首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2120篇
  免费   37篇
  国内免费   22篇
  2179篇
  2025年   9篇
  2024年   8篇
  2023年   36篇
  2022年   16篇
  2021年   39篇
  2020年   48篇
  2019年   35篇
  2018年   48篇
  2017年   89篇
  2016年   74篇
  2015年   53篇
  2014年   148篇
  2013年   158篇
  2012年   121篇
  2011年   163篇
  2010年   117篇
  2009年   150篇
  2008年   111篇
  2007年   103篇
  2006年   105篇
  2005年   104篇
  2004年   97篇
  2003年   66篇
  2002年   59篇
  2001年   50篇
  2000年   30篇
  1999年   22篇
  1998年   26篇
  1997年   10篇
  1996年   18篇
  1995年   16篇
  1994年   15篇
  1993年   4篇
  1992年   11篇
  1991年   6篇
  1990年   5篇
  1989年   5篇
  1988年   2篇
  1987年   1篇
  1975年   1篇
排序方式: 共有2179条查询结果,搜索用时 15 毫秒
681.
Full‐system testing for large‐scale systems is often infeasible or very costly. Thus, when estimating system reliability, it is desirable to use a method that uses subsystem tests, which are often less expensive and more feasible. This article presents a method for bounding full‐system reliabilities based on subsystem tests and, if available, full‐system tests. The method does not require that subsystems be independent. It accounts for dependencies through the use of certain probability inequalities. The inequalities provide the basis for valid reliability calculations while not requiring independent subsystems or full‐system tests. The inequalities allow for test information on pairwise subsystem failure modes to be incorporated, thereby improving the bound on system reliability. We illustrate some of the properties of the estimates via an example application. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
682.
This article uses a novel database of 1,625 posthumously published biographies of members of two Islamist militant organizations (Lashkar-e-Taiba (LeT) and Hizb-ul-Mujahideen (HM)), all of whom were killed in the course of carrying out militant attacks. In general, each biography provides data on the militant’s birthplace, education, recruitment, and training. The number of observations in this database is a full order of magnitude larger than those of previous databases assembled from militant biographies. While the sample of militants in this database is the product of multiple selection effects, analysis of the database undermines many common myths about Pakistani militants and casts doubt on current policy approaches to mitigating Islamist militancy in Pakistan.  相似文献   
683.
尺度不变特征变换描述子已经应用于数字图像水印的构造,但图像存在相似区域时易造成误匹配问题,基于此提出一种改进的RIT—SIFT数字图像水印算法.水印嵌入时先对图像进行分块,然后将水印分别嵌入子块的非下采样Contourlet变换低频子带中,既简化了水印嵌人又增加了嵌入容量.图像匹配时利用SIFT算法在原始图像中寻找局部特征点,将旋转不变纹理特征信息融合到传统SIFT特征向量中,更加全面地描述图像信息,提高了匹配精度.实验结果表明,提出的算法是有效的,对全局和局部几何攻击、组合攻击以及常规攻击均具有很好的鲁棒性.  相似文献   
684.
This paper investigates the potential for modeling and simulation to contribute to new defense system development, by increasing the productivity of traditional R&D in developing system‐specific technology. Building on a previous optimal control model of defense system R&D, it shows that (1) the optimal use of modeling is related in a natural way to that of traditional R&D, and (2) both have similar optimal profiles over time. Simulated results based on limited historical data suggest that optimal use of modeling could increase the rate of growth in system‐specific technology significantly.  相似文献   
685.
《Arms and Armour》2013,10(2):145-180
This paper provides new information on the gold sword awarded to Major George Wilson, 39th Regiment of Foot, in 1800 and on the retailer and silversmith, who were commissioned to provide the token.  相似文献   
686.
《Arms and Armour》2013,10(2):128-171
Abstract

The princely garniture ‘commanded’ to be made by Prince Henry Frederick for his cousin, Prince Friedrich Ulrich, later Duke of Brunswick, from the Royal ‘Almain’ Armoury at Greenwich, during the stewardship of the Master Armourer, William Pickering, his son, John, and the men of the Greenwich workshop, is described, illustrated and discussed. Accounts are presented of the lives and work of the Pickerings and the evidence is reviewed for the manufacture of this last decorated garniture of the Greenwich School.  相似文献   
687.
Abstract

The creation of the Africa Command (AFRICOM) has reflected the growth in the strategic importance of Africa in US foreign policy since the end of the 1990s. One of the objectives of this new geographical military command is to forge closer links between foreign, security and development policies. However, this approach met with a number of difficulties associated with the challenge of ‘inter-agency cooperation’ among rather disparate actors from foreign affairs, defence and development. In addition, the establishment of AFRICOM has met with fierce criticism in the US and elsewhere – especially in Africa – culminating in the charge that the US foreign and development policies in Africa are being militarised. Although AFRICOM has a number of interesting features, this paper shows that it has reacted to these criticisms by realigning itself more closely with the traditional model of a military command, at the expense of the innovative interagency elements.  相似文献   
688.
689.
One of the most important issues facing the post‐Cold War U.S. defense establishment concerns the future allocation of combat tasks and responsibilities among different branches of the armed forces. The challenge is to reduce unnecessary redundancy across roles and missions when resources are highly constrained, without compromising military effectiveness. Defining the policy problem as one of resource allocation rather than operational effectiveness, we develop a methodology for allocating roles and missions. Our methodology focuses at the highest level of force aggregation and uses a mathematical programming model to produce cross‐service cross‐mission trade‐offs that will yield the best total force combat and non‐combat potential within resource consumption constraints.  相似文献   
690.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号