首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3306篇
  免费   74篇
  国内免费   1篇
  2021年   38篇
  2019年   91篇
  2018年   57篇
  2017年   82篇
  2016年   83篇
  2015年   63篇
  2014年   66篇
  2013年   756篇
  2011年   32篇
  2010年   37篇
  2009年   41篇
  2008年   50篇
  2007年   53篇
  2006年   37篇
  2005年   46篇
  2004年   56篇
  2003年   45篇
  2002年   59篇
  2001年   33篇
  2000年   31篇
  1999年   42篇
  1998年   46篇
  1997年   51篇
  1996年   63篇
  1995年   43篇
  1994年   62篇
  1993年   64篇
  1992年   59篇
  1991年   74篇
  1989年   31篇
  1986年   74篇
  1985年   64篇
  1984年   38篇
  1983年   42篇
  1982年   43篇
  1981年   45篇
  1980年   51篇
  1979年   46篇
  1978年   49篇
  1977年   45篇
  1976年   46篇
  1975年   47篇
  1974年   52篇
  1973年   50篇
  1972年   52篇
  1971年   43篇
  1970年   41篇
  1969年   40篇
  1968年   34篇
  1967年   33篇
排序方式: 共有3381条查询结果,搜索用时 15 毫秒
961.
In September 1878 the British Museum received a donation of a folded metal plate which had been embossed and gilded. Restoration of the object revealed that the folded plate was in fact the outer casing of a Roman copper alloy cavalry sports type helmet which dates to the late second or third century AD. The story of what became known as the Guisborough helmet began 14 years earlier in what was then the North Riding of Yorkshire when workers employed by the Cleveland Railway Company discovered a ‘very curious plate of metal’ during road construction. It appears that the helmet was deliberately prepared for deposition and buried at a depth of c30 cm close to a stream. Examination by the authors suggests that this was a high value item that had been repaired many times. Experimental evidence suggests that the decoration alone required approximately 16 h to fashion.  相似文献   
962.
Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities.  相似文献   
963.
The idea of deploying noncollocated sources and receivers in multistatic sonar networks (MSNs) has emerged as a promising area of opportunity in sonar systems. This article is one of the first to address point coverage problems in MSNs, where a number of points of interest have to be monitored in order to protect them from hostile underwater assets. We consider discrete “definite range” sensors as well as various diffuse sensor models. We make several new contributions. By showing that the convex hull spanned by the targets is guaranteed to contain optimal sensor positions, we are able to limit the solution space. Under a definite range sensor model, we are able to exclude even more suboptimal solutions. We then formulate a nonlinear program and an integer nonlinear program to express the sensor placement problem. To address the nonconvex single‐source placement problem, we develop the Divide Best Sector (DiBS) algorithm, which quickly provides an optimal source position assuming fixed receivers. Starting with a basic implementation of DiBS, we show how incorporating advanced sector splitting methods and termination conditions further improve the algorithm. We also discuss two ways to use DiBS to find multiple source positions by placing sensors iteratively or simultaneously. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 287–304, 2017  相似文献   
964.
We consider parallel‐machine scheduling with a common server and job preemption to minimize the makespan. While the non‐preemptive version of the problem is strongly NP‐hard, the complexity status of the preemptive version has remained open. We show that the preemptive version is NP‐hard even if there is a fixed number of machines. We give a pseudo‐polynomial time algorithm to solve the case with two machines. We show that the case with an arbitrary number of machines is unary NP‐hard, analyze the performance ratios of some natural heuristic algorithms, and present several solvable special cases. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 388–398, 2017  相似文献   
965.
The Replenishment at Sea Planner (RASP) is saving the U.S. Navy millions of dollars a year by reducing fuel consumption of its Combat Logistics Force (CLF). CLF shuttle supply ships deploy from ports to rendezvous with underway U.S. combatants and those of coalition partners. The overwhelming commodity transferred is fuel, ship‐to‐ship by hoses, while other important packaged goods and spare parts are high‐lined, or helicoptered between ships. The U.S. Navy is organized in large areas of responsibility called numbered fleets, and within each of these a scheduler must promulgate a daily forecast of CLF shuttle operations. The operational planning horizon extends out several weeks, or as far into the future as we can forecast demand. We solve RASP with integer linear optimization and a purpose‐built heuristic. RASP plans Replenishment‐at‐Sea (RAS) events with 4‐hour (Navy watch) time fidelity. For five years, RASP has served two purposes: (1) it helps schedulers generate a daily schedule and animates it using Google Earth, and (2) it automates reports command‐to‐ship messages that are essential to keep this complex logistics system operating.  相似文献   
966.
Pakistan has an uneven history of dealing with insurgencies and extremism. This article identifies the various campaigns and policies employed to defeat militants and deal with violent extremism. It describes the major anti-state groups and how Pakistan’s military and civilian leaders, relying on the related strategies of selectivity, gradualism and containment, have allowed militancy and terrorism to thrive. This article finds that while the elites and the public may have belatedly come to appreciate the existential internal threats these groups pose to the country, there are strong reasons to doubt the state’s full commitment to its promises to take meaningful action.  相似文献   
967.
The terrorist attacks in France and Belgium of 2015–2016 that occurred while these countries were in a heightened state of alert raise questions about indications and warning methodology as well as effectiveness of the blanket-protection deployment of security services assisted even by the military. Response and perhaps even more anticipation may require strategic rethinking in light of the predatory attacks that target the most vulnerable spots of the public space. This study looks at threat analysis in Belgium as conducted through her intelligence fusion centre Coordination Unit for Threat Analysis (CUTA)?????? since its inception in 2006. With a special focus on what is known, at the time of writing, about the terrorist attacks in Paris and Brussels, this study hopes to put into context how the system (mal)functions and will also consider the preventive measures that respond to the threat, and the international aspects which have implications far beyond Belgian borders. Therefore, a case is made for not just a Belgian homeland security framework, but one that fits into an EU-wide security concept.  相似文献   
968.
This article examines challenges in international nuclear safeguards pertaining to the timely detection of highly enriched uranium production at large-scale gas centrifuge enrichment plants. To establish where present gas centrifuge enrichment plant safeguards measures and approaches could be strengthened, we have created a discrete time model for simulating hypothetical misuse scenarios, both through transient phases and at steady-state. We find that timely detection of misuse at modern large-scale facilities presents a challenge for international safeguards. A toolbox of unattended measurement systems, along with remote monitoring, however, could be used to improve detection timeliness, enabling the initiation of follow-up activities, potentially on a rapid time scale. These measures, which would need very low false alarm rates, should be implemented in a graded approach, depending on the characteristics of each enrichment plant and an analysis of plausible acquisition paths for the State in which it is situated. Some of these technologies could provide significant benefit to plant operators.  相似文献   
969.
South Korea is threatened by its troubled relationship with North Korea. North Korea possesses a large cache of missiles as well as chemical and biological weapons, and the future potential to mount nuclear weapons on its missiles. The United States is also challenged because of its defense commitments to Seoul. As a countermeasure, the United States and South Korea decided to deploy Terminal High Altitude Area Defense (THAAD) missile defenses in South Korea. However, China has objected. Chinese scholars believe the THAAD radar would be able to track Chinese inter-continental ballistic missiles, thereby weakening their deterrent. A technical analysis does not support this assertion. However, it is vital for South Korea, given its proximity and economic interdependence, to reassure China. South Korea should highlight that THAAD will be deployed by the United States Forces Korea and is not a commitment by Seoul to become part of U.S.-led missile defenses in the Asia-Pacific.  相似文献   
970.
The empirical international conflict literature has given much recent attention to interstate armed force’s impact on human well-being. While empirical research has advanced our understanding of the phenomenon considerably, we argue that one conclusion that many studies have reached is preliminary. Some recent research contends that only full-scale war, and not force short of war, has a discernable impact on human welfare or physical quality of life (PQOL). We develop theory on one type of force short of war, large-scale foreign military intervention (FMI), and its potential effects on PQOL. Using interrupted time series and panel corrected standard error methodologies, we find that from 1960 to 2005 large-scale FMI had a statistically and substantively significant impact on the PQOL of populations in 106 developing countries. The specific effect that this type of armed force has depended in large part on the regime type of the target country.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号