首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   287篇
  免费   12篇
  国内免费   9篇
  2021年   1篇
  2020年   14篇
  2019年   25篇
  2018年   24篇
  2017年   28篇
  2016年   20篇
  2015年   4篇
  2014年   29篇
  2013年   66篇
  2012年   8篇
  2011年   9篇
  2010年   8篇
  2009年   11篇
  2008年   13篇
  2007年   5篇
  2006年   4篇
  2005年   11篇
  2004年   6篇
  2003年   4篇
  2002年   3篇
  2001年   5篇
  2000年   2篇
  1999年   1篇
  1998年   1篇
  1995年   2篇
  1994年   1篇
  1990年   3篇
排序方式: 共有308条查询结果,搜索用时 15 毫秒
1.
以可靠性为中心的维修(Reliability Centered maintenance——RCM)是美国航空界和美国防部制订装备预防维修大纲时所使用的一种维修理论,其主要目的是以最低的费用保持复杂装备的固有可靠性水平。本文跟踪RCM的发展过程,简述其基本原理和基本内容,并在综述国内外有关文献的基础上提出了笔者对RCM的认识及在军械系统应用RCM的必要性。  相似文献   
2.
ABSTRACT

The United States government has no organised way of thinking about war termination other than seeking decisive military victory. This implicit assumption is inducing three major errors. First, the United States tends to select military-centric strategies that have low probabilities of success. Second, the United States is slow to modify losing or ineffective strategies due to cognitive obstacles, internal frictions, and patron-client challenges with the host nation government. Finally, as the U.S. government tires of the war and elects to withdraw, bargaining asymmetries prevent successful transitions (building the host nation to win on its own) or negotiations.  相似文献   
3.
校园网是利用现代网络技术、多媒体技术等为基础建立起来的主要应用于学校内部的计算机网络。校园网面临着病毒泛滥、非法攻击、未授权访问、盗用网络资源、内部信息非法窃取等一系列安全问题。针对目前校园网内常见的计算机病毒类型和防范措施进行了分析和探讨。  相似文献   
4.
未来作战对新时期装备保障训练提出了新要求。以信息化战争为参照系,探讨了适应未来作战需要的装备保障训练思路、内容体系、方式方法、效果评估、训练保障等关键环节问题,为促进装备保障训练发展提供理论支持,增强装备保障训练工作实践的有效性和针对性。  相似文献   
5.
What were Russia’s objectives in Eastern Ukraine, and why was it seemingly unable to achieve a successful or decisive outcome? In contrast to Russia’s seizure of Crimea, the uprising in Eastern Ukraine was marked by disorganization and chaos. Using proxy and surrogate actors, along with military exercises and the injection of Russian troops, Russia sought to institutionalize a political entity inside Ukraine to influence its domestic politics. In this article, I analyze the mechanisms by which Russia attempted to implement, and later salvage, its strategy. The article contributes to clearer theoretical and practical understanding of limited force in coercive diplomacy, signaling, and a more rigorous treatment of the role and uses of proxy actors.  相似文献   
6.
Proxy warfare is a consistent element in international warfare. However, it is unclear why proxy relationships form in cases where states have multiple options of groups to support. Existing research identifies the presence of transnational constituencies, shared interstate rivalries, and moderate relative strength of militant groups as highly influential on the development of a proxy relationship. This study examines the presence of these variables within the context of the Lebanese Civil War. The results of this demonstrate that each state places greater importance on some variables and ignores others when choosing a proxy. Additionally, this study further demonstrates the presence of new variables that are key to the development of proxy relationships.  相似文献   
7.
The Sri Lankan Civil War (1983–2009) is regarded as a violent reflection of deepening divides along political and ethnic lines. During this civil war the Sri Lankan Government and its security forces have been implicated in unlawful killings carried out in a pervasive manner against civilians, whilst at the same time specifically targeting ethnic Tamils, humanitarian workers and journalists. The human rights of all citizens suffered as a result and ultimately led to the weakening of the rule of law. With the end of the civil war, the Sri Lankan Government has made little progress in providing accountability for wartime abuses. Its absence of and reluctance to ensure justice is seen as a logical culmination of decades of impunity. The importance of acknowledging historical behaviour and taking accountability for past violations will be discussed. In an analysis for paving the way to a new democracy in Sri Lanka, the main outcomes of this article are calls for accountability arising out of the government’s actions during the war; an investigation into the present state of human rights, the rule of law and finally; an examination into the political solution going forward to ensure a process of reconciliation and peaceful co-existence.  相似文献   
8.
A comprehensive paradigm of future wars can be defined, and is called in this article “Extended conflicts.” These can be characterized by strategic attrition, to which all national resources and all possible international legitimacy are mobilized, in order to achieve a resolution by transformation of the opponent. The use of military force in this kind of conflict is limited. The understanding that we are facing an era of extended conflicts will improve the way it is utilized.  相似文献   
9.
分析了多机空战系统的顶层模型结构,给出了机载雷达、武器控制和导弹等三个主要部件的模型,可以将其应用于多机空战仿真系统的数学建模和软件设计中.  相似文献   
10.
Cyberspace is an avenue of approach through which a military force can attain objectives of value. Through these cyber avenues of approach, military forces can engage, vet, organize, and direct human agents to accomplish specific activities. Although the objectives of these activities could differ from traditional military objectives, they still have military relevance. This particular manifestation of cyber conflict is neither a new domain of war nor something outside of warfare. Rather, it can be viewed as an emerging avenue of approach in the larger context of military operations, auguring benefits in the integration of cyber activities with operations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号