首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   437篇
  免费   5篇
  2019年   4篇
  2018年   8篇
  2017年   8篇
  2016年   11篇
  2015年   6篇
  2014年   4篇
  2013年   135篇
  2010年   5篇
  2008年   4篇
  2007年   3篇
  2006年   3篇
  2005年   8篇
  2004年   3篇
  2003年   6篇
  2002年   7篇
  2000年   5篇
  1999年   5篇
  1997年   4篇
  1996年   6篇
  1995年   7篇
  1994年   8篇
  1993年   8篇
  1992年   5篇
  1991年   6篇
  1990年   3篇
  1989年   8篇
  1988年   7篇
  1987年   10篇
  1986年   10篇
  1985年   6篇
  1984年   3篇
  1983年   4篇
  1982年   9篇
  1981年   3篇
  1980年   6篇
  1979年   5篇
  1978年   9篇
  1977年   5篇
  1976年   4篇
  1975年   7篇
  1974年   7篇
  1973年   6篇
  1972年   8篇
  1971年   10篇
  1970年   5篇
  1969年   8篇
  1968年   7篇
  1967年   3篇
  1966年   3篇
  1948年   3篇
排序方式: 共有442条查询结果,搜索用时 15 毫秒
241.
The kitting problem in multiechelon assembly systems is to allocate on-hand stock and anticipated future deliveries to kits so that cost is minimized. This article structures the kitting problem and describes several preprocessing methods that are effective in refining the formulation. The model is resolved using an optimizing approach based on Lagrangian relaxation, which yields a separable problem that decomposes into a subproblem for each job. The resulting subproblems are resolved using a specialized dynamic programming algorithm, and computational efficiency is enhanced by dominance properties devised for that purpose. The Lagrangian problem is resolved effectively using subgradient optimization and a specialized branching method incorporated in the branch-and-bound procedure. Computational experience demonstrates that the specialized approach outperforms the general-purpose optimizer OSL. The new solution approach facilitates time-managed flow control, prescribing kitting decisions that promote cost-effective performance to schedule. © 1994 John Wiley & Sons. Inc.  相似文献   
242.
A counterexample is given to demonstrate that previously proposed necessary conditions for the bilevel programming problem are not correct. An interpretation of the difficulty is given by appealing to a “theorem of alternative” result presented in the original work.  相似文献   
243.
Postmodern terrorism presents a significant challenge to global security and law enforcement institutions. Non-state actors operating across international borders, engaged in an apparent global insurgency of extremism that transects the traditional boundaries of crime and war, pose significant challenges to both intelligence and law enforcement agencies. These networked global insurgents blend political and religious fanaticism with criminal enterprises to challenge the rule of law and pose an epochal shift in the structures and relations among states. Negotiating this epochal shift requires traditional organs of national security (the diplomatic, military and intelligence services) to forge new partnerships with police and public safety organizations at the state and local (sub-national), as well as transnational levels. Significant operational, policy and cultural challenges must be overcome to forge an effective multi-lateral global network to counter global terrorism and insurgency.  相似文献   
244.
The paper considers the economic lot scheduling problem (ELSP) where production facility is assumed to deteriorate, owing to aging, with an increasing failure rate. The time to shift from an “in‐control” state to an “out‐of‐control” state is assumed to be normally distributed. The system is scheduled to be inspected at the end of each production lot. If the process is found to be in an “out‐of‐control” state, then corrective maintenance is performed to restore it to an “in‐control” state before the start of the next production run. Otherwise, preventive maintenance is carried out to enhance system reliability. The ELSP is formulated under the capacity constraint taking into account the quality related cost due to possible production of non‐conforming items, process inspection, and maintenance costs. In order to find a feasible production schedule, both the common cycle and time‐varying lot sizes approaches are utilized. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 650–661, 2003  相似文献   
245.
The simulations that many defense analysts rely upon in their studies continue to grow in size and complexity. This paper contrasts the guidance that the authors have received—from some of the giants of military operations research—with the current practice. In particular, the analytic utility of Hughes' simple salvo equations is compared with that of the complex Joint Warfighting System (JWARS), with respect to JWARS' key performance parameters. The comparison suggests that a family of analytic tools supports the best analyses. It follows that smaller, more agile, and transparent models, such as Hughes' salvo equations, are underutilized in defense analyses. We believe that these models should receive more attention, use, and funding. To illustrate this point, this paper uses two very simple models (by modern standards) to rapidly generate insights on the value of information relative to force strength. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2003  相似文献   
246.
247.
248.
249.
The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently doing but also predict what their next move might be. However, the ethical implications are unclear and the backlash following Edward Snowden’s revelations have shown that such activities are not without controversy. This leaves the debate stuck between the important, ethical role that intelligence can play and the potential for its unrestrained use to cause undue harm. This paper will resolve this by giving greater detail to cyber-intelligence practices, highlighting the different levels of harm that the various intelligence operations can cause. The essence of this paper is not that cyber-intelligence should be banned outright, but that it can be justified given the necessary circumstances. Therefore, the paper will develop a specialised set of Just Cyber-Intelligence Principles, built on the just war tradition, to outline if and when such activities are justified.  相似文献   
250.
2014–2015 were years of turmoil for strategic relations, with Sino-Russian relations emerging as a particularly interesting set of ties to observe. This article asks whether recurrent Sino-Russian exhortations of friendship are mirrored by their strategic alignment in the defence and security realm, half a century after the end of the Sino-Soviet pact during the communist era. We examine the arms trade between the two countries and with regional partners, but also the recent pattern of bilateral and multilateral military exercises, as a combined test of the security and defence relationship. We are able to show that the image of friendship that both Moscow and Beijing like to promote, while apparent at the UN Security Council and within the BRICS group, remains constrained by rivalry in high-tech segments of the arms industry and by lingering concerns about the prospects of peer interference in their shared regional vicinity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号