首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   74篇
  免费   6篇
  2022年   1篇
  2021年   3篇
  2020年   2篇
  2019年   3篇
  2018年   2篇
  2017年   6篇
  2016年   4篇
  2015年   3篇
  2014年   6篇
  2013年   24篇
  2012年   2篇
  2011年   1篇
  2010年   1篇
  2009年   4篇
  2008年   2篇
  2007年   1篇
  2006年   1篇
  2004年   2篇
  1996年   1篇
  1994年   1篇
  1993年   1篇
  1991年   1篇
  1986年   1篇
  1985年   1篇
  1980年   1篇
  1978年   1篇
  1977年   2篇
  1974年   1篇
  1969年   1篇
排序方式: 共有80条查询结果,搜索用时 15 毫秒
41.
42.
There is much controversy in the literature over whether military expenditures have a positive, negative or no relation impact on economic growth. The aim of this paper is to determine the relationship between GDP and defence expenditure. The study analyses GDP and defence expenditures of the developed countries with cross-sectional ADF and SURADF unit root tests using annual data for the years 1980–2007. We conclude that in the long term, according to the Pedroni cointegration test, there exists a relationship between defence expenditure and economic growth. Furthermore, by utilizing the Granger causality test, we find that defence expenditure is a factor in economic growth. In other words, our study validates the hypothesis that defence spending by economically developed countries positively contributes to their economics.  相似文献   
43.
The container relocation problem (CRP) is concerned with emptying a single yard‐bay which contains J containers each following a given pickup order so as to minimize the total number of relocations made during their retrieval process. The CRP can be modeled as a binary integer programming (IP) problem and is known to be NP‐hard. In this work, we focus on an extension of the CRP to the case where containers are both received and retrieved from a single yard‐bay, and call it the dynamic container relocation problem. The arrival (departure) sequences of containers to (from) the yard‐bay is assumed to be known a priori. A binary IP formulation is presented for the problem. Then, we propose three types of heuristic methods: index based heuristics, heuristics using the binary IP formulation, and a beam search heuristic. Computational experiments are performed on an extensive set of randomly generated test instances. Our results show that beam search heuristic is very efficient and performs better than the other heuristic methods.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 101–118, 2014  相似文献   
44.
The goal of this paper is to investigate the relationship between type of welfare regimes and military expenditures. There is a sizeable empirical literature on the development of the welfare state and on the typology of the welfare regimes. There appear to be, however, no empirical studies that examine welfare regimes with special attention to military spending. This study aims at providing a comprehensive analysis on the topic by considering several different welfare regime typologies. To do so, we use dynamic panel data analysis for 37 countries for the period of 1988–2003 by considering a wide range of control variables such as inequality measures, number of terrorist events, and size of the armed forces. We also replicate the same analyses for the political regimes. Our findings, in line with the literature, show that there is a positive relationship between income inequality and share of military expenditures in the central government budget, and that the number of terrorist events is a significant factor that affects both the level of military expenditure and inequality. Also, the paper reveals a significant negative relationship between social democratic welfare regimes and military expenditures.  相似文献   
45.
Up to the present, there is only very little research on how the population perceives terrorism and its threats, even though support from the population is crucial for effective counterterrorism. By eliciting beliefs and subjecting them to content analyses, six factors were found that determine the protection worthiness of a target in the people's view: the potential damage to “people,” “symbolism,” “economy,” “politics,” “nature,” and “image/publicity.” These empirically found factors are in line with factors specified by terrorist target selection models. They differ in the strength of their cognitive representation among participants and, thus, their subjective importance to the people. The first three factors are shared among all participants, whereas the latter ones could only be found in a part of the participant sample. People's judgments of the targets' protection worthiness differ substantially from their judgments of the targets' attractiveness to terrorists, even though the same factors seem to be involved. This study offers an insight into the people's mental model about protection worthiness of targets. Together with classical risk analysis and knowledge about terrorists, these results can form a basis for setting up a holistic scheme for critical infrastructure protection.  相似文献   
46.
We consider the single machine parallel batch scheduling problems to minimize makespan and total completion time, respectively, under precedence relations. The complexities of these two problems are reported as open in the literature. In this paper, we settle these open questions by showing that both problems are strongly NP‐hard, even when the precedence relations are chains. When the processing times of jobs are directly agreeable or inversely agreeable with the precedence relations, there is an O(n2) time algorithm to minimize the makespan. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004  相似文献   
47.
Particulate composites are one of the widely used materials in producing numerous state-of-the-art components in biomedical, automobile, aerospace including defence technology. Variety of modelling techniques have been adopted in the past to model mechanical behaviour of particulate composites. Due to their favourable properties, particle-based methods provide a convenient platform to model failure or fracture of these composites. Smooth particle hydrodynamics (SPH) is one of such methods which demonstrate excellent potential for modelling failure or fracture of particulate composites in a Lagrangian setting. One of the major challenges in using SPH method for modelling composite materials depends on accurate and efficient way to treat interface and boundary conditions. In this paper, a master-slave method based multi-freedom constraints is proposed to impose essential boundary conditions and interfacial displacement constraints in modelling mechanical behaviour of composite materials using SPH method. The proposed methodology enforces the above constraints more accurately and requires only smaller condition number for system stiffness matrix than the procedures based on typical penalty function approach. A minimum cut-off value-based error criteria is employed to improve the compu-tational efficiency of the proposed methodology. In addition, the proposed method is further enhanced by adopting a modified numerical interpolation scheme along the boundary to increase the accuracy and computational efficiency. The numerical examples demonstrate that the proposed master-slave approach yields better accuracy in enforcing displacement constraints and requires approximately the same computational time as that of penalty method.  相似文献   
48.
Liquid-filled compartment structure consists of a bulk steel plate with matrix blind holes which are filled with liquid and a steel front plate to seal up the liquid with rings and bolts.The liquid-filled compart-ment structure can resist the shaped charge warhead effectively.This paper presents experimental and theoretical investigations of the penetration ability of the residual shaped charge jet emerging from the liquid-filled compartment structure after the penetration process at different impact angles.On the basis of shock wave propagation theory,the influence of the liquid-filled compartment structure on jet sta-bility is analysed.The interferences of the liquid backflow caused by a reflected shock wave and a back plate on jet stability under different impact angles are also examined.In addition,the range of the disturbed velocity segments of the jet at different impact angles and the penetration ability of the re-sidual jet are obtained.A theoretical model is validated against the experimental penetration depths.  相似文献   
49.
An approximation for P(X2 + Y2 ≤ K2σ21) based on an unpublished result of Kleinecke is derived, where X and Y are independent normal variables having zero means and variances σ21 and σ22 and σ1 ≥ σ2. Also, we provide asymptotic expressions for the probabilities for large values of β = K2(1 - c2)/4c2 where c = σ21. These are illustrated by comparing with values tabulated by Harter [6]. Solution of K for specified P and c is also considered. The main point of this note is that simple and easily calculable approximations for P and K can be developed and there is no need for numerical evaluation of integrals.  相似文献   
50.
This paper presents a mathematical model of a single-lane bridge serving two-way traffic in alternating directions (with an FIFO rule observed within each directional queue). While the bridge serves cars moving in one direction, cars approaching from the opposite direction wait in a queue at its foot. When cars in the current direction finish crossing the bridge, it begins serving cars from the other direction, if any are present. A newly-arrived car finding an empty bridge mounts it immediately. Several cars moving in the same direction may occupy the bridge simultaneously. The crossing speed is assumed to be constant, and the arrival processes in both directions are assumed to be independent, homogeneous Poisson processes. A generalization of the alternating-priority models [1, 2] is developed to arrive at the Laplace-Stieltjes transform and the expected value of the flow time (the time interval between the moments of arrival at the bridge and departure from it) for steady state conditions. The results are discussed and some examples are presented graphically.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号