首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   433篇
  免费   96篇
  国内免费   5篇
  2022年   2篇
  2021年   3篇
  2020年   3篇
  2019年   19篇
  2018年   7篇
  2017年   19篇
  2016年   24篇
  2015年   18篇
  2014年   18篇
  2013年   78篇
  2012年   26篇
  2011年   30篇
  2010年   29篇
  2009年   33篇
  2008年   28篇
  2007年   38篇
  2006年   33篇
  2005年   22篇
  2004年   26篇
  2003年   16篇
  2002年   18篇
  2001年   15篇
  2000年   13篇
  1999年   6篇
  1998年   1篇
  1997年   1篇
  1995年   3篇
  1993年   1篇
  1992年   1篇
  1990年   1篇
  1989年   1篇
  1988年   1篇
排序方式: 共有534条查询结果,搜索用时 15 毫秒
211.
应用评价武器系统效能和全寿命周期费用理论,建立了导弹武器系统效能、费用和费用-效能分析模型。武器系统的费用-效能分析是一项较复杂的系统工程,它综合了系统战术、技术、经济多方面的因素,按优化原则进行处理,比较和权衡,在众多的方案中选出最优化的一种。  相似文献   
212.
利用系统分析的方法对影响装备维修费用的因素做了分析.使用灰色关联分析的方法讨论了影响装备维修费用的主要因素.通过灰色GM(1,1)建模,给出了装备维修费用的预测.  相似文献   
213.
We consider the problem of maximizing the number of on‐time jobs on two uniform parallel machines. We show that a straightforward extension of an algorithm developed for the simpler two identical parallel machines problem yields a heuristic with a worst‐case ratio bound of at least . We then show that the infusion of a “look ahead” feature into the aforementioned algorithm results in a heuristic with the tight worst‐case ratio bound of , which, to our knowledge, is the tightest worst‐case ratio bound available for the problem. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006  相似文献   
214.
鱼雷寿命周期费用研究技术   总被引:1,自引:0,他引:1  
随着技术的发展,寿命周期费用的研究正日益受到关注。评述了国内外寿命周期费用方面的研究现状,介绍了鱼雷寿命周期费用研究方法的内容及用途,探讨了费用估算的一般方法,在鱼雷寿命周期费用分解原则的基础上给出了鱼雷寿命周期费用分解结构,讨论了寿命周期费用研究方法急需解决的主要问题,并对其今后的发展方向做了展望。  相似文献   
215.
We consider the problem of service rate control of a single‐server queueing system with a finite‐state Markov‐modulated Poisson arrival process. We show that the optimal service rate is nondecreasing in the number of customers in the system; higher congestion levels warrant higher service rates. On the contrary, however, we show that the optimal service rate is not necessarily monotone in the current arrival rate. If the modulating process satisfies a stochastic monotonicity property, the monotonicity is recovered. We examine several heuristics and show where heuristics are reasonable substitutes for the optimal control. None of the heuristics perform well in all the regimes and the fluctuation rate of the modulating process plays an important role in deciding the right heuristic. Second, we discuss when the Markov‐modulated Poisson process with service rate control can act as a heuristic itself to approximate the control of a system with a periodic nonhomogeneous Poisson arrival process. Not only is the current model of interest in the control of Internet or mobile networks with bursty traffic, but it is also useful in providing a tractable alternative for the control of service centers with nonstationary arrival rates. © 2013 Wiley Periodicals, Inc. Naval Research Logistics 60: 661–677, 2013  相似文献   
216.
Most modern processes involve multiple quality characteristics that are all measured on attribute levels, and their overall quality is determined by these characteristics simultaneously. The characteristic factors usually correlate with each other, making multivariate categorical control techniques a must. We study Phase I analysis of multivariate categorical processes (MCPs) to identify the presence of change‐points in the reference dataset. A directional change‐point detection method based on log‐linear models is proposed. The method exploits directional shift information and integrates MCPs into the unified framework of multivariate binomial and multivariate multinomial distributions. A diagnostic scheme for identifying the change‐point location and the shift direction is also suggested. Numerical simulations are conducted to demonstrate the detection effectiveness and the diagnostic accuracy.© 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
217.
In this article, we study a queueing system serving multiple classes of customers. Each class has a finite‐calling population. The customers are served according to the preemptive‐resume priority policy. We assume general distributions for the service times. For each priority class, we derive the steady‐state system size distributions at departure/arrival and arbitrary time epochs. We introduce the residual augmented process completion times conditioned on the number of customers in the system to obtain the system time distribution. We then extend the model by assuming that the server is subject to operation‐independent failures upon which a repair process with random duration starts immediately. We also demonstrate how setup times, which may be required before resuming interrupted service or picking up a new customer, can be incorporated in the model. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
218.
219.

As we enter the 21st Century, technologies originally developed for defense purposes such as computers and satellite communications appear to have become a driving force behind economic growth in the United States. Paradoxically, almost all previous econometric models suggest that the largely defense‐oriented federal industrial R&;D funding that helped create these technologies had no discernible effect on U.S. industrial productivity growth. This paper addresses this paradox by stressing that defense procurement as well as federal R&;D expenditures were targeted to a few narrowly defined manufacturing sub‐sectors that produced high tech weaponry. Analysis employing data from the NBER Manufacturing Productivity Database and the BEA’ s Input Output tables then demonstrates that defense procurement policies did have significant effects on the productivity performance of disaggregated manufacturing industries because of a process of procurement‐driven technological change.  相似文献   
220.
In this paper we develop an empirical model for transnational terrorist activity for a panel consisting of 139 countries over the period 1985–1998. Essentially, we attempt to sketch the profile of the average terrorist attack venue. Our findings suggest that the terrorist attack venue is, on average, characterized by low economic openness, high demographic stress, and a high level of international disputes. Furthermore, we document a strong regional component suggesting the presence of infectious contagion on a spatial level. Our results also support the presence of addictive contagion captured by a strong autoregressive component in each country’s terrorist activity. Finally, we find a weak statistical link between the level of democracy and terrorist activity, although the level of democracy is a significant determinant of the potential under‐reporting bias of terrorist activity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号