全文获取类型
收费全文 | 871篇 |
免费 | 77篇 |
国内免费 | 89篇 |
出版年
2024年 | 1篇 |
2023年 | 3篇 |
2022年 | 2篇 |
2021年 | 17篇 |
2020年 | 8篇 |
2019年 | 33篇 |
2018年 | 31篇 |
2017年 | 54篇 |
2016年 | 55篇 |
2015年 | 31篇 |
2014年 | 71篇 |
2013年 | 123篇 |
2012年 | 41篇 |
2011年 | 67篇 |
2010年 | 44篇 |
2009年 | 58篇 |
2008年 | 49篇 |
2007年 | 56篇 |
2006年 | 73篇 |
2005年 | 54篇 |
2004年 | 37篇 |
2003年 | 34篇 |
2002年 | 23篇 |
2001年 | 21篇 |
2000年 | 10篇 |
1999年 | 16篇 |
1998年 | 6篇 |
1997年 | 2篇 |
1995年 | 4篇 |
1994年 | 6篇 |
1993年 | 4篇 |
1990年 | 1篇 |
1989年 | 1篇 |
1988年 | 1篇 |
排序方式: 共有1037条查询结果,搜索用时 15 毫秒
71.
介绍了空气采样早期探测系统的原理,通过将其与常见的常规探测器相比较,充分探讨了不同探测环境下的优越性所在。其中,着重分析了其极早期报警、准确探测火灾、不产生误报的特点。通过对空气采样早期探测系统在国外发展历史的分析,并结合我国的实际情况,认为这种探测方式将在我国得到广泛应用,并会根据我国的国情不断继续发展完善。 相似文献
72.
当前公安现役部队机关在管理方面还不同程度地存在着不到位及越位问题,分析问题产生的原因,提出充分发挥机关管理效能应采取的对策,对机关服务和保障基层建设具有重要意义。 相似文献
73.
针对数字图像版权保护,提出一种非对称鲁棒性盲数字水印方法。通过将水印嵌入到最少受图像改变影响的子空间,使嵌入水印具有鲁棒性,且通过对特征子空间的选取限制,使算法具有较高的检测概率和安全性以及较低的虚警概率。同时,水印嵌入矩阵与提取矩阵不同,它可公开除密钥外的所有其它的信息,而且能实现水印盲提取。实验结果证明了该算法的鲁棒性。 相似文献
74.
75.
基于地空导弹(红方)对空中编队(蓝方)的拦截过程中的薄弱环节以及蓝方对红方实施的电子战措施的分析,对蓝方实施的电子战对红方拦截行动的影响进行了定量评估,得出蓝方突防概率与电子战综合作战效能之间的函数关系。仿真结果表明,对地空导弹拦截的每一环节都可以有效地实施电子战,削弱地空导弹的拦截能力。 相似文献
76.
区域防空导弹反导火力分配研究 总被引:1,自引:0,他引:1
分析了传统防空导弹火力分配模型的不足,考虑到编队内各舰艇近程防空作战能力的不同,结合装备性能特点,建立了基于机会约束规划的区域防空导弹火力分配优化模型。给出了基于遗传算法和BP神经网络的混合智能算法,该算法在精度和速度上均能满足防空作战的要求。 相似文献
77.
78.
79.
Akinbode Fasakin 《African Security Review》2017,26(1):87-108
This study contends that an analysis of the nexus between leadership and security offers useful insights into explaining conflict by stating that the conceptualisation of these argots, especially through the definition of leadership as a process, helps to explain and address Nigeria’s security challenges. By arguing that leaders’ ability to establish mutuality with their followers in any situation and set collectively-generated means for attaining these set goals for societal security, the study shows how such a relationship creates a secured state. This is not the case in Nigeria, where leaders’ security decisions are influenced by external actors rather than by their followers. By showing that the Nigerian ruling elite’s security agendas intersect with dominant global notions of security while neglecting genuine security interests of ordinary Nigerians, the study contextualises the complex global and local security interests in Nigeria. The lack of an intersection at home, however, has contributed to the emergence of extremists such as the Boko Haram sect, as well as the escalation of the acts of violence they perpetrate. As national insecurities become complex and intractable, ‘elegant’ or unilinear solutions – such as a military approach – lack the capacity to address these problems. 相似文献
80.
Ian Westerman 《Defense & Security Analysis》2017,33(3):276-288
The existing guidelines for security sector reform (SSR) tend to draw on theoretical work in the field of civil–military relations, which in turn has been derived from Western, liberal democratic models of governance. Although guidelines strongly advise that local culture and context need to be considered when drawing up objectives for post-conflict SSR programmes, this is not often reflected in practice. This article considers some of the reasons for this, citing both in-country challenges and donor-related issues, and suggests that one of the biggest problems is a lack of alternative, non-orthodox models of civil–military relations to draw upon. It is further suggested that elements of suitable alternative models may be found in states which possess political structures not entirely dissimilar to the Western, liberal democratic ideal, but which can offer different perspectives. Detailed research of these structures should produce a pool of sub-models which could then be employed to create bespoke, culturally appropriate objectives for use in post-conflict SSR programmes. 相似文献