全文获取类型
收费全文 | 985篇 |
免费 | 277篇 |
国内免费 | 49篇 |
出版年
2022年 | 14篇 |
2021年 | 18篇 |
2020年 | 14篇 |
2019年 | 13篇 |
2018年 | 8篇 |
2017年 | 58篇 |
2016年 | 53篇 |
2015年 | 40篇 |
2014年 | 63篇 |
2013年 | 116篇 |
2012年 | 126篇 |
2011年 | 135篇 |
2010年 | 45篇 |
2009年 | 35篇 |
2008年 | 43篇 |
2007年 | 63篇 |
2006年 | 69篇 |
2005年 | 83篇 |
2004年 | 68篇 |
2003年 | 58篇 |
2002年 | 28篇 |
2001年 | 40篇 |
2000年 | 37篇 |
1999年 | 19篇 |
1998年 | 7篇 |
1997年 | 11篇 |
1996年 | 10篇 |
1995年 | 4篇 |
1994年 | 1篇 |
1993年 | 4篇 |
1992年 | 8篇 |
1991年 | 6篇 |
1990年 | 9篇 |
1989年 | 4篇 |
1988年 | 1篇 |
排序方式: 共有1311条查询结果,搜索用时 14 毫秒
971.
This paper develops a panel smooth transition vector autoregressive model to investigate the economic growth–defense causality. This model simultaneously resolves the estimation problems of endogeneity, heterogeneity, and nonlinearity. Empirical results support that the causality is bidirectional, nonlinear, time- and country-varying. Economic growth has a negative impact on military spending and vice versa. The larger the HDI, the smaller the negative causality. Evidently, the increase in the level of country development can reduce the negative impact of military outlays on economic growth. Reducing the ratio of military spending to GDP is beneficial for countries with low HDI scores; however, moderately increasing the share of military expenditure is favorable for countries with extremely high HDI scores. Policy authority needs to set optimal education, health, and economic development shares of GDP for purchasing a maximum economic growth rate. 相似文献
972.
The study examines the effect of noncognitive skills on early career choices among young job seekers. Specifically, we analyze the influence of personality traits on the decision by military applicants either to choose the military or a civilian career option. We use a unique micro-level data-set of applicants to the US Navy and exploit the fact that many individuals who initially apply for military jobs eventually choose civilian careers instead. In this institutional setting, job candidates use new information to update their beliefs about the military job match. Personality traits are viewed as productive abilities that influence applicants’ expectations about the economic return to the job and occupational training offered by the Navy. The study finds that many of the 15 lower order personality facets associated with the Big Five traits are predictive of applicants’ job choices and provides suggestive evidence of a link between personality traits, job match expectations, and career choice. 相似文献
973.
974.
Tomas Kucera 《Journal of Military Ethics》2017,16(1-2):20-37
Humanitarian operations may pose challenges to which armed forces prepared for warfighting seem rather ill-equipped. It is the aim of this article to examine in what way military ethics should be adapted to humanitarian tasks. Two ideal types of military ethics are defined here: warfighting and humanitarian. The warfighting ethic is supposed to maximise the utility of the military in war and combat and to that end utilises the virtues of loyalty and honour. In contrast, humanitarian obligations require to a larger extent the development of personal integrity and an ability to follow one’s own conscience. The adaptation of military ethics is demonstrated in the case studies of the UK armed forces and the German Bundeswehr. Whereas the moral code of the UK armed forces remains anchored in the principles of the warfighting ethic, the case of the Bundeswehr presents a military ethic closely approximating the humanitarian ideal type. 相似文献
975.
976.
977.
978.
SAR成像算法通常都基于FFT运算,图像分辨率要受到瑞利限的制约。为了提高图像分辨率,目前常用的SAR/ISAR超分辨成像算法大多借助于现代谱估计技术。从解方程的角度考虑,认为有限长数据的高分辨率谱估计是一个欠定方程问题,估计的结果存在"病态"性。在Bayes估计准则下,把信号谱的先验概率密度作为规整项包含进信号频谱的最大后验概率估计中,提高谱估计的分辨率。将这种方法用于SAR图像峰值特征提取,提高了图像分辨率。 相似文献
979.
Randall R. Dipert 《Journal of Military Ethics》2013,12(1):34-53
Almost all discussions of cyberwarfare, other cyber-attacks, and cyber-espionage have focused entirely on the Internet as the chief means of damage – the Internet as a ‘vector,’ using a term from the theory of infectious diseases. However there are a variety of means, some of which have already been used, that involve cyber-exploitation using vectors other than the Internet. Malware can be installed in the integrated circuits of computers and servers, but also in any devices attached to them – thumb drives, CDs, printers, scanners, and so on. One can also use various forms of electromagnetic radiation at a distance of meters or more to exfiltrate data or to infiltrate corrupt data. I call this large and diverse family of unwanted interference with the functioning of information processing systems other-than-Internet (OTI) attacks on information systems. Stuxnet, and probably the 2007 Israeli corruption of Syrian air defenses, were OTI attacks. Such OTI techniques are more difficult to develop than creating malware, requiring electronic manufacturing facilities or novel technologies, and are thus accessible only to larger corporations and technologically sophisticated countries. Particularly vulnerable would be countries (like the United States and Europe) whose information processing devices are mainly produced outside of the country. Once exploitations via the Internet become harder to perpetrate, OTI exploitations are certain to grow dramatically, eventually requiring equipment for critical uses to be expensively fabricated in (and transported using) secure facilities; expensive detection measures will have to be instituted. This will create challenges for policy, law, and ethics, as well as greatly increasing the cost of many electronic devices. 相似文献
980.
The Biological Weapons Convention (BWC) regime currently suffers from a lack of effective compliance procedures. Because a legally binding compliance protocol to the BWC is not available, other measures are needed to stabilize the regime against the risk of violations of its rules. The Treaty on the Non-Proliferation of Nuclear Weapons, the Chemical Weapons Convention, and the experiences of UN inspection teams show that among the necessary components of effective compliance mechanisms are an intermediary level between bilateral consultations of states parties and involvement of the UN Security Council as well as independent assessment capabilities. This article suggests that the UN Secretary General could assume such an intermediary function and, using the authority contained in Article 99 of the UN Charter, could investigate not only alleged use of biological weapons but also alleged breaches of the BWC. A standing expert unit in the Department for Disarmament Affairs could provide the independent expertise necessary for such investigations. Such a compliance mechanism could provisionally help stabilize the BWC regime until a permanent compliance system can be agreed. 相似文献