全文获取类型
收费全文 | 100篇 |
免费 | 56篇 |
国内免费 | 3篇 |
出版年
2023年 | 2篇 |
2022年 | 1篇 |
2021年 | 2篇 |
2020年 | 8篇 |
2019年 | 4篇 |
2018年 | 2篇 |
2017年 | 9篇 |
2016年 | 13篇 |
2015年 | 6篇 |
2014年 | 5篇 |
2013年 | 9篇 |
2012年 | 7篇 |
2011年 | 10篇 |
2010年 | 2篇 |
2009年 | 8篇 |
2008年 | 5篇 |
2007年 | 6篇 |
2006年 | 8篇 |
2005年 | 5篇 |
2004年 | 2篇 |
2003年 | 1篇 |
2002年 | 3篇 |
2001年 | 7篇 |
2000年 | 4篇 |
1999年 | 3篇 |
1998年 | 2篇 |
1997年 | 3篇 |
1996年 | 4篇 |
1994年 | 4篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1991年 | 3篇 |
1990年 | 4篇 |
1989年 | 3篇 |
排序方式: 共有159条查询结果,搜索用时 37 毫秒
61.
62.
针对径向基插值代理模型样本点预测误差为零时无法获得误差函数进行序列再采样优化的问题,将样本点分布约束引入序列再采样过程,利用潜在最优解加速收敛性,提出一种适用于径向基插值代理模型序列优化的再采样策略,该策略兼顾仿真模型的输出响应特性与样本点的空间分布特性。仿真结果表明,使用该再采样策略后,算法寻优效率和精度均优于传统基于代理模型的优化方法,在对最优解进行有效预测的同时,能显著减少原始模型计算次数。 相似文献
63.
64.
Mixed censoring is useful extension of Type I and Type II censoring and combines some advantages of both types of censoring. This paper proposes a general Bayesian framework for designing a variable acceptance sampling scheme with mixed censoring. A general loss function which includes the sampling cost, the time‐consuming cost, the salvage value, and the decision loss is employed to determine the Bayes risk and the corresponding optimal sampling plan. An explicit expression of the Bayes risk is derived. The new model can easily be adapted to create life testing models for different distributions. Specifically, two commonly used distributions including the exponential distribution and the Weibull distribution are considered with a special decision loss function. We demonstrate that the proposed model is superior to models with Type I or Type II censoring. Numerical examples are reported to illustrate the effectiveness of the method proposed. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004 相似文献
65.
"新三论"(包括耗散结构论、协同学和突变论)作为一种新的世界观,给研究作战系统这个复杂的非线性系统提供了新的视角。运用"新三论"的思想和方法指出作战系统的序参量,建立序参量方程,分析序参量演化稳定性与途径,得出一些有价值的结论,对于探索作战系统发展演变的规律具有重要意义。 相似文献
66.
针对采样频率选取不当使采集的电火工品发火信号波形失真问题,研究了在实际采样过程中采样频率的取值方法。首先根据发火信号的特征,设计了采样方案;然后利用虚拟仪器软件对发火信号进行频谱分析,确定合适的采样频率和采样点数,进而采集完整的信号波形;最后结合试验数据对采样频率的选取进行了分析,得出了在实际采样过程中采样频率的取值规律。 相似文献
67.
Following work of Stroud and Saeger (Proceedings of ISI, Springer Verlag, New York, 2006) and Anand et al. (Proceedings of Computer, Communication and Control Technologies, 2003), we formulate a port of entry inspection sequencing task as a problem of finding an optimal binary decision tree for an appropriate Boolean decision function. We report on new algorithms for finding such optimal trees that are more efficient computationally than those presented by Stroud and Saeger and Anand et al. We achieve these efficiencies through a combination of specific numerical methods for finding optimal thresholds for sensor functions and two novel binary decision tree search algorithms that operate on a space of potentially acceptable binary decision trees. The improvements enable us to analyze substantially larger applications than was previously possible. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011 相似文献
68.
We develop models that lend insight into how to design systems that enjoy economies of scale in their operating costs, when those systems will subsequently face disruptions from accidents, acts of nature, or an intentional attack from a well‐informed attacker. The systems are modeled as parallel M/M/1 queues, and the key question is how to allocate service capacity among the queues to make the system resilient to worst‐case disruptions. We formulate this problem as a three‐level sequential game of perfect information between a defender and a hypothetical attacker. The optimal allocation of service capacity to queues depends on the type of attack one is facing. We distinguish between deterministic incremental attacks, where some, but not all, of the capacity of each attacked queue is knocked out, and zero‐one random‐outcome (ZORO) attacks, where the outcome is random and either all capacity at an attacked queue is knocked out or none is. There are differences in the way one should design systems in the face of incremental or ZORO attacks. For incremental attacks it is best to concentrate capacity. For ZORO attacks the optimal allocation is more complex, typically, but not always, involving spreading the service capacity out somewhat among the servers. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011 相似文献
69.
王维民 《中国人民武装警察部队学院学报》2011,27(3):51-53
作为证据制度,行政程序证据制度与诉讼证据制度有共性,可以借鉴诉讼证据制度的合理内容。但行政管理的特殊性与行政行为的多样性决定了行政机关不应照搬繁琐而严格的诉讼证据制度。主要采用比较的方法对行政程序证据制度的特点及功能进行分析和探讨,表明行政程序证据制度是一类独立的证据制度。 相似文献
70.
In this paper we study a capacity allocation problem for two firms, each of which has a local store and an online store. Customers may shift among the stores upon encountering a stockout. One question facing each firm is how to allocate its finite capacity (i.e., inventory) between its local and online stores. One firm's allocation affects the decision of the rival, thereby creating a strategic interaction. We consider two scenarios of a single‐product single‐period model and derive corresponding existence and stability conditions for a Nash equilibrium. We then conduct sensitivity analysis of the equilibrium solution with respect to price and cost parameters. We also prove the existence of a Nash equilibrium for a generalized model in which each firm has multiple local stores and a single online store. Finally, we extend the results to a multi‐period model in which each firm decides its total capacity and allocates this capacity between its local and online stores. A myopic solution is derived and shown to be a Nash equilibrium solution of a corresponding “sequential game.” © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006 相似文献