首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   196篇
  免费   0篇
  国内免费   4篇
  200篇
  2025年   1篇
  2024年   2篇
  2023年   3篇
  2022年   1篇
  2021年   7篇
  2020年   11篇
  2019年   14篇
  2018年   17篇
  2017年   12篇
  2016年   12篇
  2015年   7篇
  2014年   15篇
  2013年   40篇
  2012年   7篇
  2011年   6篇
  2010年   5篇
  2009年   4篇
  2008年   4篇
  2007年   5篇
  2006年   10篇
  2005年   3篇
  2004年   3篇
  2001年   1篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1990年   3篇
  1989年   3篇
排序方式: 共有200条查询结果,搜索用时 0 毫秒
51.
There is widespread acknowledgment that the modus operandi of jihadis affiliated with Al Qaeda and associated movements (AQAM) relies on brutal terror-inducing tactics which, more often than not, target Muslim and non-Muslim non-combatants. This article comparatively analyzes the AQAM modus operandi within the traditional stipulations of Islamic precepts with respect to waging jihad al saghir. The purpose is to glean whether or not such tactics such as suicide bombings, declaring fellow Muslim apostates in order to kill them, use of IEDs and EFPs to target civilians, constitute legitimate rules of engagement in jihad al saghir.  相似文献   
52.
基于CPN建模的行动方案开发与分析系统设计   总被引:1,自引:0,他引:1  
协助和支持军事计划人员制订和分析作战计划的建模与仿真能力是军方的现行需求,而行动方案的开发与分析则是作战计划建模与仿真的重点。针对作战计划过程期间开发的军事任务的排序与调度问题,设计了一个行动方案开发与分析系统,系统采用客户机-服务器体系结构,运用基于有色Petri网建模的军事计划领域的概念表示法,并使用状态空间分析技术完成军事任务的自动化排序与调度。军事计划人员通过图形用户界面使用系统,在面对紧急突发事件时,可以快速及时地开发出适当可行的COA,并对COA进行逻辑可行性分析。  相似文献   
53.
为了更好地评价机动作战路线的优劣,运用模糊数学的方法,结合机动路线选择的特点,建立了机动路线选择的指标体系,采用层次分析法(AHP)对指标体系的各个因素的权重进行了确定,并在模型的基础上对机动路线选择辅助决策系统的软件设计进行了构思。利用辅助决策软件对机动作战路线选择,快捷方便,特别是能够在多条路线中选取最优,实现了由定性分析转入定量分析的轨道,有助于提高指挥决策的科学性和客观性。  相似文献   
54.
联合作战通信的完备性指标的建模分析与计算   总被引:1,自引:1,他引:0  
从联合作战用户对通信需求的实际出发,探讨了完备性指标的定义及数学描述,并根据通信节点和通信链路所受破坏的不同情况研究了完备性指标的几种分析方法,最后结合实例,采用其中一种全代数化的算法,并对其进行了改进来实现联合作战通信的完备性指标的计算.  相似文献   
55.
遂行非战争军事行动训练是公安现役部队教育训练的重要内容。近年来其训练效果在公安现役部队履职实践中得到了良好的体现。但面对日益复杂的斗争形势,公安现役部队在进行常规训练的同时,应更加突出应急训练、联合训练和心理训练,以更好地完成党和人民赋予的神圣使命。  相似文献   
56.
    
This paper looks at the impact of military technology diffusion on military assistance operations (MAO), in the United States known as Security Force Assistance or SFA. The discussion looks conceptually at the role of technological change and how it interacts with martial cultures in military assistant operations. I argue that growing trends in science and technology suggest potential conflicts between culture and technology. Relying on a culture-technology model drawn from anthropology, the paper contends that new technologies will present increasing challenges for the emerging MAO landscape. The paper will illustrate that the techno-science gap will continue to grow as innovations such as robotics, sensors, and networks continue to develop. Finally, the paper will look at ways to overcome this conflict between culture and technology.  相似文献   
57.
Following Russia’s annexation of Crimea and its initial actions in eastern Ukraine in 2014, the term hybrid warfare has received much public attention. Many have argued that the Russian actions we saw in Ukraine were part of a completely new strategy while others have suggested that there was nothing new in Russia’s actions. This article takes a critical look at these claims. Through the assessment of the history of the term hybrid warfare and a rigorous analysis of the so-called Gerasimov doctrine, this study finds that the Russian hybrid warfare strategy is rather a western myth than a formal comprehensive Russian strategic concept. Additionally, through the assessment of the Russian use of information operations and the way she has utilised the cyberspace in several recent conflicts, the study finds that against all claims Russia did not make these areas its main battlefield, but rather has been using them in support of its traditional concepts.  相似文献   
58.
    
It is known that the proportionate flow shop minimum makespan F m / p r p t / C max problem is solved optimally by any permutation job sequence. We show that the F m / p r p t / C max problem is at least ordinary NP‐hard when missing operations are allowed and present some solvable cases. We then consider the standard proportionate flow shop problem (with no missing operations) and show that the solution algorithms for a class of single‐machine due date assignment problems can be extended/generalized to the corresponding proportionate flow shop problems. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 98–106, 2015  相似文献   
59.
    
Cyberspace is a new domain of operation, with its own characteristics. Cyber weapons differ qualitatively from kinetic ones: They generate effects by non-kinetic means through information, technology, and networks. Their properties, opportunities, and constraints are comparable to the qualitative difference between conventional and nuclear weapons. New weapons and their target sets in a new domain raise a series of unresolved policy challenges at the domestic, bilateral, and international levels about deterrence, attribution, and response. They also introduce new risks: uncertainty about unintended consequences, expectations of efficacy, and uncertainty about both the target’s and the international community’s response. Cyber operations offer considerable benefits for states to achieve strategic objectives both covertly and overtly. However, without a strategic framework to contain and possibly deter their use, make state and non-state behavior more predictable in the absence of reciprocal norms, and limit their impact, an environment where states face persistent attacks that nonetheless fall below the threshold of armed conflict presents a policy dilemma that reinforces collective insecurity.  相似文献   
60.
    
This article examines the ways in which the two normative concerns of casualty-aversion and civilian protection influenced US military strategy in the particular context of the asymmetric conflict in Somalia in the early 1990s. The article critically evaluates US military operations through the prism of international humanitarian law and examines whether American forces started prioritizing casualty-aversion over the safeguarding of Somali civilians. Finally, by drawing on emerging moral guidelines (such as Michael Walzer's idea of ‘due care’), the article examines whether lower numbers of Somali civilian deaths could have been achieved if marginal increases to the risks faced by US soldiers had been accepted.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号