首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   418篇
  免费   12篇
  2021年   7篇
  2020年   4篇
  2019年   9篇
  2018年   6篇
  2017年   8篇
  2016年   11篇
  2015年   5篇
  2014年   10篇
  2013年   75篇
  2012年   5篇
  2009年   8篇
  2008年   3篇
  2007年   12篇
  2004年   3篇
  2003年   7篇
  2002年   6篇
  2000年   3篇
  1999年   3篇
  1998年   7篇
  1997年   8篇
  1996年   9篇
  1995年   3篇
  1994年   6篇
  1993年   10篇
  1992年   7篇
  1991年   10篇
  1990年   10篇
  1989年   17篇
  1988年   14篇
  1987年   7篇
  1986年   14篇
  1985年   7篇
  1984年   4篇
  1983年   3篇
  1982年   10篇
  1981年   6篇
  1980年   7篇
  1979年   9篇
  1978年   8篇
  1977年   5篇
  1976年   5篇
  1975年   4篇
  1974年   8篇
  1973年   5篇
  1972年   3篇
  1971年   7篇
  1970年   6篇
  1969年   5篇
  1967年   6篇
  1948年   4篇
排序方式: 共有430条查询结果,搜索用时 31 毫秒
411.
This article argues for the continued relevance of the work and theories of the British Geostrategist Sir Halford J. Mackinder (1861-1947). It asserts that commentators and scholars who seek to marginalise Mackinder have too often dismissed his theories without setting them in the context of their continued endorsement in crucial areas of the globe. After 1945, despite his theories being tainted by association with Nazi Germany and Imperial Japan, both Moscow and Washington recognised the utility of Mackinder’s work and tailored policy accordingly. The end of Cold War saw Mackinder fall out of favour as his model was deemed unsuitable for policy analysis by a number of influential thinkers. It is argued here that, in recent years, the arena of international politics has seen a rehabilitation of Mackinder, accompanied by a resurgence of interest in Geopolitics. Finally, the piece examines those areas of the contemporary globe where Mackinder’s influence is greatest.  相似文献   
412.
When rational choice theory is applied to the study of terrorism, it is important that attention be given to the derived principles of constrained utility maximization. Particularly useful is the Slutsky equation, which rigorously analyzes the quantity response in one activity to a price change in another. By directing attention to assumptions and/or information about compensated cross price elasticities, expenditure shares, and income elasticities, the Slutsky equation can provide critical guidance in both theoretical and empirical analysis.  相似文献   
413.
Defence expenditures have both costs and benefits to the economy. The costs of defence expenditures are mainly emphasized as opportunity costs. On the other hand, defence spending may have growth‐promoting potential benefits: a rise in defence spending may result in a higher aggregate demand, production and employment. This paper examines empirically the effects of military expenditures on economic growth for Middle Eastern countries and Turkey, for the time‐period 1989–1999. The relationship between military expenditure and economic growth is investigated by using cross‐section and dynamic panel estimation techniques. Empirical analysis indicates that military expenditure enhances economic growth in the Middle Eastern countries and Turkey as a whole.  相似文献   
414.
This paper investigates the determinants of provincial terrorism in Turkey taking spatial dimension into account for the time period 1990–2006. Following a traditional global regression analysis, spatial variations in the relationships are examined with geographically weighted regression (GWR) to obtain locally different parameter estimates. Empirical results indicate that increases in income and schooling ratio tend to reduce the provincial average level of terrorism, whereas an increase in unemployment enhances it. Moreover, GWR results indicate that the provincial effects of per capita income and education are more pronounced for the Eastern and South Eastern provinces compared to the Western provinces.  相似文献   
415.
We identify the causal effect of a reduction in military personnel on a number of socioeconomic indicators within the peripheries of military bases. The base realignments and closures in Germany are used as an exogenous source of variation that allows us to identify the effect of a demand shock on household income, output, unemployment, and tax revenue within a specified buffer zone around each base. The analysis covers 298 communities for the period 2003–2007. Consistent with evidence found elsewhere, we find that these base adjustments have only a marginal impact on the local community in which the bases are located.  相似文献   
416.
FOOD AID     
Abstract

This paper seeks to critically appraise Africa's position within the United Nations Security Council from the inception of the UN in 1945 until the end of 2010, spanning the entire history of the world body. A few factors make such an appraisal a useful exercise. These include the ongoing debates about the reform of the Council in particular and the UN as a whole, and the growing interest that many African students and observers of and actors in international relations seem to have developed in recent years in the working of the world body. In this appraisal, emphasis will be placed on the origin and rationale behind the establishment of the Security Council as well as the use of the veto power by its permanent members, with a special reference to Africa.  相似文献   
417.
418.
The Biological Weapons Convention (BWC) regime currently suffers from a lack of effective compliance procedures. Because a legally binding compliance protocol to the BWC is not available, other measures are needed to stabilize the regime against the risk of violations of its rules. The Treaty on the Non-Proliferation of Nuclear Weapons, the Chemical Weapons Convention, and the experiences of UN inspection teams show that among the necessary components of effective compliance mechanisms are an intermediary level between bilateral consultations of states parties and involvement of the UN Security Council as well as independent assessment capabilities. This article suggests that the UN Secretary General could assume such an intermediary function and, using the authority contained in Article 99 of the UN Charter, could investigate not only alleged use of biological weapons but also alleged breaches of the BWC. A standing expert unit in the Department for Disarmament Affairs could provide the independent expertise necessary for such investigations. Such a compliance mechanism could provisionally help stabilize the BWC regime until a permanent compliance system can be agreed.  相似文献   
419.
Almost all discussions of cyberwarfare, other cyber-attacks, and cyber-espionage have focused entirely on the Internet as the chief means of damage – the Internet as a ‘vector,’ using a term from the theory of infectious diseases. However there are a variety of means, some of which have already been used, that involve cyber-exploitation using vectors other than the Internet. Malware can be installed in the integrated circuits of computers and servers, but also in any devices attached to them – thumb drives, CDs, printers, scanners, and so on. One can also use various forms of electromagnetic radiation at a distance of meters or more to exfiltrate data or to infiltrate corrupt data. I call this large and diverse family of unwanted interference with the functioning of information processing systems other-than-Internet (OTI) attacks on information systems. Stuxnet, and probably the 2007 Israeli corruption of Syrian air defenses, were OTI attacks. Such OTI techniques are more difficult to develop than creating malware, requiring electronic manufacturing facilities or novel technologies, and are thus accessible only to larger corporations and technologically sophisticated countries. Particularly vulnerable would be countries (like the United States and Europe) whose information processing devices are mainly produced outside of the country. Once exploitations via the Internet become harder to perpetrate, OTI exploitations are certain to grow dramatically, eventually requiring equipment for critical uses to be expensively fabricated in (and transported using) secure facilities; expensive detection measures will have to be instituted. This will create challenges for policy, law, and ethics, as well as greatly increasing the cost of many electronic devices.  相似文献   
420.
This article introduces the twin robots scheduling problem (TRSP), in which two robots positioned at the opposite ends of a rail are required to deliver items to positions along the rail, and the objective is to minimize the makespan. A proof of ‐hardness of the TRSP is presented, along with exact and heuristic algorithms. Computational results on challenging instances are provided.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 119–130, 2014  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号