首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   229篇
  免费   21篇
  国内免费   4篇
  2021年   2篇
  2020年   4篇
  2019年   6篇
  2018年   7篇
  2017年   19篇
  2016年   12篇
  2015年   2篇
  2014年   15篇
  2013年   85篇
  2012年   10篇
  2011年   6篇
  2010年   5篇
  2009年   2篇
  2008年   5篇
  2007年   11篇
  2006年   4篇
  2005年   7篇
  2004年   8篇
  2003年   3篇
  2002年   5篇
  2001年   2篇
  2000年   4篇
  1999年   3篇
  1998年   2篇
  1997年   3篇
  1996年   3篇
  1995年   4篇
  1994年   3篇
  1993年   2篇
  1992年   2篇
  1991年   5篇
  1990年   1篇
  1989年   2篇
排序方式: 共有254条查询结果,搜索用时 15 毫秒
51.
受区域生态环境的影响,新疆绿洲城市发展表现出水平低、结构不合理、效益差等特点,城市化缺乏规模优势、外向性和市场动力,制约着新疆社会经济的进一步发展。只有立足绿洲的生态和区域条件,从城乡统筹、区域协调角度,强化区域在组织、集聚、协调经济活动中的特殊作用,采取超常规的城市化发展战略,通过强化开放和流通解决市场问题,采取“相对集中发展战略”,建设大城市、大基地和大通道,克服市场化结构和布局矛盾,才能充分发挥城市的核心带动作用。  相似文献   
52.
改革开放后,特别是兵团建制恢复后的二十年来,兵团的工业经济体制进行了一系列的改革,主要改革路线是:企业整顿—放权让利—承包经营责任制—现代企业制度—资产经营责任制。通过改革,兵团工业的发展可以说取得了很大的成绩,但是也存在一些问题。总结这二十年来的发展经验,对于在今后的工作中更好地推进兵团工业经济的改革具有重要的借鉴意义。  相似文献   
53.
对工控软件InTouch的特点、开发环境和应用方法进行了简要介绍,提出了一种以InTouch为主体,结合其它应用软件的硬件--服务器--客户机模拟器开发模式,根据这种模式研制出了一套舰艇电站模拟器.使用结果表明,这种基于InTouch的模拟器是十分成功的.  相似文献   
54.
本文从合理使用内存的角度,分析了影响大数据量关系型数据库管理系统运行速度的原因,提出了提高运行速度的对策及重组数据的4条原则。  相似文献   
55.
对故障诊断专家系统方案设计作了讨论,提出了方案设计要点、介绍了故障诊断知识库的建立,给出了典型诊断策略。  相似文献   
56.
《防务技术》2020,16(3):712-719
This paper presents a computational study of the air flow past a triangular boattailed projectile. The study shows that there is a single normal shock wave impinges the projectile at transonic speeds. At supersonic speeds, the formed shock waves are smeared compared to a conical boattailed projectile. Also, there is a reduction of the wake region behind the triangular base and the rear stagnation point is nearer to the projectile base resulting in base drag reduction. Moreover, there is an improvement of the stability of the triangular boattailed projectile since a lower overturning moment is incurred.  相似文献   
57.
This paper looks at the impact of military technology diffusion on military assistance operations (MAO), in the United States known as Security Force Assistance or SFA. The discussion looks conceptually at the role of technological change and how it interacts with martial cultures in military assistant operations. I argue that growing trends in science and technology suggest potential conflicts between culture and technology. Relying on a culture-technology model drawn from anthropology, the paper contends that new technologies will present increasing challenges for the emerging MAO landscape. The paper will illustrate that the techno-science gap will continue to grow as innovations such as robotics, sensors, and networks continue to develop. Finally, the paper will look at ways to overcome this conflict between culture and technology.  相似文献   
58.
59.
We study an infinite‐horizon, N‐stage, serial production/inventory system with two transportation modes between stages: regular shipping and expedited shipping. The optimal inventory policy for this system is a top–down echelon base‐stock policy, which can be computed through minimizing 2N nested convex functions recursively (Lawson and Porteus, Oper Res 48 (2000), 878–893). In this article, we first present some structural properties and comparative statics for the parameters of the optimal inventory policies, we then derive simple, newsvendor‐type lower and upper bounds for the optimal control parameters. These results are used to develop near optimal heuristic solutions for the echelon base‐stock policies. Numerical studies show that the heuristic performs well. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
60.
This paper examines the ways in which the military infringes on the social and political rights of soldiers who joined the Zimbabwe National Army in post-independence Zimbabwe. Contrary to the scholarly and policy debates that present Zimbabwean soldiers as the silent prop behind President Robert Mugabe and the perpetrators of political violence, this paper argues that these soldiers have also been victimised in army barracks. The victimhood of soldiers has been explicit in the ways in which they are forced to execute their duties beyond their professional expectations. In substantiating this argument, the paper explores the unethical military training and the ways in which soldiers are disciplined and punished through Chapter 11:02 of the draconian Defence Act. The paper’s contribution stems from a ‘rights’ perspective that emphasises the right to freedom, justice and protection, which is usually quite silent in the military. But the question is how can soldiers’ concerns be translated into new practices without compromising so-called ‘state security’?  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号