全文获取类型
收费全文 | 1366篇 |
免费 | 6篇 |
国内免费 | 16篇 |
专业分类
1388篇 |
出版年
2025年 | 9篇 |
2023年 | 18篇 |
2022年 | 3篇 |
2021年 | 38篇 |
2020年 | 41篇 |
2019年 | 50篇 |
2018年 | 35篇 |
2017年 | 78篇 |
2016年 | 85篇 |
2015年 | 28篇 |
2014年 | 129篇 |
2013年 | 121篇 |
2012年 | 78篇 |
2011年 | 80篇 |
2010年 | 81篇 |
2009年 | 74篇 |
2008年 | 55篇 |
2007年 | 69篇 |
2006年 | 67篇 |
2005年 | 58篇 |
2004年 | 45篇 |
2003年 | 33篇 |
2002年 | 22篇 |
2001年 | 26篇 |
2000年 | 12篇 |
1999年 | 11篇 |
1998年 | 6篇 |
1997年 | 6篇 |
1996年 | 4篇 |
1995年 | 8篇 |
1994年 | 6篇 |
1993年 | 3篇 |
1992年 | 6篇 |
1991年 | 2篇 |
1990年 | 1篇 |
排序方式: 共有1388条查询结果,搜索用时 15 毫秒
201.
刘忠奎 《中国人民武装警察部队学院学报》2011,(11):56-61
袁国平是我党我军最早从事军队政治工作的杰出代表,在长期的军队政治生活实践中,袁国平从不成熟走向成熟,逐渐形成了一整套独有的从事政治工作的思想与方法,其内容广泛,特点鲜明,为搞好我党早期的军队政治工作做出了巨大贡献,其精华部分是我军思想工作建设的宝贵财富,对于当前的政治工作建设仍具有极大的参考价值。 相似文献
202.
Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA. 相似文献
203.
Kenton G. Fasana 《Defence Studies》2018,18(2):167-187
Cyberspace is an avenue of approach through which a military force can attain objectives of value. Through these cyber avenues of approach, military forces can engage, vet, organize, and direct human agents to accomplish specific activities. Although the objectives of these activities could differ from traditional military objectives, they still have military relevance. This particular manifestation of cyber conflict is neither a new domain of war nor something outside of warfare. Rather, it can be viewed as an emerging avenue of approach in the larger context of military operations, auguring benefits in the integration of cyber activities with operations. 相似文献
204.
ABSTRACTRomania faced one of the most dramatic transitions from authoritarian communism to become a democracy and a member of the North-Atlantic Treaty Organization (NATO) and the European Union (EU). The backbone of building a democratic society has been civilian control of the military. This article briefly describes the norms and institutions of democratic control of the intelligence services in Romania and assesses how the mechanisms of democratic control have worked in practice after almost three decades of reform. We argue that many of the post-1989 reforms have been only superficial implemented and monitored, particularly after Romania joined NATO and the EU. The article concludes that the democratic control of intelligence in Romania is an unfinished business. There are structural shortcomings embedded in the process of democracy consolidation that need to be addressed. 相似文献
205.
Per Marius Frost-Nielsen 《Journal of Military Ethics》2018,17(1):21-35
In this article, I outline a holistic approach to the military concept of “Rules of Engagement” (ROE), which complements the legal aspects of ROE with considerations of operational and political requirements for the use of military force. Drawing upon two illustrative cases from the US military experience with the use of ROE, I demonstrate that ROE for any particular military operation should be formulated to balance optimally, if not harmonize fully, the legal, operational and political concerns related to the use of force. In this task, political decision-makers and military practitioners alike are confronted with unavoidable and real-life dilemmas. How these dilemmas are handled has significant implications for how legal requirements concerning accountability and concerns for civilian lives in military combat can be preserved through ROE. 相似文献
206.
军队翻译能力是军队外语能力的组成部分。军队翻译能力的理论框架包含构成要素、存在形式和转换机制三个组成部分。新的安全形势对我军的翻译保障在广度和深度上都有了新的要求,而军队翻译能力供给相对不足。需要对军队翻译能力进行规划,加强翻译人力资源的储备与管理,提升翻译保障信息化水平。 相似文献
207.
由于契约的不完全性、专用性资产的存在,导致民企参军的谈判过程中,一方可能利用另一方因专用性资产投资的锁定效应,而采取机会主义行为将另一方套牢,攫取可占用专用性准租金。这种套牢风险不是单向的,而是双向的,双向套牢风险的存在不仅会降低军品科研生产项目建设质量,而且还会严重挫伤民营企业承担军品科研生产任务的积极性。为有效防范双向套牢风险,本文将从博弈论的角度,建立民营企业与军队采办部门的期望收益与专用性资产投资的函数关系和博弈矩阵,分阶段讨论民营企业与军队采办部门所面临的套牢风险大小及各自的最佳行为选择。以降低民企参军面临的套牢风险,引导更多优势民营企业进入军品科研生产与维修领域,推动军民融合的深度发展。 相似文献
208.
Paul Schuurman 《战略研究杂志》2017,40(7):1016-1038
In this article, I analyze the use of historical counterfactuals in the Campaign of 1815 by Carl von Clausewitz (1780–1831). Such is the importance of counterfactuals in this work that its gist can be given in a series of 25 counterfactuals. I claim that a central role is played by evaluative counterfactuals. This specific form of counterfactuals is part of a didactic method that allows Clausewitz to teach young officers a critical method that prepares them for the challenge of decision-making in real warfare. I conclude with the enduring relevance of Clausewitz’s use of evaluative counterfactuals for contemporary military historiography. 相似文献
209.
This article analyses the doctrine development of the People’s Liberation Army (PLA) coping with the Soviet military threat between 1969 and 1989. In the 1970s, the PLA applied a doctrine of ‘active defence and luring the enemy into depth’ based on its traditional operational art. In 1980, the PLA decided to focus its doctrine on positional defence. In 1986, the PLA introduced ‘integrated operations and prioritised strike’, a generalised doctrine that originated from its war history. Many organisational and intellectual challenges in peacetime doctrine development contributed to the PLA’s operational idealism, including its aging leadership, command structure, attitude towards its previous experience, limited analysis of contemporary military developments, and failure in test and validation of doctrines. In the post-Cold War decade, many of these challenges persisted in spite of military modernization efforts. The ongoing military reform has to address these challenges and improve the PLA doctrine development in peacetime. 相似文献
210.
Ian Westerman 《Defense & Security Analysis》2017,33(3):276-288
The existing guidelines for security sector reform (SSR) tend to draw on theoretical work in the field of civil–military relations, which in turn has been derived from Western, liberal democratic models of governance. Although guidelines strongly advise that local culture and context need to be considered when drawing up objectives for post-conflict SSR programmes, this is not often reflected in practice. This article considers some of the reasons for this, citing both in-country challenges and donor-related issues, and suggests that one of the biggest problems is a lack of alternative, non-orthodox models of civil–military relations to draw upon. It is further suggested that elements of suitable alternative models may be found in states which possess political structures not entirely dissimilar to the Western, liberal democratic ideal, but which can offer different perspectives. Detailed research of these structures should produce a pool of sub-models which could then be employed to create bespoke, culturally appropriate objectives for use in post-conflict SSR programmes. 相似文献