全文获取类型
收费全文 | 1014篇 |
免费 | 65篇 |
国内免费 | 15篇 |
出版年
2021年 | 20篇 |
2020年 | 10篇 |
2019年 | 22篇 |
2018年 | 11篇 |
2017年 | 23篇 |
2016年 | 17篇 |
2015年 | 21篇 |
2014年 | 34篇 |
2013年 | 183篇 |
2012年 | 16篇 |
2011年 | 15篇 |
2010年 | 23篇 |
2009年 | 19篇 |
2008年 | 22篇 |
2007年 | 32篇 |
2006年 | 19篇 |
2005年 | 21篇 |
2003年 | 11篇 |
2002年 | 20篇 |
2001年 | 16篇 |
2000年 | 15篇 |
1999年 | 18篇 |
1998年 | 24篇 |
1997年 | 18篇 |
1996年 | 18篇 |
1995年 | 18篇 |
1994年 | 23篇 |
1993年 | 23篇 |
1992年 | 17篇 |
1991年 | 24篇 |
1990年 | 14篇 |
1989年 | 14篇 |
1988年 | 22篇 |
1987年 | 11篇 |
1986年 | 23篇 |
1985年 | 17篇 |
1983年 | 9篇 |
1982年 | 16篇 |
1981年 | 13篇 |
1980年 | 13篇 |
1979年 | 15篇 |
1978年 | 13篇 |
1977年 | 12篇 |
1975年 | 14篇 |
1974年 | 14篇 |
1973年 | 14篇 |
1972年 | 13篇 |
1971年 | 12篇 |
1969年 | 13篇 |
1968年 | 12篇 |
排序方式: 共有1094条查询结果,搜索用时 281 毫秒
81.
This article introduces a new conceptual and methodological framework for the use of decision makers and their interactions with the computer in bicriterion decision making. The new method, called the multirun interactive method, attempts to estimate the prior of the decision maker on his uncertain preference nature using the minimum cross-entropy principle. A computational study is performed with four hypothesized prior distributions under various interaction conditions. Other important aspects related to the method, such as implementation of the method, decision making under certainty, decision making with multiple decision makers, and bicriterion integer programming, are also discussed. 相似文献
82.
John W. Chinneck 《海军后勤学研究》1992,39(4):531-543
Nonviable network models have edges which are forced to zero flow simply by the pattern of interconnection of the nodes. The original nonviability diagnosis algorithm [4] is extended here to cover all classes of network models, including pure, generalized, pure processing, nonconserving processing, and generalized processing. The extended algorithm relies on the conversion of all network forms to a pure processing form. Efficiency improvements to the original algorithm are also presented. 相似文献
83.
This article considers the problem of equipment replacement in which the replacement decision at a particular time must take into account (i) the state of the existing machine in use, (ii) the available replacement alternatives at the time, (iii) the future advances in the relevant technologies with regard to the equipment under consideration, and (iv) costs of switching between different technologies. A methodology that attains minimal forecast horizons for the problem is developed. A numerical example illustrates the methodology. 相似文献
84.
Andrew S. Bowen 《战略研究杂志》2019,42(3-4):312-343
What were Russia’s objectives in Eastern Ukraine, and why was it seemingly unable to achieve a successful or decisive outcome? In contrast to Russia’s seizure of Crimea, the uprising in Eastern Ukraine was marked by disorganization and chaos. Using proxy and surrogate actors, along with military exercises and the injection of Russian troops, Russia sought to institutionalize a political entity inside Ukraine to influence its domestic politics. In this article, I analyze the mechanisms by which Russia attempted to implement, and later salvage, its strategy. The article contributes to clearer theoretical and practical understanding of limited force in coercive diplomacy, signaling, and a more rigorous treatment of the role and uses of proxy actors. 相似文献
85.
This article examines the evolution of the current British military joint intelligence doctrine. We argue that military intelligence doctrine is dogged by an intrinsic tension between the ethos and expectations of military doctrine and those of the professional practice of intelligence. We further argue not only that prior iterations of UK joint intelligence doctrine failed to effectively deal with this intelligence doctrine dilemma, but also that measures in the current doctrine to address this problem directly created their own problems. Moreover, as a result, otherwise sound innovations in the current UK intelligence doctrine have proven unsuitable to wider diffusion in more recent intelligence doctrine such as the new NATO intelligence doctrine which, otherwise, draws extensively on its British precursor. 相似文献
86.
Michael H. Clemmesen 《Defense & Security Analysis》2019,35(1):96-97
The article outlines the essential role of free play elements in various types of exercises for the development of in-depth and practical military professionalism. It thereafter argues why such use of free play contradicts the military science founded Russian Way of War. 相似文献
87.
We consider scheduling a set of jobs with deadlines to minimize the total weighted late work on a single machine, where the late work of a job is the amount of processing of the job that is scheduled after its due date and before its deadline. This is the first study on scheduling with the late work criterion under the deadline restriction. In this paper, we show that (i) the problem is unary NP‐hard even if all the jobs have a unit weight, (ii) the problem is binary NP‐hard and admits a pseudo‐polynomial‐time algorithm and a fully polynomial‐time approximation scheme if all the jobs have a common due date, and (iii) some special cases of the problem are polynomially solvable. 相似文献
88.
David H. Tomback 《Arms and Armour》2019,16(1):56-74
The sword which is the subject of this article and which will be referred to as the Capel sword, is a fine example of what has become known as an Irish basket-hilt. Whilst there are other examples in existence, what makes this sword unique and particularly important is the fact that it is known to have been owned by two important Royalist military leaders, Lord Arthur Capel and Sir John Owen. These two extraordinary men came from different backgrounds but their fate was linked through circumstances beyond their control. The story this sword tells is one of comradeship, loyalty, total belief in a cause, betrayal and ultimate sacrifice. 相似文献
89.
为了解决传统PID控制器在电动舵机系统设计中难以满足控制要求的问题,首先设计了一种规范化前馈-反馈控制系统,然后利用混沌优化算法和共轭梯度方法相结合的混合优化算法对前馈-反馈控制器参数进行了优化.仿真结果表明:基于混合优化算法的前馈-反馈控制器具有很好的动态和静态性能,增强了系统的稳定性和鲁棒性,降低了学习参数选择的盲目性和对经验的高度依赖性. 相似文献
90.
浅谈汽车炸弹的特点和防范手段 总被引:1,自引:0,他引:1
简述了汽车炸弹的特点及其实施战术,提出防范汽车炸弹的几种方法。一是研究爆炸物探测原理,配备先进的爆炸物探测装备;二是部署拦截装置;三是通过各种工程措施加强对重要目标的防护。 相似文献