首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   96篇
  免费   10篇
  国内免费   9篇
  2021年   4篇
  2020年   2篇
  2019年   13篇
  2018年   9篇
  2017年   5篇
  2016年   5篇
  2015年   3篇
  2014年   4篇
  2013年   31篇
  2012年   2篇
  2011年   3篇
  2010年   2篇
  2009年   1篇
  2008年   3篇
  2007年   4篇
  2005年   1篇
  2004年   1篇
  2003年   2篇
  2001年   2篇
  2000年   6篇
  1999年   4篇
  1998年   1篇
  1997年   3篇
  1995年   1篇
  1994年   1篇
  1990年   1篇
  1986年   1篇
排序方式: 共有115条查询结果,搜索用时 689 毫秒
61.
The 2014 Nuclear Security Summit (NSS) in The Hague was a resounding success, both in organizational terms and in terms of substance. The new substance can be found in the Communiqué, as well as in innovative joint statements by participants, all of which may be considered as implementation of actions decided upon in the Final Document of the 2010 Review Conference of the Treaty on the Non-Proliferation of Nuclear Weapons. The next two years in the NSS process cannot be business as usual. This viewpoint makes some suggestions for NSS states to undertake between now and the final summit in 2016, including preparations for winding down the NSS process as we know it.  相似文献   
62.
There have been growing claims in media circles and law-enforcement settings that street gangs and criminal groups are turning to Internet-based social networking sites for various reasons ranging from the showcasing of their images and exploits to the suspected recruitment of members. The present study investigates whether such a trend is, in fact, in place. The presence of street gangs on these Internet sites is referred to as cyberbanging. While there is some anecdotal evidence suggesting that gangs are turning to social networking sites, there is little available research on exactly how street gangs and criminal groups use the Internet. Our main argument is that gang culture is in many ways an individualized phenomenon and this feature ties in directly with recent assessments of the Internet as a setting that is governed by a process of networked individualism. This theoretical link between the individualized gang setting and the presence of gang members on social networking sites helps us understand why recruitment is improbable even in a context where people are openly diffusing their image and exploits to a growing number of Internet users. The empirical segment of this research adds to this general outlook. Based on a keyword search of over 50 street gang names, the three main social networking sites (Twitter, Facebook, and MySpace) were monitored for street gang presence. Results illustrate that gang presence on social networking sites is linked primarily to promoting a general gang or street culture through individual displays. In regard to the visitors to such sites, there is no evidence that they are being tricked or manipulated in any way. They are, however, showing their curiosity in regard to such groups and, for those who share their comments and opinions, signs of support are evident. Thus, whereas criminal gangs are not proactively using the Internet to convert anyone into being gang members, social networking sites are creating a new venue for people who share or are sensitive to the values underlying street gang lifestyle to come together. These sites essentially create a new convergence setting for gang members to interact with a wider number of people who would probably never have been exposed to their lifestyles and exploits through physical interactions. The study's conclusion extends these findings toward further research in this area, as well as outlining the more relevant implications for law-enforcement monitoring of this growing phenomenon.  相似文献   
63.
Uruguay is a country with a very unusual profile, since it has just 3.4 million inhabitants but is among the top ten troop contributors to the UN PKO (Peace Keeping Operations) and is the first contributor per capita. In 2002 and 2003 it was the seventh troop contributor to the UN, and by the end of 2005 it was eighth in the UN ranking. Uruguay has never had any imminent external threat to its security after its independence in 1828, and it has had no internal threat since the end of the urban guerrillas’ actions in the 1970s. The country has no defence industry, and has always had an all‐volunteer military service, which presently involves almost 1% of the total population, and about 2% of the labour force. The empirical evidence presented in this paper shows that, in the past decades, Uruguayan defence spending has been influenced mainly by internal factors, most of them of an economic nature. The high participation in PKO has not increased military expenditure and it has produced a positive impact on the country’s economy.  相似文献   
64.
65.
苏武在密州的词作是其豪放词的首创之作和第一个高峰,奠定了其豪放词派开创者的地位。其成功与密州的人文环境密切相关。  相似文献   
66.
Strategic Intelligence for American World Policy by Sherman Kent, Princeton, NJ: Princeton University Press, 1949.  相似文献   
67.
Book reviews     
Export or Die: Britain's Defence Trade with Iran and Iraq. by Davina Miller, London: Cassell, 1996, ISBN 0-304-33852-4 (hbk), £40.00, 04-33853-2 (pbk), £11.99.

The Storm Passed By: Ireland and the Battle of the Atlantic, 1940-1941. by Trevor Allen, Dublin: Irish Academic Press, 1996, ISBN 0-7165-2616-6, (hbk) £17.50.

Arms Control Toward the 21st Century. by Jeffrey A. Larsen and Greqory J. Rattray (eds). Boulder: Lynne Rienner, 1996.

Asia-Pacific Security, Less Uncertainty, New Opportunities. Edited by Gary Klintworth. Melbourne: Addison Wesley Longman, 1996, ISBN 0-582-80321-7, £24.99.

Masters of War, Military Dissent and Politics in the Vietnam Era. by Robert Buzzanco, Cambridge: Cambridge University Press, 1996, ISBN 0-521-48046-9 (hbk), £29.95

Controlling the Arms Trade: the West Versus the Rest. By Paul Cornish, London: Bowerdean Publishing Co., 1996, ISBN 0-906097-44-4 (pbk), £9.99.

Secret Agencies: US Intelligence in a Hostile World. by Loch K. Johnson, London: Yale University Press, 1997, ISBN 0-300-06611-2 (hbk), £22.50.  相似文献   
68.
One of the achievements of scheduling theory is its contribution to practical applications in industrial settings. In particular, taking finiteness of the available production capacity explicitly into account, has been a major improvement of standard practice. Availability of raw materials, however, which is another important constraint in practice, has been largely disregarded in scheduling theory. This paper considers basic models for scheduling problems in contemporary manufacturing settings where raw material availability is of critical importance. We explore single scheduling machine problems, mostly with unit or all equal processing times, and Lmax and Cmax objectives. We present polynomial time algorithms, complexity and approximation results, and computational experiments. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005.  相似文献   
69.
The dielectric constant (DC) is one of the key properties for detection of threat materials such as Improvised Explosive Devices (IEDs). In the present paper, the density functional theory (DFT) as well as ab-initio approaches are used to explore effective methods to predict dielectric constants of a series of 12 energetic materials (EMs) for which experimental data needed to experimentally determine the dielectric constant (refractive indices) are available. These include military grades energetic materials, nitro and peroxide compounds, and the widely used nitroglycerin. Ab-initio and DFT calculations are conducted. In order to calculate dielectric constant values of materials, potential DFT functional combined with basis sets are considered for testing. Accuracy of the calculations are compared to experimental data listed in the scientific literature, and time required for calculations are both evaluated and discussed. The best functional/basis set combinations among those tested are CAM-B3LYP and AUG-cc-pVDZm, which provide great results, with accuracy deviations below 5% when calculated results are compared to experimental data.  相似文献   
70.
Recent researches focused on developing robust blast load mitigation systems due to the threats of terrorist attacks. One of the main embraced strategies is the structural systems that use mitigation techniques. They are developed from a combination of structural elements and described herein as conventional systems. Among the promising techniques is that redirect the waves propagation through hollow tubes. The blast wave propagation through tubes provides an efficient system since it combines many blast wave phenomena, such as reflection, diffraction, and interaction. In this research, a novel blast load mitigation system, employed as a protection fence, is developed using a technique similar to the technique of the bent tube in manipulating the shock-wave. The relative performance of the novel system to the conventional system is evaluated based on mitigation percent criteria. Performances of both systems are calculated through numerical simulation. The proposed novel system proved to satisfy high performance in mitigating the generated blast waves from charges weight up to 500 kg TNT at relatively small standoff distances (5 m and 8 m). It mitigates at least 94% of the blast waves, which means that only 6% of that blast impulse is considered as the applied load on the targeted structure.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号