首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   559篇
  免费   17篇
  2021年   13篇
  2019年   13篇
  2018年   7篇
  2017年   12篇
  2016年   10篇
  2015年   12篇
  2014年   13篇
  2013年   96篇
  2011年   5篇
  2010年   5篇
  2008年   6篇
  2006年   7篇
  2005年   7篇
  2003年   4篇
  2002年   10篇
  2001年   9篇
  2000年   6篇
  1999年   6篇
  1998年   9篇
  1997年   13篇
  1996年   6篇
  1995年   8篇
  1994年   10篇
  1993年   15篇
  1992年   10篇
  1991年   10篇
  1989年   10篇
  1988年   23篇
  1987年   9篇
  1986年   19篇
  1985年   17篇
  1984年   13篇
  1983年   6篇
  1982年   6篇
  1981年   9篇
  1980年   10篇
  1979年   13篇
  1978年   10篇
  1977年   12篇
  1976年   4篇
  1975年   9篇
  1974年   12篇
  1973年   6篇
  1972年   8篇
  1971年   10篇
  1970年   7篇
  1969年   9篇
  1968年   4篇
  1967年   4篇
  1966年   4篇
排序方式: 共有576条查询结果,搜索用时 15 毫秒
161.
A system is subject to shocks that arrive according to a nonhomogeneous Poisson process. As shocks occur a system has two types of failures. Type 1 failure (minor failure) is removed by a minimal repair, whereas type 2 failure (catastrophic failure) is removed by replacement. The probability of a type 2 failure is permitted to depend on the number of shocks since the last replacement. A system is replaced at the times of type 2 failure or at the nth type 1 failure, whichever comes first. The optimal policy is to select n* to minimize the expected cost per unit time for an infinite time span. A numerical example is given to illustrate the method. © 1996 John Wiley & Sons, Inc.  相似文献   
162.
The verification of arms-control and disarmament agreements requires states to provide declarations, including information on sensitive military sites and assets. There are important cases, however, in which negotiations of these agreements are impeded because states are reluctant to provide any such data, because of concerns about prematurely handing over militarily significant information. To address this challenge, we present a cryptographic escrow that allows a state to make a complete declaration of sites and assets at the outset and commit to its content, but only reveal the sensitive information therein sequentially. Combined with an inspection regime, our escrow allows for step-by-step verification of the correctness and completeness of the initial declaration so that the information release and inspections keep pace with parallel diplomatic and political processes. We apply this approach to the possible denuclearization of North Korea. Such approach can be applied, however, to any agreement requiring the sharing of sensitive information.  相似文献   
163.
In this article, we consider shortest path problems in a directed graph where the transitions between nodes are subject to uncertainty. We use a minimax formulation, where the objective is to guarantee that a special destination state is reached with a minimum cost path under the worst possible instance of the uncertainty. Problems of this type arise, among others, in planning and pursuit‐evasion contexts, and in model predictive control. Our analysis makes use of the recently developed theory of abstract semicontractive dynamic programming models. We investigate questions of existence and uniqueness of solution of the optimality equation, existence of optimal paths, and the validity of various algorithms patterned after the classical methods of value and policy iteration, as well as a Dijkstra‐like algorithm for problems with nonnegative arc lengths.© 2016 Wiley Periodicals, Inc. Naval Research Logistics 66:15–37, 2019  相似文献   
164.
Military reading lists, intended to promote professional reading and in turn enhance education and develop critical thinking skills and sound judgement, recommend key texts to military personnel. This is a noble intent but the lists themselves, while generally good, are not flawless. Critiques of military reading lists often focus on what sources they are missing. This article offers its own critique but from a different perspective. It does so by analysing why some sources, which have become outdated, are based on faulty or incomplete research, have been thoroughly disproven, or some combination of the above, nevertheless linger on military reading lists. It then offers a short list of such sources, which it recommends be either removed from existing reading lists or accompanied by other sources that place the original source in appropriate historical context. Where applicable, it also recommends alternative sources that provide insights into the same subject matter. In so doing, this article is intended generate debate and to assist militaries to achieve a better balance between evaluation, induction and retention of valid knowledge on one hand, and rejection of outdated or flawed knowledge on the other.  相似文献   
165.
Firing multiple artillery rounds from the same location has two main benefits: a high rate of fire at the enemy and improved accuracy as the shooter's aim adjusts to previous rounds. However, firing repeatedly from the same location carries significant risk that the enemy will detect the artillery's location. Therefore, the shooter may periodically move locations to avoid counter‐battery fire. This maneuver is known as the shoot‐and‐scoot tactic. This article analyzes the shoot‐and‐scoot tactic for a time‐critical mission using Markov models. We compute optimal move policies and develop heuristics for more complex and realistic settings. Spending a reasonable amount of time firing multiple shots from the same location is often preferable to moving immediately after firing an initial salvo. Moving frequently reduces risk to the artillery, but also limits the artillery's ability to inflict damage on the enemy.  相似文献   
166.
Abstract

The utilization of health care services by veterans has received much attention in recent years. However, the impact of the large array of factors affecting the veterans’ demand for health care services remains understudied. These factors include individual socio-demographic and economic characteristics, the availability of various sources of health insurance, and the prevalence of medical conditions. We use public data to analyze how veterans’ utilization of health care services varies with these factors. We also analyze how the reliance on VA services varies when alternative sources of health insurance are available to veterans. Based on the estimated relationships, we use a micro-simulation model to forecast future health care utilization, both inside and outside of VA.  相似文献   
167.
The claim that reactor-grade plutonium cannot or will not be used to produce nuclear weapons has been used to justify non-nuclear-weapon states’ large stockpiles of plutonium that has been separated from highly radioactive spent fuel. However, by using reduced-mass plutonium cores, it is possible to manufacture reliable nuclear weapons with reactor-grade plutonium. These weapons can have the same design, size, weight, and predetonation probability as weapons using weapon-grade plutonium and would require no special cooling. The increased radiation from reactor-grade plutonium could be easily managed by shielding and operational procedures. Weapons using plutonium routinely produced by pressurized-water reactors could have a lethal area between 40 percent and 75 percent that of weapons using weapon-grade plutonium. In the past, both Sweden and Pakistan considered using reactor-grade plutonium to produce nuclear weapons, and India may be using reactor-grade plutonium in its arsenal today. Despite claims to the contrary, the United States used what was truly reactor-grade plutonium in a successful nuclear test in 1962. The capability of reactor-grade plutonium to produce highly destructive nuclear weapons leads to the conclusion that the separation of plutonium, plutonium stockpiling, and the use of plutonium-based fuels must be phased out and banned.  相似文献   
168.
Despite the lance’s status and the amount of attention the couched lance has received in historiography, study of its martial art has been neglected. The various lance types and techniques used by western European cavalry have only recently begun to receive scholarly attention. Additionally, Medieval European lance use has too often been studied in isolation, without an adequate understanding of the idiosyncratic and asymmetrical dynamics of mounted combat. Although the charge with the couched lance was a valid tactic, it was only one of many. Light and heavy lances were used in one hand or two to trip, block, unhorse, and wrestle. These techniques were governed by the harsh laws of distance, speed, impact, iron, and asymmetry. By utilizing the surviving Fechtbücher and several Peninsular and Near Eastern sources, a brief foray into the diverse techniques of lance use and their purposes has been attempted here.  相似文献   
169.
We consider a bivariate Pareto distribution, as a generalization of the Lindley-Singpurwalla model, by incorporating the influence of the operating conditions on a two-component dependent system. The properties of the model and its applications to reliability analysis are discussed. © 1993 John Wiley & Sons, Inc.  相似文献   
170.
In this article, we introduce the capacitated warehouse location model with risk pooling (CLMRP), which captures the interdependence between capacity issues and the inventory management at the warehouses. The CLMRP models a logistics system in which a single plant ships one type of product to a set of retailers, each with an uncertain demand. Warehouses serve as the direct intermediary between the plant and the retailers for the shipment of the product and also retain safety stock to provide appropriate service levels to the retailers. The CLMRP minimizes the sum of the fixed facility location, transportation, and inventory carrying costs. The model simultaneously determines warehouse locations, shipment sizes from the plant to the warehouses, the working inventory, and safety stock levels at the warehouses and the assignment of retailers to the warehouses. The costs at each warehouse exhibit initially economies of scale and then an exponential increase due to the capacity limitations. We show that this problem can be formulated as a nonlinear integer program in which the objective function is neither concave nor convex. A Lagrangian relaxation solution algorithm is proposed. The Lagrangian subproblem is also a nonlinear integer program. An efficient algorithm is developed for the linear relaxation of this subproblem. The Lagrangian relaxation algorithm provides near‐optimal solutions with reasonable computational requirements for large problem instances. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号