首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4443篇
  免费   404篇
  国内免费   32篇
  2021年   90篇
  2019年   97篇
  2018年   66篇
  2017年   118篇
  2016年   89篇
  2015年   99篇
  2014年   109篇
  2013年   787篇
  2012年   73篇
  2011年   66篇
  2010年   100篇
  2009年   124篇
  2008年   125篇
  2007年   149篇
  2006年   77篇
  2005年   101篇
  2004年   79篇
  2003年   57篇
  2002年   73篇
  2001年   61篇
  2000年   53篇
  1999年   145篇
  1998年   104篇
  1997年   112篇
  1996年   100篇
  1995年   82篇
  1994年   91篇
  1993年   101篇
  1992年   95篇
  1991年   99篇
  1990年   65篇
  1989年   84篇
  1988年   90篇
  1987年   80篇
  1986年   80篇
  1985年   72篇
  1983年   45篇
  1982年   45篇
  1981年   47篇
  1980年   51篇
  1979年   45篇
  1978年   49篇
  1977年   45篇
  1976年   45篇
  1975年   46篇
  1974年   52篇
  1973年   50篇
  1972年   52篇
  1971年   43篇
  1969年   40篇
排序方式: 共有4879条查询结果,搜索用时 15 毫秒
321.
322.
Environmentally friendly energy resources open a new opportunity to tackle the problem of energy security and climate change arising from wide use of fossil fuels. This paper focuses on optimizing the allocation of the energy generated by the renewable energy system to minimize the total electricity cost for sustainable manufacturing systems under time‐of‐use tariff by clipping the peak demand. A rolling horizon approach is adopted to handle the uncertainty caused by the weather change. A nonlinear mathematical programming model is established for each decision epoch based on the predicted energy generation and the probability distribution of power demand in the manufacturing plant. The objective function of the model is shown to be convex, Lipchitz‐continuous, and subdifferentiable. A generalized benders decomposition method based on the primal‐dual subgradient descent algorithm is proposed to solve the model. A series of numerical experiments is conducted to show the effectiveness of the solution approach and the significant benefits of using the renewable energy resources.  相似文献   
323.
The effectiveness of a fire department is largely determined by its ability to respond to incidents in a timely manner. To do so, fire departments typically have fire stations spread evenly across the region, and dispatch the closest truck(s) whenever a new incident occurs. However, large gaps in coverage may arise in the case of a major incident that requires many nearby fire trucks over a long period of time, substantially increasing response times for emergencies that occur subsequently. We propose a heuristic for relocating idle trucks during a major incident in order to retain good coverage. This is done by solving a mathematical program that takes into account the location of the available fire trucks and the historic spatial distribution of incidents. This heuristic allows the user to balance the coverage and the number of truck movements. Using extensive simulation experiments we test the heuristic for the operations of the Fire Department of Amsterdam‐Amstelland, and compare it against three other benchmark strategies in a simulation fitted using 10 years of historical data. We demonstrate substantial improvement over the current relocation policy, and show that not relocating during major incidents may lead to a significant decrease in performance.  相似文献   
324.
Information technology (IT) infrastructure relies on a globalized supply chain that is vulnerable to numerous risks from adversarial attacks. It is important to protect IT infrastructure from these dynamic, persistent risks by delaying adversarial exploits. In this paper, we propose max‐min interdiction models for critical infrastructure protection that prioritizes cost‐effective security mitigations to maximally delay adversarial attacks. We consider attacks originating from multiple adversaries, each of which aims to find a “critical path” through the attack surface to complete the corresponding attack as soon as possible. Decision‐makers can deploy mitigations to delay attack exploits, however, mitigation effectiveness is sometimes uncertain. We propose a stochastic model variant to address this uncertainty by incorporating random delay times. The proposed models can be reformulated as a nested max‐max problem using dualization. We propose a Lagrangian heuristic approach that decomposes the max‐max problem into a number of smaller subproblems, and updates upper and lower bounds to the original problem via subgradient optimization. We evaluate the perfect information solution value as an alternative method for updating the upper bound. Computational results demonstrate that the Lagrangian heuristic identifies near‐optimal solutions efficiently, which outperforms a general purpose mixed‐integer programming solver on medium and large instances.  相似文献   
325.
What were Russia’s objectives in Eastern Ukraine, and why was it seemingly unable to achieve a successful or decisive outcome? In contrast to Russia’s seizure of Crimea, the uprising in Eastern Ukraine was marked by disorganization and chaos. Using proxy and surrogate actors, along with military exercises and the injection of Russian troops, Russia sought to institutionalize a political entity inside Ukraine to influence its domestic politics. In this article, I analyze the mechanisms by which Russia attempted to implement, and later salvage, its strategy. The article contributes to clearer theoretical and practical understanding of limited force in coercive diplomacy, signaling, and a more rigorous treatment of the role and uses of proxy actors.  相似文献   
326.
Recent scholarship in security studies has started to explore the causes and consequences of various forms of national restrictions in multinational military operations (MMOs). This article makes a conceptual contribution to this literature by developing a theoretical framework of national restrictions in MMOs that distinguishes between structural, procedural, and operational restrictions. I argue that these types of restrictions are governed by different causal mechanisms. Structural restrictions are relatively stable over time and effect deployment decisions irrespective of other factors. Procedural restrictions, on the other hand, can constitute veto points against deployment only in combination with distinct political preferences. Finally, operational restrictions directly affect the rules of engagement of troop contributing countries. The article illustrates the three types of restrictions and their interaction with empirical examples from a range of countries and sketches their impact on MMO deployment decisions and mandates.  相似文献   
327.
This article examines the evolution of the current British military joint intelligence doctrine. We argue that military intelligence doctrine is dogged by an intrinsic tension between the ethos and expectations of military doctrine and those of the professional practice of intelligence. We further argue not only that prior iterations of UK joint intelligence doctrine failed to effectively deal with this intelligence doctrine dilemma, but also that measures in the current doctrine to address this problem directly created their own problems. Moreover, as a result, otherwise sound innovations in the current UK intelligence doctrine have proven unsuitable to wider diffusion in more recent intelligence doctrine such as the new NATO intelligence doctrine which, otherwise, draws extensively on its British precursor.  相似文献   
328.
The article outlines the essential role of free play elements in various types of exercises for the development of in-depth and practical military professionalism. It thereafter argues why such use of free play contradicts the military science founded Russian Way of War.  相似文献   
329.
Today, few countries fight alone; most fight as allies or partners in multilateral campaigns. The end of the Cold War opened a window of opportunity for multinational military operations (MMOs). These have seen varying degrees of participation, enthusiasm, and success. This special forum is devoted to the politics of multilateral warfare including their formation, maintenance, and durability. The introduction sketches past research and derives some key questions of continuing relevance. The contributions shed light on the domestic and international politics of MMOs, focusing on the implementation of national restrictions and their repercussions for MMOs, party politics of military intervention, the conditions under which states decide to defect from military operations, and the role of junior partners in MMOs. In sum, this forum offers a fresh look at the politics of MMOs, including conceptual contributions to the study of national restrictions, domestic constraints, and coalition warfare.  相似文献   
330.
To engage properly with the Somali National Army, to understand it in the hope of improving stability and the lives of over 12 million Somalis, good basic information on its composition and characteristics is necessary. Authoritative accounts on the subject have been scarce for over 25 years. This account seeks to detail the army’s dispositions across southern Somalia, and, more importantly, the brigades’ clan compositions and linkages. Clan ties supersede loyalties to the central government. The army as it stands is a collection of former militias which suffer from ill-discipline and commit crime along with greater atrocities. Estimates of numbers are unreliable, but there might be 13,000 or more fighters in six brigades in the Mogadishu area and five beyond.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号