全文获取类型
收费全文 | 593篇 |
免费 | 114篇 |
国内免费 | 126篇 |
专业分类
833篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2022年 | 4篇 |
2021年 | 11篇 |
2020年 | 11篇 |
2019年 | 6篇 |
2018年 | 9篇 |
2017年 | 32篇 |
2016年 | 45篇 |
2015年 | 14篇 |
2014年 | 57篇 |
2013年 | 37篇 |
2012年 | 52篇 |
2011年 | 59篇 |
2010年 | 40篇 |
2009年 | 56篇 |
2008年 | 56篇 |
2007年 | 51篇 |
2006年 | 52篇 |
2005年 | 65篇 |
2004年 | 41篇 |
2003年 | 29篇 |
2002年 | 22篇 |
2001年 | 21篇 |
2000年 | 14篇 |
1999年 | 7篇 |
1998年 | 9篇 |
1997年 | 7篇 |
1996年 | 5篇 |
1995年 | 5篇 |
1994年 | 3篇 |
1993年 | 4篇 |
1992年 | 3篇 |
1991年 | 2篇 |
1990年 | 2篇 |
排序方式: 共有833条查询结果,搜索用时 15 毫秒
241.
We consider the problem of assessing the value of demand sharing in a multistage supply chain in which the retailer observes stationary autoregressive moving average demand with Gaussian white noise (shocks). Similar to previous research, we assume each supply chain player constructs its best linear forecast of the leadtime demand and uses it to determine the order quantity via a periodic review myopic order‐up‐to policy. We demonstrate how a typical supply chain player can determine the extent of its available information in the presence of demand sharing by studying the properties of the moving average polynomials of adjacent supply chain players. The retailer's demand is driven by the random shocks appearing in the autoregressive moving average representation for its demand. Under the assumptions we will make in this article, to the retailer, knowing the shock information is equivalent to knowing the demand process (assuming that the model parameters are also known). Thus (in the event of sharing) the retailer's demand sequence and shock sequence would contain the same information to the retailer's supplier. We will show that, once we consider the dynamics of demand propagation further up the chain, it may be that a player's demand and shock sequences will contain different levels of information for an upstream player. Hence, we study how a player can determine its available information under demand sharing, and use this information to forecast leadtime demand. We characterize the value of demand sharing for a typical supply chain player. Furthermore, we show conditions under which (i) it is equivalent to no sharing, (ii) it is equivalent to full information shock sharing, and (iii) it is intermediate in value to the two previously described arrangements. Although it follows from existing literature that demand sharing is equivalent to full information shock sharing between a retailer and supplier, we demonstrate and characterize when this result does not generalize to upstream supply chain players. We then show that demand propagates through a supply chain where any player may share nothing, its demand, or its full information shocks (FIS) with an adjacent upstream player as quasi‐ARMA in—quasi‐ARMA out. We also provide a convenient form for the propagation of demand in a supply chain that will lend itself to future research applications. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 515–531, 2014 相似文献
242.
毕晓华 《中国人民武装警察部队学院学报》2011,(12):82-84
信息化是现代社会经济发展的主要技术力量,也是消防部队发展壮大的有效途径。消防部门要以信息化科技手段规范队伍管理,完善监督程序,提高执法服务水平和部队战斗力,推动消防工作和部队建设。对目前消防部队投入使用或在建的信息化项目进行了分析、总结和归类,提出了"系统化"的构想和框架。 相似文献
243.
徐章遂 《军械工程学院学报》1990,(2)
工程设备的结构日趋复杂,使故障诊断的难度不断增大。本文在最大故障信息量诊断的基础上提出了最大故障信息增量判断准则,可从故障特征群中一次找出最可能的故障点,简化了诊断过程,提高了诊断速度。 相似文献
244.
245.
Sandor Fabian 《Defense & Security Analysis》2019,35(3):308-325
Following Russia’s annexation of Crimea and its initial actions in eastern Ukraine in 2014, the term hybrid warfare has received much public attention. Many have argued that the Russian actions we saw in Ukraine were part of a completely new strategy while others have suggested that there was nothing new in Russia’s actions. This article takes a critical look at these claims. Through the assessment of the history of the term hybrid warfare and a rigorous analysis of the so-called Gerasimov doctrine, this study finds that the Russian hybrid warfare strategy is rather a western myth than a formal comprehensive Russian strategic concept. Additionally, through the assessment of the Russian use of information operations and the way she has utilised the cyberspace in several recent conflicts, the study finds that against all claims Russia did not make these areas its main battlefield, but rather has been using them in support of its traditional concepts. 相似文献
246.
本文通过故障状态-特征的模糊聚类分析,按故障间的相似性对故障进行分类,然后按类别实施故障诊断,可在最少监测点的条件下,获得最多的设备运行故障信息。从而简化故障诊断过程,提高诊断速度和精度。 相似文献
247.
248.
249.
250.
在雷达情报处理系统中,大量采用串口通信方式传输雷达情报。雷达情报串口传输质量是雷达情报处理系统中需要考虑的问题。针对现状,探讨了三种检测和评估串口传输质量的方法即主动方式、被动方式和主被动结合方式,主被动结合检测与评估方法更适合应用于雷达情报处理系统。该方法结合物理层、数据链路层、报文层信息,从误码率、误帧/组率和错报率的角度进行分析,利用串口协议通信服务设备和报文产生器对雷达情报串口传输质量进行检测与评估,已成功应用于实际工程中,收到了较好的效果。 相似文献