全文获取类型
收费全文 | 899篇 |
免费 | 189篇 |
国内免费 | 54篇 |
出版年
2024年 | 2篇 |
2023年 | 8篇 |
2022年 | 5篇 |
2021年 | 17篇 |
2020年 | 23篇 |
2019年 | 19篇 |
2018年 | 18篇 |
2017年 | 53篇 |
2016年 | 62篇 |
2015年 | 26篇 |
2014年 | 62篇 |
2013年 | 69篇 |
2012年 | 74篇 |
2011年 | 87篇 |
2010年 | 56篇 |
2009年 | 80篇 |
2008年 | 55篇 |
2007年 | 52篇 |
2006年 | 64篇 |
2005年 | 52篇 |
2004年 | 44篇 |
2003年 | 23篇 |
2002年 | 28篇 |
2001年 | 31篇 |
2000年 | 27篇 |
1999年 | 26篇 |
1998年 | 16篇 |
1997年 | 14篇 |
1996年 | 3篇 |
1995年 | 10篇 |
1994年 | 7篇 |
1993年 | 6篇 |
1992年 | 7篇 |
1991年 | 6篇 |
1990年 | 8篇 |
1989年 | 1篇 |
1988年 | 1篇 |
排序方式: 共有1142条查询结果,搜索用时 15 毫秒
61.
明确了装备体系和核心保障能力的概念内涵。针对核心保障能力的评价问题,从评价参数和评价方法两个方面入手,系统整理了国内外开展关于核心保障能力的问题特点和研究进展,总结了现有研究成果,通过对照比较,指出了现有研究中存在的不足之处。在此基础上,从装备体系核心保障能力评价问题的外军研究成果、基础理论、系统分析和保障仿真技术4个方面,提出了后续的研究建议,对于相关科研人员具有参考和借鉴意义。 相似文献
62.
现代信息化战争是体系与体系的对抗,区域作战联合装备保障成为信息化条件下装备保障的主要方式,实施科学正确的装备保障指挥,进行保障任务分配对于提高保障效益具有非常重要的意义。通过区域作战装备保障任务的特点,依据区域保障要求建立了包括转场时间在内和不同作战方向上作战单元的重要程度不同的装备保障任务分配模型,保证了重要方向上最晚完成保障任务的作战单元保障时间最短和非重要方向上最晚完成保障任务的作战单元保障时间最短。最后,应用遗传算法给出了区域联合作战装备保障任务分配模型的求解方法和步骤,具有一定的科学性和实用性。 相似文献
63.
64.
65.
66.
Extant literature documents a relationship between military deployment and the risk of an international terrorist attack against citizens of the deploying country. It appears that deployment significantly increases the possibility of terrorist actions in the home country. In particular, if country A decides to send troops to nation B, then citizens of the former country are more likely to fall victim of an attack carried out by a terrorist organisation originating from the latter country. Contributing to this line of literature, we further refine this relationship by distinguishing between regions where the troops are sent as well as by introducing differences between types of deployment. Our results indicate that missions to Asia and the Middle East are more dangerous than missions to other regions as reflected by the terrorist threat in the home country. Robustness tests do however show that the significance of the location variable Asia is predominantly attributed to the mission to Afghanistan. As for types of deployment, only ad hoc missions seem to increase the risk of an attack, whereas no significant results are found for other missions such as operations under UN and NATO flag. Leaving out the missions to Iraq and Afghanistan however also increases the danger resulting from missions by fixed coalitions. Our results find however no evidence that ‘wearing a blue helmet’ increases the probability of a terrorist attack at home. 相似文献
67.
68.
We consider the problem of scheduling a set of n jobs on a single batch machine, where several jobs can be processed simultaneously. Each job j has a processing time pj and a size sj. All jobs are available for processing at time 0. The batch machine has a capacity D. Several jobs can be batched together and processed simultaneously, provided that the total size of the jobs in the batch does not exceed D. The processing time of a batch is the largest processing time among all jobs in the batch. There is a single vehicle available for delivery of the finished products to the customer, and the vehicle has capacity K. We assume that K = rD, where and r is an integer. The travel time of the vehicle is T; that is, T is the time from the manufacturer to the customer. Our goal is to find a schedule of the jobs and a delivery plan so that the service span is minimized, where the service span is the time that the last job is delivered to the customer. We show that if the jobs have identical sizes, then we can find a schedule and delivery plan in time such that the service span is minimum. If the jobs have identical processing times, then we can find a schedule and delivery plan in time such that the service span is asymptotically at most 11/9 times the optimal service span. When the jobs have arbitrary processing times and arbitrary sizes, then we can find a schedule and delivery plan in time such that the service span is asymptotically at most twice the optimal service span. We also derive upper bounds of the absolute worst‐case ratios in both cases. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 470–482, 2015 相似文献
69.
对某小型电动无人机(以下简称SEPUAV)在其左翼破损40%面积矩下的操稳特性进行详细分析。首先在此损伤下典型大侧滑角定常工作点附近进行特殊的小扰动线性化,然后进行特征根和飞行运动模态的分析;其次对此特殊构型SEPUAV进行操稳特性、时频响应特性进行分析。分析结果表明:左翼破损40%面积矩SEPUAV出现特有运动模态并影响全部纵侧向运动状态的响应;部分传递函数出现较多非最小相位零点从而导致初始响应发生反向;部分通道的Bode图中出现多个波峰波谷并有相角提前等现象。分析结果对后续容损飞行控制器的设计起到铺垫的作用。 相似文献
70.
针对当前通信保障方案缺少科学有效的评估方法,提出一种基于满意度的优选方法。从保障性、可靠性、时效性和经济性等4个方面,建立了评价指标体系;结合各个评价指标的特点,给出了具体量化方法,克服了评价时的主观性,并对量化后的结果进行了规范化处理;利用满意度理论,通过求解一系列关于指标权重的线性规划问题,确定了各评价指标的权重值;计算各预选方案的综合效能值,确定最终排序。最后,结合某次通信保障案例,对4个预选方案进行比较,该方法计算结果与实际相符,证明了其有效性。 相似文献