首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2022篇
  免费   464篇
  国内免费   221篇
  2024年   5篇
  2023年   17篇
  2022年   19篇
  2021年   44篇
  2020年   47篇
  2019年   66篇
  2018年   68篇
  2017年   114篇
  2016年   142篇
  2015年   74篇
  2014年   182篇
  2013年   251篇
  2012年   151篇
  2011年   131篇
  2010年   134篇
  2009年   167篇
  2008年   129篇
  2007年   128篇
  2006年   155篇
  2005年   131篇
  2004年   103篇
  2003年   88篇
  2002年   57篇
  2001年   54篇
  2000年   30篇
  1999年   43篇
  1998年   35篇
  1997年   30篇
  1996年   18篇
  1995年   18篇
  1994年   11篇
  1993年   15篇
  1992年   14篇
  1991年   13篇
  1990年   17篇
  1989年   5篇
  1987年   1篇
排序方式: 共有2707条查询结果,搜索用时 140 毫秒
191.
武警院校拥有丰富的教育资源,依托武警部队日益健全的内部网络系统,大力开展现代远程教育,能够更加紧密院校与部队的联系,及时了解部队的需求,制定出更加符合部队实际的课程体系,更大限度发挥现有教学资源的效益。由于远程教育具有方便快捷,受时间、空间局限小的特性,弥补了由于武警部队点多、线长、面广,分布相对分散,导致部队官兵学习时间不固定、人员难以集中等不便的问题,为武警部队官兵获取文化知识,学习科学技术提供了新的途径。  相似文献   
192.
为保证再入飞行器在剧烈变化飞行环境下的控制能力,传统单一气动舵面控制被直\气复合控制模式取代.性能提升同时,多个参与飞行控制的执行机构之间引起的操纵耦合使系统耦合加剧.以再入飞行器为研究重点,分析了直\气复合控制模式下的两类操纵耦合原理,建立数学模型.采用动态逆,模糊理论和变结构方法相结合策略设计鲁棒控制器.仿真结果表明该方法是行之有效的.  相似文献   
193.
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
194.
动态差分逻辑是一种典型的电路级差分功耗攻击(DPA)防护技术.这种技术通过使逻辑门保持恒定的翻转率来降低电路功耗与数据信号之间的相关性.介绍了一种新型的、基于查找表(Look-Up-Table,LUT)结构的动态差分逻辑(LBDL),以及基于这种逻辑的集成电路设计方法.该设计方法仅需在传统的半定制设计流程中添加少量的替换操作就可以实现 ,因而比其他完全需要全定制设计的动态差分逻辑具有更好的实用性.而相对同样适用于半定制实现的动态差分逻辑 WDDL(Wave Dynamic Differential Logic),LBDL逻辑解决了逻辑门翻转时刻与数据信号之间的相关性,从而比WDDL逻辑具有更好的功耗恒定性.实验结果表明,该设计方法能够有效实现具有抗DPA攻击性能的电路.  相似文献   
195.
普适计算的适应性特征对于软件重用的要求决定了构件模型是目前普适计算软件体系结构的理想选择.在面向普适计算的自适应软件平台UbiStar的研究过程中,为了准确地对普适应用中构件的外部特征进行抽象描述,参考了CORBA构件模型使用IDL3和CIDL对构件进行特征抽象的方法,结合UbiStar普适计算平台的特点与需求,提出了一种适用于普适计算环境的构件定义语言UCDL,并且给出了一个应用示例.  相似文献   
196.
信息中心网络(Information-Centric Networking, ICN)“泛在缓存”的特性,引发数据副本率过高、缓存空间不能充分利用等问题。为了解决上述问题,分别从用户、服务提供商和网络运营商的角度出发,以最小化网络流量与网络费用开销为优化目标建立两个单目标优化模型,并将二者结合为帕累托模型;基于帕累托求解方法中数学规划法的思想,详细描述缓存节点位置选择算法。仿真结果表明:在流量性价比方面,所提缓存节点选择算法优于ICN的默认缓存机制;在网络费用开销方面,所提算法更适用于只有少数内容较为流行的网络中,而在所有内容都流行的情况下,ICN中默认的“遍地缓存”机制更为适宜。  相似文献   
197.
To engage properly with the Somali National Army, to understand it in the hope of improving stability and the lives of over 12 million Somalis, good basic information on its composition and characteristics is necessary. Authoritative accounts on the subject have been scarce for over 25 years. This account seeks to detail the army’s dispositions across southern Somalia, and, more importantly, the brigades’ clan compositions and linkages. Clan ties supersede loyalties to the central government. The army as it stands is a collection of former militias which suffer from ill-discipline and commit crime along with greater atrocities. Estimates of numbers are unreliable, but there might be 13,000 or more fighters in six brigades in the Mogadishu area and five beyond.  相似文献   
198.
Cyberspace experiences worrying trends that could have a negative impact on the international strategic landscape. The lack or erosion of norms and risky practices and behaviors could lead to greater uncertainty and thus greater instability. Set against a context of renewed competition between great powers, these developments are also tied to the strategic structure of cyberspace. This forum is devoted to discussing factors leading to stability or and instability.  相似文献   
199.
The aim of this paper is to investigate the determinants of international arms transfers in a gravity model framework. By distinguishing between the decision to export arms (extensive margin) and the value of the arms exported (intensive margin), while also considering its interdependence, is what differentiates this paper from previous research. A theoretically justified gravity model of trade augmented with political and security motives is estimated using a two-stage panel data approach for 104 exporting countries over the period from 1950 to 2007. In addition to the usual gravity variables related to the economic mass of the trading countries and the trade cost factors, the model is extended with political and security factors. The level of democracy in both trading partners, political differences between trading partners and voting similarity with the United States in the UN General Assembly of the countries engaged in trade are the main political factors, whereas the existence of conflicts, military pacts, and embargoes are taken as security motives. The key result indicates that both political and security motives are an important determinant of an arms trade, but their effects on the extensive margin of exports (the decision to order a transfer) differs from their effect on the intensive margin (average value of exports). Moreover, the relative importance of the factors under study has changed since 1989. In the post-cold war period, countries that are less democratic are more likely to export arms, military pacts are less relevant and embargoes play a role.  相似文献   
200.
In this article, we consider a classic dynamic inventory control problem of a self‐financing retailer who periodically replenishes its stock from a supplier and sells it to the market. The replenishment decisions of the retailer are constrained by cash flow, which is updated periodically following purchasing and sales in each period. Excess demand in each period is lost when insufficient inventory is in stock. The retailer's objective is to maximize its expected terminal wealth at the end of the planning horizon. We characterize the optimal inventory control policy and present a simple algorithm for computing the optimal policies for each period. Conditions are identified under which the optimal control policies are identical across periods. We also present comparative statics results on the optimal control policy. © 2008 Wiley Periodicals, Inc. Naval Research Logistics 2008  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号