首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   301篇
  免费   5篇
  2021年   4篇
  2019年   9篇
  2018年   5篇
  2017年   7篇
  2015年   3篇
  2014年   4篇
  2013年   51篇
  2010年   4篇
  2009年   3篇
  2008年   6篇
  2006年   2篇
  2005年   3篇
  2004年   5篇
  2003年   4篇
  2002年   3篇
  2001年   4篇
  2000年   4篇
  1998年   5篇
  1997年   5篇
  1996年   9篇
  1995年   4篇
  1994年   2篇
  1993年   4篇
  1992年   5篇
  1991年   8篇
  1990年   5篇
  1989年   8篇
  1988年   8篇
  1987年   7篇
  1986年   7篇
  1985年   6篇
  1984年   6篇
  1983年   2篇
  1982年   4篇
  1981年   5篇
  1980年   10篇
  1979年   4篇
  1978年   6篇
  1977年   4篇
  1976年   5篇
  1975年   6篇
  1974年   4篇
  1973年   2篇
  1972年   5篇
  1971年   8篇
  1970年   4篇
  1969年   4篇
  1968年   5篇
  1967年   4篇
  1966年   6篇
排序方式: 共有306条查询结果,搜索用时 15 毫秒
181.
This article deals with the statistical analysis of an N-component series system supported by an active standby and one repair facility. Assuming that the life and repair times of the components are independent exponential random variables, the probability distribution of the first passage to the system failure time is shown to be a convolution of two independent exponential distributions. Three observation schemes are considered to obtain the maximum likelihood estimates of the survival function. Information matrices are supplied. Numerical results based on Monte Carlo simulation are presented. It is noted that component level information (failure rate, repair rate) is not necessary for estimating the survival function of the system.  相似文献   
182.
The gas turbine engine is used to power many different types of commercial and military aircraft. During the scheduled maintenance of these engines, many of the turbine components are replaced. Of particular importance to us is the replacement of nozzle guide vanes in the nozzle assembly section of the engine. Individual vanes are selected from inventory to make up sets, and each set must meet certain characteristics in order to be feasible. The vanes in each set must then be sequenced in order to meet additional criteria. In this article, we give heuristics for the above partitioning and sequencing problems. Empirical analyses, using actual data from a branch of the armed services and a major engine manufacturer, are used to evaluate the proposed heuristics. The results of these analyses indicate that the heuristics are effective.  相似文献   
183.
184.
The March 2012 coup in Mali opened the door to expanded territorial occupation in northern Mali by Tuareg separatists and subsequently armed Islamist extremists. French forces intervened at the behest of the interim government in Mali. This article examines how various actors frame the conflict to their advantage. While the Malian government and France are allies, the position of various Tuareg actors shift over time as they strategize and weigh the value of allegiance with the French. Local extremist organizations are labeled as terrorists and are targeted as enemies. This article argues that the conflict has been decontextualized and framed within the ‘war on terror’. France’s decision to intervene and to expand their regional military presence, rather than exit, is legitimized by the framing of their intervention as integral to counterterrorism efforts.  相似文献   
185.
A single server is faced with a collection of jobs of varying duration and urgency. Each job has a random lifetime during which it is available for nonpreemptive service. Should a job's lifetime expire before its service begins then it is lost from the system unserved. The goal is to schedule the jobs for service to maximize the expected number served to completion. Two heuristics have been proposed in the literature. One (labeled πS) operates a static priority among the job classes and works well in a “no premature job loss” limit, whereas the second (πM) is a myopic heuristic which works well when lifetimes are short. Both can exhibit poor performance for problems at some distance from the regimes for which they were designed. We develop a robustly good heuristic by an approximative approach to the application of a policy improvement step to the asymptotically optimal heuristic πS, in which we use a fluid model to obtain an approximation for the value function of πS. The performance of the proposed heuristic is investigated in an extensive numerical study. © 2010 Wiley Periodicals, Inc. Naval Research Logistics 2010  相似文献   
186.
187.
Irrespective our views on the rationality of our opponent's continuing to conduct operations against us, unless utterly extirpated, he retains a vote on when and how conflict will end. This is because war is about power — compelling another actor to do something he would not otherwise do, or to cease doing something he would otherwise prefer to do. In planning for conflict termination we should account for the peculiarities of opponents who may decide not to quit when we have beat them fair and square. We do not desire that they cease conventional fighting, but that they cease fighting altogether.  相似文献   
188.
This article borrows from the work of Clausewitz to posit two general approaches to the pursuit of limitation in war, one being political and the other technical. The political approach seeks to control escalation via consensual arrangements with the adversary, while the technical approach seeks to forestall escalation by peremptorily destroying the enemy's military capability. It is argued that the 'Revolution in Military Affairs' (RMA) instantiates the second, technical, approach to war limitation. By exploiting advanced technology, the US armed forces hope to limit the costs of war by defeating their adversaries in a rapid, decisive manner. The problems associated with this approach are discussed in relation to the nature of the conflicts that the US is likely to face in the foreseeable future. The article concludes by suggesting that such conflicts will require that more attention be paid to the political sources of limitation in war.  相似文献   
189.
190.
There have been growing claims in media circles and law-enforcement settings that street gangs and criminal groups are turning to Internet-based social networking sites for various reasons ranging from the showcasing of their images and exploits to the suspected recruitment of members. The present study investigates whether such a trend is, in fact, in place. The presence of street gangs on these Internet sites is referred to as cyberbanging. While there is some anecdotal evidence suggesting that gangs are turning to social networking sites, there is little available research on exactly how street gangs and criminal groups use the Internet. Our main argument is that gang culture is in many ways an individualized phenomenon and this feature ties in directly with recent assessments of the Internet as a setting that is governed by a process of networked individualism. This theoretical link between the individualized gang setting and the presence of gang members on social networking sites helps us understand why recruitment is improbable even in a context where people are openly diffusing their image and exploits to a growing number of Internet users. The empirical segment of this research adds to this general outlook. Based on a keyword search of over 50 street gang names, the three main social networking sites (Twitter, Facebook, and MySpace) were monitored for street gang presence. Results illustrate that gang presence on social networking sites is linked primarily to promoting a general gang or street culture through individual displays. In regard to the visitors to such sites, there is no evidence that they are being tricked or manipulated in any way. They are, however, showing their curiosity in regard to such groups and, for those who share their comments and opinions, signs of support are evident. Thus, whereas criminal gangs are not proactively using the Internet to convert anyone into being gang members, social networking sites are creating a new venue for people who share or are sensitive to the values underlying street gang lifestyle to come together. These sites essentially create a new convergence setting for gang members to interact with a wider number of people who would probably never have been exposed to their lifestyles and exploits through physical interactions. The study's conclusion extends these findings toward further research in this area, as well as outlining the more relevant implications for law-enforcement monitoring of this growing phenomenon.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号