首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   231篇
  免费   9篇
  2021年   4篇
  2019年   6篇
  2018年   5篇
  2017年   5篇
  2016年   4篇
  2014年   6篇
  2013年   33篇
  2011年   3篇
  2010年   3篇
  2009年   5篇
  2008年   3篇
  2007年   2篇
  2006年   3篇
  2005年   3篇
  2004年   3篇
  2003年   3篇
  2002年   6篇
  2001年   4篇
  2000年   3篇
  1999年   2篇
  1998年   2篇
  1997年   6篇
  1996年   2篇
  1995年   2篇
  1994年   3篇
  1993年   9篇
  1992年   3篇
  1991年   4篇
  1990年   2篇
  1989年   3篇
  1988年   10篇
  1987年   4篇
  1986年   7篇
  1985年   9篇
  1984年   8篇
  1983年   2篇
  1982年   3篇
  1980年   5篇
  1979年   4篇
  1978年   4篇
  1977年   6篇
  1976年   2篇
  1974年   6篇
  1973年   2篇
  1972年   2篇
  1971年   7篇
  1970年   3篇
  1969年   4篇
  1968年   3篇
  1967年   2篇
排序方式: 共有240条查询结果,搜索用时 578 毫秒
81.
A system reliability is often evaluated by individual tests of components that constitute the system. These component test plans have advantages over complete system based tests in terms of time and cost. In this paper, we consider the series system with n components, where the lifetime of the i‐th component follows exponential distribution with parameter λi. Assuming test costs for the components are different, we develop an efficient algorithm to design a two‐stage component test plan that satisfies the usual probability requirements on the system reliability and in addition minimizes the maximum expected cost. For the case of prior information in the form of upper bounds on λi's, we use the genetic algorithm to solve the associated optimization problems which are otherwise difficult to solve using mathematical programming techniques. The two‐stage component test plans are cost effective compared to single‐stage plans developed by Rajgopal and Mazumdar. We demonstrate through several numerical examples that our approach has the potential to reduce the overall testing costs significantly. © 2002 John Wiley & Sons, Inc. Naval Research Logistics, 49: 95–116, 2002; DOI 10.1002/nav.1051  相似文献   
82.
In planar location problems with barriers one considers regions which are forbidden for the siting of new facilities as well as for trespassing. These problems are important since they model various actual applications. The resulting mathematical models have a nonconvex objective function and are therefore difficult to tackle using standard methods of location theory even in the case of simple barrier shapes and distance functions. For the case of center objectives with barrier distances obtained from the rectilinear or Manhattan metric, it is shown that the problem can be solved in polynomial time by identifying a dominating set. The resulting genuinely polynomial algorithm can be combined with bound computations which are derived from solving closely connected restricted location and network location problems. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 647–665, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10038  相似文献   
83.
The article studies the range of problems that have emerged due to the growing immigration from Muslim countries into the European Union (EU). While describing the functions of immigrants' communities, the authors focus on their political role in the receiving states. The study of the historical development of government–diaspora relations in three cases (the UK, France, and Germany) shows that Muslim communities' political influence does not reflect their economic and cultural role, which in the future might threaten the EU security, unless these countries develop a new approach to an “acculturation” policy.  相似文献   
84.
For many years, non-nuclear weapons states have sought binding commitments from nuclear armed states that they would not be the victim of either the threat or use of nuclear weapons—so-called negative security assurances (NSAs). The nuclear weapon states have traditionally resisted granting such unconditional NSAs. Recent U.S. efforts to use nuclear deterrence against the acquisition and use by other states of chemical, biological and radiological weapons, however, have further exacerbated this divide. This article analyzes the historical development of NSAs and contrasts U.S. commitments not to use nuclear weapons with the empirical realities of current U.S. nuclear weapons employment doctrines. The authors conclude that NSAs are most likely to be issued as unilateral declarations and that such pledges are the worst possible manner in which to handle the issue of security assurance.  相似文献   
85.
Chinese writings on the workings of nuclear stability, deterrence, and coercion are thin and politicized. Nevertheless, it is possible to glean, from direct and inferential evidence, rather pessimistic conclusions regarding Chinese views of nuclear stability at low numbers. While China has been living with low numbers in its own arsenal for decades, today it views missile defense and advanced conventional weapons as the primary threat to nuclear stability. More generally, China views nuclear stability as wedded to political amity. Because none of these would be directly addressed through further US and Russian arsenal reductions, China is unlikely to view such reductions as particularly stabilizing. While there is little in Chinese writing to suggest lower US and Russian numbers would encourage a “race to parity,” there are grounds to worry about China becoming more assertive as it gains confidence in Beijing's own increasingly secure second-strike forces.  相似文献   
86.
87.
The roots of the information technology Revolution in Military Affairs (RMA) can be traced to the mid-1970s, when the West capitalized on scientific-technological developments to neutralize the threat posed by Soviet second echelons. However, the cultivation of the technological seeds of the American RMA preceded the maturation of the conceptual ones. Although it was the US that was laying the technological groundwork for the RMA, Soviet, rather than the American military theorists, were the first to argue that the new range of technological innovations constituted a fundamental discontinuity in the nature of war, which they dubbed the ‘Military-Technical Revolution’ (MTR). About a decade later, this fundamental Soviet approach to the transformations in military affairs was analyzed, adapted and adopted by the US, and designated the RMA. This article deals with the intellectual history of the Soviet MTR and the American RMA.  相似文献   
88.
This paper considers the contribution of military publishing to the nineteenth-century military revolution leading to the Great War. The subject is addressed in four contexts. The first is informational, analyzing the role of military publications in making available data and ideas that increased military effectiveness. The second is syncretic, evaluating the effect of military publications on cohesion within increasingly large, complex armies, and between armies and their societies. The third is internal. It discusses the contributions to professional insecurity generated by print, and by its electronic extensions the telegraph and the telephone. Finally, the paper considers the print revolution's influence on actual war-fighting  相似文献   
89.
90.
Book Reviews     
Iain McCallum, Blood Brothers Hiram and Hudson Maxim: Pioneers of Modern Warfare. London: Chatham, 1999. Pp. 224, 33 illus., 2 maps, biblio., index. £20. ISBN 1–86176–096–5.

Eric Ash, Sir Frederick Sykes and the Air Revolution, 1912–1918. London and Portland, OR: Frank Cass, 1999. Pp.xviii + 268, 20 illus., 3 maps, biblio., index. £42.50/$59.50 (cloth), £18.50/$27.50 (paper). ISBN 0–7146–4828–0 and ‐4382–3.

Azar Gat, Fascist and Liberal Visions of War: Fuller, Liddell Hart, Douhet, and other Modernists. Oxford: Clarendon Press, 1998. Ppviii + 334, biblio., index. £45. ISBN 0–19–820715–8.

David B. Woolner (ed.), The Second Quebec Conference Revisited: Waging War, Formulating Peace: Canada, Great Britain, and the United States in 1944–1945. Basingstoke; London: Macmillan Press, 1998. Pp.xiii + 210, index. £32.50. ISBN 0–333–75970–2.

Jeffrey Grey. Up Top: The Royal Australian Navy and Southeast Asian Conflicts 1955–1972. St Leonards NSW: Allen &; Unwin in association with the Australian War Memorial, 1998. Pp.xx + 380, 110 illus., 12 tables, 23 maps &; diagrams, appendices, notes, biblio., index. NP. ISBN 1–86448–290–7.

Susan L Carruthers, The Media at War. Basingstoke: Macmillan, 2000. Pp.321, biblio., index. £14.99 (paper). ISBN 0–333–69143–1, also available in hardback.

Edward J. Marolda and Robert J. Schneller Jr, Shield and Sword: The United States Navy and the Persian Gulf War. Washington DC: Naval Historical Center, 1998. Pp.xxi + 517, 120 illus., 14 maps, biblio., index. NP. ISBN 0–1604–9476–1.

Marvin Pokrant, Desert Shield at Sea: What the Navy Really Did and Desert Storm at Sea: What the Navy Really Did. Both Westport, CT: Greenwood Press, 1999. Pp.xxiii + 265,9 illus., biblio., index. £44.95. ISBN 0–313–31023–8. Pp.xxiv + 329,12 illus., biblio., index. NP. ISBN 0–313–31024–6.

David Kaularich and Ronald C. Kramer, Crimes of the American Nuclear State: At Home and Abroad. Boston: Northeastern University Press, 1999. Pp.xviii + 195, biblio., index. £42.75. ISBN 1–55553–371‐X.

Stanley Hoffmann, World Disorders: Troubled Peace in the Post‐Cold War Era. Lanham, MD: Rowman &; Littlefield, 1998. Pp.viii+279, notes, index. $29.95. ISBN 0–8476–8574–8.

Lawrence Freedman (ed.), Strategic Coercion: Concepts and Cases. Oxford: Oxford‐University Press, 1998. Pp.400, index. £48. ISBN 0–19–829–349–6.

Stephen J. Cimbala, Coercive Military Strategy. College Station, TX: Texas A&;M University Press, 1998. Pp.229, biblio, index; $39.95. ISBN 0–89096–836–5  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号