首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   741篇
  免费   50篇
  国内免费   41篇
  832篇
  2022年   1篇
  2021年   29篇
  2020年   32篇
  2019年   37篇
  2018年   30篇
  2017年   54篇
  2016年   39篇
  2015年   12篇
  2014年   92篇
  2013年   100篇
  2012年   36篇
  2011年   41篇
  2010年   53篇
  2009年   37篇
  2008年   32篇
  2007年   33篇
  2006年   35篇
  2005年   30篇
  2004年   31篇
  2003年   15篇
  2002年   13篇
  2001年   15篇
  2000年   7篇
  1999年   6篇
  1998年   3篇
  1997年   4篇
  1996年   3篇
  1995年   2篇
  1994年   2篇
  1993年   1篇
  1992年   5篇
  1991年   1篇
  1990年   1篇
排序方式: 共有832条查询结果,搜索用时 0 毫秒
71.
随着信息技术在战争中的大量应用,现代战争越来越呈现出网络化和体系对抗性,研究其拓扑特性已十分必要。基于复杂网络理论,首先建立了岸防作战体系网络模型,然后提出一种基于贪心思想的骨干网挖掘算法,最后对模型的骨干网络进行了研究。结果表明该方法能够快速、准确地挖掘出岸防作战体系的网络骨干,并能为军事对抗体系的复杂网络应用研究提供借鉴和参考。  相似文献   
72.
舰炮制导弹药发展研究   总被引:1,自引:0,他引:1  
从舰炮制导弹药的基本概念出发,结合其使命任务,对比中美两栖作战力量区别,指出发展低成本高精度制导兵器的必要性。总结当前国内外对制导弹药的研究现状,提取其关键技术,对比中外在顶层概念设计、系统交联、弹药实验测试等方面的发展差距,为下一步制导弹药的研究,提出了阶梯式、螺旋式发展、加强基础性研究工作、开展制导弹药协同控制技术研究等重要建议。  相似文献   
73.
Proxy warfare is a consistent element in international warfare. However, it is unclear why proxy relationships form in cases where states have multiple options of groups to support. Existing research identifies the presence of transnational constituencies, shared interstate rivalries, and moderate relative strength of militant groups as highly influential on the development of a proxy relationship. This study examines the presence of these variables within the context of the Lebanese Civil War. The results of this demonstrate that each state places greater importance on some variables and ignores others when choosing a proxy. Additionally, this study further demonstrates the presence of new variables that are key to the development of proxy relationships.  相似文献   
74.
Militaries rely on secure communications. Despite the permeation of cyber-systems throughout the operational environment, there is little readily available doctrine on cyber-warfare. Doctrine that does exist has not been coherently integrated. This paper introduces a Cyber Conceptual Framework, consisting of five questions pertinent to the future use of cyberspace. The authors enunciate a definition of cyberspace, expand on existing military doctrine to reject the conceptualisation of cyberspace as a domain, define cyber-conflict, define cyber-attack and describe the four components and five levels of a cyber-attack. This work develops a common framework from available doctrine and a lexicon for future discussion.  相似文献   
75.
The embellishment of a warrior biography has a long history but examples of veteran elaboration of traumatic experience have become increasingly apparent. Although legislative change in the UK has removed the penalties for fabrication and a progressive decline in the military footprint may have increased the likelihood of such false trauma narratives, a paradigm shift in explanations for mental illness underpins this phenomenon. The recognition of post-traumatic stress disorder (PTSD) in 1980, followed by studies to identify risk factors, led to a greater appreciation of psychological vulnerability. As a result, the use of shame to discourage acts formerly labelled as “cowardly” or “lacking in morale fibre” is no longer considered appropriate. Recent conflicts in Iraq and Afghanistan generated popular sympathy for service personnel, whilst media focus on PTSD has led the UK public to believe that most veterans have been traumatised by their tours of duty.  相似文献   
76.
With the rapid pace of regional arms modernization and unresolved territorial disputes, Indonesia is increasingly susceptible to the impact of emerging great power rivalry in Asia-Pacific. Rather than pursuing a robust military build-up, Indonesian policy-makers assert that diplomacy is the country’s first line of defense. This article argues that defense diplomacy serves two agenda of Indonesia’s hedging strategy – strategic engagement and military modernization. This way, Indonesian defense and security officials seek to moderate the impact of geopolitical changes while maintaining the country’s defensive ability against regional uncertainties.  相似文献   
77.
在讨论无线电系统的发展以及军用无线电现状的基础上,提出了利用软件无线电解决现存主要问题的方法.详细分析了软件无线电的基本概念、原理和典型软件电台的基本结构,并介绍了由美国空军负责研制的Speakeasy计划.  相似文献   
78.
针对军事物流的特点,本文分析了军事物流中物资储备、仓储管理和技术革新等存在的问题,并提出了相应的发展对策。  相似文献   
79.
The laser technology has made remarkable progress over the past couple of decades.It is being widely employed in diverse domains,such as holography,space sciences,spectroscopy,medical sciences,micro and power electronics,industrial engineering,and most distinctively,as directed energy military weapons.Owing to their active transmissions,laser systems are similar to microwave radars to some extent;however,unlike conventional radars,the laser operates at very high frequencies thus making it a potent enabler of narrow-beam and high energy aerial deployments,both in offensive and defensive roles.In modern avionics systems,laser target indicators and beam riders are the most common devices that are used to direct the Laser Guided Weapons(LGW)accurately to the ground targets.Additionally,compact size and outstanding angular resolution of laser-based systems motivate their use for drones and unmanned aerial applications.Moreover,the narrow-beam divergence of laser emissions offers a low probability of intercept,making it a suitable contender for secure transmissions and safety-critical operations.Furthermore,the developments in space sciences and laser technology have given syner-gistic potential outcomes to use laser systems in space operations.This paper comprehensively reviews laser applications and projects for strategic defense actions on the ground or in space.Additionally,a detailed analysis has been done on recent advancements of the laser technology for target indicators and range-finders.It also reviews the advancements in the field of laser communications for surveillance,its earlier state of the art,and ongoing scientific research and ad-vancements in the domain of high energy directed laser weapons that have revolutionized the evolving military battlefield.Besides offering a comprehensive taxonomy,the paper also critically analyzes some of the recent contributions in the associated domains.  相似文献   
80.
This paper investigates the relationship between military expenditure and FDI inflow conditioning on the exposure of a country to armed conflict in the long run. We apply the band spectrum regression estimator, and the maximal overlap discrete wavelet transform, to a panel of 60 developing countries, for the years 1990 to 2013. The estimated results indicate that military expenditure, in the absence of armed conflict, reduces FDI inflow. However, the negative effect is mitigated by increased military expenditure, in the presence of armed conflict. We also show that the effect of military expenditure on FDI is time sensitive, in that it takes time for military expenditure to affect FDI inflow. FDI inflow in response to higher military expenditure is higher for the country that faces higher armed conflict than the country that faces lower armed conflict. The findings are robust in the case of overall as well as internal conflict. These results are also robust to the alternative specification, subsample analysis with different armed conflict thresholds, and the estimation using the time variant long-run models.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号