全文获取类型
收费全文 | 3448篇 |
免费 | 83篇 |
国内免费 | 1篇 |
出版年
2021年 | 37篇 |
2019年 | 91篇 |
2018年 | 53篇 |
2017年 | 85篇 |
2016年 | 83篇 |
2015年 | 66篇 |
2014年 | 73篇 |
2013年 | 725篇 |
2010年 | 41篇 |
2009年 | 42篇 |
2008年 | 50篇 |
2007年 | 54篇 |
2006年 | 39篇 |
2005年 | 44篇 |
2004年 | 57篇 |
2003年 | 46篇 |
2002年 | 60篇 |
1999年 | 41篇 |
1998年 | 48篇 |
1997年 | 47篇 |
1996年 | 63篇 |
1995年 | 43篇 |
1994年 | 60篇 |
1993年 | 65篇 |
1992年 | 58篇 |
1991年 | 76篇 |
1990年 | 42篇 |
1989年 | 76篇 |
1988年 | 83篇 |
1987年 | 70篇 |
1986年 | 76篇 |
1985年 | 69篇 |
1984年 | 37篇 |
1983年 | 42篇 |
1982年 | 43篇 |
1981年 | 47篇 |
1980年 | 51篇 |
1979年 | 45篇 |
1978年 | 49篇 |
1977年 | 45篇 |
1976年 | 45篇 |
1975年 | 46篇 |
1974年 | 52篇 |
1973年 | 50篇 |
1972年 | 52篇 |
1971年 | 43篇 |
1970年 | 40篇 |
1969年 | 40篇 |
1968年 | 34篇 |
1967年 | 34篇 |
排序方式: 共有3532条查询结果,搜索用时 15 毫秒
281.
Defense contractors retain engineers for two reasons. First, engineers work on current-period production contracts. Second, engineers conduct independent research and development (IR&D) and write bids and proposals (B&P) for future contracts. The amount of IR&D/B&P activity, however, understates the amount of effort devoted to learning that reduces the cost of future production. Even some engineers who work on current-period production may engage in learning, as a by-product of their efforts. This article develops and implements a model for estimating the volume of learning activity undertaken by four large manufacturers of military aircraft. © 1994 John Wiley & Sons, Inc. 相似文献
282.
J. S. Dagpunar 《海军后勤学研究》1994,41(7):1029-1037
A system undergoes minimal repair during [0, T] with a failure replacement on first failure during [T, a], or a planned replacement if the system is still functioning at elapsed time a. Repairs and replacements are not necessarily instantaneous. An expression is obtained for the asymptotic expected cost rate, and sufficient conditions are obtained for the optimum T* > 0. Several special cases are considered. A numerical investigation for a Weibull distributed time to first failure compares this elapsed-time policy with replacement on failure only, and also a policy based on system operating time or age. It is found that in many cases the elapsed-time-based policy is only marginally worse than one based on system age, and may therefore be preferred in view of its administrative convenience. © 1994 John Wiley & Sons, Inc. 相似文献
283.
Let Yi ∽ N(θi, σ), i = 1, …, p, be independently distributed, where θi and σ are unknown. A Bayesian approach is used to estimate the first two moments of the minimum order statistic, W = min (Y1, …, Yp). In order to compute the Bayes estimates, one has to evaluate the predictive densities of the Yi's conditional on past data. Although the required predictive densities are complicated in form, an efficient algorithm to calculate them has been developed and given in the article. An application of the Bayesian method in a continuous-review control model with multiple suppliers is discussed. © 1994 John Wiley & Sons, Inc. 相似文献
284.
Component grouping problems, a type of set-partitioning problem, arise in a number of different manufacturing and material logistics application areas. For example, in circuit board assembly, robotic work cells can be used to insert components onto a number of different types of circuit boards. Each type of circuit board requires particular components, with some components appearing on more than one type. The problem is to decide which components should be assigned to each work cell in order to minimize the number of visits by circuit boards to work cells. We describe two new heuristics for this problem, based on so-called greedy random adaptive search procedures (GRASP). With GRASP, a local search technique is replicated many times with different starting points. The starting points are determined by a greedy procedure with a probabilistic aspect. The best result is then kept as the solution. Computational experiments on problems based on data from actual manufacturing processes indicate that these GRASP methods outperform, both in speed and in solution quality, an earlier, network-flow-based heuristic. We also describe techniques for generating lower bounds for the component grouping problem, based on the combinatorial structure of a problem instance. The lower bounds for our real-world test problems averaged within 7%-8% of the heuristic solutions. Similar results are obtained for larger, randomly generated problems. © 1994 John Wiley & Sons. Inc. 相似文献
285.
Kenton G. Fasana 《Defence Studies》2018,18(2):167-187
Cyberspace is an avenue of approach through which a military force can attain objectives of value. Through these cyber avenues of approach, military forces can engage, vet, organize, and direct human agents to accomplish specific activities. Although the objectives of these activities could differ from traditional military objectives, they still have military relevance. This particular manifestation of cyber conflict is neither a new domain of war nor something outside of warfare. Rather, it can be viewed as an emerging avenue of approach in the larger context of military operations, auguring benefits in the integration of cyber activities with operations. 相似文献
286.
We study new decision and optimization problems of finding a simple path between two given vertices in an arc weighted directed multigraph such that the path length is equal to a given number or it does not fall into the given forbidden intervals (gaps). A fairly complete computational complexity classification is provided and exact and approximation algorithms are suggested. 相似文献
287.
Mean residual life of coherent systems consisting of multiple types of dependent components
下载免费PDF全文
![点击此处可从《海军后勤学研究》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Mean residual life is a useful dynamic characteristic to study reliability of a system. It has been widely considered in the literature not only for single unit systems but also for coherent systems. This article is concerned with the study of mean residual life for a coherent system that consists of multiple types of dependent components. In particular, the survival signature based generalized mixture representation is obtained for the survival function of a coherent system and it is used to evaluate the mean residual life function. Furthermore, two mean residual life functions under different conditional events on components’ lifetimes are also defined and studied. 相似文献
288.
Adjacency‐based local top‐down search method for finding maximal efficient faces in multiple objective linear programming
下载免费PDF全文
![点击此处可从《海军后勤学研究》网站下载免费的PDF全文](/ch/ext_images/free.gif)
It is well‐known that the efficient set of a multiobjective linear programming (MOLP) problem can be represented as a union of the maximal efficient faces of the feasible region. In this paper, we propose a method for finding all maximal efficient faces for an MOLP. The new method is based on a condition that all efficient vertices (short for the efficient extreme points and rays) for the MOLP have been found and it relies on the adjacency, affine independence and convexity results of efficient sets. The method uses a local top‐down search strategy to determine maximal efficient faces incident to every efficient vertex for finding maximal efficient faces of an MOLP problem. To our knowledge, the proposed method is the first top‐down search method that uses the adjacency property of the efficient set to find all maximal efficient faces. We discuss this and other advantages and disadvantages of the algorithm. We also discuss some computational experience we have had with our computer code for implementing the algorithm. This computational experience involved solving several MOLP problems with the code. 相似文献
289.
290.
Jutta Joachim Marlen Martin Henriette Lange Andrea Schneiker Magnus Dau 《Contemporary Security Policy》2018,39(2):298-316
Private military and security companies (PMSCs) play an increasingly important role in the provision of security-related services. In their attempts to win new clients and find suitable personnel, they take on different identities by presenting themselves as conventional businesses, military actors, and humanitarians. In this article, we examine how PMSCs deploy these identities when they recruit new personnel through social media. Our computer-assisted content analysis of Twitter messages posted by two major United States-based companies—CACI and DynCorp International—shows that while both PMSCs amplify their business and military identities to attract the most talented personnel, they construct and communicate these identities in different ways with CACI branding itself as a sophisticated, modern, and patriotic business and DynCorp as a home-grown, traditional military provider. In addition, our analysis lends force to scholars suggesting that state militaries and the private security sector compete increasingly for prospective employees using similar strategies. 相似文献