首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   203篇
  免费   64篇
  国内免费   22篇
  2022年   3篇
  2021年   7篇
  2020年   3篇
  2019年   4篇
  2018年   6篇
  2017年   9篇
  2016年   23篇
  2015年   13篇
  2014年   23篇
  2013年   31篇
  2012年   17篇
  2011年   16篇
  2010年   20篇
  2009年   8篇
  2008年   12篇
  2007年   10篇
  2006年   14篇
  2005年   7篇
  2004年   15篇
  2003年   6篇
  2002年   8篇
  2001年   6篇
  2000年   2篇
  1999年   6篇
  1998年   3篇
  1997年   5篇
  1996年   4篇
  1995年   1篇
  1994年   2篇
  1992年   1篇
  1991年   1篇
  1990年   3篇
排序方式: 共有289条查询结果,搜索用时 594 毫秒
71.
Among the multiple dimensions of the tous azimuths modernisation of Chinese naval forces, the development of China’s anti-access capacity has recently elicited considerable interest. The important link between this capacity and an overarching vision of the use of force – i.e. a naval doctrine – has, however, often been left implicit. This article shows that the particular development of China’s naval anti-access forces – more precisely, forces with an impact on the naval balance – can be explained by a shift of China’s naval doctrine towards a distinctly pre-emptive posture, which, itself, stems from the set of constraints imposed by the framework of ‘local war under informationised conditions’.  相似文献   
72.
There is a growing view that the emerging brand of Chinese regional diplomacy in recent years is increasingly assertive. This article attempts to make better sense of this perceived more forceful Chinese diplomacy. It argues that Chinese regional behavior is more profitably understood through the lens of a two-pronged foreign policy strategy that combines two particular aspects. One is a tougher and more uncompromising approach toward issues that China regards as concerning its core interests. The other is a more flexible and cooperative position toward interests that, while significant, are of secondary importance.  相似文献   
73.
二维离散余弦/反余弦变换是图像处理算法的核心。基于DSP处理器或软件实现速度较低,以及ASIC实现芯片的面积和功耗都较大,本文研究了一种基于行列分解结构的二维DCT/IDCT变换,在两级一维DCT/IDCT变换之间插入双RAM结构,通过乒乓操作保证了前后级DCT/IDCT运算的并行性,提高了运算速度。电路结构在QuartusII中进行了逻辑综合,通过Modelsim编写激励对逻辑功能进行了仿真验证,并将仿真结果与Mat—lab仿真结果进行了比较。结果表明该模块功能正确,能够为图像处理提供良好的处理性能。  相似文献   
74.
Web服务基于一系列开放的标准技术,具有松散耦合、语言中立、平台无关、互操作性的优点。近年来,在武警部队信息化建设中,很多平台都构建了Web服务。但由于Web服务的各个平台对WS—Security规范的支持不统一,这就为全部队涉及不同业务部门的异构平台web服务的安全交互带来了问题。通过分析NET和Axis2Web服务平台对WS—Security规范的支持,提出一个方案来解决多个异构Web服务平台之间的安全交互问题,最后通过实验证明了该方案的可行性。  相似文献   
75.
测距精度是评估卫星自主完好性监测接收机在导航信号畸变环境下工作性能的一个重要指标。推导了卫星自主完好性监测接收机在国际民航组织二阶阶跃畸变模型下采用早晚相干跟踪处理时测距精度与畸变模型参数的解析表达式,理论分析和仿真结果表明数字畸变将导致接收机伪码鉴相器输出曲线存在过零点偏差,数字畸变量基本不影响接收机测距方差;模拟畸变将扭曲相关峰函数和鉴相器输出曲线,但鉴相器输出基本上不存在过零点偏差,模拟畸变参数、前端滤波器带宽和早晚码间距共同影响接收机的测距方差。  相似文献   
76.
The UN asks governments to report key figures of their annual military budgets with the aim of creating trust among member states. This goal can only be achieved if the data reported is accurate. However, although there are many reasons for governments to falsify data, the UN does not check for manipulation. In this paper, we apply Benford’s law to the military expenditure data of 27 states taken from the UN register. Our analysis of the first digits shows that the states with the greatest deviations from the expected Benford distribution and therefore the lowest data quality are the USA and the UK.  相似文献   
77.
“Lack of money is the root of all evil”

George Bernard Shaw

In a environment where party financing, private funding in particular, is generally a laissez-faire business, as in most Southern African countries, there is the real risk that interest groups and wealthy individuals will buy influence in political parties and in so doing erode public confidence in the political system. Because they are neither open to public scrutiny nor subject to any legislative restraints, huge private donations can, and often do, come with strings attached. This lack of transparency and openness, as well as mechanisms to prevent it, provides ample ground for influence peddling, where those who pay the piper call the tune. Left unchecked, this party funding scenario will continue to be a serious indictment of the region's democratisation projects, crippling democracy and stunting economic development. This article consid  相似文献   
78.
According to the International Committee of the Red Cross (ICRC) publication Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law, all civilians (including child soldiers) lose their immunity from direct targeting ‘for so long as’ their actions amount to direct participation in hostilities. All civilians can, however, access the revolving door of protection and return to their civilian activities – complete with full immunity from direct targeting – provided the nature of their direct participation was spontaneous and disorganised. Once it can be ascertained that their participation in hostilities amounts to continuous combative functions, they relinquish their access to the revolving door of protection, and can be targeted at all times until they abandon their formal or functional membership of the belligerent group. This piece analyses how the revolving door phenomenon and the notion of continuous combative functions apply in instances where civilian child soldiers are directly participating in hostilities.  相似文献   
79.
针对云重心和云模型评判方法存在的信息丢失、难于评判以及信息扭曲等问题,从确定权重等级、评价集和评价结果3个方面对模型进行了改进和完善.应用二元语义确定指标权重,避免了评价信息的丢失和扭曲,采用综合云的思想确定评价集,充分利用评价者给出的信息,简化相似云的理论来定量衡量评价结果,从而建立了基于云理论一二元语义的雷达装备保障指挥效能评估模型.  相似文献   
80.
一体化联合作战参战军兵种多、指挥控制(C2)与协调复杂。围绕炮兵行动特点要求,运用系统动力学理论建立联合作战炮兵行动指挥控制的系统动力学模型,研究常规打击和基于效果作战两种指挥控制模式下炮兵行动所产生的不同结果及其原因,并给合作战想定仿真验证,得出较为可靠的结论,为解决联合作战炮兵行动精确指挥控制与协调提供一种有效途径  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号