首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2784篇
  免费   470篇
  国内免费   148篇
  2024年   5篇
  2023年   11篇
  2022年   29篇
  2021年   43篇
  2020年   33篇
  2019年   64篇
  2018年   59篇
  2017年   109篇
  2016年   114篇
  2015年   73篇
  2014年   231篇
  2013年   285篇
  2012年   188篇
  2011年   221篇
  2010年   191篇
  2009年   220篇
  2008年   166篇
  2007年   192篇
  2006年   171篇
  2005年   166篇
  2004年   151篇
  2003年   119篇
  2002年   82篇
  2001年   85篇
  2000年   51篇
  1999年   48篇
  1998年   35篇
  1997年   35篇
  1996年   33篇
  1995年   29篇
  1994年   38篇
  1993年   25篇
  1992年   25篇
  1991年   20篇
  1990年   28篇
  1989年   12篇
  1988年   11篇
  1987年   3篇
  1975年   1篇
排序方式: 共有3402条查询结果,搜索用时 829 毫秒
921.
针对武器装备人机界面操控性难以有效评价的问题,提出人机界面操控易用性的评价指标,利用信息距离对易用性进行分析,并建立武器装备人机界面易用性的评估模型,并通过实例进行武器装备易用性评价分析,为武器装备人机界面操控性设计优化及检验标准的制定提供了借鉴。  相似文献   
922.
《Arms and Armour》2013,10(2):124-135
The paper re-interprets the implement known as the ‘Towton Battle Axe’ allegedly found in the river which borders the Towton Battlefield (1461), Yorkshire, England, and which now resides in Alnwick Castle, Northumberland. The paper provides parallels, in the form of comparisons with other weapons, in order that the Towton implement can be shown to be a modified former halberd dating from the early sixteenth century. It is, therefore, highly unlikely that the implement was used in the famous battle.  相似文献   
923.
《Arms and Armour》2013,10(2):145-180
This paper provides new information on the gold sword awarded to Major George Wilson, 39th Regiment of Foot, in 1800 and on the retailer and silversmith, who were commissioned to provide the token.  相似文献   
924.
可信软件是近年来软件工程领域研究的热点,装备软件可信性的研究有助于提升我国国防武器装备的作战效能。首先分析了进行装备软件可信相关研究的必要性;然后阐述可信软件技术的研究现状,主要包括软件可信度量和评估、可信软件的构造与验证、可信软件的演化与控制等三个方面;最后分析了研究可信装备软件面临的挑战。  相似文献   
925.
《Arms and Armour》2013,10(1):33-39
Abstract

An argument is presented that Valentine Green’s mezzotint engraving ‘Queen Elizabeth at the Head of her Army at Tilbury-Fort, A.D. 1588’ (1792) was inspired by the late 18th-century life-sized group of three figures representing the same subject that was formerly on show at the Tower of London. The mezzotint presented in Acta Historica Reginarum Angliae is the only known image of the original pre-1828 setup of the display, showing the figure of the queen in a skirt-like piece of armour that has since been re-identified as King Henry VIII’s tonlet armour.  相似文献   
926.
《Arms and Armour》2013,10(2):128-171
Abstract

The princely garniture ‘commanded’ to be made by Prince Henry Frederick for his cousin, Prince Friedrich Ulrich, later Duke of Brunswick, from the Royal ‘Almain’ Armoury at Greenwich, during the stewardship of the Master Armourer, William Pickering, his son, John, and the men of the Greenwich workshop, is described, illustrated and discussed. Accounts are presented of the lives and work of the Pickerings and the evidence is reviewed for the manufacture of this last decorated garniture of the Greenwich School.  相似文献   
927.
This article argues that the prewar planning process for postwar Iraq was plagued by myriad problems, including a dysfunctional interagency process, overly optimistic assumptions, and a lack of contingency planning for alternative outcomes. These problems were compounded by a lack of civilian capacity during the occupation period, which led to a complicated and often uncoordinated relationship with the military authorities who found themselves taking the lead in many reconstruction activities. Taken together, these mistakes meant that US success on the battlefield was merely a prelude to a postwar insurgency whose outcome remains very much in doubt more than three years later.  相似文献   
928.
分析了基本射表中弹丸飞行时间拟合误差对射击诸元误差的影响,给出了因时间拟合误差引起的射击误差的解析表达,并利用5条典型航路分析了飞行时间拟合误差对射角、射向误差的影响,得出了不同航捷、航高、斜距、目标速度下拟合误差对射击诸元误差的影响关系,从而为确定弹丸飞行时间拟合精度提供依据.  相似文献   
929.
As the world becomes increasingly globalized, interruptions to international trade cannot be permitted. Piracy off the coast of Somalia has hampered international trade in the region and poses significant risks to the sailors required to navigate those waters. Over the past three years the global community has attempted, through a number of different naval tactics, to stop these acts of piracy; however, these tactics have proven ineffective. This article looks at historical precedence and military theory to support the concept of using convoys to protect the thousands of cargo vessels traveling round the Horn of Africa every year. This tactic will greatly decrease the number of successful pirate attacks and save countless lives in the process.  相似文献   
930.
Since Operation Enduring Freedom, Central Asian militants, such as the Islamic Movement of Uzbekistan, have fled to Pakistan from their previous strongholds in Afghanistan. However, many militants have begun returning to Central Asia. Thus questions are raised as to what extent militancy has the potential to thrive with the pending North Atlantic Treaty Organization withdrawal from Afghanistan set for 2014? Is militancy a legitimate security threat to Central Asia? What strategies might militants implement? Thus, this article examines the current state of militancy, analyzes militant trends, introduces Afghanistan and Pakistan into the Central Asian equation, and determines the militants' capability and overall strategy. The article concludes that militant Islam, regardless of its current numbers, remains a viable threat to regional security, Afghanistan will be an essential factor for the future of Central Asian militancy, and the form this re-emergence will take becomes apparent.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号