全文获取类型
收费全文 | 709篇 |
免费 | 20篇 |
出版年
2021年 | 13篇 |
2019年 | 16篇 |
2018年 | 6篇 |
2017年 | 11篇 |
2016年 | 14篇 |
2015年 | 13篇 |
2014年 | 8篇 |
2013年 | 131篇 |
2011年 | 8篇 |
2009年 | 7篇 |
2007年 | 17篇 |
2005年 | 9篇 |
2004年 | 9篇 |
2003年 | 12篇 |
2002年 | 10篇 |
2001年 | 6篇 |
2000年 | 6篇 |
1999年 | 13篇 |
1998年 | 9篇 |
1997年 | 10篇 |
1996年 | 13篇 |
1995年 | 8篇 |
1994年 | 14篇 |
1993年 | 16篇 |
1992年 | 12篇 |
1991年 | 16篇 |
1990年 | 13篇 |
1989年 | 22篇 |
1988年 | 23篇 |
1987年 | 13篇 |
1986年 | 21篇 |
1985年 | 11篇 |
1984年 | 6篇 |
1983年 | 6篇 |
1982年 | 17篇 |
1981年 | 9篇 |
1980年 | 11篇 |
1979年 | 12篇 |
1978年 | 11篇 |
1977年 | 10篇 |
1976年 | 7篇 |
1975年 | 9篇 |
1974年 | 17篇 |
1973年 | 10篇 |
1972年 | 8篇 |
1971年 | 17篇 |
1970年 | 8篇 |
1969年 | 11篇 |
1968年 | 9篇 |
1967年 | 8篇 |
排序方式: 共有729条查询结果,搜索用时 31 毫秒
721.
Robert R. Tomes 《Defense & Security Analysis》2012,28(4):303-315
Facing nearly half a billion dollars in spending cuts over the next five years, US defense planners and strategists must simultaneously rebuild a war-weary Army weakened from over a decade of war, build new sea and air capabilities for the Pacific theater, and reduce manpower, procurement, and contractor budgets while promoting innovation. The US defense department is embarking on what may be the most sweeping period of defense transformation in recent memory. This article reviews the history of American defense transformation, focusing on an important but largely overlooked period of military innovation that began in the shadow of Vietnam and ended with troops fighting through blinding sandstorms at night on the road to Baghdad. The multifaceted transformation strategy conceived in the 1970s paved the way for a military revolution in the 1990s and enabled unprecedented battlefield adaptation in the 2000s. After reviewing the revolutionary changes that led to American dominance in conventional warfare in the 1990s, the article examines US transformation policies in the 2000s to inform defense strategy and planning efforts in the 2010s. 相似文献
722.
An effective hybrid optimization method is proposed by integrating an adaptive Kriging (A-Kriging) into an improved partial swarm optimization algorithm (IPSO) to give a so-called A-Kriging-IPSO for maxi-mizing the buckling load of laminated composite plates (LCPs) under uniaxial and biaxial compressions. In this method, a novel iterative adaptive Kriging model, which is structured using two training sample sets as active and adaptive points, is utilized to directly predict the buckling load of the LCPs and to improve the efficiency of the optimization process. The active points are selected from the initial data set while the adaptive points are generated using the radial random-based convex samples. The cell-based smoothed discrete shear gap method (CS-DSG3) is employed to analyze the buckling behavior of the LCPs to provide the response of adaptive and input data sets. The buckling load of the LCPs is maximized by utilizing the IPSO algorithm. To demonstrate the efficiency and accuracy of the proposed methodology, the LCPs with different layers (2, 3, 4, and 10 layers), boundary conditions, aspect ratios and load patterns (biaxial and uniaxial loads) are investigated. The results obtained by proposed method are in good agreement with the literature results, but with less computational burden. By applying adaptive radial Kriging model, the accurate optimal results-based predictions of the buckling load are obtained for the studied LCPs. 相似文献
723.
The present study focuses on the mitigation of shock wave using novel geometric passages in the flow field. The strategy is to produce multiple shock reflections and diffractions in the passage with minimum flow obstruction, which in turn is expected to reduce the shock wave strength at the target location. In the present study the interaction of a plane shock front (generated from a shock tube) with various geometric designs such as, 1) zig-zag geometric passage, 2) staggered cylindrical obstructions and 3) zig-zag passage with cylindrical obstructions have been investigated using computational technique. It is seen from the numerical simulation that, among the various designs, the maximum shock attenuation is produced by the zig-zag passage with cylindrical obstructions which is then followed by zig-zag passage and staggered cylindrical obstructions. A comprehensive investigation on the shock wave reflection and diffraction phenomena happening in the proposed complex passages have also been carried out. In the new zig-zag design, the initial shock wave undergoes shock wave reflection and diffraction process which swaps alternatively as the shock front moves from one turn to the other turn. This cyclic shock reflection and diffraction process helps in diffusing the shock wave energy with practically no obstruction to the flow field. It is found that by combining the shock attenuation ability of zig-zag passage (using shock reflection and diffraction) with the shock attenuation ability of cylindrical blocks (by flow obstruction), a drastic attenuation in shock strength can be achieved with moderate level of flow blocking. 相似文献
724.
In this article, we are concerned with scheduling stochastic jobs in a flowshop with m machines and zero intermediate storage. We assume that there are n - 2 identically distributed and 2 fast stochastic jobs. Roughly, the main result states that the makespan is stochastically minimized by placing one of the fast jobs first and the other last. 相似文献
725.
ABSTRACTThis paper examines the importance of closer co-operation in defence-related procurement. Led by the decision that Belgium will lead the procurement of 12 Mine CounterMeasures Vessels (MCMV), the case of a potential Belgian naval construction cluster is discussed. The feasibility of a potential cluster is investigated by looking at key elements of a successful naval construction cluster, the Dutch naval construction cluster, and comparing those key elements to the current Belgian situation. Forming a sustainable Belgian naval construction cluster will be difficult. Most of the procurement process of the MCMVs is set on a European tender. In the long run, due to the absence of both a launching customer and leader firms, no party is able to carry the cluster with investments and knowledge spill-overs. In order to keep public support for large defence-related investments, clustering around the MCMV integration system and proactive cluster support is recommended. 相似文献
726.
Ian F. W. Beckett 《Small Wars & Insurgencies》2019,30(4-5):994-1019
ABSTRACT What Rudyard Kipling called the ‘campaign of lost footsteps’ was the longest campaign fought by the Victorian army. The conquest of Upper Burma, an area of 140,000 sq. miles with a population of four million, took only three weeks in November 1885 and was accomplished with minimum cost. However, the removal and deportation of the Burmese King and dismantling of all traditional authority dismantled led to growing resistance to British rule leading to an increasingly difficult guerrilla war. Though the Burmese guerrillas were characterised by the British as mere bandits or dacoits, many were former soldiers along with Buddhist monks. The extremely difficult nature of campaigning in the terrain and climate of Burma was not sufficiently appreciated by the War Office, who viewed the conflict as a ‘subaltern’s war’ and ‘police’ work. Intended regime change was also not accompanied by any consideration of the likely implications. Prolonged insurgency necessitated deploying a force far larger than originally intended; though order was finally secured by 1895, the campaign proved destructive of Burmese society while British recruitment of hill tribes into the police and armed forces sowed the seeds for future divisions. 相似文献
727.
Charles W. Mahoney 《Defense & Security Analysis》2020,36(2):180-200
ABSTRACTThe United States’ global strategic outlook has shifted markedly since the end of major combat operations in Iraq and Afghanistan. As the United States’ strategic posture shifts, the nature of military operations is simultaneously changing rapidly. Many analysts predict that cyber-operations, autonomous weapons systems, artificial intelligence, and clandestine special forces operations will be central features in future conflicts. Although often overlooked by scholars and policy analysts, defence contractors are integral to the development and implementation of these emerging categories of warfare. This inquiry examines the evolving nature of the American defence industry and the roles corporations play in current theatres of conflict. Surprisingly, rather than becoming less reliant on defence contractors after their much-maligned performance in the wars in Iraq and Afghanistan, American military and intelligence agencies have become more dependent on the private sector as technology becomes increasingly central to warfare. 相似文献
728.
729.
ABSTRACTNo issue deserves more scrutiny than the mechanisms whereby popular unrest unleashes civil wars. We argue that one institution – two-tiered security systems – is particularly pernicious in terms of the accompanying civil war risk. These systems’ defining characteristic is the juxtaposition of small communally stacked units that protect regimes from internal adversaries with larger regular armed forces that deter external opponents. These systems aggravate civil war risks because stacked security units lack the size to repress widespread dissent, but inhibit rapid regime change through coup d’état. Regular militaries, meanwhile, fracture when ordered to employ force against populations from which they were recruited. 相似文献