全文获取类型
收费全文 | 287篇 |
免费 | 135篇 |
国内免费 | 31篇 |
出版年
2022年 | 3篇 |
2021年 | 8篇 |
2020年 | 3篇 |
2019年 | 3篇 |
2018年 | 5篇 |
2017年 | 14篇 |
2016年 | 28篇 |
2015年 | 25篇 |
2014年 | 45篇 |
2013年 | 54篇 |
2012年 | 23篇 |
2011年 | 23篇 |
2010年 | 27篇 |
2009年 | 9篇 |
2008年 | 14篇 |
2007年 | 19篇 |
2006年 | 21篇 |
2005年 | 21篇 |
2004年 | 26篇 |
2003年 | 12篇 |
2002年 | 14篇 |
2001年 | 12篇 |
2000年 | 6篇 |
1999年 | 9篇 |
1998年 | 6篇 |
1997年 | 6篇 |
1996年 | 5篇 |
1995年 | 1篇 |
1994年 | 4篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1991年 | 2篇 |
1990年 | 3篇 |
排序方式: 共有453条查询结果,搜索用时 15 毫秒
121.
设计是作战行动筹划的重要步骤,精确工程保障需要对工程保障行动进行精密的设计和精确管理与控制。科学管理采用科学实验的方法,通过劳动方法标准化和差别计件工资制度,有效提高了工作效率,其基本原理经过百余年的实际检验,被证明是一个成熟有效的管理方法。借鉴科学管理理论,需要对工程保障行动进行动作研究,进而研究工程保障行动的作业标准,以期提高其保障效率。精益管理是在科学管理在新的历史时期的发展与改进,它使用了准时制、零库存、均衡生产、持续改进等先进的管理理念和六西格玛管理、成组技术等先进技术,为基于信息系统体系作战的工程保障能力生成提供了有益的借鉴,可加深我们对精确工程保障的理解,促进精确工程保障研究的可操作性。 相似文献
122.
苏阳 《武警工程学院学报》2014,(2):38-42
二维离散余弦/反余弦变换是图像处理算法的核心。基于DSP处理器或软件实现速度较低,以及ASIC实现芯片的面积和功耗都较大,本文研究了一种基于行列分解结构的二维DCT/IDCT变换,在两级一维DCT/IDCT变换之间插入双RAM结构,通过乒乓操作保证了前后级DCT/IDCT运算的并行性,提高了运算速度。电路结构在QuartusII中进行了逻辑综合,通过Modelsim编写激励对逻辑功能进行了仿真验证,并将仿真结果与Mat—lab仿真结果进行了比较。结果表明该模块功能正确,能够为图像处理提供良好的处理性能。 相似文献
123.
张震 《武警工程学院学报》2014,(2):56-58
Web服务基于一系列开放的标准技术,具有松散耦合、语言中立、平台无关、互操作性的优点。近年来,在武警部队信息化建设中,很多平台都构建了Web服务。但由于Web服务的各个平台对WS—Security规范的支持不统一,这就为全部队涉及不同业务部门的异构平台web服务的安全交互带来了问题。通过分析NET和Axis2Web服务平台对WS—Security规范的支持,提出一个方案来解决多个异构Web服务平台之间的安全交互问题,最后通过实验证明了该方案的可行性。 相似文献
124.
Sylvie Kleinman 《Small Wars & Insurgencies》2014,25(4):784-799
Secret French plans to launch guerrilla-style raids on the British Isles devised in the spring of 1796 were referred to as ‘chouanneries’. The name and concept behind these small-war operations were modelled on the irregular tactics used by the Chouan rebels in the Vendée, which the French state army had brutally quashed, but some wished to transfer into their institutional practice. Part of France's ongoing military strategy in the war against Britain, which included fomenting insurrection in Ireland, these irregular operations were to be manned partially by pardoned deserters and released convicts and prisoners of war. Of these, only Tate's brief invasion of Wales in 1797 was realised, but the surviving plans provide insightful historical lessons into an Anglophobic mindset shared by a small network of practitioners and policy deciders on the effectiveness of such shock and awe tactics. Largely motivated by the desire to take revenge for Britain's support of counter-revolutionaries in the Vendée, these plans could more aptly be referred to as counter-‘chouanneries’. 相似文献
125.
谢美华 《国防科技大学学报》2014,36(3):36-40
针对非相干背景光辐照二波耦合中参数的最佳匹配设计问题,提出了一种基于随机共振理论的研究方法。首先,文章通过二波耦合过程进行物理机理分析和数值实验分析,证明了该问题在本质上可归结为一种随机共振现象。其次,从随机共振的角度,研究其中的最佳参数设计问题,给出了一种分布处理的最优参数设计流程。按照该方法,在给定增益要求的情况下,先根据信号光饱和与否来确定晶体长度,最后根据非相干光的比例对增益的影响来确定非相干光的比例。仿真实验表明,经过最佳参数设计后,信号的增益和输出信噪比上均有显著提高。 相似文献
126.
We consider the problem of assessing the value of demand sharing in a multistage supply chain in which the retailer observes stationary autoregressive moving average demand with Gaussian white noise (shocks). Similar to previous research, we assume each supply chain player constructs its best linear forecast of the leadtime demand and uses it to determine the order quantity via a periodic review myopic order‐up‐to policy. We demonstrate how a typical supply chain player can determine the extent of its available information in the presence of demand sharing by studying the properties of the moving average polynomials of adjacent supply chain players. The retailer's demand is driven by the random shocks appearing in the autoregressive moving average representation for its demand. Under the assumptions we will make in this article, to the retailer, knowing the shock information is equivalent to knowing the demand process (assuming that the model parameters are also known). Thus (in the event of sharing) the retailer's demand sequence and shock sequence would contain the same information to the retailer's supplier. We will show that, once we consider the dynamics of demand propagation further up the chain, it may be that a player's demand and shock sequences will contain different levels of information for an upstream player. Hence, we study how a player can determine its available information under demand sharing, and use this information to forecast leadtime demand. We characterize the value of demand sharing for a typical supply chain player. Furthermore, we show conditions under which (i) it is equivalent to no sharing, (ii) it is equivalent to full information shock sharing, and (iii) it is intermediate in value to the two previously described arrangements. Although it follows from existing literature that demand sharing is equivalent to full information shock sharing between a retailer and supplier, we demonstrate and characterize when this result does not generalize to upstream supply chain players. We then show that demand propagates through a supply chain where any player may share nothing, its demand, or its full information shocks (FIS) with an adjacent upstream player as quasi‐ARMA in—quasi‐ARMA out. We also provide a convenient form for the propagation of demand in a supply chain that will lend itself to future research applications. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 515–531, 2014 相似文献
127.
Mark Lawrence 《Small Wars & Insurgencies》2014,25(4):843-857
This article modifies the associations made by historians and political scientists of Spanish guerrilla warfare with revolutionary insurgency. First, it explains how the guerrilla phenomenon moved from a Leftist to a reactionary symbol. Second, it compares the insurgency and counter-insurgency features of the Carlist War (1833–1840) with those of the better-known Peninsular War (1808–1814). Third, it shows how erstwhile guerrilla leaders during the Carlist War made their expertise available to the counter-insurgency, in a socio-economic as well as military setting. This article revises the social banditry paradigm in nineteenth-century Spain in the under-researched context of Europe bloodiest nineteenth-century civil war. 相似文献
128.
测距精度是评估卫星自主完好性监测接收机在导航信号畸变环境下工作性能的一个重要指标。推导了卫星自主完好性监测接收机在国际民航组织二阶阶跃畸变模型下采用早晚相干跟踪处理时测距精度与畸变模型参数的解析表达式,理论分析和仿真结果表明数字畸变将导致接收机伪码鉴相器输出曲线存在过零点偏差,数字畸变量基本不影响接收机测距方差;模拟畸变将扭曲相关峰函数和鉴相器输出曲线,但鉴相器输出基本上不存在过零点偏差,模拟畸变参数、前端滤波器带宽和早晚码间距共同影响接收机的测距方差。 相似文献
129.
Romain Esmenjaud 《African Security Review》2014,23(2):172-177
The creation of an African Capacity for Immediate Response to Crisis (ACIRC) is a sign of Africa's willingness to take its destiny into its own hands. Presented as a reaction to the slowness of the development of the African Standby Force (ASF), it is also a response to some of the ASF's conceptual weaknesses. This decision reflects a wish to establish an instrument better equipped to deal with the challenges Africa is facing. Departing from the (sub)regional logic of the ASF results from a desire to take into account the transnational nature of threats, while its enlarged mandate is meant to offer Africa the capacity to intervene in all kinds of conflicts, including by undertaking peace enforcement activities. But the obstacles on the road towards the actual creation and mobilisation of this capacity should not be underestimated. These include material difficulties, but also political tensions, between ‘small’ and ‘big’ states as well as between the African Union and subregional organisations. The risk then is high that the ACIRC, whose announcement came as a reaction to France's intervention in Mali, ends up joining the ranks of the many ‘anti-imperialist’ phantoms haunting the history of the Organization of African Unity/African Union (OAU/AU). Confronted by events considered ‘neocolonial’ initiatives, African actors have indeed traditionally reacted by launching grand projects that never got off the ground. However, by actually establishing this new instrument, they may also demonstrate that times have definitively changed. 相似文献
130.
Malte Brosig 《African Security Review》2014,23(3):225-242
This article presents survey data on the African Peace and Security Architecture (APSA). It focuses explicitly on two aspects: the internal constitution and achievements of the APSA; and coordination and cooperation with external actors, such as Regional Economic Communities, the United Nations and the European Union. The survey, conducted between October 2011 and December 2012, targeted 198 security experts in international organisations, think tanks, academia and non-governmental organisations. It reveals the APSA's current stage of development, achievements and challenges. 相似文献