首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   301篇
  免费   22篇
  国内免费   33篇
  2023年   1篇
  2021年   8篇
  2020年   11篇
  2019年   23篇
  2018年   13篇
  2017年   18篇
  2016年   18篇
  2015年   4篇
  2014年   32篇
  2013年   43篇
  2012年   10篇
  2011年   17篇
  2010年   14篇
  2009年   17篇
  2008年   20篇
  2007年   21篇
  2006年   16篇
  2005年   23篇
  2004年   17篇
  2003年   12篇
  2002年   1篇
  2001年   6篇
  2000年   2篇
  1999年   3篇
  1998年   2篇
  1995年   1篇
  1994年   1篇
  1992年   1篇
  1991年   1篇
排序方式: 共有356条查询结果,搜索用时 15 毫秒
271.
为了尽快分析出未知水雷障碍参数,根据水雷战的特点,提出了建立未知水雷障碍参数分析专家系统的观点,对专家系统的设计方法进行了一定的探讨,并针对专家系统建立中的"瓶颈"问题,提出了基于Vague集插值近似推理的专家系统知识自动获取方法,在介绍推理过程的基础上给出了算例.从推理的结果来看,该方法具有较高的可信度,从而为专家系统的研制提供了一定的方法支持.  相似文献   
272.
ISIS (the Islamic State of Iraq and Syria) has become a key political and military actor in the Middle East and in North Africa. This essay aims at outlining ISIS warfare through an analysis of its operations in the frame of hybrid warfare theory proposed by Frank Hoffman. Therefore, the paper deals with: the role of terrorist tactics in ISIS warfare and the relationship between terrorism and insurgency; ISIS use of technology, mainly with regard to suicide attacks and to drones; and the relevance of urban warfare. Finally, the paper highlights how ISIS operates and the most threatening features of its warfare.  相似文献   
273.
反恐作战心理训练是现代反恐怖作战行动中需要特别研究和解决的问题。阐述公安边防部队实施反恐作战心理训练的意义,分析公安边防部队反恐作战心理训练的基本方式方法,说明实施反恐心理训练必须注意把握的几个关键性问题。  相似文献   
274.
《防务技术》2020,16(1):232-241
Operation architecture plays a more important role in Network Centric Warfare (NCW), which involves dynamic operation networks with complex properties. Thus, it is essential to investigate the operation architecture under the informatization condition within NCW and find a proper network construction method to efficiently coordinate various functional modules on a particular situation, i.e., the aerial combat. A new method integrating the physical level and functional level of NCW is proposed to establish the operation architecture, where the concept of network operation constraints unit and net constructing mechanisms are employed to avoid conflicts among different platforms. Meanwhile, we conduct simulations to assess the effectiveness and feasibility of the constructed operation architecture and analyze the influence of the network parameters.  相似文献   
275.
关于信息化作战装备保障的思考   总被引:1,自引:0,他引:1  
提出并分析了信息化作战装备保障的概念、标志及主要特征。其中主要特征为:能力要求是基于信息系统的一体化综合保障能力;力量体系是基于保障单元的多功能集成体系;保障方式是基于智能化保障手段的精确保障;保障方法是基于信息化作战行动的多样化保障。指出信息化作战保障的实现,需要智能化的保障手段提供技术基础,知识化的保障队伍提供智力基础,配套完善的机制提供制度基础,一体化保障环境提供外部条件;提出了建设信息化作战装备保障的方法途径。  相似文献   
276.
ABSTRACT

This article reviews the book by Ofer Fridman and seeks to situate the strategic debate on hybrid war in the context of debate on the US involvement in Iraq. It points to intellectuals from the Marine Corps having a significant role in the initial development of the hybrid warfare concept at a time of some reservation in US military circles over COIN strategy as this was set out in the field manual FM3-24. Thereafter, the hybrid war concept rapidly spread and became a conceptual device used to explain Russian strategic intentions in the aftermath of the invasion of Ukraine in 2014.  相似文献   
277.
278.
ABSTRACT

The brief war that took place between Spain and Portugal in 1762 is one of the least known episodes in the latter’s military history, whereas, thanks to Wellington’s construction of the Lines of Torres Vedras, the French invasion of 1810–11 is right at the other end of the spectrum. Yet the two episodes are closely linked to one another. At the very least, they are uncannily reminiscent in terms of their details – in both cases substantial foreign armies were vanquished through a combination of irregular resistance, scorched-earth tactics and the clever use of field fortifications – and the article therefore argues that Wellington based the plan that defeated the forces of Marshal Massena on the strategy used by the Portuguese half a century earlier.  相似文献   
279.
ABSTRACT

At the turn of the nineteenth century, China’s Qing dynasty (1644–1912) was hit by a sectarian rebellion. Commonly considered a breakpoint marking the end of the dynasty’s golden age spanning most of the eighteenth century, the war to suppress the rebels, referred to as the White Lotus War (1796–1804) in this article (‘White Lotus’ was the umbrella name used by both the authorities and some sectarians for their teaching), exposed many structural drawbacks of the Qing political and military systems and depleted the dynasty’s financial resources, which had never been recovered. Reluctant in embracing guerrilla warfare in the beginning, the insurgents quickly turned themselves into master guerrillas. Shuttling in two massive mountain ranges in central China, they managed to prolong their rebellion and fought some successful battles against their suppressors. Superior in manpower, weaponry, and logistical support, the government forces had to adapt to guerrilla warfare, albeit passively and ineptly. This article gives a brief introduction to this little-known episode of guerrilla war at the turn of the nineteenth century in Qing China, expounds the strengths and weaknesses of both sides, and sheds light on the roots of the war’s long duration and the grim consequences to the Qing state.  相似文献   
280.
Proxy warfare is a consistent element in international warfare. However, it is unclear why proxy relationships form in cases where states have multiple options of groups to support. Existing research identifies the presence of transnational constituencies, shared interstate rivalries, and moderate relative strength of militant groups as highly influential on the development of a proxy relationship. This study examines the presence of these variables within the context of the Lebanese Civil War. The results of this demonstrate that each state places greater importance on some variables and ignores others when choosing a proxy. Additionally, this study further demonstrates the presence of new variables that are key to the development of proxy relationships.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号