首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1130篇
  免费   278篇
  国内免费   115篇
  2024年   5篇
  2023年   14篇
  2022年   22篇
  2021年   17篇
  2020年   36篇
  2019年   16篇
  2018年   16篇
  2017年   69篇
  2016年   95篇
  2015年   37篇
  2014年   79篇
  2013年   74篇
  2012年   94篇
  2011年   106篇
  2010年   59篇
  2009年   104篇
  2008年   83篇
  2007年   72篇
  2006年   80篇
  2005年   72篇
  2004年   72篇
  2003年   41篇
  2002年   52篇
  2001年   37篇
  2000年   22篇
  1999年   23篇
  1998年   26篇
  1997年   20篇
  1996年   11篇
  1995年   20篇
  1994年   11篇
  1993年   10篇
  1992年   10篇
  1991年   5篇
  1990年   10篇
  1989年   2篇
  1988年   1篇
排序方式: 共有1523条查询结果,搜索用时 15 毫秒
971.
舰载无人机运用各种侦察载荷对目标进行搜索、定位,并在目标遭受打击后获取各类毁伤信息,是海战场目标打击效果评估过程中至关重要的环节。文章分别从对目标探测定位、毁伤信息获取、突防和返航等阶段,分析了舰载无人机雷达、通信侦察载荷的运用过程,讨论了雷达、通信侦察载荷在目标遭遇打击后毁伤信息获取中的具体应用,提出了雷达、通信侦察载荷在整个打击效果评估过程中使用应注意的问题。  相似文献   
972.
为支持军事通信业务的智能化,研究了军事通信业务上下文信息的表示和推理,提出了一种表示业务上下文信息的语法结构、语义以及上下文元信息的本体建模方法。并利用贝叶斯网络理论,提出了一种支持不确定性推理的业务上下文认知模型的构建方法,最后通过案例分析验证了模型和结论的合理性。  相似文献   
973.
近年来,无缓冲路由器由于不需要缓冲器而成为片上网络低开销的解决方案。为了提高无缓冲路由器的性能,提出一种单周期高性能无缓冲片上网络路由器。该路由器使用一个简单的置换网络替换串行化的交换分配器与交叉开关以实现高性能。虚通道路由器与基准无缓冲路由器相比,该路由器在TSMC65nm工艺下可以以较小的面积开销达到2GHz的时钟频率。在合成通信负载与真实应用负载下的模拟结果表明,该路由器的包平均延迟远小于虚通道路由器和其他无缓冲路由器。  相似文献   
974.
旋转CRC同时使用两个生成多项式产生校验数据。之前的方法校验能力弱,报文丢失后的检错失效率很高。提出了一种新的旋转CRC设计方法,通过比较,选取合适的更高次的生成多项式组合,并且修改了检验生成与检测机制,形成MR-CRC。FPGA实现结果表明,这种方法能够在较低逻辑复杂度的基础上提高校验能力,从而改善数据通信的可靠性,而且对系统性能影响甚小。通过比较16位MR-CRC与32位传统CRC的实现数据发现,前者在所用资源减少10%的情况下,频率提高了25%。  相似文献   
975.
以作战指挥理论需求为牵引,从复杂网络的角度对联合作战指挥体系问题进行网络抽象,将指挥体系中的指挥机构作为网络的节点,将指挥关系作为网络的边,按照指挥体系历史发展的规律,从简单到复杂,分别构建了传统层级纵长树状型的指挥体系网络模型,在树状模型基础上,增加了横向联系但依然具有层级结构的信息共享改进型的指挥体系网络模型,以及...  相似文献   
976.
着眼信息化战争条件下军事情报分类、处理困难的现实,在深入分析军事情报检索系统特点基础上,提出一个基于分类的自动存储和利用查询术语同义词关系扩展信念模型的检索军事情报检索原型系统,详细描述了其存储和检索设计思路.  相似文献   
977.
从战术数据链的功能模型出发,考虑影响战术数据链正常功能发挥的各方面因素,基于灰色层次理论,构建了战术数据链综合性能评估指标体系,在此基础上提出了战术数据链综合性能的灰色层次模型。应用实例的过程及结果表明,评估方法简易可行,评估结论相对真实合理,对战术数据链性能评价及新功能的开发具有理论指导意义和应用价值。  相似文献   
978.
In the Post-Bipolar Era the growing complexity of the military operations requires a new approach for the resolution of international crises. Since the end of the Cold War, peace support operations (PSO) have become the mainstay and principal occupation of most Western armies. At the same time, Italy has been one of the most important actors in such an area. The article focuses on the cooperation between military and civil components (a process called CIMIC) as a key variable in the Italian PSOs. We will analyse in detail the main lessons learned from past military interventions as well as the general context in which new tendencies are taking place. The maintaining of a minimum security frame becomes essential to fulfil activities ‘collateral’ to the mission: reconstructing services and infrastructure, food distribution, water and medication, law and order, de-mining, training of local forces, and supporting local institutions. These are the main tasks to obtain thrust and support from the population.  相似文献   
979.
Casualty figures suggest that the US/Allied Counter Improvised Explosive Device (C-IED) policy and the present allocation of national assets, resources, and intellectual capital have not been very successful. A number of explanations for why this has been the case are discussed and critiqued here.  相似文献   
980.
There have been growing claims in media circles and law-enforcement settings that street gangs and criminal groups are turning to Internet-based social networking sites for various reasons ranging from the showcasing of their images and exploits to the suspected recruitment of members. The present study investigates whether such a trend is, in fact, in place. The presence of street gangs on these Internet sites is referred to as cyberbanging. While there is some anecdotal evidence suggesting that gangs are turning to social networking sites, there is little available research on exactly how street gangs and criminal groups use the Internet. Our main argument is that gang culture is in many ways an individualized phenomenon and this feature ties in directly with recent assessments of the Internet as a setting that is governed by a process of networked individualism. This theoretical link between the individualized gang setting and the presence of gang members on social networking sites helps us understand why recruitment is improbable even in a context where people are openly diffusing their image and exploits to a growing number of Internet users. The empirical segment of this research adds to this general outlook. Based on a keyword search of over 50 street gang names, the three main social networking sites (Twitter, Facebook, and MySpace) were monitored for street gang presence. Results illustrate that gang presence on social networking sites is linked primarily to promoting a general gang or street culture through individual displays. In regard to the visitors to such sites, there is no evidence that they are being tricked or manipulated in any way. They are, however, showing their curiosity in regard to such groups and, for those who share their comments and opinions, signs of support are evident. Thus, whereas criminal gangs are not proactively using the Internet to convert anyone into being gang members, social networking sites are creating a new venue for people who share or are sensitive to the values underlying street gang lifestyle to come together. These sites essentially create a new convergence setting for gang members to interact with a wider number of people who would probably never have been exposed to their lifestyles and exploits through physical interactions. The study's conclusion extends these findings toward further research in this area, as well as outlining the more relevant implications for law-enforcement monitoring of this growing phenomenon.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号