首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   389篇
  免费   5篇
  2021年   4篇
  2019年   12篇
  2018年   9篇
  2017年   8篇
  2016年   7篇
  2015年   4篇
  2014年   6篇
  2013年   73篇
  2012年   5篇
  2010年   4篇
  2009年   6篇
  2008年   6篇
  2007年   3篇
  2006年   4篇
  2005年   3篇
  2004年   8篇
  2003年   6篇
  2002年   7篇
  2001年   6篇
  2000年   4篇
  1998年   6篇
  1997年   4篇
  1996年   12篇
  1995年   7篇
  1993年   5篇
  1992年   6篇
  1991年   10篇
  1990年   5篇
  1989年   9篇
  1988年   10篇
  1987年   8篇
  1986年   9篇
  1985年   8篇
  1984年   6篇
  1982年   5篇
  1981年   5篇
  1980年   11篇
  1979年   5篇
  1978年   6篇
  1977年   4篇
  1976年   5篇
  1975年   6篇
  1974年   5篇
  1972年   4篇
  1971年   9篇
  1970年   4篇
  1969年   6篇
  1968年   6篇
  1967年   4篇
  1966年   6篇
排序方式: 共有394条查询结果,搜索用时 15 毫秒
381.
One goal of experimentation is to identify which design parameters most significantly influence the mean performance of a system. Another goal is to obtain good parameter estimates for a response model that quantifies how the mean performance depends on influential parameters. Most experimental design techniques focus on one goal at a time. This paper proposes a new entropy‐based design criterion for follow‐up experiments that jointly identifies the important parameters and reduces the variance of parameter estimates. We simplify computations for the normal linear model by identifying an approximation that leads to a closed form solution. The criterion is applied to an example from the experimental design literature, to a known model and to a critical care facility simulation experiment. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004  相似文献   
382.
In this article, we are concerned with scheduling stochastic jobs in a flowshop with m machines and zero intermediate storage. We assume that there are n - 2 identically distributed and 2 fast stochastic jobs. Roughly, the main result states that the makespan is stochastically minimized by placing one of the fast jobs first and the other last.  相似文献   
383.
ABSTRACT

Novichok agents are a class of nerve agents developed by the Soviet Union during the Cold War. In light of the use of a Novichok agent in Salisbury in March 2018, two sets of proposals to amend Schedule 1 of the 1993 Chemical Weapons Convention (CWC) have been put forth, one jointly by the United States, Canada, and the Netherlands, and the other by Russia. Both sets of proposals will be discussed and voted upon at the next Conference of States Parties of the Organisation for the Prohibition of Chemical Weapons (OPCW) in November 2019. If either set of proposals is approved, it will be the first time that the list of chemicals subject to verification under the CWC will have been modified. This viewpoint will discuss these proposals, and argue that, if adopted, the joint proposal and the portions of the Russian proposal upon which consensus can be reached would significantly strengthen the CWC by considerably expanding the coverage of its Schedule 1 and bringing Novichok agents firmly within the CWC’s verification system. We also argue that, since the OPCW Technical Secretariat did not deem the fifth group of chemicals proposed by Russia to meet the criteria for inclusion in Schedule 1, Russia should withdraw this part of its proposal from consideration. The proposals have also served an important purpose in clarifying the identity of the chemical agent used in the Salisbury incident, squarely placing it within one of the two families of Novichok agents described by the Russian chemical-weapons scientist and whistleblower Vil Mirzayanov. If either proposal is approved in November, it will be important to conduct a thorough assessment of key precursors for the synthesis of Novichok agents and assess the need to amend CWC schedules and national and multinational export-control lists accordingly.  相似文献   
384.
ABSTRACT

Grouping warships for combat has evolved greatly over the centuries. In the early 1940s, the United States Navy began to group its warships for combat in much more flexible task forces than the previous single-type-of-warship formations. This system has evolved and spread to naval forces ashore but remains fundamentally unchanged. It now covers numbers between 1 to over 1000, of which the most prominent is the first 100 or so which U.S. Navy combat forces use. The numbered fleets worldwide utilize the series covering 20-79; 1-19 and 90-99 appear to be reserved for special allocations and Commander, Pacific Fleet; numbers over 80 to the Atlantic; 100-119 for Northern Europe and briefly Tenth Fleet; the 120 series for Second Fleet as a Joint Task Force leader; the 150 series for Naval Forces Central Command; and the 180 series for Atlantic Fleet and now-Fleet Forces Command.  相似文献   
385.
ABSTRACT

Boko Haram insurgency in North East Nigeria has exposed women (girls, ladies, and mothers) to a complex jeopardy. While some women have suffered untimely widowhood or child-lack as a result of the Boko Haram onslaught, others have suffered death, forced abduction, and allied assaults on the main and side lines of the insurgency. Oftentimes, women have faced direct violence that essentially degrade their humanity. This is evident in the deployment of women as war-front sex slaves, human shields, and suicide bombers by the insurgents. The virtual expendability of women in the context of Boko Haram insurgency has been vividly demonstrated by the gale of female suicide bombings in Nigeria over the recent years. By means of a textual and contextual analysis of library sources and/or documentary data, as well as an adroit application of the theory of objectification, this study posits that, in addition to suffering collateral vulnerabilities, women have equally been instrumentalized as objects of terror in the context of Boko Haram insurgency. The paper further argues that the ‘weaponization’ of women’s bodies as bomb vessels and human shields by the insurgents highlights the height of women’s corporal victimization and objectification in contemporary asymmetric warfare.  相似文献   
386.
387.
388.
ABSTRACT

Bagayoko, Hutchful, and Luckham correctly argue that the structures, characteristics, and operating methods of official security institutions in Africa have been somewhat neglected, with a lack of much recent research. The Somali National Army (SNA) sits among these lacunae. Its formal structures can be used as a skeletal starting point and springboard to start to draw the network diagrams that chart informal linkages. This is why recent declassification decisions by U.S. intelligence bodies, coupled with period documents released to the UK National Archives, hold significance in helping us understand early hierarchical SNA arrangements. They show the steady build-up in size of the force, to 1987, to about the time the civil war began to fragment the state.  相似文献   
389.
ABSTRACT

International efforts to hold the government of President Bashar al-Assad accountable for the use of chemical weapons in the Syrian Civil War have entered a new phase. For the first time, the Organisation for the Prohibition of Chemical Weapons (OPCW), the international organization responsible for implementing the 1993 Chemical Weapons Convention, has been empowered to identify the perpetrators of chemical attacks in Syria. The Investigation and Identification Team (IIT), which was formed to conduct the OPCW’s new attribution mission, has announced its intention to investigate and identify the perpetrators of nine chemical attacks in Syria, including the April 7, 2018, attack in Douma. This article reviews recent efforts to attribute chemical attacks in Syria, describes what we know about the nine incidents to be investigated, summarizes what is known about the Syrian government officials, military commanders, and chemical-warfare scientists suspected of being responsible for these attacks, discusses what to expect during the next phase of the attribution process, and offers insights into how the international community can move beyond attribution to accountability. Accountability is necessary to provide justice for victims and to prevent future incidents by demonstrating that perpetrators of chemical attacks will be identified and punished.  相似文献   
390.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号