全文获取类型
收费全文 | 252篇 |
免费 | 9篇 |
国内免费 | 1篇 |
出版年
2021年 | 2篇 |
2019年 | 10篇 |
2018年 | 7篇 |
2017年 | 6篇 |
2016年 | 7篇 |
2014年 | 6篇 |
2013年 | 43篇 |
2012年 | 3篇 |
2010年 | 6篇 |
2007年 | 6篇 |
2006年 | 2篇 |
2005年 | 6篇 |
2004年 | 4篇 |
2002年 | 7篇 |
2000年 | 2篇 |
1999年 | 4篇 |
1998年 | 7篇 |
1997年 | 7篇 |
1996年 | 3篇 |
1995年 | 2篇 |
1994年 | 7篇 |
1993年 | 9篇 |
1992年 | 5篇 |
1991年 | 7篇 |
1990年 | 7篇 |
1989年 | 4篇 |
1988年 | 6篇 |
1987年 | 3篇 |
1986年 | 4篇 |
1985年 | 6篇 |
1984年 | 1篇 |
1983年 | 2篇 |
1982年 | 5篇 |
1981年 | 5篇 |
1980年 | 3篇 |
1979年 | 4篇 |
1978年 | 4篇 |
1977年 | 3篇 |
1976年 | 3篇 |
1975年 | 3篇 |
1974年 | 3篇 |
1973年 | 4篇 |
1972年 | 3篇 |
1971年 | 1篇 |
1969年 | 2篇 |
1968年 | 5篇 |
1967年 | 2篇 |
1966年 | 3篇 |
1949年 | 1篇 |
1948年 | 2篇 |
排序方式: 共有262条查询结果,搜索用时 15 毫秒
81.
The maximum likelihood estimator (MLE) for a distribution function with increasing failure rate is derived, based on a collection of series system data. Applications can arise in industries where operating environments make available only such system-level data, due to system configuration or type-II censoring. The estimator can be solved using isotonic regression. For the special case in which systems contain one component, the estimator is equivalent to the restricted maximum likelihood estimator of Marshall and Proschan [9]. The MLE is illustrated using emergency diesel generator failure data from the nuclear industry. © 1998 John Wiley & Sons, Inc. Naval Research Logistics 45: 115–123, 1998 相似文献
82.
We consider optimal test plans involving life distributions with failure‐free life, i.e., where there is an unknown threshold parameter below which no failure will occur. These distributions do not satisfy the regularity conditions and thus the usual approach of using the Fisher information matrix to obtain an optimal accelerated life testing (ALT) plan cannot be applied. In this paper, we assume that lifetime follows a two‐parameter exponential distribution and the stress‐life relationship is given by the inverse power law model. Near‐optimal test plans for constant‐stress ALT under both failure‐censoring and time‐censoring are obtained. We first obtain unbiased estimates for the parameters and give the approximate variance of these estimates for both failure‐censored and time‐censored data. Using these results, the variance for the approximate unbiased estimate of a percentile at a design stress is computed and then minimized to produce the near‐optimal plan. Finally, a numerical example is presented together with simulation results to study the accuracy of the approximate variance given by the proposed plan and show that it outperforms the equal‐allocation plan. © 1999 John Wiley & Sons, Inc. Naval Research Logistics 46: 169–186, 1999 相似文献
83.
David H. Ucko 《战略研究杂志》2019,42(3-4):448-479
Despite the emphasis in doctrine and academia that counterinsurgency is in its essence political, these operations are all too commonly discussed and approached as primarily military endeavors. Informed by the need to refocus counterinsurgency studies, this article revisits a foundational case of the canon – the Malayan Emergency – to discuss its political (i.e., not military) unfolding. The analysis distinguishes itself by emphasizing the diplomatic processes, negotiations, and deals that gave strategic meaning to the military operations underway. In so doing, the article also generates insight on the use of leverage and elite bargains in creating new political settlements and bringing insurgent conflicts to an end. 相似文献
84.
We consider the classical problem of whether certain classes of lifetime distributions are preserved under the formation of coherent systems. Under the assumption of independent and identically distributed (i.i.d.) component lifetimes, we consider the NBUE (new better than used in expectation) and NWUE (new worse than used in expectation) classes. First, a necessary condition for a coherent system to preserve the NBUE class is given. Sufficient conditions are then obtained for systems satisfying this necessary condition. The sufficient conditions are satisfied for a collection of systems which includes all parallel systems, but the collection is shown to be strictly larger. We also prove that no coherent system preserves the NWUE class. As byproducts of our study, we obtain the following results for the case of i.i.d. component lifetimes: (a) the DFR (decreasing failure rate) class is preserved by no coherent systems other than series systems, and (b) the IMRL (increasing mean residual life) class is not preserved by any coherent systems. Generalizations to the case of dependent component lifetimes are briefly discussed. 相似文献
85.
Thomas H. Johnson 《Small Wars & Insurgencies》2018,29(1):1-37
This article is the latest in a series of published articles systematically examining Afghan Presidential and legislative elections. Structural problems including fraud, ethno-linguistic block voting, and the Single Non-Transferable Vote have had significant impacts on the development of Afghan democratic elections. The challenge now facing the current Afghan government and future elections is the daunting task of uniting the Afghan people while not repeating the electoral mistakes of the past. The tricky balancing act of fostering an overarching national identity without being perceived as privileging particular identities requires strong leadership and a willingness to challenge traditional ethnic, linguistic, and religious norms when need be. Karzai and Ghani Administrations have seriously failed relative to this dynamic. 相似文献
86.
87.
We reformulate a multiperiod capacity expansion model of electric utilities as a network model. We show how to reconstruct the dual solution of the original mathematical program from the network model solution. To formulate the network model, we use information about the properties of the optimal solution of the mathematical program to reduce the number of constraints. The remaining constraints are then readily converted into network constraints. © 1993 John Wiley & Sons. Inc. 相似文献
88.
This article is concerned with the analysis of a squared-Euclidean distance location-allocation problem with balanced transportation constraints, where the costs are directly proportional to distances and the amount shipped. The problem is shown to be equivalent to maximizing a convex quadratic function subject to transportation constraints. A branch-and-bound algorithm is developed that utilizes a specialized, tight, linear programming representation to compute strong upper bounds via a Lagrangian relaxation scheme. These bounds are shown to substantially dominate several other upper bounds that are derived using standard techniques as problem size increases. The special structure of the transportation constraints is used to derive a partitioning scheme, and this structure is further exploited to devise suitable logical tests that tighten the bounds implied by the branching restrictions on the transportation flows. The transportation structure is also used to generate additional cut-set inequalities based on a cycle prevention method which preserves a forest graph for any partial solution. Results of the computational experiments, and a discussion on possible extensions, are also presented. 相似文献
89.
In this article, a quality-control design framework that employs information for the supplier-buyer system is modeled. Significant operational savings may be obtained by using the integrated plans developed under this framework. This is especially true when the cost of a defective is high, and the variable sampling and rework costs are low. Analysis of the interaction of defective, rework, and variable sampling costs reveals that the savings are the result of a shift of control effort from the process-control to the lot-acceptance stage, which is the consequence of tradeoffs involving both stages. The managerial impact of adopting integrated plans is discussed. 相似文献
90.
William H. Ruckle 《海军后勤学研究》1992,39(7):893-903
This article is a theoretic study of the following problem in verification: Mobile units under control of an agent, whom we call the HIDER, travel on a known transportation network and must at the conclusion of their itinerary report locations at fixed time intervals to a monitoring authority, whom we call the SEEKER. The purpose of this reporting requirement is to verify that illegal units do not infiltrate the network from sources under the control of the HIDER. We assume that the SEEKER has an independent intelligence-gathering capability which gives sightings of both legal and illegal units. The purpose of this article is to quantify the advantage of frequent over infrequent reporting. © 1992 John Wiley & Sons, Inc. 相似文献