首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   570篇
  免费   65篇
  国内免费   21篇
  2023年   1篇
  2022年   5篇
  2021年   9篇
  2020年   16篇
  2019年   7篇
  2018年   12篇
  2017年   29篇
  2016年   20篇
  2015年   14篇
  2014年   50篇
  2013年   50篇
  2012年   39篇
  2011年   50篇
  2010年   35篇
  2009年   37篇
  2008年   43篇
  2007年   40篇
  2006年   28篇
  2005年   39篇
  2004年   22篇
  2003年   29篇
  2002年   17篇
  2001年   19篇
  2000年   9篇
  1999年   10篇
  1998年   5篇
  1997年   1篇
  1996年   1篇
  1995年   4篇
  1994年   2篇
  1993年   3篇
  1992年   2篇
  1991年   1篇
  1990年   5篇
  1989年   2篇
排序方式: 共有656条查询结果,搜索用时 15 毫秒
91.
研究了网络延时对路由器主动队列管理机制的影响,分析了几种典型主动队列管理算法在大延时网络中的性能。在介绍了基于内模补偿的DC-AQM算法的优缺点之后,根据PID控制器延时补偿的Ziegler-Nichols设定方法,提出了ZNDC(Ziegler-Nichols delay compensation)AQM算法并进行了仿真实验验证,实验结果表明算法达到了预期的目标。  相似文献   
92.
We consider a firm which faces a Poisson customer demand and uses a base‐stock policy to replenish its inventories from an outside supplier with a fixed lead time. The firm can use a preorder strategy which allows the customers to place their orders before their actual need. The time from a customer's order until the date a product is actually needed is called commitment lead time. The firm pays a commitment cost which is strictly increasing and convex in the length of the commitment lead time. For such a system, we prove the optimality of bang‐bang and all‐or‐nothing policies for the commitment lead time and the base‐stock policy, respectively. We study the case where the commitment cost is linear in the length of the commitment lead time in detail. We show that there exists a unit commitment cost threshold which dictates the optimality of either a buy‐to‐order (BTO) or a buy‐to‐stock strategy. The unit commitment cost threshold is increasing in the unit holding and backordering costs and decreasing in the mean lead time demand. We determine the conditions on the unit commitment cost for profitability of the BTO strategy and study the case with a compound Poisson customer demand.  相似文献   
93.
军事通信网综合管理系统中,各专业网络运行情况的主要数据都可汇总到综合网管数据库中。这些网管数据中隐含了网络运行的几乎全部信息,但即使是最有经验的网络管理专家面对这些繁杂的数据也只能望洋兴叹。面对大数据的智能分析技术则有可能实现网络运行态势的高度可视化,充分理解和详细把握全网运行状态,像知识、经验、联想丰富的专家一样不知疲倦地对网络运行状况进行全面细致地分析,从海量的网管数据中发现网络故障的蛛丝马迹,发现隐含的问题,预知网络变化。论文介绍了利用大数据分析技术实现网络管理智能化的现实目标,基于性能的网络异常预测预报、基于性能和事件的故障分析诊断、网络运行知识的挖掘利用等方面的功能和技术途径。  相似文献   
94.
Private military and security companies (PMSCs) play an increasingly important role in the provision of security-related services. In their attempts to win new clients and find suitable personnel, they take on different identities by presenting themselves as conventional businesses, military actors, and humanitarians. In this article, we examine how PMSCs deploy these identities when they recruit new personnel through social media. Our computer-assisted content analysis of Twitter messages posted by two major United States-based companies—CACI and DynCorp International—shows that while both PMSCs amplify their business and military identities to attract the most talented personnel, they construct and communicate these identities in different ways with CACI branding itself as a sophisticated, modern, and patriotic business and DynCorp as a home-grown, traditional military provider. In addition, our analysis lends force to scholars suggesting that state militaries and the private security sector compete increasingly for prospective employees using similar strategies.  相似文献   
95.
The article examines the findings of the Commission of Inquiry established by the Norwegian government in 2014 to evaluate all aspects of Norway’s civilian and military contribution to the international operation in Afghanistan from 2001 to 2014. Concerned with the wider implications of the Commission’s findings, it focuses on two issues in particular: (1) Norway’s relations with the US, a close and long-standing strategic ally whose resources, capabilities and dominance of decision-making dwarfed that of all other coalition partners in Afghanistan; and (2) Norway’s record in the province of Faryab, where, from 2005 to 2012, a Norwegian-led Provincial Reconstruction Team was charged with bringing security, good governance and development to the province. How Norway prioritised and managed relations with the US highlights and helps to problematise the challenges – political, practical and moral – facing small and medium-sized powers operating in a coalition alongside the US. Norwegian efforts in Faryab are revealing of the dilemmas and contradictions that plagued and, ultimately, fatally undermined the international intervention as a whole. As such, Norway’s experience provides a microcosm through which the inherent limitations of the attempt to transfer the structures of modern statehood and Western democracy to Afghanistan can be better understood.  相似文献   
96.
Abstract

Post-uprisings Middle East politics is frequently described as a ‘regional cold war’ involving proxy warfare that emphasises the role of shared identities linking external and local actors. But does the ‘content’ of identities impact proxy war dynamics? This article considers the present ‘battle for Syria’, a local conflict that became a theatre for multiple proxy wars involving actors emphasising identities on various levels, most notably national, religious/ sect and ethnic. It suggests that identity content does matter, with global powers more reluctant than regional players to back groups identifying at sub-national level, while foreign non-state actors are enthusiastic backers of sub-national identity.  相似文献   
97.
Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA.  相似文献   
98.
杨未强  李荧  宋锐  何锋 《国防科技》2018,39(5):086-090
美国空军研究实验室是一个在空中、太空和网络空间领域处于全球领先地位的科研机构,承担着美国空军国防高技术项目的规划、管理和实施工作,是美国空军保持技术优势的重要研究力量。本文剖析了美国空军实验室的使命任务、组织管理和科研规划,总结了实验室在人才培养和科研任务制定方面的经验和方法。  相似文献   
99.
Magnetic resonance imaging and other multifunctional diagnostic facilities, which are considered as scarce resources of hospitals, typically provide services to patients with different medical needs. This article examines the admission policies during the appointment management of such facilities. We consider two categories of patients: regular patients who are scheduled in advance through an appointment system and emergency patients with randomly generated demands during the workday that must be served as soon as possible. According to the actual medical needs of patients, regular patients are segmented into multiple classes with different cancelation rates, no‐show probabilities, unit value contributions, and average service times. Management makes admission decisions on whether or not to accept a service request from a regular patient during the booking horizon to improve the overall value that could be generated during the workday. The decisions should be made by considering the cancelation and no‐show behavior of booked patients as well as the emergency patients that would have to be served because any overtime service would lead to higher costs. We studied the optimal admission decision using a continuous‐time discrete‐state dynamic programming model. Identifying an optimal policy for this discrete model is analytically intractable and numerically inefficient because the state is multidimensional and infinite. We propose to study a deterministic counterpart of the problem (i.e., the fluid control problem) and to develop a time‐based fluid policy that is shown to be asymptotically optimal for large‐scale problems. Furthermore, we propose to adopt a mixed fluid policy that is developed based on the information obtained from the fluid control problem. Numerical experiments demonstrate that this improved policy works effectively for small‐scale problems. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 287–304, 2016  相似文献   
100.
结合当前新疆高校大学生主流文化教育面临的新问题、新挑战,阐述了中国特色主流文化认同的内涵、特征、主流文化认同的理论视域,分析新疆高校大学生主流文化认同教育的特殊重要性,提出加强新疆高校大学生主流文化认同教育的策略选择。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号