全文获取类型
收费全文 | 636篇 |
免费 | 105篇 |
国内免费 | 23篇 |
出版年
2024年 | 1篇 |
2023年 | 2篇 |
2022年 | 4篇 |
2021年 | 15篇 |
2020年 | 10篇 |
2019年 | 38篇 |
2018年 | 37篇 |
2017年 | 49篇 |
2016年 | 50篇 |
2015年 | 28篇 |
2014年 | 60篇 |
2013年 | 115篇 |
2012年 | 20篇 |
2011年 | 38篇 |
2010年 | 42篇 |
2009年 | 41篇 |
2008年 | 45篇 |
2007年 | 24篇 |
2006年 | 23篇 |
2005年 | 24篇 |
2004年 | 19篇 |
2003年 | 18篇 |
2002年 | 8篇 |
2001年 | 6篇 |
2000年 | 5篇 |
1999年 | 6篇 |
1998年 | 6篇 |
1997年 | 7篇 |
1996年 | 3篇 |
1995年 | 3篇 |
1994年 | 4篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1991年 | 5篇 |
1990年 | 2篇 |
1989年 | 3篇 |
排序方式: 共有764条查询结果,搜索用时 187 毫秒
561.
Ralph Rotte 《African Security Review》2016,25(1):85-94
While unmanned aerial vehicles (UAVs) have become a standard element of modern armed forces, African countries have been reluctant to acquire remotely piloted aircraft for military purposes until recently. This is mainly due to a lack of industrial capabilities and, for military purposes so far, procurement policies that have concentrated on small arms and light weapons, more prestigious armoured vehicles and combat aircraft. Moreover, counter-insurgency strategies in Africa tend to focus on manoeuvre warfare, co-opting rebels or fighting them using armed proxies. As a consequence, international counterterrorism operations against fanatical and reckless groups like al-Qaeda in the Islamic Maghreb and Boko Haram in sub-Saharan Africa are characterised by a strong dependence on Western forces providing UAV-based reconnaissance and, in some cases for the United States, military strikes by drones. This essay reviews some of the incentives and problems of the use of UAVs in the African context. Given the geographical and military conditions of asymmetric warfare in Africa, and potential problems concerning international law, ethical aspects of the use of arms, and civil–military relations notwithstanding, it is argued that African security forces should develop their own UAV capabilities by intensifying their cooperation with Western armed forces. 相似文献
562.
563.
564.
管道在线检测技术及检测机器人研究 总被引:4,自引:0,他引:4
概述了管道检测技术发展现状,介绍了最新检测技术的原理,分析了管道内检测机器人的技术要点,概括介绍了课题组在差压式管内检测机器人周围流场建模与仿真、腐蚀环境下管道钢裂纹群演化的混沌动力学、差压式管内检测机器人的通过性能、管内检测机器人运行速度和姿态分析及运动状态控制、管内检测机器人小型化、小型化管内检测机器人检测精度、小型化管内检测机器人定位精度及管道剩余寿命的预测方法等方面的研究进展,为今后的研究打下了坚实的基础。 相似文献
565.
针对在面向操作训练的装备虚拟训练系统开发中遇到的对受训者操作监控的问题,为实现对装备操作过程的详尽描述和对受训者操作逻辑性的监控,提出了一种基于IDEF3的装备操作过程概念建模方法和基于有限状态机、浅层专家知识数据库的操作过程监控系统的设计方案。建立了监控系统的结构框架,并详细介绍了系统三个组成部分的设计方案:浅层专家知识数据库、操作过程状态机和通用操作监控引擎。基于此设计方案的操作过程监控系统已成功的应用于某装备虚拟训练平台,解决了对受训者的操作监控问题,提高了训练效果。 相似文献
566.
为解决部分党员领导干部不认真过双重组织生活的问题,上海边防总队确立了发放组织生活通知单和组织生活公示制、报告制、通报制,这对于党员领导干部过好组织生活起到了很好的规范作用。严格落实"一单三制"制度,需要把握好三个环节:一要筑牢思想基础,增强落实制度的责任感;二要强化管理监督,提升落实制度的严肃性;三要建立配套制度,提高制度落实的规范性。 相似文献
567.
水下信息对抗是海军信息化建设中需要重点考虑的内容之一.除了现有的声纳侦察之外,在未来的海战中,信息获取和信息对抗将更多地依赖水声网络的作用.因此,水声网络的相关问题必须得到重视.探讨了水声网络的一些关键技术,从信息对抗的角度分析了水声网络面临的挑战及应对措施. 相似文献
568.
介绍了现有的软件可测性评估方法,继而提出了基于程序结构的软件可测性评估方法,该方法充分考虑了软件的失效机理,针对测试对象的不同特点,给出了面向控制流的软件故障执行的概率、数据状态感染的概率及以变量的定值-引用为基础的被感染数据状态传播到输出的概率等估计方案,在此基础上,进行了软件可测性的评估. 相似文献
569.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity. 相似文献
570.
Hans Mouritzen 《Defense & Security Analysis》2013,29(4):342-355
Security Intergovernmental Organizations, here illustrated by NATO, persist in a “permitted interval” of internationalization, i.e. permitted by its member-states. On the one hand, they are seldom or never permitted to vanish due to member-states' vested interests in retaining them as tools of statecraft, even if their original purposes have become redundant. On the other hand, there is an internationalization ceiling that they must respect: they should not become too autonomous and thereby no longer be suitable as member-state tools. In spite of post-Cold War reform, interviews carried out at NATO Headquarters (HQ) in the late 1980s compared to interviews in 2012 display that a continuous pulling and hauling of forces of internationalization and renationalization have taken place around NATO HQ. The only instance of clear internationalization can be observed in the proactive diplomacy of Secretary General Fogh Rasmussen. There is stiff opposition to the internationalization of abolishing the Military Committee/International Military Staff among minor and South European states, and there is no waning in states' attempts to micro-manage the International Staff. Only external shocks can overcome resistance to internationalizing reform. 相似文献