首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   504篇
  免费   34篇
  国内免费   6篇
  2023年   1篇
  2022年   1篇
  2021年   8篇
  2020年   7篇
  2019年   16篇
  2018年   18篇
  2017年   33篇
  2016年   36篇
  2015年   22篇
  2014年   40篇
  2013年   133篇
  2012年   19篇
  2011年   38篇
  2010年   22篇
  2009年   24篇
  2008年   15篇
  2007年   13篇
  2006年   19篇
  2005年   23篇
  2004年   13篇
  2003年   12篇
  2002年   8篇
  2001年   3篇
  2000年   6篇
  1999年   3篇
  1998年   2篇
  1997年   3篇
  1995年   2篇
  1992年   1篇
  1990年   3篇
排序方式: 共有544条查询结果,搜索用时 1 毫秒
411.
防火间距设计是建筑工程消防安全设计中很重要的一项内容。通过相同高度两相邻民用建筑防火间距设计工程实例,结合国家现行《建筑设计防火规范》中的有关规定,探讨了《建筑设计防火规范》对相同高度两相邻建筑防火间距设计要求方面存在的问题。  相似文献   
412.
This article investigates optimal static prices for a finite capacity queueing system serving customers from different classes. We first show that the original multi‐class formulation in which the price for each class is a decision variable can be reformulated as a single dimensional problem with the total load as the decision variable. Using this alternative formulation, we prove an upper bound for the optimal arrival rates for a fairly large class of queueing systems and provide sufficient conditions that ensure the existence of a unique optimal arrival rate vector. We show that these conditions hold for M/M/1/m and M/G/s/s systems and prove structural results on the relationships between the optimal arrival rates and system capacity. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
413.
In this article we explore how two competing firms locate and set capacities to serve time‐sensitive customers. Because customers are time‐sensitive, they may decline to place an order from either competitor if their expected waiting time is large. We develop a two‐stage game where firms set capacities and then locations, and show that three types of subgame perfect equilibria are possible: local monopoly (in which each customer is served by a single firm, but some customers may be left unserved), constrained local monopoly (in which firms serve the entire interval of customers but do not compete with each other), and constrained competition (in which firms also serve the entire interval of customers, but now compete for some customers). We perform a comparative statics analysis to illustrate differences in the equilibrium behavior of a duopolist and a coordinated monopolist. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
414.
数字化坦克营作战能力灰色聚类评估   总被引:1,自引:0,他引:1  
评估数字化坦克营的作战能力对推动数字化装甲部队建设、提高部队战斗力具有一定的现实意义。以灰色系统理论为基础,将层次分析法和灰色评估法相结合,建立了数字化坦克营的灰色聚类评估模型,论述了利用该模型进行评估的基本步骤,结合实例对数字化坦克营作战能力进行了聚类评估,提出了提高数字化坦克营作战能力的方法。评估结果比较符合实际情况,证明了该模型的正确性。  相似文献   
415.
建筑消防供水系统中,当消防水箱不能满足静压要求时,应设增压设施。给出了稳压增压装置气压罐调节容积及气压罐容积的计算方法,分析了水枪和喷头实际出水量大于规范中的额定值、工况点的选择和增压水泵的出水量等规范中存在的问题。  相似文献   
416.
概述了智能建筑的概念和火灾自动报警系统的关系,进而阐述了智能建筑中火灾自动报警系统要进行性能化设计的原因、方法和应着重注意的通信协议问题。  相似文献   
417.
本文阐述了军校开展基金项目研究的重要性,论证了军校申报科学基金项目的可行性,探讨了获取基金项目立项工作的基础和有效途径,并针对军校特点,提出了加强基金申报工作的切实可行的措施和策略。  相似文献   
418.
战损装备维修保障仿真及能力评估   总被引:1,自引:0,他引:1  
阐述了利用仿真方法进行维修能力评估的重要性和必要性,分析了战场装备维修保障活动的主要内容,建立了基于计算机的装备维修保障过程仿真模型,提出了评估装备维修保障能力的几个指标,同时还给出了某次战斗装备损坏与维修保障能力评估的示例。  相似文献   
419.
This article explains why Singapore, despite its small size and semi-authoritarian regime, retains one of the best military forces in the Indo-Pacific. It unpacks Singapore’s ability to continuously innovate since the 1960s – technologically, organizationally, and conceptually – and even recently joined the Revolution in Military Affairs bandwagon. Drawing from the broader military innovation studies literature, this article argues evolutionary peacetime military innovation is more likely to occur in a state with a unified civil–military relation and whose military faces a high-level diverse set of threats. This argument explains how the civil–military fusion under the People’s Action Party-led government since Singapore’s founding moment has been providing coherent and consistent strategic guidance, political support, and financial capital, allowing the Singapore Armed Forces to continuously innovate in response to high levels and diversity of threats.  相似文献   
420.
This work is about how the United States military has become dependent on networked technology. As arguably the largest contributor to national security, it has become so dependent that its chief doctrine integrates networked technology into nearly every specialty, with particularly intense focus on Network Centric Warfare. As the military’s old guard is replaced by the highly technical Millenial Generation, there is cause to pause when assuming this techno-acuity brings nothing but advantage and success. Vulnerabilities stemming from such extensive dependence offer opportunities for exploitation that have not gone unnoticed. The first step to moving forward from this point is to fully understand the extent to which the military has become dependent on computer networks. It might be the Millenials’ war today, but it would be quite unwise for the United States military to think about it and fight it in a purely Millenial way.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号