首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   731篇
  免费   17篇
  2021年   7篇
  2019年   17篇
  2018年   13篇
  2017年   17篇
  2016年   16篇
  2015年   15篇
  2013年   134篇
  2011年   9篇
  2010年   7篇
  2009年   10篇
  2008年   7篇
  2007年   8篇
  2006年   8篇
  2005年   16篇
  2004年   14篇
  2003年   9篇
  2000年   10篇
  1999年   9篇
  1998年   7篇
  1997年   11篇
  1996年   20篇
  1995年   6篇
  1994年   16篇
  1993年   9篇
  1992年   11篇
  1991年   24篇
  1990年   9篇
  1989年   17篇
  1988年   9篇
  1987年   17篇
  1986年   18篇
  1985年   22篇
  1984年   12篇
  1983年   9篇
  1982年   7篇
  1981年   9篇
  1980年   13篇
  1979年   10篇
  1978年   10篇
  1977年   13篇
  1976年   12篇
  1975年   7篇
  1974年   16篇
  1973年   10篇
  1972年   17篇
  1971年   17篇
  1970年   10篇
  1969年   10篇
  1968年   9篇
  1967年   8篇
排序方式: 共有748条查询结果,搜索用时 31 毫秒
81.
In this paper, we derive new families of facet‐defining inequalities for the finite group problem and extreme inequalities for the infinite group problem using approximate lifting. The new valid inequalities for the finite group problem include two‐ and three‐slope facet‐defining inequalities as well as the first family of four‐slope facet‐defining inequalities. The new valid inequalities for the infinite group problem include families of two‐ and three‐slope extreme inequalities. These new inequalities not only illustrate the diversity of strong inequalities for the finite and infinite group problems, but also provide a large variety of new cutting planes for solving integer and mixed‐integer programming problems. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
82.
为实现柱状工件直径的实时快速非接触测量,利用结构光原理,对柱体直径的视觉测量方法进行了研究.详细介绍了结构光法测直径的原理和步骤,以及激光平面的标定和坐标变换求解空间二次曲线方程及特征参数的方法.实验证明该方法测量速度快,精度适中的特点,适用于大批量产品在线测量,亦适用于恶劣环境下的测量.  相似文献   
83.
多级抽样折合的小子样计数抽样方法   总被引:1,自引:0,他引:1  
高价值、小批量产品要求小子样抽样,传统的计数抽样方法不能很好地解决这一问题.提出了一种基于多级抽样的综合抽样方法,将子系统或组件、零部件抽样折合为全系统抽样,增加全系统样本量,从而达到减少全系统抽样量,降低试验成本的目的.实例表明,该抽样方法具有较好的工程使用价值.  相似文献   
84.
The use of life-cycle costs in procurement is limited by the accuracy of cost estimates and assessments of availability risks under the conditions generating costs. Critical to these problems are the needs and responses of equipment to maintenance and repair. Using transition probabilities to define the relationships between serviceability and maintenance and repairs, this article develops a comprehensive decision support system for military procurement. It uses a dynamic programming model to determine the least-cost set of maintenance and repair decisions, where adjustments are included for warranty conditions, time value of money, the opportunity costs of equipment failure, and the end-of-cycle salvage values or disposal costs. The system allows users to define working and failed states, create their own rules or indicators of availability from estimates of state probabilities and establish thresholds of risk acceptability.  相似文献   
85.
86.
The article examines ways of computing cumulative probabilities for a constrained Poissonian binomial distribution arising from a model of a weapon defense system.  相似文献   
87.
根据同步电机工作原理提出了一种新的同步电机卦限划分及轴角识别技术,并据此技术,完成了同步电机轴角-数字转换器设计.  相似文献   
88.
This article introduces the use of Benders' cuts to guide a large neighborhood search to solve the traveling umpire problem, a sports scheduling problem inspired by the real‐life needs of the officials of a sports league. At each time slot, a greedy matching heuristic is used to construct a schedule. When an infeasibility is recognized first a single step backtracking is tried to resolve the infeasibility. If unsuccessful, Benders' cuts are generated to guide a large neighborhood search to ensure feasibility and to improve the solution. Realizing the inherent symmetry present in the problem, a large family of cuts are generated and their effectiveness is tested. The resulting approach is able to find better solutions to many instances of this problem. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
89.
This paper deals with a two searchers game and it investigates the problem of how the possibility of finding a hidden object simultaneously by players influences their behavior. Namely, we consider the following two‐sided allocation non‐zero‐sum game on an integer interval [1,n]. Two teams (Player 1 and 2) want to find an immobile object (say, a treasure) hidden at one of n points. Each point i ∈ [1,n] is characterized by a detection parameter λi (μi) for Player 1 (Player 2) such that pi(1 ? exp(?λixi)) (pi(1 ? exp(?μiyi))) is the probability that Player 1 (Player 2) discovers the hidden object with amount of search effort xi (yi) applied at point i where pi ∈ (0,1) is the probability that the object is hidden at point i. Player 1 (Player 2) undertakes the search by allocating the total amount of effort X(Y). The payoff for Player 1 (Player 2) is 1 if he detects the object but his opponent does not. If both players detect the object they can share it proportionally and even can pay some share to an umpire who takes care that the players do not cheat each other, namely Player 1 gets q1 and Player 2 gets q2 where q1 + q2 ≤ 1. The Nash equilibrium of this game is found and numerical examples are given. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
90.
During the period 1996–2006, the Communist Party of Nepal (Maoist) waged overt people’s war to seize state power and institute a new order that realized the party’s understanding of ‘New Democracy’ as posited by Mao Tse-tung. Contextual shifts led to a crucial strategic turning point in September 2005, when the Maoists agreed to a united front with estranged legal parties to oust the monarchy and establish a republic. Though touted as acceptance of political reintegration, the move was tactical rather than strategic. The party had no intention of supporting a parliamentary version of democracy and thus, 2006–2016, engaged in a covert effort to seize power. Central to this effort was the paramilitary Young Communist League (YCL), the members of which responded to inflammatory party verbiage and exhortations with attacks upon rival political actors. These attacks, academically and legally, were terrorism and offered a salient illustration of intra-state unrestricted warfare. Ultimately, organizational, national, and regional circumstances caused the main Maoist movement to move decisively away from its covert approach. By that time, however, radical splinters had embraced the use of terrorism against rival political actors, creating a situation whereby local politics is yet a dangerous endeavor in certain areas and at certain times.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号