首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   691篇
  免费   1篇
  692篇
  2021年   8篇
  2019年   7篇
  2017年   14篇
  2016年   12篇
  2015年   11篇
  2014年   10篇
  2013年   112篇
  2012年   23篇
  2011年   28篇
  2010年   23篇
  2009年   15篇
  2008年   30篇
  2007年   16篇
  2006年   15篇
  2005年   9篇
  2004年   6篇
  2003年   5篇
  2002年   5篇
  1999年   6篇
  1998年   6篇
  1997年   6篇
  1996年   5篇
  1995年   10篇
  1994年   12篇
  1993年   13篇
  1992年   10篇
  1991年   10篇
  1990年   6篇
  1989年   16篇
  1988年   9篇
  1987年   15篇
  1986年   17篇
  1985年   12篇
  1983年   8篇
  1982年   12篇
  1981年   9篇
  1980年   12篇
  1979年   14篇
  1978年   7篇
  1977年   10篇
  1976年   9篇
  1975年   11篇
  1974年   7篇
  1973年   7篇
  1972年   17篇
  1971年   11篇
  1970年   5篇
  1969年   13篇
  1968年   11篇
  1966年   5篇
排序方式: 共有692条查询结果,搜索用时 15 毫秒
111.
    
We consider the problem of scheduling a set of n jobs on a single batch machine, where several jobs can be processed simultaneously. Each job j has a processing time pj and a size sj. All jobs are available for processing at time 0. The batch machine has a capacity D. Several jobs can be batched together and processed simultaneously, provided that the total size of the jobs in the batch does not exceed D. The processing time of a batch is the largest processing time among all jobs in the batch. There is a single vehicle available for delivery of the finished products to the customer, and the vehicle has capacity K. We assume that K = rD, where and r is an integer. The travel time of the vehicle is T; that is, T is the time from the manufacturer to the customer. Our goal is to find a schedule of the jobs and a delivery plan so that the service span is minimized, where the service span is the time that the last job is delivered to the customer. We show that if the jobs have identical sizes, then we can find a schedule and delivery plan in time such that the service span is minimum. If the jobs have identical processing times, then we can find a schedule and delivery plan in time such that the service span is asymptotically at most 11/9 times the optimal service span. When the jobs have arbitrary processing times and arbitrary sizes, then we can find a schedule and delivery plan in time such that the service span is asymptotically at most twice the optimal service span. We also derive upper bounds of the absolute worst‐case ratios in both cases. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 470–482, 2015  相似文献   
112.
    
In the field of nanofabrication, engineers often face unique challenges in resource‐limited experimental budgets, the sensitive nature of process behavior with respect to controllable variables, and highly demanding tolerance requirements. To effectively overcome these challenges, this article proposes a methodology for a sequential design of experiments through batches of experimental runs, aptly named Layers of Experiments with Adaptive Combined Design (LoE/ACD). In higher layers, where process behavior is less understood, experimental regions cover more design space and data points are more spread out. In lower layers, experimental regions are more focused to improve understanding of process sensitivities in a local, data‐rich environment. The experimental design is a combination of a space‐filling and an optimal design with a tuning parameter that is dependent on the amount of information accumulated over the various layers. The proposed LoE/ACD method is applied to optimize a carbon dioxide (epet‐CO2) assisted deposition process for fabricating silver nanoparticles with pressure and temperature variables. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 127–142, 2015  相似文献   
113.
    
Person-borne improvised explosive devices (PBIEDs) are often used in terrorist attacks in Western countries. This study aims to predict the trajectories of PBIED fragments and the subsequent safety risks for people exposed to this hazard. An explosive field test with a typical PBIED composed of a plastic explosive charge and steel nut enhancements was performed to record initial fragment behaviour, including positions, velocity, and trajectory angles. These data were used to predict the full trajectory of PBIED fragments using a probabilistic analysis. In the probabilistic analyses a probability of fatality or serious injury was computed. Based on the results presented, many practical conclusions can be drawn, for instance, regarding safe evacuation distances if a person were exposed to a suspected PBIED.  相似文献   
114.
    
ABSTRACT

The making of the Treaty on the Prohibition of Nuclear Weapons (TPNW) has put Austria and its involvement in nuclear disarmament in the spotlight. This study highlights several factors that led Austria to become a prominent voice in nuclear-disarmament debates. First, its involvement dovetails with the emphasis on humanitarian disarmament it has promoted since the 1990s. Second, a strong antinuclear identity pervades Austrian society. This “nuclear allergy” combines antimilitarism inherited from the Cold War and, more broadly, an aversion to nuclear power, including for energy purposes. These two considerations form the background to the increased activism of the Austrian Foreign Ministry on nuclear disarmament in international fora. But, equally, Austria’s crusade for the TPNW can be attributed to the engagement of a small team of diplomats implementing personal as well as national preferences in favor of disarmament.  相似文献   
115.
    
We consider a general linear filtering operation on an autoregressive moving average (ARMA) time series. The variance of the filter output, which is an important quantity in many applications, is not known with certainty because it depends on the true ARMA parameters. We derive an expression for the sensitivity (i.e., the partial derivative) of the output variance with respect to deviations in the model parameters. The results provide insight into the robustness of many common statistical methods that are based on linear filtering and also yield approximate confidence intervals for the output variance. We discuss applications to time series forecasting, statistical process control, and automatic feedback control of industrial processes. © 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
116.
    
I am afraid there is clear evidence that acts of gross misconduct have taken place. This is a shameful thing for the United Nations to have to say, and I am absolutely outraged by it.

—Kofi Annan, United Nations Secretary-General

Despite promulgating a comprehensive set of guidelines to deter UN personnel from committing acts of sexual misconduct, allegations of sexual exploitation and abuse have become widespread within United Nations peacekeeping missions. The policy of zero-tolerance for peacekeeper misconduct has not been matched by strong disciplinary measures, and crimes are often ignored and rarely punished: absentee fathers, rapists and murderers simply disappear back in their home countries. In countries where women and children rarely have the same economic resources, political rights and authority or control over their environment—or their bodies—they easily become prey for those in perceived positions of power and authority. By failing to hold those responsible to account, the UN may in fact be fuelling even greater discrimination and violence against women and children. In order to ensure those who are mandated to protect to do not become perpetrators of abuse, the UN must take a stronger stand against those who commit acts of sexual misconduct, and must ensure that victims see that their abuser is brought to justice and that reparation is offered. A recent report submitted by the Secretary-General's Special Envoy on Sexual Exploitation and Sexual Abuse makes a comprehensive set of recommendations to prevent, detect, and respond to these allegations. The aim of this essay is to highlight some of the main points of the Special Envoy's report, and to examine the practical challenges the UN and troop/police contributing countries will face when attempting to implement these recommendations.  相似文献   
117.
    
ABSTRACT

The Kingdom of Lesotho spends around five per cent of its annual budget – some 700 million Maloti ($US52.6 million) in 2017 – on the Lesotho Defence Force (LDF). Lesotho’s geographical position means that the LDF has no meaningful role regarding its primary function of defending the country from external aggression and it hardly engages in its secondary functions. In addition, the LDF has a long history of interference with democratic processes and engaging in human rights abuse. The financial resources currently allocated to the LDF could do far more for security, widely defined, if they were allocated to a number of other government expenditure categories.  相似文献   
118.
    
  相似文献   
119.
    
The article examines ways of computing cumulative probabilities for a constrained Poissonian binomial distribution arising from a model of a weapon defense system.  相似文献   
120.
    
In this article we investigate situations where the buyer is offered discounted price schedules from alternative vendors. Given various discount schedules, the buyer must make the best buying decision under a variety of constraints, such as limited storage space and restricted inventory budgets. Solutions to this problem can be utilized by the buyer to improve profitability. EOQ models for multiple products with all-units discounts are readily solvable in the absence of constraints spanning the products. However, constrained discounted EOQ models lack convenient mathematical properties. Relaxing the product-spanning constraints produces a dual problem that is separable, but lack of convexity and smoothness opens the door for duality gaps. In this research we present a set of algorithms that collectively find the optimal order vector. Finally, we present numerical examples using actual data. to illustrate the application of the algorithms. © 1993 John Wiley & Sons, Inc.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号