首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3322篇
  免费   83篇
  国内免费   1篇
  3406篇
  2021年   37篇
  2019年   88篇
  2018年   51篇
  2017年   80篇
  2016年   78篇
  2015年   62篇
  2014年   65篇
  2013年   695篇
  2010年   35篇
  2009年   37篇
  2008年   47篇
  2007年   52篇
  2006年   36篇
  2005年   42篇
  2004年   56篇
  2003年   42篇
  2002年   58篇
  1999年   41篇
  1998年   46篇
  1997年   47篇
  1996年   61篇
  1995年   41篇
  1994年   59篇
  1993年   64篇
  1992年   58篇
  1991年   74篇
  1990年   39篇
  1989年   72篇
  1988年   78篇
  1987年   68篇
  1986年   71篇
  1985年   65篇
  1984年   36篇
  1983年   42篇
  1982年   43篇
  1981年   46篇
  1980年   51篇
  1979年   45篇
  1978年   49篇
  1977年   45篇
  1976年   45篇
  1975年   46篇
  1974年   52篇
  1973年   51篇
  1972年   52篇
  1971年   43篇
  1970年   40篇
  1969年   40篇
  1968年   34篇
  1967年   34篇
排序方式: 共有3406条查询结果,搜索用时 15 毫秒
971.
ABSTRACT

The article argues that current conceptual approaches in civil-military relations are deeply flawed resulting in its irrelevance in analyzing major issues including war and the collapse of democracy. After highlighting major flaws in the work of the late Samuel Huntington and those who follow his approach, the article argues that other conceptual approaches, including Security Sector Reform, are also flawed, or in the case of the “military effectiveness” literature, largely irrelevant. In explaining the main causes of the flawed conceptual literature, the article highlights the absence of good data and challenges in methodology. While arguing that military forces are very unlikely to engage in armed combat, it highlights the roles and missions which in the world today are implanted by these forces. As it is virtually impossible to prove effectiveness of the armed forces in these roles and missions, the article proposes a conceptual approach based on requirements.  相似文献   
972.
提出数据挖掘在图像信息隐写分析中的应用。首先计算原始图像和隐写图像在通用图像质量指标下的失真测度,然后利用数据挖掘技术建立一个预测模型,完成失真测度到已知隐写概率的映射,模型的输出即为预测隐写概率。实验结果表明,使用该方法得到的预测隐写概率和已知隐写概率的相关度,当使用训练样本时达到0.951以上,使用测试样本时达到0.943以上,达到了很好的预测效果。  相似文献   
973.
数据链系统处理雷达数据信息时,要求一个跟踪算法能够更有效地滤除杂波,消除虚警。在单传感器环境下,若落人相关波门内的回波多于一个,那么这些候选回波中可能都是来自目标,也可能由杂波产生。概率数据互联算法(PDA)能充分利用跟踪门内的回波,具有较小的误跟、丢失目标的概率和计算量较小的优点。通过实现 PDA 算法,证明了它在杂波环境下可以取得好的跟踪效果。  相似文献   
974.
I/O 完成端口(IOCP)是伸缩性最好的一种 I/O 模型。论文介绍了 IOCP 完成端口的基本概念和IOCP 模型的工作机制,在僵尸网络的背景下,讨论了基于 IOCP 通信模块的设计和进一步挖掘系统性能的方法,最后在局域网环境下做了实验仿真。  相似文献   
975.
认知网络是一种具有认知能力和认知过程的网络,它能够感知网络当前的状况,并根据当前的状况来计划、决定并行动。文中首先介绍了认知网络的基本概念及设计目标,然后描述了认知网络的特征和一种架构——CogNet。最后提出了认知网络的潜在应用及在今后的研究中需解决的几个主要问题。  相似文献   
976.
In this article, we introduce the capacitated warehouse location model with risk pooling (CLMRP), which captures the interdependence between capacity issues and the inventory management at the warehouses. The CLMRP models a logistics system in which a single plant ships one type of product to a set of retailers, each with an uncertain demand. Warehouses serve as the direct intermediary between the plant and the retailers for the shipment of the product and also retain safety stock to provide appropriate service levels to the retailers. The CLMRP minimizes the sum of the fixed facility location, transportation, and inventory carrying costs. The model simultaneously determines warehouse locations, shipment sizes from the plant to the warehouses, the working inventory, and safety stock levels at the warehouses and the assignment of retailers to the warehouses. The costs at each warehouse exhibit initially economies of scale and then an exponential increase due to the capacity limitations. We show that this problem can be formulated as a nonlinear integer program in which the objective function is neither concave nor convex. A Lagrangian relaxation solution algorithm is proposed. The Lagrangian subproblem is also a nonlinear integer program. An efficient algorithm is developed for the linear relaxation of this subproblem. The Lagrangian relaxation algorithm provides near‐optimal solutions with reasonable computational requirements for large problem instances. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
977.
Facility location models have been applied to problems in the public and private sectors for years. In this article, the author first presents a taxonomy of location problems based on the underlying space in which the problem is embedded. The article illustrates problems from each part of the taxonomy with an emphasis on discrete location problems. Selected recent research in the area is also discussed. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
978.
We consider a processing network in which jobs arrive at a fork‐node according to a renewal process. Each job requires the completion of m tasks, which are instantaneously assigned by the fork‐node to m task‐processing nodes that operate like G/M/1 queueing stations. The job is completed when all of its m tasks are finished. The sojourn time (or response time) of a job in this G/M/1 fork‐join network is the total time it takes to complete the m tasks. Our main result is a closed‐form approximation of the sojourn‐time distribution of a job that arrives in equilibrium. This is obtained by the use of bounds, properties of D/M/1 and M/M/1 fork‐join networks, and exploratory simulations. Statistical tests show that our approximation distributions are good fits for the sojourn‐time distributions obtained from simulations. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
979.
Derivatives (or gradients) are important for both sensitivity analysis and optimization, and in simulation models, these can often be estimated efficiently using various methods other than brute‐force finite differences. This article briefly summarizes the main approaches and discusses areas in which the approaches can most fruitfully be applied: queueing, inventory, and finance. In finance, the focus is on derivatives of another sort. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
980.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号