首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   619篇
  免费   51篇
  国内免费   4篇
  2021年   9篇
  2020年   9篇
  2019年   24篇
  2018年   17篇
  2017年   12篇
  2016年   12篇
  2015年   12篇
  2014年   16篇
  2013年   120篇
  2011年   12篇
  2010年   13篇
  2009年   10篇
  2008年   17篇
  2007年   14篇
  2006年   8篇
  2005年   12篇
  2004年   7篇
  2003年   8篇
  2002年   8篇
  2001年   9篇
  2000年   8篇
  1999年   13篇
  1998年   10篇
  1997年   13篇
  1996年   15篇
  1995年   13篇
  1994年   16篇
  1993年   9篇
  1992年   10篇
  1991年   14篇
  1990年   13篇
  1989年   13篇
  1988年   12篇
  1987年   10篇
  1986年   10篇
  1985年   9篇
  1984年   7篇
  1983年   6篇
  1981年   6篇
  1980年   10篇
  1979年   6篇
  1978年   7篇
  1976年   6篇
  1975年   8篇
  1972年   7篇
  1971年   10篇
  1970年   7篇
  1968年   7篇
  1967年   5篇
  1966年   7篇
排序方式: 共有674条查询结果,搜索用时 15 毫秒
61.
This article highlights a pattern of military adaptation and tactical problem-solving utilized by the Israel Defense Forces (IDF) while engaged in protracted conflict with the Lebanese militant group Hizballah. It discusses the IDF’s recent attempts to institutionalize their historically intuitive process of ad-hoc learning by developing a formal tactical-level mechanism for ‘knowledge management’. The diffusion of this battlefield lesson-learning system that originated at lower-levels of the organization is examined, as well as its implementation and effectiveness during the 2006 Lebanon War. A nuanced analysis of IDF adaptation illustrates the dynamic interplay between both ‘top-down’ and ‘bottom-up’ processes of military innovation.  相似文献   
62.
在分析地振动目标信号特征的基础上,提出了振动目标的威胁属性参数;建立了目标威胁隶属度函数和威胁等级判决模型;运用层次分析法确定了各目标威胁参数的权值,构建了振动目标的威胁评估函数,并通过实例验证了评估结果的合理性和实用性。  相似文献   
63.
64.
Arriving (generic) jobs may be processed at one of several service stations, but only when no other (dedicated) jobs are waiting there. We consider the problem of how to route these incoming background jobs to make best use of the spare service capacity available at the stations. We develop an approximative approach to Whittle's proposal for restless bandits to obtain an index policy for routing. The indices concerned are increasing and nonlinear in the station workload. A numerical study testifies to the strong performance of the index policies developed. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004  相似文献   
65.
Abstract

David Moore analyses the role of the Treasury in detemining and controlling defence policy and expenditure, and the place of the MoD within this function.  相似文献   
66.
67.
This paper considers the production of two products with known demands over a finite set of periods. The production and inventory carrying costs for each product are assumed to be concave. We seek the minimum cost production schedule meeting all demands, without backlogging, assuming that at most one of the two products can be produced in any period. The optimization problem is first stated as a nonlinear programming problem, which allows the proof of a result permitting the search for the optimal policy to be restricted to those which produce a product only when its inventory level is zero. A dynamic programming formulation is given and the model is then formulated as a shortest route problem in a specially constructed network.  相似文献   
68.
Computerized Scheduling of Seagoing Tankers The tanker scheduling problem considered in this paper is that of the Defense Fuel Supply Center (DFSC) and the Military Sealift Command (MSC) in the worldwide distribution of bulk petroleum products. Routes and cargoes which meet delivery schedule dates for a multiplicity of product requirements at minimum cost are to be determined for a fleet of tankers. A general mathematical programming model is presented, and then a mixed integer model is developed which attempts to reflect the true scheduling task of DFSC and MSC as closely as possible. The problem is kept to within a workable size by the systematic construction of a set of tanker routes which does not contain many possible routes that can be judged unacceptable from practical considerations alone.  相似文献   
69.
Least squares estimators of the parameters of the generalized Eyring Model are obtained by using data from censored life tests conducted at several accelerated environments. These estimators are obtained after establishing that the Gauss-Markov conditions for least squares estimation are satisfied. Confidence intervals for the hazard rate at use conditions are obtained after empirically showing that the logarithm of the estimate of the hazard rate at use conditions is approximately normally distributed. The coverage probabilities of the confidence intervals are also verified by a Monte Carlo experiment. The techniques are illustrated by an application to some real data.  相似文献   
70.
The calculation of the exact reliability of complex systems is a difficult and tedious task. Consequently simple approximating techniques have great practical value. The hazard transform of a system is an invertible transformation of its reliability function which is convenient and useful in both applied and theoretical reliability work. A simple calculus for finding an approximate hazard transform for systems formed by series and parallel combinations of components is extended so that it can be used for any coherent system. The extended calculus is shown to lead to conservative approximations. A first order version of the extended calculus is also discussed. This method of approximation is even more simple to use, but is not always conservative. Examples of its application indicate that it is capable of giving quite accurate results.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号