首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   636篇
  免费   105篇
  国内免费   23篇
  2024年   1篇
  2023年   2篇
  2022年   4篇
  2021年   15篇
  2020年   10篇
  2019年   38篇
  2018年   37篇
  2017年   49篇
  2016年   50篇
  2015年   28篇
  2014年   60篇
  2013年   115篇
  2012年   20篇
  2011年   38篇
  2010年   42篇
  2009年   41篇
  2008年   45篇
  2007年   24篇
  2006年   23篇
  2005年   24篇
  2004年   19篇
  2003年   18篇
  2002年   8篇
  2001年   6篇
  2000年   5篇
  1999年   6篇
  1998年   6篇
  1997年   7篇
  1996年   3篇
  1995年   3篇
  1994年   4篇
  1993年   2篇
  1992年   1篇
  1991年   5篇
  1990年   2篇
  1989年   3篇
排序方式: 共有764条查询结果,搜索用时 15 毫秒
61.
针对低检测概率下多目标跟踪时,概率假设密度滤波器难以正确估计当前目标个数以及目标状态问题,提出一种基于多帧融合的高斯混合概率假设密度滤波算法。根据不同时刻目标权值构造目标多帧权值记录集及目标状态抽取标志。当某些时刻目标被漏检时,依据目标状态抽取标志,并结合目标多帧权值记录集中权值信息估计丢失目标的状态。仿真实验表明,算法有效地提高了低检测概率下现有相关算法的目标状态和数目估计精度。  相似文献   
62.
This study contends that an analysis of the nexus between leadership and security offers useful insights into explaining conflict by stating that the conceptualisation of these argots, especially through the definition of leadership as a process, helps to explain and address Nigeria’s security challenges. By arguing that leaders’ ability to establish mutuality with their followers in any situation and set collectively-generated means for attaining these set goals for societal security, the study shows how such a relationship creates a secured state. This is not the case in Nigeria, where leaders’ security decisions are influenced by external actors rather than by their followers. By showing that the Nigerian ruling elite’s security agendas intersect with dominant global notions of security while neglecting genuine security interests of ordinary Nigerians, the study contextualises the complex global and local security interests in Nigeria. The lack of an intersection at home, however, has contributed to the emergence of extremists such as the Boko Haram sect, as well as the escalation of the acts of violence they perpetrate. As national insecurities become complex and intractable, ‘elegant’ or unilinear solutions – such as a military approach – lack the capacity to address these problems.  相似文献   
63.
The existing guidelines for security sector reform (SSR) tend to draw on theoretical work in the field of civil–military relations, which in turn has been derived from Western, liberal democratic models of governance. Although guidelines strongly advise that local culture and context need to be considered when drawing up objectives for post-conflict SSR programmes, this is not often reflected in practice. This article considers some of the reasons for this, citing both in-country challenges and donor-related issues, and suggests that one of the biggest problems is a lack of alternative, non-orthodox models of civil–military relations to draw upon. It is further suggested that elements of suitable alternative models may be found in states which possess political structures not entirely dissimilar to the Western, liberal democratic ideal, but which can offer different perspectives. Detailed research of these structures should produce a pool of sub-models which could then be employed to create bespoke, culturally appropriate objectives for use in post-conflict SSR programmes.  相似文献   
64.
Many African states have security sector reform (SSR) programs. These are often internationally funded. But how do such programs account for previously existing security institutions and the security needs of local communities? This article examines SSR all over Africa to assess local ownership and path dependency from a New Institutionalist perspective. It finds that SSR, particularly in post-conflict countries, tends to be driven by ideas and perceptions of international donors promoting generalized blueprints. Often, such programs only account in a very limited way for path-dependent aspects of security institutions or the local context. Hence, the reforms often lack local participation and are thus not accepted by the local community eventually.  相似文献   
65.
I present a formal framework to explore the welfare and distributional effects of a government’s optimal choice over two types of public spending in a closed economy: domestic security (DS) and investment in social capital (SC). Production is characterized as a function of social and physical capital stocks that both vary across the regions. DS stands for total factor productivity, while SC stands for human capital and civic cooperativeness combined. SC accumulates via public spending on universal primary education, cultural, and civic events and such, and is exposed to regional spillover effects. Numerical simulations of the static solution of the government’s welfare maximization problem reveal that the optimal rate of spending on SC (m*) is negatively related with the income share of physical capital, SC spillovers and fiscal decentralization. Simulations also show that SC homogeneity is positively associated with both the level and equitability of aggregate income. The maximum attainable levels of income, welfare and social cohesion and the most equitable incomes are all observed to realize at some intermediate range of m* values. In case DS augments SC, however, social cohesion improves and welfare declines monotonously in m*.  相似文献   
66.
程妍妍 《国防科技》2017,38(4):068-074
为深入研究美陆军数据战略目标及实施策略,为我军数据战略研究提供借鉴,文章对美陆军2016年发布的最新《陆军数据战略》进行分析,指出其目标是实现数据的可视化、可获取、可信任、可理解和互操作,并对美陆军数据战略的具体实施策略进行了剖析,指出美国陆军数据战略推动的是美军军事作战理论转型,从"网络为中心"转变为以"数据为中心"作战理念,其核心意图在于以数据优势实现指挥决策优势。  相似文献   
67.
The article focuses on the interface between ethnicity and national security in Nigeria. It critically explores the negative mobilization of ethnicity in Nigeria's fourth republic, and how this has been shaping (and reshaping) the democratization process, particularly in the management of cooperation and conflict over contestations for power and other resources. The re-democratization of Nigeria in 1999 has been preceded with high expectations of meaningful reductions in the high level of insecurity witnessed under the long years of military suzerainty. However, this has not been the case. Rather, what is obtained is an increase in national insecurity on a much larger scale. This article argues that one of the banes of national security in the Nigerian state is ethnic politics, which continues to witness changes in context and character with grave consequences for the future of democracy. The central argument is that ethnicity has always been a major driver of politics and conflicts in Nigeria and the trend is not likely to change anytime soon.  相似文献   
68.
利用低延迟、低功耗、高可靠的NAND Flash构建闪存存储阵列是实现高性能存储系统的有效手段。但应用传统RAID技术构建闪存存储阵列,会引入磨损均衡,校验数据更新频繁导致阵列生命周期降低等问题。针对闪存固有的读写特性,设计实现了一种基于NAND Flash的高性能RAID机制——基于缓存的可重构RAID策略(Cache-Based Reconfigurable RAID,CBR-RAID)。该机制采用可重构条带的思想,利用非易失存储器SCM(Storage Class Memory)作为缓存,对数据顺序重组。实验结果表明该策略能够有效降低垃圾回收开销,提高闪存阵列的性能和使用寿命  相似文献   
69.
采用状态转移矩阵的拦截中段制导方法   总被引:1,自引:1,他引:0       下载免费PDF全文
基于相对运动理论提出拦截中段制导方法。方法原理为,将拦截器初始轨迹与施加修正后的轨迹视为一主一从两空间目标,以相对运动理论描述从目标相对于主目标的运动规律,于是初始的修正量可由终点处相对状态求解。给出了一般形式的相对运动模型,运用几何法与变分法推导得到了J2摄动影响下相对运动的状态转移矩阵,在此基础上,提出了采用状态转移矩阵的拦截中段制导方法。仿真算例表明,提出的方法能够为工程实际中的拦截中段制导提供有效支持。  相似文献   
70.
利用低延迟、低功耗、高可靠的闪存芯片构建闪存存储阵列是实现高性能存储系统的有效手段。但应用传统磁盘阵列技术构建闪存存储阵列,会引入磨损均衡、校验数据更新频繁导致阵列生命周期降低等问题。针对闪存固有的读写特性,设计实现了一种基于NAND Flash的高性能磁盘阵列机制——基于缓存的可重构磁盘阵列策略。该机制采用可重构条带的思想,利用存储等级的内存作为缓存,对数据顺序重组。实验结果表明:该策略能够有效降低垃圾回收开销,提高闪存阵列的性能和使用寿命。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号