首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   300篇
  免费   12篇
  312篇
  2025年   1篇
  2024年   3篇
  2023年   4篇
  2022年   4篇
  2021年   8篇
  2020年   12篇
  2019年   20篇
  2018年   13篇
  2017年   30篇
  2016年   22篇
  2015年   13篇
  2014年   25篇
  2013年   35篇
  2012年   19篇
  2011年   11篇
  2010年   11篇
  2009年   13篇
  2008年   5篇
  2007年   7篇
  2006年   5篇
  2005年   9篇
  2004年   15篇
  2003年   5篇
  2002年   4篇
  2001年   3篇
  2000年   5篇
  1997年   1篇
  1996年   2篇
  1995年   3篇
  1993年   2篇
  1992年   1篇
  1990年   1篇
排序方式: 共有312条查询结果,搜索用时 15 毫秒
41.
蔡珏 《国防科技》2016,37(5):31-35
随着美国揭开第三次\"抵消战略\"重点发展对象的面纱,研发\"颠覆性技术\"已成为主要军事大国获得技术优势的手段。当前世界新一轮科技革命、产业革命、军事革命交织并行,给颠覆性技术提供了难得的良好机遇。但当我们看见颠覆性技术引领时代新型武器装备潮流发展的同时,也应理性看待其背后潜藏的风险。通过概述总结颠覆性技术研究现状,分析其推动的科技内生性变革,从本质上对其进行理性认知。研究表明,发展颠覆性技术必须积极作为,谨慎对待。  相似文献   
42.
美军电子信息装备系统集成技术评析   总被引:1,自引:0,他引:1  
信息综合集成技术已成为电子信息装备研发的重要手段。叙述了美军最新电子信息装备综合集成技术的发展目标、发展重心和发展措施;介绍了美军信息装备综合集成技术发展策略和方法;分析了其主要功能及技术特性;并对美军电子信息装备的发展现状、技术水准和存在的问题给予了较为客观的评价。  相似文献   
43.
    
There is a finite cyclic graph. The hider chooses one of all nodes except the specified one, and he hides an (immobile) object there. At the beginning the seeker is at the specified node. After the seeker chooses an ordering of the nodes except the specified one, he examines each nodes in that order until he finds the object, traveling along edges. It costs an amount when he moves from a node to an adjacent one and also when he checks a node. While the hider wishes to maximize the sum of the traveling costs and the examination costs which are required to find the object, the seeker wishes to minimize it. The problem is modeled as a two‐person zero‐sum game. We solve the game when unit costs (traveling cost + examination cost) have geometrical relations depending on nodes. Then we give properties of optimal strategies of both players. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004.  相似文献   
44.
为了提高智能协同空战攻击决策算法性能,将变异策略引入到DPSO(Discrete Particle Swarm Optimization)协同空战攻击决策算法中,提出了一种新的基于变异离散粒子群(Mutation Discrete Particle Swarm Optimization,MDPSO)的协同空战攻击决策算法。基于典型空战想定背景,仿真验证了算法的有效性。采用对比实验方法,基于准确性、可靠性和快速性等关键性能指标,分析比较了基于MDPSO协同空战攻击决策算法与多种智能决策算法,验证了基于MDPSO的协同空战攻击决策算法有着较好的综合性能。  相似文献   
45.
    
Buying off the shelf procurements (OTS) has become an important part of the national acquisition strategy in several countries, and this paper seeks to bring empirical evidence on OTS as the preferred acquisition strategy by use of data from 2015 to 2022 investment portfolio of the Norwegian Armed Forces. We develop definitions for three categories of procurement – OTS, modified OTS and development projects – as well as a method to classify projects into these categories. Our first finding is that the characteristics of OTS projects correspond to modified OTS and development projects. Our second finding indicates that OTS projects perform better when it comes to the completion of projects according to the initial schedule, compared to development projects.  相似文献   
46.
    
This paper explores the notion that US efforts to evade the political costs of war paradoxically contribute to the subsequent exacerbation of costs over time. Leaders seek to purchase political capital in the short term by limiting the costs and requirements of military operations, but in doing so cause strategic and political liabilities to mount in the long run. While identification of such behaviour is not new, insufficient attention has been devoted to explaining its causes, dynamics, and manifestations in relation to key decisions on and in war. Evidence derived from studies of recent American discretionary campaigns is analysed to advance an argument with respect to this pattern of self-defeating strategic behaviour.  相似文献   
47.
    
We consider a firm which faces a Poisson customer demand and uses a base‐stock policy to replenish its inventories from an outside supplier with a fixed lead time. The firm can use a preorder strategy which allows the customers to place their orders before their actual need. The time from a customer's order until the date a product is actually needed is called commitment lead time. The firm pays a commitment cost which is strictly increasing and convex in the length of the commitment lead time. For such a system, we prove the optimality of bang‐bang and all‐or‐nothing policies for the commitment lead time and the base‐stock policy, respectively. We study the case where the commitment cost is linear in the length of the commitment lead time in detail. We show that there exists a unit commitment cost threshold which dictates the optimality of either a buy‐to‐order (BTO) or a buy‐to‐stock strategy. The unit commitment cost threshold is increasing in the unit holding and backordering costs and decreasing in the mean lead time demand. We determine the conditions on the unit commitment cost for profitability of the BTO strategy and study the case with a compound Poisson customer demand.  相似文献   
48.
ABSTRACT

The United States government has no organised way of thinking about war termination other than seeking decisive military victory. This implicit assumption is inducing three major errors. First, the United States tends to select military-centric strategies that have low probabilities of success. Second, the United States is slow to modify losing or ineffective strategies due to cognitive obstacles, internal frictions, and patron-client challenges with the host nation government. Finally, as the U.S. government tires of the war and elects to withdraw, bargaining asymmetries prevent successful transitions (building the host nation to win on its own) or negotiations.  相似文献   
49.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   
50.
ABSTRACT

When on the wrong end of an asymmetry in the projection of hard power, weaker sides countenance the grim arithmetic of avoiding direct and massed confrontations. Invariably, insurgents have over the ages tended to employ indirect tactical methods to render their stronger opponents ineffective. Ultimately – interest asymmetry, regime type, asymmetries of strategy, and external intervention – combine in a complex interplay and pattern, to militate against a strong side. In Sudan, these factors interacted throughout the civil wars to produce regional autonomy and finally an independent South Sudan in 2011. Similar strategic logic had confronted many large African states battling insurgencies in Ethiopia, Angola, Nigeria, Zaire, and apartheid-era South Africa. Oftentimes, weakening public resolve has caused these governments to accommodate, capitulate or withdraw even if they try not to blink. Notwithstanding the regime type, it can be concluded that the majority of strong actors are prone to fail in a protracted, asymmetric conflict. Hence, the notion of linking victory in counterinsurgency to the degree of openness (democratic polyarchies); or closeness (totalitarianism) – is still valid but highly contestable in the case of Africa’s large dysfunctional states.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号