全文获取类型
收费全文 | 396篇 |
免费 | 130篇 |
国内免费 | 25篇 |
出版年
2024年 | 2篇 |
2022年 | 4篇 |
2021年 | 15篇 |
2020年 | 8篇 |
2019年 | 7篇 |
2018年 | 6篇 |
2017年 | 24篇 |
2016年 | 30篇 |
2015年 | 14篇 |
2014年 | 33篇 |
2013年 | 61篇 |
2012年 | 26篇 |
2011年 | 30篇 |
2010年 | 27篇 |
2009年 | 28篇 |
2008年 | 33篇 |
2007年 | 26篇 |
2006年 | 19篇 |
2005年 | 26篇 |
2004年 | 15篇 |
2003年 | 17篇 |
2002年 | 15篇 |
2001年 | 11篇 |
2000年 | 5篇 |
1999年 | 10篇 |
1998年 | 12篇 |
1997年 | 6篇 |
1996年 | 4篇 |
1995年 | 2篇 |
1994年 | 5篇 |
1993年 | 5篇 |
1992年 | 2篇 |
1991年 | 4篇 |
1990年 | 17篇 |
1989年 | 2篇 |
排序方式: 共有551条查询结果,搜索用时 15 毫秒
371.
Radicalism or radicalisation has become a serious political and academic theme in recent years and any incident involving Muslims now almost automatically acquires the cachet, as events in 2016 and 2017 have shown. However, despite vast sums and resources expended on the subject no one can define what they mean by ‘it’. This should make us pause and question what precisely it is that causes so much alarm and is it worth the resources, time and effort employed to respond to it? 相似文献
372.
373.
374.
This article is concerned with a general multi‐class multi‐server priority queueing system with customer priority upgrades. The queueing system has various applications in inventory control, call centers operations, and health care management. Through a novel design of Lyapunov functions, and using matrix‐analytic methods, sufficient conditions for the queueing system to be stable or instable are obtained. Bounds on the queue length process are obtained by a sample path method, with the help of an auxiliary queueing system. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012 相似文献
375.
《战略研究杂志》2012,35(5):713-734
Abstract In contemporary counter-insurgency campaigns de-escalation is typically achieved by obtaining the local population's collaboration. The rationale underlying this approach is that such collaboration spawns control over the population and therefore weakens the insurgent's position. This article seeks to understand how this approach is practised in the reality of contemporary counter-insurgency warfare. In Iraq as well as Afghanistan counter-insurgents were confronted with fragmented indigenous societies in which the various local segments were dominated by local power-holders. Consequently, obtaining the local population's collaboration required co-option of these agents. As such a strategy of co-option is a highly localized approach, this article focuses on Afghanistan's Uruzgan province and analyzes the implementation of co-option by the Netherlands' Task Force Uruzgan (TFU), which operated there from 2006 to 2010. The analysis discusses how the counter-insurgents obtained a profound understanding of Uruzgan's societal landscape and how co-option of local power-holders became part of the counter-insurgency routine. In the end, co-option was successfully implemented as TFU even succeeded in obtaining the collaboration of previously marginalized elements of the population. However, as the methods employed for co-option were mainly of a persuasive nature, the TFU co-option strategy was less effective in containing the influence of notorious spoilers. Thus this case study provides an insight into the dynamics and limitations of co-option as a tool for de-escalation in contemporary counter-insurgency warfare. 相似文献
376.
根据UML/OCL和建模环境提供的软件模型信息,以一个武器装备管理信息系统的装备入库顺序图为例,在分析UML/OCL顺序图的语法和对象间的交互信息的基础上产生测试场景,提供了一种基于UML/OCL的面向对象的软件测试方法,并提出测试自动化的设想,对软件测试有一定的借鉴作用。 相似文献
377.
378.
采用分相控制的UDVR主电路结构,利用瞬时波形比较法,基于三角波比较的delta增量逆变技术,建立了UDVR的PSCAD/EMTDC仿真模型,解决了低压配电网线路遭受雷击、绝缘子闪络等引发的单相接地故障在线路重合闸期间引发的电压跌落问题,保证了敏感负荷在此期间的持续供电的电能质量.仿真结果表明:模型建立正确,控制方法可行. 相似文献
379.
为了在开放、动态的环境中建立上下文感知系统,首先需要定义一个适合于知识共享的上下文描述,即上下文建模.提出了一种基于本体的通用上下文模型,由顶层上下文本体和6种特定本体构成.结合2008年汶川地震救援应用本体,描述了应用本体与通用上下文模型之间的关系.最后结合Web服务技术,提出了上下文感知的Web服务发现方法,对上下文感知计算的应用作了初步探索. 相似文献
380.
采用B/S模式和ASP技术,对基础实验教学系统进行了全新的设计,这种设计对强化基础实验教学的效果与质量将起到积极和有益的作用。 相似文献