全文获取类型
收费全文 | 764篇 |
免费 | 116篇 |
国内免费 | 61篇 |
出版年
2023年 | 3篇 |
2022年 | 5篇 |
2021年 | 16篇 |
2020年 | 20篇 |
2019年 | 15篇 |
2018年 | 12篇 |
2017年 | 41篇 |
2016年 | 29篇 |
2015年 | 17篇 |
2014年 | 72篇 |
2013年 | 61篇 |
2012年 | 54篇 |
2011年 | 76篇 |
2010年 | 48篇 |
2009年 | 60篇 |
2008年 | 63篇 |
2007年 | 55篇 |
2006年 | 51篇 |
2005年 | 57篇 |
2004年 | 34篇 |
2003年 | 37篇 |
2002年 | 24篇 |
2001年 | 23篇 |
2000年 | 16篇 |
1999年 | 13篇 |
1998年 | 5篇 |
1997年 | 4篇 |
1996年 | 2篇 |
1995年 | 6篇 |
1994年 | 2篇 |
1993年 | 4篇 |
1992年 | 4篇 |
1991年 | 1篇 |
1990年 | 7篇 |
1989年 | 4篇 |
排序方式: 共有941条查询结果,搜索用时 15 毫秒
31.
探讨了无人飞行器(UAV)编队的任务分配问题。任务分配是UAV协同控制的基础,其解是任务区域内各任务的一个排列。求解UAV任务分配问题的有效方法是能在合理的计算时间内找到近似最优解的启发式算法。用对称群描述UAV任务分配的搜索空间,基于右乘运算构造搜索邻域。仿真结果验证了群论禁忌搜索算法的有效性。 相似文献
32.
分析了RSA和DES的算法优点和安全弱点,设计了一个新的密码算法方案。该方案以类FEISTEL结构为基础增强了左右两半部分结构的安全设计,利用了RSA进行密钥分配,并以序列密码算法的生成原理改变了固定密钥的缺点。该新方案具有一次一密的特点,给破译者获得大量的明密文对造成了很大的困难,可较好地抵抗差分分析与线性分析,是一种安全性较强的加密方案。 相似文献
33.
34.
35.
针对花朵授粉算法易陷入局部极值、收敛速度慢等不足,提出一种具有族群机制的花朵授粉算法。该算法把种群分成多个族群,各族群的最优个体再组成新的种群,进而促进种群间的信息交流,有效地协调种群进化过程中的全局搜索和局部搜索能力,避免个体的早熟收敛,提高算法的全局寻优能力及收敛速度。通过8个CEC2005benchmark测试函数进行测试比较,仿真结果表明,改进算法的寻优性能明显优于基本的花朵授粉算法、粒子群算法和蝙蝠算法,其收敛精度、收敛速度、鲁棒性均较对比算法有较大提高。 相似文献
36.
37.
Jordan Becker 《Defense & Security Analysis》2017,33(2):131-157
While recent work has attempted to update the research agenda for transatiantic defense burden-sharing, there remain significant gaps between the public choice defense economics literature and the security studies literature. The presence of such a gap is unfortunate, because defense spending choices are likely shaped by factors identified by the public choice literature, as well as the strategic and cultural variables that the security studies literature tends to focus on, as well as domestic macroeconomic factors. The independent variables identified in recent qualitative literature are extremely useful analytically, and, fortunately, they have reasonable proxies in available quantitative data, which enables scholars to study them across large groups of countries and many years. This article builds upon such work to synthesize the most notable of the factors identified in the current literature, and offers some common analytical ground that will benefit both scholars and practitioners.. 相似文献
38.
Kenton White 《Defence Studies》2017,17(4):346-358
The use of commercial business management techniques is widespread in all government departments, including the Ministry of Defence. This article examines the use of popular management techniques in the Armed Forces and argues that their application is misplaced. It looks at what the “effs” – “efficiency” and “effectiveness” – mean in the business world and to the Armed Forces. It compares the definitions both in business and the Armed Forces and finds that there are few, if any, situations where the same measurements can be applied. Whilst many management techniques are suited for business, the function of the Armed Forces and its output cannot be measured in the same way, complicated by the different metrics of “efficiency” in peace and in war. This difference may not be clearly understood by some politicians, or indeed by some senior military personnel. Using examples from some of the most popular management techniques such as “Lean” and “Agile” it is possible to see that their use might actually diminish the capabilities of the Armed Forces when it comes to performing their principal role – the use of force to achieve political objectives. 相似文献
39.
40.