全文获取类型
收费全文 | 506篇 |
免费 | 52篇 |
国内免费 | 12篇 |
出版年
2023年 | 3篇 |
2021年 | 13篇 |
2020年 | 8篇 |
2019年 | 30篇 |
2018年 | 29篇 |
2017年 | 34篇 |
2016年 | 35篇 |
2015年 | 17篇 |
2014年 | 51篇 |
2013年 | 98篇 |
2012年 | 12篇 |
2011年 | 26篇 |
2010年 | 35篇 |
2009年 | 28篇 |
2008年 | 33篇 |
2007年 | 22篇 |
2006年 | 20篇 |
2005年 | 22篇 |
2004年 | 16篇 |
2003年 | 15篇 |
2002年 | 7篇 |
2001年 | 3篇 |
2000年 | 3篇 |
1999年 | 1篇 |
1998年 | 1篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1995年 | 2篇 |
1994年 | 1篇 |
1993年 | 1篇 |
1991年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有570条查询结果,搜索用时 15 毫秒
131.
针对小波包自适应控制子频带内包含大量卷积和相关运算导致算法收敛速度慢的问题,提出基于Hartley块的小波包滤波最小均方算法。将快速Hartley变换引入块算法,实现频域内快速卷积和相关运算;在子频带内应用Hartley块算法生成控制信号,通过重叠保留法提出基于Hartley块的小波包滤波最小均方算法;通过仿真和实验研究了定频和扫频两种工况下的隔振性能和控制效果。结果表明,基于Hartley块的小波包滤波最小均方算法不仅可以大幅缩短收敛时间,还能显著提高控制精度,且鲁棒性和稳定性良好,能够很好地应用在工程实际中。 相似文献
132.
为了解决传统分层有向图模型在卫星地面站故障诊断面临的问题,提出了基于增强分层有向图模型的故障诊断方法。在建模过程中,考虑到卫星地面站故障征兆多、建模复杂,依据各设备工作状态的故障传播方式合并同类节点,以减小模型规模;同时,在模型中加入节点有效性使能函数,克服传统分层有向图模型中设备主备切换导致系统结构发生改变时需要重新建模的问题。在故障诊断推理过程中,采用反向回溯和正向推理相结合的方法减小故障源搜索空间,并基于各节点被搜索次数给出故障概率,提高诊断效率。以北斗卫星无线电测定业务地面站为例对单故障和多故障报警场景下的故障诊断方法进行了验证。结果表明,基于增强分层有向图模型的故障诊断方法可以提高故障诊断的准确率和全面性。 相似文献
133.
Pascal Vennesson 《战略研究杂志》2017,40(3):358-391
Critical security advocates commonly portray strategic studies as crippled by its narrow focus on Cold War-era military issues, as state-centric and as Western-centric. I argue that this conception of the scope of strategy is flawed and I offer a comprehensive rebuttal by working out the logic of the theories advanced by Carl von Clausewitz and Thomas Schelling. The proponents of critical security overlook the striking expansion of strategy during the Cold War, its longstanding inclusion of competing political actors not just states, as well as its capacity to put Western and non-Western actors in a common analytic frame. By breaking out of the conceptual jails in which strategy has been incarcerated, I seek to reconnect International Relations to strategic thought from which it has become increasingly estranged. 相似文献
134.
135.
136.
Hussein Solomon 《African Security Review》2017,26(1):62-76
Confronted with myriad security challenges, African states and the much-vaunted peace and security architecture of the African Union (AU) has proven not to be up to the challenge. Indeed, this is implicitly acknowledged by the AU itself if one considers the creation of such security structures as the African Mission in Somalia (AMISOM), which exists outside its peace and security architecture. This paper argues for a radical rethink of security structures on the African continent – one in which state structures of security coexist with newer forms of security actors, including private military companies (PMCs), community movements and the business sector. Whilst this shift in security actors is already happening on the ground, policymakers need to embrace this new reality. 相似文献
137.
Kenneth L. Lasoen 《战略研究杂志》2017,40(7):927-962
The terrorist attacks in France and Belgium of 2015–2016 that occurred while these countries were in a heightened state of alert raise questions about indications and warning methodology as well as effectiveness of the blanket-protection deployment of security services assisted even by the military. Response and perhaps even more anticipation may require strategic rethinking in light of the predatory attacks that target the most vulnerable spots of the public space. This study looks at threat analysis in Belgium as conducted through her intelligence fusion centre Coordination Unit for Threat Analysis (CUTA)?????? since its inception in 2006. With a special focus on what is known, at the time of writing, about the terrorist attacks in Paris and Brussels, this study hopes to put into context how the system (mal)functions and will also consider the preventive measures that respond to the threat, and the international aspects which have implications far beyond Belgian borders. Therefore, a case is made for not just a Belgian homeland security framework, but one that fits into an EU-wide security concept. 相似文献
138.
墨家思想就是中华传统文化和思想宝库中的重要代表,其倡导的"兼爱""非攻""备御""尚贤"等思想为后世所传承发展并借鉴利用。网络空间国际关系的协调和安全环境的治理,是当前国际上探索和研究的重点,我国应为其贡献中华民族的智慧,墨家思想的精髓可以为我们更好地认识网络空间发展规律、国际关系并维护好网络空间安全和平提供借鉴启示。 相似文献
139.
Linnéa Gelot 《Contemporary Security Policy》2017,38(1):161-173
This article explores how the protection of civilians is being militarized by African policymakers and diplomats. I draw on practice approaches to analyze what social groups are doing when they claim to “protect civilians.” I show how innovative protection mechanisms can be seen as a function of officials and diplomats coping with the changing circumstances of increasingly militarized politics in Africa. Specifically, accountability mechanisms for unintended and intended civilian harm by African security operations have originated in connection with this development. I argue that these are results of anchoring practices, which means that everyday informal interactions in one context become linked to another context. I argue that these emerging accountability mechanisms represent a new combination of practices, with the potential of changing the routine activities and mutual learning between policymakers and diplomats. 相似文献
140.
Toni Haastrup 《Contemporary Security Policy》2017,38(1):102-108
African security, particularly conflict-related political violence, is a key concern in international relations. This forum seeks to advance existing research agendas by addressing four key themes: domestic politics and peacekeeping; security sector reform programs; peace enforcement; and the protection of civilians. Each of the articles in this forum makes a case for analyzing African agency when it comes to African security. As a way of introduction, this short article sets out the main debates and concludes by providing further directions for future research. 相似文献