首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   816篇
  免费   122篇
  国内免费   132篇
  2024年   1篇
  2023年   1篇
  2022年   4篇
  2021年   12篇
  2020年   24篇
  2019年   30篇
  2018年   33篇
  2017年   57篇
  2016年   64篇
  2015年   17篇
  2014年   83篇
  2013年   100篇
  2012年   58篇
  2011年   64篇
  2010年   44篇
  2009年   60篇
  2008年   57篇
  2007年   51篇
  2006年   53篇
  2005年   72篇
  2004年   44篇
  2003年   31篇
  2002年   22篇
  2001年   22篇
  2000年   15篇
  1999年   8篇
  1998年   9篇
  1997年   7篇
  1996年   5篇
  1995年   6篇
  1994年   4篇
  1993年   4篇
  1992年   3篇
  1991年   2篇
  1990年   3篇
排序方式: 共有1070条查询结果,搜索用时 140 毫秒
31.
YHCAPP系统是面向中小企业的工具型CAPP系统,如何从CAD图形提取工艺信息和生成工序图是该类系统的一个难点。文中给出了一种基于表达式求值的方法,成功解决了该难题,实际应用表明该方法稳定可靠。该方法也为一般的工具型CAPP系统提供了新思路。  相似文献   
32.
建立高效的天地预警系统对于赢得现代立体战争的胜利有着极其重要的意义。探讨了天地预警系统与机敏传感信息网 (Sm art Sensor Web)的构成 ,结合我国的部分研究现状 ,较详细地阐述了设计与构造天地预警系统所需解决的若干关键技术问题。  相似文献   
33.
基于多源信息融合的低空目标探测   总被引:3,自引:1,他引:2  
低空 /超低空是现代防空火力最薄弱的空域。提出了一种雷达与红外传感器信息融合 ,探测低空威胁目标的方法。阐述了红外传感器的特点及融合的意义 ,给出了信息融合的系统结构 ,提出了需要解决的几个关键问题 ,并简述了雷达与红外传感器集成的发展趋势  相似文献   
34.
在总结国内外信息建设经验的基础上 ,明确提出坚持一体化是加强装备信息建设的必由之路 ,其要点是综合集成 ,确立系统技术结构 ;按需定义 ,规范信息内涵和范围 ;统筹兼顾 ,营造三连三通环境等 ,并阐述了在建设实践中应把握的基本原则。  相似文献   
35.
In this article, the Building Evacuation Problem with Shared Information (BEPSI) is formulated as a mixed integer linear program, where the objective is to determine the set of routes along which to send evacuees (supply) from multiple locations throughout a building (sources) to the exits (sinks) such that the total time until all evacuees reach the exits is minimized. The formulation explicitly incorporates the constraints of shared information in providing online instructions to evacuees, ensuring that evacuees departing from an intermediate or source location at a mutual point in time receive common instructions. Arc travel time and capacity, as well as supply at the nodes, are permitted to vary with time and capacity is assumed to be recaptured over time. The BEPSI is shown to be NP‐hard. An exact technique based on Benders decomposition is proposed for its solution. Computational results from numerical experiments on a real‐world network representing a four‐story building are given. Results of experiments employing Benders cuts generated in solving a given problem instance as initial cuts in addressing an updated problem instance are also provided. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
36.
在给出事件驱动系统安全漏洞的基础上,指出了产生漏洞的根本原因是:系统忽视了输入系统的事件序列之间存在的相关性;系统无条件信任任何事件源产生的事件.针对这两个原因,相应提出了事件序列形式安全分析模型及基于事件源的可信度评估模型,依据这两个模型,构建了一种改进的事件驱动系统框架.  相似文献   
37.
Cyberspace is an avenue of approach through which a military force can attain objectives of value. Through these cyber avenues of approach, military forces can engage, vet, organize, and direct human agents to accomplish specific activities. Although the objectives of these activities could differ from traditional military objectives, they still have military relevance. This particular manifestation of cyber conflict is neither a new domain of war nor something outside of warfare. Rather, it can be viewed as an emerging avenue of approach in the larger context of military operations, auguring benefits in the integration of cyber activities with operations.  相似文献   
38.
There has been near-universal condemnation of the use of chemical weapons in the Syrian conflict. The international community has nevertheless struggled to make progress on holding the perpetrators to account. This article reviews developments at the international level in terms of Syrian chemical weapon justice between 2011 and 2017. It argues that there have been substantive disagreements between states on the rationale and means of justice in the Syrian case. It also argues that international initiatives have been tightly intertwined with developments in chemical disarmament and conflict resolution processes as well as the broader war. The article describes progress and challenges to chemical weapon justice in a number of distinct formal international mechanisms during the period studied. The analysis concludes by contextualizing international responses—including the U.S. tomahawk strikes against a Syrian airbase—to the Khan Shaykhun chemical attacks of April 2017.  相似文献   
39.
The present-day conflict in Yemen is a valuable case study in the coercive use of airpower. The Saudi-led bombing campaign demonstrates the challenges inherent in applying a punishment-based strategy in a civil war, where coercive mechanisms operate differently than in interstate conflict. The audit from Yemen vindicates the effectiveness of a denial-based strategy and offers insights on the relative utility of interdiction and close air support in advancing that strategy. This examination dissects the campaign, assesses its effectiveness, and extracts insights useful both to the analysis of similar conflicts and to the evaluation of U.S. foreign policy alternatives.  相似文献   
40.
为了提升网络隐写方法中秘密信息隐蔽传输的安全性,研究了携带诱骗信息的多层网络隐写方法。方法分为两层,高层方法用于携带诱骗信息欺骗检测者,低层方法利用网络协议栈纵向多协议之间的关系编码秘密信息,实现隐蔽通信。实验结果表明,该方法能够在保证隐写带宽的同时,确保了秘密信息传输的安全性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号