全文获取类型
收费全文 | 688篇 |
免费 | 12篇 |
出版年
2021年 | 8篇 |
2019年 | 16篇 |
2018年 | 10篇 |
2017年 | 16篇 |
2016年 | 12篇 |
2015年 | 13篇 |
2013年 | 135篇 |
2011年 | 6篇 |
2010年 | 8篇 |
2008年 | 6篇 |
2007年 | 9篇 |
2006年 | 9篇 |
2005年 | 15篇 |
2004年 | 10篇 |
2003年 | 8篇 |
2000年 | 11篇 |
1999年 | 8篇 |
1998年 | 5篇 |
1997年 | 10篇 |
1996年 | 16篇 |
1995年 | 9篇 |
1994年 | 15篇 |
1993年 | 8篇 |
1992年 | 10篇 |
1991年 | 18篇 |
1990年 | 10篇 |
1989年 | 17篇 |
1988年 | 11篇 |
1987年 | 15篇 |
1986年 | 16篇 |
1985年 | 14篇 |
1984年 | 10篇 |
1983年 | 10篇 |
1982年 | 14篇 |
1981年 | 9篇 |
1980年 | 14篇 |
1979年 | 9篇 |
1978年 | 10篇 |
1977年 | 10篇 |
1976年 | 10篇 |
1975年 | 9篇 |
1974年 | 15篇 |
1973年 | 13篇 |
1972年 | 14篇 |
1971年 | 19篇 |
1970年 | 6篇 |
1969年 | 10篇 |
1968年 | 7篇 |
1967年 | 5篇 |
1948年 | 5篇 |
排序方式: 共有700条查询结果,搜索用时 0 毫秒
591.
A general model for the failure of fibrous composite materials is described. It is shown to contain some of the well-known models in the literature. The composite material is viewed as a coherent system of independent identically distributed component strengths. Under the assumption that the applied load is redistributed “homotonically” to the unfailed components upon the failure of a component (an individual fiber segment) and that the distributions of component strengths are IFRA, it is shown that the system (composite) strength distribution is also IFRA. Examples are given using carbon reinforced composite data to illustrate the IFRA property. 相似文献
592.
When solving location problems in practice it is quite common to aggregate demand points into centroids. Solving a location problem with aggregated demand data is computationally easier, but the aggregation process introduces error. We develop theory and algorithms for certain types of centroid aggregations for rectilinear 1‐median problems. The objective is to construct an aggregation that minimizes the maximum aggregation error. We focus on row‐column aggregations, and make use of aggregation results for 1‐median problems on the line to do aggregation for 1‐median problems in the plane. The aggregations developed for the 1‐median problem are then used to construct approximate n‐median problems. We test the theory computationally on n‐median problems (n ≥ 1) using both randomly generated, as well as real, data. Every error measure we consider can be well approximated by some power function in the number of aggregate demand points. Each such function exhibits decreasing returns to scale. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 614–637, 2003. 相似文献
593.
Thomas W. Lucas 《海军后勤学研究》2003,50(4):306-321
There are multiple damage functions in the literature to estimate the probability that a single weapon detonation destroys a point target. This paper addresses differences in the tails of four of the more popular damage functions. These four cover the asymptotic tail behaviors of all monotonically decreasing damage functions with well‐behaved hazard functions. The differences in estimates of probability of kill are quite dramatic for large aim‐point offsets. This is particularly important when balancing the number of threats that can be engaged with the chances of fratricide and collateral damage. In general, analysts substituting one damage function for another may badly estimate kill probabilities in offset‐aiming, which could result in poor doctrine. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 306–321, 2003. 相似文献
594.
Block replacement and modified block replacement policies for two‐component systems with failure dependence and economic dependence are considered in this paper. Opportunistic maintenance policies are also considered. Where tractable, long‐run costs per unit time are calculated using renewal theory based arguments; otherwise simulation studies are carried out. The management implications for the adoption of the various policies are discussed. The usefulness of the results in the paper is illustrated through application to a particular two‐component system. © 2002 Wiley Periodicals, Inc. Naval Research Logistics, 2003 相似文献
595.
596.
Eric W. Schoon 《Small Wars & Insurgencies》2017,28(4-5):734-754
AbstractPrevious research has identified a variety of general mechanisms to explain how insurgents build legitimacy. Yet, there is often a gap between these mechanisms and the interactional dynamics of insurgencies. This article attempts to bridge this gap through a theoretically informed analysis of the Kurdistan Workers’ Party’s (PKK) insurgency in Turkey. I show how the PKK’s efforts to cultivate legitimacy, Turkey’s counterinsurgency strategies, and civilian perceptions of the PKK, all mutually influenced one another. Based on this analysis, I argue that the mechanisms that produce popular legitimacy coevolve with insurgents’ behaviors, states’ interventions, and civilians’ perceptions. 相似文献
597.
In this article, we consider a single machine scheduling problem, in which identical jobs are split into batches of bounded sizes. For each batch, it is allowed to produce less jobs than a given upper bound, that is, some jobs in a batch can be rejected, in which case a penalty is paid for each rejected job. The objective function is the sum of several components, including the sum of the completion times, total delivery cost, and total rejection cost. We reduce this problem to a min‐cost flow problem with a convex quadratic function and adapt Tamir's algorithm for its solution. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 217–224, 2017 相似文献
598.
Shahab Enam Khan 《Small Wars & Insurgencies》2017,28(1):191-217
Bangladesh is currently facing an incremental growth of radicalization. This radicalization can be traced back to the country’s early post-Independence years. Over time, political violence, ideological clashes between secular and right-wing ideologies, and weak governance have created conditions for the growth of radical Islam. The public rhetoric on corruption, weakening of democratic institutions, inadequate law enforcement agencies, fragile justice delivery system, fledgling educational and social institutions and growing unemployment provides further space for alternative narratives by extremist ideologues. Home-grown extremist outfits have received ideological and tactical supports from transnational terrorist network such as Islamic State (IS) and Al-Qaeda in Indian Subcontinent (AQIS), but only in a limited manner. The supply and demand side of radicalization in Bangladesh has not yet been addressed by actors such as the government, private sector, civil society and media. The failures in multiple sectors in the state governance have led to a situation where IS and AQIS now see Bangladesh as a potential ground for exerting their supremacy as flag bearers of radical forms of Islam. 相似文献
599.
Evan A. Laksmana 《Defense & Security Analysis》2017,33(4):347-365
This article explains why Singapore, despite its small size and semi-authoritarian regime, retains one of the best military forces in the Indo-Pacific. It unpacks Singapore’s ability to continuously innovate since the 1960s – technologically, organizationally, and conceptually – and even recently joined the Revolution in Military Affairs bandwagon. Drawing from the broader military innovation studies literature, this article argues evolutionary peacetime military innovation is more likely to occur in a state with a unified civil–military relation and whose military faces a high-level diverse set of threats. This argument explains how the civil–military fusion under the People’s Action Party-led government since Singapore’s founding moment has been providing coherent and consistent strategic guidance, political support, and financial capital, allowing the Singapore Armed Forces to continuously innovate in response to high levels and diversity of threats. 相似文献
600.
Douglas A. LeVien III 《Journal of Military Ethics》2017,16(3-4):173-190
During the Cold War, the spread and fear of communism furnished the overarching ideological rationale for American foreign policy and for the deployment of United States military forces and resources. Subscribing to the domino theory and its potential impact on Southeast Asia, the Johnson Administration committed the United States to the Vietnam War. Following the September 11, 2001 attacks on the United States, and the commencement of the Global War on Terrorism, Washington once again set a national agenda rooted in a simplistic analysis reminiscent of Vietnam and the domino theory. Ignorant of Iraq’s mammoth sectarian, historical, ethnic, and global strategic complexities, the Bush Administration launched Operation Iraqi Freedom (OIF). The absence of critical analysis, contrarian viewpoints, and sound judgment characterized the US policy and strategy for both the Vietnam War and OIF, exhibiting the lack of moral courage that the national security enterprise seeks, but seldom attains. Faced with this challenge, this article draws attention to the ethical lessons we can learn from the dissent of William Fulbright and Andrew Bacevich. 相似文献