首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1595篇
  免费   328篇
  国内免费   135篇
  2024年   5篇
  2023年   7篇
  2022年   22篇
  2021年   39篇
  2020年   26篇
  2019年   38篇
  2018年   48篇
  2017年   80篇
  2016年   99篇
  2015年   64篇
  2014年   127篇
  2013年   175篇
  2012年   91篇
  2011年   115篇
  2010年   119篇
  2009年   131篇
  2008年   106篇
  2007年   101篇
  2006年   117篇
  2005年   98篇
  2004年   82篇
  2003年   56篇
  2002年   34篇
  2001年   33篇
  2000年   46篇
  1999年   26篇
  1998年   23篇
  1997年   25篇
  1996年   24篇
  1995年   16篇
  1994年   16篇
  1993年   16篇
  1992年   19篇
  1991年   13篇
  1990年   13篇
  1989年   5篇
  1988年   3篇
排序方式: 共有2058条查询结果,搜索用时 15 毫秒
861.
在YHFT-DX处理器的研制中,研究并实现了多项支撑全定制设计的EDA技术。针对全定制设计的功能验证,研究并实现了层次式功能模型自动提取技术,能够将晶体管级网表转化为等效的RTL级网表。研究并实现了晶体管级混合时序分析方法,可自动分析全定制设计的延时,并采用多线程并行的方法获得了约10倍左右的速度提升。为提高模拟结果分析的效率,开发了一个延时提取的工具Aimeasure。开发了两个信号完整性分析工具PNVisual和NoiseSpy,分别用于全定制设计的IR-Drop分析和噪声分析。上述技术已在YHFT-DX处理器的设计中得到了广泛应用,有效提高了全定制设计的效率与质量。  相似文献   
862.
This article explores the livelihood pathways of serving Ugandan Army soldiers and traces their methods and motivations for enlistment. All were from areas of northern Uganda affected by nearly two decades of violent instability. With the Uganda People's Defence Forces (UPDF) increasing recruitment eligibility requirements and taking other measures to improve professionalism, some soldiers enlisted using false credentials and names, travelled to skirt unofficial ethnic quotas, and joined against their family's wishes. The Army's defence reform process was intended to preclude such problems. The article concludes with reflections on what strategic deception (by both recruits and the Army) may imply for warriors' honour.  相似文献   
863.
This article proposes a case study of the multinational counterinsurgency operations that occurred in China during the Boxer Rebellion in 1900–1, to provide a better understanding of the political and military dynamics specific to this type of mission. The study focuses primarily on the nature of the cooperation on the ground, the various national approaches to counterinsurgency, and the asymmetry of strategic approach between the Westerners and the Chinese. A discussion is also proposed, highlighting that combined counterinsurgency is not per se an obstacle to the unity of command, but that politically international coalitions create unique challenges to counterinsurgency operations.  相似文献   
864.
Why did the United States, a country notorious for supporting coups and military dictatorships in Latin America during the Cold War, seek to depoliticize security forces in the Caribbean basin during the early twentieth century? Drawing from primary sources, I argue that this emphasis on military non-partisanship abroad stemmed from Progressive Era reforms popular at home. These reforms, which stressed bureaucratic efficiency via nonpartisan expertise, had become institutionalized within the US military and State Department and then channelled into the imperial administration of Nicaragua and the Dominican Republic. The State Department and Marine Corps attempted to replace local partisan armies with the kind of professional, nonpartisan armed forces that the US's own military had come to exemplify. That these civil-military reform efforts ultimately backfired should serve as a reminder of the difficulties inherent in using military interventions to transform coercive apparatuses and their societies.  相似文献   
865.
Pirate attacks against commercial vessels in the Western Indian Ocean and nearby seas reached an unprecedented level in 2011. Despite concerted efforts by the international community and shipping companies to address this threat by conducting naval patrols and equipping commercial vessels with non-lethal defenses, the frequency of pirate attacks continues to increase. The general ineffectiveness of existing anti-piracy measures has sparked interest in expanding the use of armed private security contractors to protect commercial vessels from pirate attacks. This article argues that armed private security contractors can, indeed, enhance the security of commercial vessels because these actors can provide onsite protection for commercial vessels, which should allow them to respond very quickly to pirate attacks, and because these actors are willing to use deadly force against pirates. However, this article also argues that expanding the use of these actors may increase the degree of violence used during pirate attacks, pose threats to the safety of innocent civilians, and violate a number of domestic and international laws.  相似文献   
866.
The phenomenon of the Boko Haram insurgency in Northern Nigeria has generated many security concerns. This article explores the implications of the Boko Haram insurgency in Northern Nigeria for internal security. The article, which relies on a study of secondary sources of data, reveals that the insurgency has spawned varied implications such as an international image crisis, huge economic losses, a health and humanitarian crisis, a huge burden on the security apparatuses, arms proliferation, and endangered national unity. It holds that the insurgency is essentially interlinked with a breakdown of the social contract manifested in opportunistic behavior, economic stagnation, and lack of functioning institutional mechanisms for policy conduct and conflict resolution. Owing to the security menace posed by the insurgency, the article recommends that the root causes of the insurgency should be tackled rather than relying on reactive measures that cannot guarantee enduring peace and internal security.  相似文献   
867.
Using hitherto largely unexplored governmental archives from London and Dublin, this article focuses on the security challenges arising from the existence of the land frontier between the Republic of Ireland and Northern Ireland and the significance of issues of cross-border security cooperation for Anglo-Irish relations from the beginning of the Troubles until the Anglo-Irish Agreement in 1985. It argues that the relatively safe haven of the Republic was essential to the longevity of the IRA's campaign and that successive Irish governments exploited British security concerns to expand their political influence on Northern Ireland.  相似文献   
868.
ABSTRACT

The practice of dispatching teams of police advisors to other states to build or train foreign security forces began at the end of the nineteenth century, yet there exists no definitive history of the practice, or any definitive theoretical approach underpinning why such missions succeed or fail. Drawing upon their recent edited book on expeditionary police advising, and by examining the donor or sending states, the host nations, and the use of police in counterinsurgency situations, the authors present some key reasons why such missions fail, and lay some groundwork for additional study of this important subject.  相似文献   
869.
从导热微分方程出发,建立了光纤陀螺温度场有限元模型,对模型进行了稳态温度场和瞬态温度场仿真分析。利用铂电阻测温电路对仿真结果进行实验验证,两者相对误差小于3%,证明仿真分析的结果是正确和有效的。针对光纤环温度场分布不均匀的情况,对光纤陀螺结构进行了优化设计。光纤陀螺在25℃环境中稳定工作时,稳态温度场分析结果表明,优化设计后光纤环最高与最低温度差为0.05℃,较优化前的0.19℃减小了73.7%;将陀螺置于60℃环境且处于非开机状态时,10min瞬态温度场分析结果表明,优化设计后光纤环最高与最低温度相差0.11℃,较优化前的0.19℃减小了42.1%。  相似文献   
870.
提出一种基于主题模型的人体动作识别方法。该方法首先提取时空兴趣点(STIP,space-time interest point)来描述人体运动,然后提出使用慢特征分析(SFA, slow feature analysis)算法计算兴趣点梯度信息不变量最优解,最后使用概率潜在语义分析 (pLSA, probabilistic Latent Semantic Analysis) 模型识别人体动作。SFA计算的梯度不变量最优解可以表示时空兴趣点固有特征,能够无歧义反映时空兴趣点在空间及时间方向上的信息。同时,针对pLSA隐性主题正确性无法保证的缺点,算法将主题与动作标签“一对一”相关,通过监督方式得到主题,保证了训练中主题的正确性。该算法在KTH人体运动数据库和Weizmann人体动作数据库进行了训练与测试,动作识别结果正确率分别在91.50%和97%以上。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号