首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1715篇
  免费   567篇
  国内免费   236篇
  2024年   7篇
  2023年   17篇
  2022年   20篇
  2021年   44篇
  2020年   43篇
  2019年   45篇
  2018年   37篇
  2017年   103篇
  2016年   132篇
  2015年   83篇
  2014年   157篇
  2013年   188篇
  2012年   148篇
  2011年   118篇
  2010年   108篇
  2009年   149篇
  2008年   103篇
  2007年   127篇
  2006年   157篇
  2005年   133篇
  2004年   103篇
  2003年   78篇
  2002年   62篇
  2001年   66篇
  2000年   33篇
  1999年   49篇
  1998年   37篇
  1997年   33篇
  1996年   21篇
  1995年   17篇
  1994年   17篇
  1993年   17篇
  1992年   16篇
  1991年   19篇
  1990年   20篇
  1989年   8篇
  1988年   1篇
  1987年   2篇
排序方式: 共有2518条查询结果,搜索用时 15 毫秒
801.
This paper provides a political economy analysis of the evolution of unmanned aerial vehicles (UAV), or ‘drones’ in the USA. Focus is placed on the interplay between the polity and private economic influences, and their impact on the trajectory of political, economic, and military outcomes. We identify the initial formation of the drone industry, trace how the initial relationships between the military and the private sector expanded over time, and discuss present relationships. Understanding the historical evolution of UAV technology, as well as the major players in the industry today, is important for ongoing policy debates regarding the use of drones both domestically and internationally.  相似文献   
802.
仿真体系结构解决了各自领域内仿真资源的互操作问题,而体系结构间的互操作是解决多种仿真资源互操作的有效方法.由于通信协议、中间件和对象模型的不同,体系结构间不能直接进行信息交互.对象模型间的相同点是异构仿真系统间互操作的基础.建立异构系统对象模型与通用数据交换模型的映射关系,通过模型转换实现各异构系统间的数据交互,最后通过"点对点"和通用网关间的时延比较,总结了通用网关的性能特点.  相似文献   
803.
If international terrorism is on a rising trend, an important source of confirmation or refutation of this is time‐series data on terrorist activity. Using chiefly data collected by the RAND/MIPT consortium we show using basic statistical analysis that in the period 1968–2005 the yearly number of all international terrorist incidents shows no trend over time, but fluctuates year on year in a random manner. On the other hand some indicators do show a definite trend over time, principally the steady rise in the number of incidents that are death‐dealing in nature. A further conclusion is drawn, showing that the proportion of these incidents leading to deaths above a given level is virtually fixed.  相似文献   
804.
This article presents a dynamic model in which counterterrorism policies have the potential to generate positive public support for terrorism via a backlash that may fuel terror recruitment. For an optimizing government aiming at maximizing security, this phenomenon produces a natural bound on proactive counterterror policy that is related to the dynamic path of conflict. Moreover, terror is a persistent phenomenon that requires patience on the part of the target government for optimal counterterror policies to be realized. Finally, the potential for backlash yields insights into the need for target governments to fight an information war to change public opinion regarding its own policies and the ultimate effect of terror attacks.  相似文献   
805.
Abstract

The mandate of South Africa's recently appointed National Planning Commission includes addressing ‘defence and security matters’. This article seeks to outline the central elements of the threat environment facing South Africa in the foreseeable future. It is argued that South Africa faces no meaningful existential threat from conventional military forces but that its security forces will need to be prepared to address possible raids and attacks by conventional military forces both on home soil and on vital interests beyond the nation's borders. Other threats highlighted include the threats posed by potential insurgencies, by terrorism, and by crime, social unrest and banditry. Also addressed is the danger of so-called hybrid threats, in which two or more of the single threat types outlined here are combined. Finally, the article challenges the National Planning Commission to rethink South Africa's policy on peace operations in the light of the need to ensure the safety and security of the nation's citizenry.  相似文献   
806.
In Africa, most of the present conflicts are civil, intra-state wars where belligerent groups use guerrilla tactics to achieve various political, economic or ideological objectives. The atrocities and the effect of these on-going wars on innocent civilians, human suffering, poverty and development are beyond comprehension. Not surprisingly, the majority of current peace operations are in Africa, with more than 70 countries contributing forces to these conflict zones. On the continent, South Africa has come to assume a leading role in peace operations and is now a major troop-contributing country to UN and AU missions. In the past 11 years, the South African National Defence Force (SANDF) has taken part in no fewer than 14 peace missions. This article provides a brief background of the conflicts in Burundi, the Democratic Republic of Congo (DRC) and Sudan, the different United Nations (UN) and African Union (AU) mandates under which peacekeepers had to operate as well as their objectives, and the extent of South Africa's involvement in the various missions. In the last section, the major challenges, that these operations have posed are highlighted.  相似文献   
807.
基于复杂网络理论,分析了信息化作战系统网络结构,构建了传统作战系统和信息化作战系统拓扑模型的生成算法,并通过对传统作战系统和信息化作战系统结构拓扑模型度量性质的比较,说明了信息化战争下的作战系统结构特点,为进一步研究网络化战争提供了良好的模型基础.  相似文献   
808.
随机滤波模型在变速箱剩余寿命预测中的应用研究   总被引:1,自引:0,他引:1  
摘要:基于变速箱加速寿命实验的振动信号,提取信号的多种特征参量.通过分析各特征参量的敏感性和稳定性,选择幅域裕度指标、峰值指标、波形指标和RMS(RootMeanSquare)作为特征参量,建立一种基于随机滤波的变速箱剩余寿命预测模型,给出剩余寿命后验概率密度的递推公式,设计了极大似然估计方法求解模型参数,并经实例验证模型的有效性和实用性.  相似文献   
809.
在军事和商业应用中有很多密码算法是半公开或者不公开的,旨在证明算法保密对密码的安全性提高并没有明显帮助.针对轻型分组密码LED的未知非线性部件S盒,提出了一种基于差分功耗分析的逆向方法,该方法可以利用差分功耗曲线的极性信息来恢复未知算法结构.实验结果表明,在LED的S盒参数未知时,利用功耗采集平台采集算法运行时泄露的旁路功耗信息,可以成功逆向出全部s盒信息,验证了该方法的可行性.  相似文献   
810.
考虑感染细胞的治愈和未感染细胞吸收作用的影响,研究一类具有免疫时滞和病毒颗粒的HIV模型,通过分析特征方程研究平衡点的局部稳定性,利用规范型理论和中心流行定理得到确定Hopl分支方向和分支周期解稳定性的计算公式,并通过构造Lyapunov泛函,讨论未感染平衡点的全局稳定性.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号