首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   471篇
  免费   10篇
  2021年   5篇
  2019年   13篇
  2018年   9篇
  2017年   11篇
  2016年   9篇
  2015年   10篇
  2013年   78篇
  2011年   5篇
  2010年   6篇
  2009年   4篇
  2007年   6篇
  2006年   7篇
  2005年   11篇
  2004年   8篇
  2003年   5篇
  2001年   4篇
  2000年   9篇
  1999年   6篇
  1998年   5篇
  1997年   9篇
  1996年   12篇
  1995年   4篇
  1994年   10篇
  1993年   6篇
  1992年   7篇
  1991年   14篇
  1990年   8篇
  1989年   12篇
  1988年   6篇
  1987年   11篇
  1986年   9篇
  1985年   12篇
  1984年   9篇
  1983年   7篇
  1982年   6篇
  1981年   8篇
  1980年   10篇
  1979年   7篇
  1978年   8篇
  1977年   8篇
  1976年   9篇
  1975年   6篇
  1974年   11篇
  1973年   8篇
  1972年   9篇
  1971年   13篇
  1970年   3篇
  1969年   6篇
  1968年   5篇
  1967年   3篇
排序方式: 共有481条查询结果,搜索用时 31 毫秒
321.
This paper describes modeling and operational analysis of a generic asymmetric service‐system situation in which (a) Red agents, potentially threatening, but in another but important interpretation, are isolated friendlies, such as downed pilots, that require assistance and “arrive” according to some partially known and potentially changing pattern in time and space; and (b) Reds have effectively limited unknown deadlines or times of availability for Blue service, i.e., detection, classification, and attack in a military setting or emergency assistance in others. We discuss various service options by Blue service agents and devise several approximations allowing one to compute efficiently those proportions of tasks of different classes that are successfully served or, more generally, if different rewards are associated with different classes of tasks, the percentage of the possible reward gained. We suggest heuristic policies for a Blue server to select the next task to perform and to decide how much time to allocate to that service. We discuss this for a number of specific examples. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006.  相似文献   
322.
We consider the effects of cueing in a cooperative search mission that involves several autonomous agents. Two scenarios are discussed: one in which the search is conducted by a number of identical search‐and‐engage vehicles and one where these vehicles are assisted by a search‐only (reconnaissance) asset. The cooperation between the autonomous agents is facilitated via cueing, i.e., the information transmitted to the agents by a searcher that has just detected a target. The effect of cueing on the target detection probability is derived from first principles using a Markov chain analysis. In particular, it is demonstrated that the benefit of cueing on the system's effectiveness is bounded. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006  相似文献   
323.
Damage tolerant methodology is increasingly used in aeronautical components,especially due the fact that the Aviation Regulation requires such an assessment in case an accidental damage occurs.At pre-sent,there is a strong and actual interest in applying such procedures to helicopter components that are subjected to high frequency cyclic loads.In this paper,an investigation on a damaged transmission shaft for a tail rotor transmission of an actual helicopter has been carried out focusing on the fatigue crack propagation.A complete sequence of experimental tests was performed in order to create an actual ballistic damage and to subsequently check the damage tolerant behaviour.The shaft was damaged by oblique ballistic impact and was subsequently subjected to torsional fatigue loading.During the fatigue cycles several cracks propagated from the ballistic damages.Both of these steps(impact and fatigue loading)were also simulated by a complex modelling approach based on Finite Element Models and fracture mechanics theory.The comparison between the experimental and numerical results shows a good agreement but it underlines the need for a very refined modelling technique capable to replicate all the features associated with the damage in order to reliably simulate the subsequent propagation phase.  相似文献   
324.
The new numerical approach for analysis of the warhead transportations is suggested.This approach allows to control the warhead operability before its experimental analysis.The approach is implemented by the adequate models for the software ANSYS.Analysis of the loads at land operations and trans-portations of the warhead by natural roads,water and aviation allows to obtain the maximal values of loads,which are used in numerical simulations of the warhead.These loads give an opportunity to analyze the operability and the fatigue strength of the cartridge warhead.The numerical simulations of the attachments of the warhead combat elements are performed on the basis of the suggested method.The data of the numerical simulations verifies the operability of the fastener system of the warhead combat elements.  相似文献   
325.
We develop a heuristic procedure for partitioning graphs into clusters of nodes such that each cluster of nodes induces a connected subgraph with the objective of minimizing the differences within clusters as measured by the total differences between all pairs of nodes of a cluster. We apply our procedure to determine optimal delivery zones for community sections of a major newspaper while including a number of operational constraints. Our results demonstrate a 18–56% improvement in the total differences within the zones designed over the usual intuitive heuristics. Given the magnitude of the revenue generated by larger local newspapers through zoning, our method demonstrates how better zoning can significantly enhance the value of segmentation. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2005.  相似文献   
326.
In the aftermath of the tragic events of 11 September 2001, numerous changes have been made to aviation security policy and operations throughout the nation's airports. The allocation and utilization of checked baggage screening devices is a critical component in aviation security systems. This paper formulates problems that model multiple sets of flights originating from multiple stations (e.g., airports, terminals), where the objective is to optimize a baggage screening performance measure subject to a finite amount of resources. These measures include uncovered flight segments (UFS) and uncovered passenger segments (UPS). Three types of multiple station security problems are identified and their computational complexity is established. The problems are illustrated on two examples that use data extracted from the Official Airline Guide. The examples indicate that the problems can provide widely varying solutions based on the type of performance measure used and the restrictions imposed by the security device allocations. Moreover, the examples suggest that the allocations based on the UFS measure also provide reasonable solutions with respect to the UPS measure; however, the reverse may not be the case. This suggests that the UFS measure may provide more robust screening device allocations. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2005.  相似文献   
327.
In peace-support operations, employees of international humanitarian organisations often clash with those of the military. A lack of familiarity with each other's practices and values, embedded in their respective organisational cultures, is often seen as the culprit. This article presents and illustrates a road map to manage such cultural differences between cooperating organisations. We found that the military culture, in our Bosnian case study, was seen to operate as a hierarchical culture (characterised by formalisation, stability, predictability and efficiency). The culture of international humanitarian organisations, on the other hand, was depicted as clan-type (characterised by teamwork, participation and consensus). To facilitate the creation of cultural awareness as well as respect for, and reconciliation of, cultural differences we recommend several concrete actions that could improve civil-military cooperation.  相似文献   
328.
329.
330.
Capacity expansion models are typically formulated in the context of some finite horizon. Because the firm lasts longer than the horizon, a bias can enter into the optimal solution from the model horizon chosen. Recently, Grinold [8] has proposed a “dual-equilibrium method” for ameliorating possible distortions. Although the dual-equilibrium method has superior analytical properties to other methods, it is conceptually more complex. In this paper it is shown that there are situations where the “primal-equilibrium” approach of Manne [15] provides equivalent results and that the use of annualized capital costs in the objective function, although somewhat less efficient, results in a similar model.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号