首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   627篇
  免费   93篇
  国内免费   53篇
  2024年   1篇
  2023年   2篇
  2021年   20篇
  2020年   9篇
  2019年   29篇
  2018年   30篇
  2017年   39篇
  2016年   51篇
  2015年   23篇
  2014年   61篇
  2013年   111篇
  2012年   26篇
  2011年   46篇
  2010年   44篇
  2009年   46篇
  2008年   46篇
  2007年   31篇
  2006年   39篇
  2005年   39篇
  2004年   21篇
  2003年   23篇
  2002年   5篇
  2001年   6篇
  2000年   4篇
  1999年   4篇
  1998年   8篇
  1996年   1篇
  1995年   3篇
  1994年   1篇
  1993年   1篇
  1990年   2篇
  1989年   1篇
排序方式: 共有773条查询结果,搜索用时 390 毫秒
121.
为占有信息优势,进而占有决策优势,美军在总结近年实际战争经验的基础上,提出服务发现体系结构。在深入研究美军NCES(net-centerenterpriseservice)服务发现体系结构的基础上,分析了NCES的背景和发展趋势,NCES服务发现体系结构的含义和优势,其视图、关键技术和不足等。借鉴美军建设该体系结构的思想与发展趋势,立足我军实际情况,建设我军自己的服务发现体系结构。有助于提高我军信息获取能力,为占有决策优势提供强有力的支持。  相似文献   
122.
避雷针保护范围的图形仿真与图解法分析   总被引:1,自引:0,他引:1  
针对避雷针设计过程中计算公式过于复杂的问题,提出了利用平面几何作图求解避雷针联合保护范围的方法,给出了单支、双支和四支避雷针保护范围的作图解题步骤,并利用计算机图形仿真,给出了避雷针保护范围的空间结构图形。  相似文献   
123.
信息安全保障与信息作战的关系探究   总被引:1,自引:0,他引:1  
为了给信息作战计划的制定、行动的实施提供安全保障指导,探讨了信息安全保障与信息作战(IO)之间的关系,以几种典型信息作战要素和信息作战空间的三个层次为对象,详细分析了信息安全保障与二者之间的关系。为军队信息安全保障体系的建立提供一定理论支持。  相似文献   
124.
面向Agent方法是很有前途的C3I系统体系结构分析方法.提出了对C3I系统体系结构进行Agent组织、Agent和Agent内部三个层次分析的基本方法.采用AUML(Agent统一建模语言)并对其进行扩展,对巡航导弹C3I系统进行了面向Agent组织的分析建模:建立用例模型描述系统需求;用Agent组织类图描述系统静态结构;用顺序图或协作图描述Agent组织之间的交互;用活动图描述Agent组织的工作流程和并发行为.  相似文献   
125.
通过对现有多级安全数据库体系结构和策略模型的研究,分析它们各自存在的不足,给出了一个基于核心化体系结构的MLS-DBMS体系结构,并在现有策略模型的基础上,提出了一个基于扩展安全级的安全模型.该安全模型增加了策略模型的灵活性,提高了数据库系统的安全性和可用性.  相似文献   
126.
水声信息流仿真软件系统涉及多目标、多声纳以及多变的海洋环境.仿真软件的复用性是现代软件工程的重要性能指标.针对系统开放性的特点,在领域分析模型的基础上,采用了面向对象方法设计仿真软件模型.为了满足软件多层次复用的需求,应用软件架构技术和设计模式设计仿真软件.根据水声信息流仿真软件需求,系统划分为四层结构;按功能,层又可分解为包.可复用的设计模式用于设计不同层和包中类之间的关系.提出的仿真软件模型具有良好的可扩充性与可复用性.  相似文献   
127.
设计安全策略模型时应考虑安全策略的时序特性和灰色特性,还应综合考虑保密性、完整性和可用性三方面的需求。已有的安全模型没有描述时序性和灰色特性,而且一般只侧重描述保密性或完整性。为此,本文提出了动态灰色时序系统(简称DGTS)。本文详细描述了DGTS,以及基于DGTS的动态语义设计的灰色时序安全策略规范语言GTSL。  相似文献   
128.
Radioactive sealed sources have a long history and a much wider worldwide distribution than do weapons-usable fissile materials. This article compares the mechanisms for controlling radioactive sources with those of weapons-usable materials and makes the case for improved policy making on the safe and secure management of radioactive sources (often referred to simply as “sources”). Such sources have been widely distributed with commercial and government support to nearly every country, yet there are no legally binding, international agreements or regulations to control any aspect of their life cycle. This is problematic because some sources that are disused, abandoned, or otherwise fall out of regulatory control could be used in the form of a radiological dispersal device (RDD, or dirty bomb). An RDD could pose significant economic and psychological impacts with the potential for detrimental effects on public health. The lack of international measures to control sources is troubling for several reasons: creating an RDD is much easier than fashioning a nuclear weapon from scratch or from stolen fissile materials; given the many incidents involving diversion from regulatory control and the misuse of sources, an RDD attack would be one of the more likely scenarios; materials security for sources is generally weak and inconsistent; it is nearly impossible to determine the total amount of sources manufactured and distributed; used sources are frequently found uncontrolled and transiting borders, and penalties are light at best; the market-based supply and demand of sources facilitates their rapid and loosely regulated distribution; and the “peaceful uses” aspect of the Treaty on the Non-Proliferation of Nuclear Weapons along with norms that began developing around the time of Atoms for Peace have promoted the nearly unchecked global distribution of sources. Several immediate and long-term actions are suggested to reduce the threat posed by radiological sources.  相似文献   
129.
SADC has a poor record in advancing peace and security in Southern Africa. Many identify poor policy frameworks and weak technical capacities as the major obstacles. Laurie Nathan goes beyond these easy explanations in his important new book on SADC. Absence of common democratic values and reluctance to surrender state sovereignty are key factors preventing SADC from making progress according to this book. This article argues that Nathan overstates the case and that there are real prospects and potentials for making further progress in regional cooperation. The lessons from the history of European integration also points to the important role of regional leadership. South Africa, in coalition with other likeminded countries, may still be in a position to move the SADC project forward.  相似文献   
130.
As worries have grown about global warming and the sustainability and price of fossil fuels, the demand for nuclear energy has increased, and nuclear power is increasingly viewed as a reliable and clean resource. However, the so-called nuclear renaissance coincides with an international security environment in which the norms of nuclear nonproliferation seem to be eroding. Turkey, a non-nuclear weapon state, plans to generate nuclear power to meet future energy demands, but it is aware of and concerned with regional proliferation trends. Questions have also been raised regarding Ankara's rationale for using nuclear energy, as well as its potential motivations and capabilities regarding future proliferation. This article will provide an overview of Turkey's nuclear energy history and plans, as well as the proliferation-related questions that could arise; it will also look at the domestic debate on nuclear energy and Turkey's status as a non-nuclear weapon state.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号