首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3157篇
  免费   557篇
  国内免费   236篇
  2024年   7篇
  2023年   18篇
  2022年   38篇
  2021年   46篇
  2020年   50篇
  2019年   70篇
  2018年   60篇
  2017年   134篇
  2016年   148篇
  2015年   91篇
  2014年   250篇
  2013年   309篇
  2012年   215篇
  2011年   275篇
  2010年   206篇
  2009年   261篇
  2008年   207篇
  2007年   215篇
  2006年   201篇
  2005年   197篇
  2004年   187篇
  2003年   135篇
  2002年   108篇
  2001年   96篇
  2000年   52篇
  1999年   53篇
  1998年   45篇
  1997年   44篇
  1996年   37篇
  1995年   36篇
  1994年   37篇
  1993年   23篇
  1992年   25篇
  1991年   19篇
  1990年   28篇
  1989年   14篇
  1988年   10篇
  1987年   2篇
  1975年   1篇
排序方式: 共有3950条查询结果,搜索用时 15 毫秒
61.
以高速侵彻下45钢靶体侵彻阻力为研究对象,开展了弹体高速侵彻45钢靶体试验,获取了典型弹体对45钢靶体的成坑参数。基于高速侵彻阻力模型对靶体侵彻阻力及影响因素进行分析。结合流体动力学侵彻模型对不同弹体材料侵彻45钢靶体侵彻深度规律进行研究。研究结果表明:随着撞击速度的增大,45钢的靶体阻力从5. 13 GPa减小到3. 7 GPa;基于材料动力硬度测试方法的靶体动态阻力测试结果和理论计算结果吻合较好;随着靶体动态屈服强度的增大,靶体阻力呈线性增大的趋势;侵彻深度及靶体动态阻力理论计算结果和试验数据吻合较好,说明所提动态阻力确定方法可行,可为高速侵彻动力学研究提供参考。  相似文献   
62.
Fx-Newton算法在执行过程中需要估计次级通道模型,针对主被动隔振工程应用中次级通道估计存在误差的问题,假设输入信号为正弦信号,建立含次级通道估计误差的Fx-Newton算法结构模型,推导了Fx-Newton算法的稳定性条件,并就相位误差和幅值误差对Fx-Newton算法稳定性和收敛性的影响做了详细阐述。最后对两自由度主被动隔振模型开展仿真研究,验证了理论分析结果。  相似文献   
63.
基于风险理论提出一种面向不同目标探测任务的传感器调度方法。将主动传感器辐射被截获风险和目标探测风险结合起来,建立一般目标探测框架下的传感器最小风险调度模型。分目标跟踪、目标识别和目标威胁等级评估三种情况将传感器最小风险调度模型具体化,给出不同情况下目标探测风险值的计算方法。针对模型的求解提出一种基于混沌思想、反向学习和双向轮盘赌的改进人工蜂群算法。通过仿真实验证明了模型的可行性和算法的有效性。  相似文献   
64.
针对脑电信号随机性强、动态变化迅速等特点,提出了一种简化深度学习模型研究癫痫脑电识别问题。提出的模型以一维卷积神经网络为基础,在结构方面简化了卷积层、池化层等以提高模型效率,在整体框架方面应用了Keras框架,在训练优化算法方面采用RMSProp算法作为模型优化算法,通过预定义的目标函数来进行损失估计,模型设计上加入了批标准化层和全局均值池化层。基于所提模型,从三个方面研究了癫痫脑电识别问题,即:利用经验模态分解,分别选取前三阶、前五阶、前七阶、前八阶的本征模态函数分量,在简化模型上进行对比分析;利用提出模型所具备的深度学习特点,直接识别原始脑电信号而无须特征提取环节;增加了三种不同方法分别提取7类特征,对相同的脑电数据进行对比分析。性能分析结果表明:对于五类不同的脑电信号,前三阶的本征模态函数分量的识别率达到92.1%,比其他几种处理方式识别率高;前八阶的本征模态分量识别率不及原始信号,表明人工数据处理时会给数据带来噪声; 所提出的简化深度学习模型能高效处理癫痫脑电识别问题,具备较高效率和较好性能。  相似文献   
65.
鲁赢  伏涛  张志勇  林文浩 《国防科技》2020,41(3):127-130
随着智能技术的发展,人类已逐步迈入智能时代,而智能时代催生了军事训练变革。本文从智能技术影响军事训练典型领域的角度,分析了智能时代背景下,以大数据和人工智能为核心的智能技术,如何影响军事训练的理念、内容、方式及管理,并催生了这些领域的变革。研究表明,智能时代发展背景下,军事训练理念将更加先进,训练内容更加融合,训练方式更加有效,训练管理更加精准。  相似文献   
66.
作战试验能有效地推动装备体系的建设发展,本文通过分析美国陆军网络集成评估与联合作战评估的作战试验特点,提出军队开展装备作战试验的几个建议。首先,总结了美国陆军网络集成评估到联合作战评估的发展演变,主要包括网络集成评估的地位和作用、网络集成评估的实施流程以及13次网络集成评估和3次作战评估的有关情况;其次,分析了网络集成评估的一系列作战试验特点,诸如实际作战需求牵引、逼真场景构建、试训一体化模式、部队战斗力的直接生成以及作战能力的军民融合式发展等;最后,提出了网络集成评估带来的若干启示,从满足实战能力需求开展作战试验、突出装备体系的互操作能力评估、探索试训结合的作战试验模式、组建专门的作战试验部队及鼓励工业部门参与作战试验等方面推动军队作战试验的发展。  相似文献   
67.
《防务技术》2020,16(1):232-241
Operation architecture plays a more important role in Network Centric Warfare (NCW), which involves dynamic operation networks with complex properties. Thus, it is essential to investigate the operation architecture under the informatization condition within NCW and find a proper network construction method to efficiently coordinate various functional modules on a particular situation, i.e., the aerial combat. A new method integrating the physical level and functional level of NCW is proposed to establish the operation architecture, where the concept of network operation constraints unit and net constructing mechanisms are employed to avoid conflicts among different platforms. Meanwhile, we conduct simulations to assess the effectiveness and feasibility of the constructed operation architecture and analyze the influence of the network parameters.  相似文献   
68.
The aim of this paper is to investigate the determinants of international arms transfers in a gravity model framework. By distinguishing between the decision to export arms (extensive margin) and the value of the arms exported (intensive margin), while also considering its interdependence, is what differentiates this paper from previous research. A theoretically justified gravity model of trade augmented with political and security motives is estimated using a two-stage panel data approach for 104 exporting countries over the period from 1950 to 2007. In addition to the usual gravity variables related to the economic mass of the trading countries and the trade cost factors, the model is extended with political and security factors. The level of democracy in both trading partners, political differences between trading partners and voting similarity with the United States in the UN General Assembly of the countries engaged in trade are the main political factors, whereas the existence of conflicts, military pacts, and embargoes are taken as security motives. The key result indicates that both political and security motives are an important determinant of an arms trade, but their effects on the extensive margin of exports (the decision to order a transfer) differs from their effect on the intensive margin (average value of exports). Moreover, the relative importance of the factors under study has changed since 1989. In the post-cold war period, countries that are less democratic are more likely to export arms, military pacts are less relevant and embargoes play a role.  相似文献   
69.
Information technology (IT) infrastructure relies on a globalized supply chain that is vulnerable to numerous risks from adversarial attacks. It is important to protect IT infrastructure from these dynamic, persistent risks by delaying adversarial exploits. In this paper, we propose max‐min interdiction models for critical infrastructure protection that prioritizes cost‐effective security mitigations to maximally delay adversarial attacks. We consider attacks originating from multiple adversaries, each of which aims to find a “critical path” through the attack surface to complete the corresponding attack as soon as possible. Decision‐makers can deploy mitigations to delay attack exploits, however, mitigation effectiveness is sometimes uncertain. We propose a stochastic model variant to address this uncertainty by incorporating random delay times. The proposed models can be reformulated as a nested max‐max problem using dualization. We propose a Lagrangian heuristic approach that decomposes the max‐max problem into a number of smaller subproblems, and updates upper and lower bounds to the original problem via subgradient optimization. We evaluate the perfect information solution value as an alternative method for updating the upper bound. Computational results demonstrate that the Lagrangian heuristic identifies near‐optimal solutions efficiently, which outperforms a general purpose mixed‐integer programming solver on medium and large instances.  相似文献   
70.
This paper explores the notion that US efforts to evade the political costs of war paradoxically contribute to the subsequent exacerbation of costs over time. Leaders seek to purchase political capital in the short term by limiting the costs and requirements of military operations, but in doing so cause strategic and political liabilities to mount in the long run. While identification of such behaviour is not new, insufficient attention has been devoted to explaining its causes, dynamics, and manifestations in relation to key decisions on and in war. Evidence derived from studies of recent American discretionary campaigns is analysed to advance an argument with respect to this pattern of self-defeating strategic behaviour.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号