首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   604篇
  免费   69篇
  国内免费   25篇
  698篇
  2024年   1篇
  2023年   1篇
  2022年   1篇
  2021年   17篇
  2020年   9篇
  2019年   29篇
  2018年   31篇
  2017年   36篇
  2016年   38篇
  2015年   23篇
  2014年   68篇
  2013年   105篇
  2012年   26篇
  2011年   40篇
  2010年   42篇
  2009年   37篇
  2008年   36篇
  2007年   27篇
  2006年   27篇
  2005年   28篇
  2004年   17篇
  2003年   20篇
  2002年   6篇
  2001年   6篇
  2000年   2篇
  1999年   5篇
  1998年   2篇
  1997年   4篇
  1996年   2篇
  1995年   2篇
  1994年   3篇
  1993年   3篇
  1992年   2篇
  1991年   1篇
  1990年   1篇
排序方式: 共有698条查询结果,搜索用时 15 毫秒
51.
Jian-li Su  Hua Wang 《防务技术》2021,17(6):1967-1975
Single unmanned aerial vehicle (UAV) multitasking plays an important role in multiple UAVs cooperative control, which is as well as the most complicated and hardest part. This paper establishes a three-dimensional topographical map, and an improved adaptive differential evolution (IADE) algorithm is proposed for single UAV multitasking. As an optimized problem, the efficiency of using standard differential evolution to obtain the global optimal solution is very low to avoid this problem. Therefore, the algorithm adopts the mutation factor and crossover factor into dynamic adaptive functions, which makes the crossover factor and variation factor can be adjusted with the number of population iteration and individual fitness value, letting the algorithm exploration and development more reasonable. The experimental results implicate that the IADE algorithm has better performance, higher convergence and efficiency to solve the multitasking problem compared with other algorithms.  相似文献   
52.
Cyberspace experiences worrying trends that could have a negative impact on the international strategic landscape. The lack or erosion of norms and risky practices and behaviors could lead to greater uncertainty and thus greater instability. Set against a context of renewed competition between great powers, these developments are also tied to the strategic structure of cyberspace. This forum is devoted to discussing factors leading to stability or and instability.  相似文献   
53.
To engage properly with the Somali National Army, to understand it in the hope of improving stability and the lives of over 12 million Somalis, good basic information on its composition and characteristics is necessary. Authoritative accounts on the subject have been scarce for over 25 years. This account seeks to detail the army’s dispositions across southern Somalia, and, more importantly, the brigades’ clan compositions and linkages. Clan ties supersede loyalties to the central government. The army as it stands is a collection of former militias which suffer from ill-discipline and commit crime along with greater atrocities. Estimates of numbers are unreliable, but there might be 13,000 or more fighters in six brigades in the Mogadishu area and five beyond.  相似文献   
54.
探讨了建立指挥军官任职培训效果评估量化指标体系应遵循的基本原则,提出了建立该指标体系的模型,运用基于主成分的因子分析方法研究了26项评估指标,确定了反映任职培训效果的5类指标类型,对指标类型的内涵进行了分析,说明建立的指标体系具有实际意义.  相似文献   
55.
避雷针保护范围的图形仿真与图解法分析   总被引:1,自引:0,他引:1  
针对避雷针设计过程中计算公式过于复杂的问题,提出了利用平面几何作图求解避雷针联合保护范围的方法,给出了单支、双支和四支避雷针保护范围的作图解题步骤,并利用计算机图形仿真,给出了避雷针保护范围的空间结构图形。  相似文献   
56.
刘丽等作者在《装甲兵工程学院学报》第19卷第2期中,利用非齐次线性方程组给出了一种身份认证协议和一种消息认证协议。指出了这2个协议在设计上存在的安全缺陷,并给出了几种可能的攻击方法。  相似文献   
57.
AFRICA     
Political violence, at times perceived as terrorism, remains a major security challenge in Swaziland. The common view is that this violence is perpetrated by those who feel marginalised from the political process. Central to the hypothesis advanced in this paper is that any effective solution to the menace of political violence and the security challenges it poses begins with an awareness of the symbiotic relation between security, human rights and democracy. It has been empirically proven that abuse of human rights can lead to violence, which negates peace and security in any society. In terms of content the paper looks at the shape of political violence in Swaziland. Next, it discusses the strategies and ideas behind efforts by the Swazi state to combat political violence and the counter-arguments. The final section shows the inextricable link between security, human rights and democracy; and argues that recognising this linkage can provide the key to unlocking the security puzzle in Swaziland.  相似文献   
58.
Much has changed since the United Nations was established in 1945. New challenges confront the organization including global warming, global diseases and global terrorism. Responding to these challenges requires continual change, adaptation and learning—a hallmark of the stewardship of current UN Secretary General Kofi Annan. In 1997 Annan announced major structural changes to streamline the organization, follow up five years later by another initiative to clarify, simplify and rationalize the organization and subsequent efforts to streamline UN peacekeeping. The UN has also forged new partnerships with civil society and the private sector. Important as these changes are, reform of the General Assembly and the Security Council hold the organization hostage to the vested interests of key member states. There are a number of options to make the Council more representative including regionalism, population distribution, economic weight, culture/religion/civilization and democracy. Clearly the largest challenge is the absence of representation for Asia, Africa and Latin America. Currently Germany, Japan, India and Brazil have strong claims—plus at least one candidate from Africa. Should these four countries decide to act in unison, they could force reform of the Security Council  相似文献   
59.
I am afraid there is clear evidence that acts of gross misconduct have taken place. This is a shameful thing for the United Nations to have to say, and I am absolutely outraged by it.

—Kofi Annan, United Nations Secretary-General

Despite promulgating a comprehensive set of guidelines to deter UN personnel from committing acts of sexual misconduct, allegations of sexual exploitation and abuse have become widespread within United Nations peacekeeping missions. The policy of zero-tolerance for peacekeeper misconduct has not been matched by strong disciplinary measures, and crimes are often ignored and rarely punished: absentee fathers, rapists and murderers simply disappear back in their home countries. In countries where women and children rarely have the same economic resources, political rights and authority or control over their environment—or their bodies—they easily become prey for those in perceived positions of power and authority. By failing to hold those responsible to account, the UN may in fact be fuelling even greater discrimination and violence against women and children. In order to ensure those who are mandated to protect to do not become perpetrators of abuse, the UN must take a stronger stand against those who commit acts of sexual misconduct, and must ensure that victims see that their abuser is brought to justice and that reparation is offered. A recent report submitted by the Secretary-General's Special Envoy on Sexual Exploitation and Sexual Abuse makes a comprehensive set of recommendations to prevent, detect, and respond to these allegations. The aim of this essay is to highlight some of the main points of the Special Envoy's report, and to examine the practical challenges the UN and troop/police contributing countries will face when attempting to implement these recommendations.  相似文献   
60.
Data limitations arising from non‐transparency in military expenditure reporting impose significant constraints on economists studying country and comparative developments in this field. This article focuses on the case of China. It reviews the recent literature on China's military expenditure, examines the variance in published estimates, and identifies three factors which help explain the variance: budgetary falsification; non‐budgeted PLA revenue; and the US dollar purchasing‐power parity of the yuan. Conclusions emphasize important policy implications of such variance and suggest a more active role for defence economists in a field of research generating considerable attention from international relations scholars.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号