全文获取类型
收费全文 | 1670篇 |
免费 | 470篇 |
国内免费 | 88篇 |
出版年
2024年 | 4篇 |
2023年 | 16篇 |
2022年 | 26篇 |
2021年 | 33篇 |
2020年 | 47篇 |
2019年 | 35篇 |
2018年 | 28篇 |
2017年 | 75篇 |
2016年 | 110篇 |
2015年 | 68篇 |
2014年 | 118篇 |
2013年 | 139篇 |
2012年 | 133篇 |
2011年 | 143篇 |
2010年 | 99篇 |
2009年 | 131篇 |
2008年 | 90篇 |
2007年 | 100篇 |
2006年 | 122篇 |
2005年 | 110篇 |
2004年 | 90篇 |
2003年 | 63篇 |
2002年 | 54篇 |
2001年 | 59篇 |
2000年 | 52篇 |
1999年 | 36篇 |
1998年 | 48篇 |
1997年 | 30篇 |
1996年 | 33篇 |
1995年 | 24篇 |
1994年 | 25篇 |
1993年 | 16篇 |
1992年 | 17篇 |
1991年 | 21篇 |
1990年 | 24篇 |
1989年 | 8篇 |
1988年 | 1篇 |
排序方式: 共有2228条查询结果,搜索用时 406 毫秒
991.
自动消防系统在大型聚集场所火灾中的应用 总被引:1,自引:0,他引:1
分析大型公共聚集场所(如商场、会展中心、写字楼、公共娱乐场所等)火灾事故特点,并有针对性地说明了自动消防系统的作用,着重阐述了在火灾抢险救援中如何充分利用这些设施,以减少人员伤亡和财产损失,提高灭火成效。 相似文献
992.
近年来,大学生(包括部队院校大学生)在学习马克思主义理论课的过程中存在着比较严重的厌学现象,重要原因之一就是理论教学模式陈旧,使学生在马克思主义理论“有什么用”、“对谁有用”等问题上产生了程度不同的模糊认识。因此,必须构建马克思主义理论课教学的新模式。 相似文献
993.
In this paper we present an application of the core solution concepts for multi‐objective games to a bank ATM network model. In these games, the worth of a coalition is given by a subset of vectors of the k‐dimensional space rather than by a scalar. The paper investigates how an ATM network model based on multi‐objective cooperative game theory could be used as an alternative way of setting interchange fees paid by the customer's bank to the one that owns the ATM. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2005 相似文献
994.
A 2‐dimensional rectangular k‐within‐consecutive‐(r, s)‐out‐of‐(m, n):F system consists of m × n components, and fails if and only if k or more components fail in an r × s submatrix. This system can be treated as a reliability model for TFT liquid crystal displays, wireless communication networks, etc. Although an effective method has been developed for evaluating the exact system reliability of small or medium‐sized systems, that method needs extremely high computing time and memory capacity when applied to larger systems. Therefore, developing upper and lower bounds and accurate approximations for system reliability is useful for large systems. In this paper, first, we propose new upper and lower bounds for the reliability of a 2‐dimensional rectangular k‐within‐consecutive‐(r, s)‐out‐of‐(m, n):F system. Secondly, we propose two limit theorems for that system. With these theorems we can obtain accurate approximations for system reliabilities when the system is large and component reliabilities are close to one. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005 相似文献
995.
In a traditional multiple subset sum problem (MSSP), there is a given set of items and a given set of bins (or knapsacks) with identical capacities. The objective is to select a subset of the items and pack them into the bins such that the total weight of the selected items is maximized. However, in many applications of the MSSP, the bins have assignment restrictions. In this article, we study the subset sum problem with inclusive assignment set restrictions, in which the assignment set of one item (i.e., the set of bins that the item may be assigned to) must be either a subset or a superset of the assignment set of another item. We develop an efficient 0.6492‐approximation algorithm and test its effectiveness via computational experiments. We also develop a polynomial time approximation scheme for this problem. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011 相似文献
996.
Problems in counterterrorism and corporate competition have prompted research that attempts to combine statistical risk analysis with game theory in ways that support practical decision making. This article applies these methods of adversarial risk analysis to the problem of selecting a route through a network in which an opponent chooses vertices for ambush. The motivating application is convoy routing across a road network when there may be improvised explosive devices and imperfect intelligence about their locations. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011 相似文献
997.
Following work of Stroud and Saeger (Proceedings of ISI, Springer Verlag, New York, 2006) and Anand et al. (Proceedings of Computer, Communication and Control Technologies, 2003), we formulate a port of entry inspection sequencing task as a problem of finding an optimal binary decision tree for an appropriate Boolean decision function. We report on new algorithms for finding such optimal trees that are more efficient computationally than those presented by Stroud and Saeger and Anand et al. We achieve these efficiencies through a combination of specific numerical methods for finding optimal thresholds for sensor functions and two novel binary decision tree search algorithms that operate on a space of potentially acceptable binary decision trees. The improvements enable us to analyze substantially larger applications than was previously possible. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011 相似文献
998.
We develop models that lend insight into how to design systems that enjoy economies of scale in their operating costs, when those systems will subsequently face disruptions from accidents, acts of nature, or an intentional attack from a well‐informed attacker. The systems are modeled as parallel M/M/1 queues, and the key question is how to allocate service capacity among the queues to make the system resilient to worst‐case disruptions. We formulate this problem as a three‐level sequential game of perfect information between a defender and a hypothetical attacker. The optimal allocation of service capacity to queues depends on the type of attack one is facing. We distinguish between deterministic incremental attacks, where some, but not all, of the capacity of each attacked queue is knocked out, and zero‐one random‐outcome (ZORO) attacks, where the outcome is random and either all capacity at an attacked queue is knocked out or none is. There are differences in the way one should design systems in the face of incremental or ZORO attacks. For incremental attacks it is best to concentrate capacity. For ZORO attacks the optimal allocation is more complex, typically, but not always, involving spreading the service capacity out somewhat among the servers. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011 相似文献
999.
对任意正整数n,Pd(n)定义为n的所有正因子的乘积,gd(n)定义为n的所有小于n的正因子的乘积。若n=p1^a1p2^a2…px^as是n的标准分解式,算数函数Ω(n)=a1+a2+…+as。用解析的方法研究关于Smarandache序列Pd(n)、qd(n)与Q(n)的混合均值,并给出两个较好的渐近公式。 相似文献
1000.
黄兴春 《武警工程学院学报》2011,(6):73-74
军事理论课程教学,在武警部队“合训”院校课程设置中所处的位置越来越重要。如何在由培养工程技术类干部向指挥类干部“学历教育合训”为主的转变过程中,提高军事理论课程讲授的效益和质量,关键在于军事理论课程教学方法的选择与应用。 相似文献