首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   258篇
  免费   11篇
  国内免费   9篇
  2021年   2篇
  2020年   16篇
  2019年   25篇
  2018年   24篇
  2017年   28篇
  2016年   21篇
  2015年   4篇
  2014年   27篇
  2013年   73篇
  2012年   6篇
  2011年   5篇
  2010年   4篇
  2009年   5篇
  2008年   4篇
  2007年   4篇
  2006年   2篇
  2005年   10篇
  2004年   4篇
  2003年   3篇
  2002年   2篇
  2001年   3篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1995年   1篇
  1994年   1篇
  1990年   1篇
排序方式: 共有278条查询结果,搜索用时 31 毫秒
31.
吴起是战国时期伟大的军事家,他在继承前人兵学理论、总结当时战争经验的基础上,系统地论述了其战争观念,并形成了许多新的见解。其战争观丰富了中国古代的兵学理论,在中国兵学发展史上具有重大的意义。  相似文献   
32.
战例研究是进行军事问题研究的重要基础,也是汲取战争经验、深化军事斗争准备的现实需要。开展战例研究的前提是建立起知识体系完备、检索运用便捷的战例库。随着智能技术的发展,战例数据的标准化描述、规范化存储、智能化分析成为可能,极大地支撑了便捷、高效的数字化战例库系统开发工作。本文首先从战例研究的重要性入手,分析了当前战例运用和研究的基本现状,梳理了存在的典型问题;其次,从数字化技术对战例描述和战例库建设的影响角度剖析了数字化战例库构建的基本需求;最后,通过对智能技术的把握,分析了智能技术对数字化战例库构建的支撑作用,并对如何开展基于智能技术的数字化战例库建设提出了初步设想。  相似文献   
33.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article.  相似文献   
34.
Ron Rosenbaum, How the End Begins: The Road to a Nuclear World War III. Simon & Schuster, 2011. 305 pages, $28.  相似文献   
35.
No war,no peace     
The armed conflict over crude petroleum oil in the Niger Delta has raged for several decades. A host of peace initiatives have been adopted by the Nigerian state to address it, but with minimal impact. The amnesty offer to repentant militias in 2009 by President Umaru Yar'Adua's administration is one of the most recent and broadest peace initiatives by the Nigerian government intended to end the general tendency to warfare and the absence of peace in the Niger Delta. This article, based on secondary sources of data, examines the components of the amnesty, its critical problems and their implications for peacebuilding in the Niger Delta. It finds that though the programme has engendered relative peace, the issues and grievances that occasioned the general tendency to warfare and absence of peace in the region – such as inequitable distribution of oil revenue, environmental degradation, and underdevelopment – are not properly articulated in the disarmament, demobilisation, and reintegration components of the programme. Thus, it holds that the prevailing situation in the region largely approximates a swinging pendulum of no war, no peace.  相似文献   
36.
This article presents a proposed theory of how war economies are formed and maintained, as well as an integrated policy framework to guide the dismantling of war economies emanating from the proposed theory. Additionally, six potential areas for future research pertaining to the dismantling of war economies are also presented.  相似文献   
37.
Paul Collier has produced a well-written and apparently plausible thesis on ‘greed and grievance’, evidenced in several published texts, which concludes unambiguously that greed, not grievance, is overwhelmingly the cause of conflict. However, Collier has based these findings upon narrowly defined quantitative measures–three defined indices of greed and four indices of grievance. Collier consciously omitted indices which he found difficult to measure, such as suppliers of armaments and opportunities for bureaucratic corruption. However, he appears to have unwittingly omitted some further factors, including governance, management mechanisms for natural resources and the influence that charismatic leadership can have on rebel groups. These omissions can be viewed as a major flaw in Collier's work. They also explain why Collier has diagnosed that civil wars are more likely to occur in some countries in the developing world without offering adequate explanation of why this may be so.  相似文献   
38.
分析了战时装备调配保障决策的特点,运用模糊聚类分析法对装备调配保障对象进行了分组和优先级排序,以此为基础,运用目标规划法构建了战时装备调配保障决策模型,最后,通过实例验证了模型的可行性和有效性.  相似文献   
39.
针对海战反潜作战实际,结合战略战役兵棋特点,设计了被动声纳探测仿真流程框架。为模拟探测时间的随机性,提出了被动声纳探测时间模型,并确立了探测时间与探测噪声的关系方程。从舰艇声源特性和战场环境对噪声传播的影响两方面考虑,建立了舰艇声源方程和噪声传播模型。最后,在某模拟系统上进行了验证,结果表明模型符合战略战役模拟实际。  相似文献   
40.
Many well-established explanations for war suggest that cyber weapons have a greater chance of being used offensively than other kinds of military technologies. This response article introduces a research agenda for the study of cyber war, and offers an example – principal-agent problems in cyber operations – to demonstrate how rigorous theoretical and empirical work may proceed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号