首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   508篇
  免费   204篇
  国内免费   26篇
  2024年   2篇
  2023年   3篇
  2022年   11篇
  2021年   15篇
  2020年   10篇
  2019年   14篇
  2018年   12篇
  2017年   25篇
  2016年   27篇
  2015年   15篇
  2014年   38篇
  2013年   47篇
  2012年   24篇
  2011年   46篇
  2010年   35篇
  2009年   50篇
  2008年   37篇
  2007年   44篇
  2006年   33篇
  2005年   38篇
  2004年   34篇
  2003年   30篇
  2002年   18篇
  2001年   21篇
  2000年   17篇
  1999年   18篇
  1998年   11篇
  1997年   9篇
  1996年   8篇
  1995年   5篇
  1994年   2篇
  1993年   12篇
  1992年   6篇
  1991年   8篇
  1990年   5篇
  1989年   6篇
  1988年   1篇
  1987年   1篇
排序方式: 共有738条查询结果,搜索用时 15 毫秒
121.
文章对延时中断容忍网络技术的基本概念进行了介绍,并对DTN捆绑层协议的框架及重点内容进行了分析,在此基础上,提出了捆绑层协议实现的基本思路,为DTN技术在军事通信领域的应用提供了参考。  相似文献   
122.
背诵是成功的语言学习者常用的策略,也是不同条件下英语教学行之有效的教学方法。文章通过跟踪调查,试验对照的形式,结合SPSS对数据加以分析,在实证研究的基础上,揭示背诵对提高大学生口译能力的正迁移作用并提出如何将背诵科学、合理地应用于口译教学,以提高教学质量。  相似文献   
123.
将旁路攻击中线性碰撞思想与代数攻击方法相结合,使AES加密操作第1轮中的碰撞转换为线性方程组,构造了SAT求解器求解方程组,利用穷举攻击筛选真实的密钥。实验结果表明,该方法可降低密钥搜索空间,最终获得AES128位真实密钥,攻击效果优于碰撞攻击。  相似文献   
124.
电子产品在振动环境中的损伤效应研究   总被引:1,自引:1,他引:0  
在分析电子装备结构特点及冲击振动环境影响因素基础上,阐述了电子产品在冲击振动环境中的损伤机理与模式。以某型雷达装备为试验对象,选取该装备某型组合体与电路板进行冲击振动与扫频振动试验,分析了电子产品在振动环境中的损伤规律。试验表明:电子产品在振动环境中的损伤不仅与振动类型及幅值有关,也与其自身结构有着密切的关系。  相似文献   
125.
借助Z上矩阵A∈Mm×n(Z)的标准形式D=VAU=diag(d1,d2,…,dq,0,…,0),得到了整环上不定方程组AX=B的通解公式以及矩阵初等变换法.  相似文献   
126.
编程实现局域网内可靠传输文件的方法研究   总被引:2,自引:0,他引:2  
针对在开发船舶动力系统分布式设计环境过程中遇到的文件传输问题,讨论了分别基于Socket技术和.NET Remoting技术的编程实现方法.通过比较发现,后者具有编程简单、使用可靠等方面的明显优势.另外,通过实验方式确定了传送过程中数据块大小的选择,并对文件加密解密的问题采用了加入随机数据的方式进行解决.  相似文献   
127.
Defence offsets rank as one of the most important and controversial topics within the broad field of defence economics. Arms vendors are likely to view offsetting investment as a distraction, fearful of its potential to hurt the bottom line. By contrast, policymakers in the arms purchasing countries see offsets as an opportunity to extract technology transfer, as well as employment, investment and export sales opportunities. Establishing the actual impact of offsets, however, is not easy. The subject is shrouded in secrecy and myth, with anecdote and generalisation pervading even the intellectual press. This paper seeks to break the mould by offering an empirical case study of the role of offsets in Malaysian defence industrialisation.  相似文献   
128.
This paper studies a strategic conflict between a state and a non-state military organization. The non-state military organization decides whether to attack or not to attack the state, while the state decides on its counter-measure. If the state uses a high level of violence against the non-state organization, it may be accused by the international community of ‘non-proportional’ use of force, and both sides of the conflict take this possibility into account. The model predicts that it may be rational for the non-state organization to attack the state, even if as a reaction the state will militarily destroy this organization, due to a positive probability the state will be punished by the international community for non-proportional use of violence.  相似文献   
129.
Armed conflict on the African continent has witnessed increasing recruitment of child soldiers, often at the hands of non-state armed groups. Unfortunately this practice continues unabated in the face of legal obligations prohibiting the recruitment of child soldiers under international humanitarian law, and international and regional human rights law. While international condemnation of the practice has led to attempts to increase the minimum age for recruitment to 18, a disjuncture persists between the legal obligations states sign up to, and the actual enforcement of these prohibitions at a domestic level.

International criminal law jurisprudence emanating from the Special Court for Sierra Leone and the International Criminal Court is being monitored closely, as these courts seek to enforce the prohibition in all armed conflicts, and against both state actors and non-state armed groups. International humanitarian law only protects child soldiers who have been unlawfully recruited. In this piece, the authors take a closer look at what amounts to unlawful recruitment in light of customary international humanitarian law, since this body of law also binds non-state actors, even without further criminalising legislation at a domestic level. Moreover, the article briefly explores whether a child can ever void this protected status by volunteering to participate directly in hostilities.  相似文献   
130.
This paper uses linear and non‐linear Granger causality methods to determine the causal relationship between defense spending and economic growth in Turkey for the period 1949–2004. The innovative feature of this paper is that it provides evidence regarding the nonlinear causal dependence between military spending and economic growth in Turkey. The empirical results contribute to the empirical literature by indicating support for both linear and non‐linear causality between military expenditures and economic development and they may prove useful in theoretical and empirical research by regulators and policy makers.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号