全文获取类型
收费全文 | 816篇 |
免费 | 122篇 |
国内免费 | 132篇 |
出版年
2024年 | 1篇 |
2023年 | 1篇 |
2022年 | 4篇 |
2021年 | 12篇 |
2020年 | 24篇 |
2019年 | 30篇 |
2018年 | 33篇 |
2017年 | 57篇 |
2016年 | 64篇 |
2015年 | 17篇 |
2014年 | 83篇 |
2013年 | 100篇 |
2012年 | 58篇 |
2011年 | 64篇 |
2010年 | 44篇 |
2009年 | 60篇 |
2008年 | 57篇 |
2007年 | 51篇 |
2006年 | 53篇 |
2005年 | 72篇 |
2004年 | 44篇 |
2003年 | 31篇 |
2002年 | 22篇 |
2001年 | 22篇 |
2000年 | 15篇 |
1999年 | 8篇 |
1998年 | 9篇 |
1997年 | 7篇 |
1996年 | 5篇 |
1995年 | 6篇 |
1994年 | 4篇 |
1993年 | 4篇 |
1992年 | 3篇 |
1991年 | 2篇 |
1990年 | 3篇 |
排序方式: 共有1070条查询结果,搜索用时 15 毫秒
291.
292.
293.
294.
针对不确定信息下反导拦截效果评估过程中指标信息和权重信息都不确定,传统评估方法很难加以解决的问题,使用区间数和随机多属性可接受性分析(SMAA)相结合的方法对反导拦截效果进行了评估。首先,根据来袭弹道导弹目标的毁伤程度划分了拦截效果等级;然后,针对观测信息的不确定性,采用区间数和隶属函数对特征指标进行了表示;在此基础上,通过引入SMAA方法,计算和比较拦截效果为各拦截等级的可接受性指标和信任因子,对不确定信息下反导拦截效果进行了评估。实例计算结果表明所介绍的不确定信息下反导拦截效果评估方法是可行的。 相似文献
295.
Romain Malejacq 《Small Wars & Insurgencies》2017,28(4-5):867-886
AbstractHow do warlords build their legitimacy and eventually exert authority? The case of Afghan leader Ahmad Shah Massoud demonstrates that warlords do not only build legitimacy through the internal provision of goods and services to the population under their control, but also build their legitimacy by projecting authority externally, through the development of their own form of diplomacy. In this article, I show that warlords develop complex and complementary legitimisation strategies that extend beyond their territorial realms to include consequential relationships with foreign actors. 相似文献
296.
目前大数据时代情况下的信息有文本、图像、语音和视频等多种形式,而且信息的容量非常大,怎样高效、正确地筛选、分类和处理、利用这些信息,为决策者提供指挥与控制的科学依据显得尤为重要。据此对文本情报信息提出了一种文本聚类的特征选择以及特征变换的方法,利用单词在文本中的出现次数的概率来选择参与聚类的单词,并且对单词出现概率模型定义了特征变换函数,提高了文本信息的筛选、分类和处理的精度,能快速、准确地提取所需要的情报信息提供给指挥与控制的决策者参考、使用。 相似文献
297.
298.
Stephen J. Cimbala 《Defense & Security Analysis》2017,33(3):193-208
Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities. 相似文献
299.
Ana Arjona 《Small Wars & Insurgencies》2017,28(4-5):755-778
AbstractTerms like ‘support’ and ‘collaboration’ are often used interchangeably to denote a loose set of acts or attitudes that benefit non-state armed groups (NSAGs). However, these terms are seldom defined, and the alternatives available to civilians are rarely identified. Moreover, existing approaches overlook that the interaction between civilians and NSAGs is often one between ruler and ruled, which makes obedience and resistance central. This paper proposes to conceptualize the choices available to civilians as forms of cooperation and non-cooperation, offers a typology, and discusses the implications for theory building on civilian and NSAG behavior, and on the functioning of armed social orders. 相似文献
300.