首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1556篇
  免费   554篇
  国内免费   142篇
  2024年   2篇
  2023年   16篇
  2022年   20篇
  2021年   38篇
  2020年   44篇
  2019年   27篇
  2018年   17篇
  2017年   108篇
  2016年   108篇
  2015年   80篇
  2014年   107篇
  2013年   157篇
  2012年   182篇
  2011年   177篇
  2010年   82篇
  2009年   112篇
  2008年   88篇
  2007年   120篇
  2006年   122篇
  2005年   117篇
  2004年   104篇
  2003年   84篇
  2002年   58篇
  2001年   59篇
  2000年   54篇
  1999年   33篇
  1998年   19篇
  1997年   23篇
  1996年   21篇
  1995年   13篇
  1994年   10篇
  1993年   11篇
  1992年   10篇
  1991年   7篇
  1990年   16篇
  1989年   6篇
排序方式: 共有2252条查询结果,搜索用时 15 毫秒
931.
基于熵的空中目标识别模型及应用   总被引:12,自引:0,他引:12  
空中目标识别是现代防空作战的重要研究内容。研究根据不同类型的目标产生不同的辐射和不同的雷达回波信号对目标进行识别。提出利用熵理论来处理目标识别问题,采用层次分析法与熵权的组合来确定指标的权重。仿真实例表明,基于熵的识别是一种运算简单,结果可靠的目标识别算法。  相似文献   
932.
S-Box是现行分组密码中唯一的非线性部件,主要提供了分组密码算法中必需的混淆作用,其密码强度决定了整个分组密码的安全强度。为进一步提高S-Box的强度,结合离散混沌系统的内在随机性、有界性、非周期性及对初始条件和参数极度敏感等特点,提出一种采用多混沌映射和交叉映射生成S-Box的生成算法。实验分析表明,该算法生成的样本密钥敏感性强,随机性好,既能较好地满足S-Box设计所要求的各项准则和特性,安全性高,同时又能降低计算复杂度,提高计算速度,且易于生成和扩展,因而是一种性能良好的S-Box候选算法。  相似文献   
933.
基于动网格的翼型设计优化   总被引:1,自引:0,他引:1       下载免费PDF全文
针对传统基于代理模型的翼型优化的缺陷,提出采用基于动网格的翼型优化;针对基本Hicks-Henne方法后缘不光滑情况进行了改进;采用自编程序实现动网格生成,通过集成商业软件Pointwise和CFD计算软件Fluent完成边界条件生成和流场解算,并实现上述程序和软件间的数据交互和自动化,整个优化流程在iSIGHT平台下执行,优化算例表明基于动网格的翼型优化方法能大幅提高翼型性能,节省大量的重复性操作,增加优化结果的鲁棒性和可信度,是翼型优化中的一种有效方法。  相似文献   
934.
This article will seek to provide a detailed examination of the IRA's operational intelligence methodologies. Providing not only a lengthy discussion on the organization's intelligence collection protocols, it will also examine the interplay between intelligence and IRA decision-making. It will be contended that intelligence's influence resided in its ability to introduce a strong element of predictability into the IRA's decision-making process. This depended on an ability to construct a detailed intelligence picture of the target and its geographical milieu so as to minimize the likelihood of volunteers encountering unforeseen circumstances that could adversely affect planned or anticipated outcomes.  相似文献   
935.
US military operations are increasingly conducted within urban environments and with these operations come the risk of increasing the number of civilian casualties and infrastructure damage. The use of non-lethal weaponry, such as directed-energy weapons, is one method for minimizing collateral damage. This method enables US military forces to effectively fight within urban environments through force escalation capabilities. Using a series of historical examples and future scenarios for urban warfare, this article highlights deficiencies affecting military capabilities in military urban operations, addresses the consequences of collateral damage, assesses the effectiveness of directed-energy weapons in military urban operations and encourages further funding, research and integration of non-lethal weaponry, such as directed-energy weapons, within the US military.  相似文献   
936.
Insurgencies in the Northeast of India have been a recurring phenomenon since India's independence in 1947. One of the most significant aspects of the multiple insurgencies has been the use of violence for political goals. By drawing upon three cases of insurgencies in Northeast India, the article offers a conceptual framework on escalation and de-escalation of violence in insurgencies. The article argues that the most critical variables which have a direct bearing on the levels of insurgent violence are: popular support, loss of legitimacy and the state's counter-response.  相似文献   
937.
By any objective measure, defense institutions in Central and Eastern Europe have all but universally been incapable of producing viable defense plans that are based on objective costing and operational planning data. This situation exists in spite the provision of considerable Western advice and assistance, let alone reporting to and receiving assessments by NATO’s International Staff under Partnership for Peace, as well as via the integrated defense planning and reporting systems. An explanation for this systematic failure across European post-Communist defense institutions can be found in the continued slow development of an over-arching policy framework which directs and approves all activities of the armed forces, as well as the de-centralization of financial decision-making down to capability providers. The essay ends with an examination of the adverse effects of the early introduction of planning programming, budgeting system (PPBS), have had on the development of effective policy and planning capabilities within these defense institutions.  相似文献   
938.
在可视卫星数少于4颗、无法进行传统导航解算的恶劣环境下,导航接收机可利用外部高程气压计提供的高程或者内部守时模块的钟差等信息进行应急辅助定位。在该应急辅助定位工作模式的误差分析中,传统导航定位误差传递模型无法适用。针对此问题,本文在研究三星结合高程、三星结合钟差、双星结合高程钟差等几种应急辅助定位原理的基础上,给出了新的应急辅助定位误差传递的分析模型,利用仿真算例验证了该模型的正确性。最后通过对定位精度的分析,说明根据卫星分布特点可以按照本文方法量化得到伪距测量与辅助信息的精度的最优数量级关系,可以用最小代价实现定位精度的提升。该结论可指导接收机外部辅助器件的选择。  相似文献   
939.
采用MSC.Patran参数化建模和遗传算法进行包带式星箭连接结构优化设计。首先给出了包带连接结构二维轴对称模型优化设计过程中涉及的V形卡块刚度等效、包带预紧力模拟和载荷施加方法,以及强度和刚度约束条件、优化目标等内容;然后以某直径为3m的包带连接结构为例进行了优化设计,并分析了对接框内延伸段长度和端头高度对应力及变形的影响;最后建立三维有限元模型进行静力分析。结果表明(1)该方法适用于包带连接结构的优化设计;(2)增加对接框内延伸段长度和端头高度能够提高整体连接刚度;(3)三维有限元模型与轴对称模型计算结果一致,验证了轴对称模型分析方法的正确性,以及V形卡块等效和预紧力模拟方法的有效性。  相似文献   
940.
ABSTRACT

Decade-long security cooperation and counterterrorism engagements in Nigeria have failed to bring down Boko Haram or at least weaken its terrorist structures and transnational spread. I argue that disconnects between counterterrorism-assistance seeking states and their superpower sponsors are implicated in the intractability of Boko Haram's insurgency in Nigeria. Why is the U.S. counterterrorism intervention to individual MNJTF countries (i.e. troop contribution, military funding and intelligence support) ‘lopsided’, ‘fragmented’ and ‘unevenly distributed;’ and how are these implicated in the fight against Boko Haram terrorism? This has impacted negatively on MNJTF countries – lack of cooperation, divisiveness and individualism in coordinating and forging offensives against Boko Haram. These concerns interface several blind spots in the picture of external influences on military’s approach to Boko Haram. I elicit primary data from top military officers. I conclude by predicting the implications and consequences of these counterterrorism complexities, and their potency to defeat or encourage Boko Haram terror.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号