首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   367篇
  免费   41篇
  国内免费   15篇
  2024年   2篇
  2023年   3篇
  2022年   2篇
  2021年   3篇
  2020年   19篇
  2019年   26篇
  2018年   30篇
  2017年   42篇
  2016年   32篇
  2015年   4篇
  2014年   34篇
  2013年   76篇
  2012年   17篇
  2011年   13篇
  2010年   12篇
  2009年   17篇
  2008年   12篇
  2007年   12篇
  2006年   11篇
  2005年   18篇
  2004年   6篇
  2003年   5篇
  2002年   4篇
  2001年   8篇
  2000年   5篇
  1999年   2篇
  1998年   1篇
  1996年   1篇
  1995年   1篇
  1994年   2篇
  1993年   1篇
  1990年   2篇
排序方式: 共有423条查询结果,搜索用时 15 毫秒
221.
伊拉克战争美军后勤(装备)保障特点及启示   总被引:1,自引:0,他引:1  
伊拉克战争中,美军采取多种手段和措施,成功地实施了后勤(装备)保障,在保障准备、保障方法、保障信息化建设等方面呈现出许多新特点,为我军做好新形势下的装备保障工作提供了有益的启示。  相似文献   
222.
We consider a scenario with two firms determining which products to develop and introduce to the market. In this problem, there exists a finite set of potential products and market segments. Each market segment has a preference list of products and will buy its most preferred product among those available. The firms play a Stackelberg game in which the leader firm first introduces a set of products, and the follower responds with its own set of products. The leader's goal is to maximize its profit subject to a product introduction budget, assuming that the follower will attempt to minimize the leader's profit using a budget of its own. We formulate this problem as a multistage integer program amenable to decomposition techniques. Using this formulation, we develop three variations of an exact mathematical programming method for solving the multistage problem, along with a family of heuristic procedures for estimating the follower solution. The efficacy of our approaches is demonstrated on randomly generated test instances. This article contributes to the operations research literature a multistage algorithm that directly addresses difficulties posed by degeneracy, and contributes to the product variety literature an exact optimization algorithm for a novel competitive product introduction problem. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
223.
就一个仓库、多个零售商,对联合订货费用函数的模型进行分析,给出了一个求解最佳订货周期的多项式时间的算法,且算法的时间复杂性为O(nlogn)。利用文献[8]中的技巧,给出了该库存博弈的核。  相似文献   
224.
针对军事欺骗战法定量分析困难的问题,采用基于贝叶斯统计推断和博弈均衡分析的数学方法,在理论上为解决此难题提供了一种可行的方法.该方法首先定义基本概率矩阵,然后根据贝叶斯原理为交战双方构造用于统计推断的主观概率矩阵,并在由两个主观概率矩阵元素构成的偏序链与实施军事欺骗机会之间建立对应关系,再将此关系推广到基本概率矩阵,即是否存在实施军事欺骗的机会将由基本概率矩阵元素构成的偏序链决定.对理论成果的初步应用表明:通过分析由战场情报信息构成的基本概率矩阵的偏序链,可以科学地运用军事欺骗和反军事欺骗战法.  相似文献   
225.
目标分配问题是UAV自主控制的重要问题。针对舰载无人机编队协同对海突击目标分配问题,首先建立了基于离散动态贝叶斯网络的目标价值评估模型,在此基础上构建了舰载无人机编队的益损值矩阵,设计了舰载无人机编队协同对海突击目标分配的决策函数,提出了一种基于改进博弈论的目标分配方法,为4种不同约束条件下的目标分配问题分别设计了算法。最后对所建立的目标价值评估模型和改进博弈论的目标分配算法进行了实例仿真,仿真结果表明了模型和算法的可行性和有效性。  相似文献   
226.
The objective of this article is to move ethical discourse on military strategy beyond the confines of the established War Convention. This is achieved by utilising the common good, a concept found in political philosophy and theology. The common good acts as a positive organising concept for socio-political activity. With its focus on peace, development and the flourishing of the individual and community, the common good poses a significant challenge to strategy. This article constructs an approach to strategy that is compatible with the common good. Importantly, it does so whilst respecting the pursuit of victory as an indispensable component of strategy’s true nature. The theory presented in this article is then tested in relation to four different modes of strategy: regular war, irregular war, deterrence, and cyberwar.  相似文献   
227.
The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently doing but also predict what their next move might be. However, the ethical implications are unclear and the backlash following Edward Snowden’s revelations have shown that such activities are not without controversy. This leaves the debate stuck between the important, ethical role that intelligence can play and the potential for its unrestrained use to cause undue harm. This paper will resolve this by giving greater detail to cyber-intelligence practices, highlighting the different levels of harm that the various intelligence operations can cause. The essence of this paper is not that cyber-intelligence should be banned outright, but that it can be justified given the necessary circumstances. Therefore, the paper will develop a specialised set of Just Cyber-Intelligence Principles, built on the just war tradition, to outline if and when such activities are justified.  相似文献   
228.
The jus ad bellum criterion of right intention (CRI) is a central guiding principle of just war theory. It asserts that a country’s resort to war is just only if that country resorts to war for the right reasons. However, there is significant confusion, and little consensus, about how to specify the CRI. We seek to clear up this confusion by evaluating several distinct ways of understanding the criterion. On one understanding, a state’s resort to war is just only if it plans to adhere to the principles of just war while achieving its just cause. We argue that the first understanding makes the CRI superfluous, because it can be subsumed under the probability of success criterion. On a second understanding, a resort to war is just only if a state’s motives, which explain its resort to war, are of the right kind. We argue that this second understanding of the CRI makes it a significant further obstacle to justifying war. However, this second understanding faces a possible infinite regress problem, which, left unresolved, leaves us without a plausible interpretation of the CRI. This constitutes a significant and novel reason for leaving the CRI out of the international law of armed conflict (LOAC).  相似文献   
229.
Although most styles of military ethics are hybrids that draw on multiple ethical theories, they are usually based primarily on the model of Aristotelian virtue ethics. Virtue ethics is well-suited for regulating the conduct of soldiers who have to make quick decisions on the battlefield, but its applicability to military personnel is threatened by the growing use of unmanned weapon systems. These weapons disrupt virtue ethics’ institutional and cultural basis by changing what it means to display virtue and transforming the roles soldiers perform and the nature of the military profession itself. I argue that in light of these challenges to virtue ethics, at least as it is traditionally understood within the armed forces, soldiers operating unmanned weapons require a more heavily rule-based approach to military ethics.  相似文献   
230.
Colin Gray’s dimensions of strategy, built upon the earlier work of Clausewitz and Howard, has theoretical, practical, and pedagogic value for the Strategic Studies community. This paper further develops the theory, arguing that the dimensions can be controlled or managed to improve strategic performance. The dimensions are divided into two categories: “internal” and “external” to the process of strategy. The paper describes the dynamic process by which the internal dimensions, which can be controlled, are used to exert influence over the external dimensions that are beyond the control of the strategist. It is argued that six dimensions hold the key to strategic success: politics and the five dimensions concerned with warfighting. This conclusion validates the Clausewitzian paradigm with its emphasis on policy and battle.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号