首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   681篇
  免费   60篇
  国内免费   106篇
  2024年   1篇
  2023年   3篇
  2022年   2篇
  2021年   9篇
  2020年   9篇
  2019年   16篇
  2018年   15篇
  2017年   33篇
  2016年   46篇
  2015年   21篇
  2014年   46篇
  2013年   65篇
  2012年   54篇
  2011年   57篇
  2010年   22篇
  2009年   57篇
  2008年   26篇
  2007年   43篇
  2006年   65篇
  2005年   51篇
  2004年   48篇
  2003年   36篇
  2002年   35篇
  2001年   25篇
  2000年   13篇
  1999年   19篇
  1998年   7篇
  1997年   4篇
  1996年   4篇
  1995年   2篇
  1994年   6篇
  1993年   3篇
  1992年   1篇
  1990年   1篇
  1989年   1篇
  1988年   1篇
排序方式: 共有847条查询结果,搜索用时 156 毫秒
711.
军用信息系统能力评价方法研究*   总被引:1,自引:0,他引:1  
信息能力直接影响信息优势能力和指挥决策能力,如何分析和评军用信息系统信息能力对作战的影响是一个重要的研究课题。在分析信息能力概念及其流程的基础上,详细研究了信息能力的三个度量指标:完备性、准确性和时效性的评估方法,给出评估信息能力的解析数学模型,研究结果对信息战和信息优势具有参考价值。  相似文献   
712.
一种防空自动化系统效能的模糊综合评估方法   总被引:1,自引:0,他引:1  
针对防空自动化系统的组成,给出了防空自动化系统效能的指标体系,并通过分析防空自动化系统静态效能和动态效能的关系,运用模糊综合评估和系统性能评价等级划分的方法,在防空自动化系统静态效能评估的基础上,研究了防空自动化系统的动态效能,提出了一种静态效能与动态效能相结合的防空自动化系统模糊综合评估方法。  相似文献   
713.
针对现有空袭目标威胁评估方法存在的不足,提出了一种基于区间数灰色关联分析法的威胁评估技术,讨论了目标机动对威胁度的影响,克服了无量纲化处理对指标作用大小的影响,给出了决策矩阵的建立方法和目标威胁度排序方法。最后给出了一个应用实例,排序结果与专家评估结果完全一致,证明了该技术的有效性与可行性。  相似文献   
714.
针对防空作战中电子对抗异常激烈的现实,利用概率论和作战运筹方法,描述了电子干扰对防空兵群射击指挥效率影响的主要特点和评估指标,分析了射击指挥方式与群抗击效率之间的数学关系,建立了搜索雷达、通信系统和火控雷达受到电子干扰时群射击指挥效率的评估模型.结合实例计算,得到了电子干扰对群射击指挥效率影响的基本规律,提出了电子干扰时选择射击指挥方式的原则与方法.  相似文献   
715.
India and China both have powerful spy networks; completely different in their approaches to espionage; both effective against their perceived enemies. China focuses first on internal threats, on Taiwan and Hong Kong, and then the US and Japan. India’s defense policy focuses on Pakistan and internal terrorist threats, and then on China. In reality, however, when it comes to spying on each other, both China and India suffer from incompetence and apathy – which endangers both their own security and regional stability. This article looks at how they spy on each other, and asks why and how they need to improve. The narrative also touches upon some of the individuals who are waging the spy war, from India’s wily spymaster Ajit Doval down to junior Chinese agents such as Wang Qing and Pema Tsering. The two countries are not friends. They have the largest territorial dispute in the world on their hands, covering an area the size of North Korea, and they have large armies facing each other along 4000 kilometers of frontier. But they also lay claim to the world’s two oldest and richest civilizations, with a rich history of exchange, and now with a combined population of 2.6 billion people and more than a quarter of the world’s economic output. If they cooperated, they could solve many of the world’s problems; but if they lurch into conflict, the potential consequences are terrifying to contemplate. Unfortunately, despite their geographical closeness, they do not know much about each other. They have few cultural interchanges, little diplomacy, few trade missions. They do not watch each other’s films, read each other’s books or listen to each other’s music. Chinese tourists would rather fly to New Zealand for their holidays than cross the border to India, and Indian students would rather study in Europe than China. China and India are neighbors that barely talk to each other. Most significantly, they do not spy on each competently. For countries that do not interact socially, defensive understanding is important for security – but China prefers the glamor of facing up to its Pacific and other maritime rivals such as the US and Japan. India, for its part, does talk a great deal about the China threat, but its resources and expertise are wrapped up in controlling its security threat from Pakistan and the Islamic world. When China and India do try to spy on each other, it is often without the benefit of a long-term focus or understanding. India has some very skilled operatives within the Research and Analysis Wing, but few that specialize in China. China has an enormous pool of resources spread across several government departments, including the Ministry of Public Security, and also has extensive facilities and manpower in the Joint Staff Department of the Central Military Commission (the JSD) and the new Strategic Support Force (the SSF). However, China’s intelligence services generally behave as if India is not worth spying on. Given that the two countries do not have the cultural or political machinery in place to understand each other, espionage and intelligence gathering is vital to ensure that miscalculations do not take place. This has been apparent over the last few years in stand-offs in the Himalaya, as well as top-level suspicions on each side about a variety of subjects including terrorism, covert operations in Sri Lanka and Burma, and the two countries’ nuclear weapons programs. Both countries do occasionally make efforts in espionage against each other, especially during sensitive periods such as the mountain stand-offs of 2014 and 2013 and during policy developments in nuclear warfare. In this article the author looks at actual spying incidents between the two countries, their methodologies, their staff, their technical capabilities, and how the act of spying, which is usually viewed as intrinsically adversarial, can be a force for good. The article relies on interviews with actual participants in intelligence from both countries as well as extensive use of contemporary online sources, and secondary analysis by both military and academic experts from China, India and NATO countries.  相似文献   
716.
空中突击部队是由多装备系统组成的装备体系,在执行任务过程中体现多阶段多任务的特点。基于DoDAF体系框架,结合美军空中突击部队装备体系作战任务展开研究。首先,通过作战任务的形式化描述,建立了装备体系作战任务的四元组描述模型;其次,在DoDAF体系框架下,提出建立空中突击部队装备体系作战任务的静态模型和动态模型;最后通过仿真方法对动态模型进行验证,证明了该模型的可信性。  相似文献   
717.
量子技术是基于量子力学和其他学科交叉产生的新兴学科,已经涉及到计算、信息、导航、能源等多个应用领域。近年来,随着量子技术的快速发展和应用潜力,量子技术已成为研究热点并逐步走向应用。与此同时,世界新军事革命发展中武器装备须具有远程精确化、职能化、隐身化、无人化的技术特点。结合量子技术的特点,从量子计算,量子通信与量子密码、量子控制、量子导航、量子雷达,量子电池,量子技术对作战模式的改变等方面对武器装备领域的应用、作战能力和作战模式进行阐述。研究表明,量子计算的发展必然使现有武器装备的性能得到提高、作战能力得到提升,进而改变现有作战模式。  相似文献   
718.
从武警部队武器装备快速形成战斗力的客观需求出发,分析了影响新型装备战斗力生成的关键因素,建立了装备战斗力生成评估指标体系。从装备的质量标准、装备的数量标准、人员与装备的有效结合、装备的综合保障能力、装备的能动性等5个方面进行评估,运用层次分析法以及灰色理论,对装备形成战斗力进行综合评估。并以部队现役某型装甲防暴车为例,通过求解其评估值,证明该方法的可行性,为部队实践和装备战斗力评估提供了参考。  相似文献   
719.
The article analyses the Spanish military transformation. This process started in 2004 as a means to adapt the force structure, organization and capabilities of the Spanish military to meet present and future threats in compliance with NATO’s initiatives, thus ensuring the continuity of the equipment modernization, professionalization and the adjustment of the country’s defence architecture to the post-cold war environment. A decade later, although transformation is still a priority for the Ministry of Defence, limited political will, a lack of strategic guidance, poor resource management and the effects of the economic crisis are compromising its development. This article describes the Spanish military transformation and assesses its value in adapting the country’s armed forces to the current and prospective security environment.  相似文献   
720.
秦有权 《国防科技》2017,38(1):001-007
通过分析空袭兵器、空袭历史、防空体系和防护技术的发展,将空袭模式划分为防区内(低空)地毯式打击、防区内(中低空)多手段打击、防区外陆海空三位一体精确打击三代。将防护体系划分为"边陲墙壕烽火台+腹地城池"、"防空系统+防护工程"两代。并预测了第四代空袭模式:防区外陆海空天四位一体全球快速精确打击和与之相对应的第三代"防空反导+信息化防护工程"防护体系。根据打击力和防护力相生相克的矛盾运动,提出了末端防护工程应吸收信息技术、发展综合防护技术,信息化时代的防护工程不仅要保护可以转入地下的目标,而且要保护无法转入地下的目标。从源头上为陆基目标防护的研究和建设提供参考和启迪。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号