全文获取类型
收费全文 | 723篇 |
免费 | 233篇 |
国内免费 | 30篇 |
出版年
2024年 | 2篇 |
2023年 | 1篇 |
2022年 | 3篇 |
2021年 | 15篇 |
2020年 | 22篇 |
2019年 | 17篇 |
2018年 | 16篇 |
2017年 | 44篇 |
2016年 | 34篇 |
2015年 | 30篇 |
2014年 | 57篇 |
2013年 | 109篇 |
2012年 | 38篇 |
2011年 | 35篇 |
2010年 | 38篇 |
2009年 | 29篇 |
2008年 | 26篇 |
2007年 | 43篇 |
2006年 | 36篇 |
2005年 | 43篇 |
2004年 | 38篇 |
2003年 | 26篇 |
2002年 | 25篇 |
2001年 | 40篇 |
2000年 | 15篇 |
1999年 | 24篇 |
1998年 | 20篇 |
1997年 | 21篇 |
1996年 | 22篇 |
1995年 | 16篇 |
1994年 | 42篇 |
1993年 | 15篇 |
1992年 | 8篇 |
1991年 | 13篇 |
1990年 | 10篇 |
1989年 | 5篇 |
1988年 | 5篇 |
1987年 | 3篇 |
排序方式: 共有986条查询结果,搜索用时 15 毫秒
141.
涉外型院校实施体育“双语教学”的可行性研究 总被引:2,自引:0,他引:2
焦峪平 《兵团教育学院学报》2006,16(3):49-51
在社会飞速发展的时代,经济的进步促使知识的日新月异,导致教学模式的不断创新。伴随着我国加入WTO,双语教学应运而生.在体育教学中运用双语教学,是体育教学模式的大胆尝试和教学手段的创新.涉外型院校具有实施体育双语教学得天独厚的条件,双语教学的实施具有重要意义,并有可行性。 相似文献
142.
提出了一种新颖简单的虹膜内边缘(瞳孔)定位算法.此算法分别对虹膜图像的每一行进行处理.首先,采用一种简单的齿形变换对虹膜图像每一行的灰度曲线进行变换,变换后的灰度曲线为齿形并且虹膜内边缘点出现在齿形曲线的转折点处.然后,根据在虹膜内边缘点处齿形灰度曲线的斜率由负值变为正值的特点,检测虹膜内边缘点并定位虹膜内边缘的位置.此算法具有新颖、简单、准确和速度快等特点. 相似文献
143.
编程实现局域网内可靠传输文件的方法研究 总被引:2,自引:0,他引:2
针对在开发船舶动力系统分布式设计环境过程中遇到的文件传输问题,讨论了分别基于Socket技术和.NET Remoting技术的编程实现方法.通过比较发现,后者具有编程简单、使用可靠等方面的明显优势.另外,通过实验方式确定了传送过程中数据块大小的选择,并对文件加密解密的问题采用了加入随机数据的方式进行解决. 相似文献
144.
Peter Gastrow 《African Security Review》2013,22(1):39-43
This article discusses the validity of national security threats in Botswana and whether they justified the creation of the Directorate of Intelligence and Security Services (DISS), which has been controversial since its formation. Since its inception in 2008, the DISS has been accused of many human rights violations and politicisation. Without fully deliberating on the basis for its creation, some discourses have focused on the politicised operations without relation to what the DISS is supposed to be doing. The author works under the assumption that debates should be shaped by whether it was necessary to create the DISS, and, if so, how we can shape and steer debates on its oversight, management, reform and operations. This article argues that despite the politicisation of the DISS, Botswana's national security threats are both real and imagined; and that domestic threats to national security have moved from the conceptual ‘imagined’ category to the ‘real’. However, that in itself did not warrant the design and mandate of the DISS, and the article argues that it was external threats that really warranted the creation of a civilian intelligence agency. The article concludes that Botswana faces a plethora of external security threats – traditional and non-traditional – that warranted the creation and continuance of the DISS. 相似文献
145.
Xiaohui Wu 《The Nonproliferation Review》2013,20(2):317-338
China-U.S. cooperation over the most difficult security problem in Northeast Asia—the North Korean nuclear issue—in essence projects its bigger power game amid the tectonic shifts of Asian geopolitics. The nuclear issue affords a test case to gauge the future posture of China and the United States in East Asia and their partnership in that conflict-prone region. Approaches to resolving this issue must take into account the geopolitical realignment of Asia, Washington's reorientation of relations with its Asian allies, and China's rise as an influential regional player and the subsequent regional response. However, the long-standing mistrust between China and the United States is contributing to a lack of substantial progress in Korean nonproliferation efforts. The declared nuclear test by Pyongyang further put the denuclearization cooperation between China and the Unites States on the line. China-U.S. cooperation in denuclearizing Pyongyang may either produce lasting stability for the region or create ‘‘collateral damage,’’ with the North Korean issue paling in comparison. 相似文献
146.
147.
Heather Williams 《The Nonproliferation Review》2013,20(3):493-498
George F. Kennan: An American Life, by John Lewis Gaddis. The Penguin Press, 2011. 784 pages, $40. 相似文献
148.
分析了战时装备调配保障决策的特点,运用模糊聚类分析法对装备调配保障对象进行了分组和优先级排序,以此为基础,运用目标规划法构建了战时装备调配保障决策模型,最后,通过实例验证了模型的可行性和有效性. 相似文献
149.
《Arms and Armour》2013,10(1):76-84
AbstractIn an earlier issue, Dr. Timothy Dawson suggested that the fighting techniques found in Royal Armouries MS I.33 may have been influenced by earlier Byzantine sword and shield combat. For evidence, he cites a series of 9th-century ivory carvings depicting similar positions found in I.33. This article is a response to Dr. Dawson’s, in which it is argued that there is ample evidence for similar combat positions being found in Western Europe that both pre-date and are contemporary with I.33. 相似文献
150.
Magnus Petersson 《战略研究杂志》2013,36(4):607-632
This article deals with Scandinavian intelligence cooperation and its significance for Swedish security policy during the first part of the Cold War. First, the development of the cooperation is described. Second, it is related to a wider context. Third, intelligence in Swedish security policy-making is discussed. Common security interests caused the cooperation. For Sweden, it represented an important part of the wider contacts with the West. Although military intelligence was important for Swedish security policy-making in some respects (e.g. military readiness), it did not have a significant influence in others (e.g. the politicians' threat perceptions). One important reason is the Swedish tradition of weak connections between the political and military leadership. 相似文献