首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   414篇
  免费   111篇
  国内免费   12篇
  2024年   1篇
  2023年   1篇
  2022年   6篇
  2021年   6篇
  2020年   6篇
  2019年   15篇
  2018年   10篇
  2017年   22篇
  2016年   28篇
  2015年   24篇
  2014年   23篇
  2013年   74篇
  2012年   23篇
  2011年   30篇
  2010年   29篇
  2009年   30篇
  2008年   30篇
  2007年   36篇
  2006年   24篇
  2005年   21篇
  2004年   25篇
  2003年   13篇
  2002年   17篇
  2001年   12篇
  2000年   12篇
  1999年   5篇
  1998年   4篇
  1997年   1篇
  1996年   3篇
  1992年   2篇
  1990年   2篇
  1989年   2篇
排序方式: 共有537条查询结果,搜索用时 15 毫秒
211.
运用九故障信息标记(X,D,M,R,E,Q,T,P,U),提出了加速扇出重汇聚引线临界性计算的一种故障模拟新方法,理论分析表明该方法是有效的。  相似文献   
212.
道路或区域通行限制在日常交通和部队兵力机动过程中普遍存在。通行限制情况下的最短路径问题属于时变道路网最短路径研究的范畴,对时变道路网最短路径算法及算法效率的研究有着广泛而现实的意义。重点讨论了道路网的模型描述、时变道路网拓扑结构的构建技术,最短路径算法的高效实现等内容,并给出了该算法的应用实例。试验结果显示,该算法有效可行。  相似文献   
213.
在无人机多机协同路径规划中,采用V orono i图方法,引入协同变量和协同函数,产生关于已知威胁的路径,使各架无人机能够同时到达目标。在此基础上,利用集合点规划状态图,针对作战过程中的突发威胁实时进行路径规划,从而得到各架飞机的几何路径。仿真结果表明集合点规划状态图的使用对于无人机多机协同路径规划中的突发威胁问题的求解是有效的。  相似文献   
214.
We consider the problem of service rate control of a single‐server queueing system with a finite‐state Markov‐modulated Poisson arrival process. We show that the optimal service rate is nondecreasing in the number of customers in the system; higher congestion levels warrant higher service rates. On the contrary, however, we show that the optimal service rate is not necessarily monotone in the current arrival rate. If the modulating process satisfies a stochastic monotonicity property, the monotonicity is recovered. We examine several heuristics and show where heuristics are reasonable substitutes for the optimal control. None of the heuristics perform well in all the regimes and the fluctuation rate of the modulating process plays an important role in deciding the right heuristic. Second, we discuss when the Markov‐modulated Poisson process with service rate control can act as a heuristic itself to approximate the control of a system with a periodic nonhomogeneous Poisson arrival process. Not only is the current model of interest in the control of Internet or mobile networks with bursty traffic, but it is also useful in providing a tractable alternative for the control of service centers with nonstationary arrival rates. © 2013 Wiley Periodicals, Inc. Naval Research Logistics 60: 661–677, 2013  相似文献   
215.
Most modern processes involve multiple quality characteristics that are all measured on attribute levels, and their overall quality is determined by these characteristics simultaneously. The characteristic factors usually correlate with each other, making multivariate categorical control techniques a must. We study Phase I analysis of multivariate categorical processes (MCPs) to identify the presence of change‐points in the reference dataset. A directional change‐point detection method based on log‐linear models is proposed. The method exploits directional shift information and integrates MCPs into the unified framework of multivariate binomial and multivariate multinomial distributions. A diagnostic scheme for identifying the change‐point location and the shift direction is also suggested. Numerical simulations are conducted to demonstrate the detection effectiveness and the diagnostic accuracy.© 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
216.
We consider a robust shortest path problem when the cost coefficient is the product of two uncertain factors. We first show that the robust problem can be solved in polynomial time by a dual‐variable enumeration with shortest path problems as subproblems. We also propose a path enumeration approach using a K ‐shortest paths finding algorithm that may be efficient in many real cases. An application in hazardous materials transportation is discussed, and the solution methods are illustrated by numerical examples. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
217.
In this article, we study a queueing system serving multiple classes of customers. Each class has a finite‐calling population. The customers are served according to the preemptive‐resume priority policy. We assume general distributions for the service times. For each priority class, we derive the steady‐state system size distributions at departure/arrival and arbitrary time epochs. We introduce the residual augmented process completion times conditioned on the number of customers in the system to obtain the system time distribution. We then extend the model by assuming that the server is subject to operation‐independent failures upon which a repair process with random duration starts immediately. We also demonstrate how setup times, which may be required before resuming interrupted service or picking up a new customer, can be incorporated in the model. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
218.
219.

As we enter the 21st Century, technologies originally developed for defense purposes such as computers and satellite communications appear to have become a driving force behind economic growth in the United States. Paradoxically, almost all previous econometric models suggest that the largely defense‐oriented federal industrial R&;D funding that helped create these technologies had no discernible effect on U.S. industrial productivity growth. This paper addresses this paradox by stressing that defense procurement as well as federal R&;D expenditures were targeted to a few narrowly defined manufacturing sub‐sectors that produced high tech weaponry. Analysis employing data from the NBER Manufacturing Productivity Database and the BEA’ s Input Output tables then demonstrates that defense procurement policies did have significant effects on the productivity performance of disaggregated manufacturing industries because of a process of procurement‐driven technological change.  相似文献   
220.
In this paper we develop an empirical model for transnational terrorist activity for a panel consisting of 139 countries over the period 1985–1998. Essentially, we attempt to sketch the profile of the average terrorist attack venue. Our findings suggest that the terrorist attack venue is, on average, characterized by low economic openness, high demographic stress, and a high level of international disputes. Furthermore, we document a strong regional component suggesting the presence of infectious contagion on a spatial level. Our results also support the presence of addictive contagion captured by a strong autoregressive component in each country’s terrorist activity. Finally, we find a weak statistical link between the level of democracy and terrorist activity, although the level of democracy is a significant determinant of the potential under‐reporting bias of terrorist activity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号