全文获取类型
收费全文 | 1442篇 |
免费 | 337篇 |
国内免费 | 169篇 |
出版年
2024年 | 1篇 |
2022年 | 14篇 |
2021年 | 21篇 |
2020年 | 20篇 |
2019年 | 14篇 |
2018年 | 16篇 |
2017年 | 75篇 |
2016年 | 77篇 |
2015年 | 65篇 |
2014年 | 92篇 |
2013年 | 148篇 |
2012年 | 163篇 |
2011年 | 188篇 |
2010年 | 61篇 |
2009年 | 82篇 |
2008年 | 68篇 |
2007年 | 118篇 |
2006年 | 126篇 |
2005年 | 108篇 |
2004年 | 107篇 |
2003年 | 84篇 |
2002年 | 56篇 |
2001年 | 62篇 |
2000年 | 59篇 |
1999年 | 39篇 |
1998年 | 13篇 |
1997年 | 14篇 |
1996年 | 14篇 |
1995年 | 5篇 |
1994年 | 3篇 |
1993年 | 5篇 |
1992年 | 10篇 |
1991年 | 8篇 |
1990年 | 8篇 |
1989年 | 4篇 |
排序方式: 共有1948条查询结果,搜索用时 15 毫秒
861.
介绍了国外导弹防御系统研制和部署过程中所考虑的进攻方可能采取的几种典型对抗措施,研究分析了对抗导弹防御系统的基本方法、技术和策略。通过使用大量诱饵或假目标、减弱弹头的雷达信号特征或红外特征、隐藏弹头的真实位置,以及进行弹头机动等一种或多种组合的对抗措施,可以有效对付那些使用外大气层碰撞杀伤拦截器的导弹防御系统。 相似文献
862.
863.
以中继卫星(Racking and Data Relay Satellite,TDRS)为研究对象,以有色Petri网(Colored Petri Net,CPN)为数学工具,根据自顶向下的原则和层次化建模思想,提出一种基于CPN的TDRS操作规划模型,该模型分为顶层模型、控制模型、前向链路数据接收任务与发送任务的操作规划模型和返向链路数据接收任务与发送任务的操作规划模型,有效地描述了TDRS的动态行为特性。最后,通过仿真实验得到了TDRS操作规划方案,验证了所建模型的有效性。与PDDL模型比较分析表明:所建模型可以有效引入TDRS的领域知识,能够有效提高求解效率。所建模型可以为TDRS操作规划方案的制定提供理论参考。 相似文献
864.
865.
866.
867.
868.
869.
Garrett Grochowski 《Defense & Security Analysis》2015,31(2):152-158
The USA is currently facing an increasingly diverse range of threats, including non-state actors, particularly violent extremist organizations attempting to do harm. The national leadership has made it clear that for the near future it will employ Special Operations Forces (SOF) as the tool of choice in short-duration, high-intensity operations that have more in common with the battle of Takur Ghar, than those with a larger footprint. It is critical then that the lessons of the past are learnt now and are applied before employing SOF in the future. This becomes especially important given the short lead-time in concert with the short-duration/high-intensity tempo of their operations. In the Battle of Takur Ghar, during Operation Anaconda, rigid adherence to the joint functions, especially clearer and more robust Command and Control (C2) and Intelligence, Surveillance, and Reconnaissance (ISR) in the planning and execution of Operation Anaconda would have yielded a better operational outcome and saved lives. With the benefit of hindsight, many things could have been done differently, but several key issues stand out. The C2 structure must include all components from the outset to synchronize effects and rapidly re-task ISR. There must be multiple communications redundancies and adequate bandwidth. Finally, all SOF, conventional and interagency capabilities must be synchronized under one task force commander with a sufficiently robust C2 infrastructure to direct the entire effort. As our nation calls on SOF at an ever-increasing rate, we must take those lessons learned and apply them to future operations. 相似文献
870.
Surulola James Eke 《Defense & Security Analysis》2015,31(4):319-329
Boko Haram (BH) is an insurgent group that operates mainly in northeastern Nigeria. Its stated aim is to establish an Islamic state, and it employs terrorism as its strategy. Earlier interests of security analysts centred on the drivers of BH uprising and the possibility of its internationalisation. Today's concerns relate more to why the rebellion has lasted this long. In toeing the same line, this article demonstrates that BH is a purposive terror group against which the government has evolved no viable strategy. It examines some gains of BH over the past six years and how it benefitted from the government's underestimation of its capacity and determination. It concludes that to effectively engage BH, the Nigerian government must revaluate its threat and sincerely pursue an expanded strategy beyond the current military-centric approach. To be effective, government's response must be packaged in such a way as to enhance human security in the region. 相似文献