首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   287篇
  免费   12篇
  国内免费   9篇
  2021年   1篇
  2020年   14篇
  2019年   25篇
  2018年   24篇
  2017年   28篇
  2016年   20篇
  2015年   4篇
  2014年   29篇
  2013年   66篇
  2012年   8篇
  2011年   9篇
  2010年   8篇
  2009年   11篇
  2008年   13篇
  2007年   5篇
  2006年   4篇
  2005年   11篇
  2004年   6篇
  2003年   4篇
  2002年   3篇
  2001年   5篇
  2000年   2篇
  1999年   1篇
  1998年   1篇
  1995年   2篇
  1994年   1篇
  1990年   3篇
排序方式: 共有308条查询结果,搜索用时 78 毫秒
61.
Our paper investigates the political trajectories of armed actors in Mali since 2012, using recent theoretical advances on alliance formation and collapse in civil wars. Our paper establishes an analytically productive distinction between levels of wartime cleavages and factors shaping groups’ trajectories. Strategic alliances, we argue, emerge from anticipated benefits on the national political scene as well as in the local political economy. The two sets of considerations do not necessarily converge. This dual logic is studied through the cases of two armed groups, both siding with the government after originally aligning with jihadi and separatist coalitions respectively.  相似文献   
62.
卫星导航系统作为重要的战场传感器,已经成为现代战争不可或缺的重要组成部分,围绕卫星导航系统的攻防博弈由此兴起。针对美国首先提出的导航战概念,俄罗斯为进一步提升导航战作战实力,有针对性地采取了应对举措。文章介绍了导航战概念及相关作战案例,具体分析了俄罗斯应对导航战威胁的主要举措,并结合美俄围绕导航战开展的攻防博弈,得出掌握现代战争制导航权的改进方向。  相似文献   
63.
曾力宁  黄朝峰 《国防科技》2020,41(6):134-141
以自主武器为代表的人工智能正在掀起一场新的军事革命。保罗·沙瑞尔所著的《无人军队:自主武器与未来战争》一书通过技术概念解释、各路专家访谈与大量战场实例,深入浅出地探讨了自主武器的内涵、特点与影响。本文基于该书内容,结合相关文献、书籍、评论等资料,首先对自主武器与无人军队的内涵、现阶段的运用情况进行简要介绍;其次,通过对自主武器技术内核的分析,简要介绍自主武器在各类战争样式的运用、存在的反为敌方利用的可欺骗性风险和故障发生后产生更严重后果的不稳定性风险;最后从三方面总结自主武器对战争其他方面的影响,即对军队建设模式提出更高要求,对国际战略稳定的双重作用以及对战争法与战争伦理道德的挑战。  相似文献   
64.
Since a system and its components usually deteriorate with age, preventive maintenance (PM) is often performed to restore or keep the function of a system in a good state. Furthermore, PM is capable of improving the health condition of the system and thus prolongs its effective age. There has been a vast amount of research to find optimal PM policies for deteriorating repairable systems. However, such decisions involve numerous uncertainties and the analyses are typically difficult to perform because of the scarcity of data. It is therefore important to make use of all information in an efficient way. In this article, a Bayesian decision model is developed to determine the optimal number of PM actions for systems which are maintained according to a periodic PM policy. A non‐homogeneous Poisson process with a power law failure intensity is used to describe the deteriorating behavior of the repairable system. It is assumed that the status of the system after a PM is somewhere between as good as new for a perfect repair and as good as old for a minimal repair, and for failures between two preventive maintenances, the system undergoes minimal repairs. Finally, a numerical example is given and the results of the proposed approach are discussed after performing sensitivity analysis. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
65.
信息战是现代战争中重要作战样式,网络战是信息战的重要组成部分,分布式、网络化的计算机系统是信息作战中实施攻击与防护首要作战目标。根据网络作战的需求,从技术角度出发,首先对网络战的要素组成进行了分析,在此基础上将网络战划分为两个阶段,并对此进行了深入研究,最后提出了实施网络战的方法与步骤。  相似文献   
66.
目标选择的一个优化模型   总被引:7,自引:3,他引:4       下载免费PDF全文
坦克作战过程中 ,经常出现一个坦克群遭遇对方一个坦克群的情况 ,这时每辆坦克往往向威胁自身最大的目标开火 ,但这种选择的整体效果不一定最优。本文提出一种目标选择方法 ,使得最大限度地减轻了对方对己方的威胁 ,大大提高了作战坦克对敌杀伤效果  相似文献   
67.
对战备物资进行分类是选择储备模式的基础和重要前提。把战备物资分类问题抽象为战备物资的军事性和经济性评价问题,设计了物资分类评价指标体系,并对部分指标进行了说明;利用层次分析法确定各指标的权重,运用专家打分法完成指标打分,并对专家打分程序进行优化,增强战备物资分类的可操作性,由军事性和经济性两方面的得分确定战备物资所属类别;最后通过算例证明了分类方法的有效性。  相似文献   
68.
Abstract

How do warlords build their legitimacy and eventually exert authority? The case of Afghan leader Ahmad Shah Massoud demonstrates that warlords do not only build legitimacy through the internal provision of goods and services to the population under their control, but also build their legitimacy by projecting authority externally, through the development of their own form of diplomacy. In this article, I show that warlords develop complex and complementary legitimisation strategies that extend beyond their territorial realms to include consequential relationships with foreign actors.  相似文献   
69.
Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities.  相似文献   
70.
Abstract

Terms like ‘support’ and ‘collaboration’ are often used interchangeably to denote a loose set of acts or attitudes that benefit non-state armed groups (NSAGs). However, these terms are seldom defined, and the alternatives available to civilians are rarely identified. Moreover, existing approaches overlook that the interaction between civilians and NSAGs is often one between ruler and ruled, which makes obedience and resistance central. This paper proposes to conceptualize the choices available to civilians as forms of cooperation and non-cooperation, offers a typology, and discusses the implications for theory building on civilian and NSAG behavior, and on the functioning of armed social orders.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号