首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   259篇
  免费   12篇
  国内免费   7篇
  2021年   2篇
  2020年   16篇
  2019年   25篇
  2018年   24篇
  2017年   28篇
  2016年   21篇
  2015年   4篇
  2014年   27篇
  2013年   73篇
  2012年   6篇
  2011年   5篇
  2010年   4篇
  2009年   5篇
  2008年   4篇
  2007年   4篇
  2006年   2篇
  2005年   10篇
  2004年   4篇
  2003年   3篇
  2002年   2篇
  2001年   3篇
  2000年   1篇
  1999年   1篇
  1998年   1篇
  1995年   1篇
  1994年   1篇
  1990年   1篇
排序方式: 共有278条查询结果,搜索用时 15 毫秒
121.
提出了在一定经费的约束条件下,使所有二级存储场站的所有战备器材期望缺货数最小的模型,通过对后方仓库存量初值和场站库存量的确定,求解出后方仓库和场站之间库存量的优化分配调整方案。最后通过实例得出发散型布局形态模型。  相似文献   
122.
During the transformation period of the Ottoman Empire leading to the Republic of Turkey, many conflicts took place between 1918 and 1923. These conflicts interrupted the servicing of the Ottoman war bond. The reimbursement likelihood of this bond was related to the outcomes of First World War and the hostilities. This paper analyses the impacts of First World War and hostilities on the risk assessments regarding the Ottoman war debt, using manually collected data on the price of the Ottoman war bond traded at the ?stanbul bourse between 1918 and 1925. The empirical results imply that the defeat of the Bulgarian army and the peace offer of Austria-Hungary were associated with the increasing premium demanded by investors of the bond. The victories of the Turkish National Movement and the peace offer of the Allies to end the hostilities by 1922 positively affected the likelihood of the servicing of the debt.  相似文献   
123.
ABSTRACT

The Kargil conflict was a limited war between India and Pakistan fought along the Kashmir Line of Control during the spring/summer of 1999. Named for the principal town in the combat zone on the Indian side, it was the first open warfare between India and Pakistan as declared nuclear weapons states and included the first combat employment of the Indian Air Force since 1971. Despite its intensity, it was also characterised by considerable restraint on both sides. The potential for conventional escalation, however, was high and the possibility of nuclear confrontation could not be excluded. It had significant long-term ramifications for both countries and constitutes an important part of the backdrop to their relations today.  相似文献   
124.
ABSTRACT

This article aims to identify and elaborate the causes and ramifications of applying transitional justice, in particular accountability measures, to situations of war. It focuses on the correlations between peace and justice – and hence an important perspective on the question ‘how do wars end’. The article seeks to understand some of the main challenges associated with pursuing accountability for crimes committed in contemporary forms of conflict, including civil wars and abuses committed by major powers in armed conflict.  相似文献   
125.
近年来,随着军队使命任务的拓展,涉外非战争军事行动日益成为国家运用军事力量的重要方式。因此,必须加强涉外非战争军事行动中法律保障问题研究,使其在法律框架下进行。加强对涉外非战争军事行动的法律保障,有助于为军队遂行多样化军事任务提供有力的法律支持和保障。  相似文献   
126.
从关于国防和军队重大改革的重要论述入手,系统地阐述了武警部队重大改革必须向“能打胜仗”的战斗力聚焦。主要从三个层面进行分析:一是向提高部队整体素质及优化规模结构聚焦;二是向提高部队武器装备保障效能聚焦;三是向增强部队以执勤处突为中心的军事能力聚焦。  相似文献   
127.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity.  相似文献   
128.
根据战备物资储备工作的特点和要求,分析了统筹工作的目的和意义,用于指导战备物资的储备工作。构建了战备物资储备统筹模型,运用定性和定量相结合的方法,综合考虑各种因素对储备的影响,对各方向的战备物资消耗需求量进行多层次的统筹,最终获得战备物资的储备限额量。  相似文献   
129.
根据战备物资储备工作的特点和要求,分析了统筹工作的目的和意义,用于指导战备物资的储备工作。构建了战备物资储备统筹模型,运用定性和定量相结合的方法,综合考虑各种因素对储备的影响,对各方向的战备物资消耗需求量进行多层次的统筹,最终获得战备物资的储备限额量。  相似文献   
130.
A large collection of captured documents from the very highest levels of the Iraqi government offers a chance to gain insight into why Saddam Hussein was unwilling and unable to alter his strategy on the eve of the 2003 war that toppled his regime. This paper explores some of the perceptions and misperceptions that Saddam Hussein took away from the 1991 Gulf War and shows how they affected his decisionmaking on the eve of the war in 2003. It concludes with some thoughts on the policy implications of these findings.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号