首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   876篇
  免费   155篇
  国内免费   40篇
  2024年   6篇
  2023年   4篇
  2022年   2篇
  2021年   28篇
  2020年   18篇
  2019年   32篇
  2018年   43篇
  2017年   57篇
  2016年   62篇
  2015年   27篇
  2014年   84篇
  2013年   136篇
  2012年   46篇
  2011年   53篇
  2010年   57篇
  2009年   52篇
  2008年   50篇
  2007年   39篇
  2006年   46篇
  2005年   53篇
  2004年   35篇
  2003年   30篇
  2002年   25篇
  2001年   17篇
  2000年   15篇
  1999年   12篇
  1998年   8篇
  1997年   7篇
  1996年   4篇
  1995年   8篇
  1994年   3篇
  1993年   2篇
  1992年   3篇
  1991年   2篇
  1990年   5篇
排序方式: 共有1071条查询结果,搜索用时 15 毫秒
941.
针对航空集群协同反隐身探测盲区的识别判定问题,在多种编队构型下的集群协同探测仿真结果的基础上,运用属性的0-1分辨矩阵方法进行识别,对于连通的区域,建立相关模型,求得允许目标通过的最小宽度,将建立的模型应用到模拟作战中,仿真结果验证模型的正确性和合理性。结论表明,航空集群协同横向探测盲区可视为探测区下的保护区;纵向探测盲区则视为连通区域;斜探测盲区的判定,则依据通道倾斜角、通道长度和宽度的比值而定。  相似文献   
942.
针对双经纬仪异面交会中目标点并不一定正好在公垂线上的问题,提出了在公垂线附近的空间区域上估计目标点位置的方法。该空间区域为以公垂线为对角线,各边分别平行于双经纬仪测量坐标系三轴的长方体空间区域。在目标点位置估计时考虑到经纬仪高低角与水平角测角精度的不同,以及目标点与经纬仪之间距离对空间点坐标精度的影响。采用蒙特卡洛方法模拟结果表明:新方法的目标点空间位置估计精度不亚于传统公垂线法,在特定情况下甚至能提高5%以上。模拟结果验证了新方法的可行性和有效性。  相似文献   
943.
黄旗绅  李留英 《国防科技》2017,38(5):079-083
随着信息技术的迅猛发展,互联网已深刻融入人们生产生活全过程,这使得网络中留下了各组织、机构和人员活动的海量信息痕迹。借助云计算、大数据等网络信息技术,这些信息痕迹已逐渐成为各国军事情报部门重要的情报来源,围绕网络空间展开的军事情报与反情报斗争日益激烈,需要引起高度重视。  相似文献   
944.
形成备选国防关键技术领域和技术清单是进行国防关键技术调查与选择的前提和基础。按照先分解再合并的研究路径,研究提出备选技术清单的有五个主要来源,通过初步开展国防关键技术领域和备选清单遴选的研究,为后续国防关键技术选择评价理论、模型、方法和工具的应用验证提供支撑。  相似文献   
945.
李自力 《国防科技》2017,38(3):004-011
国防科技评价是国家科技评价的组成部分,是国防科技管理的重要内容,是构建军民融合创新体系的内在要求。分析了国防科技评价的基本内涵,阐述了构建国防科技评价体系的总体设想,提出了改革国防科技评价制度的几点思考。研究认为,改革国防科技评价制度,完善国防科技评价体,要加强国防科技评价理论研究,重视国防科技评价机构建设,充分发挥第三方评价的作用,建立多元化的国防科技评价体系,完善国防科技专家选择机制,建立健全国防科技评价指标,加快国防科技评价人才培养,优化国防科技评价环境建设。  相似文献   
946.
This work is about how the United States military has become dependent on networked technology. As arguably the largest contributor to national security, it has become so dependent that its chief doctrine integrates networked technology into nearly every specialty, with particularly intense focus on Network Centric Warfare. As the military’s old guard is replaced by the highly technical Millenial Generation, there is cause to pause when assuming this techno-acuity brings nothing but advantage and success. Vulnerabilities stemming from such extensive dependence offer opportunities for exploitation that have not gone unnoticed. The first step to moving forward from this point is to fully understand the extent to which the military has become dependent on computer networks. It might be the Millenials’ war today, but it would be quite unwise for the United States military to think about it and fight it in a purely Millenial way.  相似文献   
947.
Recent elections in Latin America, such as those of Mauricio Macri in Argentina, Horacio Cartes in Paraguay, and the impeachment process of Dilma Rousseff in Brazil, point to a new direction in Latin American politics and away from the “hard left;” they also point to a new momentum in the security relationship between the US and Latin American countries. Former US President Obama’s 2016 trip to Cuba and Argentina was a clear demonstration of this new security paradigm and also a clear indication that there is a new momentum brewing in the US towards a rethinking and reshaping of security strategies and mindsets. This article will explore the multidimensional security relationship between the US and Latin American countries in light of recent changes in the US’ posture toward the region.  相似文献   
948.
Mark Erbel 《Defence Studies》2017,17(2):135-155
This article reappraises the two most-studied country cases of military outsourcing: the USA and the UK. It argues that the contemporary wave of military contracting stretches back to the beginning of the cold war and not only to the demobilisation of armies in the 1990s or the neoliberal reforms introduced since the 1980s. It traces the political, technological and ideational developments that laid the groundwork for these reforms and practices since the early cold war and account for its endurance today. Importantly, it argues that a persistent gap between strategic objectives and resources, i.e. the challenge to reconcile ends and means, is an underlying driver of military contracting in both countries. Contemporary contracting is thus most closely tied to military support functions in support of wider foreign and defence political objectives. Security services in either state may not have been outsourced so swiftly, if at all, without decades of experience in outsourcing military logistics functions and the resultant vehicles, processes and familiarities with public-private partnerships. The article thus provides a wider and deeper understanding of the drivers of contractualisation, thereby improving our understanding of both its historical trajectory and the determinants of its present and potential futures.  相似文献   
949.
Postmodern contradictions in postcolonial Nigeria have led to the fetishisation of alternative local security measures often labelled as vigilante activities. The profiling of these groups as ethnic militia often undermines their essential bid to provide security while delimiting security needs to the physical. The fallouts of such profiling are frictions between federal security agents and ethnic-based security groups, often resulting in violence, as exemplified by the 7 May 2013 incident between the Nigerian federal security agents and the Ombatse. This study focuses on the emergence and activities of the Ombatse as an alternative security apparatus of the Eggon. It presents three years of field research which entailed the use of ethnography, key informant interviews and observation. The findings reveal that the Ombatse emerged to assert historical legitimacy for both the physical and spiritual securitisation of the Eggon through a return to the ancestral ways of social engineering. The study considers the security challenges in Nigeria, and also situates the Eggon historical context within political, religious, sociocultural and economic intersections of securitisation. It concludes that the Ombatse situates its legitimacy within the Eggon past and retains its relevance through the holistic focus of providing both physical and spiritual security.  相似文献   
950.
为贴近实战完成火箭助飞鱼雷攻潜试验,针对目标指示信息设备选择、目标靶的选择、射击方式解算等几个试验方案设计关键点对试验方案设计进行了分析,建立了影响攻潜效果主要因素的仿真计算模型,并给出了仿真计算结果。经海上试验检验,方案设计合理可行。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号