首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   741篇
  免费   18篇
  2021年   11篇
  2019年   15篇
  2018年   8篇
  2017年   19篇
  2016年   13篇
  2015年   14篇
  2014年   18篇
  2013年   134篇
  2012年   7篇
  2010年   10篇
  2009年   17篇
  2007年   11篇
  2006年   10篇
  2005年   11篇
  2004年   16篇
  2002年   17篇
  2001年   9篇
  2000年   11篇
  1999年   7篇
  1998年   15篇
  1997年   9篇
  1996年   9篇
  1995年   11篇
  1994年   17篇
  1993年   16篇
  1992年   11篇
  1991年   18篇
  1990年   12篇
  1989年   19篇
  1988年   20篇
  1987年   20篇
  1986年   20篇
  1985年   12篇
  1984年   13篇
  1983年   9篇
  1982年   8篇
  1981年   11篇
  1980年   7篇
  1979年   11篇
  1978年   15篇
  1977年   6篇
  1976年   8篇
  1975年   8篇
  1974年   10篇
  1973年   11篇
  1972年   11篇
  1971年   6篇
  1970年   11篇
  1969年   8篇
  1967年   6篇
排序方式: 共有759条查询结果,搜索用时 15 毫秒
221.
This article examines challenges in international nuclear safeguards pertaining to the timely detection of highly enriched uranium production at large-scale gas centrifuge enrichment plants. To establish where present gas centrifuge enrichment plant safeguards measures and approaches could be strengthened, we have created a discrete time model for simulating hypothetical misuse scenarios, both through transient phases and at steady-state. We find that timely detection of misuse at modern large-scale facilities presents a challenge for international safeguards. A toolbox of unattended measurement systems, along with remote monitoring, however, could be used to improve detection timeliness, enabling the initiation of follow-up activities, potentially on a rapid time scale. These measures, which would need very low false alarm rates, should be implemented in a graded approach, depending on the characteristics of each enrichment plant and an analysis of plausible acquisition paths for the State in which it is situated. Some of these technologies could provide significant benefit to plant operators.  相似文献   
222.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy.  相似文献   
223.
John Brown is usually not considered to have been a terrorist, and even recent analyses of his activities consider him to be a guerrilla fighter or insurgent in his activities in Kansas. Brown, however, meets the criteria of a terrorist more than a guerrilla fighter when his activities in the Kansas Territory are considered. His raid on Harpers Ferry, however, is more in line with guerrilla operations or insurgent activities.  相似文献   
224.
225.
The problem of finding a strict total order for a finite set of multiple criteria alternatives is considered. Our research extends previous work by us, which considered finding a partial order for a finite set of alternatives. We merge the preference information extracted from the preference cones and corresponding polyhedral sets, with the information derived from pairwise comparisons of two alternatives, yielding a preference matrix. This preference matrix is used as input to an integer programming model to obtain a strict total order that provides a transitive ranking for the set of alternatives. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 155–163, 2014  相似文献   
226.
In most western countries, there is a strong incentive for defence department budget-holders to expend all of the funds they are authorized to spend in a fiscal year. In this paper, we question whether this emphasis makes sense. We develop a model of a defence department’s operating expenditure assuming a fixed level of funding for a year and uncertain costs. The results of the model suggest that the incentive for departmental managers to expend all authorized funds is inefficient. We explore the implications of the model for the Department of National Defence (DND) in Canada in light of the recent criticism of DND lapsed funding by the Auditor-General of Canada.  相似文献   
227.
This paper provides a political economy analysis of the evolution of unmanned aerial vehicles (UAV), or ‘drones’ in the USA. Focus is placed on the interplay between the polity and private economic influences, and their impact on the trajectory of political, economic, and military outcomes. We identify the initial formation of the drone industry, trace how the initial relationships between the military and the private sector expanded over time, and discuss present relationships. Understanding the historical evolution of UAV technology, as well as the major players in the industry today, is important for ongoing policy debates regarding the use of drones both domestically and internationally.  相似文献   
228.
229.
The main objective of the paper is to decipher the military expenditure–economic growth relationship, taking the level of economic development (income) into consideration. Our findings suggest the following: (i) military expenditure has a significantly negative relationship to economic growth for the 23 countries with initial incomes (threshold variable) less than or equal to $475.93; (ii) when the threat level is heightened, economic growth (23 countries) is expected to decrease. However, military expenditure in the presence of sufficiently large threats increases growth; (iii) for the remaining 69 countries whose initial incomes (real GDP per capita in 1992 price) exceed $475.93, no significant relationship exists whether the threat variable is taken into consideration or not.  相似文献   
230.

This paper explores some of the key issues associated with the restructuring of the defence industry. A comparison is made between the US and the European Defence Industrial Bases in terms of the drivers for change and the paradigms within which change has taken place. Having shown that some very important differences exist, the paper then explores the approaches that have been adopted for industry consolidation and references them to the academic literature on mergers and acquisitions (M&As) and strategic alliances (SAs). Given that most of the key defence players recognise the need to be global players, the paper presents an argument that the European firms’ experience of operating with a wide range of forms of corporate alliance will serve them in good stead for operating on a global defence scale. US firms, in contrast, have focused largely on M&A activity.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号