首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   418篇
  免费   152篇
  国内免费   27篇
  2024年   2篇
  2023年   3篇
  2022年   4篇
  2021年   7篇
  2020年   10篇
  2019年   9篇
  2018年   8篇
  2017年   20篇
  2016年   31篇
  2015年   13篇
  2014年   48篇
  2013年   37篇
  2012年   40篇
  2011年   53篇
  2010年   29篇
  2009年   37篇
  2008年   36篇
  2007年   34篇
  2006年   23篇
  2005年   27篇
  2004年   21篇
  2003年   24篇
  2002年   8篇
  2001年   19篇
  2000年   13篇
  1999年   14篇
  1998年   2篇
  1997年   5篇
  1996年   7篇
  1995年   1篇
  1994年   1篇
  1993年   3篇
  1992年   2篇
  1991年   2篇
  1990年   2篇
  1988年   2篇
排序方式: 共有597条查询结果,搜索用时 15 毫秒
201.
实现军队思想政治教育人文关怀,是改进军队思想政治教育和促进我军现代化建设的重要任务。把人文关怀融入思想政治教育,使军队思想政治教育迈向更高层次,更加科学化。以马克思主义的人文精神及其内涵为基点,提出把人文精神融入军队思想政治教育中,在阐释军队思想政治教育实践人文关怀的路径上,实现官兵的个人发展和军队建设的和谐统一。  相似文献   
202.
针对临近空间高超声速目标(NSHT)防御问题,从NSHT的特点出发分析上升段拦截面临的难点,并建立了空基拦截模型,以此为基础分析拦截武器所需的能力并确定其指标,对于拦截系统的建设具有一定的借鉴意义。  相似文献   
203.
本文采取实证分析方法,通过对流行文化对新疆高校大学生价值观的影响进行问卷调查,得出流行文化对大学生价值观影响的结构维度包括政治价值观、生活价值观、自我价值观和婚恋价值观。在流行文化对大学生价值观的影响因素方面,性别、民族、对流行文化的了解程度、您在上大学前在什么类型的学校就读等影响显著。  相似文献   
204.
Secret French plans to launch guerrilla-style raids on the British Isles devised in the spring of 1796 were referred to as ‘chouanneries’. The name and concept behind these small-war operations were modelled on the irregular tactics used by the Chouan rebels in the Vendée, which the French state army had brutally quashed, but some wished to transfer into their institutional practice. Part of France's ongoing military strategy in the war against Britain, which included fomenting insurrection in Ireland, these irregular operations were to be manned partially by pardoned deserters and released convicts and prisoners of war. Of these, only Tate's brief invasion of Wales in 1797 was realised, but the surviving plans provide insightful historical lessons into an Anglophobic mindset shared by a small network of practitioners and policy deciders on the effectiveness of such shock and awe tactics. Largely motivated by the desire to take revenge for Britain's support of counter-revolutionaries in the Vendée, these plans could more aptly be referred to as counter-‘chouanneries’.  相似文献   
205.
天线阵载波相位双差的欺骗干扰检测技术   总被引:1,自引:0,他引:1       下载免费PDF全文
针对采用单一发射天线的导航信号欺骗干扰,研究了基于天线阵载波相位双差的欺骗干扰检测技术,采用代数方法证明了三元非线阵是进行导航信号到达角无模糊解算的最少阵元数和阵型要求,并以相应阵型为基础,提出了基于天线阵载波相位双差的欺骗干扰检测量构造方法,给出了检测性能的分析方法,定义了用于限制检测性能下降的最小检测门限。采用蒙特卡洛方法对所提检测方法的检测性能进行了仿真,结果验证了理论分析的正确性。  相似文献   
206.
利用时间窗权重进行航迹关联   总被引:1,自引:0,他引:1  
提出一种利用传感器测量数据的时间窗权重进行航迹关联的方法,将目标运动状态的多维向量(如距离、方位角、俯仰角等)分解为多个一维状态标量;根据每个状态标量与时间的关系,提取两条航迹的共同测量时间区间,将其划分为若干个时间窗,计算对应时间窗内的权重;根据时间窗权重差计算每一个状态标量的航迹相似度;应用DS理论或Bayes理论进行航迹关联决策。  相似文献   
207.

This paper explores some of the key issues associated with the restructuring of the defence industry. A comparison is made between the US and the European Defence Industrial Bases in terms of the drivers for change and the paradigms within which change has taken place. Having shown that some very important differences exist, the paper then explores the approaches that have been adopted for industry consolidation and references them to the academic literature on mergers and acquisitions (M&As) and strategic alliances (SAs). Given that most of the key defence players recognise the need to be global players, the paper presents an argument that the European firms’ experience of operating with a wide range of forms of corporate alliance will serve them in good stead for operating on a global defence scale. US firms, in contrast, have focused largely on M&A activity.  相似文献   
208.
Kovenock and Roberson's (2012a, b) replication of Hausken’s (2008a) equations and parameter restrictions do not enhance our insight into the defense and attack of reliability systems. This reply intends to fill the remaining understanding gaps.  相似文献   
209.
According to the International Committee of the Red Cross (ICRC) publication Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law, all civilians (including child soldiers) lose their immunity from direct targeting ‘for so long as’ their actions amount to direct participation in hostilities. All civilians can, however, access the revolving door of protection and return to their civilian activities – complete with full immunity from direct targeting – provided the nature of their direct participation was spontaneous and disorganised. Once it can be ascertained that their participation in hostilities amounts to continuous combative functions, they relinquish their access to the revolving door of protection, and can be targeted at all times until they abandon their formal or functional membership of the belligerent group. This piece analyses how the revolving door phenomenon and the notion of continuous combative functions apply in instances where civilian child soldiers are directly participating in hostilities.  相似文献   
210.
The roots of the information technology Revolution in Military Affairs (RMA) can be traced to the mid-1970s, when the West capitalized on scientific-technological developments to neutralize the threat posed by Soviet second echelons. However, the cultivation of the technological seeds of the American RMA preceded the maturation of the conceptual ones. Although it was the US that was laying the technological groundwork for the RMA, Soviet, rather than the American military theorists, were the first to argue that the new range of technological innovations constituted a fundamental discontinuity in the nature of war, which they dubbed the ‘Military-Technical Revolution’ (MTR). About a decade later, this fundamental Soviet approach to the transformations in military affairs was analyzed, adapted and adopted by the US, and designated the RMA. This article deals with the intellectual history of the Soviet MTR and the American RMA.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号