首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   219篇
  免费   126篇
  国内免费   10篇
  355篇
  2024年   1篇
  2023年   1篇
  2022年   1篇
  2021年   3篇
  2020年   1篇
  2019年   3篇
  2018年   4篇
  2017年   23篇
  2016年   26篇
  2015年   20篇
  2014年   27篇
  2013年   47篇
  2012年   16篇
  2011年   13篇
  2010年   15篇
  2009年   11篇
  2008年   12篇
  2007年   12篇
  2006年   11篇
  2005年   16篇
  2004年   13篇
  2003年   7篇
  2002年   9篇
  2001年   11篇
  2000年   9篇
  1999年   14篇
  1998年   6篇
  1997年   7篇
  1996年   2篇
  1995年   2篇
  1994年   3篇
  1993年   2篇
  1992年   1篇
  1991年   2篇
  1990年   2篇
  1989年   1篇
  1988年   1篇
排序方式: 共有355条查询结果,搜索用时 15 毫秒
101.
LabWindows/CVI环境下的仪器驱动器开发   总被引:1,自引:0,他引:1  
研究了VPP下的仪器驱动器、软面板和安装程序等的功能和特性,并结合寄存器基VXI多路开关模块的研制,说明了在LabWindows/CVI环境下开发仪器驱动器的一般方法与研制过程.  相似文献   
102.
We consider the problem of assessing the value of demand sharing in a multistage supply chain in which the retailer observes stationary autoregressive moving average demand with Gaussian white noise (shocks). Similar to previous research, we assume each supply chain player constructs its best linear forecast of the leadtime demand and uses it to determine the order quantity via a periodic review myopic order‐up‐to policy. We demonstrate how a typical supply chain player can determine the extent of its available information in the presence of demand sharing by studying the properties of the moving average polynomials of adjacent supply chain players. The retailer's demand is driven by the random shocks appearing in the autoregressive moving average representation for its demand. Under the assumptions we will make in this article, to the retailer, knowing the shock information is equivalent to knowing the demand process (assuming that the model parameters are also known). Thus (in the event of sharing) the retailer's demand sequence and shock sequence would contain the same information to the retailer's supplier. We will show that, once we consider the dynamics of demand propagation further up the chain, it may be that a player's demand and shock sequences will contain different levels of information for an upstream player. Hence, we study how a player can determine its available information under demand sharing, and use this information to forecast leadtime demand. We characterize the value of demand sharing for a typical supply chain player. Furthermore, we show conditions under which (i) it is equivalent to no sharing, (ii) it is equivalent to full information shock sharing, and (iii) it is intermediate in value to the two previously described arrangements. Although it follows from existing literature that demand sharing is equivalent to full information shock sharing between a retailer and supplier, we demonstrate and characterize when this result does not generalize to upstream supply chain players. We then show that demand propagates through a supply chain where any player may share nothing, its demand, or its full information shocks (FIS) with an adjacent upstream player as quasi‐ARMA in—quasi‐ARMA out. We also provide a convenient form for the propagation of demand in a supply chain that will lend itself to future research applications. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 515–531, 2014  相似文献   
103.
This paper provides a political economy analysis of the evolution of unmanned aerial vehicles (UAV), or ‘drones’ in the USA. Focus is placed on the interplay between the polity and private economic influences, and their impact on the trajectory of political, economic, and military outcomes. We identify the initial formation of the drone industry, trace how the initial relationships between the military and the private sector expanded over time, and discuss present relationships. Understanding the historical evolution of UAV technology, as well as the major players in the industry today, is important for ongoing policy debates regarding the use of drones both domestically and internationally.  相似文献   
104.
Secret French plans to launch guerrilla-style raids on the British Isles devised in the spring of 1796 were referred to as ‘chouanneries’. The name and concept behind these small-war operations were modelled on the irregular tactics used by the Chouan rebels in the Vendée, which the French state army had brutally quashed, but some wished to transfer into their institutional practice. Part of France's ongoing military strategy in the war against Britain, which included fomenting insurrection in Ireland, these irregular operations were to be manned partially by pardoned deserters and released convicts and prisoners of war. Of these, only Tate's brief invasion of Wales in 1797 was realised, but the surviving plans provide insightful historical lessons into an Anglophobic mindset shared by a small network of practitioners and policy deciders on the effectiveness of such shock and awe tactics. Largely motivated by the desire to take revenge for Britain's support of counter-revolutionaries in the Vendée, these plans could more aptly be referred to as counter-‘chouanneries’.  相似文献   
105.
This article modifies the associations made by historians and political scientists of Spanish guerrilla warfare with revolutionary insurgency. First, it explains how the guerrilla phenomenon moved from a Leftist to a reactionary symbol. Second, it compares the insurgency and counter-insurgency features of the Carlist War (1833–1840) with those of the better-known Peninsular War (1808–1814). Third, it shows how erstwhile guerrilla leaders during the Carlist War made their expertise available to the counter-insurgency, in a socio-economic as well as military setting. This article revises the social banditry paradigm in nineteenth-century Spain in the under-researched context of Europe bloodiest nineteenth-century civil war.  相似文献   
106.
设计是作战行动筹划的重要步骤,精确工程保障需要对工程保障行动进行精密的设计和精确管理与控制。科学管理采用科学实验的方法,通过劳动方法标准化和差别计件工资制度,有效提高了工作效率,其基本原理经过百余年的实际检验,被证明是一个成熟有效的管理方法。借鉴科学管理理论,需要对工程保障行动进行动作研究,进而研究工程保障行动的作业标准,以期提高其保障效率。精益管理是在科学管理在新的历史时期的发展与改进,它使用了准时制、零库存、均衡生产、持续改进等先进的管理理念和六西格玛管理、成组技术等先进技术,为基于信息系统体系作战的工程保障能力生成提供了有益的借鉴,可加深我们对精确工程保障的理解,促进精确工程保障研究的可操作性。  相似文献   
107.
随着通用航空及无人机产业的发展,低成本及小型化的导航解决方案将具有广泛的市场。提出了一种基于单频GPS接收机的自迭代定位算法,用于提高定位精度,增强定位收敛性。对该算法的基本原理进行了分析,并推导出该算法的数学模型,通过静态实验的方法对该算法的收敛性进行验证,并将该算法的位置信息与最小二乘法解出的位置信息进行对比,体现了自迭代定位算法的优势。  相似文献   
108.
This article proposes an approximation for the blocking probability in a many‐server loss model with a non‐Poisson time‐varying arrival process and flexible staffing (number of servers) and shows that it can be used to set staffing levels to stabilize the time‐varying blocking probability at a target level. Because the blocking probabilities necessarily change dramatically after each staffing change, we randomize the time of each staffing change about the planned time. We apply simulation to show that (i) the blocking probabilities cannot be stabilized without some form of randomization, (ii) the new staffing algorithm with randomiation can stabilize blocking probabilities at target levels and (iii) the required staffing can be quite different when the Poisson assumption is dropped. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 177–202, 2017  相似文献   
109.
This article explores a perennial theme in the literature of strategic studies: the relationship between military theory and the military profession. It begins with a conceptual analysis of this relationship. It then investigates what military theorists themselves have had to say about the utility of their craft. It concludes by assessing the actual influence of military theory on selected individuals and institutions. The individuals are George S. Patton, Jr., and Ulysses S. Grant. The institutions are the United States Army and the United States Air Force in the late twentieth century. The fundamental finding is suggested in the title: military theory can indeed be quite useful in the maturation of military commanders and in the development of martial institutions, but it is not always necessary and by no means perfect. It should thus be studied assiduously but used with caution.  相似文献   
110.
对装备保障抽组力量的物资装载问题进行了数学描述,建立了以实现全部物资尽量分散装载为目标,以同类物资集中装载、车辆承载物资总体积不超过车辆有效容积、车辆承载物资总重量不超过车辆标记载重量、物资必须装载且不被重复装载等为主要约束的数学模型,并进行了求解.最后通过实例解算验证了模型的有效性.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号