全文获取类型
收费全文 | 5423篇 |
免费 | 196篇 |
国内免费 | 93篇 |
专业分类
管理学 | 367篇 |
劳动科学 | 1篇 |
民族学 | 48篇 |
人才学 | 2篇 |
人口学 | 31篇 |
丛书文集 | 575篇 |
理论方法论 | 196篇 |
综合类 | 3613篇 |
社会学 | 845篇 |
统计学 | 34篇 |
出版年
2024年 | 9篇 |
2023年 | 69篇 |
2022年 | 76篇 |
2021年 | 74篇 |
2020年 | 115篇 |
2019年 | 113篇 |
2018年 | 127篇 |
2017年 | 110篇 |
2016年 | 126篇 |
2015年 | 131篇 |
2014年 | 304篇 |
2013年 | 368篇 |
2012年 | 356篇 |
2011年 | 385篇 |
2010年 | 331篇 |
2009年 | 335篇 |
2008年 | 303篇 |
2007年 | 389篇 |
2006年 | 390篇 |
2005年 | 332篇 |
2004年 | 272篇 |
2003年 | 283篇 |
2002年 | 187篇 |
2001年 | 171篇 |
2000年 | 103篇 |
1999年 | 43篇 |
1998年 | 34篇 |
1997年 | 19篇 |
1996年 | 39篇 |
1995年 | 26篇 |
1994年 | 22篇 |
1993年 | 15篇 |
1992年 | 18篇 |
1991年 | 8篇 |
1990年 | 6篇 |
1989年 | 7篇 |
1988年 | 9篇 |
1987年 | 2篇 |
1986年 | 4篇 |
1983年 | 1篇 |
排序方式: 共有5712条查询结果,搜索用时 328 毫秒
71.
提出了由于信息化社会、Internet、Intranet和多媒体技术的出现,从而要求卫星通信向多体制、多功能发展。文中着重分析了具有独特优点的激光通信在宽带卫星通信和星际链路中的现实商用前景。 相似文献
72.
对自由空间激光通信光束自动捕获、跟踪、瞄准(ATP)系统的结构与系统主要技术指标进行了分析和讨论。通过对其中典型系统的介绍,进一步描述了ATP技术的最新进展,论证了空间激光通信的可行性。 相似文献
73.
空间光通信ATP系统设计分析 总被引:2,自引:0,他引:2
空间光束捕获、跟踪、瞄准(ATP)技术在空间光通信中具有重要地位。文中讨论了空间光通信系统中的ATP伺服系统的结构,并对系统稳态设计和系统动态综合等关键问题进行了详细的分析和研究。 相似文献
74.
自由空间激光通信技术研究关键的步骤之一是通过其地面实验演示系统研究各项关键技术和整体优化技术,并验证它们的性能。文中描述了该地面实验演示系统的一个关键分系统—捕获、跟踪、瞄准(ATP)系统的设计、预期达到的性能和未来升级的设想。 相似文献
75.
何毅 《电子科技大学学报(社会科学版)》1998,(5)
针对卫星间光通信链路需求,分析了卫星间激光通信系统关键技术分布。介绍具有自动跟瞄功能的激光通信系统光学天线构成方式,对主要性能参数进行了设计和计算。 相似文献
76.
对半导体激光器进行光学准直是空间光通信系统必须进行的重要工作。文中简述了准直通常使用的方法,测试了使用单透镜对一种35mW半导体激光器的准直结果,准直效率约为60%,准直后的发射角为04~075mrad。 相似文献
77.
战术移动通信网的网络拓扑结构随战场环境的变化而变化,为此网络拓扑结构具有重组的能力,网络拓扑重组后必须进行链路频道的重新分配,文中提出的频道分配技术是在避免同频道干扰条件下任一频道可在全网内多次重复使用,以提高频道的重复利用率,同时分析了该情况下网络至少应拥有的频道数,以保证网络有足够的频道供分配。 相似文献
78.
Quantitative Estimates of Risk for Noncancer Endpoints 总被引:2,自引:0,他引:2
While quantitative estimates of risk have been a standard practice in cancer risk assessment for many years, no similar practice is evident in noncancer risk assessment. We use two recent examples involving methylmercury and arsenic to illustrate the negative impact of this discrepancy on risk communication and cost-benefit analysis. We argue for a more balanced treatment of cancer and noncancer risks and suggest an approach for reaching this goal. 相似文献
79.
In the history of warfare, there are a number of examples of strategic uses of asymmetric technologies. Consistent with history and theory, individuals, organizations and nations have spotted opportunities to employ information and communications technologies to gain and exploit asymmetric advantages and to counter asymmetric weaknesses. This article discusses various asymmetries associated with institutions, nations and organizations that influence the ICT-national security nexus. Regulative, normative and cognitive institutions in a country provide various mechanisms that affect the nature of positive and negative asymmetries. Nations and organizations also differ in terms of their capability to assimilate ICT tools to gain positive asymmetries and deal with vulnerabilities of negative asymmetries. Integrative approaches that combine policy and technological measures at various levels are likely to make the world more secure. 相似文献
80.
Katherine A. McComas 《Risk analysis》2003,23(6):1257-1270
This article offers longitudinal data tracking people who did and did not attend a series of public meetings in an upstate New York rural community grappling with the expansion of an existing solid waste landfill and remediation of an adjacent inactive hazardous waste site. Before and after the public meetings, mailed questionnaires measured risk perceptions and perceived credibility of risk managers (here, the state government agencies and the responsible industry) conducting the meetings. Respondents at each measurement point included meeting attendees and nonattendees, with some fluctuation over time when attendees at one measurement point were nonattendees at the next and vice versa. The results from the first survey indicate that following the first two public meetings, attendees perceived greater risks from the waste sites than did nonattendees; attendees also perceived the risk managers as less credible. After the third public meeting, the results showed that attendees' risk perceptions remained steady; however, perceptions of government agency credibility significantly decreased. After the fourth public meeting, the survey found that attendees' risk perceptions were again not significantly different, whereas perceptions of government agency credibility increased significantly. The industry's credibility also increased, though only among attendees who had attended the most recent public meeting, not among attendees who had attended both the third and fourth public meetings. For nonattendees, risk perceptions and credibility ratings did not change. The discussion examines how distinctive characteristics of communication at each public meeting may have resulted in different effects and proposes hypotheses for future research. 相似文献