首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   237篇
  免费   97篇
  国内免费   8篇
  2024年   2篇
  2023年   3篇
  2022年   7篇
  2021年   3篇
  2020年   8篇
  2019年   12篇
  2018年   11篇
  2017年   21篇
  2016年   21篇
  2015年   14篇
  2014年   18篇
  2013年   27篇
  2012年   18篇
  2011年   15篇
  2010年   15篇
  2009年   16篇
  2008年   17篇
  2007年   6篇
  2006年   10篇
  2005年   14篇
  2004年   16篇
  2003年   8篇
  2002年   5篇
  2001年   6篇
  2000年   4篇
  1999年   8篇
  1998年   5篇
  1997年   7篇
  1996年   4篇
  1995年   1篇
  1994年   4篇
  1993年   4篇
  1992年   1篇
  1991年   5篇
  1990年   3篇
  1989年   3篇
排序方式: 共有342条查询结果,搜索用时 15 毫秒
201.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity.  相似文献   
202.
基于有限元强度折减法,结合工程实例,利用软件ANSYS对不同倾角微型桩加固边坡以及倾斜微型桩的设桩位置、锚固深度和桩排距等桩身参数对边坡稳定性的影响进行了数值模拟分析。结果表明:微型桩加固边坡较优的倾斜角度为60°;随着设桩位置离坡顶距离的增加,边坡的稳定系数先增大后减小,当设桩位置距坡顶的相对位置为0.58~0.66,边坡的稳定系数较高;当桩排距为9倍桩径,边坡的稳定系数较高。研究结果为倾斜微型桩的设计与工程应用提供了理论依据,具有一定的普遍意义。  相似文献   
203.
《防务技术》2014,10(2):124-130
A method of augmenting an airborne vehicle for short-period dynamics and stability by passive means is presented in this study. A trajectory-phase disturbance rejection capability is achieved for an unguided fin-stabilized vehicle by flexible mounting of the fins to the vehicle body. The deflecting fins lag the body oscillation such that the harmonic oscillation can be quickly dampened. The amount of fin deflection may be chosen by a hinge-line location; among other things, the vehicle damping behaviour is largely determined by this choice. Linear theory is applied and 6-DOF simulations are carried out to demonstrate the approach suitability for the task.  相似文献   
204.
电池管理系统(battery management system,BMS)是混合动力汽车(parallel hybrid electric vehicle,PHEV)能量管理系统中的核心组成部分,而其中电池电荷状态(state of charge,soc)则是PHEV控制策略中的重要参数.针对PHEV动力电池组SOC系统高度非线性和复杂性的特点,提出了一种基于改进的BP神经网络的HEV动力电池组的实时SOC估计,并对网络的收敛性进行了证明.利用大量PHEV动力电池组在行驶过程中充放电的数据样本,对神经网络进行网络训练并且进行仿真.结果表明,与传统离线SOC估计方法相比,能够有效地减小误差,提高电池SOC的精度.  相似文献   
205.
从分析定性推理结果存在的问题出发,提出定性约束的必要性.总结了几种现有的定性约束,提出一种新的定性约束-粗糙定性约束,利用粗糙集属性约简算法对定性推理结果进行约简.简要介绍了粗糙定性推理软件的总体设计思路流程和功能模块划分.以物资供应保障过程定性推理结果为例,对所得推理结果进行粗糙定性约束,得到重要推理结果,为物资供应保障决策提供参考意见.  相似文献   
206.
分析了单星观测模式下的天基测控系统的可行性,并针对该观测模式下轨道确定中法矩阵的特点,提出了一种基于压缩估计的定轨方法,对法矩阵进行压缩变换,避免了法矩阵奇异造成的误差传递。证明了当满足一定条件时,该压缩方法的估计精度要高于传统的定轨方法。结合单星观测的特殊性,提出了误差传递因子,设计了单星观测下的压缩估计定轨算法。最后以单星模式下的天基测控系统作为仿真背景进行了仿真试验。结果表明,该压缩估计可有效提高单星观测模式下轨道确定的精度。  相似文献   
207.
President Barack Obama and an array of other Western leaders continue to assert that the spread of weapons of mass destruction (WMD) to non-state actors is one of most pressing challenges to global security today. Yet, Western efforts to engage governments—particularly governments across the global South—in a practical nonproliferation dialogue have largely yielded disappointing results. This viewpoint examines the need for a new strategy to engage the developing world in nonproliferation programs. It argues that strategies focused strictly on WMD nonproliferation are unsustainable, and ultimately are destined for failure. An alternative “dual-benefit” nonproliferation engagement strategy utilizes the enlightened self-interest of partner governments needed to achieve broad-based buy-in among all partners. In a concluding section, we recommend that the “Group of 8” Global Partnership Against the Spread of Weapons and Materials of Mass Destruction standardize this model of nonproliferation engagement as it sets out to identify and fund WMD nonproliferation capacity-building initiatives beyond the states of the former Soviet Union.  相似文献   
208.
Nuclear proliferation, lax security standards in the storage of fissile materials, and international apathy in the prosecution of terrorists make nuclear terror a serious threat to the United States and its allies, yet no doctrine of retaliation has been established. To decrease the probability of terrorist use of nuclear weapons, a doctrine of retaliation—a negligence doctrine—should be considered. If the United States can distinguish whose fissile material was used for a nuclear terror event, a negligence doctrine would prescribe retaliation against that state. Where the proximate cause—terrorists—is unavailable for deterrent retaliation, deterring an accessible mediate cause—a state that has failed to adequately secure its fissile material—is one of a few effective alternatives. In the absence of such a negligence doctrine, the United States and its allies are increasingly vulnerable to a nuclear terror attack and the ensuing negative consequences.  相似文献   
209.
In 2007, 334 nuclear reactors (including for naval propulsion) and isotope production facilities employed highly enriched uranium (HEU) fuel or target material. One year of operations at these reactors and facilities required more than 3,100 kilograms (kg) of HEU for naval propulsion, more than 750 kg for research reactors, and 40?–50 kg for isotope production in civilian facilities—in addition to several tons used in other types of reactors. Material with high enrichment levels and low radiation barriers stored or handled in large batches, such as HEU target waste and certain types of fuel from isotope production, research reactors/critical assemblies, and naval fuel, presents serious safety and security concerns. Forty-eight civilian research reactors have converted to low-enriched uranium as a result of a three-decade international effort to minimize HEU use, resulting in a decrease in HEU consumption of 278 kg per year. This article's establishment of baseline measurements for assessing the results of HEU minimization efforts calls for additional focus on the scope and methodology of HEU minimization. Facility decommissioning and dismantling should play a larger role in the future HEU minimization effort, materials with specific weapons-relevant properties should be given higher priority compared to bulk HEU material, and the use of large quantities of weapon-grade HEU fuel for naval propulsion should be reconsidered.  相似文献   
210.
再入飞行器采用变质心控制不但可以保持较好的气动外形,还町以增大机动能力,但变质心控制较强的非线性和耦合性大大增加了控制系统设计难度,使控制器设计和实施的代价较高。针对这一问题,基于自抗扰控制技术,设计了变质心再入飞行器双通道解耦控制器。通过构造连续光滑扩张状态观测器,不加区分飞行器的各类干扰与耦合,对其统一进行估计:利用非线性状态反馈控制律,并自适应调节控制参数对其进行补偿,实现对飞行器姿态的解耦控制。仿真结果表明:该方法大大降低了对系统模型精度的要求与控制器设计实施代价,对变质心再入飞行器非线性、耦合性以及参数摄动具有较强的鲁棒性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号