全文获取类型
收费全文 | 457篇 |
免费 | 236篇 |
国内免费 | 54篇 |
出版年
2024年 | 6篇 |
2023年 | 10篇 |
2022年 | 12篇 |
2021年 | 10篇 |
2020年 | 20篇 |
2019年 | 19篇 |
2018年 | 11篇 |
2017年 | 41篇 |
2016年 | 53篇 |
2015年 | 28篇 |
2014年 | 51篇 |
2013年 | 32篇 |
2012年 | 52篇 |
2011年 | 47篇 |
2010年 | 32篇 |
2009年 | 49篇 |
2008年 | 29篇 |
2007年 | 29篇 |
2006年 | 55篇 |
2005年 | 30篇 |
2004年 | 21篇 |
2003年 | 14篇 |
2002年 | 15篇 |
2001年 | 12篇 |
2000年 | 6篇 |
1999年 | 12篇 |
1998年 | 8篇 |
1997年 | 2篇 |
1996年 | 7篇 |
1995年 | 5篇 |
1994年 | 5篇 |
1993年 | 5篇 |
1992年 | 3篇 |
1991年 | 5篇 |
1990年 | 5篇 |
1989年 | 6篇 |
排序方式: 共有747条查询结果,搜索用时 15 毫秒
331.
332.
333.
334.
针对单部件系统工龄更换策略下备件需求的特点,建立了工龄更换策略与备件库存控制的联合优化模型。该模型通过分析一个订购期内工龄更换间隔期T及备件最大库存水平S对系统寿命分布的影响,建立了工龄更换间隔期、订购间隔期及最大库存水平与单位时间总费用(包括维修费用和库存费用)的关系,然后以单位时间总费用最小为目标,优化工龄更换间隔期T、订购间隔期t0及最大库存水平S。最后,基于案例,运用Matlab对模型进行数值计算,结果表明模型能有效地降低单位时间的总费用。 相似文献
335.
336.
提出了一种基于预配载思想的装备物资混装配载策略,并应用模糊聚类和混合智能算法进行了实例仿真。研究对于组合优化策略在装备保障信息化系统建设中的应用具有积极意义。 相似文献
337.
研究了线性调频(LFM)脉冲体制雷达由于距离-多普勒耦合效应造成的测距偏差问题。推导、分析了该测距偏差的产生机理,指出了偏差中被大多数研究者遗漏的非线性余项,并分析了该余项与雷达发射信号及目标运动参数的关系;利用无约束优化方法对该偏差余项进行估计。最后,计算机仿真实验验证了分析结论和估计算法的正确性。 相似文献
338.
This paper extends traditional production/distribution system analysis to address raw material, factories, and markets located beyond Earth. It explains the eventual advantages of such operations and discusses likely sites in the solar system. It furnishes a typology for production/distribution systems, assessing the fit of each type to space operations. It briefly reviews the physics of orbits. It develops transportation and inventory cost functions for the simplest case of Hohmann trajectories, and for transportation between circular orbits of similar radii using higher‐energy trajectories. These cost functions are used to derive a model of production/distribution system cost, the minimization of which selects an optimal factory location. The paper suggests potential extensions to this work, and concludes with ideas for location research on the novel reaches of extraterrestrial space. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005. 相似文献
339.
Following work of Stroud and Saeger (Proceedings of ISI, Springer Verlag, New York, 2006) and Anand et al. (Proceedings of Computer, Communication and Control Technologies, 2003), we formulate a port of entry inspection sequencing task as a problem of finding an optimal binary decision tree for an appropriate Boolean decision function. We report on new algorithms for finding such optimal trees that are more efficient computationally than those presented by Stroud and Saeger and Anand et al. We achieve these efficiencies through a combination of specific numerical methods for finding optimal thresholds for sensor functions and two novel binary decision tree search algorithms that operate on a space of potentially acceptable binary decision trees. The improvements enable us to analyze substantially larger applications than was previously possible. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011 相似文献
340.
We develop models that lend insight into how to design systems that enjoy economies of scale in their operating costs, when those systems will subsequently face disruptions from accidents, acts of nature, or an intentional attack from a well‐informed attacker. The systems are modeled as parallel M/M/1 queues, and the key question is how to allocate service capacity among the queues to make the system resilient to worst‐case disruptions. We formulate this problem as a three‐level sequential game of perfect information between a defender and a hypothetical attacker. The optimal allocation of service capacity to queues depends on the type of attack one is facing. We distinguish between deterministic incremental attacks, where some, but not all, of the capacity of each attacked queue is knocked out, and zero‐one random‐outcome (ZORO) attacks, where the outcome is random and either all capacity at an attacked queue is knocked out or none is. There are differences in the way one should design systems in the face of incremental or ZORO attacks. For incremental attacks it is best to concentrate capacity. For ZORO attacks the optimal allocation is more complex, typically, but not always, involving spreading the service capacity out somewhat among the servers. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011 相似文献