全文获取类型
收费全文 | 131篇 |
免费 | 12篇 |
国内免费 | 7篇 |
专业分类
电工技术 | 1篇 |
综合类 | 7篇 |
化学工业 | 1篇 |
金属工艺 | 1篇 |
建筑科学 | 1篇 |
矿业工程 | 1篇 |
轻工业 | 1篇 |
石油天然气 | 1篇 |
武器工业 | 13篇 |
无线电 | 27篇 |
一般工业技术 | 7篇 |
冶金工业 | 3篇 |
原子能技术 | 1篇 |
自动化技术 | 85篇 |
出版年
2022年 | 1篇 |
2021年 | 2篇 |
2020年 | 2篇 |
2019年 | 3篇 |
2018年 | 4篇 |
2017年 | 6篇 |
2016年 | 8篇 |
2015年 | 3篇 |
2014年 | 7篇 |
2013年 | 4篇 |
2012年 | 8篇 |
2011年 | 13篇 |
2010年 | 7篇 |
2009年 | 10篇 |
2008年 | 12篇 |
2007年 | 15篇 |
2006年 | 9篇 |
2005年 | 3篇 |
2004年 | 10篇 |
2003年 | 4篇 |
2002年 | 7篇 |
2001年 | 6篇 |
2000年 | 2篇 |
1996年 | 3篇 |
1983年 | 1篇 |
排序方式: 共有150条查询结果,搜索用时 46 毫秒
61.
李艇 《黄河水利职业技术学院学报》2012,24(1):92-96
严羽"断千百年公案"说使《沧浪诗话》成为历代诗论家关注的著作。"断千百年公案"一是要恢复汉魏以来千百年诗歌情景交融的光荣传统,二是发现了逻辑思维与形象思维的区别。在"断千百年公案"的旗帜下,严羽将禅理溶入诗论,提出"妙悟"与"熟参"一对概念,辨析了"妙悟"与形象思维和感情的联系,论证了"熟参"与"妙悟"的关系。其意义在于:抨击了宋代诗派"以文为诗""以理为诗"的流弊,为形象思维概念的产生提供了理论基础,提出了新的理论体系,并提出了一些新的范畴、命题。 相似文献
62.
介绍对空中目标进行排序的方法,其基本思想是首先构建威胁评估指标体系,对各指标进行量化处理,然后应用灰色关联度分析对空中威胁目标进行威胁评估与排序,找出影响战场态势的重要目标,以便合理正确地分配火力进行打击。通过实例来说明灰色关联分析在目标排序中的应用。 相似文献
63.
64.
In a sample of 170 youngsters, the effect of two versions of a public service announcement (PSA) threat appeal against speeding, placed in four different contexts, on evoked fear, perceived threat (severity and probability of occurrence), perceived response efficacy and self-efficacy, message involvement and anti-speeding attitude and anti-speeding intention is investigated. Evoked fear and perceived threat and efficacy independently influence message involvement. Message involvement is a full mediator between evoked fear, perceived threat and efficacy perception on the one hand, and attitudes towards the message and behavioral intention to accept the message on the other. Speeding experience has a significantly negative impact on anti-speeding attitudes. Message and medium context threat levels and context thematic congruency have a significant effect on evoked fear and to a lesser extent on perceived threat. 相似文献
65.
BZ28-2S油田位于渤海南部海域黄河口凹陷中央构造脊,是中海油2006年发现的浅层优质中型油田,石油地质储量4500×104m3,油田于2009年投产,年产180×104m3。油田产层为明下段,埋深主要在900~1600m,明下段为浅水三角洲沉积,储盖组合良好。BZ28-2S油田发现历程曲折,20世纪80年代曾因毗邻构造浅层勘探失利终止了勘探,直至2005年在评价邻区BZ34-1等油田过程中积累了浅层油气成藏模式的新认识,BZ28-2S油田才迟滞24年之后终被发现。在BZ28-2S油田评价过程中也进一步验证了油气运移断层、中转站成藏模式、油层强振幅等钻前认识。BZ28-2S油田的发现历程再次启示勘探人员在老区勘探要用新思路才能找到油气。 相似文献
66.
67.
The aim of this paper is to propose a threat assessment method based on intuitionistic fuzzy measurement reasoning with orientaion to deal with the shortcomings of the method proposed in [Ying-Jie Lei et al., Journal of Electronics and Information Technology 29(9)(2007)2077-2081] and [Dong-Feng Chen et al., Procedia Engineering 29(5)(2012)3302-3306] the ignorance of the influence of the intuitionistic index's orientation on the membership functions in the reasoning, which caused partial information loss in reasoning process. Therefore, we present a 3D expression of intuitionistic fuzzy similarity measurement, make an analysis of the constraints for intuitionistic fuzzy similarity measurement, and redefine the intuitionistic fuzzy similarity measurement. Moreover, in view of the threat assessment problem, we give the system variables of attribute function and assessment index, set up the reasoning system based on intuitionistic fuzzy similarity measurement with orientation, and design the reasoning rules, reasoning algorithms and fuzzy-resolving algorithms. Finally, through the threat assessment, some typical examples are cited to verify the validity and superiority of the method. 相似文献
68.
郑小苗 《盐城工业专科学校学报》2005,18(4):18-20
同案同判已成为人们判断司法是否公正的一个标准,人们不能容忍同案不同判的结果。从同案同判的意义、认定,以及同案不同判的解决机制入手,阐释同案同判的法理问题。 相似文献
69.
70.
The increasing complexity of information and telecommunications systems and networks is reaching a level beyond human ability, mainly from the security assessment viewpoint. Methodologies currently proposed for managing and assuring security requirements fall short of industrial and societal expectations. The statistics about vulnerabilities and attacks show that the security, reliability and availability objectives are not reached and that the general threat situation is getting worse. With the deployment of Next Generation Networks – NGNs, the complexity of networks, considering their architecture, speed and amount of connections, will increase exponentially. There are several proposals for the network and security architectures of NGNs, but current vulnerability, threat and risk analysis methods do not appear adequate to evaluate them. Appropriate analysis methods should have some additional new characteristics, mainly regarding their adaptation to the continuous evolution of the NGNs. In addition, the application of security countermeasures will require technological improvements, which will demand further security analyses. This paper evaluates the current vulnerability, threat and risk analysis methods from the point of view of the new security requirements of NGNs. Then, the paper proposes to use autonomic and self-adaptive systems/applications for assuring the security of NGNs. 相似文献