全文获取类型
收费全文 | 2649篇 |
免费 | 593篇 |
国内免费 | 96篇 |
出版年
2024年 | 1篇 |
2023年 | 21篇 |
2022年 | 32篇 |
2021年 | 37篇 |
2020年 | 70篇 |
2019年 | 45篇 |
2018年 | 63篇 |
2017年 | 142篇 |
2016年 | 142篇 |
2015年 | 89篇 |
2014年 | 214篇 |
2013年 | 220篇 |
2012年 | 189篇 |
2011年 | 243篇 |
2010年 | 164篇 |
2009年 | 243篇 |
2008年 | 185篇 |
2007年 | 163篇 |
2006年 | 182篇 |
2005年 | 163篇 |
2004年 | 165篇 |
2003年 | 100篇 |
2002年 | 98篇 |
2001年 | 75篇 |
2000年 | 43篇 |
1999年 | 39篇 |
1998年 | 41篇 |
1997年 | 28篇 |
1996年 | 25篇 |
1995年 | 34篇 |
1994年 | 23篇 |
1993年 | 13篇 |
1992年 | 18篇 |
1991年 | 10篇 |
1990年 | 7篇 |
1989年 | 7篇 |
1988年 | 2篇 |
1987年 | 1篇 |
1975年 | 1篇 |
排序方式: 共有3338条查询结果,搜索用时 15 毫秒
1.
提出了一种模糊方向神经网络分类器,并应用于液体推进剂火箭发动机故障检测与分离。模糊方向神经网络采用模糊集表示发动机故障模式,模糊集是方向超体聚集形成的集合体,方向超体则由单位方向、夹角和两个半径确定。模糊方向神经网络能在一次循环学习中形成非线性方向边界。故障检测与分离的仿真研究表明:模糊方向神经网络的识别性能是比较优越的。 相似文献
2.
3.
Nathaniel L. Moir 《Small Wars & Insurgencies》2017,28(6):909-946
This article assesses Bernard Fall’s concept of Vietnamese Revolutionary Warfare in Indochina between 1953 and 1958. It also investigates differences in the conceptualization of Revolutionary Warfare between Fall and proponents of French military doctrine known as la guerre révolutionnaire. The last component of the article considers limits of Fall’s influence on counterinsurgency doctrine. 相似文献
4.
在当前信息化的战场环境下,战场环境瞬息万变,战术通信网作为信息化战争的神经中枢,起到了至关重要的作用,然而组网方案的好坏直接决定着通信网性能的优劣,因此,如何在战场环境下快速、自动、客观地评估战术通信网组网方案是一个亟待解决的问题。通过分析战术通信网的特性和要求,提出了战术通信网组网方案评估指标体系,并采用熵权灰关联的方法对组网方案进行评估优选,该方法方便快捷并且可以编程实现,不仅能够在战场环境下实时、自动地对组网方案进行评估优选,而且评估结果也符合实际情况,为指挥员提供了决策依据。 相似文献
5.
6.
NOEL STOTT 《African Security Review》2013,22(3):4-11
A truly universal ban on anti-personnel mines cannot be realized without engagement of armed non-state actors and armed groups operating outside state control, including rebels and national liberation movements. Events after 9/11 have complicated engagement with organizations that can be classified as ‘terrorists’. Yet, the use of anti-personnel landmines itself can be viewed as an act of terrorism and African leaders have, on various occasions, classified the use of landmines and the presence of unexploded ordnance as engendering insecurity and a serious impediment to development. The success of a total ban ultimately depends upon ensuring that armed non-state actors act in accordance with international humanitarian law. The Geneva Call Deed of Commitment for Adherence to a Total Ban on Anti-Personnel Mines and for Cooperation in Mine Action (DoC) might be described as an alternative instrument to the Anti-Personnel Mine Ban Convention and can serve an important and impartial channel of communication with non-state actors. Already 18 armed groups in Africa have signed the Geneva Call DoC. 相似文献
7.
Peter Gastrow 《African Security Review》2013,22(1):39-43
This article discusses the validity of national security threats in Botswana and whether they justified the creation of the Directorate of Intelligence and Security Services (DISS), which has been controversial since its formation. Since its inception in 2008, the DISS has been accused of many human rights violations and politicisation. Without fully deliberating on the basis for its creation, some discourses have focused on the politicised operations without relation to what the DISS is supposed to be doing. The author works under the assumption that debates should be shaped by whether it was necessary to create the DISS, and, if so, how we can shape and steer debates on its oversight, management, reform and operations. This article argues that despite the politicisation of the DISS, Botswana's national security threats are both real and imagined; and that domestic threats to national security have moved from the conceptual ‘imagined’ category to the ‘real’. However, that in itself did not warrant the design and mandate of the DISS, and the article argues that it was external threats that really warranted the creation of a civilian intelligence agency. The article concludes that Botswana faces a plethora of external security threats – traditional and non-traditional – that warranted the creation and continuance of the DISS. 相似文献
8.
Nicholas G. Evans 《The Nonproliferation Review》2013,20(3-4):351-366
ABSTRACTScience and technology (S&T) review is key to anticipating developments in the life sciences that may benefit or run contrary to the aims of the 1972 Biological and Toxin Weapons Convention. It serves as a mechanism for both preparing against novel biological threats and identifying the best opportunities for developing and sharing the life sciences to the fullest extent. In the age of rapidly advancing biotechnology, S&T review needs to be wide ranging, involve a diverse set of inputs, and be transparent about its methods and data. This viewpoint considers four models of S&T review and their capacity to respond to the challenge of the life sciences: standing advisory boards; ad hoc working groups; peer review; and wikis. It then identifies a hybrid model that is suitably broad, diverse, and transparent. 相似文献
9.
针对径向基(RBF)神经网络在进行超声检测脱粘缺陷识别时存在参数选择不确定、网络结构鲁棒性差等问题,提出一种改进的自适应半监督模糊C均值聚类(FCM)的RBF神经网络的方法,将kw近邻估计法和半监督模糊C均值聚类方法相结合,改进了隶属度函数,自适应确定聚类数目。将改进的RBF神经网络应用于超声检测脱粘缺陷识别,实验结果表明:与传统RBF神经网络相比,本方法减弱了孤立样本对网络结构的影响,增强了网络结构的鲁棒性,提高了脱粘缺陷识别的准确率,是一种较好的超声检测脱粘缺陷识别分类方法. 相似文献
10.
摘要:在基于活动的质量模型维护性分析方法基础上,对贝叶斯方法进行了扩展,将模糊推理技术与现有的贝叶斯方法进行比较,开发了一个基于模糊推理的系统来对软件维护性进行量化评估和预测,描述了模糊技术在维护性评估和预测准确度方面的优势. 相似文献