首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   229篇
  免费   19篇
  国内免费   3篇
  2022年   1篇
  2021年   2篇
  2020年   8篇
  2019年   12篇
  2018年   22篇
  2017年   22篇
  2016年   22篇
  2015年   10篇
  2014年   12篇
  2013年   64篇
  2012年   9篇
  2011年   7篇
  2010年   5篇
  2009年   5篇
  2008年   9篇
  2007年   7篇
  2006年   7篇
  2005年   4篇
  2004年   4篇
  2003年   3篇
  2001年   4篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1997年   1篇
  1995年   2篇
  1993年   3篇
  1991年   1篇
  1990年   1篇
排序方式: 共有251条查询结果,搜索用时 31 毫秒
1.
设备的一种计划维修策略   总被引:1,自引:0,他引:1  
本文根据设备在全寿命内有事后修理、计划修理和最后报废的实际情况,以全寿命内单位时间的更新维修期望费用最少为目标函数,建立一种数学模型,寻求设备在全寿命内最佳计划修理次数N和最佳的一组计划维修时间间隔集T。  相似文献   
2.
基于灰色时序的完整性规范技术   总被引:1,自引:0,他引:1       下载免费PDF全文
计算机系统的完整性安全策略模型与规范问题,是计算机安全研究中最重要的课题之一。已有的研究结果离实际应用还相差太远,例如Clark-Wilson完整性模型只是提出了一个框架。本文呈现了我们构造的形式化灰色时序安全策略规范语言(GTSL)。GTSL的理论基础是灰色系统理论和时序规范语言LO-TOS理论。由于它在完整性规范能力、完整性验证过程的构造与表示、责任分离合理性测试等一系列技术方面的完善与创新,使得GTSL成为真正能够实际使用的完整性安全策略规范语言。  相似文献   
3.
We consider the salvo policy problem, in which there are k moments, called salvos, at which we can fire multiple missiles simultaneously at an incoming object. Each salvo is characterized by a probability pi: the hit probability of a single missile. After each salvo, we can assess whether the incoming object is still active. If it is, we fire the missiles assigned to the next salvo. In the salvo policy problem, the goal is to assign at most n missiles to salvos in order to minimize the expected number of missiles used. We consider three problem versions. In Gould's version, we have to assign all n missiles to salvos. In the Big Bomb version, a cost of B is incurred when all salvo's are unsuccessful. Finally, we consider the Quota version in which the kill probability should exceed some quota Q. We discuss the computational complexity and the approximability of these problem versions. In particular, we show that Gould's version and the Big Bomb version admit pseudopolynomial time exact algorithms and fully polynomial time approximation schemes. We also present an iterative approximation algorithm for the Quota version, and show that a related problem is NP-complete.  相似文献   
4.
Why does a state directly police certain kinds of transnational perpetrators by itself while indirectly policing other kinds through their host government? To address this question, we develop a formal model, where Defender chooses either to police Perpetrators or to make Proxy do so. According to our theory, the delegation of policing can enhance its effectiveness in light of Proxy’s three advantages: (a) Proxy can convince Perpetrators of punishments more credibly than Defender (communicative advantage); (b) Proxy is more likely to identify Perpetrators and detect what they hold dear (informational advantage); (c) Proxy can cripple and punish Perpetrators more effectively (offensive advantage). On the other hand, the delegation may cause inefficiency if Defender has limited information about Proxy’s choice or cost of policing. Depending on the relative size between these advantages and disadvantages, one of the following four forms of policing may emerge: (i) Defender polices Perpetrators on her own (e.g. Somali counter-piracy operations); (ii) Defender induces Proxy to police Perpetrators (U.S. War on Drugs in Colombia and Mexico); (iii) Defender and Proxy together police Perpetrators (Operation Inherent Resolve); (iv) two or more Defender-Proxy states police Perpetrators in each’s own domain (Interpol, Budapest Convention).  相似文献   
5.
In this article, we consider a classic dynamic inventory control problem of a self‐financing retailer who periodically replenishes its stock from a supplier and sells it to the market. The replenishment decisions of the retailer are constrained by cash flow, which is updated periodically following purchasing and sales in each period. Excess demand in each period is lost when insufficient inventory is in stock. The retailer's objective is to maximize its expected terminal wealth at the end of the planning horizon. We characterize the optimal inventory control policy and present a simple algorithm for computing the optimal policies for each period. Conditions are identified under which the optimal control policies are identical across periods. We also present comparative statics results on the optimal control policy. © 2008 Wiley Periodicals, Inc. Naval Research Logistics 2008  相似文献   
6.
This article surveys the body of available evidence regarding the spill-over effects of defence R&D. It reviews the routes through which defence R&D spills over to the economy with positive externalities – in terms of new products, technologies or processes; the barriers that impede or block such a process; potential negative repercussions, and the measure of such effects. The main conclusion is that the uncertainty of these effects, and the inaccurate appraisal of their value, hardly supports informed decisions concerning defence R&D policies.  相似文献   
7.
The article examines the findings of the Commission of Inquiry established by the Norwegian government in 2014 to evaluate all aspects of Norway’s civilian and military contribution to the international operation in Afghanistan from 2001 to 2014. Concerned with the wider implications of the Commission’s findings, it focuses on two issues in particular: (1) Norway’s relations with the US, a close and long-standing strategic ally whose resources, capabilities and dominance of decision-making dwarfed that of all other coalition partners in Afghanistan; and (2) Norway’s record in the province of Faryab, where, from 2005 to 2012, a Norwegian-led Provincial Reconstruction Team was charged with bringing security, good governance and development to the province. How Norway prioritised and managed relations with the US highlights and helps to problematise the challenges – political, practical and moral – facing small and medium-sized powers operating in a coalition alongside the US. Norwegian efforts in Faryab are revealing of the dilemmas and contradictions that plagued and, ultimately, fatally undermined the international intervention as a whole. As such, Norway’s experience provides a microcosm through which the inherent limitations of the attempt to transfer the structures of modern statehood and Western democracy to Afghanistan can be better understood.  相似文献   
8.
The article concerns the strategy development processes of the South African Department of Defence in South Africa. It intends to identify the probable causes of the observed failure of the South African National Defence Force to develop appropriate departmental policy and military strategy. Military strategy comprises force development, force employment, force deployment and the coordination of these elements in pursuit of national, grand-strategic objectives. (See Dennis M. Drew and Donald M. Snow, Making Twenty-first Century Strategy: An Introduction to Modern National Security Processes and Problems Montgomery, AL: Air University Press, Maxwell Air Force Base, November 2006, 103). Of these four constructs, the article concerns itself only with the first two. The article analyses two complementary approaches to strategy formation: a resource-driven, inside-out model and an interests-driven, outside-in method. The article concludes that the Department is preoccupied with the inside-out method to the lasting detriment of the declared strategic intent of the defence policy.  相似文献   
9.
刘明  彭天笑 《国防科技》2018,39(3):032-036
军队翻译能力是军队外语能力的组成部分。军队翻译能力的理论框架包含构成要素、存在形式和转换机制三个组成部分。新的安全形势对我军的翻译保障在广度和深度上都有了新的要求,而军队翻译能力供给相对不足。需要对军队翻译能力进行规划,加强翻译人力资源的储备与管理,提升翻译保障信息化水平。  相似文献   
10.
ABSTRACT

From 1944 to 1973 Australia attempted to acquire atomic weaponry. This ambition was driven by the desire to contribute to defending British interests in Asia, fears of invasion by China, Indonesia, and Japan, great-power war, and the belief that nuclear weapons were merely bigger and better conventional weapons, that they would proliferate, and that US security assurances lacked credibility. Although the pursuit of the bomb was eventually abandoned, this was not the result of US assurances. Rather, geopolitical changes in Australia’s environment meant that a major attack on the continent was unlikely to occur outside the context of a confrontation between the US, China, and the Soviet Union. This article argues that Australia may soon have to rethink its policies towards US extended deterrence and instead focus on developing its own deterrent.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号