首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   490篇
  免费   37篇
  国内免费   17篇
  2024年   1篇
  2023年   1篇
  2021年   13篇
  2020年   6篇
  2019年   28篇
  2018年   29篇
  2017年   33篇
  2016年   33篇
  2015年   17篇
  2014年   49篇
  2013年   97篇
  2012年   10篇
  2011年   28篇
  2010年   35篇
  2009年   28篇
  2008年   33篇
  2007年   21篇
  2006年   18篇
  2005年   20篇
  2004年   13篇
  2003年   15篇
  2002年   4篇
  2001年   4篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1995年   2篇
  1993年   1篇
  1990年   1篇
排序方式: 共有544条查询结果,搜索用时 25 毫秒
381.
一种提高正横布置潜艇发射装置发射安全性的方法   总被引:3,自引:1,他引:2  
正横布置的潜艇发射装置在发射鱼雷诱饵时,由于受潜艇航行带来的水流作用力的影响,鱼雷诱饵出管后将向潜艇的尾部方向回转,如果潜艇发射鱼雷诱饵时的航速较高,则这种回转将十分严重,有可能与发射艇的尾部相碰撞,这将给发射艇及鱼雷诱饵带来安全性问题.文中提出了一种鱼雷诱饵发射装置在艇上作向前倾斜的斜置式布置结构.数值仿真结果表明:此种布置方式可以削弱鱼雷诱饵出管以后的回转趋势,从而可以避免较高航速时鱼雷诱饵与发射艇的回转碰撞.  相似文献   
382.
由于某框架结构在施工过程中发生了明显的不均匀沉降,结构体可能存在安全隐患。为此,对该框架结构进行了现场检测,根据检测结果,应用大型有限元软件ANSYS对地基变形后的结构安全性进行分析,合理评价了结构性能,其工程经验可供参考。  相似文献   
383.
根据数据链系统的故障检测困难的特点,采用故障树分析法,建立了数据链系统的故障树;在详细分析数据链系统故障特点的基础上,提出了端口功能检测法、调制解调器替代法和电性能参数检测法3种故障定位方法。设计了端口功能检测法中数据测试仪、终端设备模拟器和自环测试监测仪的系统连接方法,设计了调制解调器替代法的系统连接方法和电性能参数检测法的常见电性能参数。综合使用故障检测定位方法,可快速定位数据链系统常见故障。  相似文献   
384.
直升机野战油料保障模拟优化研究   总被引:1,自引:0,他引:1  
野战条件下,场站通常在前沿阵地开设野战直升机场实施伴随保障,其中油料保障主要采取飞机加油车先对直升机实施加油,后到野战机场油库领取油料这一方式进行。若将野战直升机场油料保障作为一个系统来研究,要实现适时、适量的油料保障,确定合适的飞机加油车及野战机场油库发油鹤位数量是一个关键问题。利用GPSSW语言对这一问题进行模拟,得出模拟结果并进行统计分析,经反复模拟和参数比较得到适合的参数,为部队保障提供依据。  相似文献   
385.
In the aftermath of the tragic events of 11 September 2001, numerous changes have been made to aviation security policy and operations throughout the nation's airports. The allocation and utilization of checked baggage screening devices is a critical component in aviation security systems. This paper formulates problems that model multiple sets of flights originating from multiple stations (e.g., airports, terminals), where the objective is to optimize a baggage screening performance measure subject to a finite amount of resources. These measures include uncovered flight segments (UFS) and uncovered passenger segments (UPS). Three types of multiple station security problems are identified and their computational complexity is established. The problems are illustrated on two examples that use data extracted from the Official Airline Guide. The examples indicate that the problems can provide widely varying solutions based on the type of performance measure used and the restrictions imposed by the security device allocations. Moreover, the examples suggest that the allocations based on the UFS measure also provide reasonable solutions with respect to the UPS measure; however, the reverse may not be the case. This suggests that the UFS measure may provide more robust screening device allocations. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2005.  相似文献   
386.
军事装备大数据是实现军事现代化、智能化的基础,其中,数据共享对实现装备可视化管理、整合装备供应链、优化指挥控制系统等具有至关重要的作用。军事装备数据涉及核心机密,数据的安全共享问题是导致这些技术发展迟缓的关键因素之一。区块链是一种具有去中心化、不可篡改、稳定可靠等特性的分布式链式账本技术,利用区块链技术和云计算可以保障装备数据安全,在军事领域有着广阔的发展前景。本文面向装备数据安全共享业务开展研究,探讨利用基于属性加密技术和智能合约技术解决不同主体间的信任问题,并提出了基于区块链的装备数据安全共享方案,以打破传统装备系统中的“信息孤岛”现象。  相似文献   
387.
介绍计算机病毒及其防护知识 ,提高用户的安全防范意识 ,做好计算机系统的安全防范工作。  相似文献   
388.
In the last decade, cyber conflict has become a main feature of international politics and a growing concern for strategic stability and collective security. Unfortunately, cyber conflict suffers from a lack of conceptual clarity about its impact on collective security and a lack of consensus among international actors on how to interpret it. This article proposes to understand cyber conflict as an evolving process driven by two factors: the way in which digital space is configured and the way in which tactical, organizational, strategic, and doctrinal characteristics related to cyber have been included in the field of national and international security. Both tend to encourage offensive behavior but also demonstrate features pointing to restraint.  相似文献   
389.
Most counterinsurgency campaigns have featured the use of some form of local defense forces. Such forces have had a somewhat mixed record, both in their usefulness in actually countering insurgents and in their longer-term impact on internal security. This article focuses on historical cases that provide lessons for the best operational and strategic uses of local defense forces and measures to control their activities.  相似文献   
390.
This article analyzes the North Korean nuclear crisis from a balance-of-power perspective. It is in the long-term interests of international peace for a secure and independent North Korea to serve as a buffer between US and Chinese ground forces. However, the conventional military advantage of the South Korean-American alliance over North Korea has grown drastically since the end of the Cold War, threatening North Korea’s survival. Since North Korea lacks any reliable ally, nuclear weapons represent its most cost-effective way to restore a balance of power and thus secure itself. Accepting security guarantees in exchange for its nuclear arsenal is rhetorically appealing but not a viable approach. North Korea’s development of intercontinental ballistic missiles (ICBMs), however, has overcompensated for the post-Cold War imbalance, inviting talk in Washington of waging a preventive war. Persuading North Korea to give up its ICBM capability, not its nuclear arsenal, should therefore be the primary objective of US diplomacy.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号