首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   240篇
  免费   16篇
  国内免费   46篇
  2023年   1篇
  2021年   9篇
  2020年   10篇
  2019年   23篇
  2018年   10篇
  2017年   17篇
  2016年   18篇
  2015年   4篇
  2014年   26篇
  2013年   37篇
  2012年   12篇
  2011年   10篇
  2010年   9篇
  2009年   16篇
  2008年   13篇
  2007年   17篇
  2006年   15篇
  2005年   20篇
  2004年   15篇
  2003年   6篇
  2002年   1篇
  2001年   3篇
  2000年   1篇
  1999年   3篇
  1998年   2篇
  1995年   1篇
  1994年   1篇
  1992年   1篇
  1991年   1篇
排序方式: 共有302条查询结果,搜索用时 15 毫秒
71.
用速度平差法求解目标运动要素的改进方法   总被引:1,自引:1,他引:0  
用速度平差法求解目标运动要素是潜艇作战中常用的目标运动要素求解方法.通过全面分析该算法的原理和求解过程,运用典型数值分析、数学归纳等方法,论证了目前速度平差法应用中求解过程的不完整性及漏根的根源,结合潜艇鱼雷攻击实际,采用迭代法和数轴验根法,提出了新的求解办法,提高了目标运动要素解算的可靠性和效率.  相似文献   
72.
Despite the lance’s status and the amount of attention the couched lance has received in historiography, study of its martial art has been neglected. The various lance types and techniques used by western European cavalry have only recently begun to receive scholarly attention. Additionally, Medieval European lance use has too often been studied in isolation, without an adequate understanding of the idiosyncratic and asymmetrical dynamics of mounted combat. Although the charge with the couched lance was a valid tactic, it was only one of many. Light and heavy lances were used in one hand or two to trip, block, unhorse, and wrestle. These techniques were governed by the harsh laws of distance, speed, impact, iron, and asymmetry. By utilizing the surviving Fechtbücher and several Peninsular and Near Eastern sources, a brief foray into the diverse techniques of lance use and their purposes has been attempted here.  相似文献   
73.
Cyberspace is a new domain of operation, with its own characteristics. Cyber weapons differ qualitatively from kinetic ones: They generate effects by non-kinetic means through information, technology, and networks. Their properties, opportunities, and constraints are comparable to the qualitative difference between conventional and nuclear weapons. New weapons and their target sets in a new domain raise a series of unresolved policy challenges at the domestic, bilateral, and international levels about deterrence, attribution, and response. They also introduce new risks: uncertainty about unintended consequences, expectations of efficacy, and uncertainty about both the target’s and the international community’s response. Cyber operations offer considerable benefits for states to achieve strategic objectives both covertly and overtly. However, without a strategic framework to contain and possibly deter their use, make state and non-state behavior more predictable in the absence of reciprocal norms, and limit their impact, an environment where states face persistent attacks that nonetheless fall below the threshold of armed conflict presents a policy dilemma that reinforces collective insecurity.  相似文献   
74.
Following Russia’s annexation of Crimea and its initial actions in eastern Ukraine in 2014, the term hybrid warfare has received much public attention. Many have argued that the Russian actions we saw in Ukraine were part of a completely new strategy while others have suggested that there was nothing new in Russia’s actions. This article takes a critical look at these claims. Through the assessment of the history of the term hybrid warfare and a rigorous analysis of the so-called Gerasimov doctrine, this study finds that the Russian hybrid warfare strategy is rather a western myth than a formal comprehensive Russian strategic concept. Additionally, through the assessment of the Russian use of information operations and the way she has utilised the cyberspace in several recent conflicts, the study finds that against all claims Russia did not make these areas its main battlefield, but rather has been using them in support of its traditional concepts.  相似文献   
75.
提出了将极化阵列应用到反辐射导引头上,导引头利用目标与诱饵的极化差异,采用极化域-空域联合估计方法抗诱偏。首先,利用波达方向矩阵法,估算出雷达与诱饵的空间二维到达角和极化参数,将估算出来的二维到达角信息为反辐射导引头提供导引,极化参数用来鉴别雷达与诱饵,从而达到抗诱偏的目的。然后,结合导弹运动方程及导引方程对反辐射导弹抗三点源诱偏进行了全弹道数字仿真,并且采用Monte-Carlo方法对全弹道仿真进行了多次实验,仿真结果证明了将极化域-空域联合估计应用于反辐射导引头抗诱偏的可行性。  相似文献   
76.
This article examines contemporary modes of American warfare. It posits the concept of “vicarious warfare” as a means of capturing prominent patterns in warfighting approaches. Although rooted in long-standing traditions of military practice, vicarious warfare is sufficiently novel as to be identifiable as a distinct phenomenon. The precise manifestation or combination of vicarious methods vary according to the specific circumstances and political contexts prevailing in different theaters. However, America’s general preference is to fight its wars by delegating tasks to proxies and limiting exposure of its own military to danger. Where U.S. forces are employed directly, this takes place largely in the shadows. Such approaches have clear attractions, offer undoubted tactical advantages, and permit successive administrations to maintain a persistent tempo of operations that evades rigorous democratic scrutiny. Yet, prominent cases and numerous studies suggest that vicarious warfare has a high potential to generate counterproductive effects and significant strategic harm.  相似文献   
77.
战争复杂系统研究现状分析   总被引:1,自引:1,他引:0  
分析了经典复杂系统理论、仿真建模方法、综合集成方法以及作战实验室等方法在战争复杂系统研究中的应用,在此基础上,分析了国内外对战争复杂系统分析方法的共同特点,指出了分析方法中存在的问题,进一步给出了战争复杂系统分析方法中需要深入研究和完善的内容.  相似文献   
78.
实践当代革命军人核心价值观是当前公安警卫部队思想政治建设的根本任务。正确把握当代革命军人核心价值观的科学内涵及其在警卫部队的具体表现,坚持“以人为本”、“和谐文化”、“依法治军”和“长效机制”的理念,对警卫部队实践当代革命军人核心价值观具有重要意义。  相似文献   
79.
下反稳像炮控系统具有较好的动力特性,为了克服传统PI控制算法的缺陷,研发先进的控制算法,提出了将笔记本电脑嵌入到炮控系统中,建立半实物炮控仿真平台的具体实施方法,为炮控系统先进控制算法的实现和性能评估提供了快捷实用的仿真开发环境。  相似文献   
80.
复杂战争系统建模与仿真需求及ABMS方法   总被引:1,自引:1,他引:0  
复杂战争系统与一般的物理系统相比,建模与仿真条件、要求与过程有着明显差异。在论述战争系统及其复杂性的基础上,分析了复杂战争系统一般的建模与仿真方法及存在的问题,重点分析研究了基于Agent的建模与仿真(ABMS)方法。将ABMS方法应用于信息化战场多传感器仿真演示,验证了其对复杂战争系统建模与仿真的可行性与有效性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号