首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   80篇
  免费   1篇
  2020年   1篇
  2019年   4篇
  2018年   4篇
  2017年   3篇
  2016年   2篇
  2014年   1篇
  2013年   23篇
  2012年   2篇
  2011年   2篇
  2010年   2篇
  2009年   4篇
  2008年   1篇
  2007年   2篇
  2006年   1篇
  2005年   3篇
  2004年   4篇
  2002年   2篇
  2001年   2篇
  1999年   1篇
  1998年   1篇
  1997年   1篇
  1996年   1篇
  1994年   1篇
  1992年   1篇
  1989年   2篇
  1988年   1篇
  1986年   1篇
  1985年   1篇
  1979年   1篇
  1978年   2篇
  1977年   2篇
  1976年   2篇
排序方式: 共有81条查询结果,搜索用时 328 毫秒
11.
12.
We consider a general linear filtering operation on an autoregressive moving average (ARMA) time series. The variance of the filter output, which is an important quantity in many applications, is not known with certainty because it depends on the true ARMA parameters. We derive an expression for the sensitivity (i.e., the partial derivative) of the output variance with respect to deviations in the model parameters. The results provide insight into the robustness of many common statistical methods that are based on linear filtering and also yield approximate confidence intervals for the output variance. We discuss applications to time series forecasting, statistical process control, and automatic feedback control of industrial processes. © 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
13.
Having a robustly designed supply chain network is one of the most effective ways to hedge against network disruptions because contingency plans in the event of a disruption are often significantly limited. In this article, we study the facility reliability problem: how to design a reliable supply chain network in the presence of random facility disruptions with the option of hardening selected facilities. We consider a facility location problem incorporating two types of facilities, one that is unreliable and another that is reliable (which is not subject to disruption, but is more expensive). We formulate this as a mixed integer programming model and develop a Lagrangian Relaxation‐based solution algorithm. We derive structural properties of the problem and show that for some values of the disruption probability, the problem reduces to the classical uncapacitated fixed charge location problem. In addition, we show that the proposed solution algorithm is not only capable of solving large‐scale problems, but is also computationally effective. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
14.
Illicit procurement networks often target industry in developed economies to acquire materials and components of use in WMD and military programs. These procurement networks are ultimately directed by elements of the proliferating state and utilize state resources to undertake their activities: diplomats and missions, state intelligence networks, and state-connected logistical assets. These state assets have also been utilized to facilitate the export of WMD and military technologies in breach of sanctions. While used in most historic proliferation cases, their role has seen limited consideration in the scholarly literature. This article seeks to systematically contextualize state resources in proliferation networks, arguing that their use lies between state criminality and routine activity in support of national security. Considering the competitive advantages of these assets compared to similar resources available in the private sector, the article argues that nonproliferation efforts have caused states to change how they use these resources through an ongoing process of competitive adaptation.  相似文献   
15.
We study the (s,S) inventory system in which the server takes a rest when the level of the inventory is zero. The demands are assumed to occur for one unit at a time. The interoccurrence times between successive demands, the lead times, and the rest times are assumed to follow general distributions which are mutually independent. Using renewal and convolution techniques we obtain the state transition probabilities.  相似文献   
16.
17.
We consider a single item inventory system with positive and negative stock fluctuations. Items can be purchased from a central stock, n items can be returned for a cost R + rn, and a linear inventory carrying cost is charged. It is shown that for minimizing the asymptotic cost rate when returns are a significant fraction of stock usage, a two-critical-number policy (a,b) is optimal, where b is the trigger level for returns and b – a is the return quantity. The values for a and b are found, as well as the operating characteristics of the system. We also consider the optimal return decision to make at time zero and show that it is partially determined by a and b.  相似文献   
18.
This paper presents a one-period two-echelon inventory model with one warehouse in the first echelon and n warehouses in the second echelon. At the beginning of the period the stock levels at all facilities are adjusted by purchasing or disposing of items at the first echelon, returning or shipping items between the echelons and transshipping items within the second echelon. During the period, demands (which may be negative) are placed on all warehouses in the second echelon and an attempt is made to satisfy shortages either by an expedited shipment from the first echelon to the second echelon or an expedited transshipment within the second echelon. The decision problem is to choose an initial stock level at the first echelon (by a purchase or a disposition) and an initial allocation so as to minimize the initial stock movement costs during the period plus inventory carrying costs and system shortage costs at the end of the period. It is shown that the objective function takes on one of four forms, depending on the relative magnitudes of the various shipping costs. All four forms of the objective function are derived and proven to be convex. Several applications of this general model are considered. We also consider multi-period extensions of the general model and an important special case is solved explicitly.  相似文献   
19.
Among the multiple dimensions of the tous azimuths modernisation of Chinese naval forces, the development of China’s anti-access capacity has recently elicited considerable interest. The important link between this capacity and an overarching vision of the use of force – i.e. a naval doctrine – has, however, often been left implicit. This article shows that the particular development of China’s naval anti-access forces – more precisely, forces with an impact on the naval balance – can be explained by a shift of China’s naval doctrine towards a distinctly pre-emptive posture, which, itself, stems from the set of constraints imposed by the framework of ‘local war under informationised conditions’.  相似文献   
20.
We use the Hsiao–Granger method to test for terrorism–growth causality for seven Western European countries. In bivariate settings, the impact of economic performance on domestic terrorism is very strong. In trivariate settings, the impact of performance on terrorism diminishes. In general, we find that economic performance leads terrorist violence in robust ways only for three out of seven countries. Terrorism is almost never found to causally influence growth in bivariate and trivariate specifications. Our findings indicate that the role of economic performance in determining terrorist violence appears to have been important for some countries, whereas all attacked economies have been successful in adjusting to the threat of terrorism.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号