全文获取类型
收费全文 | 429篇 |
免费 | 157篇 |
国内免费 | 82篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2022年 | 5篇 |
2021年 | 14篇 |
2020年 | 16篇 |
2019年 | 8篇 |
2018年 | 7篇 |
2017年 | 36篇 |
2016年 | 37篇 |
2015年 | 27篇 |
2014年 | 42篇 |
2013年 | 55篇 |
2012年 | 38篇 |
2011年 | 29篇 |
2010年 | 20篇 |
2009年 | 29篇 |
2008年 | 27篇 |
2007年 | 30篇 |
2006年 | 43篇 |
2005年 | 42篇 |
2004年 | 27篇 |
2003年 | 15篇 |
2002年 | 11篇 |
2001年 | 22篇 |
2000年 | 7篇 |
1999年 | 11篇 |
1998年 | 10篇 |
1997年 | 7篇 |
1996年 | 5篇 |
1995年 | 1篇 |
1994年 | 8篇 |
1993年 | 12篇 |
1992年 | 3篇 |
1991年 | 6篇 |
1990年 | 9篇 |
1989年 | 2篇 |
1988年 | 4篇 |
1987年 | 1篇 |
排序方式: 共有668条查询结果,搜索用时 46 毫秒
431.
432.
433.
如何实现长方体元件光学面形位误差的高精度测量以及怎样利用测量数据对这些误差进行修正加工是制造过程中的主要问题。提出一种基于波面干涉的长方体类光学元件形位误差测量方法,借助大口径干涉仪和高精度端齿盘搭建测量系统,实现了长方体类光学元件1μm/400mm精度的平行度和垂直度测量,获得了高精度的形位误差综合分布数据,并利用磁流变、小磨头数控抛光等现代光学加工手段实现了此类光学元件的高精度加工。 相似文献
434.
利用演化博弈理论,探讨了联合作战中担负相同作战任务的作战单元间其策略选择根据利益变化的演化过程,建立了复制动态方程并求得平衡点解,通过复制动态的相位图直观反映了博弈的演化稳定策略,并通过Malab软件对作战单元策略选择与收益关系进行了仿真,其行为选择的演化结果与相位图展示具有一致性。研究结论表明,收益大小及变化是作战单元策略改变的重要依据,最后针对提高作战单元间的策略稳定性提出对策建议. 相似文献
435.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity. 相似文献
436.
437.
438.
Celeste Ward Gventer 《Small Wars & Insurgencies》2014,25(1):242-253
This article explores the historical reasoning behind counterinsurgency thinking, particularly as applied to Iraq, using Douglas Porch's book, Counterinsurgency: Exposing the Myths of the New Way of War as a reference point. It argues that the classic historical analogies of counterinsurgency theory were inapt in dealing with the conflict in Iraq, and that the historical reasoning behind counterinsurgency more generally deserves greater scrutiny. Not only are the analogies of questionable applicability, but the evidence of causation in prior conflicts is ultimately unproveable. In the end, Counterinsurgency theory and the US Army's Field Manual 3-24 on Counterinsurgency were politically useful during the ‘Surge’, beginning in 2007, but remain intellectually and historically problematic. 相似文献
439.
针对日益普遍和多样的网络攻击行为,如何对网络各种攻防过程进行分析已逐渐成为热点研究方向。在对计算机网络对抗问题复杂性表现和产生根源进行探讨基础上,从完全信息静态博弈、完全信息动态博弈、不完全信息静态博弈、不完全信息动态博弈4个视角,对计算机网络对抗问题进行分类论述,对各解决方法进行了综合比较,并对今后的研究进行了展望。 相似文献
440.