全文获取类型
收费全文 | 300篇 |
免费 | 0篇 |
专业分类
300篇 |
出版年
2021年 | 5篇 |
2019年 | 4篇 |
2018年 | 2篇 |
2017年 | 5篇 |
2016年 | 6篇 |
2015年 | 4篇 |
2014年 | 3篇 |
2013年 | 77篇 |
2011年 | 2篇 |
2010年 | 2篇 |
2008年 | 3篇 |
2007年 | 4篇 |
2006年 | 2篇 |
2005年 | 5篇 |
2004年 | 2篇 |
2003年 | 3篇 |
2002年 | 2篇 |
2000年 | 2篇 |
1999年 | 3篇 |
1996年 | 4篇 |
1995年 | 7篇 |
1994年 | 7篇 |
1993年 | 3篇 |
1992年 | 5篇 |
1991年 | 4篇 |
1990年 | 3篇 |
1989年 | 7篇 |
1988年 | 8篇 |
1987年 | 6篇 |
1986年 | 8篇 |
1985年 | 7篇 |
1983年 | 3篇 |
1982年 | 9篇 |
1981年 | 1篇 |
1980年 | 6篇 |
1979年 | 4篇 |
1978年 | 4篇 |
1977年 | 5篇 |
1976年 | 2篇 |
1975年 | 5篇 |
1974年 | 5篇 |
1973年 | 8篇 |
1972年 | 6篇 |
1971年 | 8篇 |
1970年 | 5篇 |
1969年 | 5篇 |
1968年 | 6篇 |
1967年 | 2篇 |
1966年 | 2篇 |
1948年 | 3篇 |
排序方式: 共有300条查询结果,搜索用时 15 毫秒
51.
Person-borne improvised explosive devices (PBIEDs) are often used in terrorist attacks in Western countries. This study aims to predict the trajectories of PBIED fragments and the subsequent safety risks for people exposed to this hazard. An explosive field test with a typical PBIED composed of a plastic explosive charge and steel nut enhancements was performed to record initial fragment behaviour, including positions, velocity, and trajectory angles. These data were used to predict the full trajectory of PBIED fragments using a probabilistic analysis. In the probabilistic analyses a probability of fatality or serious injury was computed. Based on the results presented, many practical conclusions can be drawn, for instance, regarding safe evacuation distances if a person were exposed to a suspected PBIED. 相似文献
52.
We consider a general linear filtering operation on an autoregressive moving average (ARMA) time series. The variance of the filter output, which is an important quantity in many applications, is not known with certainty because it depends on the true ARMA parameters. We derive an expression for the sensitivity (i.e., the partial derivative) of the output variance with respect to deviations in the model parameters. The results provide insight into the robustness of many common statistical methods that are based on linear filtering and also yield approximate confidence intervals for the output variance. We discuss applications to time series forecasting, statistical process control, and automatic feedback control of industrial processes. © 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010 相似文献
53.
This article examines the Ottoman military's escalatory response to violence and frames the Armenian insurrection of 1915 in the historical context of contemporary early twentieth-century counterinsurgency campaigns. A case study is presented, from a military historian's perspective, of counterinsurgency operations conducted by the Ottoman Army's 41st Infantry Division against Armenian insurgents on Musa Da? (Musa Dagh) in an operational area south of Iskenderun (Alexandretta). In this particular operational area, it appears that the modern label which most closely approximates what happened there is ethnic cleansing. Finally, the article concludes with an objective assessment of the effectiveness of the Ottoman Army's counterinsurgency operations. 相似文献
54.
In this paper, we examine the current state of knowledge in the economics literature on the conduct of reconstruction activities in Iraq and Afghanistan. As stabilisation and reconstruction missions grow in importance for units deployed to these regions, it becomes more important to understand what activities can promote economic growth at the local level. While military operations focus on interdicting the insurgency, successful counter-insurgency campaigns have typically addressed the conditions conducive to the insurgency. Mitigating the incentives for individuals to participate in an insurgency is imperative. Well-crafted and timed reconstruction activities can, we argue, attenuate these incentives. 相似文献
55.
Tlohang W. Letsie 《African Security Review》2013,22(3-4):291-307
ABSTRACTThe Kingdom of Lesotho spends around five per cent of its annual budget – some 700 million Maloti ($US52.6 million) in 2017 – on the Lesotho Defence Force (LDF). Lesotho’s geographical position means that the LDF has no meaningful role regarding its primary function of defending the country from external aggression and it hardly engages in its secondary functions. In addition, the LDF has a long history of interference with democratic processes and engaging in human rights abuse. The financial resources currently allocated to the LDF could do far more for security, widely defined, if they were allocated to a number of other government expenditure categories. 相似文献
56.
Edward G. Keating Irv Blickstein Michael Boito Jess Chandler Deborah Peetz 《Defence and Peace Economics》2014,25(3):271-280
Building on prior work on optimal replacement of aging aircraft, this paper presents three methodologies to evaluate prospective aviation Service Life Extension Programs (SLEPs) and applies these methodologies to US Navy F/A-18E/F data. While considerable uncertainty remains as to the values of key parameters (e.g. the cost of F/A-18E/F SLEPs), the preponderance of the evidence available at this juncture favors undertaking SLEPs on F/A-18E/Fs rather than replacing them with new Joint Strike Fighters. 相似文献
57.
A. W. Kemp 《海军后勤学研究》1987,34(6):853-858
The article examines ways of computing cumulative probabilities for a constrained Poissonian binomial distribution arising from a model of a weapon defense system. 相似文献
58.
In this article we investigate situations where the buyer is offered discounted price schedules from alternative vendors. Given various discount schedules, the buyer must make the best buying decision under a variety of constraints, such as limited storage space and restricted inventory budgets. Solutions to this problem can be utilized by the buyer to improve profitability. EOQ models for multiple products with all-units discounts are readily solvable in the absence of constraints spanning the products. However, constrained discounted EOQ models lack convenient mathematical properties. Relaxing the product-spanning constraints produces a dual problem that is separable, but lack of convexity and smoothness opens the door for duality gaps. In this research we present a set of algorithms that collectively find the optimal order vector. Finally, we present numerical examples using actual data. to illustrate the application of the algorithms. © 1993 John Wiley & Sons, Inc. 相似文献
59.
The calculation of the exact reliability of complex systems is a difficult and tedious task. Consequently simple approximating techniques have great practical value. The hazard transform of a system is an invertible transformation of its reliability function which is convenient and useful in both applied and theoretical reliability work. A simple calculus for finding an approximate hazard transform for systems formed by series and parallel combinations of components is extended so that it can be used for any coherent system. The extended calculus is shown to lead to conservative approximations. A first order version of the extended calculus is also discussed. This method of approximation is even more simple to use, but is not always conservative. Examples of its application indicate that it is capable of giving quite accurate results. 相似文献
60.
A model, for assessing the effectiveness of alternative force structures in an uncertain future conflict, is presented and exemplified. The methodology is appropriate to forces (e.g., the attack submarine force) where alternative unit types may be employed, albeit at differing effectiveness, in the same set of missions. Procurement trade-offs, and in particular the desirability of special purpose units in place of some (presumably more expensive) general purpose units, can be addressed by this model. Example calculations indicate an increase in the effectiveness of a force composed of general purpose units, relative to various mixed forces, with increase in the uncertainty regarding future conflicts. 相似文献