全文获取类型
收费全文 | 561篇 |
免费 | 17篇 |
专业分类
578篇 |
出版年
2021年 | 13篇 |
2019年 | 13篇 |
2018年 | 7篇 |
2017年 | 13篇 |
2016年 | 10篇 |
2015年 | 12篇 |
2014年 | 13篇 |
2013年 | 98篇 |
2010年 | 5篇 |
2008年 | 6篇 |
2006年 | 7篇 |
2005年 | 7篇 |
2004年 | 4篇 |
2003年 | 4篇 |
2002年 | 10篇 |
2001年 | 9篇 |
2000年 | 6篇 |
1999年 | 6篇 |
1998年 | 9篇 |
1997年 | 13篇 |
1996年 | 6篇 |
1995年 | 8篇 |
1994年 | 10篇 |
1993年 | 15篇 |
1992年 | 10篇 |
1991年 | 10篇 |
1989年 | 10篇 |
1988年 | 23篇 |
1987年 | 9篇 |
1986年 | 19篇 |
1985年 | 17篇 |
1984年 | 13篇 |
1983年 | 6篇 |
1982年 | 6篇 |
1981年 | 9篇 |
1980年 | 10篇 |
1979年 | 13篇 |
1978年 | 10篇 |
1977年 | 12篇 |
1976年 | 4篇 |
1975年 | 9篇 |
1974年 | 12篇 |
1973年 | 6篇 |
1972年 | 8篇 |
1971年 | 10篇 |
1970年 | 7篇 |
1969年 | 9篇 |
1968年 | 4篇 |
1967年 | 4篇 |
1966年 | 4篇 |
排序方式: 共有578条查询结果,搜索用时 15 毫秒
91.
Mean residual life of coherent systems consisting of multiple types of dependent components 下载免费PDF全文
Mean residual life is a useful dynamic characteristic to study reliability of a system. It has been widely considered in the literature not only for single unit systems but also for coherent systems. This article is concerned with the study of mean residual life for a coherent system that consists of multiple types of dependent components. In particular, the survival signature based generalized mixture representation is obtained for the survival function of a coherent system and it is used to evaluate the mean residual life function. Furthermore, two mean residual life functions under different conditional events on components’ lifetimes are also defined and studied. 相似文献
92.
A model, for assessing the effectiveness of alternative force structures in an uncertain future conflict, is presented and exemplified. The methodology is appropriate to forces (e.g., the attack submarine force) where alternative unit types may be employed, albeit at differing effectiveness, in the same set of missions. Procurement trade-offs, and in particular the desirability of special purpose units in place of some (presumably more expensive) general purpose units, can be addressed by this model. Example calculations indicate an increase in the effectiveness of a force composed of general purpose units, relative to various mixed forces, with increase in the uncertainty regarding future conflicts. 相似文献
93.
Many Markov chain models have very large state spaces, making the computation of stationary probabilities very difficult. Often the structure and numerical properties of the Markov chain allows for more efficient computation through state aggregation and disaggregation. In this article we develop an efficient exact single pass aggregation/disaggregation algorithm which exploits structural properties of large finite irreducible mandatory set decomposable Markov chains. The required property of being of mandatory set decomposable structure is a generalization of several other Markov chain structures for which exact aggregation/disaggregation algorithms exist. © 1995 John Wiley & Sons, Inc. 相似文献
94.
Finite-capacity queues arise naturally in many practical situations, notably in communications and manufacturing engineering. In this article, the matrix formalism of probability distributions of phase type is used to develop fast algorithms to compute various steady-state distributions for the finite-capacity PH/PH/1 queue. This algorithm is an important ingredient in solving nontraditional but significant design problems. Some of these are described as illustrative examples. 相似文献
95.
Marc-Antoine Pérouse de Montclos 《Small Wars & Insurgencies》2013,24(5-6):863-885
ABSTRACTThis article discusses the shortcomings of the “de-radicalization doctrine” in sub-Saharan Africa. The issues raised are illustrated by the war against Boko Haram, which involves Nigeria, Niger, Chad and Cameroon. Relying on interviews with security officers, insurgents, civil servants, displaced people, humanitarian workers and Muslim and Christian clerics in Nigeria, Niger and Chad since 2005, the investigation shows that the four states focused on repression rather than demobilisation programs in prison or outdoors. The Boko Haram crisis is mainly a story of mismanagement. The article thus challenges the assumptions of the “de-radicalization doctrine” in Muslim Africa South of the Sahara. First, attempts to de-radicalize jihadi terrorists tend to focus too much on religious fanaticism and the exegesis of the Quran. Secondly, they are neither feasible nor efficient. Finally, they obscure priorities that are more important to counter extremism and demobilize insurgents. 相似文献
96.
In this article, we are concerned with scheduling stochastic jobs in a flowshop with m machines and zero intermediate storage. We assume that there are n - 2 identically distributed and 2 fast stochastic jobs. Roughly, the main result states that the makespan is stochastically minimized by placing one of the fast jobs first and the other last. 相似文献
97.
Having a robustly designed supply chain network is one of the most effective ways to hedge against network disruptions because contingency plans in the event of a disruption are often significantly limited. In this article, we study the facility reliability problem: how to design a reliable supply chain network in the presence of random facility disruptions with the option of hardening selected facilities. We consider a facility location problem incorporating two types of facilities, one that is unreliable and another that is reliable (which is not subject to disruption, but is more expensive). We formulate this as a mixed integer programming model and develop a Lagrangian Relaxation‐based solution algorithm. We derive structural properties of the problem and show that for some values of the disruption probability, the problem reduces to the classical uncapacitated fixed charge location problem. In addition, we show that the proposed solution algorithm is not only capable of solving large‐scale problems, but is also computationally effective. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2010 相似文献
98.
Andrew S. Bowen 《战略研究杂志》2019,42(3-4):312-343
What were Russia’s objectives in Eastern Ukraine, and why was it seemingly unable to achieve a successful or decisive outcome? In contrast to Russia’s seizure of Crimea, the uprising in Eastern Ukraine was marked by disorganization and chaos. Using proxy and surrogate actors, along with military exercises and the injection of Russian troops, Russia sought to institutionalize a political entity inside Ukraine to influence its domestic politics. In this article, I analyze the mechanisms by which Russia attempted to implement, and later salvage, its strategy. The article contributes to clearer theoretical and practical understanding of limited force in coercive diplomacy, signaling, and a more rigorous treatment of the role and uses of proxy actors. 相似文献
99.
100.
Hakimi has considered the problem of finding an optimal location for a single service center, such as a hospital or a police station. He used a graph theoretic model to represent the region being serviced. The communities are represented by the nodes while the road network is represented by the ares of the graph. In his work, the objective is one of minimizing the maximum of the shortest distances between the vertices and the service center. In the present work, the region being serviced is represented by a convex polygon and communities are spread over the entire region. The objective is to minimize the maximum of Euclidian distances between the service center and any point in the polygon. Two methods of solution presented are (i) a geometric method, and (ii) a quadratic programming formulation. Of these, the geometric method is simpler and more efficient. It is seen that for a class of problems, the geometric method is well suited and very efficient while the graph theoretic method, in general, will give only approximate solutions in spite of the increased efforts involved. But, for a different class of problems, the graph theoretic approach will be more appropriate while the geometric method will provide only approximate solutions though with ease. Finally, some feasible applications of importance are outlined and a few meaningful extensions are indicated. 相似文献