首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   362篇
  免费   44篇
  国内免费   10篇
  2023年   1篇
  2022年   1篇
  2021年   5篇
  2020年   8篇
  2019年   11篇
  2018年   8篇
  2017年   17篇
  2016年   14篇
  2015年   7篇
  2014年   24篇
  2013年   32篇
  2012年   28篇
  2011年   31篇
  2010年   35篇
  2009年   38篇
  2008年   19篇
  2007年   31篇
  2006年   19篇
  2005年   22篇
  2004年   11篇
  2003年   9篇
  2002年   9篇
  2001年   13篇
  2000年   7篇
  1999年   6篇
  1998年   1篇
  1997年   1篇
  1995年   3篇
  1993年   1篇
  1992年   1篇
  1990年   1篇
  1989年   1篇
  1988年   1篇
排序方式: 共有416条查询结果,搜索用时 320 毫秒
111.
为了解决目前装备在保障性方面存在的问题,给出了可操作性强而且实用的保障性风险识别与分析的技术与方法。该方法包括保障性风险区域的确定,保障性风险判断准则的建立,保障性风险的量化,保障性风险的评定等,为保障性风险管理提供了有效的方法和手段,从而为提高装备战备完好性和作战能力提供了有力支持。  相似文献   
112.
线性系统测试矩阵优化   总被引:2,自引:2,他引:0       下载免费PDF全文
研究了工程中常见的线性系统循环指数为1(即其约当标准形不同的约当块不出现重根)的情况下测试矩阵优化的方法.通过将系统矩阵变换为约当标准型,能够简单地判定测试矩阵能否保持系统可观测.采用该方法可以在保持系统可观测的情况下,简单而直观地获取系统测试代价最小的测试策略.例子表明,该算法在工程上易于应用.  相似文献   
113.
通常卫星的唯一能源来源是太阳能,因此星上网络设备的能源供应问题比地面网络的更加严峻。通过修改和扩展链路容量受限的最小代价多商品流模型来适应卫星网络这一特殊的体系结构,并基于低轨道卫星网络的多重覆盖机制和流量分布模型,改进现有的启发式算法来关闭冗余的卫星节点、星地链路和星间链路。在满足链路利用率和路由跳数增加比例约束的条件下,仿真实验中关闭上述三种参数的比例分别可达59%、61%和72%,卫星网络的总体节能比例可达65%。  相似文献   
114.
针对精确制导弹药制导控制系统低成本的迫切需求,提出了一种弹载低成本制导控制系统设计方法。建立了一种弹载制导控制系统低成本体系架构,从功能、硬件、软件等方面对其进行了GNC一体化设计,并在此基础上提出了一种基于ARM处理器的一体化制导计算机设计方法。针对MEMS导航系统精度低、噪声大特点,设计了一种惯性/卫星数字制导方案。该低成本制导控制系统设计方法可有效减少系统冗余硬件,降低成本,实现较高的制导控制精度,满足未来低成本精确制导武器的需求。  相似文献   
115.
The profession of arms is distinct from other professions for many reasons. One reason which is not so obvious is that, unlike members of other professions, soldiers may go their entire careers preparing for a day that never arrives. All things considered, we should think this to be a very good thing. For soldiers, however, this can feel somewhat odd, since there is a natural desire to want to feel useful and to see one’s role and purpose find realization. Accordingly, the common soldier is forced to adopt a rather paradoxical mindset, one of longing for peace, and therefore for uselessness, while at the same time longing to be useful, which would entail that there be a war. This latter desire to be useful and to vindicate one’s identity as a soldier can sometimes take on an unhealthy life of its own. The pull of wanting too strongly to live up to a warrior identity, I argue, can sometimes skew a soldier’s ability to assess risk rationally. This article will therefore investigate how a soldier’s concept of self influences his or her overall capacity to evaluate risk in war and when such influence might become morally problematic.  相似文献   
116.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy.  相似文献   
117.
This paper empirically examines whether the aging of a fleet affects operational availability and operating cost using a unique data-set on the 117 47-foot Motor Lifeboats (MLBs) of the United States Coast Guard (USCG). Procured from 1997 to 2003, the 47-foot MLB is the standard lifeboat of the USCG and all 117 MLBs remain in service. The aging of the MLB fleet has resulted in higher annual operating costs and lower operational availability, although the nature of this relationship remains unclear. Our estimation strategy utilizes an error components estimator to examine these issues. We employ three variants of the dependent variables (i.e. the standard logarithmic transformation as is most commonly seen in the literature, inverse hyperbolic sine [IHS], and level outcomes). The point estimates from the standard logarithmic model finds operational availability for the MLBs decreases at a rate between 0.83 and 1.8% per year and cost increases at a rate between 0.33 and 7.81% per year. Similar effects are shown with the IHS and level outcome specifications. In terms of nonlinearity effects, we find the most pronounced changes in operational availability and cost occur for MLBs aged 15 years or more (in comparison to younger MLBs).  相似文献   
118.
传统的主动学习方法往往仅基于当前的目标模型来挑选样本,而忽略了历史模型所蕴含的对未标注样本预测稳定性的信息。因此,提出基于不稳定性采样的主动学习方法,依据历史模型的预测差异来估计每个未标注样本对提高模型性能的潜在效用。该方法基于历史模型对样本的预测后验概率之间的差异来衡量无标注样本的不稳定性,并挑选最不稳定的样本进行查询。在多个数据集上的大量实验结果验证了方法的有效性。  相似文献   
119.
In terrorism research, three different sources of information and data exist: the terrorists and their environment; the incidents; and the population. This article discusses the strengths and weaknesses of research that is concerned with, or relies on, any of the mentioned sources. An in-depth understanding of the methodological issues that come with these sources is important to correctly interpret results from scientific studies. It is highlighted how the different scientific approaches add to a holistic view of terrorism as a phenomenon. Furthermore, the double-edged sword of information in the field of terrorism is discussed. From these deliberations, guidance concerning the future work of both scholars and decision-makers can be deducted.  相似文献   
120.
提出了信息化背景下边境安全风险情报分析的基本概念及其内涵,论述了信息化背景下边境安全风险分析系统的架构和面向边境安全风险分析的信息组织方式。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号