首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   500篇
  免费   18篇
  国内免费   7篇
  2022年   4篇
  2021年   3篇
  2020年   3篇
  2019年   6篇
  2018年   2篇
  2017年   10篇
  2016年   14篇
  2015年   16篇
  2014年   60篇
  2013年   34篇
  2012年   50篇
  2011年   53篇
  2010年   46篇
  2009年   45篇
  2008年   22篇
  2007年   31篇
  2006年   21篇
  2005年   30篇
  2004年   23篇
  2003年   8篇
  2002年   9篇
  2001年   10篇
  2000年   5篇
  1999年   4篇
  1998年   3篇
  1997年   5篇
  1994年   3篇
  1993年   2篇
  1992年   1篇
  1991年   2篇
排序方式: 共有525条查询结果,搜索用时 234 毫秒
51.
油料装备信息接入和传输网络设计   总被引:1,自引:1,他引:0  
在将油料装备从逻辑上划分为基础层、系统层、决策层3个层次的基础上,提出并设计了从基础层到系统层信息接入的网络方式,以及系统层到决策层信息传输的联网形式,从而为油料装备信息化提供了一个可行的网络解决方案。  相似文献   
52.
汽油与柴油混合用作柴油机应急燃料的探讨   总被引:1,自引:0,他引:1  
应急燃料对于提高战时油料保障能力具有重要意义。文章以在-10#军用柴油中掺入90#车用汽油(简称为汽柴混合油)为例,从柴油机燃料应具有的品质性能着手,分析了汽柴混合油作为柴油机应急燃料的可行性。把车用汽油和军用柴油按照不同的比例掺兑,将试验结果与军用柴油的性能要求和美军应急使用指标对某些理化性能的要求相比照, 指出了汽柴混合油作为柴油机燃料的可行性,并提出了建议。  相似文献   
53.
针对钢质油罐底板腐蚀,首先分析了油罐底板腐蚀工程检测数据的特点和腐蚀试验数据统计分析理论;然后针对工程检测信息不完全的特性,以最大腐蚀深度的预测估计为目标,建立了以轻微腐蚀面积估计来实现腐蚀概率修正估计的模型;最后利用广州等地27个罐约900条检测数据估计了油罐底板的最大腐蚀深度。其最大相对误差小于45%,约80%的相对误差优于30%。  相似文献   
54.
自主驾驶技术许多相关技术可以应用到车辆主动安全中去.文章阐述了一些主动安全的基本概念,并讨论了主动安全技术在军车的应用展望.  相似文献   
55.
Croatia's successful bid for independence was one of the defining moments of the immediate post-Cold War period. Nevertheless, the means that Croatia used to obtain independence remains relatively unexamined by academics. This article focuses on the early period of Croatia's bid for secession, and specifically the role that Yugoslavia's policy of Total National Defence played in facilitating its independence. Unlike in Slovenia, where the legacies of Total National Defence facilitated Slovenia's bid for secession, in Croatia the decision of its political leaders meant that the country largely neglected its positive legacies, resulting in a protracted four-year struggle.  相似文献   
56.
On 4 January 1961 in Baixa do Cassange, in the north of Angola, the blacks who worked in the cotton fields began a strike. The army with air support was called to quell the rebellion, and the article emphasizes the importance of air support tethered to the ground forces, particularly in a remote and vast area of operations in the tropical rainy season. In this case, the support originally came in the form a squadron of Lockheed PV-2 Harpoons from Luanda, some 300 kilometers away. These open-ocean reconnaissance aircraft and their crews were ill-suited for the task. When this became apparent, four small Auster D5/160s were relocated from Negage to Malange, among the ground forces. The Austers flew reconnaissance missions over the troubled zones, dropped provisions and messages to the advancing ground forces, and served as a backup communications link. When the strike ceased after three weeks, the Austers assumed a humanitarian role in support of the starving population. The conclusion is that air support to ground forces is indispensable, must be properly tailored to the job, and must operate as an integral part of the ground forces.  相似文献   
57.
ABSTRACT

When on the wrong end of an asymmetry in the projection of hard power, weaker sides countenance the grim arithmetic of avoiding direct and massed confrontations. Invariably, insurgents have over the ages tended to employ indirect tactical methods to render their stronger opponents ineffective. Ultimately – interest asymmetry, regime type, asymmetries of strategy, and external intervention – combine in a complex interplay and pattern, to militate against a strong side. In Sudan, these factors interacted throughout the civil wars to produce regional autonomy and finally an independent South Sudan in 2011. Similar strategic logic had confronted many large African states battling insurgencies in Ethiopia, Angola, Nigeria, Zaire, and apartheid-era South Africa. Oftentimes, weakening public resolve has caused these governments to accommodate, capitulate or withdraw even if they try not to blink. Notwithstanding the regime type, it can be concluded that the majority of strong actors are prone to fail in a protracted, asymmetric conflict. Hence, the notion of linking victory in counterinsurgency to the degree of openness (democratic polyarchies); or closeness (totalitarianism) – is still valid but highly contestable in the case of Africa’s large dysfunctional states.  相似文献   
58.
政策的执行是一项系统性工作,其中领导者的综合素质、直达基层的领导骨干、及时高效的反馈机制、牢靠的群众基础以及周密配套的实施方案,都是政策执行的必备要素。讨论政策执行的必备要素,对于政策的执行乃至当前的改革,都具有非常重要的现实意义。  相似文献   
59.
文化安全的关键在意识形态,意识形态领域中的关键问题是价值观掌控问题。作为文化传播的主要组成部分,网络舆情对文化安全的表层和深层结构都有重要影响。本文从文化安全视角下切入,结合新疆高校网络舆情调研,分析了文化安全面临的冲击与挑战,并提出了基于文化安全保障下的新疆高校网络舆情有效管理方式和路径。  相似文献   
60.
This paper studies load balancing for many-server (N servers) systems. Each server has a buffer of size b ? 1, and can have at most one job in service and b ? 1 jobs in the buffer. The service time of a job follows the Coxian-2 distribution. We focus on steady-state performance of load balancing policies in the heavy traffic regime such that the normalized load of system is λ = 1 ? N?α for 0 < α < 0.5. We identify a set of policies that achieve asymptotic zero waiting. The set of policies include several classical policies such as join-the-shortest-queue (JSQ), join-the-idle-queue (JIQ), idle-one-first (I1F) and power-of-d-choices (Po d) with d = O(Nα log N). The proof of the main result is based on Stein's method and state space collapse. A key technical contribution of this paper is the iterative state space collapse approach that leads to a simple generator approximation when applying Stein's method.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号