首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   678篇
  免费   68篇
  国内免费   34篇
  2024年   1篇
  2023年   1篇
  2021年   14篇
  2020年   7篇
  2019年   29篇
  2018年   29篇
  2017年   34篇
  2016年   38篇
  2015年   25篇
  2014年   56篇
  2013年   104篇
  2012年   18篇
  2011年   38篇
  2010年   39篇
  2009年   44篇
  2008年   44篇
  2007年   35篇
  2006年   38篇
  2005年   32篇
  2004年   39篇
  2003年   29篇
  2002年   10篇
  2001年   16篇
  2000年   8篇
  1999年   7篇
  1998年   6篇
  1997年   4篇
  1996年   4篇
  1995年   7篇
  1994年   5篇
  1993年   4篇
  1992年   6篇
  1991年   4篇
  1990年   2篇
  1989年   3篇
排序方式: 共有780条查询结果,搜索用时 78 毫秒
141.
针对我军后方仓库弹药装卸运输环节对人员叉车操作的安全性需求,设计出了叉车操作测试场地路线,归纳总结了人员操作叉车进行弹药装卸运输环节中的安全失效形式及失效原因,构建了HRA评估数学模型.选取我军某后方仓库搬运机械建制班人员为对象,进行了实地测试,得到了弹药装卸运输环节的人为失误概率.测试结果表明,基于CREAM方法能够较好地解决后方仓库弹药装卸运输环节人为失误概率的量化问题.  相似文献   
142.
As part of a bio-inspired design process, the authors examine exoskeletal sensors found in insects and their potential application to armor and hardened buildings. In this way, the outer hardening of a structure or vehicle would not limit the ability of occupants to arrive at an actionable picture of the outer environment. To this end, various sensor modalities employed by insects are compared and contrasted with their current human-engineered equivalents. In several sensing modalities, biosensors perform better, are smaller, and more energy efficient than human-engineered equivalents. They note that biological designs tend to employ non-linear response to signal amplitude and respond with heightened sensitivity over a greater dynamic range of signals than human-engineered sensors. The insect biological sensors have structural and mechanical innovations that preserve the protective capacity of the exoskeleton.  相似文献   
143.
为了克服新形势下军事发展面临的一系列环境安全问题,不断加强军事环境管理工作,拓展并解析了军事环境安全的概念,建立了基于WSR方法论的军事环境安全三维分析模型.结合模型的“物理”、“事理”、“人理”分析,提出了一套相互关联的军事环境安全策略,为进一步深入研究并制定军事环境安全战略规划提供了重要参考.  相似文献   
144.
Policies to counter the threat of weapons of mass destruction (WMD) have, for the most part, been modeled on strategies originally devised to counter the danger of nuclear proliferation. While useful in countering a traditional CBN (chemical/biological/nuclear)/WMD threat, current counter-proliferation and non-proliferation regimes are insufficient to meet the challenge of maritime terrorism. Maritime terrorism represents a new category of threat; one that partially overlaps with conventional WMD, but for which – due to the scope and nature of the maritime industry – traditional counter-proliferation policies may be inadequate and even inappropriate. This article outlines the means by which maritime shipping can be used as WMD and discusses the policies implemented to deal with these threats, in light of the challenges presented to traditional conceptualizations of WMD and counter-proliferation strategies.  相似文献   
145.
In 1924, HMCS Thiepval provided logistical support to a British attempt to circumnavigate the world by air. But the ship had another secret mission. Concerned America and Japan were fortifying their north Pacific possessions in violation of the 1922 Washington Treaty, and fearing war might be inevitable, the Canadian navy sent the Thiepval to covertly spy upon American and Japanese facilities. No cheating was discovered, but in the longer run, Canadian concerns about hostilities in the north Pacific were ‘on the mark’ correct.  相似文献   
146.
This article argues that the debate on security sector reform (SSR) needs to be taken further by taking into consideration the fact that, even though the SSR concept was not originally developed as an element in stabilising states undergoing an insurgency, it is very much being used for exactly that. When conducting counterinsurgency with a focus on the creation of stability, the baseline will ultimately have to be security sector stabilisation (SSS) as a precondition for complete SSR implementation. However, the two must be connected to avoid them undermining each other. This is important if a comprehensive approach to programme implementation and especially sustainability is to guide the programme, and not just isolated ‘train and equip’ stand-alone projects that do not solve either the initial need for stabilisation or the long-term need for accountable security forces. Currently, in Afghanistan the surge for security by the international military is in danger of overtaking the other elements of the SSR, thereby undermining the primary end state and thus risking laying the wrong foundation for the long-term process of SSR.  相似文献   
147.
There were several high-profile violent incidents in 2011 in Kazakhstan, including several bombings, shootings that targeted police, and a protest turned clash that resulted in a number of deaths. Some of the perpetrators reportedly had links with radical religious groups. An overlooked aspect of the violence is how it is reported in Kazakhstan. There are active, competent media in Kazakhstan, which are largely unknown in the West. An examination of these incidents using the media in Kazakhstan can provide a unique insight into what took place. While Western sources quickly blamed radical religious groups with international connections, media in Kazakhstan have found that there are other reasons for the violence.  相似文献   
148.
Since the peace agreements of 2002–2003 which ended the second war in the Democratic Republic of Congo, reconstruction of the army has been an inherently political process, in common with other attempts to carry out security sector reform (SSR). This article briefly sketches out the Congolese army's history, then attempts to fill a gap in the literature on Congolese SSR by detailing what can be found of the actual structure and shape of the present army. The efforts that have been made to reform the army are then examined, followed by a conclusion which examines the major issues and possible ways forward.  相似文献   
149.
提出了一种新的三粒子量子安全直接通信协议。通信过程利用decoy光子来检测窃听,保证信道安全。发送方将秘密消息编码在不同幺正操作上,通信双方通过Bell基和Z基测量可直接传递秘密消息。由于所有粒子都用于传输秘密消息,且传输一次可获得两比特信息,该协议具有较高的量子比特及量子密码协议效率;三粒子纠缠态的制备是已实现技术,该协议具有实际操作的意义。此外,该协议在量子信道中也是安全的。  相似文献   
150.
随着中美实力差距不断缩小和信息技术的发展与扩散,网络安全成为中美新的竞争点和摩擦点,中美在网络安全问题上展开新一轮的博弈,具体体现为网络空间治理权之争、中美网络安全战略博弈和网络技术优势的夺取。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号