全文获取类型
收费全文 | 936篇 |
免费 | 298篇 |
国内免费 | 52篇 |
专业分类
1286篇 |
出版年
2022年 | 13篇 |
2021年 | 18篇 |
2020年 | 15篇 |
2019年 | 12篇 |
2018年 | 8篇 |
2017年 | 60篇 |
2016年 | 48篇 |
2015年 | 40篇 |
2014年 | 57篇 |
2013年 | 119篇 |
2012年 | 124篇 |
2011年 | 134篇 |
2010年 | 49篇 |
2009年 | 38篇 |
2008年 | 44篇 |
2007年 | 63篇 |
2006年 | 67篇 |
2005年 | 77篇 |
2004年 | 63篇 |
2003年 | 56篇 |
2002年 | 26篇 |
2001年 | 38篇 |
2000年 | 34篇 |
1999年 | 17篇 |
1998年 | 7篇 |
1997年 | 12篇 |
1996年 | 10篇 |
1995年 | 5篇 |
1994年 | 2篇 |
1993年 | 3篇 |
1992年 | 7篇 |
1991年 | 5篇 |
1990年 | 11篇 |
1989年 | 4篇 |
排序方式: 共有1286条查询结果,搜索用时 15 毫秒
371.
372.
Sylvie Kleinman 《Small Wars & Insurgencies》2014,25(4):784-799
Secret French plans to launch guerrilla-style raids on the British Isles devised in the spring of 1796 were referred to as ‘chouanneries’. The name and concept behind these small-war operations were modelled on the irregular tactics used by the Chouan rebels in the Vendée, which the French state army had brutally quashed, but some wished to transfer into their institutional practice. Part of France's ongoing military strategy in the war against Britain, which included fomenting insurrection in Ireland, these irregular operations were to be manned partially by pardoned deserters and released convicts and prisoners of war. Of these, only Tate's brief invasion of Wales in 1797 was realised, but the surviving plans provide insightful historical lessons into an Anglophobic mindset shared by a small network of practitioners and policy deciders on the effectiveness of such shock and awe tactics. Largely motivated by the desire to take revenge for Britain's support of counter-revolutionaries in the Vendée, these plans could more aptly be referred to as counter-‘chouanneries’. 相似文献
373.
374.
由于复杂的空中目标机动,其三维方向的机动强度是不一致的,传统IMM算法存在模型匹配不准确的问题,提出一种机动目标IMM三维并行滤波的跟踪算法。算法以CV和修正的CS模型为子集,在3个坐标轴上分别根据目标机动的分量实际更新其模型概率,并行IMM滤波方法,尽量确保模型的适配性,提高滤波精度。仿真结果表明,该算法比传统IMM方法跟踪精度更高,对空中机动目标跟踪适应性更强。 相似文献
375.
随着通用航空及无人机产业的发展,低成本及小型化的导航解决方案将具有广泛的市场。提出了一种基于单频GPS接收机的自迭代定位算法,用于提高定位精度,增强定位收敛性。对该算法的基本原理进行了分析,并推导出该算法的数学模型,通过静态实验的方法对该算法的收敛性进行验证,并将该算法的位置信息与最小二乘法解出的位置信息进行对比,体现了自迭代定位算法的优势。 相似文献
376.
Pascal Vennesson 《战略研究杂志》2017,40(3):358-391
Critical security advocates commonly portray strategic studies as crippled by its narrow focus on Cold War-era military issues, as state-centric and as Western-centric. I argue that this conception of the scope of strategy is flawed and I offer a comprehensive rebuttal by working out the logic of the theories advanced by Carl von Clausewitz and Thomas Schelling. The proponents of critical security overlook the striking expansion of strategy during the Cold War, its longstanding inclusion of competing political actors not just states, as well as its capacity to put Western and non-Western actors in a common analytic frame. By breaking out of the conceptual jails in which strategy has been incarcerated, I seek to reconnect International Relations to strategic thought from which it has become increasingly estranged. 相似文献
377.
Marvin G. Weinbaum 《Small Wars & Insurgencies》2017,28(1):34-56
Pakistan has an uneven history of dealing with insurgencies and extremism. This article identifies the various campaigns and policies employed to defeat militants and deal with violent extremism. It describes the major anti-state groups and how Pakistan’s military and civilian leaders, relying on the related strategies of selectivity, gradualism and containment, have allowed militancy and terrorism to thrive. This article finds that while the elites and the public may have belatedly come to appreciate the existential internal threats these groups pose to the country, there are strong reasons to doubt the state’s full commitment to its promises to take meaningful action. 相似文献
378.
Single‐commodity stochastic network design under demand and topological uncertainties with insufficient data 下载免费PDF全文
Stochastic network design is fundamental to transportation and logistic problems in practice, yet faces new modeling and computational challenges resulted from heterogeneous sources of uncertainties and their unknown distributions given limited data. In this article, we design arcs in a network to optimize the cost of single‐commodity flows under random demand and arc disruptions. We minimize the network design cost plus cost associated with network performance under uncertainty evaluated by two schemes. The first scheme restricts demand and arc capacities in budgeted uncertainty sets and minimizes the worst‐case cost of supply generation and network flows for any possible realizations. The second scheme generates a finite set of samples from statistical information (e.g., moments) of data and minimizes the expected cost of supplies and flows, for which we bound the worst‐case cost using budgeted uncertainty sets. We develop cutting‐plane algorithms for solving the mixed‐integer nonlinear programming reformulations of the problem under the two schemes. We compare the computational efficacy of different approaches and analyze the results by testing diverse instances of random and real‐world networks. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 154–173, 2017 相似文献
379.
针对导弹系统技术复杂、贮存样本量受限、测试数据波动性较大等特点,结合装备的具体情况提出了基于改进GM(1,1)模型的导弹贮存可靠性预测方法。该方法首先利用"对数-幂函数变换"对导弹的历史可靠性数据进行处理,提高数据光滑度,然后依据GM(1,1)模型计算得到可靠性预测值和残差,再利用残差建立残差修正模型,得到残差修正值,减少残差对结果的影响,最后利用残差修正值修正可靠性预测值并还原,求得可靠性最终预测值。实例表明,该改进模型对导弹系统可靠性变化的描述比传统模型更加准确有效,预测结果精度更高,为导弹贮存可靠性预测分析提供了一种有效的改进方法,其算法设计推广性强,可作为其他装备寿命预估的重要工具。 相似文献
380.