首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   582篇
  免费   14篇
  596篇
  2021年   11篇
  2019年   24篇
  2018年   12篇
  2017年   16篇
  2016年   12篇
  2015年   12篇
  2014年   14篇
  2013年   137篇
  2009年   6篇
  2008年   5篇
  2007年   6篇
  2006年   5篇
  2005年   9篇
  2004年   8篇
  2003年   6篇
  2002年   7篇
  2001年   5篇
  2000年   9篇
  1998年   11篇
  1997年   16篇
  1996年   9篇
  1995年   5篇
  1994年   11篇
  1993年   4篇
  1992年   7篇
  1991年   13篇
  1990年   5篇
  1989年   9篇
  1988年   9篇
  1987年   16篇
  1986年   10篇
  1985年   8篇
  1984年   5篇
  1983年   8篇
  1982年   9篇
  1981年   5篇
  1980年   7篇
  1979年   11篇
  1978年   7篇
  1977年   9篇
  1976年   8篇
  1975年   7篇
  1974年   7篇
  1973年   12篇
  1972年   6篇
  1971年   7篇
  1970年   8篇
  1969年   7篇
  1968年   6篇
  1967年   8篇
排序方式: 共有596条查询结果,搜索用时 0 毫秒
441.
The anthrax attacks of 2001 energized research directed toward reducing health consequences from airborne contaminants by augmenting current heating ventilation and air-conditioning (HVAC) systems. Even during peacetime, interest will continue in improving HVAC components to reduce biocontaminants associated with sick building syndrome. Current HVAC design uses numerical simulation methods of ordinary differential equations to predict approximate performance. The authors show that state-space Laplace Transform calculations actually solve the underlying differential equations and yield algebraic expressions that provide new insight. To sharpen the arguments in favor of this methodology, attention is restricted to improving existing HVAC systems to increase protection from an external release of hazardous particulates. By nearly eliminating the need for dynamical simulation, the resulting methods can be applied to far more complex HVAC designs with little additional computational effort. The new methods reduce the time required for computation by three orders of magnitude. These algebraic methods also can be extended to disparate technical problems including internal particulate release, gas masks, and designing new protective buildings.  相似文献   
442.
Cyberspace has emerged as a potentially new (and unconventional) domain for warfare. Much debate has focused on understanding cyber conflict. The ability to critically analyse this phenomenon is important; however, the nascent nature of cyberwarfare and the complexity of the systems involved create challenges not met by conventional approaches. As a first step, this requires an analytical construct to frame discussions in a way that highlights distinct characteristics of the cyber domain. An approach proposed is one of the postulating conjectures for debate as a way to achieve this and to demonstrate its use, both at the strategic and operational levels. It is suggested that such an approach provides one component of a mature analytical framework for the analysis of cyber across a range of warfare domains.  相似文献   
443.
Decades ago, simulation was famously characterized as a “method of last resort,” to which analysts should turn only “when all else fails.” In those intervening decades, the technologies supporting simulation—computing hardware, simulation‐modeling paradigms, simulation software, design‐and‐analysis methods—have all advanced dramatically. We offer an updated view that simulation is now a very appealing option for modeling and analysis. When applied properly, simulation can provide fully as much insight, with as much precision as desired, as can exact analytical methods that are based on more restrictive assumptions. The fundamental advantage of simulation is that it can tolerate far less restrictive modeling assumptions, leading to an underlying model that is more reflective of reality and thus more valid, leading to better decisions. Published 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 293–303, 2015  相似文献   
444.
What explains the pace at which militaries adopt new technology? We argue that the hierarchical structure and unique expertise requirements of military organizations combine to empower select individuals as ‘gatekeepers’ of innovation. These individuals acquire beliefs throughout their military careers regarding the nature and means of warfare that act to shape their attitudes towards new military innovations. By filtering, sidelining, and ignoring competing sources of advice and information, these officers actively inhibit the adoption of new, often advantageous, innovations. We develop this argument through the analysis of two cases: the delayed acquisition of breech-loading and repeating rifles by the Union Army during the American Civil War, and the failure of the US Army to adopt an adequate heavy-type tank in World War II.  相似文献   
445.
Revenue management is the process of actively managing inventory or capacity to maximize revenues. The active management typically occurs through managerial levers such as price, promotion, or availability. We present a novel real options approach to revenue management that is specifically suited to the car rental business. We illustrate the concept with actual car rental data. The model produces minimally acceptable prices and inventory release quantities (number of cars available for rent at a given price) as a function of remaining time and available inventory. The pricing and inventory release recommendations of the developed model confirm earlier empirical analysis that suggested current practises discount too deeply early in the booking cycle. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004  相似文献   
446.
In peace-support operations, employees of international humanitarian organisations often clash with those of the military. A lack of familiarity with each other's practices and values, embedded in their respective organisational cultures, is often seen as the culprit. This article presents and illustrates a road map to manage such cultural differences between cooperating organisations. We found that the military culture, in our Bosnian case study, was seen to operate as a hierarchical culture (characterised by formalisation, stability, predictability and efficiency). The culture of international humanitarian organisations, on the other hand, was depicted as clan-type (characterised by teamwork, participation and consensus). To facilitate the creation of cultural awareness as well as respect for, and reconciliation of, cultural differences we recommend several concrete actions that could improve civil-military cooperation.  相似文献   
447.
This study examines the failures of the William J. Clinton and Barack Obama administrations to secure ratification of the Comprehensive Nuclear-Test-Ban Treaty (CTBT). It applies an integrated analytical framework for assessing treaty ratification that builds upon previous research in order to understand why the Clinton administration failed to achieve CTBT ratification in 1999 and why the Obama administration has so far failed to advance the treaty in the Senate. The study concludes that CTBT ratification, despite Obama administration pledges of support, remains highly unlikely. Finally, the study analyzes the common domestic political factors present in both cases and suggests areas for further research.  相似文献   
448.
Capability-based planning (CBP) is considered by many defence organisations to be the best practice for enterprise-level planning, analysis and management. This approach, loosely based around investment portfolio theory, is premised on balancing the cost, benefit and risk of capability options across the defence enterprise. However a number of authors have recently noted limitations of its current applications. The authors propose a more general, insurance-based approach, which can support the evolutionary improvement of the current CBP approach. This approach is implemented as hedging-based planning and aims to better reflect the enterprise nature of defence organisations, capturing both force structure and force generation aspects of military systems.  相似文献   
449.
We study a stochastic interdiction model of Morton et al. IIE Transactions, 39 (2007):3–14 that locates radiation sensors at border crossings to detect and prevent the smuggling of nuclear material. In this model, an interdictor places sensors at customs checkpoints to minimize a potential smuggler's maximum probability of crossing a border undetected. We focus on a model variant in which the interdictor has different, and likely more accurate, perceptions of the system's parameters than the smuggler does. We introduce a model that is tighter and uses fewer constraints than that of Morton et al. We also develop a class of valid inequalities along with a corresponding separation procedure that can be used within a cutting‐plane approach to reduce computational effort. Computational results demonstrate the effectiveness of our approach.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 91–100, 2014  相似文献   
450.
The container relocation problem (CRP) is concerned with emptying a single yard‐bay which contains J containers each following a given pickup order so as to minimize the total number of relocations made during their retrieval process. The CRP can be modeled as a binary integer programming (IP) problem and is known to be NP‐hard. In this work, we focus on an extension of the CRP to the case where containers are both received and retrieved from a single yard‐bay, and call it the dynamic container relocation problem. The arrival (departure) sequences of containers to (from) the yard‐bay is assumed to be known a priori. A binary IP formulation is presented for the problem. Then, we propose three types of heuristic methods: index based heuristics, heuristics using the binary IP formulation, and a beam search heuristic. Computational experiments are performed on an extensive set of randomly generated test instances. Our results show that beam search heuristic is very efficient and performs better than the other heuristic methods.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 101–118, 2014  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号