首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   493篇
  免费   14篇
  2021年   5篇
  2019年   12篇
  2018年   10篇
  2017年   12篇
  2016年   7篇
  2015年   8篇
  2014年   9篇
  2013年   115篇
  2011年   5篇
  2010年   7篇
  2009年   7篇
  2008年   10篇
  2006年   7篇
  2005年   10篇
  2004年   9篇
  2003年   6篇
  2002年   6篇
  2001年   5篇
  2000年   6篇
  1998年   7篇
  1997年   5篇
  1996年   12篇
  1995年   8篇
  1994年   6篇
  1993年   8篇
  1992年   12篇
  1991年   11篇
  1990年   7篇
  1989年   10篇
  1988年   11篇
  1987年   11篇
  1986年   9篇
  1985年   8篇
  1984年   7篇
  1983年   4篇
  1982年   4篇
  1981年   8篇
  1980年   14篇
  1979年   6篇
  1978年   6篇
  1977年   5篇
  1976年   5篇
  1975年   9篇
  1974年   4篇
  1971年   9篇
  1970年   5篇
  1969年   4篇
  1968年   5篇
  1967年   5篇
  1966年   7篇
排序方式: 共有507条查询结果,搜索用时 15 毫秒
431.
432.
We undertake inference for a stochastic form of the Lanchester combat model. In particular, given battle data, we assess the type of battle that occurred and whether or not it makes any difference to the number of casualties if an army is attacking or defending. Our approach is Bayesian and we use modern computational techniques to fit the model. We illustrate our method using data from the Ardennes campaign. We compare our results with previous analyses of these data by Bracken and Fricker. Our conclusions are somewhat different to those of Bracken. Where he suggests that a linear law is appropriate, we show that the logarithmic or linear‐logarithmic laws fit better. We note however that the basic Lanchester modeling assumptions do not hold for the Ardennes data. Using Fricker's modified data, we show that although his “super‐logarithmic” law fits best, the linear, linear‐logarithmic, and logarithmic laws cannot be ruled out. We suggest that Bayesian methods can be used to make inference for battles in progress. We point out a number of advantages: Prior information from experts or previous battles can be incorporated; predictions of future casualties are easily made; more complex models can be analysed using stochastic simulation techniques. © 2000 John Wiley & Sons, Inc. Naval Research Logistics 47: 541–558, 2000  相似文献   
433.
A general model for the failure of fibrous composite materials is described. It is shown to contain some of the well-known models in the literature. The composite material is viewed as a coherent system of independent identically distributed component strengths. Under the assumption that the applied load is redistributed “homotonically” to the unfailed components upon the failure of a component (an individual fiber segment) and that the distributions of component strengths are IFRA, it is shown that the system (composite) strength distribution is also IFRA. Examples are given using carbon reinforced composite data to illustrate the IFRA property.  相似文献   
434.
This article further considers the two‐person continuous ambush game introduced by Ruckle. This article extends the work of Ruckle, Baston and Bostock, and Lee by considering the game for a general number of barriers. By supplanting optimal strategies from a discretized version of the game, we show that there always exists a value for the game, which, furthermore, can be found using linear programming techniques. Further to this, we show that the discrete ambush game considered by Garnaev has the same value as a continuous game, allowing many new results to be obtained in both games. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 515–529, 2003  相似文献   
435.
436.
How have European cross-border defence industrial mergers and acquisitions affected domestic procurement bias among the major EU powers? This article departs from the findings of Andrew Moravcsik more than two decades ago suggesting that major West European states had no ingrained preferences for defence industrial autarchy. When cross-national armament projects were derailed, this could be attributed to political efforts of national defence industrial champions favouring purely domestic projects. As former national champions join pan-European defence groups, their preferences are likely modified. Does this shift procurement towards non-European “off-the-shelf” solutions which, according to Moravcsik, are favoured by defence departments? Or does it give impetus to a stronger preference for European as opposed to domestic systems? In this article, procurement patterns in the aftermath of cross-border defence industry consolidation will be analysed. Procurement bias is assessed in two industry segments characterised by pervasive consolidation.  相似文献   
437.
The success of any humanitarian aid mission is generally measured by the timeliness of critical supplies that are delivered to the affected area. However, a more interesting analysis may be to determine the effect of the aid on the overall satisfaction of the local population. The authors' research focused on the delivery of humanitarian aid to a notional region that was decimated by flooding with ships, landing craft and security personnel provided by the US Navy and Marines. While the research effort addressed naval force structure, the focus of the research was: (1) to assess different delivery methods for the aid; and (2) to determine how the aid delivery impacted the overall satisfaction of the local population. To examine both concerns, two simulation models were developed, with one examining the throughput of aid delivered during the operation, and the other the satisfaction of the population based on the humanitarian aid effort.  相似文献   
438.
Recently, post-explosion nuclear forensics, or nuclear attribution, has gained a new spotlight within the nuclear weapons scientific and policymaking community. Academics are beginning to ask whether post-explosion forensics might create a replacement for an international nonproliferation regime, or at least offer a fallback option to deter states and individuals from selling nuclear materials. This paper examines current attribution technology from unclassified literature and finds the technology to be well developed but not foolproof, such that nuclear attribution currently provides little deterrent value. If current capabilities were publicized more thoroughly and if the post-explosion process of assessing the evidence were internationalized, states and intermediate actors might be deterred more effectively. Developing a nuclear fingerprint database is also discussed. While useful, its impact on deterrence would be minimal.  相似文献   
439.
440.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号