全文获取类型
收费全文 | 2101篇 |
免费 | 365篇 |
国内免费 | 141篇 |
出版年
2024年 | 4篇 |
2023年 | 17篇 |
2022年 | 25篇 |
2021年 | 31篇 |
2020年 | 40篇 |
2019年 | 36篇 |
2018年 | 27篇 |
2017年 | 88篇 |
2016年 | 103篇 |
2015年 | 45篇 |
2014年 | 169篇 |
2013年 | 152篇 |
2012年 | 141篇 |
2011年 | 198篇 |
2010年 | 147篇 |
2009年 | 189篇 |
2008年 | 149篇 |
2007年 | 151篇 |
2006年 | 137篇 |
2005年 | 140篇 |
2004年 | 135篇 |
2003年 | 113篇 |
2002年 | 75篇 |
2001年 | 58篇 |
2000年 | 30篇 |
1999年 | 33篇 |
1998年 | 35篇 |
1997年 | 28篇 |
1996年 | 14篇 |
1995年 | 23篇 |
1994年 | 22篇 |
1993年 | 11篇 |
1992年 | 12篇 |
1991年 | 8篇 |
1990年 | 14篇 |
1989年 | 7篇 |
排序方式: 共有2607条查询结果,搜索用时 15 毫秒
881.
This article examines a problem faced by a firm procuring a material input or good from a set of suppliers. The cost to procure the material from any given supplier is concave in the amount ordered from the supplier, up to a supplier‐specific capacity limit. This NP‐hard problem is further complicated by the observation that capacities are often uncertain in practice, due for instance to production shortages at the suppliers, or competition from other firms. We accommodate this uncertainty in a worst‐case (robust) fashion by modeling an adversarial entity (which we call the “follower”) with a limited procurement budget. The follower reduces supplier capacity to maximize the minimum cost required for our firm to procure its required goods. To guard against uncertainty, the firm can “protect” any supplier at a cost (e.g., by signing a contract with the supplier that guarantees supply availability, or investing in machine upgrades that guarantee the supplier's ability to produce goods at a desired level), ensuring that the anticipated capacity of that supplier will indeed be available. The problem we consider is thus a three‐stage game in which the firm first chooses which suppliers' capacities to protect, the follower acts next to reduce capacity from unprotected suppliers, and the firm then satisfies its demand using the remaining capacity. We formulate a three‐stage mixed‐integer program that is well‐suited to decomposition techniques and develop an effective cutting‐plane algorithm for its solution. The corresponding algorithmic approach solves a sequence of scaled and relaxed problem instances, which enables solving problems having much larger data values when compared to standard techniques. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013 相似文献
882.
In a rendezvous search problem, two players are placed in a network and must try to meet each other in the least possible expected time. We look at rendezvous search on a discrete interval in which the players are initially placed using independent draws (usually assumed to be from the same distribution). Some optimal solutions are known if this distribution is uniform, and also for certain other special types of distribution. In this article, we present two new results. First, we characterize the complete set of solutions for the uniform case, showing that all optimal strategies must have two specific properties (namely, of being swept and strictly geodesic). Second, we relate search strategies on the interval to proper binary trees, and use this correspondence to derive a recurrence relation for solutions to the symmetric rendezvous problem for any initial distribution. This relation allows us to solve any such problem computationally by dynamic programming. Finally, some ideas for future research are discussed. © Wiley Periodicals, Inc. Naval Research Logistics 60: 454–467, 2013 相似文献
883.
Rudolph C. Barnes Jr. 《Small Wars & Insurgencies》2013,24(1):1-2
In 1897 and 1898, Winston Churchill participated in what late Victorian Britain termed ‘small wars’, first on India's northwest frontier and then in the vast wasteland of the Sudan. Churchill chronicled his experiences in these conflicts in personal letters, dispatches to newspapers, and in his first two books, The Story of the Malakand Field Force and The River War. These writings provide a snapshot of a particular period in the formative years of the great statesman, demonstrating through Churchill's eloquent analyses many of the contradictions concerning the conduct of small wars that have emerged in the present era. 相似文献
884.
针对现代战争条件下装备保障资源需求变化快,保障资源预测困难的问题,首先分析了影响装备保障资源需求的因素,根据实际情况选取了平均维修间隔时间(MTBM)、平均修复时间(MTBR)等8项影响装备保障资源需求的关键指标,然后将基于遗传算法(GA)优化的反向传播(BP)神经网络应用于保障资源需求预测中,构建了基于遗传神经网络的需求预测模型,最后利用1980年~2010年实际保障资源需求数据对模型进行了验证.验证结果表明,基于GA优化的BP神经网络预测模型有较快的收敛速度、较强的适应性和较高的预测精度,适用于装备保障资源需求预测. 相似文献
885.
886.
887.
888.
在液体储罐泄漏过程中,罐内压力是随泄漏时间变化的量,泄漏强度也随罐内压力而变化,但在已有对液体流泄漏数学模型的建构中,在后果计算时没有全面考虑罐内压力以及罐内液体闪蒸导致空间的物质量,获得的结果用于后果评价,就必然与实际情况存在偏差.应用数学方法,对液体泄漏模型进行改进,改进后模型把罐内压力以及罐内空间的物质量作为变量,可较真实模拟出泄漏时泄漏强度、储罐内气体压力及泄漏量随时间变化的大小情况,并模拟了孔洞液体泄漏,得出不太可能发生灾难性事故的结论. 相似文献
889.
王翔 《国防科技大学学报》2013,35(1)
针对欠定混合盲辨识问题,提出了一种基于时频单源点检测及聚类验证的盲辨识算法。检测各个源信号的时频单源点,利用奇异值分解的方法求解不同单源点集合对应的混合矢量,利用基于k均值的聚类验证技术完成源信号数目和混合矩阵的联合估计。算法放宽了已有方法对时频单源区域的假设,不需要假设信号存在时频单源区域,可以完成仅存在离散的时频单源点条件下的欠定混合盲辨识;同时克服了传统算法需要假设源信号个数已知的不足,可以有效地估计源信号数目。仿真结果验证了算法的有效性。 相似文献
890.