首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   241篇
  免费   96篇
  国内免费   12篇
  2023年   1篇
  2022年   6篇
  2021年   3篇
  2020年   4篇
  2019年   15篇
  2018年   13篇
  2017年   24篇
  2016年   32篇
  2015年   16篇
  2014年   22篇
  2013年   28篇
  2012年   18篇
  2011年   16篇
  2010年   12篇
  2009年   17篇
  2008年   13篇
  2007年   15篇
  2006年   8篇
  2005年   12篇
  2004年   11篇
  2003年   5篇
  2002年   6篇
  2001年   8篇
  2000年   5篇
  1999年   5篇
  1998年   5篇
  1997年   7篇
  1996年   4篇
  1995年   1篇
  1994年   5篇
  1993年   1篇
  1992年   1篇
  1991年   5篇
  1990年   2篇
  1989年   3篇
排序方式: 共有349条查询结果,搜索用时 15 毫秒
31.
针对组网雷达系统在跟踪目标发生机动时采用自适应滤波来估计目标状态的特点,在点迹融合数据处理结构的组网雷达基础上提出了一种欺骗干扰优化策略.根据状态和量测方程描述了组网雷达跟踪目标的模型,同时建立了跟踪机动目标的自适应滤波模型.在此基础上,建立了欺骗干扰模型,并在目标机动检测约束下,推导了虚假目标欺骗干扰对于组网雷达融合...  相似文献   
32.
ABSTRACT

When on the wrong end of an asymmetry in the projection of hard power, weaker sides countenance the grim arithmetic of avoiding direct and massed confrontations. Invariably, insurgents have over the ages tended to employ indirect tactical methods to render their stronger opponents ineffective. Ultimately – interest asymmetry, regime type, asymmetries of strategy, and external intervention – combine in a complex interplay and pattern, to militate against a strong side. In Sudan, these factors interacted throughout the civil wars to produce regional autonomy and finally an independent South Sudan in 2011. Similar strategic logic had confronted many large African states battling insurgencies in Ethiopia, Angola, Nigeria, Zaire, and apartheid-era South Africa. Oftentimes, weakening public resolve has caused these governments to accommodate, capitulate or withdraw even if they try not to blink. Notwithstanding the regime type, it can be concluded that the majority of strong actors are prone to fail in a protracted, asymmetric conflict. Hence, the notion of linking victory in counterinsurgency to the degree of openness (democratic polyarchies); or closeness (totalitarianism) – is still valid but highly contestable in the case of Africa’s large dysfunctional states.  相似文献   
33.
While separatist-related conflict has re-emerged in southern Thailand, there is one predominantly Muslim border province that has remained outside of the conflict. Satun province has been conspicuously unaffected by the Malay-Muslim separatist movement, despite its shared history and ethnic origins with the conflict-affected provinces. In contrast to Pattani, Yala, and Narathiwat, the process of state penetration in Satun was gradual and comparatively less coercive, leading to relative stability and encouraging political and economic integration. This comparative study analyzes the history of cooperative state–minority relations and political stability in Satun province, and draws important lessons directly applicable to the unrest in neighbouring provinces.  相似文献   
34.
提出了一种新的三粒子量子安全直接通信协议。通信过程利用decoy光子来检测窃听,保证信道安全。发送方将秘密消息编码在不同幺正操作上,通信双方通过Bell基和Z基测量可直接传递秘密消息。由于所有粒子都用于传输秘密消息,且传输一次可获得两比特信息,该协议具有较高的量子比特及量子密码协议效率;三粒子纠缠态的制备是已实现技术,该协议具有实际操作的意义。此外,该协议在量子信道中也是安全的。  相似文献   
35.
基于零控脱靶量的思想,提出一种能够有效针对大气层再入目标的滑模末制导律.首先,建立纵向平面内的弹目相对运动方程;然后利用扩张状态观测器对目标机动加速度信息进行估计,并对零控脱靶量算法进行分析,提出了制导律的设计思路;接着利用滑模变结构控制理论进行制导律的推导;最后进行仿真分析,仿真结果证明,所设计的制导律能够很好地对目标弹进行拦截,并且指令的跟踪效果也很好,从而验证了算法的有效性.  相似文献   
36.
为克服动态逆控制严重依赖被控对象精确数学模型且鲁棒性较差的缺点,将动态逆与变结构方法相结合采用双环结构设计了空空导弹鲁棒动态逆控制律.将导弹飞行状态划分成快慢2个回路,慢回路(外环)采用变结构控制,并设计扩张状态观测器,对外环中的不确定性进行估计;快回路(内环)采用动态逆控制.仿真结果表明,所设计的控制律具有较好的动态特性和鲁棒性能.  相似文献   
37.
Since the July 2009 Boko Haram terrorist outburst in Nigeria, there have been increasing questions on the phenomenon in the country. There has not been any substantial analysis on the emergence of the Boko Haram group and its terrorist activities in Nigeria as the out-rage continues. This study is advanced to explain the phenomenon of Boko Haram terrorism in Nigeria. It employs the levels of analysis framework popular in the field of international relations to explain the terrorism at three major levels: individual, state and international. The study relies on dependable news reports, which include interviews with key actors relevant to the subject matter, and finds that Boko Haram terrorism has its roots in the ideology and motivations of its founder and members, the failures and deficiencies of the Nigerian state, and the modern trend of religious terrorism in the international system.  相似文献   
38.
The article presents and analyzes the US extended deterrence commitments in the Middle East as well as those provided by regional states, and assesses the effectiveness and credibility of these commitments. The article then proceeds to analyze a situation wherein Iran successfully develops nuclear weapons. It considers first the security requirements and alternatives of Gulf Cooperation Council (GCC) states, and then proceeds to assess the stability—or instability—of an Israeli-Iranian nuclear balance. The enhancement of US extended deterrence in the region is required in order to deter Iran, reassure allies, and contribute to the stability of an Israeli-Iranian nuclear balance. The article also discusses several contextual issues, such as: the future form of US extended deterrence; distinguishing between the latter and other US extended deterrence commitments; and the different approaches of specific GCC states and Israel.  相似文献   
39.
As the potential for the involvement of corporations in the manufacture of nuclear weapons has increased, particularly through dual-use technology, global regulation has failed to keep pace. Where regulation of private corporations does exist, in the form of treaties, UN resolutions, or more informal arrangements, the obligations fall only on states. This state of affairs is a result of international law's traditional deference to state sovereignty; yet, it has led to significant shortcomings in the global regulatory regime, where states are unwilling or unable to meet their obligations. While radical departures from the traditional model of international law might remove the regulatory gaps caused by noncompliant states, such changes are unrealistic in the current political climate. More realistic changes must be focused on, offering greater recognition of the role of private corporations in nuclear proliferation and increasing state compliance with existing regulation.  相似文献   
40.
摘要:研究一类具有leakage时滞的离散型神经网络的状态估计问题.通过构造新的Lyapunov泛函得到保证估计误差全局渐近稳定的充分条件,并通过求解一个线性矩阵不等式(LMI)得到状态估计器的增益矩阵.采用一种新的时滞分割方法将变时滞区间分割为多个子区间,使该结果在获得更小的保守性同时也降低了计算的复杂度.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号