全文获取类型
收费全文 | 2505篇 |
免费 | 394篇 |
国内免费 | 193篇 |
专业分类
3092篇 |
出版年
2024年 | 3篇 |
2023年 | 12篇 |
2022年 | 26篇 |
2021年 | 56篇 |
2020年 | 61篇 |
2019年 | 44篇 |
2018年 | 66篇 |
2017年 | 120篇 |
2016年 | 115篇 |
2015年 | 81篇 |
2014年 | 208篇 |
2013年 | 230篇 |
2012年 | 184篇 |
2011年 | 219篇 |
2010年 | 163篇 |
2009年 | 212篇 |
2008年 | 138篇 |
2007年 | 151篇 |
2006年 | 171篇 |
2005年 | 160篇 |
2004年 | 139篇 |
2003年 | 99篇 |
2002年 | 77篇 |
2001年 | 76篇 |
2000年 | 56篇 |
1999年 | 36篇 |
1998年 | 37篇 |
1997年 | 19篇 |
1996年 | 23篇 |
1995年 | 28篇 |
1994年 | 19篇 |
1993年 | 8篇 |
1992年 | 14篇 |
1991年 | 15篇 |
1990年 | 16篇 |
1989年 | 6篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1975年 | 1篇 |
排序方式: 共有3092条查询结果,搜索用时 0 毫秒
261.
主要讨论基于摩擦磨损的数学模型的分布性态和分布近似问题。引用无穷小概念,结合0-1律讨论了该模型的分布收敛于退化正态分布的条件。并在一定的矩条件下,利用特征函数,得到了该模型的分布近似于标准正态分布的误差。 相似文献
262.
结合装备表面智能维修保养技术方面的研究成果,介绍了装甲装备故障智能检测技术、自适应、自修复功能材料,装甲装备器材全自动保养设备等先进技术,侧重装备维修保养阐述了如何提高信息化程度,推进军队武器装备维修保养技术的现代化建设。 相似文献
263.
介绍可拓学及物元理论,提出用可拓工程方法对武器装备效能-费用进行权衡分析。建立了装备效费权衡分析的高阶复合物元模型,对初始效费方案进行了延拓,提出可拓特征集的概念。在此基础上,对效能-费用方案进行可拓聚类分析。 相似文献
264.
NOEL STOTT 《African Security Review》2013,22(3):4-11
A truly universal ban on anti-personnel mines cannot be realized without engagement of armed non-state actors and armed groups operating outside state control, including rebels and national liberation movements. Events after 9/11 have complicated engagement with organizations that can be classified as ‘terrorists’. Yet, the use of anti-personnel landmines itself can be viewed as an act of terrorism and African leaders have, on various occasions, classified the use of landmines and the presence of unexploded ordnance as engendering insecurity and a serious impediment to development. The success of a total ban ultimately depends upon ensuring that armed non-state actors act in accordance with international humanitarian law. The Geneva Call Deed of Commitment for Adherence to a Total Ban on Anti-Personnel Mines and for Cooperation in Mine Action (DoC) might be described as an alternative instrument to the Anti-Personnel Mine Ban Convention and can serve an important and impartial channel of communication with non-state actors. Already 18 armed groups in Africa have signed the Geneva Call DoC. 相似文献
265.
Jacques Fontanel 《Defence and Peace Economics》2013,24(2):135-147
The evolutions of military expenditures in Eastern and Central European countries are difficult to estimate and to compare, due to the lack of available data for these states. Some results of the extent of cuts in defence spending since 1990 are interesting to interpret, but it is difficult for econometricians to use these figures even carefully. The structures of national military expenditure have been modified to the detriment of arms equipment. Thus, the disarmament process needs a special analysis of the arms industry. 相似文献
266.
267.
A. Steven Dietz 《Small Wars & Insurgencies》2013,24(2):385-401
The current approach to countering the threat of improvised explosive devices (IEDs) in Afghanistan has met with limited success. The relative lack of success may be in part because the current approach is not holistic and discounts the social systems that foster the IEDs. Insurgents are using IEDs as a tool to further their strategic aims, but the coalition and to a lesser extent the Government of the Islamic Republic of Afghanistan (GIRoA) are attacking the IEDs as if they are an end in and of themselves. Combining network disruption with information change maximizes the opportunities for mitigating the IED threat. More specifically, to mitigate the IED threat requires disrupting the social and economic systems associated with IEDs, and at the same time providing alternative economic opportunities and improving rule of law and governance at the local level. In other words, counter-IED (C-IED) must be Counter-Insurgency (COIN) centric to be successful. This paper reviews the current state of C-IED efforts, identifies five main problems with the current approach, and suggests changes to reduce or mitigate the IED threat in Afghanistan. 相似文献
268.
Marc R. DeVore 《Small Wars & Insurgencies》2013,24(1):144-173
Following the emergence of a communist regime in South Yemen and the multiplication of subversive movements in the United Kingdom's Gulf protectorates, British policymakers genuinely feared the spread of communism throughout southern Arabia. Defeating the People's Front for the Liberation for the Occupied Arabian Gulf (PFLOAG) insurgency in Oman's Dhofar province was considered central to preventing such an outcome. In their pursuit of victory, British officers overthrew the sultan of Oman, escalated the war by conducting attacks in South Yemen, and, ultimately, appealed to Islam as a means of rallying support against communism. However, lessons learned in previous counterinsurgencies (Malaya, Kenya, and Borneo) proved of only limited value in Oman's physical and cultural environment. Unfortunately, none of these measures worked as anticipated. Only Iran's direct military intervention and the dramatic growth of Oman's financial resources after the 1973 oil crisis provided the resources to conduct large-scale offensive operations. Even so, victory was only achieved in 1975 because the rebellion's leaders unwisely attempted to oppose the Anglo–Omani offensives conventionally. 相似文献
269.
This paper attempts to examine the effect of an anticipated foreign military threat on the steady‐state growth rate and the transitional behavior of the economy. The modeling strategy follows the Sandler and Hartley (1995) and Dunne et al. (2005) viewpoints to emphasize the role of national defense in affecting growth from the perspective of both the demand and the supply sides. We thus combine the public capital version of endogenous growth with a framework of competitive arms accumulation. It is found that the key factor determining the steady state and the transitional effects of a rise in the foreign military threat on the home weapon–capital ratio, the consumption–capital ratio, and the rate of economic growth, is the degree of relative risk aversion. 相似文献
270.
讨论了消防产品的身份证管理制度,针对跟踪管理系统中移动终端查询速度较慢的问题,将Hash技术应用到产品信息检索中,并对全国消防产品数据库中采集的数据进行了实验测试.实验结果表明,Hash技术用于移动终端大规模数据的检索具有简单高效的特点. 相似文献