首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2542篇
  免费   372篇
  国内免费   216篇
  2024年   3篇
  2023年   11篇
  2022年   20篇
  2021年   54篇
  2020年   60篇
  2019年   78篇
  2018年   99篇
  2017年   156篇
  2016年   133篇
  2015年   88篇
  2014年   227篇
  2013年   306篇
  2012年   159篇
  2011年   211篇
  2010年   161篇
  2009年   198篇
  2008年   158篇
  2007年   149篇
  2006年   159篇
  2005年   150篇
  2004年   133篇
  2003年   87篇
  2002年   64篇
  2001年   63篇
  2000年   39篇
  1999年   28篇
  1998年   28篇
  1997年   11篇
  1996年   19篇
  1995年   21篇
  1994年   16篇
  1993年   9篇
  1992年   11篇
  1991年   6篇
  1990年   7篇
  1989年   4篇
  1988年   2篇
  1987年   1篇
  1975年   1篇
排序方式: 共有3130条查询结果,搜索用时 15 毫秒
231.
主要对要地防空时多个可能的敌空袭兵器来袭方向进行了分析,并确定每个来袭方向的综合评价指标。应用模糊层次分析法建立多层次的评价指标体系,确立被评事物对各等级模糊子集的隶属度。应用灰色关联理论消除各个因素之间的量纲和数量级差异,将综合运算得到的量值进行排序比较,以供指挥员进行战场情况判断。  相似文献   
232.
针对网络攻防环境中防御方以提高系统生存能力为目的所进行的最优生存防御策略的选取问题,提出了一种基于完全信息动态博弈理论的生存防御策略优化配置算法。将恶意攻击方、故障意外事件及防御方作为博弈的参与人,提出了一种混合战略模式下的三方动态博弈模型,对博弈的主要信息要素进行了说明,以混合战略纳什均衡理论为基础,将原纳什均衡条件式的表达式转化为可计算数值结果的表达式,并据此增加了近似的概念,最后,将提出的模型和近似纳什均衡求解算法应用到一个网络实例中,结果证明了模型和算法的可行性和有效性。  相似文献   
233.
This study contends that an analysis of the nexus between leadership and security offers useful insights into explaining conflict by stating that the conceptualisation of these argots, especially through the definition of leadership as a process, helps to explain and address Nigeria’s security challenges. By arguing that leaders’ ability to establish mutuality with their followers in any situation and set collectively-generated means for attaining these set goals for societal security, the study shows how such a relationship creates a secured state. This is not the case in Nigeria, where leaders’ security decisions are influenced by external actors rather than by their followers. By showing that the Nigerian ruling elite’s security agendas intersect with dominant global notions of security while neglecting genuine security interests of ordinary Nigerians, the study contextualises the complex global and local security interests in Nigeria. The lack of an intersection at home, however, has contributed to the emergence of extremists such as the Boko Haram sect, as well as the escalation of the acts of violence they perpetrate. As national insecurities become complex and intractable, ‘elegant’ or unilinear solutions – such as a military approach – lack the capacity to address these problems.  相似文献   
234.
While recent work has attempted to update the research agenda for transatiantic defense burden-sharing, there remain significant gaps between the public choice defense economics literature and the security studies literature. The presence of such a gap is unfortunate, because defense spending choices are likely shaped by factors identified by the public choice literature, as well as the strategic and cultural variables that the security studies literature tends to focus on, as well as domestic macroeconomic factors. The independent variables identified in recent qualitative literature are extremely useful analytically, and, fortunately, they have reasonable proxies in available quantitative data, which enables scholars to study them across large groups of countries and many years. This article builds upon such work to synthesize the most notable of the factors identified in the current literature, and offers some common analytical ground that will benefit both scholars and practitioners..  相似文献   
235.
The existing guidelines for security sector reform (SSR) tend to draw on theoretical work in the field of civil–military relations, which in turn has been derived from Western, liberal democratic models of governance. Although guidelines strongly advise that local culture and context need to be considered when drawing up objectives for post-conflict SSR programmes, this is not often reflected in practice. This article considers some of the reasons for this, citing both in-country challenges and donor-related issues, and suggests that one of the biggest problems is a lack of alternative, non-orthodox models of civil–military relations to draw upon. It is further suggested that elements of suitable alternative models may be found in states which possess political structures not entirely dissimilar to the Western, liberal democratic ideal, but which can offer different perspectives. Detailed research of these structures should produce a pool of sub-models which could then be employed to create bespoke, culturally appropriate objectives for use in post-conflict SSR programmes.  相似文献   
236.
Insurgencies thrive in regions where government legitimacy is absent. In the post-war Philippines, Captain Charles T. R. Bohannan of the Army’s Counter Intelligence Corps became actively aware of this dynamic. Bohannan is best known for his later work with Edward Lansdale and Ramon Magsaysay in defeating the Huk Rebellion (1950–1954). Here the author examines Bohannan’s early investigative work against Japanese war criminals, wartime Filipino collaborators, and the rising threat of communist subversion most associated with the Huk. All of these experiences fed into what would be the successful campaign against the Huk, chronicled in his seminal work, Counter Guerrilla Operations: The Philippines Experience, and offers lessons on the investigative (as opposed to tactical or psychological) nature of effective counter-insurgency work, as it relates to both legitimacy in governance and the rise of insurgencies.  相似文献   
237.
周朴  陶汝茂 《国防科技》2017,38(3):051-057
美国联合非致命武器理事会在成立20周年之际发布了《联合非致命武器项目科技战略规划2016-2025》,对未来十年相关领域的科技发展做出了部署安排。本文介绍美国联合非致命武器项目的使命职能、组织机构、运行模型、代表性成果以及十年科技战略规划,旨在为技术创新和管理创新提供参考和借鉴。  相似文献   
238.
潘平 《国防科技》2017,38(4):005-007
国防科技和武器装备领域是军民融合发展的重点,也是衡量军民融合发展水平的重要标志。加快国防科技和武器装备军民融合发展,是保军强军的重要支撑,更关乎国家安全和发展一系列重大问题,必须从战略高度深刻领会其全局意义,以清醒头脑研判国防科技和武器装备军民融合发展形势,用务实举措推动国防科技和武器装备军民融合创新发展。  相似文献   
239.
孟轲  胡云飞 《国防科技》2017,38(1):118-120
在防空兵警戒雷达专业传统训练方法的基础上,结合新型警戒雷达技术体制特点,对新型警戒雷达训练进行的一系列探索,对于防空部队作战能力的提升起到了重要的推动作用。  相似文献   
240.
唐苏妍  祁永强  裴飞 《国防科技》2017,38(2):049-054
信息攻防作战力量既可以独立成军成战,又可以和各军兵种、各种武器平台无缝衔接、联合协同,以发挥无限的战争潜力,是以信息攻防新技术为支撑、以软硬打击新能力为标志的新型作战力量。从核心信息基础设施建设,信息攻击和防护能力建设以及信息攻防协同作战三个方面论述了信息攻防新型作战力量建设的重要问题及战法对策,对信息攻防作战的特点规律和技术手段进行了剖析。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号