首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   640篇
  免费   11篇
  2021年   11篇
  2019年   15篇
  2018年   9篇
  2017年   7篇
  2016年   9篇
  2015年   5篇
  2014年   9篇
  2013年   101篇
  2010年   5篇
  2009年   7篇
  2008年   7篇
  2007年   14篇
  2004年   9篇
  2003年   11篇
  2002年   9篇
  2001年   6篇
  2000年   7篇
  1998年   12篇
  1997年   12篇
  1996年   17篇
  1995年   6篇
  1994年   8篇
  1993年   13篇
  1992年   12篇
  1991年   14篇
  1990年   12篇
  1989年   25篇
  1988年   22篇
  1987年   14篇
  1986年   19篇
  1985年   13篇
  1984年   9篇
  1983年   5篇
  1982年   14篇
  1981年   11篇
  1980年   16篇
  1979年   12篇
  1978年   12篇
  1977年   9篇
  1976年   10篇
  1975年   10篇
  1974年   12篇
  1973年   7篇
  1972年   6篇
  1971年   13篇
  1970年   9篇
  1969年   8篇
  1968年   6篇
  1967年   10篇
  1966年   6篇
排序方式: 共有651条查询结果,搜索用时 31 毫秒
191.
An approximation suggested in Mann, Schafer and Singpurwalla [18] for obtaining small-sample tolerance bounds based on possibly censored two-parameter Weibull and lognormal samples is investigated. The tolerance bounds obtained are those that effectively make most efficient use of sample data. Values based on the approximation are compared with some available exact values and shown to be in surprisingly good agreement, even in certain cases in which sample sizes are very small or censoring is extensive. Ranges over which error in the approximation is less than about 1 or 2 percent are determined. The investigation of the precision of the approximation extends results of Lawless [8], who considered large-sample maximum-likelihood estimates of parameters as the basis for approximate 95 percent Weibull tolerance bounds obtained by the general approach described in [18]. For Weibull (or extreme-value) data the approximation is particularly useful when sample sizes are moderately large (more than 25), but not large enough (well over 100 for severely censored data) for asymptotic normality of estimators to apply. For such cases simplified efficient linear estimates or maximum-likelihood estimates may be used to obtain the approximate tolerance bounds. For lognormal censored data, best linear unbiased estimates may be used, or any efficient unbiased estimators for which variances and covariances are known as functions of the square of the distribution variance.  相似文献   
192.
Two issues of frequent importance in new product development are product improvement and reliability testing. A question often faced by the developer is: Should the product be distributed in its present state, or should it be improved further and/or tested before distribution? A more useful statement of the question might be: What levels of investment in further improvement and testing are economically permissible? Products for which this question is relevant may vary widely in type and intended use. This paper presents a model for determining these levels for one such product—an equipment modification procedure. The model presented makes use of present value analysis to compare cost streams and of Bayesian statistics to relate the costs to various outcomes under conditions of uncertainty. The model is applied to an actual military problem and a method is described for examining the sensitivity of the results to changes in the prior probabilities and discount rate.  相似文献   
193.
This paper deals with the problem of scheduling items (tasks, employees, equipment, etc.) over a finite time horizon so as to minimize total cost expenditures while maintaining a predefined separation between certain items. The problem is cyclic, because the same schedule will be repeated over several consecutive time periods of equal length. Thus, requirements are present to maintain the separation of items not only within the individual time periods considered, but also between items in adjoining periods. A special purpose branch-and-bound algorithm is developed to solve this scheduling problem by taking advantage of its cyclic nature. Computational results are given.  相似文献   
194.
This article deals with the problem of scheduling jobs with random processing times on single machine in order to minimize the expected variance of job completion times. Sufficient conditions for the existence of V-shaped optimal sequences are derived separately for general and ordered job processing times. It is shown that when coefficient of variation of random processing times are bounded by a certain value, an optimal sequence is V-shaped. © 1997 John Wiley & Sons, Inc.  相似文献   
195.
The problem of searching for randomly moving targets such as children and submarines is known to be fundamentally difficult, but finding efficient methods for generating optimal or near optimal solutions is nonetheless an important practical problem. This paper investigates the efficiency of Branch and Bound methods, with emphasis on the tradeoff between the accuracy of the bound employed and the time required to compute it. A variety of bounds are investigated, some of which are new. In most cases the best bounds turn out to be imprecise, but very easy to compute. © 1998 John Wiley & Sons, Inc. Naval Research Logistics 45: 243–257, 1998  相似文献   
196.
This paper revisits the modeling by Bracken [3] of the Ardennes campaign of World War II using the Lanchester equations. It revises and extends that analysis in a number of ways: (1) It more accurately fits the model parameters using linear regression; (2) it considers the data from the entire campaign; and (3) it adds in air sortie data. In contrast to previous results, it concludes by showing that neither the Lanchester linear or Lanchester square laws fit the data. A new form of the Lanchester equations emerges with a physical interpretation. © 1998 John Wiley & Sons, Inc. Naval Research Logistics 45: 1–22, 1998  相似文献   
197.
Components in a complex system are usually not structurally identical. However, in many cases we may find components that are structurally symmetric, and one should make use of this additional information to simplify reliability analysis. The main purpose of this article is to define and study one such class of systems, namely, those having symmetric components, and to derive some reliability-related properties. © 1996 John Wiley & Sons, Inc.  相似文献   
198.
The compound Poisson “local” formulation of the Stein-Chen method is applied to problems in reliability theory. Bounds for the accuracy of the approximation of the reliability by an appropriate compound Poisson distribution are derived under fairly general conditions, and are applied to consecutive-2 and connected-s systems, and the 2-dimensional consecutive-k-out-ofn system, together with a pipeline model. The approximations are usually better than the Poisson “local” approach would give. © 1996 John Wiley & Sons, Inc.  相似文献   
199.
Studied here is the problem of evaluating the formation of coalitions in cooperative games by considering its internal and external effects. Our analysis is based upon a formal theory of the quotient game and the use of multilinear extensions to compute the Shapley value and the coalitional value. When it applies to simple games, a series of interesting results is obtained. © 1996 John Wiley & Sons, Inc.  相似文献   
200.
This article examines the historical impact of foreign fighters and how the international community has sought to counter this threat. It argues that foreign fighters have contributed significantly to the metastasis of Salafi-jihadism over the past 30 years. They have globalized local conflicts. They have brought advanced skills to battlefields. Further, the logistics infrastructure built by foreign fighters has allowed Salafi-jihadism to expand rapidly. The challenge for security officials today is how to prevent the foreign fighters in Syria and Iraq from expanding the threat of Salafi-jihadism further. To inform this effort, this article derives lessons learned from past efforts against Arab Afghans in Bosnia (1992–1995) and Abu Musab al-Zarqawi’s foreign volunteers in Iraq (2003–2008).  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号