首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   876篇
  免费   155篇
  国内免费   40篇
  2024年   6篇
  2023年   4篇
  2022年   2篇
  2021年   28篇
  2020年   18篇
  2019年   32篇
  2018年   43篇
  2017年   57篇
  2016年   62篇
  2015年   27篇
  2014年   84篇
  2013年   136篇
  2012年   46篇
  2011年   53篇
  2010年   57篇
  2009年   52篇
  2008年   50篇
  2007年   39篇
  2006年   46篇
  2005年   53篇
  2004年   35篇
  2003年   30篇
  2002年   25篇
  2001年   17篇
  2000年   15篇
  1999年   12篇
  1998年   8篇
  1997年   7篇
  1996年   4篇
  1995年   8篇
  1994年   3篇
  1993年   2篇
  1992年   3篇
  1991年   2篇
  1990年   5篇
排序方式: 共有1071条查询结果,搜索用时 15 毫秒
711.
In the years since the 2003 Rose Revolution, the popularly elected leadership of the Republic of Georgia has responded to organized protests with a variety of repressive tactics. These reactions suggest that former challengers to authoritarian elites may utilize similar methods of retaining power during crisis periods. Yet, the alleged involvement of agencies of the Russian Federation in fomenting domestic instability has also occupied a central position in the national security policies of the outgoing Saakashvili government. These conditions both preceded and were reinforced by the South Ossetia War of August 2008. This article proposes a theoretical model that represents the intervening effect of interstate conflicts on state–society relations in Georgia from 2003 to present. It presents several hypotheses and possible indicators, data sources, and techniques for analyzing the interaction between characteristics of opposition groups, external threats, and the domestic security practices of contemporary Georgian political elites.  相似文献   
712.
Following the 11 September 2001 attacks, the US government increased its counterterrorism (CT) funding and created several Federal Agencies such as the Department of Homeland Security; Transportation Security Administration; and National Counterterrorism Center. Similarly, the 7 July 2005, London bombings also compelled the British government to increase its CT funding. These examples illustrate a phenomenon that when states experience terrorism, they dramatically increase public safety spending in order to reduce or eliminate the incidents of and casualties resulting from acts of terror. Using statistical data collected from 34 countries covering nine years, this article examines recent CT spending increases. Critically, the authors explore whether recent public safety expenditures can measurably reduce the number of domestic and international terrorist attacks. The implications of their findings should be salient for policy-makers’ assessments of their countries’ current CT strategies and policies concerning their respective Intelligence and Security Communities.  相似文献   
713.
Taiwan's international status is such that the country's ability to trade and to supply certain goods and technologies remains its primary means of practicing diplomacy and asserting international influence. U.S. pressure to conform to international nonproliferation standards has made the issue of export controls a troubling one for Taiwan. Limiting Taiwan's economic relations affects its ability to sustain itself economically and to maintain productive relations with other nations. On the other hand, as a recipient of U.S. high-technology transfers and security assurances, Taiwan cannot ignore the directives of the United States. The article focuses on this dilemma and how a shift in power to the Democratic Progressive Party is affecting Taiwan's choice between placing limitations on its global economic power or risking being cut off from U.S. technology and losing U.S. security assurances. In order to address this challenge properly, Taiwan will need to reassess its fundamental economic and security interests.  相似文献   
714.
This article explores Russia's increasing reliance on nuclear weapons from three perspectives. First, it seeks to demonstrate that the phenomenon is not exclusively limited to Russia and represents a broader trend, which is ultimately rooted in the nature of the contemporary international system or, more precisely, the uncertainties of the transitional period between the Cold War system and a new emerging one. Second, it analyzes the role assigned to nuclear weapons in Russia's doctrinal documents, in particular the emergence of a new mission—limited-use of nuclear weapons to deter or, if deterrence fails, to de-escalate large-scale conventional conflicts. Discussions of the new doctrine, which have begun recently, suggest that this new mission will likely remain unchanged. Finally, this article looks at the apparent discrepancy between Russia's nuclear modernization programs and the roles assigned to nuclear weapons in the military doctrine, as well as the causes of that discrepancy.  相似文献   
715.
从战场抢救抢修注重时效的特点出发,提出了战场抢救抢修作业复杂性概念,分析了影响抢救抢修作业复杂性的因素.引入软件工程领域的图熵模型,从微观方面研究战场抢救抢修方案实施过程中的复杂性问题.将抢救抢修方案划分为3个层次,利用petri网对操作过程进行建模,并从中提取信息结构图和动作结构图.以作业的量化为基础,给出了方案的综合量化方法.实例证明该方法可以很好的反映抢救抢修方案的可操作性.  相似文献   
716.
有限差分算法是常用的海洋拖曳系统运动仿真计算方法,传统的有限差分算法在对拖缆进行离散时,采用固定空间步长,为了提高数值计算的精度,通常需要减小空间步长,这既增加了计算时间,又浪费了计算机内存,甚至造成无法仿真一些工况。针对这一问题,提出了变步长有限差分数值算法,给出了步长变化的设定原则与算法,在建立海洋拖曳系统运动模型的基础上,系统分析了这一方法的求解思想与过程,并分别采用传统固定步长有限差分算法(大空间步长和小空间步长)和变步长有限差分算法,对模型进行了数值仿真,结果表明:变步长有限差分算法不仅保证了仿真计算精度,而且降低了计算机内存需求量,减少了计算时间。此外,变步长有限差分算法具有较高的灵活性,可根据实际情况,综合考虑计算时间、内存需求量和计算结果精度,从而选择合适的空间步长变化规律。  相似文献   
717.
以Web of Science数据库相关文献为数据源,运用Excel图表工具及CitespaceⅡ可视化知识图谱软件进行数据信息分析,绘制了共现网络图谱,通过解读图谱.对国外“strategic technology”研究热点及趋势进行了初步探析,得出“strategic technology”研究热点与前沿的相关结论,对国内战略技术的研究与政策制定具有一定的参考价值.  相似文献   
718.
蔡刿  肖毅  张恒  许林 《国防科技》2013,(6):6-10
文章介绍了以美国为主的军事发达国家的人系整合分析与评估的前沿技术、相应的平台及它们的应用情况,也介绍了我国在该方向的研究现状与不足。最后对武器装备人系整合设计分析与评估提出了发展建议。  相似文献   
719.
输送流量在线实时监测是准确掌握机动管线运行工况、优化运行方案、分析判断泄漏的关键之一。分析了容积式、速度式和差压式等常用流量监测技术的技术特征与使用条件,根据机动管线的作业特点和要求,优选出涡街流量监测技术作为该管线系统的流量在线实时监测技术;分析了机动管线输送过程中管道振动对涡街流量计计量精度的影响,提出了几种不同的抗振防干扰技术,并应用于机动管线涡街流量监测装置的研制。样机试验表明,采用抗振技术的涡街流量监测装置检测精度能满足机动管线流量在线实时监测需求。  相似文献   
720.
基于IPSec的下一代高性能安全处理器的体系结构   总被引:1,自引:0,他引:1       下载免费PDF全文
IPSec是目前适合所有Internet通信的惟一一种安全技术。通过分析IPSec的处理过程,指出网络安全处理器的使用是IPSec协议高效实现的关键,并详细介绍了目前典型安全处理器的结构和应用。由于目前的网络安全处理器无法满足OC 48及其以上速率接口的处理要求,对下一代高速网络安全处理器的体系结构进行了分析和预测。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号