全文获取类型
收费全文 | 926篇 |
免费 | 205篇 |
国内免费 | 47篇 |
出版年
2024年 | 3篇 |
2023年 | 12篇 |
2022年 | 16篇 |
2021年 | 19篇 |
2020年 | 18篇 |
2019年 | 21篇 |
2018年 | 24篇 |
2017年 | 41篇 |
2016年 | 52篇 |
2015年 | 44篇 |
2014年 | 68篇 |
2013年 | 81篇 |
2012年 | 71篇 |
2011年 | 72篇 |
2010年 | 54篇 |
2009年 | 78篇 |
2008年 | 40篇 |
2007年 | 48篇 |
2006年 | 65篇 |
2005年 | 59篇 |
2004年 | 52篇 |
2003年 | 42篇 |
2002年 | 30篇 |
2001年 | 37篇 |
2000年 | 29篇 |
1999年 | 13篇 |
1998年 | 19篇 |
1997年 | 8篇 |
1996年 | 9篇 |
1995年 | 13篇 |
1994年 | 6篇 |
1993年 | 3篇 |
1992年 | 7篇 |
1991年 | 11篇 |
1990年 | 10篇 |
1989年 | 2篇 |
1988年 | 1篇 |
排序方式: 共有1178条查询结果,搜索用时 15 毫秒
81.
82.
王福德 《中国人民武装警察部队学院学报》2010,26(7):55-57
提高思想教育的实效是思想教育的终极目标。要增强思想教育的实效,必须提高思想教育者素质,增强思想教育的感召力;把握官兵接受心理,增强思想教育的接受力;创新思想教育方法,增强思想教育的助推力。 相似文献
83.
在任职教育中开发学员任职经验的探讨 总被引:1,自引:0,他引:1
张春 《武警工程学院学报》2010,(1):55-58
任职教育是在受训学员有着一定的任职经验基础上,提高岗位任职能力的一种短期培训。在教学实施过程中,必须注重挖掘任职经验,交流任职经验,再把经验上升为理论从而去指导部队实践。这种任职经验的开发,有利于在教学过程中按需施教,扩大师生的视野,丰富教学资源,实现理论与实践的统一,有效达成任职教育的目标。 相似文献
84.
汪红伟 《武警工程学院学报》2010,(5):47-49
世博会的圆满召开,不仅需要强大的军事“硬实力”作后盾,也需要军事“软实力”作支撑。本文从军事“软实力”的基本概念入手,将其分解为感化认同力、形象吸引力、心理威慑力等三个子要素;从各要素出发,以完成世博安保任务为着眼点,提出加强军事“软实力”的具体思路。 相似文献
85.
前景理论(Prospect Theory,PT)描述了个体在不确定条件下的决策规律,较好地刻画了决策者的风险偏好。分析表明,PT在作战决策建模中具有一定的适用性和可行性。提出了一种基于PT的计算机生成兵力(Computer Generated Forces,CGF)Agent决策建模方法,给出了CGF Agent的建模框架,对CGF Agent决策过程中方案选择的具体步骤和算法进行了详细阐述。实验表明,所提出的方法在一定程度上提高了CGF Agent决策行为的真实性,证明了所提出方法的有效性。 相似文献
86.
提出一种基于支持向量机的功率变换器开关管开路故障诊断方法。利用支持向量机建立分类模型,模型以相电流功率谱为输入量,7种故障状态为输出量,选用高斯核,使用基于二叉树分类器的分类算法。将诊断结果与基于BP神经网络的诊断结果进行比较,结果表明基于支持向量机的分类器在功率变换器开关管开路故障诊断中具有更高的准确率和更好的泛化能力。 相似文献
87.
利用金属膜电阻设计并制作了用于陡化前沿Marx发生器调试的大功率低电感负载.其阻值约为90Ω,电感约为55nH,基本不具备分散电容.该负载采用线性渐变的圆锥外型结构,有利于减小信号在负载上的反射,配合电容分压器使用能够很好地完成对前沿约为几ns的快前沿高压脉冲的测量.理论估算了该负载的功率容量,并利用PSpice软件模拟了对其进行脉冲方波加载的情况.该负载用于调试陡化前沿的Marx发生器的实验中,获得了幅值约210kV,脉宽近40ns,前沿为5ns的快前沿高压脉冲.多次实验结果表明该负载性能稳定,适用于陡化前沿Marx发生器的调试工作. 相似文献
88.
In this article, we develop a novel electric power supply chain network model with fuel supply markets that captures both the economic network transactions in energy supply markets and the physical network transmission constraints in the electric power network. The theoretical derivation and analysis are done using the theory of variational inequalities. We then apply the model to a specific case, the New England electric power supply chain, consisting of six states, five fuel types, 82 power generators, with a total of 573 generating units, and 10 demand market regions. The empirical case study demonstrates that the regional electric power prices simulated by our model match the actual electricity prices in New England very well. We also compute the electric power prices and the spark spread, an important measure of the power plant profitability, under natural gas and oil price variations. The empirical examples illustrate that in New England, the market/grid‐level fuel competition has become the major factor that affects the influence of the oil price on the natural gas price. Finally, we utilize the model to quantitatively investigate how changes in the demand for electricity influence the electric power and the fuel markets from a regional perspective. The theoretical model can be applied to other regions and multiple electricity markets under deregulation to quantify the interactions in electric power/energy supply chains and their effects on flows and prices. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009 相似文献
89.
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009 相似文献
90.
Many manufacturers sell their products through retailers and share the revenue with those retailers. Given this phenomenon, we build a stylized model to investigate the role of revenue sharing schemes in supply chain coordination and product variety decisions. In our model, a monopolistic manufacturer serves two segments of consumers, which are distinguished by their willingness to pay for quality. In the scenario with exogenous revenue sharing ratios, when the potential gain from serving the low segment is substantial (e.g., the low‐segment consumers' willingness to pay is high enough or the low segment takes a large enough proportion of the market), the retailer is better off abandoning the revenue sharing scheme. Moreover, when the potential gain from serving the low (high) segment is substantial enough, the manufacturer finds it profitable to offer a single product. Furthermore, when revenue sharing ratios are endogenous, we divide our analysis into two cases, depending on the methods of cooperation. When revenue sharing ratios are negotiated at the very beginning, the decentralized supply chain causes further distortion. This suggests that the central premise of revenue sharing—the coordination of supply chains—may be undermined if supply chain parties meticulously bargain over it. 相似文献