首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   651篇
  免费   96篇
  国内免费   43篇
  2024年   2篇
  2023年   4篇
  2022年   6篇
  2021年   12篇
  2020年   12篇
  2019年   16篇
  2018年   16篇
  2017年   46篇
  2016年   55篇
  2015年   22篇
  2014年   56篇
  2013年   138篇
  2012年   38篇
  2011年   42篇
  2010年   31篇
  2009年   36篇
  2008年   34篇
  2007年   29篇
  2006年   21篇
  2005年   26篇
  2004年   18篇
  2003年   18篇
  2002年   20篇
  2001年   20篇
  2000年   13篇
  1999年   11篇
  1998年   5篇
  1997年   7篇
  1996年   5篇
  1995年   9篇
  1994年   4篇
  1993年   6篇
  1992年   4篇
  1991年   1篇
  1990年   6篇
  1988年   1篇
排序方式: 共有790条查询结果,搜索用时 31 毫秒
221.
王瑛  付静  郑军  邹芳 《国防科技》2018,39(4):063-068
从历史战例归纳通信干扰作战样式,从技术角度分析卫星通信潜在干扰威胁,立足当前卫星通信抗干扰能力,针对通信干扰作战样式设计卫星通信抗干扰综合运用模式,并提出后续研究工作。  相似文献   
222.
侯娜  余明明 《国防科技》2018,39(3):064-070
随着科技的发展和进步,世界各国越来越认识到空间天气的重要性,并对空间天气效应展开深入的理论和实践探索。我国也加快空间天气领域的研究进程,并取得了一定成就。本文系统介绍了空间天气的定义与发展历程,运用总体国家安全观的方法,从国土安全、军事安全、经济安全与核安全等角度分析了灾害性空间天气对国家安全的影响。在对国内外空间天气研究现状和发展趋势分析的基础上,针对灾害性空间天气的国家安全影响提出了政策性建议。  相似文献   
223.
This article argues that logistics constrains strategic opportunity while itself being heavily circumscribed by strategic and operational planning. With the academic literature all but ignoring the centrality of logistics to strategy and war, this article argues for a reappraisal of the critical role of military logistics, and posits that the study and conduct of war and strategy are incomplete at best or false at worst when they ignore this crucial component of the art of war. The article conceptualises the logistics–strategy nexus in a novel way, explores its contemporary manifestation in an age of uncertainty, and applies it to a detailed case study of UK operations in Iraq and Afghanistan since 2001.  相似文献   
224.
军事通信卫星及其下行链路性能研究   总被引:2,自引:2,他引:0  
随着航天技术、数字通信技术、信息安全技术等的发展,一些军事大国恣意进行空间“武器化”,掌握“制天权”,对他国的安全构成严重的威胁。介绍了军事通信卫星及其优缺点,以及在现代战争中的应用,并对军事通信卫星的下行链路进行有效干扰的一些性能数据进行了分析和计算机仿真。  相似文献   
225.
分布式火控系统实时通信的设计实现   总被引:2,自引:0,他引:2  
实时可靠的通信系统是实现分布式火控的关键。介绍了在一个小型实时通信系统的设计中,为保证通信的实时性采取了节拍控制、数据分级、重发限制等方法,为提高通信可靠性采用了断路重组技术、差错控制和冗余技术,软件采用了面向对象分层次模块化设计的方法,提高了可维性和可扩展性。通过这些措施,实现了5km距离内数据和语音的多点实时传输,误码率小于10-6,通信时延小于150ms,满足了分布式火控系统的要求。  相似文献   
226.
为了科学合理选择装备价格第三方服务机构,研究以灰度关联分析和神经网络方法构建评价模型。研究数据采用问卷调研形式获取,针对样本数据采用灰度关联法分析评价指标与综合评分之间的关联性,发现服务态度和制度建设情况两个评价指标与综合评分关联度达0.74以上,较为重要。采用有效二级指标和综合评分作为输入和输出数据,构建基于神经网络的装备价格第三方服务机构评价模型。通过实际数据验证分析,发现神经网络模型预测精准的概率为75%,预测满足要求的概率为25%,满足实际应用需求,能够为主管部门遴选机构建言献策。  相似文献   
227.
Abstract

Smart power is comprised of two elements: the quest for building society among states and between states and non-state actors; as well as the desire for cleaner forms of power projection. This special issue explores how states continue to fumble over achieving the optimum mix of hard and soft power across several country cases and themed articles. This set of contributions suggests that smart power is not unlike a ‘Swiss Army Knife’ analogy: multifunctional and challenging to choose the right combination of ideational and material tools.  相似文献   
228.
It has been argued that the discovery of a new natural resource greatly increases the risk of conflict. This research aims to study the effect of natural resources on military spending, using the data from rentier states in the Middle East and North Africa (MENA) countries from 1987 to 2012. In considering the ‘resource curse,’ the types of natural resources matter. Our empirical results demonstrate that the ‘resource curse’ arising from the abundance of certain natural resources, particularly oil and forest resources, leads to increases in military spending. In contrast, the rent from coal and natural gas has a negative impact on military spending, while the rent from minerals has no impact on military spending, controlling for GDP growth and per capita income.  相似文献   
229.
This paper examines the ways in which the military infringes on the social and political rights of soldiers who joined the Zimbabwe National Army in post-independence Zimbabwe. Contrary to the scholarly and policy debates that present Zimbabwean soldiers as the silent prop behind President Robert Mugabe and the perpetrators of political violence, this paper argues that these soldiers have also been victimised in army barracks. The victimhood of soldiers has been explicit in the ways in which they are forced to execute their duties beyond their professional expectations. In substantiating this argument, the paper explores the unethical military training and the ways in which soldiers are disciplined and punished through Chapter 11:02 of the draconian Defence Act. The paper’s contribution stems from a ‘rights’ perspective that emphasises the right to freedom, justice and protection, which is usually quite silent in the military. But the question is how can soldiers’ concerns be translated into new practices without compromising so-called ‘state security’?  相似文献   
230.
This article proposes an approximation for the blocking probability in a many‐server loss model with a non‐Poisson time‐varying arrival process and flexible staffing (number of servers) and shows that it can be used to set staffing levels to stabilize the time‐varying blocking probability at a target level. Because the blocking probabilities necessarily change dramatically after each staffing change, we randomize the time of each staffing change about the planned time. We apply simulation to show that (i) the blocking probabilities cannot be stabilized without some form of randomization, (ii) the new staffing algorithm with randomiation can stabilize blocking probabilities at target levels and (iii) the required staffing can be quite different when the Poisson assumption is dropped. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 177–202, 2017  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号