首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   636篇
  免费   105篇
  国内免费   23篇
  2024年   1篇
  2023年   2篇
  2022年   4篇
  2021年   15篇
  2020年   10篇
  2019年   38篇
  2018年   37篇
  2017年   49篇
  2016年   50篇
  2015年   28篇
  2014年   60篇
  2013年   115篇
  2012年   20篇
  2011年   38篇
  2010年   42篇
  2009年   41篇
  2008年   45篇
  2007年   24篇
  2006年   23篇
  2005年   24篇
  2004年   19篇
  2003年   18篇
  2002年   8篇
  2001年   6篇
  2000年   5篇
  1999年   6篇
  1998年   6篇
  1997年   7篇
  1996年   3篇
  1995年   3篇
  1994年   4篇
  1993年   2篇
  1992年   1篇
  1991年   5篇
  1990年   2篇
  1989年   3篇
排序方式: 共有764条查询结果,搜索用时 187 毫秒
561.
While unmanned aerial vehicles (UAVs) have become a standard element of modern armed forces, African countries have been reluctant to acquire remotely piloted aircraft for military purposes until recently. This is mainly due to a lack of industrial capabilities and, for military purposes so far, procurement policies that have concentrated on small arms and light weapons, more prestigious armoured vehicles and combat aircraft. Moreover, counter-insurgency strategies in Africa tend to focus on manoeuvre warfare, co-opting rebels or fighting them using armed proxies. As a consequence, international counterterrorism operations against fanatical and reckless groups like al-Qaeda in the Islamic Maghreb and Boko Haram in sub-Saharan Africa are characterised by a strong dependence on Western forces providing UAV-based reconnaissance and, in some cases for the United States, military strikes by drones. This essay reviews some of the incentives and problems of the use of UAVs in the African context. Given the geographical and military conditions of asymmetric warfare in Africa, and potential problems concerning international law, ethical aspects of the use of arms, and civil–military relations notwithstanding, it is argued that African security forces should develop their own UAV capabilities by intensifying their cooperation with Western armed forces.  相似文献   
562.
针对人机环复杂因素的空管安全性评价难题,基于非对称贴近度,提出一种的多级模糊综合评判方法。首先构建了基于人机环境工程的空管安全影响因素集,包括人的因素、人机关系和环境条件这三大类因素集,然后依据因素评判的等级和标准,建立了基于非对称贴近度的空管安全性的多级模糊综合评判模型,最后以专家系统评价数据为基础,对某实际空管部门的安全性进行了模糊综合评判。研究方法和研究结论为科学评价空管系统的安全性提供了借鉴。  相似文献   
563.
低慢小无人机具有小型化、红外与雷达暴露征候小、飞行高度低、飞行轨迹不定以及购买使用几乎无门槛等特征,给当前全球军事区域和军事行动安全带来了新的挑战.本文首先分析了世界主要国家对低慢小无人机的界定、国内外管控情况和相关威胁事件;然后,从低慢小无人机的侦察袭击能力、军事区域现有安防措施和低慢小无人机对军事区域进行侦察的相关...  相似文献   
564.
管道在线检测技术及检测机器人研究   总被引:4,自引:0,他引:4  
概述了管道检测技术发展现状,介绍了最新检测技术的原理,分析了管道内检测机器人的技术要点,概括介绍了课题组在差压式管内检测机器人周围流场建模与仿真、腐蚀环境下管道钢裂纹群演化的混沌动力学、差压式管内检测机器人的通过性能、管内检测机器人运行速度和姿态分析及运动状态控制、管内检测机器人小型化、小型化管内检测机器人检测精度、小型化管内检测机器人定位精度及管道剩余寿命的预测方法等方面的研究进展,为今后的研究打下了坚实的基础。  相似文献   
565.
针对在面向操作训练的装备虚拟训练系统开发中遇到的对受训者操作监控的问题,为实现对装备操作过程的详尽描述和对受训者操作逻辑性的监控,提出了一种基于IDEF3的装备操作过程概念建模方法和基于有限状态机、浅层专家知识数据库的操作过程监控系统的设计方案。建立了监控系统的结构框架,并详细介绍了系统三个组成部分的设计方案:浅层专家知识数据库、操作过程状态机和通用操作监控引擎。基于此设计方案的操作过程监控系统已成功的应用于某装备虚拟训练平台,解决了对受训者的操作监控问题,提高了训练效果。  相似文献   
566.
为解决部分党员领导干部不认真过双重组织生活的问题,上海边防总队确立了发放组织生活通知单和组织生活公示制、报告制、通报制,这对于党员领导干部过好组织生活起到了很好的规范作用。严格落实"一单三制"制度,需要把握好三个环节:一要筑牢思想基础,增强落实制度的责任感;二要强化管理监督,提升落实制度的严肃性;三要建立配套制度,提高制度落实的规范性。  相似文献   
567.
水下信息对抗是海军信息化建设中需要重点考虑的内容之一.除了现有的声纳侦察之外,在未来的海战中,信息获取和信息对抗将更多地依赖水声网络的作用.因此,水声网络的相关问题必须得到重视.探讨了水声网络的一些关键技术,从信息对抗的角度分析了水声网络面临的挑战及应对措施.  相似文献   
568.
介绍了现有的软件可测性评估方法,继而提出了基于程序结构的软件可测性评估方法,该方法充分考虑了软件的失效机理,针对测试对象的不同特点,给出了面向控制流的软件故障执行的概率、数据状态感染的概率及以变量的定值-引用为基础的被感染数据状态传播到输出的概率等估计方案,在此基础上,进行了软件可测性的评估.  相似文献   
569.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity.  相似文献   
570.
Security Intergovernmental Organizations, here illustrated by NATO, persist in a “permitted interval” of internationalization, i.e. permitted by its member-states. On the one hand, they are seldom or never permitted to vanish due to member-states' vested interests in retaining them as tools of statecraft, even if their original purposes have become redundant. On the other hand, there is an internationalization ceiling that they must respect: they should not become too autonomous and thereby no longer be suitable as member-state tools. In spite of post-Cold War reform, interviews carried out at NATO Headquarters (HQ) in the late 1980s compared to interviews in 2012 display that a continuous pulling and hauling of forces of internationalization and renationalization have taken place around NATO HQ. The only instance of clear internationalization can be observed in the proactive diplomacy of Secretary General Fogh Rasmussen. There is stiff opposition to the internationalization of abolishing the Military Committee/International Military Staff among minor and South European states, and there is no waning in states' attempts to micro-manage the International Staff. Only external shocks can overcome resistance to internationalizing reform.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号