首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1010篇
  免费   241篇
  国内免费   125篇
  1376篇
  2024年   5篇
  2023年   14篇
  2022年   18篇
  2021年   21篇
  2020年   33篇
  2019年   36篇
  2018年   22篇
  2017年   64篇
  2016年   79篇
  2015年   35篇
  2014年   80篇
  2013年   89篇
  2012年   81篇
  2011年   81篇
  2010年   46篇
  2009年   86篇
  2008年   79篇
  2007年   64篇
  2006年   72篇
  2005年   70篇
  2004年   72篇
  2003年   36篇
  2002年   40篇
  2001年   26篇
  2000年   14篇
  1999年   18篇
  1998年   22篇
  1997年   17篇
  1996年   7篇
  1995年   15篇
  1994年   9篇
  1993年   6篇
  1992年   8篇
  1991年   5篇
  1990年   4篇
  1989年   2篇
排序方式: 共有1376条查询结果,搜索用时 15 毫秒
121.
This article had its genesis in a background study for the development of a new Australian Army counter-insurgency doctrine. Archival research showed that the Australian counter-insurgency doctrine employed in such post-1945 conflicts as Burma, Malaya, Borneo and Vietnam originated in the jungle campaigns of the South West Pacific Area during World War II. The historical record also showed that the Army's counter-insurgency doctrine, as with its World War II-jungle warfare doctrine, was a pragmatic amalgam of Australian experience and British doctrine. The article traces this process through the development of a series of doctrine manuals. It also considers the contribution of key individuals to both counter-insurgency theory and practice. This distinctively Australian approach to the development of doctrine was responsible for producing a highly successful manual, The Division in Battle: Pamphlet No. 11, Counter-Revolutionary Warfare (DIB 11), which the Army used during its involvement in Vietnam.  相似文献   
122.
This article explains the demise of Sierra Leone's Revolutionary United Front (RUF) rebellion. It argues that the main cause of this fate was the group's relationship with its primary sponsor, Charles Taylor. The RUF's dependency on Taylor's patronage, coupled with the rebellion's weak organisational endowments harmed the group's prospects of success. Based on original research, the article shows how Taylor used the RUF as a strategic instrument for his own regional interests, which led to the group's unravelling. More broadly, the article speaks about proxy warfare in Africa and how the relationship between resource flows and rebellion are not always beneficial to rebels as one might expect.  相似文献   
123.
ABSTRACT

This paper evaluates Boko Haram’s military capabilities and details the process of how its standing army, driven by these capabilities, came to pose a phased threat between 2013 and 2015 in particular. This was a period when military fighting dominated the insurgency in north-east Nigeria. Whereas there is an abundance of literature on Boko Haram’s histories and the impact of its insurgency on north-east Nigeria, analysis of Boko Haram’s military campaigning is still deficient. Attempting to fill this gap, this paper uses field findings and battlefield case studies from north-east Nigeria to highlight how Boko Haram’s overt front – its standing army – came to supplant its guerrilla operations as the main security threat to the frontier area.

This pivot towards military fighting, for a group initially composed of a few ragtag combatants, on the surface might seem surprising. Yet, whereas Boko Haram may lack the popular support required for ‘people’s war’, classic insurgency theories nevertheless hold some explanatory power for this deliberate shift: away from guerrilla warfare as the expedient of the weaker side, and towards the use of a large standing army of locals to swarm, and sometimes successfully overrun, state forces.  相似文献   
124.
可靠性对于军事传送网而言显得尤为重要。数字交叉连接(DXC)设备提供了一个灵活的冗余和保护以满足用户的需求,有利于最小化服务中断时间。文中首先介绍了DXC设备及其应用;其次,讨论了基于DXC设备的恢复应该考虑的问题;最后,结合军事传送网的特点,提出了恢复策略,并对此进行了讨论。  相似文献   
125.
基于模糊-组合神经网络的信息系统安全风险评估   总被引:1,自引:0,他引:1  
针对信息系统的安全风险评估问题,提出了一种将模糊理论与神经网络进行"浅层次"结合的评估方法。通过对信息系统所涉及的风险因素分别从资产影响、威胁频度、脆弱性严重程度三方面进行分析,建立了信息系统的安全风险层次化结构,并构造了各因素所对应评判集的隶属度矩阵;综合运用模糊推理算法与神经网络仿真技术,对信息系统的安全风险进行评估,进而判定信息系统安全风险等级。最后,通过实例分析说明了算法的应用,并借助误差分析检测了模型的有效性。  相似文献   
126.
基于SV、JYK系列滑行艇的阻力、浸湿面积、航行纵倾角试验数据,采用RBF神经网络建立了深V型滑行艇阻力预报数值图谱;针对艇艉底部横向斜升角变化的有限试验数据,提出了一种基于小样本试验数据的阻力修正方法。试验表明,该方法对深V型滑行艇(折角线长度与最大折角线宽度比在4~5.5,面积负荷系数在5.5~7,重心纵向相对位置在3%~9%,艉部艇底斜升角在5°~25°之间变化)阻力预报是可行的。在相同精度下,针对该文研究的问题,RBF神经网络所需时间少于BP神经网络。  相似文献   
127.
离散动态贝叶斯网络是对动态系统进行建模和定性推理的有力工具。由于观测证据会随时间增加,直接计算推理算法的公式会变得冗长而且推理速度还会下降。在直接计算推理算法的基础上推导出递推公式,并给出算例验证。递推计算公式简洁,仿真表明递推算法的推理速度较直接计算推理算法有明显提高,因而适合实时在线推理。最后将递推算法应用于航天器的态势感知。  相似文献   
128.
根据无标度网络理论对军事信息网络进行分析,认为军事信息网的逻辑层应为符合幂指数分布的无标度网络,传统的以泊松分布为理论基础的随机网络分析方法已不再适用,并通过构建随机网络和无标度网络的实例进行了对比分析,进一步论证了这个结论.根据无标度网络理论,对军事信息网的抗毁性特点进行了分析,得出了"对随机攻击鲁棒性强,对智能攻击脆弱性高"的结论,并提出了以网络连通性为标准,判定节点重要性的一般方法.参照国外的先进网络应用经验,针对军事信息网节点间非常不均衡的无标度特性,给出了"关键节点热备份"和"物理节点分散配置"的抗毁策略.  相似文献   
129.
针对C^4ISR组织结构的复杂特点,运用社会网络分析概念分析军事C。ISR(指挥、控制、通信、计算机、情报、监视和侦察)组织结构,旨在对军事组织结构中的C^4ISR的效能给出一种定量分析的方法。具体讲,就是描述了FINC(力量、情报、网络和指挥控制)方法,给出了大量的基本运算法则来比较和定量分析C^4ISR组织结构的组织网络,便于更全面地分析评估不同组织结构的费效比,并将其应用于一个想定的C^4ISR组织结构中。  相似文献   
130.
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号