首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   317篇
  免费   34篇
  国内免费   51篇
  2023年   4篇
  2022年   1篇
  2021年   19篇
  2020年   11篇
  2019年   30篇
  2018年   12篇
  2017年   21篇
  2016年   23篇
  2015年   4篇
  2014年   28篇
  2013年   38篇
  2012年   17篇
  2011年   16篇
  2010年   10篇
  2009年   26篇
  2008年   17篇
  2007年   22篇
  2006年   17篇
  2005年   23篇
  2004年   17篇
  2003年   7篇
  2002年   5篇
  2001年   8篇
  2000年   4篇
  1999年   4篇
  1998年   4篇
  1997年   3篇
  1995年   4篇
  1994年   2篇
  1992年   1篇
  1991年   2篇
  1990年   2篇
排序方式: 共有402条查询结果,搜索用时 156 毫秒
61.
网络中心战中的协作及其量化模型研究   总被引:3,自引:0,他引:3  
协作是网络中心战的原则之一.协作的概念及其量化模型是目前网络中心战研究中的一个热点.在详细解释了信息时代中协作的概念基础上,分析研究了协作的维以及网络中心战中的信息域和认知域的协作,指出协作既有利也有弊.进而,将协作的影响简化为协作对完成作战任务的时间上的影响.利用信息熵量化了协作带来的"正影响",利用Logistic方程量化了协作带来的"负影响",综合这两种影响给出了简化的协作量化模型.最后指出了该模型适用于量化诸如防空作战中的协作等时间关键的协作.  相似文献   
62.
C4ISR领域本体研究初探   总被引:8,自引:0,他引:8  
如何实现C4ISR系统的跨越式发展,是当前的研究重点。本体论作为最新的知识工程化技术,信息系统建设是其研究、应用的重要领域。通过分析C4ISR系统特点及未来军事发展趋势,结合C4ISR系统建设的实际情况,阐述了军事领域开展本体研究的广阔前景,并探求建立C4ISR领域本体库,对本体库的作用及发展过程提出了初步设想,在C4ISR系统建设和本体应用两方面做出了有益的探索。  相似文献   
63.
随着防空反导作战环境的日益复杂,快速准确地进行真假目标识别显得尤为重要。针对多源目标决策级识别中冲突证据融合问题,在综合分析现有改进证据理论方法的基础上,引入新的冲突度量系数,提出了一种通过在融合流程中增加智能判断环节,以冲突系数为判断依据,对具有不同冲突系数证据选择不同组合规则进行证据组合的融合方法,并给出了策略的流程图。最后进行了实例验证,结果表明新策略能对不同未知信度和不同识别框架冲突证据进行快速有效的融合。  相似文献   
64.
次声波是一种频率变化范围在10?4 Hz~20 Hz之间的声波,它具有穿透力强、传输距离远以及不易被吸收的特点,以此制造的次声波武器伤人但不毁物。近年来,随着高新技术的不断发展,次声波武器在心理战领域得到了广泛应用。本文首先对次声波技术及次声波武器的概念进行了简要介绍;其次,研究了次声波的生物学效应,分析了次声波频率、声压强度以及作用时间与生物学效应的关系,发现三种次声波的作用参数与生物学效应之间的关系虽然错综复杂,但也有一定规律可循;最后,提出了次声波武器在心理战的三个潜在应用前景,即利用次声波穿透力强的特点发展对掩体人员作战的心理战装备、利用次声波的生物学效应发展反恐作战的心理战装备以及利用次声波的生理致伤机理发展心理战防护装备。  相似文献   
65.
导弹是由各种类型装备组成的综合性很强的复杂系统,智能技术的引入进一步丰富了智能导弹质量特性的内涵,对质量检测和控制提出了更高要求,需要开发与之相适应的检测方法。本文先给出了智能导弹的定义和内涵,分析了其智能特性,接着概述了智能化导弹的结构组成,分析了各智能部件的功能和结构组成,从智能化导弹结构组成及测试参数、智能化部件的嵌入式软件作用、零部件机械加工精度等方面提出了智能化导弹质量检测的需求,并在此基础上结合智能化制造等技术提出了在线检测、自动检测/测试、BIT自检、软件测评技术以及弹载遥测的智能化导弹质量检测途径和方法。  相似文献   
66.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article.  相似文献   
67.
Although Africa is host to the vast majority (and the most deadly) of conflicts in the world, it would appear that there is a distinct lack of genuine interest in African affairs shown by the UN Security Council and its key members. This paper proposes a 10-level scale of response system to measure the seriousness of the Council in dealing with conflicts. By comparing the Council response with the size and severity of each individual conflict, the scale attempts to assess the Council performance in the fulfilment of its duty to restore international peace and security. The results show that Africa has been (and remains) marginalized in the Council work.  相似文献   
68.
This article had its genesis in a background study for the development of a new Australian Army counter-insurgency doctrine. Archival research showed that the Australian counter-insurgency doctrine employed in such post-1945 conflicts as Burma, Malaya, Borneo and Vietnam originated in the jungle campaigns of the South West Pacific Area during World War II. The historical record also showed that the Army's counter-insurgency doctrine, as with its World War II-jungle warfare doctrine, was a pragmatic amalgam of Australian experience and British doctrine. The article traces this process through the development of a series of doctrine manuals. It also considers the contribution of key individuals to both counter-insurgency theory and practice. This distinctively Australian approach to the development of doctrine was responsible for producing a highly successful manual, The Division in Battle: Pamphlet No. 11, Counter-Revolutionary Warfare (DIB 11), which the Army used during its involvement in Vietnam.  相似文献   
69.
This study develops the concepts of fourth generation operations and the associated principles. First, the concept of fourth generation operations is introduced and defined. Fourth generation operations are the evolution and extension of third and fourth generation warfare based on a change of tactics, technology, and combatants. These operations are currently ongoing in Afghanistan and Iraq, and with the global war on terrorism. Based on the framework of US joint doctrine, the supporting principles of fourth generation operations are developed. This requires the introduction of the principle of Population Perception.  相似文献   
70.
ABSTRACT

This article discusses the Rhodesian Front regime propaganda warfare strategy during Zimbabwe’s war of liberation. It uses the case of the Chilonga area of Chiredzi located in the south-east of Zimbabwe to demonstrate that propaganda warfare was introduced as a measure to counter guerrilla infiltration and civilian cooperation with them. Drawing on ideas of military anthropology vis-à-vis the importance of cultural awareness in counterinsurgency, the paper argues that the efforts of the Rhodesian Front regime to use propaganda were fruitless. This is because they mostly ignored the culture of the Shangani, local people. Despite that, there were other reasons for the failure of the Rhodesian Front’s propaganda strategy, including the lack of conformity between politics and military action.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号