首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   759篇
  免费   8篇
  国内免费   8篇
  775篇
  2025年   3篇
  2024年   3篇
  2023年   5篇
  2022年   4篇
  2021年   14篇
  2020年   9篇
  2019年   30篇
  2018年   34篇
  2017年   38篇
  2016年   39篇
  2015年   24篇
  2014年   69篇
  2013年   113篇
  2012年   24篇
  2011年   45篇
  2010年   45篇
  2009年   45篇
  2008年   50篇
  2007年   36篇
  2006年   28篇
  2005年   30篇
  2004年   23篇
  2003年   19篇
  2002年   9篇
  2001年   5篇
  2000年   8篇
  1999年   4篇
  1998年   3篇
  1997年   3篇
  1996年   1篇
  1995年   5篇
  1994年   3篇
  1993年   3篇
  1990年   1篇
排序方式: 共有775条查询结果,搜索用时 0 毫秒
641.
针对海洋水声环境对声纳探测效能的评估问题,分析了影响声纳探测效能的海洋水声环境因素,建立了水声探测效能评估指标体系,研究了基于直觉模糊推理的水声探测环境效能评估方法。运用该方法对典型海洋水声环境下声纳探测效能进行评估,评估结果表明,该方法较好的反映声纳探测效能与海洋水声环境之间的模糊关系,评估结果更为科学可信。  相似文献   
642.
高寒山地作战将是我军在西北方向的主要作战形式,而气象环境严重制约其作战效能的发挥。针对高寒山地典型作战样式进行研究,探讨西北地区气象环境与作战单元和作战样式的影响,并由此提炼评估模型的模糊推理规则,构建模糊推理框架,采用多级评估决策的思想和模糊逻辑推理系统,建立影响高寒山地作战的气象环境效能三级模糊推理评估模型。经试验仿真检验,其评估结果与客观实际基本相符,对高寒山地作战效能和武器作战性能的充分发挥以及最大限度利用战场气象环境优势,具有重要军事价值。  相似文献   
643.
    
Postmodern contradictions in postcolonial Nigeria have led to the fetishisation of alternative local security measures often labelled as vigilante activities. The profiling of these groups as ethnic militia often undermines their essential bid to provide security while delimiting security needs to the physical. The fallouts of such profiling are frictions between federal security agents and ethnic-based security groups, often resulting in violence, as exemplified by the 7 May 2013 incident between the Nigerian federal security agents and the Ombatse. This study focuses on the emergence and activities of the Ombatse as an alternative security apparatus of the Eggon. It presents three years of field research which entailed the use of ethnography, key informant interviews and observation. The findings reveal that the Ombatse emerged to assert historical legitimacy for both the physical and spiritual securitisation of the Eggon through a return to the ancestral ways of social engineering. The study considers the security challenges in Nigeria, and also situates the Eggon historical context within political, religious, sociocultural and economic intersections of securitisation. It concludes that the Ombatse situates its legitimacy within the Eggon past and retains its relevance through the holistic focus of providing both physical and spiritual security.  相似文献   
644.
    
Mark Erbel 《Defence Studies》2017,17(2):135-155
This article reappraises the two most-studied country cases of military outsourcing: the USA and the UK. It argues that the contemporary wave of military contracting stretches back to the beginning of the cold war and not only to the demobilisation of armies in the 1990s or the neoliberal reforms introduced since the 1980s. It traces the political, technological and ideational developments that laid the groundwork for these reforms and practices since the early cold war and account for its endurance today. Importantly, it argues that a persistent gap between strategic objectives and resources, i.e. the challenge to reconcile ends and means, is an underlying driver of military contracting in both countries. Contemporary contracting is thus most closely tied to military support functions in support of wider foreign and defence political objectives. Security services in either state may not have been outsourced so swiftly, if at all, without decades of experience in outsourcing military logistics functions and the resultant vehicles, processes and familiarities with public-private partnerships. The article thus provides a wider and deeper understanding of the drivers of contractualisation, thereby improving our understanding of both its historical trajectory and the determinants of its present and potential futures.  相似文献   
645.
This work is about how the United States military has become dependent on networked technology. As arguably the largest contributor to national security, it has become so dependent that its chief doctrine integrates networked technology into nearly every specialty, with particularly intense focus on Network Centric Warfare. As the military’s old guard is replaced by the highly technical Millenial Generation, there is cause to pause when assuming this techno-acuity brings nothing but advantage and success. Vulnerabilities stemming from such extensive dependence offer opportunities for exploitation that have not gone unnoticed. The first step to moving forward from this point is to fully understand the extent to which the military has become dependent on computer networks. It might be the Millenials’ war today, but it would be quite unwise for the United States military to think about it and fight it in a purely Millenial way.  相似文献   
646.
Recent elections in Latin America, such as those of Mauricio Macri in Argentina, Horacio Cartes in Paraguay, and the impeachment process of Dilma Rousseff in Brazil, point to a new direction in Latin American politics and away from the “hard left;” they also point to a new momentum in the security relationship between the US and Latin American countries. Former US President Obama’s 2016 trip to Cuba and Argentina was a clear demonstration of this new security paradigm and also a clear indication that there is a new momentum brewing in the US towards a rethinking and reshaping of security strategies and mindsets. This article will explore the multidimensional security relationship between the US and Latin American countries in light of recent changes in the US’ posture toward the region.  相似文献   
647.
李翼鹏  鲁赢  王旭 《国防科技》2017,38(2):028-032
空天环境作为传统战场空间的拓展,是打赢信息化战争、维护国家安全的重要战略高点。为更好了解空天环境对作战效能的影响,运用云模型的评估方法,从自然环境、作战平台、武器装备等方面对空天环境进行研究,以期对空天作战发展方向提供参考。研究表明,应根据空天作战时自然环境对作战的影响权重,增强空天作战平台与新概念武器自主适应环境的能力。  相似文献   
648.
邵萌 《国防科技》2017,38(5):046-049
随着中国在太空领域的不断崛起,太空地位不断提升的同时,也面临着各种各样的挑战,这些挑战既有源自传统政治领域的大国阻挠,也有来自外太空的人类共同威胁。为了应对这些威胁和挑战,保护中国的太空利益和国家利益,我们需要从多方面着手,多管齐下,以维护日益重要的中国国家太空利益。  相似文献   
649.
郭力萌  朱勤 《国防科技》2017,38(5):050-054
在美国大力推动下,韩日政府于2016年11月签署《军事情报保护协定》。本文对韩日签署《军事情报保护协定》的背景和过程进行了梳理,指出了韩日政府关于该协定所存在的主要分歧,分析了该协定签署对东北亚乃至亚太地缘政治安全形势产生的深远影响。  相似文献   
650.
Due to expanding and increasing religious extremism and terrorism coupled with political instability in Pakistan, most western observers believe that Pakistan's nuclear weapons are not secure and could be taken over by terrorists. This would have adverse implications for the region and for global peace, especially for the security of USA and Europe. This article argues that this perception is based on a flawed understanding and knowledge of how Pakistan's command and control setup has evolved and operates. Pakistan's nuclear weapons are as safe as any other state's nuclear weapons. Pakistan has also been active in supporting and participating in global efforts to improve nuclear safety and security. Over the years, Pakistan has been quite open in sharing information regarding how it is improving its command and control system with western governments as well as scholars. This article argues that the steps Pakistan has taken to secure its nuclear weapons are adequate and that Pakistan would continue to further strengthen these measures; however, it is the expanding religious extremism, terrorism and anti-Americanism in the country which make the international perception of Pakistan extremely negative and then seep into the perception of Pakistan's nuclear weapons safety and security.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号