全文获取类型
收费全文 | 258篇 |
免费 | 49篇 |
国内免费 | 13篇 |
出版年
2023年 | 1篇 |
2022年 | 8篇 |
2021年 | 8篇 |
2020年 | 14篇 |
2019年 | 13篇 |
2018年 | 23篇 |
2017年 | 25篇 |
2016年 | 32篇 |
2015年 | 13篇 |
2014年 | 20篇 |
2013年 | 49篇 |
2012年 | 25篇 |
2011年 | 12篇 |
2010年 | 8篇 |
2009年 | 8篇 |
2008年 | 13篇 |
2007年 | 10篇 |
2006年 | 10篇 |
2005年 | 6篇 |
2004年 | 4篇 |
2003年 | 3篇 |
2001年 | 4篇 |
2000年 | 1篇 |
1999年 | 2篇 |
1998年 | 1篇 |
1995年 | 2篇 |
1993年 | 3篇 |
1991年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有320条查询结果,搜索用时 15 毫秒
31.
通过对某型无坐力炮弹战斗部的结构分析和功能分析,以弹着目标不爆炸为顶事件建立了失效树,并根据该型弹药的功能构件在储存期间的特点选择了失效树的简化原则,建立了系统可靠度模型。确定了由储存因素导致弹着目标不爆炸这一事件的4种主要失效模式。并通过分析其不同的储存期失效机理和影响因素,提出该型炮弹的储存策略。 相似文献
32.
33.
基于模糊均值聚类算法的图像分割 总被引:2,自引:0,他引:2
将图像直方图统计特性引入到FCM聚类算法的目标函数中,用混合粒子群优化算法对目标函数进行全局最优求解,提高了图像分割的运算速度。 相似文献
34.
针对舰艇武器布置问题的特点,提出了一种基于粒子群优化和分类器系统的协同优化算法,以粒子群优化进行优化计算,用分类器系统消除约束.计算实例表明,该算法能较好地实现优化计算,并能节省大量的计算时间. 相似文献
35.
设计安全策略模型时应考虑安全策略的时序特性和灰色特性,还应综合考虑保密性、完整性和可用性三方面的需求。已有的安全模型没有描述时序性和灰色特性,而且一般只侧重描述保密性或完整性。为此,本文提出了动态灰色时序系统(简称DGTS)。本文详细描述了DGTS,以及基于DGTS的动态语义设计的灰色时序安全策略规范语言GTSL。 相似文献
36.
Philip G. Pugh 《Defence and Peace Economics》2013,24(1):25-37
This paper, intended to stimulate debate, suggests that we are at a turning point in the history of the UK military aerospace industry. It argues that there is urgent need for a fresh vision as to how the UK military aerospace industry can both prosper and make its maximum contribution to the defence of Britain. Further, the resulting plans and policies must emphasise the robustness of defence capabilities in a future in which the only thing we can be certain is that it will be very different from the present – especially whenever defence most matters. 相似文献
37.
Bryan R. Early 《The Nonproliferation Review》2013,20(2):259-280
The United Arab Emirates (UAE) has laid out an ambitious plan to become the first Arab country to possess a civilian nuclear energy program. Central to that effort has been the Emirati government's ability to obtain foreign nuclear assistance. This article traces the UAE's strategies for overcoming the obstacles that stood in the way of nuclear suppliers providing assistance. It examines the approach taken by the UAE to assuage the safety and security concerns of nuclear suppliers, how the UAE leveraged its alliances with France and the United States to obtain their cooperation, and its strategies for engaging domestic interest groups in supplier states. The generalizable elements of the UAE's strategies are discussed and used to provide insight into the prospects for other Middle Eastern states' bids to obtain similar assistance. The article concludes with a discussion of the potentially transformative aspects of the strategies employed by the UAE in shaping other countries' pursuit of nuclear energy in the region. 相似文献
38.
This article presents a proposed theory of how war economies are formed and maintained, as well as an integrated policy framework to guide the dismantling of war economies emanating from the proposed theory. Additionally, six potential areas for future research pertaining to the dismantling of war economies are also presented. 相似文献
39.
Doraval Govender 《African Security Review》2013,22(3):291-306
This article is about the management of security incidents in organisations and companies which are under the protection of private security personnel, whether in-house or contracted. Incidents can be defined as accidental or anecdotal (bird flies into a camera) to a violation of law or company policy. Managing security incidents is one of the key functions of a private security service provider. The purpose of this study is to explore the management of security incidents and the information related thereto, identify shortcomings and find solutions for managing these shortcomings. Interviews were used to gain insight from personnel within the private and government sectors which are served by the private security industry. It was found that security incidents are handled in a routine way by organisations from the different sectors. One major shortcoming is that security incidents and the information related thereto are not managed by security service providers according to an operational framework or model with the required infrastructure and resources. The significance of this study is for security incidents to be managed correctly, so that the information related thereto may be captured accurately, analysed and used proactively and reactively to improve physical protection systems, develop preventative strategies and provide actionable information products in order to reduce crime, increase detection rates and prevent losses. 相似文献
40.
John Siko 《African Security Review》2013,22(2):74-87
South Africa's military has, since the First World War, been an oft-used and effective tool in the conduct of South African foreign policy, but this role has not always translated into power for Defence Department principals in its formulation. South African Defence Ministers for most of the country's history have played a minor role in the making of foreign policy; despite a change in this dynamic between approximately 1975–1990, the post-apartheid era has once again seen a diminishment of Defence's power in this arena. This article examines why Defence Ministers have generally been such weak players, with an eye toward disaggregating whether this was a product of interpersonal relationships with Cabinet and – most importantly – the Head of State, or whether this influence (or lack thereof) was more a function of South Africa's international standing. While determining who has influence on this process is difficult given the primacy of the national leader in making foreign policy and a lack of insider accounts by participants in the process, this article relies upon several interviews with participants and knowledgeable observers that help illuminate the process and Defence's role in it. 相似文献