全文获取类型
收费全文 | 285篇 |
免费 | 60篇 |
国内免费 | 45篇 |
专业分类
390篇 |
出版年
2024年 | 5篇 |
2023年 | 3篇 |
2022年 | 6篇 |
2021年 | 5篇 |
2020年 | 5篇 |
2019年 | 3篇 |
2018年 | 3篇 |
2017年 | 29篇 |
2016年 | 32篇 |
2015年 | 16篇 |
2014年 | 28篇 |
2013年 | 27篇 |
2012年 | 35篇 |
2011年 | 29篇 |
2010年 | 15篇 |
2009年 | 23篇 |
2008年 | 15篇 |
2007年 | 14篇 |
2006年 | 23篇 |
2005年 | 20篇 |
2004年 | 15篇 |
2003年 | 12篇 |
2002年 | 4篇 |
2001年 | 7篇 |
2000年 | 2篇 |
1999年 | 5篇 |
1998年 | 2篇 |
1997年 | 1篇 |
1996年 | 1篇 |
1993年 | 3篇 |
1990年 | 2篇 |
排序方式: 共有390条查询结果,搜索用时 15 毫秒
121.
122.
Kenneth L. Lasoen 《战略研究杂志》2017,40(7):927-962
The terrorist attacks in France and Belgium of 2015–2016 that occurred while these countries were in a heightened state of alert raise questions about indications and warning methodology as well as effectiveness of the blanket-protection deployment of security services assisted even by the military. Response and perhaps even more anticipation may require strategic rethinking in light of the predatory attacks that target the most vulnerable spots of the public space. This study looks at threat analysis in Belgium as conducted through her intelligence fusion centre Coordination Unit for Threat Analysis (CUTA)?????? since its inception in 2006. With a special focus on what is known, at the time of writing, about the terrorist attacks in Paris and Brussels, this study hopes to put into context how the system (mal)functions and will also consider the preventive measures that respond to the threat, and the international aspects which have implications far beyond Belgian borders. Therefore, a case is made for not just a Belgian homeland security framework, but one that fits into an EU-wide security concept. 相似文献
123.
《防务技术》2022,18(11):2097-2106
The target's threat prediction is an essential procedure for the situation analysis in an aerial defense system. However, the traditional threat prediction methods mostly ignore the effect of commander's emotion. They only predict a target's present threat from the target's features itself, which leads to their poor ability in a complex situation. To aerial targets, this paper proposes a method for its potential threat prediction considering commander emotion (PTP-CE) that uses the Bi-directional LSTM (BiLSTM) network and the backpropagation neural network (BP) optimized by the sparrow search algorithm (SSA). Furthermore, we use the BiLSTM to predict the target's future state from real-time series data, and then adopt the SSA-BP to combine the target's state with the commander's emotion to establish a threat prediction model. Therefore, the target's potential threat level can be obtained by this threat prediction model from the predicted future state and the recognized emotion. The experimental results show that the PTP-CE is efficient for aerial target's state prediction and threat prediction, regardless of commander's emotional effect. 相似文献
124.
Ryusuke Hohzaki 《海军后勤学研究》2009,56(3):264-278
Search theory originates from the military research efforts of WWII. Most researchers of that period modeled their search games in noncooperative games, where players are enemies or compete against each other. In this article, we deal with a cooperative search game, where multiple searchers behave cooperatively. First we describe several search problems and discuss the possibility of a coalition or cooperation among searchers. For the cooperative search game, we define a function named quasi‐characteristic function, which gives us a criterion similar to the so‐called characteristic function in the general coalition game with transferable utility. The search operation includes a kind of randomness with respect to whether the searchers can detect a target and get the value of the target. We also propose a methodology to divide the obtained target value among members of the coalition taking account of the randomness. As a concrete problem of the cooperative search game, we take the so‐called search allocation game, where searchers distribute their searching resources to detect a target in a cooperative way and the target moves in a search space to evade the searchers. Lastly, we discuss the core of the cooperative search allocation game. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009 相似文献
125.
126.
本文评述了壁面传热对水边界层流体流动及其阻力的影响,同时分析了加热减阻的应用及其影响因素。传热不仅对层流流动、层流向湍流的转捩以及湍流流动有明显的影响,而且对流动分离以及由分离引起的空化也有显著影响。以热脉冲加热的主动式加热方式既可用来产生和消除边界层的T-S波,也能用来控制边界层的分离。因此,热控制技术可望在控制边界层转捩和分离,减小流动阻力等方面得到应用。 相似文献
127.
128.
129.
基于警报关联的网络威胁行为检测技术因其与网络上大量部署的安全产品耦合,且能充分挖掘异常事件之间的关联关系以提供场景还原证据,正成为复杂威胁行为检测的研究热点。从威胁行为和网络安全环境的特点出发,引出威胁行为检测的应用需求和分类,介绍基于警报关联的威胁行为检测的基本概念和系统模型;重点论述作为模型核心的警报关联方法,并分类介绍了各类典型算法的基本原理和特点,包括基于因果逻辑的方法、基于场景的方法、基于相似性的方法和基于数据挖掘的方法;并结合实例介绍了威胁行为检测系统的三种典型结构,即集中式结构、层次式结构和分布式结构;基于当前研究现状,提出了对未来研究趋势的一些认识。 相似文献
130.