首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   311篇
  免费   21篇
  国内免费   49篇
  2023年   1篇
  2021年   16篇
  2020年   16篇
  2019年   29篇
  2018年   15篇
  2017年   25篇
  2016年   30篇
  2015年   10篇
  2014年   32篇
  2013年   58篇
  2012年   13篇
  2011年   10篇
  2010年   10篇
  2009年   13篇
  2008年   13篇
  2007年   18篇
  2006年   15篇
  2005年   20篇
  2004年   16篇
  2003年   5篇
  2002年   1篇
  2001年   3篇
  2000年   1篇
  1999年   3篇
  1998年   3篇
  1997年   1篇
  1995年   1篇
  1994年   1篇
  1992年   1篇
  1991年   1篇
排序方式: 共有381条查询结果,搜索用时 31 毫秒
91.
基于信息战内涵,分析了信息因素和兵力因素在信息战过程中相互作用的关系,根据影响图建模理论,建立了信息战模型,得到了兵力与信息耦合作用的微分方程,说明了制信息权在信息战中的决定性作用,为定量研究信息战的兵力和信息要素提供了理论依据。最后通过对模型的分析和简化,导出了我们熟悉的情报战模型和兰彻斯特方程第二线性律,体现了模型的合理性,但是在实际应用时仍需结合具体问题对模型进一步规范和完善,才能得出科学合理而有价值的结论。  相似文献   
92.
固定翼反潜巡逻机及其作战效能分析   总被引:2,自引:0,他引:2  
固定翼反潜巡逻机作为战役、战术反潜兵力,在现代海上军事斗争中发挥着极其重要的作用.首先研究了固定翼反潜巡逻机的系统构成、应召反潜的作战过程和特点,全面分析了影响固定翼反潜巡逻机作战效能的各因素,并在此基础上给出了固定翼反潜巡逻机的作战效能分析体系,提出了固定翼反潜巡逻机不同攻潜武器下的效能评估方法,最后通过仿真分析验证了方法的合理性与可行性.  相似文献   
93.
AirSea Battle (ASB) has generated significant publicity, controversy, and debate among scholars, analysts, commentators, and observers of US defense strategy. However, a research gap exists concerning formal analysis of the impact of the operational concept on the relationship between the US Air Force (USAF) and the US Navy (USN). The impact of the ASB operational concept on the USAF–USN relationship is examined across the issue areas of strategy, budgets, weapons procurement, and training. These four issue areas represent important areas of historical conflict and competition between the Air Force and Navy. The conclusion is that ASB is ushering in a new era of Air Force–Navy partnership that advances the inter-service dynamic from “jointness” toward integration. The emergent USAF–USN partnership therefore represents a significant development in US defense politics and defense strategy.  相似文献   
94.
What are relationships between epidemics, national security, and US immigration policy? This question is important because it sheds light on transnational or nontraditional security areas, American immigration policy, and a pressing issue for US leaders who have recently faced epidemics such as the West Africa Ebola outbreak that began in 2013. This article answers it and lays ground in the area by reviewing epidemics in world history, using International Relations and Security Studies works to specify dangers of contagions for states, and identifying three general immigration measures that American leaders have utilized from the seventeenth century to the present day to protect against contagions, which are (1) policies restricting entrance of foreigners thought to carry specified diseases, (2) the isolation or quarantining of immigrants with contagious disease, and (3) delegating the President with authority to stop immigration in the event of an epidemic abroad. This study has implications for research and contemporary US immigration policy.  相似文献   
95.
认知电子战通常被定义为以具备认知性能的电子战装备为基础,注重自主交互式的电磁环境学习能力与动态智能化的对抗任务处理能力的电子战形态。自其被首次提出以来,以其感知准、推理强、决策快的优势备受国内外研究学者广泛关注。随着人工智能新理念、新技术、新应用的不断涌现,认知电子战步入崭新的发展阶段。为捕捉其未来发展方向,从人工智能角度出发,总结并丰富了认知电子战概念内涵,梳理认知电子战的发展脉络及外国典型项目,搭建认知电子战系统框架及架构,从感知、判断、决策等方面对认知听电子战关键技术进行了全面系统综述,并总结了认知电子战面临的挑战和发展趋势。  相似文献   
96.
Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities.  相似文献   
97.
Japan has been overlooked as a ‘cyber power’ but it now becoming a serious player in this new strategic domain. Japanese policy-makers have forged a consensus to move cybersecurity to the very core of national security policy, to create more centralized frameworks for cybersecurity, and for Japan’s military institutions to build dynamic cyberdefense capabilities. Japan’s stance has moved rapidly toward the securitization and now militarization of responses to cyber challenges. Japan’s cybersecurity stance has bolstered US–Japan alliance responses to securing all dimensions of the ‘global commons’ and extended its defense perimeter to further deter but potentially raise tensions with China.  相似文献   
98.
针对航母编队对岸电子进攻作战提出了一种航母编队阵位确定的方法。基于航母编队在对岸电子进攻中的任务,提出了航母编队与岸边距离的基本要求,建立了航母编队与岸边距离的数学模型,仿真计算了模型中各个参数对航母编队与岸边距离的影响。这些模型可用于航母编队在对岸电子进攻中确定航母的阵位,满足航母编队作战使用的需要。  相似文献   
99.
The insurrection in the Vendée combined open warfare with the methods of petite guerre, ambushing French republican soldiers and cutting their supply lines to Paris. These tactics, when combined with the hatreds generated by a civil war, go far to explain to the cruelty of the conflict in the west and the depth of the hatreds it engendered. In republican eyes the use of guerrilla tactics was unjust and illegitimate, and they denounced their adversaries as common criminals and brigands, portraying them as backward, superstitious, even as subhuman, and in the process justified the savage repression they unleashed against them.  相似文献   
100.
Secret French plans to launch guerrilla-style raids on the British Isles devised in the spring of 1796 were referred to as ‘chouanneries’. The name and concept behind these small-war operations were modelled on the irregular tactics used by the Chouan rebels in the Vendée, which the French state army had brutally quashed, but some wished to transfer into their institutional practice. Part of France's ongoing military strategy in the war against Britain, which included fomenting insurrection in Ireland, these irregular operations were to be manned partially by pardoned deserters and released convicts and prisoners of war. Of these, only Tate's brief invasion of Wales in 1797 was realised, but the surviving plans provide insightful historical lessons into an Anglophobic mindset shared by a small network of practitioners and policy deciders on the effectiveness of such shock and awe tactics. Largely motivated by the desire to take revenge for Britain's support of counter-revolutionaries in the Vendée, these plans could more aptly be referred to as counter-‘chouanneries’.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号