首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   258篇
  免费   49篇
  国内免费   13篇
  2023年   1篇
  2022年   8篇
  2021年   8篇
  2020年   14篇
  2019年   13篇
  2018年   23篇
  2017年   25篇
  2016年   32篇
  2015年   13篇
  2014年   20篇
  2013年   49篇
  2012年   25篇
  2011年   12篇
  2010年   8篇
  2009年   8篇
  2008年   13篇
  2007年   10篇
  2006年   10篇
  2005年   6篇
  2004年   4篇
  2003年   3篇
  2001年   4篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1995年   2篇
  1993年   3篇
  1991年   1篇
  1990年   1篇
排序方式: 共有320条查询结果,搜索用时 15 毫秒
31.
通过对某型无坐力炮弹战斗部的结构分析和功能分析,以弹着目标不爆炸为顶事件建立了失效树,并根据该型弹药的功能构件在储存期间的特点选择了失效树的简化原则,建立了系统可靠度模型。确定了由储存因素导致弹着目标不爆炸这一事件的4种主要失效模式。并通过分析其不同的储存期失效机理和影响因素,提出该型炮弹的储存策略。  相似文献   
32.
防空作战中的目标分配问题属于NP完全问题,在综合考虑火力单元作战效能和防御效能的基础上,引入火力单元综合有利度,建立了一种用于大规模多火力单元对抗多轮次目标的静态目标分配模型,给出了基于GA因子的改进PSO算法,并将算法应用于目标分配模型的求解,通过VC 6.0编程和计算机仿真验证了模型的可行性和算法的有效性.  相似文献   
33.
基于模糊均值聚类算法的图像分割   总被引:2,自引:0,他引:2  
将图像直方图统计特性引入到FCM聚类算法的目标函数中,用混合粒子群优化算法对目标函数进行全局最优求解,提高了图像分割的运算速度。  相似文献   
34.
针对舰艇武器布置问题的特点,提出了一种基于粒子群优化和分类器系统的协同优化算法,以粒子群优化进行优化计算,用分类器系统消除约束.计算实例表明,该算法能较好地实现优化计算,并能节省大量的计算时间.  相似文献   
35.
设计安全策略模型时应考虑安全策略的时序特性和灰色特性,还应综合考虑保密性、完整性和可用性三方面的需求。已有的安全模型没有描述时序性和灰色特性,而且一般只侧重描述保密性或完整性。为此,本文提出了动态灰色时序系统(简称DGTS)。本文详细描述了DGTS,以及基于DGTS的动态语义设计的灰色时序安全策略规范语言GTSL。  相似文献   
36.
This paper, intended to stimulate debate, suggests that we are at a turning point in the history of the UK military aerospace industry. It argues that there is urgent need for a fresh vision as to how the UK military aerospace industry can both prosper and make its maximum contribution to the defence of Britain. Further, the resulting plans and policies must emphasise the robustness of defence capabilities in a future in which the only thing we can be certain is that it will be very different from the present – especially whenever defence most matters.  相似文献   
37.
The United Arab Emirates (UAE) has laid out an ambitious plan to become the first Arab country to possess a civilian nuclear energy program. Central to that effort has been the Emirati government's ability to obtain foreign nuclear assistance. This article traces the UAE's strategies for overcoming the obstacles that stood in the way of nuclear suppliers providing assistance. It examines the approach taken by the UAE to assuage the safety and security concerns of nuclear suppliers, how the UAE leveraged its alliances with France and the United States to obtain their cooperation, and its strategies for engaging domestic interest groups in supplier states. The generalizable elements of the UAE's strategies are discussed and used to provide insight into the prospects for other Middle Eastern states' bids to obtain similar assistance. The article concludes with a discussion of the potentially transformative aspects of the strategies employed by the UAE in shaping other countries' pursuit of nuclear energy in the region.  相似文献   
38.
This article presents a proposed theory of how war economies are formed and maintained, as well as an integrated policy framework to guide the dismantling of war economies emanating from the proposed theory. Additionally, six potential areas for future research pertaining to the dismantling of war economies are also presented.  相似文献   
39.
This article is about the management of security incidents in organisations and companies which are under the protection of private security personnel, whether in-house or contracted. Incidents can be defined as accidental or anecdotal (bird flies into a camera) to a violation of law or company policy. Managing security incidents is one of the key functions of a private security service provider. The purpose of this study is to explore the management of security incidents and the information related thereto, identify shortcomings and find solutions for managing these shortcomings. Interviews were used to gain insight from personnel within the private and government sectors which are served by the private security industry. It was found that security incidents are handled in a routine way by organisations from the different sectors. One major shortcoming is that security incidents and the information related thereto are not managed by security service providers according to an operational framework or model with the required infrastructure and resources. The significance of this study is for security incidents to be managed correctly, so that the information related thereto may be captured accurately, analysed and used proactively and reactively to improve physical protection systems, develop preventative strategies and provide actionable information products in order to reduce crime, increase detection rates and prevent losses.  相似文献   
40.
South Africa's military has, since the First World War, been an oft-used and effective tool in the conduct of South African foreign policy, but this role has not always translated into power for Defence Department principals in its formulation. South African Defence Ministers for most of the country's history have played a minor role in the making of foreign policy; despite a change in this dynamic between approximately 1975–1990, the post-apartheid era has once again seen a diminishment of Defence's power in this arena. This article examines why Defence Ministers have generally been such weak players, with an eye toward disaggregating whether this was a product of interpersonal relationships with Cabinet and – most importantly – the Head of State, or whether this influence (or lack thereof) was more a function of South Africa's international standing. While determining who has influence on this process is difficult given the primacy of the national leader in making foreign policy and a lack of insider accounts by participants in the process, this article relies upon several interviews with participants and knowledgeable observers that help illuminate the process and Defence's role in it.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号