首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   578篇
  免费   9篇
  2021年   5篇
  2020年   4篇
  2019年   6篇
  2017年   11篇
  2016年   15篇
  2015年   10篇
  2014年   12篇
  2013年   104篇
  2012年   22篇
  2011年   27篇
  2010年   23篇
  2009年   15篇
  2008年   30篇
  2007年   13篇
  2006年   15篇
  2005年   6篇
  2004年   4篇
  2002年   3篇
  2001年   4篇
  1998年   8篇
  1997年   7篇
  1996年   4篇
  1995年   7篇
  1994年   4篇
  1993年   13篇
  1992年   11篇
  1991年   9篇
  1990年   3篇
  1989年   13篇
  1988年   8篇
  1987年   12篇
  1986年   13篇
  1985年   9篇
  1983年   7篇
  1982年   6篇
  1981年   9篇
  1980年   10篇
  1979年   13篇
  1978年   5篇
  1977年   7篇
  1976年   9篇
  1975年   8篇
  1973年   4篇
  1972年   14篇
  1971年   3篇
  1970年   5篇
  1969年   11篇
  1968年   7篇
  1967年   4篇
  1966年   5篇
排序方式: 共有587条查询结果,搜索用时 26 毫秒
161.
This article considers a two-person game in which the first player has access to certain information that is valuable but unknown to the second player. The first player can distort the information before it is passed on to the second player. The purpose in distorting the information is to render it as useless as possible to the second player. Based on the distorted information received, the second player then maximizes some given objective. In certain cases he may still be able to use the distorted information, but sometimes the information has been so badly distorted that it becomes completely useless to him. © 1993 John Wiley & Sons, Inc.  相似文献   
162.
The purpose of this article is to investigate some managerial insights related to using the all-unit quantity discount policies under various conditions. The models developed here are general treatments that deal with four major issues: (a) one buyer or multiple buyers, (b) constant or price-elastic demand, (c) the relationship between the supplier's production schedule or ordering policy and the buyers' ordering sizes, and (d) the supplier either purchasing or manufacturing the item. The models are developed with two objectives: the supplier's profit improvement or the supplier's increased profit share analysis. Algorithms are developed to find optimal decision policies. Our analysis provides the supplier with both the optimal all-unit quantity discount policy and the optimal production (or ordering) strategy. Numerical examples are provided. © 1993 John Wiley & Sons. Inc.  相似文献   
163.
随着隐身技术在军用飞机上的广泛应用,反隐身技术成为赢取未来高技术战争必须研究的课题.以F-117 A和B-2飞机为例,分析了现有的飞机红外隐身技术措施,对红外隐身前后系统作用距离进行估算,重点阐述了未来反红外隐身飞机的技术措施,对飞机反隐身技术的发展提出了展望.  相似文献   
164.
We consider a processing network in which jobs arrive at a fork‐node according to a renewal process. Each job requires the completion of m tasks, which are instantaneously assigned by the fork‐node to m task‐processing nodes that operate like G/M/1 queueing stations. The job is completed when all of its m tasks are finished. The sojourn time (or response time) of a job in this G/M/1 fork‐join network is the total time it takes to complete the m tasks. Our main result is a closed‐form approximation of the sojourn‐time distribution of a job that arrives in equilibrium. This is obtained by the use of bounds, properties of D/M/1 and M/M/1 fork‐join networks, and exploratory simulations. Statistical tests show that our approximation distributions are good fits for the sojourn‐time distributions obtained from simulations. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
165.
Discrete‐time queues with D‐MAP arrival process are more useful in modeling and performance analysis of telecommunication networks based on the ATM environment. This paper analyzes a finite‐buffer discrete‐time queue with general bulk‐service rule, wherein the arrival process is D‐MAP and service times are arbitrarily and independently distributed. The distributions of buffer contents at various epochs (departure, random, and prearrival) have been obtained using imbedded Markov chain and supplementary variable methods. Finally, some performance measures such as loss probability and average delay are discussed. Numerical results are also presented in some cases. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 345–363, 2003.  相似文献   
166.
Consider a stochastic simulation experiment consisting of v independent vector replications consisting of an observation from each of k independent systems. Typical system comparisons are based on mean (long‐run) performance. However, the probability that a system will actually be the best is sometimes more relevant, and can provide a very different perspective than the systems' means. Empirically, we select one system as the best performer (i.e., it wins) on each replication. Each system has an unknown constant probability of winning on any replication and the numbers of wins for the individual systems follow a multinomial distribution. Procedures exist for selecting the system with the largest probability of being the best. This paper addresses the companion problem of estimating the probability that each system will be the best. The maximum likelihood estimators (MLEs) of the multinomial cell probabilities for a set of v vector replications across k systems are well known. We use these same v vector replications to form vk unique vectors (termed pseudo‐replications) that contain one observation from each system and develop estimators based on AVC (All Vector Comparisons). In other words, we compare every observation from each system with every combination of observations from the remaining systems and note the best performer in each pseudo‐replication. AVC provides lower variance estimators of the probability that each system will be the best than the MLEs. We also derive confidence intervals for the AVC point estimators, present a portion of an extensive empirical evaluation and provide a realistic example. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 341–358, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10019  相似文献   
167.
基于模糊数的防空C3I系统效能评估   总被引:1,自引:0,他引:1  
根据模糊数适于量化模糊信息的特点,运用模糊集理论,提出了一种基于模糊数的模糊综合评估方法.通过计算被评估系统效能的模糊数,将问题转化为模糊数的排序问题,并给出了采用该方法对防空C3I系统效能评估的模型及实现步骤.该方法能对防空C3I系统的效能指标进行合理的量化处理,较好地解决了防空C3I系统效能评估问题,通过计算实例验证了该方法的正确性和实用性.  相似文献   
168.
分析了RGB-D传感器的标定模型及标定方法,利用标定棋盘和Matlab工具箱对RGB-D传感器进行了标定。采用摄像机标定方法计算了彩色摄像机和深度摄像机的初始化参数,根据标定棋盘和标定板的共面关系计算了相对位姿的初始估计值,并采用非线性最小化方法对标定参数进行了优化。实验结果表明:标定后的彩色图像和深度图像的重投影误差较小,深度测量不确定性标准差比标定前约减小了1/2,有效地提高了RGB-D传感器的测量精度。  相似文献   
169.
The Replenishment at Sea Planner (RASP) is saving the U.S. Navy millions of dollars a year by reducing fuel consumption of its Combat Logistics Force (CLF). CLF shuttle supply ships deploy from ports to rendezvous with underway U.S. combatants and those of coalition partners. The overwhelming commodity transferred is fuel, ship‐to‐ship by hoses, while other important packaged goods and spare parts are high‐lined, or helicoptered between ships. The U.S. Navy is organized in large areas of responsibility called numbered fleets, and within each of these a scheduler must promulgate a daily forecast of CLF shuttle operations. The operational planning horizon extends out several weeks, or as far into the future as we can forecast demand. We solve RASP with integer linear optimization and a purpose‐built heuristic. RASP plans Replenishment‐at‐Sea (RAS) events with 4‐hour (Navy watch) time fidelity. For five years, RASP has served two purposes: (1) it helps schedulers generate a daily schedule and animates it using Google Earth, and (2) it automates reports command‐to‐ship messages that are essential to keep this complex logistics system operating.  相似文献   
170.
The terrorist attacks in France and Belgium of 2015–2016 that occurred while these countries were in a heightened state of alert raise questions about indications and warning methodology as well as effectiveness of the blanket-protection deployment of security services assisted even by the military. Response and perhaps even more anticipation may require strategic rethinking in light of the predatory attacks that target the most vulnerable spots of the public space. This study looks at threat analysis in Belgium as conducted through her intelligence fusion centre Coordination Unit for Threat Analysis (CUTA)?????? since its inception in 2006. With a special focus on what is known, at the time of writing, about the terrorist attacks in Paris and Brussels, this study hopes to put into context how the system (mal)functions and will also consider the preventive measures that respond to the threat, and the international aspects which have implications far beyond Belgian borders. Therefore, a case is made for not just a Belgian homeland security framework, but one that fits into an EU-wide security concept.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号