全文获取类型
收费全文 | 1368篇 |
免费 | 105篇 |
国内免费 | 74篇 |
出版年
2023年 | 2篇 |
2022年 | 6篇 |
2021年 | 43篇 |
2020年 | 41篇 |
2019年 | 45篇 |
2018年 | 51篇 |
2017年 | 76篇 |
2016年 | 73篇 |
2015年 | 17篇 |
2014年 | 143篇 |
2013年 | 156篇 |
2012年 | 82篇 |
2011年 | 102篇 |
2010年 | 94篇 |
2009年 | 90篇 |
2008年 | 75篇 |
2007年 | 69篇 |
2006年 | 69篇 |
2005年 | 54篇 |
2004年 | 64篇 |
2003年 | 37篇 |
2002年 | 31篇 |
2001年 | 42篇 |
2000年 | 19篇 |
1999年 | 16篇 |
1998年 | 5篇 |
1997年 | 10篇 |
1996年 | 8篇 |
1995年 | 7篇 |
1994年 | 3篇 |
1993年 | 4篇 |
1992年 | 8篇 |
1991年 | 2篇 |
1990年 | 1篇 |
1988年 | 2篇 |
排序方式: 共有1547条查询结果,搜索用时 15 毫秒
891.
军事信息系统作战活动描述方法研究* 总被引:1,自引:0,他引:1
针对军事信息系统需求分析需要,探讨了作战活动过程描述、作战节点连接描述、节点状态转换描述和作战活动时序描述的内容和方法。基于该理论和方法,可以准确描述信息化条件下军事人员对军事信息系统的应用需求,实现军事人员与技术人员的有效沟通,为军事信息系统军事需求分析与应用设计的基础。 相似文献
892.
893.
894.
为了实现对船舶水下电场信号目标特征的控制,提出一种信号预测的方法。对测得的信号进行小波分解并分别在静电场和轴频电场频段进行重构。对高频的轴频电场信号构建自回归预测模型,对低频的静电场信号以灰色GM(1,1)模型进行拟合。将预测结果进行叠加得到对下一时刻电场信号的预测值。实测数据对该方法的检验结果表明:用该方法对船舶水下电场进行预测,电场的预测误差在原信号幅值的20%以内。 相似文献
895.
Ross W. Bellaby 《Journal of Military Ethics》2016,15(4):299-319
The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently doing but also predict what their next move might be. However, the ethical implications are unclear and the backlash following Edward Snowden’s revelations have shown that such activities are not without controversy. This leaves the debate stuck between the important, ethical role that intelligence can play and the potential for its unrestrained use to cause undue harm. This paper will resolve this by giving greater detail to cyber-intelligence practices, highlighting the different levels of harm that the various intelligence operations can cause. The essence of this paper is not that cyber-intelligence should be banned outright, but that it can be justified given the necessary circumstances. Therefore, the paper will develop a specialised set of Just Cyber-Intelligence Principles, built on the just war tradition, to outline if and when such activities are justified. 相似文献
896.
897.
898.
针对SSG/LRR-ω雷诺应力模型,选取NASA湍流资源网站上的四个典型算例,即湍流平板边界层流动、带凸起管道流动、翼型尾迹区流动和NACA0012不同攻角绕流,开展初步的验证与确认工作,将部分结果和CFL3D进行对比。对于NACA0012翼型绕流,对比雷诺应力模型和SA模型的升力系数,结果表明:在失速攻角附近,雷诺应力模型明显优于SA模型。在此基础上,将该模型应用于DLR-F6翼身组合体的数值模拟,计算得到的机翼表面典型站位压力分布和实验值吻合良好,同时该模型捕捉到翼身交汇位置的小范围分离。 相似文献
899.
900.
Stratis Andreas Efthymiou 《Defence Studies》2016,16(4):408-426
This article provides a theorisation of militarism in post-war Cyprus. Based on qualitative empirical research conducted in Cyprus in 2011, the article explores the manifestation and steadfastness of Greek-Cypriot militarism, and the development of this militarism, which appeared after the partition of the island in 1974. In particular, it proposes the ideology of defence as a way to understand post-war Greek-Cypriot militarism. It shows the embedded nature of defence in the idea of the national struggle. It aims at mapping the character of this militarism in order to provide the grounds for future discussion. Only by understanding the interconnecting discourses that made Greek-Cypriot militarism possible in post-war Cyprus, can we understand its past, present, and future. 相似文献