首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3393篇
  免费   82篇
  国内免费   1篇
  3476篇
  2021年   37篇
  2019年   93篇
  2018年   54篇
  2017年   82篇
  2016年   84篇
  2015年   61篇
  2014年   65篇
  2013年   723篇
  2010年   35篇
  2009年   37篇
  2008年   48篇
  2007年   53篇
  2006年   37篇
  2005年   42篇
  2004年   57篇
  2003年   43篇
  2002年   57篇
  2001年   35篇
  1999年   41篇
  1998年   46篇
  1997年   50篇
  1996年   61篇
  1995年   41篇
  1994年   59篇
  1993年   64篇
  1992年   59篇
  1991年   76篇
  1990年   41篇
  1989年   72篇
  1988年   80篇
  1987年   70篇
  1986年   73篇
  1985年   65篇
  1984年   37篇
  1983年   42篇
  1982年   43篇
  1981年   47篇
  1980年   51篇
  1979年   45篇
  1978年   49篇
  1977年   45篇
  1976年   45篇
  1975年   46篇
  1974年   52篇
  1973年   51篇
  1972年   52篇
  1971年   43篇
  1970年   40篇
  1969年   40篇
  1967年   35篇
排序方式: 共有3476条查询结果,搜索用时 15 毫秒
981.
Inspection models deal with operating systems whose stochastic failure is detected by observations carried out intermittently. The current communication deals with systems in which N + 1 levels of quality can be diagnosed. Optimal policies leading to minimal loss are developed, while the system's distribution is represented by an (N + 1)-state semi-markov process. Based on previous studies of the authors, relative efficiencies of the proposed checking policies are ascertained, by comparison with the loss sustained if discrimination of quality by intermediate levels is disregarded and by viewing the system as one which is either good or failed. Various models are treated where checking, truncated checking, and monitoring policies optimize loss per cycle, per unit of time and per unit of good time. Numerical examples are given.  相似文献   
982.
This paper considers the problem of allocating weapons to achieve targeting objectives while simultaneously minimizing aggregate damage to surrounding nonmilitary facilities, each of which has an upper limit to the damage it is permitted to incur. A model is formulated which assumes only that damage to individual targets or associated facilities does not decrease as the number of allocated weapons increases. An implicit enumeration algorithm, based on that of Lawler and Bell is described that yields optimal integer solutions. An example is presented.  相似文献   
983.
We consider a class of asymmetric two-person games played on graphs, and characterize all the positions in the game.  相似文献   
984.
An algorithm is developed to modify the Wilson Q to account for a short-term expenditure constraint over a catalog of items. Representative results are shown and generalizations made.  相似文献   
985.
We consider a single item inventory system with positive and negative stock fluctuations. Items can be purchased from a central stock, n items can be returned for a cost R + rn, and a linear inventory carrying cost is charged. It is shown that for minimizing the asymptotic cost rate when returns are a significant fraction of stock usage, a two-critical-number policy (a,b) is optimal, where b is the trigger level for returns and b – a is the return quantity. The values for a and b are found, as well as the operating characteristics of the system. We also consider the optimal return decision to make at time zero and show that it is partially determined by a and b.  相似文献   
986.
A model is developed which may be used to determine the expected total cost of quality control per inspection lot under acceptance sampling by variables where several characteristics are to be simultaneously controlled. Optimization of the model is accomplished through the application of a conventional search procedure. The sensitivity of the model and the optimum solution to the shape of the underlying probability distributions is discussed and associated analyses are presented through an example.  相似文献   
987.
One-sided sequential tests for the mean of an exponential distribution are proposed, and the related confidence intervals are computed. The tests behave like the classical sequential probability-ration test when the mean is small and like a fixed-time test when the mean is large and accurate estimation is important.  相似文献   
988.
A simple and relatively efficient method for simulating one-dimensional and two-dimensional nonhomogeneous Poisson processes is presented The method is applicable for any rate function and is based on controlled deletion of points in a Poisson process whose rate function dominates the given rate function In its simplest implementation, the method obviates the need for numerical integration of the rate function, for ordering of points, and for generation of Poisson variates.  相似文献   
989.
This paper considers a single server queueing system that alternates stochastically between two states: operational and failed. When operational, the system functions as an M/Ek/1 queue. When the system is failed, no service takes place but customers continue to arrive according to a Poisson process; however, the arrival rate is different from that when the system is operational. The durations of the operating and failed periods are exponential with mean 1/cβ and Erlang with mean 1/cβ, respectively. Generating functions are used to derive the steady-state quantities L and W, both of which, when viewed as functions of c, decrease at a rate inversely proportional to c2. The paper includes an analysis of several special and extreme cases and an application to a production-storage system.  相似文献   
990.
For large numbers of perfectly reliable, optimally targeted warheads the square-root law approximates the expected fraction damage achieved on an area target. In this paper a more exact expression is derived for this damage fraction which Holds for all numbers of warheads. This expression is shown to converge to the square-root law when a large number of warheads are fired. The more exact expression is used in a procedure to calculate expected damage when warheads are unreliable, and this procedure is shown to be superior to a modified square-root approximation which has been used previously.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号