首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   442篇
  免费   9篇
  2021年   11篇
  2019年   11篇
  2017年   11篇
  2016年   8篇
  2015年   11篇
  2014年   9篇
  2013年   94篇
  2010年   3篇
  2008年   5篇
  2007年   5篇
  2006年   4篇
  2005年   5篇
  2004年   3篇
  2003年   3篇
  2002年   6篇
  2001年   7篇
  2000年   4篇
  1999年   5篇
  1998年   8篇
  1997年   9篇
  1996年   6篇
  1995年   7篇
  1994年   9篇
  1993年   8篇
  1992年   7篇
  1991年   10篇
  1990年   3篇
  1989年   10篇
  1988年   17篇
  1987年   8篇
  1986年   15篇
  1985年   9篇
  1984年   6篇
  1983年   5篇
  1982年   5篇
  1981年   9篇
  1980年   5篇
  1979年   11篇
  1978年   7篇
  1977年   7篇
  1975年   9篇
  1974年   7篇
  1973年   5篇
  1972年   7篇
  1971年   5篇
  1970年   5篇
  1969年   6篇
  1968年   3篇
  1967年   3篇
  1966年   3篇
排序方式: 共有451条查询结果,搜索用时 15 毫秒
151.
The 1940 Norway campaign was the first truly modern joint operation in which ground, sea and air forces all played major roles. With three services involved over a huge theater of war, the normal friction in obtaining and disseminating intelligence and information that one finds in a joint operation was multiplied. As the two sides were fairly evenly matched, effective use of intelligence and information provided a decisive advantage. This paper analyzes the use of information and intelligence of both sides at the strategic, operational and tactical levels. Both sides performed poorly at the strategic level but the Germans proved far superior to the British at the operational and tactical levels. The paper challenges several common assumptions on the importance of intelligence and information in joint campaigns.  相似文献   
152.
153.
This article argues that deterrence theory can be applied to counterterrorism. Doing so requires broadening the traditional concept of deterrence by punishment, expanding deterrence by denial to include defense, mitigation, and strategic hindrance, and developing deterrence by delegitimization to influence the political, ideological, and religious rationales informing terrorist behavior. In practice, deterring terrorism requires tailoring threats against state and individual facilitators, diffusing the intended consequences of terrorism, and manipulating terrorist self–restraints. When these and other deterrent leverages are applied simultaneously against various actors and processes involved in terrorism, coercion can be achieved.  相似文献   
154.
Book Reviews     
Iain McCallum, Blood Brothers Hiram and Hudson Maxim: Pioneers of Modern Warfare. London: Chatham, 1999. Pp. 224, 33 illus., 2 maps, biblio., index. £20. ISBN 1–86176–096–5.

Eric Ash, Sir Frederick Sykes and the Air Revolution, 1912–1918. London and Portland, OR: Frank Cass, 1999. Pp.xviii + 268, 20 illus., 3 maps, biblio., index. £42.50/$59.50 (cloth), £18.50/$27.50 (paper). ISBN 0–7146–4828–0 and ‐4382–3.

Azar Gat, Fascist and Liberal Visions of War: Fuller, Liddell Hart, Douhet, and other Modernists. Oxford: Clarendon Press, 1998. Ppviii + 334, biblio., index. £45. ISBN 0–19–820715–8.

David B. Woolner (ed.), The Second Quebec Conference Revisited: Waging War, Formulating Peace: Canada, Great Britain, and the United States in 1944–1945. Basingstoke; London: Macmillan Press, 1998. Pp.xiii + 210, index. £32.50. ISBN 0–333–75970–2.

Jeffrey Grey. Up Top: The Royal Australian Navy and Southeast Asian Conflicts 1955–1972. St Leonards NSW: Allen &; Unwin in association with the Australian War Memorial, 1998. Pp.xx + 380, 110 illus., 12 tables, 23 maps &; diagrams, appendices, notes, biblio., index. NP. ISBN 1–86448–290–7.

Susan L Carruthers, The Media at War. Basingstoke: Macmillan, 2000. Pp.321, biblio., index. £14.99 (paper). ISBN 0–333–69143–1, also available in hardback.

Edward J. Marolda and Robert J. Schneller Jr, Shield and Sword: The United States Navy and the Persian Gulf War. Washington DC: Naval Historical Center, 1998. Pp.xxi + 517, 120 illus., 14 maps, biblio., index. NP. ISBN 0–1604–9476–1.

Marvin Pokrant, Desert Shield at Sea: What the Navy Really Did and Desert Storm at Sea: What the Navy Really Did. Both Westport, CT: Greenwood Press, 1999. Pp.xxiii + 265,9 illus., biblio., index. £44.95. ISBN 0–313–31023–8. Pp.xxiv + 329,12 illus., biblio., index. NP. ISBN 0–313–31024–6.

David Kaularich and Ronald C. Kramer, Crimes of the American Nuclear State: At Home and Abroad. Boston: Northeastern University Press, 1999. Pp.xviii + 195, biblio., index. £42.75. ISBN 1–55553–371‐X.

Stanley Hoffmann, World Disorders: Troubled Peace in the Post‐Cold War Era. Lanham, MD: Rowman &; Littlefield, 1998. Pp.viii+279, notes, index. $29.95. ISBN 0–8476–8574–8.

Lawrence Freedman (ed.), Strategic Coercion: Concepts and Cases. Oxford: Oxford‐University Press, 1998. Pp.400, index. £48. ISBN 0–19–829–349–6.

Stephen J. Cimbala, Coercive Military Strategy. College Station, TX: Texas A&;M University Press, 1998. Pp.229, biblio, index; $39.95. ISBN 0–89096–836–5  相似文献   
155.
156.
This article is a portrait of Admiral Sergei Gorshkov, commander of the Soviet Navy for almost three decades, from 1956–85. The author, a retired US Navy admiral with a Harvard PhD in Russian studies who served as both defense and naval attaché in Moscow, draws on numerous face-to-face interactions with Gorshkov. He also explores Gorshkov's memoirs that were published recently in Russia but have not appeared in an English translation. The paper is not only a first-hand account of an important historical figure, but also a window into the world of military-to-military diplomacy and intelligence during the Cold War.  相似文献   
157.
Command and Control (C2) in a military setting can be epitomized in battles‐of‐old when commanders would seek high ground to gain superior spatial‐temporal information; from this vantage point, decisions were made and relayed to units in the field. Although the fundamentals remain, technology has changed the practice of C2; for example, enemy units may be observed remotely, with instruments of varying positional accuracy. A basic problem in C2 is the ability to track an enemy object in the battlespace and to forecast its future position; the (extended) Kalman filter provides a straightforward solution. The problem changes fundamentally if one assumes that the moving object is headed for an (unknown) location, or waypoint. This article is concerned with the new problem of estimation of such a waypoint, for which we use Bayesian statistical prediction. The computational burden is greater than an ad hoc regression‐based estimate, which we also develop, but the Bayesian approach has a big advantage in that it yields both a predictor and a measure of its variability. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004  相似文献   
158.
Tungsten inert gas (TIG) welding is the most commonly used joining process for aluminum alloy for AA6061 and AA7075 which are highly demanded in the aerospace engineering and the automobile sector, but there are some defects occur during TIG welding like micro-crack, coarse grain structure, and porosity. To improve these defects, the TIG welded joint is processed using friction stir processing (FSP). This paper presents the effect of friction stir processing on TIG welding with filler ER4043 and ER 5356 for dissimilar aluminum alloy AA6061 and AA7075. The mechanical characterization, finite element formulation and mathematical equations of heat transfer of TIG + FSP welded joints are investigated using ANSYS Fluent software by adjusting process parameters of FSP. The results show that the maximum compressive residual stress 73 MPa was obtained at the fusion zone (FZ) of the TIG weldment with filler ER4043, whereas minimum compressive residual stress 37 MPa was obtained at stir zone (SZ) of the TIG+FSP with filler 5356. The maximum heat flux 5.33 × 106 W/m2 and temperature 515 ℃ have observed at tool rotation 1600 rpm with a feed rate of 63 mm/min. These results give a satisfactory measure of confidence in the fidelity of the simulation  相似文献   
159.
In this paper, we extend the results of Ferguson M. Naval Research Logistics 8 . on an end‐product manufacturer's choice of when to commit to an order quantity from its parts supplier. During the supplier's lead‐time, information arrives about end‐product demand. This information reduces some of the forecast uncertainty. While the supplier must choose its production quantity of parts based on the original forecast, the manufacturer can wait to place its order from the supplier after observing the information update. We find that a manufacturer is sometimes better off with a contract requiring an early commitment to its order quantity, before the supplier commits resources. On the other hand, the supplier sometimes prefers a delayed commitment. The preferences depend upon the amount of demand uncertainty resolved by the information as well as which member of the supply chain sets the exchange price. We also show conditions where demand information updating is detrimental to both the manufacturer and the supplier. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005  相似文献   
160.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号