首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   552篇
  免费   76篇
  国内免费   19篇
  2024年   1篇
  2023年   4篇
  2022年   5篇
  2021年   9篇
  2020年   14篇
  2019年   24篇
  2018年   15篇
  2017年   44篇
  2016年   40篇
  2015年   26篇
  2014年   49篇
  2013年   55篇
  2012年   43篇
  2011年   37篇
  2010年   28篇
  2009年   35篇
  2008年   19篇
  2007年   20篇
  2006年   22篇
  2005年   25篇
  2004年   35篇
  2003年   14篇
  2002年   9篇
  2001年   9篇
  2000年   15篇
  1999年   6篇
  1998年   6篇
  1997年   3篇
  1996年   3篇
  1995年   9篇
  1994年   2篇
  1993年   6篇
  1992年   2篇
  1991年   4篇
  1990年   9篇
排序方式: 共有647条查询结果,搜索用时 31 毫秒
131.
Following Russia’s annexation of Crimea and its initial actions in eastern Ukraine in 2014, the term hybrid warfare has received much public attention. Many have argued that the Russian actions we saw in Ukraine were part of a completely new strategy while others have suggested that there was nothing new in Russia’s actions. This article takes a critical look at these claims. Through the assessment of the history of the term hybrid warfare and a rigorous analysis of the so-called Gerasimov doctrine, this study finds that the Russian hybrid warfare strategy is rather a western myth than a formal comprehensive Russian strategic concept. Additionally, through the assessment of the Russian use of information operations and the way she has utilised the cyberspace in several recent conflicts, the study finds that against all claims Russia did not make these areas its main battlefield, but rather has been using them in support of its traditional concepts.  相似文献   
132.
We consider preventive transshipments between two stores in a decentralized system with two demand subperiods. Replenishment orders are made before the first subperiod, and the stores may make transshipments to one another between the subperiods. We prove that the transshipment decision has a dominant strategy, called a control‐band conserving transfer policy, under which each store chooses a quantity to transship in or out that will keep its second‐subperiod starting inventory level within a range called a control band. We prove that the optimal replenishment policy is a threshold policy in which the threshold depends on the capacity level at the other store. Finally, we prove that there does not exist a transfer price that coordinates the decentralized supply chain. Our research also explains many of the differences between preventive and emergency transshipments, including differences in the optimal transfer policies and the existence or nonexistence of transfer prices that coordinate the system. © 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
133.
随着海洋经济的迅速发展,海上人、财、物的流动急剧增加,海上治安形势日趋复杂。海上抢劫、盗窃、偷渡及贩枪贩毒等犯罪活动呈多发态势,这严重破坏了海上的生产作业秩序,危害了海上治安秩序的稳定。研究海上犯罪案件的特,点,有助于公安边防部门采取有针对性的侦查方略,有力地打击海上犯罪,以创造安全、有序的海上治安环境。  相似文献   
134.
边防行政复议是规范边防行政执法和对边防行政执法相对人权益进行救济的重要途径。当前边防行政复议主要存在立法不完善、复议机构设置不完善、复议工作人员法律素质偏低、复议案件审查程序不严谨等方面的问题。加强和完善边防行政复议,主要应从立法、机构设置、转变观念等方面入手。  相似文献   
135.
调查外语受蚀时间对语言学习策略使用频率的影响。调查发现,学习者学习策略的使用频率,特别是记忆策略、认知策略和补偿策略的使用频率,随着受蚀时间的增加逐渐降低。  相似文献   
136.
“重述神话”的写作策略及其实践立足于民族神话的精神源泉,把神话的寓意和象征以及民族心理的把握有机结合起来,采用暗示和寓言的策略,从本土文化中演绎文学的构想并注入诗意的因素,力图凸显传统与现代接壤的特质。  相似文献   
137.
This article examines contemporary modes of American warfare. It posits the concept of “vicarious warfare” as a means of capturing prominent patterns in warfighting approaches. Although rooted in long-standing traditions of military practice, vicarious warfare is sufficiently novel as to be identifiable as a distinct phenomenon. The precise manifestation or combination of vicarious methods vary according to the specific circumstances and political contexts prevailing in different theaters. However, America’s general preference is to fight its wars by delegating tasks to proxies and limiting exposure of its own military to danger. Where U.S. forces are employed directly, this takes place largely in the shadows. Such approaches have clear attractions, offer undoubted tactical advantages, and permit successive administrations to maintain a persistent tempo of operations that evades rigorous democratic scrutiny. Yet, prominent cases and numerous studies suggest that vicarious warfare has a high potential to generate counterproductive effects and significant strategic harm.  相似文献   
138.
保障性分析在现役装备维修资源确定中的应用   总被引:1,自引:0,他引:1  
针对我军现役装备维修保障资源建设中的弊端,分析了在现役装备维修保障资源确定中实施保障性分析的可行性,并介绍了与传统保障性分析的不同点及其主要流程,从而为我军现役装备维修保障的确定与配置实施提供了一个良好的思考方向。  相似文献   
139.
We have asymptotically solved a discrete search game on an array of n ordered cells with two players: infiltrator (hider) and searcher, when the probability of survival approaches 1. The infiltrator wishes to reach the last cell in finite time, and the searcher has to defend that cell. When the players occupy the same cell, the searcher captures the infiltrator with probability 1 ? z. The payoff to the hider is the probability that the hider reaches the last cell without getting captured. © 2002 John Wiley & Sons, Inc. Naval Research Logistics, 49: 1–14, 2002; DOI 10.1002/nav.1047  相似文献   
140.
核心维修能力,是解决军队建制维修力量与地方维修力量如何结合、如何结合合理、如何结合才能取得最佳效果,成功推行军民一体化装备维修保障的瓶颈问题。从美军核心维修能力的研究背景着手,分析了核心维修能力研究的必然性和重要性,全面阐述了美军核心维修能力的内涵和现行判定方法,客观分析了美军核心维修能力研究中存在的一些不足,得出开展我军核心维修能力研究的重要启示。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号