首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   103篇
  免费   3篇
  国内免费   3篇
  2022年   1篇
  2021年   3篇
  2020年   6篇
  2019年   7篇
  2018年   6篇
  2017年   6篇
  2016年   3篇
  2015年   2篇
  2014年   11篇
  2013年   34篇
  2012年   3篇
  2011年   3篇
  2010年   2篇
  2009年   4篇
  2008年   2篇
  2007年   3篇
  2006年   3篇
  2005年   1篇
  2003年   4篇
  2000年   1篇
  1999年   2篇
  1997年   1篇
  1992年   1篇
排序方式: 共有109条查询结果,搜索用时 15 毫秒
81.
论证了对流层气体分子平均质量的变化相对于温度的变化可以忽略,并利用对流层大气温度随海拔高度变化的规律,研究其压强随高度的变化规律,明确了其参数的意义.同时,在海拔超过10000 m时,国际气压方程出现了越来越明显的误差,提出了合理的修正方法,并发现其温度变化远小于近地面的情况.  相似文献   
82.
定量的近距空战训练对抗态势分析方法   总被引:1,自引:0,他引:1  
针对近距对抗态势分析不能量化的不足,提出一种定量的近距空战训练对抗态势分析方法。该方法以对抗过程中双方的位置关系为基础,结合近距空空导弹的攻击包线,建立位置优势函数和武器优势函数,通过两类函数的线性组合构造对抗态势函数,实现了空战训练对抗态势的定量描述。通过算例验证了该方法的合理性和有效性。  相似文献   
83.
本文提出一种用于研究战术弹道导弹攻防对抗及电子战的面向对象的仿真模型,结合导弹攻防对抗仿真的特点给出仿真模型的结构,并讨论了相应的仿真算法。  相似文献   
84.
Why do states make substantial military contributions to coalition operations, while at the same time apply reservations, or caveats, to how the coalition can use the military contributions? Caveats rose to prominence in defense and policy circles with NATO’s campaign in Afghanistan. In the scholarly security literature, the term remains a buzzword for all types of reserved efforts by states in coalition warfare, but there are few theoretical accounts addressing caveats. This article contributes to the knowledge gap on caveats through a comparative case study of Denmark’s, the Netherlands’, and Norway’s contributions to NATO’s intervention in Libya in 2011. It demonstrates that caveats can occur through three different causal pathways: compromises from domestic bargaining, handling of alliance commitments, and implementation and civil–military relations. Insights into the complexity that causes caveats are highly relevant for both political and military decision-makers that are trying to coordinate states’ effort in coalition operations.  相似文献   
85.
The United States’ Air Force (USAF) has developed and used unmanned aerial vehicle (UAV) technology to monitor and assassinate dangerous terrorists in Afghanistan, Iraq, Libya, Pakistan, Somalia, Syria, and Yemen. Currently, there are few countries that possess armed UAV and since the US created much of this technology, the USAF is usually part of the training that automatically accompanies the purchase of its UAVs. The research question this article attempts to answer is, “What is the extent of the United States’ Air Force assistance in the training and proliferation of UAV technology to foreign militaries?”  相似文献   
86.
印度开展外空技术试验遭受了来自国际舆论的谴责、强国遏制与外空法约束等多个方面的压力.当今世界航天大国都在竞相开展外空技术试验.当各国面临相似的问题时,应尽快开展研究,找出如何以合理的理由、灵活的手段开展试验,同时集结优势力量开展国际合作.本文深入分析主要航天国家对印度开展外空试验的主要压制手段,以此剖析印度外空技术试验...  相似文献   
87.
本文从当今国际维和行动现状出发,分析了国际维和行动的特点,剖析了国际维和行动面临的挑战问题,最后对国际维和行动的发展提出几点思考,并系统阐述了维和行动的相关问题。  相似文献   
88.
In the last decade, cyber conflict has become a main feature of international politics and a growing concern for strategic stability and collective security. Unfortunately, cyber conflict suffers from a lack of conceptual clarity about its impact on collective security and a lack of consensus among international actors on how to interpret it. This article proposes to understand cyber conflict as an evolving process driven by two factors: the way in which digital space is configured and the way in which tactical, organizational, strategic, and doctrinal characteristics related to cyber have been included in the field of national and international security. Both tend to encourage offensive behavior but also demonstrate features pointing to restraint.  相似文献   
89.
The upsurge in post-Cold War coalition operations has stimulated research on caveats: national reservations on the use of force in multinational military operations. However, because the concept of caveats has no agreed-upon definition, it is used inconsistently. This in turn impedes comparing research findings across academic and policy studies and therefore systematic research. This article is a contribution to the scholarly debate on how the analytical concept of caveats are to be delimited. Crucially, we argue that caveats result from some calculated political decision, and should not be confused with reserved behavior due to financial and technical limitations, or lack of coordination. We suggest that caveats are empirically observed and measured in two ways: First, we argue that coalition rules of engagement should be used as a yardstick for measuring direct reservations on the use of force. Second, we suggest reservations on task-assignment and geographical mobility should be used to register indirect reservations.  相似文献   
90.
While unmanned aerial vehicles (UAVs) have become a standard element of modern armed forces, African countries have been reluctant to acquire remotely piloted aircraft for military purposes until recently. This is mainly due to a lack of industrial capabilities and, for military purposes so far, procurement policies that have concentrated on small arms and light weapons, more prestigious armoured vehicles and combat aircraft. Moreover, counter-insurgency strategies in Africa tend to focus on manoeuvre warfare, co-opting rebels or fighting them using armed proxies. As a consequence, international counterterrorism operations against fanatical and reckless groups like al-Qaeda in the Islamic Maghreb and Boko Haram in sub-Saharan Africa are characterised by a strong dependence on Western forces providing UAV-based reconnaissance and, in some cases for the United States, military strikes by drones. This essay reviews some of the incentives and problems of the use of UAVs in the African context. Given the geographical and military conditions of asymmetric warfare in Africa, and potential problems concerning international law, ethical aspects of the use of arms, and civil–military relations notwithstanding, it is argued that African security forces should develop their own UAV capabilities by intensifying their cooperation with Western armed forces.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号