首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   723篇
  免费   233篇
  国内免费   30篇
  2024年   2篇
  2023年   1篇
  2022年   3篇
  2021年   15篇
  2020年   22篇
  2019年   17篇
  2018年   16篇
  2017年   44篇
  2016年   34篇
  2015年   30篇
  2014年   57篇
  2013年   109篇
  2012年   38篇
  2011年   35篇
  2010年   38篇
  2009年   29篇
  2008年   26篇
  2007年   43篇
  2006年   36篇
  2005年   43篇
  2004年   38篇
  2003年   26篇
  2002年   25篇
  2001年   40篇
  2000年   15篇
  1999年   24篇
  1998年   20篇
  1997年   21篇
  1996年   22篇
  1995年   16篇
  1994年   42篇
  1993年   15篇
  1992年   8篇
  1991年   13篇
  1990年   10篇
  1989年   5篇
  1988年   5篇
  1987年   3篇
排序方式: 共有986条查询结果,搜索用时 15 毫秒
141.
涉外型院校实施体育“双语教学”的可行性研究   总被引:2,自引:0,他引:2  
在社会飞速发展的时代,经济的进步促使知识的日新月异,导致教学模式的不断创新。伴随着我国加入WTO,双语教学应运而生.在体育教学中运用双语教学,是体育教学模式的大胆尝试和教学手段的创新.涉外型院校具有实施体育双语教学得天独厚的条件,双语教学的实施具有重要意义,并有可行性。  相似文献   
142.
提出了一种新颖简单的虹膜内边缘(瞳孔)定位算法.此算法分别对虹膜图像的每一行进行处理.首先,采用一种简单的齿形变换对虹膜图像每一行的灰度曲线进行变换,变换后的灰度曲线为齿形并且虹膜内边缘点出现在齿形曲线的转折点处.然后,根据在虹膜内边缘点处齿形灰度曲线的斜率由负值变为正值的特点,检测虹膜内边缘点并定位虹膜内边缘的位置.此算法具有新颖、简单、准确和速度快等特点.  相似文献   
143.
编程实现局域网内可靠传输文件的方法研究   总被引:2,自引:0,他引:2  
针对在开发船舶动力系统分布式设计环境过程中遇到的文件传输问题,讨论了分别基于Socket技术和.NET Remoting技术的编程实现方法.通过比较发现,后者具有编程简单、使用可靠等方面的明显优势.另外,通过实验方式确定了传送过程中数据块大小的选择,并对文件加密解密的问题采用了加入随机数据的方式进行解决.  相似文献   
144.
This article discusses the validity of national security threats in Botswana and whether they justified the creation of the Directorate of Intelligence and Security Services (DISS), which has been controversial since its formation. Since its inception in 2008, the DISS has been accused of many human rights violations and politicisation. Without fully deliberating on the basis for its creation, some discourses have focused on the politicised operations without relation to what the DISS is supposed to be doing. The author works under the assumption that debates should be shaped by whether it was necessary to create the DISS, and, if so, how we can shape and steer debates on its oversight, management, reform and operations. This article argues that despite the politicisation of the DISS, Botswana's national security threats are both real and imagined; and that domestic threats to national security have moved from the conceptual ‘imagined’ category to the ‘real’. However, that in itself did not warrant the design and mandate of the DISS, and the article argues that it was external threats that really warranted the creation of a civilian intelligence agency. The article concludes that Botswana faces a plethora of external security threats – traditional and non-traditional – that warranted the creation and continuance of the DISS.  相似文献   
145.
China-U.S. cooperation over the most difficult security problem in Northeast Asia—the North Korean nuclear issue—in essence projects its bigger power game amid the tectonic shifts of Asian geopolitics. The nuclear issue affords a test case to gauge the future posture of China and the United States in East Asia and their partnership in that conflict-prone region. Approaches to resolving this issue must take into account the geopolitical realignment of Asia, Washington's reorientation of relations with its Asian allies, and China's rise as an influential regional player and the subsequent regional response. However, the long-standing mistrust between China and the United States is contributing to a lack of substantial progress in Korean nonproliferation efforts. The declared nuclear test by Pyongyang further put the denuclearization cooperation between China and the Unites States on the line. China-U.S. cooperation in denuclearizing Pyongyang may either produce lasting stability for the region or create ‘‘collateral damage,’’ with the North Korean issue paling in comparison.  相似文献   
146.
147.
George F. Kennan: An American Life, by John Lewis Gaddis. The Penguin Press, 2011. 784 pages, $40.  相似文献   
148.
分析了战时装备调配保障决策的特点,运用模糊聚类分析法对装备调配保障对象进行了分组和优先级排序,以此为基础,运用目标规划法构建了战时装备调配保障决策模型,最后,通过实例验证了模型的可行性和有效性.  相似文献   
149.
《Arms and Armour》2013,10(1):76-84
Abstract

In an earlier issue, Dr. Timothy Dawson suggested that the fighting techniques found in Royal Armouries MS I.33 may have been influenced by earlier Byzantine sword and shield combat. For evidence, he cites a series of 9th-century ivory carvings depicting similar positions found in I.33. This article is a response to Dr. Dawson’s, in which it is argued that there is ample evidence for similar combat positions being found in Western Europe that both pre-date and are contemporary with I.33.  相似文献   
150.
This article deals with Scandinavian intelligence cooperation and its significance for Swedish security policy during the first part of the Cold War. First, the development of the cooperation is described. Second, it is related to a wider context. Third, intelligence in Swedish security policy-making is discussed. Common security interests caused the cooperation. For Sweden, it represented an important part of the wider contacts with the West. Although military intelligence was important for Swedish security policy-making in some respects (e.g. military readiness), it did not have a significant influence in others (e.g. the politicians' threat perceptions). One important reason is the Swedish tradition of weak connections between the political and military leadership.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号