首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   246篇
  免费   142篇
  国内免费   11篇
  2023年   1篇
  2022年   4篇
  2021年   10篇
  2020年   3篇
  2019年   7篇
  2018年   4篇
  2017年   13篇
  2016年   25篇
  2015年   18篇
  2014年   30篇
  2013年   42篇
  2012年   22篇
  2011年   21篇
  2010年   19篇
  2009年   18篇
  2008年   15篇
  2007年   12篇
  2006年   16篇
  2005年   28篇
  2004年   16篇
  2003年   5篇
  2002年   3篇
  2001年   14篇
  2000年   6篇
  1999年   3篇
  1998年   5篇
  1997年   3篇
  1996年   6篇
  1995年   5篇
  1994年   6篇
  1993年   4篇
  1992年   5篇
  1991年   2篇
  1990年   3篇
  1989年   4篇
  1988年   1篇
排序方式: 共有399条查询结果,搜索用时 15 毫秒
81.
We consider the problem of assessing the value of demand sharing in a multistage supply chain in which the retailer observes stationary autoregressive moving average demand with Gaussian white noise (shocks). Similar to previous research, we assume each supply chain player constructs its best linear forecast of the leadtime demand and uses it to determine the order quantity via a periodic review myopic order‐up‐to policy. We demonstrate how a typical supply chain player can determine the extent of its available information in the presence of demand sharing by studying the properties of the moving average polynomials of adjacent supply chain players. The retailer's demand is driven by the random shocks appearing in the autoregressive moving average representation for its demand. Under the assumptions we will make in this article, to the retailer, knowing the shock information is equivalent to knowing the demand process (assuming that the model parameters are also known). Thus (in the event of sharing) the retailer's demand sequence and shock sequence would contain the same information to the retailer's supplier. We will show that, once we consider the dynamics of demand propagation further up the chain, it may be that a player's demand and shock sequences will contain different levels of information for an upstream player. Hence, we study how a player can determine its available information under demand sharing, and use this information to forecast leadtime demand. We characterize the value of demand sharing for a typical supply chain player. Furthermore, we show conditions under which (i) it is equivalent to no sharing, (ii) it is equivalent to full information shock sharing, and (iii) it is intermediate in value to the two previously described arrangements. Although it follows from existing literature that demand sharing is equivalent to full information shock sharing between a retailer and supplier, we demonstrate and characterize when this result does not generalize to upstream supply chain players. We then show that demand propagates through a supply chain where any player may share nothing, its demand, or its full information shocks (FIS) with an adjacent upstream player as quasi‐ARMA in—quasi‐ARMA out. We also provide a convenient form for the propagation of demand in a supply chain that will lend itself to future research applications. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 515–531, 2014  相似文献   
82.
Secret French plans to launch guerrilla-style raids on the British Isles devised in the spring of 1796 were referred to as ‘chouanneries’. The name and concept behind these small-war operations were modelled on the irregular tactics used by the Chouan rebels in the Vendée, which the French state army had brutally quashed, but some wished to transfer into their institutional practice. Part of France's ongoing military strategy in the war against Britain, which included fomenting insurrection in Ireland, these irregular operations were to be manned partially by pardoned deserters and released convicts and prisoners of war. Of these, only Tate's brief invasion of Wales in 1797 was realised, but the surviving plans provide insightful historical lessons into an Anglophobic mindset shared by a small network of practitioners and policy deciders on the effectiveness of such shock and awe tactics. Largely motivated by the desire to take revenge for Britain's support of counter-revolutionaries in the Vendée, these plans could more aptly be referred to as counter-‘chouanneries’.  相似文献   
83.
This article modifies the associations made by historians and political scientists of Spanish guerrilla warfare with revolutionary insurgency. First, it explains how the guerrilla phenomenon moved from a Leftist to a reactionary symbol. Second, it compares the insurgency and counter-insurgency features of the Carlist War (1833–1840) with those of the better-known Peninsular War (1808–1814). Third, it shows how erstwhile guerrilla leaders during the Carlist War made their expertise available to the counter-insurgency, in a socio-economic as well as military setting. This article revises the social banditry paradigm in nineteenth-century Spain in the under-researched context of Europe bloodiest nineteenth-century civil war.  相似文献   
84.
无机及分析化学是高等院校农学类各专业的基础课。教学过程中应该把农学学科实际与教学环节紧密结合起来,充分调动学生学习积极性,这样既有利于培养学生的多种能力,又有利于提高教师的教学及科研水平。  相似文献   
85.
从设备信息管理系统的升级和业务功能扩展的角度,阐述了采用现场总线技术构成的设备监控系统的必要性和作用,并结合某工程背景,介绍了基于现场总线设备自动化监控系统的体系结构、网络拓扑结构及应用软件设计等关键技术。  相似文献   
86.
射击精度小样本检验理论和方法应用研究初探   总被引:2,自引:2,他引:0  
给出了多维正态分布与x2分布的概率性质,讨论了在小样本检验中如何检验同方差的二维正态分布的方差问题.给出了检验中所涉及到的拒真和纳伪概率的重要物理参数和OC曲线.该结论在武器装备小样本检验中具有重要的意义.  相似文献   
87.
家庭是人才成长的重要因素。“两弹一星”科技英才早年的成长也得益于此,即:深厚的家学渊源——“两弹一星”科技英才早年成长的知识土壤;殷实的家庭经济——“两弹一星”科技英才早年成长的物质基础;优良的家族传统——“两弹一星”科技英才早年成长的文化基因。  相似文献   
88.
针对基于控制顶点的NURBS曲线形状修改的不足,讨论了如何通过修改控制顶点的权值进行NURBS曲线的形状修改问题。NURBS曲线可以看作是高一维空间非有理B样条曲线的中心投影,该B样条的控制顶点为原NURBS曲线的带权控制顶点,并且这样的B样条曲线有无数多条。根据这个性质,以实例的方式通过特定自由参数确定B样条曲线,实现了基于权值的NURBS曲线形状修改。该方法不仅能够较好地确定新的带权控制顶点,还解决了修改后曲线在给定点的切矢问题,具有更好的灵活性。  相似文献   
89.
系统模型误差是导致卡尔曼滤波发散的一个很重要的原因,分析了衰减记忆法和限定记忆法两种对模型误差所致滤波发散的补偿方法,通过引入阈值可以将这两种方法进行有机结合,给出了一种新的衰减限定记忆算法。算例分析验证了衰减限定记忆算法在抑制滤波发散方面具有比衰减记忆和限定记忆法更好的性能,并能自适应调整算法所需观测数据数目。  相似文献   
90.
While Carl von Clausewitz has generally been respected as one of the most profound philosophers of war, his expertise has been regarded as somewhat limited if not even irrelevant to the so-called ‘new wars’ of the post-Cold War world. Many scholars in international relations have claimed that ‘new wars’ are essentially ‘post-Clausewitzian’ and ‘post-trinitarian’ in nature, meaning that they are no longer fathomable through a Clausewitzian framework. However Clausewitz's earlier writings were nearly exclusively dedicated to guerrilla warfare, or what he called ‘small wars’. These writings have been largely overlooked by many analysts of contemporary conflicts. By drawing on his rare and untranslated writings, the article uncovers a critical part of Clausewitz's expertise in asymmetric warfare and shows that, far from being irrelevant in an age where interstate warfare is increasingly being replaced by conflicts between states and semi-/non-state actors, Clausewitz's philosophical writings actually shed new light into the particular interactive dynamics generated during wars waged under conditions of asymmetry.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号