首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   669篇
  免费   143篇
  国内免费   38篇
  2024年   4篇
  2023年   3篇
  2022年   3篇
  2021年   23篇
  2020年   15篇
  2019年   38篇
  2018年   39篇
  2017年   49篇
  2016年   40篇
  2015年   28篇
  2014年   75篇
  2013年   108篇
  2012年   28篇
  2011年   39篇
  2010年   49篇
  2009年   48篇
  2008年   48篇
  2007年   42篇
  2006年   38篇
  2005年   30篇
  2004年   19篇
  2003年   19篇
  2002年   9篇
  2001年   7篇
  2000年   11篇
  1999年   6篇
  1998年   4篇
  1997年   6篇
  1996年   5篇
  1995年   5篇
  1994年   4篇
  1993年   1篇
  1992年   3篇
  1991年   2篇
  1990年   2篇
排序方式: 共有850条查询结果,搜索用时 31 毫秒
841.
针对星上路由器的路由查找功能展开研究。通过分析比较多种路由查找算法,利用软硬件协同设计的思想,给出了星上路由查找的设计与适合硬件查找的Trie树实现。给出了算法实现程序,通过实例分析了算法的优点。结果表明设计可以满足宽带卫星通信系统业务的需求。  相似文献   
842.
宋博 《国防科技》2021,42(6):5-9
美国认为太空已被普遍认定为最重要的作战域之一,未来的太空安全态势将愈发严峻。本文认为, 美国正面向未来太空对抗环境进行全面转型, 从顶层战略、作战理论、组织结构、战备训练、装备技术等方面开展研究、调整和长远布局, 如以我为主要对手谋划布局、发布系列军事航天顶层指导文件、大幅增加太空攻防作战相关经费投入等。 目前, 美军正处于新旧体系转换、 下一代能力构建发展的关键期, 不仅正在变革军队组织体制、重组太空攻防作战力量, 还积极开展系列演习演训, 以加速形成太空攻防实战能力。美军这一系列动向将对未来太空领域安全与发展产生重大影响, 应引起我高度重视。  相似文献   
843.
为了增强支付系统的安全性和可靠性,设计了一种区块链技术下的智能支付系统。这个系统利用区块链的去中心化和分布式账本特性,提供了一种更加安全和透明的支付解决方案。系统将区块链技术、国密算法与支付系统相结合,给传统互联网支付系统提供一个更安全的保障。利用区块链技术的点对点特点,解决支付效率和数据安全等方面的问题。借助互联网大数据技术,对用户进行信用评级,提供信贷服务。结合跨链技术可以对不同区块链的数据进行共享,更好地解决资金流动性。相比比特币和以太坊等电子货币系统,该系统在安全性、交易吞吐率和交易时延等方面做到了权衡发展,使得各方面的性能有了一定程度的均衡提升,更能满足当前环境下的应用需要。  相似文献   
844.
ABSTRACT

While most contemporary analyses of South Asian nuclear dynamics acknowledge the presence of a strategic triangle between the region’s three nuclear players, the primary focus usually remains on the rivalry between India and Pakistan. Discussions of Sino-Indian relations remain limited. This is likely attributed to the stability in the two countries’ relations, yet it is worth asking why this stability exists and whether it is likely to continue in the future. Although China and India have an acrimonious relationship, their asymmetric nuclear capabilities and threat perceptions mitigate the danger of a traditional security dilemma. India may perceive China’s nuclear aggrandizement to be a security threat, but the same is not true of China, which has a vastly superior nuclear force and is largely shaping its nuclear-force structure in response to the threat it perceives from the United States. This dynamic makes a serious conventional or nuclear conflict highly unlikely.  相似文献   
845.
ABSTRACT

The paper’s goal is to analyses the potential of the Iranian defence industry, including both research-and-development and production capabilities. It is argued that, despite official statements about the great power and sophistication of the Iranian defence industry, in reality its capabilities are very limited and cannot meet the operational needs of the Iranian armed forces. At the same time, it is argued that many official releases, which are abundantly available in the Iranian press and often unthinkingly repeated by the Western media, do not present the real and value of military products, but are rather a tool for deception and propaganda.  相似文献   
846.
ABSTRACT

Over the last five decades, India’s nuclear and space programs have gone through several phases, from collaboration to divorce to supportive. An interplay of two factors determined the nature of the relationship. One was the state of India’s nuclear-weapon program. The second was international conditions, especially India’s relationship with the nuclear-nonproliferation regime. In the early decades, because of the rudimentary nature of India’s nuclear and space programs, the relationship was collaborative, since the rocket technology being developed was a necessary adjunct to the nuclear-weapon program. Subsequently, as India’s rocketry capabilities and nuclear-weapon program began to mature and concerns about international sanctions under the non-proliferation regime began to grow, the two programs were separated. The Indian rocketry program was also divided, with the civilian-space and ballistic-missile programs clearly demarcated. After India declared itself a nuclear-weapon state in 1998 and the programs matured, the relationship has become more supportive. As the two programs mature further, this relationship is likely to deepen, as the nuclear-weapon program requires space assets to build a robust and survivable nuclear deterrent force.  相似文献   
847.
ABSTRACT

The United States’ global strategic outlook has shifted markedly since the end of major combat operations in Iraq and Afghanistan. As the United States’ strategic posture shifts, the nature of military operations is simultaneously changing rapidly. Many analysts predict that cyber-operations, autonomous weapons systems, artificial intelligence, and clandestine special forces operations will be central features in future conflicts. Although often overlooked by scholars and policy analysts, defence contractors are integral to the development and implementation of these emerging categories of warfare. This inquiry examines the evolving nature of the American defence industry and the roles corporations play in current theatres of conflict. Surprisingly, rather than becoming less reliant on defence contractors after their much-maligned performance in the wars in Iraq and Afghanistan, American military and intelligence agencies have become more dependent on the private sector as technology becomes increasingly central to warfare.  相似文献   
848.
ABSTRACT

Bagayoko, Hutchful, and Luckham correctly argue that the structures, characteristics, and operating methods of official security institutions in Africa have been somewhat neglected, with a lack of much recent research. The Somali National Army (SNA) sits among these lacunae. Its formal structures can be used as a skeletal starting point and springboard to start to draw the network diagrams that chart informal linkages. This is why recent declassification decisions by U.S. intelligence bodies, coupled with period documents released to the UK National Archives, hold significance in helping us understand early hierarchical SNA arrangements. They show the steady build-up in size of the force, to 1987, to about the time the civil war began to fragment the state.  相似文献   
849.
ABSTRACT

Over a decade of security force assistance (SFA) initiatives to build an effective Somali National Army (SNA) failed because of the interrelated effects of political, contextual and operational challenges. The key political challenges were interest asymmetry between international actors and Somali elites, insufficient focus on institution-building and a lack of donor coordination. The principal contextual challenges in Somalia were the legacies of two decades of state collapse and the negative effects of clan dynamics. The main operational challenges were building an army while simultaneously fighting a war, the complexities of military integration, and the severe capability gaps afflicting the SNA.  相似文献   
850.
ABSTRACT

The rising trend of kidnapping targeting women has shown that counterinsurgency does not begin and end with the strategic advantage of state security providers in the security market and the field. Kidnapping of females by Boko Haram insurgents threatens human security and hinders sustainable development goals in Northeastern Nigeria. With primary and secondary sources, this qualitative study examines how Boko Haram insurgents target women in Northeastern Nigeria. The paper argues that community driven security strategy achievable through the collaboration between state and traditional security providers, can prevent the entry and easy escape of the insurgents. It concludes that the forces of order should sustain a policy of stop and searches until insurgents are defeated along with a programme of community-based human rights education and insurgency emergency response system for quick response to security threats.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号