全文获取类型
收费全文 | 3423篇 |
免费 | 83篇 |
国内免费 | 1篇 |
专业分类
3507篇 |
出版年
2021年 | 38篇 |
2019年 | 91篇 |
2018年 | 54篇 |
2017年 | 84篇 |
2016年 | 80篇 |
2015年 | 64篇 |
2014年 | 67篇 |
2013年 | 737篇 |
2010年 | 36篇 |
2009年 | 39篇 |
2008年 | 49篇 |
2007年 | 52篇 |
2006年 | 38篇 |
2005年 | 45篇 |
2004年 | 56篇 |
2003年 | 42篇 |
2002年 | 58篇 |
1999年 | 41篇 |
1998年 | 46篇 |
1997年 | 50篇 |
1996年 | 61篇 |
1995年 | 44篇 |
1994年 | 60篇 |
1993年 | 64篇 |
1992年 | 60篇 |
1991年 | 74篇 |
1990年 | 39篇 |
1989年 | 73篇 |
1988年 | 79篇 |
1987年 | 70篇 |
1986年 | 74篇 |
1985年 | 69篇 |
1984年 | 36篇 |
1983年 | 42篇 |
1982年 | 43篇 |
1981年 | 47篇 |
1980年 | 51篇 |
1979年 | 45篇 |
1978年 | 49篇 |
1977年 | 46篇 |
1976年 | 45篇 |
1975年 | 47篇 |
1974年 | 52篇 |
1973年 | 50篇 |
1972年 | 52篇 |
1971年 | 43篇 |
1970年 | 40篇 |
1969年 | 40篇 |
1968年 | 36篇 |
1967年 | 34篇 |
排序方式: 共有3507条查询结果,搜索用时 7 毫秒
281.
This paper attempts to resolve the existing confusion concerning missing operations. Scheduling problems are classified in two groups: (i) null-continuous (NC)—comprising the problems where an optimal schedule remains optimal on replacement of arbitrarily small processing times (existing operations) with zeros (missing operations); (ii) null-discontinuous (NDC)—comprising those problems which are not null-continuous. 相似文献
282.
Preference for food in the function of the time since last consumption and total preference in the function of eating frequency are equivalent mathematical representations of attitudes governing food consumption. The observed and postulated properties of these functions imply a formal correspondence between preference maximizing and variety seeking behavior. 相似文献
283.
284.
Sarah M. Ryan 《海军后勤学研究》2003,50(2):167-183
The combination of uncertain demand and lead times for installing capacity creates the risk of shortage during the lead time, which may have serious consequences for a service provider. This paper analyzes a model of capacity expansion with autocorrelated random demand and a fixed lead time for adding capacity. To provide a specified level of service, a discrete time expansion timing policy uses a forecast error‐adjusted minimum threshold level of excess capacity position to trigger an expansion. Under this timing policy, the expansion cost can be minimized by solving a deterministic dynamic program. We study the effects of demand characteristics and the lead time length on the capacity threshold. Autocorrelation acts similarly to randomness in hastening expansions but has a smaller impact, especially when lead times are short. However, the failure either to recognize autocorrelation or to accurately estimate its extent can cause substantial policy errors. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2003 相似文献
285.
Matthew S. Goldberg 《Defence and Peace Economics》2018,29(1):44-61
AbstractIn Operation Iraqi Freedom, which ended in August 2010, nearly 3500 hostile deaths occurred among US military personnel and 32,000 more were wounded in action (WIA). More than 1800 hostile deaths occurred during Operation Enduring Freedom (in and around Afghanistan) through 2014 and about 20,000 were WIA. A larger proportion of wounded personnel survived in Iraq and Afghanistan than during the Vietnam War, but the increased survival rates were not as high as some studies have asserted. The survival rates were 90.2% in Iraq and 91.6% in Afghanistan, compared with 86.5% in Vietnam. The casualty rates varied between the conflicts in Iraq and Afghanistan and before, during, and after the respective surges. Amputation rates are difficult to measure consistently, but I estimate that 2.6% of all WIA and 9.0% of medically evacuated WIA from the Iraq and Afghanistan theaters combined resulted in the major loss of a limb. Elevated non-hostile death rates (including deaths due to accidents, illnesses, homicides, or suicides) resulted in about 220 more deaths in Iraq and about 200 more deaths in Afghanistan than would have been expected in peacetime among populations of the size deployed to those two conflicts. 相似文献
286.
Kenton G. Fasana 《Defence Studies》2018,18(2):167-187
Cyberspace is an avenue of approach through which a military force can attain objectives of value. Through these cyber avenues of approach, military forces can engage, vet, organize, and direct human agents to accomplish specific activities. Although the objectives of these activities could differ from traditional military objectives, they still have military relevance. This particular manifestation of cyber conflict is neither a new domain of war nor something outside of warfare. Rather, it can be viewed as an emerging avenue of approach in the larger context of military operations, auguring benefits in the integration of cyber activities with operations. 相似文献
287.
Assessing the effects of changes in weapons systems or battle tactics is difficult because of the variations in battles and the resulting instability of measures of combat effectiveness. Even under the relatively stable conditions of designed combat exercises, traditional measures may fail to reflect important battle events and dynamics. This variation in results makes the design, conduct, and evaluation of combat experiments, combat simulations, and combat training exercises a challenging endeavor, indeed. We develop and examine a combat measure of effectiveness, based on Lanchester models, which we call the battle trace. The battle trace is a measure of ongoing battle results, measured as a function of time into the battle. We describe how such measures might contribute to assessing effects of changing certain battle parameters. We suggest applications of these ideas to developing combat simulations and to enhancing combat training exercises. 相似文献
288.
Some U.S. military leaders have asserted that the United States, Japan, Australia, and India and the Republic of Korea are developing multilateral defense cooperation to deter aggression and uphold norms much like North Atlantic Treaty Organization (NATO) has in Europe. Frequent military exercises and China’s threats to freedom of navigation (FoN) and North Korea’s nuclear missiles comprise the motive force for such cooperation. However, cooperation thus far has been trilateral and minimal, given divergent national interests and dispersed geopolitical locations. Cooperation among Japan, Republic of Korea (ROK), and the United States is increasing given the threat, but ROK’s public opinion is divided about Japan. Australia, Japan, and India have increased cooperation with the United States but are reluctant to conduct FoN operations with the United States to challenge China’s expansionism in the South China Sea. If China becomes more aggressive and blocks FoN or seizes territory, development toward an Asian NATO is possible. 相似文献
289.
We study new decision and optimization problems of finding a simple path between two given vertices in an arc weighted directed multigraph such that the path length is equal to a given number or it does not fall into the given forbidden intervals (gaps). A fairly complete computational complexity classification is provided and exact and approximation algorithms are suggested. 相似文献
290.
Adjacency‐based local top‐down search method for finding maximal efficient faces in multiple objective linear programming 下载免费PDF全文
It is well‐known that the efficient set of a multiobjective linear programming (MOLP) problem can be represented as a union of the maximal efficient faces of the feasible region. In this paper, we propose a method for finding all maximal efficient faces for an MOLP. The new method is based on a condition that all efficient vertices (short for the efficient extreme points and rays) for the MOLP have been found and it relies on the adjacency, affine independence and convexity results of efficient sets. The method uses a local top‐down search strategy to determine maximal efficient faces incident to every efficient vertex for finding maximal efficient faces of an MOLP problem. To our knowledge, the proposed method is the first top‐down search method that uses the adjacency property of the efficient set to find all maximal efficient faces. We discuss this and other advantages and disadvantages of the algorithm. We also discuss some computational experience we have had with our computer code for implementing the algorithm. This computational experience involved solving several MOLP problems with the code. 相似文献