全文获取类型
收费全文 | 506篇 |
免费 | 81篇 |
国内免费 | 85篇 |
出版年
2023年 | 1篇 |
2022年 | 5篇 |
2021年 | 10篇 |
2020年 | 7篇 |
2019年 | 12篇 |
2018年 | 7篇 |
2017年 | 28篇 |
2016年 | 40篇 |
2015年 | 22篇 |
2014年 | 34篇 |
2013年 | 35篇 |
2012年 | 29篇 |
2011年 | 34篇 |
2010年 | 23篇 |
2009年 | 42篇 |
2008年 | 36篇 |
2007年 | 31篇 |
2006年 | 48篇 |
2005年 | 34篇 |
2004年 | 30篇 |
2003年 | 26篇 |
2002年 | 18篇 |
2001年 | 17篇 |
2000年 | 23篇 |
1999年 | 14篇 |
1998年 | 7篇 |
1997年 | 9篇 |
1996年 | 12篇 |
1995年 | 9篇 |
1994年 | 4篇 |
1993年 | 3篇 |
1992年 | 7篇 |
1991年 | 5篇 |
1990年 | 5篇 |
1989年 | 2篇 |
1988年 | 2篇 |
1987年 | 1篇 |
排序方式: 共有672条查询结果,搜索用时 15 毫秒
201.
Stephen J. Cimbala 《Defense & Security Analysis》2017,33(3):193-208
Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities. 相似文献
202.
In this article, we study how to derive bounds for the reliability and the expected lifetime of a coherent system with heterogeneous ordered components. These bounds can be used to compare the performance of the systems obtained by permuting the components at a given system structure, that is, to study where we should place the different components at a system structure to get the most reliable system. Moreover, a similar procedure is applied to get bounds for mixtures and for the generalized proportional hazard rate model when the baseline populations are ordered. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 108–116, 2017 相似文献
203.
Richard A.I. Johnson 《Defence and Peace Economics》2017,28(3):272-297
Arms transfers provide exporters an avenue to provide security to other states while gaining economic benefits. Arms transfers provide importers an avenue to gain security without having to rely on alliances. Past research uses aggregate measures of the monetary or security value of major weapon system transfers without accounting for strategic differences in possible use in interstate and civil conflict. This article presents a data set on interstate transfers of major weapon systems between 1950 and 2010 building upon Stockholm Peach Research Institute’s Arms Trade Register with several improvements. First, it disaggregates land weapons and air weapons into categories reflecting their strategic capabilities. Second, model level characteristics (e.g. age, speed, and range) are drawn from Jane’s Defence sources. Additionally, the data set covers a larger range of time and states than previous data sets categorizing arms. To demonstrate the usefulness, this article first presents summary statistics of the data set and then replicates an earlier test to show that the effect of human rights and regime types on United States transfers differs across the categories of arms compared to alternative measures of arms transfers. 相似文献
204.
针对群系统编队跟踪问题,提出一种满足线性二次型调节器性能指标的优化控制方法。建立编队跟踪问题的数学描述和设计编队跟踪控制协议。给出群系统实现编队跟踪的充要条件,借助李雅普诺夫第二方法分析系统的稳定性。得到了控制协议能够最小化线性二次型调节器性能指标的拓扑条件,设计了编〖BHDWG8,WK10YQ,DK1*2,WK1*2D〗〖XCWL.TIF;%129%129〗听语音 聊科研与作者互动 队跟踪算法。仿真实验验证了控制方法的有效性。 相似文献
205.
《防务技术》2022,18(10):1842-1851
In this study, the approximate and exact solutions for the stationary-state of the solids model with neglecting reactant consumption for both non-uniform and uniform temperature systems were applied on gas ignition under a constant pressure condition. The criticality conditions for a slab, an infinite cylinder, and a sphere are determined and discussed using dimensionless temperatures under constant ambient and surface temperatures for a non-uniform temperature system. Exact solution for a Semenov model with convection heat loss was also presented. The solution of the Semenov problem for constant volume or density as a solid and constant pressure were compared. The critical parameter δ is calculated and compared with those of Frank-Kamenetskii solution values. The validation of the calculated ignition temperatures with other exact solution and experimental results were offered. The relation between critical parameters form Semenov and F.K. models solution was introduced. 相似文献
206.
俄印是传统友好国家,俄罗斯也是印度最大的武器和军事装备供应国。在俄奉行"多极"外交政策的背景下,同时印度作为世界最大的武器和军事装备进口国,其军火市场受到多方觊觎,俄对印军售也面临着严峻的挑战。俄专家认为,"俄中印"战略大三角的构想应做出调整,且"多极"外交政策无助于加强俄罗斯与印度关系。文章分析和预测了俄对印的军售现状和前景。俄印这两个传统与新兴大国间的军事技术乃至政治-军事合作,已经和继续对亚太地区乃至全球政治格局施加重大影响。 相似文献
207.
Some of the most active arms races are taking place between developed and less developed countries. The inability of less developed countries to compete financially, as well as technologically, with developed countries may be forcing the former to acquire terror weapons (TWP). The Iran–Iraq war in the 1980s and the events of 9/11 proved that the use of TWP is no longer a mere threat; there are several organizations and countries that will not hesitate to use them. This study develops a model of resource allocation in an arms race between a developed country that is characterized by state‐of‐the‐art technology and high GDP, and a less developed country whose technological capability and GDP are much lower. The model is used to predict the optimal mix of weapons of the two countries that are engaged in the arms race. Applying the model to the arms race between Israel and Syria demonstrates its use. 相似文献
208.
Simen A. Ellingsen 《The Nonproliferation Review》2013,20(2):399-402
On Nuclear Terrorism, by Michael Levi. Harvard University Press, 2007. 210 pages, $24.95. 相似文献
209.
齐紫微 《军械工程学院学报》2013,(2):66-69
基于复杂网络理论,分析了信息化作战系统网络结构,构建了传统作战系统和信息化作战系统拓扑模型的生成算法,并通过对传统作战系统和信息化作战系统结构拓扑模型度量性质的比较,说明了信息化战争下的作战系统结构特点,为进一步研究网络化战争提供了良好的模型基础. 相似文献
210.