首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   389篇
  免费   221篇
  国内免费   38篇
  2024年   2篇
  2023年   4篇
  2022年   1篇
  2021年   12篇
  2020年   12篇
  2019年   8篇
  2018年   9篇
  2017年   18篇
  2016年   18篇
  2015年   12篇
  2014年   26篇
  2013年   51篇
  2012年   23篇
  2011年   24篇
  2010年   25篇
  2009年   30篇
  2008年   23篇
  2007年   23篇
  2006年   13篇
  2005年   25篇
  2004年   21篇
  2003年   15篇
  2002年   17篇
  2001年   18篇
  2000年   13篇
  1999年   10篇
  1998年   10篇
  1997年   12篇
  1996年   6篇
  1995年   66篇
  1994年   83篇
  1993年   3篇
  1992年   3篇
  1991年   5篇
  1990年   6篇
  1988年   1篇
排序方式: 共有648条查询结果,搜索用时 15 毫秒
301.
针对分布式放大前传中继辅助多用户对等通信系统研究了存在非理想信道状态信息(CSI)时的分布式中继网络(DRN)鲁棒波束成形设计问题。采用统计CSI误差模型,考虑了两种鲁棒优化问题:一是从公平性的角度出发在DRN总发送功率约束下实现多个目的节点间的信干噪比(SINR)平衡;另一是从有效性的角度出发在保证各个目的节点服务质量需求(SINR大于预设门限)约束下最小化DRN总发送功率。对问题的分析和建模表明,在多用户情况下,这两个问题都是难以求解的优化问题。通过引入半定松弛(SDR)思想,将上述两种优化问题转化为可利用内点法有效求解的半定规划(SDP)问题。最后通过仿真验证了所提设计的鲁棒性能。  相似文献   
302.
This article will seek to provide a detailed examination of the IRA's operational intelligence methodologies. Providing not only a lengthy discussion on the organization's intelligence collection protocols, it will also examine the interplay between intelligence and IRA decision-making. It will be contended that intelligence's influence resided in its ability to introduce a strong element of predictability into the IRA's decision-making process. This depended on an ability to construct a detailed intelligence picture of the target and its geographical milieu so as to minimize the likelihood of volunteers encountering unforeseen circumstances that could adversely affect planned or anticipated outcomes.  相似文献   
303.
This article examines the use of specialised plain-clothes military units in counter-terrorism, concentrating on examples involving liberal-democratic states. It analyses the benefits and problems arising from clandestine military activity, focusing in particular on British army units (notably 14 Intelligence Company and the Force Research Unit in Northern Ireland). The article concludes by arguing that such formations have a clear utility – notably in gathering intelligence on terrorist groups – but other aspects of their role are inherently controversial (notably in cases where undercover soldiers use deadly force against suspected terrorists). It also states that plain-clothes military operations need to be conducted on the basis of accountability, both for strategic reasons, and also in accordance with the norms of liberal democracy.  相似文献   
304.
US military operations are increasingly conducted within urban environments and with these operations come the risk of increasing the number of civilian casualties and infrastructure damage. The use of non-lethal weaponry, such as directed-energy weapons, is one method for minimizing collateral damage. This method enables US military forces to effectively fight within urban environments through force escalation capabilities. Using a series of historical examples and future scenarios for urban warfare, this article highlights deficiencies affecting military capabilities in military urban operations, addresses the consequences of collateral damage, assesses the effectiveness of directed-energy weapons in military urban operations and encourages further funding, research and integration of non-lethal weaponry, such as directed-energy weapons, within the US military.  相似文献   
305.
ABSTRACT

Decade-long security cooperation and counterterrorism engagements in Nigeria have failed to bring down Boko Haram or at least weaken its terrorist structures and transnational spread. I argue that disconnects between counterterrorism-assistance seeking states and their superpower sponsors are implicated in the intractability of Boko Haram's insurgency in Nigeria. Why is the U.S. counterterrorism intervention to individual MNJTF countries (i.e. troop contribution, military funding and intelligence support) ‘lopsided’, ‘fragmented’ and ‘unevenly distributed;’ and how are these implicated in the fight against Boko Haram terrorism? This has impacted negatively on MNJTF countries – lack of cooperation, divisiveness and individualism in coordinating and forging offensives against Boko Haram. These concerns interface several blind spots in the picture of external influences on military’s approach to Boko Haram. I elicit primary data from top military officers. I conclude by predicting the implications and consequences of these counterterrorism complexities, and their potency to defeat or encourage Boko Haram terror.  相似文献   
306.
自抗扰控制器(ADRC)的参数众多,通常依赖于人工试凑优化,控制系统的性能好坏过分取决于设计人员的经验且效率不高。针对ADRC的参数选取问题,首次利用鱼群算法(AFSA)全局寻优能力强,鲁棒性好的特点,结合已有的参数整定经验,提出了一套基于AFSA的ADRC参数整定规则,并进行了数字仿真。仿真结果表明,经由基于AFSA参数整定规则优化过后的ADRC具有良好的动静态特性,提高了设计效率,验证了该方法的可行性和有效性。  相似文献   
307.
面向实体的作战行动数据采集系统研究与设计   总被引:1,自引:0,他引:1  
为满足基地对作战行动数据的实际需求,针对作战行动数据的特点,提出了以作战实体为中心的数据组织方式和作战行动的模板描述方法;运用软件工程技术对系统进行了需求分析和方案设计,并结合主流的web技术构建了系统解决方案。系统能够对训练、演习中的作战行动进行标准化数据描述并记录形成作战行动数据库,为演习评估、裁决等实际应用提供数据支撑。经过长期的数据积累和数据挖掘,能够对部队的作战行动进行合理的评价与预测,为建立长效的数据采集、使用机制提供保障。  相似文献   
308.
This paper empirically investigates the importance of financial and political variables in determining debt rescheduling probabilities in Turkey for 1955–2000. The problem of sovereign debt default and rescheduling has been the subject of substantial academic research during the last two decades. There has been criticism of models of developing countries’ indebtedness and rescheduling that rely solely on some economic or financial predictors related to country debt, the foreign exchange sector or the domestic economic situation. Using probit analysis, this paper indicates that financial variables are important determinants of rescheduling probabilities. However, political variables are not significant in our models.  相似文献   
309.
This paper models transnational terrorism as a three‐way strategic interaction involving a government that faces armed opposition at home, which may spill over in the form of acts of terrorism by the state's opponents against the government's external sponsor. The external sponsor also utilises deterrence against potential terrorists, which only lowers terrorism if terrorists are not intrinsically motivated by a deep‐seated sense of humiliation. The model highlights the importance of intrinsic motivation. A rise in the external power's preference for deterrence against terrorism may backfire in these circumstances. Increases in the government's military efficiency against the rebels, who are also terrorists against the government's sponsor, raises overall levels of violence.  相似文献   
310.
分布式灾难恢复系统采用客户层、服务层和管理层3部分组织形式,完成数据的网络备份和恢复,并提供管理功能。系统通过构建分布式远程备份体系结构,采用ACE(自适配通信环境)面向对象构架,线程池和反应器编程模式,实现了网络互连、事件驱动程序设计,完成了备份计划制订、数据备份、数据恢复3个阶段各个模块的功能。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号