首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   794篇
  免费   105篇
  国内免费   49篇
  2023年   4篇
  2022年   8篇
  2021年   18篇
  2020年   17篇
  2019年   16篇
  2018年   16篇
  2017年   35篇
  2016年   38篇
  2015年   27篇
  2014年   65篇
  2013年   68篇
  2012年   59篇
  2011年   68篇
  2010年   56篇
  2009年   77篇
  2008年   36篇
  2007年   58篇
  2006年   56篇
  2005年   49篇
  2004年   32篇
  2003年   29篇
  2002年   15篇
  2001年   24篇
  2000年   19篇
  1999年   8篇
  1998年   6篇
  1997年   4篇
  1996年   6篇
  1995年   7篇
  1994年   3篇
  1993年   3篇
  1992年   2篇
  1991年   8篇
  1990年   9篇
  1989年   2篇
排序方式: 共有948条查询结果,搜索用时 15 毫秒
101.
集合线对对数周期偶极子天线的影响   总被引:3,自引:1,他引:2  
主要研究了对数周期偶极子天线.基于Pocklington积分方程和全域基函数,采用矩量法结合网络理论建立了天线算法模型;使用该模型计算了在天线阵和集合线共同作用下天线的辐射方向图,得出了集合线在不同频段上对天线辐射性能的影响,并通过截短延长线长度改善了天线低频段的辐射特性,增强了天线轴向方向性.  相似文献   
102.
模糊逻辑系统在船舶风险评估中的应用   总被引:4,自引:2,他引:2  
为了合理进行船舶风险评估,提出了一种基于模糊逻辑系统的船舶风险评估方法.根据模糊逻辑系统的基本原理,建立了船舶风险评估的模糊逻辑模型;按照国家标准、规范,并结合经验建立了风险指标的模糊集合、风险矩阵及模糊规则,然后进行了模糊推理,得到了系统的风险等级,并制定了预防风险的措施.以某艇消防系统的风险评估为例,证明了其能够合理地评估出系统的风险,可为决策提供参考.  相似文献   
103.
This paper is the first to demonstrate a viable prediction market that successfully forecasts defense acquisition cost and schedule outcomes, and to provide insights for defense executive decision‐making. Already used in private industry, prediction markets can also accurately forecast outcomes and their associated risks for government programs. Using virtual money, prediction markets allow traders to ‘bet’ on some future outcome. This market mechanism turns out to be a relatively simple and accurate way to discover, aggregate, and communicate to a defense executive the collective market’s beliefs about the likelihood of an eventual outcome of an acquisition program of interest.  相似文献   
104.
This article presents a proposed theory of how war economies are formed and maintained, as well as an integrated policy framework to guide the dismantling of war economies emanating from the proposed theory. Additionally, six potential areas for future research pertaining to the dismantling of war economies are also presented.  相似文献   
105.
This article is about the management of security incidents in organisations and companies which are under the protection of private security personnel, whether in-house or contracted. Incidents can be defined as accidental or anecdotal (bird flies into a camera) to a violation of law or company policy. Managing security incidents is one of the key functions of a private security service provider. The purpose of this study is to explore the management of security incidents and the information related thereto, identify shortcomings and find solutions for managing these shortcomings. Interviews were used to gain insight from personnel within the private and government sectors which are served by the private security industry. It was found that security incidents are handled in a routine way by organisations from the different sectors. One major shortcoming is that security incidents and the information related thereto are not managed by security service providers according to an operational framework or model with the required infrastructure and resources. The significance of this study is for security incidents to be managed correctly, so that the information related thereto may be captured accurately, analysed and used proactively and reactively to improve physical protection systems, develop preventative strategies and provide actionable information products in order to reduce crime, increase detection rates and prevent losses.  相似文献   
106.
Kovenock and Roberson's [2011] comment provides initial work which has the potential, when suitably extended, to advance the research frontier. Kovenock and Roberson's paper consists of three sections. The first section is an interesting introduction. The second section, titled ‘Model and Main Result,’ provides no contribution beyond Hausken [2008a]. It consists of Equations (1)–(10) which are equivalent to equations developed by Hausken, and Equation (11) which is equivalent to the utility requirements u???0 and U???0 provided after Equation (17) in Hausken. The third section provides interesting ideas about mixed-strategy equilibria that can be extended in future research.  相似文献   
107.
This paper analyses the financial and war‐spending policies of a state that faces a conflict in which defeat would result in the loss of sovereign power and in which the material consequences, conditional on avoiding defeat, are stochastic. The analysis takes explicit account of the historical experiences of lenders, who face debt repudiation if the state to whom they have lent is defeated and who also face partial default if the material consequences of the war are unfavorable for the debtor state, even if it avoids defeat. In this analysis, the state uses war debt to smooth expected consumption intertemporally in response to temporary war spending, and the state also uses contingent debt servicing to insure realized consumption against the risk associated with the material consequences of the war. An important innovation in the analysis is to treat the equilibrium amount of war spending, the state's resulting probability of avoiding defeat, as well as the equilibrium amount of borrowing as a set of endogenous variables to be determined simultaneously.  相似文献   
108.
为解决小子样条件下进行产品固有可用度试验验证的问题,基于Bayes理论,提出了一种固有可用度定时截尾试验方案.该试验方案在假设故障间隔时间和修复时间均服从指数分布的前提下,将现场试验分为同时进行的可靠性和维修性定时截尾试验2个部分,要求在利用验前试验信息的基础上,使本次试验获得的验后分布还可以作为下一次现场试验的验前分布,提高了试验数据的利用率,具有较好的经济效益.  相似文献   
109.
110.
The current approach to countering the threat of improvised explosive devices (IEDs) in Afghanistan has met with limited success. The relative lack of success may be in part because the current approach is not holistic and discounts the social systems that foster the IEDs. Insurgents are using IEDs as a tool to further their strategic aims, but the coalition and to a lesser extent the Government of the Islamic Republic of Afghanistan (GIRoA) are attacking the IEDs as if they are an end in and of themselves. Combining network disruption with information change maximizes the opportunities for mitigating the IED threat. More specifically, to mitigate the IED threat requires disrupting the social and economic systems associated with IEDs, and at the same time providing alternative economic opportunities and improving rule of law and governance at the local level. In other words, counter-IED (C-IED) must be Counter-Insurgency (COIN) centric to be successful. This paper reviews the current state of C-IED efforts, identifies five main problems with the current approach, and suggests changes to reduce or mitigate the IED threat in Afghanistan.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号