全文获取类型
收费全文 | 243篇 |
免费 | 11篇 |
出版年
2021年 | 8篇 |
2019年 | 3篇 |
2018年 | 7篇 |
2017年 | 6篇 |
2016年 | 7篇 |
2015年 | 4篇 |
2014年 | 8篇 |
2013年 | 44篇 |
2012年 | 4篇 |
2011年 | 3篇 |
2010年 | 3篇 |
2009年 | 10篇 |
2007年 | 5篇 |
2006年 | 2篇 |
2005年 | 2篇 |
2004年 | 5篇 |
2003年 | 2篇 |
2002年 | 8篇 |
2001年 | 5篇 |
2000年 | 4篇 |
1999年 | 2篇 |
1998年 | 3篇 |
1997年 | 3篇 |
1996年 | 2篇 |
1995年 | 8篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1992年 | 3篇 |
1991年 | 6篇 |
1990年 | 4篇 |
1989年 | 5篇 |
1988年 | 6篇 |
1987年 | 6篇 |
1986年 | 5篇 |
1984年 | 6篇 |
1983年 | 3篇 |
1982年 | 2篇 |
1981年 | 4篇 |
1980年 | 3篇 |
1979年 | 3篇 |
1978年 | 4篇 |
1977年 | 5篇 |
1975年 | 2篇 |
1974年 | 2篇 |
1973年 | 4篇 |
1972年 | 2篇 |
1971年 | 2篇 |
1970年 | 2篇 |
1969年 | 3篇 |
1968年 | 2篇 |
排序方式: 共有254条查询结果,搜索用时 15 毫秒
71.
K. D. Glazebrook 《海军后勤学研究》1984,31(2):251-264
A single machine is available to process a collection of stochastic jobs. There may be technological constraints on the job set. The machine sometimes breaks down. Costs are incurred and rewards are earned during processing. We seek strategies for processing the jobs which maximize the total expected reward earned. 相似文献
72.
A model is developed which may be used to determine the expected total cost of quality control per inspection lot under acceptance sampling by variables where several characteristics are to be simultaneously controlled. Optimization of the model is accomplished through the application of a conventional search procedure. The sensitivity of the model and the optimum solution to the shape of the underlying probability distributions is discussed and associated analyses are presented through an example. 相似文献
73.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy. 相似文献
74.
Stephan Frühling 《Contemporary Security Policy》2017,38(1):4-25
America’s alliances in Europe and East Asia all involve some institutional cooperation on U.S. nuclear weapons policy, planning or employment—from consultative fora in Asia to joint policy and sharing of nuclear warheads in NATO. Such cooperation is often analyzed through the prism of “extended nuclear deterrence,” which focuses on the extension of U.S. security guarantees and their effect on potential adversaries. This article argues that this underplays the importance of institutional factors: Allies have historically addressed a range of objectives through such cooperation, which has helped to catalyze agreements about broader alliance strategy. The varied form such cooperation takes in different alliances also flows from the respective bargaining power of allies and the relative importance of consensus, rather than perceived threats. The article concludes that nuclear weapons cooperation will remain crucial in successful U.S. alliance management, as allies negotiate their relationship with each other in the face of geostrategic change. 相似文献
75.
Constructing a strict total order for alternatives characterized by multiple criteria: An extension 下载免费PDF全文
Akram Dehnokhalaji Pekka J. Korhonen Murat Köksalan Nasim Nasrabadi Diclehan Tezcaner Öztürk Jyrki Wallenius 《海军后勤学研究》2014,61(2):155-163
The problem of finding a strict total order for a finite set of multiple criteria alternatives is considered. Our research extends previous work by us, which considered finding a partial order for a finite set of alternatives. We merge the preference information extracted from the preference cones and corresponding polyhedral sets, with the information derived from pairwise comparisons of two alternatives, yielding a preference matrix. This preference matrix is used as input to an integer programming model to obtain a strict total order that provides a transitive ranking for the set of alternatives. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 155–163, 2014 相似文献
76.
Separatist terrorism has been a severe problem for Turkey since the mid-1980s. The conventional wisdom contends that economic deprivation in southeastern Turkey is the fundamental reason for the long-running battle against the Kurdish rebels. Considering that there is limited empirical literature on the roots of terrorism in Turkey, yielding conflicting results about the claim that the main cause of terrorism is deprived economic conditions, this study aims to answer whether there is a causal relationship between income inequality and separatist terrorism in Turkey. To this end, the Global Terrorism Data Base for the period of 1973–2006, two Theil indices of pay inequality as proxy for income inequality, and the vector autoregression and Autoregressive Moving Average (ARMA) methods are utilized. The results support the early findings that income inequality, a particular focus in this paper and an essential indicator of economic deprivation, is not a main cause of escalation of separatist terrorism in Turkey. 相似文献
77.
Richard B. Streeter Guy W. Hagen Edward E. Patenaude Dennis K. Killinger 《Defence and Peace Economics》2013,24(6):569-587
This paper presents a model for converting legacy defense production facilities into private‐sector economic resources. Specifically, this paper will examine as a case study the first successful conversion of a former U.S. Department of Energy nuclear weapons production installation, including reasons for its success, its costs and benefits, and lessons for public policy. It is envisioned that this model may be useful for mitigating local economic hardship resulting from defense “downsizing” and for privatizing production capacities critical for national defense. 相似文献
78.
79.
Although a number of studies concerning Turkish defence-growth relation have been published in recent years, little attention is given the demand for Turkish defence expenditure. This is an important issue for understanding which variables contribute to the determination of the demand for military expenditure. However, it is difficult to develop a general theory or a standard empirical approach for the determination of the demand military expenditure. This study models and estimates the demand for Turkish defence expenditure for the period 1951-1998 using autoregressive distributed lag approach to cointegration (ARDL) following the methodology outlined in Pesaran and Shin (1999). This procedure can be applied regardless of the stationary properties of the variables in the sample and allows for inferences on long-run estimates, which is not possible under alternative cointegration procedures. The findings suggest that Turkish defence spending is determined by NATO's defence spending, Greece's defence spending and some security considerations. 相似文献
80.