全文获取类型
收费全文 | 570篇 |
免费 | 65篇 |
国内免费 | 21篇 |
出版年
2023年 | 1篇 |
2022年 | 5篇 |
2021年 | 9篇 |
2020年 | 16篇 |
2019年 | 7篇 |
2018年 | 12篇 |
2017年 | 29篇 |
2016年 | 20篇 |
2015年 | 14篇 |
2014年 | 50篇 |
2013年 | 50篇 |
2012年 | 39篇 |
2011年 | 50篇 |
2010年 | 35篇 |
2009年 | 37篇 |
2008年 | 43篇 |
2007年 | 40篇 |
2006年 | 28篇 |
2005年 | 39篇 |
2004年 | 22篇 |
2003年 | 29篇 |
2002年 | 17篇 |
2001年 | 19篇 |
2000年 | 9篇 |
1999年 | 10篇 |
1998年 | 5篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1995年 | 4篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 5篇 |
1989年 | 2篇 |
排序方式: 共有656条查询结果,搜索用时 15 毫秒
91.
研究了网络延时对路由器主动队列管理机制的影响,分析了几种典型主动队列管理算法在大延时网络中的性能。在介绍了基于内模补偿的DC-AQM算法的优缺点之后,根据PID控制器延时补偿的Ziegler-Nichols设定方法,提出了ZNDC(Ziegler-Nichols delay compensation)AQM算法并进行了仿真实验验证,实验结果表明算法达到了预期的目标。 相似文献
92.
We consider a firm which faces a Poisson customer demand and uses a base‐stock policy to replenish its inventories from an outside supplier with a fixed lead time. The firm can use a preorder strategy which allows the customers to place their orders before their actual need. The time from a customer's order until the date a product is actually needed is called commitment lead time. The firm pays a commitment cost which is strictly increasing and convex in the length of the commitment lead time. For such a system, we prove the optimality of bang‐bang and all‐or‐nothing policies for the commitment lead time and the base‐stock policy, respectively. We study the case where the commitment cost is linear in the length of the commitment lead time in detail. We show that there exists a unit commitment cost threshold which dictates the optimality of either a buy‐to‐order (BTO) or a buy‐to‐stock strategy. The unit commitment cost threshold is increasing in the unit holding and backordering costs and decreasing in the mean lead time demand. We determine the conditions on the unit commitment cost for profitability of the BTO strategy and study the case with a compound Poisson customer demand. 相似文献
93.
军事通信网综合管理系统中,各专业网络运行情况的主要数据都可汇总到综合网管数据库中。这些网管数据中隐含了网络运行的几乎全部信息,但即使是最有经验的网络管理专家面对这些繁杂的数据也只能望洋兴叹。面对大数据的智能分析技术则有可能实现网络运行态势的高度可视化,充分理解和详细把握全网运行状态,像知识、经验、联想丰富的专家一样不知疲倦地对网络运行状况进行全面细致地分析,从海量的网管数据中发现网络故障的蛛丝马迹,发现隐含的问题,预知网络变化。论文介绍了利用大数据分析技术实现网络管理智能化的现实目标,基于性能的网络异常预测预报、基于性能和事件的故障分析诊断、网络运行知识的挖掘利用等方面的功能和技术途径。 相似文献
94.
Jutta Joachim Marlen Martin Henriette Lange Andrea Schneiker Magnus Dau 《Contemporary Security Policy》2018,39(2):298-316
Private military and security companies (PMSCs) play an increasingly important role in the provision of security-related services. In their attempts to win new clients and find suitable personnel, they take on different identities by presenting themselves as conventional businesses, military actors, and humanitarians. In this article, we examine how PMSCs deploy these identities when they recruit new personnel through social media. Our computer-assisted content analysis of Twitter messages posted by two major United States-based companies—CACI and DynCorp International—shows that while both PMSCs amplify their business and military identities to attract the most talented personnel, they construct and communicate these identities in different ways with CACI branding itself as a sophisticated, modern, and patriotic business and DynCorp as a home-grown, traditional military provider. In addition, our analysis lends force to scholars suggesting that state militaries and the private security sector compete increasingly for prospective employees using similar strategies. 相似文献
95.
The article examines the findings of the Commission of Inquiry established by the Norwegian government in 2014 to evaluate all aspects of Norway’s civilian and military contribution to the international operation in Afghanistan from 2001 to 2014. Concerned with the wider implications of the Commission’s findings, it focuses on two issues in particular: (1) Norway’s relations with the US, a close and long-standing strategic ally whose resources, capabilities and dominance of decision-making dwarfed that of all other coalition partners in Afghanistan; and (2) Norway’s record in the province of Faryab, where, from 2005 to 2012, a Norwegian-led Provincial Reconstruction Team was charged with bringing security, good governance and development to the province. How Norway prioritised and managed relations with the US highlights and helps to problematise the challenges – political, practical and moral – facing small and medium-sized powers operating in a coalition alongside the US. Norwegian efforts in Faryab are revealing of the dilemmas and contradictions that plagued and, ultimately, fatally undermined the international intervention as a whole. As such, Norway’s experience provides a microcosm through which the inherent limitations of the attempt to transfer the structures of modern statehood and Western democracy to Afghanistan can be better understood. 相似文献
96.
AbstractPost-uprisings Middle East politics is frequently described as a ‘regional cold war’ involving proxy warfare that emphasises the role of shared identities linking external and local actors. But does the ‘content’ of identities impact proxy war dynamics? This article considers the present ‘battle for Syria’, a local conflict that became a theatre for multiple proxy wars involving actors emphasising identities on various levels, most notably national, religious/ sect and ethnic. It suggests that identity content does matter, with global powers more reluctant than regional players to back groups identifying at sub-national level, while foreign non-state actors are enthusiastic backers of sub-national identity. 相似文献
97.
An attacker‐defender model for analyzing the vulnerability of initial attack in wildfire suppression 下载免费PDF全文
Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA. 相似文献
98.
99.
Magnetic resonance imaging and other multifunctional diagnostic facilities, which are considered as scarce resources of hospitals, typically provide services to patients with different medical needs. This article examines the admission policies during the appointment management of such facilities. We consider two categories of patients: regular patients who are scheduled in advance through an appointment system and emergency patients with randomly generated demands during the workday that must be served as soon as possible. According to the actual medical needs of patients, regular patients are segmented into multiple classes with different cancelation rates, no‐show probabilities, unit value contributions, and average service times. Management makes admission decisions on whether or not to accept a service request from a regular patient during the booking horizon to improve the overall value that could be generated during the workday. The decisions should be made by considering the cancelation and no‐show behavior of booked patients as well as the emergency patients that would have to be served because any overtime service would lead to higher costs. We studied the optimal admission decision using a continuous‐time discrete‐state dynamic programming model. Identifying an optimal policy for this discrete model is analytically intractable and numerically inefficient because the state is multidimensional and infinite. We propose to study a deterministic counterpart of the problem (i.e., the fluid control problem) and to develop a time‐based fluid policy that is shown to be asymptotically optimal for large‐scale problems. Furthermore, we propose to adopt a mixed fluid policy that is developed based on the information obtained from the fluid control problem. Numerical experiments demonstrate that this improved policy works effectively for small‐scale problems. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 287–304, 2016 相似文献
100.
张伟 《兵团教育学院学报》2016,(4)
结合当前新疆高校大学生主流文化教育面临的新问题、新挑战,阐述了中国特色主流文化认同的内涵、特征、主流文化认同的理论视域,分析新疆高校大学生主流文化认同教育的特殊重要性,提出加强新疆高校大学生主流文化认同教育的策略选择。 相似文献