首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   93篇
  免费   1篇
  2021年   1篇
  2017年   1篇
  2016年   1篇
  2015年   1篇
  2014年   1篇
  2013年   49篇
  2012年   2篇
  2009年   1篇
  2006年   1篇
  2003年   1篇
  2001年   1篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1996年   1篇
  1995年   1篇
  1994年   2篇
  1993年   2篇
  1991年   3篇
  1990年   1篇
  1989年   4篇
  1986年   1篇
  1983年   2篇
  1982年   1篇
  1978年   1篇
  1976年   2篇
  1975年   1篇
  1974年   1篇
  1973年   2篇
  1972年   2篇
  1970年   3篇
排序方式: 共有94条查询结果,搜索用时 15 毫秒
31.
32.
Strategic terrorism: The framework and its fallacies   总被引:1,自引:0,他引:1  
This article seeks to lay out a comprehensive framework by which those who utilize a campaign of strategic terrorism seek to attain their ends. It identifies a distinctive modus operandi: 1) disorientation: to alienate the authorities from their citizens, reducing the government to impotence in the eyes of the population; 2) target response: to induce a target to respond in a manner that is favorable to the insurgent cause; 3) gaining legitimacy: to exploit the emotional impact of the violence to insert an alternative political message. By elucidating the strategy of terrorism, the analysis also reveals its inherent limitations. Resting on the premise that a militarily more powerful adversary will in some way feel restrained from bringing the full force of its military superiority to bear, the strategy relies exclusively on the exploitation of the psychological effects of armed action, thereby rendering it vulnerable to those who are willing to view the resolution of clashes of interest principally in terms of the tangibles of military power.  相似文献   
33.
34.
A new model has been defined that enables the estimation of the lethal radius (radius of efficiency) of HE (High Explosive) artillery projectiles against human targets. The model is made of several modules: CAD (Computer Aided Design) modeling, fragment mass distribution estimation, fragment initial velocity prediction, fragment trajectory calculation, effective fragment density estimation, and high explosive projectile lethal radius estimation. The results were compared with the experimental results obtained based on tests in the arena used in our country, and the agreement of the results was good. This model can be used in any terminal-ballistics scenario for high explosive projectiles since it is general, para-metric, fast and relatively easy to implement.  相似文献   
35.
We consider a generalization of the well‐known generalized assignment problem (GAP) over discrete time periods encompassed within a finite planning horizon. The resulting model, MultiGAP, addresses the assignment of tasks to agents within each time period, with the attendant single‐period assignment costs and agent‐capacity constraint requirements, in conjunction with transition costs arising between any two consecutive periods in which a task is reassigned to a different agent. As is the case for its single‐period antecedent, MultiGAP offers a robust tool for modeling a wide range of capacity planning problems occurring within supply chain management. We provide two formulations for MultiGAP and establish that the second (alternative) formulation provides a tighter bound. We define a Lagrangian relaxation‐based heuristic as well as a branch‐and‐bound algorithm for MultiGAP. Computational experience with the heuristic and branch‐and‐bound algorithm on over 2500 test problems is reported. The Lagrangian heuristic consistently generates high‐quality and in many cases near‐optimal solutions. The branch‐and‐bound algorithm is also seen to constitute an effective means for solving to optimality MultiGAP problems of reasonable size. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012  相似文献   
36.
The Jelinski–Moranda model of software reliability is generalized by introducing a negative‐binomial prior distribution for the number of faults remaining, together with a Gamma distribution for the rate at which each fault is exposed. This model is well suited to sequential use, where a sequence of reliability forecasts is made in the process of testing or using the software. We also investigate replacing the Gamma distribution with a worst‐case assumption about failure rates (the worst‐case failure rate in models such as this is not infinite, since faults with large failure rates are immediately discovered and removed). © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006  相似文献   
37.
The problem of searching for randomly moving targets such as children and submarines is known to be fundamentally difficult, but finding efficient methods for generating optimal or near optimal solutions is nonetheless an important practical problem. This paper investigates the efficiency of Branch and Bound methods, with emphasis on the tradeoff between the accuracy of the bound employed and the time required to compute it. A variety of bounds are investigated, some of which are new. In most cases the best bounds turn out to be imprecise, but very easy to compute. © 1998 John Wiley & Sons, Inc. Naval Research Logistics 45: 243–257, 1998  相似文献   
38.
Polling systems are used to model a wide variety of real-world applications, for example, telecommunication and material handling systems. Consequently, there is continued interest in developing efficient algorithms to analyze the performance of polling systems. Recent interest in the optimization of these systems has brought up the need for developing very efficient techniques for analyzing their waiting times. This article presents the Individual Station technique for cyclic polling systems. The technique possesses the following features: (a) it allows the user to compute the mean waiting time at a selected station independent of the mean waiting time computations at other stations, and (b) its complexity is low and independent of the system utilization. In addition the technique provides explicit closed-form expressions for (i) the mean waiting times in a system with 3 stations, and (ii) the second moment of the waiting times in a system with 2 stations, for an exhaustive service system. © 1996 John Wiley & Sons, Inc.  相似文献   
39.
A pursuer (P) pursues an evader(E), with each party choosing a speed in ignorance of the other's choice. Going extremely fast is not wise for either party because doing so would quickly exhaust available energy. The situation is modeled as a two-person zero-sum game. The game may or may not have a saddle point, depending on the energy ratio and tactical parameters. © 1994 John Wiley & Sons, Inc.  相似文献   
40.
This article defines a class of univariate functions termed composite unimodal, and shows how their minimization admits an effective search procedure, albeit one not as efficient as is Fibonacci search for unimodal functions. An approximate Lagrangian approach to an important real-world logistics problem is seen to yield a surrogate problem whose objective function is composite unimodal. The mathematical form of this objective function is likely to be encountered in solving future real-world problems. © 1993 John Wiley & Sons, Inc.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号