全文获取类型
收费全文 | 230篇 |
免费 | 100篇 |
国内免费 | 25篇 |
出版年
2022年 | 7篇 |
2021年 | 11篇 |
2020年 | 4篇 |
2019年 | 1篇 |
2018年 | 5篇 |
2017年 | 4篇 |
2016年 | 20篇 |
2015年 | 18篇 |
2014年 | 22篇 |
2013年 | 27篇 |
2012年 | 21篇 |
2011年 | 17篇 |
2010年 | 20篇 |
2009年 | 17篇 |
2008年 | 15篇 |
2007年 | 10篇 |
2006年 | 15篇 |
2005年 | 13篇 |
2004年 | 21篇 |
2003年 | 9篇 |
2002年 | 11篇 |
2001年 | 14篇 |
2000年 | 10篇 |
1999年 | 9篇 |
1998年 | 8篇 |
1997年 | 5篇 |
1996年 | 6篇 |
1995年 | 2篇 |
1994年 | 5篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 4篇 |
排序方式: 共有355条查询结果,搜索用时 15 毫秒
111.
张震 《武警工程学院学报》2014,(2):56-58
Web服务基于一系列开放的标准技术,具有松散耦合、语言中立、平台无关、互操作性的优点。近年来,在武警部队信息化建设中,很多平台都构建了Web服务。但由于Web服务的各个平台对WS—Security规范的支持不统一,这就为全部队涉及不同业务部门的异构平台web服务的安全交互带来了问题。通过分析NET和Axis2Web服务平台对WS—Security规范的支持,提出一个方案来解决多个异构Web服务平台之间的安全交互问题,最后通过实验证明了该方案的可行性。 相似文献
112.
测距精度是评估卫星自主完好性监测接收机在导航信号畸变环境下工作性能的一个重要指标。推导了卫星自主完好性监测接收机在国际民航组织二阶阶跃畸变模型下采用早晚相干跟踪处理时测距精度与畸变模型参数的解析表达式,理论分析和仿真结果表明数字畸变将导致接收机伪码鉴相器输出曲线存在过零点偏差,数字畸变量基本不影响接收机测距方差;模拟畸变将扭曲相关峰函数和鉴相器输出曲线,但鉴相器输出基本上不存在过零点偏差,模拟畸变参数、前端滤波器带宽和早晚码间距共同影响接收机的测距方差。 相似文献
113.
为了解决三维矢量场可视化中流线数量过多造成的遮挡与视觉混乱问题,同时保证流线能够准确描述矢量场变化规律与重要特征,提出了一种基于特征保持的视点相关三维矢量场流线简化方法。采用粒子跟踪生成3D矢量场流线集,并进行视点相关映射;对流线集进行特征保持计算;基于流线视觉效果度量对流线集进行迭代简化计算,从而实现流线集的有效简化。实验结果表明,能够有效保持矢量场的物理特征,且具有较好的流线视觉效果。 相似文献
114.
Eduardo Morales-Ramos 《Defence and Peace Economics》2013,24(5):365-383
The impact of defence expenditure on the economy has been widely studied through different types of models. However, the results from these studies have not reached definitive conclusions, and have left a gap in the analysis of the impact of defence R&D expenditure at the economy level. Defence R&D has specific characteristics, which lead to market failures: public good, high risk and uncertainty, national security. Also, defence R&D creates two types of externalities: negative (crowding-out), and positive (spin-off). Crowding-out is the major economic debate about defence R&D. This paper analyses the crowding-out hypothesis by applying three types of models for the UK case: supply, demand, and demand-supply models. From these three models the most reliable is chosen and applied to the individual cases of France, Germany, Japan and USA. The paper also reports the results for the pooled data of these five countries, and for four error component models. The results from estimating such models shed light on the defence R&D crowding-out hypothesis. 相似文献
115.
ON THE CHOICE OF MULTI-TASK R&D DEFENSE PROJECTS: A CASE STUDY OF The ISRAELI MISSILE DEFENSE SYSTEM
Investments in R&D constitute a major share of the expenditures of the hi-tech industry since, generally, they enable firms to successfully compete in the rapidly and constantly changing markets for hi-tech products and services. The role of R&D projects is particularly important in the areas of defense and homeland security due to the nature of warfare and the continuous threats posed by arms races and by terror organizations. This study analyzes the choice of the R&D projects designed to counter multiple related military threats. It develops the methodology required to assess whether it is preferable to develop one project to thwart several related threats, or several distinct projects, each of which provides an answer to one specific threat or a partial set of the threats. An analytic solution is provided and assessed for two simple models with two related threats. A solution of the model is then provided for any number of related threats, using a dynamic programming methodology. Finally, we demonstrate the usefulness of our model and methodology to Israel’s missile defense problem; that is, we show how to optimally develop systems aimed at thwarting the multiple threats of short-, medium-, and long-range missiles. 相似文献
116.
ANDILE SOKOMANI 《African Security Review》2013,22(4):81-90
“Lack of money is the root of all evil” George Bernard Shaw In a environment where party financing, private funding in particular, is generally a laissez-faire business, as in most Southern African countries, there is the real risk that interest groups and wealthy individuals will buy influence in political parties and in so doing erode public confidence in the political system. Because they are neither open to public scrutiny nor subject to any legislative restraints, huge private donations can, and often do, come with strings attached. This lack of transparency and openness, as well as mechanisms to prevent it, provides ample ground for influence peddling, where those who pay the piper call the tune. Left unchecked, this party funding scenario will continue to be a serious indictment of the region's democratisation projects, crippling democracy and stunting economic development. This article consid 相似文献
117.
针对云重心和云模型评判方法存在的信息丢失、难于评判以及信息扭曲等问题,从确定权重等级、评价集和评价结果3个方面对模型进行了改进和完善.应用二元语义确定指标权重,避免了评价信息的丢失和扭曲,采用综合云的思想确定评价集,充分利用评价者给出的信息,简化相似云的理论来定量衡量评价结果,从而建立了基于云理论一二元语义的雷达装备保障指挥效能评估模型. 相似文献
118.
119.
120.
末段反导指控与作战管理(Command,Control and Battle Manangement,C2BM)系统是末段反导系统的指挥控制中心.在系统分析末段反导系统的组成及末段反导C2BM系统工作过程的基础上,初步探讨了基于DoDAF(Department of Defense Architecture Framework)的末段反导C2BM系统需求分析方法和步骤,建立了末段反导C2BM系统的作战视图,对末段反导C2BM系统的体系结构及其信息交互进行了深入分析和可视化建模,保证了对末段反导C2BM系统需求理解的一致性,有效促进了军事人员与分析设计人员间的沟通和交流,为后续的开发夯实坚实的基础. 相似文献