首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   515篇
  免费   325篇
  国内免费   54篇
  2024年   2篇
  2023年   7篇
  2022年   11篇
  2021年   14篇
  2020年   15篇
  2019年   8篇
  2018年   9篇
  2017年   33篇
  2016年   40篇
  2015年   41篇
  2014年   56篇
  2013年   62篇
  2012年   47篇
  2011年   49篇
  2010年   39篇
  2009年   35篇
  2008年   38篇
  2007年   45篇
  2006年   42篇
  2005年   31篇
  2004年   45篇
  2003年   26篇
  2002年   27篇
  2001年   27篇
  2000年   21篇
  1999年   23篇
  1998年   19篇
  1997年   16篇
  1996年   10篇
  1995年   8篇
  1994年   11篇
  1993年   7篇
  1992年   9篇
  1991年   5篇
  1990年   6篇
  1989年   8篇
  1988年   1篇
  1987年   1篇
排序方式: 共有894条查询结果,搜索用时 15 毫秒
291.
We consider the problem of assessing the value of demand sharing in a multistage supply chain in which the retailer observes stationary autoregressive moving average demand with Gaussian white noise (shocks). Similar to previous research, we assume each supply chain player constructs its best linear forecast of the leadtime demand and uses it to determine the order quantity via a periodic review myopic order‐up‐to policy. We demonstrate how a typical supply chain player can determine the extent of its available information in the presence of demand sharing by studying the properties of the moving average polynomials of adjacent supply chain players. The retailer's demand is driven by the random shocks appearing in the autoregressive moving average representation for its demand. Under the assumptions we will make in this article, to the retailer, knowing the shock information is equivalent to knowing the demand process (assuming that the model parameters are also known). Thus (in the event of sharing) the retailer's demand sequence and shock sequence would contain the same information to the retailer's supplier. We will show that, once we consider the dynamics of demand propagation further up the chain, it may be that a player's demand and shock sequences will contain different levels of information for an upstream player. Hence, we study how a player can determine its available information under demand sharing, and use this information to forecast leadtime demand. We characterize the value of demand sharing for a typical supply chain player. Furthermore, we show conditions under which (i) it is equivalent to no sharing, (ii) it is equivalent to full information shock sharing, and (iii) it is intermediate in value to the two previously described arrangements. Although it follows from existing literature that demand sharing is equivalent to full information shock sharing between a retailer and supplier, we demonstrate and characterize when this result does not generalize to upstream supply chain players. We then show that demand propagates through a supply chain where any player may share nothing, its demand, or its full information shocks (FIS) with an adjacent upstream player as quasi‐ARMA in—quasi‐ARMA out. We also provide a convenient form for the propagation of demand in a supply chain that will lend itself to future research applications. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 515–531, 2014  相似文献   
292.
This article modifies the associations made by historians and political scientists of Spanish guerrilla warfare with revolutionary insurgency. First, it explains how the guerrilla phenomenon moved from a Leftist to a reactionary symbol. Second, it compares the insurgency and counter-insurgency features of the Carlist War (1833–1840) with those of the better-known Peninsular War (1808–1814). Third, it shows how erstwhile guerrilla leaders during the Carlist War made their expertise available to the counter-insurgency, in a socio-economic as well as military setting. This article revises the social banditry paradigm in nineteenth-century Spain in the under-researched context of Europe bloodiest nineteenth-century civil war.  相似文献   
293.
测距精度是评估卫星自主完好性监测接收机在导航信号畸变环境下工作性能的一个重要指标。推导了卫星自主完好性监测接收机在国际民航组织二阶阶跃畸变模型下采用早晚相干跟踪处理时测距精度与畸变模型参数的解析表达式,理论分析和仿真结果表明数字畸变将导致接收机伪码鉴相器输出曲线存在过零点偏差,数字畸变量基本不影响接收机测距方差;模拟畸变将扭曲相关峰函数和鉴相器输出曲线,但鉴相器输出基本上不存在过零点偏差,模拟畸变参数、前端滤波器带宽和早晚码间距共同影响接收机的测距方差。  相似文献   
294.
This paper provides a political economy analysis of the evolution of unmanned aerial vehicles (UAV), or ‘drones’ in the USA. Focus is placed on the interplay between the polity and private economic influences, and their impact on the trajectory of political, economic, and military outcomes. We identify the initial formation of the drone industry, trace how the initial relationships between the military and the private sector expanded over time, and discuss present relationships. Understanding the historical evolution of UAV technology, as well as the major players in the industry today, is important for ongoing policy debates regarding the use of drones both domestically and internationally.  相似文献   
295.
If international terrorism is on a rising trend, an important source of confirmation or refutation of this is time‐series data on terrorist activity. Using chiefly data collected by the RAND/MIPT consortium we show using basic statistical analysis that in the period 1968–2005 the yearly number of all international terrorist incidents shows no trend over time, but fluctuates year on year in a random manner. On the other hand some indicators do show a definite trend over time, principally the steady rise in the number of incidents that are death‐dealing in nature. A further conclusion is drawn, showing that the proportion of these incidents leading to deaths above a given level is virtually fixed.  相似文献   
296.
“Lack of money is the root of all evil”

George Bernard Shaw

In a environment where party financing, private funding in particular, is generally a laissez-faire business, as in most Southern African countries, there is the real risk that interest groups and wealthy individuals will buy influence in political parties and in so doing erode public confidence in the political system. Because they are neither open to public scrutiny nor subject to any legislative restraints, huge private donations can, and often do, come with strings attached. This lack of transparency and openness, as well as mechanisms to prevent it, provides ample ground for influence peddling, where those who pay the piper call the tune. Left unchecked, this party funding scenario will continue to be a serious indictment of the region's democratisation projects, crippling democracy and stunting economic development. This article consid  相似文献   
297.
针对云重心和云模型评判方法存在的信息丢失、难于评判以及信息扭曲等问题,从确定权重等级、评价集和评价结果3个方面对模型进行了改进和完善.应用二元语义确定指标权重,避免了评价信息的丢失和扭曲,采用综合云的思想确定评价集,充分利用评价者给出的信息,简化相似云的理论来定量衡量评价结果,从而建立了基于云理论一二元语义的雷达装备保障指挥效能评估模型.  相似文献   
298.
地球外部空间扰动引力并行计算   总被引:1,自引:0,他引:1  
针对传统的司托克斯积分方法计算量大、模型复杂的缺点,通过将地球球面以适当的经纬度差进行划分及合理简化,实现了司托克斯积分法计算外部空间扰动引力的积分方程的离散化,建立了地球扰动引力的快速计算模型,并在快速计算模型的基础上采用并行计算技术,实现扰动引力的实时计算。仿真结果表明,提出的快速并行计算模型能较好地实现地球扰动引力的快速、高精度计算。  相似文献   
299.
一体化联合作战参战军兵种多、指挥控制(C2)与协调复杂。围绕炮兵行动特点要求,运用系统动力学理论建立联合作战炮兵行动指挥控制的系统动力学模型,研究常规打击和基于效果作战两种指挥控制模式下炮兵行动所产生的不同结果及其原因,并给合作战想定仿真验证,得出较为可靠的结论,为解决联合作战炮兵行动精确指挥控制与协调提供一种有效途径  相似文献   
300.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号