全文获取类型
收费全文 | 241篇 |
免费 | 96篇 |
国内免费 | 12篇 |
出版年
2023年 | 1篇 |
2022年 | 6篇 |
2021年 | 3篇 |
2020年 | 4篇 |
2019年 | 15篇 |
2018年 | 13篇 |
2017年 | 24篇 |
2016年 | 32篇 |
2015年 | 16篇 |
2014年 | 22篇 |
2013年 | 28篇 |
2012年 | 18篇 |
2011年 | 16篇 |
2010年 | 12篇 |
2009年 | 17篇 |
2008年 | 13篇 |
2007年 | 15篇 |
2006年 | 8篇 |
2005年 | 12篇 |
2004年 | 11篇 |
2003年 | 5篇 |
2002年 | 6篇 |
2001年 | 8篇 |
2000年 | 5篇 |
1999年 | 5篇 |
1998年 | 5篇 |
1997年 | 7篇 |
1996年 | 4篇 |
1995年 | 1篇 |
1994年 | 5篇 |
1993年 | 1篇 |
1992年 | 1篇 |
1991年 | 5篇 |
1990年 | 2篇 |
1989年 | 3篇 |
排序方式: 共有349条查询结果,搜索用时 15 毫秒
31.
针对组网雷达系统在跟踪目标发生机动时采用自适应滤波来估计目标状态的特点,在点迹融合数据处理结构的组网雷达基础上提出了一种欺骗干扰优化策略.根据状态和量测方程描述了组网雷达跟踪目标的模型,同时建立了跟踪机动目标的自适应滤波模型.在此基础上,建立了欺骗干扰模型,并在目标机动检测约束下,推导了虚假目标欺骗干扰对于组网雷达融合... 相似文献
32.
Majak D’Agoôt 《Small Wars & Insurgencies》2013,24(3):679-702
ABSTRACTWhen on the wrong end of an asymmetry in the projection of hard power, weaker sides countenance the grim arithmetic of avoiding direct and massed confrontations. Invariably, insurgents have over the ages tended to employ indirect tactical methods to render their stronger opponents ineffective. Ultimately – interest asymmetry, regime type, asymmetries of strategy, and external intervention – combine in a complex interplay and pattern, to militate against a strong side. In Sudan, these factors interacted throughout the civil wars to produce regional autonomy and finally an independent South Sudan in 2011. Similar strategic logic had confronted many large African states battling insurgencies in Ethiopia, Angola, Nigeria, Zaire, and apartheid-era South Africa. Oftentimes, weakening public resolve has caused these governments to accommodate, capitulate or withdraw even if they try not to blink. Notwithstanding the regime type, it can be concluded that the majority of strong actors are prone to fail in a protracted, asymmetric conflict. Hence, the notion of linking victory in counterinsurgency to the degree of openness (democratic polyarchies); or closeness (totalitarianism) – is still valid but highly contestable in the case of Africa’s large dysfunctional states. 相似文献
33.
Thomas I. Parks 《Small Wars & Insurgencies》2013,24(1):185-202
While separatist-related conflict has re-emerged in southern Thailand, there is one predominantly Muslim border province that has remained outside of the conflict. Satun province has been conspicuously unaffected by the Malay-Muslim separatist movement, despite its shared history and ethnic origins with the conflict-affected provinces. In contrast to Pattani, Yala, and Narathiwat, the process of state penetration in Satun was gradual and comparatively less coercive, leading to relative stability and encouraging political and economic integration. This comparative study analyzes the history of cooperative state–minority relations and political stability in Satun province, and draws important lessons directly applicable to the unrest in neighbouring provinces. 相似文献
34.
黄红梅 《武警工程学院学报》2013,(6):28-31
提出了一种新的三粒子量子安全直接通信协议。通信过程利用decoy光子来检测窃听,保证信道安全。发送方将秘密消息编码在不同幺正操作上,通信双方通过Bell基和Z基测量可直接传递秘密消息。由于所有粒子都用于传输秘密消息,且传输一次可获得两比特信息,该协议具有较高的量子比特及量子密码协议效率;三粒子纠缠态的制备是已实现技术,该协议具有实际操作的意义。此外,该协议在量子信道中也是安全的。 相似文献
35.
36.
37.
Since the July 2009 Boko Haram terrorist outburst in Nigeria, there have been increasing questions on the phenomenon in the country. There has not been any substantial analysis on the emergence of the Boko Haram group and its terrorist activities in Nigeria as the out-rage continues. This study is advanced to explain the phenomenon of Boko Haram terrorism in Nigeria. It employs the levels of analysis framework popular in the field of international relations to explain the terrorism at three major levels: individual, state and international. The study relies on dependable news reports, which include interviews with key actors relevant to the subject matter, and finds that Boko Haram terrorism has its roots in the ideology and motivations of its founder and members, the failures and deficiencies of the Nigerian state, and the modern trend of religious terrorism in the international system. 相似文献
38.
Yair Evron 《The Nonproliferation Review》2013,20(3):377-390
The article presents and analyzes the US extended deterrence commitments in the Middle East as well as those provided by regional states, and assesses the effectiveness and credibility of these commitments. The article then proceeds to analyze a situation wherein Iran successfully develops nuclear weapons. It considers first the security requirements and alternatives of Gulf Cooperation Council (GCC) states, and then proceeds to assess the stability—or instability—of an Israeli-Iranian nuclear balance. The enhancement of US extended deterrence in the region is required in order to deter Iran, reassure allies, and contribute to the stability of an Israeli-Iranian nuclear balance. The article also discusses several contextual issues, such as: the future form of US extended deterrence; distinguishing between the latter and other US extended deterrence commitments; and the different approaches of specific GCC states and Israel. 相似文献
39.
Joshua Masters 《The Nonproliferation Review》2013,20(3):347-361
As the potential for the involvement of corporations in the manufacture of nuclear weapons has increased, particularly through dual-use technology, global regulation has failed to keep pace. Where regulation of private corporations does exist, in the form of treaties, UN resolutions, or more informal arrangements, the obligations fall only on states. This state of affairs is a result of international law's traditional deference to state sovereignty; yet, it has led to significant shortcomings in the global regulatory regime, where states are unwilling or unable to meet their obligations. While radical departures from the traditional model of international law might remove the regulatory gaps caused by noncompliant states, such changes are unrealistic in the current political climate. More realistic changes must be focused on, offering greater recognition of the role of private corporations in nuclear proliferation and increasing state compliance with existing regulation. 相似文献
40.
摘要:研究一类具有leakage时滞的离散型神经网络的状态估计问题.通过构造新的Lyapunov泛函得到保证估计误差全局渐近稳定的充分条件,并通过求解一个线性矩阵不等式(LMI)得到状态估计器的增益矩阵.采用一种新的时滞分割方法将变时滞区间分割为多个子区间,使该结果在获得更小的保守性同时也降低了计算的复杂度. 相似文献