首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   589篇
  免费   1篇
  590篇
  2021年   9篇
  2019年   13篇
  2018年   9篇
  2017年   8篇
  2016年   7篇
  2015年   7篇
  2014年   11篇
  2013年   102篇
  2012年   7篇
  2010年   9篇
  2009年   6篇
  2008年   10篇
  2006年   8篇
  2004年   7篇
  2003年   7篇
  2002年   6篇
  2001年   6篇
  2000年   7篇
  1998年   6篇
  1997年   10篇
  1996年   16篇
  1995年   6篇
  1994年   7篇
  1993年   11篇
  1992年   10篇
  1991年   15篇
  1990年   7篇
  1989年   14篇
  1988年   12篇
  1987年   12篇
  1986年   10篇
  1985年   12篇
  1984年   9篇
  1982年   9篇
  1981年   8篇
  1980年   18篇
  1979年   11篇
  1978年   13篇
  1977年   5篇
  1976年   12篇
  1975年   16篇
  1974年   10篇
  1973年   10篇
  1972年   8篇
  1971年   10篇
  1970年   9篇
  1969年   7篇
  1968年   9篇
  1967年   7篇
  1966年   7篇
排序方式: 共有590条查询结果,搜索用时 15 毫秒
451.
    
ABSTRACT

International efforts to hold the government of President Bashar al-Assad accountable for the use of chemical weapons in the Syrian Civil War have entered a new phase. For the first time, the Organisation for the Prohibition of Chemical Weapons (OPCW), the international organization responsible for implementing the 1993 Chemical Weapons Convention, has been empowered to identify the perpetrators of chemical attacks in Syria. The Investigation and Identification Team (IIT), which was formed to conduct the OPCW’s new attribution mission, has announced its intention to investigate and identify the perpetrators of nine chemical attacks in Syria, including the April 7, 2018, attack in Douma. This article reviews recent efforts to attribute chemical attacks in Syria, describes what we know about the nine incidents to be investigated, summarizes what is known about the Syrian government officials, military commanders, and chemical-warfare scientists suspected of being responsible for these attacks, discusses what to expect during the next phase of the attribution process, and offers insights into how the international community can move beyond attribution to accountability. Accountability is necessary to provide justice for victims and to prevent future incidents by demonstrating that perpetrators of chemical attacks will be identified and punished.  相似文献   
452.
ABSTRACT

Bagayoko, Hutchful, and Luckham correctly argue that the structures, characteristics, and operating methods of official security institutions in Africa have been somewhat neglected, with a lack of much recent research. The Somali National Army (SNA) sits among these lacunae. Its formal structures can be used as a skeletal starting point and springboard to start to draw the network diagrams that chart informal linkages. This is why recent declassification decisions by U.S. intelligence bodies, coupled with period documents released to the UK National Archives, hold significance in helping us understand early hierarchical SNA arrangements. They show the steady build-up in size of the force, to 1987, to about the time the civil war began to fragment the state.  相似文献   
453.
454.
    
We propose a novel simulation‐based approach for solving two‐stage stochastic programs with recourse and endogenous (decision dependent) uncertainty. The proposed augmented nested sampling approach recasts the stochastic optimization problem as a simulation problem by treating the decision variables as random. The optimal decision is obtained via the mode of the augmented probability model. We illustrate our methodology on a newsvendor problem with stock‐dependent uncertain demand both in single and multi‐item (news‐stand) cases. We provide performance comparisons with Markov chain Monte Carlo and traditional Monte Carlo simulation‐based optimization schemes. Finally, we conclude with directions for future research.  相似文献   
455.
    
The Akko 1 shipwreck is the remains of a 26-metre-long Egyptian armed vessel or auxiliary naval brig built at the beginning of the 19th century. Remains of six flintlock muskets were retrieved from the shipwreck, and characterised by various metallurgical methods. The research aimed to study the composition and microstructure of the musket fittings and their manufacturing processes, and if possible, to determine the date and origin of the raw materials. The lead isotope analysis of the fittings suggests that their raw material originated in Great Britain. Based on their typology and composition, the fittings were made in Great Britain of brass alloy and manufactured by casting, probably at the same workshop; and the staple was manufactured by casting and drawing. Considering the zinc content, combined with the manufacturing techniques, the fittings were manufactured between the latter part of the 18th and the early 19th centuries, which might indicate that they were purchased in the course of 19th century weapons trade to be used on board the Egyptian ship.  相似文献   
456.
    
This paper describes modeling and operational analysis of a generic asymmetric service‐system situation in which (a) Red agents, potentially threatening, but in another but important interpretation, are isolated friendlies, such as downed pilots, that require assistance and “arrive” according to some partially known and potentially changing pattern in time and space; and (b) Reds have effectively limited unknown deadlines or times of availability for Blue service, i.e., detection, classification, and attack in a military setting or emergency assistance in others. We discuss various service options by Blue service agents and devise several approximations allowing one to compute efficiently those proportions of tasks of different classes that are successfully served or, more generally, if different rewards are associated with different classes of tasks, the percentage of the possible reward gained. We suggest heuristic policies for a Blue server to select the next task to perform and to decide how much time to allocate to that service. We discuss this for a number of specific examples. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006.  相似文献   
457.
    
We consider the problem of safely and swiftly navigating through a spatial arrangement of potential hazard detections in which each detection has associated with it a probability that the detection is indeed a true hazard. When in close proximity to a detection, we assume the ability—for a cost—to determine whether or not the hazard is real. Our approach to this problem involves a new object, the random disambiguation path (RDP), which is a curve‐valued random variable parametrized by a binary tree with particular properties. We prove an admissibility result showing that there is positive probability that the use of an RDP reduces the expected traversal length compared to the conventional shortest zero‐risk path, and we introduce a practically computable additive‐constant approximation to the optimal RDP. The theoretical considerations are complemented by simulation and example. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005  相似文献   
458.
    
We study the problem of minimizing the makespan in no‐wait two‐machine open shops producing multiple products using lot streaming. In no‐wait open shop scheduling, sublot sizes are necessarily consistent; i.e., they remain the same over all machines. This intractable problem requires finding sublot sizes, a product sequence for each machine, and a machine sequence for each product. We develop a dynamic programming algorithm to generate all the dominant schedule profiles for each product that are required to formulate the open shop problem as a generalized traveling salesman problem. This problem is equivalent to a classical traveling salesman problem with a pseudopolynomial number of cities. We develop and test a computationally efficient heuristic for the open shop problem. Our results indicate that solutions can quickly be found for two machine open shops with up to 50 products. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005  相似文献   
459.
    
We study how changes to the composition and employment of the US Navy combat logistic force (CLF) influence our ability to supply our navy worldwide. The CLF consists of about 30 special transport ships that carry ship and aircraft fuel, ordnance, dry stores, and food, and deliver these to client combatant ships underway, making it possible for our naval forces to operate at sea for extended periods. We have modeled CLF operations to evaluate a number of transforming initiatives that simplify its operation while supporting an even larger number of client ships for a greater variety of missions. Our input is an employment schedule for navy battle groups of ships operating worldwide, extending over a planning horizon of 90–180 days. We show how we use optimization to advise how to sustain these ships. We have used this model to evaluate new CLF ship designs, advise what number of ships in a new ship class would be needed, test concepts for forward at‐sea logistics bases in lieu of conventional ports, demonstrate the effects of changes to operating policy, and generally try to show whether and how the CLF can support planned naval operations. Published 2008 Wiley Periodicals, Inc. Naval Research Logistics 2008  相似文献   
460.
    
Recent years have seen a strong trend toward outsourcing warranty repair services to outside vendors. In this article we consider the problem of dynamically routing warranty repairs to service vendors when warranties have priority levels. Each time an item under warranty fails, it is sent to one of the vendors for repair. Items covered by higher priority warranty receive higher priority in repair service. The manufacturer pays a fixed fee per repair and incurs a linear holding cost while an item is undergoing or waiting for repair. The objective is to minimize the manufacturer's long‐run average cost. Because of the complexity of the problem, it is very unlikely that there exist tractable ways to find the optimal routing strategies. Therefore, we propose five heuristic routing procedures that are applicable to real‐life problems. We evaluate the heuristics using simulation. The simulation results show that the index‐based “generalized join the shortest queue” policy, which applies a single policy improvement step to an initial state‐independent policy, performs the best among all five heuristics. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号