首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   152篇
  免费   3篇
  155篇
  2020年   1篇
  2019年   8篇
  2018年   3篇
  2017年   8篇
  2016年   2篇
  2015年   2篇
  2014年   5篇
  2013年   47篇
  2012年   2篇
  2011年   1篇
  2010年   4篇
  2009年   3篇
  2007年   2篇
  2006年   2篇
  2005年   2篇
  2004年   5篇
  2003年   1篇
  2002年   3篇
  2001年   8篇
  2000年   3篇
  1999年   1篇
  1998年   4篇
  1997年   1篇
  1996年   2篇
  1995年   2篇
  1994年   2篇
  1993年   2篇
  1992年   4篇
  1990年   1篇
  1989年   2篇
  1988年   3篇
  1987年   2篇
  1986年   2篇
  1985年   2篇
  1982年   1篇
  1978年   1篇
  1977年   1篇
  1976年   2篇
  1975年   1篇
  1971年   1篇
  1970年   1篇
  1969年   1篇
  1968年   1篇
  1967年   3篇
排序方式: 共有155条查询结果,搜索用时 15 毫秒
11.
12.
This article argues that the debate on security sector reform (SSR) needs to be taken further by taking into consideration the fact that, even though the SSR concept was not originally developed as an element in stabilising states undergoing an insurgency, it is very much being used for exactly that. When conducting counterinsurgency with a focus on the creation of stability, the baseline will ultimately have to be security sector stabilisation (SSS) as a precondition for complete SSR implementation. However, the two must be connected to avoid them undermining each other. This is important if a comprehensive approach to programme implementation and especially sustainability is to guide the programme, and not just isolated ‘train and equip’ stand-alone projects that do not solve either the initial need for stabilisation or the long-term need for accountable security forces. Currently, in Afghanistan the surge for security by the international military is in danger of overtaking the other elements of the SSR, thereby undermining the primary end state and thus risking laying the wrong foundation for the long-term process of SSR.  相似文献   
13.
Defence offsets rank as one of the most important and controversial topics within the broad field of defence economics. Arms vendors are likely to view offsetting investment as a distraction, fearful of its potential to hurt the bottom line. By contrast, policymakers in the arms purchasing countries see offsets as an opportunity to extract technology transfer, as well as employment, investment and export sales opportunities. Establishing the actual impact of offsets, however, is not easy. The subject is shrouded in secrecy and myth, with anecdote and generalisation pervading even the intellectual press. This paper seeks to break the mould by offering an empirical case study of the role of offsets in Malaysian defence industrialisation.  相似文献   
14.
武警学院边消警部队政治工作专业的研究生教学要抓好的问题是:选准苗子,严格把好研究生的入学关;做好教学的各项准备工作,严格把好教学关;注意各方协调,齐抓共管,把好对研究生的管理关;不断加强研究生教学的硬件建设,把好保障关;坚持各项政策标准和原则,把好研究生毕业质量关。  相似文献   
15.
We present an air-defense engagement model to counter an attack by multiple antiship missiles, assuming perfect kill assessment. In this model, the probability of shooting down all incoming missiles is maximized. A generating function is employed to produce an algorithm which is used to evaluate the outcomes. © 1997 John Wiley & Sons, Inc. Naval Research Logistics 44: 687–697, 1997  相似文献   
16.
The purpose of this article is to explore the economic theoretical foundations of the idea that rational terrorist organizations deliberately randomize their attacks (by type, timing, location, and targets) to generate uncertainty and intimidation. A choice theoretic framework is applied to the analysis of the terrorist organization's behavior to determine whether welfare (utility) gains from the randomization of terrorist attacks are plausible and feasible. The randomization of attacks can appear to promise higher amounts of political influence for each resource input but it turns out that randomization cannot manufacture a situation where higher amounts of political influence are obtained for each resource input.The results imply that, rather than randomization and instability, the rational terrorist organization is more likely to prefer stability. The findings and implications provide a theoretical explanation for the non-randomness of terrorist attacks.Thismay be one small step towards explaining the patterns – non-randomness – in the time-series of terrorist incidents.  相似文献   
17.
The effectiveness of a fire department is largely determined by its ability to respond to incidents in a timely manner. To do so, fire departments typically have fire stations spread evenly across the region, and dispatch the closest truck(s) whenever a new incident occurs. However, large gaps in coverage may arise in the case of a major incident that requires many nearby fire trucks over a long period of time, substantially increasing response times for emergencies that occur subsequently. We propose a heuristic for relocating idle trucks during a major incident in order to retain good coverage. This is done by solving a mathematical program that takes into account the location of the available fire trucks and the historic spatial distribution of incidents. This heuristic allows the user to balance the coverage and the number of truck movements. Using extensive simulation experiments we test the heuristic for the operations of the Fire Department of Amsterdam‐Amstelland, and compare it against three other benchmark strategies in a simulation fitted using 10 years of historical data. We demonstrate substantial improvement over the current relocation policy, and show that not relocating during major incidents may lead to a significant decrease in performance.  相似文献   
18.
19.
On 22 September 1979 two optical sensors on U.S. satellite Vela 6911 detected a double-flash of light that appeared characteristic of an atmospheric nuclear explosion conducted over the southern Atlantic or Indian Ocean. It became known as the Vela Incident, Event 747, or Alert 747. An anomaly between the amplitude of the two signals during the second pulse led a U.S. government expert panel established to assess the event to conclude in mid-1980 that a more likely explanation was the impact of a small meteoroid on the satellite, the debris from which reflected sunlight into the sensors' field of view. No model was presented to support the contention, and a similar anomaly—known as background modulation—was a given for the second pulse of all confirmed explosions detected by Vela, though beginning later. Nonetheless, this event has remained the subject of intense debate. This article reviews the evidence and presents an updated analysis of the original Vela signal based on recently declassified literature and on modern knowledge of interplanetary dust and hyper velocity impact. Given the geometry of the satellite, and that the bulk of the surface comprised solar panels, much of the debris from any collision would be carried away from the sensors' field of view. Thus, a meteoroid collision appears much less likely than previously assumed. The double flash is instead consistent with a nuclear explosion, albeit detected by an aged satellite for which background modulation was abnormal and/or commenced earlier, also seen in post-event SYSTEM tests. A companion paper to be published in 2018 presents radionuclide and hydroacoustic evidence supporting the conclusion that the Vela Incident was a nuclear weapon test explosion.  相似文献   
20.
The paper explores terrorist choice by applying two well-known theoretical frameworks: stochastic dominance and prospect theory (PT). We analyse each pair of attack methods that can be formed from the RAND-MIPT database and the Global Terrorism Database. Instances of stochastic dominance are identified. PT orderings are computed. Attention is accorded to the identification of ‘trigger points’ and the circumstances that may lead to an increased likelihood that a terrorist will select an attack method associated with a higher expected number of fatalities, i.e. a potentially more damaging attack method.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号