首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   627篇
  免费   81篇
  国内免费   35篇
  2023年   1篇
  2022年   5篇
  2021年   14篇
  2020年   23篇
  2019年   14篇
  2018年   18篇
  2017年   36篇
  2016年   25篇
  2015年   17篇
  2014年   55篇
  2013年   59篇
  2012年   40篇
  2011年   50篇
  2010年   40篇
  2009年   38篇
  2008年   46篇
  2007年   43篇
  2006年   39篇
  2005年   41篇
  2004年   22篇
  2003年   28篇
  2002年   17篇
  2001年   19篇
  2000年   9篇
  1999年   10篇
  1998年   4篇
  1997年   1篇
  1996年   1篇
  1995年   4篇
  1994年   2篇
  1993年   3篇
  1992年   4篇
  1991年   2篇
  1990年   8篇
  1989年   5篇
排序方式: 共有743条查询结果,搜索用时 125 毫秒
731.
问题管理模式把发现问题作为高校评建工作中经常性的制度内容,把解决问题作为高校评建工作的核心。在高校评建过程中,运用问题管理模式会大大提高评建工作的质量和效率。  相似文献   
732.
基于OWA算子的军队院校物资采购招投标管理研究   总被引:1,自引:1,他引:0  
针对军队院校物资采购招投标管理问题,文中分析了军队院校物资采购招投标的特点,研究了基于合同的谈判机制;针对评标过程中,其所评指标中存在定量指标和定性指标的特点,提出一种基于OWA算子和语言OWA算子的综合多属性群决策方法,实现了招投标管理中的评标、定标。最后,通过实例说明了该方法的有效性及合理性。  相似文献   
733.
基于半实物仿真的HLA/RTI关键技术研究   总被引:1,自引:0,他引:1  
分析了基于HLA/RTI的半实物仿真中实践管理、数据收集能力、RTI通用性以及网络传输安全等问题,研究了新的时间管理策略,提出了合理设置lookahead的算法,设计了数据收集的层次框架,并制定了研发RTI的通用原则和安全有效的网络传输方案,为现代半实物系统仿真提供了理论借鉴。  相似文献   
734.
A two‐echelon distribution inventory system with a central warehouse and a number of retailers is considered. The retailers face stochastic demand and replenish from the warehouse, which, in turn, replenishes from an outside supplier. The system is reviewed continuously and demands that cannot be met directly are backordered. Standard holding and backorder costs are considered. In the literature on multi‐echelon inventory control it is standard to assume that backorders at the warehouse are served according to a first come–first served policy (FCFS). This allocation rule simplifies the analysis but is normally not optimal. It is shown that the FCFS rule can, in the worst case, lead to an asymptotically unbounded relative cost increase as the number of retailers approaches infinity. We also provide a new heuristic that will always give a reduction of the expected costs. A numerical study indicates that the average cost reduction when using the heuristic is about two percent. The suggested heuristic is also compared with two existing heuristics. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
735.
Consider a set of product variants that are differentiated by some secondary attributes such as flavor, color, or size. The retailer's problem is to jointly determine the set of variants to include in her product line (“assortment”), together with their prices and inventory levels, so as to maximize her expected profit. We model the consumer choice process using a multinomial logit choice model and consider a newsvendor type inventory setting. We derive the structure of the optimal assortment for some important special cases, including the case of horizontally differentiated items, and propose a dominance relationship for the general case that simplifies the search for an optimal assortment. We also discuss structural properties of the optimal prices. Finally, motivated by our analytical results, we propose a heuristic solution procedure, which is shown to be quite effective through a numerical study. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
736.
This paper derives optimal policies for when to hire, train, and lay off employees in service organizations when worker productivity appreciates deterministically or stochastically under constant, monotonic, and cyclic service demand. The model, an extension of the machine replacement problem from the engineering economy literature, uses infinite horizon linear programming to produce optimal personnel planning strategies and dual prices that characterize the workforce's economic value. The effect of employee attrition is also considered. In its valuation of human assets, unlike pure accounting approaches that only try to measure, this paper proposes an approach to capture the interaction between firm decisions pertaining to human resources and human resource value. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
737.
ABSTRACT

This article analyses the positions of the Chinese civilian leaders and military elites on Military Operations Other Than War in order to shed light on their preferences about the use of the armed forces in foreign policy between the late 1990s and the early 2010s. Over time, a significant divergence developed between civilians and soldiers until 2011, when the Libyan crisis happened. The study also prompts important considerations about our understanding of civil–military relations in China and future role of the People’s Liberation Army as a tool of statecraft in foreign policy.  相似文献   
738.
周炎明  兰旭  熊俊芬 《国防科技》2020,41(5):111-118
随着“大智移云物”的出现和发展,战争形态已经发展到智能化战争新阶段。为了打赢未来智能化战争,推进军队财务管理实现智能化,充分利用军事大数据这一新兴重要战略资源尤为必要。本文利用需求分析法和现象分类法,从经费需求测算、预算编制、军费支出和军费绩效评估四个方面分析了军队财务管理领域应用军事大数据的需求。针对当前存在的运用军事大数据观念淡薄、数据采集困难、数据挖掘处理能力较弱、数据安全威胁及军事大数据人才缺乏等五个问题,从大数据应用观念的树立、软硬件设备的更新、数据中心的建设、应用框架的构建、信息化管理制度的完善、数据安全管理和大数据人才队伍建设几个方面提出了在军队财务管理领域应用军事大数据的思路。  相似文献   
739.
ABSTRACT

Despite its portrayal as something new, the concept of the ‘gray zone’ is not novel. It was the Cold War battleground in which the USA and the Soviet Union waged rival unconventional campaigns, and it was there that the newly formed Central Intelligence Agency (CIA) was given responsibility for operating. This was not the organization’s original purpose, but Cold War exigencies forced Washington to improvise and build an organization with unique capabilities. These early years shaped the CIA’s operations directorate, creating two distinct cultures within the larger agency, one focused on intelligence collection and the other focused on covert action.  相似文献   
740.
ABSTRACT

Under what conditions are cyber-weapons effective in nuclear counter-proliferation? With continued interest in nuclear proliferation professed by Iran, North Korea, and Saudi Arabia, a discussion of the effectiveness of counter-proliferation measures remains relevant. Cyber-attacks as military option in a state-on-state conflict still requires additional corroborating evidence to make conclusions about its long-term effectiveness. This work analyses the general applicability of cyber-weapons and their usefulness in nuclear counter-proliferation. Through a comparative case study of Operation Orchard, Stuxnet, and recent “Left-of-Launch” operations against North Korea, the essay finds that cyber-operations are not particularly effective against nuclear programmes that are in the later stages of their development. They can disrupt and delay a nuclear programme temporarily, if the attack remains clandestine, but cannot halt nuclear proliferation all together. However, effectiveness increases if they are used in combination with conventional weapons. The article addresses a topic of interest to national-level decision-makers: whether cyber-operations can and should play a role in nuclear counter-proliferation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号