首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   277篇
  免费   70篇
  国内免费   27篇
  2024年   1篇
  2022年   6篇
  2021年   7篇
  2020年   2篇
  2019年   2篇
  2018年   2篇
  2017年   4篇
  2016年   14篇
  2015年   10篇
  2014年   13篇
  2013年   15篇
  2012年   15篇
  2011年   13篇
  2010年   20篇
  2009年   21篇
  2008年   10篇
  2007年   10篇
  2006年   26篇
  2005年   22篇
  2004年   20篇
  2003年   17篇
  2002年   14篇
  2001年   15篇
  2000年   19篇
  1999年   16篇
  1998年   16篇
  1997年   6篇
  1996年   7篇
  1995年   9篇
  1994年   6篇
  1993年   4篇
  1992年   5篇
  1991年   1篇
  1990年   3篇
  1989年   2篇
  1988年   1篇
排序方式: 共有374条查询结果,搜索用时 15 毫秒
171.
C3I系统是一个复杂的分布式离散事件动态系统,适合于用Petri网来描述其异步,并发行的,而且C3I系统是一个时间准则系统,文中提出的区间着色Petri网非常适合于分析其严格时限,并给出计算时延上(下)界的算法。  相似文献   
172.
介绍了防空C3I时分多址网络仿真系统的结构、功能、原理和特点。  相似文献   
173.
系统的互操作性   总被引:1,自引:1,他引:0  
阐明了确保互操作性的重要性,介绍了有关互操作性的标准及互操作性的鉴别与测试,并提出了确保互操作性的几点建议。  相似文献   
174.
陆军防空兵自动化指挥系统已作为防空作战效能“倍增器”列入国家军装武器发展规划,并在近期可能交付防空部队使用。这一新装备、新技术的出现和发展必然会引起防空作战指挥的变化。在分析防空兵指挥自动化对防空作战指挥影响的基础上,对如何发挥防空兵自动化指挥的防空作战效能和防空兵指挥自动化需迫切解决的一些问题加以探讨。  相似文献   
175.
本文首先介绍单片机控制的指挥仪航路产生系统的原理及组成,重点讨论了目标现在点坐标由数字量到指挥仪所需要的模拟信号的转换方法,最后对该系统的误差结果进行了分析。  相似文献   
176.
As a consequence of intervention in Iraq and Afghanistan, force ratio for counterinsurgency (COIN) has come under increased scrutiny. Reduced to its essence, the issue is simply, ‘How many troops does it take to get the job done?’ This answer has been sought by the US military, academia, and think tanks. There have been numerous responses, culminating in several ‘plug-and-play’ equations for minimum force ratios in COIN operations. Due to the impossibility of determining precisely how many insurgent forces there are, it has become common to base force ratios on the population of the country. In the realm of policy, the question above is posed as, ‘How many of our troops does it take to get the job done?’  相似文献   
177.
This paper models transnational terrorism as a three‐way strategic interaction involving a government that faces armed opposition at home, which may spill over in the form of acts of terrorism by the state's opponents against the government's external sponsor. The external sponsor also utilises deterrence against potential terrorists, which only lowers terrorism if terrorists are not intrinsically motivated by a deep‐seated sense of humiliation. The model highlights the importance of intrinsic motivation. A rise in the external power's preference for deterrence against terrorism may backfire in these circumstances. Increases in the government's military efficiency against the rebels, who are also terrorists against the government's sponsor, raises overall levels of violence.  相似文献   
178.
This paper provides a contribution to the growing corpus of knowledge and understanding of the interaction between economic growth and defence spending in South Africa by specifying a Keynesian simultaneous equation model and estimating the system for the period 1961 to 1997. The model contains a growth equation, a savings equation, a trade balance equation and a military burden equation and when estimated by single equation and systems estimation methods is relatively well specified. There is evidence of an overall negative effect of military spending on the economy over this period, though the significance of individual coefficients is low. There is certainly no evidence of any positive impact, suggesting that cuts in military spending do present an opportunity for improved macroeconomic performance.  相似文献   
179.
This article presents the results of an empirical survey of Slovenian defence enterprises focusing on three segmented geographic market outlets: the domestic market, the other European Union (EU-26) markets and the global markets. In the enterprise surveys are included around two-thirds of the domestic defence enterprises of different sizes and activities. The Slovenian defence enterprises by production, supply-in-return, subcontracting, middleman and trader activities in the defence marketing chains are mostly specializing towards the businesses on the domestic market. Rare enterprises are specialized exclusively for activities on the EU-26 markets and the global markets.  相似文献   
180.
当前,对ISAR成像和目标识别的研究很多,但用于ISAR成像和目标识别的目标模型大都相对简单.建立一种新的ISAR二维散射点模型,生成目标各种姿态的二维散射点数据库.首先选用3DS为散射点生成模型,以此为基础完成模型简化和信息抽取.然后根据目标姿态变化,计算转换坐标,并以F16战斗机为例生成二维散射点图像.最后采用步进频雷达信号对目标散射点模型进行ISAR成像.所建立的目标二维散射点模型可以用于ISAR成像和目标识别研究.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号