首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   251篇
  免费   71篇
  国内免费   10篇
  2023年   1篇
  2022年   3篇
  2021年   6篇
  2020年   4篇
  2019年   6篇
  2018年   2篇
  2017年   17篇
  2016年   18篇
  2015年   9篇
  2014年   22篇
  2013年   14篇
  2012年   10篇
  2011年   19篇
  2010年   15篇
  2009年   20篇
  2008年   15篇
  2007年   14篇
  2006年   14篇
  2005年   16篇
  2004年   15篇
  2003年   13篇
  2002年   12篇
  2001年   10篇
  2000年   10篇
  1999年   10篇
  1998年   3篇
  1997年   4篇
  1996年   7篇
  1995年   4篇
  1994年   1篇
  1993年   3篇
  1992年   3篇
  1991年   3篇
  1990年   4篇
  1989年   2篇
  1988年   2篇
  1987年   1篇
排序方式: 共有332条查询结果,搜索用时 31 毫秒
61.
After only ten years in existence, the African Union (AU) has already made its mark on the landscape of peace and security in Africa. This paper seeks to explore the relationship between the AU's leading collaborative interstate security policy, the African Peace and Security Architecture (APSA), and sustainable peace in the Horn of Africa. It examines four countries – Djibouti, Eritrea, Ethiopia, and Kenya – and how engaging with the APSA through early warning systems can contribute to developing the elements necessary for sustainable peace, namely regional stability, conflict management, and good governance.  相似文献   
62.
The current approach to countering the threat of improvised explosive devices (IEDs) in Afghanistan has met with limited success. The relative lack of success may be in part because the current approach is not holistic and discounts the social systems that foster the IEDs. Insurgents are using IEDs as a tool to further their strategic aims, but the coalition and to a lesser extent the Government of the Islamic Republic of Afghanistan (GIRoA) are attacking the IEDs as if they are an end in and of themselves. Combining network disruption with information change maximizes the opportunities for mitigating the IED threat. More specifically, to mitigate the IED threat requires disrupting the social and economic systems associated with IEDs, and at the same time providing alternative economic opportunities and improving rule of law and governance at the local level. In other words, counter-IED (C-IED) must be Counter-Insurgency (COIN) centric to be successful. This paper reviews the current state of C-IED efforts, identifies five main problems with the current approach, and suggests changes to reduce or mitigate the IED threat in Afghanistan.  相似文献   
63.
服务概率是高炮系统作战效能的一个重要指标,同时也是合理配置防空兵器的重要参考依据。以排队论为基础的高炮系统服务概率数学模型及数值仿真技术已经比较成熟,但是其仿真过程不够直观形象。通过数据传递,在数值仿真的基础上建立了视景仿真系统,分析了系统的整体框架以及工作流程。在基于Unity3D的三维视景环境中,以真实的仿真数据来驱动模型运动,实现了目标航迹模拟以及目标信息的实时获取,再现了高炮系统的服务过程与射击效果,为高炮系统作战效能评估提供重要参考。  相似文献   
64.
提出了基于联系数的电子装备系统和体系作战效能倍增效应分析新方法。首先介绍了联系数的定义与数学运算,其次提出以基于作战能力指数的同异联系数来描述电子装备的作战效能,并根据不确定系数的取值分别对电子装备系统和体系的作战效能倍增效应进行了分析,最后基于侦察装备对目标的侦察能力进行了实例分析,结果表明该方法合理可行。  相似文献   
65.
设计了一种新的MIMO-OFDM系统Turbo接收机中的信道估计器.考虑了信道估计误差对编码比特外信息计算的影响,利用软球形译码器的搜索列表和解码器反馈的先验信息对传统EM信道估计中的软信息近似处理进行了修正,获得了更为准确的软符号统计信息用于信道估计,提出了考虑软符号互相关性的Bayesian EM(BEM)信道估计算法.仿真结果表明,新算法较传统EM算法具有更低的误码率和更小的估计均方误差值.  相似文献   
66.
An R out of N repairable system consisting of N components and operates if at least R components are functioning. Repairable means that failed components are repaired, and upon repair completion they are as good as new. We derive formulas for the expected up‐time, expected down‐time, and the availability of the system, using Markov renewal processes. We assume that either the repair times of the components are generally distributed and the components' lifetimes are exponential or vice versa. The analysis is done for systems with either cold or warm stand‐by. Numerical examples are given for several life time and repair time distributions. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 483–498, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10025  相似文献   
67.
We study an infinite‐horizon, N‐stage, serial production/inventory system with two transportation modes between stages: regular shipping and expedited shipping. The optimal inventory policy for this system is a top–down echelon base‐stock policy, which can be computed through minimizing 2N nested convex functions recursively (Lawson and Porteus, Oper Res 48 (2000), 878–893). In this article, we first present some structural properties and comparative statics for the parameters of the optimal inventory policies, we then derive simple, newsvendor‐type lower and upper bounds for the optimal control parameters. These results are used to develop near optimal heuristic solutions for the echelon base‐stock policies. Numerical studies show that the heuristic performs well. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
68.
高三现代文阅读是高三语文备考的重点和难点,常规的备考指导耗时费力,但收效微小。以2013———2015年高考全国卷小说阅读为例,从提高阅读速度、学会主动阅读两大方面开发《如何阅读一本书》相关理念和方法,以指导高三学生的现代文阅读的备考,从而培养高三学生高效阅读的习惯和良好的阅读爱好。  相似文献   
69.
In this paper we consider networks that consist of components operating under a randomly changing common environment. Our work is motivated by power system networks that are subject to fluctuating weather conditions over time that affect the performance of the network. We develop a general setup for any network that is subject to such environment and present results for network reliability assessment under two repair scenarios. We also present Bayesian analysis of network failure data and illustrate how reliability predictions can be obtained for the network. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 574–591, 2003  相似文献   
70.
日-地(月)系统拉格朗日L1点及L1点附近的晕(Halo)轨道在"夸父"工程中有重要的应用价值,可用于对太阳实施持续观测.利用数值分析方法,找到了日-地(月)-探测器三者构成的圆限制性三体问题中L1点附近的周期晕(Halo)轨道,分析了轨道的特性.研究结果对"夸父"工程中的目标轨道设计有一定的参考价值.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号