首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   243篇
  免费   11篇
  2021年   8篇
  2019年   3篇
  2018年   7篇
  2017年   6篇
  2016年   7篇
  2015年   4篇
  2014年   8篇
  2013年   44篇
  2012年   4篇
  2011年   3篇
  2010年   3篇
  2009年   10篇
  2007年   5篇
  2006年   2篇
  2005年   2篇
  2004年   5篇
  2003年   2篇
  2002年   8篇
  2001年   5篇
  2000年   4篇
  1999年   2篇
  1998年   3篇
  1997年   3篇
  1996年   2篇
  1995年   8篇
  1994年   2篇
  1993年   3篇
  1992年   3篇
  1991年   6篇
  1990年   4篇
  1989年   5篇
  1988年   6篇
  1987年   6篇
  1986年   5篇
  1984年   6篇
  1983年   3篇
  1982年   2篇
  1981年   4篇
  1980年   3篇
  1979年   3篇
  1978年   4篇
  1977年   5篇
  1975年   2篇
  1974年   2篇
  1973年   4篇
  1972年   2篇
  1971年   2篇
  1970年   2篇
  1969年   3篇
  1968年   2篇
排序方式: 共有254条查询结果,搜索用时 78 毫秒
171.
In this paper marginal investment costs are assumed known for two kinds of equipment stocks employed to supply telecommunications services: trunks and switching facilities. A network hierarchy is defined which includes important cases occurring in the field and also appearing in the literature. A different use of the classical concept of the marginal capacity of an additional trunk at prescribed blocking probability leads to a linear programming supply model which can be used to compute the sizes of all the high usage trunk groups. The sizes of the remaining trunk groups are approximated by the linear programming models, but can be determined more accurately by alternate methods once all high usage group sizes are computed. The approach applies to larger scale networks than previously reported in the literature and permits direct application of the duality theory of linear programming and its sensitivity analyses to the study and design of switched probabilistic communications networks with multiple busy hours during the day. Numerical results are presented for two examples based on field data, one of which having been designed by the multi-hour engineering method.  相似文献   
172.
When applied to a problem which has more than one local optimal solution, most nonlinear programming algorithms will terminate with the first local solution found. Several methods have been suggested for extending the search to find the global optimum of such a nonlinear program. In this report we present the results of some numerical experiments designed to compare the performance of various strategies for finding the global solution.  相似文献   
173.
We consider the problem of allotting locations in the geostationary orbit to communication satellites, subject to angle of elevation and electromagnetic interference constraints. An optimization framework is used as a means of finding feasible allotment plans. Specifically, we present a two-phase solution procedure for the satellite location problem (SLP). The objective in SLP is to allot geostationary orbital locations to satellites so as to minimize the sum of the absolute differences between the locations prescribed for the satellites and corresponding specified desired locations. We describe two heuristics, an ordering procedure and a k-permutation algorithm, that are used in tandem to find solutions to SLP. Solutions to a worldwide example problem with 183 satellites serving 208 service areas are summarized.  相似文献   
174.
This paper analyses the E/M/c queueing system and shows how to calculate the expected number in the system, both at a random epoch and immediately preceding an arrival. These expectations are expressed in terms of certain initial probabilities which are determined by linear equations. The advantages and disadvantages of this method are also discussed.  相似文献   
175.
The shortest path problem between two specified nodes in a general network possesses the unimodularity property and, therefore, can be solved by efficient labelling algorithms. However, the introduction of an additional linear constraint would, in general, destroy this property and the existing algorithms are not applicable in this case. This paper presents a parametric approach for solving this problem. The algorithm presented would require, on the average, a number of iterations which is polynomially bounded. The similarity of this approach to that of the generalized Lagrange multiplier technique is demonstrated and a numerical example is presented.  相似文献   
176.
A system is subject to a sequence of randomly occurring shocks. Each shock causes a random amount of damage which accumulates additively. Any of the shocks might cause the system to fail. The shock process is in some sense related to an environmental process in order to describe randomly varying external factors of an economical and/or technical nature as well as internal factors of a statistical nature. A discrete time formulation of the problem is given. Sufficient conditions are found for optimality of a generalized control-limit rule with respect to the total cost criterion: Whenever the accumulated damage s is not less than a specified critical number t(i), depending on the environmental state i, replace the system by a new one; otherwise do not replace it. Moreover, bounds are given for these critical numbers.  相似文献   
177.
Turkey has been investing in its national defence industrial base since the 1980s. As with other developing countries, Turkey’s motivations for investing in national defence industries can be boiled down to the pursuit of defence autarky, economic benefits and international prestige. However, after 40 years of investment, Turkey is unable to reach the primary goals of defence industrialisation. We argue that three factors are important to understanding Turkey’s persistence in these primary goals. First, Turkey believes that there is an overall improvement in its defence industrial capabilities and the goal of autarky is still reachable. Second, increased defence exports support the belief that Turkish defence industries have become sustainable and the trend will continue in the future. The third reason, perhaps most important of all, has to do with the domestic political gains of defence industrialisation: the AKP uses defence industry and indigenous weapon systems for prestige and, therefore, garners broader support.  相似文献   
178.
Items are characterized by a set of attributes (T) and a collection of covariates (X) associated with those attributes. We wish to screen for acceptable items (TCT), but T is expensive to measure. We envisage a two-stage screen in which observation of X_ is used as a filter at the first stage to sentence most items. The second stage involves the observation of T for those items for which the first stage is indecisive. We adopt a Bayes decision-theoretic approach to the development of optimal two-stage screens within a general framework for costs and stochastic structure. We also consider the important question of how much screens need to be modified in the light of resource limitations that bound the proportion of items that can be passed to the second stage. © 1996 John Wiley & Sons, Inc.  相似文献   
179.
Until recently, fast algorithms for the maximum flow problem have typically proceeded by constructing layered networks and establishing blocking flows in these networks. However, in recent years, new distance-directed algorithms have been suggested that do not construct layered networks but instead maintain a distance label with each node. The distance label of a node is a lower bound on the length of the shortest augmenting path from the node to the sink. In this article we develop two distance-directed augmenting path algorithms for the maximum flow problem. Both the algorithms run in O(n2m) time on networks with n nodes and m arcs. We also point out the relationship between the distance labels and layered networks. Using a scaling technique, we improve the complexity of our distance-directed algorithms to O(nm log U), where U denotes the largest arc capacity. We also consider applications of these algorithms to unit capacity maximum flow problems and a class of parametric maximum flow problems.  相似文献   
180.
The discrete evasion game with three-move lag, formulated over 30 years ago, was one of the earliest games with time-lag complications. This game remains unsolved even though it is well known that the game has a value. In this article we obtain an upper bound for the value by constructing a strategy which consists of 400 conditional probabilities for the minimizing player. This is believed to be the best upper bound known.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号