全文获取类型
收费全文 | 297篇 |
免费 | 102篇 |
国内免费 | 29篇 |
出版年
2024年 | 3篇 |
2023年 | 3篇 |
2022年 | 4篇 |
2021年 | 7篇 |
2020年 | 3篇 |
2019年 | 4篇 |
2018年 | 4篇 |
2017年 | 13篇 |
2016年 | 30篇 |
2015年 | 14篇 |
2014年 | 23篇 |
2013年 | 24篇 |
2012年 | 35篇 |
2011年 | 33篇 |
2010年 | 18篇 |
2009年 | 18篇 |
2008年 | 18篇 |
2007年 | 25篇 |
2006年 | 31篇 |
2005年 | 24篇 |
2004年 | 12篇 |
2003年 | 6篇 |
2002年 | 7篇 |
2001年 | 2篇 |
2000年 | 11篇 |
1999年 | 11篇 |
1998年 | 16篇 |
1997年 | 12篇 |
1996年 | 7篇 |
1995年 | 4篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1990年 | 2篇 |
排序方式: 共有428条查询结果,搜索用时 14 毫秒
61.
针对变速箱故障信号的非平稳和时变特性,提出了小波分析和神经网络结合的变速箱状态识别方法。为了验证该方法的有效性,试验模拟了某型车辆变速箱正常、7216轴承滚动体点蚀及3挡被动齿轮严重磨损3种状态,以箱体振动信号作为分析信号,首先对信号应用小波阈值法降噪减少干扰,接着将小波分解系数单子带重构得到不同频带的信号分量,提取各频带能量作为特征向量输人神经网络进行状态识别,结果表明该方法能有效识别变速箱的3种状态。 相似文献
62.
C2关系网络演化生成特性分析* 总被引:1,自引:0,他引:1
在网络中心作战背景下,为了探索"聚力前沿"(Power to the Edge)现实要求下的指挥控制(C2)关系动态演化规律,讨论了两种实元的加入策略模型:"信息最优加入"策略(BIMS)和"随机加入"策略(RMS):提出了信息资源利用率、信息资源命中率、信息传输有效率等三个指挥控制关系网络效能指标和一种加权评价方法.通过对仿真结果的分析,发现了BIMS策略下C2关系网络演化过程中存在的自组织、自适应现象,得出了BIMS策略下C2关系网络将具有无尺度网络特征这一结论.最后,比较了BIMS策略和RMS策略下的C2关系网效能和抗随机干扰能力,发现前者优于后者,而且BIMS策略下C2关系网具有逐渐优化的能力. 相似文献
63.
64.
Daniel Salisbury 《Defense & Security Analysis》2019,35(1):2-22
Illicit procurement networks often target industry in developed economies to acquire materials and components of use in WMD and military programs. These procurement networks are ultimately directed by elements of the proliferating state and utilize state resources to undertake their activities: diplomats and missions, state intelligence networks, and state-connected logistical assets. These state assets have also been utilized to facilitate the export of WMD and military technologies in breach of sanctions. While used in most historic proliferation cases, their role has seen limited consideration in the scholarly literature. This article seeks to systematically contextualize state resources in proliferation networks, arguing that their use lies between state criminality and routine activity in support of national security. Considering the competitive advantages of these assets compared to similar resources available in the private sector, the article argues that nonproliferation efforts have caused states to change how they use these resources through an ongoing process of competitive adaptation. 相似文献
65.
This paper investigates the relationship between military expenditure and FDI inflow conditioning on the exposure of a country to armed conflict in the long run. We apply the band spectrum regression estimator, and the maximal overlap discrete wavelet transform, to a panel of 60 developing countries, for the years 1990 to 2013. The estimated results indicate that military expenditure, in the absence of armed conflict, reduces FDI inflow. However, the negative effect is mitigated by increased military expenditure, in the presence of armed conflict. We also show that the effect of military expenditure on FDI is time sensitive, in that it takes time for military expenditure to affect FDI inflow. FDI inflow in response to higher military expenditure is higher for the country that faces higher armed conflict than the country that faces lower armed conflict. The findings are robust in the case of overall as well as internal conflict. These results are also robust to the alternative specification, subsample analysis with different armed conflict thresholds, and the estimation using the time variant long-run models. 相似文献
66.
67.
68.
MEMS陀螺由于结构不完善而存在较大的随机误差,为了推进MEMS陀螺的实用化水平、提高测量精度,首先对MEMS陀螺进行了Allan方差分析,得到了MEMS陀螺随机误差的主要成分;然后通过分析软阈值函数和硬阈值函数在直线上的降噪结果,得到了两种阈值函数的缺陷,为了解决软阈值和硬阈值函数的问题,推导了改进的小波阈值函数。通过对比各种阈值函数和阈值量化准则的降噪效果,确定了最终的降噪方案,将此方案应用在陀螺的动静态输出中,使陀螺输出数据的稳定性提高了一个数量级,数据的平均值也更加接近真实值。 相似文献
69.
70.
Fernando M. M. Ruiz Florent Hainaut Nathalie Schiffino 《Defence and Peace Economics》2016,27(6):774-793
Lobbyists may not share the same interests, but they usually agree to form a link in a network which could eventually be used to spread information, to search for potential partners, to speak with one voice to decision makers. In other words, social links represent value for lobbyists because they may ultimately facilitate access. In this article, we explore the network of the Security and Defense lobbies in the EU and we describe its structure. 相似文献