首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   71篇
  免费   0篇
  2021年   1篇
  2019年   5篇
  2018年   1篇
  2017年   3篇
  2016年   2篇
  2014年   1篇
  2013年   24篇
  2012年   1篇
  2011年   1篇
  2010年   2篇
  2008年   3篇
  2007年   1篇
  2005年   1篇
  2004年   2篇
  2003年   1篇
  2002年   1篇
  2001年   1篇
  1999年   1篇
  1997年   1篇
  1996年   1篇
  1995年   1篇
  1994年   1篇
  1993年   1篇
  1991年   1篇
  1990年   1篇
  1989年   3篇
  1988年   3篇
  1987年   2篇
  1982年   1篇
  1981年   1篇
  1971年   1篇
  1967年   1篇
排序方式: 共有71条查询结果,搜索用时 627 毫秒
11.
12.
13.
As part of a bio-inspired design process, the authors examine exoskeletal sensors found in insects and their potential application to armor and hardened buildings. In this way, the outer hardening of a structure or vehicle would not limit the ability of occupants to arrive at an actionable picture of the outer environment. To this end, various sensor modalities employed by insects are compared and contrasted with their current human-engineered equivalents. In several sensing modalities, biosensors perform better, are smaller, and more energy efficient than human-engineered equivalents. They note that biological designs tend to employ non-linear response to signal amplitude and respond with heightened sensitivity over a greater dynamic range of signals than human-engineered sensors. The insect biological sensors have structural and mechanical innovations that preserve the protective capacity of the exoskeleton.  相似文献   
14.
The DOD directs the usage of 10% of item cost as the cost of capital in the calculation of inventory holding costs. This 10% cost is not totally justified and a complete review must be accomplished to bring this factor to a meaningful and more useful value. The current logic supporting a 10% cost of capital results in a continuing perturbation which forces the Air Force to operate in a less than efficient mode when using the economic order quantity for consumable purchases.  相似文献   
15.
Having a robustly designed supply chain network is one of the most effective ways to hedge against network disruptions because contingency plans in the event of a disruption are often significantly limited. In this article, we study the facility reliability problem: how to design a reliable supply chain network in the presence of random facility disruptions with the option of hardening selected facilities. We consider a facility location problem incorporating two types of facilities, one that is unreliable and another that is reliable (which is not subject to disruption, but is more expensive). We formulate this as a mixed integer programming model and develop a Lagrangian Relaxation‐based solution algorithm. We derive structural properties of the problem and show that for some values of the disruption probability, the problem reduces to the classical uncapacitated fixed charge location problem. In addition, we show that the proposed solution algorithm is not only capable of solving large‐scale problems, but is also computationally effective. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
16.
17.
The traditional forms of Chechen society - the extended family, the clan, the religious brotherhood - have proven to be effective building blocks on which to construct network-based structures both for modern organized crime and also for fighting a guerrilla war against the Russians in Chechnya. These networks have evolved in the face of external pressure and are proving durable and successful, even as they are supplemented by separate networks of Islamic extremists, devoted both to guerrilla warfare and also a campaign of terrorism within Russia.  相似文献   
18.
19.
This article examines challenges in international nuclear safeguards pertaining to the timely detection of highly enriched uranium production at large-scale gas centrifuge enrichment plants. To establish where present gas centrifuge enrichment plant safeguards measures and approaches could be strengthened, we have created a discrete time model for simulating hypothetical misuse scenarios, both through transient phases and at steady-state. We find that timely detection of misuse at modern large-scale facilities presents a challenge for international safeguards. A toolbox of unattended measurement systems, along with remote monitoring, however, could be used to improve detection timeliness, enabling the initiation of follow-up activities, potentially on a rapid time scale. These measures, which would need very low false alarm rates, should be implemented in a graded approach, depending on the characteristics of each enrichment plant and an analysis of plausible acquisition paths for the State in which it is situated. Some of these technologies could provide significant benefit to plant operators.  相似文献   
20.
This article modifies the associations made by historians and political scientists of Spanish guerrilla warfare with revolutionary insurgency. First, it explains how the guerrilla phenomenon moved from a Leftist to a reactionary symbol. Second, it compares the insurgency and counter-insurgency features of the Carlist War (1833–1840) with those of the better-known Peninsular War (1808–1814). Third, it shows how erstwhile guerrilla leaders during the Carlist War made their expertise available to the counter-insurgency, in a socio-economic as well as military setting. This article revises the social banditry paradigm in nineteenth-century Spain in the under-researched context of Europe bloodiest nineteenth-century civil war.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号