首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   396篇
  免费   130篇
  国内免费   25篇
  2024年   2篇
  2022年   4篇
  2021年   15篇
  2020年   8篇
  2019年   7篇
  2018年   6篇
  2017年   24篇
  2016年   30篇
  2015年   14篇
  2014年   33篇
  2013年   61篇
  2012年   26篇
  2011年   30篇
  2010年   27篇
  2009年   28篇
  2008年   33篇
  2007年   26篇
  2006年   19篇
  2005年   26篇
  2004年   15篇
  2003年   17篇
  2002年   15篇
  2001年   11篇
  2000年   5篇
  1999年   10篇
  1998年   12篇
  1997年   6篇
  1996年   4篇
  1995年   2篇
  1994年   5篇
  1993年   5篇
  1992年   2篇
  1991年   4篇
  1990年   17篇
  1989年   2篇
排序方式: 共有551条查询结果,搜索用时 500 毫秒
351.
本文给出正切函数的有理展开和契比协夫展开式系数的加速计算方法;同时在YH-1机上进行了数值试验,结果表明:用现在的系数来计算正切函数,其精度比原来正切函数的精度可提高30%左右。  相似文献   
352.
本文提出了通过源语言到中间语言的变换进行语言扩充的方法。这种方法已用来在YFT77中扩充向量语句,实践证明,这是一种有效、可行的途径。  相似文献   
353.
智能飞机悬挂物及武器发射/投放管理系统研究   总被引:2,自引:0,他引:2  
采用人工智能技术研究飞机悬挂物及武器发射/投放管理系统,实现对飞机悬挂物及武器发射/投放的自动化、智能化控制与管理,以此减轻驾驶员的工作负担,提高飞机的作战效能和自身的安全性及生存率,并对系统功能进行了具体的编程仿真。  相似文献   
354.
介绍了网络的应用方式,并综合运用各种应用方式实现《海军工程学院学报》的网络发布.这对于充分运用网络资源,提高应用系统开发的灵活性与实用性具有实际意义.  相似文献   
355.
从面向对象的程序设计的角度,剖析了CLIENT/SERVER环境下的通用数据库开发工具POWERBUILDER(PB)的特点、基本结构及其开发数据库应用系统的方法。  相似文献   
356.
TCP/IP协议簇是一个实际上的网际协议标准,4BSD UNIX操作系统提供了网际间通信的socket机制,以解决应用程序与TCP/IP软件的接口,客户-服务器模型已成为网际环境下的程序设计的实际标准模式。较详细分析了客户-服务器模型的原理,socket编程机制的系统调用,并给出了基于socket系统调用的客户服务器模型实现的方法。  相似文献   
357.
Military rapid response mechanisms are generally understood as troops that are on standby, ready to be deployed to a crisis within a short time frame. Yet, the overall track record of the existing multinational rapid response mechanisms within the European Union, the African Union, and North Atlantic Treaty Organization remains disappointing, and the United Nations does not even have a rapidly deployable capacity anymore. Meanwhile, despite that calls for the further development of these mechanisms are still being voiced politically, scholarly literature remains fragmented. This is problematic as many of the obstacles faced by these organizations are similar. This forum uniquely compares experiences from the four aforementioned organizations. Drawing on these insights, this introductory article identifies some key factors that hamper or enable the development and deployment of multinational rapid response mechanisms.  相似文献   
358.
The United States’ Air Force (USAF) has developed and used unmanned aerial vehicle (UAV) technology to monitor and assassinate dangerous terrorists in Afghanistan, Iraq, Libya, Pakistan, Somalia, Syria, and Yemen. Currently, there are few countries that possess armed UAV and since the US created much of this technology, the USAF is usually part of the training that automatically accompanies the purchase of its UAVs. The research question this article attempts to answer is, “What is the extent of the United States’ Air Force assistance in the training and proliferation of UAV technology to foreign militaries?”  相似文献   
359.
This essay recalls the immediate and longer-term responses of the US and its allies to the events of 9/11. It contends that the die for contemporary developments in transnational terrorism was cast in the immediate aftermath of 9/11 – in particular the launching of sustained ‘anti-terrorist’ military combat operations in Afghanistan and Iraq, and more covert ‘kinetic’ operations elsewhere in the Middle East and Africa. The essay seeks specifically to expose the counter-productivity of using military operations as the primary antidote to transnational terrorism. Focusing on the African ‘laboratory’ and the spread of transnational terrorism and Islamic militancy, particularly in West and East Africa, the essay concludes that radical Islamists have mastered the ‘battle of the narrative’ and that the Western penchant for dispensing a kinetic brand of medication is feeding rather than fighting the virus of global terrorism.  相似文献   
360.
Radicalism or radicalisation has become a serious political and academic theme in recent years and any incident involving Muslims now almost automatically acquires the cachet, as events in 2016 and 2017 have shown. However, despite vast sums and resources expended on the subject no one can define what they mean by ‘it’. This should make us pause and question what precisely it is that causes so much alarm and is it worth the resources, time and effort employed to respond to it?  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号