首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   899篇
  免费   282篇
  国内免费   50篇
  2022年   13篇
  2021年   17篇
  2020年   14篇
  2019年   12篇
  2018年   8篇
  2017年   56篇
  2016年   47篇
  2015年   37篇
  2014年   56篇
  2013年   113篇
  2012年   121篇
  2011年   133篇
  2010年   44篇
  2009年   31篇
  2008年   41篇
  2007年   62篇
  2006年   65篇
  2005年   76篇
  2004年   61篇
  2003年   55篇
  2002年   24篇
  2001年   37篇
  2000年   34篇
  1999年   16篇
  1998年   5篇
  1997年   9篇
  1996年   10篇
  1995年   4篇
  1994年   1篇
  1993年   3篇
  1992年   7篇
  1991年   6篇
  1990年   9篇
  1989年   4篇
排序方式: 共有1231条查询结果,搜索用时 15 毫秒
991.
The study examines the effect of noncognitive skills on early career choices among young job seekers. Specifically, we analyze the influence of personality traits on the decision by military applicants either to choose the military or a civilian career option. We use a unique micro-level data-set of applicants to the US Navy and exploit the fact that many individuals who initially apply for military jobs eventually choose civilian careers instead. In this institutional setting, job candidates use new information to update their beliefs about the military job match. Personality traits are viewed as productive abilities that influence applicants’ expectations about the economic return to the job and occupational training offered by the Navy. The study finds that many of the 15 lower order personality facets associated with the Big Five traits are predictive of applicants’ job choices and provides suggestive evidence of a link between personality traits, job match expectations, and career choice.  相似文献   
992.
993.
Humanitarian operations may pose challenges to which armed forces prepared for warfighting seem rather ill-equipped. It is the aim of this article to examine in what way military ethics should be adapted to humanitarian tasks. Two ideal types of military ethics are defined here: warfighting and humanitarian. The warfighting ethic is supposed to maximise the utility of the military in war and combat and to that end utilises the virtues of loyalty and honour. In contrast, humanitarian obligations require to a larger extent the development of personal integrity and an ability to follow one’s own conscience. The adaptation of military ethics is demonstrated in the case studies of the UK armed forces and the German Bundeswehr. Whereas the moral code of the UK armed forces remains anchored in the principles of the warfighting ethic, the case of the Bundeswehr presents a military ethic closely approximating the humanitarian ideal type.  相似文献   
994.
995.
刚桂虎  赵显 《国防科技》2017,38(2):033-037
随着全球范围的城市化进程不断推进,未来军事斗争向城市环境中发展是必然趋势。在城市作战需求分析的基础上,剖析了传统装备的"城市病",阐述了小型旋翼无人机在城市军事行动中的应用潜能。研究表明,针对现有装备在城市作战中显示出的若干短板,发展基于小型旋翼无人机打造侦察平台与精确打击平台将是一个较好的解决方案。而运用军民融合的发展模式挖掘小型旋翼无人机军用潜力,在提升军队作战能力,降低成本均具有积极意义。  相似文献   
996.
规整化SAR图像特征提取   总被引:3,自引:0,他引:3       下载免费PDF全文
SAR成像算法通常都基于FFT运算,图像分辨率要受到瑞利限的制约。为了提高图像分辨率,目前常用的SAR/ISAR超分辨成像算法大多借助于现代谱估计技术。从解方程的角度考虑,认为有限长数据的高分辨率谱估计是一个欠定方程问题,估计的结果存在"病态"性。在Bayes估计准则下,把信号谱的先验概率密度作为规整项包含进信号频谱的最大后验概率估计中,提高谱估计的分辨率。将这种方法用于SAR图像峰值特征提取,提高了图像分辨率。  相似文献   
997.
Almost all discussions of cyberwarfare, other cyber-attacks, and cyber-espionage have focused entirely on the Internet as the chief means of damage – the Internet as a ‘vector,’ using a term from the theory of infectious diseases. However there are a variety of means, some of which have already been used, that involve cyber-exploitation using vectors other than the Internet. Malware can be installed in the integrated circuits of computers and servers, but also in any devices attached to them – thumb drives, CDs, printers, scanners, and so on. One can also use various forms of electromagnetic radiation at a distance of meters or more to exfiltrate data or to infiltrate corrupt data. I call this large and diverse family of unwanted interference with the functioning of information processing systems other-than-Internet (OTI) attacks on information systems. Stuxnet, and probably the 2007 Israeli corruption of Syrian air defenses, were OTI attacks. Such OTI techniques are more difficult to develop than creating malware, requiring electronic manufacturing facilities or novel technologies, and are thus accessible only to larger corporations and technologically sophisticated countries. Particularly vulnerable would be countries (like the United States and Europe) whose information processing devices are mainly produced outside of the country. Once exploitations via the Internet become harder to perpetrate, OTI exploitations are certain to grow dramatically, eventually requiring equipment for critical uses to be expensively fabricated in (and transported using) secure facilities; expensive detection measures will have to be instituted. This will create challenges for policy, law, and ethics, as well as greatly increasing the cost of many electronic devices.  相似文献   
998.
The Biological Weapons Convention (BWC) regime currently suffers from a lack of effective compliance procedures. Because a legally binding compliance protocol to the BWC is not available, other measures are needed to stabilize the regime against the risk of violations of its rules. The Treaty on the Non-Proliferation of Nuclear Weapons, the Chemical Weapons Convention, and the experiences of UN inspection teams show that among the necessary components of effective compliance mechanisms are an intermediary level between bilateral consultations of states parties and involvement of the UN Security Council as well as independent assessment capabilities. This article suggests that the UN Secretary General could assume such an intermediary function and, using the authority contained in Article 99 of the UN Charter, could investigate not only alleged use of biological weapons but also alleged breaches of the BWC. A standing expert unit in the Department for Disarmament Affairs could provide the independent expertise necessary for such investigations. Such a compliance mechanism could provisionally help stabilize the BWC regime until a permanent compliance system can be agreed.  相似文献   
999.
针对现代储运过程典型的管道堵塞故障,分析了其对过程监控参数的影响;采用基于主成分分析的故障检测方法,构建了故障检测流程和检测模型;以储运过程典型仿真系统为研究对象,建立了主成分模型;通过模拟不同程度的管道堵塞故障,进行了管道堵塞故障检测的仿真应用研究,获得了管道堵塞故障统计量控制图.实验结果表明了基于主成分分析的故障检测方法的有效性和正确性.  相似文献   
1000.
利用TRNSYS软件对重庆夏季建筑屋顶太阳能光电热一体化系统进行瞬态模拟分析计算,得到系统瞬时发电量与一段时间内累计发电量,光电热模块瞬时进出水温度与太阳能平板集热器瞬时进出水温度,系统一段时间内光电热模块累计有效得热量与一段时间内太阳能平板集热器累计有效得热量,系统的光电转换效率、光热转换效率以及太阳能综合利用效率。结果表明,建筑屋顶太阳能光电热一体化系统是重庆地区建筑太阳能光电热一体化系统适宜的型式。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号