首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   627篇
  免费   93篇
  国内免费   53篇
  2024年   1篇
  2023年   2篇
  2021年   20篇
  2020年   9篇
  2019年   29篇
  2018年   30篇
  2017年   39篇
  2016年   51篇
  2015年   23篇
  2014年   61篇
  2013年   111篇
  2012年   26篇
  2011年   46篇
  2010年   44篇
  2009年   46篇
  2008年   46篇
  2007年   31篇
  2006年   39篇
  2005年   39篇
  2004年   21篇
  2003年   23篇
  2002年   5篇
  2001年   6篇
  2000年   4篇
  1999年   4篇
  1998年   8篇
  1996年   1篇
  1995年   3篇
  1994年   1篇
  1993年   1篇
  1990年   2篇
  1989年   1篇
排序方式: 共有773条查询结果,搜索用时 15 毫秒
711.
通过刚体飞行六自由度动力学方程建立弹射式导弹初始段无控飞行模型,并结合弹射装置动力模型和导弹发动机推力模型进行仿真计算。基于无控飞行模型和仿真结果分析了无人机配载弹射式导弹发射特性,在导弹初始飞行段对机弹分离安全性和导弹姿态控制要求进行了研究。对导弹不同静稳定度下的运动特性对比分析,分别给出了满足各种安全和控制要求的导弹静稳定度范围。进一步综合所有安全和姿态控制要求,得到了满足所有要求的最佳静稳定度。经过一个实例的仿真研究,结果表明建立的模型与所用到的方法是合理有效的。  相似文献   
712.
A comprehensive maritime interdiction strategy to attack the insurgent's logistic system was a key element in the defeat of the Tamil Tigers. The campaign of maritime interdiction required the Sri Lankan Navy (SLN) to attack LTTE arms smuggling, sea piracy, and maritime terrorism. The SLN degraded the insurgency's robust maritime logistical network while also devising tactics to engage the maritime insurgents who reacted with swarm and suicide boat tactics. The efforts of the SLN forced the Tamil Tigers to confront the government's final land offensives with diminished resources, thus collapsing a three decades’ old insurgency in a matter of months.  相似文献   
713.
As US counterinsurgency campaigns draw to a close, doctrine for asymmetric warfare written during the War on Terror has come under heavy criticism. While many have argued that this shift to ‘winning hearts and minds’ is evidence that the United States is taking humanitarianism and nation-building seriously, others argue that a wide gap exists between US counterinsurgency doctrine and the protection of civilians afflicted by conflict. In this article, I show that the latter is true by comparing theories of instrumental and communicative action to US doctrine for operational design, stability operations, and counterinsurgency. I argue that these texts treat the people as an object to be manipulated for the achievement of pre-determined self-interested strategic goals rather than members of a community that jointly designs operations to fulfill shared objectives. However, US doctrine does contain communicative elements that, if prioritized, would better support humanitarian and state-building objectives otherwise subordinated in the War on Terror.  相似文献   
714.
ABSTRACT

This paper challenges recent claims that competitive market dynamics incentivize Private Military and Security Companies (PMSCs) to fully commit to providing effective services, thereby reducing the duration of civil war. Our assessment of a most-likely case scenario for this argument – Sierra Leone – reveals four critical problems. First, there is rarely direct competition, even if numerous companies are present. Second, the presence of multiple PMSCs usually represents a collaboration among subsidiaries providing distinct services, often under the same corporate umbrella. Third, data aggregation obfuscates the overlap of PMSC presence, inflating the amount of perceived competition. Finally, we raise concerns regarding how quantitative analyses can conflate conflict intensity with conflict termination.  相似文献   
715.
采用HLA技术的装备保障仿真训练系统是通过网络将分散在各地的仿真器、计算机生成兵力以及其他设备联合为一个整体,形成一个可以在时间和空间上互相耦合的虚拟战场环境.分析了装备保障仿真训练的功能和特点,并依据HLA的基本概念、方法和原理对分布式装备保障仿真训练系统进行方案设计,建立了系统体系结构,并介绍了其方案组成.  相似文献   
716.
针对飞机的结构可达性问题,提出了一种对飞机部件排列顺序进行优化的可达性改进方案。应用飞机的维修拆装顺序模型,得出飞机拆卸时的一般顺序,建立了基于模糊综合判定法的飞机可达性改进模型,给出了合理的飞机部件排列顺序。最后,结合实例,验证了该方法的可行性和实用性。  相似文献   
717.
This article explores the convergence between three pillars of influence – feminist security studies, civil society activism and policy decision-making – and its role in the adoption and implementation of United Nations Security Council Resolution (UNSCR) 1325. It argues that these three pillars, individually and collectively, have made important contributions to the debate and action on the gender and security agenda, but that they remain organically disconnected. Their convergence has the potential to achieve path-breaking results in the sphere of gender and security, whilst their divergence makes transformation unattainable. We show the disconnect in the application of UNSCR 1325 in Africa and argue that this is partly the reason why, despite enormous efforts, the gains realised in terms of gender equality in the peace and security arena have been negligible.  相似文献   
718.
Madagascar     
Despite a constitution that condemns discrimination, as well as positive efforts by all stakeholders, Madagascar is still far from meeting the desired objectives of the Southern African Development Community (SADC) Protocol on Gender and Development, or any other relevant international instruments and conventions. The establishment of an Organising Technical Committee on security sector reform for Madagascar is a positive development, which will hopefully facilitate an understanding of the multiple facets of gender and security in Madagascar as well as advancing the implementation of the instruments calling for greater female participation in the security sector.  相似文献   
719.
Ballistic missile defense (BMD) politics present an interesting evolution in how the USA, especially Congress, has come to think about BMD both as operational reality and as a symbolic policy. The argument here is that BMD's operational reality is increasingly overshadowed by its symbolic aspects. Such a status arose from rapidly changing international and domestic politics. The end result is a situation in which BMD policy in a sense floats above the question of its actual combat effectiveness. Its primary mission in part is sustaining US capacity to remain a global power and support its allies.  相似文献   
720.
Islamist extremism as an ideology has seemingly spread in influence in the past few years. The violent Islamist threat may have a singular religious dogma, but that does not mean that it will interact in the same fashion within the various cultures it infests. The Sub-Saharan region is one general context where Islamist extremism is both vividly active and misunderstood. Africa's reaction to: Arabization; the adjustment to post-colonial rule; the perception of secular government institutions; the extent of cultural and religious pluralism; and the local character of Muslim leadership and institutions are all very different from that of the Middle East. Scores of terrorism analysts and even Arab populations only too familiar with the Middle East context superimpose Middle East threats over the Sub-Saharan African cultural landscape. Instead of generalizing the Islamist threats, it might be better to ask why it is that violent Islamist groups have traditionally been challenged to expand their influence in Muslim Sub-Saharan Africa. The underestimated Islamist is using ignorance to its advantage, recruiting through channels unnoticed by its Arab counterparts while creatively catering its message by region.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号