全文获取类型
收费全文 | 643篇 |
免费 | 111篇 |
国内免费 | 17篇 |
出版年
2023年 | 1篇 |
2022年 | 1篇 |
2021年 | 9篇 |
2020年 | 9篇 |
2019年 | 15篇 |
2018年 | 9篇 |
2017年 | 35篇 |
2016年 | 35篇 |
2015年 | 22篇 |
2014年 | 39篇 |
2013年 | 90篇 |
2012年 | 38篇 |
2011年 | 51篇 |
2010年 | 37篇 |
2009年 | 31篇 |
2008年 | 35篇 |
2007年 | 48篇 |
2006年 | 41篇 |
2005年 | 38篇 |
2004年 | 31篇 |
2003年 | 31篇 |
2002年 | 31篇 |
2001年 | 28篇 |
2000年 | 20篇 |
1999年 | 15篇 |
1998年 | 10篇 |
1997年 | 6篇 |
1996年 | 2篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1992年 | 3篇 |
1991年 | 1篇 |
1990年 | 1篇 |
1989年 | 2篇 |
1988年 | 2篇 |
排序方式: 共有771条查询结果,搜索用时 234 毫秒
1.
Ryusuke Hohzaki 《海军后勤学研究》2008,55(1):76-90
This article deals with a two‐person zero‐sum game called a search allocation game (SAG), in which a searcher and a target participate as players. The searcher distributes his searching resources in a search space to detect the target. The effect of resources lasts a certain period of time and extends to some areas at a distance from the resources' dropped points. On the other hand, the target moves around in the search space to evade the searcher. In the history of search games, there has been little research covering the durability and reachability of searching resources. This article proposes two linear programming formulations to solve the SAG with durable and reachable resources, and at the same time provide an optimal strategy of distributing searching resources for the searcher and an optimal moving strategy for the target. Using examples, we will analyze the influences of two attributes of resources on optimal strategies. © 2007 Wiley Periodicals, Inc. Naval Research Logistics 2008 相似文献
2.
An attacker‐defender model for analyzing the vulnerability of initial attack in wildfire suppression 下载免费PDF全文
Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA. 相似文献
3.
4.
文中指出抑制阶比混迭和泄漏是建立一套完整的微机特征分析系统中需要解决的二个关键的信号处理问题。提出了阶比滤波器是抑制阶比混迭有效和实用的方法;并研制频率比合成器以抑制泄漏。介绍了由频率比合成器、阶比滤波器、TMS32010数据采集装置、主机和绘图仪所组成的微机特征分析系统。最后给出了该微机特征分析系统对轴承进行故障诊断的结果。 相似文献
5.
姜礼平 《海军工程大学学报》1991,(4)
本文讨论了带噪声情形下 AR 模型的参数估计及定阶问题,还给出了噪声模型的参数估计,并证明了它们的强相容性。 相似文献
6.
We seek dynamic server assignment policies in finite‐capacity queueing systems with flexible and collaborative servers, which involve an assembly and/or a disassembly operation. The objective is to maximize the steady‐state throughput. We completely characterize the optimal policy for a Markovian system with two servers, two feeder stations, and instantaneous assembly and disassembly operations. This optimal policy allocates one server per station unless one of the stations is blocked, in which case both servers work at the unblocked station. For Markovian systems with three stations and instantaneous assembly and/or disassembly operations, we consider similar policies that move a server away from his/her “primary” station only when that station is blocked or starving. We determine the optimal assignment of each server whose primary station is blocked or starving in systems with three stations and zero buffers, by formulating the problem as a Markov decision process. Using this optimal assignment, we develop heuristic policies for systems with three or more stations and positive buffers, and show by means of a numerical study that these policies provide near‐optimal throughput. Furthermore, our numerical study shows that these policies developed for assembly‐type systems also work well in tandem systems. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008 相似文献
7.
Joseph Y.‐T. Leung 《海军后勤学研究》2002,49(4):422-431
We consider the problem of sequencing n jobs on a single machine, with each job having a processing time and a common due date. The common due date is assumed to be so large that all jobs can complete by the due date. It is known that there is an O(n log n)‐time algorithm for finding a schedule with minimum total earliness and tardiness. In this article, we consider finding a schedule with dual criteria. The primary goal is to minimize the total earliness and tardiness. The secondary goals are to minimize: (1) the maximum earliness and tardiness; (2) the sum of the maximum of the squares of earliness and tardiness; (3) the sum of the squares of earliness and tardiness. For the first two criteria, we show that the problems are NP‐hard and we give a fully polynomial time approximation scheme for both of them. For the last two criteria, we show that the ratio of the worst schedule versus the best schedule is no more than . © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 422–431, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10020 相似文献
8.
9.
提出了一种确定目标进入角的原理和方法,这种原理和方法具有较高的计算精度和实时性,易于工程实现,可用于机载火力控制系统完成空对空导弹允许发射区计算. 相似文献
10.
杜旭宇 《中国人民武装警察部队学院学报》2003,19(1):72-75
中国的改革始终并越来越置于开放的国际大环境和背景下 ,围绕开放来进行 ,改革的历史取向、实际步骤等方方面面都自觉不自觉地受到开放的很大影响 :开放引致改革、开放促进改革、开放制约改革、开放本身就是改革、开放保障改革。因此 ,中国的改革是一种典型的开放式改革 ,中国的“改革开放”也可以或越来越应当是“开放改革” ;就改革与开放的相互关系、作用及对整个社会发展的作用和意义而言 ,开放重于改革。 相似文献