全文获取类型
收费全文 | 636篇 |
免费 | 105篇 |
国内免费 | 23篇 |
出版年
2024年 | 1篇 |
2023年 | 2篇 |
2022年 | 4篇 |
2021年 | 15篇 |
2020年 | 10篇 |
2019年 | 38篇 |
2018年 | 37篇 |
2017年 | 49篇 |
2016年 | 50篇 |
2015年 | 28篇 |
2014年 | 60篇 |
2013年 | 115篇 |
2012年 | 20篇 |
2011年 | 38篇 |
2010年 | 42篇 |
2009年 | 41篇 |
2008年 | 45篇 |
2007年 | 24篇 |
2006年 | 23篇 |
2005年 | 24篇 |
2004年 | 19篇 |
2003年 | 18篇 |
2002年 | 8篇 |
2001年 | 6篇 |
2000年 | 5篇 |
1999年 | 6篇 |
1998年 | 6篇 |
1997年 | 7篇 |
1996年 | 3篇 |
1995年 | 3篇 |
1994年 | 4篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1991年 | 5篇 |
1990年 | 2篇 |
1989年 | 3篇 |
排序方式: 共有764条查询结果,搜索用时 15 毫秒
181.
182.
针对轴频电场包络跟踪中先验信息缺失的问题,研究了船舶轴频电场跟踪对传感器阵列的基本要求,引入了一种基于最大似然选择的多初值渐进更新扩展卡尔曼滤波算法。建立船舶轴频电场包络跟踪的状态空间模型,用水平电偶极子对船舶轴频电场包络进行建模;建立基于最大似然选择的多初值模型;基于轴频包络信号特征,研究了对传感器阵列排布方式的要求。仿真结果表明,利用轴频电场包络对船舶进行跟踪是可行的,要求传感器阵列至少由3个传感器组成,且3个传感器不在一条直线上;在传感器阵列满足要求的情况下,该算法可以有效解决轴频电场包络跟踪中的先验信息缺失问题,具有较高的实用价值。 相似文献
183.
在"总和"扰动模型未知的前提下,针对线性扩张状态观测器跟踪时变信号精度不高的问题,设计出一种前馈观测补偿器。在分析线性扩张状态观测器观测原理的基础上,通过对扰动项的线性近似、误差系统动态响应的忽略,在时域内推导出观测静差的量化表达式,进而使用扰动微分项的估计值替代真值对观测作前馈补偿。理论分析了替代的可行性,证明了补偿器减小观测误差幅值、超前校正观测相位滞后的作用。将这一补偿思想推广至非线性扩张状态观测器中。通过仿真对补偿器提高观测精度、加快误差收敛的有效性进行检验,实验结果进一步表明,补偿器的引入能显著提高整个自抗扰控制系统的控制精度,从而证明了这种补偿思路的可行性。 相似文献
184.
针对容器技术在网络层面缺乏控制的问题,设计一套面向大规模容器集群的网络控制架构,分别从容器集群网络的灵活组网、智能适配以及安全隔离三个方向进行研究,主要解决大规模容器集群部署中的网络适配和隔离控制等关键问题。实验结果表明,设计的网络控制架构可以根据网络特点有针对性地实现虚拟局域网的快速划分、网络节点的稳定迁移和节点通信的精确隔离控制。 相似文献
185.
International concern over nuclear terrorism has grown during the past few decades. This has driven a broad spectrum of efforts to strengthen nuclear security globally, including the widespread adoption of radiation-detection technology for border monitoring. Detection systems are now deployed at strategic locations for the purported purpose of detecting and deterring the smuggling of nuclear and radioactive materials. However, despite considerable investment in this area, few studies have examined how these programs are implemented or the operational challenges they face on a day-to-day basis. This article seeks to address this with a focus on radiation-detection efforts at maritime facilities. Utilizing practitioner interviews and a survey, this article identifies the factors that influence the planning and use of these systems in this fast-moving environment. The results clearly demonstrate that the implementation of these systems varies significantly across different national and organizational contexts, resulting in a fragmented global nuclear-detection architecture, which arguably undermines efforts to detect trafficked nuclear-threat materials. Greater consideration should therefore be given to developing international standards and guidance, designing and adopting tools to support key parts of the alarm assessment process, and broader sharing of good practice. 相似文献
186.
Christian Leuprecht Joseph Szeman David B. Skillicorn 《Contemporary Security Policy》2019,40(3):382-407
Cyberspace is a new domain of operation, with its own characteristics. Cyber weapons differ qualitatively from kinetic ones: They generate effects by non-kinetic means through information, technology, and networks. Their properties, opportunities, and constraints are comparable to the qualitative difference between conventional and nuclear weapons. New weapons and their target sets in a new domain raise a series of unresolved policy challenges at the domestic, bilateral, and international levels about deterrence, attribution, and response. They also introduce new risks: uncertainty about unintended consequences, expectations of efficacy, and uncertainty about both the target’s and the international community’s response. Cyber operations offer considerable benefits for states to achieve strategic objectives both covertly and overtly. However, without a strategic framework to contain and possibly deter their use, make state and non-state behavior more predictable in the absence of reciprocal norms, and limit their impact, an environment where states face persistent attacks that nonetheless fall below the threshold of armed conflict presents a policy dilemma that reinforces collective insecurity. 相似文献
187.
A dynamic multi-stage decision-theoretic approach is introduced to establish the optimal offset and its incidence, the contract price arising from bargaining, and the scale of the acquisition. A new rationale is suggested for offsets in terms of their role as an insurance devise. Results are derived for the pricing of delivery contracts subject to offset claims and their national security implications. It is shown that the national security is strictly convex in the offset transaction. As to the incidence of the offset, the offset claim is shown to be capitalised in the delivery price. The bargaining price is shown to depend on the value of the product to be delivered for the national security, the relative negotiation power of the contracting partners and the social cost of public funds. The analysis highlights the expectation effects of offsets on the bargaining price and the scale of delivery. The results aid in explaining why offsets are widely used in procurement contracts for defence materiel. As they contribute to the national security, they should be allowed to survive and not be denied under competition laws. 相似文献
188.
Eugenio Cusumano 《Contemporary Security Policy》2019,40(2):239-262
Between 2014 and 2017, no less than 10 different non-governmental organizations (NGOs) conducted maritime Search and Rescue (SAR) operations off the coast of Libya. By rescuing over 100,000 migrants in three years, these NGOs became the largest provider of SAR in the Mediterranean. The theory of institutionalism suggests that organizations conducting similar activities are likely to converge in a process of mimetic isomorphism, deliberately imitating one another to increase their effectiveness and cope with uncertainty. These 10 SAR NGOs, however, developed two different rescue models: While some rescued migrants and disembarked them in Italian ports, others only simply assisted those in distress until the arrival of another ship transporting them to land. They also cooperated with Italian and European authorities to different degrees. Why did SAR NGOs imitated many elements of existing non-governmental rescue models, but discarded some others? This article argues that differences in material capabilities and organizational role conceptions are crucial to explain why newer SAR NGOs have imitated most but not all of their predecessors’ policies, engaging in a process of “selective emulation.” 相似文献
189.
The past decade has seen substantial shifts in Swedish security policy and major change in the domestic debate about NATO. For the first time, all of the right-of-centre “alliance parties” are calling for a full NATO membership, and popular support for NATO has increased. Yet public opinion contains ambiguities and paradoxes that complicate the picture. At the same time as support for NATO has increased, the public is overwhelmingly for continued military non-alignment. Drawing on previous research, longitudinal data from national surveys, and other sources on defence and security issues, this article aims to increase our understanding of the development and change in Swedish public opinion on NATO. A key argument is that Erving Goffman’s theatre metaphor, combined with neo-institutional decoupling theory, to a large degree can help understand the public opinion paradox. 相似文献
190.