首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1072篇
  免费   144篇
  国内免费   96篇
  2023年   2篇
  2022年   4篇
  2021年   24篇
  2020年   17篇
  2019年   34篇
  2018年   37篇
  2017年   63篇
  2016年   75篇
  2015年   30篇
  2014年   103篇
  2013年   131篇
  2012年   58篇
  2011年   81篇
  2010年   70篇
  2009年   81篇
  2008年   86篇
  2007年   67篇
  2006年   67篇
  2005年   79篇
  2004年   51篇
  2003年   41篇
  2002年   23篇
  2001年   21篇
  2000年   15篇
  1999年   8篇
  1998年   10篇
  1997年   7篇
  1996年   5篇
  1995年   6篇
  1994年   3篇
  1993年   5篇
  1992年   3篇
  1991年   2篇
  1990年   3篇
排序方式: 共有1312条查询结果,搜索用时 15 毫秒
51.
针对GM(1,1)预测模型误差较大的问题,在GM(1,1)模型的基础上引入加权马尔科夫模型构建了部队集成训练效果预测模型。该模型以GM(1,1)模型存在的预测残差作为划分马尔科夫状态的依据,通过加权处理对预测结果进行修正。实例分析结果表明,该模型算法简单,易于实现,可以较大地提高部队训练效果预测精度,为部队开展科学有效的实战化训练提供了有力的数据支撑。  相似文献   
52.
This study contends that an analysis of the nexus between leadership and security offers useful insights into explaining conflict by stating that the conceptualisation of these argots, especially through the definition of leadership as a process, helps to explain and address Nigeria’s security challenges. By arguing that leaders’ ability to establish mutuality with their followers in any situation and set collectively-generated means for attaining these set goals for societal security, the study shows how such a relationship creates a secured state. This is not the case in Nigeria, where leaders’ security decisions are influenced by external actors rather than by their followers. By showing that the Nigerian ruling elite’s security agendas intersect with dominant global notions of security while neglecting genuine security interests of ordinary Nigerians, the study contextualises the complex global and local security interests in Nigeria. The lack of an intersection at home, however, has contributed to the emergence of extremists such as the Boko Haram sect, as well as the escalation of the acts of violence they perpetrate. As national insecurities become complex and intractable, ‘elegant’ or unilinear solutions – such as a military approach – lack the capacity to address these problems.  相似文献   
53.
The existing guidelines for security sector reform (SSR) tend to draw on theoretical work in the field of civil–military relations, which in turn has been derived from Western, liberal democratic models of governance. Although guidelines strongly advise that local culture and context need to be considered when drawing up objectives for post-conflict SSR programmes, this is not often reflected in practice. This article considers some of the reasons for this, citing both in-country challenges and donor-related issues, and suggests that one of the biggest problems is a lack of alternative, non-orthodox models of civil–military relations to draw upon. It is further suggested that elements of suitable alternative models may be found in states which possess political structures not entirely dissimilar to the Western, liberal democratic ideal, but which can offer different perspectives. Detailed research of these structures should produce a pool of sub-models which could then be employed to create bespoke, culturally appropriate objectives for use in post-conflict SSR programmes.  相似文献   
54.
唐苏妍  祁永强  裴飞 《国防科技》2017,38(2):049-054
信息攻防作战力量既可以独立成军成战,又可以和各军兵种、各种武器平台无缝衔接、联合协同,以发挥无限的战争潜力,是以信息攻防新技术为支撑、以软硬打击新能力为标志的新型作战力量。从核心信息基础设施建设,信息攻击和防护能力建设以及信息攻防协同作战三个方面论述了信息攻防新型作战力量建设的重要问题及战法对策,对信息攻防作战的特点规律和技术手段进行了剖析。  相似文献   
55.
Many African states have security sector reform (SSR) programs. These are often internationally funded. But how do such programs account for previously existing security institutions and the security needs of local communities? This article examines SSR all over Africa to assess local ownership and path dependency from a New Institutionalist perspective. It finds that SSR, particularly in post-conflict countries, tends to be driven by ideas and perceptions of international donors promoting generalized blueprints. Often, such programs only account in a very limited way for path-dependent aspects of security institutions or the local context. Hence, the reforms often lack local participation and are thus not accepted by the local community eventually.  相似文献   
56.
I present a formal framework to explore the welfare and distributional effects of a government’s optimal choice over two types of public spending in a closed economy: domestic security (DS) and investment in social capital (SC). Production is characterized as a function of social and physical capital stocks that both vary across the regions. DS stands for total factor productivity, while SC stands for human capital and civic cooperativeness combined. SC accumulates via public spending on universal primary education, cultural, and civic events and such, and is exposed to regional spillover effects. Numerical simulations of the static solution of the government’s welfare maximization problem reveal that the optimal rate of spending on SC (m*) is negatively related with the income share of physical capital, SC spillovers and fiscal decentralization. Simulations also show that SC homogeneity is positively associated with both the level and equitability of aggregate income. The maximum attainable levels of income, welfare and social cohesion and the most equitable incomes are all observed to realize at some intermediate range of m* values. In case DS augments SC, however, social cohesion improves and welfare declines monotonously in m*.  相似文献   
57.
李智勇  王本胜 《国防科技》2017,38(6):099-102
随着信息技术的发展,分布式指挥与控制已成为信息时代联合作战指挥的一种新方式。把握实施分布式指挥与控制主要环节的核心技术,运用物联网、大数据、量子通信、人工智能等前沿科技,是促进指挥信息系统在作战指挥领域发挥效能的关键所在。  相似文献   
58.
薛贵江 《国防科技》2017,38(5):004-006
习主席强调,研究作战问题核心是要把现代战争的特点规律和制胜机理搞清楚。深刻认识信息化战争的五个时代特征,准确把握特点规律,真正搞清信息化战争的五个制胜机理,在将信息化建设成果转化为现实战斗力的过程中做到五个坚持,对于做好军事斗争准备,打赢信息化战争具有重要意义。  相似文献   
59.
程妍妍 《国防科技》2017,38(4):068-074
为深入研究美陆军数据战略目标及实施策略,为我军数据战略研究提供借鉴,文章对美陆军2016年发布的最新《陆军数据战略》进行分析,指出其目标是实现数据的可视化、可获取、可信任、可理解和互操作,并对美陆军数据战略的具体实施策略进行了剖析,指出美国陆军数据战略推动的是美军军事作战理论转型,从"网络为中心"转变为以"数据为中心"作战理念,其核心意图在于以数据优势实现指挥决策优势。  相似文献   
60.
从目前我国指挥控制系统中地理信息使用存在的问题出发,结合指挥信息系统的实际工作需要和现代战争作战趋势与发展方向,应用服务化与网络化系统技术理念,提出了基于SOA的地理信息服务的软件架构,使部队现有的应用系统之间的地理信息协同与共享,为部队作战任务和决策提供地理信息的有力支撑,并给出了具体的软件模块设计。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号