首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   522篇
  免费   215篇
  国内免费   25篇
  2024年   1篇
  2023年   6篇
  2022年   3篇
  2021年   24篇
  2020年   14篇
  2019年   13篇
  2018年   17篇
  2017年   29篇
  2016年   24篇
  2015年   8篇
  2014年   33篇
  2013年   51篇
  2012年   40篇
  2011年   27篇
  2010年   26篇
  2009年   30篇
  2008年   18篇
  2007年   27篇
  2006年   30篇
  2005年   43篇
  2004年   23篇
  2003年   16篇
  2002年   20篇
  2001年   23篇
  2000年   18篇
  1999年   11篇
  1998年   11篇
  1997年   10篇
  1996年   2篇
  1995年   69篇
  1994年   81篇
  1993年   2篇
  1992年   3篇
  1991年   4篇
  1990年   5篇
排序方式: 共有762条查询结果,搜索用时 15 毫秒
221.
彭耿  周少平 《国防科技》2014,35(6):92-96
卫星具有覆盖范围广、可长时间稳定运行、无国界限制、安全性高等独特优势,是提升部队作战效能的"倍增器",也是解决大范围战场信息支撑能力问题的有效手段和最佳途径。21世纪初,高速增长的经济推动越南航天事业驶入了发展的快车道,不仅实现了卫星发射的零突破,还相继发射了多颗通信卫星、遥感卫星和试验型纳卫星。文章主要对越南当前的卫星现状进行总结归纳,并分析其未来的发展计划。  相似文献   
222.
针对传统电工与电子技术实验教学存在的问题,分析实验教学改革的必要性,提出实验教学改革的目的,并从实验教学体系、教学模式、项目设置、考核方式几个方面进行了探索与研究,以使实验教学更加符合培养认知能力强、综合素质高、具有创新能力人才的培养目标.  相似文献   
223.
计算机科学与技术专业课程体系的建设与实践   总被引:1,自引:1,他引:0  
计算机科学与技术专业是一门随着社会、经济、科技的飞速发展而不断更新的学科,为了培养具有开拓、创新、适应社会发展的高素质工程应用型人才,我们必须不断加强计算机科学与技术专业的课程体系建设。本文结合我校计算机科学与技术专业教学和应用现状,通过建立良好的课程体系,使课程教学能更系统、更具目的性;同时将实践教学摆到了重要的位置,注重课程体系的组织与学生能力培养和素质提高的密切结合。  相似文献   
224.
We study a supply chain in which an original equipment manufacturer (OEM) and a contract manufacturer (CM) compete in the finished goods market. The OEM can decide whether to outsource the intermediate good, a critical component for producing the finished good, from the CM or make in‐house production. Technology transition improves the CM's production efficiency, and it can take two different forms: a direct technology transfer from the OEM to the CM or technology spillovers through outsourcing from the OEM to the CM. We document the possibility of strategic outsourcing, that is, the CM supplies the intermediate good to the OEM when she is less efficient than the OEM's in‐house production. We find that technology spillovers can strengthen the incentive for strategic outsourcing. Furthermore, compared with direct technology transfers, outsourcing coupled with technology spillovers may generate more technology transition. Outsourcing is a particularly appropriate channel for implicit collusion when the OEM is not very efficient with the production of the intermediate good. Our results suggest that ex post competition on the finished goods can create room for ex ante collaboration and provide some implications on the OEM's outsourcing strategies when facing a competitive CM.© 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 501–514, 2014  相似文献   
225.
针对分布式星群网络业务通信QoS不高的问题,提出了一种基于流量均衡和跨层技术的分布式星群网络路由算法(TACA)。该算法首先通过跨层技术将物理层、MAC层的相关信息搜集起来,作为判断链路负载状况的依据;然后对不同类型的业务进行分类,根据链路负载状况和业务QoS级别选择不同的路由层次,从而均衡流量以提高QoS。仿真表明,该路由算法在一定程度上降低了星群的呼叫阻塞率和切换阻塞率,平衡了网络的负载,提高了网络吞吐量。  相似文献   
226.

Since 1975 “offsets” have begun to appear frequently in contracts covering international sales of aircraft and other products incorporating advanced technology. Offsets involve reciprocity beyond that normally found in an exchange of goods for money. They may involve co‐production or co‐design of the principal item to be exchanged, or acceptance by the seller of goods or services unrelated to it as partial payment (indirect offsets or countertrade).

The United States has become the major provider of offsets and anti‐offset sentiment has grown. Economists interpret them as trade diverting. Politicians from regions suffering loss of employment view them as bestowing unfair advantage to foreign competitors.

The authors examine offsets from both theoretical and policy perspectives and conclude that in such noncompetitive markets, second‐best considerations dominate, requiring case‐by‐case evaluation of impacts and rendering across‐the‐board determinations of welfare loss suspect.  相似文献   
227.
Why should deployment affect re‐enlistment? In our model, members enter the military with naïve beliefs about deployment and use actual deployment experience to update their beliefs and revise their expected utility of re‐enlisting. Empirically, re‐enlistment is related to the type and number of deployments, consistent with the learning model. Non‐hostile deployment increases first‐term re‐enlistment but hostile deployment has little effect except for the Army, where the effect is positive. Both types increase second‐term re‐enlistment. Interestingly, first‐term members with dependants tend to respond to deployment like second‐term members. In addition, deployment acts directly to affect re‐enlistment, not indirectly through time to promotion.  相似文献   
228.
We model an oppressor aiming at victimizing an excluded group in his country, with two main variants. A foreign power affects his behaviour using either conditional aid, subject to the dictator’s participation constraint, or the threat of sanctions, broadly defined, subject to the credibility constraint. The choice between the two is either determined by the latter, or by their relative cost. Aid is preferred when the threat of sanctions is ineffective, and sanctions are too expensive. Sanctions might be imposed, if the threat is ineffective. A case study of the Iraqi Kurds after Iraq was subject to sanctions is presented.  相似文献   
229.
If international terrorism is on a rising trend, an important source of confirmation or refutation of this is time‐series data on terrorist activity. Using chiefly data collected by the RAND/MIPT consortium we show using basic statistical analysis that in the period 1968–2005 the yearly number of all international terrorist incidents shows no trend over time, but fluctuates year on year in a random manner. On the other hand some indicators do show a definite trend over time, principally the steady rise in the number of incidents that are death‐dealing in nature. A further conclusion is drawn, showing that the proportion of these incidents leading to deaths above a given level is virtually fixed.  相似文献   
230.
Indonesia, Thailand, and Vietnam recently announced that they are launching nuclear energy programs, and Malaysia and the Philippines soon may follow suit. As a result, by 2020, at least three states in Southeast Asia could possess latent nuclear capabilities—the option to pursue military applications of dual-use nuclear technology. Analysis of the nuclear programs, domestic proliferation pressures, and the external threat environment in Southeast Asia leads the authors to conclude that the nuclear intentions of states in that region are entirely peaceful and the probability of future nuclear breakout there is low. However, this finding does not justify complacency. In the long term, the benign outlook for regional security may change, and in the near term weak regulatory regimes present serious challenges to nuclear safety and create opportunities that non-state actors may exploit. To minimize these risks, the authors recommend creating a “proliferation firewall” around the region, which would combine strong global support for Southeast Asian nuclear energy programs with innovative regional multilateral nuclear arrangements.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号