首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   784篇
  免费   195篇
  国内免费   60篇
  2024年   2篇
  2023年   2篇
  2022年   5篇
  2021年   28篇
  2020年   17篇
  2019年   10篇
  2018年   18篇
  2017年   40篇
  2016年   42篇
  2015年   20篇
  2014年   53篇
  2013年   79篇
  2012年   48篇
  2011年   46篇
  2010年   40篇
  2009年   46篇
  2008年   47篇
  2007年   45篇
  2006年   60篇
  2005年   67篇
  2004年   47篇
  2003年   44篇
  2002年   35篇
  2001年   28篇
  2000年   24篇
  1999年   28篇
  1998年   24篇
  1997年   15篇
  1996年   12篇
  1995年   13篇
  1994年   9篇
  1993年   9篇
  1992年   7篇
  1991年   6篇
  1990年   20篇
  1989年   3篇
排序方式: 共有1039条查询结果,搜索用时 15 毫秒
991.
针对舰载火控系统通信需求,提出基于DDS的舰载火控体系结构,实现了系统松耦合,同时满足了实时性要求。通过发布订阅服务的设计,基于默认QoS策略,分别使用内置数据类型和自定义数据类型实现舰载火控系统的发布订阅功能。通过可靠性QoS策略的配置分析其对系统实时性和可靠性的影响。测试结果表明,DDS在舰载火控系统中有广阔的应用前景。  相似文献   
992.
This second part of the review article begins with a definition of military power, when and how it should be used. From a large number of authors, “moral forces” are linked to “codes of conduct”, and the fundamental understandings about the “profession of arms”, based on “fiduciary trust”, “covenanted” service and professional and personal “conscience”. The article covers what authors have written about “culture” and the ethics of “technology” devices and systems, including “cyber” warfare. It concludes with recognition of the increase in ethical sensitivity in this century which is characterized by a phenomenon, the crises of “identity”, personal, national and global.  相似文献   
993.
India and China both have powerful spy networks; completely different in their approaches to espionage; both effective against their perceived enemies. China focuses first on internal threats, on Taiwan and Hong Kong, and then the US and Japan. India’s defense policy focuses on Pakistan and internal terrorist threats, and then on China. In reality, however, when it comes to spying on each other, both China and India suffer from incompetence and apathy – which endangers both their own security and regional stability. This article looks at how they spy on each other, and asks why and how they need to improve. The narrative also touches upon some of the individuals who are waging the spy war, from India’s wily spymaster Ajit Doval down to junior Chinese agents such as Wang Qing and Pema Tsering. The two countries are not friends. They have the largest territorial dispute in the world on their hands, covering an area the size of North Korea, and they have large armies facing each other along 4000 kilometers of frontier. But they also lay claim to the world’s two oldest and richest civilizations, with a rich history of exchange, and now with a combined population of 2.6 billion people and more than a quarter of the world’s economic output. If they cooperated, they could solve many of the world’s problems; but if they lurch into conflict, the potential consequences are terrifying to contemplate. Unfortunately, despite their geographical closeness, they do not know much about each other. They have few cultural interchanges, little diplomacy, few trade missions. They do not watch each other’s films, read each other’s books or listen to each other’s music. Chinese tourists would rather fly to New Zealand for their holidays than cross the border to India, and Indian students would rather study in Europe than China. China and India are neighbors that barely talk to each other. Most significantly, they do not spy on each competently. For countries that do not interact socially, defensive understanding is important for security – but China prefers the glamor of facing up to its Pacific and other maritime rivals such as the US and Japan. India, for its part, does talk a great deal about the China threat, but its resources and expertise are wrapped up in controlling its security threat from Pakistan and the Islamic world. When China and India do try to spy on each other, it is often without the benefit of a long-term focus or understanding. India has some very skilled operatives within the Research and Analysis Wing, but few that specialize in China. China has an enormous pool of resources spread across several government departments, including the Ministry of Public Security, and also has extensive facilities and manpower in the Joint Staff Department of the Central Military Commission (the JSD) and the new Strategic Support Force (the SSF). However, China’s intelligence services generally behave as if India is not worth spying on. Given that the two countries do not have the cultural or political machinery in place to understand each other, espionage and intelligence gathering is vital to ensure that miscalculations do not take place. This has been apparent over the last few years in stand-offs in the Himalaya, as well as top-level suspicions on each side about a variety of subjects including terrorism, covert operations in Sri Lanka and Burma, and the two countries’ nuclear weapons programs. Both countries do occasionally make efforts in espionage against each other, especially during sensitive periods such as the mountain stand-offs of 2014 and 2013 and during policy developments in nuclear warfare. In this article the author looks at actual spying incidents between the two countries, their methodologies, their staff, their technical capabilities, and how the act of spying, which is usually viewed as intrinsically adversarial, can be a force for good. The article relies on interviews with actual participants in intelligence from both countries as well as extensive use of contemporary online sources, and secondary analysis by both military and academic experts from China, India and NATO countries.  相似文献   
994.
对几种类型的碳纤维在Cf/SiC复合材料制备工艺中的先驱体中氧含量及高温热处理和PCS浸渍裂解处理过程中造成的损伤进行了考察,并探讨了损伤机制.结果表明,碳纤维石墨化程度和表面状态的差别会对其在复合材料制备过程中的损伤程度产生影响.石墨化程度高的M40JB碳纤维损伤程度较大;表面呈活性的JC1#碳纤维对外界条件的变化较为敏感;而石墨化程度不高而表面不活泼的JC2#碳纤维则损伤程度较小且较稳定.  相似文献   
995.
为了适应嵌入式定制微处理器的开发的需要 ,克服现有微处理器仿真工具的某些不足 ,文中介绍了微处理器的仿真验证工具———VCPU的设计和实现方法。同其它微处理器仿真工具相比 ,该工具具有多层次 ,可配置 ,功能全面的特点。利用该工具 ,设计者可在设计早期进行系统集成验证 ,缩短设计周期并减少设计错误。该工具已经在嵌入式微处理器开发过程中得到成功应用  相似文献   
996.
介绍了某型车载机动式导弹火控系统的主要功能、基本组成和总体方案,并综合运用单片机技术、分布式测试技术、数字传输技术、标准总线技术等对其主要设备进行了设计,指出了火控系统的主要技术特点。本系统已装备部队,经部队使用和实弹打靶证明,性能良好。  相似文献   
997.
根据化学危险品事故的特点及消防部队的装备配备情况 ,提出了一整套化学危险品事故抢险救援的程序 ,并介绍了处置过程中的关键技术。  相似文献   
998.
网络安全与防火墙技术   总被引:1,自引:0,他引:1  
介绍了防火墙技术的概念、几种防大墙实现技术的原理、防火墙的配置及安全措施.  相似文献   
999.
介绍了一种双正激电路的软开关拓扑,分析了其软开关的工作原理,推导了实现软开关的关键技术参数的计算公式并采用该技术开发了1.8kW的充电电源。  相似文献   
1000.
应用AVERLOGIC公司最新研制的平板显示控制器AL300,实现了便携式火炮测径窥膛仪的火炮直径数据采集、炮膛视频图像转换与显示系统设计。该系统以微处理器AT89C52为控制核心,利用AL300控制液晶显示屏,同时显示炮膛视频图像和直径测量数据。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号