首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1128篇
  免费   308篇
  国内免费   25篇
  2022年   7篇
  2021年   52篇
  2020年   9篇
  2019年   9篇
  2018年   7篇
  2017年   14篇
  2016年   17篇
  2015年   46篇
  2014年   50篇
  2013年   89篇
  2012年   31篇
  2011年   28篇
  2010年   57篇
  2009年   82篇
  2008年   61篇
  2007年   80篇
  2006年   34篇
  2005年   44篇
  2004年   11篇
  2003年   14篇
  2002年   15篇
  2001年   11篇
  2000年   29篇
  1999年   119篇
  1998年   86篇
  1997年   70篇
  1996年   54篇
  1995年   52篇
  1994年   53篇
  1993年   44篇
  1992年   38篇
  1991年   39篇
  1990年   49篇
  1989年   10篇
  1988年   4篇
  1987年   13篇
  1986年   6篇
  1985年   9篇
  1983年   13篇
  1982年   3篇
  1978年   1篇
  1973年   1篇
排序方式: 共有1461条查询结果,搜索用时 15 毫秒
171.
本文以标准化与知识产权的关系为中心,详细分析了标准与版权、标准与专利权的关系,进而就标准化在知识创新和技术创新中发挥的作用进行了探讨,并对可以采取的措施提出了新的见解。  相似文献   
172.
本文从编写测量、试验方法类标准的基本要求、应包括的内容、各部分技术内容的编写和正文内容之外其他要素的编写等方面介绍了“测量、试验方法类标准的编写”。  相似文献   
173.
在飞行器隐身技术的研究中发现,机(弹)载雷达天线将在飞行器鼻锥方向产生很强的RCS贡献,如何降低雷达天线的RCS而又保证自身雷达正常工作已成为目标隐身技术中的一个关键课题.文中介绍了由十字型振子单元构成的带阻式频率选择表面的选频特性,探讨了该表面在低RCS抛物面天线和低RCS卡塞格伦天线中的工程应用,分析了应用于主、副反射面天线的隐身性能,最后得出两点结论,指出在副反射面天线的工程应用中更容易实现。  相似文献   
174.
在归纳经济可承受性思想含义的基础上,给出了装备经济可承受性的数学模型,并对其特征和实践指导作用进行了分析。重点研究了经济可承受性在武器装备综合评价和武器装备建设中的应用。本文给出的提高经济可承受性的具体方法,具有可操作性。  相似文献   
175.
本文提出了产品标准中的生产型标准和贸易型标准的分类,介绍了两类标准的结构特点,剖析了我国产品标准向贸易型标准转化的趋势,指出了面对这种转化的趋势,现行的标准中存在着的问题,进而提出应对这种转化的策略建议。  相似文献   
176.
论文介绍并分析了美军标准化技术文件在其舰船研制各个阶段的功能和作用。  相似文献   
177.
为了给在核化生事件中遂行任务的应急处置人员提供符合要求的个人防护装备,美国于2001年实施了NFPA1994《化学、生物恐怖事件用防护装具标准》.介绍了该标准中提出的化学、生物恐怖事件防护装备的技术要求,包括设计要求和技术性能要求,并讨论了各级防护装具的使用场合和时机、防护服的型式结构和对防护材料的要求.  相似文献   
178.
Design and management of complex systems with both integer and continuous decision variables can be guided using mixed‐integer optimization models and analysis. We propose a new mixed‐integer black‐box optimization (MIBO) method, subspace dynamic‐simplex linear interpolation search (SD‐SLIS), for decision making problems in which system performance can only be evaluated with a computer black‐box model. Through a sequence of gradient‐type local searches in subspaces of solution space, SD‐SLIS is particularly efficient for such MIBO problems with scaling issues. We discuss the convergence conditions and properties of SD‐SLIS algorithms for a class of MIBO problems. Under mild conditions, SD‐SLIS is proved to converge to a stationary solution asymptotically. We apply SD‐SLIS to six example problems including two MIBO problems associated with petroleum field development projects. The algorithm performance of SD‐SLIS is compared with that of a state‐of‐the‐art direct‐search method, NOMAD, and that of a full space simplex interpolation search, Full‐SLIS. The numerical results suggest that SD‐SLIS solves the example problems efficiently and outperforms the compared methods for most of the example cases. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 305–322, 2017  相似文献   
179.
We study a setting with a single type of resource and with several players, each associated with a single resource (of this type). Unavailability of these resources comes unexpectedly and with player‐specific costs. Players can cooperate by reallocating the available resources to the ones that need the resources most and let those who suffer the least absorb all the costs. We address the cost savings allocation problem with concepts of cooperative game theory. In particular, we formulate a probabilistic resource pooling game and study them on various properties. We show that these games are not necessarily convex, do have non‐empty cores, and are totally balanced. The latter two are shown via an interesting relationship with Böhm‐Bawerk horse market games. Next, we present an intuitive class of allocation rules for which the resulting allocations are core members and study an allocation rule within this class of allocation rules with an appealing fairness property. Finally, we show that our results can be applied to a spare parts pooling situation.  相似文献   
180.
Extant literature documents a relationship between military deployment and the risk of an international terrorist attack against citizens of the deploying country. It appears that deployment significantly increases the possibility of terrorist actions in the home country. In particular, if country A decides to send troops to nation B, then citizens of the former country are more likely to fall victim of an attack carried out by a terrorist organisation originating from the latter country. Contributing to this line of literature, we further refine this relationship by distinguishing between regions where the troops are sent as well as by introducing differences between types of deployment. Our results indicate that missions to Asia and the Middle East are more dangerous than missions to other regions as reflected by the terrorist threat in the home country. Robustness tests do however show that the significance of the location variable Asia is predominantly attributed to the mission to Afghanistan. As for types of deployment, only ad hoc missions seem to increase the risk of an attack, whereas no significant results are found for other missions such as operations under UN and NATO flag. Leaving out the missions to Iraq and Afghanistan however also increases the danger resulting from missions by fixed coalitions. Our results find however no evidence that ‘wearing a blue helmet’ increases the probability of a terrorist attack at home.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号