首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   179篇
  免费   6篇
  2021年   8篇
  2019年   3篇
  2018年   4篇
  2017年   2篇
  2016年   3篇
  2015年   1篇
  2014年   4篇
  2013年   26篇
  2012年   2篇
  2011年   1篇
  2010年   2篇
  2009年   7篇
  2007年   5篇
  2006年   2篇
  2005年   2篇
  2004年   5篇
  2003年   2篇
  2002年   7篇
  2001年   5篇
  2000年   4篇
  1999年   2篇
  1998年   3篇
  1997年   3篇
  1996年   2篇
  1995年   7篇
  1994年   2篇
  1993年   3篇
  1992年   3篇
  1991年   5篇
  1989年   2篇
  1987年   3篇
  1986年   5篇
  1984年   5篇
  1983年   3篇
  1982年   1篇
  1981年   4篇
  1980年   3篇
  1979年   3篇
  1978年   4篇
  1977年   5篇
  1976年   1篇
  1975年   2篇
  1974年   2篇
  1973年   4篇
  1972年   2篇
  1971年   2篇
  1970年   2篇
  1969年   3篇
  1968年   2篇
  1948年   1篇
排序方式: 共有185条查询结果,搜索用时 15 毫秒
61.
In planar location problems with barriers one considers regions which are forbidden for the siting of new facilities as well as for trespassing. These problems are important since they model various actual applications. The resulting mathematical models have a nonconvex objective function and are therefore difficult to tackle using standard methods of location theory even in the case of simple barrier shapes and distance functions. For the case of center objectives with barrier distances obtained from the rectilinear or Manhattan metric, it is shown that the problem can be solved in polynomial time by identifying a dominating set. The resulting genuinely polynomial algorithm can be combined with bound computations which are derived from solving closely connected restricted location and network location problems. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 647–665, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10038  相似文献   
62.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy.  相似文献   
63.
The problem of finding a strict total order for a finite set of multiple criteria alternatives is considered. Our research extends previous work by us, which considered finding a partial order for a finite set of alternatives. We merge the preference information extracted from the preference cones and corresponding polyhedral sets, with the information derived from pairwise comparisons of two alternatives, yielding a preference matrix. This preference matrix is used as input to an integer programming model to obtain a strict total order that provides a transitive ranking for the set of alternatives. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 155–163, 2014  相似文献   
64.

This paper presents a model for converting legacy defense production facilities into private‐sector economic resources. Specifically, this paper will examine as a case study the first successful conversion of a former U.S. Department of Energy nuclear weapons production installation, including reasons for its success, its costs and benefits, and lessons for public policy. It is envisioned that this model may be useful for mitigating local economic hardship resulting from defense “downsizing” and for privatizing production capacities critical for national defense.  相似文献   
65.
There is widespread acknowledgment that the modus operandi of jihadis affiliated with Al Qaeda and associated movements (AQAM) relies on brutal terror-inducing tactics which, more often than not, target Muslim and non-Muslim non-combatants. This article comparatively analyzes the AQAM modus operandi within the traditional stipulations of Islamic precepts with respect to waging jihad al saghir. The purpose is to glean whether or not such tactics such as suicide bombings, declaring fellow Muslim apostates in order to kill them, use of IEDs and EFPs to target civilians, constitute legitimate rules of engagement in jihad al saghir.  相似文献   
66.
67.
68.
The debate on the civil–military gap and especially the TISS findings are viewed with a focus on Germany. After outlining the historical development of civil–military relations, the question of a civil–military gap is explored with data from 2001. The study finds similarities and differences in the attitudes of the civilian and the military population on several issues. Overall, there is a broad overlap of attitudes, yet differences do exist, especially on issues of foreign policy and things military. It is argued that at the beginning of the twenty-first century, civil–military relations in Germany are largely uncontested, but will become more strained.  相似文献   
69.
Some scholars would have us believe that the distinctions between military and policing roles, methods and objectives have become increasingly blurred by the security demands of a post-Cold War and post-11 September global and domestic order. This article explores the current state of the police–military divide through a conceptual and case study analysis. It concludes that, in this case, there is some conflation occurring at a macro-level as international and domestic affairs have become increasingly indistinct, but the article also demonstrates that the actual ethos and practice of these agencies still differs strongly. Most importantly, the article argues that this distinction is in fact a very useful one in planning for future peace support operations  相似文献   
70.
In the present study,organically modified Montmorillonite clay with polar moiety,the Cloisite 30B,is used for preparation of Hydroxyl terminated polybutadiene(HTPB)-clay nanocomposites(HCN)by dispersion of nanoclay in polymer matrix under high shear mixing.The nanocomposites thus prepared are evaluated in composite propellants as inhibitor material for their functional utility.Several inhibition formulations containing 5 wt%-15 wt%of nanoclay,with or without the conventional filler Sb2O3,were prepared.All these formulations were evaluated for their physical,mechanical,thermal,and ablative properties.Ablation rate and density of the compositions containing Cloisite 30B is around 23%and 5%lower respectively in comparison of the base composition.Strain capability of these compositions is twofold higher than that of base composition.These compositions have also been evaluated for their smoke generation tendency by measuring infra red(IR)attenuation in the wavelength range 1.3 μm-5.6 μm and 8 μm-13 μm and thereby compared with the base composition.The corresponding results confirmed that the compositions containing Cloisite 30B as filler have much lower IR attenuation than compositions with conventional filler,Sb2O3.Replacement of 5%Sb2O3 by nanoclay showed 8%reduction in IR attenuation rate which further reduced to 16%on replacement of 15%of Sb2O3.Interfacial bonding of HCN based inhibitors is also comparable or even better than conventional inhibitors.Precisely,the nanoclay composites with Cloisite 30B as filler exhibit all desirable properties of an inhibitor.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号