首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2022篇
  免费   464篇
  国内免费   221篇
  2024年   5篇
  2023年   17篇
  2022年   19篇
  2021年   44篇
  2020年   47篇
  2019年   66篇
  2018年   68篇
  2017年   114篇
  2016年   142篇
  2015年   74篇
  2014年   182篇
  2013年   251篇
  2012年   151篇
  2011年   131篇
  2010年   134篇
  2009年   167篇
  2008年   129篇
  2007年   128篇
  2006年   155篇
  2005年   131篇
  2004年   103篇
  2003年   88篇
  2002年   57篇
  2001年   54篇
  2000年   30篇
  1999年   43篇
  1998年   35篇
  1997年   30篇
  1996年   18篇
  1995年   18篇
  1994年   11篇
  1993年   15篇
  1992年   14篇
  1991年   13篇
  1990年   17篇
  1989年   5篇
  1987年   1篇
排序方式: 共有2707条查询结果,搜索用时 31 毫秒
811.
针对运载火箭伺服机构故障,提出了一种基于扩展多模型自适应估计的故障检测与诊断算法。首先建立了考虑伺服机构故障的运载火箭姿态动力学模型,其次将故障角度作为状态变量得到增广状态空间模型,然后利用扩展卡尔曼滤波器进行状态向量和故障参数的非线性估计,并基于传感器测量数据采用假设检验算法在线计算故障发生的概率,最后给出了基于扩展多模型自适应估计的故障检测与诊断算法流程。该方法的优点是只用一个扩展卡尔曼滤波器就可完成一个伺服机构的故障检测与诊断,从而大幅减小用于伺服机构故障检测与诊断的滤波器数量。仿真结果表明,该方法在无故障时可对伺服机构进行健康监测,在单台伺服机构故障下,可以及时准确判断出哪一台芯级伺服机构发生故障,并可准确估计出伺服机构故障下的发动机摆角角度。  相似文献   
812.
针对同时具有输出和输入非线性的系统,通过中间虚拟控制量的设置,转化为两个非线性子系统的串联,从而简化系统结构并解决最终控制量不宜直接获取的问题。针对无人水面艇的航迹和横摇控制,设计了基于反演控制的从控制器,实现了输入非线性中虚拟控制量到舵角的映射,通过T-S模型将输出非线性系统,转化为线性时变系统,并考虑舵机的角度与角速度约束,设计了广义预测主控制器。该方法不仅简化了系统结构,同时仿真结果表明,所设计的主从控制器可以获得较好的控制效果。  相似文献   
813.
Critical security advocates commonly portray strategic studies as crippled by its narrow focus on Cold War-era military issues, as state-centric and as Western-centric. I argue that this conception of the scope of strategy is flawed and I offer a comprehensive rebuttal by working out the logic of the theories advanced by Carl von Clausewitz and Thomas Schelling. The proponents of critical security overlook the striking expansion of strategy during the Cold War, its longstanding inclusion of competing political actors not just states, as well as its capacity to put Western and non-Western actors in a common analytic frame. By breaking out of the conceptual jails in which strategy has been incarcerated, I seek to reconnect International Relations to strategic thought from which it has become increasingly estranged.  相似文献   
814.
纳米技术的兴起为全世界带来了一场全新的科技变革。纳米技术在信息、化工、医药、农业、环保、航空航天等众多领域具有重要的应用价值和广阔的发展前景,被誉为21世纪的三大高新技术之一。然而,经过近五十余年的发展,纳米技术的"双刃剑"效应逐渐显现,纳米技术的滥用对国家安全可能产生的风险正在日益积聚,集中体现在人类健康与生态环境、国家经济安全、国防安全等领域。  相似文献   
815.
翟东航  张娜  段慧娇 《国防科技》2017,38(2):105-110
提出互联网+时代军队院校面临与军队新型作战能力培养有关的国家安全时代课题,从整合新媒体网络资源、依托校园文化平台、构建国家安全教育体系三方面进行了对策分析,重点探索与新军事变革密切相关的"文化安全、军事话语传播、地缘政治"等议题,以学术活动的顶层设计将国家安全教育融入军事院校学员具有中国特色的军事理论创新。  相似文献   
816.
Confronted with myriad security challenges, African states and the much-vaunted peace and security architecture of the African Union (AU) has proven not to be up to the challenge. Indeed, this is implicitly acknowledged by the AU itself if one considers the creation of such security structures as the African Mission in Somalia (AMISOM), which exists outside its peace and security architecture. This paper argues for a radical rethink of security structures on the African continent – one in which state structures of security coexist with newer forms of security actors, including private military companies (PMCs), community movements and the business sector. Whilst this shift in security actors is already happening on the ground, policymakers need to embrace this new reality.  相似文献   
817.
In the face of rapid technological change and the creation of ambitious military modernisation programmes, this paper argues that land forces, in managing the relationship between force levels and the adoption of military robotics, must recognise that there are inherent limits to techno-centric force reduction efforts and realise the inefficacy of substituting skilled soldiers with robots. It begins with an overview of how the proper integration of robotics into a military’s force structure can improve capability, save lives and potentially reduce costs, but suggests that common accounts of robot utility are exaggerated and endanger the risk assessment processes governing the adoption of said technologies and relevant personnel settings. The paper explores the limits of robotic solutions to military problems, discussing their technical limitations, redundancy and related issues that, when combined with a technico-moral skills degradation problem also detailed within, point to the need to reshape force structures to suit the adoption of robotics while preserving existing levels of human staffing.  相似文献   
818.
In the literature two common macroscopic evacuation planning approaches exist: The dynamic network flow approach and the Cell–Transmission–Based approach. Both approaches have advantages and disadvantages. Many efficient solution approaches for the dynamic network flow approach exist so that realistic problem instances can be considered. However, the consideration of (more) realistic aspects (eg, density dependent travel times) results in non‐linear model formulations. The Cell‐Transmission‐Based approach on the other hand considers realistic traffic phenomena like shock waves and traffic congestion, but this approach leads to long computational times for realistic problem instances. In this article, we combine the advantages of both approaches: We consider a Cell‐Transmission‐Based Evacuation Planning Model (CTEPM) and present a network flow formulation that is equivalent to the cell‐based model. Thus, the computational costs of the CTEPM are enormously reduced due to the reformulation and the detailed representation of the traffic flow dynamics is maintained. We investigate the impacts of various evacuation scenario parameters on the evacuation performance and on the computational times in a computational study including 90 realistic instances.  相似文献   
819.
基于警报关联的网络威胁行为检测技术因其与网络上大量部署的安全产品耦合,且能充分挖掘异常事件之间的关联关系以提供场景还原证据,正成为复杂威胁行为检测的研究热点。从威胁行为和网络安全环境的特点出发,引出威胁行为检测的应用需求和分类,介绍基于警报关联的威胁行为检测的基本概念和系统模型;重点论述作为模型核心的警报关联方法,并分类介绍了各类典型算法的基本原理和特点,包括基于因果逻辑的方法、基于场景的方法、基于相似性的方法和基于数据挖掘的方法;并结合实例介绍了威胁行为检测系统的三种典型结构,即集中式结构、层次式结构和分布式结构;基于当前研究现状,提出了对未来研究趋势的一些认识。  相似文献   
820.
The terrorist attacks in France and Belgium of 2015–2016 that occurred while these countries were in a heightened state of alert raise questions about indications and warning methodology as well as effectiveness of the blanket-protection deployment of security services assisted even by the military. Response and perhaps even more anticipation may require strategic rethinking in light of the predatory attacks that target the most vulnerable spots of the public space. This study looks at threat analysis in Belgium as conducted through her intelligence fusion centre Coordination Unit for Threat Analysis (CUTA)?????? since its inception in 2006. With a special focus on what is known, at the time of writing, about the terrorist attacks in Paris and Brussels, this study hopes to put into context how the system (mal)functions and will also consider the preventive measures that respond to the threat, and the international aspects which have implications far beyond Belgian borders. Therefore, a case is made for not just a Belgian homeland security framework, but one that fits into an EU-wide security concept.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号