全文获取类型
收费全文 | 196篇 |
免费 | 62篇 |
国内免费 | 11篇 |
出版年
2023年 | 1篇 |
2022年 | 3篇 |
2021年 | 6篇 |
2020年 | 3篇 |
2019年 | 6篇 |
2018年 | 2篇 |
2017年 | 15篇 |
2016年 | 15篇 |
2015年 | 8篇 |
2014年 | 19篇 |
2013年 | 13篇 |
2012年 | 7篇 |
2011年 | 12篇 |
2010年 | 10篇 |
2009年 | 16篇 |
2008年 | 14篇 |
2007年 | 12篇 |
2006年 | 11篇 |
2005年 | 12篇 |
2004年 | 13篇 |
2003年 | 7篇 |
2002年 | 8篇 |
2001年 | 8篇 |
2000年 | 10篇 |
1999年 | 5篇 |
1998年 | 3篇 |
1997年 | 3篇 |
1996年 | 7篇 |
1995年 | 3篇 |
1993年 | 2篇 |
1992年 | 3篇 |
1991年 | 3篇 |
1990年 | 4篇 |
1989年 | 2篇 |
1988年 | 2篇 |
1987年 | 1篇 |
排序方式: 共有269条查询结果,搜索用时 31 毫秒
41.
Martin Schönteich 《African Security Review》2013,22(2):39-51
After only ten years in existence, the African Union (AU) has already made its mark on the landscape of peace and security in Africa. This paper seeks to explore the relationship between the AU's leading collaborative interstate security policy, the African Peace and Security Architecture (APSA), and sustainable peace in the Horn of Africa. It examines four countries – Djibouti, Eritrea, Ethiopia, and Kenya – and how engaging with the APSA through early warning systems can contribute to developing the elements necessary for sustainable peace, namely regional stability, conflict management, and good governance. 相似文献
42.
A. Steven Dietz 《Small Wars & Insurgencies》2013,24(2):385-401
The current approach to countering the threat of improvised explosive devices (IEDs) in Afghanistan has met with limited success. The relative lack of success may be in part because the current approach is not holistic and discounts the social systems that foster the IEDs. Insurgents are using IEDs as a tool to further their strategic aims, but the coalition and to a lesser extent the Government of the Islamic Republic of Afghanistan (GIRoA) are attacking the IEDs as if they are an end in and of themselves. Combining network disruption with information change maximizes the opportunities for mitigating the IED threat. More specifically, to mitigate the IED threat requires disrupting the social and economic systems associated with IEDs, and at the same time providing alternative economic opportunities and improving rule of law and governance at the local level. In other words, counter-IED (C-IED) must be Counter-Insurgency (COIN) centric to be successful. This paper reviews the current state of C-IED efforts, identifies five main problems with the current approach, and suggests changes to reduce or mitigate the IED threat in Afghanistan. 相似文献
43.
44.
在剖析海军装备体系与体系技术概念的基础上,分析了海军装备体系技术的特点与作用,提出了海军装备体系技术的基本构成,为海军装备体系技术的应用研究提供理论指导。 相似文献
45.
46.
Magnetic resonance imaging and other multifunctional diagnostic facilities, which are considered as scarce resources of hospitals, typically provide services to patients with different medical needs. This article examines the admission policies during the appointment management of such facilities. We consider two categories of patients: regular patients who are scheduled in advance through an appointment system and emergency patients with randomly generated demands during the workday that must be served as soon as possible. According to the actual medical needs of patients, regular patients are segmented into multiple classes with different cancelation rates, no‐show probabilities, unit value contributions, and average service times. Management makes admission decisions on whether or not to accept a service request from a regular patient during the booking horizon to improve the overall value that could be generated during the workday. The decisions should be made by considering the cancelation and no‐show behavior of booked patients as well as the emergency patients that would have to be served because any overtime service would lead to higher costs. We studied the optimal admission decision using a continuous‐time discrete‐state dynamic programming model. Identifying an optimal policy for this discrete model is analytically intractable and numerically inefficient because the state is multidimensional and infinite. We propose to study a deterministic counterpart of the problem (i.e., the fluid control problem) and to develop a time‐based fluid policy that is shown to be asymptotically optimal for large‐scale problems. Furthermore, we propose to adopt a mixed fluid policy that is developed based on the information obtained from the fluid control problem. Numerical experiments demonstrate that this improved policy works effectively for small‐scale problems. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 287–304, 2016 相似文献
47.
48.
随着信息技术在战争中的大量应用,现代战争越来越呈现出网络化和体系对抗性,研究其拓扑特性已十分必要。基于复杂网络理论,首先建立了岸防作战体系网络模型,然后提出一种基于贪心思想的骨干网挖掘算法,最后对模型的骨干网络进行了研究。结果表明该方法能够快速、准确地挖掘出岸防作战体系的网络骨干,并能为军事对抗体系的复杂网络应用研究提供借鉴和参考。 相似文献
49.
针对防空导弹体系建模的复杂性,探讨研究防空导弹体系的Agent建模方法.提出了基于G/A矩阵的Agent建模方法步骤,通过分析角色之间的关系描述了Agent组织结构,给出了角色类和Agent类的统一定义,并建立了Agent结构框架和类实现模型,最后构建了基于FIPA规范的MAS综合集成框架.该方法的提出,为防空导弹体系的进一步建模提供了方法依据. 相似文献
50.
线性系统的鲁棒容错控制设计方法 总被引:1,自引:0,他引:1
考虑了线性故障系统的鲁棒容错控制问题。利用状态反馈特征结构配置参数化结果,提出了一种鲁棒容错控制设计方法。该方法将故障系统的鲁棒容错控制问题转化为含有约束的最小化问题。数值算例及其仿真结果验证了所设计方法的简单性和有效性。 相似文献