首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   619篇
  免费   51篇
  国内免费   4篇
  2021年   9篇
  2020年   9篇
  2019年   24篇
  2018年   17篇
  2017年   12篇
  2016年   12篇
  2015年   12篇
  2014年   16篇
  2013年   120篇
  2011年   12篇
  2010年   13篇
  2009年   10篇
  2008年   17篇
  2007年   14篇
  2006年   8篇
  2005年   12篇
  2004年   7篇
  2003年   8篇
  2002年   8篇
  2001年   9篇
  2000年   8篇
  1999年   13篇
  1998年   10篇
  1997年   13篇
  1996年   15篇
  1995年   13篇
  1994年   16篇
  1993年   9篇
  1992年   10篇
  1991年   14篇
  1990年   13篇
  1989年   13篇
  1988年   12篇
  1987年   10篇
  1986年   10篇
  1985年   9篇
  1984年   7篇
  1983年   6篇
  1981年   6篇
  1980年   10篇
  1979年   6篇
  1978年   7篇
  1976年   6篇
  1975年   8篇
  1972年   7篇
  1971年   10篇
  1970年   7篇
  1968年   7篇
  1967年   5篇
  1966年   7篇
排序方式: 共有674条查询结果,搜索用时 15 毫秒
41.
42.
Multivariable elimination algorithms, which may be regarded as generalizations of various one-dimensional search procedures, have not found wide application. A probable reason may be the generally very irregularly shaped regions of uncertainty that evolve iteratively in the procedures. Hence hope for practical salvage of this class of algorithms seems to lie in controlling the shape of the successively smaller regions of uncertainty. In this article an extension of Bolzano search to rectangles which preserves rectangular iterates is given. Since the result is essentially geometrical in nature, a geometric proof of this procedure is given. Hopefully the proof procedure will be of independent interest. A numerical illustration of the procedure is given for a game problem, such problems lending themselves to this method.  相似文献   
43.
The flow-shop scheduling problem with sequence-dependent additive setup times is considered as a special case of the general problem, and a polynomially bounded approximate method is developed to find a minimum makespan permutation schedule. The approximate algorithm is shown to yield optimal results for the two-machine case. A version of Sule's model is defined that produces the first approximation of the optimal solution for this problem. Computational experience along with numerical examples are provided to test the effectiveness of the method.  相似文献   
44.
This article is concerned with the scaling variant of Karmarkar's algorithm for linear programming problems. Several researchers have presented convergence analyses for this algorithm under various nondegeneracy types of assumptions, or under assumptions regarding the nature of the sequence of iterates generated by the algorithm. By employing a slight perturbation of the algorithm, which is computationally imperceptible, we are able to prove without using any special assumptions that the algorithm converges finitely to an ε-optimal solution for any chosen ε > 0, from which it can be (polynomically) rounded to an optimum, for ε > 0 small enough. The logarithmic barrier function is used as a construct for this analysis. A rounding scheme which produces an optimal extreme point solution is also suggested. Besides the non-negatively constrained case, we also present a convergence analysis for the case of bounded variables. An application in statistics to the L1 estimation problem and related computational results are presented.  相似文献   
45.
提倡身体律动与音乐教学相结合的奥尔夫教学法与"内初班"少数民族学生能歌善舞的特点十分契合,本研究通过访谈和实地调查的方法了解奥尔夫教学法在"内初班"音乐教学中的应用现状,发现奥尔夫教学法在应用中存在师资力量匮乏、教材资源匮乏和教学场地匮乏的问题,并对出现的问题提出对策和建议,以期对奥尔夫教学法在"内初班"音乐教学中的应用进行深入地剖析,为奥尔夫教学法在"内初班"音乐教学中的实施与推广提供参考.  相似文献   
46.
Abstract

Insomnia is prevalent among Veterans with post-traumatic stress disorder (PTSD), it exacerbates PTSD symptoms, and it contributes to impaired functioning and quality of life. To improve treatment outcomes, it is important to identify risk factors for insomnia and sedative-hypnotic use. Classification and regression trees and logistic regression models were used to identify variables associated with insomnia or sedative-hypnotic use. Key findings include low insomnia diagnosis rates (3.5–5.6%) and high rates of sedative-hypnotics (44.2–49.0%). Younger Veterans and those without a breathing-related sleep disorder (BRSD) were more likely to receive an insomnia diagnosis. Veterans with greater service connection and those with an alcohol/substance use disorder were more likely to be prescribed sedative-hypnotics. Interaction terms may have identified potential groups at risk of being under-diagnosed with insomnia (i.e. non-black Veterans with psychiatric co-morbidity, black Veterans without psychiatric co-morbidity) as well as groups at risk for sedative-hypnotic use (i.e. younger Veterans without BRSD). In sum, Veterans with PTSD have high rates of sedative-hypnotic use despite minimal evidence they are effective. This is counter to recommendations indicating behavioral interventions are the first-line treatment. Policy changes are needed to reduce use of sedative-hypnotics and increase access to behavioral insomnia interventions.  相似文献   
47.
This article treats an elementary optimization problem, where an inbound stream of successive items is to be resequenced with the help of multiple parallel queues in order to restore an intended target sequence. Whenever early items block the one item to be currently released into the target sequence, they are withdrawn from their queue and intermediately stored in an overflow area until their actual release is reached. We aim to minimize the maximum number of items simultaneously stored in the overflow area during the complete resequencing process. We met this problem in industry practice at a large German automobile producer, who has to resequence containers with car seats prior to the assembly process. We formalize the resulting resequencing problem and provide suited exact and heuristic solution algorithms. In our computational study, we also address managerial aspects such as how to properly avoid the negative effects of sequence alterations. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 401–415, 2016  相似文献   
48.
Militaries rely on secure communications. Despite the permeation of cyber-systems throughout the operational environment, there is little readily available doctrine on cyber-warfare. Doctrine that does exist has not been coherently integrated. This paper introduces a Cyber Conceptual Framework, consisting of five questions pertinent to the future use of cyberspace. The authors enunciate a definition of cyberspace, expand on existing military doctrine to reject the conceptualisation of cyberspace as a domain, define cyber-conflict, define cyber-attack and describe the four components and five levels of a cyber-attack. This work develops a common framework from available doctrine and a lexicon for future discussion.  相似文献   
49.
针对变速箱状态检测与故障诊断过程中状态信息获取的测点位置基本靠经验设定,缺少理论支持,导致检测准确性和可靠性不高的问题,在建立变速箱箱体的有限元分析模型的基础上,进行了箱体的约束模态分析,根据模态位移"取大优先"的原则初选10个测点,然后采用模糊综合评判的方法,将测点优化问题转化为方案优选问题处理,提出了变速箱箱体模态实验的测点优化配置方案。结果表明:采用动力学分析和模糊综合评判相结合的方法进行测点优化选择,得到了科学合理的测点优化配置方案。  相似文献   
50.
Variations of Hale's channel assignment problem, the L(j, k)‐labeling problem and the radio labeling problem require the assignment of integers to the vertices of a graph G subject to various distance constraints. The λj,k‐number of G and the radio number of G are respectively the minimum span among all L(j, k)‐labelings, and the minimum span plus 1 of all radio labelings of G (defined in the Introduction). In this paper, we establish the λj,k‐number of ∏ K for pairwise relatively prime integers t1 < t2 < … < tq, t1 ≥ 2. We also show the existence of an infinite class of graphs G with radio number |V(G)| for any diameter d(G). © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2005  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号