首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   387篇
  免费   2篇
  389篇
  2021年   7篇
  2020年   4篇
  2019年   13篇
  2018年   7篇
  2017年   7篇
  2015年   5篇
  2014年   4篇
  2013年   57篇
  2010年   5篇
  2009年   6篇
  2008年   7篇
  2007年   3篇
  2005年   3篇
  2004年   6篇
  2003年   4篇
  2002年   5篇
  2001年   4篇
  2000年   5篇
  1999年   4篇
  1998年   7篇
  1997年   4篇
  1996年   10篇
  1995年   6篇
  1994年   3篇
  1993年   6篇
  1992年   6篇
  1991年   11篇
  1990年   5篇
  1989年   15篇
  1988年   8篇
  1987年   11篇
  1986年   11篇
  1985年   6篇
  1984年   9篇
  1982年   5篇
  1981年   6篇
  1980年   11篇
  1979年   5篇
  1978年   7篇
  1977年   4篇
  1976年   7篇
  1975年   6篇
  1974年   6篇
  1972年   4篇
  1971年   8篇
  1970年   6篇
  1969年   6篇
  1968年   5篇
  1967年   5篇
  1966年   6篇
排序方式: 共有389条查询结果,搜索用时 15 毫秒
301.
    
The aim of this article is to consider how Algeria's most prized achievement and treasured memory – the FLN's victory over the French in the war of liberation – has helped stimulate and sustain the violence that has blighted the country since independence. It argues that successive governments have propagated a legend of the war that encourages and legitimises rebellion and armed resistance. By celebrating the actions and achievements of a committed band of revolutionaries they have established a precedent whereby it is every citizen's duty to oppose and resist an unjust government. Time and again therefore, insurgent groups like the FFS, MIA, and AIS have justified their actions and won popular support by portraying themselves as the early FLN's natural heir.  相似文献   
302.
There have been growing claims in media circles and law-enforcement settings that street gangs and criminal groups are turning to Internet-based social networking sites for various reasons ranging from the showcasing of their images and exploits to the suspected recruitment of members. The present study investigates whether such a trend is, in fact, in place. The presence of street gangs on these Internet sites is referred to as cyberbanging. While there is some anecdotal evidence suggesting that gangs are turning to social networking sites, there is little available research on exactly how street gangs and criminal groups use the Internet. Our main argument is that gang culture is in many ways an individualized phenomenon and this feature ties in directly with recent assessments of the Internet as a setting that is governed by a process of networked individualism. This theoretical link between the individualized gang setting and the presence of gang members on social networking sites helps us understand why recruitment is improbable even in a context where people are openly diffusing their image and exploits to a growing number of Internet users. The empirical segment of this research adds to this general outlook. Based on a keyword search of over 50 street gang names, the three main social networking sites (Twitter, Facebook, and MySpace) were monitored for street gang presence. Results illustrate that gang presence on social networking sites is linked primarily to promoting a general gang or street culture through individual displays. In regard to the visitors to such sites, there is no evidence that they are being tricked or manipulated in any way. They are, however, showing their curiosity in regard to such groups and, for those who share their comments and opinions, signs of support are evident. Thus, whereas criminal gangs are not proactively using the Internet to convert anyone into being gang members, social networking sites are creating a new venue for people who share or are sensitive to the values underlying street gang lifestyle to come together. These sites essentially create a new convergence setting for gang members to interact with a wider number of people who would probably never have been exposed to their lifestyles and exploits through physical interactions. The study's conclusion extends these findings toward further research in this area, as well as outlining the more relevant implications for law-enforcement monitoring of this growing phenomenon.  相似文献   
303.
304.
    
This article empirically explores the relationship between military expenditure, external debts and economic performance in the economies of sub-Saharan Africa using a sample of 25 countries from 1988–2007. In investigating the defence–external debt nexus, we employ three advanced panel techniques of fully modified OLS (FMOLS), Dynamic OLS (DOLS) and dynamic fixed effect (DFE) to estimate our model. We observe that military expenditure has a positive and significant impact on external debt in African countries. Real GDP affects the total debt stock of African countries with a negative relationship. Our empirical results based on long-run elasticities show that a 1% rise in national output leads to a decline in external debt by 1.52%, on average. Policy-wise, the study suggests that African countries need to strengthen areas of fiscal responsibility and pursue models that encourage rational spending, particularly reductions in military expenditure.  相似文献   
305.
    

The aim of this paper is to indicate the extent to which the arms race against Turkey, in which Greece and Cyprus have been entangled, imposes a defence expenditure burden that is tough for the two allies to bear. To do so we have resorted to evaluating the optimal military expenditure for the two countries, allied in the context of the Integrated Defence Doctrine, which is compatible with the constraints imposed by the resources of their economies. All experiments and scenarios examined lead to the conclusion that the current defence burden of the two allies seems to be driving their economies beyond capacity limits. The fact remains, however, that under the circumstances, a one-sided disarmament policy like the one currently followed by Greece, is a risky choice given that the long-term armament programmes pursued by Turkey, whose role in this arms race has been proven as leading, leave very small room to the Greek and Cypriot sides to reduce their own defence expenditure.  相似文献   
306.
    

The scope of this paper is to forecast the extent to which a settlement of the Cyprus issue may be possible given the decisions taken during the Copenhagen EU summit. It aims, in addition, at investigating the possibilities of improvement in Greek-Turkish relations which may lead, in turn, to reducing the arms race between the two countries. The paper uses a Genetically Evolved Certainty Neuron Fuzzy Cognitive Map algorithm to consider a number of scenarios examining the possible reactions of all sides involved in the Cyprus issue, namely Greece, Turkey, Cyprus, the Turkish-Cypriot community and the international environment. All simulation exercises suggest that the Greek and the Cypriot side should not necessarily rely on the decisions taken during the Copenhagen summit conference. The forecasts point out, in addition, that the optimism of the Greek government concerning the outlook of its relations with Turkey, and a subsequent reduction of the arms race against it, is far from being justified.  相似文献   
307.
ABSTRACT

Over a decade of security force assistance (SFA) initiatives to build an effective Somali National Army (SNA) failed because of the interrelated effects of political, contextual and operational challenges. The key political challenges were interest asymmetry between international actors and Somali elites, insufficient focus on institution-building and a lack of donor coordination. The principal contextual challenges in Somalia were the legacies of two decades of state collapse and the negative effects of clan dynamics. The main operational challenges were building an army while simultaneously fighting a war, the complexities of military integration, and the severe capability gaps afflicting the SNA.  相似文献   
308.
The maintenance strategy considered in this article is in the class of block replacement policies. The working unit is replaced by new ones at instants T,2T,3T,… independently of the age and state of the unit. If a failure occurs between these instants, the random repair cost is evaluated. If it is smaller than a predetermined control limit then a minimal repair is carried out. Otherwise the unit is replaced by a used unit. The performance of this maintenance strategy is evaluated in terms of average total cost per time unit over an infinite time span. The mathematical model is defined and several analytical results are obtained. A computer program has been written, which solves the mathematical problem, and some examples are given for the cases where the underlying life distribution is gamma, Weibull or truncated normal.  相似文献   
309.
310.
针对真实物联网环境中的缺失多元时间序列异常检测难题,提出一种融合缺失信息图嵌入的多元时间序列异常检测算法;基于预插值与异常检测任务融合的联合学习框架,设计一个基于时序高斯核函数的图神经网络(graph neural network, GNN)预插值模块,实现了预插值与异常检测任务的共同优化;提出一种时间序列数据缺失信息嵌入的图结构学习方法,采用图注意力机制融合缺失信息掩蔽矩阵和时空特征向量,有效建模多元时间序列缺失数据分布的潜在联系。在真实物联网传感器数据集上验证了提出算法的性能,实验结果表明,该方法在缺失多元时间序列异常检测任务上显著优于主流两阶段方法,预插值模块对比实验部分充分证明了基于高斯核函数的GNN预插值层的有效性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号