全文获取类型
收费全文 | 319篇 |
免费 | 88篇 |
国内免费 | 17篇 |
出版年
2023年 | 2篇 |
2022年 | 5篇 |
2021年 | 7篇 |
2020年 | 4篇 |
2019年 | 8篇 |
2018年 | 5篇 |
2017年 | 17篇 |
2016年 | 22篇 |
2015年 | 9篇 |
2014年 | 27篇 |
2013年 | 18篇 |
2012年 | 9篇 |
2011年 | 21篇 |
2010年 | 14篇 |
2009年 | 26篇 |
2008年 | 25篇 |
2007年 | 24篇 |
2006年 | 23篇 |
2005年 | 21篇 |
2004年 | 17篇 |
2003年 | 11篇 |
2002年 | 18篇 |
2001年 | 23篇 |
2000年 | 15篇 |
1999年 | 11篇 |
1998年 | 7篇 |
1997年 | 8篇 |
1996年 | 7篇 |
1995年 | 3篇 |
1993年 | 2篇 |
1992年 | 3篇 |
1991年 | 3篇 |
1990年 | 4篇 |
1989年 | 2篇 |
1988年 | 2篇 |
1987年 | 1篇 |
排序方式: 共有424条查询结果,搜索用时 15 毫秒
111.
112.
Stephen J. Cimbala 《Defense & Security Analysis》2017,33(3):193-208
Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities. 相似文献
113.
In this article, we study how to derive bounds for the reliability and the expected lifetime of a coherent system with heterogeneous ordered components. These bounds can be used to compare the performance of the systems obtained by permuting the components at a given system structure, that is, to study where we should place the different components at a system structure to get the most reliable system. Moreover, a similar procedure is applied to get bounds for mixtures and for the generalized proportional hazard rate model when the baseline populations are ordered. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 108–116, 2017 相似文献
114.
Richard A.I. Johnson 《Defence and Peace Economics》2017,28(3):272-297
Arms transfers provide exporters an avenue to provide security to other states while gaining economic benefits. Arms transfers provide importers an avenue to gain security without having to rely on alliances. Past research uses aggregate measures of the monetary or security value of major weapon system transfers without accounting for strategic differences in possible use in interstate and civil conflict. This article presents a data set on interstate transfers of major weapon systems between 1950 and 2010 building upon Stockholm Peach Research Institute’s Arms Trade Register with several improvements. First, it disaggregates land weapons and air weapons into categories reflecting their strategic capabilities. Second, model level characteristics (e.g. age, speed, and range) are drawn from Jane’s Defence sources. Additionally, the data set covers a larger range of time and states than previous data sets categorizing arms. To demonstrate the usefulness, this article first presents summary statistics of the data set and then replicates an earlier test to show that the effect of human rights and regime types on United States transfers differs across the categories of arms compared to alternative measures of arms transfers. 相似文献
115.
针对群系统编队跟踪问题,提出一种满足线性二次型调节器性能指标的优化控制方法。建立编队跟踪问题的数学描述和设计编队跟踪控制协议。给出群系统实现编队跟踪的充要条件,借助李雅普诺夫第二方法分析系统的稳定性。得到了控制协议能够最小化线性二次型调节器性能指标的拓扑条件,设计了编〖BHDWG8,WK10YQ,DK1*2,WK1*2D〗〖XCWL.TIF;%129%129〗听语音 聊科研与作者互动 队跟踪算法。仿真实验验证了控制方法的有效性。 相似文献
116.
《防务技术》2022,18(10):1842-1851
In this study, the approximate and exact solutions for the stationary-state of the solids model with neglecting reactant consumption for both non-uniform and uniform temperature systems were applied on gas ignition under a constant pressure condition. The criticality conditions for a slab, an infinite cylinder, and a sphere are determined and discussed using dimensionless temperatures under constant ambient and surface temperatures for a non-uniform temperature system. Exact solution for a Semenov model with convection heat loss was also presented. The solution of the Semenov problem for constant volume or density as a solid and constant pressure were compared. The critical parameter δ is calculated and compared with those of Frank-Kamenetskii solution values. The validation of the calculated ignition temperatures with other exact solution and experimental results were offered. The relation between critical parameters form Semenov and F.K. models solution was introduced. 相似文献
117.
针对海军遂行多样化军事任务所面临的日益复杂的社会舆论环境,采用基于Agent的建模理论与方法,建立了舆情演化过程的模型,并对其进行了仿真和分析。首先,提出了个体间观点交互的规则,建立了个体观点交互的舆情演化模型。其次,基于所建模型对不同条件下的舆情演化及引导进行了仿真实验与分析。仿真结果表明,模型的统计结果与实际舆情演化情况相符,具有较强的实际性。 相似文献
118.
针对我海军遂行多样化军事任务所面临的日益复杂的社会舆论环境,采用基于Agent的建模理论与方法,建立了舆情演化过程的模型,并对其进行了仿真和分析。首先,提出了个体间观点交互的规则,建立了个体观点交互的舆情演化模型。其次,基于所建模型对不同条件下的舆情演化及引导进行了仿真实验与分析。仿真结果表明,模型的统计结果与实际舆情演化情况相符,具有较强的实际意义。 相似文献
119.
Some of the most active arms races are taking place between developed and less developed countries. The inability of less developed countries to compete financially, as well as technologically, with developed countries may be forcing the former to acquire terror weapons (TWP). The Iran–Iraq war in the 1980s and the events of 9/11 proved that the use of TWP is no longer a mere threat; there are several organizations and countries that will not hesitate to use them. This study develops a model of resource allocation in an arms race between a developed country that is characterized by state‐of‐the‐art technology and high GDP, and a less developed country whose technological capability and GDP are much lower. The model is used to predict the optimal mix of weapons of the two countries that are engaged in the arms race. Applying the model to the arms race between Israel and Syria demonstrates its use. 相似文献
120.
齐紫微 《军械工程学院学报》2013,(2):66-69
基于复杂网络理论,分析了信息化作战系统网络结构,构建了传统作战系统和信息化作战系统拓扑模型的生成算法,并通过对传统作战系统和信息化作战系统结构拓扑模型度量性质的比较,说明了信息化战争下的作战系统结构特点,为进一步研究网络化战争提供了良好的模型基础. 相似文献