全文获取类型
收费全文 | 1172篇 |
免费 | 36篇 |
国内免费 | 7篇 |
专业分类
1215篇 |
出版年
2025年 | 4篇 |
2024年 | 9篇 |
2023年 | 24篇 |
2022年 | 16篇 |
2021年 | 19篇 |
2020年 | 18篇 |
2019年 | 24篇 |
2018年 | 25篇 |
2017年 | 41篇 |
2016年 | 52篇 |
2015年 | 44篇 |
2014年 | 68篇 |
2013年 | 82篇 |
2012年 | 78篇 |
2011年 | 73篇 |
2010年 | 54篇 |
2009年 | 78篇 |
2008年 | 40篇 |
2007年 | 48篇 |
2006年 | 65篇 |
2005年 | 59篇 |
2004年 | 52篇 |
2003年 | 42篇 |
2002年 | 30篇 |
2001年 | 37篇 |
2000年 | 29篇 |
1999年 | 13篇 |
1998年 | 19篇 |
1997年 | 8篇 |
1996年 | 10篇 |
1995年 | 13篇 |
1994年 | 6篇 |
1993年 | 3篇 |
1992年 | 7篇 |
1991年 | 11篇 |
1990年 | 11篇 |
1989年 | 2篇 |
1988年 | 1篇 |
排序方式: 共有1215条查询结果,搜索用时 15 毫秒
171.
临近空间对地观测平台的矢量化建模及稳定性分析 总被引:2,自引:1,他引:1
研究了临近空间对地观测平台的矢量化建模和稳定性问题.定义了描述观测平台空间运动的坐标系及运动参数;在受力分析的基础上,根据Newton-Euler方程建立了矢量形式的六自由度非线性数学模型;基于此模型,应用Lyapunov稳定性理论对观测平台的稳定性进行了分析.研究结果表明:对于给定的未扰运动,观测平台是渐近稳定的;纵... 相似文献
172.
研究了网络延时对路由器主动队列管理机制的影响,分析了几种典型主动队列管理算法在大延时网络中的性能。在介绍了基于内模补偿的DC-AQM算法的优缺点之后,根据PID控制器延时补偿的Ziegler-Nichols设定方法,提出了ZNDC(Ziegler-Nichols delay compensation)AQM算法并进行了仿真实验验证,实验结果表明算法达到了预期的目标。 相似文献
173.
174.
D-S证据理论是一种比概率论确定性弱的不确定性理论,它能将“不知道”和“不确定”两个认知学上的主要概念区别开来,在多传感器数据融合中具有广泛的应用前景。D-S证据理论在实际应用中却存在一个困难,当目标的个数较多时,需要计算的项数太多,容易造成漏项,引起计算错误。提出了一种确定计算项数的算法,作为验证计算结果的必要条件,并通过图解的方法找出需要计算的项。 相似文献
175.
确定性理论在雷达型号识别中的应用 总被引:1,自引:0,他引:1
雷达型号识别是雷达对抗情报侦察的首要工作,是近一步分析雷达用途及相关武器系统的基础,也是高层次上的态势评估和威胁估计的主要依据。针对现代战争中电磁信号环境的复杂性,利用单一传感器很难对雷达型号进行准确识别,而基于确定性理论的不确定推理技术能将多个传感器在多个周期的侦察信息进行融合,所以采用确定性理论的数据融合技术,基于确定性理论的组合规则,采用分层式融合算法对雷达型号进行识别。仿真结果表明,该方法的识别结果令人满意,使采用单一传感器可能存在的无法识别或误识别等现象得到了明显的改善。 相似文献
176.
Birte Julia Gippert 《Contemporary Security Policy》2018,39(1):51-71
ABSTRACTThis article explores the interaction between local and international power structures in EU peacebuilding. While citizens in a state only face order from one authority (the state), local actors in a peacebuilding context are subject to orders from two institutions (the domestic state and the peacebuilding mission). This article explores the nature of interactions of these two institutions and their effect on local police officers’ compliance and resistance. Specifically, it analyzes the example of the police restructuring process in Bosnia and Herzegovina. It demonstrates that the choices of local officers to comply or resist depended on whether the interactions between the EU Police Mission and the local police organization were positive and mutually supportive, or whether they were competitive and contradictory. The findings of the article contribute to the debates on the role of local power and the importance of local legitimacy in peacebuilding. 相似文献
177.
Kenton G. Fasana 《Defence Studies》2018,18(2):167-187
Cyberspace is an avenue of approach through which a military force can attain objectives of value. Through these cyber avenues of approach, military forces can engage, vet, organize, and direct human agents to accomplish specific activities. Although the objectives of these activities could differ from traditional military objectives, they still have military relevance. This particular manifestation of cyber conflict is neither a new domain of war nor something outside of warfare. Rather, it can be viewed as an emerging avenue of approach in the larger context of military operations, auguring benefits in the integration of cyber activities with operations. 相似文献
178.
Christian Tripodi 《战略研究杂志》2017,40(7):990-1015
In his 1987 work Strategy: The Logic of War and Peace (Harvard University Press, Cambridge, MA, 1987), Edward Luttwak described strategy as a field of activity characterised not only by an innately complex relationship between designs, actions and outcomes, but so too by the frequent disparity between its theory and praxis. Similar observations on this subject have since been made by Richard K. Betts, Lawrence Freedman and Antulio Echevarria II. This article will use the Allied invasion of Sicily in July–August 1943 as a vehicle through which to test these theories against a signal event in the European theatre of the Second World War. It will illustrate how Operation Husky and its aftermath are a paradigm of the confusing and often illogical course of events associated with the process of formulating strategy and waging war. In so doing it demonstrates the benefits of using strategic theory to illuminate events and so move beyond the often insular focus of campaign histories, and simultaneously reinforces the importance of military history in informing a theoretical understanding of strategy. 相似文献
179.
The paper explores terrorist choice by applying two well-known theoretical frameworks: stochastic dominance and prospect theory (PT). We analyse each pair of attack methods that can be formed from the RAND-MIPT database and the Global Terrorism Database. Instances of stochastic dominance are identified. PT orderings are computed. Attention is accorded to the identification of ‘trigger points’ and the circumstances that may lead to an increased likelihood that a terrorist will select an attack method associated with a higher expected number of fatalities, i.e. a potentially more damaging attack method. 相似文献
180.
Antonio Giustozzi 《Small Wars & Insurgencies》2017,28(1):12-33
Although the Taliban insurgency was internally divided and unable to coordinate its activities in 2014–2015, the Afghan security forces were not able to contain it and steadily lost ground throughout 2015. Until 2015, there had been little effort to develop an indigenous Afghan counterinsurgency strategy, but a sense of urgency emerged after a string of Taliban victories. At the beginning of 2016, it was still not clear if and when the National Unity Government would be able to produce a counterinsurgency strategy and, in any case, the need for a coherent counterinsurgency approach became questionable as the Taliban appeared to be transitioning towards conventional warfare. 相似文献