全文获取类型
收费全文 | 160篇 |
免费 | 69篇 |
国内免费 | 37篇 |
出版年
2022年 | 4篇 |
2021年 | 12篇 |
2020年 | 11篇 |
2019年 | 3篇 |
2018年 | 3篇 |
2017年 | 10篇 |
2016年 | 10篇 |
2015年 | 9篇 |
2014年 | 27篇 |
2013年 | 36篇 |
2012年 | 13篇 |
2011年 | 20篇 |
2010年 | 7篇 |
2009年 | 2篇 |
2008年 | 4篇 |
2007年 | 5篇 |
2006年 | 9篇 |
2005年 | 9篇 |
2004年 | 12篇 |
2003年 | 7篇 |
2002年 | 6篇 |
2001年 | 8篇 |
2000年 | 6篇 |
1999年 | 9篇 |
1998年 | 2篇 |
1997年 | 2篇 |
1996年 | 3篇 |
1995年 | 4篇 |
1993年 | 3篇 |
1992年 | 3篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1988年 | 1篇 |
1987年 | 2篇 |
排序方式: 共有266条查询结果,搜索用时 250 毫秒
251.
252.
Mai’a K. Davis Cross 《Contemporary Security Policy》2016,37(3):402-413
The new EU Global Strategy has significant implications for EU diplomacy, in terms of both goals and means. This article first analyses the timing of the strategy as an exercise in diplomacy in its own right. Second, it argues that the strategy outlines a more expansive and noticeably more smart power-oriented approach to diplomacy in practical terms. Finally, it notes that the strategy has a new meta-narrative for EU diplomacy, which seeks to project a blend of both realistic assessment and idealistic aspiration. 相似文献
253.
建立作战系统多Agent系统(Multi-Agent System,MAS)组织,必须首先建立由作战系统实际组元到Agent的映射。围绕作战系统MAS的建立,在提出由作战系统实际组元到Agent的映射过程与方法的基础上,提出了作战系统领域概念视图、作战行动域及其各层次概念、实际组元逻辑关系分析的基本方法,为实现基于多Agent的作战系统建模与仿真奠定基础。在基于多Agent的信息化战场多传感器仿真演示系统中,证明了该方法的可行性与有效性。 相似文献
254.
255.
当前,军队工程防护对象以地下工程和野战阵地为主,对于设施设备及军事活动以地表为主的机动式保障基地系统,其毁伤特点规律、防护威胁、评估方法及防护标准等尚无专门研究。本文介绍了机动式保障基地系统的基本概念、主要功能及构成要素,研究了近年来典型军事基地遇袭案例,采用案例分析与数据库研究相结合的方法,分析了机动式保障基地系统的主要威胁及其毁伤元和毁伤评估量,并提出机动式保障基地系统防护需求的构建原则和评估步骤。根据建立的原则和步骤,建立5级防护需求等级,以海外维和基地为例,分析了基地内各类保障装备的防护等级需求和防护等级设置的主要依据,为开展机动式保障基地系统防护体系研究打下基础。 相似文献
256.
257.
Maria Mälksoo 《Contemporary Security Policy》2016,37(3):374-388
Security strategies are important sites for narrating the EU into existence as a security actor. The unveiling of a new global strategy on foreign and security policy for the EU immediately post-Brexit could be conceived as a pledge to remain together as a Union for the purposes of contributing to global security in a particular way. This paper offers a brief stock-taking of the EU’s way of writing security from the European Security Strategy (2003) to the EU Global Strategy (2016). A concise exegesis of these documents exposes an interesting dynamic: as exercises in ordering the world, both strategic guidelines have turned out to be major exercises in ordering the self. The comparative snapshot shows the EU as increasingly anxious to prove its relevance for its own citizens, yet notably less confident about its actual convincingness as an ontological security framework for the EU’s constituent members over time. 相似文献
258.
259.
《防务技术》2020,16(2):334-340
In view of the failure of GNSS signals, this paper proposes an INS/GNSS integrated navigation method based on the recurrent neural network (RNN). This proposed method utilizes the calculation principle of INS and the memory function of the RNN to estimate the errors of the INS, thereby obtaining a continuous, reliable and high-precision navigation solution. The performance of the proposed method is firstly demonstrated using an INS/GNSS simulation environment. Subsequently, an experimental test on boat is also conducted to validate the performance of the method. The results show a promising application prospect for RNN in the field of positioning for INS/GNSS integrated navigation in the absence of GNSS signal, as it outperforms extreme learning machine (ELM) and EKF by approximately 30% and 60%, respectively. 相似文献
260.
Modeling and realization of real time electronic countermeasure simulation system based on SystemVue
《防务技术》2020,16(2):470-486
In this paper, we proposed a new design scheme of real time electronic countermeasure simulation system. This paper mainly expounds the modeling and realization methods of each part of the whole simulation system, and the real-time property of system has been lucubrated. Electronic countermeasure simulation system is the key part of military training of individuals; it can also allow the realistic evaluation of the performance of modern equipments and techniques. As a proof, we have drawn up a series of simulation scenarios, such as radar electronic reconnaissance simulation scenario, to explain the feasibility and the superiority of our modeling scheme in this paper. 相似文献