全文获取类型
收费全文 | 2120篇 |
免费 | 37篇 |
国内免费 | 22篇 |
专业分类
2179篇 |
出版年
2025年 | 9篇 |
2024年 | 8篇 |
2023年 | 36篇 |
2022年 | 16篇 |
2021年 | 39篇 |
2020年 | 48篇 |
2019年 | 35篇 |
2018年 | 48篇 |
2017年 | 89篇 |
2016年 | 74篇 |
2015年 | 53篇 |
2014年 | 148篇 |
2013年 | 158篇 |
2012年 | 121篇 |
2011年 | 163篇 |
2010年 | 117篇 |
2009年 | 150篇 |
2008年 | 111篇 |
2007年 | 103篇 |
2006年 | 105篇 |
2005年 | 104篇 |
2004年 | 97篇 |
2003年 | 66篇 |
2002年 | 59篇 |
2001年 | 50篇 |
2000年 | 30篇 |
1999年 | 22篇 |
1998年 | 26篇 |
1997年 | 10篇 |
1996年 | 18篇 |
1995年 | 16篇 |
1994年 | 15篇 |
1993年 | 4篇 |
1992年 | 11篇 |
1991年 | 6篇 |
1990年 | 5篇 |
1989年 | 5篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1975年 | 1篇 |
排序方式: 共有2179条查询结果,搜索用时 15 毫秒
681.
Full‐system testing for large‐scale systems is often infeasible or very costly. Thus, when estimating system reliability, it is desirable to use a method that uses subsystem tests, which are often less expensive and more feasible. This article presents a method for bounding full‐system reliabilities based on subsystem tests and, if available, full‐system tests. The method does not require that subsystems be independent. It accounts for dependencies through the use of certain probability inequalities. The inequalities provide the basis for valid reliability calculations while not requiring independent subsystems or full‐system tests. The inequalities allow for test information on pairwise subsystem failure modes to be incorporated, thereby improving the bound on system reliability. We illustrate some of the properties of the estimates via an example application. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013 相似文献
682.
C. Christine Fair 《战略研究杂志》2013,36(2):259-290
This article uses a novel database of 1,625 posthumously published biographies of members of two Islamist militant organizations (Lashkar-e-Taiba (LeT) and Hizb-ul-Mujahideen (HM)), all of whom were killed in the course of carrying out militant attacks. In general, each biography provides data on the militant’s birthplace, education, recruitment, and training. The number of observations in this database is a full order of magnitude larger than those of previous databases assembled from militant biographies. While the sample of militants in this database is the product of multiple selection effects, analysis of the database undermines many common myths about Pakistani militants and casts doubt on current policy approaches to mitigating Islamist militancy in Pakistan. 相似文献
683.
尺度不变特征变换描述子已经应用于数字图像水印的构造,但图像存在相似区域时易造成误匹配问题,基于此提出一种改进的RIT—SIFT数字图像水印算法.水印嵌入时先对图像进行分块,然后将水印分别嵌入子块的非下采样Contourlet变换低频子带中,既简化了水印嵌人又增加了嵌入容量.图像匹配时利用SIFT算法在原始图像中寻找局部特征点,将旋转不变纹理特征信息融合到传统SIFT特征向量中,更加全面地描述图像信息,提高了匹配精度.实验结果表明,提出的算法是有效的,对全局和局部几何攻击、组合攻击以及常规攻击均具有很好的鲁棒性. 相似文献
684.
Edward S. Cavin 《Defence and Peace Economics》2013,24(2):77-88
This paper investigates the potential for modeling and simulation to contribute to new defense system development, by increasing the productivity of traditional R&D in developing system‐specific technology. Building on a previous optimal control model of defense system R&D, it shows that (1) the optimal use of modeling is related in a natural way to that of traditional R&D, and (2) both have similar optimal profiles over time. Simulated results based on limited historical data suggest that optimal use of modeling could increase the rate of growth in system‐specific technology significantly. 相似文献
685.
《Arms and Armour》2013,10(2):145-180
This paper provides new information on the gold sword awarded to Major George Wilson, 39th Regiment of Foot, in 1800 and on the retailer and silversmith, who were commissioned to provide the token. 相似文献
686.
《Arms and Armour》2013,10(2):128-171
AbstractThe princely garniture ‘commanded’ to be made by Prince Henry Frederick for his cousin, Prince Friedrich Ulrich, later Duke of Brunswick, from the Royal ‘Almain’ Armoury at Greenwich, during the stewardship of the Master Armourer, William Pickering, his son, John, and the men of the Greenwich workshop, is described, illustrated and discussed. Accounts are presented of the lives and work of the Pickerings and the evidence is reviewed for the manufacture of this last decorated garniture of the Greenwich School. 相似文献
687.
Henri Boshoff 《African Security Review》2013,22(1):70-73
Abstract The creation of the Africa Command (AFRICOM) has reflected the growth in the strategic importance of Africa in US foreign policy since the end of the 1990s. One of the objectives of this new geographical military command is to forge closer links between foreign, security and development policies. However, this approach met with a number of difficulties associated with the challenge of ‘inter-agency cooperation’ among rather disparate actors from foreign affairs, defence and development. In addition, the establishment of AFRICOM has met with fierce criticism in the US and elsewhere – especially in Africa – culminating in the charge that the US foreign and development policies in Africa are being militarised. Although AFRICOM has a number of interesting features, this paper shows that it has reacted to these criticisms by realigning itself more closely with the traditional model of a military command, at the expense of the innovative interagency elements. 相似文献
688.
689.
One of the most important issues facing the post‐Cold War U.S. defense establishment concerns the future allocation of combat tasks and responsibilities among different branches of the armed forces. The challenge is to reduce unnecessary redundancy across roles and missions when resources are highly constrained, without compromising military effectiveness. Defining the policy problem as one of resource allocation rather than operational effectiveness, we develop a methodology for allocating roles and missions. Our methodology focuses at the highest level of force aggregation and uses a mathematical programming model to produce cross‐service cross‐mission trade‐offs that will yield the best total force combat and non‐combat potential within resource consumption constraints. 相似文献
690.