首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   291篇
  免费   10篇
  2021年   11篇
  2019年   8篇
  2018年   6篇
  2017年   5篇
  2016年   4篇
  2015年   3篇
  2014年   4篇
  2013年   39篇
  2011年   3篇
  2010年   3篇
  2009年   10篇
  2007年   6篇
  2006年   2篇
  2005年   3篇
  2004年   7篇
  2003年   2篇
  2002年   9篇
  2001年   5篇
  2000年   5篇
  1999年   6篇
  1998年   5篇
  1997年   3篇
  1996年   3篇
  1995年   8篇
  1994年   3篇
  1993年   5篇
  1992年   4篇
  1991年   8篇
  1990年   4篇
  1989年   10篇
  1988年   7篇
  1987年   11篇
  1986年   8篇
  1984年   10篇
  1983年   3篇
  1982年   2篇
  1981年   5篇
  1980年   4篇
  1979年   4篇
  1978年   5篇
  1977年   5篇
  1976年   4篇
  1975年   3篇
  1974年   4篇
  1973年   4篇
  1972年   3篇
  1971年   2篇
  1970年   4篇
  1969年   5篇
  1968年   2篇
排序方式: 共有301条查询结果,搜索用时 15 毫秒
111.
In September 1878 the British Museum received a donation of a folded metal plate which had been embossed and gilded. Restoration of the object revealed that the folded plate was in fact the outer casing of a Roman copper alloy cavalry sports type helmet which dates to the late second or third century AD. The story of what became known as the Guisborough helmet began 14 years earlier in what was then the North Riding of Yorkshire when workers employed by the Cleveland Railway Company discovered a ‘very curious plate of metal’ during road construction. It appears that the helmet was deliberately prepared for deposition and buried at a depth of c30 cm close to a stream. Examination by the authors suggests that this was a high value item that had been repaired many times. Experimental evidence suggests that the decoration alone required approximately 16 h to fashion.  相似文献   
112.
An analysis of the security vetting files of 19 employees within a South African national department who had been found guilty of financial misconduct in the last five years uncovered that the existing security vetting processes did not detect the financial misconduct of which these employees have been found guilty. This research sets out to establish whether security vetting can be extended to include the detection of financial misconduct within the department and, if so, how. Moreover, if security vetting can indeed be so extended, can it possibly enhance the management of fraud risk across all South African public sector departments? Qualitative interviews were conducted with 27 employees who are key to fraud risk management and security vetting within the researched department. During the interviews, the following five themes emerged: (1) the reasons why employees commit financial misconduct; (2) why it is not detected by the security vetting process; (3) the potential alignment of the security vetting process to facilitate the detection of financial misconduct; (4) the following through on security vetting findings; and (5) sharing these findings with the internal audit and risk management functions within state departments. These themes were probed and are reported on, establishing firstly that security vetting can indeed be extended to include the detection of financial misconduct within the researched department, and secondly that it can enhance the management of fraud risk across all South African public sector departments, given the specific mandate of the State Security Agency (SSA) and the national security vetting strategy.  相似文献   
113.
The problem of finding a strict total order for a finite set of multiple criteria alternatives is considered. Our research extends previous work by us, which considered finding a partial order for a finite set of alternatives. We merge the preference information extracted from the preference cones and corresponding polyhedral sets, with the information derived from pairwise comparisons of two alternatives, yielding a preference matrix. This preference matrix is used as input to an integer programming model to obtain a strict total order that provides a transitive ranking for the set of alternatives. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 155–163, 2014  相似文献   
114.
The main objective of the paper is to decipher the military expenditure–economic growth relationship, taking the level of economic development (income) into consideration. Our findings suggest the following: (i) military expenditure has a significantly negative relationship to economic growth for the 23 countries with initial incomes (threshold variable) less than or equal to $475.93; (ii) when the threat level is heightened, economic growth (23 countries) is expected to decrease. However, military expenditure in the presence of sufficiently large threats increases growth; (iii) for the remaining 69 countries whose initial incomes (real GDP per capita in 1992 price) exceed $475.93, no significant relationship exists whether the threat variable is taken into consideration or not.  相似文献   
115.

This paper presents a model for converting legacy defense production facilities into private‐sector economic resources. Specifically, this paper will examine as a case study the first successful conversion of a former U.S. Department of Energy nuclear weapons production installation, including reasons for its success, its costs and benefits, and lessons for public policy. It is envisioned that this model may be useful for mitigating local economic hardship resulting from defense “downsizing” and for privatizing production capacities critical for national defense.  相似文献   
116.
South Africa and Kenya experienced various forms of conflict and gross human rights abuse between 1948–1994 and 1963–2002 respectively. In both situations, the conflicts were motivated by various factors; these included unequal distribution of socio-economic resources and skewed political relationships. The centrality of human rights abuse and political violence to both situations places similar issues on the agenda for analysis. In both cases opposition to regimes was justified on the basis that the political systems were constructed in such a way that limited alternative conceptions and prevented democratic freedom (until 19921 in Kenya and 1994 in South Africa). After undergoing transition to democratic rule in 1994, South Africa engaged the idea of a truth and reconciliation commission as an instrument for dealing with its past conflicts. The South African case animated widespread international interest and after an electoral victory in 2002, the National Rainbow Coalition (NARC) government in Kenya mooted the same idea. By the end of 2004 however the NARC government seems to have lost interest in the truth commission concept; this paper probes the question why? Broadly there is room for alternative interpretations both within and between the two cases on how conflicts were perpetuated and the potency of a truth and reconciliation commission as a viable alternative for dealing with past conflicts. This paper broadly aims to offer a clearer account of conflicts and mechanisms for dealing with them from the conceptual lenses of conflict management theory.  相似文献   
117.
There is widespread acknowledgment that the modus operandi of jihadis affiliated with Al Qaeda and associated movements (AQAM) relies on brutal terror-inducing tactics which, more often than not, target Muslim and non-Muslim non-combatants. This article comparatively analyzes the AQAM modus operandi within the traditional stipulations of Islamic precepts with respect to waging jihad al saghir. The purpose is to glean whether or not such tactics such as suicide bombings, declaring fellow Muslim apostates in order to kill them, use of IEDs and EFPs to target civilians, constitute legitimate rules of engagement in jihad al saghir.  相似文献   
118.
119.
120.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号