首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   394篇
  免费   10篇
  2021年   12篇
  2019年   8篇
  2017年   9篇
  2016年   8篇
  2015年   11篇
  2014年   9篇
  2013年   71篇
  2010年   2篇
  2008年   4篇
  2007年   4篇
  2006年   5篇
  2005年   4篇
  2003年   2篇
  2002年   6篇
  2001年   6篇
  2000年   4篇
  1999年   6篇
  1998年   9篇
  1997年   8篇
  1996年   6篇
  1995年   6篇
  1994年   8篇
  1993年   8篇
  1992年   7篇
  1991年   8篇
  1990年   2篇
  1989年   7篇
  1988年   16篇
  1987年   6篇
  1986年   15篇
  1985年   9篇
  1984年   6篇
  1983年   7篇
  1982年   4篇
  1981年   8篇
  1980年   6篇
  1979年   11篇
  1978年   7篇
  1977年   7篇
  1976年   2篇
  1975年   9篇
  1974年   7篇
  1973年   5篇
  1972年   7篇
  1971年   4篇
  1970年   4篇
  1969年   6篇
  1968年   3篇
  1967年   2篇
  1966年   3篇
排序方式: 共有404条查询结果,搜索用时 15 毫秒
61.
Allocation of spare components in a system in order to optimize the lifetime of the system with respect to a suitable criterion is of considerable interest in reliability, engineering, industry, and defense. We consider the problem of allocation of K active spares to a series system of independent and identical components in order to optimize the failure-rate function of the system. © 1997 John Wiley & Sons, Inc.  相似文献   
62.
We study a stochastic outpatient appointment scheduling problem (SOASP) in which we need to design a schedule and an adaptive rescheduling (i.e., resequencing or declining) policy for a set of patients. Each patient has a known type and associated probability distributions of random service duration and random arrival time. Finding a provably optimal solution to this problem requires solving a multistage stochastic mixed‐integer program (MSMIP) with a schedule optimization problem solved at each stage, determining the optimal rescheduling policy over the various random service durations and arrival times. In recognition that this MSMIP is intractable, we first consider a two‐stage model (TSM) that relaxes the nonanticipativity constraints of MSMIP and so yields a lower bound. Second, we derive a set of valid inequalities to strengthen and improve the solvability of the TSM formulation. Third, we obtain an upper bound for the MSMIP by solving the TSM under the feasible (and easily implementable) appointment order (AO) policy, which requires that patients are served in the order of their scheduled appointments, independent of their actual arrival times. Fourth, we propose a Monte Carlo approach to evaluate the relative gap between the MSMIP upper and lower bounds. Finally, in a series of numerical experiments, we show that these two bounds are very close in a wide range of SOASP instances, demonstrating the near‐optimality of the AO policy. We also identify parameter settings that result in a large gap in between these two bounds. Accordingly, we propose an alternative policy based on neighbor‐swapping. We demonstrate that this alternative policy leads to a much tighter upper bound and significantly shrinks the gap.  相似文献   
63.
This work uses the molecular dynamics approach to study the effects of functionalization of carbon nanotubes (CNTs) on the mechanical properties of Cu64Zr36 metallic glass (MG). Three types of functional groups, carboxylic, vinyl and ester were used. The effect of CNT volume fraction (Vf) and the number of functional groups attached to CNT, on the mechanical properties and thermal conductivity of CNT-MG composites was analysed using Biovia Materials Studio. At lower values of Vf (from 0 to 5%), the per-centage increase in Young's modulus was approximately 66%. As the value of Vf was increased further (from 5 to 12%), the rate of increase in Young's modulus was reduced to 16%. The thermal conductivity was found to increase from 1.52 W/mK at Vf=0%to 5.88 W/mK at Vf=12%, thus giving an increase of approximately 286%. Functionalization of SWCNT reduced the thermal conductivity of the SWCNT-MG composites.  相似文献   
64.
This work presents a numerical simulation of ballistic penetration and high velocity impact behavior of plain and reinforced concrete panels. This paper is divided into two parts. The first part consists of numerical modeling of reinforced concrete panel penetrated with a spherical projectile using concrete damage plasticity (CDP) model, while the second part focuses on the comparison of CDP model and Johnson-Holmquist-2 (JH-2) damage model and their ability to describe the behavior of concrete panel under impact loads. The first and second concrete panels have dimensions of 1500 mm × 1500 mm × 150 mm and 675 mm × 675 mm × 200 mm, respectively, and are meshed using 8-node hexahedron solid elements. The impact object used in the first part is a spherical projectile of 150 mm diameter, while in the second part steel projectile of a length of 152 mm is modeled as rigid element. Failure and scabbing characteristics are studied in the first part. In the second part, the com-parison results are presented as damage contours, kinetic energy of projectile and internal energy of the concrete. The results revealed a severe fracture of the panel and high kinetic energy of the projectile using CDP model comparing to the JH-2 model. In addition, the internal energy of concrete using CDP model was found to be less comparing to the JH-2 model.  相似文献   
65.
The human visual system is still an important factor in military warfare; military personnel receive training on effective search strategies, and camouflage that can effectively conceal objects and personnel is a key component of a successful integrated survivability strategy. Previous methods of camouflage assessment have, amongst others, used psychophysics to generate distinctiveness metrics. However, the population from which the human observers are drawn is often not well defined, or necessarily appropriate. In this experiment we designed a new platform for testing multiple patterns based on a camouflaged object detection task, and investigate whether trained military observers perform better than civilians. We use a two-alternative forced choice paradigm, with participants searching images of woodland for a replica military helmet displaying Olive Green, Multi Terrain Pattern, US Marine Pattern or, as a conspicuous control, UN Peacekeeper Blue. Our data show that there is no difference in detection performance between the two observer groups but that there are clear differences in the effectiveness of the different helmet colour patterns in a temperate woodland environment. We conclude that when tasks involve very short stimulus presentation times, task-specific training has little effect on the success of target detection and thus this paradigm is particularly suitable for robust estimates of camouflage efficacy.  相似文献   
66.
We examine who benefits when there is a strong leader in place, and who benefits when a situation lacks a proper leader. There are fractious terrorist groups who seek to serve the same people in common cause against a common enemy. The groups compete for rents obtained from the public by engaging in actions against the common enemy. We determine the leadership structure under which each group is better off, as well as the circumstance that the common enemy prefers. We are able to state simple and general conditions for each group and the common enemy to benefit.  相似文献   
67.
68.
69.
Syria's slide into sectarian civil war in 2011 raises a new fundamental knowledge question about the conditions under which power-sharing pacts can be clinched as an approach to war termination. When intrastate conflicts escalate into violent sectarian struggles, power-sharing is a likely basis of an eventual political settlement in situations where partition is off the table. This article contends that there remain two puzzling knowledge gaps about power-sharing as the basis for peace agreements to end civil wars: first, the specific conditions under which elites find it in their own interest to share power with bitter adversaries rather than fight on the battlefield, and second, how war-ending elite-negotiated pacts may evolve into more enduring social contracts. These puzzles, critical for policymakers and still unresolved in the scholarly literature, suggest the need to develop more contingent- and context-specific knowledge if research findings are to more capably contribute to peacemaking efforts.  相似文献   
70.
Many well-established explanations for war suggest that cyber weapons have a greater chance of being used offensively than other kinds of military technologies. This response article introduces a research agenda for the study of cyber war, and offers an example – principal-agent problems in cyber operations – to demonstrate how rigorous theoretical and empirical work may proceed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号