首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   264篇
  免费   16篇
  2021年   6篇
  2020年   2篇
  2019年   6篇
  2018年   7篇
  2017年   5篇
  2016年   5篇
  2015年   4篇
  2014年   7篇
  2013年   32篇
  2011年   3篇
  2010年   3篇
  2009年   8篇
  2008年   5篇
  2006年   4篇
  2005年   4篇
  2004年   7篇
  2003年   5篇
  2002年   7篇
  2001年   6篇
  2000年   4篇
  1999年   3篇
  1998年   3篇
  1997年   9篇
  1996年   3篇
  1995年   2篇
  1994年   4篇
  1993年   10篇
  1992年   3篇
  1991年   5篇
  1990年   2篇
  1989年   5篇
  1988年   11篇
  1987年   4篇
  1986年   7篇
  1985年   9篇
  1984年   9篇
  1983年   3篇
  1982年   2篇
  1981年   2篇
  1980年   5篇
  1979年   4篇
  1978年   4篇
  1977年   6篇
  1976年   3篇
  1974年   6篇
  1972年   2篇
  1971年   8篇
  1970年   4篇
  1969年   5篇
  1967年   2篇
排序方式: 共有280条查询结果,搜索用时 15 毫秒
151.
We introduce the notion of comparison of the criticality of two nodes in a coherent system, and devlop a monotonicity property of the reliability function under component pairwise rearrangement. We use this property to find the optimal component arrangement. Worked examples illustrate the methods proposed.  相似文献   
152.
The statistical properties of an estimator of a source location were established by simulation for the case in which the source location is estimated—using transformation of lines to points—from the angles in which different observers see the source, and both the assumed locations of the observer points and the observed angles are subject to error. It was found that for normal error distributions the estimator is unbiased, and the resulting estimates are approximately normally distributed with a small standard deviation. An easy-to-use and reliable forecasting formula was suggested to forecast the parameters of the distributions of the estimates for different observer-source relationships. © 1993 John Wiley & Sons, Inc.  相似文献   
153.
The article considers a two-person zero-sum game in which the movement of the players is constrained to integer points …, −1, 0, 1, … of a line L. Initially the searcher (hider) is at point x = 0 (x = d, d > 0). The searcher and the hider perform simple motion on L with maximum speeds w and u, respectively, where w > u > 0. Each of the players knows the other's initial position but not the other's subsequent positions. The searcher has a bomb which he can drop at any time during his search. Between the dropping of the bomb and the bomb exploding there is a T time lag. If the bomb explodes at point i and the hider is at point i − 1, or i, or i + 1, then the destruction probability is equal to P, or 1, or P, respectively, where 0 < P < 1. d, w, u, and T are integer constants. The searcher can drop the bomb at integer moments of time t = 0, 1, … . The aim of the searcher is to maximize the probability of the destruction of the hider. © 1993 John Wiley & Sons, Inc.  相似文献   
154.
We describe a decision process for establishing the threshold reliabilities for components of naval major-caliber ammunition. We present a measure of reliability performance, called ef*, which relates directly to the weapons system's performance in a naval gunfire support environment. We use a simulation model to establish this relationship, a regression metamodel to estimate its parameters, and a simple decision process to specify component reliability thresholds which ensure that the ammunition is mission effective. We present this article as an example of the integration of discrete event dynamic system analysis within a decision process. © 1992 John Wiley & Sons, Inc.  相似文献   
155.
For more than a decade, multiattribute utility/value theory and multiobjective mathematical programming have offered different approaches to similar problems. Unfortunately, the two areas have developed with little interaction in spite of their common aims. We consider the use of utility/value functions in a mathematical programming framework, and demonstrate that these functions often possess desirable properties from an optimization point of view. We conclude that a hybridization of approaches is more viable than is perhaps commonly assumed.  相似文献   
156.
Minimax strategies are obtained for an infiltration game in which one player must move through a one-dimensional interval defended by the other player.  相似文献   
157.
A counterexample is given to demonstrate that previously proposed necessary conditions for the bilevel programming problem are not correct. An interpretation of the difficulty is given by appealing to a “theorem of alternative” result presented in the original work.  相似文献   
158.
New partial orderings of life distributions are given. The concepts of decreasing mean residual life, new better than used in expectation, harmonic new better than used in expectation, new better than used in failure rate, and new better than used in failure rate average are generalized, so as to compare the aging properties of two arbitrary life distributions.  相似文献   
159.
Postmodern terrorism presents a significant challenge to global security and law enforcement institutions. Non-state actors operating across international borders, engaged in an apparent global insurgency of extremism that transects the traditional boundaries of crime and war, pose significant challenges to both intelligence and law enforcement agencies. These networked global insurgents blend political and religious fanaticism with criminal enterprises to challenge the rule of law and pose an epochal shift in the structures and relations among states. Negotiating this epochal shift requires traditional organs of national security (the diplomatic, military and intelligence services) to forge new partnerships with police and public safety organizations at the state and local (sub-national), as well as transnational levels. Significant operational, policy and cultural challenges must be overcome to forge an effective multi-lateral global network to counter global terrorism and insurgency.  相似文献   
160.
The paper considers the economic lot scheduling problem (ELSP) where production facility is assumed to deteriorate, owing to aging, with an increasing failure rate. The time to shift from an “in‐control” state to an “out‐of‐control” state is assumed to be normally distributed. The system is scheduled to be inspected at the end of each production lot. If the process is found to be in an “out‐of‐control” state, then corrective maintenance is performed to restore it to an “in‐control” state before the start of the next production run. Otherwise, preventive maintenance is carried out to enhance system reliability. The ELSP is formulated under the capacity constraint taking into account the quality related cost due to possible production of non‐conforming items, process inspection, and maintenance costs. In order to find a feasible production schedule, both the common cycle and time‐varying lot sizes approaches are utilized. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 650–661, 2003  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号