首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   759篇
  免费   0篇
  759篇
  2019年   16篇
  2018年   9篇
  2017年   25篇
  2016年   15篇
  2015年   17篇
  2014年   20篇
  2013年   173篇
  2012年   7篇
  2011年   10篇
  2010年   10篇
  2009年   14篇
  2008年   8篇
  2007年   6篇
  2006年   12篇
  2005年   15篇
  2004年   14篇
  2003年   7篇
  2002年   13篇
  2000年   9篇
  1999年   8篇
  1998年   13篇
  1997年   8篇
  1996年   11篇
  1995年   7篇
  1994年   18篇
  1993年   17篇
  1992年   13篇
  1991年   16篇
  1990年   10篇
  1989年   16篇
  1988年   17篇
  1987年   18篇
  1986年   17篇
  1985年   13篇
  1984年   8篇
  1983年   9篇
  1982年   7篇
  1981年   11篇
  1980年   6篇
  1979年   9篇
  1978年   12篇
  1976年   7篇
  1975年   8篇
  1974年   8篇
  1973年   8篇
  1972年   9篇
  1971年   5篇
  1970年   10篇
  1969年   6篇
  1967年   7篇
排序方式: 共有759条查询结果,搜索用时 15 毫秒
291.
This paper gives a mathematical programming model for the problem of assigning frequencies to nodes in a communications network. The objective is to select a frequency assignment which minimizes both cochannel and adjacent-channel interference. In addition, a design engineer has the option to designate key links in which the avoidance of jamming due to self interference is given a higher priority. The model has a nonconvex quadratic objective function, generalized upper-bounding constraints, and binary decision variables. We developed a special heuristic algorithm and software for this model and tested it on five test problems which were modifications of a real-world problem. Even though most of the test problems had over 600 binary variables, we were able to obtain a near optimum in less than 12 seconds of CPU time on a CDC Cyber-875.  相似文献   
292.
293.
Postmodern terrorism presents a significant challenge to global security and law enforcement institutions. Non-state actors operating across international borders, engaged in an apparent global insurgency of extremism that transects the traditional boundaries of crime and war, pose significant challenges to both intelligence and law enforcement agencies. These networked global insurgents blend political and religious fanaticism with criminal enterprises to challenge the rule of law and pose an epochal shift in the structures and relations among states. Negotiating this epochal shift requires traditional organs of national security (the diplomatic, military and intelligence services) to forge new partnerships with police and public safety organizations at the state and local (sub-national), as well as transnational levels. Significant operational, policy and cultural challenges must be overcome to forge an effective multi-lateral global network to counter global terrorism and insurgency.  相似文献   
294.
The primary objective of this work is to introduce and perform a detailed study of a class of multistate reliability structures in which no ordering in the levels of components' performances is necessary. In particular, the present paper develops the basic theory (exact reliability formulae, reliability bounds, asymptotic results) that will make it feasible to investigate systems whose components are allowed to experience m ≥ 2 kinds of failure (failure modes), and their breakdown is described by different families of cut sets in each mode. For illustration purposes, two classical (binary) systems are extended to analogous multiple failure mode structures, and their reliability performance (bounds and asymptotic behavior) is investigated by numerical experimentation. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 167–185, 2002; DOI 10.1002/nav.10007  相似文献   
295.
In this paper an inventory model with several demand classes, prioritised according to importance, is analysed. We consider a lot‐for‐lot or (S ? 1, S) inventory model with lost sales. For each demand class there is a critical stock level at and below which demand from that class is not satisfied from stock on hand. In this way stock is retained to meet demand from higher priority demand classes. A set of such critical levels determines the stocking policy. For Poisson demand and a generally distributed lead time, we derive expressions for the service levels for each demand class and the average total cost per unit time. Efficient solution methods for obtaining optimal policies, with and without service level constraints, are presented. Numerical experiments in which the solution methods are tested demonstrate that significant cost reductions can be achieved by distinguishing between demand classes. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 593–610, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10032  相似文献   
296.
Optimal allocation and control of limited inspection capacity for multiple production processes are considered. The production processes, which operate independently but share inspection capacity, are subject to random failures and are partially observed through inspection. This study proposes an approach of stochastic allocation, using a Markov decision process, to minimize expected total discounted cost over an infinite time horizon. Both an optimal model and a disaggregate approximation model are introduced. The study provides some structural results and establishes that the control policy is of a threshold type. Numerical experiments demonstrate a significantly decreased amount of computational time required for the disaggregate approach when compared to the optimal solution, while generating very good control policies. © 2002 John Wiley & Sons, Inc. Naval Research Logistics, 49: 78–94, 2002; DOI 10.1002/nav.1049  相似文献   
297.
298.
We introduce the notion of comparison of the criticality of two nodes in a coherent system, and devlop a monotonicity property of the reliability function under component pairwise rearrangement. We use this property to find the optimal component arrangement. Worked examples illustrate the methods proposed.  相似文献   
299.
300.
The controversy over banning landmines in the past decade has removed matters of military technical expertise to the purview of civilian interest groups. According to a Huntingtonian perspective, this could be an indicator of unhealthy civil-military relations. Evidence of this includes political leaders' disregard of senior military advice and the initiation of a program to develop landmine alternatives after having already committed to banning them. The desire to ban landmines may represent a pragmatic revision of pacifist attempts to ban warfare altogether. Because of the development of self-destructing or deactivating mines, the landmine ban movement intrudes on technical military matters without redeeming humanitarian value. This intrusion may have further ramifications for civil-military relations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号