全文获取类型
收费全文 | 1711篇 |
免费 | 739篇 |
国内免费 | 170篇 |
出版年
2024年 | 14篇 |
2023年 | 19篇 |
2022年 | 30篇 |
2021年 | 32篇 |
2020年 | 40篇 |
2019年 | 41篇 |
2018年 | 41篇 |
2017年 | 102篇 |
2016年 | 139篇 |
2015年 | 116篇 |
2014年 | 160篇 |
2013年 | 139篇 |
2012年 | 156篇 |
2011年 | 142篇 |
2010年 | 126篇 |
2009年 | 152篇 |
2008年 | 113篇 |
2007年 | 136篇 |
2006年 | 140篇 |
2005年 | 112篇 |
2004年 | 114篇 |
2003年 | 68篇 |
2002年 | 73篇 |
2001年 | 73篇 |
2000年 | 49篇 |
1999年 | 50篇 |
1998年 | 40篇 |
1997年 | 35篇 |
1996年 | 34篇 |
1995年 | 18篇 |
1994年 | 29篇 |
1993年 | 18篇 |
1992年 | 22篇 |
1991年 | 15篇 |
1990年 | 19篇 |
1989年 | 10篇 |
1988年 | 3篇 |
排序方式: 共有2620条查询结果,搜索用时 15 毫秒
821.
杜静 《武警工程学院学报》2014,(3):92-95
《基层管理》课程的实践性、应用性特点明显。在任职教育教学过程中运用研讨式教学法,将有助于促进教员与学员之间的互动,增强课程的吸引力和实效性。教员要转变传统的教学观念,深入研究学员的思想状况,灵活巧妙地运用研讨式教学方法,提高有任职经历学员的理论水平,提高学员素质与能力。 相似文献
822.
823.
陈晓姿 《兵团教育学院学报》2014,(3):75-78
中学作文教学是整个语文教学中十分重要的一环,传统的作文教学方法忽视学生的主体作用,而"写前-写中-写后"三阶段作文教学法突出了语文教师应有的"引导"作用,在作文教学中侧重对学生主体性的调动,让作文教学在语文教师"导"的作用下更好地成为教与学的互动平台,进一步提高学生的写作能力。 相似文献
824.
首先,在研究飞行器背景磁干扰模型与小信号模型的基础上,分析了地磁梯度沿纬度与高度的变化规律,分析可知由于飞行器的机动,地磁梯度会对测量结果造成影响;然后,考虑地磁梯度因素,对原有小信号模型求解方法进行了改进:飞行器在四个航向上做小角度的机动飞行,将地磁场沿纬度与高度的梯度作为未知量,与飞行器磁干扰模型中的剩磁参数、感磁参数和涡磁参数一起求解;最后,利用实测试验数据进行了验证,结果表明:考虑地磁梯度的影响与不考虑地磁梯度的影响相比,求解的模型参数可以在细节上进一步提高飞行器背景磁干扰的补偿效果。 相似文献
825.
Sylvie Kleinman 《Small Wars & Insurgencies》2014,25(4):784-799
Secret French plans to launch guerrilla-style raids on the British Isles devised in the spring of 1796 were referred to as ‘chouanneries’. The name and concept behind these small-war operations were modelled on the irregular tactics used by the Chouan rebels in the Vendée, which the French state army had brutally quashed, but some wished to transfer into their institutional practice. Part of France's ongoing military strategy in the war against Britain, which included fomenting insurrection in Ireland, these irregular operations were to be manned partially by pardoned deserters and released convicts and prisoners of war. Of these, only Tate's brief invasion of Wales in 1797 was realised, but the surviving plans provide insightful historical lessons into an Anglophobic mindset shared by a small network of practitioners and policy deciders on the effectiveness of such shock and awe tactics. Largely motivated by the desire to take revenge for Britain's support of counter-revolutionaries in the Vendée, these plans could more aptly be referred to as counter-‘chouanneries’. 相似文献
826.
A novel gradient approach for optimal design and sensitivity analysis of EWMA control charts
下载免费PDF全文
![点击此处可从《海军后勤学研究》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Conventional control charts are often designed to optimize out‐of‐control average run length (ARL), while constraining in‐control ARL to a desired value. The widely employed grid search approach in statistical process control (SPC) is time‐consuming with unsatisfactory accuracy. Although the simulation‐based ARL gradient estimators proposed by Fu and Hu [Manag Sci 45 (1999), 395–413] can alleviate this issue, it still requires a large number of simulation runs to significantly reduce the variance of gradient estimators. This article proposes a novel ARL gradient estimation approach based on integral equation for efficient analysis and design of control charts. Although this article compares with the results of Fu and Hu [Manag Sci 45 (1999), 395–413] based on the exponentially weighted moving average (EWMA) control chart, the proposed approach has wide applicability as it can generally fit into any control chart with Markovian property under any distributions. It is shown that the proposed method is able to provide a fast, accurate, and easy‐to‐implement algorithm for the design and analysis of EWMA charts, as compared to the simulation‐based gradient estimation method. Moreover, the proposed gradient estimation method facilitates the computation of high‐order derivatives that are valuable in sensitivity analysis. The code is written in Matlab, which is available on request. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 223–237, 2014 相似文献
827.
We consider the burglar problem in which a burglar can either retire or choose among different types of burglaries, with each type having its own success probability and reward distribution. Some general structural results are established and, in the case of exponentially distributed reward distributions, a solution technique is presented. The burglar problem's relationship to a stochastic knapsack problem with a random exponentially distributed knapsack capacity is shown. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 359–364, 2014 相似文献
828.
谢美华 《国防科技大学学报》2014,36(3):36-40
针对非相干背景光辐照二波耦合中参数的最佳匹配设计问题,提出了一种基于随机共振理论的研究方法。首先,文章通过二波耦合过程进行物理机理分析和数值实验分析,证明了该问题在本质上可归结为一种随机共振现象。其次,从随机共振的角度,研究其中的最佳参数设计问题,给出了一种分布处理的最优参数设计流程。按照该方法,在给定增益要求的情况下,先根据信号光饱和与否来确定晶体长度,最后根据非相干光的比例对增益的影响来确定非相干光的比例。仿真实验表明,经过最佳参数设计后,信号的增益和输出信噪比上均有显著提高。 相似文献
829.
We consider the problem of assessing the value of demand sharing in a multistage supply chain in which the retailer observes stationary autoregressive moving average demand with Gaussian white noise (shocks). Similar to previous research, we assume each supply chain player constructs its best linear forecast of the leadtime demand and uses it to determine the order quantity via a periodic review myopic order‐up‐to policy. We demonstrate how a typical supply chain player can determine the extent of its available information in the presence of demand sharing by studying the properties of the moving average polynomials of adjacent supply chain players. The retailer's demand is driven by the random shocks appearing in the autoregressive moving average representation for its demand. Under the assumptions we will make in this article, to the retailer, knowing the shock information is equivalent to knowing the demand process (assuming that the model parameters are also known). Thus (in the event of sharing) the retailer's demand sequence and shock sequence would contain the same information to the retailer's supplier. We will show that, once we consider the dynamics of demand propagation further up the chain, it may be that a player's demand and shock sequences will contain different levels of information for an upstream player. Hence, we study how a player can determine its available information under demand sharing, and use this information to forecast leadtime demand. We characterize the value of demand sharing for a typical supply chain player. Furthermore, we show conditions under which (i) it is equivalent to no sharing, (ii) it is equivalent to full information shock sharing, and (iii) it is intermediate in value to the two previously described arrangements. Although it follows from existing literature that demand sharing is equivalent to full information shock sharing between a retailer and supplier, we demonstrate and characterize when this result does not generalize to upstream supply chain players. We then show that demand propagates through a supply chain where any player may share nothing, its demand, or its full information shocks (FIS) with an adjacent upstream player as quasi‐ARMA in—quasi‐ARMA out. We also provide a convenient form for the propagation of demand in a supply chain that will lend itself to future research applications. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 515–531, 2014 相似文献
830.
Mark Lawrence 《Small Wars & Insurgencies》2014,25(4):843-857
This article modifies the associations made by historians and political scientists of Spanish guerrilla warfare with revolutionary insurgency. First, it explains how the guerrilla phenomenon moved from a Leftist to a reactionary symbol. Second, it compares the insurgency and counter-insurgency features of the Carlist War (1833–1840) with those of the better-known Peninsular War (1808–1814). Third, it shows how erstwhile guerrilla leaders during the Carlist War made their expertise available to the counter-insurgency, in a socio-economic as well as military setting. This article revises the social banditry paradigm in nineteenth-century Spain in the under-researched context of Europe bloodiest nineteenth-century civil war. 相似文献