全文获取类型
收费全文 | 360篇 |
免费 | 75篇 |
国内免费 | 16篇 |
出版年
2023年 | 2篇 |
2022年 | 3篇 |
2021年 | 8篇 |
2020年 | 8篇 |
2019年 | 6篇 |
2018年 | 3篇 |
2017年 | 19篇 |
2016年 | 17篇 |
2015年 | 10篇 |
2014年 | 30篇 |
2013年 | 20篇 |
2012年 | 22篇 |
2011年 | 25篇 |
2010年 | 18篇 |
2009年 | 27篇 |
2008年 | 26篇 |
2007年 | 19篇 |
2006年 | 19篇 |
2005年 | 23篇 |
2004年 | 19篇 |
2003年 | 12篇 |
2002年 | 14篇 |
2001年 | 12篇 |
2000年 | 16篇 |
1999年 | 8篇 |
1998年 | 6篇 |
1997年 | 6篇 |
1996年 | 8篇 |
1995年 | 7篇 |
1994年 | 5篇 |
1993年 | 4篇 |
1992年 | 11篇 |
1991年 | 7篇 |
1990年 | 6篇 |
1989年 | 2篇 |
1988年 | 2篇 |
1987年 | 1篇 |
排序方式: 共有451条查询结果,搜索用时 15 毫秒
121.
122.
We study an infinite‐horizon, N‐stage, serial production/inventory system with two transportation modes between stages: regular shipping and expedited shipping. The optimal inventory policy for this system is a top–down echelon base‐stock policy, which can be computed through minimizing 2N nested convex functions recursively (Lawson and Porteus, Oper Res 48 (2000), 878–893). In this article, we first present some structural properties and comparative statics for the parameters of the optimal inventory policies, we then derive simple, newsvendor‐type lower and upper bounds for the optimal control parameters. These results are used to develop near optimal heuristic solutions for the echelon base‐stock policies. Numerical studies show that the heuristic performs well. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2010 相似文献
123.
124.
针对装备使用阶段可修复件的采购优化问题,引入近似拉普拉斯需求概率分布代替正态分布,建立了采购间隔期内的备件短缺函数。根据供应链系统库存控制论,建立了可修备件的采购模型。通过对可修件周转渠道的分析,对采购短缺指标进行了修订,并给出了最优采购点和采购量的计算方法。对两种需求分布下的算例结果进行了对比和分析,结果表明:该模型得到的结果鲁棒性强、偏差小,优化过程简单,为故障率高、消耗量低的可修件采购方案的确定提供了一种新的思路。 相似文献
125.
126.
127.
Stephen J. Cimbala 《Defense & Security Analysis》2017,33(3):193-208
Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities. 相似文献
128.
In this article, we study how to derive bounds for the reliability and the expected lifetime of a coherent system with heterogeneous ordered components. These bounds can be used to compare the performance of the systems obtained by permuting the components at a given system structure, that is, to study where we should place the different components at a system structure to get the most reliable system. Moreover, a similar procedure is applied to get bounds for mixtures and for the generalized proportional hazard rate model when the baseline populations are ordered. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 108–116, 2017 相似文献
129.
Richard A.I. Johnson 《Defence and Peace Economics》2017,28(3):272-297
Arms transfers provide exporters an avenue to provide security to other states while gaining economic benefits. Arms transfers provide importers an avenue to gain security without having to rely on alliances. Past research uses aggregate measures of the monetary or security value of major weapon system transfers without accounting for strategic differences in possible use in interstate and civil conflict. This article presents a data set on interstate transfers of major weapon systems between 1950 and 2010 building upon Stockholm Peach Research Institute’s Arms Trade Register with several improvements. First, it disaggregates land weapons and air weapons into categories reflecting their strategic capabilities. Second, model level characteristics (e.g. age, speed, and range) are drawn from Jane’s Defence sources. Additionally, the data set covers a larger range of time and states than previous data sets categorizing arms. To demonstrate the usefulness, this article first presents summary statistics of the data set and then replicates an earlier test to show that the effect of human rights and regime types on United States transfers differs across the categories of arms compared to alternative measures of arms transfers. 相似文献
130.
针对群系统编队跟踪问题,提出一种满足线性二次型调节器性能指标的优化控制方法。建立编队跟踪问题的数学描述和设计编队跟踪控制协议。给出群系统实现编队跟踪的充要条件,借助李雅普诺夫第二方法分析系统的稳定性。得到了控制协议能够最小化线性二次型调节器性能指标的拓扑条件,设计了编〖BHDWG8,WK10YQ,DK1*2,WK1*2D〗〖XCWL.TIF;%129%129〗听语音 聊科研与作者互动 队跟踪算法。仿真实验验证了控制方法的有效性。 相似文献