首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   73篇
  免费   56篇
  国内免费   3篇
  2023年   4篇
  2021年   4篇
  2020年   4篇
  2019年   6篇
  2018年   9篇
  2017年   7篇
  2016年   8篇
  2015年   6篇
  2014年   4篇
  2013年   8篇
  2012年   5篇
  2011年   11篇
  2010年   7篇
  2009年   7篇
  2008年   10篇
  2006年   8篇
  2005年   2篇
  2004年   5篇
  2003年   2篇
  2002年   1篇
  2001年   3篇
  1999年   2篇
  1998年   2篇
  1997年   2篇
  1994年   1篇
  1991年   2篇
  1990年   1篇
  1989年   1篇
排序方式: 共有132条查询结果,搜索用时 15 毫秒
41.
This paper considers the statistical analysis of masked data in a series system, where the components are assumed to have Marshall‐Olkin Weibull distribution. Based on type‐I progressive hybrid censored and masked data, we derive the maximum likelihood estimates, approximate confidence intervals, and bootstrap confidence intervals of unknown parameters. As the maximum likelihood estimate does not exist for small sample size, Gibbs sampling is used to obtain the Bayesian estimates and Monte Carlo method is employed to construct the credible intervals based on Jefferys prior with partial information. Numerical simulations are performed to compare the performances of the proposed methods and one data set is analyzed.  相似文献   
42.
Abstract

The mandate of South Africa's recently appointed National Planning Commission includes addressing ‘defence and security matters’. This article seeks to outline the central elements of the threat environment facing South Africa in the foreseeable future. It is argued that South Africa faces no meaningful existential threat from conventional military forces but that its security forces will need to be prepared to address possible raids and attacks by conventional military forces both on home soil and on vital interests beyond the nation's borders. Other threats highlighted include the threats posed by potential insurgencies, by terrorism, and by crime, social unrest and banditry. Also addressed is the danger of so-called hybrid threats, in which two or more of the single threat types outlined here are combined. Finally, the article challenges the National Planning Commission to rethink South Africa's policy on peace operations in the light of the need to ensure the safety and security of the nation's citizenry.  相似文献   
43.
提出了一种基于混杂端口(hybridport)的VLAN设计方案。通过这种方式设计,在提高网络安全性的同时,避免了IP地址紧缺的问题。最后给出了基于华为交换机的混杂端口VLAN设计方案。  相似文献   
44.
提出一种适用于结构化道路的单目视觉/惯性组合导航定位算法.针对点特征匹配和连续多帧追踪受车速和相机视野制约的不足,提取道路上车道线的直线特征,引入对偶四元数描述直线特征.在基于对偶四元数的相对位姿估计算法的基础上,推导了图像特征增量与相机位姿增量的表达式.通过配准和时间同步,用惯导系统和相机分别解算的载体速度之差作为组合导航的观测量,建立kalman滤波修正组合导航系统的误差,包括相机测速标度因数误差.车载实验结果表明在结构化道路上算法是有效的.  相似文献   
45.
为满足陆军装备对电源保障的特殊要求,提出了一种由发动机-发电机组、电功率变换器、蓄电池、交流电机驱动系统组成的新型机动电源保障平台,对平台中主要子系统进行了设计和开发,完成了一吨级4×4混合动力新型机动电源保障平台的研制。试验结果表明:研究成果不仅实现了保障平台机动能力强、功能多等要求,而且具有良好的操控性。  相似文献   
46.
本文对非线性的三维涡度方程单向周期问题构造了一种新的谱——差分格式,并证明了格式的稳定性和收敛性。  相似文献   
47.
Abstract

The rollback of Daesh’s territorial control during 2017 has (re-)established an area of limited statehood in large parts of Iraq that may endure for many years. The government of Iraq projects its authority into a large geographical and political space that it shares with a multitude of other state, non-state and hybrid actors, competing and collaborating to achieve advantageous security and political outcomes. This paper examines the heterarchy of actors in post-Daesh Iraq to develop a typology and start a critical discussion about post-Westphalian alternatives for security governance in Iraq during the coming period of reconstruction and reconciliation.  相似文献   
48.
Cyberspace is a new domain of operation, with its own characteristics. Cyber weapons differ qualitatively from kinetic ones: They generate effects by non-kinetic means through information, technology, and networks. Their properties, opportunities, and constraints are comparable to the qualitative difference between conventional and nuclear weapons. New weapons and their target sets in a new domain raise a series of unresolved policy challenges at the domestic, bilateral, and international levels about deterrence, attribution, and response. They also introduce new risks: uncertainty about unintended consequences, expectations of efficacy, and uncertainty about both the target’s and the international community’s response. Cyber operations offer considerable benefits for states to achieve strategic objectives both covertly and overtly. However, without a strategic framework to contain and possibly deter their use, make state and non-state behavior more predictable in the absence of reciprocal norms, and limit their impact, an environment where states face persistent attacks that nonetheless fall below the threshold of armed conflict presents a policy dilemma that reinforces collective insecurity.  相似文献   
49.
Following Russia’s annexation of Crimea and its initial actions in eastern Ukraine in 2014, the term hybrid warfare has received much public attention. Many have argued that the Russian actions we saw in Ukraine were part of a completely new strategy while others have suggested that there was nothing new in Russia’s actions. This article takes a critical look at these claims. Through the assessment of the history of the term hybrid warfare and a rigorous analysis of the so-called Gerasimov doctrine, this study finds that the Russian hybrid warfare strategy is rather a western myth than a formal comprehensive Russian strategic concept. Additionally, through the assessment of the Russian use of information operations and the way she has utilised the cyberspace in several recent conflicts, the study finds that against all claims Russia did not make these areas its main battlefield, but rather has been using them in support of its traditional concepts.  相似文献   
50.
在逐步Ⅰ型混合截尾试验下,研究了Burr部件寿命参数及可靠性指标的极大似然估计和Bayes估计.利用简单迭代方法,给出了寿命参数和可靠性指标的极大似然估计的数值解.然后利用Lindely Bayes近似算法得到了平方损失下寿命参数以及可靠性指标的Bayes估计.最后,运用Monte-Carlo方法对各估计结果作了模拟比较,结果表明Bayes估计较极大似然估计的误差小.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号