首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   229篇
  免费   16篇
  国内免费   46篇
  2023年   1篇
  2021年   9篇
  2020年   9篇
  2019年   23篇
  2018年   10篇
  2017年   17篇
  2016年   18篇
  2015年   4篇
  2014年   27篇
  2013年   38篇
  2012年   9篇
  2011年   10篇
  2010年   6篇
  2009年   13篇
  2008年   13篇
  2007年   17篇
  2006年   14篇
  2005年   19篇
  2004年   15篇
  2003年   5篇
  2002年   1篇
  2001年   3篇
  2000年   1篇
  1999年   3篇
  1998年   2篇
  1995年   1篇
  1994年   1篇
  1992年   1篇
  1991年   1篇
排序方式: 共有291条查询结果,搜索用时 15 毫秒
21.
次声波是一种频率变化范围在10?4 Hz~20 Hz之间的声波,它具有穿透力强、传输距离远以及不易被吸收的特点,以此制造的次声波武器伤人但不毁物。近年来,随着高新技术的不断发展,次声波武器在心理战领域得到了广泛应用。本文首先对次声波技术及次声波武器的概念进行了简要介绍;其次,研究了次声波的生物学效应,分析了次声波频率、声压强度以及作用时间与生物学效应的关系,发现三种次声波的作用参数与生物学效应之间的关系虽然错综复杂,但也有一定规律可循;最后,提出了次声波武器在心理战的三个潜在应用前景,即利用次声波穿透力强的特点发展对掩体人员作战的心理战装备、利用次声波的生物学效应发展反恐作战的心理战装备以及利用次声波的生理致伤机理发展心理战防护装备。  相似文献   
22.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article.  相似文献   
23.
Although Africa is host to the vast majority (and the most deadly) of conflicts in the world, it would appear that there is a distinct lack of genuine interest in African affairs shown by the UN Security Council and its key members. This paper proposes a 10-level scale of response system to measure the seriousness of the Council in dealing with conflicts. By comparing the Council response with the size and severity of each individual conflict, the scale attempts to assess the Council performance in the fulfilment of its duty to restore international peace and security. The results show that Africa has been (and remains) marginalized in the Council work.  相似文献   
24.
This article had its genesis in a background study for the development of a new Australian Army counter-insurgency doctrine. Archival research showed that the Australian counter-insurgency doctrine employed in such post-1945 conflicts as Burma, Malaya, Borneo and Vietnam originated in the jungle campaigns of the South West Pacific Area during World War II. The historical record also showed that the Army's counter-insurgency doctrine, as with its World War II-jungle warfare doctrine, was a pragmatic amalgam of Australian experience and British doctrine. The article traces this process through the development of a series of doctrine manuals. It also considers the contribution of key individuals to both counter-insurgency theory and practice. This distinctively Australian approach to the development of doctrine was responsible for producing a highly successful manual, The Division in Battle: Pamphlet No. 11, Counter-Revolutionary Warfare (DIB 11), which the Army used during its involvement in Vietnam.  相似文献   
25.
This study develops the concepts of fourth generation operations and the associated principles. First, the concept of fourth generation operations is introduced and defined. Fourth generation operations are the evolution and extension of third and fourth generation warfare based on a change of tactics, technology, and combatants. These operations are currently ongoing in Afghanistan and Iraq, and with the global war on terrorism. Based on the framework of US joint doctrine, the supporting principles of fourth generation operations are developed. This requires the introduction of the principle of Population Perception.  相似文献   
26.
ABSTRACT

This article discusses the Rhodesian Front regime propaganda warfare strategy during Zimbabwe’s war of liberation. It uses the case of the Chilonga area of Chiredzi located in the south-east of Zimbabwe to demonstrate that propaganda warfare was introduced as a measure to counter guerrilla infiltration and civilian cooperation with them. Drawing on ideas of military anthropology vis-à-vis the importance of cultural awareness in counterinsurgency, the paper argues that the efforts of the Rhodesian Front regime to use propaganda were fruitless. This is because they mostly ignored the culture of the Shangani, local people. Despite that, there were other reasons for the failure of the Rhodesian Front’s propaganda strategy, including the lack of conformity between politics and military action.  相似文献   
27.
This article explains the demise of Sierra Leone's Revolutionary United Front (RUF) rebellion. It argues that the main cause of this fate was the group's relationship with its primary sponsor, Charles Taylor. The RUF's dependency on Taylor's patronage, coupled with the rebellion's weak organisational endowments harmed the group's prospects of success. Based on original research, the article shows how Taylor used the RUF as a strategic instrument for his own regional interests, which led to the group's unravelling. More broadly, the article speaks about proxy warfare in Africa and how the relationship between resource flows and rebellion are not always beneficial to rebels as one might expect.  相似文献   
28.
Abstract

The 1919-1921 Anglo-Irish War represents one of the earliest instances of a successful insurgent movement in the twentieth century. By combining a fluid organizational structure with effective hit-and-run tactics and accurate intelligence, the Irish Republican Army was able to defeat militarily the security forces of Great Britain. Combined with a successful propaganda campaign, these tactics allowed the IRA to drive the British to the negotiating table, where its representatives secured greater autonomy than Ireland had known in centuries. The outcome of the Anglo-Irish War demonstrates the success which a well-organized guerrilla campaign can achieve, and the tactics used by the IRA must therefore be understood by any serious student of small warfare.  相似文献   
29.
ABSTRACT

This paper evaluates Boko Haram’s military capabilities and details the process of how its standing army, driven by these capabilities, came to pose a phased threat between 2013 and 2015 in particular. This was a period when military fighting dominated the insurgency in north-east Nigeria. Whereas there is an abundance of literature on Boko Haram’s histories and the impact of its insurgency on north-east Nigeria, analysis of Boko Haram’s military campaigning is still deficient. Attempting to fill this gap, this paper uses field findings and battlefield case studies from north-east Nigeria to highlight how Boko Haram’s overt front – its standing army – came to supplant its guerrilla operations as the main security threat to the frontier area.

This pivot towards military fighting, for a group initially composed of a few ragtag combatants, on the surface might seem surprising. Yet, whereas Boko Haram may lack the popular support required for ‘people’s war’, classic insurgency theories nevertheless hold some explanatory power for this deliberate shift: away from guerrilla warfare as the expedient of the weaker side, and towards the use of a large standing army of locals to swarm, and sometimes successfully overrun, state forces.  相似文献   
30.
A combination of threat analysis and “subterranean forces” (such as proclivities to fight conventional wars as compared to asymmetric ones) leads the USA to prefer focusing on the threats from China rather than those emanating from the Middle East.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号