全文获取类型
收费全文 | 301篇 |
免费 | 22篇 |
国内免费 | 33篇 |
出版年
2023年 | 1篇 |
2021年 | 8篇 |
2020年 | 11篇 |
2019年 | 23篇 |
2018年 | 13篇 |
2017年 | 18篇 |
2016年 | 18篇 |
2015年 | 4篇 |
2014年 | 32篇 |
2013年 | 43篇 |
2012年 | 10篇 |
2011年 | 17篇 |
2010年 | 14篇 |
2009年 | 17篇 |
2008年 | 20篇 |
2007年 | 21篇 |
2006年 | 16篇 |
2005年 | 23篇 |
2004年 | 17篇 |
2003年 | 12篇 |
2002年 | 1篇 |
2001年 | 6篇 |
2000年 | 2篇 |
1999年 | 3篇 |
1998年 | 2篇 |
1995年 | 1篇 |
1994年 | 1篇 |
1992年 | 1篇 |
1991年 | 1篇 |
排序方式: 共有356条查询结果,搜索用时 15 毫秒
271.
为了尽快分析出未知水雷障碍参数,根据水雷战的特点,提出了建立未知水雷障碍参数分析专家系统的观点,对专家系统的设计方法进行了一定的探讨,并针对专家系统建立中的"瓶颈"问题,提出了基于Vague集插值近似推理的专家系统知识自动获取方法,在介绍推理过程的基础上给出了算例.从推理的结果来看,该方法具有较高的可信度,从而为专家系统的研制提供了一定的方法支持. 相似文献
272.
Andrea Beccaro 《Small Wars & Insurgencies》2018,29(2):207-228
ISIS (the Islamic State of Iraq and Syria) has become a key political and military actor in the Middle East and in North Africa. This essay aims at outlining ISIS warfare through an analysis of its operations in the frame of hybrid warfare theory proposed by Frank Hoffman. Therefore, the paper deals with: the role of terrorist tactics in ISIS warfare and the relationship between terrorism and insurgency; ISIS use of technology, mainly with regard to suicide attacks and to drones; and the relevance of urban warfare. Finally, the paper highlights how ISIS operates and the most threatening features of its warfare. 相似文献
273.
徐娜 《中国人民武装警察部队学院学报》2010,26(3):90-92
反恐作战心理训练是现代反恐怖作战行动中需要特别研究和解决的问题。阐述公安边防部队实施反恐作战心理训练的意义,分析公安边防部队反恐作战心理训练的基本方式方法,说明实施反恐心理训练必须注意把握的几个关键性问题。 相似文献
274.
《防务技术》2020,16(1):232-241
Operation architecture plays a more important role in Network Centric Warfare (NCW), which involves dynamic operation networks with complex properties. Thus, it is essential to investigate the operation architecture under the informatization condition within NCW and find a proper network construction method to efficiently coordinate various functional modules on a particular situation, i.e., the aerial combat. A new method integrating the physical level and functional level of NCW is proposed to establish the operation architecture, where the concept of network operation constraints unit and net constructing mechanisms are employed to avoid conflicts among different platforms. Meanwhile, we conduct simulations to assess the effectiveness and feasibility of the constructed operation architecture and analyze the influence of the network parameters. 相似文献
275.
关于信息化作战装备保障的思考 总被引:1,自引:0,他引:1
提出并分析了信息化作战装备保障的概念、标志及主要特征。其中主要特征为:能力要求是基于信息系统的一体化综合保障能力;力量体系是基于保障单元的多功能集成体系;保障方式是基于智能化保障手段的精确保障;保障方法是基于信息化作战行动的多样化保障。指出信息化作战保障的实现,需要智能化的保障手段提供技术基础,知识化的保障队伍提供智力基础,配套完善的机制提供制度基础,一体化保障环境提供外部条件;提出了建设信息化作战装备保障的方法途径。 相似文献
276.
Paul B. Rich 《Defense & Security Analysis》2019,35(4):430-446
ABSTRACTThis article reviews the book by Ofer Fridman and seeks to situate the strategic debate on hybrid war in the context of debate on the US involvement in Iraq. It points to intellectuals from the Marine Corps having a significant role in the initial development of the hybrid warfare concept at a time of some reservation in US military circles over COIN strategy as this was set out in the field manual FM3-24. Thereafter, the hybrid war concept rapidly spread and became a conceptual device used to explain Russian strategic intentions in the aftermath of the invasion of Ukraine in 2014. 相似文献
277.
278.
Charles Esdaile 《Small Wars & Insurgencies》2019,30(4-5):734-749
ABSTRACT The brief war that took place between Spain and Portugal in 1762 is one of the least known episodes in the latter’s military history, whereas, thanks to Wellington’s construction of the Lines of Torres Vedras, the French invasion of 1810–11 is right at the other end of the spectrum. Yet the two episodes are closely linked to one another. At the very least, they are uncannily reminiscent in terms of their details – in both cases substantial foreign armies were vanquished through a combination of irregular resistance, scorched-earth tactics and the clever use of field fortifications – and the article therefore argues that Wellington based the plan that defeated the forces of Marshal Massena on the strategy used by the Portuguese half a century earlier. 相似文献
279.
Yingcong Dai 《Small Wars & Insurgencies》2019,30(4-5):750-774
ABSTRACT At the turn of the nineteenth century, China’s Qing dynasty (1644–1912) was hit by a sectarian rebellion. Commonly considered a breakpoint marking the end of the dynasty’s golden age spanning most of the eighteenth century, the war to suppress the rebels, referred to as the White Lotus War (1796–1804) in this article (‘White Lotus’ was the umbrella name used by both the authorities and some sectarians for their teaching), exposed many structural drawbacks of the Qing political and military systems and depleted the dynasty’s financial resources, which had never been recovered. Reluctant in embracing guerrilla warfare in the beginning, the insurgents quickly turned themselves into master guerrillas. Shuttling in two massive mountain ranges in central China, they managed to prolong their rebellion and fought some successful battles against their suppressors. Superior in manpower, weaponry, and logistical support, the government forces had to adapt to guerrilla warfare, albeit passively and ineptly. This article gives a brief introduction to this little-known episode of guerrilla war at the turn of the nineteenth century in Qing China, expounds the strengths and weaknesses of both sides, and sheds light on the roots of the war’s long duration and the grim consequences to the Qing state. 相似文献
280.
Brendan Sozer 《Small Wars & Insurgencies》2016,27(4):636-658
Proxy warfare is a consistent element in international warfare. However, it is unclear why proxy relationships form in cases where states have multiple options of groups to support. Existing research identifies the presence of transnational constituencies, shared interstate rivalries, and moderate relative strength of militant groups as highly influential on the development of a proxy relationship. This study examines the presence of these variables within the context of the Lebanese Civil War. The results of this demonstrate that each state places greater importance on some variables and ignores others when choosing a proxy. Additionally, this study further demonstrates the presence of new variables that are key to the development of proxy relationships. 相似文献