首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1715篇
  免费   567篇
  国内免费   236篇
  2024年   7篇
  2023年   17篇
  2022年   20篇
  2021年   44篇
  2020年   43篇
  2019年   45篇
  2018年   37篇
  2017年   103篇
  2016年   132篇
  2015年   83篇
  2014年   157篇
  2013年   188篇
  2012年   148篇
  2011年   118篇
  2010年   108篇
  2009年   149篇
  2008年   103篇
  2007年   127篇
  2006年   157篇
  2005年   133篇
  2004年   103篇
  2003年   78篇
  2002年   62篇
  2001年   66篇
  2000年   33篇
  1999年   49篇
  1998年   37篇
  1997年   33篇
  1996年   21篇
  1995年   17篇
  1994年   17篇
  1993年   17篇
  1992年   16篇
  1991年   19篇
  1990年   20篇
  1989年   8篇
  1988年   1篇
  1987年   2篇
排序方式: 共有2518条查询结果,搜索用时 15 毫秒
711.
介绍了光电精确制导武器和光电对抗装备的特点,进而分析得出要地防空中要采用分层对抗战术,并分析了实施方法和运用方式,给出了战术配置原则,从技术、战术和地形气候方面分析了影响战术配置的因素,对部队开展基地训练中的光电对抗战术训练具有一定的参考价值。  相似文献   
712.
针对舰炮火控雷达高精度实时仿真建模的问题,运用高斯分布和正态平稳过程的两种误差序列生成方法,建立火控雷达简化仿真模型。通过对某火控雷达实测数据误差的统计及时序相关性分析,完成误差序列仿真生成与验证,给出了实现舰炮火控雷达探测误差仿真的优选方法。实践证明,正态平稳模型的误差生成方法可以有效满足新型舰炮仿真试验火控雷达建模要求。  相似文献   
713.
针对装备技术发展管理的重用度和冗余度问题,研究了体系网络建模与结构优化方法。将装备技术抽象为节点,技术关系抽象为边,提出了基于装备技术描述属性框架和技术关系分析的体系网络建模方法;将3种经典的网络社团探测方法应用于装备技术聚类,通过比较评估指标,生成了技术聚类优化方案;基于加权网络中心度算法,识别了对体系冗余影响最大的装备技术。以包含235项激光武器装备技术的技术体系为例,验证了方法的有效性,总结了体系结构的优化结论。  相似文献   
714.
The creation of an African Capacity for Immediate Response to Crisis (ACIRC) is a sign of Africa's willingness to take its destiny into its own hands. Presented as a reaction to the slowness of the development of the African Standby Force (ASF), it is also a response to some of the ASF's conceptual weaknesses. This decision reflects a wish to establish an instrument better equipped to deal with the challenges Africa is facing. Departing from the (sub)regional logic of the ASF results from a desire to take into account the transnational nature of threats, while its enlarged mandate is meant to offer Africa the capacity to intervene in all kinds of conflicts, including by undertaking peace enforcement activities. But the obstacles on the road towards the actual creation and mobilisation of this capacity should not be underestimated. These include material difficulties, but also political tensions, between ‘small’ and ‘big’ states as well as between the African Union and subregional organisations. The risk then is high that the ACIRC, whose announcement came as a reaction to France's intervention in Mali, ends up joining the ranks of the many ‘anti-imperialist’ phantoms haunting the history of the Organization of African Unity/African Union (OAU/AU). Confronted by events considered ‘neocolonial’ initiatives, African actors have indeed traditionally reacted by launching grand projects that never got off the ground. However, by actually establishing this new instrument, they may also demonstrate that times have definitively changed.  相似文献   
715.
Over the last decade, the Iranian Government budget on military has been higher than the average of the world. The current increasing international sanctions aim to reduce the military capabilities and capacities of the Iranian Government. We analyze the response of the Iranian economy to shocks in its military budget from 1959 to 2007, using impulse response functions and variance decomposition analysis. The Granger causality results show that there is unidirectional causality from the military spending growth rate to the economic growth rate. The response of income growth to increasing shocks in the military budget is positive and statistically significant.  相似文献   
716.
This paper provides a political economy analysis of the evolution of unmanned aerial vehicles (UAV), or ‘drones’ in the USA. Focus is placed on the interplay between the polity and private economic influences, and their impact on the trajectory of political, economic, and military outcomes. We identify the initial formation of the drone industry, trace how the initial relationships between the military and the private sector expanded over time, and discuss present relationships. Understanding the historical evolution of UAV technology, as well as the major players in the industry today, is important for ongoing policy debates regarding the use of drones both domestically and internationally.  相似文献   
717.
仿真体系结构解决了各自领域内仿真资源的互操作问题,而体系结构间的互操作是解决多种仿真资源互操作的有效方法.由于通信协议、中间件和对象模型的不同,体系结构间不能直接进行信息交互.对象模型间的相同点是异构仿真系统间互操作的基础.建立异构系统对象模型与通用数据交换模型的映射关系,通过模型转换实现各异构系统间的数据交互,最后通过"点对点"和通用网关间的时延比较,总结了通用网关的性能特点.  相似文献   
718.
If international terrorism is on a rising trend, an important source of confirmation or refutation of this is time‐series data on terrorist activity. Using chiefly data collected by the RAND/MIPT consortium we show using basic statistical analysis that in the period 1968–2005 the yearly number of all international terrorist incidents shows no trend over time, but fluctuates year on year in a random manner. On the other hand some indicators do show a definite trend over time, principally the steady rise in the number of incidents that are death‐dealing in nature. A further conclusion is drawn, showing that the proportion of these incidents leading to deaths above a given level is virtually fixed.  相似文献   
719.
This article presents a dynamic model in which counterterrorism policies have the potential to generate positive public support for terrorism via a backlash that may fuel terror recruitment. For an optimizing government aiming at maximizing security, this phenomenon produces a natural bound on proactive counterterror policy that is related to the dynamic path of conflict. Moreover, terror is a persistent phenomenon that requires patience on the part of the target government for optimal counterterror policies to be realized. Finally, the potential for backlash yields insights into the need for target governments to fight an information war to change public opinion regarding its own policies and the ultimate effect of terror attacks.  相似文献   
720.
Abstract

The mandate of South Africa's recently appointed National Planning Commission includes addressing ‘defence and security matters’. This article seeks to outline the central elements of the threat environment facing South Africa in the foreseeable future. It is argued that South Africa faces no meaningful existential threat from conventional military forces but that its security forces will need to be prepared to address possible raids and attacks by conventional military forces both on home soil and on vital interests beyond the nation's borders. Other threats highlighted include the threats posed by potential insurgencies, by terrorism, and by crime, social unrest and banditry. Also addressed is the danger of so-called hybrid threats, in which two or more of the single threat types outlined here are combined. Finally, the article challenges the National Planning Commission to rethink South Africa's policy on peace operations in the light of the need to ensure the safety and security of the nation's citizenry.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号