全文获取类型
收费全文 | 476篇 |
免费 | 12篇 |
专业分类
488篇 |
出版年
2021年 | 11篇 |
2019年 | 20篇 |
2018年 | 10篇 |
2017年 | 10篇 |
2016年 | 11篇 |
2015年 | 11篇 |
2014年 | 9篇 |
2013年 | 93篇 |
2011年 | 4篇 |
2009年 | 5篇 |
2008年 | 5篇 |
2007年 | 5篇 |
2006年 | 5篇 |
2005年 | 9篇 |
2004年 | 8篇 |
2003年 | 6篇 |
2002年 | 6篇 |
2001年 | 4篇 |
2000年 | 7篇 |
1999年 | 4篇 |
1998年 | 8篇 |
1997年 | 15篇 |
1996年 | 7篇 |
1994年 | 10篇 |
1992年 | 4篇 |
1991年 | 13篇 |
1990年 | 4篇 |
1989年 | 7篇 |
1988年 | 7篇 |
1987年 | 14篇 |
1986年 | 8篇 |
1985年 | 6篇 |
1984年 | 5篇 |
1983年 | 8篇 |
1982年 | 8篇 |
1981年 | 5篇 |
1980年 | 7篇 |
1979年 | 11篇 |
1978年 | 7篇 |
1977年 | 8篇 |
1976年 | 7篇 |
1975年 | 7篇 |
1974年 | 7篇 |
1973年 | 12篇 |
1972年 | 6篇 |
1971年 | 6篇 |
1970年 | 7篇 |
1969年 | 6篇 |
1968年 | 5篇 |
1967年 | 5篇 |
排序方式: 共有488条查询结果,搜索用时 0 毫秒
211.
Ethan M. Orwin 《Small Wars & Insurgencies》2013,24(2):330-351
From 1956 to 1960, the French Army developed a force of Muslim auxiliaries (supplétifs) as a major component of its strategy to combat the National Liberation Front (FLN) insurgency in Algeria. Aside from their military utility in hunting down the guerrillas in the mountains and forests, the supplétifs were instrumental in undermining FLN legitimacy in the countryside. The rapid growth and employment of the supplétif force dismantled FLN political control in the villages, undermined the enemy's unity, and critically weakened the revolutionaries' claim to represent all of Algeria's Muslims. The military and political activities of France's Muslim soldiers also projected an image of Muslim–European unity behind the French cause, and portrayed the French Army as the only legitimate political force in numerous villages. These political successes, however, were limited to the local, tactical level of revolutionary warfare, and the Army was never able to convert the supplétifs into a force of decisive, strategic political significance. They thus had little ultimate impact on the outcome of the conflict. 相似文献
212.
Riley M. Moore 《Small Wars & Insurgencies》2013,24(5):857-878
As a consequence of intervention in Iraq and Afghanistan, force ratio for counterinsurgency (COIN) has come under increased scrutiny. Reduced to its essence, the issue is simply, ‘How many troops does it take to get the job done?’ This answer has been sought by the US military, academia, and think tanks. There have been numerous responses, culminating in several ‘plug-and-play’ equations for minimum force ratios in COIN operations. Due to the impossibility of determining precisely how many insurgent forces there are, it has become common to base force ratios on the population of the country. In the realm of policy, the question above is posed as, ‘How many of our troops does it take to get the job done?’ 相似文献
213.
Supply chains are often characterized by the presence of a dominant buyer purchasing from a supplier with limited capacity. We study such a situation where a single supplier sells capacity to an established and more powerful buyer and also to a relatively less powerful buyer. The more powerful buyer enjoys the first right to book her capacity requirements at supplier's end, and then the common supplier fulfills the requirement of the less powerful buyer. We find that when the supplier's capacity is either too low (below the lower threshold) or too high (above the higher threshold), there is no excess procurement as compared to the case when supplier has infinite capacity. When the supplier's capacity is between these two thresholds, the more powerful buyer purchases an excess amount in comparison to the infinite capacity case. 相似文献
214.
The present study deals with development of conceptual proof for jute rubber basedflexible composite block to completely arrest the projectile impacting the target at high velocity impact of 400 m/s through numerical simulation approach using finite element (FE) method. The proposed flexible composite blocks of repeating jute/rubber/jute (JRJ) units are modelled with varying thickness from 30 mm to 120 mm in increments of 30 mm and impacted by flat (F), ogival (O) and hemispherical (HS) shaped projectiles. All the considered projectiles are impacted with proposed flexible composite blocks of different thicknesses and the penetration behaviour of the projectile in each case is studied. The penetration depth of the projectile in case of partially penetrated cases are considered and the effect of thickness and projectile shape on percentage of penetration depth is statistically analyzed using Tagu-chi's design of experiments (DOE). Results reveal that the though proposedflexible composite block with thickness of 90 mm is just sufficient to arrest the complete penetration of the projectile, considering the safety issues, it is recommended to use theflexible composite with thickness of 120 mm. The nature of damage caused by the projectile in the flexible composite is also studied. Statistical studies show that thickness of the block plays a prominent role in determining the damage resistance of the flexible composite. 相似文献
215.
Adam D.M. Svendsen 《Defense & Security Analysis》2012,28(3):234-246
Adopting the analytical framework of the established interpretive “schools” of Anglo-American relations, this article offers several reflections on UK–US defense relations as they occurred over the significant years of 2000–2005. During those years, trajectories were established on which UK–US defense relations continue to travel today and outcomes emerged which are still being navigated. This article concludes that the Latin phrase, “Flectas Non Frangas” (essentially translated as: “Bend not Break”), is the most appropriate to adopt to characterize the developments undergone in recent UK–US defense relations. Many historical and strategic lessons with contemporary relevance are drawn. 相似文献
216.
Terence M Mashingaidze 《African Security Review》2016,25(4):378-392
This study is an exploration of the use of technology-mediated interventions by the Zimbabwe Peace Project (ZPP) in checkmating the country’s insidious culture of political violence and impunity. It disentangles the ZPP’s strategies and the composite reactions they triggered from state functionaries and the aligned security apparatus. The ZPP exploited and deployed an Internet-circulated monthly newsletter, bulk short message service (SMS) alerts, smartphones, radio and Facebook to shine a spotlight on injustice. It is argued that the ZPP’s whistle-blowing strategies used against human rights violators were not necessarily intended to secure immediate perpetrator conviction; rather, they were a partial but exigent attempt at using perpetrator exposure to reveal extralegal activities and checkmate the country’s culture of impunity. The ZPP’s cybernetic naming and shaming strategies embarrassed some offenders, as evidenced by the intelligence operatives and the police’s constant harassment and arrests of ZPP-affiliated activists. The state-controlled media compounded this pressure by casting aspersions on the ZPP’s bona fides, labelling it a foreign-funded organisation that was attempting to destabilise the country. Finally, this study is informed by a broad evidentiary base that includes ZPP reports on its e-archive, oral interviews, policy documents and newspaper accounts. 相似文献
217.
There are n boxes with box i having a quota value Balls arrive sequentially, with each ball having a binary vector attached to it, with the interpretation being that if Xi = 1 then that ball is eligible to be put in box i. A ball's vector is revealed when it arrives and the ball can be put in any alive box for which it is eligible, where a box is said to be alive if it has not yet met its quota. Assuming that the components of a vector are independent, we are interested in the policy that minimizes, either stochastically or in expectation, the number of balls that need arrive until all boxes have met their quotas. © 2014 Wiley Periodicals, Inc. 62:23–31, 2015 相似文献
218.
We present methods for optimizing generation and storage decisions in an electricity network with multiple unreliable generators, each colocated with one energy storage unit (e.g., battery), and multiple loads under power flow constraints. Our model chooses the amount of energy produced by each generator and the amount of energy stored in each battery in every time period in order to minimize power generation and storage costs when each generator faces stochastic Markovian supply disruptions. This problem cannot be optimized easily using stochastic programming and/or dynamic programming approaches. Therefore, in this study, we present several heuristic methods to find an approximate optimal solution for this system. Each heuristic involves decomposing the network into several single‐generator, single‐battery, multiload systems and solving them optimally using dynamic programming, then obtaining a solution for the original problem by recombining. We discuss the computational performance of the proposed heuristics as well as insights gained from the models. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 493–511, 2015 相似文献
219.
220.
带微进给方式步进电机的PC控制轴系驱动装置可生产光学质量的表面。超精密车床可生产诸如球体和非球体之类的集合体,其表面粗糙度≤5nmRa,可用于光学装置的反光镜或空气轴承转轴的超精密零件。 相似文献