首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1467篇
  免费   213篇
  国内免费   163篇
  2024年   1篇
  2023年   2篇
  2022年   8篇
  2021年   44篇
  2020年   45篇
  2019年   48篇
  2018年   41篇
  2017年   94篇
  2016年   95篇
  2015年   33篇
  2014年   156篇
  2013年   145篇
  2012年   91篇
  2011年   107篇
  2010年   97篇
  2009年   105篇
  2008年   95篇
  2007年   90篇
  2006年   97篇
  2005年   102篇
  2004年   79篇
  2003年   49篇
  2002年   41篇
  2001年   40篇
  2000年   29篇
  1999年   18篇
  1998年   15篇
  1997年   13篇
  1996年   15篇
  1995年   10篇
  1994年   5篇
  1993年   7篇
  1992年   10篇
  1991年   5篇
  1990年   6篇
  1989年   2篇
  1988年   2篇
  1987年   1篇
排序方式: 共有1843条查询结果,搜索用时 15 毫秒
351.
Why does peacekeeping sometimes fail? How can effective peacekeepers increase the likelihood of success of a mission? The two main flaws in the current evaluations of peace operations are that they mainly rely on already concluded missions and that they make use of indicators that do not reveal micro-level dynamics. This article introduces an analytical framework relating the effectiveness of soldiers to their actual impact in their area of operation in a peace operation. The framework is called “unit peace operation effectiveness” (UPOE). Focusing on soldiers in peace operations, this article shows that: different units behave differently; emphasize different aspects of the mandate; and are effective in different ways. Ultimately, this has an actual impact on the end-state of the mission. It relies on and adapts classic security studies works to theoretically enrich the peacekeeping literature. The model is tested in an illustrative case study based on ethnographic work on French and Italian units in Afghanistan between 2008 and 2010.  相似文献   
352.
This article seeks to assess the magnitude of military reform in Indonesia and its impact in establishing greater levels of professionalism within the armed forces. To this end, the authors will offer some reflections on the studies of civil-military relations and military transformation for inculcating a higher degree of military professionalism; analyse to what extent the process of military reform in Indonesia has reshaped the institutional role of the armed forces; and discern three major strategic gaps in Indonesia's military reform, namely the “legal loopholes and regulation vacuum,” the “shortcomings of democratic civilian control,” and the “defence-economic gap.” This article asserts that military professionalism will grow more substantially depending on the ability of civilian elites to exercise effective control over the military and the capacity of the government to transform the military establishment keeping pace with strategic challenges and operational requirements.  相似文献   
353.
为了克服新形势下军事发展面临的一系列环境安全问题,不断加强军事环境管理工作,拓展并解析了军事环境安全的概念,建立了基于WSR方法论的军事环境安全三维分析模型.结合模型的“物理”、“事理”、“人理”分析,提出了一套相互关联的军事环境安全策略,为进一步深入研究并制定军事环境安全战略规划提供了重要参考.  相似文献   
354.
军备控制的目的是维护国家的安全和减少国家安全威胁.随着现代科学技术的发展和世界经济一体化进程的加快,国家安全威胁的因素与国家军事能力同步增长.尤其是现代信息技术的快速渗透和发展,不仅带来了安全隐患的增加,也加速了武器装备的更新换代,对国际军备控制产生了广泛的影响.  相似文献   
355.
宋阔益 《国防科技》2013,(5):110-112
信息化建设培训作为专题培训重要形式已在军队人才队伍建设中产生很大影响,基于问题驱动的培训是新形势下创新发展的重要探索和有益尝试.  相似文献   
356.
针对海洋环境对鱼雷等武器装备战术效能影响的试验数据和案例样本匮乏等普遍性问题,引入信息扩和模糊映射思想,并基于遗传算法改进和发展了最优窗宽扩散模型。该方法可从有限的试验样本中客观拟合出数据结构信息,进而实现有限数据样本信息的合理扩散。利用该方法进行了基于小样本案例的潜射鱼雷战术效能的海洋环境影响评估的信息扩散建模和仿真实验和对比分析。结果表明,窗宽优化的信息扩散模型可有效改进常规信息扩散模型的评估效果,对武器装备环境影响评估中普遍存在的小样本或信息不完备困难有一定参考应用意义。  相似文献   
357.
Information Management (IM) – the systematic ordering, processing and channelling of information within organisations – forms a critical component of modern military command and control systems. As a subject of scholarly enquiry, however, the history of military IM has been relatively poorly served. Employing new and under-utilised archival sources, this article takes the British Expeditionary Force (BEF) of the First World War as its case study and assesses the extent to which its IM system contributed to the emergence of the modern battlefield in 1918. It argues that the demands of fighting a modern war resulted in a general, but not universal, improvement in the BEF’s IM techniques, which in turn laid the groundwork, albeit in embryonic form, for the IM systems of modern armies.  相似文献   
358.
This article details two largely unreported atrocities by British forces operating against Arab rebels during the Arab revolt, 1936–9, at the Palestinian villages of al-Bassa and Halhul. It then examines the military-legal system that underpinned and authorised British military forces operating in aid of the civil power, suggesting that the law in place at the time allowed for a level of reprisals and punitive actions, such as happened at al-Bassa and Halhul. The article does not conclude that the law allowed for atrocities but it does argue that it gave a basic form and understanding to an operational method that was brutal and could lead to atrocities. It thus tests the idea in much of the literature on counterinsurgency that the British were restrained and used minimum force when compared to other colonial and neo-colonial powers fighting insurgents.  相似文献   
359.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   
360.
The current approach to countering the threat of improvised explosive devices (IEDs) in Afghanistan has met with limited success. The relative lack of success may be in part because the current approach is not holistic and discounts the social systems that foster the IEDs. Insurgents are using IEDs as a tool to further their strategic aims, but the coalition and to a lesser extent the Government of the Islamic Republic of Afghanistan (GIRoA) are attacking the IEDs as if they are an end in and of themselves. Combining network disruption with information change maximizes the opportunities for mitigating the IED threat. More specifically, to mitigate the IED threat requires disrupting the social and economic systems associated with IEDs, and at the same time providing alternative economic opportunities and improving rule of law and governance at the local level. In other words, counter-IED (C-IED) must be Counter-Insurgency (COIN) centric to be successful. This paper reviews the current state of C-IED efforts, identifies five main problems with the current approach, and suggests changes to reduce or mitigate the IED threat in Afghanistan.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号