全文获取类型
收费全文 | 434篇 |
免费 | 16篇 |
国内免费 | 10篇 |
出版年
2024年 | 1篇 |
2021年 | 2篇 |
2020年 | 15篇 |
2019年 | 36篇 |
2018年 | 27篇 |
2017年 | 34篇 |
2016年 | 23篇 |
2015年 | 4篇 |
2014年 | 44篇 |
2013年 | 169篇 |
2012年 | 16篇 |
2011年 | 8篇 |
2010年 | 6篇 |
2009年 | 7篇 |
2008年 | 5篇 |
2007年 | 8篇 |
2006年 | 3篇 |
2005年 | 15篇 |
2004年 | 7篇 |
2003年 | 7篇 |
2002年 | 4篇 |
2001年 | 6篇 |
2000年 | 3篇 |
1999年 | 1篇 |
1998年 | 2篇 |
1997年 | 1篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1992年 | 1篇 |
1990年 | 1篇 |
1989年 | 1篇 |
排序方式: 共有460条查询结果,搜索用时 15 毫秒
251.
因稳定时间受限,传统的倍增公式导出的外推临界公式计算结果大于实测值,偏危险;文中根据新的中子倍增公式导出了外推临界计算的新公式,实例计算表明,该公式比传统的外推临界公式精确且偏安全. 相似文献
252.
核污染的危害及其去除方法 总被引:3,自引:1,他引:2
核污染已成为全球十大环境难题之一,成了人类摆脱不掉的阴影.论述了核污染设施的核污染去除方法如物理法、化学法、电化学法、物理-化学联用法、微生物清除法、焚烧、超级压缩法和土壤核污染去除方法如铲土去污、深翻客土、可剥离性膜、森林修复等,并分析了各种去除方法的优缺点,最后提出了加强管理削减核污染源、加强现有处理方法的联用、开发微生物处理新技术和开发基因工程修复植物的建议. 相似文献
253.
软件复用是在软件开发过程中避免重复劳动的解决方案。通过构件的形式来实现软件复用,可以提高开发的效率和质量。以核侦察处理模块的实现和集成为例,介绍了基于构件的复用技术在目前信息化建设中的使用手段和方法。 相似文献
254.
提出了在一定经费的约束条件下,使所有二级存储场站的所有战备器材期望缺货数最小的模型,通过对后方仓库存量初值和场站库存量的确定,求解出后方仓库和场站之间库存量的优化分配调整方案。最后通过实例得出发散型布局形态模型。 相似文献
255.
John H. Gill 《战略研究杂志》2019,42(5):701-726
ABSTRACTThe Kargil conflict was a limited war between India and Pakistan fought along the Kashmir Line of Control during the spring/summer of 1999. Named for the principal town in the combat zone on the Indian side, it was the first open warfare between India and Pakistan as declared nuclear weapons states and included the first combat employment of the Indian Air Force since 1971. Despite its intensity, it was also characterised by considerable restraint on both sides. The potential for conventional escalation, however, was high and the possibility of nuclear confrontation could not be excluded. It had significant long-term ramifications for both countries and constitutes an important part of the backdrop to their relations today. 相似文献
256.
Nikolay I. Geraskin Andrey A. Krasnoborodko Taisia A. Piskureva 《Defense & Security Analysis》2015,31(4):330-345
In 2002, a Nuclear Security Culture (NSC) Enhancement Program with the mission to raise the level of the NSC at sites and facilities in Russia's nuclear complex was launched under the guidance of the Russian State Corporation “ROSATOM” and with support from the US Department of Energy. A Joint Working Group for NSC with both Russian Federation and US members was formed and charged with the design and implementation of the program. The program was implemented at sites and facilities on a pilot basis. Nine sites participated in the Pilot Project. The key program component was an establishment of Culture Coordinators (CCs) with the authority to coordinate and implement NSC enhancement activities at sites and facilities. The CCs have served as the force that has maintained the momentum of the Pilot Project and continuously steered the site NSC enhancement efforts. The contribution of the CCs in achieving the positive outcomes of the program cannot be overstated. 相似文献
257.
Thomas Obel Hansen 《战略研究杂志》2019,42(7):946-970
ABSTRACTThis article aims to identify and elaborate the causes and ramifications of applying transitional justice, in particular accountability measures, to situations of war. It focuses on the correlations between peace and justice – and hence an important perspective on the question ‘how do wars end’. The article seeks to understand some of the main challenges associated with pursuing accountability for crimes committed in contemporary forms of conflict, including civil wars and abuses committed by major powers in armed conflict. 相似文献
258.
王雪姣 《中国人民武装警察部队学院学报》2011,(11):34-36,77
近年来,随着军队使命任务的拓展,涉外非战争军事行动日益成为国家运用军事力量的重要方式。因此,必须加强涉外非战争军事行动中法律保障问题研究,使其在法律框架下进行。加强对涉外非战争军事行动的法律保障,有助于为军队遂行多样化军事任务提供有力的法律支持和保障。 相似文献
259.
汪红伟 《武警工程学院学报》2014,(5):12-16
从关于国防和军队重大改革的重要论述入手,系统地阐述了武警部队重大改革必须向“能打胜仗”的战斗力聚焦。主要从三个层面进行分析:一是向提高部队整体素质及优化规模结构聚焦;二是向提高部队武器装备保障效能聚焦;三是向增强部队以执勤处突为中心的军事能力聚焦。 相似文献
260.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity. 相似文献