全文获取类型
收费全文 | 479篇 |
免费 | 10篇 |
出版年
2021年 | 5篇 |
2019年 | 14篇 |
2018年 | 9篇 |
2017年 | 11篇 |
2016年 | 11篇 |
2015年 | 11篇 |
2013年 | 79篇 |
2011年 | 5篇 |
2010年 | 7篇 |
2009年 | 4篇 |
2007年 | 6篇 |
2006年 | 7篇 |
2005年 | 11篇 |
2004年 | 8篇 |
2003年 | 5篇 |
2001年 | 4篇 |
2000年 | 9篇 |
1999年 | 6篇 |
1998年 | 5篇 |
1997年 | 9篇 |
1996年 | 12篇 |
1995年 | 4篇 |
1994年 | 10篇 |
1993年 | 6篇 |
1992年 | 7篇 |
1991年 | 14篇 |
1990年 | 8篇 |
1989年 | 12篇 |
1988年 | 6篇 |
1987年 | 11篇 |
1986年 | 9篇 |
1985年 | 11篇 |
1984年 | 9篇 |
1983年 | 7篇 |
1982年 | 6篇 |
1981年 | 8篇 |
1980年 | 10篇 |
1979年 | 8篇 |
1978年 | 8篇 |
1977年 | 8篇 |
1976年 | 9篇 |
1975年 | 6篇 |
1974年 | 11篇 |
1973年 | 8篇 |
1972年 | 9篇 |
1971年 | 13篇 |
1970年 | 3篇 |
1969年 | 6篇 |
1968年 | 5篇 |
1967年 | 3篇 |
排序方式: 共有489条查询结果,搜索用时 15 毫秒
251.
Stephen A. Emerson 《Small Wars & Insurgencies》2013,24(4):669-687
This article provides an in-depth examination and analysis of the 2006–2009 Tuareg rebellion in Mali and Niger. It identifies the underlying reasons behind the rebellion, explores contrasting counter-insurgency (COIN) strategies employed by the two governments, and presents some lessons learned. While both COIN approaches ultimately produced similar peace settlements, the article argues that the Malian strategy of reconciliation combined with the selective use of force was far more effective than the Nigerien iron fist approach at limiting the size and scope of the insurgency and producing a more sustainable peace. It concludes by looking at the role of external actors, particularly the United States, and how the failure to internationalize the conflict was actually more beneficial to the local COIN effort, as well as to the longer strategic interests of the United States in the region. 相似文献
252.
Devabhaktuni Srikrishna A. Narasimha Chari Thomas Tisch 《The Nonproliferation Review》2013,20(3):573-578
The United States has multiple nuclear detection initiatives to secure against a terrorist nuclear attack, including the Container Security Initiative, installation of radiation detectors at U.S. border points of entry, and establishment of the Domestic Nuclear Detection Office (DNDO). The current nuclear detection system architecture falls short of being able to reliably catch fissile nuclear material in transit, specifically shielded Highly Enriched Uranium (HEU) and Plutonium (Pu), both within the US and abroad. Checkpoints at border crossings can be circumvented, and no adequate system is under development to deter the transport of fissile materials. Using nuclear link-budget calculations, we show why a network relying primarily on handhelds, fixed detectors, and portals is not sufficient. We examine the technical, economic, and operational feasibility of a comprehensive national network incorporating in-vehicle detectors to reliably detect and deter the transport of fissile material inside the vehicle itself. 相似文献
253.
254.
Nadir A.L. Mohammed 《Defence and Peace Economics》2013,24(3):203-231
This paper investigates theoretically and empirically the determinants of military spending in Africa. It specifies a formal model and uses time‐series and cross‐sectional estimations to ascertain the reasons behind variations in military allocations across and within 40 African countries during 1960–1991. The differences in military expenditures appear to reflect a complex of economic, political, and strategic factors at both national and international levels. Strategic considerations are, however, found to be the most important factors in most African countries. 相似文献
255.
AbstractIn 2011 a wave of revolutionary movements, the so-called Arab Spring, spread in the Middle East and North Africa. Libya was one of the most affected countries, ending Gaddafi’s dictatorship after an international intervention and a civil war. This paper assesses the effects that this revolution had on Libyan economy. The analysis is made by means of the synthetic control method. Our estimates for the 2011–2014 period show (i) a cumulative loss in the growth rate of per capita real GDP of 64.15%; (ii) a cumulative loss in per capita real GDP of 56,548 dollars; and (iii) a cumulative loss in the aggregate real GDP of 350.5 billion dollars. 相似文献
256.
257.
We consider an M/G/1 retrial queue with finite capacity of the retrial group. First, we obtain equations governing the dynamic of the waiting time. Then, we focus on the numerical inversion of the density function and the computation of moments. These results are used to approximate the waiting time of the M/G/1 queue with infinite retrial group for which direct analysis seems intractable. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007 相似文献
258.
Ben A. Chaouch 《海军后勤学研究》2007,54(1):94-108
This paper develops an inventory model that determines replenishment strategies for buyers facing situations in which sellers offer price‐discounting campaigns at random times as a way to drive sales or clear excess inventory. Specifically, the model deals with the inventory of a single item that is maintained to meet a constant demand over time. The item can be purchased at two different prices denoted high and low. We assume that the low price goes into effect at random points in time following an exponential distribution and lasts for a random length of time following another exponential distribution. We highlight a replenishment strategy that will lead to the lowest inventory holding and ordering costs possible. This strategy is to replenish inventory only when current levels are below a certain threshold when the low price is offered and the replenishment is to a higher order‐up‐to level than the one currently in use when inventory depletes to zero and the price is high. Our analysis provides new insight into the behavior of the optimal replenishment strategy in response to changes in the ratio of purchase prices together with changes in the ratio of the duration of a low‐price period to that of a high‐price period. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2007. 相似文献
259.
This article fills the gap in existing scholarship on asymmetric conflict, indigenous forces, and how socio-cultural codes shape the dynamics and outcomes of conflict transformation. Specifically, it identifies three key socio-cultural values commonplace in honorific societies: retaliation, hospitality, and silence. As sources of effective pro-insurgent violent mobilisation and support from among the local population, these values provide insurgents with an asymmetric advantage over much stronger incumbents. Using the case studies of the two Russian counterinsurgencies in Chechnya, the article shows the mechanisms on the ground through which Moscow’s deployment of indigenous forces against insurgents helped to stem the tide of conflict, reversing the insurgents’ initial advantage in terms of asymmetry of values. 相似文献
260.
An MX/G/1 queueing system with disasters and repairs under a multiple adapted vacation policy
下载免费PDF全文
![点击此处可从《海军后勤学研究》网站下载免费的PDF全文](/ch/ext_images/free.gif)
We consider a queueing system with batch Poisson arrivals subject to disasters which occur independently according to a Poisson process but affect the system only when the server is busy, in which case the system is cleared of all customers. Following a disaster that affects the system, the server initiates a repair period during which arriving customers accumulate without receiving service. The server operates under a Multiple Adapted Vacation policy. The stationary regime of this process is analyzed using the supplementary variables method. We obtain the probability generating function of the number of customers in the system, the fraction of customers who complete service, and the Laplace transform of the system time of a typical customer in stationarity. The stability condition for the system and the Laplace transform of the time between two consecutive disasters affecting the system is obtained by analyzing an embedded Markov renewal process. The statistical characteristics of the batches that complete service without being affected by disasters and those of the partially served batches are also derived. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 171–189, 2015 相似文献