首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   317篇
  免费   7篇
  2021年   5篇
  2020年   4篇
  2019年   8篇
  2018年   5篇
  2017年   4篇
  2015年   6篇
  2014年   5篇
  2013年   49篇
  2012年   5篇
  2010年   9篇
  2009年   4篇
  2008年   7篇
  2006年   4篇
  2005年   5篇
  2004年   5篇
  2003年   5篇
  2002年   4篇
  2001年   4篇
  2000年   4篇
  1998年   5篇
  1997年   4篇
  1996年   9篇
  1995年   4篇
  1993年   4篇
  1992年   5篇
  1991年   8篇
  1990年   5篇
  1989年   8篇
  1988年   8篇
  1987年   7篇
  1986年   7篇
  1985年   6篇
  1984年   6篇
  1982年   4篇
  1981年   5篇
  1980年   10篇
  1979年   4篇
  1978年   6篇
  1977年   4篇
  1976年   5篇
  1975年   6篇
  1974年   4篇
  1973年   2篇
  1972年   3篇
  1971年   8篇
  1970年   4篇
  1969年   4篇
  1968年   5篇
  1967年   4篇
  1966年   6篇
排序方式: 共有324条查询结果,搜索用时 15 毫秒
311.
We present techniques for classifying Markov chains with a continuous state space as either ergodic or recurrent. These methods are analogous to those of Foster for countable space chains. The theory is presented in the first half of the paper, while the second half consists of examples illustrating these techniques. The technique for proving ergodicity involves, in practice, three steps: showing that the chain is irreducible in a suitable sense; verifying that the mean hitting times on certain (usually bounded) sets are bounded, by using a “mean drift” criterion analogous to that of Foster; and finally, checking that the chain is such that bounded mean hitting times for these sets does actually imply ergodicity. The examples comprise a number of known and new results: using our techniques we investigate random walks, queues with waiting-time-dependent service times, dams with general and random-release rules, the s-S inventory model, and feedback models.  相似文献   
312.
边防部队预防、处置群体性事件应该以维护社会稳定、构建和谐社会为出发点和立足点.这个定位符合国家发展的总要求,有利于发挥边防部队在预防、处置群体性事件中的作用,有利于转变角色,克服思维惯性,进一步做好预防、处置群体性事件的工作.  相似文献   
313.
装甲装备器材保障具有规模大、时间紧、消耗大、不确定因素多、决策难度大等特点。准确的需求预测是实施主动的、精细化的器材保障的重要前提条件。利用BP神经网络较强自学习能力和自适应能力对器材需求规律进行学习,并借助遗传算法提高BP神经网络的收敛速度,设计了一种基于遗传算法改进的BP神经网络模型预测方法,对装甲装备器材进行需求预测。通过实例计算表明,该方法比单纯BP神经网络方法具有预测精度高、收敛速度快的优点。  相似文献   
314.
In a multifunction radar, the maximum number of targets that can be managed or tracked is an important performance measure. Interleaving algorithms developed to operate radars exploit the dead‐times between the transmitted and the received pulses to allocate new tracking tasks that might involve transmitting or receiving pulses, thus increasing the capacity of the system. The problem of interleaving N targets involves a search among N! possibilities, and suboptimal solutions are usually employed to satisfy the real‐time constraints of the radar system. In this paper, we present new tight 0–1 integer programming models for the radar pulse interleaving problem and develop effective solution methods based on Lagrangian relaxation techniques. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2004.  相似文献   
315.
In this article, we are concerned with scheduling stochastic jobs in a flowshop with m machines and zero intermediate storage. We assume that there are n - 2 identically distributed and 2 fast stochastic jobs. Roughly, the main result states that the makespan is stochastically minimized by placing one of the fast jobs first and the other last.  相似文献   
316.
ABSTRACT

Novichok agents are a class of nerve agents developed by the Soviet Union during the Cold War. In light of the use of a Novichok agent in Salisbury in March 2018, two sets of proposals to amend Schedule 1 of the 1993 Chemical Weapons Convention (CWC) have been put forth, one jointly by the United States, Canada, and the Netherlands, and the other by Russia. Both sets of proposals will be discussed and voted upon at the next Conference of States Parties of the Organisation for the Prohibition of Chemical Weapons (OPCW) in November 2019. If either set of proposals is approved, it will be the first time that the list of chemicals subject to verification under the CWC will have been modified. This viewpoint will discuss these proposals, and argue that, if adopted, the joint proposal and the portions of the Russian proposal upon which consensus can be reached would significantly strengthen the CWC by considerably expanding the coverage of its Schedule 1 and bringing Novichok agents firmly within the CWC’s verification system. We also argue that, since the OPCW Technical Secretariat did not deem the fifth group of chemicals proposed by Russia to meet the criteria for inclusion in Schedule 1, Russia should withdraw this part of its proposal from consideration. The proposals have also served an important purpose in clarifying the identity of the chemical agent used in the Salisbury incident, squarely placing it within one of the two families of Novichok agents described by the Russian chemical-weapons scientist and whistleblower Vil Mirzayanov. If either proposal is approved in November, it will be important to conduct a thorough assessment of key precursors for the synthesis of Novichok agents and assess the need to amend CWC schedules and national and multinational export-control lists accordingly.  相似文献   
317.
ABSTRACT

Grouping warships for combat has evolved greatly over the centuries. In the early 1940s, the United States Navy began to group its warships for combat in much more flexible task forces than the previous single-type-of-warship formations. This system has evolved and spread to naval forces ashore but remains fundamentally unchanged. It now covers numbers between 1 to over 1000, of which the most prominent is the first 100 or so which U.S. Navy combat forces use. The numbered fleets worldwide utilize the series covering 20-79; 1-19 and 90-99 appear to be reserved for special allocations and Commander, Pacific Fleet; numbers over 80 to the Atlantic; 100-119 for Northern Europe and briefly Tenth Fleet; the 120 series for Second Fleet as a Joint Task Force leader; the 150 series for Naval Forces Central Command; and the 180 series for Atlantic Fleet and now-Fleet Forces Command.  相似文献   
318.
319.
ABSTRACT

Bagayoko, Hutchful, and Luckham correctly argue that the structures, characteristics, and operating methods of official security institutions in Africa have been somewhat neglected, with a lack of much recent research. The Somali National Army (SNA) sits among these lacunae. Its formal structures can be used as a skeletal starting point and springboard to start to draw the network diagrams that chart informal linkages. This is why recent declassification decisions by U.S. intelligence bodies, coupled with period documents released to the UK National Archives, hold significance in helping us understand early hierarchical SNA arrangements. They show the steady build-up in size of the force, to 1987, to about the time the civil war began to fragment the state.  相似文献   
320.
ABSTRACT

International efforts to hold the government of President Bashar al-Assad accountable for the use of chemical weapons in the Syrian Civil War have entered a new phase. For the first time, the Organisation for the Prohibition of Chemical Weapons (OPCW), the international organization responsible for implementing the 1993 Chemical Weapons Convention, has been empowered to identify the perpetrators of chemical attacks in Syria. The Investigation and Identification Team (IIT), which was formed to conduct the OPCW’s new attribution mission, has announced its intention to investigate and identify the perpetrators of nine chemical attacks in Syria, including the April 7, 2018, attack in Douma. This article reviews recent efforts to attribute chemical attacks in Syria, describes what we know about the nine incidents to be investigated, summarizes what is known about the Syrian government officials, military commanders, and chemical-warfare scientists suspected of being responsible for these attacks, discusses what to expect during the next phase of the attribution process, and offers insights into how the international community can move beyond attribution to accountability. Accountability is necessary to provide justice for victims and to prevent future incidents by demonstrating that perpetrators of chemical attacks will be identified and punished.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号