首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   647篇
  免费   17篇
  国内免费   5篇
  669篇
  2025年   4篇
  2024年   2篇
  2023年   9篇
  2022年   7篇
  2021年   10篇
  2020年   14篇
  2019年   15篇
  2018年   5篇
  2017年   22篇
  2016年   30篇
  2015年   23篇
  2014年   29篇
  2013年   26篇
  2012年   44篇
  2011年   55篇
  2010年   26篇
  2009年   49篇
  2008年   35篇
  2007年   31篇
  2006年   33篇
  2005年   26篇
  2004年   30篇
  2003年   24篇
  2002年   25篇
  2001年   19篇
  2000年   13篇
  1999年   15篇
  1998年   9篇
  1997年   9篇
  1996年   9篇
  1995年   6篇
  1994年   2篇
  1993年   5篇
  1992年   3篇
  1991年   1篇
  1990年   3篇
  1989年   1篇
排序方式: 共有669条查询结果,搜索用时 15 毫秒
61.
  总被引:1,自引:0,他引:1  
Instead of measuring a Wiener degradation or performance process at predetermined time points to track degradation or performance of a product for estimating its lifetime, we propose to obtain the first‐passage times of the process over certain nonfailure thresholds. Based on only these intermediate data, we obtain the uniformly minimum variance unbiased estimator and uniformly most accurate confidence interval for the mean lifetime. For estimating the lifetime distribution function, we propose a modified maximum likelihood estimator and a new estimator and prove that, by increasing the sample size of the intermediate data, these estimators and the above‐mentioned estimator of the mean lifetime can achieve the same levels of accuracy as the estimators assuming one has failure times. Thus, our method of using only intermediate data is useful for highly reliable products when their failure times are difficult to obtain. Furthermore, we show that the proposed new estimator of the lifetime distribution function is more accurate than the standard and modified maximum likelihood estimators. We also obtain approximate confidence intervals for the lifetime distribution function and its percentiles. Finally, we use light‐emitting diodes as an example to illustrate our method and demonstrate how to validate the Wiener assumption during the testing. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
62.
针对基本建设审计特点,提出逐步从规范基本建设审核审批程序入手,进行基建建设前期、施工中及结算、决算跟踪审计,发挥审计监督的机制性作用,达到基本建设活动全过程运作规范、有序、监督有效。  相似文献   
63.
基于GAHP的模糊综合评判法在潜艇作战方案评估中的应用   总被引:1,自引:0,他引:1  
潜艇作战方案评估是辅助对潜指挥员决策的重要方法,而评估的科学性对决策的有效性影响很大.利用多人层次分析法(GAHP)和模糊综合评判相结合的方法,对潜艇作战方案进行评估,评估的结果可信度高,有利于对潜指挥员的正确决策.最后,通过实例证明了方法的有效性.  相似文献   
64.
应对新形势下非常规突发事件的严峻挑战是各国政府亟待解决的问题,综合人工社会-计算实验-平行执行的ACP方法,是解决非常规突发事件应急管理问题的有效方法.本文引入ACP方法,阐述构建高性能社会计算实验动态仿真引擎的作用;按照层次化模块化思想设计动态仿真引擎D-PARSE的体系结构,详细描述各组成部分的具体功能,并基于并行...  相似文献   
65.
为研究水下制氢反应室的动态过程规律,基于化学反应动力学和单液滴运动学得到合金/水反应转化率,并在最小自由能法计算得到生成物各组分摩尔数的基础上利用质量守恒方程得到室内各物质质量变化规律。在建立非线性移动边界螺旋管动态模型的前提下,利用能量守恒方程得到室内热力参数变化规律,进而完成制氢反应室动态过程详尽模型的建立。利用该模型编写计算程序,完成某水下制氢反应室动态过程仿真。结果表明,各仿真曲线较好地反映了对应参数的动态变化规律,验证了模型建立与仿真的正确性;合金/水反应转化率决定了反应室的物质质量变化规律及其能量释放特性。该模型可以作为制氢反应室动态特性分析及其过程控制研究的基础模型。  相似文献   
66.
针对脉冲发动机软质隔层在工作过程中状态与规律无法准确描述等问题,设计了软质隔层打开试验系统,近似模拟了隔层在脉冲发动机中的工作历程,对比了烧蚀与未烧蚀隔层打开特性,结合电镜扫描微观手段,从机理分析了烧蚀与未烧蚀隔层变形规律。试验结果表明,烧蚀模拟试验计算与某试验发动机隔层烧蚀率近似相当,相对误差可控制在5%以内;未烧蚀隔层变形呈“谷堆形”,烧蚀后隔层变形呈“灯泡形”。所建立的软质隔层打开试验系统可为脉冲发动机软质隔层设计与试验验证提供一种可行的技术途径和手段。  相似文献   
67.
    
We consider the integrated problem of optimally maintaining an imperfect, deteriorating sensor and the safety‐critical system it monitors. The sensor's costless observations of the binary state of the system become less informative over time. A costly full inspection may be conducted to perfectly discern the state of the system, after which the system is replaced if it is in the out‐of‐control state. In addition, a full inspection provides the opportunity to replace the sensor. We formulate the problem of adaptively scheduling full inspections and sensor replacements using a partially observable Markov decision process (POMDP) model. The objective is to minimize the total expected discounted costs associated with system operation, full inspection, system replacement, and sensor replacement. We show that the optimal policy has a threshold structure and demonstrate the value of coordinating system and sensor maintenance via numerical examples. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 399–417, 2017  相似文献   
68.
    
In networks, there are often more than one sources of capacity. The capacities can be permanently or temporarily owned by the decision maker. Depending on the nature of sources, we identify the permanent capacity, spot market capacity, and contract capacity. We use a scenario tree to model the uncertainty, and build a multi‐stage stochastic integer program that can incorporate multiple sources and multiple types of capacities in a general network. We propose two solution methodologies for the problem. Firstly, we design an asymptotically convergent approximation algorithm. Secondly, we design a cutting plane algorithm based on Benders decomposition to find tight bounds for the problem. The numerical experiments show superb performance of the proposed algorithms compared with commercial software. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 600–614, 2017  相似文献   
69.
    
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
70.
    
An area defense consists of several groups that act independently, i.e., do not communicate with each other. Each group has a fixed number of defenders and a controller that allocates these defenders optimally against the individual attackers comprising an attack. We analyze the effectiveness of this partially coordinated defense against a simultaneous attack of known size in which all attackers are considered to be equally lethal. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2005.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号