首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3869篇
  免费   233篇
  国内免费   28篇
  2021年   75篇
  2019年   93篇
  2018年   61篇
  2017年   95篇
  2016年   86篇
  2015年   92篇
  2014年   107篇
  2013年   722篇
  2012年   55篇
  2011年   61篇
  2010年   91篇
  2009年   77篇
  2008年   90篇
  2007年   90篇
  2006年   62篇
  2005年   73篇
  2004年   65篇
  2003年   45篇
  2002年   60篇
  2001年   42篇
  2000年   41篇
  1999年   77篇
  1998年   70篇
  1997年   71篇
  1996年   81篇
  1995年   70篇
  1994年   72篇
  1993年   71篇
  1992年   69篇
  1991年   85篇
  1990年   45篇
  1989年   74篇
  1988年   83篇
  1987年   73篇
  1986年   74篇
  1985年   65篇
  1983年   43篇
  1982年   43篇
  1981年   46篇
  1980年   51篇
  1979年   45篇
  1978年   49篇
  1977年   45篇
  1976年   45篇
  1975年   46篇
  1974年   52篇
  1973年   50篇
  1972年   52篇
  1971年   43篇
  1969年   40篇
排序方式: 共有4130条查询结果,搜索用时 15 毫秒
221.
通过建立直径为1.4,1.6,1.8 mm,长度为6,8,10 mm,螺纹深度为0.2 mm,螺纹间距0.5 mm的Ti质微种植体支抗与颌骨有限元模型,研究在常用载荷1.96 N正畸力与微种植体长轴呈45°,60°和75°三种角度时的Ti质微种植体应力分布和大小。分析得出,应力主要集中在微种植体颈部1 mm内,在其颈部1.2 mm的范围内应力值的衰减都很明显,在颈部1.2 mm的范围内曲线较陡。在设定的加载条件下,不同直径的微种植体应力值呈规则的变化趋势,直径1.8 mm,45°时微种植体的各应力值极值最小。微种植体长度对应力的影响不大,位移变化均较小。  相似文献   
222.
介绍了数字自动增益控制(AGC)技术在数字中频接收机中的实现方法’,提出了利用 DSP Builder模型库设计的一种实用的数字自动增益控制电路,所设计的电路在数字中频接收机系统内工作良好。该数字 AGC具有快速收敛、结构简单、性能稳定和成本低等特点。占用 Altera StratixⅡ FPGA 片上163个自适应逻辑单元(ALUTs)。  相似文献   
223.
Multiple Objectives Optimization is much seen in combination with linear functions and even with linear programming, together with an adding of the objectives by using weights. With distance functions, normalization instead of weights is used. It is also possible that together with an additive direct influence of the objectives on the utility function a mutual utility of the objectives exists under the form of a multiplicative representation. A critical comment is brought on some representations of this kind. A full‐multiplicative form may offer other opportunities, which will be discussed at length in an effort to exclude weights and normalization. This theoretical approach is followed by an application for arms procurement. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 327–340, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10014  相似文献   
224.
225.
The “gold‐mining” decision problem is concerned with the efficient utilization of a delicate mining equipment working in a number of different mines. Richard Bellman was the first to consider this type of a problem. The solution found by Bellman for the finite‐horizon, continuous‐time version of the problem with two mines is not overly realistic since he assumed that fractional parts of the same mining equipment could be used in different mines and this fraction could change instantaneously. In this paper, we provide some extensions to this model in order to produce more operational and realistic solutions. Our first model is concerned with developing an operational policy where the equipment may be switched from one mine to the other at most once during a finite horizon. In the next extension we incorporate a cost component in the objective function and assume that the horizon length is not fixed but it is the second decision variable. Structural properties of the optimal solutions are obtained using nonlinear programming. Each model and its solution is illustrated with a numerical example. The models developed here may have potential applications in other areas including production of items requiring the same machine or choosing a sequence of activities requiring the same resource. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 186–203, 2002; DOI 10.1002/nav.10008  相似文献   
226.
Blue strike aircraft enter region ? to attack Red targets. In Case 1, Blue conducts (preplanned) SEAD to establish air superiority. In the (reactive) SEAD scenario, which is Case 2, such superiority is already in place, but is jeopardized by prohibitive interference from Red, which threatens Blue's ability to conduct missions. We utilize both deterministic and stochastic models to explore optimal tactics for Red in such engagements. Policies are developed which will guide both Red's determination of the modes of operation of his engagement radar, and his choice of Blue opponent to target next. An index in the form of a simple transaction kill ratio plays a major role throughout. Published 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 723–742, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10046  相似文献   
227.
228.
Since the end of the Cold War the process of nation building has become a priority in the attempt to maintain world order and security in the wake of the instability and devastation wrought by failed and war-torn states. The proliferation of nation-building missions has led to their diversification and the need to marshal a vast array of resources in order to attain substantial levels of success. This article deals with a new and important component of peacekeeping and nation-building missions, that of civilian policing. The article outlines the goals of using civilian police officers in nation-building missions and discusses a variety of problems (pragmatic, legal, and cultural) that policing may introduce to such missions. This discussion is focused around the civilian policing component of the United Nations Mission in Kosovo. It delineates the successes and hardships so far experienced during the mission in Kosovo and explores the insights that the mission may provide for similar projects in the future.  相似文献   
229.
The newest US Cabinet department is Homeland Security (DHS). One of the most controversial aspects in the process of developing this entity is the role of intelligence in providing information on the increasing terrorist threat. This article examines the intelligence challenges for homeland security. In doing so, it explores the problems of merging disparate cultures - law enforcement vs intelligence, civil entities vs military, federal vs state and local jurisdictions, and domestic focus vs international perspective. Given the nature of the globalized, asymmetric threat, the need for more and better intelligence sharing is obvious. Terrorists and other criminals do not respect international boundaries; in fact, they exploit them in an effort to prevent effective and timely countermeasures. This demands that robust multinational collaboration and interagency coordination be practiced.  相似文献   
230.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号