首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1905篇
  免费   534篇
  国内免费   234篇
  2024年   9篇
  2023年   16篇
  2022年   39篇
  2021年   45篇
  2020年   44篇
  2019年   29篇
  2018年   25篇
  2017年   99篇
  2016年   156篇
  2015年   86篇
  2014年   154篇
  2013年   169篇
  2012年   163篇
  2011年   152篇
  2010年   111篇
  2009年   166篇
  2008年   108篇
  2007年   142篇
  2006年   159篇
  2005年   133篇
  2004年   118篇
  2003年   81篇
  2002年   66篇
  2001年   63篇
  2000年   57篇
  1999年   32篇
  1998年   50篇
  1997年   34篇
  1996年   37篇
  1995年   33篇
  1994年   19篇
  1993年   17篇
  1992年   15篇
  1991年   20篇
  1990年   18篇
  1989年   7篇
  1988年   1篇
排序方式: 共有2673条查询结果,搜索用时 15 毫秒
721.
对宫颈细胞进行多分类可以自动识别出不同状态的细胞,进而为宫颈癌诊断提供科学依据。在用6种多分类算法进行实验后,选取支持向量机作为基分类器,先用一对一策略训练6个分类器进行3分类,然后再训练1个2分类器,这种二层4分类方法提高了识别准确率。考虑不同层特征模式的差异性,在保证识别性能的同时,每层分类前先采用主成分分析法将原始154维特征变换到低维空间,去除冗余特征,加快识别速度。实验证明,所提层次主成分分析法在宫颈细胞分类中相比6种传统多分类方法有更高的识别准确率,可达90%以上;识别速度也较普通层次法提升了21.31%。  相似文献   
722.
拦截弹中制导最优弹道簇生成   总被引:1,自引:0,他引:1       下载免费PDF全文
针对临近空间高超声速目标飞行速度快,跟踪预测难的特点,提出在中制导阶段进行最优弹道设计与弹道簇生成用于对目标预测命中区域进行有效覆盖的方法。通过分析临近空间高超声速目标对现有防空体系带来的挑战,阐明了在中制导段进行弹道簇设计与生成的必要性;将中制导段的弹道规划问题视为求解满足多种约束条件下的最优控制问题,应用最优化理论方法得到了基准的最优弹道;应用邻域最优控制理论,针对终端约束条件进行调整,设计了邻域最优弹道簇的生成算法。仿真验证了所提方法的有效性。  相似文献   
723.
大规模协同作战中的高效通信问题为当前信息战的研究重点之一,但由于单独作战单元无法了解全局的信息内容及需求方,这给通信资源有限的参战兵力之间的态势共享带来了困难。为此提出了一个分布式协作信息分发算法,在理论上借鉴了复杂网络的小世界特性,即单元节点可以通过邻节点在较少跳数内完成信息的传输。在思路上利用了信息相关性概念,作战单元利用信息之间的关联性及信息与节点之间的收发关系建立控制信息发送的路由表。并通过仿真实验验证了不同网络拓扑下算法性能的变化情况,结果证明分发算法能较好地支持信息共享。  相似文献   
724.
多火力单元责任扇区的动态调整是防空导弹指挥控制系统的核心功能之一,通过引入可打击目标数和覆盖目标数的概念及计算方法,提出了一种新的多火力单元责任扇区调整方法。该方法能快速有效地确定多火力单元责任扇区调整方案。  相似文献   
725.
路征  龚燕 《国防科技》2017,38(2):024-027
信息化战场上,复杂电磁环境严重制约雷达辐射源识别过程。通过梳理雷达辐射源识别技术发展阶段及各阶段主要识别方法,深入分析了现阶段雷达辐射源识别技术面临的主要挑战,并提出应对策略,为创新雷达辐射源识别方法提供借鉴。研究表明,针对未来战场雷达识别面临的主要挑战,平时做好预判,熟谋对策,将极大地有利于战时进行雷达辐射源识别,进而促进整个电子对抗行动作战效能的发挥。  相似文献   
726.
翟东航  张娜  段慧娇 《国防科技》2017,38(2):105-110
提出互联网+时代军队院校面临与军队新型作战能力培养有关的国家安全时代课题,从整合新媒体网络资源、依托校园文化平台、构建国家安全教育体系三方面进行了对策分析,重点探索与新军事变革密切相关的"文化安全、军事话语传播、地缘政治"等议题,以学术活动的顶层设计将国家安全教育融入军事院校学员具有中国特色的军事理论创新。  相似文献   
727.
Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities.  相似文献   
728.
The idea of deploying noncollocated sources and receivers in multistatic sonar networks (MSNs) has emerged as a promising area of opportunity in sonar systems. This article is one of the first to address point coverage problems in MSNs, where a number of points of interest have to be monitored in order to protect them from hostile underwater assets. We consider discrete “definite range” sensors as well as various diffuse sensor models. We make several new contributions. By showing that the convex hull spanned by the targets is guaranteed to contain optimal sensor positions, we are able to limit the solution space. Under a definite range sensor model, we are able to exclude even more suboptimal solutions. We then formulate a nonlinear program and an integer nonlinear program to express the sensor placement problem. To address the nonconvex single‐source placement problem, we develop the Divide Best Sector (DiBS) algorithm, which quickly provides an optimal source position assuming fixed receivers. Starting with a basic implementation of DiBS, we show how incorporating advanced sector splitting methods and termination conditions further improve the algorithm. We also discuss two ways to use DiBS to find multiple source positions by placing sensors iteratively or simultaneously. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 287–304, 2017  相似文献   
729.
Do ceasefires or peace talks create fragmentation in the insurgent groups? Rather than proposing claims that can offer predictions about armed groups behaviour under ceasefires or peace processes, the analysts tend to focus largely on the dynamics between state and non-state actor. The experts pay little attention to overtime changes in social and local political context which might contribute to propelling a rebel group towards fragmentation and factionalism. The present study intends to fill this gap by exploring the shifting role of public opinion and ethnic support for the peace talks to ascertain whether it can increase the likelihood of factionalism in rebel groups or not. This article applies this approach to the case of Naga National Movement (1947–2015) in India, and finds that the proposed variable appears to have increased the frequency of factionalism in the movement.  相似文献   
730.
Despite the prevalence of violent uprisings against the states, existing literature has produced a generalized explanation of the causes and onset of such uprisings ignoring crucial aspects of (non-state) armed group cohesion, such as their capabilities to manage intra-group tensions and rivalries. In this paper, I examine recent research in the field of civil conflict to understand the importance of investigating underlying constraints which can cause serious impediments to the capabilities of a state during the course of a war. The paper then focuses on the importance of internal strategic resources, such as pre-war and wartime sociopolitical networks in which insurgents mobilize, recruit new cadres and maintain intra-group cooperation, to suggest how it can contain the consequences of counterinsurgency operations and other state strategies on the internal cohesion of an insurgent group. A detailed case study of the Mizo National Front (MNF) in India demonstrates the argument’s plausibility.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号