全文获取类型
收费全文 | 404篇 |
免费 | 48篇 |
国内免费 | 69篇 |
出版年
2022年 | 2篇 |
2021年 | 8篇 |
2020年 | 8篇 |
2019年 | 11篇 |
2018年 | 25篇 |
2017年 | 31篇 |
2016年 | 25篇 |
2015年 | 21篇 |
2014年 | 28篇 |
2013年 | 55篇 |
2012年 | 34篇 |
2011年 | 37篇 |
2010年 | 16篇 |
2009年 | 22篇 |
2008年 | 24篇 |
2007年 | 26篇 |
2006年 | 45篇 |
2005年 | 36篇 |
2004年 | 17篇 |
2003年 | 12篇 |
2002年 | 2篇 |
2001年 | 15篇 |
2000年 | 7篇 |
1999年 | 6篇 |
1998年 | 3篇 |
1997年 | 1篇 |
1994年 | 2篇 |
1993年 | 2篇 |
排序方式: 共有521条查询结果,搜索用时 15 毫秒
441.
Tai Ming Cheung 《战略研究杂志》2016,39(5-6):728-761
ABSTRACTChina’s defense science, technology, and industrial system has been undergoing a far-reaching transformation over the past two decades and the single biggest factor behind this turnaround is the role of external technology and knowledge transfers and the defense industry’s improving ability to absorb these inputs and convert into localized output. China is pursuing an intensive campaign to obtain defense and dual-use civil–military foreign technology transfers using a wide variety of means, which is explored in this article. 相似文献
442.
The warehouse problem with deterministic production cost, selling prices, and demand was introduced in the 1950s and there is a renewed interest recently due to its applications in energy storage and arbitrage. In this paper, we consider two extensions of the warehouse problem and develop efficient computational algorithms for finding their optimal solutions. First, we consider a model where the firm can invest in capacity expansion projects for the warehouse while simultaneously making production and sales decisions in each period. We show that this problem can be solved with a computational complexity that is linear in the product of the length of the planning horizon and the number of capacity expansion projects. We then consider a problem in which the firm can invest to improve production cost efficiency while simultaneously making production and sales decisions in each period. The resulting optimization problem is non‐convex with integer decision variables. We show that, under some mild conditions on the cost data, the problem can be solved in linear computational time. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 367–373, 2016 相似文献
443.
Tamir Libel 《Defence Studies》2016,16(2):137-156
The paper’s main argument is that Israel’s security policy, which traditionally focused on defending its territorial integrity against regular Arab armed forces, was, by the 2010s, transformed into one that focuses on facing a variety of state- and non-state-based threats. Neo-realist explanations could neither account for the contested nature of the security debate during this period, nor the inconsistent evolution of the policy. The present study aims to solve this conundrum by introducing an alternative approach known as 4th generation strategic culture research. The paper is comprised of four parts. First, the origins and evolution of strategic culture are reviewed, with emphasis placed on the commonly accepted weaknesses that, to date, have prevented it from being used as a testable theoretical concept, and subsequently as an explanatory factor for security policy changes. The second part presents the “modernist constructivism” approach that bridges the gap between traditional constructivism and hypothesis-driven research design. Next, the paper introduces the emerging fourth generation in strategic culture literature, followed by a conceptual framework designed to resolve the inherent weaknesses of the more traditional approaches. Finally, this conceptual framework is applied to analyse the transformation of Israel’s security policy between 1982 and 2014. 相似文献
444.
Darrell Driver 《Defense & Security Analysis》2016,32(1):4-18
The US role in the North Atlantic Treaty Organization (NATO) Alliance is a 65-year history of retrenchment and renewal. When Washington has sought a retrenchment from the world, it traditionally increased burden sharing pressure on Europe to do more. During times of increased global ambition, the USA reaffirmed its traditional leadership role in the Alliance and its commitment to NATO effectiveness and relevance. This cycle of NATO retrenchment and renewal, however, is halting. Though the USA will continue to go through periods of relative increases and decreases in security policy ambition, signs point to a permanent defense and security retrenchment in Europe. Germany is the ally singularly capable of filling the resulting security gap. If NATO is to avoid the drift toward irrelevance many critics have predicted, Germany will need to cast off old inhibitions toward security and defense leadership. These trends and their implications for NATO's future are explored through historical case studies and the shifting contemporary security environment. 相似文献
445.
Nicolas Groffman 《Defense & Security Analysis》2016,32(2):144-162
India and China both have powerful spy networks; completely different in their approaches to espionage; both effective against their perceived enemies. China focuses first on internal threats, on Taiwan and Hong Kong, and then the US and Japan. India’s defense policy focuses on Pakistan and internal terrorist threats, and then on China. In reality, however, when it comes to spying on each other, both China and India suffer from incompetence and apathy – which endangers both their own security and regional stability. This article looks at how they spy on each other, and asks why and how they need to improve. The narrative also touches upon some of the individuals who are waging the spy war, from India’s wily spymaster Ajit Doval down to junior Chinese agents such as Wang Qing and Pema Tsering. The two countries are not friends. They have the largest territorial dispute in the world on their hands, covering an area the size of North Korea, and they have large armies facing each other along 4000 kilometers of frontier. But they also lay claim to the world’s two oldest and richest civilizations, with a rich history of exchange, and now with a combined population of 2.6 billion people and more than a quarter of the world’s economic output. If they cooperated, they could solve many of the world’s problems; but if they lurch into conflict, the potential consequences are terrifying to contemplate. Unfortunately, despite their geographical closeness, they do not know much about each other. They have few cultural interchanges, little diplomacy, few trade missions. They do not watch each other’s films, read each other’s books or listen to each other’s music. Chinese tourists would rather fly to New Zealand for their holidays than cross the border to India, and Indian students would rather study in Europe than China. China and India are neighbors that barely talk to each other. Most significantly, they do not spy on each competently. For countries that do not interact socially, defensive understanding is important for security – but China prefers the glamor of facing up to its Pacific and other maritime rivals such as the US and Japan. India, for its part, does talk a great deal about the China threat, but its resources and expertise are wrapped up in controlling its security threat from Pakistan and the Islamic world. When China and India do try to spy on each other, it is often without the benefit of a long-term focus or understanding. India has some very skilled operatives within the Research and Analysis Wing, but few that specialize in China. China has an enormous pool of resources spread across several government departments, including the Ministry of Public Security, and also has extensive facilities and manpower in the Joint Staff Department of the Central Military Commission (the JSD) and the new Strategic Support Force (the SSF). However, China’s intelligence services generally behave as if India is not worth spying on. Given that the two countries do not have the cultural or political machinery in place to understand each other, espionage and intelligence gathering is vital to ensure that miscalculations do not take place. This has been apparent over the last few years in stand-offs in the Himalaya, as well as top-level suspicions on each side about a variety of subjects including terrorism, covert operations in Sri Lanka and Burma, and the two countries’ nuclear weapons programs. Both countries do occasionally make efforts in espionage against each other, especially during sensitive periods such as the mountain stand-offs of 2014 and 2013 and during policy developments in nuclear warfare. In this article the author looks at actual spying incidents between the two countries, their methodologies, their staff, their technical capabilities, and how the act of spying, which is usually viewed as intrinsically adversarial, can be a force for good. The article relies on interviews with actual participants in intelligence from both countries as well as extensive use of contemporary online sources, and secondary analysis by both military and academic experts from China, India and NATO countries. 相似文献
446.
447.
防空导弹武器系统研制是一项非常复杂的工程 ,研制过程中会碰到各种各样的问题。对一些带有普遍性的问题进行了讨论 ,以期引起设计人员的重视。 相似文献
448.
拦截TBM发射区的确定方法初探 总被引:2,自引:0,他引:2
在讨论拦截TBM杀伤区的基础上 ,应用TBM的运动方程 ,给出了确定低层反导防御系统拦截TBM时发射区的方法 ,对研究反导防御作战理论有一定的参考作用 ,同时 ,为指挥员选择最佳发射时机和发射方式提供了重要的理论依据。 相似文献
449.
"道尔-M1"武器系统对F-117的拦截可能性分析 总被引:6,自引:0,他引:6
对美国F 1 1 7隐身飞机和俄罗斯“道尔 M1”防空导弹武器系统进行了简单介绍 ,对“道尔 M1”拦截F 1 1 7的可能性进行了计算分析 ,结果表明“道尔 M1”可以对F 1 1 7进行拦截 ,并根据计算结果提出了“道尔 M1”对F 1 1 7进行拦截的最佳作战方式 相似文献
450.
主要介绍了美国战区导弹防御的发展过程及其 4个核心系统 ,即“爱国者”PAC - 3、海军区域导弹防御系统、陆军战区高空区域导弹防御系统、海军全战区系统。 相似文献