首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   4175篇
  免费   775篇
  国内免费   301篇
  2024年   7篇
  2023年   15篇
  2022年   42篇
  2021年   75篇
  2020年   79篇
  2019年   92篇
  2018年   97篇
  2017年   213篇
  2016年   169篇
  2015年   133篇
  2014年   364篇
  2013年   398篇
  2012年   288篇
  2011年   384篇
  2010年   293篇
  2009年   344篇
  2008年   264篇
  2007年   300篇
  2006年   271篇
  2005年   244篇
  2004年   226篇
  2003年   168篇
  2002年   129篇
  2001年   128篇
  2000年   75篇
  1999年   71篇
  1998年   57篇
  1997年   39篇
  1996年   45篇
  1995年   45篇
  1994年   49篇
  1993年   21篇
  1992年   33篇
  1991年   25篇
  1990年   34篇
  1989年   18篇
  1988年   12篇
  1987年   3篇
  1975年   1篇
排序方式: 共有5251条查询结果,搜索用时 31 毫秒
951.
针对信息化海战的特点和对鱼雷的要求,提出了在信息化海战条件下鱼雷应该具备的一些战术和技术能力,如在网络体系中及时可靠获取信息的能力、更强的对抗能力、先进的导航定位能力、远程的水声通信能力等,并对鱼雷航程和航速之间的关系重新进行了分析,以期为新型鱼雷的研制和开发提供一定的参考。  相似文献   
952.
针对战法仿真实验的复杂性及其仿真可信度要求,结合基于战法仿真实验的综合集成研讨厅平台,分析了专家在战法仿真实验中的地位和作用,研究提出了仿真实验中专家的行为要求和规范,为基于战法仿真综合集成研讨厅的创新应用提供了理论和方法。经应用证明,该方法可以有效地提高战法仿真过程的透明度和仿真实验结果的可信度。具有很强的适应性和实用性。  相似文献   
953.
针对组网雷达系统在跟踪目标发生机动时采用自适应滤波来估计目标状态的特点,在点迹融合数据处理结构的组网雷达基础上提出了一种欺骗干扰优化策略.根据状态和量测方程描述了组网雷达跟踪目标的模型,同时建立了跟踪机动目标的自适应滤波模型.在此基础上,建立了欺骗干扰模型,并在目标机动检测约束下,推导了虚假目标欺骗干扰对于组网雷达融合...  相似文献   
954.
‘Doctrine’ has been part of military vernacular for at least a century. Nonetheless, it is a concept which is rather under-explored. The aim of this article is thus to break doctrine down into its component parts in order to grasp what a military doctrine actually is. Thereafter, the article points out different ways to utilise doctrine as a military devise. A doctrine cannot be, or rather should not be, all things to all men. On the contrary, doctrine can be a tool of command, tool of education or a tool of change. The main upshot of the article is that the future of doctrine is far brighter than its critics want us to believe.  相似文献   
955.
Many well-established explanations for war suggest that cyber weapons have a greater chance of being used offensively than other kinds of military technologies. This response article introduces a research agenda for the study of cyber war, and offers an example – principal-agent problems in cyber operations – to demonstrate how rigorous theoretical and empirical work may proceed.  相似文献   
956.
During the July Crisis Britain’s foreign secretary, Sir Edward Grey, focused on organising a conference through which differences could be reconciled. After the war, he maintained that Germany’s unwillingness to join this conference was one of the immediate causes of war. This essay disputes Grey’s contention, arguing that his plans for a conference, based on a misleading analogy to the previous Balkan Crises, actually helped facilitate the outbreak of war in 1914 by sanctioning inaction in the first phase of the crisis (28 June–22 July) and by tacitly encouraging Russian mobilisation in the second phase (23 July–4 August).  相似文献   
957.
Despite all the talk of ‘hearts and minds’ being the key to counterinsurgency, local public opinion is rarely studied and when it is, it often yields surprising conclusions. Through analyzing polling data from Vietnam, Iraq and Afghanistan, this article shows that public opinion is less malleable, more of an effect rather than a cause of tactical success, and a poor predictor of strategic victory. As a result, modern counterinsurgency doctrine’s focus on winning popular support may need to be rethought.  相似文献   
958.
Stay-behind networks in France were set up starting in 1948 and were aimed at responding to the possibility of a Soviet armed attack into Western Europe. Participants were identified, and arms and explosives cached, to be activated in case of hostilities. This activity became folded into a multilateral effort under the Allied Coordination Committee (ACC) of NATO. In France, the network was run as a highly compartmented activity under the French external intelligence service (DGSE). As the Soviet threat receded, the stay-behind activity became more and more dormant, and in 1990 it was quietly disbanded, immediately after the P-2 scandal broke in Italy.  相似文献   
959.
Abstract

This article answers three questions: What is the nature of the Long War? How is progress (or lack thereof) to be assessed? Where is it likely to go next? An appreciation of Clausewitz shows that practical centers of gravity exist for the Long War, and that the conflict pivots upon the ability to persuasively link ideology to events via a strategic narrative. A close examination of an illustrative case study, the interaction between the US and the late Abu Musab al-Zarqawi in Iraq 2004 – 2006, shows that Al Qaeda has suffered a severe setback, but also that the nature of the war is set to shift yet again. Further tangible progress for the US requires waging the Long War as a global counterinsurgency based on a strategy of ‘selective identification’ (versus pure ‘disaggregation’) as well as an understanding of how to more effectively craft a strategic narrative.  相似文献   
960.
This article proposes two dual‐ascent algorithms and uses each in combination with a primal drop heuristic embedded within a branch and bound framework to solve the uncapacitated production assembly distribution system (i.e., supply chain) design problem, which is formulated as a mixed integer program. Computational results indicate that one approach, which combines primal drop and dual‐ascent heuristics, can solve instances within reasonable time and prescribes solutions with gaps between the primal and dual solution values that are less than 0.15%, an efficacy suiting it for actual large‐scale applications. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号