首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   458篇
  免费   32篇
  国内免费   18篇
  2023年   1篇
  2022年   3篇
  2021年   4篇
  2020年   9篇
  2019年   10篇
  2018年   9篇
  2017年   21篇
  2016年   26篇
  2015年   5篇
  2014年   42篇
  2013年   66篇
  2012年   37篇
  2011年   46篇
  2010年   28篇
  2009年   35篇
  2008年   28篇
  2007年   24篇
  2006年   17篇
  2005年   22篇
  2004年   17篇
  2003年   18篇
  2002年   7篇
  2001年   9篇
  2000年   6篇
  1999年   6篇
  1998年   1篇
  1997年   2篇
  1996年   4篇
  1995年   1篇
  1994年   1篇
  1993年   1篇
  1988年   2篇
排序方式: 共有508条查询结果,搜索用时 15 毫秒
391.
科学计算可视化作为一门新兴应用科学,为水下可视化战场建设提供了一种新的表达手段。首先介绍了科学计算可视化的基本概念,然后通过对其在水下战场建设领域的应用举例,展现了科学计算可视化在该领域的应用前景及其对潜艇战术发展的巨大推动作用。  相似文献   
392.
为了准确有效地判断敌空中目标的威胁程度,运用层次-效用方法,对要地防空作战中空中目标威胁度建立数学模型。先用层次分析法建立影响因素诸指标的层次结构,然后导出指标因素的效用函数,对其加权和线性变换,得到目标威胁度。该模型使复杂的问题条理化,操作性强,便于计算机辅助决策,为防空指挥员对空情威胁做出正确判断提供了科学依据。  相似文献   
393.
隐性逃课是指学生上课时消极参与课堂教学的精神旷课行为,多被认为是越轨行为的一种表现。从社会学视角切入,对大学生隐性逃课问题进行分析,发现将隐性逃课视作越轨行为实际上是学术研究和教学实践过程中简单定性的结果,是对隐性逃课性质的片面反映。这种越轨定性导致了对隐性逃课功能认识、原因分析和应对路径设计的偏离。大学生隐性逃课具有社会根源,是多元社会与高校统一管理之间的张力以及大学无用论和信任危机的产物。在越轨属性之外,大学生隐性逃课还是一种去学校化的反抗和师生之间的默契妥协。因此,对于大学生隐性逃课,应将其置放在社会背景中加以思考,引发人们对社会根源和社会规则本身的关注。  相似文献   
394.
自清末当局引入西方警察制度起,中国警察权力的行使逐步规范,呈现出明显的统一化倾向。其表现包括:军队与警察职能的剥离;民间社会警察权向专业警察机关的集中。近代中国警察的统一化倾向代表着社会的进步。  相似文献   
395.
有的著作认为在极限公式limx→0sinxx=1的证明中,要用到圆(扇形)的面积公式S=21Lr,而对后者的证明中必须要用到重要极限limx→0sinxx=1,从而犯了循环论证的错误。魏晋刘徽的“割圆术”是对无限问题的独特认识和致用的处理方式,是为证明圆面积公式而设计出来的一种方法。刘徽之前,希腊的阿基米德用穷竭法也证明了圆的面积公式。其中,刘徽的证法强调计算的程序性和构造性,而阿基米德则倾向于演绎的严谨性。这两种证明说明limx→0sinxx=1证明所谓的循环论证是可以避免的。  相似文献   
396.
This article explains why Singapore, despite its small size and semi-authoritarian regime, retains one of the best military forces in the Indo-Pacific. It unpacks Singapore’s ability to continuously innovate since the 1960s – technologically, organizationally, and conceptually – and even recently joined the Revolution in Military Affairs bandwagon. Drawing from the broader military innovation studies literature, this article argues evolutionary peacetime military innovation is more likely to occur in a state with a unified civil–military relation and whose military faces a high-level diverse set of threats. This argument explains how the civil–military fusion under the People’s Action Party-led government since Singapore’s founding moment has been providing coherent and consistent strategic guidance, political support, and financial capital, allowing the Singapore Armed Forces to continuously innovate in response to high levels and diversity of threats.  相似文献   
397.
This work is about how the United States military has become dependent on networked technology. As arguably the largest contributor to national security, it has become so dependent that its chief doctrine integrates networked technology into nearly every specialty, with particularly intense focus on Network Centric Warfare. As the military’s old guard is replaced by the highly technical Millenial Generation, there is cause to pause when assuming this techno-acuity brings nothing but advantage and success. Vulnerabilities stemming from such extensive dependence offer opportunities for exploitation that have not gone unnoticed. The first step to moving forward from this point is to fully understand the extent to which the military has become dependent on computer networks. It might be the Millenials’ war today, but it would be quite unwise for the United States military to think about it and fight it in a purely Millenial way.  相似文献   
398.
Possession of a brand is a sine qua non for economic success, not least because it connotes trust in delivering the value promised. Although Western arms exporters offer branded systems whose sales are influenced by price, there is a plethora of other economic variables, such as offset requirements and life-cycle support. Entrants to the international arms market will struggle without such arms “packages.” China’s entry, however, goes beyond the traditional economic paradigm. A four-stage historical model offers the backdrop for identifying the drivers that have forged its market entry into 55 countries worldwide. The strategy initially focused on sales of rudimentary military equipment for political purposes, but recently it has begun to commercialize exports, repositioning them from a low- to a high-tech sales trajectory. A Sino “brand” is thus emerging, reflecting both competitiveness and diplomatic considerations, especially non-interference in client state domestic affairs.  相似文献   
399.
China’s rapid economic growth is facilitating massive increases in its military spending and causing increased security concerns in Asia and the Western Pacific. But there is uncertainty over how large China’s military spending is relative to other countries, or how fast it is growing in real terms. We address this issue by deriving a relative military cost price index based on the relative unit costs of inputs. We find that China’s real military spending is much larger than suggested by exchange rate comparisons, and even larger than standard purchasing power parity comparisons. We also find, however, that the real growth of China’s military spending has been smaller than conventionally thought. This is due to rapidly growing wages in China and the large share of personnel in China’s military budget.  相似文献   
400.
邵萌 《国防科技》2017,38(5):046-049
随着中国在太空领域的不断崛起,太空地位不断提升的同时,也面临着各种各样的挑战,这些挑战既有源自传统政治领域的大国阻挠,也有来自外太空的人类共同威胁。为了应对这些威胁和挑战,保护中国的太空利益和国家利益,我们需要从多方面着手,多管齐下,以维护日益重要的中国国家太空利益。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号