全文获取类型
收费全文 | 230篇 |
免费 | 41篇 |
国内免费 | 33篇 |
出版年
2023年 | 7篇 |
2022年 | 3篇 |
2021年 | 3篇 |
2020年 | 6篇 |
2019年 | 7篇 |
2018年 | 6篇 |
2017年 | 22篇 |
2016年 | 24篇 |
2015年 | 16篇 |
2014年 | 21篇 |
2013年 | 23篇 |
2012年 | 20篇 |
2011年 | 16篇 |
2010年 | 5篇 |
2009年 | 15篇 |
2008年 | 11篇 |
2007年 | 14篇 |
2006年 | 13篇 |
2005年 | 7篇 |
2004年 | 3篇 |
2003年 | 17篇 |
2002年 | 6篇 |
2001年 | 12篇 |
2000年 | 7篇 |
1999年 | 5篇 |
1998年 | 1篇 |
1997年 | 3篇 |
1996年 | 4篇 |
1995年 | 3篇 |
1992年 | 3篇 |
1991年 | 1篇 |
排序方式: 共有304条查询结果,搜索用时 322 毫秒
81.
82.
83.
84.
无人机在结构样式和材料构成方面具有的灵活性使得其相比有人机具有更大的隐身性能优化空间,在室内或者室外开展近场成像变得迫切。结合飞行器转台成像几何模型建立了近场转台成像通用信号模型,提出了一种面向飞行器电磁散射特征诊断的近场频域成像算法,在子孔径成像设置约束下,近似将斜距平面频谱按照水平面频谱处理;分析了该算法适用的条件,并围绕典型近场成像几何和飞行器尺寸生成仿真数据,在0.6~35 GHz范围内选择典型波段完成近场成像,良好的成像结果证实了理论分析与所提算法的正确性。 相似文献
85.
Adrian Roads 《Arms and Armour》2017,14(2):101-137
The Pattern 1838 Musket was initially designed for the rank and file of the British army, it was instead issued to the elite Foot Guards. With arguably the lowest survival rate of any 19th Century British military firearm it is one of the rarest muskets to encounter today. This is its story … 相似文献
86.
87.
Stephen J. Cimbala 《Defense & Security Analysis》2017,33(3):193-208
Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities. 相似文献
88.
为向开展具体的风洞虚拟飞行试验技术提供引导,针对应用于飞控系统评估的风洞虚拟飞行试验系统及关键技术进行了分析。基于传统意义上的飞控系统评估方法的不足,分析风洞虚拟飞行试验应用于飞控系统评估的优势;按飞控系统常用的姿态控制回路及制导控制回路的组成形式,介绍风洞虚拟飞行试验系统方案与工作原理,详细分析它与半实物仿真系统的差异;分析风洞虚拟飞行试验应用于飞控系统评估需解决的关键技术问题,包括风洞虚拟飞行试验评估方法、飞行器模型设计技术、飞控系统改进技术及模型支撑技术。 相似文献
89.
Kenneth L. Lasoen 《战略研究杂志》2017,40(7):927-962
The terrorist attacks in France and Belgium of 2015–2016 that occurred while these countries were in a heightened state of alert raise questions about indications and warning methodology as well as effectiveness of the blanket-protection deployment of security services assisted even by the military. Response and perhaps even more anticipation may require strategic rethinking in light of the predatory attacks that target the most vulnerable spots of the public space. This study looks at threat analysis in Belgium as conducted through her intelligence fusion centre Coordination Unit for Threat Analysis (CUTA)?????? since its inception in 2006. With a special focus on what is known, at the time of writing, about the terrorist attacks in Paris and Brussels, this study hopes to put into context how the system (mal)functions and will also consider the preventive measures that respond to the threat, and the international aspects which have implications far beyond Belgian borders. Therefore, a case is made for not just a Belgian homeland security framework, but one that fits into an EU-wide security concept. 相似文献
90.
TSO-C151b标准中近地告警包线为通用模型设计,未结合飞机的自身特性。为精确给出飞机过大下降速率告警包线,通过结合飞机自身气动特性和操纵特性,分析告警机理,建立飞机六自由度仿真程序。依据飞机发动机数据、气动力数据、质量特性数据等,建立仿真模型及操作程序,实时模拟飞机各舵面的操作响应过程,以及飞机的运动姿态和飞行轨迹,计算飞机在不同下降速率时拉起的损失高度,设计近地告警包线。实际试飞数据验证了模型设计合理,计算结果准确。同时,将仿真计算得出的告警包线与TSO-C151b对比,给出适用于飞机的近地告警包线使用建议,保证飞机飞行安全。 相似文献