首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   893篇
  免费   21篇
  2021年   14篇
  2019年   29篇
  2018年   19篇
  2017年   20篇
  2016年   20篇
  2015年   20篇
  2014年   11篇
  2013年   166篇
  2011年   8篇
  2009年   9篇
  2008年   8篇
  2007年   11篇
  2006年   11篇
  2005年   15篇
  2004年   16篇
  2003年   10篇
  2002年   8篇
  2000年   14篇
  1999年   10篇
  1998年   12篇
  1997年   24篇
  1996年   19篇
  1994年   18篇
  1993年   7篇
  1992年   11篇
  1991年   22篇
  1990年   12篇
  1989年   19篇
  1988年   12篇
  1987年   21篇
  1986年   16篇
  1985年   16篇
  1984年   12篇
  1983年   15篇
  1982年   13篇
  1981年   13篇
  1980年   16篇
  1979年   17篇
  1978年   14篇
  1977年   15篇
  1976年   14篇
  1975年   12篇
  1974年   18篇
  1973年   18篇
  1972年   15篇
  1971年   19篇
  1970年   9篇
  1969年   11篇
  1968年   10篇
  1967年   8篇
排序方式: 共有914条查询结果,搜索用时 15 毫秒
311.
The problem of determining the sample sizes in various strata when several characteristics are under study is formulated as a nonlinear multistage decision problem. Dynamic programming is used to obtain an integer solution to the problem. © 1997 John Wiley & Sons, Inc.  相似文献   
312.
313.
Jihadist violence is typically associated with being particularly indiscriminate. Often, as in variations of the ‘new terrorism’ thesis, this characteristic is proposed to correspond in some way to its other attributes such as its globalised, decentralised and ‘postmodern’ religious nature. Recent work appears to give more substance to such claims, by claiming to show a relationship between indiscriminate violence and decentralised group organisation. However, in this paper we show, based on an analysis of jihadist targeting in Western Europe and America from 2001 to 2013, that targeting choices by jihadists unconnected to organised militant groups have in fact been consistently more, rather than less discriminate in their targeting choices than their better-integrated peers. Drawing on this finding, as well as a broader reading of jihadist targeting discourses, we argue for a more complex understanding of the relationship between radicalisation, extremist ideology, decentralisation, and targeting choice.  相似文献   
314.
AirSea Battle (ASB) has generated significant publicity, controversy, and debate among scholars, analysts, commentators, and observers of US defense strategy. However, a research gap exists concerning formal analysis of the impact of the operational concept on the relationship between the US Air Force (USAF) and the US Navy (USN). The impact of the ASB operational concept on the USAF–USN relationship is examined across the issue areas of strategy, budgets, weapons procurement, and training. These four issue areas represent important areas of historical conflict and competition between the Air Force and Navy. The conclusion is that ASB is ushering in a new era of Air Force–Navy partnership that advances the inter-service dynamic from “jointness” toward integration. The emergent USAF–USN partnership therefore represents a significant development in US defense politics and defense strategy.  相似文献   
315.
It has been argued that the discovery of a new natural resource greatly increases the risk of conflict. This research aims to study the effect of natural resources on military spending, using the data from rentier states in the Middle East and North Africa (MENA) countries from 1987 to 2012. In considering the ‘resource curse,’ the types of natural resources matter. Our empirical results demonstrate that the ‘resource curse’ arising from the abundance of certain natural resources, particularly oil and forest resources, leads to increases in military spending. In contrast, the rent from coal and natural gas has a negative impact on military spending, while the rent from minerals has no impact on military spending, controlling for GDP growth and per capita income.  相似文献   
316.
ABSTRACT

Even with sizable economic inputs, access to foreign technologies, and considerable political will, China, up until the late 1990s, experienced only limited success when it came to the local design, development, and manufacture of advanced conventional weapons. Not surprisingly, therefore, reforming the local defense industry in order to upgrade its technology base and manufacturing capabilities and to make armaments production more efficient and cost-effective has long preoccupied the Chinese leadership. The fact that most of these efforts had little positive impact on the country’s military technological and industrial capabilities only encouraged Beijing to experiment with additional reforms in the hopes of finally getting it right.  相似文献   
317.
Case summary, by James Cook (Case Study Editor):

In the final issue of the 2015 volume of the Journal of Military Ethics, we published a case study entitled “Coining an Ethical Dilemma: The Impunity of Afghanistan’s Indigenous Security Forces”, written by Paul Lushenko. The study detailed two extra-judicial killings (EJKs) by Afghan National Police (ANP) personnel in an area stabilized and overseen by a US-led Combined Task Force (CTF). To deter further EJKs following the first incident, the CTF’s commander reported the incidents up his chain of command and used the limited tools at his disposal to influence local indigenous officials directly. Apparently, the ANP unit took no notice. In his commentary on the case study, Paul Robinson considered moral compromise in war more generally. Coalition troops in Afghanistan, for instance, have encountered not just EJKs but also sexual abuse of minors, killing of non-combatants, kidnapping, torture, and widespread corruption. What should the soldier on the ground do if indigenous personnel violate Laws of Armed Conflict (LOAC) with impunity? Refusing to serve will not right or prevent moral wrongs, while staying on to fight the good but futile fight will mire the soldier in moral compromise. “?… [S]oldiers faced with this dilemma have no good options. The systemic failings surrounding them mean that it is probable that nothing they do will help”. In a concluding note, I suggested that while an individual soldier may indeed have no good options, as Paul Robinson suggests, that soldier’s military and nation at large are obliged to do what they can. At least, they must keep to the moral high ground so as not to give indigenous security forces an excuse to misbehave, and determine the nature of crimes such as EJKs: are they outlaw acts or in fact endorsed by the indigenous culture and perhaps even government? Below Colonel Dave Barnes, himself a veteran of Operation Enduring Freedom, analyzes Paul Lushenko’s case study at “?…?the local, tactical level: If a commander is in this situation – where her unit witnesses an EJK or other war crime – what should she do?”  相似文献   
318.
The idea of deploying noncollocated sources and receivers in multistatic sonar networks (MSNs) has emerged as a promising area of opportunity in sonar systems. This article is one of the first to address point coverage problems in MSNs, where a number of points of interest have to be monitored in order to protect them from hostile underwater assets. We consider discrete “definite range” sensors as well as various diffuse sensor models. We make several new contributions. By showing that the convex hull spanned by the targets is guaranteed to contain optimal sensor positions, we are able to limit the solution space. Under a definite range sensor model, we are able to exclude even more suboptimal solutions. We then formulate a nonlinear program and an integer nonlinear program to express the sensor placement problem. To address the nonconvex single‐source placement problem, we develop the Divide Best Sector (DiBS) algorithm, which quickly provides an optimal source position assuming fixed receivers. Starting with a basic implementation of DiBS, we show how incorporating advanced sector splitting methods and termination conditions further improve the algorithm. We also discuss two ways to use DiBS to find multiple source positions by placing sensors iteratively or simultaneously. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 287–304, 2017  相似文献   
319.
We consider parallel‐machine scheduling with a common server and job preemption to minimize the makespan. While the non‐preemptive version of the problem is strongly NP‐hard, the complexity status of the preemptive version has remained open. We show that the preemptive version is NP‐hard even if there is a fixed number of machines. We give a pseudo‐polynomial time algorithm to solve the case with two machines. We show that the case with an arbitrary number of machines is unary NP‐hard, analyze the performance ratios of some natural heuristic algorithms, and present several solvable special cases. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 388–398, 2017  相似文献   
320.
The Replenishment at Sea Planner (RASP) is saving the U.S. Navy millions of dollars a year by reducing fuel consumption of its Combat Logistics Force (CLF). CLF shuttle supply ships deploy from ports to rendezvous with underway U.S. combatants and those of coalition partners. The overwhelming commodity transferred is fuel, ship‐to‐ship by hoses, while other important packaged goods and spare parts are high‐lined, or helicoptered between ships. The U.S. Navy is organized in large areas of responsibility called numbered fleets, and within each of these a scheduler must promulgate a daily forecast of CLF shuttle operations. The operational planning horizon extends out several weeks, or as far into the future as we can forecast demand. We solve RASP with integer linear optimization and a purpose‐built heuristic. RASP plans Replenishment‐at‐Sea (RAS) events with 4‐hour (Navy watch) time fidelity. For five years, RASP has served two purposes: (1) it helps schedulers generate a daily schedule and animates it using Google Earth, and (2) it automates reports command‐to‐ship messages that are essential to keep this complex logistics system operating.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号