全文获取类型
收费全文 | 759篇 |
免费 | 0篇 |
专业分类
759篇 |
出版年
2019年 | 16篇 |
2018年 | 9篇 |
2017年 | 25篇 |
2016年 | 15篇 |
2015年 | 17篇 |
2014年 | 20篇 |
2013年 | 173篇 |
2012年 | 7篇 |
2011年 | 10篇 |
2010年 | 10篇 |
2009年 | 14篇 |
2008年 | 8篇 |
2007年 | 6篇 |
2006年 | 12篇 |
2005年 | 15篇 |
2004年 | 14篇 |
2003年 | 7篇 |
2002年 | 13篇 |
2000年 | 9篇 |
1999年 | 8篇 |
1998年 | 13篇 |
1997年 | 8篇 |
1996年 | 11篇 |
1995年 | 7篇 |
1994年 | 18篇 |
1993年 | 17篇 |
1992年 | 13篇 |
1991年 | 16篇 |
1990年 | 10篇 |
1989年 | 16篇 |
1988年 | 17篇 |
1987年 | 18篇 |
1986年 | 17篇 |
1985年 | 13篇 |
1984年 | 8篇 |
1983年 | 9篇 |
1982年 | 7篇 |
1981年 | 11篇 |
1980年 | 6篇 |
1979年 | 9篇 |
1978年 | 12篇 |
1976年 | 7篇 |
1975年 | 8篇 |
1974年 | 8篇 |
1973年 | 8篇 |
1972年 | 9篇 |
1971年 | 5篇 |
1970年 | 10篇 |
1969年 | 6篇 |
1967年 | 7篇 |
排序方式: 共有759条查询结果,搜索用时 15 毫秒
291.
This paper gives a mathematical programming model for the problem of assigning frequencies to nodes in a communications network. The objective is to select a frequency assignment which minimizes both cochannel and adjacent-channel interference. In addition, a design engineer has the option to designate key links in which the avoidance of jamming due to self interference is given a higher priority. The model has a nonconvex quadratic objective function, generalized upper-bounding constraints, and binary decision variables. We developed a special heuristic algorithm and software for this model and tested it on five test problems which were modifications of a real-world problem. Even though most of the test problems had over 600 binary variables, we were able to obtain a near optimum in less than 12 seconds of CPU time on a CDC Cyber-875. 相似文献
292.
293.
Postmodern terrorism presents a significant challenge to global security and law enforcement institutions. Non-state actors operating across international borders, engaged in an apparent global insurgency of extremism that transects the traditional boundaries of crime and war, pose significant challenges to both intelligence and law enforcement agencies. These networked global insurgents blend political and religious fanaticism with criminal enterprises to challenge the rule of law and pose an epochal shift in the structures and relations among states. Negotiating this epochal shift requires traditional organs of national security (the diplomatic, military and intelligence services) to forge new partnerships with police and public safety organizations at the state and local (sub-national), as well as transnational levels. Significant operational, policy and cultural challenges must be overcome to forge an effective multi-lateral global network to counter global terrorism and insurgency. 相似文献
294.
The primary objective of this work is to introduce and perform a detailed study of a class of multistate reliability structures in which no ordering in the levels of components' performances is necessary. In particular, the present paper develops the basic theory (exact reliability formulae, reliability bounds, asymptotic results) that will make it feasible to investigate systems whose components are allowed to experience m ≥ 2 kinds of failure (failure modes), and their breakdown is described by different families of cut sets in each mode. For illustration purposes, two classical (binary) systems are extended to analogous multiple failure mode structures, and their reliability performance (bounds and asymptotic behavior) is investigated by numerical experimentation. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 167–185, 2002; DOI 10.1002/nav.10007 相似文献
295.
In this paper an inventory model with several demand classes, prioritised according to importance, is analysed. We consider a lot‐for‐lot or (S ? 1, S) inventory model with lost sales. For each demand class there is a critical stock level at and below which demand from that class is not satisfied from stock on hand. In this way stock is retained to meet demand from higher priority demand classes. A set of such critical levels determines the stocking policy. For Poisson demand and a generally distributed lead time, we derive expressions for the service levels for each demand class and the average total cost per unit time. Efficient solution methods for obtaining optimal policies, with and without service level constraints, are presented. Numerical experiments in which the solution methods are tested demonstrate that significant cost reductions can be achieved by distinguishing between demand classes. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 593–610, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10032 相似文献
296.
Optimal allocation and control of limited inspection capacity for multiple production processes are considered. The production processes, which operate independently but share inspection capacity, are subject to random failures and are partially observed through inspection. This study proposes an approach of stochastic allocation, using a Markov decision process, to minimize expected total discounted cost over an infinite time horizon. Both an optimal model and a disaggregate approximation model are introduced. The study provides some structural results and establishes that the control policy is of a threshold type. Numerical experiments demonstrate a significantly decreased amount of computational time required for the disaggregate approach when compared to the optimal solution, while generating very good control policies. © 2002 John Wiley & Sons, Inc. Naval Research Logistics, 49: 78–94, 2002; DOI 10.1002/nav.1049 相似文献
297.
298.
We introduce the notion of comparison of the criticality of two nodes in a coherent system, and devlop a monotonicity property of the reliability function under component pairwise rearrangement. We use this property to find the optimal component arrangement. Worked examples illustrate the methods proposed. 相似文献
299.
300.
Matthew J. Morgan 《Small Wars & Insurgencies》2013,24(3):97-110
The controversy over banning landmines in the past decade has removed matters of military technical expertise to the purview of civilian interest groups. According to a Huntingtonian perspective, this could be an indicator of unhealthy civil-military relations. Evidence of this includes political leaders' disregard of senior military advice and the initiation of a program to develop landmine alternatives after having already committed to banning them. The desire to ban landmines may represent a pragmatic revision of pacifist attempts to ban warfare altogether. Because of the development of self-destructing or deactivating mines, the landmine ban movement intrudes on technical military matters without redeeming humanitarian value. This intrusion may have further ramifications for civil-military relations. 相似文献