首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   300篇
  免费   0篇
  300篇
  2021年   5篇
  2019年   4篇
  2018年   2篇
  2017年   5篇
  2016年   6篇
  2015年   4篇
  2014年   3篇
  2013年   77篇
  2011年   2篇
  2010年   2篇
  2008年   3篇
  2007年   4篇
  2006年   2篇
  2005年   5篇
  2004年   2篇
  2003年   3篇
  2002年   2篇
  2000年   2篇
  1999年   3篇
  1996年   4篇
  1995年   7篇
  1994年   7篇
  1993年   3篇
  1992年   5篇
  1991年   4篇
  1990年   3篇
  1989年   7篇
  1988年   8篇
  1987年   6篇
  1986年   8篇
  1985年   7篇
  1983年   3篇
  1982年   9篇
  1981年   1篇
  1980年   6篇
  1979年   4篇
  1978年   4篇
  1977年   5篇
  1976年   2篇
  1975年   5篇
  1974年   5篇
  1973年   8篇
  1972年   6篇
  1971年   8篇
  1970年   5篇
  1969年   5篇
  1968年   6篇
  1967年   2篇
  1966年   2篇
  1948年   3篇
排序方式: 共有300条查询结果,搜索用时 15 毫秒
51.
    
Person-borne improvised explosive devices (PBIEDs) are often used in terrorist attacks in Western countries. This study aims to predict the trajectories of PBIED fragments and the subsequent safety risks for people exposed to this hazard. An explosive field test with a typical PBIED composed of a plastic explosive charge and steel nut enhancements was performed to record initial fragment behaviour, including positions, velocity, and trajectory angles. These data were used to predict the full trajectory of PBIED fragments using a probabilistic analysis. In the probabilistic analyses a probability of fatality or serious injury was computed. Based on the results presented, many practical conclusions can be drawn, for instance, regarding safe evacuation distances if a person were exposed to a suspected PBIED.  相似文献   
52.
    
We consider a general linear filtering operation on an autoregressive moving average (ARMA) time series. The variance of the filter output, which is an important quantity in many applications, is not known with certainty because it depends on the true ARMA parameters. We derive an expression for the sensitivity (i.e., the partial derivative) of the output variance with respect to deviations in the model parameters. The results provide insight into the robustness of many common statistical methods that are based on linear filtering and also yield approximate confidence intervals for the output variance. We discuss applications to time series forecasting, statistical process control, and automatic feedback control of industrial processes. © 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
53.
This article examines the Ottoman military's escalatory response to violence and frames the Armenian insurrection of 1915 in the historical context of contemporary early twentieth-century counterinsurgency campaigns. A case study is presented, from a military historian's perspective, of counterinsurgency operations conducted by the Ottoman Army's 41st Infantry Division against Armenian insurgents on Musa Da? (Musa Dagh) in an operational area south of Iskenderun (Alexandretta). In this particular operational area, it appears that the modern label which most closely approximates what happened there is ethnic cleansing. Finally, the article concludes with an objective assessment of the effectiveness of the Ottoman Army's counterinsurgency operations.  相似文献   
54.
    
In this paper, we examine the current state of knowledge in the economics literature on the conduct of reconstruction activities in Iraq and Afghanistan. As stabilisation and reconstruction missions grow in importance for units deployed to these regions, it becomes more important to understand what activities can promote economic growth at the local level. While military operations focus on interdicting the insurgency, successful counter-insurgency campaigns have typically addressed the conditions conducive to the insurgency. Mitigating the incentives for individuals to participate in an insurgency is imperative. Well-crafted and timed reconstruction activities can, we argue, attenuate these incentives.  相似文献   
55.
    
ABSTRACT

The Kingdom of Lesotho spends around five per cent of its annual budget – some 700 million Maloti ($US52.6 million) in 2017 – on the Lesotho Defence Force (LDF). Lesotho’s geographical position means that the LDF has no meaningful role regarding its primary function of defending the country from external aggression and it hardly engages in its secondary functions. In addition, the LDF has a long history of interference with democratic processes and engaging in human rights abuse. The financial resources currently allocated to the LDF could do far more for security, widely defined, if they were allocated to a number of other government expenditure categories.  相似文献   
56.
    
Building on prior work on optimal replacement of aging aircraft, this paper presents three methodologies to evaluate prospective aviation Service Life Extension Programs (SLEPs) and applies these methodologies to US Navy F/A-18E/F data. While considerable uncertainty remains as to the values of key parameters (e.g. the cost of F/A-18E/F SLEPs), the preponderance of the evidence available at this juncture favors undertaking SLEPs on F/A-18E/Fs rather than replacing them with new Joint Strike Fighters.  相似文献   
57.
    
The article examines ways of computing cumulative probabilities for a constrained Poissonian binomial distribution arising from a model of a weapon defense system.  相似文献   
58.
    
In this article we investigate situations where the buyer is offered discounted price schedules from alternative vendors. Given various discount schedules, the buyer must make the best buying decision under a variety of constraints, such as limited storage space and restricted inventory budgets. Solutions to this problem can be utilized by the buyer to improve profitability. EOQ models for multiple products with all-units discounts are readily solvable in the absence of constraints spanning the products. However, constrained discounted EOQ models lack convenient mathematical properties. Relaxing the product-spanning constraints produces a dual problem that is separable, but lack of convexity and smoothness opens the door for duality gaps. In this research we present a set of algorithms that collectively find the optimal order vector. Finally, we present numerical examples using actual data. to illustrate the application of the algorithms. © 1993 John Wiley & Sons, Inc.  相似文献   
59.
    
The calculation of the exact reliability of complex systems is a difficult and tedious task. Consequently simple approximating techniques have great practical value. The hazard transform of a system is an invertible transformation of its reliability function which is convenient and useful in both applied and theoretical reliability work. A simple calculus for finding an approximate hazard transform for systems formed by series and parallel combinations of components is extended so that it can be used for any coherent system. The extended calculus is shown to lead to conservative approximations. A first order version of the extended calculus is also discussed. This method of approximation is even more simple to use, but is not always conservative. Examples of its application indicate that it is capable of giving quite accurate results.  相似文献   
60.
    
A model, for assessing the effectiveness of alternative force structures in an uncertain future conflict, is presented and exemplified. The methodology is appropriate to forces (e.g., the attack submarine force) where alternative unit types may be employed, albeit at differing effectiveness, in the same set of missions. Procurement trade-offs, and in particular the desirability of special purpose units in place of some (presumably more expensive) general purpose units, can be addressed by this model. Example calculations indicate an increase in the effectiveness of a force composed of general purpose units, relative to various mixed forces, with increase in the uncertainty regarding future conflicts.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号