首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   434篇
  免费   16篇
  国内免费   10篇
  2024年   1篇
  2021年   2篇
  2020年   15篇
  2019年   36篇
  2018年   27篇
  2017年   34篇
  2016年   23篇
  2015年   4篇
  2014年   44篇
  2013年   169篇
  2012年   16篇
  2011年   8篇
  2010年   6篇
  2009年   7篇
  2008年   5篇
  2007年   8篇
  2006年   3篇
  2005年   15篇
  2004年   7篇
  2003年   7篇
  2002年   4篇
  2001年   6篇
  2000年   3篇
  1999年   1篇
  1998年   2篇
  1997年   1篇
  1995年   2篇
  1994年   1篇
  1992年   1篇
  1990年   1篇
  1989年   1篇
排序方式: 共有460条查询结果,搜索用时 15 毫秒
251.
因稳定时间受限,传统的倍增公式导出的外推临界公式计算结果大于实测值,偏危险;文中根据新的中子倍增公式导出了外推临界计算的新公式,实例计算表明,该公式比传统的外推临界公式精确且偏安全.  相似文献   
252.
核污染的危害及其去除方法   总被引:3,自引:1,他引:2  
核污染已成为全球十大环境难题之一,成了人类摆脱不掉的阴影.论述了核污染设施的核污染去除方法如物理法、化学法、电化学法、物理-化学联用法、微生物清除法、焚烧、超级压缩法和土壤核污染去除方法如铲土去污、深翻客土、可剥离性膜、森林修复等,并分析了各种去除方法的优缺点,最后提出了加强管理削减核污染源、加强现有处理方法的联用、开发微生物处理新技术和开发基因工程修复植物的建议.  相似文献   
253.
软件复用是在软件开发过程中避免重复劳动的解决方案。通过构件的形式来实现软件复用,可以提高开发的效率和质量。以核侦察处理模块的实现和集成为例,介绍了基于构件的复用技术在目前信息化建设中的使用手段和方法。  相似文献   
254.
提出了在一定经费的约束条件下,使所有二级存储场站的所有战备器材期望缺货数最小的模型,通过对后方仓库存量初值和场站库存量的确定,求解出后方仓库和场站之间库存量的优化分配调整方案。最后通过实例得出发散型布局形态模型。  相似文献   
255.
ABSTRACT

The Kargil conflict was a limited war between India and Pakistan fought along the Kashmir Line of Control during the spring/summer of 1999. Named for the principal town in the combat zone on the Indian side, it was the first open warfare between India and Pakistan as declared nuclear weapons states and included the first combat employment of the Indian Air Force since 1971. Despite its intensity, it was also characterised by considerable restraint on both sides. The potential for conventional escalation, however, was high and the possibility of nuclear confrontation could not be excluded. It had significant long-term ramifications for both countries and constitutes an important part of the backdrop to their relations today.  相似文献   
256.
In 2002, a Nuclear Security Culture (NSC) Enhancement Program with the mission to raise the level of the NSC at sites and facilities in Russia's nuclear complex was launched under the guidance of the Russian State Corporation “ROSATOM” and with support from the US Department of Energy. A Joint Working Group for NSC with both Russian Federation and US members was formed and charged with the design and implementation of the program. The program was implemented at sites and facilities on a pilot basis. Nine sites participated in the Pilot Project. The key program component was an establishment of Culture Coordinators (CCs) with the authority to coordinate and implement NSC enhancement activities at sites and facilities. The CCs have served as the force that has maintained the momentum of the Pilot Project and continuously steered the site NSC enhancement efforts. The contribution of the CCs in achieving the positive outcomes of the program cannot be overstated.  相似文献   
257.
ABSTRACT

This article aims to identify and elaborate the causes and ramifications of applying transitional justice, in particular accountability measures, to situations of war. It focuses on the correlations between peace and justice – and hence an important perspective on the question ‘how do wars end’. The article seeks to understand some of the main challenges associated with pursuing accountability for crimes committed in contemporary forms of conflict, including civil wars and abuses committed by major powers in armed conflict.  相似文献   
258.
近年来,随着军队使命任务的拓展,涉外非战争军事行动日益成为国家运用军事力量的重要方式。因此,必须加强涉外非战争军事行动中法律保障问题研究,使其在法律框架下进行。加强对涉外非战争军事行动的法律保障,有助于为军队遂行多样化军事任务提供有力的法律支持和保障。  相似文献   
259.
从关于国防和军队重大改革的重要论述入手,系统地阐述了武警部队重大改革必须向“能打胜仗”的战斗力聚焦。主要从三个层面进行分析:一是向提高部队整体素质及优化规模结构聚焦;二是向提高部队武器装备保障效能聚焦;三是向增强部队以执勤处突为中心的军事能力聚焦。  相似文献   
260.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号