全文获取类型
收费全文 | 551篇 |
免费 | 13篇 |
出版年
2021年 | 8篇 |
2020年 | 5篇 |
2019年 | 21篇 |
2018年 | 12篇 |
2017年 | 6篇 |
2016年 | 15篇 |
2015年 | 9篇 |
2014年 | 11篇 |
2013年 | 129篇 |
2011年 | 9篇 |
2009年 | 7篇 |
2008年 | 5篇 |
2007年 | 15篇 |
2005年 | 7篇 |
2004年 | 5篇 |
2003年 | 10篇 |
2002年 | 11篇 |
2001年 | 5篇 |
1999年 | 8篇 |
1998年 | 8篇 |
1997年 | 11篇 |
1996年 | 11篇 |
1995年 | 6篇 |
1994年 | 12篇 |
1993年 | 6篇 |
1992年 | 7篇 |
1990年 | 9篇 |
1989年 | 11篇 |
1988年 | 5篇 |
1987年 | 6篇 |
1986年 | 14篇 |
1985年 | 9篇 |
1984年 | 5篇 |
1983年 | 6篇 |
1982年 | 10篇 |
1981年 | 7篇 |
1980年 | 7篇 |
1979年 | 11篇 |
1978年 | 9篇 |
1977年 | 5篇 |
1976年 | 6篇 |
1975年 | 6篇 |
1974年 | 9篇 |
1973年 | 7篇 |
1972年 | 7篇 |
1971年 | 9篇 |
1970年 | 9篇 |
1969年 | 5篇 |
1967年 | 6篇 |
1948年 | 4篇 |
排序方式: 共有564条查询结果,搜索用时 250 毫秒
61.
Joanna R.Hall Olivia Matthews Timothy N.Volonakis Eric Liggins Karl P.Lymer Roland Baddeley Innes C.Cuthill Nicholas E.Scott-Samuel 《防务技术》2021,17(6):1833-1839
The human visual system is still an important factor in military warfare; military personnel receive training on effective search strategies, and camouflage that can effectively conceal objects and personnel is a key component of a successful integrated survivability strategy. Previous methods of camouflage assessment have, amongst others, used psychophysics to generate distinctiveness metrics. However, the population from which the human observers are drawn is often not well defined, or necessarily appropriate. In this experiment we designed a new platform for testing multiple patterns based on a camouflaged object detection task, and investigate whether trained military observers perform better than civilians. We use a two-alternative forced choice paradigm, with participants searching images of woodland for a replica military helmet displaying Olive Green, Multi Terrain Pattern, US Marine Pattern or, as a conspicuous control, UN Peacekeeper Blue. Our data show that there is no difference in detection performance between the two observer groups but that there are clear differences in the effectiveness of the different helmet colour patterns in a temperate woodland environment. We conclude that when tasks involve very short stimulus presentation times, task-specific training has little effect on the success of target detection and thus this paradigm is particularly suitable for robust estimates of camouflage efficacy. 相似文献
62.
Charles R. Boehmer 《Defence and Peace Economics》2013,24(3):249-268
This paper extends the joint product model of military alliances to apply to the new strategic doctrine adopted by NATO in the 1990s. In particular, a choice must be made between protecting one's own territory and pooling forces for an alliancewide rapid reaction force. This new model accounts for a host of externalities and their implications for burden sharing, full financing, and allocative efficiency. The Pigouvian taxes that adjust for force thinning and attack deflection are shown to finance optimal border‐protecting forces under a variety of circumstances. Second‐best considerations arise owing to the pure publicness of rapid reaction forces. The ideal toll arrangement does not currently characterize NATO financing, nor is it likely to do so. 相似文献
63.
Bryan R. Early 《The Nonproliferation Review》2013,20(2):259-280
The United Arab Emirates (UAE) has laid out an ambitious plan to become the first Arab country to possess a civilian nuclear energy program. Central to that effort has been the Emirati government's ability to obtain foreign nuclear assistance. This article traces the UAE's strategies for overcoming the obstacles that stood in the way of nuclear suppliers providing assistance. It examines the approach taken by the UAE to assuage the safety and security concerns of nuclear suppliers, how the UAE leveraged its alliances with France and the United States to obtain their cooperation, and its strategies for engaging domestic interest groups in supplier states. The generalizable elements of the UAE's strategies are discussed and used to provide insight into the prospects for other Middle Eastern states' bids to obtain similar assistance. The article concludes with a discussion of the potentially transformative aspects of the strategies employed by the UAE in shaping other countries' pursuit of nuclear energy in the region. 相似文献
64.
Recent scholarship has largely ignored systematic differences in the existential threats that nuclear-weapon possessors pose to other states. This study theorizes that the capacity to pose existential threats shapes nuclear-armed states’ willingness to use military force against one another. We explore three hypotheses regarding how nuclear-based existential threats can deter conflict or encourage it, including under the conditions proposed by the stability–instability paradox. We rely on a statistical analysis of nuclear-armed dyads from 1950 to 2001 and employ the Nuclear Annihilation Threat (NAT) Index to capture variation in the existential threats nuclear-armed states pose to one another. We find that being able to pose an existential threat to another state emboldens potential initiators to use military force but does not deter attacks. The emboldening effects are particularly strong under the hypothesized conditions of the stability–instability paradox. Our study provides unique contributions to ongoing debates over the political effects of nuclear weapons. 相似文献
65.
The US Air Force is asking when to replace its aging aircraft. We develop a framework to identify economically optimal replacement strategies that recognizes cost trade-offs and incorporates age effects. We also preview a stochastic methodology. We use the framework to identify an optimal strategy, defined by the replacement age, for a generic fleet and conduct a sensitivity analysis. Quantitative illustrations show that the range of strategies that provides close-to-optimal outcomes widens as the operating and support (O&S) cost growth rate decreases and the ratio of the acquisition price to the initial O&S cost increases. A wider range implies more decision-making leeway. 相似文献
66.
67.
68.
69.
Kevin D. McCranie Marcus Faulkner David French Gregory A. Daddis James Gow Austin Long 《战略研究杂志》2013,36(2):281-293
Patrick Finney (ed.), The Origins of the Second World War. London: Arnold, 1997. Pp.xvi + 461, index. £15.99. ISBN 0–340–67640‐X. Maria Emilia Paz, Strategy, Security, and Spies: Mexico and the US as Allies in World War II. University Park, PA: The Pennsylvania State University Press, 1997. Pp.xii + 264, 10 illus., biblio., index. $55 (cloth); $19.95 (paper). ISBN 0–271–01665–5 and 01666–3. Norman J.W. Goda, Tomorrow the World: Hitler, Northwest Africa and the Path toward America. College Station, Texas A&;M University Press, 1998. Pp.xxvi + 307, 2 maps, biblio., index. $39.95. ISBN 0–89096–807–1. Michael J. Hogan, A Cross of Iron: Harry S. Truman and the Origins of the National Security State, 1945–1954. Cambridge; New York: Cambridge University Press, 1998. Pp.xii + 525, biblio., index. £25; $34.95. ISBN 0–521–64044‐X. Stephen Van Evera, Causes of War: Power and the Roots of Conflict. Ithaca, NY: Cornell University Press, 1999. Pp.viii + 270, index. $35. ISBN 0–801403201–4. Eric Arnett (ed.), Nuclear Weapons and Arms Control in South Asia after the Test Ban, SIPRI Research Report No.14. Oxford: Oxford University Press/Stockholm Int Peace Research Institute, 1998. Pp.viii + 98, index. £12.99. ISBN 0–19–8294115. T.V. Paul, Richard J. Harknett and James J. Wirtz (eds.), The Absolute Weapon Revisited: Nuclear Arms and Emerging International Order. Ann Arbor, Michigan: The University of Michigan Press, 1998. Pp.vi + 312, index. $47.50/£36. ISBN 0–472–10863–8. 相似文献
70.
David J. Karl 《战略研究杂志》2013,36(4):619-641
Policies to counter the threat of weapons of mass destruction (WMD) have, for the most part, been modeled on strategies originally devised to counter the danger of nuclear proliferation. While useful in countering a traditional CBN (chemical/biological/nuclear)/WMD threat, current counter-proliferation and non-proliferation regimes are insufficient to meet the challenge of maritime terrorism. Maritime terrorism represents a new category of threat; one that partially overlaps with conventional WMD, but for which – due to the scope and nature of the maritime industry – traditional counter-proliferation policies may be inadequate and even inappropriate. This article outlines the means by which maritime shipping can be used as WMD and discusses the policies implemented to deal with these threats, in light of the challenges presented to traditional conceptualizations of WMD and counter-proliferation strategies. 相似文献