全文获取类型
收费全文 | 647篇 |
免费 | 17篇 |
国内免费 | 5篇 |
专业分类
669篇 |
出版年
2025年 | 4篇 |
2024年 | 2篇 |
2023年 | 9篇 |
2022年 | 7篇 |
2021年 | 10篇 |
2020年 | 14篇 |
2019年 | 15篇 |
2018年 | 5篇 |
2017年 | 22篇 |
2016年 | 30篇 |
2015年 | 23篇 |
2014年 | 29篇 |
2013年 | 26篇 |
2012年 | 44篇 |
2011年 | 55篇 |
2010年 | 26篇 |
2009年 | 49篇 |
2008年 | 35篇 |
2007年 | 31篇 |
2006年 | 33篇 |
2005年 | 26篇 |
2004年 | 30篇 |
2003年 | 24篇 |
2002年 | 25篇 |
2001年 | 19篇 |
2000年 | 13篇 |
1999年 | 15篇 |
1998年 | 9篇 |
1997年 | 9篇 |
1996年 | 9篇 |
1995年 | 6篇 |
1994年 | 2篇 |
1993年 | 5篇 |
1992年 | 3篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1989年 | 1篇 |
排序方式: 共有669条查询结果,搜索用时 15 毫秒
61.
Instead of measuring a Wiener degradation or performance process at predetermined time points to track degradation or performance of a product for estimating its lifetime, we propose to obtain the first‐passage times of the process over certain nonfailure thresholds. Based on only these intermediate data, we obtain the uniformly minimum variance unbiased estimator and uniformly most accurate confidence interval for the mean lifetime. For estimating the lifetime distribution function, we propose a modified maximum likelihood estimator and a new estimator and prove that, by increasing the sample size of the intermediate data, these estimators and the above‐mentioned estimator of the mean lifetime can achieve the same levels of accuracy as the estimators assuming one has failure times. Thus, our method of using only intermediate data is useful for highly reliable products when their failure times are difficult to obtain. Furthermore, we show that the proposed new estimator of the lifetime distribution function is more accurate than the standard and modified maximum likelihood estimators. We also obtain approximate confidence intervals for the lifetime distribution function and its percentiles. Finally, we use light‐emitting diodes as an example to illustrate our method and demonstrate how to validate the Wiener assumption during the testing. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008 相似文献
62.
吕春娥 《中国人民武装警察部队学院学报》2009,25(4):84-86
针对基本建设审计特点,提出逐步从规范基本建设审核审批程序入手,进行基建建设前期、施工中及结算、决算跟踪审计,发挥审计监督的机制性作用,达到基本建设活动全过程运作规范、有序、监督有效。 相似文献
63.
64.
应对新形势下非常规突发事件的严峻挑战是各国政府亟待解决的问题,综合人工社会-计算实验-平行执行的ACP方法,是解决非常规突发事件应急管理问题的有效方法.本文引入ACP方法,阐述构建高性能社会计算实验动态仿真引擎的作用;按照层次化模块化思想设计动态仿真引擎D-PARSE的体系结构,详细描述各组成部分的具体功能,并基于并行... 相似文献
65.
为研究水下制氢反应室的动态过程规律,基于化学反应动力学和单液滴运动学得到合金/水反应转化率,并在最小自由能法计算得到生成物各组分摩尔数的基础上利用质量守恒方程得到室内各物质质量变化规律。在建立非线性移动边界螺旋管动态模型的前提下,利用能量守恒方程得到室内热力参数变化规律,进而完成制氢反应室动态过程详尽模型的建立。利用该模型编写计算程序,完成某水下制氢反应室动态过程仿真。结果表明,各仿真曲线较好地反映了对应参数的动态变化规律,验证了模型建立与仿真的正确性;合金/水反应转化率决定了反应室的物质质量变化规律及其能量释放特性。该模型可以作为制氢反应室动态特性分析及其过程控制研究的基础模型。 相似文献
66.
针对脉冲发动机软质隔层在工作过程中状态与规律无法准确描述等问题,设计了软质隔层打开试验系统,近似模拟了隔层在脉冲发动机中的工作历程,对比了烧蚀与未烧蚀隔层打开特性,结合电镜扫描微观手段,从机理分析了烧蚀与未烧蚀隔层变形规律。试验结果表明,烧蚀模拟试验计算与某试验发动机隔层烧蚀率近似相当,相对误差可控制在5%以内;未烧蚀隔层变形呈“谷堆形”,烧蚀后隔层变形呈“灯泡形”。所建立的软质隔层打开试验系统可为脉冲发动机软质隔层设计与试验验证提供一种可行的技术途径和手段。 相似文献
67.
We consider the integrated problem of optimally maintaining an imperfect, deteriorating sensor and the safety‐critical system it monitors. The sensor's costless observations of the binary state of the system become less informative over time. A costly full inspection may be conducted to perfectly discern the state of the system, after which the system is replaced if it is in the out‐of‐control state. In addition, a full inspection provides the opportunity to replace the sensor. We formulate the problem of adaptively scheduling full inspections and sensor replacements using a partially observable Markov decision process (POMDP) model. The objective is to minimize the total expected discounted costs associated with system operation, full inspection, system replacement, and sensor replacement. We show that the optimal policy has a threshold structure and demonstrate the value of coordinating system and sensor maintenance via numerical examples. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 399–417, 2017 相似文献
68.
In networks, there are often more than one sources of capacity. The capacities can be permanently or temporarily owned by the decision maker. Depending on the nature of sources, we identify the permanent capacity, spot market capacity, and contract capacity. We use a scenario tree to model the uncertainty, and build a multi‐stage stochastic integer program that can incorporate multiple sources and multiple types of capacities in a general network. We propose two solution methodologies for the problem. Firstly, we design an asymptotically convergent approximation algorithm. Secondly, we design a cutting plane algorithm based on Benders decomposition to find tight bounds for the problem. The numerical experiments show superb performance of the proposed algorithms compared with commercial software. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 600–614, 2017 相似文献
69.
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009 相似文献
70.
An area defense consists of several groups that act independently, i.e., do not communicate with each other. Each group has a fixed number of defenders and a controller that allocates these defenders optimally against the individual attackers comprising an attack. We analyze the effectiveness of this partially coordinated defense against a simultaneous attack of known size in which all attackers are considered to be equally lethal. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2005. 相似文献