全文获取类型
收费全文 | 247篇 |
免费 | 85篇 |
国内免费 | 29篇 |
出版年
2024年 | 4篇 |
2023年 | 3篇 |
2022年 | 7篇 |
2021年 | 5篇 |
2020年 | 4篇 |
2019年 | 5篇 |
2018年 | 5篇 |
2017年 | 13篇 |
2016年 | 20篇 |
2015年 | 14篇 |
2014年 | 26篇 |
2013年 | 26篇 |
2012年 | 25篇 |
2011年 | 25篇 |
2010年 | 15篇 |
2009年 | 16篇 |
2008年 | 14篇 |
2007年 | 23篇 |
2006年 | 13篇 |
2005年 | 15篇 |
2004年 | 12篇 |
2003年 | 7篇 |
2002年 | 5篇 |
2001年 | 7篇 |
2000年 | 11篇 |
1999年 | 6篇 |
1998年 | 10篇 |
1997年 | 7篇 |
1996年 | 7篇 |
1995年 | 4篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 2篇 |
1990年 | 2篇 |
排序方式: 共有361条查询结果,搜索用时 78 毫秒
111.
112.
针对放大转发协议下双向中继网络移动级联信道,为了分析其统计特征,结合用户完成信息交互的过程,将移动级联信道分解为传输部分和干扰部分两个时间过程。依据它们的双高斯乘积特点,分别给出了对应的一阶概率密度分布、二阶自相关函数和多普勒功率谱的表达式。与此同时,通过采用Gamma分布对级联信道进行了概率近似,得到了描述移动级联信道时变特性的电平通过率和平均衰落时间等指标的近似计算式。借助数值仿真验证了上述表达式的正确性。 相似文献
113.
After the fall of the Berlin Wall, European governments adopted a hands‐off policy towards the defence industrial base, in an attempt to increase the sector’s efficiency and reactivity. In this context, one topical issue is how to motivate defence firms to apply for private rather than public finance. Since banks have no prior experience with European defence firms, a problem of asymmetric information may block this transition. The problem is analysed within the framework of a game between defence firms and banks. It is shown that the Bayesian Equilibrium might correspond to a situation where low‐risk firms prefer the state‐financed scheme; yet, in a perfect information set‐up, the same firms would apply for bank credit. In order to facilitate the transition to private finance, the government might decide to subsidize investors who agree on financing defence firms; the state aid should be made available during a transitory learning period. 相似文献
114.
This paper aims at forecasting the burden on the Greek economy resulting from the arms race against Turkey and at concentrating on the leading determinants of this burden. The military debt and the defence share of GDP are employed alternatively in order to approximate the measurement of the arms race pressure on Greece, and the method used is that of artificial neural networks. The use of a wide variety of explanatory variables in combination with the promising results derived, suggest that the impact on the Greek economy resulting from this arms race is determined, to a large, extent, by demographic factors which strongly favour the Turkish side. Prediction on both miltary debt and defence expenditure exhibited highly satisfactory accuracy, while the estimation of input significance, indicates that variables describing the Turkish side are often dominant over the corresponding Greek ones. 相似文献
115.
Why should deployment affect re‐enlistment? In our model, members enter the military with naïve beliefs about deployment and use actual deployment experience to update their beliefs and revise their expected utility of re‐enlisting. Empirically, re‐enlistment is related to the type and number of deployments, consistent with the learning model. Non‐hostile deployment increases first‐term re‐enlistment but hostile deployment has little effect except for the Army, where the effect is positive. Both types increase second‐term re‐enlistment. Interestingly, first‐term members with dependants tend to respond to deployment like second‐term members. In addition, deployment acts directly to affect re‐enlistment, not indirectly through time to promotion. 相似文献
116.
齐紫微 《军械工程学院学报》2013,(2):66-69
基于复杂网络理论,分析了信息化作战系统网络结构,构建了传统作战系统和信息化作战系统拓扑模型的生成算法,并通过对传统作战系统和信息化作战系统结构拓扑模型度量性质的比较,说明了信息化战争下的作战系统结构特点,为进一步研究网络化战争提供了良好的模型基础. 相似文献
117.
Egle Murauskaite 《The Nonproliferation Review》2013,20(3-4):321-339
ABSTRACTThis article explores the paradox of trust in the largest nuclear smuggling operation involving highly enriched uranium (HEU) discussed in open source literature. In the first effort to understand the type, extent, and role of trust in nuclear smuggling enterprises, it draws from literature on trust development in legitimate businesses as well as criminal enterprises. Observed behavioral patterns in this case challenge traditional notions of the internal dynamics of temporary groups engaged in nuclear smuggling and operational realities of such activities. The article seeks to explain why individuals agree (and continue) to operate in this high-risk environment, unbound by close personal ties, without any effort to verify the background, motives, or qualifications of the fellow conspirators. It offers ways to advance current nonproliferation efforts in non-state actor interdiction by exploiting the environment of shallow trust in temporary groups. 相似文献
118.
摘要:利用泛函微分方程的度理论,研究一类具有时滞的Cohen-Grossberg神经网络的全局分支的存在性,研究结果为该类神经网络的应用设计提供理论基础. 相似文献
119.
Spencer Willardson 《Defense & Security Analysis》2013,29(1):42-53
One aspect of the global “War on Terror” that has received limited coverage in the academic literature is the problem of detained persons as it relates to intelligence. This is a surprising oversight, given the number of detainees that the USA has been responsible for (over 25,000 were in custody in Iraq alone at one time during its peak). The detention environment offers a prime strategic intelligence opportunity for the US intelligence community to study the tactics and organizations of individuals who have been removed from the overall conflict. In this article an easily implemented collection program is recommended to be deployed in US/coalition detention centers. The primary recommendation is to gather relational data on detainee communication, both authorized and illicit, and to use these data to perform network analyses of terrorist groups and their individual members. 相似文献
120.