首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   58篇
  免费   9篇
  2021年   3篇
  2019年   1篇
  2018年   2篇
  2016年   1篇
  2015年   3篇
  2014年   3篇
  2013年   2篇
  2012年   1篇
  2011年   1篇
  2009年   4篇
  2008年   3篇
  2006年   1篇
  2005年   1篇
  2004年   5篇
  2003年   3篇
  2002年   1篇
  2001年   2篇
  2000年   1篇
  1999年   1篇
  1998年   2篇
  1997年   4篇
  1996年   1篇
  1995年   1篇
  1994年   1篇
  1993年   2篇
  1991年   2篇
  1990年   1篇
  1989年   2篇
  1988年   1篇
  1987年   1篇
  1986年   1篇
  1984年   1篇
  1983年   1篇
  1981年   1篇
  1978年   1篇
  1976年   1篇
  1975年   1篇
  1971年   1篇
  1970年   1篇
  1969年   1篇
排序方式: 共有67条查询结果,搜索用时 15 毫秒
11.
We study new decision and optimization problems of finding a simple path between two given vertices in an arc weighted directed multigraph such that the path length is equal to a given number or it does not fall into the given forbidden intervals (gaps). A fairly complete computational complexity classification is provided and exact and approximation algorithms are suggested.  相似文献   
12.
介绍了一种用零记忆非线性变换(ZMNL)模拟具高斯谱特性的相参相关Weibull分布地杂波的方法,详细阐述了Weibull分布杂波随机序列产生的流程.仿真结果表明,该法形成的地杂波信号与理论值吻合较好,适合雷达引信的实际应用.  相似文献   
13.
较为详细地推导了鱼雷转角射击公式,根据分鱼雷转向的不同总结出两类求解公式(各种态好都能用两类公式之一来解算).最后还讨论了所导出的非线性方程的数值解算方法,该算法具有工程应用价值。  相似文献   
14.
In this article we study the estimation of the average excess life θ in a two-parameter exponential distribution with a known linear relationship between α (the minimum life) and θ of the form α = aθ, where a is known and positive. A comparison of the efficiencies of estimators which are linear combinations of the smallest sample value and the sample sum of deviations from the smallest sample value and the maximum likelihood estimators is made for various sample sizes and different values of a. It is shown that these estimators are dominated in the risk by the minimum-risk scale equivariant estimator based on sufficient statistics. A class of Bayes estimators for inverted gamma priors is constructed and shown to include a minimum-risk scale equivariant estimator in it. All the members of this class can be computed easily.  相似文献   
15.
In this paper we consider n jobs and a number of machines in parallel. The machines are identical and subject to breakdown and repair. The number may therefore vary over time and is at time t equal to m(t). Preemptions are allowed. We consider three objectives, namely, the total completion time, ∑ Cj, the makespan Cmax, and the maximum lateness Lmax. We study the conditions on m(t) under which various rules minimize the objective functions under consideration. We analyze cases when the jobs have deadlines to meet and when the jobs are subject to precedence constraints. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2004.  相似文献   
16.
We study a deterministic two‐machine flowshop scheduling problem with an assumption that one of the two machines is not available in a specified time period. This period can be due to a breakdown, preventive maintenance, or processing unfinished jobs from a previous planning horizon. The problem is known to be NP‐hard. Pseudopolynomial dynamic programming algorithms and heuristics with worst case error bounds are given in the literature to solve the problem. They are different for the cases when the unavailability interval is for the first or second machine. The existence of a fully polynomial time approximation scheme (FPTAS) was formulated as an open conjecture in the literature. In this paper, we show that the two cases of the problem under study are equivalent to similar partition type problems. Then we derive a generic FPTAS for the latter problems with O(n54) time complexity. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2004.  相似文献   
17.
We study a generalization of the weighted set covering problem where every element needs to be covered multiple times. When no set contains more than two elements, we can solve the problem in polynomial time by solving a corresponding weighted perfect b‐matching problem. In general, we may use a polynomial‐time greedy heuristic similar to the one for the classical weighted set covering problem studied by D.S. Johnson [Approximation algorithms for combinatorial problems, J Comput Syst Sci 9 (1974), 256–278], L. Lovasz [On the ratio of optimal integral and fractional covers, Discrete Math 13 (1975), 383–390], and V. Chvatal [A greedy heuristic for the set‐covering problem, Math Oper Res 4(3) (1979), 233–235] to get an approximate solution for the problem. We find a worst‐case bound for the heuristic similar to that for the classical problem. In addition, we introduce a general type of probability distribution for the population of the problem instances and prove that the greedy heuristic is asymptotically optimal for instances drawn from such a distribution. We also conduct computational studies to compare solutions resulting from running the heuristic and from running the commercial integer programming solver CPLEX on problem instances drawn from a more specific type of distribution. The results clearly exemplify benefits of using the greedy heuristic when problem instances are large. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2005  相似文献   
18.
We consider optimal test plans involving life distributions with failure‐free life, i.e., where there is an unknown threshold parameter below which no failure will occur. These distributions do not satisfy the regularity conditions and thus the usual approach of using the Fisher information matrix to obtain an optimal accelerated life testing (ALT) plan cannot be applied. In this paper, we assume that lifetime follows a two‐parameter exponential distribution and the stress‐life relationship is given by the inverse power law model. Near‐optimal test plans for constant‐stress ALT under both failure‐censoring and time‐censoring are obtained. We first obtain unbiased estimates for the parameters and give the approximate variance of these estimates for both failure‐censored and time‐censored data. Using these results, the variance for the approximate unbiased estimate of a percentile at a design stress is computed and then minimized to produce the near‐optimal plan. Finally, a numerical example is presented together with simulation results to study the accuracy of the approximate variance given by the proposed plan and show that it outperforms the equal‐allocation plan. © 1999 John Wiley & Sons, Inc. Naval Research Logistics 46: 169–186, 1999  相似文献   
19.
Starting from a safe base, an Infiltrator tries to reach a sensitive zone within a given time limit without being detected by a Guard. The Infiltrator can move with speed at most u, while the Guard can only perform a restricted number of searches. A discrete variant of this zero-sum game played on a graph consisting of two vertices joined by n nonintersecting arcs is investigated. Optimal strategies and an explicit expression for its value are obtained. © 1996 John Wiley & Sons, Inc.  相似文献   
20.
研究Boura等和Derbez分别提出的不可能差分分析时间复杂度计算公式,根据实际攻击过程优化密钥排除的步骤,给出不可能差分分析实际攻击的时间复杂度计算的改进公式,进而利用两个分组密码算法模型将改进后公式计算的实际结果分别与Boura等的公式和Derbez的公式的计算结果进行对比,结果表明Boura等的公式计算结果既可能高于优化公式的实际分析计算的结果,也可能低于优化公式的实际分析计算的结果,而在轮子密钥独立时改进后公式的实际计算结果是Derbez公式的计算结果的2-1.2倍。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号