首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3551篇
  免费   448篇
  国内免费   225篇
  2024年   4篇
  2023年   9篇
  2022年   24篇
  2021年   68篇
  2020年   70篇
  2019年   105篇
  2018年   91篇
  2017年   167篇
  2016年   169篇
  2015年   84篇
  2014年   322篇
  2013年   391篇
  2012年   228篇
  2011年   280篇
  2010年   250篇
  2009年   259篇
  2008年   196篇
  2007年   215篇
  2006年   213篇
  2005年   197篇
  2004年   173篇
  2003年   125篇
  2002年   89篇
  2001年   98篇
  2000年   55篇
  1999年   51篇
  1998年   34篇
  1997年   35篇
  1996年   32篇
  1995年   39篇
  1994年   33篇
  1993年   19篇
  1992年   26篇
  1991年   19篇
  1990年   29篇
  1989年   12篇
  1988年   10篇
  1987年   2篇
  1975年   1篇
排序方式: 共有4224条查询结果,搜索用时 15 毫秒
161.
We model the perspective faced by nuclear powers involved in a supergame where nuclear deterrence is used to stabilise peace. This setting allows us to investigate the bearings of defensive weapons on the effectiveness of deterrence and peace stability, relying on one-shot optimal punishments. We find that the sustainability of peace is unaffected by defensive shields if the latter are symmetric across countries, while asymmetric endowments of such weapons have clear-cut destabilising consequences.  相似文献   
162.
Africa and for that matter the Gulf of Guinea cannot be indifferent to the global energy politics of the 21st century. The increasing importance of the region has attracted major actors in the energy sector. The competing interests of these actors are played out in various forms. This heightened interest in the region, especially with the discovery of oil in huge commercial quantities, has brought the importance of the area into focus in global oil politics. This paper looks at the importance of the region in light of the huge energy potentials of the Gulf of Guinea and how the institution of proper governance systems could serve as an important factor in ensuring the proper management of the resource.  相似文献   
163.
Analysing the relationship between the provision of military support and the probability of becoming the target of a terrorist attack, this paper contributes to the literature on the causes of transnational terrorism. We find that deployment of military troops of country X in country Y increases the probability of a terrorist attack on citizens of country X by a terrorist group located in country Y. Exporting weapons to country Y seems to increase the probability of being attacked by the terrorists of this country Y as well. Deploying materials, however, does not seem to significantly influence the probability of attack. Including lagged values for our military support variables ensures that the causality direction is from military support to terrorist attacks. Moreover, these results indicate that while the effect of military deployment on the probability of attack lasts for more than 1 year, the effect is rather short-lived.  相似文献   
164.
Militaries rely on secure communications. Despite the permeation of cyber-systems throughout the operational environment, there is little readily available doctrine on cyber-warfare. Doctrine that does exist has not been coherently integrated. This paper introduces a Cyber Conceptual Framework, consisting of five questions pertinent to the future use of cyberspace. The authors enunciate a definition of cyberspace, expand on existing military doctrine to reject the conceptualisation of cyberspace as a domain, define cyber-conflict, define cyber-attack and describe the four components and five levels of a cyber-attack. This work develops a common framework from available doctrine and a lexicon for future discussion.  相似文献   
165.
Particularly in African operations, United Nations (UN) peacekeeping forces have faced significant problems in restoring stability. In at least a few situations, unilateral national military interventions have been launched in the same countries. In the cases of Sierra Leone and Côte d’Ivoire, the British and French interventions respectively played a significant role in re-establishing stability. Lessons from these operations suggest that if effective coordination and liaison channels are established, such hybrid unilateral-UN missions can in fact be more successful than “pure” peace operations.  相似文献   
166.
With the rapid pace of regional arms modernization and unresolved territorial disputes, Indonesia is increasingly susceptible to the impact of emerging great power rivalry in Asia-Pacific. Rather than pursuing a robust military build-up, Indonesian policy-makers assert that diplomacy is the country’s first line of defense. This article argues that defense diplomacy serves two agenda of Indonesia’s hedging strategy – strategic engagement and military modernization. This way, Indonesian defense and security officials seek to moderate the impact of geopolitical changes while maintaining the country’s defensive ability against regional uncertainties.  相似文献   
167.
The embellishment of a warrior biography has a long history but examples of veteran elaboration of traumatic experience have become increasingly apparent. Although legislative change in the UK has removed the penalties for fabrication and a progressive decline in the military footprint may have increased the likelihood of such false trauma narratives, a paradigm shift in explanations for mental illness underpins this phenomenon. The recognition of post-traumatic stress disorder (PTSD) in 1980, followed by studies to identify risk factors, led to a greater appreciation of psychological vulnerability. As a result, the use of shame to discourage acts formerly labelled as “cowardly” or “lacking in morale fibre” is no longer considered appropriate. Recent conflicts in Iraq and Afghanistan generated popular sympathy for service personnel, whilst media focus on PTSD has led the UK public to believe that most veterans have been traumatised by their tours of duty.  相似文献   
168.
蔡珏 《国防科技》2016,37(5):31-35
随着美国揭开第三次"抵消战略"重点发展对象的面纱,研发"颠覆性技术"已成为主要军事大国获得技术优势的手段。当前世界新一轮科技革命、产业革命、军事革命交织并行,给颠覆性技术提供了难得的良好机遇。但当我们看见颠覆性技术引领时代新型武器装备潮流发展的同时,也应理性看待其背后潜藏的风险。通过概述总结颠覆性技术研究现状,分析其推动的科技内生性变革,从本质上对其进行理性认知。研究表明,发展颠覆性技术必须积极作为,谨慎对待。  相似文献   
169.
通过分析车辆电子控制单元输出的点火开关和燃油喷射信号波形在高功率微波辐射条件下的演变过程,阐明了高功率微波致使车辆发动机熄火的原因。研究结果表明,电子控制单元受到微波辐射扰乱后,点火开关信号发生意外丢失,燃油喷射信号脉冲重复周期迅速缩短,造成发动机气缸内喷入过量燃油,火花塞无法点燃油气混合物,迫使发动机转速下降甚至熄火。通过分析车辆发动机的点火系统工作原理,提出了根据监测车体辐射电磁信号获取车辆易受攻击的敏感频段的试验思路。  相似文献   
170.
抽取作战文书中的军事命名实体关系,是实现作战文书语义理解的一种有效方法。在分析作战文书中军事命名实体词语规则的基础上,提出了一种结合词语规则和 SVM 模型的军事命名实体关系抽取方法。首先,使用词语规则整合作战文书中连续出现的军事命名实体并抽取其关系,使其更加适合 SVM 模型。然后,使用 SVM 模型对传统规则模板难以使用的词窗、词性和距离等特征进行建模,抽取军事命名实体关系。实验结果表明,优先利用词语规则能充分提高 SVM 模型抽取军事命名实体关系的效果,与单纯使用 SVM 模型相比,准确率和召回率分别提高了8.73%和41.71%。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号