首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   981篇
  免费   295篇
  国内免费   52篇
  2023年   2篇
  2022年   14篇
  2021年   17篇
  2020年   15篇
  2019年   13篇
  2018年   8篇
  2017年   58篇
  2016年   54篇
  2015年   40篇
  2014年   63篇
  2013年   117篇
  2012年   124篇
  2011年   139篇
  2010年   47篇
  2009年   40篇
  2008年   47篇
  2007年   65篇
  2006年   74篇
  2005年   83篇
  2004年   63篇
  2003年   57篇
  2002年   25篇
  2001年   41篇
  2000年   35篇
  1999年   19篇
  1998年   7篇
  1997年   10篇
  1996年   10篇
  1995年   7篇
  1994年   1篇
  1993年   4篇
  1992年   8篇
  1991年   6篇
  1990年   10篇
  1989年   5篇
排序方式: 共有1328条查询结果,搜索用时 439 毫秒
991.
Humanitarian operations may pose challenges to which armed forces prepared for warfighting seem rather ill-equipped. It is the aim of this article to examine in what way military ethics should be adapted to humanitarian tasks. Two ideal types of military ethics are defined here: warfighting and humanitarian. The warfighting ethic is supposed to maximise the utility of the military in war and combat and to that end utilises the virtues of loyalty and honour. In contrast, humanitarian obligations require to a larger extent the development of personal integrity and an ability to follow one’s own conscience. The adaptation of military ethics is demonstrated in the case studies of the UK armed forces and the German Bundeswehr. Whereas the moral code of the UK armed forces remains anchored in the principles of the warfighting ethic, the case of the Bundeswehr presents a military ethic closely approximating the humanitarian ideal type.  相似文献   
992.
993.
刚桂虎  赵显 《国防科技》2017,38(2):033-037
随着全球范围的城市化进程不断推进,未来军事斗争向城市环境中发展是必然趋势。在城市作战需求分析的基础上,剖析了传统装备的"城市病",阐述了小型旋翼无人机在城市军事行动中的应用潜能。研究表明,针对现有装备在城市作战中显示出的若干短板,发展基于小型旋翼无人机打造侦察平台与精确打击平台将是一个较好的解决方案。而运用军民融合的发展模式挖掘小型旋翼无人机军用潜力,在提升军队作战能力,降低成本均具有积极意义。  相似文献   
994.
规整化SAR图像特征提取   总被引:3,自引:0,他引:3       下载免费PDF全文
SAR成像算法通常都基于FFT运算,图像分辨率要受到瑞利限的制约。为了提高图像分辨率,目前常用的SAR/ISAR超分辨成像算法大多借助于现代谱估计技术。从解方程的角度考虑,认为有限长数据的高分辨率谱估计是一个欠定方程问题,估计的结果存在"病态"性。在Bayes估计准则下,把信号谱的先验概率密度作为规整项包含进信号频谱的最大后验概率估计中,提高谱估计的分辨率。将这种方法用于SAR图像峰值特征提取,提高了图像分辨率。  相似文献   
995.
Almost all discussions of cyberwarfare, other cyber-attacks, and cyber-espionage have focused entirely on the Internet as the chief means of damage – the Internet as a ‘vector,’ using a term from the theory of infectious diseases. However there are a variety of means, some of which have already been used, that involve cyber-exploitation using vectors other than the Internet. Malware can be installed in the integrated circuits of computers and servers, but also in any devices attached to them – thumb drives, CDs, printers, scanners, and so on. One can also use various forms of electromagnetic radiation at a distance of meters or more to exfiltrate data or to infiltrate corrupt data. I call this large and diverse family of unwanted interference with the functioning of information processing systems other-than-Internet (OTI) attacks on information systems. Stuxnet, and probably the 2007 Israeli corruption of Syrian air defenses, were OTI attacks. Such OTI techniques are more difficult to develop than creating malware, requiring electronic manufacturing facilities or novel technologies, and are thus accessible only to larger corporations and technologically sophisticated countries. Particularly vulnerable would be countries (like the United States and Europe) whose information processing devices are mainly produced outside of the country. Once exploitations via the Internet become harder to perpetrate, OTI exploitations are certain to grow dramatically, eventually requiring equipment for critical uses to be expensively fabricated in (and transported using) secure facilities; expensive detection measures will have to be instituted. This will create challenges for policy, law, and ethics, as well as greatly increasing the cost of many electronic devices.  相似文献   
996.
The Biological Weapons Convention (BWC) regime currently suffers from a lack of effective compliance procedures. Because a legally binding compliance protocol to the BWC is not available, other measures are needed to stabilize the regime against the risk of violations of its rules. The Treaty on the Non-Proliferation of Nuclear Weapons, the Chemical Weapons Convention, and the experiences of UN inspection teams show that among the necessary components of effective compliance mechanisms are an intermediary level between bilateral consultations of states parties and involvement of the UN Security Council as well as independent assessment capabilities. This article suggests that the UN Secretary General could assume such an intermediary function and, using the authority contained in Article 99 of the UN Charter, could investigate not only alleged use of biological weapons but also alleged breaches of the BWC. A standing expert unit in the Department for Disarmament Affairs could provide the independent expertise necessary for such investigations. Such a compliance mechanism could provisionally help stabilize the BWC regime until a permanent compliance system can be agreed.  相似文献   
997.
针对现代储运过程典型的管道堵塞故障,分析了其对过程监控参数的影响;采用基于主成分分析的故障检测方法,构建了故障检测流程和检测模型;以储运过程典型仿真系统为研究对象,建立了主成分模型;通过模拟不同程度的管道堵塞故障,进行了管道堵塞故障检测的仿真应用研究,获得了管道堵塞故障统计量控制图.实验结果表明了基于主成分分析的故障检测方法的有效性和正确性.  相似文献   
998.
利用TRNSYS软件对重庆夏季建筑屋顶太阳能光电热一体化系统进行瞬态模拟分析计算,得到系统瞬时发电量与一段时间内累计发电量,光电热模块瞬时进出水温度与太阳能平板集热器瞬时进出水温度,系统一段时间内光电热模块累计有效得热量与一段时间内太阳能平板集热器累计有效得热量,系统的光电转换效率、光热转换效率以及太阳能综合利用效率。结果表明,建筑屋顶太阳能光电热一体化系统是重庆地区建筑太阳能光电热一体化系统适宜的型式。  相似文献   
999.
为了从能量均衡角度出发解决无线传感器网络生命周期延长问题,从而延长整个物联网生命周期,针对无线传感器网络节点遭遇"路由空洞"的时候出现路由中断和生命周期缩短现象,分析能量消耗原理,构建最优跳数模型和能量均衡协议,并提出采用能量均衡的思路减少节点能量消耗。实验仿真发现,应用能量均衡协议使无线传感器网络节点能量分布更加均匀,节点能量消耗时间明显变长,而个别节点能量消耗速度明显大于其他节点的情况得以减少,达到延长无线传感器网络生命周期的目的。仿真结果验证了该方法的可行性。  相似文献   
1000.
以探索装备保障的信息化决策与控制方法为目的,从基于效果作战的观点出发,利用概念模型,从OODA环的相互作用、混沌现象和自同步及蜂群效应3个方面,研究了网络中心条件下装备保障指挥决策与体系控制的激励与响应模式,并得出了相关结论,以此为基础提出了装备保障指挥决策与体系控制的3项建议.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号