全文获取类型
收费全文 | 251篇 |
免费 | 71篇 |
国内免费 | 29篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2022年 | 6篇 |
2021年 | 7篇 |
2020年 | 5篇 |
2019年 | 5篇 |
2018年 | 6篇 |
2017年 | 17篇 |
2016年 | 21篇 |
2015年 | 11篇 |
2014年 | 20篇 |
2013年 | 21篇 |
2012年 | 34篇 |
2011年 | 22篇 |
2010年 | 15篇 |
2009年 | 23篇 |
2008年 | 11篇 |
2007年 | 9篇 |
2006年 | 20篇 |
2005年 | 18篇 |
2004年 | 13篇 |
2003年 | 11篇 |
2002年 | 8篇 |
2001年 | 2篇 |
2000年 | 8篇 |
1999年 | 5篇 |
1998年 | 3篇 |
1997年 | 5篇 |
1996年 | 3篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1993年 | 7篇 |
1992年 | 4篇 |
1991年 | 2篇 |
1990年 | 2篇 |
1989年 | 1篇 |
排序方式: 共有351条查询结果,搜索用时 15 毫秒
331.
332.
333.
334.
335.
针对飞行器跟踪预设轨迹的问题,提出非奇异快速终端滑模和角度约束的轨迹跟踪制导律。通过引入虚拟目标点,提出参考轨迹曲率半径的期望视线角约束条件,建立带有视线角约束并考虑自动驾驶仪动态特性的轨迹跟踪数学模型。为了保证在有限时间内跟踪预设轨迹并避免出现奇异问题,采用快速非奇异终端滑模和动态面控制方法进行制导律设计。推导出视线角误差和轨迹跟踪误差之间的数学关系,并利用Lyapunov稳定性准则证明轨迹跟踪误差最终有界任意小。与弹道成型轨迹跟踪制导律进行仿真对比,仿真结果表明所提出的制导律具有良好的跟踪性能及鲁棒性。 相似文献
336.
《防务技术》2020,16(4):811-824
For the automatic tracking of unknown moving targets on the ground, most of the commonly used methods involve circling above the target. With such a tracking mode, there is a moving laser spot on the target, which will bring trouble for cooperative manned helicopters. In this paper, we propose a new way of tracking, where an unmanned aerial vehicle (UAV) circles on one side of the tracked target. A circular path algorithm is developed for monitoring the relative position between the UAV and the target considering the real-time range and the bearing angle. This can determine the center of the new circular path if the predicted range between the UAV and the target does not meet the monitoring requirements. A transition path algorithm is presented for planning the transition path between circular paths that constrain the turning radius of the UAV. The transition path algorithm can generate waypoints that meet the flight ability. In this paper, we analyze the entire method and detail the scope of applications. We formulate an observation angle as an evaluation index. A series of simulations and evaluation index comparisons verify the effectiveness of the proposed algorithms. 相似文献
337.
338.
David J. Lonsdale 《Journal of Military Ethics》2020,19(1):20-39
ABSTRACT Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. The onset of this new instrument in national security has implications for conflict thresholds and military ethics. To serve as a legitimate tool of policy, cyber attack must operate in accordance with moral concerns. To test the viability of cyber attack, this paper provides a new perspective on cyber ethics. Cyber attack is tested against the criteria of the common good. This involves identifying the four core components of the common good from a conflict perspective: respect for the person; social wellbeing; peace and security; and solidarity. The fate of these components is assessed in relation to the six key characteristics of cyber attack from a moral standpoint: security; the role or absence of violence; discrimination; proportionality; cyberharm; and the threshold of conflict. It is concluded that the common good must be incorporated into developing state cyber strategies. 相似文献
339.
蔡建刚 《中国人民武装警察部队学院学报》2009,25(1):25-28
近年来,恐怖分子热衷于使用液体炸弹实施袭击,利用其制造简易、携带隐蔽、识别困难、现场配用等特点,逃避安全检查。液体炸药的有效识别和探测,成为各国安全部门亟待解决的问题。 相似文献
340.