全文获取类型
收费全文 | 559篇 |
免费 | 53篇 |
国内免费 | 1篇 |
出版年
2021年 | 16篇 |
2019年 | 20篇 |
2018年 | 10篇 |
2017年 | 11篇 |
2016年 | 12篇 |
2015年 | 12篇 |
2014年 | 13篇 |
2013年 | 97篇 |
2009年 | 8篇 |
2008年 | 8篇 |
2007年 | 7篇 |
2006年 | 6篇 |
2005年 | 11篇 |
2004年 | 10篇 |
2003年 | 6篇 |
2002年 | 7篇 |
2000年 | 10篇 |
1999年 | 24篇 |
1998年 | 26篇 |
1997年 | 28篇 |
1996年 | 10篇 |
1995年 | 6篇 |
1994年 | 15篇 |
1993年 | 8篇 |
1992年 | 9篇 |
1991年 | 16篇 |
1990年 | 6篇 |
1989年 | 12篇 |
1988年 | 7篇 |
1987年 | 14篇 |
1986年 | 8篇 |
1985年 | 6篇 |
1984年 | 5篇 |
1983年 | 9篇 |
1982年 | 11篇 |
1981年 | 5篇 |
1980年 | 7篇 |
1979年 | 11篇 |
1978年 | 7篇 |
1977年 | 8篇 |
1976年 | 7篇 |
1975年 | 7篇 |
1974年 | 7篇 |
1973年 | 12篇 |
1972年 | 6篇 |
1971年 | 6篇 |
1970年 | 7篇 |
1969年 | 6篇 |
1968年 | 5篇 |
1967年 | 5篇 |
排序方式: 共有613条查询结果,搜索用时 15 毫秒
501.
Unit‐load warehouses store and retrieve unit‐loads, typically pallets. When storage and retrieval operations are not coordinated, travel is from a pickup and deposit (P&D) point to a pallet location and back again. In some facilities, workers interleave storage and retrieval operations to form a dual‐command cycle. Two new aisle designs proposed by Gue and Meller (“Improving the unit‐load warehouse.” In Progress in Material Handling Research: 2006. Material Handling Industry of America, Charlotte, NC, 2006) use diagonal aisles to reduce the travel distance to a single pallet location by approximately 10 and 20[percnt] for the two designs, respectively. We develop analytical expressions for travel between pallet locations for one of these—the fishbone design. We then compare fishbone warehouses that have been optimized for dual‐command to traditional warehouses that have been optimized in the same manner, and show that an optimal fishbone design reduces dual‐command travel by 10–15%. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 54: 389–403, 2009 相似文献
502.
In this article, we study the design and control of manufacturing cells with a mix of manual and automated equipment, operating under a CONWIP pull protocol, and staffed by a single agile (cross‐trained) worker. For a three‐station line with one automated station, we fully characterize the structure of the optimal control policy for the worker and show that it is a static priority policy. Using analytical models and extensive simulation experiments, we also evaluate the effectiveness of practical heuristic control policies and provide managerial insights on automation configuration design of the line. This characterization of the worker control policy enables us to develop managerial insights into the design issues of how best to locate and concentrate automation in the line. Finally, we show that, in addition to ease of control and greater design flexibility, the CONWIP protocol also offers higher efficiency and robustness than does the push protocol. © 2008 Wiley Periodicals, Inc. Naval Research Logistics 2009 相似文献
503.
In this article we consider a single-server, bulk-service queueing system in which the waiting room is of finite capacity. Arrival process is Poisson and all the arrivals taking place when the waiting room is full are lost. The service times are generally distributed independent random variables and the distribution is depending on the batch size being served. Using renewal theory, we derive the time-dependent solution for the system-size probabilities at arbitrary time points. Also we give expressions for the distribution of virtual waiting time in the queue at any time t. 相似文献
504.
Existing models in multistage service systems assume full information on the state of downstream stages. In this paper, we investigate how much the lack of such information impacts jobs' waiting time in a two‐stage system with two types of jobs at the first stage. The goal is to find the optimal control policy for the server at the first stage to switch between type‐1 and type‐2 jobs, while minimizing the long‐run average number of jobs in the system. We identify control policies and corresponding conditions under which having no or partial information, the system can still capture the most benefit of having full information. 相似文献
505.
M. A. Thomas 《Defence Studies》2019,19(2):149-169
In the mid-2000s, the United States Army was embroiled in counterinsurgency missions in Iraq and Afghanistan that required deeper understanding of local social systems. The Army turned to systems thinking and design thinking to model and understand the world, define problems, and develop approaches to strategic and operational challenges. However, the Army’s approach as expressed in publications and doctrine encourages the development of complicated, unsupported, and unfalsifiable hypotheses. The risk is that the Army will act on incorrect assumptions and develop plans that are fragile. 相似文献
506.
Joakim Erma Møller 《Defence Studies》2019,19(3):235-256
Norway, Sweden and Finland have proclaimed a willingness to cooperate militarily in a future crisis or conflict despite their diverging alliance affiliation. This article assesses their ability to do so through various elements affecting their interoperability, with Arctic Challenge, a multinational military exercise, as an empirical basis. The analysis finds that the NATO/non-NATO-divide has a negative impact on the trilateral defence cooperation, especially on exchange of information and aspects related to command and control. At the same time, Finland and Sweden have become largely NATO-standardized through their active partnership with the Alliance. This has affected interoperability aspects, such as communication, culture, and the compatibility of technical solutions, in a positive manner. Through agreements with the Alliance, as well as domestic legal changes, the two NATO-partners have facilitated receiving military assistance from Norway and other NATO-members during a crisis. Other agreements between the Nordic countries, however, have been limited to peacetime. 相似文献
507.
Matthijs M. Maas 《Contemporary Security Policy》2019,40(3):285-311
Many observers anticipate “arms races” between states seeking to deploy artificial intelligence (AI) in diverse military applications, some of which raise concerns on ethical and legal grounds, or from the perspective of strategic stability or accident risk. How viable are arms control regimes for military AI? This article draws a parallel with the experience in controlling nuclear weapons, to examine the opportunities and pitfalls of efforts to prevent, channel, or contain the militarization of AI. It applies three analytical lenses to argue that (1) norm institutionalization can counter or slow proliferation; (2) organized “epistemic communities” of experts can effectively catalyze arms control; (3) many military AI applications will remain susceptible to “normal accidents,” such that assurances of “meaningful human control” are largely inadequate. I conclude that while there are key differences, understanding these lessons remains essential to those seeking to pursue or study the next chapter in global arms control. 相似文献
508.
José M. Fernández 《Defence and Peace Economics》2019,30(3):324-348
The Colombian civil war lasted for nearly six decades with approximately 10 percent of its population being displaced over the same period. The implications of this conflict have transgressed international boundaries. Countries such as Ecuador experienced an exodus of victims as well as an increase in the presence of armed groups, along with the proliferation of illegal businesses. Even though the internal social and economic consequences of the Colombian conflict have been documented in the literature, there is yet to be a study addressing these issues from the perspective of impacted neighboring countries. In this work, we contribute to the literature by evaluating whether the influx of asylum seekers and the increasing presence of armed groups in the bordering provinces of Ecuador have lead to an increase in violence among these provinces. We do not find any link between the arrival of asylum seekers and the incidence of violent crimes in the Ecuadorean bordering provinces. Similarly, our results indicate that despite an increase in the presence of armed groups, these regions did not experience an increase in the homicide rates significantly different from the other provinces. The results are robust to various specifications and econometric techniques. 相似文献
509.
Christopher M. Faulkner 《Civil Wars》2019,21(1):83-103
Do Private Military and Security Companies (PMSCs) impact peace duration after civil war? I argue that the role these organisations play in a conflict can impact post-conflict stability. Specifically, I suggest that variance in services provided by PMSCs can influence rebels’ calculations about relative capabilities. These calculations then contribute to the probability for civil war recurrence. Building on the bargaining framework, with a focus on information and commitment problems, this article demonstrates that PMSCs participating in armed combat operations can jeopardise the stability of peace following civil war. Three case narratives (Angola, Sierra Leone and Croatia) are used to probe the theoretical argument and results are illustrative – PMSCs serving as force multipliers contribute to an increase in the probability for conflict recurrence. 相似文献
510.
Algorithm to solve a chance‐constrained network capacity design problem with stochastic demands and finite support 下载免费PDF全文
Kathryn M. Schumacher Richard Li‐Yang Chen Amy E.M. Cohn Jeremy Castaing 《海军后勤学研究》2016,63(3):236-246
We consider the problem of determining the capacity to assign to each arc in a given network, subject to uncertainty in the supply and/or demand of each node. This design problem underlies many real‐world applications, such as the design of power transmission and telecommunications networks. We first consider the case where a set of supply/demand scenarios are provided, and we must determine the minimum‐cost set of arc capacities such that a feasible flow exists for each scenario. We briefly review existing theoretical approaches to solving this problem and explore implementation strategies to reduce run times. With this as a foundation, our primary focus is on a chance‐constrained version of the problem in which α% of the scenarios must be feasible under the chosen capacity, where α is a user‐defined parameter and the specific scenarios to be satisfied are not predetermined. We describe an algorithm which utilizes a separation routine for identifying violated cut‐sets which can solve the problem to optimality, and we present computational results. We also present a novel greedy algorithm, our primary contribution, which can be used to solve for a high quality heuristic solution. We present computational analysis to evaluate the performance of our proposed approaches. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 236–246, 2016 相似文献