全文获取类型
收费全文 | 876篇 |
免费 | 1篇 |
国内免费 | 4篇 |
专业分类
881篇 |
出版年
2025年 | 3篇 |
2023年 | 6篇 |
2022年 | 1篇 |
2021年 | 33篇 |
2020年 | 34篇 |
2019年 | 48篇 |
2018年 | 35篇 |
2017年 | 55篇 |
2016年 | 41篇 |
2015年 | 12篇 |
2014年 | 95篇 |
2013年 | 105篇 |
2012年 | 43篇 |
2011年 | 41篇 |
2010年 | 53篇 |
2009年 | 37篇 |
2008年 | 32篇 |
2007年 | 33篇 |
2006年 | 35篇 |
2005年 | 30篇 |
2004年 | 31篇 |
2003年 | 15篇 |
2002年 | 13篇 |
2001年 | 15篇 |
2000年 | 7篇 |
1999年 | 6篇 |
1998年 | 3篇 |
1997年 | 4篇 |
1996年 | 3篇 |
1995年 | 2篇 |
1994年 | 2篇 |
1993年 | 1篇 |
1992年 | 5篇 |
1991年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有881条查询结果,搜索用时 15 毫秒
231.
Amira Jadoon 《Small Wars & Insurgencies》2013,24(3):587-614
ABSTRACTU.S. military aid provides recipient governments the fighting capability they require to undermine domestic militant groups, which can undermine groups’ leadership structures and trigger group splintering. In this environment, brutal attacks against non-combatants become an effective mechanism for targeted groups to signal their resolve and outbid competitors. A large-n analysis of U.S. military aid between 1989 -2011 links higher levels of military aid with higher levels of rebel-perpetrated civilian killings, and deaths due to explosive attacks on non-combatant targets. A closer examination of the case of Pakistan sheds further light on the underlying causal mechanisms. 相似文献
232.
Military intelligence forms a vital element of counter-insurgency operations. When the Colombian military suffered setbacks at the hands of the FARC in the 1990s, military intelligence received much of the blame. It was also accused of human rights violations. With the help of US. financed Plan Colombia, military intelligence has been reorganized, expanded, strengthened with upgraded technical capabilities, constrained to operate within defined legal boundaries, and refocused to match the government's strategic priorities. Human intelligence has laid the groundwork for impressive tactical and operational results since 2006. Nevertheless, like all intelligence services, that of the Colombian military continues to experience problems of structure and political outlook. 相似文献
233.
Kjell Hausken 《Defence and Peace Economics》2013,24(5):517-519
Kovenock and Roberson's (2012a, b) replication of Hausken’s (2008a) equations and parameter restrictions do not enhance our insight into the defense and attack of reliability systems. This reply intends to fill the remaining understanding gaps. 相似文献
234.
AbstractThis paper examines the impact of civil war on military expenditure. We employ two measures of military expenditure: the share of military expenditure in general government expenditure and the logarithm of military expenditures. We would reasonably expect a priori that military expenditure as a share of general government expenditure increases during a civil war and that such increases would taper off over the duration of a civil war. We also explore whether the termination of a civil war induces a decline in the share of military expenditure as a share of the general government expenditure in the short-run. We find evidence the of share of military expenditure increases during a civil war and falls in the year succeeding the end of a civil war, and, in particular, if a war ends in a peace treaty. The level of military expenditures, however, rises during civil wars and does not appear to decline in the short-term after the end of a civil war. 相似文献
235.
ANDILE SOKOMANI 《African Security Review》2013,22(4):81-90
“Lack of money is the root of all evil” George Bernard Shaw In a environment where party financing, private funding in particular, is generally a laissez-faire business, as in most Southern African countries, there is the real risk that interest groups and wealthy individuals will buy influence in political parties and in so doing erode public confidence in the political system. Because they are neither open to public scrutiny nor subject to any legislative restraints, huge private donations can, and often do, come with strings attached. This lack of transparency and openness, as well as mechanisms to prevent it, provides ample ground for influence peddling, where those who pay the piper call the tune. Left unchecked, this party funding scenario will continue to be a serious indictment of the region's democratisation projects, crippling democracy and stunting economic development. This article consid 相似文献
236.
ABSTRACTThis study seeks to evaluate the threat of malicious chemical use by non-state actors. It finds that non-state actors have primarily turned to ready-to-use crude chemical weapons (CW) instead of traditional CW agents. Interestingly, the worst crude CW attacks have been more destructive than those employing traditional CW. Scenarios for catastrophic consequences exist, but chemical attacks have typically been used to accomplish tactical goals, which leverage psychological and economic impacts. Therefore, successful efforts to counter CW proliferation by non-state actors must be substantially different from those targeting states. 相似文献
237.
一种基于知识的作战计划系统设计 总被引:1,自引:1,他引:0
作战计划系统是复杂的问题求解系统,在军事领域的各个方面发挥着重要的作用。介绍了当前一些主要的作战计划辅助生成系统及其特点,分析比较和归纳整理了当前军用计划系统所采用的一些常见规划技术和优缺点,重点分析了作战计划系统中的智能规划技术。在此基础上,提出了一种基于知识的作战计划辅助生成系统的开发设想,构建了系统知识库,系统采用层级任务网络规划技术,给出了这种规划技术的理论框架和算法过程,并且把这种技术与多主体规划技术相结合,辅助实现军事作战任务的逐层分解与规划优化,进而生成完整的行动序列,较好地解决了作战计划辅助生成问题。 相似文献
238.
对敌后侦察反军事诱骗的远程火力打击战法的定量分析是战役研究中尚未解决的关键问题之一,根据信息作战原理,运用仿真和统计学分析的混合方法,建立基于概率的二人非零和(TPNZS)非合作博弈模型,设计基于侦察与诱骗博弈的远程火力打击战法,定量分析我方的敌后侦察和敌方的军事诱骗对远程信息与火力联合打击能力的影响,并对一个典型实例的初步试验及分析结果表明:与敌后侦察和军事诱骗有关的正确识别目标和错误识别目标的概率以及远程火力命中目标的概率是评估远程信息与火力联合打击能力的关键,而对评估结果进行博弈分析则是远程火力打击战法设计的关键,用识别正确目标和错误目标能力以及远程火力命中目标能力描述的基于敌后侦察与诱骗博弈的远程火力最优打击战法为Δ*=(0,Δ2*,1-Δ2*)=(0.0000,0.7727,0.2273),被打击方对远程火力打击的最优战法为π*=(π1*,0,1-π1*)=(0.8511,0.0000,0.1489)。 相似文献
239.
基于CPN建模的行动方案开发与分析系统设计 总被引:1,自引:0,他引:1
协助和支持军事计划人员制订和分析作战计划的建模与仿真能力是军方的现行需求,而行动方案的开发与分析则是作战计划建模与仿真的重点。针对作战计划过程期间开发的军事任务的排序与调度问题,设计了一个行动方案开发与分析系统,系统采用客户机-服务器体系结构,运用基于有色Petri网建模的军事计划领域的概念表示法,并使用状态空间分析技术完成军事任务的自动化排序与调度。军事计划人员通过图形用户界面使用系统,在面对紧急突发事件时,可以快速及时地开发出适当可行的COA,并对COA进行逻辑可行性分析。 相似文献
240.