首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1322篇
  免费   129篇
  国内免费   129篇
  2024年   1篇
  2023年   3篇
  2022年   7篇
  2021年   42篇
  2020年   41篇
  2019年   31篇
  2018年   30篇
  2017年   68篇
  2016年   74篇
  2015年   28篇
  2014年   107篇
  2013年   79篇
  2012年   109篇
  2011年   99篇
  2010年   69篇
  2009年   110篇
  2008年   104篇
  2007年   67篇
  2006年   86篇
  2005年   98篇
  2004年   73篇
  2003年   43篇
  2002年   38篇
  2001年   39篇
  2000年   29篇
  1999年   27篇
  1998年   13篇
  1997年   15篇
  1996年   5篇
  1995年   10篇
  1994年   5篇
  1993年   7篇
  1992年   9篇
  1991年   3篇
  1990年   9篇
  1989年   1篇
  1988年   1篇
排序方式: 共有1580条查询结果,搜索用时 0 毫秒
241.
摘要:针对单小批量武器装备保障的特殊需求,对传统的质量屋模型进行了改进,建立了基于装备保障需求与保障规则的质量屋模型,利用整数规划技术进行求解,使得单小批量武器的装备保障规则按照实际保障需求重新排列优先次序,并通过对某型火炮保障方案的筛选验证了模型的正确性.新的质量屋模型发展完善了质量屋的理论与方法,有助于提高单小批量武器的装备保障能力.  相似文献   
242.
This article had its genesis in a background study for the development of a new Australian Army counter-insurgency doctrine. Archival research showed that the Australian counter-insurgency doctrine employed in such post-1945 conflicts as Burma, Malaya, Borneo and Vietnam originated in the jungle campaigns of the South West Pacific Area during World War II. The historical record also showed that the Army's counter-insurgency doctrine, as with its World War II-jungle warfare doctrine, was a pragmatic amalgam of Australian experience and British doctrine. The article traces this process through the development of a series of doctrine manuals. It also considers the contribution of key individuals to both counter-insurgency theory and practice. This distinctively Australian approach to the development of doctrine was responsible for producing a highly successful manual, The Division in Battle: Pamphlet No. 11, Counter-Revolutionary Warfare (DIB 11), which the Army used during its involvement in Vietnam.  相似文献   
243.
This study develops the concepts of fourth generation operations and the associated principles. First, the concept of fourth generation operations is introduced and defined. Fourth generation operations are the evolution and extension of third and fourth generation warfare based on a change of tactics, technology, and combatants. These operations are currently ongoing in Afghanistan and Iraq, and with the global war on terrorism. Based on the framework of US joint doctrine, the supporting principles of fourth generation operations are developed. This requires the introduction of the principle of Population Perception.  相似文献   
244.
ABSTRACT

This article discusses the Rhodesian Front regime propaganda warfare strategy during Zimbabwe’s war of liberation. It uses the case of the Chilonga area of Chiredzi located in the south-east of Zimbabwe to demonstrate that propaganda warfare was introduced as a measure to counter guerrilla infiltration and civilian cooperation with them. Drawing on ideas of military anthropology vis-à-vis the importance of cultural awareness in counterinsurgency, the paper argues that the efforts of the Rhodesian Front regime to use propaganda were fruitless. This is because they mostly ignored the culture of the Shangani, local people. Despite that, there were other reasons for the failure of the Rhodesian Front’s propaganda strategy, including the lack of conformity between politics and military action.  相似文献   
245.
This article explains the demise of Sierra Leone's Revolutionary United Front (RUF) rebellion. It argues that the main cause of this fate was the group's relationship with its primary sponsor, Charles Taylor. The RUF's dependency on Taylor's patronage, coupled with the rebellion's weak organisational endowments harmed the group's prospects of success. Based on original research, the article shows how Taylor used the RUF as a strategic instrument for his own regional interests, which led to the group's unravelling. More broadly, the article speaks about proxy warfare in Africa and how the relationship between resource flows and rebellion are not always beneficial to rebels as one might expect.  相似文献   
246.
Abstract

The 1919-1921 Anglo-Irish War represents one of the earliest instances of a successful insurgent movement in the twentieth century. By combining a fluid organizational structure with effective hit-and-run tactics and accurate intelligence, the Irish Republican Army was able to defeat militarily the security forces of Great Britain. Combined with a successful propaganda campaign, these tactics allowed the IRA to drive the British to the negotiating table, where its representatives secured greater autonomy than Ireland had known in centuries. The outcome of the Anglo-Irish War demonstrates the success which a well-organized guerrilla campaign can achieve, and the tactics used by the IRA must therefore be understood by any serious student of small warfare.  相似文献   
247.
ABSTRACT

This paper evaluates Boko Haram’s military capabilities and details the process of how its standing army, driven by these capabilities, came to pose a phased threat between 2013 and 2015 in particular. This was a period when military fighting dominated the insurgency in north-east Nigeria. Whereas there is an abundance of literature on Boko Haram’s histories and the impact of its insurgency on north-east Nigeria, analysis of Boko Haram’s military campaigning is still deficient. Attempting to fill this gap, this paper uses field findings and battlefield case studies from north-east Nigeria to highlight how Boko Haram’s overt front – its standing army – came to supplant its guerrilla operations as the main security threat to the frontier area.

This pivot towards military fighting, for a group initially composed of a few ragtag combatants, on the surface might seem surprising. Yet, whereas Boko Haram may lack the popular support required for ‘people’s war’, classic insurgency theories nevertheless hold some explanatory power for this deliberate shift: away from guerrilla warfare as the expedient of the weaker side, and towards the use of a large standing army of locals to swarm, and sometimes successfully overrun, state forces.  相似文献   
248.
针对当前在装备保障需求分析过程中缺乏合适的方法和工具的问题,提出一种基于能力与面向需求分析相结合的装备保障需求分析方法,并通过运用解释结构模型法,对分析结果的结构及相互关系进行科学构建.力求通过该方法的应用,能够辅助论证人员深刻理解和合理判断各种因素之间的相互影响关系,通过结构化和对比化的装备保障需求分析过程得到能正确反映保障需求的关系结构.从而为装备保障发展内容的分析打下良好的理论基础.  相似文献   
249.
针对海战场密集目标情况下,传统方法在解决舰载主被动传感器数据关联问题中表现的不足,提出一种基于属性信息相似度检验的方法.通过分析雷达实体目标与辐射源在时间上可能出现的不同对应关系,给出相应的判决规则.仿真结果表明,新算法具有较高的关联精度和较低的漏关联概率.  相似文献   
250.
提出了一种新的三粒子量子安全直接通信协议。通信过程利用decoy光子来检测窃听,保证信道安全。发送方将秘密消息编码在不同幺正操作上,通信双方通过Bell基和Z基测量可直接传递秘密消息。由于所有粒子都用于传输秘密消息,且传输一次可获得两比特信息,该协议具有较高的量子比特及量子密码协议效率;三粒子纠缠态的制备是已实现技术,该协议具有实际操作的意义。此外,该协议在量子信道中也是安全的。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号