首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   507篇
  免费   13篇
  520篇
  2021年   11篇
  2019年   24篇
  2018年   12篇
  2017年   11篇
  2016年   13篇
  2015年   13篇
  2014年   12篇
  2013年   103篇
  2011年   4篇
  2009年   5篇
  2008年   5篇
  2007年   8篇
  2006年   5篇
  2005年   9篇
  2004年   8篇
  2003年   6篇
  2002年   6篇
  2001年   4篇
  2000年   7篇
  1999年   6篇
  1998年   8篇
  1997年   15篇
  1996年   7篇
  1994年   10篇
  1992年   4篇
  1991年   13篇
  1990年   4篇
  1989年   7篇
  1988年   8篇
  1987年   14篇
  1986年   8篇
  1985年   6篇
  1984年   5篇
  1983年   8篇
  1982年   8篇
  1981年   5篇
  1980年   7篇
  1979年   11篇
  1978年   7篇
  1977年   8篇
  1976年   7篇
  1975年   7篇
  1974年   7篇
  1973年   12篇
  1972年   6篇
  1971年   6篇
  1970年   7篇
  1969年   6篇
  1968年   5篇
  1967年   5篇
排序方式: 共有520条查询结果,搜索用时 0 毫秒
271.
272.
In the aftermath of Israel's stunning victory over Egyptian, Jordanian and Syrian forces during the 1967 Six-Day War, accolades for the victory were often showered upon the Israeli Air Force (IAF). Indeed, many believed that it had been Israeli air power that had been the decisive element in the war by first eliminating the Arab air forces and then obliterating the Arab armies in turn. While the IAF did play an extremely important role in the fighting, it was not the decisive element of Israeli victory, and its impact was felt in very different ways from the common perception. Indeed, an appreciation of the true role of Israeli air power in the war reinforces both the importance of psychological factors in combat, and the ability of air forces to have a psychological impact disproportionate to their physical impact.  相似文献   
273.
Suppose X1,X2, ?,Xn is a random sample of size n from a continuous distribution function F(x) and let X1,n, ≦ X2,n ≦ ? ≦ Xn,n be the corresponding order statistics. We define the jth-order gap gi,j as gi,j = Xi+j,n ? Xi,n, 1 ≦ i < n, 1 ≦ jn ? i. In this article characterizations of the exponential distribution are given by considering the distributional properties of gk,n-k, 1 ≦ kn.  相似文献   
274.
After inconclusive elections in 2012, Lesotho had a coalition government for the first time, made up of three political parties that had a narrow majority in parliament. The new government, however, faced several challenges, some of which were of its own making. The agreement among the three parties was to literally divide the government into three parts, leading to a continuous stalemate in its operation; the most serious consequence was the prorogation of parliament and the resultant attempted coup. The flight of the prime minister to South Africa and his return under a Southern African Development Community (SADC) security detail provided a short-term solution to Lesotho's security crisis. Under Cyril Ramaphosa's mediation, the prorogued parliament was conditionally opened and the election date set for 28 February 2015. However, the security dilemma – whereby the prime minister, who is also minister of defence, has no control over the military – remains. When elections are held, there does not seem to be a guarantee that they will be held in peace; moreover, there are now fears that the losers will not accept the results of the elections because of the security vacuum in Lesotho. This article argues that peace can only be salvaged by enhanced SADC security before, during and after the elections. It argues that the SADC mission should remain beyond the elections to oversee the constitutional changes that are necessary for ensuring long-term stability. On their own, Lesotho politicians are unlikely to be able to work together in order to move the country forward.  相似文献   
275.
We propose an algorithm for generating normal random variates that is based on the acceptance–rejection method and uses a piecewise majorizing function. The piecewise function has 2048 equal‐area pieces, 2046 of which are constant, and the two extreme pieces are curves that majorize the tails. The proposed algorithm has not only good performance from correlation induction perspective, but also works well from a speed perspective. It is faster than the inversion method by Odeh and Evans and most other methods. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
276.
In this paper, we consider the economic production quantity problem in the presence of imperfect processes. In the literature, the time to shift from the in-control state to the out-of-control state is assumed to be exponentially distributed. In this study, we consider general time to shift distributions and provide distribution-based and distribution-free bounds on the optimal cost. For the exponential case, we compare the optimal solutions to approximate solutions proposed in the literature. A numerical example is used to illustrate the analysis presented and to conduct a sensitivity analysis in order to see the effect of the input parameters on the various solutions to the problem. © 1998 John Wiley & Sons, Inc. Naval Research Logistics 45: 423–433, 1998  相似文献   
277.
Myerson 3 and 4 proposed and characterized a modification of the Shapley value in the context of communication situations. In this paper we propose several characterizations of the extension of the Banzhaf value proposed by Owen 7 to communication situations. In particular we characterize this value with the properties of fairness, isolation, and pairwise merging. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006  相似文献   
278.
279.
280.
The extensive timespan of evolving assumptions about future adversaries, US military engagements, and technology inherent in the US Army's 30-year modernization strategy can overwhelm the management capacity of planners, and misdirect acquisition investments. Some military scholars have argued that long-range planning is futile due to the complexities of the global security environment. So how can the US Army manage the evolving assumptions inherent in its 30-year modernization strategy to ensure it remains a superior global force? This study will answer the above question by arguing that the US Army's 30-year modernization strategy, while emulative of a similar modernization approach in the threat-based planning environment of the Cold War, is viable if supported by a method and a tool that manage investments and planning assumptions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号