首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   264篇
  免费   16篇
  2021年   6篇
  2020年   2篇
  2019年   6篇
  2018年   7篇
  2017年   5篇
  2016年   5篇
  2015年   4篇
  2014年   7篇
  2013年   32篇
  2011年   3篇
  2010年   3篇
  2009年   8篇
  2008年   5篇
  2006年   4篇
  2005年   4篇
  2004年   7篇
  2003年   5篇
  2002年   7篇
  2001年   6篇
  2000年   4篇
  1999年   3篇
  1998年   3篇
  1997年   9篇
  1996年   3篇
  1995年   2篇
  1994年   4篇
  1993年   10篇
  1992年   3篇
  1991年   5篇
  1990年   2篇
  1989年   5篇
  1988年   11篇
  1987年   4篇
  1986年   7篇
  1985年   9篇
  1984年   9篇
  1983年   3篇
  1982年   2篇
  1981年   2篇
  1980年   5篇
  1979年   4篇
  1978年   4篇
  1977年   6篇
  1976年   3篇
  1974年   6篇
  1972年   2篇
  1971年   8篇
  1970年   4篇
  1969年   5篇
  1967年   2篇
排序方式: 共有280条查询结果,搜索用时 31 毫秒
161.
162.
We present transient and asymptotic reliability indices for a single‐unit system that is subject to Markov‐modulated shocks and wear. The transient results are derived from the (transform) solution of an integro‐differential equation describing the joint distribution of the cumulative degradation process and the state of the modulating process. Additionally, we prove the asymptotic normality of a properly centered and time‐scaled version of the cumulative degradation at time t. This asymptotic result leads to a simple normal approximation for a properly centered and space‐scaled version of the systes lifetime distribution. Two numerical examples illustrate the quality of the normal approximation. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 2009  相似文献   
163.
We address the problem of optimal decision‐making in conflicts based on Lanchester square law attrition model where a defending force needs to be partitioned optimally, and allocated to two different attacking forces of differing strengths and capabilities. We consider a resource allocation scheme called the Time Zero Allocation with Redistribution (TZAR) strategy, where allocation is followed by redistribution of defending forces, on the occurrence of certain decisive events. Unlike previous work on Lanchester attrition model based tactical decision‐making, which propose time sequential tactics through an optimal control approach, the present article focuses on obtaining simpler resource allocation tactics based on a static optimization framework, and demonstrates that the results obtained are similar to those obtained by the more complex dynamic optimal control solution. Complete solution for this strategy is obtained for optimal partitioning of resources of the defending forces. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
164.
We consider the problem of assigning a set of jobs to different parallel machines of the same processing speed, where each job is compatible to only a subset of those machines. The machines can be linearly ordered such that a higher‐indexed machine can process all those jobs that a lower‐indexed machine can process. The objective is to minimize the makespan of the schedule. This problem is motivated by industrial applications such as cargo handling by cranes with nonidentical weight capacities, computer processor scheduling with memory constraints, and grades of service provision by parallel servers. We develop an efficient algorithm for this problem with a worst‐case performance ratio of + ε, where ε is a positive constant which may be set arbitrarily close to zero. We also present a polynomial time approximation scheme for this problem, which answers an open question in the literature. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
165.
This paper describes modeling and operational analysis of a generic asymmetric service‐system situation in which (a) Red agents, potentially threatening, but in another but important interpretation, are isolated friendlies, such as downed pilots, that require assistance and “arrive” according to some partially known and potentially changing pattern in time and space; and (b) Reds have effectively limited unknown deadlines or times of availability for Blue service, i.e., detection, classification, and attack in a military setting or emergency assistance in others. We discuss various service options by Blue service agents and devise several approximations allowing one to compute efficiently those proportions of tasks of different classes that are successfully served or, more generally, if different rewards are associated with different classes of tasks, the percentage of the possible reward gained. We suggest heuristic policies for a Blue server to select the next task to perform and to decide how much time to allocate to that service. We discuss this for a number of specific examples. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006.  相似文献   
166.
Motivated by wind energy applications, we consider the problem of optimally replacing a stochastically degrading component that resides and operates in a partially observable environment. The component's rate of degradation is modulated by the stochastic environment process, and the component fails when it is accumulated degradation first reaches a fixed threshold. Assuming periodic inspection of the component, the objective is to minimize the long‐run average cost per unit time of performing preventive and reactive replacements for two distinct cases. The first case examines instantaneous replacements and fixed costs, while the second considers time‐consuming replacements and revenue losses accrued during periods of unavailability. Formulated and solved are mixed state space, partially observable Markov decision process models, both of which reveal the optimality of environment‐dependent threshold policies with respect to the component's cumulative degradation level. Additionally, it is shown that for each degradation value, a threshold policy with respect to the environment belief state is optimal if the environment alternates between two states. The threshold policies are illustrated by way of numerical examples using both synthetic and real wind turbine data. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 395–415, 2015  相似文献   
167.
Job shop scheduling with a bank of machines in parallel is important from both theoretical and practical points of view. Herein we focus on the scheduling problem of minimizing the makespan in a flexible two-center job shop. The first center consists of one machine and the second has k parallel machines. An easy-to-perform approximate algorithm for minimizing the makespan with one-unit-time operations in the first center and k-unit-time operations in the second center is proposed. The algorithm has the absolute worst-case error bound of k − 1 , and thus for k = 1 it is optimal. Importantly, it runs in linear time and its error bound is independent of the number of jobs to be processed. Moreover, the algorithm can be modified to give an optimal schedule for k = 2 .  相似文献   
168.
This study examines the failures of the William J. Clinton and Barack Obama administrations to secure ratification of the Comprehensive Nuclear-Test-Ban Treaty (CTBT). It applies an integrated analytical framework for assessing treaty ratification that builds upon previous research in order to understand why the Clinton administration failed to achieve CTBT ratification in 1999 and why the Obama administration has so far failed to advance the treaty in the Senate. The study concludes that CTBT ratification, despite Obama administration pledges of support, remains highly unlikely. Finally, the study analyzes the common domestic political factors present in both cases and suggests areas for further research.  相似文献   
169.
This article examines the implications of the proliferation of cyberwarfare capabilities for the character and frequency of war. Consideration of strategic logic, perceptions, and bargaining dynamics finds that the size of the effect of the proliferation of cyberwarfare capabilities on the frequency of war will probably be relatively small. This effect will not be constant across all situations; in some cases the advent of cyberwarfare capabilities may decrease the likelihood of war. On the other hand, the use of computer network attack as a brute force weapon will probably become increasingly frequent.  相似文献   
170.
This article analyzes the main factors that contributed to the failure of the US intelligence community to alert against Soviet intentions and the intervention in the Egyptian–Israeli War of Attrition in 1969–70. Based on fresh archival sources, this research describes the US intelligence conception concerning the USSR; explains the crystallization of the intelligence estimate on the probability of Soviet intervention in 1970; deals with the intelligence data that were acquired but eventually ignored; and concludes with several plausible explanations for the intelligence blunder.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号