首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2805篇
  免费   520篇
  国内免费   280篇
  2024年   1篇
  2023年   7篇
  2022年   18篇
  2021年   36篇
  2020年   29篇
  2019年   30篇
  2018年   34篇
  2017年   113篇
  2016年   163篇
  2015年   86篇
  2014年   194篇
  2013年   141篇
  2012年   194篇
  2011年   210篇
  2010年   128篇
  2009年   222篇
  2008年   198篇
  2007年   189篇
  2006年   236篇
  2005年   217篇
  2004年   186篇
  2003年   129篇
  2002年   107篇
  2001年   110篇
  2000年   84篇
  1999年   90篇
  1998年   78篇
  1997年   65篇
  1996年   53篇
  1995年   49篇
  1994年   54篇
  1993年   41篇
  1992年   39篇
  1991年   36篇
  1990年   22篇
  1989年   13篇
  1988年   2篇
  1987年   1篇
排序方式: 共有3605条查询结果,搜索用时 46 毫秒
991.
针对B/S模式优质课评分系统的开发需求,提出了基于SSH(Struts+Spring+Hi—bernate)架构的解决方案,给出了系统设计与开发实现的具体过程。实践证明,SSH架构在构建业务系统中能够提高开发效率,增强系统的可扩展性和可维护性。  相似文献   
992.
国家安全委员会具有“内外兼备”的基本职能,即:将维护国家安全与创新社会治理、创新有效预防和化解社会矛盾体制、健全公共安全体系等内政事务并列并举,在维护国内安全稳定方面也肩负重任。它较之现今的“国安领导小组”更为广泛和重要,是一个应对有别于国家日常工作之外的应急的危机管理机构,是应对可能的、突发的、潜在的对国家安全、利益构成威胁的前瞻性机构。  相似文献   
993.
火控雷达组网是应对未来末端防御作战挑战的有效途径。提出了基于指挥信息系统的火控雷达组网方式,并分析了该方式的优势。继而基于末端防御战斗部署一般要求和火控雷达组网系统对空侦察配系的特殊要求,经仿真计算得出和分析了火控雷达组网系统的典型对空侦察配系。最后详细论述了火控雷达组网系统的指挥控制要点。研究结果对于促进末端防御部队形成以信息系统为核心的体系作战能力具有重要意义。  相似文献   
994.
计算机科学与技术专业课程体系的建设与实践   总被引:1,自引:1,他引:0  
计算机科学与技术专业是一门随着社会、经济、科技的飞速发展而不断更新的学科,为了培养具有开拓、创新、适应社会发展的高素质工程应用型人才,我们必须不断加强计算机科学与技术专业的课程体系建设。本文结合我校计算机科学与技术专业教学和应用现状,通过建立良好的课程体系,使课程教学能更系统、更具目的性;同时将实践教学摆到了重要的位置,注重课程体系的组织与学生能力培养和素质提高的密切结合。  相似文献   
995.
Secret French plans to launch guerrilla-style raids on the British Isles devised in the spring of 1796 were referred to as ‘chouanneries’. The name and concept behind these small-war operations were modelled on the irregular tactics used by the Chouan rebels in the Vendée, which the French state army had brutally quashed, but some wished to transfer into their institutional practice. Part of France's ongoing military strategy in the war against Britain, which included fomenting insurrection in Ireland, these irregular operations were to be manned partially by pardoned deserters and released convicts and prisoners of war. Of these, only Tate's brief invasion of Wales in 1797 was realised, but the surviving plans provide insightful historical lessons into an Anglophobic mindset shared by a small network of practitioners and policy deciders on the effectiveness of such shock and awe tactics. Largely motivated by the desire to take revenge for Britain's support of counter-revolutionaries in the Vendée, these plans could more aptly be referred to as counter-‘chouanneries’.  相似文献   
996.
Many conventional models that characterize the reliability of multicomponent systems are developed on the premise that for a given system, the failures of its components are independent. Although this facilitates mathematical tractability, it may constitute a significant departure from what really takes place. In many real‐world applications, system components exhibit various degrees of interdependencies, which present significant challenges in predicting degradation performance and the remaining lifetimes of the individual components as well as the system at large. We focus on modeling the performance of interdependent components of networked systems that exhibit interactive degradation processes. Specifically, we focus on how the performance level of one component affects the degradation rates of other dependent components. This is achieved by using stochastic models to characterize how degradation‐based sensor signals associated with the components evolve over time. We consider “Continuous‐Type” component interactions that occur continuously over time. This type of degradation interaction exists in many applications, in which interdependencies occur on a continuum. We use a system of stochastic differential equations to capture such “Continuous‐Type” interaction. In addition, we utilize a Bayesian approach to update the proposed model using real‐time sensor signals observed in the field and provide more accurate estimation of component residual lifetimes. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 286–303, 2014  相似文献   
997.
针对非相干背景光辐照二波耦合中参数的最佳匹配设计问题,提出了一种基于随机共振理论的研究方法。首先,文章通过二波耦合过程进行物理机理分析和数值实验分析,证明了该问题在本质上可归结为一种随机共振现象。其次,从随机共振的角度,研究其中的最佳参数设计问题,给出了一种分布处理的最优参数设计流程。按照该方法,在给定增益要求的情况下,先根据信号光饱和与否来确定晶体长度,最后根据非相干光的比例对增益的影响来确定非相干光的比例。仿真实验表明,经过最佳参数设计后,信号的增益和输出信噪比上均有显著提高。  相似文献   
998.
We consider the problem of assessing the value of demand sharing in a multistage supply chain in which the retailer observes stationary autoregressive moving average demand with Gaussian white noise (shocks). Similar to previous research, we assume each supply chain player constructs its best linear forecast of the leadtime demand and uses it to determine the order quantity via a periodic review myopic order‐up‐to policy. We demonstrate how a typical supply chain player can determine the extent of its available information in the presence of demand sharing by studying the properties of the moving average polynomials of adjacent supply chain players. The retailer's demand is driven by the random shocks appearing in the autoregressive moving average representation for its demand. Under the assumptions we will make in this article, to the retailer, knowing the shock information is equivalent to knowing the demand process (assuming that the model parameters are also known). Thus (in the event of sharing) the retailer's demand sequence and shock sequence would contain the same information to the retailer's supplier. We will show that, once we consider the dynamics of demand propagation further up the chain, it may be that a player's demand and shock sequences will contain different levels of information for an upstream player. Hence, we study how a player can determine its available information under demand sharing, and use this information to forecast leadtime demand. We characterize the value of demand sharing for a typical supply chain player. Furthermore, we show conditions under which (i) it is equivalent to no sharing, (ii) it is equivalent to full information shock sharing, and (iii) it is intermediate in value to the two previously described arrangements. Although it follows from existing literature that demand sharing is equivalent to full information shock sharing between a retailer and supplier, we demonstrate and characterize when this result does not generalize to upstream supply chain players. We then show that demand propagates through a supply chain where any player may share nothing, its demand, or its full information shocks (FIS) with an adjacent upstream player as quasi‐ARMA in—quasi‐ARMA out. We also provide a convenient form for the propagation of demand in a supply chain that will lend itself to future research applications. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 515–531, 2014  相似文献   
999.
This article modifies the associations made by historians and political scientists of Spanish guerrilla warfare with revolutionary insurgency. First, it explains how the guerrilla phenomenon moved from a Leftist to a reactionary symbol. Second, it compares the insurgency and counter-insurgency features of the Carlist War (1833–1840) with those of the better-known Peninsular War (1808–1814). Third, it shows how erstwhile guerrilla leaders during the Carlist War made their expertise available to the counter-insurgency, in a socio-economic as well as military setting. This article revises the social banditry paradigm in nineteenth-century Spain in the under-researched context of Europe bloodiest nineteenth-century civil war.  相似文献   
1000.
目标选择是军事计划的关键要素之一。基于马尔科夫决策方法,解决具有复杂目标间关联的多阶段目标选择问题。使用与或树描述目标体系各层状态间的影响关联,并以目标体系整体失效为求解目的,建立了基于离散时间MDP的多阶段打击目标选择模型。在LRTDP算法基础上提出一种启发式方法,通过判断从当前目标体系状态到达体系失效状态的演化过程中的可能资源消耗和失败概率,来提供对当前状态的评估值,该方法能有效排除问题搜索空间中不能到达体系失效目的的中间状态,压缩了由于目标间复杂关联而增长的巨大状态空间。用实验验证了该方法有效性,实验结果表明,该方法直观实用,对目标间具有复杂关联关系的目标打击决策有一定参考价值。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号