首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1172篇
  免费   36篇
  国内免费   7篇
  1215篇
  2025年   4篇
  2024年   9篇
  2023年   24篇
  2022年   16篇
  2021年   19篇
  2020年   18篇
  2019年   24篇
  2018年   25篇
  2017年   41篇
  2016年   52篇
  2015年   44篇
  2014年   68篇
  2013年   82篇
  2012年   78篇
  2011年   73篇
  2010年   54篇
  2009年   78篇
  2008年   40篇
  2007年   48篇
  2006年   65篇
  2005年   59篇
  2004年   52篇
  2003年   42篇
  2002年   30篇
  2001年   37篇
  2000年   29篇
  1999年   13篇
  1998年   19篇
  1997年   8篇
  1996年   10篇
  1995年   13篇
  1994年   6篇
  1993年   3篇
  1992年   7篇
  1991年   11篇
  1990年   11篇
  1989年   2篇
  1988年   1篇
排序方式: 共有1215条查询结果,搜索用时 15 毫秒
171.
临近空间对地观测平台的矢量化建模及稳定性分析   总被引:2,自引:1,他引:1  
研究了临近空间对地观测平台的矢量化建模和稳定性问题.定义了描述观测平台空间运动的坐标系及运动参数;在受力分析的基础上,根据Newton-Euler方程建立了矢量形式的六自由度非线性数学模型;基于此模型,应用Lyapunov稳定性理论对观测平台的稳定性进行了分析.研究结果表明:对于给定的未扰运动,观测平台是渐近稳定的;纵...  相似文献   
172.
研究了网络延时对路由器主动队列管理机制的影响,分析了几种典型主动队列管理算法在大延时网络中的性能。在介绍了基于内模补偿的DC-AQM算法的优缺点之后,根据PID控制器延时补偿的Ziegler-Nichols设定方法,提出了ZNDC(Ziegler-Nichols delay compensation)AQM算法并进行了仿真实验验证,实验结果表明算法达到了预期的目标。  相似文献   
173.
针对机载探测系统的特性,应用D em pster-Shafer(D-S)证据理论和主观B ayes的组合算法,对来自机载SAR雷达、机载前视红外搜索跟踪系统(IRS)、电子支援系统(ESM)等探测系统多次观测所获得的数据,以及来自地面的电子情报(EL INT)的不同信息进行实时融合、识别,进而确定攻击对象。通过实例进行仿真证明,这种组合算法适用于不同类传感器和不同格式信息间的融合,适合于复杂信号环境。  相似文献   
174.
D-S证据理论是一种比概率论确定性弱的不确定性理论,它能将“不知道”和“不确定”两个认知学上的主要概念区别开来,在多传感器数据融合中具有广泛的应用前景。D-S证据理论在实际应用中却存在一个困难,当目标的个数较多时,需要计算的项数太多,容易造成漏项,引起计算错误。提出了一种确定计算项数的算法,作为验证计算结果的必要条件,并通过图解的方法找出需要计算的项。  相似文献   
175.
确定性理论在雷达型号识别中的应用   总被引:1,自引:0,他引:1  
雷达型号识别是雷达对抗情报侦察的首要工作,是近一步分析雷达用途及相关武器系统的基础,也是高层次上的态势评估和威胁估计的主要依据。针对现代战争中电磁信号环境的复杂性,利用单一传感器很难对雷达型号进行准确识别,而基于确定性理论的不确定推理技术能将多个传感器在多个周期的侦察信息进行融合,所以采用确定性理论的数据融合技术,基于确定性理论的组合规则,采用分层式融合算法对雷达型号进行识别。仿真结果表明,该方法的识别结果令人满意,使采用单一传感器可能存在的无法识别或误识别等现象得到了明显的改善。  相似文献   
176.
    
ABSTRACT

This article explores the interaction between local and international power structures in EU peacebuilding. While citizens in a state only face order from one authority (the state), local actors in a peacebuilding context are subject to orders from two institutions (the domestic state and the peacebuilding mission). This article explores the nature of interactions of these two institutions and their effect on local police officers’ compliance and resistance. Specifically, it analyzes the example of the police restructuring process in Bosnia and Herzegovina. It demonstrates that the choices of local officers to comply or resist depended on whether the interactions between the EU Police Mission and the local police organization were positive and mutually supportive, or whether they were competitive and contradictory. The findings of the article contribute to the debates on the role of local power and the importance of local legitimacy in peacebuilding.  相似文献   
177.
    
Cyberspace is an avenue of approach through which a military force can attain objectives of value. Through these cyber avenues of approach, military forces can engage, vet, organize, and direct human agents to accomplish specific activities. Although the objectives of these activities could differ from traditional military objectives, they still have military relevance. This particular manifestation of cyber conflict is neither a new domain of war nor something outside of warfare. Rather, it can be viewed as an emerging avenue of approach in the larger context of military operations, auguring benefits in the integration of cyber activities with operations.  相似文献   
178.
    
In his 1987 work Strategy: The Logic of War and Peace (Harvard University Press, Cambridge, MA, 1987), Edward Luttwak described strategy as a field of activity characterised not only by an innately complex relationship between designs, actions and outcomes, but so too by the frequent disparity between its theory and praxis. Similar observations on this subject have since been made by Richard K. Betts, Lawrence Freedman and Antulio Echevarria II. This article will use the Allied invasion of Sicily in July–August 1943 as a vehicle through which to test these theories against a signal event in the European theatre of the Second World War. It will illustrate how Operation Husky and its aftermath are a paradigm of the confusing and often illogical course of events associated with the process of formulating strategy and waging war. In so doing it demonstrates the benefits of using strategic theory to illuminate events and so move beyond the often insular focus of campaign histories, and simultaneously reinforces the importance of military history in informing a theoretical understanding of strategy.  相似文献   
179.
    
The paper explores terrorist choice by applying two well-known theoretical frameworks: stochastic dominance and prospect theory (PT). We analyse each pair of attack methods that can be formed from the RAND-MIPT database and the Global Terrorism Database. Instances of stochastic dominance are identified. PT orderings are computed. Attention is accorded to the identification of ‘trigger points’ and the circumstances that may lead to an increased likelihood that a terrorist will select an attack method associated with a higher expected number of fatalities, i.e. a potentially more damaging attack method.  相似文献   
180.
    
Although the Taliban insurgency was internally divided and unable to coordinate its activities in 2014–2015, the Afghan security forces were not able to contain it and steadily lost ground throughout 2015. Until 2015, there had been little effort to develop an indigenous Afghan counterinsurgency strategy, but a sense of urgency emerged after a string of Taliban victories. At the beginning of 2016, it was still not clear if and when the National Unity Government would be able to produce a counterinsurgency strategy and, in any case, the need for a coherent counterinsurgency approach became questionable as the Taliban appeared to be transitioning towards conventional warfare.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号