首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   483篇
  免费   12篇
  2021年   12篇
  2019年   21篇
  2018年   10篇
  2017年   10篇
  2016年   11篇
  2015年   11篇
  2014年   9篇
  2013年   93篇
  2011年   4篇
  2009年   5篇
  2008年   5篇
  2007年   5篇
  2006年   5篇
  2005年   9篇
  2004年   8篇
  2003年   6篇
  2002年   6篇
  2001年   4篇
  2000年   7篇
  1999年   4篇
  1998年   8篇
  1997年   15篇
  1996年   7篇
  1994年   10篇
  1992年   4篇
  1991年   13篇
  1990年   4篇
  1989年   7篇
  1988年   7篇
  1987年   15篇
  1986年   8篇
  1985年   6篇
  1984年   5篇
  1983年   8篇
  1982年   8篇
  1981年   6篇
  1980年   7篇
  1979年   12篇
  1978年   8篇
  1977年   8篇
  1976年   8篇
  1975年   7篇
  1974年   7篇
  1973年   12篇
  1972年   6篇
  1971年   6篇
  1970年   7篇
  1969年   6篇
  1968年   5篇
  1967年   5篇
排序方式: 共有495条查询结果,搜索用时 437 毫秒
411.
We consider the problem of determining the capacity to assign to each arc in a given network, subject to uncertainty in the supply and/or demand of each node. This design problem underlies many real‐world applications, such as the design of power transmission and telecommunications networks. We first consider the case where a set of supply/demand scenarios are provided, and we must determine the minimum‐cost set of arc capacities such that a feasible flow exists for each scenario. We briefly review existing theoretical approaches to solving this problem and explore implementation strategies to reduce run times. With this as a foundation, our primary focus is on a chance‐constrained version of the problem in which α% of the scenarios must be feasible under the chosen capacity, where α is a user‐defined parameter and the specific scenarios to be satisfied are not predetermined. We describe an algorithm which utilizes a separation routine for identifying violated cut‐sets which can solve the problem to optimality, and we present computational results. We also present a novel greedy algorithm, our primary contribution, which can be used to solve for a high quality heuristic solution. We present computational analysis to evaluate the performance of our proposed approaches. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 236–246, 2016  相似文献   
412.
The debate over whether there exists a British counter-insurgency tradition of minimum force is one that has been thoroughly discussed. Is there anything left to say? This study suggests there is further insight to be attained if one explicitly evaluates the concept of minimum force in relation to the conduct of the security forces in the years of the Northern Ireland conflict. Through an examination of three key periods in the conflict, it will be shown that while there was invariably an awareness of the need to act with restraint among senior officers at the strategic level, this was often difficult to apply at the tactical level in the heat of confrontation. The argument demonstrates that the British Army, and other instruments of the state, rarely acted in a manner that could be described as ‘minimal’. Instead, it was the broader liberal values of the British state that explains largely the degrees of restraint exhibited by the government and security forces.  相似文献   
413.
We undertake inference for a stochastic form of the Lanchester combat model. In particular, given battle data, we assess the type of battle that occurred and whether or not it makes any difference to the number of casualties if an army is attacking or defending. Our approach is Bayesian and we use modern computational techniques to fit the model. We illustrate our method using data from the Ardennes campaign. We compare our results with previous analyses of these data by Bracken and Fricker. Our conclusions are somewhat different to those of Bracken. Where he suggests that a linear law is appropriate, we show that the logarithmic or linear‐logarithmic laws fit better. We note however that the basic Lanchester modeling assumptions do not hold for the Ardennes data. Using Fricker's modified data, we show that although his “super‐logarithmic” law fits best, the linear, linear‐logarithmic, and logarithmic laws cannot be ruled out. We suggest that Bayesian methods can be used to make inference for battles in progress. We point out a number of advantages: Prior information from experts or previous battles can be incorporated; predictions of future casualties are easily made; more complex models can be analysed using stochastic simulation techniques. © 2000 John Wiley & Sons, Inc. Naval Research Logistics 47: 541–558, 2000  相似文献   
414.
An efficient algorithm for determining the optimal arrival schedule for customers in a stochastic service system is developed. All customers arrive exactly when scheduled, and service times are modeled as iid Erlang random variables. Costs are incurred at a fixed rate per unit of time each customer waits for service, and an additional cost is incurred for every unit of time the server operates beyond a scheduled closing time. The objective is to minimize total operating cost. This type of problem arises in many operational contexts including transportation, manufacturing, and appointment‐based services. © 1999 John Wiley & Sons, Inc. Naval Research Logistics 46: 549–559, 1999  相似文献   
415.
The paper considers the open shop scheduling problem to minimize the make-span, provided that one of the machines has to process the jobs according to a given sequence. We show that in the preemptive case the problem is polynomially solvable for an arbitrary number of machines. If preemption is not allowed, the problem is NP-hard in the strong sense if the number of machines is variable, and is NP-hard in the ordinary sense in the case of two machines. For the latter case we give a heuristic algorithm that runs in linear time and produces a schedule with the makespan that is at most 5/4 times the optimal value. We also show that the two-machine problem in the nonpreemptive case is solvable in pseudopolynomial time by a dynamic programming algorithm, and that the algorithm can be converted into a fully polynomial approximation scheme. © 1998 John Wiley & Sons, Inc. Naval Research Logistics 45: 705–731, 1998  相似文献   
416.
Simulation is commonly used to find the best values of decision variables for problems which defy analytical solutions. This objective is similar to that of optimization problems and thus, mathematical programming techniques may be applied to simulation. However, the application of mathematical programming techniques, e.g., the gradient methods, to simulation is compounded by the random nature of simulation responses and by the complexity of the statistical issues involved. The literature relevant to optimization in simulation is scattered, and no comprehensive and up-to-date treatment of the subject is presently available. To that end, this article brings together numerous concepts related to t he problem of optimization in simulation. Specifically, it discusses the application of mathematical programming techniques to optimization in simulation, response surface methodology and designs, perturbation analysis, and frequency domain simulation experiments. The article provides a user with an overview of the available optimization techniues and identifies future research possibilities.  相似文献   
417.
Ethnicity and ideology are frequently used to determine whether an armed group is hostile or friendly vis-à-vis the state. By contrast, I argue that the social structure of insurgent movements holds more explanatory power for their respective positions than ethnicity or ideology. To illustrate this, I apply Pierre Bourdieu’s concept of a contest between forces of ‘conservation’ and forces of ‘heresy’ to the current Afghanistan war. I demonstrate that the social structure of the Taleban renders them prone to ‘heresy’, while the formerly second biggest insurgent group, Gulbuddin Hekmatyar’s party, has rather been an impeded force of ‘conservation.’  相似文献   
418.
In 1920, the Birmingham Small Arms Company supplied 10,000 Pattern 1907 bayonets to the government of Siam to accompany an order for rifles. The original maker of these bayonets was unknown, but historical research indicates that the Wilkinson Sword Co. Ltd. was a primary maker. The weights of some surviving Pattern 1907 bayonets, including twelve bayonets from the 10,000 described above, produced by the six makers in the UK before and during the Great War (1914–1918) period were available. A statistical analysis of the data was performed to compare with the historical research. The results strongly supported that the Wilkinson Sword Co. Ltd. was a primary maker. They were also sufficient to exclude from this batch of twelve bayonets the Royal Small Arms Factory (Enfield) and Vickers Ltd. as manufacturers. The statistical evidence for the presence of bayonets made by J.A. Chapman Ltd., R. Mole & Sons and Sanderson Bros. was weaker than that for the Wilkinson Sword Co. Ltd., but was nevertheless supportive of that hypothesis. Overall, the analysis was consistent with the supply to Siam of commingled bayonets from British government stores. It was noted that the bayonets for the Siam contract fell into a relatively narrow weight range, but the reason for this could not be determined.  相似文献   
419.
Iran’s support for terrorist groups is the subject of countless articles and monographs. Less emphasis is placed on Tehran’s efforts to fight terrorist groups targeting the Iranian state. Yet, modern domestic and foreign terrorist groups have targeted Iran for decades. As a result, the country has developed fairly sophisticated, albeit opaque, counterterrorism apparatus and mechanisms. This article sheds light on the Iranian counterterrorism apparatus and efforts since the 1979 Islamic Revolution, drawing on several years of fieldwork in Iran, interviews with current and former officials, and Persian sources.  相似文献   
420.
Queueing systems with multiple servers are commonly used to model telecommunications systems. But, in general, the service rate of each of the servers is not the same. This fact is indeed true in a communication network where one path (server) may be a terrestrial link and the other (server) a satellite link with its inherent propagation delay. In this article we consider a two-server system where arriving customers are first placed in the queue for the faster server until that queue size reaches a certain threshold, whereupon they are diverted to the slower server. Additional arriving customers are assigned to the slower server until the faster server's queue drops to another lower threshold, at which point arrivals are reassigned to the faster server. We develop an exact mathematical model of the steady-state behavior of each queueing system and a simple analytic approximation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号