首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   636篇
  免费   105篇
  国内免费   23篇
  2024年   1篇
  2023年   2篇
  2022年   4篇
  2021年   15篇
  2020年   10篇
  2019年   38篇
  2018年   37篇
  2017年   49篇
  2016年   50篇
  2015年   28篇
  2014年   60篇
  2013年   115篇
  2012年   20篇
  2011年   38篇
  2010年   42篇
  2009年   41篇
  2008年   45篇
  2007年   24篇
  2006年   23篇
  2005年   24篇
  2004年   19篇
  2003年   18篇
  2002年   8篇
  2001年   6篇
  2000年   5篇
  1999年   6篇
  1998年   6篇
  1997年   7篇
  1996年   3篇
  1995年   3篇
  1994年   4篇
  1993年   2篇
  1992年   1篇
  1991年   5篇
  1990年   2篇
  1989年   3篇
排序方式: 共有764条查询结果,搜索用时 15 毫秒
181.
刘楝  孟宪民  李阳 《国防科技》2020,41(3):76-79,85
5G作为当今先进的通信技术,其广泛应用将给整个社会生产生活带来全新变革,相关技术和应用的安全问题,事关社会公共安全和军事利益安全,应纳入总体国家安全观视角下重点考量。本文主要梳理5G关键技术可能带来的网络安全风险,以及相关应用可能给网络监管带来的挑战,并从牢牢把控核心知识产权、综合构建安全保障体系、紧跟推进行业法律规范以及着力完善高效应急措施这四方面探讨相关的应对措施。  相似文献   
182.
针对轴频电场包络跟踪中先验信息缺失的问题,研究了船舶轴频电场跟踪对传感器阵列的基本要求,引入了一种基于最大似然选择的多初值渐进更新扩展卡尔曼滤波算法。建立船舶轴频电场包络跟踪的状态空间模型,用水平电偶极子对船舶轴频电场包络进行建模;建立基于最大似然选择的多初值模型;基于轴频包络信号特征,研究了对传感器阵列排布方式的要求。仿真结果表明,利用轴频电场包络对船舶进行跟踪是可行的,要求传感器阵列至少由3个传感器组成,且3个传感器不在一条直线上;在传感器阵列满足要求的情况下,该算法可以有效解决轴频电场包络跟踪中的先验信息缺失问题,具有较高的实用价值。  相似文献   
183.
在"总和"扰动模型未知的前提下,针对线性扩张状态观测器跟踪时变信号精度不高的问题,设计出一种前馈观测补偿器。在分析线性扩张状态观测器观测原理的基础上,通过对扰动项的线性近似、误差系统动态响应的忽略,在时域内推导出观测静差的量化表达式,进而使用扰动微分项的估计值替代真值对观测作前馈补偿。理论分析了替代的可行性,证明了补偿器减小观测误差幅值、超前校正观测相位滞后的作用。将这一补偿思想推广至非线性扩张状态观测器中。通过仿真对补偿器提高观测精度、加快误差收敛的有效性进行检验,实验结果进一步表明,补偿器的引入能显著提高整个自抗扰控制系统的控制精度,从而证明了这种补偿思路的可行性。  相似文献   
184.
针对容器技术在网络层面缺乏控制的问题,设计一套面向大规模容器集群的网络控制架构,分别从容器集群网络的灵活组网、智能适配以及安全隔离三个方向进行研究,主要解决大规模容器集群部署中的网络适配和隔离控制等关键问题。实验结果表明,设计的网络控制架构可以根据网络特点有针对性地实现虚拟局域网的快速划分、网络节点的稳定迁移和节点通信的精确隔离控制。  相似文献   
185.
International concern over nuclear terrorism has grown during the past few decades. This has driven a broad spectrum of efforts to strengthen nuclear security globally, including the widespread adoption of radiation-detection technology for border monitoring. Detection systems are now deployed at strategic locations for the purported purpose of detecting and deterring the smuggling of nuclear and radioactive materials. However, despite considerable investment in this area, few studies have examined how these programs are implemented or the operational challenges they face on a day-to-day basis. This article seeks to address this with a focus on radiation-detection efforts at maritime facilities. Utilizing practitioner interviews and a survey, this article identifies the factors that influence the planning and use of these systems in this fast-moving environment. The results clearly demonstrate that the implementation of these systems varies significantly across different national and organizational contexts, resulting in a fragmented global nuclear-detection architecture, which arguably undermines efforts to detect trafficked nuclear-threat materials. Greater consideration should therefore be given to developing international standards and guidance, designing and adopting tools to support key parts of the alarm assessment process, and broader sharing of good practice.  相似文献   
186.
Cyberspace is a new domain of operation, with its own characteristics. Cyber weapons differ qualitatively from kinetic ones: They generate effects by non-kinetic means through information, technology, and networks. Their properties, opportunities, and constraints are comparable to the qualitative difference between conventional and nuclear weapons. New weapons and their target sets in a new domain raise a series of unresolved policy challenges at the domestic, bilateral, and international levels about deterrence, attribution, and response. They also introduce new risks: uncertainty about unintended consequences, expectations of efficacy, and uncertainty about both the target’s and the international community’s response. Cyber operations offer considerable benefits for states to achieve strategic objectives both covertly and overtly. However, without a strategic framework to contain and possibly deter their use, make state and non-state behavior more predictable in the absence of reciprocal norms, and limit their impact, an environment where states face persistent attacks that nonetheless fall below the threshold of armed conflict presents a policy dilemma that reinforces collective insecurity.  相似文献   
187.
A dynamic multi-stage decision-theoretic approach is introduced to establish the optimal offset and its incidence, the contract price arising from bargaining, and the scale of the acquisition. A new rationale is suggested for offsets in terms of their role as an insurance devise. Results are derived for the pricing of delivery contracts subject to offset claims and their national security implications. It is shown that the national security is strictly convex in the offset transaction. As to the incidence of the offset, the offset claim is shown to be capitalised in the delivery price. The bargaining price is shown to depend on the value of the product to be delivered for the national security, the relative negotiation power of the contracting partners and the social cost of public funds. The analysis highlights the expectation effects of offsets on the bargaining price and the scale of delivery. The results aid in explaining why offsets are widely used in procurement contracts for defence materiel. As they contribute to the national security, they should be allowed to survive and not be denied under competition laws.  相似文献   
188.
Between 2014 and 2017, no less than 10 different non-governmental organizations (NGOs) conducted maritime Search and Rescue (SAR) operations off the coast of Libya. By rescuing over 100,000 migrants in three years, these NGOs became the largest provider of SAR in the Mediterranean. The theory of institutionalism suggests that organizations conducting similar activities are likely to converge in a process of mimetic isomorphism, deliberately imitating one another to increase their effectiveness and cope with uncertainty. These 10 SAR NGOs, however, developed two different rescue models: While some rescued migrants and disembarked them in Italian ports, others only simply assisted those in distress until the arrival of another ship transporting them to land. They also cooperated with Italian and European authorities to different degrees. Why did SAR NGOs imitated many elements of existing non-governmental rescue models, but discarded some others? This article argues that differences in material capabilities and organizational role conceptions are crucial to explain why newer SAR NGOs have imitated most but not all of their predecessors’ policies, engaging in a process of “selective emulation.”  相似文献   
189.
The past decade has seen substantial shifts in Swedish security policy and major change in the domestic debate about NATO. For the first time, all of the right-of-centre “alliance parties” are calling for a full NATO membership, and popular support for NATO has increased. Yet public opinion contains ambiguities and paradoxes that complicate the picture. At the same time as support for NATO has increased, the public is overwhelmingly for continued military non-alignment. Drawing on previous research, longitudinal data from national surveys, and other sources on defence and security issues, this article aims to increase our understanding of the development and change in Swedish public opinion on NATO. A key argument is that Erving Goffman’s theatre metaphor, combined with neo-institutional decoupling theory, to a large degree can help understand the public opinion paradox.  相似文献   
190.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号