首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   398篇
  免费   5篇
  2020年   8篇
  2019年   11篇
  2018年   12篇
  2017年   14篇
  2016年   11篇
  2015年   8篇
  2014年   7篇
  2013年   127篇
  2011年   3篇
  2010年   4篇
  2009年   4篇
  2008年   5篇
  2007年   3篇
  2006年   4篇
  2005年   5篇
  2003年   2篇
  2002年   2篇
  2001年   5篇
  2000年   3篇
  1999年   4篇
  1998年   7篇
  1997年   6篇
  1996年   6篇
  1995年   9篇
  1994年   7篇
  1993年   6篇
  1992年   10篇
  1991年   12篇
  1990年   4篇
  1989年   6篇
  1988年   5篇
  1987年   7篇
  1986年   8篇
  1985年   7篇
  1984年   4篇
  1983年   2篇
  1982年   4篇
  1981年   2篇
  1980年   6篇
  1978年   4篇
  1977年   2篇
  1976年   2篇
  1975年   5篇
  1974年   6篇
  1973年   5篇
  1972年   2篇
  1971年   2篇
  1970年   3篇
  1968年   2篇
  1967年   2篇
排序方式: 共有403条查询结果,搜索用时 15 毫秒
191.
Boko Haram (BH) is an insurgent group that operates mainly in northeastern Nigeria. Its stated aim is to establish an Islamic state, and it employs terrorism as its strategy. Earlier interests of security analysts centred on the drivers of BH uprising and the possibility of its internationalisation. Today's concerns relate more to why the rebellion has lasted this long. In toeing the same line, this article demonstrates that BH is a purposive terror group against which the government has evolved no viable strategy. It examines some gains of BH over the past six years and how it benefitted from the government's underestimation of its capacity and determination. It concludes that to effectively engage BH, the Nigerian government must revaluate its threat and sincerely pursue an expanded strategy beyond the current military-centric approach. To be effective, government's response must be packaged in such a way as to enhance human security in the region.  相似文献   
192.
193.
194.
195.
Sidescan sonars are used in detecting hostile targets on the seabed. An accurate representation of the sensor performance is required to carefully plan and execute searches. We studied several confidence interval methods for assessing the accuracy of detection performance as a function of range from hostile targets. Using simulation, we determined that the best approach for modeling sensor data was piecewise logistic regression with cubic B‐splines at carefully selected knots. This method was demonstrated on real data collected from the CITADEL sea trial. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012  相似文献   
196.
The Belfast Agreement of 1998 was hailed at the time as a breakthrough in conflict resolution both in Northern Ireland and as a model for international emulation. In fact it has turned out to be neither; rather it has been a sad exercise in surrendering to terrorism and the cause of increased sectarian segregation and enmity. The core of the problem lies in the 'constructive ambiguity' at the heart of the Agreement - that is, a form of words that all could sign up to because each party could interpret them differently. This may have enabled everyone to sign up, but also implied they were signing up to different things and therefore were not in agreement. Consequently clever word games and spin by politicians and senior civil servants have created an, in some ways, worse situation, largely because real, substantive issues were ducked. This in turn has its roots in postmodernism, whose baleful influence can be seen throughout not only the Agreement but most government policy over the past 20 odd years.  相似文献   
197.
This article examines the role of the Macedonian Question in the 1944 December Uprising (Dekemvriana) in Greece. While the Dekemvriana is commonly portrayed in right–left terminology in the historiography, this article argues that part of the reason for the left’s failure was their inability to manage the Macedonian ethnic component of the struggle, either within their armed forces or in their relationship with Yugoslavia. As such, this article integrates the early phases of the Greek Civil War into the broader literature on minorities in civil conflict, while simultaneously exposing some of the myths about Macedonian involvement that result from its contemporary political ramifications.  相似文献   
198.
199.
This article addresses the inventory placement problem in a serial supply chain facing a stochastic demand for a single planning period. All customer demand is served from stage 1, where the product is stored in its final form. If the demand exceeds the supply at stage 1, then stage 1 is resupplied from stocks held at the upstream stages 2 through N, where the product may be stored in finished form or as raw materials or subassemblies. All stocking decisions are made before the demand occurs. The demand is nonnegative and continuous with a known probability distribution, and the purchasing, holding, shipping, processing, and shortage costs are proportional. There are no fixed costs. All unsatisfied demand is lost. The objective is to select the stock quantities that should be placed different stages so as to maximize the expected profit. Under reasonable cost assumptions, this leads to a convex constrained optimization problem. We characterize the properties of the optimal solution and propose an effective algorithm for its computation. For the case of normal demands, the calculations can be done on a spreadsheet. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48:506–517, 2001  相似文献   
200.
This paper considers the scheduling problem to minimize total tardiness given multiple machines, ready times, sequence dependent setups, machine downtime and scarce tools. We develop a genetic algorithm based on random keys representation, elitist reproduction, Bernoulli crossover and immigration type mutation. Convergence of the algorithm is proved. We present computational results on data sets from the auto industry. To demonstrate robustness of the approach, problems from the literature of different structure are solved by essentially the same algorithm. © 1999 John Wiley & Sons, Inc. Naval Research Logistics 46: 199–211, 1999  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号