首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   170篇
  免费   6篇
  2022年   1篇
  2021年   8篇
  2019年   3篇
  2018年   6篇
  2017年   3篇
  2016年   3篇
  2015年   1篇
  2014年   4篇
  2013年   29篇
  2012年   2篇
  2011年   1篇
  2010年   3篇
  2009年   8篇
  2008年   1篇
  2007年   7篇
  2006年   2篇
  2005年   2篇
  2004年   5篇
  2003年   2篇
  2002年   7篇
  2001年   5篇
  2000年   4篇
  1999年   2篇
  1998年   3篇
  1997年   3篇
  1992年   1篇
  1991年   1篇
  1989年   2篇
  1987年   3篇
  1986年   5篇
  1984年   5篇
  1983年   3篇
  1982年   1篇
  1981年   4篇
  1980年   3篇
  1979年   3篇
  1978年   4篇
  1977年   5篇
  1976年   1篇
  1975年   2篇
  1974年   2篇
  1973年   4篇
  1972年   2篇
  1971年   2篇
  1970年   2篇
  1969年   3篇
  1968年   2篇
  1948年   1篇
排序方式: 共有176条查询结果,搜索用时 15 毫秒
51.
52.
Suppose a given set of jobs has to be processed on a multi-purpose facility which has various settings or states. There is a choice of states in which to process a job and the cost of processing depends on the state. In addition, there is also a sequence-dependent changeover cost between states. The problem is then to schedule the jobs, and pick an optimum setting for each job, so as to minimize the overall operating costs. A dynamic programming model is developed for obtaining an optimal solution to the problem. The model is then extended using the method of successive approximations with a view to handling large-dimensioned problems. This extension yields good (but not necessarily optimal) solutions at a significant computational saving over the direct dynamic programming approach.  相似文献   
53.
The present study is concerned with the determination of a few observations from a sufficiently large complete or censored sample from the extreme value distribution with location and scale parameters μ and σ, respectively, such that the asymptotically best linear unbiased estimators (ABLUE) of the parameters in Ref. [24] yield high efficiencies among other choices of the same number of observations. (All efficiencies considered are relative to the Cramér-Rao lower bounds for regular unbiased estimators.) The study is on the asymptotic theory and under Type II censoring scheme. For the estimation of μ when σ is known, it has been proved that there exists a unique optimum spacing whether the sample is complete, right censored, left censored, or doubly censored. Several tables are prepared to aid in the numerical computation of the estimates as well as to furnish their efficiencies. For the estimation of σ when μ is known, it has been observed that there does not exist a unique optimum spacing. Accordingly we have obtained a spacing based on a complete sample which yields high efficiency. A similar table as above is prepared. When both μ and σ are unknown, we have considered four different spacings based on a complete sample and chosen the one yielding highest efficiency. A table of the efficiencies is also prepared. Finally we apply the above results for the estimation of the scale and/or shape parameters of the Weibull distribution.  相似文献   
54.
Although cycling in the simplex method has long been known, a number of theoretical questions concerning cycling have not been fully answered. One of these, stated in [3], is to find the smallest example of cycling, and Beale's example with three equations and seven variables is conjectured to be the smallest one. The exact bounds on dimensions of cycling examples are established in this paper. We show that Beale's example is the smallest one which cycles at a non-optimal solution, that a smaller one can cycle at the optimum, and that, in general (including the completely degenerate case), a cycling example must have at least two equations, at least six variables, and at least three non-basic variables. Examples and geometries are given for the extreme cases, showing that the bounds are sharp.  相似文献   
55.
We study the problem of capacity exchange between two firms in anticipation of the mismatch between demand and capacity, and its impact on firm's capacity investment decisions. For given capacity investment levels of the two firms, we demonstrate how capacity price may be determined and how much capacity should be exchanged when either manufacturer acts as a Stackelberg leader in the capacity exchange game. By benchmarking against the centralized system, we show that a side payment may be used to coordinate the capacity exchange decisions. We then study the firms' capacity investment decisions using a biform game framework in which capacity investment decisions are made individually and exchange decisions are made as in a centralized system. We demonstrate the existence and uniqueness of the Nash equilibrium capacity investment levels and study the impact of firms' share of the capacity exchange surplus on their capacity investment levels.© 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
56.
The subject of this note is the validity of the algorithm described by Aneja and Nair to solve the constrained shortest-path problem.  相似文献   
57.
A single machine is available to process a collection of stochastic jobs. There may be technological constraints on the job set. The machine sometimes breaks down. Costs are incurred and rewards are earned during processing. We seek strategies for processing the jobs which maximize the total expected reward earned.  相似文献   
58.
A model is developed which may be used to determine the expected total cost of quality control per inspection lot under acceptance sampling by variables where several characteristics are to be simultaneously controlled. Optimization of the model is accomplished through the application of a conventional search procedure. The sensitivity of the model and the optimum solution to the shape of the underlying probability distributions is discussed and associated analyses are presented through an example.  相似文献   
59.
In planar location problems with barriers one considers regions which are forbidden for the siting of new facilities as well as for trespassing. These problems are important since they model various actual applications. The resulting mathematical models have a nonconvex objective function and are therefore difficult to tackle using standard methods of location theory even in the case of simple barrier shapes and distance functions. For the case of center objectives with barrier distances obtained from the rectilinear or Manhattan metric, it is shown that the problem can be solved in polynomial time by identifying a dominating set. The resulting genuinely polynomial algorithm can be combined with bound computations which are derived from solving closely connected restricted location and network location problems. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 647–665, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10038  相似文献   
60.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号