首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3404篇
  免费   646篇
  国内免费   225篇
  2024年   3篇
  2023年   8篇
  2022年   34篇
  2021年   53篇
  2020年   45篇
  2019年   73篇
  2018年   60篇
  2017年   147篇
  2016年   144篇
  2015年   100篇
  2014年   275篇
  2013年   366篇
  2012年   286篇
  2011年   339篇
  2010年   223篇
  2009年   242篇
  2008年   199篇
  2007年   234篇
  2006年   221篇
  2005年   218篇
  2004年   196篇
  2003年   167篇
  2002年   100篇
  2001年   110篇
  2000年   76篇
  1999年   59篇
  1998年   32篇
  1997年   37篇
  1996年   39篇
  1995年   29篇
  1994年   31篇
  1993年   24篇
  1992年   23篇
  1991年   23篇
  1990年   30篇
  1989年   16篇
  1988年   10篇
  1987年   2篇
  1975年   1篇
排序方式: 共有4275条查询结果,搜索用时 15 毫秒
181.
战争形态正加速向信息化战争演变,数字化作战成为主要形式,作战数据以前所未有的深度广度进入战争全脉络,成为作战的核心,影响着战争进程甚至决定成败。习主席高度重视作战数据建设,多次指出我军数据积累严重不足是军事斗争准备的短板弱项。因此,建设完善配套的作战数据库和形成战时高效的作战数据保障能力,对获取作战信息优势、提升指挥控制能力至关重要,对于提高我军基于网络信息体系的联合作战能力具有重要的支撑作用。  相似文献   
182.
技术预警是对技术突破和由此引起的军事、政治、经济和社会危机的预测,是从国家安全的根本利益出发,以保持己方军事优势、防止敌人"技术突袭"为宗旨的技术发展预测。研究回顾了国内外技术预警研究历程,从前期准备、预警清单、技术调查、分析评估等四个主要环节,全面分析国防领域技术预警的具体流程,为国防领域技术预警系统的构建与应用提供支撑。  相似文献   
183.
秦有权  陶西贵  杜博 《国防科技》2018,39(5):001-005
在分析海岸雷达阵地组成要素及其特点的基础上,针对海岸雷达阵地可能面临的侦察定位、软毁伤和硬打击等方面威胁,提出了避免和减少多种威胁毁伤作用的防护思路,探讨了规划布局、隐真示假、干扰致偏、喷涂加固等防护措施,为深入开展海岸雷达阵地防护技术研究和规划设计实践提供参考。  相似文献   
184.
刘念光 《国防科技》2018,39(6):001-004
习主席在庆祝改革开放40周年大会上的重要讲话,是新时代改革开放再出发的宣言书和动员令。学习贯彻习主席重要讲话精神,关键要全面推进学校深化改革创新,深刻认清弘扬改革创新精神对于建设世界一流高等教育院校的重大意义,牢牢扭住全面深化改革创新的主攻方向,科学处理深化改革创新的重大关系,既以顽强的战略定力坚定不移深化改革,又运用科学的工作方法积极稳妥地推进改革。  相似文献   
185.
为了得到发射装置设计因素和超高速碎片性能间的关系,考虑了药型罩的材料、炸药种类、装药长径比、药型罩的锥角、药型罩的厚度、药型罩顶部靠近装药侧的曲率半径等设计因素,采用AUTODYNTM,结合正交试验,对超高速碎片的发射过程进行数值模拟。结果表明,3种发射装置结构分别可以提供质量为1. 533 g的紫铜碎片、速度为11. 649 km/s的铝碎片、动能为85. 6 k J的铝碎片; 2种发射装置结构均可以提供质量大于1 g、速度高于11 km/s的密实结构圆柱状碎片。验证了仿真方法的可信性,对影响碎片性能的设计因素进行了分析、排序,并得到了这些设计因素与碎片质量、速度、动能的关系。  相似文献   
186.
Abstract

Libya in 2011 witnessed a real process of political change, though different from all the policy-oriented jargon equating transition with a teleological transition to democracy. Due to the resilience of the Qadhafi regime in power and with the essential role of NATO intervention, the process was eased out by a eight-month civil war. Governance in post-Qadhafi Libya was not done through the rebuilding of centralized authorities. But it took the specific form of the emergence of multiple non-state actors embedded in local dynamics and then connected with weakened central authorities that had access to the huge Libyan resources. That raised complex questions about the quality of this mode of governance, especially at a time of pressing problems for Libya and its neighbors, whether direct ones (Tunisia, Egypt, Mali) or farther countries across the Mediterranean sea: terrorism with the expansion of Da’esh into the country and flows of refugees crossing Libya’s uncontrolled borders and flowing into Italy and then Europe by thousands.  相似文献   
187.
Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA.  相似文献   
188.
Since the fall of the Taliban in late 2001, the Islamic Republic of Afghanistan (GIRoA), the United States, the United Nations, and the International Security Assistance Force (ISAF) have funded and led three different Disarmament, Demobilization, and Reintegration (DDR) programs. Despite a significant investment in time and treasure, all of them have failed to significantly reduce the number of insurgents or arbaki (militia). This article explores why these programs failed despite incorporating ideas from the prominent DDR schools of thought. Utilizing Stathis Kalyvas’ theory of The Logic of Violence in Civil War as a lens, this article argues that GIRoA and ISAF did not have sufficient control of territory to entice insurgents or arbaki to reconcile and/or reintegrate with the government. Further, in areas GIRoA nominally controlled in northern and western Afghanistan, regional powerbrokers who controlled these areas balked at these programs.  相似文献   
189.
Some U.S. military leaders have asserted that the United States, Japan, Australia, and India and the Republic of Korea are developing multilateral defense cooperation to deter aggression and uphold norms much like North Atlantic Treaty Organization (NATO) has in Europe. Frequent military exercises and China’s threats to freedom of navigation (FoN) and North Korea’s nuclear missiles comprise the motive force for such cooperation. However, cooperation thus far has been trilateral and minimal, given divergent national interests and dispersed geopolitical locations. Cooperation among Japan, Republic of Korea (ROK), and the United States is increasing given the threat, but ROK’s public opinion is divided about Japan. Australia, Japan, and India have increased cooperation with the United States but are reluctant to conduct FoN operations with the United States to challenge China’s expansionism in the South China Sea. If China becomes more aggressive and blocks FoN or seizes territory, development toward an Asian NATO is possible.  相似文献   
190.
设我方m艘战舰,对方n个来袭目标.运用灰色局势决策求得目标对各个战舰产生的威胁值排序;再用模拟退火算法,参考目标威胁,单舰根据自身装载的火力发射进行初步武器分配;最后将分配结果传送至融合中心,应用大系统理论的分解协调法,协调武器分配,使得我方武器对本批目标的打击概率最大.仿真基于VC++编程实现,具体分析了算法及思想的可行性.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号