全文获取类型
收费全文 | 317篇 |
免费 | 7篇 |
出版年
2021年 | 5篇 |
2020年 | 4篇 |
2019年 | 8篇 |
2018年 | 5篇 |
2017年 | 4篇 |
2015年 | 6篇 |
2014年 | 5篇 |
2013年 | 49篇 |
2012年 | 5篇 |
2010年 | 9篇 |
2009年 | 4篇 |
2008年 | 7篇 |
2006年 | 4篇 |
2005年 | 5篇 |
2004年 | 5篇 |
2003年 | 5篇 |
2002年 | 4篇 |
2001年 | 4篇 |
2000年 | 4篇 |
1998年 | 5篇 |
1997年 | 4篇 |
1996年 | 9篇 |
1995年 | 4篇 |
1993年 | 4篇 |
1992年 | 5篇 |
1991年 | 8篇 |
1990年 | 5篇 |
1989年 | 8篇 |
1988年 | 8篇 |
1987年 | 7篇 |
1986年 | 7篇 |
1985年 | 6篇 |
1984年 | 6篇 |
1982年 | 4篇 |
1981年 | 5篇 |
1980年 | 10篇 |
1979年 | 4篇 |
1978年 | 6篇 |
1977年 | 4篇 |
1976年 | 5篇 |
1975年 | 6篇 |
1974年 | 4篇 |
1973年 | 2篇 |
1972年 | 3篇 |
1971年 | 8篇 |
1970年 | 4篇 |
1969年 | 4篇 |
1968年 | 5篇 |
1967年 | 4篇 |
1966年 | 6篇 |
排序方式: 共有324条查询结果,搜索用时 15 毫秒
201.
The anthrax attacks of 2001 energized research directed toward reducing health consequences from airborne contaminants by augmenting current heating ventilation and air-conditioning (HVAC) systems. Even during peacetime, interest will continue in improving HVAC components to reduce biocontaminants associated with sick building syndrome. Current HVAC design uses numerical simulation methods of ordinary differential equations to predict approximate performance. The authors show that state-space Laplace Transform calculations actually solve the underlying differential equations and yield algebraic expressions that provide new insight. To sharpen the arguments in favor of this methodology, attention is restricted to improving existing HVAC systems to increase protection from an external release of hazardous particulates. By nearly eliminating the need for dynamical simulation, the resulting methods can be applied to far more complex HVAC designs with little additional computational effort. The new methods reduce the time required for computation by three orders of magnitude. These algebraic methods also can be extended to disparate technical problems including internal particulate release, gas masks, and designing new protective buildings. 相似文献
202.
未来5~10年,军事技术可能出现革命性突破,推动武器装备发展跃上一个新的台阶。网空、太空、无人等新型作战力量快速发展,作战力量体系将发生结构性变革。信息化作战理论聚焦新型作战领域不断创新发展。世界新军事革命将进入以打造升级版信息化战争体系为核心内容的新阶段。 相似文献
203.
Irrespective our views on the rationality of our opponent's continuing to conduct operations against us, unless utterly extirpated, he retains a vote on when and how conflict will end. This is because war is about power — compelling another actor to do something he would not otherwise do, or to cease doing something he would otherwise prefer to do. In planning for conflict termination we should account for the peculiarities of opponents who may decide not to quit when we have beat them fair and square. We do not desire that they cease conventional fighting, but that they cease fighting altogether. 相似文献
204.
Allan D. English 《战略研究杂志》2013,36(3):408-431
This article borrows from the work of Clausewitz to posit two general approaches to the pursuit of limitation in war, one being political and the other technical. The political approach seeks to control escalation via consensual arrangements with the adversary, while the technical approach seeks to forestall escalation by peremptorily destroying the enemy's military capability. It is argued that the 'Revolution in Military Affairs' (RMA) instantiates the second, technical, approach to war limitation. By exploiting advanced technology, the US armed forces hope to limit the costs of war by defeating their adversaries in a rapid, decisive manner. The problems associated with this approach are discussed in relation to the nature of the conflicts that the US is likely to face in the foreseeable future. The article concludes by suggesting that such conflicts will require that more attention be paid to the political sources of limitation in war. 相似文献
205.
206.
There have been growing claims in media circles and law-enforcement settings that street gangs and criminal groups are turning to Internet-based social networking sites for various reasons ranging from the showcasing of their images and exploits to the suspected recruitment of members. The present study investigates whether such a trend is, in fact, in place. The presence of street gangs on these Internet sites is referred to as cyberbanging. While there is some anecdotal evidence suggesting that gangs are turning to social networking sites, there is little available research on exactly how street gangs and criminal groups use the Internet. Our main argument is that gang culture is in many ways an individualized phenomenon and this feature ties in directly with recent assessments of the Internet as a setting that is governed by a process of networked individualism. This theoretical link between the individualized gang setting and the presence of gang members on social networking sites helps us understand why recruitment is improbable even in a context where people are openly diffusing their image and exploits to a growing number of Internet users. The empirical segment of this research adds to this general outlook. Based on a keyword search of over 50 street gang names, the three main social networking sites (Twitter, Facebook, and MySpace) were monitored for street gang presence. Results illustrate that gang presence on social networking sites is linked primarily to promoting a general gang or street culture through individual displays. In regard to the visitors to such sites, there is no evidence that they are being tricked or manipulated in any way. They are, however, showing their curiosity in regard to such groups and, for those who share their comments and opinions, signs of support are evident. Thus, whereas criminal gangs are not proactively using the Internet to convert anyone into being gang members, social networking sites are creating a new venue for people who share or are sensitive to the values underlying street gang lifestyle to come together. These sites essentially create a new convergence setting for gang members to interact with a wider number of people who would probably never have been exposed to their lifestyles and exploits through physical interactions. The study's conclusion extends these findings toward further research in this area, as well as outlining the more relevant implications for law-enforcement monitoring of this growing phenomenon. 相似文献
207.
208.
Abdullahi D. Ahmed 《Defence and Peace Economics》2013,24(5):485-506
This article empirically explores the relationship between military expenditure, external debts and economic performance in the economies of sub-Saharan Africa using a sample of 25 countries from 1988–2007. In investigating the defence–external debt nexus, we employ three advanced panel techniques of fully modified OLS (FMOLS), Dynamic OLS (DOLS) and dynamic fixed effect (DFE) to estimate our model. We observe that military expenditure has a positive and significant impact on external debt in African countries. Real GDP affects the total debt stock of African countries with a negative relationship. Our empirical results based on long-run elasticities show that a 1% rise in national output leads to a decline in external debt by 1.52%, on average. Policy-wise, the study suggests that African countries need to strengthen areas of fiscal responsibility and pursue models that encourage rational spending, particularly reductions in military expenditure. 相似文献
209.
This paper employs public choice analysis to explain certain kinds of military decision‐making during the Civil War. Specifically, the political costs and benefits which may have influenced policy with respect to casualty rates in the Union army are considered. A primary empirical finding is that electoral votes per capita are a strong explainer of casualties across Union states, all else equal. 相似文献
210.
Michael D. Gordin 《The Nonproliferation Review》2013,20(2):375-380
Five Myths about Nuclear Weapons, by Ward Wilson. Houghton Mifflin Harcourt, 2013. 188 pages, $22. 相似文献