首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   183篇
  免费   8篇
  2019年   6篇
  2018年   9篇
  2017年   4篇
  2016年   4篇
  2015年   6篇
  2014年   5篇
  2013年   37篇
  2012年   3篇
  2011年   3篇
  2010年   1篇
  2009年   4篇
  2005年   1篇
  2004年   2篇
  2003年   6篇
  2002年   2篇
  2001年   2篇
  2000年   4篇
  1999年   1篇
  1998年   1篇
  1997年   3篇
  1996年   1篇
  1995年   2篇
  1994年   2篇
  1993年   4篇
  1992年   2篇
  1991年   3篇
  1990年   4篇
  1989年   4篇
  1988年   7篇
  1987年   4篇
  1986年   5篇
  1985年   2篇
  1984年   2篇
  1983年   3篇
  1981年   1篇
  1980年   2篇
  1979年   3篇
  1978年   1篇
  1977年   1篇
  1976年   3篇
  1975年   2篇
  1974年   6篇
  1973年   2篇
  1972年   4篇
  1971年   4篇
  1970年   3篇
  1969年   4篇
  1968年   3篇
  1966年   1篇
  1948年   1篇
排序方式: 共有191条查询结果,搜索用时 390 毫秒
171.
This article discusses the impact of Complex Humanitarian Emergencies on the delivery of humanitarian aids. Complex emergencies were the results of long-term political and social disputes. Its impact brings about public health crises like epidemics, malnutrition, and even widespread desperation. In fact, there are four aspects of these crises which complicate public health programs: 1) emergencies are long and recurring; 2) access to the most vulnerable population is often restricted; 3) restructuring health systems in complex emergencies can be futile; and 4) complex emergencies often result in mass forced migration. What makes matters worse is the breakdown of health networks which collapse early in complex emergencies, leading to extensive losses of human health resources. Not only that, health facilities and transportation, infrastructure are often decimated in complex emergencies, and regional hospitals, district health posts, laboratories, and primary care outposts are similarly abandoned or destroyed. Moreover, because it is difficult to predict the course of these emergencies, ascertaining the optimal time to intervene and to invest in materials and facilities that could be lost to renewed fighting can be impossible. To solve this problem requires a coordinated effort. It should also focus on resources, early warning systems, preparedness measures, ongoing career training of relief workers, and prepositioning of relief supplies.  相似文献   
172.
One way of achieving the increased levels of system reliability and availability demanded by critical computer-based control systems is through the use of fault-tolerant distributed computer systems. This article addresses the problem of allocating a set of m tasks among a set of n processors in a manner that will satisfy various task assignment, system capacity, and task scheduling constraints while balancing the workload across processors. We discuss problem background, problem formulation, and a known heuristic procedure for the problem. A new solution-improving heuristic procedure is introduced, and computational experience with the heuristics is presented. With only a modest increase in the amount of computational effort, the new procedure is demonstrated to improve dramatically solution quality as well as obtain near-optimal solutions to the test problems.  相似文献   
173.
Under fairly general conditions, a nonlinear fractional program, where the function to be maximized has the form f(x)/g(x), is shown to be equivalent to a nonlinear program not involving fractions. The latter program is not generally a convex program, but there is often a convex program equivalent to it, to which the known algorithms for convex programming may be applied. An application to duality of a fractional program is discussed.  相似文献   
174.
175.
This paper presents a method of selecting design parameters which optimizes a specific measure (aircraft design example: minimum weight, maximum mission effectiveness) and guarantees designated levels of response in specified areas (such as combal ceiling, acceleration time). The method employs direct search optimization applied to a nonlinear functional constrained by nonlinear surfaces. The composite design technique is combined with regression methods to determine adequate surface representations with a minimum of required data points. A sensitivity analysis is conducted at the optimum set of design parameters to test for uniqueness.  相似文献   
176.
This paper presents a procedure akin to dynamic programming for designing optimal acceptance sampling plans for item-by-item inspection. Using a Bayesian procedure, a prior distribution is specified, and a suitable cost model is employed depicting the cost of sampling, accepting or rejecting the lot. An algorithm is supplied which is digital computer oriented.  相似文献   
177.
In peacetime, base stock levels of spares are determined on the assumption of normal resupply from the depot. In the event of war, however, a unit must be prepared to operate from stock on hand for a period of time without being resupplied from the depot. This paper describes a mathematical model for determining such war reserve spares (WRS) requirements. Specifically, the model solves the following kind of optimization problem: find the least-cost WRS kits that will keep the probability of a stockout after K cannibalizations less than or equal to some target objective α. The user of the model specifies the number of allowable cannibalizations, and the level of protection that the kit is supposed to provide. One interesting feature of this model is that in the probability computation it takes into account the possiblility of utilizing normal base operating assets. Results of a sensitivity analysis indicate that if peacetime levels were explicitly taken into account when designing a WRS kit, a cost saving of nearly 40 percent could be effected without degrading base supply performance in wartime.  相似文献   
178.
The discounted return associated with a finite state Markov chain X1, X2… is given by g(X1)+ αg(X2) + α2g(X3) + …, where g(x) represents the immediate return from state x. Knowing the transition matrix of the chain, it is desired to compute the expected discounted return (present worth) given the initial state. This type of problem arises in inventory theory, dynamic programming, and elsewhere. Usually the solution is approximated by solving the system of linear equations characterizing the expected return. These equations can be solved by a variety of well-known methods. This paper describes yet another method, which is a slight modification of the classical iterative scheme. The method gives sequences of upper and lower bounds which converge mono-tonely to the solution. Hence, the method is relatively free of error control problems. Computational experiments were conducted which suggest that for problems with a large number of states, the method is quite efficient. The amount of computation required to obtain the solution increases much slower with an increase in the number of states, N, than with the conventional methods. In fact, computational time is more nearly proportional to N2, than to N3.  相似文献   
179.
Rosen's method of Gradient Projection chooses a search direction which is not necessarily the direction of steepest ascent. However, the projection of the gradient onto a “suitably chosen subspace” does yield the direction of steepest ascent. The suitable choice is easily recognized as a result of some theorems relating gradient projection to steepest ascent. These results lead to a modification of Rosen's method. The modification improves the choice of search direction and usually yields the steepest ascent direction without solving a quadratic programming problem.  相似文献   
180.
We present techniques for classifying Markov chains with a continuous state space as either ergodic or recurrent. These methods are analogous to those of Foster for countable space chains. The theory is presented in the first half of the paper, while the second half consists of examples illustrating these techniques. The technique for proving ergodicity involves, in practice, three steps: showing that the chain is irreducible in a suitable sense; verifying that the mean hitting times on certain (usually bounded) sets are bounded, by using a “mean drift” criterion analogous to that of Foster; and finally, checking that the chain is such that bounded mean hitting times for these sets does actually imply ergodicity. The examples comprise a number of known and new results: using our techniques we investigate random walks, queues with waiting-time-dependent service times, dams with general and random-release rules, the s-S inventory model, and feedback models.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号