首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   442篇
  免费   9篇
  2021年   11篇
  2019年   11篇
  2017年   11篇
  2016年   8篇
  2015年   11篇
  2014年   9篇
  2013年   94篇
  2010年   3篇
  2008年   5篇
  2007年   5篇
  2006年   4篇
  2005年   5篇
  2004年   3篇
  2003年   3篇
  2002年   6篇
  2001年   7篇
  2000年   4篇
  1999年   5篇
  1998年   8篇
  1997年   9篇
  1996年   6篇
  1995年   7篇
  1994年   9篇
  1993年   8篇
  1992年   7篇
  1991年   10篇
  1990年   3篇
  1989年   10篇
  1988年   17篇
  1987年   8篇
  1986年   15篇
  1985年   9篇
  1984年   6篇
  1983年   5篇
  1982年   5篇
  1981年   9篇
  1980年   5篇
  1979年   11篇
  1978年   7篇
  1977年   7篇
  1975年   9篇
  1974年   7篇
  1973年   5篇
  1972年   7篇
  1971年   5篇
  1970年   5篇
  1969年   6篇
  1968年   3篇
  1967年   3篇
  1966年   3篇
排序方式: 共有451条查询结果,搜索用时 15 毫秒
131.
Competitive imperatives are causing manufacturing firms to consider multiple criteria when designing products. However, current methods to deal with multiple criteria in product design are ad hoc in nature. In this paper we present a systematic procedure to efficiently solve bicriteria product design optimization problems. We first present a modeling framework, the AND/OR tree, which permits a simplified representation of product design optimization problems. We then show how product design optimization problems on AND/OR trees can be framed as network design problems on a special graph—a directed series‐parallel graph. We develop an enumerative solution algorithm for the bicriteria problem that requires as a subroutine the solution of the parametric shortest path problem. Although this parametric problem is hard on general graphs, we show that it is polynomially solvable on the series‐parallel graph. As a result we develop an efficient solution algorithm for the product design optimization problem that does not require the use of complex and expensive linear/integer programming solvers. As a byproduct of the solution algorithm, sensitivity analysis for product design optimization is also efficiently performed under this framework. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 574–592, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10031  相似文献   
132.
133.
It is known that the proportionate flow shop minimum makespan F m / p r p t / C max problem is solved optimally by any permutation job sequence. We show that the F m / p r p t / C max problem is at least ordinary NP‐hard when missing operations are allowed and present some solvable cases. We then consider the standard proportionate flow shop problem (with no missing operations) and show that the solution algorithms for a class of single‐machine due date assignment problems can be extended/generalized to the corresponding proportionate flow shop problems. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 98–106, 2015  相似文献   
134.
This article examines challenges in international nuclear safeguards pertaining to the timely detection of highly enriched uranium production at large-scale gas centrifuge enrichment plants. To establish where present gas centrifuge enrichment plant safeguards measures and approaches could be strengthened, we have created a discrete time model for simulating hypothetical misuse scenarios, both through transient phases and at steady-state. We find that timely detection of misuse at modern large-scale facilities presents a challenge for international safeguards. A toolbox of unattended measurement systems, along with remote monitoring, however, could be used to improve detection timeliness, enabling the initiation of follow-up activities, potentially on a rapid time scale. These measures, which would need very low false alarm rates, should be implemented in a graded approach, depending on the characteristics of each enrichment plant and an analysis of plausible acquisition paths for the State in which it is situated. Some of these technologies could provide significant benefit to plant operators.  相似文献   
135.
This article modifies the associations made by historians and political scientists of Spanish guerrilla warfare with revolutionary insurgency. First, it explains how the guerrilla phenomenon moved from a Leftist to a reactionary symbol. Second, it compares the insurgency and counter-insurgency features of the Carlist War (1833–1840) with those of the better-known Peninsular War (1808–1814). Third, it shows how erstwhile guerrilla leaders during the Carlist War made their expertise available to the counter-insurgency, in a socio-economic as well as military setting. This article revises the social banditry paradigm in nineteenth-century Spain in the under-researched context of Europe bloodiest nineteenth-century civil war.  相似文献   
136.
Abstract

This article surveys China’s current naval forces and considers key dynamics and possible Chinese naval futures to 2020, the projected end of Beijing’s ‘strategic window of opportunity’, the idea that a peaceful external environment for economic development, globalization, and integration of China into the global economy allows China to benefit from diversion of US attention to countering terrorism. It considers broad possibilities through 2030, the general limit of public US government projections, and by which time multiple factors will likely slow China’s growth and compete for leadership focus and resources.  相似文献   
137.
Famous cultural monuments are often regarded as unique icons, making them an attractive target for terrorists. Despite huge military and police outlays, terrorist attacks on important monuments can hardly be avoided. We argue that an effective strategy to discourage terrorist attacks on iconic monuments is for a government to show a firm commitment to swift reconstruction. Using a simple game‐theoretic model, we demonstrate how a credible claim to rebuild any destroyed cultural monument discourages terrorist attacks by altering the terrorists' expectations and by increasing the government's reputation costs if they fail to rebuild.  相似文献   
138.
This paper aims at forecasting the burden on the Greek economy resulting from the arms race against Turkey and at concentrating on the leading determinants of this burden. The military debt and the defence share of GDP are employed alternatively in order to approximate the measurement of the arms race pressure on Greece, and the method used is that of artificial neural networks. The use of a wide variety of explanatory variables in combination with the promising results derived, suggest that the impact on the Greek economy resulting from this arms race is determined, to a large, extent, by demographic factors which strongly favour the Turkish side. Prediction on both miltary debt and defence expenditure exhibited highly satisfactory accuracy, while the estimation of input significance, indicates that variables describing the Turkish side are often dominant over the corresponding Greek ones.  相似文献   
139.
This paper investigates the potential for modeling and simulation to contribute to new defense system development, by increasing the productivity of traditional R&D in developing system‐specific technology. Building on a previous optimal control model of defense system R&D, it shows that (1) the optimal use of modeling is related in a natural way to that of traditional R&D, and (2) both have similar optimal profiles over time. Simulated results based on limited historical data suggest that optimal use of modeling could increase the rate of growth in system‐specific technology significantly.  相似文献   
140.
Why should deployment affect re‐enlistment? In our model, members enter the military with naïve beliefs about deployment and use actual deployment experience to update their beliefs and revise their expected utility of re‐enlisting. Empirically, re‐enlistment is related to the type and number of deployments, consistent with the learning model. Non‐hostile deployment increases first‐term re‐enlistment but hostile deployment has little effect except for the Army, where the effect is positive. Both types increase second‐term re‐enlistment. Interestingly, first‐term members with dependants tend to respond to deployment like second‐term members. In addition, deployment acts directly to affect re‐enlistment, not indirectly through time to promotion.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号