首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   467篇
  免费   129篇
  国内免费   21篇
  2024年   3篇
  2023年   4篇
  2022年   6篇
  2021年   9篇
  2020年   15篇
  2019年   22篇
  2018年   16篇
  2017年   38篇
  2016年   38篇
  2015年   20篇
  2014年   36篇
  2013年   53篇
  2012年   38篇
  2011年   34篇
  2010年   28篇
  2009年   26篇
  2008年   28篇
  2007年   17篇
  2006年   31篇
  2005年   29篇
  2004年   35篇
  2003年   14篇
  2002年   14篇
  2001年   10篇
  2000年   20篇
  1999年   4篇
  1998年   8篇
  1997年   3篇
  1996年   2篇
  1995年   6篇
  1994年   1篇
  1993年   2篇
  1992年   2篇
  1990年   3篇
  1989年   2篇
排序方式: 共有617条查询结果,搜索用时 109 毫秒
21.
简要介绍了军事虚拟仓库及其组织结构形式.以及博弈论的相关知识。结合军事后勤系统的特点,采用完全信息静态博弈纳什均衡的方法分析了军事虚拟仓库的组织结构模式,在假设的合理的条件下模拟3种组织形式的博弈过程。通过各个模型的最终纳什均衡,指出了3种组织结构形式运作的结果和其积极因素、消极因素、噪声构成.结合我军现有的后勤保障体制,提出现行保障体制的合理与不合理的地方,并给出了改进方案,对优化全军后方仓库布局及管理和战备物资储备及应急保障有着重要意义,可以为总部决策提供咨询建议。  相似文献   
22.
一种自适应指数加权衰减记忆滤波算法   总被引:4,自引:0,他引:4  
根据衰减记忆因子为一个常数的不尽合理性的假设,深入研究了指数加权衰减记忆滤波因子,根据滤波收敛条件和滤波模型准确时的新息(残差)特点,提出了具有自适应性、抑制滤波发散的指数加权衰减记忆滤波算法,并通过仿真试验验证了自适应抑制滤波发散的有效性。  相似文献   
23.
实现大空域变轨的三维虚拟目标比例导引律   总被引:6,自引:1,他引:5  
为了实现反舰导弹的大空域变轨,提出了一种三维虚拟目标比例导引律。该导引律利用简单的控制指令就能控制导弹完成复杂的大空域变轨。采用变轨弹道可以提高导弹的机动性,有效地对抗敌方反导武器系统的拦截,提高突防能力。同时,采用变轨弹道可以增大导弹的射程,实现防区外发射,从而有效地提高发射平台的生存能力。最后,通过仿真实例证明所提出的导引律是很有效的。  相似文献   
24.
虚拟机应用软件VMware在计算机辅助教学中的应用   总被引:13,自引:0,他引:13  
本文介绍了虚拟机应用软件VMware,并分析了虚拟机VMware软件作为一种新的教学辅助手段在计算机辅助教学中的应用。  相似文献   
25.
Li Chen 《战略研究杂志》2017,40(5):663-695
This article analyses the doctrine development of the People’s Liberation Army (PLA) coping with the Soviet military threat between 1969 and 1989. In the 1970s, the PLA applied a doctrine of ‘active defence and luring the enemy into depth’ based on its traditional operational art. In 1980, the PLA decided to focus its doctrine on positional defence. In 1986, the PLA introduced ‘integrated operations and prioritised strike’, a generalised doctrine that originated from its war history. Many organisational and intellectual challenges in peacetime doctrine development contributed to the PLA’s operational idealism, including its aging leadership, command structure, attitude towards its previous experience, limited analysis of contemporary military developments, and failure in test and validation of doctrines. In the post-Cold War decade, many of these challenges persisted in spite of military modernization efforts. The ongoing military reform has to address these challenges and improve the PLA doctrine development in peacetime.  相似文献   
26.
In his 1987 work Strategy: The Logic of War and Peace (Harvard University Press, Cambridge, MA, 1987), Edward Luttwak described strategy as a field of activity characterised not only by an innately complex relationship between designs, actions and outcomes, but so too by the frequent disparity between its theory and praxis. Similar observations on this subject have since been made by Richard K. Betts, Lawrence Freedman and Antulio Echevarria II. This article will use the Allied invasion of Sicily in July–August 1943 as a vehicle through which to test these theories against a signal event in the European theatre of the Second World War. It will illustrate how Operation Husky and its aftermath are a paradigm of the confusing and often illogical course of events associated with the process of formulating strategy and waging war. In so doing it demonstrates the benefits of using strategic theory to illuminate events and so move beyond the often insular focus of campaign histories, and simultaneously reinforces the importance of military history in informing a theoretical understanding of strategy.  相似文献   
27.
Europe,Russia and the Ukraine crisis: the dynamics of coercion   总被引:2,自引:0,他引:2  
This article analyses European strategy towards Russia during the Ukraine crisis between February 2014 and December 2015, conceptualising it as a coercive diplomatic strategy and analysing the relationship between its ends, ways and means. European strategy sought to reverse Russian intervention. However, this overarching aim was flanked by two ‘constraining’ aims of avoiding an escalation of the conflict and a breakdown of relations with Russia. The strategy shifted between these aims, which proved to be irreconcilable: while the EU partly succeeded in containing the conflict, it failed to reverse Russian intervention and relations between the EU and Russia deteriorated sharply.  相似文献   
28.
程妍妍 《国防科技》2017,38(4):068-074
为深入研究美陆军数据战略目标及实施策略,为我军数据战略研究提供借鉴,文章对美陆军2016年发布的最新《陆军数据战略》进行分析,指出其目标是实现数据的可视化、可获取、可信任、可理解和互操作,并对美陆军数据战略的具体实施策略进行了剖析,指出美国陆军数据战略推动的是美军军事作战理论转型,从"网络为中心"转变为以"数据为中心"作战理念,其核心意图在于以数据优势实现指挥决策优势。  相似文献   
29.
针对网络攻防环境中防御方以提高系统生存能力为目的所进行的最优生存防御策略的选取问题,提出了一种基于完全信息动态博弈理论的生存防御策略优化配置算法。将恶意攻击方、故障意外事件及防御方作为博弈的参与人,提出了一种混合战略模式下的三方动态博弈模型,对博弈的主要信息要素进行了说明,以混合战略纳什均衡理论为基础,将原纳什均衡条件式的表达式转化为可计算数值结果的表达式,并据此增加了近似的概念,最后,将提出的模型和近似纳什均衡求解算法应用到一个网络实例中,结果证明了模型和算法的可行性和有效性。  相似文献   
30.
ABSTRACT

When on the wrong end of an asymmetry in the projection of hard power, weaker sides countenance the grim arithmetic of avoiding direct and massed confrontations. Invariably, insurgents have over the ages tended to employ indirect tactical methods to render their stronger opponents ineffective. Ultimately – interest asymmetry, regime type, asymmetries of strategy, and external intervention – combine in a complex interplay and pattern, to militate against a strong side. In Sudan, these factors interacted throughout the civil wars to produce regional autonomy and finally an independent South Sudan in 2011. Similar strategic logic had confronted many large African states battling insurgencies in Ethiopia, Angola, Nigeria, Zaire, and apartheid-era South Africa. Oftentimes, weakening public resolve has caused these governments to accommodate, capitulate or withdraw even if they try not to blink. Notwithstanding the regime type, it can be concluded that the majority of strong actors are prone to fail in a protracted, asymmetric conflict. Hence, the notion of linking victory in counterinsurgency to the degree of openness (democratic polyarchies); or closeness (totalitarianism) – is still valid but highly contestable in the case of Africa’s large dysfunctional states.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号