首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   389篇
  免费   221篇
  国内免费   38篇
  2024年   2篇
  2023年   4篇
  2022年   1篇
  2021年   12篇
  2020年   12篇
  2019年   8篇
  2018年   9篇
  2017年   18篇
  2016年   18篇
  2015年   12篇
  2014年   26篇
  2013年   51篇
  2012年   23篇
  2011年   24篇
  2010年   25篇
  2009年   30篇
  2008年   23篇
  2007年   23篇
  2006年   13篇
  2005年   25篇
  2004年   21篇
  2003年   15篇
  2002年   17篇
  2001年   18篇
  2000年   13篇
  1999年   10篇
  1998年   10篇
  1997年   12篇
  1996年   6篇
  1995年   66篇
  1994年   83篇
  1993年   3篇
  1992年   3篇
  1991年   5篇
  1990年   6篇
  1988年   1篇
排序方式: 共有648条查询结果,搜索用时 15 毫秒
401.
恐怖主义犯罪是威胁新疆社会稳定的一个不可忽视的因素。反恐情报收集工作是新疆反恐维稳工作的前提。将“爱民固边”战略方法与公安边防反恐情报收集工作相结合,指出“爱民固边”战略在新疆反恐情报收集q-的应用问题现状,并针对问题提出了方法措施,从而最大限度地发挥“爱民固边”战略优势,维护新疆边境地区的安全与稳定。  相似文献   
402.
IEEE802.11的MAC协议是移动Ad Hoc网络目前事实上的标准.节点成功发送后,该协议中的信道接入退避算法将节点竞争窗口值CW(contention window)设为最小竞争窗口值CWmin,这种算法易造成某个节点一直占有信道,使得其他节点出现“饥饿”现象.提出一种改进算法EBEB(enhanced binary exponential backoff),用窗口阀值CWmid区分网络状态,让节点据此来合理的设置当前的竞争窗口,而不是直接设为最小值,避免节点之间产生严重的不公平.仿真结果表明改进算法EBEB在数据丢失量、时延、吞吐量上优于原有的BEB(Binary exponential backoff)算法.  相似文献   
403.
404.
An availability‐oriented approach has been developed to decide when to replace an aging system. For an existing system, it is optimal to operate another year if and only if the incremental cost per available year is less than the lifetime average cost per available year of a new aircraft. We illustrate our approach using United States Air Force KC‐135 tanker data. In demonstrating our approach, we find it will be optimal to replace the KC‐135 by the end of the decade.  相似文献   
405.
This paper investigates a series of unit root, cointegration and causality tests to ascertain the direction of causality between the growth of GNP and defence expenditure in Turkey for the years 1955–2000. The main conclusion is that there is a long‐run equilibrium relationship between GNP and defence expenditures. Furthermore, the short run causality test indicates that there is a unidirectional causality between variables, from defence expenditure to economic growth. In order to see the effect of a shock, we employed impulse response analyses. The results show that GNP decreased during the period then output finally recovered from the initial shock to defence expenditures.  相似文献   
406.
In recent years, South Africa has come to be used by international terrorists as a safe house, for paramilitary training purposes, as a base from which to plan attacks on other countries and as a conduit for financial transactions. South Africa's own counter-terrorism initiatives have been labelled ‘reactive’ by analysts. Indeed, the existing counter-terrorism regime suffers from a lack of political will to issues of corruption and ineptitude bedevilling the security apparatus of the state. However, using lessons learned from other countries, Pretoria can yet turn the tide against international terrorism by adopting more pro-active measures and by undertaking steps aimed at the depoliticisation and decriminalisation of the security forces.  相似文献   
407.
SYMBIOTIC SPIES     
Spying on the Nuclear Bear: Anglo-American Intelligence and the Soviet Bomb, by Michael S. Goodman. Stanford University Press, 2007. 295 pages, $50.  相似文献   
408.
Following the 11 September 2001 attacks, the US government increased its counterterrorism (CT) funding and created several Federal Agencies such as the Department of Homeland Security; Transportation Security Administration; and National Counterterrorism Center. Similarly, the 7 July 2005, London bombings also compelled the British government to increase its CT funding. These examples illustrate a phenomenon that when states experience terrorism, they dramatically increase public safety spending in order to reduce or eliminate the incidents of and casualties resulting from acts of terror. Using statistical data collected from 34 countries covering nine years, this article examines recent CT spending increases. Critically, the authors explore whether recent public safety expenditures can measurably reduce the number of domestic and international terrorist attacks. The implications of their findings should be salient for policy-makers’ assessments of their countries’ current CT strategies and policies concerning their respective Intelligence and Security Communities.  相似文献   
409.
高保真超宽带TEM喇叭的分析与设计   总被引:1,自引:1,他引:1       下载免费PDF全文
本文讨论了波形保真的TEM嗽叭分析和设计问题.本文提出了两个新论点:1)嗽叭的开口端阻抗不能看作真空波阻抗,它与嗽叭尺寸、张角有关;2)冲激脉冲有时序性能,反射只与局部结构有关,因此,波形保真嗽叭不同于普通的宽带嗽叭.本文按此思想设计了一个宽张角圆锥TEN嗽叭,实验表明波形保真良好.  相似文献   
410.
针对FMS具有加工柔性和加工线路柔性的特点,提出了FMS任务可靠性框图模型的二种建模方法(并联形式的建模方法、贮备形式的建模方法(冷贮备、热贮备))以及模型的简化方法。本文的目的在于为分析、评估FMS可靠性提供理论依据。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号