首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1240篇
  免费   113篇
  国内免费   42篇
  2023年   1篇
  2022年   6篇
  2021年   36篇
  2020年   46篇
  2019年   42篇
  2018年   37篇
  2017年   76篇
  2016年   55篇
  2015年   23篇
  2014年   134篇
  2013年   129篇
  2012年   71篇
  2011年   82篇
  2010年   88篇
  2009年   71篇
  2008年   75篇
  2007年   71篇
  2006年   61篇
  2005年   65篇
  2004年   49篇
  2003年   41篇
  2002年   30篇
  2001年   32篇
  2000年   16篇
  1999年   13篇
  1998年   6篇
  1997年   5篇
  1996年   4篇
  1995年   6篇
  1994年   4篇
  1993年   3篇
  1992年   7篇
  1991年   2篇
  1990年   6篇
  1989年   2篇
排序方式: 共有1395条查询结果,搜索用时 31 毫秒
991.
After the fall of the Taliban regime in 2001, several thousand Afghan Taliban forces fled across the border to Pakistan, and the area became a safe haven for Afghan insurgents. In 2014, the transnational dimension of the insurgency is still highly prominent. Although regional support for insurgents is not uncommon, how to counter this aspect is mostly ignored in counterinsurgency (COIN) theory and doctrines. In this article, a regional counterinsurgency framework is developed, using the regional counterinsurgency efforts in Afghanistan as an example. The framework will facilitate the systematic inclusion of regional COIN measures in theory and doctrine.  相似文献   
992.
We introduce a generalized orienteering problem (OP) where, as usual, a vehicle is routed from a prescribed start node, through a directed network, to a prescribed destination node, collecting rewards at each node visited, to maximize the total reward along the path. In our generalization, transit on arcs in the network and reward collection at nodes both consume a variable amount of the same limited resource. We exploit this resource trade‐off through a specialized branch‐and‐bound algorithm that relies on partial path relaxation problems that often yield tight bounds and lead to substantial pruning in the enumeration tree. We present the smuggler search problem (SSP) as an important real‐world application of our generalized OP. Numerical results show that our algorithm applied to the SSP outperforms standard mixed‐integer nonlinear programming solvers for moderate to large problem instances. We demonstrate model enhancements that allow practitioners to represent realistic search planning scenarios by accounting for multiple heterogeneous searchers and complex smuggler motion. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
993.
Israel and Hezbollah have applied the lessons learned from the 2006 Lebanon War and have been preparing for a future conflict with both sides aiming for a more decisive victory. With improved capabilities from 2006, future hostilities will be far more destructive. This article analyzes their performance in 2006 and the lessons they have drawn to predict what a future conflict is likely to look like. The article analyzes both parties in three categories: ground forces; rockets, missiles, and anti-armor weapons; and lastly, Israel's air and sea dominance and Hezbollah's efforts to counter that dominance. Finally, this article argues that, contrary to conventional wisdom, a large-scale conflict between Israel and Hezbollah is unlikely to become a larger regional conflict involving Syria and Iran.  相似文献   
994.
Since 2000, international organisations such as the UN, NATO and the EU, but also countries, have started to apply what has been called the comprehensive approach to crisis management. This article unpacks this comprehensive approach implemented by the Dutch in Uruzgan province, Afghanistan. It first borrows and expands a conceptual framework developed by De Coning and Friis. Subsequently, it maps the different sorts of coherence in the mission by applying the framework. It shows how in practice there was not one single comprehensive approach, but many different forms of interaction between a number of organisational units. Each interaction had its own distinct issues and its own level of coherence. The level of coherence differed depending on the level at which the interaction took place – strategic at headquarters level versus operational at field level – and at what point in the mission it happened – in most cases it moved towards more cohesion.  相似文献   
995.
ABSTRACT

This paper challenges recent claims that competitive market dynamics incentivize Private Military and Security Companies (PMSCs) to fully commit to providing effective services, thereby reducing the duration of civil war. Our assessment of a most-likely case scenario for this argument – Sierra Leone – reveals four critical problems. First, there is rarely direct competition, even if numerous companies are present. Second, the presence of multiple PMSCs usually represents a collaboration among subsidiaries providing distinct services, often under the same corporate umbrella. Third, data aggregation obfuscates the overlap of PMSC presence, inflating the amount of perceived competition. Finally, we raise concerns regarding how quantitative analyses can conflate conflict intensity with conflict termination.  相似文献   
996.
As US counterinsurgency campaigns draw to a close, doctrine for asymmetric warfare written during the War on Terror has come under heavy criticism. While many have argued that this shift to ‘winning hearts and minds’ is evidence that the United States is taking humanitarianism and nation-building seriously, others argue that a wide gap exists between US counterinsurgency doctrine and the protection of civilians afflicted by conflict. In this article, I show that the latter is true by comparing theories of instrumental and communicative action to US doctrine for operational design, stability operations, and counterinsurgency. I argue that these texts treat the people as an object to be manipulated for the achievement of pre-determined self-interested strategic goals rather than members of a community that jointly designs operations to fulfill shared objectives. However, US doctrine does contain communicative elements that, if prioritized, would better support humanitarian and state-building objectives otherwise subordinated in the War on Terror.  相似文献   
997.
针对军事信息系统的作战任务推演需求,提出了一种基于时空事件序列的、较为完备的高效任务推演方法。论述了基于层次化分解的任务表达机制与实体化策略;针对保障数据定制问题提出了面向任务的时空数据应用模型,以任务最小需求为准则对一体化时空数据集进行多维筛选,有效降低数据的冗余度;详细讨论了时空事件序列模型的定义及其在军事任务推演中的数据驱动模式;结合具体仿真实例进行了应用探讨。原型系统的实现证明了该思路的有效性和可行性。  相似文献   
998.
复杂电磁环境对海上作战和频谱管控提出了更高的要求,准确感知战场电磁态势是指挥控制、频谱管控的重要基础,但目前尚没有系统生成海战场电磁态势的方法.在分析传统态势感知模型的基础上,定义了战场电磁态势的相关概念,提出了海战场电磁态势感知的基本模型,深入分析了电磁环境感知、电磁环境构建、电磁态势理解、电磁态势展现等模型中的重要环节,并提出了初步技术解决途径,为进一步分析和评估海战场电磁态势提供了基础.  相似文献   
999.
In this paper, Markovian models of three‐on‐one stochastic firefights between ground‐based weapon systems are developed. These models address a common scenario of interest to the military, but one which has been much neglected in analytic combat models, that of combat between a hidden defender and an exposed attacking force. Each combatant must detect an opponent before commencing their firing cycle, a task which is considerably more difficult for the attacker. In the models developed here, the defender detects the exposed attacking group after an exponentially distributed time interval, while each attacker has a fixed probability of detecting the defender via the flash signature produced after each shot fired by him. The utility of the approach is demonstrated by investigating what impact the introduction of a coordinated gun‐laying system for the attacking force might have, a system made possible by battlefield digitization. The method used here allows models to be developed incrementally. This and other advantages of the Markovian approach are discussed. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 627–646, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10041  相似文献   
1000.
从特色、学术地位、作用和意义等方面探讨了我院军事装备学学科的4大研究方向:装备作战仿真、装备发展研究、装备管理研究和装备保障研究,并分析了它们之间的关系。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号