首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   215篇
  免费   8篇
  2021年   4篇
  2020年   2篇
  2019年   6篇
  2018年   5篇
  2017年   5篇
  2016年   4篇
  2014年   5篇
  2013年   30篇
  2011年   2篇
  2010年   3篇
  2009年   4篇
  2008年   3篇
  2006年   3篇
  2005年   3篇
  2004年   3篇
  2003年   2篇
  2002年   6篇
  2001年   4篇
  2000年   3篇
  1999年   2篇
  1998年   2篇
  1997年   5篇
  1996年   2篇
  1995年   2篇
  1994年   3篇
  1993年   8篇
  1992年   3篇
  1991年   4篇
  1989年   3篇
  1988年   10篇
  1987年   3篇
  1986年   6篇
  1985年   9篇
  1984年   8篇
  1983年   2篇
  1982年   2篇
  1980年   5篇
  1979年   4篇
  1978年   4篇
  1977年   6篇
  1976年   2篇
  1974年   6篇
  1973年   1篇
  1972年   2篇
  1971年   7篇
  1970年   3篇
  1969年   4篇
  1968年   1篇
  1967年   2篇
  1966年   1篇
排序方式: 共有223条查询结果,搜索用时 62 毫秒
131.
This article examines the implications of the proliferation of cyberwarfare capabilities for the character and frequency of war. Consideration of strategic logic, perceptions, and bargaining dynamics finds that the size of the effect of the proliferation of cyberwarfare capabilities on the frequency of war will probably be relatively small. This effect will not be constant across all situations; in some cases the advent of cyberwarfare capabilities may decrease the likelihood of war. On the other hand, the use of computer network attack as a brute force weapon will probably become increasingly frequent.  相似文献   
132.
This article analyzes the main factors that contributed to the failure of the US intelligence community to alert against Soviet intentions and the intervention in the Egyptian–Israeli War of Attrition in 1969–70. Based on fresh archival sources, this research describes the US intelligence conception concerning the USSR; explains the crystallization of the intelligence estimate on the probability of Soviet intervention in 1970; deals with the intelligence data that were acquired but eventually ignored; and concludes with several plausible explanations for the intelligence blunder.  相似文献   
133.
In 1999 India and Pakistan engaged in a limited war in the Himalayan peaks of Kashmir. Pakistani irregulars occupied territory in the Indian-held district of Kargil. A campaign that lasted 74 days and cost each side more than 1,000 casualties concluded with India in control of the commanding heights around Kargil. The conflict exposed flaws in the Indian armed forces as well as enduring truths of combat in the high mountains. Political constraints combined with the unforgiving environment and a determined enemy to diminish India's military advantage. Transition from counterinsurgency to high-intensity combat in the Himalayas proved to be a daunting task. Early failure was only overcome through innovation and adaptation to the environment. Specialised forces, unconventional techniques and the focused application of overwhelming firepower ultimately secured victory.  相似文献   
134.
This article attempts to understand the manner in which the notion of good governance has been applied in the United Republic of Tanzania. In 1989, the World Bank issued a document which argued that Africa's development problems were in essence a crisis of governance. This became the basis for the imposition of conditionalities in order to establish liberal democratic governments. More than a decade later, good governance still dominates the donor agenda, which is reminiscent of the heyday of colonialism and the civilising mission that thrust Africa into the orbit of the European world, albeit as a ‘dark continent’. Although Tanzania has escaped the more overt political turmoil that plagued neighbouring countries, the country appears to be open to inter-ethnic rivalry due largely to Zanzibar, the site of the greatest opposition to the ruling party, in power since independence. The challenge is to deal with the dysfunctional economy and to meet the growing demands of its population for adequate social services. The ideal of self-reliance espoused by Nyerere is no longer a choice but a necessity.  相似文献   
135.
This study examines the failures of the William J. Clinton and Barack Obama administrations to secure ratification of the Comprehensive Nuclear-Test-Ban Treaty (CTBT). It applies an integrated analytical framework for assessing treaty ratification that builds upon previous research in order to understand why the Clinton administration failed to achieve CTBT ratification in 1999 and why the Obama administration has so far failed to advance the treaty in the Senate. The study concludes that CTBT ratification, despite Obama administration pledges of support, remains highly unlikely. Finally, the study analyzes the common domestic political factors present in both cases and suggests areas for further research.  相似文献   
136.
We study a stochastic interdiction model of Morton et al. IIE Transactions, 39 (2007):3–14 that locates radiation sensors at border crossings to detect and prevent the smuggling of nuclear material. In this model, an interdictor places sensors at customs checkpoints to minimize a potential smuggler's maximum probability of crossing a border undetected. We focus on a model variant in which the interdictor has different, and likely more accurate, perceptions of the system's parameters than the smuggler does. We introduce a model that is tighter and uses fewer constraints than that of Morton et al. We also develop a class of valid inequalities along with a corresponding separation procedure that can be used within a cutting‐plane approach to reduce computational effort. Computational results demonstrate the effectiveness of our approach.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 91–100, 2014  相似文献   
137.
Job shop scheduling with a bank of machines in parallel is important from both theoretical and practical points of view. Herein we focus on the scheduling problem of minimizing the makespan in a flexible two-center job shop. The first center consists of one machine and the second has k parallel machines. An easy-to-perform approximate algorithm for minimizing the makespan with one-unit-time operations in the first center and k-unit-time operations in the second center is proposed. The algorithm has the absolute worst-case error bound of k − 1 , and thus for k = 1 it is optimal. Importantly, it runs in linear time and its error bound is independent of the number of jobs to be processed. Moreover, the algorithm can be modified to give an optimal schedule for k = 2 .  相似文献   
138.
Motivated by wind energy applications, we consider the problem of optimally replacing a stochastically degrading component that resides and operates in a partially observable environment. The component's rate of degradation is modulated by the stochastic environment process, and the component fails when it is accumulated degradation first reaches a fixed threshold. Assuming periodic inspection of the component, the objective is to minimize the long‐run average cost per unit time of performing preventive and reactive replacements for two distinct cases. The first case examines instantaneous replacements and fixed costs, while the second considers time‐consuming replacements and revenue losses accrued during periods of unavailability. Formulated and solved are mixed state space, partially observable Markov decision process models, both of which reveal the optimality of environment‐dependent threshold policies with respect to the component's cumulative degradation level. Additionally, it is shown that for each degradation value, a threshold policy with respect to the environment belief state is optimal if the environment alternates between two states. The threshold policies are illustrated by way of numerical examples using both synthetic and real wind turbine data. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 395–415, 2015  相似文献   
139.
This paper describes modeling and operational analysis of a generic asymmetric service‐system situation in which (a) Red agents, potentially threatening, but in another but important interpretation, are isolated friendlies, such as downed pilots, that require assistance and “arrive” according to some partially known and potentially changing pattern in time and space; and (b) Reds have effectively limited unknown deadlines or times of availability for Blue service, i.e., detection, classification, and attack in a military setting or emergency assistance in others. We discuss various service options by Blue service agents and devise several approximations allowing one to compute efficiently those proportions of tasks of different classes that are successfully served or, more generally, if different rewards are associated with different classes of tasks, the percentage of the possible reward gained. We suggest heuristic policies for a Blue server to select the next task to perform and to decide how much time to allocate to that service. We discuss this for a number of specific examples. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006.  相似文献   
140.
Particulate composites are one of the widely used materials in producing numerous state-of-the-art components in biomedical, automobile, aerospace including defence technology. Variety of modelling techniques have been adopted in the past to model mechanical behaviour of particulate composites. Due to their favourable properties, particle-based methods provide a convenient platform to model failure or fracture of these composites. Smooth particle hydrodynamics (SPH) is one of such methods which demonstrate excellent potential for modelling failure or fracture of particulate composites in a Lagrangian setting. One of the major challenges in using SPH method for modelling composite materials depends on accurate and efficient way to treat interface and boundary conditions. In this paper, a master-slave method based multi-freedom constraints is proposed to impose essential boundary conditions and interfacial displacement constraints in modelling mechanical behaviour of composite materials using SPH method. The proposed methodology enforces the above constraints more accurately and requires only smaller condition number for system stiffness matrix than the procedures based on typical penalty function approach. A minimum cut-off value-based error criteria is employed to improve the compu-tational efficiency of the proposed methodology. In addition, the proposed method is further enhanced by adopting a modified numerical interpolation scheme along the boundary to increase the accuracy and computational efficiency. The numerical examples demonstrate that the proposed master-slave approach yields better accuracy in enforcing displacement constraints and requires approximately the same computational time as that of penalty method.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号