首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   217篇
  免费   108篇
  国内免费   11篇
  2023年   1篇
  2022年   3篇
  2021年   3篇
  2020年   2篇
  2019年   4篇
  2018年   5篇
  2017年   18篇
  2016年   19篇
  2015年   17篇
  2014年   26篇
  2013年   45篇
  2012年   17篇
  2011年   15篇
  2010年   16篇
  2009年   12篇
  2008年   9篇
  2007年   13篇
  2006年   16篇
  2005年   18篇
  2004年   13篇
  2003年   7篇
  2002年   8篇
  2001年   9篇
  2000年   8篇
  1999年   9篇
  1998年   4篇
  1997年   4篇
  1996年   4篇
  1995年   2篇
  1994年   3篇
  1993年   2篇
  1991年   2篇
  1990年   2篇
排序方式: 共有336条查询结果,搜索用时 93 毫秒
91.
We consider the problem of assessing the value of demand sharing in a multistage supply chain in which the retailer observes stationary autoregressive moving average demand with Gaussian white noise (shocks). Similar to previous research, we assume each supply chain player constructs its best linear forecast of the leadtime demand and uses it to determine the order quantity via a periodic review myopic order‐up‐to policy. We demonstrate how a typical supply chain player can determine the extent of its available information in the presence of demand sharing by studying the properties of the moving average polynomials of adjacent supply chain players. The retailer's demand is driven by the random shocks appearing in the autoregressive moving average representation for its demand. Under the assumptions we will make in this article, to the retailer, knowing the shock information is equivalent to knowing the demand process (assuming that the model parameters are also known). Thus (in the event of sharing) the retailer's demand sequence and shock sequence would contain the same information to the retailer's supplier. We will show that, once we consider the dynamics of demand propagation further up the chain, it may be that a player's demand and shock sequences will contain different levels of information for an upstream player. Hence, we study how a player can determine its available information under demand sharing, and use this information to forecast leadtime demand. We characterize the value of demand sharing for a typical supply chain player. Furthermore, we show conditions under which (i) it is equivalent to no sharing, (ii) it is equivalent to full information shock sharing, and (iii) it is intermediate in value to the two previously described arrangements. Although it follows from existing literature that demand sharing is equivalent to full information shock sharing between a retailer and supplier, we demonstrate and characterize when this result does not generalize to upstream supply chain players. We then show that demand propagates through a supply chain where any player may share nothing, its demand, or its full information shocks (FIS) with an adjacent upstream player as quasi‐ARMA in—quasi‐ARMA out. We also provide a convenient form for the propagation of demand in a supply chain that will lend itself to future research applications. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 515–531, 2014  相似文献   
92.
This article modifies the associations made by historians and political scientists of Spanish guerrilla warfare with revolutionary insurgency. First, it explains how the guerrilla phenomenon moved from a Leftist to a reactionary symbol. Second, it compares the insurgency and counter-insurgency features of the Carlist War (1833–1840) with those of the better-known Peninsular War (1808–1814). Third, it shows how erstwhile guerrilla leaders during the Carlist War made their expertise available to the counter-insurgency, in a socio-economic as well as military setting. This article revises the social banditry paradigm in nineteenth-century Spain in the under-researched context of Europe bloodiest nineteenth-century civil war.  相似文献   
93.
This paper provides a political economy analysis of the evolution of unmanned aerial vehicles (UAV), or ‘drones’ in the USA. Focus is placed on the interplay between the polity and private economic influences, and their impact on the trajectory of political, economic, and military outcomes. We identify the initial formation of the drone industry, trace how the initial relationships between the military and the private sector expanded over time, and discuss present relationships. Understanding the historical evolution of UAV technology, as well as the major players in the industry today, is important for ongoing policy debates regarding the use of drones both domestically and internationally.  相似文献   
94.
If international terrorism is on a rising trend, an important source of confirmation or refutation of this is time‐series data on terrorist activity. Using chiefly data collected by the RAND/MIPT consortium we show using basic statistical analysis that in the period 1968–2005 the yearly number of all international terrorist incidents shows no trend over time, but fluctuates year on year in a random manner. On the other hand some indicators do show a definite trend over time, principally the steady rise in the number of incidents that are death‐dealing in nature. A further conclusion is drawn, showing that the proportion of these incidents leading to deaths above a given level is virtually fixed.  相似文献   
95.
弹药洞库有害气体分布规律研究   总被引:1,自引:0,他引:1  
以计算流体力学(CFD)为理论基础,应用GAMBIT软件对洞库内的有害气体进行几何模型构建和网络划分,用FLUENT软件对所建模型中有害气体的扩散和分布规律进行模拟分析,并对单一释放源条件下扩散规律进行比较,分析弹药堆垛对气体扩散的影响.通过对洞库内有害气体的整体分布规律的研究,找到了库房内有害气体浓度最高的位置.最后,通过实验对仿真结果进行验证.  相似文献   
96.
GPS现代化中的L1C信号使用了LDPC码,以提高接收机的弱信号接收能力。L1C信号中使用的LDPC码没有循环或准循环结构,这为译码器设计带来了难度。为了降低译码器实现复杂度,在分析L1C信号LDPC码校验矩阵结构的基础上,通过对校验节点分类和改变变量节点更新方法,提出了一种低存储量和简化译码器控制逻辑的低复杂度译码器结构,并通过仿真验证了译码器译码结果的正确性。  相似文献   
97.
对装备保障抽组力量的物资装载问题进行了数学描述,建立了以实现全部物资尽量分散装载为目标,以同类物资集中装载、车辆承载物资总体积不超过车辆有效容积、车辆承载物资总重量不超过车辆标记载重量、物资必须装载且不被重复装载等为主要约束的数学模型,并进行了求解.最后通过实例解算验证了模型的有效性.  相似文献   
98.
While Carl von Clausewitz has generally been respected as one of the most profound philosophers of war, his expertise has been regarded as somewhat limited if not even irrelevant to the so-called ‘new wars’ of the post-Cold War world. Many scholars in international relations have claimed that ‘new wars’ are essentially ‘post-Clausewitzian’ and ‘post-trinitarian’ in nature, meaning that they are no longer fathomable through a Clausewitzian framework. However Clausewitz's earlier writings were nearly exclusively dedicated to guerrilla warfare, or what he called ‘small wars’. These writings have been largely overlooked by many analysts of contemporary conflicts. By drawing on his rare and untranslated writings, the article uncovers a critical part of Clausewitz's expertise in asymmetric warfare and shows that, far from being irrelevant in an age where interstate warfare is increasingly being replaced by conflicts between states and semi-/non-state actors, Clausewitz's philosophical writings actually shed new light into the particular interactive dynamics generated during wars waged under conditions of asymmetry.  相似文献   
99.
在基于亥姆霍兹共振腔的一维声子晶体中引入点缺陷会在原有局域共振型声禁带内产生缺陷模式。采用传递矩阵法和有限元法分析了缺陷模式随缺陷单元几何尺寸变化关系和声子晶体中声场分布情况。结果表明,随着缺陷单元与完美单元之间耦合程度的增强,缺陷模式从局域共振型禁带中完美单元共振频率处向禁带边缘移动。同时,缺陷模式的存在使得结构中出现了能量局域化的现象。本工作对设计新型声滤波器、能量集中装置具有一定的理论意义。  相似文献   
100.
This article explores a perennial theme in the literature of strategic studies: the relationship between military theory and the military profession. It begins with a conceptual analysis of this relationship. It then investigates what military theorists themselves have had to say about the utility of their craft. It concludes by assessing the actual influence of military theory on selected individuals and institutions. The individuals are George S. Patton, Jr., and Ulysses S. Grant. The institutions are the United States Army and the United States Air Force in the late twentieth century. The fundamental finding is suggested in the title: military theory can indeed be quite useful in the maturation of military commanders and in the development of martial institutions, but it is not always necessary and by no means perfect. It should thus be studied assiduously but used with caution.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号