全文获取类型
收费全文 | 162篇 |
免费 | 59篇 |
国内免费 | 7篇 |
出版年
2023年 | 2篇 |
2022年 | 1篇 |
2021年 | 4篇 |
2020年 | 2篇 |
2019年 | 6篇 |
2018年 | 4篇 |
2017年 | 13篇 |
2016年 | 14篇 |
2015年 | 7篇 |
2014年 | 8篇 |
2013年 | 10篇 |
2012年 | 17篇 |
2011年 | 13篇 |
2010年 | 10篇 |
2009年 | 15篇 |
2008年 | 11篇 |
2007年 | 14篇 |
2006年 | 13篇 |
2005年 | 6篇 |
2004年 | 5篇 |
2003年 | 3篇 |
2002年 | 5篇 |
2001年 | 6篇 |
2000年 | 10篇 |
1999年 | 13篇 |
1998年 | 2篇 |
1997年 | 3篇 |
1996年 | 3篇 |
1995年 | 3篇 |
1993年 | 2篇 |
1992年 | 1篇 |
1991年 | 1篇 |
1989年 | 1篇 |
排序方式: 共有228条查询结果,搜索用时 687 毫秒
171.
Gjorgji Veljovski Nenad Taneski Metodija Dojchinovski 《Defense & Security Analysis》2017,33(4):292-307
The term “hybrid warfare” is a new one that the West began to use to explain its failure to cope with asymmetric threats. Focusing on the war on global terrorism, the West temporarily withdrew its attention from traditional adversaries, such as Russia, which has used this gap and has audaciously returned to the stage as a global actor. Until the Russian annexation of the Crimean Peninsula in 2014 and inflaming the Ukrainian crisis, most Western authors attributed “hybrid threats” mostly to non-state actors. But the Ukrainian scenario showed the true face of “hybridity” in the modern battlefield when practised by a powerful state actor. Russian “hybrid warfare” in Ukraine has already been seen as a combination of conventional and unconventional methods, that have been complemented with other instruments of national power – diplomatic, economic and information. The purpose of this article is, through an analysis of the Ukrainian scenario, to demonstrate that although the term “hybrid” is new, the concept itself is old and is a continuation of already seen doctrine from the Cold War era. Although “hybrid threats” can come both from state and non-state actors, the Russian interference in Ukraine is proof that they are especially dangerous for the West if, or when, they are initiated from a traditional, sophisticated adversary that has the capacity to use all forms of warfare. 相似文献
172.
Jaïr van der Lijn 《Small Wars & Insurgencies》2013,24(1):72-89
Since 2000, international organisations such as the UN, NATO and the EU, but also countries, have started to apply what has been called the comprehensive approach to crisis management. This article unpacks this comprehensive approach implemented by the Dutch in Uruzgan province, Afghanistan. It first borrows and expands a conceptual framework developed by De Coning and Friis. Subsequently, it maps the different sorts of coherence in the mission by applying the framework. It shows how in practice there was not one single comprehensive approach, but many different forms of interaction between a number of organisational units. Each interaction had its own distinct issues and its own level of coherence. The level of coherence differed depending on the level at which the interaction took place – strategic at headquarters level versus operational at field level – and at what point in the mission it happened – in most cases it moved towards more cohesion. 相似文献
173.
174.
PN码的快速捕获是设计直接序列扩频接收机的关键技术之一。对于无限长的输入序列,采用了基于分段相关的快速捕获算法。分段相关采用重叠保留法,用FFT实现每块的相关运算。在Matlab环境下验证了本算法可以在低信噪比及高动态环境下实现PN码的快速捕获。 相似文献
175.
近年来,记忆词汇的方法不断涌现,但是这些方法仅仅考虑其中某一方面因素,而非综合考虑多方面因素。鉴于单词间拼写和发音重合度对于词汇记忆的重要性,融合了单词拼写和发音重合度,提出了基于单词间关联度的词汇记忆方法,结合图论知识给出了单词最优记忆回路的近似算法,运用Matlab编程对大学英语四级词汇进行了排序,通过实验和假设检验验证了使用基于单词间关联度的词汇记忆方法的记忆效率明显优于普通方法。 相似文献
176.
复杂系统的安全风险涉及面广、影响因素多,因此需要系统的、可操作的方法来指导安全风险的评价过程。在系统的各类安全风险中,故障安全风险是由各种故障导致系统发生事故的风险,是最常见的系统安全问题,因此针对复杂系统的故障安全风险评价开展研究。复杂系统故障安全风险评价需要明确的评价参数和评价方法的支持,为此提出了复杂系统故障安全风险评价的流程、分层次的评价参数体系及评价方法,并通过示例来具体说明故障安全风险的评价过程,为解决复杂系统的故障安全风险评价问题提出了可行的思路。 相似文献
177.
178.
179.
180.
“六熟悉”、灭火预案和指挥员的素质是取得灭火战斗胜利的三个关键因素,在分析三者之间关系的基础上,指出三者具有同样的作用,不可偏废。否则,将无法取得灭火战斗的胜利。 相似文献