首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   121篇
  免费   22篇
  国内免费   1篇
  2023年   1篇
  2022年   1篇
  2021年   3篇
  2020年   6篇
  2019年   12篇
  2018年   5篇
  2017年   16篇
  2016年   12篇
  2015年   4篇
  2014年   11篇
  2013年   20篇
  2012年   8篇
  2011年   10篇
  2010年   5篇
  2009年   4篇
  2008年   2篇
  2007年   2篇
  2006年   3篇
  2005年   2篇
  2004年   1篇
  2003年   4篇
  2002年   2篇
  2001年   1篇
  1999年   1篇
  1998年   1篇
  1997年   2篇
  1995年   1篇
  1994年   1篇
  1991年   1篇
  1990年   2篇
排序方式: 共有144条查询结果,搜索用时 46 毫秒
1.
以可靠性为中心的维修(Reliability Centered maintenance——RCM)是美国航空界和美国防部制订装备预防维修大纲时所使用的一种维修理论,其主要目的是以最低的费用保持复杂装备的固有可靠性水平。本文跟踪RCM的发展过程,简述其基本原理和基本内容,并在综述国内外有关文献的基础上提出了笔者对RCM的认识及在军械系统应用RCM的必要性。  相似文献   
2.
With the rapid pace of regional arms modernization and unresolved territorial disputes, Indonesia is increasingly susceptible to the impact of emerging great power rivalry in Asia-Pacific. Rather than pursuing a robust military build-up, Indonesian policy-makers assert that diplomacy is the country’s first line of defense. This article argues that defense diplomacy serves two agenda of Indonesia’s hedging strategy – strategic engagement and military modernization. This way, Indonesian defense and security officials seek to moderate the impact of geopolitical changes while maintaining the country’s defensive ability against regional uncertainties.  相似文献   
3.
A comprehensive paradigm of future wars can be defined, and is called in this article “Extended conflicts.” These can be characterized by strategic attrition, to which all national resources and all possible international legitimacy are mobilized, in order to achieve a resolution by transformation of the opponent. The use of military force in this kind of conflict is limited. The understanding that we are facing an era of extended conflicts will improve the way it is utilized.  相似文献   
4.
《防务技术》2020,16(2):401-407
The measurement and control of high temperature play very important roles in national defense, military, scientific experiments, industrial and agricultural production. Photoelectric pyrometer is one of the important radiation thermometers for non-contact temperature measurement. It has an important application in the field of high temperature measurement, and its performance directly affects the accuracy of temperature measurement. By improving the design of the detection optical system of the photoelectric pyrometer, the imaging performance of the photoelectric pyrometer can be improved effectively, and the temperature measurement accuracy can be improved. In this paper, the temperature measurement principle of photoelectric pyrometer, the working principle of the detection optical system and the composition of the system are introduced. The optical components that affect the imaging of the optical system of the photoelectric pyrometer are analyzed. The optical pyrometer detection optical system is simulated by ZEMAX software, based on the analysis results, the Modulation Transfer Function (MTF) and the spot Diagram are used as the main evaluation criteria to optimize the design of the objective lens of the photoelectric pyrometer detection optical system. The imaging performance of the photoelectric pyrometer detection optical system and the accuracy of temperature measurement of the photoelectric pyrometer are improved by optimization design of the detection optical system.  相似文献   
5.
The recent Russian approach to strategy has linked nuclear, conventional and informational (cyber) tools of influence into one integrated mechanism. The article traces the intellectual history of this Russian cross-domain concept, discusses its essence and highlights its destabilising effects. By analysing a case outside of Western strategic thought, it demonstrates how strategic concepts evolve differently in various cultural realms and argues for a tailored approach for exploring coercion policies of different actors. The findings of the study are applicable beyond the Russian case, and relevant to scholars and actors exploring, utilising or responding to cross-domain coercion strategy.  相似文献   
6.
Most research on strategic narratives has explored their creation, and their interaction with other elements of national power in the conduct of foreign policy. Yet, the issue of how the targeted political communities receive those strategic narratives, and thus how those narratives are likely to have a political impact, is understudied. This article argues that in order to understand the ways strategic narrative are received within a political community, political myths must be taken into account. It introduces a typology of political myths based on their degree of universality and their degree of coherence with other myths, and shows how those factors influence the reception of strategic narratives. These mechanisms are illustrated through a study of the reception of the Russian strategic narrative in France. This approach offers opportunities to assess the differentiated impact strategic narratives have on political communities.  相似文献   
7.
在分析VORONOI图的性质与威胁代价函数的基础上,针对航路的初始规划提出了一种先局部优化后进行全局优化的算法,从而避免在航路全局优化时陷入局部极小点的危险.通过对一个简单算例的分析,阐述了这种规划方法的合理性和快速性,给出了其对应的伪代码.它可对其他各种航路规划算法的边界条件进行初始预处理,快速确定初始可选航路集的解,缩短航路规划的时间;针对某阵地航路规划的仿真结果表明了该算法的有效性,初始的航路集有效地避开了威胁配置较密集的地方,同时尽量以较短的航路接近目标.  相似文献   
8.
本文运用SWOT分析方法对新疆高校开发中亚教育市场中面临的优势、劣势、机遇、威胁四个方面进行了全面分析。新疆留学生教育的发展,优势与劣势并存、机会与威胁同在,关键是如何充分利用优势、消除劣势。并借助SWOT模型中的不同战略组合提出了新疆开发中亚留学市场的的LCVP战略选择方式,为发展新疆留学生教育提供了依据。  相似文献   
9.
Cyberspace experiences worrying trends that could have a negative impact on the international strategic landscape. The lack or erosion of norms and risky practices and behaviors could lead to greater uncertainty and thus greater instability. Set against a context of renewed competition between great powers, these developments are also tied to the strategic structure of cyberspace. This forum is devoted to discussing factors leading to stability or and instability.  相似文献   
10.
中国非传统安全面临的挑战及思考   总被引:3,自引:1,他引:2  
在对我国21世纪初期安全环境进行综合分析判断的基础上,重点从金融、环境、信息安全、流行疾病、人口安全等方面对中国非传统安全领域面临的挑战进行了深入的分析,探究了非传统安全因素对国家安全形势的影响,提出了有利于安全环境的几点预防性对策。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号