全文获取类型
收费全文 | 2022篇 |
免费 | 464篇 |
国内免费 | 221篇 |
出版年
2024年 | 5篇 |
2023年 | 17篇 |
2022年 | 19篇 |
2021年 | 44篇 |
2020年 | 47篇 |
2019年 | 66篇 |
2018年 | 68篇 |
2017年 | 114篇 |
2016年 | 142篇 |
2015年 | 74篇 |
2014年 | 182篇 |
2013年 | 251篇 |
2012年 | 151篇 |
2011年 | 131篇 |
2010年 | 134篇 |
2009年 | 167篇 |
2008年 | 129篇 |
2007年 | 128篇 |
2006年 | 155篇 |
2005年 | 131篇 |
2004年 | 103篇 |
2003年 | 88篇 |
2002年 | 57篇 |
2001年 | 54篇 |
2000年 | 30篇 |
1999年 | 43篇 |
1998年 | 35篇 |
1997年 | 30篇 |
1996年 | 18篇 |
1995年 | 18篇 |
1994年 | 11篇 |
1993年 | 15篇 |
1992年 | 14篇 |
1991年 | 13篇 |
1990年 | 17篇 |
1989年 | 5篇 |
1987年 | 1篇 |
排序方式: 共有2707条查询结果,搜索用时 31 毫秒
811.
针对运载火箭伺服机构故障,提出了一种基于扩展多模型自适应估计的故障检测与诊断算法。首先建立了考虑伺服机构故障的运载火箭姿态动力学模型,其次将故障角度作为状态变量得到增广状态空间模型,然后利用扩展卡尔曼滤波器进行状态向量和故障参数的非线性估计,并基于传感器测量数据采用假设检验算法在线计算故障发生的概率,最后给出了基于扩展多模型自适应估计的故障检测与诊断算法流程。该方法的优点是只用一个扩展卡尔曼滤波器就可完成一个伺服机构的故障检测与诊断,从而大幅减小用于伺服机构故障检测与诊断的滤波器数量。仿真结果表明,该方法在无故障时可对伺服机构进行健康监测,在单台伺服机构故障下,可以及时准确判断出哪一台芯级伺服机构发生故障,并可准确估计出伺服机构故障下的发动机摆角角度。 相似文献
812.
813.
Pascal Vennesson 《战略研究杂志》2017,40(3):358-391
Critical security advocates commonly portray strategic studies as crippled by its narrow focus on Cold War-era military issues, as state-centric and as Western-centric. I argue that this conception of the scope of strategy is flawed and I offer a comprehensive rebuttal by working out the logic of the theories advanced by Carl von Clausewitz and Thomas Schelling. The proponents of critical security overlook the striking expansion of strategy during the Cold War, its longstanding inclusion of competing political actors not just states, as well as its capacity to put Western and non-Western actors in a common analytic frame. By breaking out of the conceptual jails in which strategy has been incarcerated, I seek to reconnect International Relations to strategic thought from which it has become increasingly estranged. 相似文献
814.
815.
816.
Hussein Solomon 《African Security Review》2017,26(1):62-76
Confronted with myriad security challenges, African states and the much-vaunted peace and security architecture of the African Union (AU) has proven not to be up to the challenge. Indeed, this is implicitly acknowledged by the AU itself if one considers the creation of such security structures as the African Mission in Somalia (AMISOM), which exists outside its peace and security architecture. This paper argues for a radical rethink of security structures on the African continent – one in which state structures of security coexist with newer forms of security actors, including private military companies (PMCs), community movements and the business sector. Whilst this shift in security actors is already happening on the ground, policymakers need to embrace this new reality. 相似文献
817.
Jai Galliott 《Defence Studies》2017,17(4):327-345
In the face of rapid technological change and the creation of ambitious military modernisation programmes, this paper argues that land forces, in managing the relationship between force levels and the adoption of military robotics, must recognise that there are inherent limits to techno-centric force reduction efforts and realise the inefficacy of substituting skilled soldiers with robots. It begins with an overview of how the proper integration of robotics into a military’s force structure can improve capability, save lives and potentially reduce costs, but suggests that common accounts of robot utility are exaggerated and endanger the risk assessment processes governing the adoption of said technologies and relevant personnel settings. The paper explores the limits of robotic solutions to military problems, discussing their technical limitations, redundancy and related issues that, when combined with a technico-moral skills degradation problem also detailed within, point to the need to reshape force structures to suit the adoption of robotics while preserving existing levels of human staffing. 相似文献
818.
In the literature two common macroscopic evacuation planning approaches exist: The dynamic network flow approach and the Cell–Transmission–Based approach. Both approaches have advantages and disadvantages. Many efficient solution approaches for the dynamic network flow approach exist so that realistic problem instances can be considered. However, the consideration of (more) realistic aspects (eg, density dependent travel times) results in non‐linear model formulations. The Cell‐Transmission‐Based approach on the other hand considers realistic traffic phenomena like shock waves and traffic congestion, but this approach leads to long computational times for realistic problem instances. In this article, we combine the advantages of both approaches: We consider a Cell‐Transmission‐Based Evacuation Planning Model (CTEPM) and present a network flow formulation that is equivalent to the cell‐based model. Thus, the computational costs of the CTEPM are enormously reduced due to the reformulation and the detailed representation of the traffic flow dynamics is maintained. We investigate the impacts of various evacuation scenario parameters on the evacuation performance and on the computational times in a computational study including 90 realistic instances. 相似文献
819.
基于警报关联的网络威胁行为检测技术因其与网络上大量部署的安全产品耦合,且能充分挖掘异常事件之间的关联关系以提供场景还原证据,正成为复杂威胁行为检测的研究热点。从威胁行为和网络安全环境的特点出发,引出威胁行为检测的应用需求和分类,介绍基于警报关联的威胁行为检测的基本概念和系统模型;重点论述作为模型核心的警报关联方法,并分类介绍了各类典型算法的基本原理和特点,包括基于因果逻辑的方法、基于场景的方法、基于相似性的方法和基于数据挖掘的方法;并结合实例介绍了威胁行为检测系统的三种典型结构,即集中式结构、层次式结构和分布式结构;基于当前研究现状,提出了对未来研究趋势的一些认识。 相似文献
820.
Kenneth L. Lasoen 《战略研究杂志》2017,40(7):927-962
The terrorist attacks in France and Belgium of 2015–2016 that occurred while these countries were in a heightened state of alert raise questions about indications and warning methodology as well as effectiveness of the blanket-protection deployment of security services assisted even by the military. Response and perhaps even more anticipation may require strategic rethinking in light of the predatory attacks that target the most vulnerable spots of the public space. This study looks at threat analysis in Belgium as conducted through her intelligence fusion centre Coordination Unit for Threat Analysis (CUTA)?????? since its inception in 2006. With a special focus on what is known, at the time of writing, about the terrorist attacks in Paris and Brussels, this study hopes to put into context how the system (mal)functions and will also consider the preventive measures that respond to the threat, and the international aspects which have implications far beyond Belgian borders. Therefore, a case is made for not just a Belgian homeland security framework, but one that fits into an EU-wide security concept. 相似文献