全文获取类型
收费全文 | 528篇 |
免费 | 60篇 |
国内免费 | 20篇 |
出版年
2023年 | 1篇 |
2022年 | 5篇 |
2021年 | 9篇 |
2020年 | 15篇 |
2019年 | 6篇 |
2018年 | 11篇 |
2017年 | 24篇 |
2016年 | 18篇 |
2015年 | 12篇 |
2014年 | 44篇 |
2013年 | 38篇 |
2012年 | 36篇 |
2011年 | 44篇 |
2010年 | 35篇 |
2009年 | 35篇 |
2008年 | 43篇 |
2007年 | 39篇 |
2006年 | 28篇 |
2005年 | 39篇 |
2004年 | 20篇 |
2003年 | 28篇 |
2002年 | 17篇 |
2001年 | 18篇 |
2000年 | 9篇 |
1999年 | 10篇 |
1998年 | 4篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1995年 | 4篇 |
1994年 | 2篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 5篇 |
1989年 | 2篇 |
排序方式: 共有608条查询结果,搜索用时 15 毫秒
181.
设计是作战行动筹划的重要步骤,精确工程保障需要对工程保障行动进行精密的设计和精确管理与控制。科学管理采用科学实验的方法,通过劳动方法标准化和差别计件工资制度,有效提高了工作效率,其基本原理经过百余年的实际检验,被证明是一个成熟有效的管理方法。借鉴科学管理理论,需要对工程保障行动进行动作研究,进而研究工程保障行动的作业标准,以期提高其保障效率。精益管理是在科学管理在新的历史时期的发展与改进,它使用了准时制、零库存、均衡生产、持续改进等先进的管理理念和六西格玛管理、成组技术等先进技术,为基于信息系统体系作战的工程保障能力生成提供了有益的借鉴,可加深我们对精确工程保障的理解,促进精确工程保障研究的可操作性。 相似文献
182.
美国网络安全战略管理体系分析 总被引:1,自引:0,他引:1
文章从美国政府颁布的政策文件、法律法规和各机构部门的职能三个方面,对美国网络安全战略管理体系进行了介绍和分析。 相似文献
183.
针对红外观测站部署问题,在研究观测站位置对定位精度影响的基础上,提出了基于粒子群优化的观测站部署算法。首先对ECEF坐标系下的CRLB矩阵进行推导;然后将观测站优化部署问题抽象为非线性规划模型,并将红外传感器联合定位的CRLB作为目标函数;最后采用粒子群优化算法求解该模型,避免了传统的非线性规划算法需要求解目标函数梯度的难题。结果表明,本文的部署算法具有一定的理论依据和工程意义;可以为实际红外观测站的静态部署和动态部署提供参考。 相似文献
184.
王洪军 《中国人民武装警察部队学院学报》2014,(5):25-27
部队战斗力的生成和提高主要依靠平时的军事训练来实现。根据公安警卫部队当前任务实际,着眼新形势下的警卫任务执勤需要,就警卫部队训练对象的层级划分和具体训练目标、训练科目和内容、训练管理体制的建立与完善等问题进行探讨。 相似文献
185.
李振华 《中国人民武装警察部队学院学报》2014,(7):68-71
网络信息管理是新形势下部队管理工作的一项重要内容,对于促进官兵全面发展、加强部队行政管理、提升信息化建设具有重要意义,加强部队网络信息管理必须遵循共享与防范相结合、标本兼治和网络信息技术与官兵素质同步提高规律,从组织领导、官兵思想、安全防护、制度落实和网管人员建设五个方面构筑部队网络信息管理有效策略. 相似文献
186.
杜静 《武警工程学院学报》2014,(3):92-95
《基层管理》课程的实践性、应用性特点明显。在任职教育教学过程中运用研讨式教学法,将有助于促进教员与学员之间的互动,增强课程的吸引力和实效性。教员要转变传统的教学观念,深入研究学员的思想状况,灵活巧妙地运用研讨式教学方法,提高有任职经历学员的理论水平,提高学员素质与能力。 相似文献
187.
We consider a capacitated inventory model with flexible delivery upgrades, in which the seller allocates its on‐hand inventory to price‐ and delivery‐time‐sensitive customers. The seller has two decisions: inventory commitment and replenishment. The former addresses how the on‐hand inventories are allocated between the two classes of customers within an inventory cycle. The latter addresses how the inventory is replenished between inventory cycles. We develop optimal inventory allocation, upgrade, and replenishment policies and demonstrate that the optimal policy can be characterized by a set of switching curves. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 418–426, 2014 相似文献
188.
We study a supply chain in which an original equipment manufacturer (OEM) and a contract manufacturer (CM) compete in the finished goods market. The OEM can decide whether to outsource the intermediate good, a critical component for producing the finished good, from the CM or make in‐house production. Technology transition improves the CM's production efficiency, and it can take two different forms: a direct technology transfer from the OEM to the CM or technology spillovers through outsourcing from the OEM to the CM. We document the possibility of strategic outsourcing, that is, the CM supplies the intermediate good to the OEM when she is less efficient than the OEM's in‐house production. We find that technology spillovers can strengthen the incentive for strategic outsourcing. Furthermore, compared with direct technology transfers, outsourcing coupled with technology spillovers may generate more technology transition. Outsourcing is a particularly appropriate channel for implicit collusion when the OEM is not very efficient with the production of the intermediate good. Our results suggest that ex post competition on the finished goods can create room for ex ante collaboration and provide some implications on the OEM's outsourcing strategies when facing a competitive CM.© 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 501–514, 2014 相似文献
189.
We consider the problem of assessing the value of demand sharing in a multistage supply chain in which the retailer observes stationary autoregressive moving average demand with Gaussian white noise (shocks). Similar to previous research, we assume each supply chain player constructs its best linear forecast of the leadtime demand and uses it to determine the order quantity via a periodic review myopic order‐up‐to policy. We demonstrate how a typical supply chain player can determine the extent of its available information in the presence of demand sharing by studying the properties of the moving average polynomials of adjacent supply chain players. The retailer's demand is driven by the random shocks appearing in the autoregressive moving average representation for its demand. Under the assumptions we will make in this article, to the retailer, knowing the shock information is equivalent to knowing the demand process (assuming that the model parameters are also known). Thus (in the event of sharing) the retailer's demand sequence and shock sequence would contain the same information to the retailer's supplier. We will show that, once we consider the dynamics of demand propagation further up the chain, it may be that a player's demand and shock sequences will contain different levels of information for an upstream player. Hence, we study how a player can determine its available information under demand sharing, and use this information to forecast leadtime demand. We characterize the value of demand sharing for a typical supply chain player. Furthermore, we show conditions under which (i) it is equivalent to no sharing, (ii) it is equivalent to full information shock sharing, and (iii) it is intermediate in value to the two previously described arrangements. Although it follows from existing literature that demand sharing is equivalent to full information shock sharing between a retailer and supplier, we demonstrate and characterize when this result does not generalize to upstream supply chain players. We then show that demand propagates through a supply chain where any player may share nothing, its demand, or its full information shocks (FIS) with an adjacent upstream player as quasi‐ARMA in—quasi‐ARMA out. We also provide a convenient form for the propagation of demand in a supply chain that will lend itself to future research applications. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 515–531, 2014 相似文献
190.
Romain Esmenjaud 《African Security Review》2014,23(2):172-177
The creation of an African Capacity for Immediate Response to Crisis (ACIRC) is a sign of Africa's willingness to take its destiny into its own hands. Presented as a reaction to the slowness of the development of the African Standby Force (ASF), it is also a response to some of the ASF's conceptual weaknesses. This decision reflects a wish to establish an instrument better equipped to deal with the challenges Africa is facing. Departing from the (sub)regional logic of the ASF results from a desire to take into account the transnational nature of threats, while its enlarged mandate is meant to offer Africa the capacity to intervene in all kinds of conflicts, including by undertaking peace enforcement activities. But the obstacles on the road towards the actual creation and mobilisation of this capacity should not be underestimated. These include material difficulties, but also political tensions, between ‘small’ and ‘big’ states as well as between the African Union and subregional organisations. The risk then is high that the ACIRC, whose announcement came as a reaction to France's intervention in Mali, ends up joining the ranks of the many ‘anti-imperialist’ phantoms haunting the history of the Organization of African Unity/African Union (OAU/AU). Confronted by events considered ‘neocolonial’ initiatives, African actors have indeed traditionally reacted by launching grand projects that never got off the ground. However, by actually establishing this new instrument, they may also demonstrate that times have definitively changed. 相似文献