全文获取类型
收费全文 | 500篇 |
免费 | 9篇 |
专业分类
509篇 |
出版年
2021年 | 5篇 |
2020年 | 4篇 |
2019年 | 8篇 |
2018年 | 7篇 |
2017年 | 11篇 |
2016年 | 17篇 |
2015年 | 12篇 |
2014年 | 13篇 |
2013年 | 72篇 |
2012年 | 23篇 |
2011年 | 26篇 |
2010年 | 21篇 |
2009年 | 17篇 |
2008年 | 28篇 |
2007年 | 13篇 |
2006年 | 15篇 |
2005年 | 5篇 |
2004年 | 3篇 |
2002年 | 3篇 |
2001年 | 4篇 |
1998年 | 6篇 |
1997年 | 6篇 |
1995年 | 5篇 |
1994年 | 4篇 |
1993年 | 10篇 |
1992年 | 7篇 |
1991年 | 6篇 |
1989年 | 12篇 |
1988年 | 3篇 |
1987年 | 10篇 |
1986年 | 10篇 |
1985年 | 7篇 |
1984年 | 2篇 |
1983年 | 5篇 |
1982年 | 5篇 |
1981年 | 8篇 |
1980年 | 9篇 |
1979年 | 11篇 |
1978年 | 4篇 |
1977年 | 6篇 |
1976年 | 7篇 |
1975年 | 7篇 |
1974年 | 2篇 |
1973年 | 2篇 |
1972年 | 12篇 |
1971年 | 3篇 |
1970年 | 3篇 |
1969年 | 9篇 |
1968年 | 7篇 |
1966年 | 3篇 |
排序方式: 共有509条查询结果,搜索用时 0 毫秒
401.
L.C.O. Klaus 《Journal of Military Ethics》2016,15(4):275-287
This article shows under which circumstances fraudulent accreditation can occur in Brazilian military hospitals, calling attention to the tone at the top as a critical aspect of military fraud deterrence – and hence as a critical aspect of this branch of military ethics. The problems allegedly found in Brazilian military health institutions were revealed through in-depth interviews conducted with 29 professionals who reported to work or have worked in a Brazilian military hospital. These fraud allegations were mostly associated with false documentation and procedures designed to give the appearance that legal requirements for accreditation were met and could be traced back to a weak or corrupt “tone at the top” coming from military higher ranks. 相似文献
402.
分析了舰船全寿命期和使用期的结构,在此基础上,借助于WSEIAC模型,分别对舰船空调系统在两种保障方式的全寿命使用期效能和费用的各个指标进行了建模,提出了指标计算的思路与计算方法.结合海军舰船特点,在对WSEIAC效能模型进行修改和完善的基础上,给出了计算示例,结果显示了海军舰船空调系统采用岸基保障方式的合理性和优越性. 相似文献
403.
提出一种解决软着陆制动段燃料最优制导以及闭环控制的方案.首先使用庞氏极大值原理将制动段燃料最优问题转化为一个初值问题,并使用遗传算法搜索求解;其次为了解决最优制导的闭环控制问题,将最优弹道作为标称弹道,使用RCS系统对轨道面内两个方向误差量进行解耦,分别使用极限环控制.仿真表明,所规划出的燃料最优弹道比阿波罗方案能节约159.7 kg的燃料,而闭环控制系统可以将初始1 000 m的位置误差和5 m/s的速度误差收敛到接近段入口误差要求以内,在闭环控制过程中,燃料消耗不大于87.75 kg,总体燃料消耗节约至少71.95 kg. 相似文献
404.
Traditionally regarded as a secondary activity in military thinking and practice, the notion of counter-insurgency (COIN) has undergone a remarkable renaissance. This analysis traces the origins of this renaissance to two distinctive schools: a neo-classical school and a global insurgency school. The global insurgency school critiques neo-classical thought and presents itself as a more sophisticated appreciation of current security problems. An examination of the evolution of these two schools of counter-insurgency reveals how the interplay between them ultimately leaves us with a confused and contradictory understanding of the phenomenon of insurgency and the policies and strategies necessary to combat it. 相似文献
405.
侦察卫星及无源对抗方法 总被引:1,自引:0,他引:1
与其他侦察监视手段相比,卫星侦察具有范围广、时效性好、可重复观测、情报信息准确以及获取途径安全合法等优点.叙述了侦察卫星的工作原理和在军事上的应用价值,介绍了成像侦察卫星及其发展现状,最后提出了一些有效的无源对抗方法. 相似文献
406.
It is well known that a minimal makespan permutation sequence exists for the n × 3 flow shop problem and for the n × m flow shop problem with no inprocess waiting when processing times for both types of problems are positive. It is shown in this paper that when the assumption of positive processing times is relaxed to include nonnegative processing times, optimality of permutation schedules cannot be guaranteed. 相似文献
407.
408.
We present techniques for classifying Markov chains with a continuous state space as either ergodic or recurrent. These methods are analogous to those of Foster for countable space chains. The theory is presented in the first half of the paper, while the second half consists of examples illustrating these techniques. The technique for proving ergodicity involves, in practice, three steps: showing that the chain is irreducible in a suitable sense; verifying that the mean hitting times on certain (usually bounded) sets are bounded, by using a “mean drift” criterion analogous to that of Foster; and finally, checking that the chain is such that bounded mean hitting times for these sets does actually imply ergodicity. The examples comprise a number of known and new results: using our techniques we investigate random walks, queues with waiting-time-dependent service times, dams with general and random-release rules, the s-S inventory model, and feedback models. 相似文献
409.
410.
The economic theory of defense has traditionally described public safety as achieved through investments that deter adversaries. Deterrence is, however, ineffective and pre‐emptive defense is required when a population of intended victims confronts supreme‐value suicide terror. A moral dilemma then arises, since pre‐emption may impose collective punishment, while in the absence of pre‐emption the population of intended victims is exposed to acts of terror. We consider how a population of intended terror victims confronts the moral dilemma, and compare the threatened population's response with the public‐safety recommendations of external judges who are not personally affected by the threat of terror. 相似文献