首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   500篇
  免费   9篇
  509篇
  2021年   5篇
  2020年   4篇
  2019年   8篇
  2018年   7篇
  2017年   11篇
  2016年   17篇
  2015年   12篇
  2014年   13篇
  2013年   72篇
  2012年   23篇
  2011年   26篇
  2010年   21篇
  2009年   17篇
  2008年   28篇
  2007年   13篇
  2006年   15篇
  2005年   5篇
  2004年   3篇
  2002年   3篇
  2001年   4篇
  1998年   6篇
  1997年   6篇
  1995年   5篇
  1994年   4篇
  1993年   10篇
  1992年   7篇
  1991年   6篇
  1989年   12篇
  1988年   3篇
  1987年   10篇
  1986年   10篇
  1985年   7篇
  1984年   2篇
  1983年   5篇
  1982年   5篇
  1981年   8篇
  1980年   9篇
  1979年   11篇
  1978年   4篇
  1977年   6篇
  1976年   7篇
  1975年   7篇
  1974年   2篇
  1973年   2篇
  1972年   12篇
  1971年   3篇
  1970年   3篇
  1969年   9篇
  1968年   7篇
  1966年   3篇
排序方式: 共有509条查询结果,搜索用时 0 毫秒
401.
This article shows under which circumstances fraudulent accreditation can occur in Brazilian military hospitals, calling attention to the tone at the top as a critical aspect of military fraud deterrence – and hence as a critical aspect of this branch of military ethics. The problems allegedly found in Brazilian military health institutions were revealed through in-depth interviews conducted with 29 professionals who reported to work or have worked in a Brazilian military hospital. These fraud allegations were mostly associated with false documentation and procedures designed to give the appearance that legal requirements for accreditation were met and could be traced back to a weak or corrupt “tone at the top” coming from military higher ranks.  相似文献   
402.
分析了舰船全寿命期和使用期的结构,在此基础上,借助于WSEIAC模型,分别对舰船空调系统在两种保障方式的全寿命使用期效能和费用的各个指标进行了建模,提出了指标计算的思路与计算方法.结合海军舰船特点,在对WSEIAC效能模型进行修改和完善的基础上,给出了计算示例,结果显示了海军舰船空调系统采用岸基保障方式的合理性和优越性.  相似文献   
403.
提出一种解决软着陆制动段燃料最优制导以及闭环控制的方案.首先使用庞氏极大值原理将制动段燃料最优问题转化为一个初值问题,并使用遗传算法搜索求解;其次为了解决最优制导的闭环控制问题,将最优弹道作为标称弹道,使用RCS系统对轨道面内两个方向误差量进行解耦,分别使用极限环控制.仿真表明,所规划出的燃料最优弹道比阿波罗方案能节约159.7 kg的燃料,而闭环控制系统可以将初始1 000 m的位置误差和5 m/s的速度误差收敛到接近段入口误差要求以内,在闭环控制过程中,燃料消耗不大于87.75 kg,总体燃料消耗节约至少71.95 kg.  相似文献   
404.
Traditionally regarded as a secondary activity in military thinking and practice, the notion of counter-insurgency (COIN) has undergone a remarkable renaissance. This analysis traces the origins of this renaissance to two distinctive schools: a neo-classical school and a global insurgency school. The global insurgency school critiques neo-classical thought and presents itself as a more sophisticated appreciation of current security problems. An examination of the evolution of these two schools of counter-insurgency reveals how the interplay between them ultimately leaves us with a confused and contradictory understanding of the phenomenon of insurgency and the policies and strategies necessary to combat it.  相似文献   
405.
侦察卫星及无源对抗方法   总被引:1,自引:0,他引:1  
与其他侦察监视手段相比,卫星侦察具有范围广、时效性好、可重复观测、情报信息准确以及获取途径安全合法等优点.叙述了侦察卫星的工作原理和在军事上的应用价值,介绍了成像侦察卫星及其发展现状,最后提出了一些有效的无源对抗方法.  相似文献   
406.
It is well known that a minimal makespan permutation sequence exists for the n × 3 flow shop problem and for the n × m flow shop problem with no inprocess waiting when processing times for both types of problems are positive. It is shown in this paper that when the assumption of positive processing times is relaxed to include nonnegative processing times, optimality of permutation schedules cannot be guaranteed.  相似文献   
407.
通过引入流量强度指数和流量分布指数,建立了不同网络流量下的复杂保障网络级联失效抗毁性模型。基于该模型比较分析了无标度网络、随机网络和复杂保障网络在不同流量强度和流量分布下对单个节点的随机失效和故意攻击的抗毁性。结果表明:复杂保障网络的抗毁性随着流量强度的增加急剧下降。此外,流量分布对复杂保障网络的抗毁性也有显著影响。  相似文献   
408.
We present techniques for classifying Markov chains with a continuous state space as either ergodic or recurrent. These methods are analogous to those of Foster for countable space chains. The theory is presented in the first half of the paper, while the second half consists of examples illustrating these techniques. The technique for proving ergodicity involves, in practice, three steps: showing that the chain is irreducible in a suitable sense; verifying that the mean hitting times on certain (usually bounded) sets are bounded, by using a “mean drift” criterion analogous to that of Foster; and finally, checking that the chain is such that bounded mean hitting times for these sets does actually imply ergodicity. The examples comprise a number of known and new results: using our techniques we investigate random walks, queues with waiting-time-dependent service times, dams with general and random-release rules, the s-S inventory model, and feedback models.  相似文献   
409.
410.
The economic theory of defense has traditionally described public safety as achieved through investments that deter adversaries. Deterrence is, however, ineffective and pre‐emptive defense is required when a population of intended victims confronts supreme‐value suicide terror. A moral dilemma then arises, since pre‐emption may impose collective punishment, while in the absence of pre‐emption the population of intended victims is exposed to acts of terror. We consider how a population of intended terror victims confronts the moral dilemma, and compare the threatened population's response with the public‐safety recommendations of external judges who are not personally affected by the threat of terror.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号