首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   319篇
  免费   106篇
  国内免费   11篇
  2022年   6篇
  2021年   3篇
  2020年   4篇
  2019年   8篇
  2018年   2篇
  2017年   19篇
  2016年   18篇
  2015年   12篇
  2014年   23篇
  2013年   47篇
  2012年   43篇
  2011年   40篇
  2010年   11篇
  2009年   9篇
  2008年   12篇
  2007年   22篇
  2006年   25篇
  2005年   28篇
  2004年   20篇
  2003年   16篇
  2002年   5篇
  2001年   14篇
  2000年   16篇
  1999年   11篇
  1998年   2篇
  1997年   4篇
  1996年   2篇
  1995年   2篇
  1992年   3篇
  1991年   3篇
  1990年   4篇
  1989年   2篇
排序方式: 共有436条查询结果,搜索用时 18 毫秒
421.
Almost all discussions of cyberwarfare, other cyber-attacks, and cyber-espionage have focused entirely on the Internet as the chief means of damage – the Internet as a ‘vector,’ using a term from the theory of infectious diseases. However there are a variety of means, some of which have already been used, that involve cyber-exploitation using vectors other than the Internet. Malware can be installed in the integrated circuits of computers and servers, but also in any devices attached to them – thumb drives, CDs, printers, scanners, and so on. One can also use various forms of electromagnetic radiation at a distance of meters or more to exfiltrate data or to infiltrate corrupt data. I call this large and diverse family of unwanted interference with the functioning of information processing systems other-than-Internet (OTI) attacks on information systems. Stuxnet, and probably the 2007 Israeli corruption of Syrian air defenses, were OTI attacks. Such OTI techniques are more difficult to develop than creating malware, requiring electronic manufacturing facilities or novel technologies, and are thus accessible only to larger corporations and technologically sophisticated countries. Particularly vulnerable would be countries (like the United States and Europe) whose information processing devices are mainly produced outside of the country. Once exploitations via the Internet become harder to perpetrate, OTI exploitations are certain to grow dramatically, eventually requiring equipment for critical uses to be expensively fabricated in (and transported using) secure facilities; expensive detection measures will have to be instituted. This will create challenges for policy, law, and ethics, as well as greatly increasing the cost of many electronic devices.  相似文献   
422.
为检验雷达回波传输质量,完成基于莱斯因子K的混响室电磁环境分级,提出混响室条件下雷达回波传输环境模拟评价参数信杂比S,对比分析莱斯因子K和信杂比S的测量原理.实验结果表明:混响室可用于雷达回波传输环境模拟.  相似文献   
423.
《防务技术》2022,18(10):1895-1913
The cell-type continuous electromagnetic radiation system is a demonstration device capable of generating high-power millimeter electromagnetic waves of a specific wavelength and observing their effects on living organisms. It irradiates a biological sample placed in a 30 × 30 × 50 cm3 cell with electromagnetic waves in the 3.15-mm-wavelength region (with an output of ≥1 W) and analyzes the temperature change of the sample. A vacuum electronic device-based coupled-cavity backward-wave oscillator converts the electron energy of the electron beam into radiofrequency (RF) energy and radiates it to the target through an antenna, increasing the temperature through the absorption of RF energy in the skin. The system causes pain and ultimately reduces combat power. A cell-type continuous electromagnetic radiation system consisting of four parts—an electromagnetic-wave generator, a high-voltage power supply, a test cell, and a system controller—generates an RF signal of ≥1 W in a continuous waveform at a 95-GHz center frequency, as well as a chemical solution with a dielectric constant similar to that of the skin of a living organism. An increase of 5 °C lasting approximately 10 s was confirmed through an experiment.  相似文献   
424.
US nuclear deterrence and arms control policy may be moving, by design and by inadvertence, toward a posture of strategic “defensivism”. Strategic “defensivism” emphasizes the overlapping and reinforcing impact of: (1) reductions in US, Russian and possibly other strategic nuclear forces, possibly down to the level of “minimum deterrence,” (2) deployment of improved strategic and/or theater antimissile defenses for the US, NATO allies and other partners; and (3) additional reliance on conventional military forces for some missions hitherto preferentially assigned to nuclear weapons. This article deals with the first two of these aspects only: the interaction between missile defenses and offensive force reductions in US–Russian strategy and policy. The findings are that stable deterrence as between the USA and Russia is possible at lower than New Strategic Arms Reduction Treaty levels, but reductions below 1000 deployed long-range weapons for each state, toward a true minimum deterrent posture, will require multilateral as opposed to bilateral coordination of arms limitations. Missile defenses might provide some denial capability against light attacks by states with small arsenals, but they still fall short of meaningful damage limitation as between powers capable of massive nuclear strikes.  相似文献   
425.
针对非线性观测条件下的机动目标跟踪问题,基于机动目标的协同转弯(CT)模型,采用无迹卡尔曼滤波(UKF)方法和自适应网格(AG)的模型集自适应策略,研究了一种变结构交互式多模型算法,即:基于UKF的自适应网格交互式多模型(UKF-AGIMM)算法。对二维机动目标跟踪的仿真结果表明,本算法与相应的固定结构交互式多模型算法相比,可以解决固定结构多模型算法存在的问题,有效提高多模型算法的精度和费效比,缩短计算时间,且适合工程应用  相似文献   
426.
提出了四站时差定位无源雷达系统的探测威力模型及覆盖度指数评估模型,分析了系统在实际部署应用中面临的辅站站址的选择、主辅站高度优化配置等问题.论述了系统在实际运行中可能出现2种故障模式,并定量仿真分析了目标位置变化对辅站故障时系统探测能力的影响.分析方法及所得结论对系统的实际部署使用具有理论指导意义,且可作为一种实用方法用于具体部署优化决策.  相似文献   
427.
防空反导一体化雷达是新时期解决隐身飞机、弹道导弹威胁的主要手段,通过研究国外防空反导一体化雷达的发展状况,总结出防空反导一体化雷达的性能需求以及技术发展趋势,并为我国防空反导一体化多功能雷达系统的发展提出部分建议.  相似文献   
428.
对高斯信道下LDPC(Low-Density Parity-Check)码的传统的译码算法进行分析,指出影响收敛速度的原因,并提出了一种基于整数运算的加速收敛的LDPC码译码算法。该算法融合分层译码(Layered Belief Propagation)算法、带偏移量的最小和算法(Offset Min-Sum)以及量化的优势。仿真验证表明该算法有效地减少了译码复杂度,加速了译码收敛,且性能上同传统的量化最小和算法相比没有下降。  相似文献   
429.
防空导弹末段拦截弹道导弹的作战效能与防空导弹火力单元的部署位置密切相关,合理的战斗部署是成功反导的前提和关键.分析了防空导弹末段反导的条件和反导防御区,在此基础上探讨了防空导弹反导杀伤区纵深和相关射击诸元的算法.然后,使用末段低层和末段高层反导火力单元组成双层防御系统,对防御从一个方向和从扇区来袭弹道导弹的反导火力单元部署位置确定模型进行了研究.研究成果对防空导弹末段反导的作战使用具有参考价值.  相似文献   
430.
对双基地制导雷达距离解算精度进行系统仿真,针对在基线附近无法高精度定位的问题,介绍了利用多站距离信息数据融合算法。通过多站定位和数据融合,仿真结果表明这种优化算法可获得较高的距离解算精度,很大程度上提高了基线附近距离定位精度,提高了系统的定位性能和抗干扰能力。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号