全文获取类型
收费全文 | 375篇 |
免费 | 0篇 |
国内免费 | 4篇 |
专业分类
379篇 |
出版年
2025年 | 1篇 |
2024年 | 2篇 |
2023年 | 3篇 |
2022年 | 2篇 |
2021年 | 10篇 |
2020年 | 13篇 |
2019年 | 15篇 |
2018年 | 15篇 |
2017年 | 21篇 |
2016年 | 11篇 |
2015年 | 7篇 |
2014年 | 33篇 |
2013年 | 40篇 |
2012年 | 17篇 |
2011年 | 14篇 |
2010年 | 17篇 |
2009年 | 22篇 |
2008年 | 17篇 |
2007年 | 19篇 |
2006年 | 28篇 |
2005年 | 18篇 |
2004年 | 15篇 |
2003年 | 10篇 |
2002年 | 3篇 |
2001年 | 4篇 |
2000年 | 3篇 |
1999年 | 2篇 |
1998年 | 3篇 |
1997年 | 1篇 |
1995年 | 1篇 |
1993年 | 2篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 3篇 |
1989年 | 4篇 |
排序方式: 共有379条查询结果,搜索用时 0 毫秒
81.
美国国防部在世纪伊始成立的高能激光技术联合办公室专职人员不到10人,却能高效调动创新体系中所有创新单元,长期保持战略先导地位。本文全面介绍联合办公室的使命职能、编制组成、运行方式、科研项目、代表性成果以及重要决策,旨在为技术创新和管理创新提供参考和借鉴。 相似文献
82.
Given a number of patrollers that are required to detect an intruder in a channel, the channel patrol problem consists of determining the periodic trajectories that the patrollers must trace out so as to maximized the probability of detection of the intruder. We formulate this problem as an optimal control problem. We assume that the patrollers' sensors are imperfect and that their motions are subject to turn‐rate constraints, and that the intruder travels straight down a channel with constant speed. Using discretization of time and space, we approximate the optimal control problem with a large‐scale nonlinear programming problem which we solve to obtain an approximately stationary solution and a corresponding optimized trajectory for each patroller. In numerical tests for one, two, and three underwater patrollers, an underwater intruder, different trajectory constraints, several intruder speeds and other specific parameter choices, we obtain new insight—not easily obtained using simply geometric calculations—into efficient patrol trajectory design under certain conditions for multiple patrollers in a narrow channel where interaction between the patrollers is unavoidable due to their limited turn rate.© 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011 相似文献
83.
Benjamin Armstrong 《Small Wars & Insurgencies》2013,24(1):171-193
Maritime interests in the twenty-first century are not immune to the growing number of irregular challenges and hybrid threats that have come to dominate land warfare. In order to better understand these challenges a study of naval history can help provide a vital foundation. In the early 1830s the United States Navy dispatched the frigate USS Potomac to Sumatra to investigate a pirate attack on the spice trader Friendship. Potomac's crew of sailors and Marines conducted a landing at the village Quallah Batoo and fought a pitched battle. As the navies of the world approach naval irregular warfare in the new century, studying past examples like Potomac's mission can help illuminate the principles of successful naval irregular warfare. 相似文献
84.
Deane-Peter Baker 《African Security Review》2013,22(3):54-64
Abstract The mandate of South Africa's recently appointed National Planning Commission includes addressing ‘defence and security matters’. This article seeks to outline the central elements of the threat environment facing South Africa in the foreseeable future. It is argued that South Africa faces no meaningful existential threat from conventional military forces but that its security forces will need to be prepared to address possible raids and attacks by conventional military forces both on home soil and on vital interests beyond the nation's borders. Other threats highlighted include the threats posed by potential insurgencies, by terrorism, and by crime, social unrest and banditry. Also addressed is the danger of so-called hybrid threats, in which two or more of the single threat types outlined here are combined. Finally, the article challenges the National Planning Commission to rethink South Africa's policy on peace operations in the light of the need to ensure the safety and security of the nation's citizenry. 相似文献
85.
Shireen K. Burki 《Defense & Security Analysis》2013,29(3):234-252
There is widespread acknowledgment that the modus operandi of jihadis affiliated with Al Qaeda and associated movements (AQAM) relies on brutal terror-inducing tactics which, more often than not, target Muslim and non-Muslim non-combatants. This article comparatively analyzes the AQAM modus operandi within the traditional stipulations of Islamic precepts with respect to waging jihad al saghir. The purpose is to glean whether or not such tactics such as suicide bombings, declaring fellow Muslim apostates in order to kill them, use of IEDs and EFPs to target civilians, constitute legitimate rules of engagement in jihad al saghir. 相似文献
86.
基于CPN建模的行动方案开发与分析系统设计 总被引:1,自引:0,他引:1
协助和支持军事计划人员制订和分析作战计划的建模与仿真能力是军方的现行需求,而行动方案的开发与分析则是作战计划建模与仿真的重点。针对作战计划过程期间开发的军事任务的排序与调度问题,设计了一个行动方案开发与分析系统,系统采用客户机-服务器体系结构,运用基于有色Petri网建模的军事计划领域的概念表示法,并使用状态空间分析技术完成军事任务的自动化排序与调度。军事计划人员通过图形用户界面使用系统,在面对紧急突发事件时,可以快速及时地开发出适当可行的COA,并对COA进行逻辑可行性分析。 相似文献
87.
联合作战通信的完备性指标的建模分析与计算 总被引:1,自引:1,他引:0
从联合作战用户对通信需求的实际出发,探讨了完备性指标的定义及数学描述,并根据通信节点和通信链路所受破坏的不同情况研究了完备性指标的几种分析方法,最后结合实例,采用其中一种全代数化的算法,并对其进行了改进来实现联合作战通信的完备性指标的计算. 相似文献
88.
89.
北斗载波相位时间差分/SINS紧组合技术与实验研究 总被引:1,自引:1,他引:1
说明北斗系统有源定位模式的不足,提出一种基于载波相位时间差分的北斗/SINS紧组合导航技术,即以导航卫星载波相位信号的时间差分作为Kalman滤波器的观测量,建立工作于无源方式的北斗/SINS紧组合导航系统。介绍载波相位时间差分的基本原理和数学模型,设计组合导航滤波器。通过动态和静态实验对算法的正确性和精度进行验证。实验结果表明,SINS的位置和速度误差积累受到有效的抑制,导航精度明显提高。 相似文献
90.
2020年初发生的\"新冠肺炎\"疫情是新中国成立以来防控难度最大的重大突发公共卫生事件,也是对军队应急防疫保障体系的实际检验。军队应立足于军民融合战略思想的大背景,着眼非战争军事行动应急防疫保障体系建设的实际,完善重大疫情防控体制机制,进一步健全公共卫生体系,以全面提升防控和救治能力。本文结合当前新型冠状病毒肺炎疫情和以往非战争军事行动应急防疫保障的实践经验,分析了非战争军事行动卫生防疫保障的特点,阐述了其经验做法和存在的不足,从防疫指挥救治、应急物资保障、卫勤保障法律、心理危机干预以及防疫研发攻关等五个方面给出了对策措施,希翼随着军民融合不断深入推进,军地救治经验的相互交流和科研技术的协助攻关,本研究能够为非战争军事行动应急防疫保障体系建设提供一些参考。 相似文献