首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   611篇
  免费   14篇
  2019年   12篇
  2017年   17篇
  2016年   13篇
  2015年   14篇
  2014年   18篇
  2013年   128篇
  2012年   6篇
  2011年   5篇
  2010年   8篇
  2009年   12篇
  2007年   6篇
  2006年   8篇
  2005年   10篇
  2004年   11篇
  2003年   6篇
  2002年   10篇
  2001年   4篇
  2000年   7篇
  1999年   6篇
  1998年   14篇
  1997年   9篇
  1996年   9篇
  1995年   5篇
  1994年   16篇
  1993年   14篇
  1992年   9篇
  1991年   14篇
  1990年   8篇
  1989年   14篇
  1988年   15篇
  1987年   17篇
  1986年   16篇
  1985年   12篇
  1984年   8篇
  1983年   7篇
  1982年   7篇
  1981年   10篇
  1980年   7篇
  1979年   8篇
  1978年   12篇
  1976年   8篇
  1975年   6篇
  1974年   8篇
  1973年   8篇
  1972年   9篇
  1971年   5篇
  1970年   9篇
  1969年   6篇
  1968年   4篇
  1967年   6篇
排序方式: 共有625条查询结果,搜索用时 31 毫秒
491.
The signature of a system with independent and identically distributed (i.i.d.) component lifetimes is a vector whose ith element is the probability that the ith component failure is fatal to the system. System signatures have been found to be quite useful tools in the study and comparison of engineered systems. In this article, the theory of system signatures is extended to versions of signatures applicable in dynamic reliability settings. It is shown that, when a working used system is inspected at time t and it is noted that precisely k failures have occurred, the vector s [0,1]nk whose jth element is the probability that the (k + j)th component failure is fatal to the system, for j = 1,2,2026;,nk, is a distribution‐free measure of the design of the residual system. Next, known representation and preservation theorems for system signatures are generalized to dynamic versions. Two additional applications of dynamic signatures are studied in detail. The well‐known “new better than used” (NBU) property of aging systems is extended to a uniform (UNBU) version, which compares systems when new and when used, conditional on the known number of failures. Sufficient conditions are given for a system to have the UNBU property. The application of dynamic signatures to the engineering practice of “burn‐in” is also treated. Specifically, we consider the comparison of new systems with working used systems burned‐in to a given ordered component failure time. In a reliability economics framework, we illustrate how one might compare a new system to one successfully burned‐in to the kth component failure, and we identify circumstances in which burn‐in is inferior (or is superior) to the fielding of a new system. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
492.
In this article, we study the design and control of manufacturing cells with a mix of manual and automated equipment, operating under a CONWIP pull protocol, and staffed by a single agile (cross‐trained) worker. For a three‐station line with one automated station, we fully characterize the structure of the optimal control policy for the worker and show that it is a static priority policy. Using analytical models and extensive simulation experiments, we also evaluate the effectiveness of practical heuristic control policies and provide managerial insights on automation configuration design of the line. This characterization of the worker control policy enables us to develop managerial insights into the design issues of how best to locate and concentrate automation in the line. Finally, we show that, in addition to ease of control and greater design flexibility, the CONWIP protocol also offers higher efficiency and robustness than does the push protocol. © 2008 Wiley Periodicals, Inc. Naval Research Logistics 2009  相似文献   
493.
This article considers the determination of the optimal base-stock inventory policy for the newsboy inventory model when there is uncertainty about either or both of its basic cost inputs: either Cu, the marginal cost of an undersupply mistake, or Co, the marginal cost of an oversupply mistake. Such uncertainties often arise in implementing the newsboy model, especially with respect to Cu, whose value depends mostly on the often-imponderable economic consequences of a lost sale or backorder. Given this uncertainty, we use decision theory to propose and analyze two measures of policy “goodness” and two base-stock selection criteria, which in combination provide four alternative “optimal” base-stock policies. Formulas and/or conditions defining each alternative policy are provided. Our empirical study indicates that the recommended policy can be quite sensitive to the measure/criterion chosen, and that the consequences of the wrong choice can be quite considerable.  相似文献   
494.
This paper considers a problem of warranty reserving, namely, the current practice of setting aside part of a product revenue to meet future claims arising from the warranty. We define a Compound Poisson stochastic model for warranty claims and reserve and obtain, using a sample paths technique, the long-run probability distribution of a warranty reserves, managed under alternative warranties and reserve policies.  相似文献   
495.
In this article we consider a single-server, bulk-service queueing system in which the waiting room is of finite capacity. Arrival process is Poisson and all the arrivals taking place when the waiting room is full are lost. The service times are generally distributed independent random variables and the distribution is depending on the batch size being served. Using renewal theory, we derive the time-dependent solution for the system-size probabilities at arbitrary time points. Also we give expressions for the distribution of virtual waiting time in the queue at any time t.  相似文献   
496.
A general model for the failure of fibrous composite materials is described. It is shown to contain some of the well-known models in the literature. The composite material is viewed as a coherent system of independent identically distributed component strengths. Under the assumption that the applied load is redistributed “homotonically” to the unfailed components upon the failure of a component (an individual fiber segment) and that the distributions of component strengths are IFRA, it is shown that the system (composite) strength distribution is also IFRA. Examples are given using carbon reinforced composite data to illustrate the IFRA property.  相似文献   
497.
The two purposes of this article are to illustrate the power and simplicity of level crossing analysis and to present a conservation identity for M/G/1 priority queues with server vacations. To illustrate the use of level crossing analysis we apply it to preemptive (resume) priority M/G/1 queues with single- and multiple-server vacations considered by Kella and Yechiali (1986) and to non-preemptive priority M/M/c queues considered by Kella and Yechiali (1985). The conservation identity presented here states that the ratios of mean waiting times in an M/G/1 queue with and without server vacation policies are independent of the service discipline for first come first served, shortest processing time, shortest processing time within generations and non-preemptive priority service disciplines.  相似文献   
498.
ABSTRACT

The Chinese People’s Liberation Army (PLA) is halfway through a multi-decade modernization process. It has begun a major restructuring effort as it shifts its focus from a traditional continental defensive posture to a more maritime-oriented emphasis. In order to create more balanced joint force, it has adjusted the structure of its highest command organization, the Central Military Commission; abolished the former four General Departments and seven Military Regions; created five new joint Theater Commands and service-level commands for the Army and Rocket Force; and is reducing the size of its active duty force by 300,000 personnel. While seeking to overcome numerous internal obstacles, the PLA continues to develop and improve its capabilities to conduct integrated joint operations to deter a variety of threats to China’s sovereignty and territory and, if deterrence fails, to win informationized local war.  相似文献   
499.
The debate over whether there exists a British counter-insurgency tradition of minimum force is one that has been thoroughly discussed. Is there anything left to say? This study suggests there is further insight to be attained if one explicitly evaluates the concept of minimum force in relation to the conduct of the security forces in the years of the Northern Ireland conflict. Through an examination of three key periods in the conflict, it will be shown that while there was invariably an awareness of the need to act with restraint among senior officers at the strategic level, this was often difficult to apply at the tactical level in the heat of confrontation. The argument demonstrates that the British Army, and other instruments of the state, rarely acted in a manner that could be described as ‘minimal’. Instead, it was the broader liberal values of the British state that explains largely the degrees of restraint exhibited by the government and security forces.  相似文献   
500.
In a military intervention, do surges work? I compare the failed ‘surge’ in Vietnam, the repulse of the Easter Invasion in 1972, as a means of assessing the more ambiguous surges in Iraq and Afghanistan. I identify four features of a surge for this analysis: the military dimensions and strategy of the surging forces, the military capabilities of the host forces, the political vitality and will of the host country, and the political commitment in the domestic politics of the intervener. I find that the last feature is the most critical; and, in all three surges, the American political commitment was lacking.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号