全文获取类型
收费全文 | 775篇 |
免费 | 52篇 |
国内免费 | 41篇 |
出版年
2022年 | 1篇 |
2021年 | 29篇 |
2020年 | 34篇 |
2019年 | 41篇 |
2018年 | 32篇 |
2017年 | 56篇 |
2016年 | 43篇 |
2015年 | 12篇 |
2014年 | 98篇 |
2013年 | 107篇 |
2012年 | 38篇 |
2011年 | 45篇 |
2010年 | 54篇 |
2009年 | 37篇 |
2008年 | 32篇 |
2007年 | 34篇 |
2006年 | 36篇 |
2005年 | 30篇 |
2004年 | 31篇 |
2003年 | 15篇 |
2002年 | 13篇 |
2001年 | 15篇 |
2000年 | 7篇 |
1999年 | 6篇 |
1998年 | 3篇 |
1997年 | 4篇 |
1996年 | 3篇 |
1995年 | 2篇 |
1994年 | 2篇 |
1993年 | 1篇 |
1992年 | 5篇 |
1991年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有868条查询结果,搜索用时 15 毫秒
11.
论述了基础性研究在军队工程院校科研工作中的地位和作用 ,强调了进行这一工作的必要性和紧迫性 ,探讨了加强基础性研究的对策 . 相似文献
12.
13.
军事法律关系研究 总被引:1,自引:1,他引:0
李佑标 《中国人民武装警察部队学院学报》2003,19(4):33-37
军事法律关系是军事法律体系逻辑起点的基本范畴 ,是主体、客体和内容的统一。本文就军事法律关系的概念、主体和客体作一回溯性的研究和评析 ,并以此来构筑我国军事法学的理论体系。 相似文献
14.
徐丹彤 《中国人民武装警察部队学院学报》2003,19(6):37-40
军事行政法从严原则应当成为军事行政法的一项基本原则。其基本涵义是军事行政法的制定具有严密性 ,军事行政法的实施具有严格性 ,军事行政法律制裁具有严厉性。该原则是军队质量建设的规律之一 ,是维护国防利益和军事利益的内在要求。军事行政法中的很多具体规定均体现了该原则 相似文献
15.
分析了基数滚动切块和层次分析-目标规划(AnalyticHierarchyProcessandGoalProgramming)投资分配模型的利弊,探讨了工程建设投资效能的估计方法,研究建立了基于效能分析的投资分配优化模型.该模型经实际算例分析证明,模型的思路清晰,便于理解和操作,具有较好的实用性. 相似文献
16.
George Joffé 《Small Wars & Insurgencies》2016,27(1):1-21
Although the Islamic State in Iraq and al-Sham (ISIS) is seen as a novel manifestation of Islamic extremism, it is in fact the latest, albeit perhaps the most effective, of a long line of revivalist movements in the Islamic and the Arab worlds. Its motivations – hisba and jihad – differ little from its predecessors and its ambitions – to create a state organised in accordance with the precepts of the Islamic caliphate – reflect a long-standing Islamic ambition. It differs, of course, in terms of the sophistication of its political and military strategies, which mirror the contemporary complexities of the world in which it operates, but its objectives recall long-standing Islamic ideals, even if articulated in radically brutal and extremist ways. More importantly, perhaps, ISIS or Da’ish, to give it its Arabic sobriquet, reflects the enormous degree of resentment inside the Middle East at the ways in which Western powers have intervened in regional affairs over recent years, particularly their support for regimes and economic systems there that have betrayed, in the popular imaginary, the essential principles of social justice that lie at the root of Islamic vision of ideal social order. Indeed, in many respects, its analysis of the world in which it operates and of the objectives it seeks differ little in essence from those any other resistance and rejectionist movement, whether religious or sectarian. More specifically, it has been the sectarian conflict that resulted from the reversal of political order in Iraq as a result of the 2003 American-led invasion that has driven the success of the movement in capturing widespread Sunni support. Whether it can manage the complexities of the administration of a state remains open to question. 相似文献
17.
Brendan Sozer 《Small Wars & Insurgencies》2016,27(4):636-658
Proxy warfare is a consistent element in international warfare. However, it is unclear why proxy relationships form in cases where states have multiple options of groups to support. Existing research identifies the presence of transnational constituencies, shared interstate rivalries, and moderate relative strength of militant groups as highly influential on the development of a proxy relationship. This study examines the presence of these variables within the context of the Lebanese Civil War. The results of this demonstrate that each state places greater importance on some variables and ignores others when choosing a proxy. Additionally, this study further demonstrates the presence of new variables that are key to the development of proxy relationships. 相似文献
18.
随着信息技术在战争中的大量应用,现代战争越来越呈现出网络化和体系对抗性,研究其拓扑特性已十分必要。基于复杂网络理论,首先建立了岸防作战体系网络模型,然后提出一种基于贪心思想的骨干网挖掘算法,最后对模型的骨干网络进行了研究。结果表明该方法能够快速、准确地挖掘出岸防作战体系的网络骨干,并能为军事对抗体系的复杂网络应用研究提供借鉴和参考。 相似文献
19.
20.
Militaries rely on secure communications. Despite the permeation of cyber-systems throughout the operational environment, there is little readily available doctrine on cyber-warfare. Doctrine that does exist has not been coherently integrated. This paper introduces a Cyber Conceptual Framework, consisting of five questions pertinent to the future use of cyberspace. The authors enunciate a definition of cyberspace, expand on existing military doctrine to reject the conceptualisation of cyberspace as a domain, define cyber-conflict, define cyber-attack and describe the four components and five levels of a cyber-attack. This work develops a common framework from available doctrine and a lexicon for future discussion. 相似文献