全文获取类型
收费全文 | 1230篇 |
免费 | 109篇 |
国内免费 | 61篇 |
出版年
2023年 | 1篇 |
2022年 | 6篇 |
2021年 | 37篇 |
2020年 | 46篇 |
2019年 | 42篇 |
2018年 | 37篇 |
2017年 | 76篇 |
2016年 | 55篇 |
2015年 | 23篇 |
2014年 | 134篇 |
2013年 | 129篇 |
2012年 | 71篇 |
2011年 | 82篇 |
2010年 | 88篇 |
2009年 | 71篇 |
2008年 | 75篇 |
2007年 | 71篇 |
2006年 | 61篇 |
2005年 | 65篇 |
2004年 | 49篇 |
2003年 | 41篇 |
2002年 | 30篇 |
2001年 | 32篇 |
2000年 | 16篇 |
1999年 | 16篇 |
1998年 | 7篇 |
1997年 | 5篇 |
1996年 | 4篇 |
1995年 | 6篇 |
1994年 | 4篇 |
1993年 | 3篇 |
1992年 | 7篇 |
1991年 | 2篇 |
1990年 | 6篇 |
1989年 | 2篇 |
排序方式: 共有1400条查询结果,搜索用时 15 毫秒
321.
结合维修改革试验试行资料和当前部队在维修方面存在的不足,从硬件和软件两部分,分析装甲车辆维修质量存在的问题及影响因素,提出加强维修理论教育,完善维修工艺标准,完善维修配套设施与设备,建立维修质量评估标准和数据信息系统的措施. 相似文献
322.
梁庆福 《军械工程学院学报》1994,(2)
本文从合理使用内存的角度,分析了影响大数据量关系型数据库管理系统运行速度的原因,提出了提高运行速度的对策及重组数据的4条原则。 相似文献
323.
组播技术的应用可以有效提高RTI的实现性能。介绍了组播分配的一般理论和实现方案,详细展示了KD RTI中的组播分配策略,讨论了组播应用过程中出现的问题,同时给出了解决方法。 相似文献
324.
操作系统是紧靠硬件的基础软件,它既是应用软件安全的坚实基础,又是硬件不安全因素的屏蔽器.在操作系统安全隐患和嵌入式操作系统技术特点的基础上,提出信息保护、空间域保护和时间域保护等增强操作系统安全性的几种方法,以提高嵌入式系统抗击系统本身缺陷或敌方恶意攻击等安全威胁的能力.上述几种安全保护技术已在嵌入式Linux中进行验证,并取得满意的结果. 相似文献
325.
326.
In financial engineering, sensitivities of derivative prices (also known as the Greeks) are important quantities in risk management, and stochastic gradient estimation methods are used to estimate them given the market parameters. In practice, the surface (function) of the Greeks with respect to the underlying parameters is much more desired, because it can be used in real‐time risk management. In this paper, we consider derivatives with multiple underlying assets, and propose three stochastic kriging‐based methods, the element‐by‐element, the importance mapping, and the Cholesky decomposition, to fit the surface of the gamma matrix that can fulfill the time constraint and the precision requirement in real‐time risk management. Numerical experiments are provided to illustrate the effectiveness of the proposed methods. 相似文献
327.
Stephen Deakin 《Journal of Military Ethics》2018,17(1):54-71
Military units can become to some extent self-governing in war-time battle. At times, they may take the discipline of their soldiers into their own hands and such discipline may be severe. This paper examines incidents in the British military, in both World Wars, where British soldiers were killed by their comrades because they would not fight in the heat of battle. The judicial execution by the military authorities of deserters in the First World War led to much controversy in Britain. It may be much less well-known that in both World Wars there was, on occasion, an extra-judicial practice within the British military of executing soldiers who would not fight in the heat of battle. In such situations ethical dilemmas become very difficult indeed and some of the relevant issues are examined here. 相似文献
328.
Thomas C. Bruneau 《Defense & Security Analysis》2018,34(4):345-364
ABSTRACTThe article argues that current conceptual approaches in civil-military relations are deeply flawed resulting in its irrelevance in analyzing major issues including war and the collapse of democracy. After highlighting major flaws in the work of the late Samuel Huntington and those who follow his approach, the article argues that other conceptual approaches, including Security Sector Reform, are also flawed, or in the case of the “military effectiveness” literature, largely irrelevant. In explaining the main causes of the flawed conceptual literature, the article highlights the absence of good data and challenges in methodology. While arguing that military forces are very unlikely to engage in armed combat, it highlights the roles and missions which in the world today are implanted by these forces. As it is virtually impossible to prove effectiveness of the armed forces in these roles and missions, the article proposes a conceptual approach based on requirements. 相似文献
329.
Thomas Waldman 《Contemporary Security Policy》2018,39(2):181-205
This article examines contemporary modes of American warfare. It posits the concept of “vicarious warfare” as a means of capturing prominent patterns in warfighting approaches. Although rooted in long-standing traditions of military practice, vicarious warfare is sufficiently novel as to be identifiable as a distinct phenomenon. The precise manifestation or combination of vicarious methods vary according to the specific circumstances and political contexts prevailing in different theaters. However, America’s general preference is to fight its wars by delegating tasks to proxies and limiting exposure of its own military to danger. Where U.S. forces are employed directly, this takes place largely in the shadows. Such approaches have clear attractions, offer undoubted tactical advantages, and permit successive administrations to maintain a persistent tempo of operations that evades rigorous democratic scrutiny. Yet, prominent cases and numerous studies suggest that vicarious warfare has a high potential to generate counterproductive effects and significant strategic harm. 相似文献
330.
ZHANG Xiao 《国防科技》2018,39(1):005-008
党的十九大报告把军民融合发展战略作为七大国家战略之一,明确提出要"更加注重军民融合"。必须将交通领域军民融合视作整个军民融合深度发展的重要突破口,建设军民融合大交通体系。提出以新形势下军事战略方针为统揽,以军民深度融合为途径,聚焦保障军队打赢,大力推进民用交通设施工具贯彻要求;依托国家路网基础,大力推进军地交通运输网络统筹纳入;强化应战应急一体,大力推进各种交通力量建设互补衔接;着眼战略投送能力,大力推进军民交通物流体系有机结合。 相似文献