全文获取类型
收费全文 | 678篇 |
免费 | 14篇 |
出版年
2021年 | 6篇 |
2020年 | 7篇 |
2019年 | 17篇 |
2018年 | 9篇 |
2017年 | 14篇 |
2016年 | 18篇 |
2015年 | 14篇 |
2014年 | 15篇 |
2013年 | 125篇 |
2012年 | 22篇 |
2011年 | 34篇 |
2010年 | 23篇 |
2009年 | 17篇 |
2008年 | 31篇 |
2007年 | 18篇 |
2006年 | 17篇 |
2005年 | 9篇 |
2004年 | 5篇 |
2003年 | 5篇 |
2002年 | 7篇 |
2001年 | 6篇 |
1999年 | 7篇 |
1998年 | 7篇 |
1997年 | 9篇 |
1995年 | 7篇 |
1994年 | 10篇 |
1993年 | 13篇 |
1992年 | 10篇 |
1991年 | 9篇 |
1990年 | 5篇 |
1989年 | 16篇 |
1988年 | 7篇 |
1987年 | 13篇 |
1986年 | 11篇 |
1985年 | 9篇 |
1983年 | 8篇 |
1982年 | 5篇 |
1981年 | 9篇 |
1980年 | 9篇 |
1979年 | 13篇 |
1978年 | 5篇 |
1977年 | 6篇 |
1976年 | 8篇 |
1975年 | 9篇 |
1973年 | 5篇 |
1972年 | 16篇 |
1971年 | 5篇 |
1970年 | 6篇 |
1969年 | 10篇 |
1968年 | 9篇 |
排序方式: 共有692条查询结果,搜索用时 15 毫秒
101.
David Simchi-Levi 《海军后勤学研究》1994,41(4):579-585
In this note we consider the familiar bin-packing problem and provide new worst-case results for a number of classical heuristics. We show that the first-fit and best-fit heuristics have an absolute performance ratio of no more than 1.75, and first-fit decreasing and best-fit decreasing heuristics have an absolute performance ratio of 1.5. The latter is the best possible absolute performance ratio for the bin-packing problem, unless P = NP. © 1994 John Wiley & Sons, Inc. 相似文献
102.
103.
借助于计算流体力学软件,对导管螺旋桨的敞水性能进行了数值模拟,得到了在不同网格模型和湍流模型下导管螺旋桨的正车敞水性能曲线,通过与试验图谱的对比分析,发现Wilcoxk-ω模型更适合于导管螺旋桨的敞水性能计算,并且采用结构化网格和非结构化网格相结合的计算方法能够满足导管螺旋桨敞水性能预报的工程精度要求。同时,当网格中存在少量高度倾斜的网格单元时,在不影响计算收敛的情况下,仍能将计算误差控制在10%以内。此外,如果要获得更为精确的计算结果,应提高网格质量,尽量使用结构化网格,并将近壁面网格加密,合理控制壁面附近的Y+值。虽然网格数量的增加并不总是意味着计算误差的减少,但合理控制网格细密度能够获得更为可信的计算结果。 相似文献
104.
为了解决传统的自适应均衡技术需发送训练序列的问题,采用盲均衡技术,利用接收信号本身的特征使均衡器收敛。提出了一种新的盲均衡算法(C&D算法),该算法将CRIMNO算法和判决引导(Decision Directed,DD)算法相结合,利用信号序列间的互不相关特性,从而使其具有全局收敛性能。实验结果表明:与CRIMNO算法相比,在相同的信噪比下,该算法具有收敛快速、运算量少和残留误差小的特点。 相似文献
105.
106.
107.
David H. Tomback 《Arms and Armour》2019,16(1):56-74
The sword which is the subject of this article and which will be referred to as the Capel sword, is a fine example of what has become known as an Irish basket-hilt. Whilst there are other examples in existence, what makes this sword unique and particularly important is the fact that it is known to have been owned by two important Royalist military leaders, Lord Arthur Capel and Sir John Owen. These two extraordinary men came from different backgrounds but their fate was linked through circumstances beyond their control. The story this sword tells is one of comradeship, loyalty, total belief in a cause, betrayal and ultimate sacrifice. 相似文献
108.
Resequencing with parallel queues to minimize the maximum number of items in the overflow area
下载免费PDF全文
![点击此处可从《海军后勤学研究》网站下载免费的PDF全文](/ch/ext_images/free.gif)
This article treats an elementary optimization problem, where an inbound stream of successive items is to be resequenced with the help of multiple parallel queues in order to restore an intended target sequence. Whenever early items block the one item to be currently released into the target sequence, they are withdrawn from their queue and intermediately stored in an overflow area until their actual release is reached. We aim to minimize the maximum number of items simultaneously stored in the overflow area during the complete resequencing process. We met this problem in industry practice at a large German automobile producer, who has to resequence containers with car seats prior to the assembly process. We formalize the resulting resequencing problem and provide suited exact and heuristic solution algorithms. In our computational study, we also address managerial aspects such as how to properly avoid the negative effects of sequence alterations. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 401–415, 2016 相似文献
109.
Militaries rely on secure communications. Despite the permeation of cyber-systems throughout the operational environment, there is little readily available doctrine on cyber-warfare. Doctrine that does exist has not been coherently integrated. This paper introduces a Cyber Conceptual Framework, consisting of five questions pertinent to the future use of cyberspace. The authors enunciate a definition of cyberspace, expand on existing military doctrine to reject the conceptualisation of cyberspace as a domain, define cyber-conflict, define cyber-attack and describe the four components and five levels of a cyber-attack. This work develops a common framework from available doctrine and a lexicon for future discussion. 相似文献
110.
James L. Cook 《Journal of Military Ethics》2016,15(4):321-324