全文获取类型
收费全文 | 338篇 |
免费 | 106篇 |
国内免费 | 29篇 |
专业分类
473篇 |
出版年
2024年 | 2篇 |
2023年 | 8篇 |
2022年 | 7篇 |
2021年 | 5篇 |
2020年 | 15篇 |
2019年 | 6篇 |
2018年 | 11篇 |
2017年 | 30篇 |
2016年 | 30篇 |
2015年 | 21篇 |
2014年 | 28篇 |
2013年 | 30篇 |
2012年 | 32篇 |
2011年 | 32篇 |
2010年 | 24篇 |
2009年 | 29篇 |
2008年 | 23篇 |
2007年 | 26篇 |
2006年 | 24篇 |
2005年 | 19篇 |
2004年 | 6篇 |
2003年 | 8篇 |
2002年 | 10篇 |
2001年 | 11篇 |
2000年 | 8篇 |
1999年 | 6篇 |
1998年 | 5篇 |
1997年 | 2篇 |
1996年 | 3篇 |
1995年 | 2篇 |
1994年 | 2篇 |
1993年 | 2篇 |
1991年 | 1篇 |
1990年 | 2篇 |
1989年 | 2篇 |
1988年 | 1篇 |
排序方式: 共有473条查询结果,搜索用时 0 毫秒
151.
This article examines a problem faced by a firm procuring a material input or good from a set of suppliers. The cost to procure the material from any given supplier is concave in the amount ordered from the supplier, up to a supplier‐specific capacity limit. This NP‐hard problem is further complicated by the observation that capacities are often uncertain in practice, due for instance to production shortages at the suppliers, or competition from other firms. We accommodate this uncertainty in a worst‐case (robust) fashion by modeling an adversarial entity (which we call the “follower”) with a limited procurement budget. The follower reduces supplier capacity to maximize the minimum cost required for our firm to procure its required goods. To guard against uncertainty, the firm can “protect” any supplier at a cost (e.g., by signing a contract with the supplier that guarantees supply availability, or investing in machine upgrades that guarantee the supplier's ability to produce goods at a desired level), ensuring that the anticipated capacity of that supplier will indeed be available. The problem we consider is thus a three‐stage game in which the firm first chooses which suppliers' capacities to protect, the follower acts next to reduce capacity from unprotected suppliers, and the firm then satisfies its demand using the remaining capacity. We formulate a three‐stage mixed‐integer program that is well‐suited to decomposition techniques and develop an effective cutting‐plane algorithm for its solution. The corresponding algorithmic approach solves a sequence of scaled and relaxed problem instances, which enables solving problems having much larger data values when compared to standard techniques. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013 相似文献
152.
In a rendezvous search problem, two players are placed in a network and must try to meet each other in the least possible expected time. We look at rendezvous search on a discrete interval in which the players are initially placed using independent draws (usually assumed to be from the same distribution). Some optimal solutions are known if this distribution is uniform, and also for certain other special types of distribution. In this article, we present two new results. First, we characterize the complete set of solutions for the uniform case, showing that all optimal strategies must have two specific properties (namely, of being swept and strictly geodesic). Second, we relate search strategies on the interval to proper binary trees, and use this correspondence to derive a recurrence relation for solutions to the symmetric rendezvous problem for any initial distribution. This relation allows us to solve any such problem computationally by dynamic programming. Finally, some ideas for future research are discussed. © Wiley Periodicals, Inc. Naval Research Logistics 60: 454–467, 2013 相似文献
153.
Kjell Hausken 《Defence and Peace Economics》2013,24(5):517-519
Kovenock and Roberson's (2012a, b) replication of Hausken’s (2008a) equations and parameter restrictions do not enhance our insight into the defense and attack of reliability systems. This reply intends to fill the remaining understanding gaps. 相似文献
154.
Nicholas Owen 《Defence and Peace Economics》2013,24(4):269-288
In fiscal year 1999, the US Air Force introduced a bonus program designed to encourage longer enlistment terms. This regime shift provides a unique opportunity to estimate the elasticity of labor supply at a new margin: the length of the employment contract. A $5000 bonus differential is estimated to increase the probability that a recruit will choose a 6‐year enlistment over a 4‐year enlistment by 30 percentage points. The program is found to be cost‐effective relative to other policies to increase man‐years. 相似文献
155.
在混合对策理论的基础上,将空战过程看作是由一系列离散的状态组成的离散事件动态系统,建立了空战过程的离散状态子模型,利用空战态势指数和战机空战能力指数构造了战术评估函数,以完成对战术动作的筛选工作,并结合3DOF质点模型设计了机动指令生成器,实现对无人机运动状态的控制,并在Matlab环境下对机动实例进行了仿真. 相似文献
156.
根据电场的作用机理,提出保障场的概念,从场思维的角度构建装备保障力量配置分析的优化模型;并进一步定量分析与定性判断相结合,提出装备保障力量配置优化的流程,最后结合实例具体分析。研究结果对装备保障的部署决策具有一定参考价值和指导意义。 相似文献
157.
对敌后侦察反军事诱骗的远程火力打击战法的定量分析是战役研究中尚未解决的关键问题之一,根据信息作战原理,运用仿真和统计学分析的混合方法,建立基于概率的二人非零和(TPNZS)非合作博弈模型,设计基于侦察与诱骗博弈的远程火力打击战法,定量分析我方的敌后侦察和敌方的军事诱骗对远程信息与火力联合打击能力的影响,并对一个典型实例的初步试验及分析结果表明:与敌后侦察和军事诱骗有关的正确识别目标和错误识别目标的概率以及远程火力命中目标的概率是评估远程信息与火力联合打击能力的关键,而对评估结果进行博弈分析则是远程火力打击战法设计的关键,用识别正确目标和错误目标能力以及远程火力命中目标能力描述的基于敌后侦察与诱骗博弈的远程火力最优打击战法为Δ*=(0,Δ2*,1-Δ2*)=(0.0000,0.7727,0.2273),被打击方对远程火力打击的最优战法为π*=(π1*,0,1-π1*)=(0.8511,0.0000,0.1489)。 相似文献
158.
159.
《防务技术》2022,18(11):2097-2106
The target's threat prediction is an essential procedure for the situation analysis in an aerial defense system. However, the traditional threat prediction methods mostly ignore the effect of commander's emotion. They only predict a target's present threat from the target's features itself, which leads to their poor ability in a complex situation. To aerial targets, this paper proposes a method for its potential threat prediction considering commander emotion (PTP-CE) that uses the Bi-directional LSTM (BiLSTM) network and the backpropagation neural network (BP) optimized by the sparrow search algorithm (SSA). Furthermore, we use the BiLSTM to predict the target's future state from real-time series data, and then adopt the SSA-BP to combine the target's state with the commander's emotion to establish a threat prediction model. Therefore, the target's potential threat level can be obtained by this threat prediction model from the predicted future state and the recognized emotion. The experimental results show that the PTP-CE is efficient for aerial target's state prediction and threat prediction, regardless of commander's emotional effect. 相似文献
160.
Ryusuke Hohzaki 《海军后勤学研究》2009,56(3):264-278
Search theory originates from the military research efforts of WWII. Most researchers of that period modeled their search games in noncooperative games, where players are enemies or compete against each other. In this article, we deal with a cooperative search game, where multiple searchers behave cooperatively. First we describe several search problems and discuss the possibility of a coalition or cooperation among searchers. For the cooperative search game, we define a function named quasi‐characteristic function, which gives us a criterion similar to the so‐called characteristic function in the general coalition game with transferable utility. The search operation includes a kind of randomness with respect to whether the searchers can detect a target and get the value of the target. We also propose a methodology to divide the obtained target value among members of the coalition taking account of the randomness. As a concrete problem of the cooperative search game, we take the so‐called search allocation game, where searchers distribute their searching resources to detect a target in a cooperative way and the target moves in a search space to evade the searchers. Lastly, we discuss the core of the cooperative search allocation game. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009 相似文献