全文获取类型
收费全文 | 691篇 |
免费 | 1篇 |
专业分类
692篇 |
出版年
2021年 | 8篇 |
2019年 | 7篇 |
2017年 | 14篇 |
2016年 | 12篇 |
2015年 | 11篇 |
2014年 | 10篇 |
2013年 | 112篇 |
2012年 | 23篇 |
2011年 | 28篇 |
2010年 | 23篇 |
2009年 | 15篇 |
2008年 | 30篇 |
2007年 | 16篇 |
2006年 | 15篇 |
2005年 | 9篇 |
2004年 | 6篇 |
2003年 | 5篇 |
2002年 | 5篇 |
1999年 | 6篇 |
1998年 | 6篇 |
1997年 | 6篇 |
1996年 | 5篇 |
1995年 | 10篇 |
1994年 | 12篇 |
1993年 | 13篇 |
1992年 | 10篇 |
1991年 | 10篇 |
1990年 | 6篇 |
1989年 | 16篇 |
1988年 | 9篇 |
1987年 | 15篇 |
1986年 | 17篇 |
1985年 | 12篇 |
1983年 | 8篇 |
1982年 | 12篇 |
1981年 | 9篇 |
1980年 | 12篇 |
1979年 | 14篇 |
1978年 | 7篇 |
1977年 | 10篇 |
1976年 | 9篇 |
1975年 | 11篇 |
1974年 | 7篇 |
1973年 | 7篇 |
1972年 | 17篇 |
1971年 | 11篇 |
1970年 | 5篇 |
1969年 | 13篇 |
1968年 | 11篇 |
1966年 | 5篇 |
排序方式: 共有692条查询结果,搜索用时 15 毫秒
111.
We consider the problem of scheduling a set of n jobs on a single batch machine, where several jobs can be processed simultaneously. Each job j has a processing time pj and a size sj. All jobs are available for processing at time 0. The batch machine has a capacity D. Several jobs can be batched together and processed simultaneously, provided that the total size of the jobs in the batch does not exceed D. The processing time of a batch is the largest processing time among all jobs in the batch. There is a single vehicle available for delivery of the finished products to the customer, and the vehicle has capacity K. We assume that K = rD, where and r is an integer. The travel time of the vehicle is T; that is, T is the time from the manufacturer to the customer. Our goal is to find a schedule of the jobs and a delivery plan so that the service span is minimized, where the service span is the time that the last job is delivered to the customer. We show that if the jobs have identical sizes, then we can find a schedule and delivery plan in time such that the service span is minimum. If the jobs have identical processing times, then we can find a schedule and delivery plan in time such that the service span is asymptotically at most 11/9 times the optimal service span. When the jobs have arbitrary processing times and arbitrary sizes, then we can find a schedule and delivery plan in time such that the service span is asymptotically at most twice the optimal service span. We also derive upper bounds of the absolute worst‐case ratios in both cases. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 470–482, 2015 相似文献
112.
Sungil Kim Heeyoung Kim Jye‐Chyi Lu Michael J. Casciato Martha A. Grover Dennis W. Hess Richard W. Lu Xin Wang 《海军后勤学研究》2015,62(2):127-142
In the field of nanofabrication, engineers often face unique challenges in resource‐limited experimental budgets, the sensitive nature of process behavior with respect to controllable variables, and highly demanding tolerance requirements. To effectively overcome these challenges, this article proposes a methodology for a sequential design of experiments through batches of experimental runs, aptly named Layers of Experiments with Adaptive Combined Design (LoE/ACD). In higher layers, where process behavior is less understood, experimental regions cover more design space and data points are more spread out. In lower layers, experimental regions are more focused to improve understanding of process sensitivities in a local, data‐rich environment. The experimental design is a combination of a space‐filling and an optimal design with a tuning parameter that is dependent on the amount of information accumulated over the various layers. The proposed LoE/ACD method is applied to optimize a carbon dioxide (epet‐CO2) assisted deposition process for fabricating silver nanoparticles with pressure and temperature variables. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 127–142, 2015 相似文献
113.
Person-borne improvised explosive devices (PBIEDs) are often used in terrorist attacks in Western countries. This study aims to predict the trajectories of PBIED fragments and the subsequent safety risks for people exposed to this hazard. An explosive field test with a typical PBIED composed of a plastic explosive charge and steel nut enhancements was performed to record initial fragment behaviour, including positions, velocity, and trajectory angles. These data were used to predict the full trajectory of PBIED fragments using a probabilistic analysis. In the probabilistic analyses a probability of fatality or serious injury was computed. Based on the results presented, many practical conclusions can be drawn, for instance, regarding safe evacuation distances if a person were exposed to a suspected PBIED. 相似文献
114.
ABSTRACTThe making of the Treaty on the Prohibition of Nuclear Weapons (TPNW) has put Austria and its involvement in nuclear disarmament in the spotlight. This study highlights several factors that led Austria to become a prominent voice in nuclear-disarmament debates. First, its involvement dovetails with the emphasis on humanitarian disarmament it has promoted since the 1990s. Second, a strong antinuclear identity pervades Austrian society. This “nuclear allergy” combines antimilitarism inherited from the Cold War and, more broadly, an aversion to nuclear power, including for energy purposes. These two considerations form the background to the increased activism of the Austrian Foreign Ministry on nuclear disarmament in international fora. But, equally, Austria’s crusade for the TPNW can be attributed to the engagement of a small team of diplomats implementing personal as well as national preferences in favor of disarmament. 相似文献
115.
We consider a general linear filtering operation on an autoregressive moving average (ARMA) time series. The variance of the filter output, which is an important quantity in many applications, is not known with certainty because it depends on the true ARMA parameters. We derive an expression for the sensitivity (i.e., the partial derivative) of the output variance with respect to deviations in the model parameters. The results provide insight into the robustness of many common statistical methods that are based on linear filtering and also yield approximate confidence intervals for the output variance. We discuss applications to time series forecasting, statistical process control, and automatic feedback control of industrial processes. © 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010 相似文献
116.
VANESSA L KENT 《African Security Review》2013,22(2):85-92
I am afraid there is clear evidence that acts of gross misconduct have taken place. This is a shameful thing for the United Nations to have to say, and I am absolutely outraged by it. —Kofi Annan, United Nations Secretary-General Despite promulgating a comprehensive set of guidelines to deter UN personnel from committing acts of sexual misconduct, allegations of sexual exploitation and abuse have become widespread within United Nations peacekeeping missions. The policy of zero-tolerance for peacekeeper misconduct has not been matched by strong disciplinary measures, and crimes are often ignored and rarely punished: absentee fathers, rapists and murderers simply disappear back in their home countries. In countries where women and children rarely have the same economic resources, political rights and authority or control over their environment—or their bodies—they easily become prey for those in perceived positions of power and authority. By failing to hold those responsible to account, the UN may in fact be fuelling even greater discrimination and violence against women and children. In order to ensure those who are mandated to protect to do not become perpetrators of abuse, the UN must take a stronger stand against those who commit acts of sexual misconduct, and must ensure that victims see that their abuser is brought to justice and that reparation is offered. A recent report submitted by the Secretary-General's Special Envoy on Sexual Exploitation and Sexual Abuse makes a comprehensive set of recommendations to prevent, detect, and respond to these allegations. The aim of this essay is to highlight some of the main points of the Special Envoy's report, and to examine the practical challenges the UN and troop/police contributing countries will face when attempting to implement these recommendations. 相似文献
117.
Tlohang W. Letsie 《African Security Review》2013,22(3-4):291-307
ABSTRACTThe Kingdom of Lesotho spends around five per cent of its annual budget – some 700 million Maloti ($US52.6 million) in 2017 – on the Lesotho Defence Force (LDF). Lesotho’s geographical position means that the LDF has no meaningful role regarding its primary function of defending the country from external aggression and it hardly engages in its secondary functions. In addition, the LDF has a long history of interference with democratic processes and engaging in human rights abuse. The financial resources currently allocated to the LDF could do far more for security, widely defined, if they were allocated to a number of other government expenditure categories. 相似文献
118.
119.
A. W. Kemp 《海军后勤学研究》1987,34(6):853-858
The article examines ways of computing cumulative probabilities for a constrained Poissonian binomial distribution arising from a model of a weapon defense system. 相似文献
120.
In this article we investigate situations where the buyer is offered discounted price schedules from alternative vendors. Given various discount schedules, the buyer must make the best buying decision under a variety of constraints, such as limited storage space and restricted inventory budgets. Solutions to this problem can be utilized by the buyer to improve profitability. EOQ models for multiple products with all-units discounts are readily solvable in the absence of constraints spanning the products. However, constrained discounted EOQ models lack convenient mathematical properties. Relaxing the product-spanning constraints produces a dual problem that is separable, but lack of convexity and smoothness opens the door for duality gaps. In this research we present a set of algorithms that collectively find the optimal order vector. Finally, we present numerical examples using actual data. to illustrate the application of the algorithms. © 1993 John Wiley & Sons, Inc. 相似文献