全文获取类型
收费全文 | 1121篇 |
免费 | 303篇 |
国内免费 | 116篇 |
出版年
2024年 | 5篇 |
2023年 | 16篇 |
2022年 | 22篇 |
2021年 | 23篇 |
2020年 | 32篇 |
2019年 | 22篇 |
2018年 | 15篇 |
2017年 | 70篇 |
2016年 | 84篇 |
2015年 | 47篇 |
2014年 | 80篇 |
2013年 | 75篇 |
2012年 | 94篇 |
2011年 | 100篇 |
2010年 | 58篇 |
2009年 | 109篇 |
2008年 | 83篇 |
2007年 | 68篇 |
2006年 | 81篇 |
2005年 | 72篇 |
2004年 | 84篇 |
2003年 | 44篇 |
2002年 | 50篇 |
2001年 | 34篇 |
2000年 | 24篇 |
1999年 | 24篇 |
1998年 | 24篇 |
1997年 | 21篇 |
1996年 | 15篇 |
1995年 | 17篇 |
1994年 | 7篇 |
1993年 | 9篇 |
1992年 | 10篇 |
1991年 | 8篇 |
1990年 | 6篇 |
1989年 | 4篇 |
1988年 | 2篇 |
1987年 | 1篇 |
排序方式: 共有1540条查询结果,搜索用时 31 毫秒
161.
现代信息化战争是体系与体系的对抗,区域作战联合装备保障成为信息化条件下装备保障的主要方式,实施科学正确的装备保障指挥,进行保障任务分配对于提高保障效益具有非常重要的意义。通过区域作战装备保障任务的特点,依据区域保障要求建立了包括转场时间在内和不同作战方向上作战单元的重要程度不同的装备保障任务分配模型,保证了重要方向上最晚完成保障任务的作战单元保障时间最短和非重要方向上最晚完成保障任务的作战单元保障时间最短。最后,应用遗传算法给出了区域联合作战装备保障任务分配模型的求解方法和步骤,具有一定的科学性和实用性。 相似文献
162.
163.
针对网络攻防环境中防御方以提高系统生存能力为目的所进行的最优生存防御策略的选取问题,提出了一种基于完全信息动态博弈理论的生存防御策略优化配置算法。将恶意攻击方、故障意外事件及防御方作为博弈的参与人,提出了一种混合战略模式下的三方动态博弈模型,对博弈的主要信息要素进行了说明,以混合战略纳什均衡理论为基础,将原纳什均衡条件式的表达式转化为可计算数值结果的表达式,并据此增加了近似的概念,最后,将提出的模型和近似纳什均衡求解算法应用到一个网络实例中,结果证明了模型和算法的可行性和有效性。 相似文献
164.
165.
166.
Extant literature documents a relationship between military deployment and the risk of an international terrorist attack against citizens of the deploying country. It appears that deployment significantly increases the possibility of terrorist actions in the home country. In particular, if country A decides to send troops to nation B, then citizens of the former country are more likely to fall victim of an attack carried out by a terrorist organisation originating from the latter country. Contributing to this line of literature, we further refine this relationship by distinguishing between regions where the troops are sent as well as by introducing differences between types of deployment. Our results indicate that missions to Asia and the Middle East are more dangerous than missions to other regions as reflected by the terrorist threat in the home country. Robustness tests do however show that the significance of the location variable Asia is predominantly attributed to the mission to Afghanistan. As for types of deployment, only ad hoc missions seem to increase the risk of an attack, whereas no significant results are found for other missions such as operations under UN and NATO flag. Leaving out the missions to Iraq and Afghanistan however also increases the danger resulting from missions by fixed coalitions. Our results find however no evidence that ‘wearing a blue helmet’ increases the probability of a terrorist attack at home. 相似文献
167.
Adam D.M. Svendsen 《Defense & Security Analysis》2015,31(1):58-73
This article aims to encourage the fostering of more systems thinking, and its greater exploitation, within the domain of contemporary intelligence. With particular focus on “micro systems thinking” and with reference to key intelligence processes, such as intelligence analysis, the utility of many systems dynamics within the intelligence context seeks to be further revealed. Through their greater collective harnessing, including up to “System of Systems” (“SoS”) dynamics, and promoting all that they can offer, more sophisticated overarching operational-to-strategic/policy “ends,” notably that of “defence-in-depth,” can be viably further advanced in a sustainable manner into the future. Arguably, a much-needed transformative impact on contemporary intelligence can also be increasingly realised through comprehensively engaging in and with more systems and SoS thinking. Aiding civil protection tasks, crisis management, emergency planners, and civil contingency practitioners likewise gain. 相似文献
168.
169.
170.