全文获取类型
收费全文 | 1831篇 |
免费 | 66篇 |
国内免费 | 19篇 |
专业分类
1916篇 |
出版年
2025年 | 9篇 |
2024年 | 24篇 |
2023年 | 32篇 |
2022年 | 17篇 |
2021年 | 21篇 |
2020年 | 21篇 |
2019年 | 29篇 |
2018年 | 25篇 |
2017年 | 69篇 |
2016年 | 86篇 |
2015年 | 43篇 |
2014年 | 100篇 |
2013年 | 94篇 |
2012年 | 118篇 |
2011年 | 103篇 |
2010年 | 73篇 |
2009年 | 117篇 |
2008年 | 89篇 |
2007年 | 75篇 |
2006年 | 75篇 |
2005年 | 88篇 |
2004年 | 85篇 |
2003年 | 71篇 |
2002年 | 56篇 |
2001年 | 50篇 |
2000年 | 44篇 |
1999年 | 40篇 |
1998年 | 36篇 |
1997年 | 42篇 |
1996年 | 33篇 |
1995年 | 23篇 |
1994年 | 34篇 |
1993年 | 27篇 |
1992年 | 22篇 |
1991年 | 27篇 |
1990年 | 7篇 |
1989年 | 5篇 |
1988年 | 4篇 |
1987年 | 2篇 |
排序方式: 共有1916条查询结果,搜索用时 0 毫秒
291.
292.
大型飞行器制导与姿态控制联合仿真建模研究 总被引:1,自引:0,他引:1
针对固体火箭发动机、机动发射的大型飞行器的特点 ,提出了建立大姿态情况下全量、全干扰、非线性、时变的制导与姿态控制联合仿真数学模型的一般方法。以某型号固体发动机、机动发射的飞行器为背景 ,在综合考虑了控制系统动态特性和飞行器质心运动、绕质心运动、变质量特性、弹性振动特性、风干扰等因素的情况下 ,建立了飞行器的联合仿真数学模型。进而在面向对象仿真环境下 ,建立了直观、形象、易理想、易扩充的面向对象的飞行器联合仿真模型。仿真结果表明所建联合仿真模型是正确和有效的 相似文献
293.
Doraval Govender 《African Security Review》2013,22(3):291-306
This article is about the management of security incidents in organisations and companies which are under the protection of private security personnel, whether in-house or contracted. Incidents can be defined as accidental or anecdotal (bird flies into a camera) to a violation of law or company policy. Managing security incidents is one of the key functions of a private security service provider. The purpose of this study is to explore the management of security incidents and the information related thereto, identify shortcomings and find solutions for managing these shortcomings. Interviews were used to gain insight from personnel within the private and government sectors which are served by the private security industry. It was found that security incidents are handled in a routine way by organisations from the different sectors. One major shortcoming is that security incidents and the information related thereto are not managed by security service providers according to an operational framework or model with the required infrastructure and resources. The significance of this study is for security incidents to be managed correctly, so that the information related thereto may be captured accurately, analysed and used proactively and reactively to improve physical protection systems, develop preventative strategies and provide actionable information products in order to reduce crime, increase detection rates and prevent losses. 相似文献
294.
295.
Erin D. Dumbacher 《The Nonproliferation Review》2013,20(3-4):203-222
ABSTRACTAn arms race in cyberspace is underway. US and Western government efforts to control this process have largely been limited to deterrence and norm development. This article examines an alternative policy option: arms control. To gauge whether arms-control models offer useful lessons for addressing cyber capabilities, this article compiles a new dataset of predominantly twentieth-century arms-control agreements. It also evaluates two case studies of negotiated agreements that regulate dual-use technologies, the 1928 Geneva Protocol prohibiting chemical- and biological-weapon use and the 1944 Chicago Convention on International Civil Aviation. The analysis underscores the limits of norm development for emerging technologies with both civilian and military applications. It finds lessons for developing verifiable, international cooperation mechanisms for cyberwarfare in the regulatory model of international aviation. Conventionally, arms-control agreements take advantage of transparent tests or estimates of arms. To restrict cyberwarfare activities, experts and policy makers must adapt arms-control models to a difficult-to-measure technology at an advanced stage of development and use. Further investigation of international regulatory schemes for dual-use technology of similar diffusion and development to the internet, such as international civil aviation, is needed. 相似文献
296.
Richard B. White 《The Nonproliferation Review》2014,21(3-4):261-274
The Indian government has not made a public comment about the status of its nuclear weapon program since approving a nuclear doctrine in 2003. However, there is now enough information in the public domain to determine that the command-and-control system for the nuclear program has steadily matured in accordance with the intent of the approved nuclear doctrine. The Indian government has successfully mitigated many of the issues that plague the conventional military. The result is a basic command-and-control system that is focused only on the delivery, if ordered by the prime minister, of nuclear weapons. The system is not as robust as those of the United States and Russia, but is in place and ready as new Indian nuclear weapons enter into operation. The command-and-control system is developing to meet India's needs and political compulsions, but not necessarily as part of a more assertive nuclear policy. 相似文献
297.
298.
针对传统飞行控制律参数单目标优化设计不能同时满足多控制指标要求,且与飞行品质要求缺乏相关性,物理意义不明确等缺点,提出了一种基于改进NSGA-II算法的飞行控制律多目标优化设计方法。在该算法中提出了一种分化进化策略,使得进化搜索过程中染色体群可以自适应分化为数量和构成动态调整的子群,避免了多染色体子群对局部最优区域的重复搜索,维持染色体的多样性,有效抑制了早熟收敛现象发生。最后,使用改进的NSGA-II算法对某型飞机横航向控制律设计进行数值仿真,结果显示提出算法有效提高控制律优化调参效率,结果满足期望的飞行品质要求。 相似文献
299.
无人水下反潜作战平台指挥控制研究 总被引:1,自引:0,他引:1
无人反潜平台的指挥控制问题是关系其作战能力的核心问题之一,它一般包含平台行为控制、自主行为决策控制和支援平台干预控制三个部分。本文探讨了无人反潜平台指挥控制的工作原理,对影响无人反潜平台未来发展方向的指挥控制方面的几个关键问题进行了分析,并指出了今后研究的重点。 相似文献
300.
提出了中段反导指挥控制能力生成的要素基础建设机理、要素集成聚优机理和要素联动涌效机理,构建了中段反导指挥控制能力总体构成框架,并对作战能力具体构成进行了分析,可为反导指挥控制系统建设及作战效能评估提供借鉴。 相似文献