首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   642篇
  免费   12篇
  2021年   5篇
  2019年   14篇
  2018年   17篇
  2017年   16篇
  2016年   17篇
  2015年   11篇
  2013年   160篇
  2011年   5篇
  2010年   8篇
  2009年   5篇
  2007年   6篇
  2006年   7篇
  2005年   15篇
  2004年   8篇
  2003年   9篇
  2002年   7篇
  2001年   4篇
  2000年   11篇
  1999年   9篇
  1998年   6篇
  1997年   13篇
  1996年   14篇
  1995年   6篇
  1994年   13篇
  1993年   11篇
  1992年   10篇
  1991年   16篇
  1990年   7篇
  1989年   6篇
  1987年   6篇
  1986年   12篇
  1985年   12篇
  1984年   11篇
  1983年   8篇
  1982年   8篇
  1981年   9篇
  1980年   10篇
  1979年   9篇
  1978年   11篇
  1977年   9篇
  1976年   11篇
  1975年   8篇
  1974年   14篇
  1973年   8篇
  1972年   11篇
  1971年   15篇
  1970年   5篇
  1969年   8篇
  1968年   7篇
  1967年   4篇
排序方式: 共有654条查询结果,搜索用时 328 毫秒
41.
During the period 1996–2006, the Communist Party of Nepal (Maoist) waged overt people’s war to seize state power and institute a new order that realized the party’s understanding of ‘New Democracy’ as posited by Mao Tse-tung. Contextual shifts led to a crucial strategic turning point in September 2005, when the Maoists agreed to a united front with estranged legal parties to oust the monarchy and establish a republic. Though touted as acceptance of political reintegration, the move was tactical rather than strategic. The party had no intention of supporting a parliamentary version of democracy and thus, 2006–2016, engaged in a covert effort to seize power. Central to this effort was the paramilitary Young Communist League (YCL), the members of which responded to inflammatory party verbiage and exhortations with attacks upon rival political actors. These attacks, academically and legally, were terrorism and offered a salient illustration of intra-state unrestricted warfare. Ultimately, organizational, national, and regional circumstances caused the main Maoist movement to move decisively away from its covert approach. By that time, however, radical splinters had embraced the use of terrorism against rival political actors, creating a situation whereby local politics is yet a dangerous endeavor in certain areas and at certain times.  相似文献   
42.
基于非线性Kalman滤波的导航系统误差补偿技术   总被引:1,自引:0,他引:1       下载免费PDF全文
针对非线性非高斯导航系统信息处理问题,采用自组织算法、神经网络和遗传算法等改进传统非线性Kalman滤波算法,构建一种自适应的组合导航系统。应用具有冗余趋势项的自组织算法、Volterra神经网络和遗传算法,建立导航系统误差的非线性预测模型,进而计算得到其预测值;将该预测值与Kalman滤波算法求得的估计值进行比较得到差值,以此监测Kalman滤波算法的工作状态;采用自适应控制方法,在导航系统结构层面改进Kalman滤波算法,构建新型的导航系统误差补偿模型。开展基于导航系统KIND-34的半实物仿真研究,应用所提出的改进方法改善了导航系统误差的补偿效果,提高了组合导航系统的自适应能力和容错能力。  相似文献   
43.
Abstract

Contemporary development assistance often takes the form of subcontracted state-building. Foreign donors hire for-profit firms to provide services and to improve or create institutions in developing countries, particularly those experiencing internal conflict. This arrangement creates two counterproductive dynamics: first, it introduces agency problems between donors, recipient states, subcontractors, and citizens; and second, it undermines the long-run development of domestic bureaucratic capacity by creating disincentives for the host government to invest. These dynamics hinder, rather than foster, the legitimacy of state institutions. This paper summarizes trends in external support to state-building since the 1970s and illustrates subcontracted state-building with examples from Colombia.  相似文献   
44.
This article analyses the main challenges and future prospects of creating United Nations (UN) rapid reaction mechanisms, particularly in the light of past attempts and current discussions about a “UN Vanguard Force” in the wake of the High-Level Panel on Peace Operations report. The article reviews major initiatives (in particular lessons from the Standby High Readiness Brigade for UN Operations) and assesses the main achievements, failures, and challenges related to past UN-led rapid reaction mechanisms. In line with the overall aim of this special forum, the article highlights the future potentials and institutional, operational, financial, and political challenges that need to be overcome in order to design and create a pragmatic and effective rapid reaction tool at the disposal of the UN.  相似文献   
45.
In the field of nanofabrication, engineers often face unique challenges in resource‐limited experimental budgets, the sensitive nature of process behavior with respect to controllable variables, and highly demanding tolerance requirements. To effectively overcome these challenges, this article proposes a methodology for a sequential design of experiments through batches of experimental runs, aptly named Layers of Experiments with Adaptive Combined Design (LoE/ACD). In higher layers, where process behavior is less understood, experimental regions cover more design space and data points are more spread out. In lower layers, experimental regions are more focused to improve understanding of process sensitivities in a local, data‐rich environment. The experimental design is a combination of a space‐filling and an optimal design with a tuning parameter that is dependent on the amount of information accumulated over the various layers. The proposed LoE/ACD method is applied to optimize a carbon dioxide (epet‐CO2) assisted deposition process for fabricating silver nanoparticles with pressure and temperature variables. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 127–142, 2015  相似文献   
46.
This article examines the complex legacy of David Petraeus who was a key figure in the emergence of the US military shift towards counterinsurgency doctrine in the years after 2006. Although Petraeus has been perceived by critics as a publicity seeker, he can be credited with laying the foundations for a more serious commitment to COIN involving in particular in integrating conventional and Special Forces in arenas like village stability operations. The article looks a Petraeus's role in both Iraq and Afghanistan: it concludes that, in the case of Afghanistan, it is too early to assess whether counterinsurgency has had a decisive impact of the outcome of the war against the Taliban.  相似文献   
47.
We show the existence of a unique analytic single parameter limiting survival function arising from the repeated composition of a coherent structure as the number of components tends to infinity. Examples include the repeated composition process of the bridge structure. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2004.  相似文献   
48.
Chen and Bhattacharyya [Exact confidence bounds for an exponential parameter under hybrid censoring, Commun Statist Theory Methods 17 (1988), 1857–1870] considered a hybrid censoring scheme and obtained the exact distribution of the maximum likelihood estimator of the mean of an exponential distribution along with an exact lower confidence bound. Childs et al. [Exact likelihood inference based on Type‐I and Type‐II hybrid censored samples from the exponential distribution, Ann Inst Statist Math 55 (2003), 319–330] recently derived an alternative simpler expression for the distribution of the MLE. These authors also proposed a new hybrid censoring scheme and derived similar results for the exponential model. In this paper, we propose two generalized hybrid censoring schemes which have some advantages over the hybrid censoring schemes already discussed in the literature. We then derive the exact distribution of the maximum likelihood estimator as well as exact confidence intervals for the mean of the exponential distribution under these generalized hybrid censoring schemes. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004  相似文献   
49.
Blue strike aircraft enter region ? to attack Red targets. In Case 1, Blue conducts (preplanned) SEAD to establish air superiority. In the (reactive) SEAD scenario, which is Case 2, such superiority is already in place, but is jeopardized by prohibitive interference from Red, which threatens Blue's ability to conduct missions. We utilize both deterministic and stochastic models to explore optimal tactics for Red in such engagements. Policies are developed which will guide both Red's determination of the modes of operation of his engagement radar, and his choice of Blue opponent to target next. An index in the form of a simple transaction kill ratio plays a major role throughout. Published 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 723–742, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10046  相似文献   
50.
We study a stochastic scenario‐based facility location problem arising in situations when facilities must first be located, then activated in a particular scenario before they can be used to satisfy scenario demands. Unlike typical facility location problems, fixed charges arise in the initial location of the facilities, and then in the activation of located facilities. The first‐stage variables in our problem are the traditional binary facility‐location variables, whereas the second‐stage variables involve a mix of binary facility‐activation variables and continuous flow variables. Benders decomposition is not applicable for these problems due to the presence of the second‐stage integer activation variables. Instead, we derive cutting planes tailored to the problem under investigation from recourse solution data. These cutting planes are derived by solving a series of specialized shortest path problems based on a modified residual graph from the recourse solution, and are tighter than the general cuts established by Laporte and Louveaux for two‐stage binary programming problems. We demonstrate the computational efficacy of our approach on a variety of randomly generated test problems. © 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号