首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   255篇
  免费   16篇
  国内免费   11篇
  2021年   2篇
  2020年   16篇
  2019年   24篇
  2018年   24篇
  2017年   28篇
  2016年   22篇
  2015年   3篇
  2014年   33篇
  2013年   66篇
  2012年   9篇
  2011年   6篇
  2010年   5篇
  2009年   5篇
  2008年   4篇
  2007年   4篇
  2006年   2篇
  2005年   10篇
  2004年   4篇
  2003年   4篇
  2002年   2篇
  2001年   3篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1995年   1篇
  1994年   1篇
  1990年   1篇
排序方式: 共有282条查询结果,搜索用时 531 毫秒
121.
基于兰彻斯特作战理论,提出了一个新的微分对策模型来研究在交战双方均有信息战系统协助作战的条件下的最优火力分配策略。又运用微分对策理论对该模型进行分析和求解,并对所得到的结论作出符合战术意义的解释。  相似文献   
122.
GPS在导航战中的作用及其干扰对抗研究   总被引:8,自引:1,他引:7  
论述导航战的作用和军用范围,进攻导航战的目标和防御导航战的措施以及GPS系统中C/A码的扩展和加密应用,新码的发展和抗干扰能力。并通过应用实例进一步论述对GPS接收机的干扰原理和干扰效果分析以及美、俄两国发展GPS干扰机的技术现状。  相似文献   
123.
基于网络的指挥控制协同性能评估模型   总被引:1,自引:0,他引:1  
网络中心作战是通过部队网络化而实现的军事行动,网络化作战行动的评估需要新的模型和测量方法,以便获取基于信息优势对改进后的指挥和控制的效果.在借鉴美军经验的基础上,从信息的角度区分了网络中心作战信息栅格运作的方式,运用图论、复杂性理论和性能评估理论等方法,建立了作为信息处理系统的指挥控制网络的结构、预期延迟时间、协同影响、复杂性和有效期望等待时间模型,以及作为指挥控制系统的指挥控制网络的节点决策和网络决策效能模型,是对网络中心作战方法的探索.  相似文献   
124.
精确制导武器发展趋向   总被引:5,自引:1,他引:4  
通过“科索沃战争”中精确制导武器使用情况的跟踪研究 ,结合近年来国外公开报道的有关资料 ,分析未来高技术条件下局部战争对精确制导武器的发展需求 ,提出在军事技术高速发展新形势下精确制导武器发展趋向。  相似文献   
125.
伊拉克战争美军后勤(装备)保障特点及启示   总被引:1,自引:0,他引:1  
伊拉克战争中,美军采取多种手段和措施,成功地实施了后勤(装备)保障,在保障准备、保障方法、保障信息化建设等方面呈现出许多新特点,为我军做好新形势下的装备保障工作提供了有益的启示。  相似文献   
126.
The objective of this article is to move ethical discourse on military strategy beyond the confines of the established War Convention. This is achieved by utilising the common good, a concept found in political philosophy and theology. The common good acts as a positive organising concept for socio-political activity. With its focus on peace, development and the flourishing of the individual and community, the common good poses a significant challenge to strategy. This article constructs an approach to strategy that is compatible with the common good. Importantly, it does so whilst respecting the pursuit of victory as an indispensable component of strategy’s true nature. The theory presented in this article is then tested in relation to four different modes of strategy: regular war, irregular war, deterrence, and cyberwar.  相似文献   
127.
The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently doing but also predict what their next move might be. However, the ethical implications are unclear and the backlash following Edward Snowden’s revelations have shown that such activities are not without controversy. This leaves the debate stuck between the important, ethical role that intelligence can play and the potential for its unrestrained use to cause undue harm. This paper will resolve this by giving greater detail to cyber-intelligence practices, highlighting the different levels of harm that the various intelligence operations can cause. The essence of this paper is not that cyber-intelligence should be banned outright, but that it can be justified given the necessary circumstances. Therefore, the paper will develop a specialised set of Just Cyber-Intelligence Principles, built on the just war tradition, to outline if and when such activities are justified.  相似文献   
128.
The jus ad bellum criterion of right intention (CRI) is a central guiding principle of just war theory. It asserts that a country’s resort to war is just only if that country resorts to war for the right reasons. However, there is significant confusion, and little consensus, about how to specify the CRI. We seek to clear up this confusion by evaluating several distinct ways of understanding the criterion. On one understanding, a state’s resort to war is just only if it plans to adhere to the principles of just war while achieving its just cause. We argue that the first understanding makes the CRI superfluous, because it can be subsumed under the probability of success criterion. On a second understanding, a resort to war is just only if a state’s motives, which explain its resort to war, are of the right kind. We argue that this second understanding of the CRI makes it a significant further obstacle to justifying war. However, this second understanding faces a possible infinite regress problem, which, left unresolved, leaves us without a plausible interpretation of the CRI. This constitutes a significant and novel reason for leaving the CRI out of the international law of armed conflict (LOAC).  相似文献   
129.
Although most styles of military ethics are hybrids that draw on multiple ethical theories, they are usually based primarily on the model of Aristotelian virtue ethics. Virtue ethics is well-suited for regulating the conduct of soldiers who have to make quick decisions on the battlefield, but its applicability to military personnel is threatened by the growing use of unmanned weapon systems. These weapons disrupt virtue ethics’ institutional and cultural basis by changing what it means to display virtue and transforming the roles soldiers perform and the nature of the military profession itself. I argue that in light of these challenges to virtue ethics, at least as it is traditionally understood within the armed forces, soldiers operating unmanned weapons require a more heavily rule-based approach to military ethics.  相似文献   
130.
针对非致命微波武器效能评估问题,通过分析影响非致命微波武器效能的关键因素,建立了非致命微波武器评价指标体系,提出了非致命微波武器效能的评估方法。采用一致性排序法确定各个指标的分配权重,并将Vague集应用到效能评估中,利用加权贴近度表征非致命微波武器效能的评估值。得到评估结果与实际情况相符,为国内非致命微波武器发展提供了理论依据。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号