全文获取类型
收费全文 | 859篇 |
免费 | 169篇 |
国内免费 | 25篇 |
出版年
2024年 | 2篇 |
2023年 | 10篇 |
2022年 | 9篇 |
2021年 | 13篇 |
2020年 | 20篇 |
2019年 | 13篇 |
2018年 | 21篇 |
2017年 | 39篇 |
2016年 | 37篇 |
2015年 | 35篇 |
2014年 | 68篇 |
2013年 | 62篇 |
2012年 | 59篇 |
2011年 | 68篇 |
2010年 | 59篇 |
2009年 | 58篇 |
2008年 | 59篇 |
2007年 | 50篇 |
2006年 | 46篇 |
2005年 | 60篇 |
2004年 | 44篇 |
2003年 | 44篇 |
2002年 | 35篇 |
2001年 | 40篇 |
2000年 | 21篇 |
1999年 | 18篇 |
1998年 | 17篇 |
1997年 | 5篇 |
1996年 | 4篇 |
1995年 | 10篇 |
1994年 | 5篇 |
1993年 | 2篇 |
1992年 | 7篇 |
1991年 | 4篇 |
1990年 | 6篇 |
1989年 | 2篇 |
1988年 | 1篇 |
排序方式: 共有1053条查询结果,搜索用时 15 毫秒
311.
312.
313.
为解决串联锂离子电池组电压均衡问题,提出了一种新型主动电池到电池均衡电路。该电路主要包括N+5个双向开关以及一个LC谐振电路,其中,N表示电池组中电池的数量。利用LC串联谐振电路能够直接将能量从最大充电电池传输至最小充电电池,无需使用多绕组变压器。并且在零电流开关条件下,运行电路中的所有开关能够减少平衡所用功耗。通过10节串联锂离子电池的实际测试,结果显示相比常规均衡电路,提出的电路能够实现快速平衡并且传输效率更高。当均衡功率为0.48 W和2.04W时,实测功率传输效率分别为92.7%和79.2%。 相似文献
314.
Pascal Vennesson 《战略研究杂志》2017,40(3):358-391
Critical security advocates commonly portray strategic studies as crippled by its narrow focus on Cold War-era military issues, as state-centric and as Western-centric. I argue that this conception of the scope of strategy is flawed and I offer a comprehensive rebuttal by working out the logic of the theories advanced by Carl von Clausewitz and Thomas Schelling. The proponents of critical security overlook the striking expansion of strategy during the Cold War, its longstanding inclusion of competing political actors not just states, as well as its capacity to put Western and non-Western actors in a common analytic frame. By breaking out of the conceptual jails in which strategy has been incarcerated, I seek to reconnect International Relations to strategic thought from which it has become increasingly estranged. 相似文献
315.
316.
317.
Stephen J. Cimbala 《Defense & Security Analysis》2017,33(3):193-208
Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities. 相似文献
318.
提出一种基于双幂次组合函数趋近律的新型滑模控制方案。与现有的快速幂次或双幂次趋近律相比,具有更快的收敛速度,同时还保持了全局固定时间收敛特性,收敛时间上界与滑模初值无关。当系统存在有界扰动时,能够使滑模变量在有限时间内收敛到稳态误差界内,同时其稳态误差要小于现有方法的。仿真实验验证了该方法的有效性及理论分析的正确性。 相似文献
319.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy. 相似文献
320.