全文获取类型
收费全文 | 607篇 |
免费 | 116篇 |
国内免费 | 46篇 |
专业分类
769篇 |
出版年
2024年 | 1篇 |
2023年 | 4篇 |
2022年 | 8篇 |
2021年 | 16篇 |
2020年 | 14篇 |
2019年 | 14篇 |
2018年 | 11篇 |
2017年 | 26篇 |
2016年 | 35篇 |
2015年 | 22篇 |
2014年 | 52篇 |
2013年 | 52篇 |
2012年 | 46篇 |
2011年 | 49篇 |
2010年 | 33篇 |
2009年 | 59篇 |
2008年 | 28篇 |
2007年 | 40篇 |
2006年 | 52篇 |
2005年 | 39篇 |
2004年 | 29篇 |
2003年 | 25篇 |
2002年 | 14篇 |
2001年 | 20篇 |
2000年 | 16篇 |
1999年 | 7篇 |
1998年 | 7篇 |
1997年 | 5篇 |
1996年 | 7篇 |
1995年 | 8篇 |
1994年 | 5篇 |
1993年 | 3篇 |
1992年 | 2篇 |
1991年 | 8篇 |
1990年 | 9篇 |
1989年 | 3篇 |
排序方式: 共有769条查询结果,搜索用时 15 毫秒
321.
322.
BP神经网络和D-S证据理论的目标识别 总被引:6,自引:0,他引:6
目标识别是指挥自动化系统的一个重要组成部分,针对现代战争对抗手段不断增强的特点,运用BP神经网络和D-S证据理论探索作战飞机机型的识别方法.前端采用3层BP神经网络结构,以传感器接收数据为输入,以神经网络输出作为证据,后端对不同传感器的证据按D-S理论进行融合,得到待识别目标的识别概率.经由MATLAB编程对国内外几种主要机型的识别进行仿真研究,与现行目标识别方法相比较,能够更快速、准确、可靠地识别飞机目标,较好地满足了空战中作战指挥系统对飞机机型识别的需求. 相似文献
323.
324.
利用遗传算法求解装备调拨中的路径优化问题和运输装载问题,并利用MATLAB进行了实例仿真,对装备调拨的辅助决策具有积极的意义。 相似文献
325.
Dr. Aaron Karp Ambassador Julio Carasales Ministry of Foreign Affairs Argentina 《The Nonproliferation Review》2013,20(1):189-190
Atomic Obsession: Nuclear Alarmism from Hiroshima to Al Qaeda, by John Mueller. Oxford University Press, 2009. 336 pages, $27.95. Les armes nucléaires: Mythes et réalités [Nuclear Weapons: Myths and Realities], by Georges Le Guelte. Actes Sud, 2009. 390 pages, [euro]25. 相似文献
326.
Alex Marshall 《Small Wars & Insurgencies》2013,24(2):233-258
Since 9/11, counterinsurgency is back in fashion; the ‘war on terror’ has even been branded a ‘global counterinsurgency’. However the context within which counterinsurgency originally arose is critical to understanding the prospects for its present success; the radically changed environment in which it is currently being conducted casts into considerable doubt the validity of the doctrine's application by many national militaries currently ‘rediscovering’ this school of military thought today. Above all, classical counterinsurgency was a profoundly imperial, state-centric phenomenon; consequently it only rarely faced the thorny issue of sovereignty and legitimacy which bedevils and may doom these same efforts today. 相似文献
327.
Mika Kerttunen 《Small Wars & Insurgencies》2013,24(1):78-118
This paper examines the insurgency in Nepal (1996–2008) from a military theoretical point of view. It looks at the insurgency from André Beaufre's exterior/interior framework, which is modified to match postmodern conflicts. Simultaneously the importance of the political is underlined. The author critically examines the relevance of the Maoist label the movement and insurgency have received. He claims that the insurgency became a hybrid consisting of Chinese, Latin American, and Leninist thoughts wrapped in pragmatic/revisionists and nationalist ideas. The author also suggests that the ability of insurgents – or counter-insurgents – to combine the effects of the exterior and interior is more likely to constitute the key centre of gravity of a conflict than any single political, economic, or military factor. 相似文献
328.
Dan Kovenock 《Defence and Peace Economics》2013,24(5):507-515
The contest-theoretic literature on the attack and defense of networks of targets focuses primarily on pure-strategy Nash equilibria. Hausken's 2008 European Journal of Operational Research article typifies this approach, and many of the models in this literature either build upon this model or utilize similar techniques. We show that Hausken's characterization of Nash equilibrium is invalid for much of the parameter space examined and provides necessary conditions for his solution to hold. The complete characterization of mixed-strategy equilibria remains an open problem, although there exist solutions in the literature for special prominent cases. 相似文献
329.
A defender wants to detect as quickly as possible whether some attacker is secretly conducting a project that could harm the defender. Security services, for example, need to expose a terrorist plot in time to prevent it. The attacker, in turn, schedules his activities so as to remain undiscovered as long as possible. One pressing question for the defender is: which of the project's activities to focus intelligence efforts on? We model the situation as a zero‐sum game, establish that a late‐start schedule defines a dominant attacker strategy, and describe a dynamic program that yields a Nash equilibrium for the zero‐sum game. Through an innovative use of cooperative game theory, we measure the harm reduction thanks to each activity's intelligence effort, obtain insight into what makes intelligence effort more effective, and show how to identify opportunities for further harm reduction. We use a detailed example of a nuclear weapons development project to demonstrate how a careful trade‐off between time and ease of detection can reduce the harm significantly. 相似文献
330.
Bleddyn E. Bowen 《战略研究杂志》2019,42(3-4):532-556
Colin Gray once lamented the absence of a ‘Mahan for the final frontier’ and spacepower theory in strategic studies. This article proposes the command of space as the fundamental concept of spacepower theory, and that Mahan himself has much to offer in the endeavour of spacepower theory-making than has hitherto been realised. The theory is advanced by tempering versions of the ‘command of space’, stressing its educational intent, and explaining the nuanced sub-concepts of space control and denial through understanding some precedents set by seapower theory. In the process, aspects of Mahanian and Corbettian seapower theory are unified. 相似文献