全文获取类型
收费全文 | 894篇 |
免费 | 243篇 |
国内免费 | 63篇 |
出版年
2024年 | 5篇 |
2023年 | 17篇 |
2022年 | 20篇 |
2021年 | 14篇 |
2020年 | 26篇 |
2019年 | 12篇 |
2018年 | 12篇 |
2017年 | 51篇 |
2016年 | 68篇 |
2015年 | 32篇 |
2014年 | 56篇 |
2013年 | 60篇 |
2012年 | 76篇 |
2011年 | 79篇 |
2010年 | 41篇 |
2009年 | 79篇 |
2008年 | 67篇 |
2007年 | 56篇 |
2006年 | 67篇 |
2005年 | 62篇 |
2004年 | 59篇 |
2003年 | 33篇 |
2002年 | 42篇 |
2001年 | 24篇 |
2000年 | 18篇 |
1999年 | 18篇 |
1998年 | 24篇 |
1997年 | 20篇 |
1996年 | 10篇 |
1995年 | 16篇 |
1994年 | 9篇 |
1993年 | 6篇 |
1992年 | 9篇 |
1991年 | 4篇 |
1990年 | 6篇 |
1989年 | 2篇 |
排序方式: 共有1200条查询结果,搜索用时 14 毫秒
991.
作战体系已成为制约网络舆论斗争作战效能的关键性问题。论文借鉴信息化战争的一体化联合作战思想,分析了网络舆论斗争的全域一体化联合作战特点,建立了全域一体化联合作战体系架构,为网络舆论斗争实践提供思想理论指导。论文的研究成果,对于丰富网络舆论斗争理论,占领网络舆论制高点,具有重要理论意义和参考价值。 相似文献
992.
Matthew Crosston 《Defense & Security Analysis》2017,33(2):94-105
This work is about how the United States military has become dependent on networked technology. As arguably the largest contributor to national security, it has become so dependent that its chief doctrine integrates networked technology into nearly every specialty, with particularly intense focus on Network Centric Warfare. As the military’s old guard is replaced by the highly technical Millenial Generation, there is cause to pause when assuming this techno-acuity brings nothing but advantage and success. Vulnerabilities stemming from such extensive dependence offer opportunities for exploitation that have not gone unnoticed. The first step to moving forward from this point is to fully understand the extent to which the military has become dependent on computer networks. It might be the Millenials’ war today, but it would be quite unwise for the United States military to think about it and fight it in a purely Millenial way. 相似文献
993.
994.
基于PCA和BP神经网络的水下目标识别方法研究 总被引:2,自引:0,他引:2
针对被动声纳信号的特点,提出了基于信号线谱特征的主成分分析(PCA)特征选择方法,其优点是从复杂的目标信号中提取目标的特有信息,降低了目标特征维数.将此方法用于实录的三类水下目标数据,采用BP神经网络对目标进行识别分类,仿真结果说明了所提出的方法的正确性和有效性. 相似文献
995.
疲劳累积损伤是一个非稳态能耗过程,可以用遗传算法优化后的3层2 7 1BP神经网络来描述疲劳损伤的非线关系,经仿真验证表明,该神经网络具有较高的精度和泛化能力.通过对材料疲劳损伤临界值和载荷的分散性的分析研究,建立了疲劳失效动态准则,并运用蒙特卡罗随机抽样法对材料疲劳寿命的可靠性进行了仿真验证;对调质45号钢在随机载荷和2级载荷作用下,进行了疲劳寿命可靠性仿真计算,仿真结果与实验结果和理论分析比较吻合. 相似文献
996.
配氧控制是闭式循环柴油机(CCD)系统的关键技术之一,为改善其动态特性,在 PID反馈控制的基础上,设计了基于模糊神经网络(FNNs)模型的前馈控制器,并采用 PID反馈控制输出信号作为网络训练的误差信号,使模糊神经网络逐步具有前馈补偿能力,从而能够有效对负荷扰动进行及时补偿.仿真结果表明,采用FNNs前馈控制器后,可以有效改善氧气控制的动态特性,并且具有快速的学习速度和很强的适应能力. 相似文献
997.
BP神经网络在电子设备可靠性验证中的应用 总被引:1,自引:0,他引:1
讨论了借助MATLAB的BP神经网络解决电子设备在寿命分布未知和小样本试验数据时的可靠性评估方法, 并给出了一个应用实例, 该方法可以提高可靠性评估置信度, 并能节省试验时间和费用, 特别适用于大型复杂电子设备。 相似文献
998.
多个方向的可扩展特性是新一代互联网的重要特点,这对高性能路由器的性能、规模、功能和服务等能力提出了更高的要求,高速路由与交换技术是承载这种可扩展特性的关键技术。从网络处理器设计、路由查找技术以及高速交换技术三个方面总结了高速路由与交换技术的研究和发展现状,并展望了未来的发展趋势。 相似文献
999.
We describe the application of a decomposition based solution method to a class of network interdiction problems. The problem of maximizing the probability of sufficient disruption of the flow of information or goods in a network whose characteristics are not certain is shown to be solved effectively by applying a scenario decomposition method developed by Riis and Schultz [Comput Optim Appl 24 (2003), 267–287]. Computational results demonstrate the effectiveness of the algorithm and design decisions that result in speed improvements. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005. 相似文献
1000.
During the last decade telecommunication operators have been deploying WDM (Wavelength Division Multiplexing) technology to satisfy the exponential growth in global communication. While facilitating the advanced information society of today, this has also led to a higher dependency on the networks, and furthermore the high capacity utilization of optical fibers means that a single link failure will influence many users and enterprises. For these reasons, protection of network connections has become a major competitive parameter for the operators. Currently, the most popular protection method is ring protection, due to its simplicity, requiring only basic management functionality and operating with local restoration control. While many optical rings have been deployed, little work has been published on exactly what the cost of ring networks are, compared to general mesh networks. In this article we perform a quantitative comparison between ring protection and mesh protection, using real world network data and realistic prices for network components. Extending classic LP flow models to take rings and node costs into account, and using a link‐path based mesh network LP model, we are able to perform a total cost comparison of the two architectures, and of manual ring network design. The results suggest that the price of mesh network components must be reduced significantly to be competitive with ring based networks, and also that manual network design does not necessarily lead to the most cost‐efficient designs. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2005 相似文献