首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   642篇
  免费   47篇
  国内免费   32篇
  2024年   1篇
  2023年   1篇
  2022年   1篇
  2021年   13篇
  2020年   11篇
  2019年   32篇
  2018年   37篇
  2017年   45篇
  2016年   45篇
  2015年   19篇
  2014年   70篇
  2013年   115篇
  2012年   14篇
  2011年   40篇
  2010年   43篇
  2009年   41篇
  2008年   46篇
  2007年   35篇
  2006年   32篇
  2005年   25篇
  2004年   16篇
  2003年   21篇
  2002年   6篇
  2001年   4篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1995年   2篇
  1994年   1篇
  1993年   1篇
  1990年   1篇
排序方式: 共有721条查询结果,搜索用时 15 毫秒
621.
以概率方法确定了飞机近距发射空空导弹时的安全性评估指标,分析了载机、导弹和目标三者初始状态,飞机轨迹等诸多因素对载机安全性的影响,同时给出了评估飞机运用空空导弹攻击目标时的安全性评估指标的原理框架。运用此模型可以解决新型飞机的安全性设计问题以及通过对现有飞机的安全性评估来改进飞机的安全性等级。  相似文献   
622.
通过分析抗御火灾的客观事实 ,从抗御火灾的公共配套设施、专用装备和人员保证三个方面揭示人类控制火灾的观念需要更新 ,指出人类控制火灾必须从人的观念上实现根本性转变 ,重建抗御火灾的意识。  相似文献   
623.
讨论了导航装备数字维修平台的网络传输安全性问题,分析其安全需求,提出采用Java安全技术来解决堆修平台的安全性.从工程项目实际需要的角度出发,阐述了在导航装备数字维修平台中的Java安全机制以及实现技术.  相似文献   
624.
网络安全与防火墙技术   总被引:1,自引:0,他引:1  
介绍了防火墙技术的概念、几种防大墙实现技术的原理、防火墙的配置及安全措施.  相似文献   
625.
针对航空集群协同反隐身探测盲区的识别判定问题,在多种编队构型下的集群协同探测仿真结果的基础上,运用属性的0-1分辨矩阵方法进行识别,对于连通的区域,建立相关模型,求得允许目标通过的最小宽度,将建立的模型应用到模拟作战中,仿真结果验证模型的正确性和合理性。结论表明,航空集群协同横向探测盲区可视为探测区下的保护区;纵向探测盲区则视为连通区域;斜探测盲区的判定,则依据通道倾斜角、通道长度和宽度的比值而定。  相似文献   
626.
美军在军事人才培养的体系构筑、目标设定、课目设置等方面有着众多独到之处。《军官职业军事教育政策》是美军规范军官职业军事教育的指导性文件,研究掌握其核心内容的发展演变,从中提取美军职业教育改革的先进理念和成熟做法,可为我军军事职业教育建设提供经验借鉴。  相似文献   
627.
This article explains why Singapore, despite its small size and semi-authoritarian regime, retains one of the best military forces in the Indo-Pacific. It unpacks Singapore’s ability to continuously innovate since the 1960s – technologically, organizationally, and conceptually – and even recently joined the Revolution in Military Affairs bandwagon. Drawing from the broader military innovation studies literature, this article argues evolutionary peacetime military innovation is more likely to occur in a state with a unified civil–military relation and whose military faces a high-level diverse set of threats. This argument explains how the civil–military fusion under the People’s Action Party-led government since Singapore’s founding moment has been providing coherent and consistent strategic guidance, political support, and financial capital, allowing the Singapore Armed Forces to continuously innovate in response to high levels and diversity of threats.  相似文献   
628.
Humanitarian operations may pose challenges to which armed forces prepared for warfighting seem rather ill-equipped. It is the aim of this article to examine in what way military ethics should be adapted to humanitarian tasks. Two ideal types of military ethics are defined here: warfighting and humanitarian. The warfighting ethic is supposed to maximise the utility of the military in war and combat and to that end utilises the virtues of loyalty and honour. In contrast, humanitarian obligations require to a larger extent the development of personal integrity and an ability to follow one’s own conscience. The adaptation of military ethics is demonstrated in the case studies of the UK armed forces and the German Bundeswehr. Whereas the moral code of the UK armed forces remains anchored in the principles of the warfighting ethic, the case of the Bundeswehr presents a military ethic closely approximating the humanitarian ideal type.  相似文献   
629.
This work is about how the United States military has become dependent on networked technology. As arguably the largest contributor to national security, it has become so dependent that its chief doctrine integrates networked technology into nearly every specialty, with particularly intense focus on Network Centric Warfare. As the military’s old guard is replaced by the highly technical Millenial Generation, there is cause to pause when assuming this techno-acuity brings nothing but advantage and success. Vulnerabilities stemming from such extensive dependence offer opportunities for exploitation that have not gone unnoticed. The first step to moving forward from this point is to fully understand the extent to which the military has become dependent on computer networks. It might be the Millenials’ war today, but it would be quite unwise for the United States military to think about it and fight it in a purely Millenial way.  相似文献   
630.
Recent elections in Latin America, such as those of Mauricio Macri in Argentina, Horacio Cartes in Paraguay, and the impeachment process of Dilma Rousseff in Brazil, point to a new direction in Latin American politics and away from the “hard left;” they also point to a new momentum in the security relationship between the US and Latin American countries. Former US President Obama’s 2016 trip to Cuba and Argentina was a clear demonstration of this new security paradigm and also a clear indication that there is a new momentum brewing in the US towards a rethinking and reshaping of security strategies and mindsets. This article will explore the multidimensional security relationship between the US and Latin American countries in light of recent changes in the US’ posture toward the region.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号