首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2672篇
  免费   399篇
  国内免费   175篇
  2024年   4篇
  2023年   7篇
  2022年   23篇
  2021年   41篇
  2020年   32篇
  2019年   62篇
  2018年   55篇
  2017年   99篇
  2016年   102篇
  2015年   71篇
  2014年   218篇
  2013年   283篇
  2012年   169篇
  2011年   228篇
  2010年   190篇
  2009年   213篇
  2008年   160篇
  2007年   202篇
  2006年   166篇
  2005年   157篇
  2004年   149篇
  2003年   118篇
  2002年   74篇
  2001年   79篇
  2000年   41篇
  1999年   45篇
  1998年   28篇
  1997年   27篇
  1996年   31篇
  1995年   27篇
  1994年   32篇
  1993年   20篇
  1992年   22篇
  1991年   17篇
  1990年   26篇
  1989年   14篇
  1988年   10篇
  1987年   3篇
  1975年   1篇
排序方式: 共有3246条查询结果,搜索用时 156 毫秒
951.
《Arms and Armour》2013,10(2):124-135
The paper re-interprets the implement known as the ‘Towton Battle Axe’ allegedly found in the river which borders the Towton Battlefield (1461), Yorkshire, England, and which now resides in Alnwick Castle, Northumberland. The paper provides parallels, in the form of comparisons with other weapons, in order that the Towton implement can be shown to be a modified former halberd dating from the early sixteenth century. It is, therefore, highly unlikely that the implement was used in the famous battle.  相似文献   
952.
《Arms and Armour》2013,10(2):145-180
This paper provides new information on the gold sword awarded to Major George Wilson, 39th Regiment of Foot, in 1800 and on the retailer and silversmith, who were commissioned to provide the token.  相似文献   
953.
可信软件是近年来软件工程领域研究的热点,装备软件可信性的研究有助于提升我国国防武器装备的作战效能。首先分析了进行装备软件可信相关研究的必要性;然后阐述可信软件技术的研究现状,主要包括软件可信度量和评估、可信软件的构造与验证、可信软件的演化与控制等三个方面;最后分析了研究可信装备软件面临的挑战。  相似文献   
954.
《Arms and Armour》2013,10(1):33-39
Abstract

An argument is presented that Valentine Green’s mezzotint engraving ‘Queen Elizabeth at the Head of her Army at Tilbury-Fort, A.D. 1588’ (1792) was inspired by the late 18th-century life-sized group of three figures representing the same subject that was formerly on show at the Tower of London. The mezzotint presented in Acta Historica Reginarum Angliae is the only known image of the original pre-1828 setup of the display, showing the figure of the queen in a skirt-like piece of armour that has since been re-identified as King Henry VIII’s tonlet armour.  相似文献   
955.
《Arms and Armour》2013,10(2):128-171
Abstract

The princely garniture ‘commanded’ to be made by Prince Henry Frederick for his cousin, Prince Friedrich Ulrich, later Duke of Brunswick, from the Royal ‘Almain’ Armoury at Greenwich, during the stewardship of the Master Armourer, William Pickering, his son, John, and the men of the Greenwich workshop, is described, illustrated and discussed. Accounts are presented of the lives and work of the Pickerings and the evidence is reviewed for the manufacture of this last decorated garniture of the Greenwich School.  相似文献   
956.
This article argues that the prewar planning process for postwar Iraq was plagued by myriad problems, including a dysfunctional interagency process, overly optimistic assumptions, and a lack of contingency planning for alternative outcomes. These problems were compounded by a lack of civilian capacity during the occupation period, which led to a complicated and often uncoordinated relationship with the military authorities who found themselves taking the lead in many reconstruction activities. Taken together, these mistakes meant that US success on the battlefield was merely a prelude to a postwar insurgency whose outcome remains very much in doubt more than three years later.  相似文献   
957.
Strengthening the United States' ability to prevent adversaries from smuggling nuclear materials into the country is a vital and ongoing issue. The prospect of additional countries, such as Iran, obtaining the know‐how and equipment to produce these special nuclear materials in the near future underscores the need for efficient and effective inspection policies at ports and border crossings. In addition, the reduction of defense and homeland security budgets in recent years has made it increasingly important to accomplish the interdiction mission with fewer funds. Addressing these complications, in this article, we present a novel two‐port interdiction model. We propose using prior inspection data as a low‐cost way of increasing overall interdiction performance. We provide insights into two primary questions: first, how should a decision maker at a domestic port use detection data from the foreign port to improve the overall detection capability? Second, what are potential limitations to the usefulness of prior inspection data—is it possible that using prior data actually harms decision making at the domestic port? We find that a boundary curve policy (BCP) that takes into account both foreign and domestic inspection data can provide a significant improvement in detection probability. This BCP also proves to be surprisingly robust, even if adversaries are able to infiltrate shipments during transit. © 2013 Wiley Periodicals, Inc. Naval Research Logistics 60: 433‐448, 2013  相似文献   
958.
分析了基本射表中弹丸飞行时间拟合误差对射击诸元误差的影响,给出了因时间拟合误差引起的射击误差的解析表达,并利用5条典型航路分析了飞行时间拟合误差对射角、射向误差的影响,得出了不同航捷、航高、斜距、目标速度下拟合误差对射击诸元误差的影响关系,从而为确定弹丸飞行时间拟合精度提供依据.  相似文献   
959.
This article examines the ways in which the two normative concerns of casualty-aversion and civilian protection influenced US military strategy in the particular context of the asymmetric conflict in Somalia in the early 1990s. The article critically evaluates US military operations through the prism of international humanitarian law and examines whether American forces started prioritizing casualty-aversion over the safeguarding of Somali civilians. Finally, by drawing on emerging moral guidelines (such as Michael Walzer's idea of ‘due care’), the article examines whether lower numbers of Somali civilian deaths could have been achieved if marginal increases to the risks faced by US soldiers had been accepted.  相似文献   
960.
As the world becomes increasingly globalized, interruptions to international trade cannot be permitted. Piracy off the coast of Somalia has hampered international trade in the region and poses significant risks to the sailors required to navigate those waters. Over the past three years the global community has attempted, through a number of different naval tactics, to stop these acts of piracy; however, these tactics have proven ineffective. This article looks at historical precedence and military theory to support the concept of using convoys to protect the thousands of cargo vessels traveling round the Horn of Africa every year. This tactic will greatly decrease the number of successful pirate attacks and save countless lives in the process.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号