全文获取类型
收费全文 | 268篇 |
免费 | 107篇 |
国内免费 | 18篇 |
出版年
2024年 | 2篇 |
2023年 | 3篇 |
2022年 | 7篇 |
2021年 | 6篇 |
2020年 | 9篇 |
2019年 | 4篇 |
2018年 | 14篇 |
2017年 | 16篇 |
2016年 | 33篇 |
2015年 | 15篇 |
2014年 | 33篇 |
2013年 | 27篇 |
2012年 | 30篇 |
2011年 | 30篇 |
2010年 | 15篇 |
2009年 | 17篇 |
2008年 | 21篇 |
2007年 | 18篇 |
2006年 | 14篇 |
2005年 | 16篇 |
2004年 | 9篇 |
2003年 | 4篇 |
2002年 | 4篇 |
2001年 | 2篇 |
2000年 | 7篇 |
1999年 | 6篇 |
1998年 | 10篇 |
1997年 | 6篇 |
1996年 | 5篇 |
1995年 | 3篇 |
1994年 | 1篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1990年 | 2篇 |
排序方式: 共有393条查询结果,搜索用时 531 毫秒
101.
为增强复杂电磁环境中同时收发认知抗干扰通信系统的性能,研究了基于该系统的改进能量检测算法,推导出瑞利衰落信道中系统的检测概率、虚警概率及中断概率的理论表达式。该改进方法思想是将自干扰信道容量与接收机所需传输速率进行比较,通过比较结果确定能量检测门限值。仿真结果表明,改进能量检测算法能够有效地降低自干扰信号对同时收发认知抗干扰接收机的不利影响,提升系统的中断性能。 相似文献
102.
103.
Stephen J. Cimbala 《Defense & Security Analysis》2017,33(3):193-208
Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities. 相似文献
104.
Namrata Panwar 《Small Wars & Insurgencies》2017,28(6):973-995
Despite the prevalence of violent uprisings against the states, existing literature has produced a generalized explanation of the causes and onset of such uprisings ignoring crucial aspects of (non-state) armed group cohesion, such as their capabilities to manage intra-group tensions and rivalries. In this paper, I examine recent research in the field of civil conflict to understand the importance of investigating underlying constraints which can cause serious impediments to the capabilities of a state during the course of a war. The paper then focuses on the importance of internal strategic resources, such as pre-war and wartime sociopolitical networks in which insurgents mobilize, recruit new cadres and maintain intra-group cooperation, to suggest how it can contain the consequences of counterinsurgency operations and other state strategies on the internal cohesion of an insurgent group. A detailed case study of the Mizo National Front (MNF) in India demonstrates the argument’s plausibility. 相似文献
105.
106.
Henry Prunckun 《Defense & Security Analysis》2014,30(2):176-184
Covert operations by underground groups, such as transnational terrorists, are not new and neither are the methods members of these groups use to communicate in their shadowy world. In this regard, one of the enduring myths is that the main means these covert operatives use to communicate within their cell structure are telephones and emails in their various manifestations. This article critically discusses the possible use of wireless transmissions by transnational terrorists as a reliable form of communications. To critically discuss this proposition, a force field analysis was used to assess the theory that radio is a viable option. Implications of this study's findings are considered in terms of the ramifications they have for defence and security policy. 相似文献
107.
108.
功耗与延迟是无线传感器网络介质访问控制协议设计首要考虑的两个问题。提出了一种新的传感器网络低延迟、低功耗、接收节点初始化异步介质访问控制协议——THO-MAC协议。通过准确预测接收节点的唤醒时间,THO-MAC协议调度发送节点侦听信道,从而减少发送节点空闲侦听能量浪费。THOMAC协议在发送节点两跳转发节点集中选择使报文两跳转发延迟最小的转发节点,从而降低报文传输延迟。使用NS2模拟器对THO-MAC协议进行了详细模拟。模拟结果显示,与RI-MAC和Any-MAC协议相比,THOMAC协议可以减少35.5%和18%的报文传输延迟,同时节省23.5%和15.5%的节点功耗。 相似文献
109.
针对高度动态变化的卫星网络,提出一种基于动态拓扑图的可视化方法。动态拓扑图可视化的难点在于如何保持动态可视化过程中的稳定性,从而使用户容易地感知到网络中所发生的拓扑变化。根据卫星网络的动态变化特点,构建连续的动态拓扑图模型;设计一种保持布局稳定性的策略,并基于力引导思想提出一种动态拓扑图布局算法;以Iridium系统为典型实例,验证本文的可视化方法的合理性和可行性。实验表明,该方法能够以清晰的可视化图像支持用户对卫星网络动态拓扑的感知和理解。 相似文献
110.