全文获取类型
收费全文 | 396篇 |
免费 | 130篇 |
国内免费 | 25篇 |
出版年
2024年 | 2篇 |
2022年 | 4篇 |
2021年 | 15篇 |
2020年 | 8篇 |
2019年 | 7篇 |
2018年 | 6篇 |
2017年 | 24篇 |
2016年 | 30篇 |
2015年 | 14篇 |
2014年 | 33篇 |
2013年 | 61篇 |
2012年 | 26篇 |
2011年 | 30篇 |
2010年 | 27篇 |
2009年 | 28篇 |
2008年 | 33篇 |
2007年 | 26篇 |
2006年 | 19篇 |
2005年 | 26篇 |
2004年 | 15篇 |
2003年 | 17篇 |
2002年 | 15篇 |
2001年 | 11篇 |
2000年 | 5篇 |
1999年 | 10篇 |
1998年 | 12篇 |
1997年 | 6篇 |
1996年 | 4篇 |
1995年 | 2篇 |
1994年 | 5篇 |
1993年 | 5篇 |
1992年 | 2篇 |
1991年 | 4篇 |
1990年 | 17篇 |
1989年 | 2篇 |
排序方式: 共有551条查询结果,搜索用时 500 毫秒
351.
本文给出正切函数的有理展开和契比协夫展开式系数的加速计算方法;同时在YH-1机上进行了数值试验,结果表明:用现在的系数来计算正切函数,其精度比原来正切函数的精度可提高30%左右。 相似文献
352.
本文提出了通过源语言到中间语言的变换进行语言扩充的方法。这种方法已用来在YFT77中扩充向量语句,实践证明,这是一种有效、可行的途径。 相似文献
353.
354.
介绍了网络的应用方式,并综合运用各种应用方式实现《海军工程学院学报》的网络发布.这对于充分运用网络资源,提高应用系统开发的灵活性与实用性具有实际意义. 相似文献
355.
从面向对象的程序设计的角度,剖析了CLIENT/SERVER环境下的通用数据库开发工具POWERBUILDER(PB)的特点、基本结构及其开发数据库应用系统的方法。 相似文献
356.
TCP/IP协议簇是一个实际上的网际协议标准,4BSD UNIX操作系统提供了网际间通信的socket机制,以解决应用程序与TCP/IP软件的接口,客户-服务器模型已成为网际环境下的程序设计的实际标准模式。较详细分析了客户-服务器模型的原理,socket编程机制的系统调用,并给出了基于socket系统调用的客户服务器模型实现的方法。 相似文献
357.
Military rapid response mechanisms are generally understood as troops that are on standby, ready to be deployed to a crisis within a short time frame. Yet, the overall track record of the existing multinational rapid response mechanisms within the European Union, the African Union, and North Atlantic Treaty Organization remains disappointing, and the United Nations does not even have a rapidly deployable capacity anymore. Meanwhile, despite that calls for the further development of these mechanisms are still being voiced politically, scholarly literature remains fragmented. This is problematic as many of the obstacles faced by these organizations are similar. This forum uniquely compares experiences from the four aforementioned organizations. Drawing on these insights, this introductory article identifies some key factors that hamper or enable the development and deployment of multinational rapid response mechanisms. 相似文献
358.
Christine Sixta Rinehart 《Defense & Security Analysis》2017,33(1):45-56
The United States’ Air Force (USAF) has developed and used unmanned aerial vehicle (UAV) technology to monitor and assassinate dangerous terrorists in Afghanistan, Iraq, Libya, Pakistan, Somalia, Syria, and Yemen. Currently, there are few countries that possess armed UAV and since the US created much of this technology, the USAF is usually part of the training that automatically accompanies the purchase of its UAVs. The research question this article attempts to answer is, “What is the extent of the United States’ Air Force assistance in the training and proliferation of UAV technology to foreign militaries?” 相似文献
359.
Mark Malan 《African Security Review》2017,26(4):341-361
This essay recalls the immediate and longer-term responses of the US and its allies to the events of 9/11. It contends that the die for contemporary developments in transnational terrorism was cast in the immediate aftermath of 9/11 – in particular the launching of sustained ‘anti-terrorist’ military combat operations in Afghanistan and Iraq, and more covert ‘kinetic’ operations elsewhere in the Middle East and Africa. The essay seeks specifically to expose the counter-productivity of using military operations as the primary antidote to transnational terrorism. Focusing on the African ‘laboratory’ and the spread of transnational terrorism and Islamic militancy, particularly in West and East Africa, the essay concludes that radical Islamists have mastered the ‘battle of the narrative’ and that the Western penchant for dispensing a kinetic brand of medication is feeding rather than fighting the virus of global terrorism. 相似文献
360.
Radicalism or radicalisation has become a serious political and academic theme in recent years and any incident involving Muslims now almost automatically acquires the cachet, as events in 2016 and 2017 have shown. However, despite vast sums and resources expended on the subject no one can define what they mean by ‘it’. This should make us pause and question what precisely it is that causes so much alarm and is it worth the resources, time and effort employed to respond to it? 相似文献