首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   504篇
  免费   38篇
  国内免费   16篇
  2024年   1篇
  2023年   1篇
  2021年   14篇
  2020年   8篇
  2019年   29篇
  2018年   29篇
  2017年   33篇
  2016年   32篇
  2015年   17篇
  2014年   51篇
  2013年   99篇
  2012年   8篇
  2011年   30篇
  2010年   34篇
  2009年   33篇
  2008年   38篇
  2007年   23篇
  2006年   17篇
  2005年   18篇
  2004年   12篇
  2003年   15篇
  2002年   5篇
  2001年   3篇
  2000年   1篇
  1999年   2篇
  1998年   1篇
  1995年   2篇
  1993年   1篇
  1990年   1篇
排序方式: 共有558条查询结果,搜索用时 15 毫秒
551.
周炎明  兰旭  熊俊芬 《国防科技》2020,41(5):111-118
随着“大智移云物”的出现和发展,战争形态已经发展到智能化战争新阶段。为了打赢未来智能化战争,推进军队财务管理实现智能化,充分利用军事大数据这一新兴重要战略资源尤为必要。本文利用需求分析法和现象分类法,从经费需求测算、预算编制、军费支出和军费绩效评估四个方面分析了军队财务管理领域应用军事大数据的需求。针对当前存在的运用军事大数据观念淡薄、数据采集困难、数据挖掘处理能力较弱、数据安全威胁及军事大数据人才缺乏等五个问题,从大数据应用观念的树立、软硬件设备的更新、数据中心的建设、应用框架的构建、信息化管理制度的完善、数据安全管理和大数据人才队伍建设几个方面提出了在军队财务管理领域应用军事大数据的思路。  相似文献   
552.
ABSTRACT

While most contemporary analyses of South Asian nuclear dynamics acknowledge the presence of a strategic triangle between the region’s three nuclear players, the primary focus usually remains on the rivalry between India and Pakistan. Discussions of Sino-Indian relations remain limited. This is likely attributed to the stability in the two countries’ relations, yet it is worth asking why this stability exists and whether it is likely to continue in the future. Although China and India have an acrimonious relationship, their asymmetric nuclear capabilities and threat perceptions mitigate the danger of a traditional security dilemma. India may perceive China’s nuclear aggrandizement to be a security threat, but the same is not true of China, which has a vastly superior nuclear force and is largely shaping its nuclear-force structure in response to the threat it perceives from the United States. This dynamic makes a serious conventional or nuclear conflict highly unlikely.  相似文献   
553.
ABSTRACT

The paper’s goal is to analyses the potential of the Iranian defence industry, including both research-and-development and production capabilities. It is argued that, despite official statements about the great power and sophistication of the Iranian defence industry, in reality its capabilities are very limited and cannot meet the operational needs of the Iranian armed forces. At the same time, it is argued that many official releases, which are abundantly available in the Iranian press and often unthinkingly repeated by the Western media, do not present the real and value of military products, but are rather a tool for deception and propaganda.  相似文献   
554.
ABSTRACT

This article analyses findings from an original survey of 187 private military contractors on their incentives for working in the industry. Perceptions of contractors as “greedy, ruthless, and unscrupulous mercenaries” shape both public and military opinions of outsourcing and may impact U.S. military effectiveness, civil–military relations, and contractor identity. We find that contractors are motivated by a range of factors and that their financial experiences are not clearly more positive than that of state military troops. We recommend broad education of military and defense officials and the public in the U.S. and other relevant nations, regarding the true incentives of modern-day, Western contractors, in an effort to dispel misperceptions, increase effective utilisation of contractors, and beneficially shape PMC-military coordination. DoD may consider integrating such training into its current efforts to improve outsourcing, including its Joint OCS Planning and Execution Course, pre-deployment fora, and curricula of advanced military studies schools.  相似文献   
555.
ABSTRACT

The United States’ global strategic outlook has shifted markedly since the end of major combat operations in Iraq and Afghanistan. As the United States’ strategic posture shifts, the nature of military operations is simultaneously changing rapidly. Many analysts predict that cyber-operations, autonomous weapons systems, artificial intelligence, and clandestine special forces operations will be central features in future conflicts. Although often overlooked by scholars and policy analysts, defence contractors are integral to the development and implementation of these emerging categories of warfare. This inquiry examines the evolving nature of the American defence industry and the roles corporations play in current theatres of conflict. Surprisingly, rather than becoming less reliant on defence contractors after their much-maligned performance in the wars in Iraq and Afghanistan, American military and intelligence agencies have become more dependent on the private sector as technology becomes increasingly central to warfare.  相似文献   
556.
ABSTRACT

Bagayoko, Hutchful, and Luckham correctly argue that the structures, characteristics, and operating methods of official security institutions in Africa have been somewhat neglected, with a lack of much recent research. The Somali National Army (SNA) sits among these lacunae. Its formal structures can be used as a skeletal starting point and springboard to start to draw the network diagrams that chart informal linkages. This is why recent declassification decisions by U.S. intelligence bodies, coupled with period documents released to the UK National Archives, hold significance in helping us understand early hierarchical SNA arrangements. They show the steady build-up in size of the force, to 1987, to about the time the civil war began to fragment the state.  相似文献   
557.
ABSTRACT

Over a decade of security force assistance (SFA) initiatives to build an effective Somali National Army (SNA) failed because of the interrelated effects of political, contextual and operational challenges. The key political challenges were interest asymmetry between international actors and Somali elites, insufficient focus on institution-building and a lack of donor coordination. The principal contextual challenges in Somalia were the legacies of two decades of state collapse and the negative effects of clan dynamics. The main operational challenges were building an army while simultaneously fighting a war, the complexities of military integration, and the severe capability gaps afflicting the SNA.  相似文献   
558.
ABSTRACT

The rising trend of kidnapping targeting women has shown that counterinsurgency does not begin and end with the strategic advantage of state security providers in the security market and the field. Kidnapping of females by Boko Haram insurgents threatens human security and hinders sustainable development goals in Northeastern Nigeria. With primary and secondary sources, this qualitative study examines how Boko Haram insurgents target women in Northeastern Nigeria. The paper argues that community driven security strategy achievable through the collaboration between state and traditional security providers, can prevent the entry and easy escape of the insurgents. It concludes that the forces of order should sustain a policy of stop and searches until insurgents are defeated along with a programme of community-based human rights education and insurgency emergency response system for quick response to security threats.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号