首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   495篇
  免费   202篇
  国内免费   49篇
  2024年   3篇
  2022年   6篇
  2021年   19篇
  2020年   10篇
  2019年   8篇
  2018年   9篇
  2017年   23篇
  2016年   40篇
  2015年   25篇
  2014年   47篇
  2013年   56篇
  2012年   35篇
  2011年   42篇
  2010年   33篇
  2009年   39篇
  2008年   47篇
  2007年   37篇
  2006年   32篇
  2005年   34篇
  2004年   30篇
  2003年   22篇
  2002年   24篇
  2001年   18篇
  2000年   8篇
  1999年   18篇
  1998年   15篇
  1997年   9篇
  1996年   8篇
  1995年   3篇
  1994年   7篇
  1993年   7篇
  1992年   3篇
  1991年   5篇
  1990年   22篇
  1989年   2篇
排序方式: 共有746条查询结果,搜索用时 15 毫秒
611.
航天器姿态控制系统需要特殊的运行环境,在地面很难考核,这给系统可靠性带来一定的风险。针对微纳卫星的特点,设计并研制了一套面向微纳卫星的姿态确定与控制半实物仿真系统。该系统通过数字化模型模拟卫星姿态轨道运动、敏感器模型产生敏感器测量数据、执行器模型生成控制力矩、敏感器模拟器实现通信协议,最终实现姿态控制系统的全系统仿真。这套系统可以接入卫星控制系统回路,实现对姿控系统软件、硬件的考核,同时验证算法的性能。基于该系统,对天拓三号卫星姿控系统进行地面半实物仿真,并对比在轨试验数据,结果表明系统设计合理,仿真结果可信。  相似文献   
612.
众所周知,Vo IP技术在未来语音通信中所占的比重越来越大。随着Vo IP的不断发展,基于SIP协议的Vo IP应用也不断增多。但是,由于SIP协议高度依赖于开放的IP网络,使得其安全性逐渐成为关注和探讨的焦点。主要分析了SIP协议网络面临的一些安全威胁,包括典型的外部攻击技术和协议自身存在的漏洞等。探讨了为应对SIP安全威胁提出的加密、认证等安全策略并且分析了这些安全策略的优缺点,提出了针对SIP安全策略进一步改进的方向,旨在不断提高和完善基于SIP协议的安全性能。  相似文献   
613.
针对无线传感网中高效数据收集和传输的需要,提出了一种基于动态可调簇的能量感知数据收集协议ACEDGP(Adjusted Cluster-based energy-aware Data Gathering Protocol)。该协议初始时根据区域将节点等分成许多簇结构,簇首节点负责簇内部数据的收集和聚合,距离较远的簇通过其他簇首节点的转发实现数据的收集;随着时间的推移和节点能量的减少,ACEDGP能够统计各簇首能量消耗预测簇的通信频次,根据动态调整簇策略选择合适的簇首节点和合并分裂各个相邻的簇,保证各簇首节点簇内数据收集和簇间数据转发的能量平衡。仿真结果表明,与典型的分簇协议相比,ACEDGP能够更好地平衡节点的能耗,获得更长的网络生存期。  相似文献   
614.
In this paper, I critically analyse the doctrine of the Responsibility to Protect (RtoP), as it relates to the responsibility of intervening forces towards the people they claim to protect and the challenges that the situation in Libya now poses in the region and for the African Union (AU). I focus most of my attention on the coercive elements of the RtoP framework (Pillar III). This is the most contested element in the framework. Three questions guide this article: were there legitimate grounds to justify an external intervention in Libya? In the words of Hugh Roberts in Who Said Gaddafi Had to Go, ‘[w]hat if anything has Libya got in exchange for all the death and destruction that have been visited on it’ since 2011? What are the practical implications and consequences of the North Atlantic Treaty Organization (NATO) intervention, led by the United States (US), for regional peace? I discuss the problems surrounding the US–NATO intervention, followed by an analysis of the various positions and narratives leading up to the intervention, the framing and justifications provided for the intervention, and an analysis of the AU's proposal for the resolution of the Libyan crisis. I analyse the various debates that took place in the US (Pentagon/White House), at the United Nations, among scholars in the West and in Africa, and among various actors who tried to broker a ceasefire in Libya before and during the intervention. I conclude with a discussion of the implications for regional peace.  相似文献   
615.
针对舰载火控系统通信需求,提出基于DDS的舰载火控体系结构,实现了系统松耦合,同时满足了实时性要求。通过发布订阅服务的设计,基于默认QoS策略,分别使用内置数据类型和自定义数据类型实现舰载火控系统的发布订阅功能。通过可靠性QoS策略的配置分析其对系统实时性和可靠性的影响。测试结果表明,DDS在舰载火控系统中有广阔的应用前景。  相似文献   
616.
现阶段,国内外应急事件时有发生,如何快速有效地实施应急指挥控制是处置社会公共安全突发事件的核心要求之一。因此,以OODA模型为基础提出了一种基于敏捷性指标的应急指挥控制过程模型和一种基于Lotka?Volterra模型的度量指挥控制敏捷性的数学计算方法,并以地铁突发爆炸事故为背景,对应急指挥控制的敏捷性与指挥控制效果进行了仿真分析和对比。  相似文献   
617.
India and China both have powerful spy networks; completely different in their approaches to espionage; both effective against their perceived enemies. China focuses first on internal threats, on Taiwan and Hong Kong, and then the US and Japan. India’s defense policy focuses on Pakistan and internal terrorist threats, and then on China. In reality, however, when it comes to spying on each other, both China and India suffer from incompetence and apathy – which endangers both their own security and regional stability. This article looks at how they spy on each other, and asks why and how they need to improve. The narrative also touches upon some of the individuals who are waging the spy war, from India’s wily spymaster Ajit Doval down to junior Chinese agents such as Wang Qing and Pema Tsering. The two countries are not friends. They have the largest territorial dispute in the world on their hands, covering an area the size of North Korea, and they have large armies facing each other along 4000 kilometers of frontier. But they also lay claim to the world’s two oldest and richest civilizations, with a rich history of exchange, and now with a combined population of 2.6 billion people and more than a quarter of the world’s economic output. If they cooperated, they could solve many of the world’s problems; but if they lurch into conflict, the potential consequences are terrifying to contemplate. Unfortunately, despite their geographical closeness, they do not know much about each other. They have few cultural interchanges, little diplomacy, few trade missions. They do not watch each other’s films, read each other’s books or listen to each other’s music. Chinese tourists would rather fly to New Zealand for their holidays than cross the border to India, and Indian students would rather study in Europe than China. China and India are neighbors that barely talk to each other. Most significantly, they do not spy on each competently. For countries that do not interact socially, defensive understanding is important for security – but China prefers the glamor of facing up to its Pacific and other maritime rivals such as the US and Japan. India, for its part, does talk a great deal about the China threat, but its resources and expertise are wrapped up in controlling its security threat from Pakistan and the Islamic world. When China and India do try to spy on each other, it is often without the benefit of a long-term focus or understanding. India has some very skilled operatives within the Research and Analysis Wing, but few that specialize in China. China has an enormous pool of resources spread across several government departments, including the Ministry of Public Security, and also has extensive facilities and manpower in the Joint Staff Department of the Central Military Commission (the JSD) and the new Strategic Support Force (the SSF). However, China’s intelligence services generally behave as if India is not worth spying on. Given that the two countries do not have the cultural or political machinery in place to understand each other, espionage and intelligence gathering is vital to ensure that miscalculations do not take place. This has been apparent over the last few years in stand-offs in the Himalaya, as well as top-level suspicions on each side about a variety of subjects including terrorism, covert operations in Sri Lanka and Burma, and the two countries’ nuclear weapons programs. Both countries do occasionally make efforts in espionage against each other, especially during sensitive periods such as the mountain stand-offs of 2014 and 2013 and during policy developments in nuclear warfare. In this article the author looks at actual spying incidents between the two countries, their methodologies, their staff, their technical capabilities, and how the act of spying, which is usually viewed as intrinsically adversarial, can be a force for good. The article relies on interviews with actual participants in intelligence from both countries as well as extensive use of contemporary online sources, and secondary analysis by both military and academic experts from China, India and NATO countries.  相似文献   
618.
从核电站压水堆动力装置在运行中ΔT超温度 /超功率保护功能出发 ,介绍了压水堆ΔT超温度 /超功率保护系统 ,分析了确定极限限制线以及保护区的方法 ,并对此作出了评价 .  相似文献   
619.
Common due date problems have been extensively discussed in the scheduling literature. Initially, these problems discussed finding a common due date for a set of jobs on a single machine. These single machine problems were later extended to finding the common due date on a set of parallel machines. This paper further extends the single machine problem to finding multiple common due dates on a single machine. For a basic and important class of penalty functions, we show that this problem is comparable to the parallel machine problem. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48: 293–298, 2001  相似文献   
620.
A 2‐dimensional rectangular (cylindrical) k‐within‐consecutive‐r × s‐out‐of‐m × n:F system is the rectangular (cylindrical) m × n‐system if the system fails whenever k components in a r × s‐submatrix fail. This paper proposes a recursive algorithm for the reliability of the 2‐dimensional k‐within‐consecutive‐r × s‐out‐m × n:F system, in the rectangular case and the cylindrical case. This algorithm requires min ( O (mkr(n?s)), O (nks(m?r))), and O (mkrn) computing time in the rectangular case and the cylindrical case, respectively. The proposed algorithm will be demonstrated and some numerical examples will be shown. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48: 625–637, 2001.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号