期刊文献+
共找到121篇文章
< 1 2 7 >
每页显示 20 50 100
The Mythological Battles Around the World The Images and Meanings of International Dragon-Slayers
1
作者 QiguangZhao 《天津外国语大学学报》 1996年第2期17-26,共10页
Dragons and dragon slayers belong to a system ofsemiology.They are images with messages.Differentcultures in the world have assigned to these imageshistorical limits,conditions of use,and introducedmultiple meanings i... Dragons and dragon slayers belong to a system ofsemiology.They are images with messages.Differentcultures in the world have assigned to these imageshistorical limits,conditions of use,and introducedmultiple meanings into them.Dragons do not exist,therefore dragon slayers do not either.However,they have become an artificial existence in most cul-tures,and this existence have passed from a closed,silent existence to an oral state,open to appropria-tion by society,for there is no regulation,either nat-ural or not,which forbids imagination.Few symbols saturate human civilization sobroadly and thoroughly as those of the dragon:proudly flicking its tail across the tapestries 展开更多
关键词 St The Mythological battles Around the World The Images and Meanings of International Dragon-Slayers
下载PDF
WeChat Battles Potential Charge
2
《ChinAfrica》 2013年第6期12-13,共2页
Whether or not Chinese over-the-top (OTT) content service WeChat, in Chinese, Weixin, should start charging users for its services has recently been the subject of heated debate.
关键词 WeChat battles Potential Charge
下载PDF
Fantastic Histories: The Battles of Coxinga and the Preservation of Ming in Japan
3
作者 Satoko SHIMAZAKI 《Frontiers of Literary Studies in China-Selected Publications from Chinese Universities》 2015年第1期17-53,共37页
People in Japan reacted to the bewilderment they felt at the fall of Ming by creating a bifurcated view of China, evident in encyclopedias and gazeteers: On the one hand, there was the traditional China represented b... People in Japan reacted to the bewilderment they felt at the fall of Ming by creating a bifurcated view of China, evident in encyclopedias and gazeteers: On the one hand, there was the traditional China represented by the Ming; on the other, there was the new China ruled by the Dattan or the Tatars. Such was the power of the Ming as an image that it endured in Japanese literature and theater for centuries after its fall. This article explores the preservation in popular discourse of the Ming as the most natural representation of China, focusing on Chikamatsu Monzaemon's hit jrruri play The Battles of Coxinga (Kokusen'ya kassen), first staged in 1715 and produced many times after that, showing how the political turmoil was filtered through both misunderstandings and creative fabrications. It shows that The Battles of Coxinga creates a fantastic image of China, as opposed to the barbaric Dattan, by drawing on historical memories internal to Japan and readily available images of foreignness. I argue that the preservation of the Ming in popular theater offered audiences a means of rethinking Japan's position as the inheritor of a "universal" Chinese essence in an age when knowledge of the world was being dramatically expanded by imported European cartography, complicating earlier views of a world centered on the Three Realms or the Sinocentric world order. 展开更多
关键词 fall of the Ming Chikamatsu Monzaemon The battles of Coxinga(Kokusen 'ya kassen) Nishikawa Joken Japanese views of China
原文传递
Egypt Battles to Save Its Endangered Tortoise
4
作者 Reim Bashir 陆小丫 《当代外语研究》 2000年第10期19-21,共3页
本文让我们认识了一种Egyptian Tortoise,其学名是Testudo Kleinmanni,是世界上最小的龟种之一。其生活环境险恶,并有“保护色”: It is found in both sandy and fairly rocky habitats(生活环境)and its lightbrown color blends(混和... 本文让我们认识了一种Egyptian Tortoise,其学名是Testudo Kleinmanni,是世界上最小的龟种之一。其生活环境险恶,并有“保护色”: It is found in both sandy and fairly rocky habitats(生活环境)and its lightbrown color blends(混和)in with the local soil color. 但是,这种保护色也许能帮助它们对付其他动物,然而,“保护色”却对付不了本应是它们朋友的人类!现在,Testudo Kleinmanni已被列为most endangeredtortoises。 本文透露的信息让我们略感欣慰:拯救Testudo Kleinmanni已经成了一个国际行动。 世界野生动物横遭“灭顶之灾”的原因似乎有其共同之处,值得我们深思: Overgrazing(过度放牧)and the expansion of agriculture and tourism threatentheir existence… 展开更多
关键词 过度放牧 Egypt battles to Save Its Endangered Tortoise
原文传递
Damage assessment of aircraft wing subjected to blast wave with finite element method and artificial neural network tool
5
作者 Meng-tao Zhang Yang Pei +1 位作者 Xin Yao Yu-xue Ge 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第7期203-219,共17页
Damage assessment of the wing under blast wave is essential to the vulnerability reduction design of aircraft. This paper introduces a critical relative distance prediction method of aircraft wing damage based on the ... Damage assessment of the wing under blast wave is essential to the vulnerability reduction design of aircraft. This paper introduces a critical relative distance prediction method of aircraft wing damage based on the back-propagation artificial neural network(BP-ANN), which is trained by finite element simulation results. Moreover, the finite element method(FEM) for wing blast damage simulation has been validated by ground explosion tests and further used for damage mode determination and damage characteristics analysis. The analysis results indicate that the wing is more likely to be damaged when the root is struck from vertical directions than others for a small charge. With the increase of TNT equivalent charge, the main damage mode of the wing gradually changes from the local skin tearing to overall structural deformation and the overpressure threshold of wing damage decreases rapidly. Compared to the FEM-based damage assessment, the BP-ANN-based method can predict the wing damage under a random blast wave with an average relative error of 4.78%. The proposed method and conclusions can be used as a reference for damage assessment under blast wave and low-vulnerability design of aircraft structures. 展开更多
关键词 VULNERABILITY Wing structural damage Blast wave Battle damage assessment Back-propagation artificial neural network
下载PDF
Battle Royale Optimization-Based Resource Scheduling Scheme for Cloud Computing Environment
6
作者 Lenin Babu Russeliah R.Adaline Suji D.Bright Anand 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3925-3938,共14页
Cloud computing(CC)is developing as a powerful and flexible computational structure for providing ubiquitous service to users.It receives interrelated software and hardware resources in an integrated manner distinct f... Cloud computing(CC)is developing as a powerful and flexible computational structure for providing ubiquitous service to users.It receives interrelated software and hardware resources in an integrated manner distinct from the classical computational environment.The variation of software and hardware resources were combined and composed as a resource pool.The software no more resided in the single hardware environment,it can be executed on the schedule of resource pools to optimize resource consumption.Optimizing energy consumption in CC environments is the question that allows utilizing several energy conservation approaches for effective resource allocation.This study introduces a Battle Royale Optimization-based Resource Scheduling Scheme for Cloud Computing Environment(BRORSS-CCE)technique.The presented BRORSS-CCE technique majorly schedules the available resources for maximum utilization and effectual makespan.In the BRORSS-CCE technique,the BRO is a population-based algorithm where all the individuals are denoted by a soldier/player who likes to go towards the optimal place and ultimate survival.The BRORSS-CCE technique can be employed to balance the load,distribute resources based on demand and assure services to all requests.The experimental validation of the BRORSS-CCE technique is tested under distinct aspects.The experimental outcomes indicated the enhancements of the BRORSS-CCE technique over other models. 展开更多
关键词 Cloud computing resource scheduling battle royale optimization MAKESPAN resource utilization
下载PDF
Battle Royale Optimization with Fuzzy Deep Learning for Arabic Sentiment Classification
7
作者 Manar Ahmed Hamza Hala J.Alshahrani +3 位作者 Jaber S.Alzahrani Heba Mohsen Mohamed I.Eldesouki Mohammed Rizwanullah 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期2619-2635,共17页
Aspect-Based Sentiment Analysis(ABSA)on Arabic corpus has become an active research topic in recent days.ABSA refers to a fine-grained Sentiment Analysis(SA)task that focuses on the extraction of the conferred aspects... Aspect-Based Sentiment Analysis(ABSA)on Arabic corpus has become an active research topic in recent days.ABSA refers to a fine-grained Sentiment Analysis(SA)task that focuses on the extraction of the conferred aspects and the identification of respective sentiment polarity from the provided text.Most of the prevailing Arabic ABSA techniques heavily depend upon dreary feature-engineering and pre-processing tasks and utilize external sources such as lexicons.In literature,concerning the Arabic language text analysis,the authors made use of regular Machine Learning(ML)techniques that rely on a group of rare sources and tools.These sources were used for processing and analyzing the Arabic language content like lexicons.However,an important challenge in this domain is the unavailability of sufficient and reliable resources.In this background,the current study introduces a new Battle Royale Optimization with Fuzzy Deep Learning for Arabic Aspect Based Sentiment Classification(BROFDL-AASC)technique.The aim of the presented BROFDL-AASC model is to detect and classify the sentiments in the Arabic language.In the presented BROFDL-AASC model,data pre-processing is performed at first to convert the input data into a useful format.Besides,the BROFDL-AASC model includes Discriminative Fuzzy-based Restricted Boltzmann Machine(DFRBM)model for the identification and categorization of sentiments.Furthermore,the BRO algorithm is exploited for optimal fine-tuning of the hyperparameters related to the FBRBM model.This scenario establishes the novelty of current study.The performance of the proposed BROFDL-AASC model was validated and the outcomes demonstrate the supremacy of BROFDL-AASC model over other existing models. 展开更多
关键词 Arabic corpus aspect based sentiment analysis arabic language deep learning battle royale optimization natural language processing
下载PDF
高分辨一维距离像的雷达目标识别方法 被引量:1
8
作者 樊萍 景占荣 《火力与指挥控制》 CSCD 北大核心 2008年第11期112-115,共4页
提出了一种基于高分辨一维距离像的宽带雷达目标识别方法。首先使用零相位描述对雷达回波进行预处理,实现距离像的绝对对准,解决了平移敏感性问题。然后根据多分辨分析构造出3次Battle-Lemarie小波函数和尺度函数,对预处理后的一维距离... 提出了一种基于高分辨一维距离像的宽带雷达目标识别方法。首先使用零相位描述对雷达回波进行预处理,实现距离像的绝对对准,解决了平移敏感性问题。然后根据多分辨分析构造出3次Battle-Lemarie小波函数和尺度函数,对预处理后的一维距离像进行小波变换提取目标特征矢量,在显著降低特征存储空间的同时保留了主要散射点。最后对3类不同目标的雷达实测数据进行识别试验,结果表明本算法不但具有较高的正确识别率,而且能够有效降低加性高斯白噪声对识别率的影响。 展开更多
关键词 目标识别 一维距离像 零相位描述 特征提取 Battle—Lemarie小波
下载PDF
Enterovirus B Sneaks into Victim Cells through Accomplice Receptors
9
作者 YAN Fusheng 《Bulletin of the Chinese Academy of Sciences》 2019年第2期96-100,共5页
“If you know both the enemy and yourself well, you need not to fear for the results of a hundred battles,” wrote Sun Tzu, a Chinese philosopher, in his famous the Art of War about 2,500 years ago. This is particular... “If you know both the enemy and yourself well, you need not to fear for the results of a hundred battles,” wrote Sun Tzu, a Chinese philosopher, in his famous the Art of War about 2,500 years ago. This is particularly true in the ever-lasting war against human viruses. Recently, a vital piece of information has been acquired concerning enteroviruses, which could cause many severe brain infections and even death in children. A recent study published in Cell unravels how these viruses sneak into cells with the help of accomplices from the host, opening a new window on developing drugs to specifically fight against them. 展开更多
关键词 results battles CHILDREN
下载PDF
Knowledge-oriented modeling for influencing factors of battle damage in military industrial logistics:An integrated method 被引量:2
10
作者 Xiong Li Xiao-dong Zhao Wei Pu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2020年第3期571-587,共17页
Modeling influencing factors of battle damage is one of essential works in implementing military industrial logistics simulation to explore battle damage laws knowledge.However,one of key challenges in designing the s... Modeling influencing factors of battle damage is one of essential works in implementing military industrial logistics simulation to explore battle damage laws knowledge.However,one of key challenges in designing the simulation system could be how to reasonably determine simulation model input and build a bridge to link battle damage model and battle damage laws knowledge.In this paper,we propose a novel knowledge-oriented modeling method for influencing factors of battle damage in military industrial logistics,integrating conceptual analysis,conceptual modeling,quantitative modeling and simulation implementation.We conceptualize influencing factors of battle damage by using the principle of hierarchical decomposition,thus classifying the related battle damage knowledge logically.Then,we construct the conceptual model of influencing factors of battle damage by using Entity-Relations hip approach,thus describing their interactions reasonably.Subsequently,we extract the important influencing factors by using social network analysis,thus evaluating their importance quantitatively and further clarifying the elements of simulation.Finally,we develop an agent-based military industry logistics simulation system by taking the modeling results on influencing factors of battle damage as simulation model input,and obtain simulation model output,i.e.,new battle damage laws knowledge,thus verifying feasibility and effectiveness of the proposed method.The results show that this method can be used to support human decision-making and action. 展开更多
关键词 Battle damage Industrial logistics Entity-relationship approach Social network analysis Agent-based simulation
下载PDF
Further Recognition of Interventional Medicine 被引量:3
11
作者 Lin-sun Li 《Journal of Interventional Medicine》 2018年第2期121-123,共3页
Subtle changes have occurred in China, and interventional radiology has gradually become an independent specialty, separated from diagnostic radiology. This has been called "Interventionalogy", "interve... Subtle changes have occurred in China, and interventional radiology has gradually become an independent specialty, separated from diagnostic radiology. This has been called "Interventionalogy", "interventional medicine(IM)", or simply Intervention by our team,and "Interventional Radiology" is used no more. It has even been given the name "Third clinical Medicine" by us. Chinese intervention has established an independent association for interventional doctors, as well as independent interventional societies in many provinces. The national interventional society will likely be set up at some point in time. Chinese interve ntion has set up their own clinical wards, with much attention paid to a clinical, professional, and normalized direction for development, and established special nursing units. According to us, turf battle is meaningless. "The Third clinical Medicine" belongs to all human beings. It could also be predicted that interventional history will follow the same evolutionary rule as other disciplines, i.e., "long divided, must unite; long united, must divide". 展开更多
关键词 INTERVENTIONAL RADIOLOGY INTERVENTIONAL MEDICINE third clinical MEDICINE independent DEPARTMENT of INTERVENTIONAL MEDICINE TURF BATTLE
下载PDF
Packet Drop Battling Mechanism for Energy Aware Detection in Wireless Networks 被引量:5
12
作者 Ahmad F.Subahi Youseef Alotaibi +1 位作者 Osamah Ibrahim Khalaf F.Ajesh 《Computers, Materials & Continua》 SCIE EI 2021年第2期2077-2086,共10页
Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks(WMANets).There are various routing attacks which harm Ad Hoc networks.This is because of the uns... Network security and energy consumption are deemed to be two important components of wireless and mobile ad hoc networks(WMANets).There are various routing attacks which harm Ad Hoc networks.This is because of the unsecure wireless communication,resource constrained capabilities and dynamic topology.In order to cope with these issues,Ad Hoc On-Demand Distance Vector(AODV)routing protocol can be used to remain the normal networks functionality and to adjust data transmission by defending the networks against black hole attacks.The proposed system,in this work,identifies the optimal route from sender to collector,prioritizing the number of jumps,the battery life,and security,which are fundamental prerequisites.Researches have proposed various plans for detecting the shortest route,as well as ensuring energy conversions and defense against threats and attacks.In this regard,the packet drop attack is one of the most destructive attack against WMANet communication and hence merits special attention.This type of attack may allow the attacker to take control of the attacked hubs,which may lost packets or transmitted information via a wrong route during the packets journey from a source hub to a target one.Hence,a new routing protocol method has been proposed in this study.It applies the concept of energy saving systems to conserve energy that is not required by the system.The proposed method for energy aware detection and prevention of packet drop attacks in mobile ad hoc networks is termed the Ad Hoc On-Demand and Distance Vector–Packet Drop Battling Mechanism(AODV–PDBM). 展开更多
关键词 Wireless and mobile ad hoc networks(WMANet) packet drop attack(PDA) ad hoc on-demand distance vector(AODV) dynamic source routing(DSR) packet drop battling mechanism(PDBM)
下载PDF
分布式自选举动态陈列蜜罐系统的设计与实现(英文) 被引量:1
13
作者 石乐义 李婕 +1 位作者 韩煦 贾春福 《China Communications》 SCIE CSCD 2011年第4期109-115,共7页
Traditional honeypot is in fact a "passive proactive" defense mechanism because it may lose the value entirely once the adversary has detected the existence of the static trap and bypassed it.Our work focuse... Traditional honeypot is in fact a "passive proactive" defense mechanism because it may lose the value entirely once the adversary has detected the existence of the static trap and bypassed it.Our work focuses on a Self-Election dynamic honeypot framework which aims to bewilder attackers by coordinating and switching roles periodically to form a huge dynamic puzzle.In this paper,we discuss the UDP Spokesman synchronization scheme and the Self-Election coordination method,perform the framework simulation of the dynamic array honeypot with NS2,carry out the prototype implementation by Java,and then validate the effectiveness and feasibility on the simulation and prototype system.The promising results of applying this framework to mitigate the effects of attacks are shown and analyzed.Our work demonstrates that the Self-Election dynamic array honeypot system is feasible and effective for proactive network confrontation. 展开更多
关键词 HONEYPOT network confrontation self-election battle diagram network simulation
下载PDF
Winning Probability Estimation Based on Improved Bradley-Terry Model and Bayesian Network for Aircraft Carrier Battle 被引量:1
14
作者 Yuhui Wang Wei Wang Qingxian Wu 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2017年第2期39-44,共6页
To provide a decision-making aid for aircraft carrier battle,the winning probability estimation based on Bradley-Terry model and Bayesian network is presented. Firstly,the armed forces units of aircraft carrier are cl... To provide a decision-making aid for aircraft carrier battle,the winning probability estimation based on Bradley-Terry model and Bayesian network is presented. Firstly,the armed forces units of aircraft carrier are classified into three types,which are aircraft,ship and submarine. Then,the attack ability value and defense ability value for each type of armed forces are estimated by using BP neural network,whose training results of sample data are consistent with the estimation results. Next,compared the assessment values through an improved Bradley-Terry model and constructed a Bayesian network to do the global assessment,the winning probabilities of both combat sides are obtained. Finally,the winning probability estimation for a navy battle is given to illustrate the validity of the proposed scheme. 展开更多
关键词 aircraft carrier battle BP neural network Bradley-Terry model Bayesian networks
下载PDF
Long-Term Poverty Reduction Strategies in China Post-2020 被引量:1
15
作者 黄征学 高国力 +3 位作者 滕飞 潘彪 宋建军 李爱民 《China Economist》 2020年第3期50-60,共11页
Poverty reduction is an eternal theme in the modernization drive of countries.After 2020,China’s poverty reduction endeavors will face new challenges and shift towards:(i)elevating poverty standards,(ii)placing equal... Poverty reduction is an eternal theme in the modernization drive of countries.After 2020,China’s poverty reduction endeavors will face new challenges and shift towards:(i)elevating poverty standards,(ii)placing equal emphasis on rural and urban poverty,(iii)preventing people in the deeply poor regions from slipping back to poverty,(iv)combining external assistance with endogenous development,and(v)enhancing social protection and targeted fiscal support for aiding the poor.Following the new trends of poverty reduction,policymakers should update their strategic approach,adopt new poverty reduction standards,target at a broader group of poor groups,promote pro-poor development,and improve poverty governance.Lastly,this paper puts forward the following policy recommendations for reducing poverty in China post-2020:(i)maintaining policy continuity and stability during the transition period;(ii)creating regular poverty relief mechanisms for urban and rural residents;(iii)improving the targeted identification and dynamic adjustment of target groups for poverty reduction;and(iv)reducing poverty through social protection and development. 展开更多
关键词 post-2020 POVERTY REDUCTION BATTLE against ABSOLUTE POVERTY POVERTY REDUCTION STRATEGIES urban and rural integration
下载PDF
Energy Consumption Patterns for Different Mobility Conditions in WSN 被引量:1
16
作者 Manjusha Pandey Shekhar Verma 《Wireless Sensor Network》 2011年第12期378-383,共6页
Wireless sensor networks are challenging networks regarding communication because of its resource constrained nature and dynamic network topology. Plenty of research has being going on throughout the world to optimize... Wireless sensor networks are challenging networks regarding communication because of its resource constrained nature and dynamic network topology. Plenty of research has being going on throughout the world to optimize communication cost and overhead due to it in the ad hoc networks, thus efforts are being made to make the communications more energy efficient. The application spectrum and use cases of wireless sensor networks includes many critical applications as environmental monitoring, to resource monitoring, to Industrial measurements, to public safety applications and last but not the least to sensitive applications as military sector applications .The erratic size of such networks and along with its exotic topology pose a magnificent set of challenges to the routing algorithms designed and implemented within such networks. The present work concentrates on the comparative analysis of some of reactive and proactive protocols used in the wireless sensor networks. The parameter for comparative analysis is the energy consumption for different simulation time and for different mobility conditions based scenario. 展开更多
关键词 Sensor Networks BATTLE Field Monitoring System AODV DYMO LANMAR OLSR
下载PDF
The Battle of The Sexes in James Thurber’s Works:Take The Unicorn in the Garden as an Example 被引量:1
17
作者 周颖 《海外英语》 2019年第14期198-199,共2页
From The Unicorn in the Garden to The Catbird Seat and two adaptations of Little Red Riding Hood,this thesis,mainly based on several famous works of Jame Thurber,by comparison and contrast,aims to analyze the battle o... From The Unicorn in the Garden to The Catbird Seat and two adaptations of Little Red Riding Hood,this thesis,mainly based on several famous works of Jame Thurber,by comparison and contrast,aims to analyze the battle of the sexes in James Thurber’s literary works. 展开更多
关键词 Thurber male female SEXES BATTLE
下载PDF
Dependability in Future Battle Network System —Transport Layer Ability to Maintain Quality of Service 被引量:1
18
作者 Veiko Dieves 《Wireless Sensor Network》 2016年第10期211-228,共18页
Modernization of armies is a constant process and is driven by intuitive fact that those who do not modernize will become extinct. In last five decades, the development of modern armies has taken place around Colonel ... Modernization of armies is a constant process and is driven by intuitive fact that those who do not modernize will become extinct. In last five decades, the development of modern armies has taken place around Colonel John Boyd’s theory of OODA loop that deals with information superiority. Building a robust, mobile and capable network that could provide for novel appliances and information superiority is the main challenge which modernizers are facing. Network, suitable for future combat operations, and able to transport a vast amount of information on a battlefield, is expensive to build. Every mistake in design and the need to correct those mistakes could halt development in an army for years. Therefore, system dependability analysis during system design phase is needed. In this report, the concept of a future Battle Network System is described. The Report evaluates operational environment of BNS and possible failure reasons of the service, and illustrates the change in BNS Quality of Service due to probable transport layer errors. This paper describes the method of testing the concept of proposed network systems on the drawing board, and emphasizes design points for a new system. Nevertheless, the proposed method is by no means conclusive. Rather, it describes an engineering approach to define the main problems while creating MANET-based networking systems. 展开更多
关键词 Combat Systems Network Battle Network System Transport Layer Quality of Service Dependability Evaluation MANET
下载PDF
Introduction to Military Medical Research
19
《Journal of Medical Colleges of PLA(China)》 CAS 2015年第1期3-3,共1页
Military Medical Research(MMR;ISSN 2095-7467,eISSN 2054-9369,CN 10-2094/R),an Open Access international journal,publishes cutting-edge findings on clinical research and basic medical sciences topics,with special focus... Military Medical Research(MMR;ISSN 2095-7467,eISSN 2054-9369,CN 10-2094/R),an Open Access international journal,publishes cutting-edge findings on clinical research and basic medical sciences topics,with special focus on military medicine related subjects.Article types included in MMR are:Editorial,Research Highlights,Perspective,Commentary Review,Original Article,Case Report。 展开更多
关键词 MILITARY cutting COMMITTED BATTLE advances PERSONNEL RADIOLOGICAL extreme environments SOLDIER
下载PDF
Introduction to Military Medical Research
20
《Journal of Medical Colleges of PLA(China)》 CAS 2014年第1期4-4,共1页
Military Medical Research(MMR;ISSN 2095-7467,elSSN 2054-9369,CN 10-2094/R),an Open Access international journal,publishes cuttirig-edge findings on clinical research and basic medical sciences topics,with special focu... Military Medical Research(MMR;ISSN 2095-7467,elSSN 2054-9369,CN 10-2094/R),an Open Access international journal,publishes cuttirig-edge findings on clinical research and basic medical sciences topics,with special focus on military medicine related subjects.Article types included in MMR are:Editorial,Research Highlights,Perspective,Commentary Review,Original Article,Case Report,Methodology Article,Clinical Image,and Letter to Editor. 展开更多
关键词 MILITARY BATTLE COMMITTED PERSONNEL RADIOLOGICAL e
下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部