全文获取类型
收费全文 | 60篇 |
免费 | 0篇 |
专业分类
60篇 |
出版年
2022年 | 1篇 |
2021年 | 4篇 |
2020年 | 1篇 |
2019年 | 2篇 |
2018年 | 1篇 |
2016年 | 1篇 |
2015年 | 1篇 |
2014年 | 3篇 |
2013年 | 10篇 |
2011年 | 1篇 |
2010年 | 1篇 |
2009年 | 2篇 |
2008年 | 3篇 |
2007年 | 2篇 |
2006年 | 2篇 |
2005年 | 1篇 |
2004年 | 1篇 |
2002年 | 1篇 |
2000年 | 1篇 |
1999年 | 1篇 |
1996年 | 3篇 |
1994年 | 3篇 |
1993年 | 2篇 |
1991年 | 1篇 |
1988年 | 1篇 |
1987年 | 2篇 |
1986年 | 1篇 |
1985年 | 1篇 |
1980年 | 1篇 |
1978年 | 1篇 |
1977年 | 2篇 |
1974年 | 1篇 |
1969年 | 1篇 |
排序方式: 共有60条查询结果,搜索用时 0 毫秒
31.
社会主义荣辱观解读 总被引:1,自引:0,他引:1
翁世平 《军队政工理论研究》2006,7(3):43-45
社会主义荣辱观的全新时代内涵,是传承与发展的统一,建设与批判的统一,先进性与普及性的统一。树立和实践社会主义荣辱观,应当把握关键、突出重点,明辨荣辱、凝聚共识,拒耻为荣、筑牢防线,赏善罚恶、完善制度。 相似文献
32.
This article develops a model for determining the optimal inspection schedule for a system which deteriorates according to a semi-Markov process that progresses through three states: good, defective, and bad. A binary test is used, and false positives may occur. A true positive results in an action that reduces the likelihood of entering the bad state, but at most one such corrective action can occur during the lifetime of the system. Costs are associated with each inspection, each false positive, the corrective action, and the entrance into the bad state. Dynamic programming is used to compute the minimum expected cost, which is a function of the age of the system. The optimal inspection schedule is readily derived from this value function. Computational examples are provided. This model is appropriate for medical screening or for a mission where there is only one spare part. 相似文献
33.
This paper deals with the Weber single-facility location problem where the demands are not only points but may be areas as well. It provides an iterative procedure for solving the problem with lp distances when p > 1 (a method of obtaining the exact solution when p = 1 and distances are thus rectangular already exists). The special case where the weight densities in the areas are uniform and the areas are rectangles or circles results in a modified iterative process that is computationally much faster. This method can be extended to the simultaneous location of several facilities. 相似文献
34.
Kevin D. Stringer 《Small Wars & Insurgencies》2013,24(1):142-169
Given the nature of global counterinsurgency operations, the demands of military expansion, and the need for cultural, linguistic, and regional expertise, the United States Army should evaluate the establishment of US-led foreign troop units for its evolving force structure. This article proposes the creation of an American foreign legion based upon the recruitment of US-led, ethnically homogeneous tribal force units to meet the grist mill of counterinsurgency operations. This structured approach would be more beneficial than the current reliance on a de facto American Foreign Legion, represented by private military contractors (PMCs), many of them comprised of foreigners. These PMCs carry a number of oversight, accountability, and legal risks not found in a fully integrated, and US-officered foreign legion. The British Brigade of Gurkhas, the South-West African Police Counter-Insurgency Unit (Koevoet), and the Kit Carson Scouts serve as relevant historical examples where foreign troops were used to supplement national manpower resources. 相似文献
35.
Consider a patrol problem, where a patroller traverses a graph through edges to detect potential attacks at nodes. An attack takes a random amount of time to complete. The patroller takes one time unit to move to and inspect an adjacent node, and will detect an ongoing attack with some probability. If an attack completes before it is detected, a cost is incurred. The attack time distribution, the cost due to a successful attack, and the detection probability all depend on the attack node. The patroller seeks a patrol policy that minimizes the expected cost incurred when, and if, an attack eventually happens. We consider two cases. A random attacker chooses where to attack according to predetermined probabilities, while a strategic attacker chooses where to attack to incur the maximal expected cost. In each case, computing the optimal solution, although possible, quickly becomes intractable for problems of practical sizes. Our main contribution is to develop efficient index policies—based on Lagrangian relaxation methodology, and also on approximate dynamic programming—which typically achieve within 1% of optimality with computation time orders of magnitude less than what is required to compute the optimal policy for problems of practical sizes. © 2014 Wiley Periodicals, Inc. Naval Research Logistics, 61: 557–576, 2014 相似文献
36.
Kevin Marsh 《Defense & Security Analysis》2014,30(2):120-132
In March 2011, President Barack Obama ordered US air and naval forces to commence Operation Odyssey Dawn in Libya to impose a no-fly zone. The decision by the Obama Administration to intervene in a limited and supporting role in Libya is an important development in US foreign policy. Operation Odyssey Dawn presents scholars with a valuable opportunity to analyze and explore how US foreign policy is made and what roles domestic politics and elite perceptions play in decisions to use force. The author argues that neoclassical realism is a useful and compelling theoretic framework with which to analyze Operation Odyssey Dawn. While the Administration intervened in response to perceived external-level threats to US national interests, salient intervening domestic-level variables and elite perceptions shaped and guided the tenor and scope of the operation. 相似文献
37.
A single server is faced with a collection of jobs of varying duration and urgency. Each job has a random lifetime during which it is available for nonpreemptive service. Should a job's lifetime expire before its service begins then it is lost from the system unserved. The goal is to schedule the jobs for service to maximize the expected number served to completion. Two heuristics have been proposed in the literature. One (labeled πS) operates a static priority among the job classes and works well in a “no premature job loss” limit, whereas the second (πM) is a myopic heuristic which works well when lifetimes are short. Both can exhibit poor performance for problems at some distance from the regimes for which they were designed. We develop a robustly good heuristic by an approximative approach to the application of a policy improvement step to the asymptotically optimal heuristic πS, in which we use a fluid model to obtain an approximation for the value function of πS. The performance of the proposed heuristic is investigated in an extensive numerical study. © 2010 Wiley Periodicals, Inc. Naval Research Logistics 2010 相似文献
38.
Kevin O'Brien 《Small Wars & Insurgencies》2013,24(1):183-206
This essay will discuss two of the key pillars of asymmetry: notably Information Operations and terrorism, including the links between the two. While a great deal changed on 11 September 2001, one thing that has not changed in substance is the challenge of protecting the Information Society, notably from cyber-threats. Although the immediate threat to Western societies is from the physical and possibly bio-weapons favoured by Al Qaeda and its associates, it is time now to prepare for future threats to the information society, including cyber-threats. 相似文献
39.
This article analyzes the North Korean nuclear crisis from a balance-of-power perspective. It is in the long-term interests of international peace for a secure and independent North Korea to serve as a buffer between US and Chinese ground forces. However, the conventional military advantage of the South Korean-American alliance over North Korea has grown drastically since the end of the Cold War, threatening North Korea’s survival. Since North Korea lacks any reliable ally, nuclear weapons represent its most cost-effective way to restore a balance of power and thus secure itself. Accepting security guarantees in exchange for its nuclear arsenal is rhetorically appealing but not a viable approach. North Korea’s development of intercontinental ballistic missiles (ICBMs), however, has overcompensated for the post-Cold War imbalance, inviting talk in Washington of waging a preventive war. Persuading North Korea to give up its ICBM capability, not its nuclear arsenal, should therefore be the primary objective of US diplomacy. 相似文献
40.
We consider the single machine parallel batch scheduling problems to minimize makespan and total completion time, respectively, under precedence relations. The complexities of these two problems are reported as open in the literature. In this paper, we settle these open questions by showing that both problems are strongly NP‐hard, even when the precedence relations are chains. When the processing times of jobs are directly agreeable or inversely agreeable with the precedence relations, there is an O(n2) time algorithm to minimize the makespan. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004 相似文献