warfare相关论文
The paper presents the possibilities of,and methods for,acquiring,analysing and processing optical signals in order to r......
应用认知语言学概念隐喻理论对中医治则治法中的战争隐喻进行研究;战争需要根据瞬息万变的战况,抓住时机,应用正确的战略、战术,从......
信息战(informationwarfare—IW)信息战是指综合运用信息技术和武器,打击敌人的信息系统,特别是侦察和指挥控制系统,使敌人情况不明,难以作出决策,或者给以虚假......
This historiographic essay contends that warfare made and unmade the Qing dynasty between 1644 and 1911,and its study ha......
Since 1990,New Chinese Military History in the West has remedied scholarly neglect of Chinese warfare and changed the us......
Lanchester equations and their extensions are widely used to calculate attrition in warfare models.The current paper add......
The article presents problems related to mechanical protection of vehicles with different add-on armours against chemica......
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in numbe......
土家族多彩的民间歌舞蕴含着深厚的文化内涵,而在其族史发展历程中,土家先民自古以来与大自然和外族进行着顽强的抗争,这个过程中......
从面向体系对抗仿真的EBI(entity,behavior,interaction)建模框架入手,在分析防区外空地攻击系统结构、实体、攻击过程的基础上,针对武器......
介绍了非相干光源的发展和应用,探讨了现阶段应用非相干红外辐射源的必要性....
未来信息化条件下的局部战争是系统与系统的对抗。就武器装备而言,我军并不占有绝对优势。但是我们具有夺取战争胜利的坚实政治基......
西路军大文学叙事始于相关参战人员的个人回忆录,如《星火燎原》(第三辑)所载程世才《血战河西走廊》及《历史的结论》、秦基伟《苦战......
Transmit waveform optimization is critical to radar system performance. There have been a fruit of achievements about wa......
We propose a global warfare model that integrates the models of the whole tensor-centric warfare series, represented as ......
In this paper, as a new contribution to the tensor-centric warfare (TCW) series [1] [2] [3] [4], we extend the kinetic T......
Background: Sulfur mustard (2,2’-bis-chloroethyl-sulfide;SM) has been a military threat since the World War I. SM is th......
Combined with the fact that information asymmetry between two belligerent parties is very common in information-based wa......
It is necessary to assess the risks generated by various micro-organisms that can be used as biological weapons and to u......
Distributed Denial of Service (DDoS) is known to compromise availability of Information Systems today. Widely deployed M......
In the first paper of the tensor-centric warfare (TCW) series [1], we proposed a tensor model of combat generalizing ear......
This paper presents the complex dynamics synthesis of the combat dy-namics series called tensor-centric warfare (TCW;for......
This paper is the third part of the complex combat dynamics series, called tensor-centric warfare (for the first two par......
Bioterrorism has received a lot of attention in the first decade of this century.Biological agents are considered attrac......
Electronic warfare is a modern combat mode,in which predicting digital material consumption is a key for material requir......
Operation architecture plays a more important role in Network Centric Warfare(NGAV),which involves dynamic operation net......
Analyses of the systematic confrontation between two military forcfes are the highest hierarchy on opera-tional effectiv......
...
Improvements to the Fluoride Reactivation Method by Simple Organic Extraction for Retrospective Dete
A rapid and simple organic extraction method for the determination of the chemical warfare agent, isopropyl methylphosph......
本文讨论了高技术兵器的分类和基本特征以及高技术战争的内涵,进而阐述了高技术对武器装备、作战样式、部队编制、后勤保障以及战......
In the present world, international strategic pattern is entering a period of reconstitution and readjustment in the hig......
A joint two-dimensional(2D)direction-of-arrival(DOA)and radial Doppler frequency estimation method for the L-shaped arra......
运用CitespaceⅡ信息可视化图谱软件对"Cyberspace"Or"Cyberwarfare"研究文献数据进行分析,绘制了共引网络图谱,井依据图谱中关键节点文......
For more than 2500 years, soil tunnels have been used in warfare and smuggling. Initially tunnels were utilized to attac......