首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1230篇
  免费   109篇
  国内免费   61篇
  2023年   1篇
  2022年   6篇
  2021年   37篇
  2020年   46篇
  2019年   42篇
  2018年   37篇
  2017年   76篇
  2016年   55篇
  2015年   23篇
  2014年   134篇
  2013年   129篇
  2012年   71篇
  2011年   82篇
  2010年   88篇
  2009年   71篇
  2008年   75篇
  2007年   71篇
  2006年   61篇
  2005年   65篇
  2004年   49篇
  2003年   41篇
  2002年   30篇
  2001年   32篇
  2000年   16篇
  1999年   16篇
  1998年   7篇
  1997年   5篇
  1996年   4篇
  1995年   6篇
  1994年   4篇
  1993年   3篇
  1992年   7篇
  1991年   2篇
  1990年   6篇
  1989年   2篇
排序方式: 共有1400条查询结果,搜索用时 15 毫秒
321.
结合维修改革试验试行资料和当前部队在维修方面存在的不足,从硬件和软件两部分,分析装甲车辆维修质量存在的问题及影响因素,提出加强维修理论教育,完善维修工艺标准,完善维修配套设施与设备,建立维修质量评估标准和数据信息系统的措施.  相似文献   
322.
本文从合理使用内存的角度,分析了影响大数据量关系型数据库管理系统运行速度的原因,提出了提高运行速度的对策及重组数据的4条原则。  相似文献   
323.
组播技术的应用可以有效提高RTI的实现性能。介绍了组播分配的一般理论和实现方案,详细展示了KD RTI中的组播分配策略,讨论了组播应用过程中出现的问题,同时给出了解决方法。  相似文献   
324.
操作系统是紧靠硬件的基础软件,它既是应用软件安全的坚实基础,又是硬件不安全因素的屏蔽器.在操作系统安全隐患和嵌入式操作系统技术特点的基础上,提出信息保护、空间域保护和时间域保护等增强操作系统安全性的几种方法,以提高嵌入式系统抗击系统本身缺陷或敌方恶意攻击等安全威胁的能力.上述几种安全保护技术已在嵌入式Linux中进行验证,并取得满意的结果.  相似文献   
325.
在信息采集、信息管理、信息传递过程中,数据链出现空穴、误传或丢失等情况时,将影响信息采集传递的安全性与信息管理的有效性,是信息管理与使用中一个值得关注的问题,如何对数据列进行有效补偿则是解决该问题的关键.运用灰色理论与正交试验设计方法建立了信息链缺失补偿模型并给出了信息链空穴补偿优化准则.所给出的具体的补偿实例说明信息链空穴灰色生成与正交试验设计生成是一种极为有效的信息缺失补偿方法.  相似文献   
326.
In financial engineering, sensitivities of derivative prices (also known as the Greeks) are important quantities in risk management, and stochastic gradient estimation methods are used to estimate them given the market parameters. In practice, the surface (function) of the Greeks with respect to the underlying parameters is much more desired, because it can be used in real‐time risk management. In this paper, we consider derivatives with multiple underlying assets, and propose three stochastic kriging‐based methods, the element‐by‐element, the importance mapping, and the Cholesky decomposition, to fit the surface of the gamma matrix that can fulfill the time constraint and the precision requirement in real‐time risk management. Numerical experiments are provided to illustrate the effectiveness of the proposed methods.  相似文献   
327.
Military units can become to some extent self-governing in war-time battle. At times, they may take the discipline of their soldiers into their own hands and such discipline may be severe. This paper examines incidents in the British military, in both World Wars, where British soldiers were killed by their comrades because they would not fight in the heat of battle. The judicial execution by the military authorities of deserters in the First World War led to much controversy in Britain. It may be much less well-known that in both World Wars there was, on occasion, an extra-judicial practice within the British military of executing soldiers who would not fight in the heat of battle. In such situations ethical dilemmas become very difficult indeed and some of the relevant issues are examined here.  相似文献   
328.
ABSTRACT

The article argues that current conceptual approaches in civil-military relations are deeply flawed resulting in its irrelevance in analyzing major issues including war and the collapse of democracy. After highlighting major flaws in the work of the late Samuel Huntington and those who follow his approach, the article argues that other conceptual approaches, including Security Sector Reform, are also flawed, or in the case of the “military effectiveness” literature, largely irrelevant. In explaining the main causes of the flawed conceptual literature, the article highlights the absence of good data and challenges in methodology. While arguing that military forces are very unlikely to engage in armed combat, it highlights the roles and missions which in the world today are implanted by these forces. As it is virtually impossible to prove effectiveness of the armed forces in these roles and missions, the article proposes a conceptual approach based on requirements.  相似文献   
329.
This article examines contemporary modes of American warfare. It posits the concept of “vicarious warfare” as a means of capturing prominent patterns in warfighting approaches. Although rooted in long-standing traditions of military practice, vicarious warfare is sufficiently novel as to be identifiable as a distinct phenomenon. The precise manifestation or combination of vicarious methods vary according to the specific circumstances and political contexts prevailing in different theaters. However, America’s general preference is to fight its wars by delegating tasks to proxies and limiting exposure of its own military to danger. Where U.S. forces are employed directly, this takes place largely in the shadows. Such approaches have clear attractions, offer undoubted tactical advantages, and permit successive administrations to maintain a persistent tempo of operations that evades rigorous democratic scrutiny. Yet, prominent cases and numerous studies suggest that vicarious warfare has a high potential to generate counterproductive effects and significant strategic harm.  相似文献   
330.
ZHANG Xiao 《国防科技》2018,39(1):005-008
党的十九大报告把军民融合发展战略作为七大国家战略之一,明确提出要"更加注重军民融合"。必须将交通领域军民融合视作整个军民融合深度发展的重要突破口,建设军民融合大交通体系。提出以新形势下军事战略方针为统揽,以军民深度融合为途径,聚焦保障军队打赢,大力推进民用交通设施工具贯彻要求;依托国家路网基础,大力推进军地交通运输网络统筹纳入;强化应战应急一体,大力推进各种交通力量建设互补衔接;着眼战略投送能力,大力推进军民交通物流体系有机结合。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号