首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   375篇
  免费   13篇
  国内免费   1篇
  2021年   3篇
  2019年   15篇
  2018年   14篇
  2017年   9篇
  2016年   8篇
  2015年   4篇
  2014年   10篇
  2013年   87篇
  2012年   3篇
  2010年   6篇
  2007年   8篇
  2006年   5篇
  2005年   11篇
  2004年   7篇
  2003年   4篇
  2002年   8篇
  2000年   2篇
  1999年   4篇
  1998年   8篇
  1997年   8篇
  1996年   4篇
  1995年   5篇
  1994年   9篇
  1993年   11篇
  1992年   7篇
  1991年   8篇
  1990年   7篇
  1989年   7篇
  1988年   8篇
  1987年   4篇
  1986年   5篇
  1985年   8篇
  1984年   4篇
  1983年   2篇
  1982年   5篇
  1981年   5篇
  1980年   4篇
  1979年   4篇
  1978年   4篇
  1977年   4篇
  1976年   4篇
  1975年   3篇
  1974年   5篇
  1973年   7篇
  1972年   4篇
  1969年   3篇
  1968年   5篇
  1967年   2篇
  1966年   4篇
  1948年   2篇
排序方式: 共有389条查询结果,搜索用时 15 毫秒
201.
The Western interventions in Iraq and Afghanistan have produced a heated polemic concerning the merits and demerits of counterinsurgency – the operational approach underpinning both campaigns. The two books reviewed here provide a good summation of the arguments against counterinsurgency: it is not a strategy and will fail when mistaken as such; its theory does not make intervention and war significantly easier; and even the most successful counterinsurgency campaigns have been bloody, violent, and protracted. Yet as this review highlights, beyond these central points, criticism of counterinsurgency is too often off the mark in its approach and totalizing in its pretentions. There is much to criticize and an urgent need to learn from past campaigns, yet bold claims and broad generalizations can mislead rather than enlighten. The analysis is particularly unhelpful when the definition of the central issue at hand – counterinsurgency – is being unwittingly or deliberately distorted. In the end, these two books form a poor basis for the debate that must now take place, because they are too ideological in tone, too undisciplined in approach, and therefore too unqualified in what they finally say.  相似文献   
202.
Addressing insurgency requires the same application of operational art as utilized in conventional warfare planning. Counterinsurgency strategy will be driven by the nature of the insurgent movement, with campaigns constructed to use tactics appropriately so that key facets of the insurgent campaign are neutralized. It is especially important to determine whether terror is used as a tactic (a method of action) by an insurgency or as a stand-alone strategy (a logic of action) by a challenger divorced from a mass base. Insurgencies, in turn, will normally emphasize strategically either winning allegiance of the target population or using violence as a substitute for other methods. Each of these approaches requires the weighting of the appropriate campaign elements of the counterinsurgency strategy. Sri Lanka, having faced both approaches, is an especially useful case study.  相似文献   
203.
This paper extends traditional production/distribution system analysis to address raw material, factories, and markets located beyond Earth. It explains the eventual advantages of such operations and discusses likely sites in the solar system. It furnishes a typology for production/distribution systems, assessing the fit of each type to space operations. It briefly reviews the physics of orbits. It develops transportation and inventory cost functions for the simplest case of Hohmann trajectories, and for transportation between circular orbits of similar radii using higher‐energy trajectories. These cost functions are used to derive a model of production/distribution system cost, the minimization of which selects an optimal factory location. The paper suggests potential extensions to this work, and concludes with ideas for location research on the novel reaches of extraterrestrial space. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005.  相似文献   
204.
In this paper we present an application of the core solution concepts for multi‐objective games to a bank ATM network model. In these games, the worth of a coalition is given by a subset of vectors of the k‐dimensional space rather than by a scalar. The paper investigates how an ATM network model based on multi‐objective cooperative game theory could be used as an alternative way of setting interchange fees paid by the customer's bank to the one that owns the ATM. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2005  相似文献   
205.
This article deals with the investigation of the effects of porosity distributions on nonlinear free vibration and transient analysis of porous functionally graded skew (PFGS) plates. The effective material properties of the PFGS plates are obtained from the modified power-law equations in which gradation varies through the thickness of the PFGS plate. A nonlinear finite element (FE) formulation for the overall PFGS plate is derived by adopting first-order shear deformation theory (FSDT) in conjunction with von Karman’s nonlinear strain displacement relations. The governing equations of the PFGS plate are derived using the principle of virtual work. The direct iterative method and Newmark’s integration technique are espoused to solve nonlinear mathematical relations. The influences of the porosity distributions and porosity parameter indices on the nonlinear frequency responses of the PFGS plate for different skew angles are studied in various parameters. The effects of volume fraction grading index and skew angle on the plate’s nonlinear dynamic responses for various porosity distributions are illustrated in detail.  相似文献   
206.
Observational data are prevalent in many fields of research, and it is desirable to use this data to make causal inferences. Because this data is nonrandom, additional assumptions are needed in order to construct unbiased estimators for causal effects. The standard assumption is strong ignorability, though it is often impossible to achieve the level of covariate balance that it requires. As such, researchers often settle for lesser balance levels within their datasets. However, these balance levels are generally insufficient to guarantee an unbiased estimate of the treatment effect without further assumptions. This article presents several extensions to the strong ignorability assumption that address this issue. Under these additional assumptions, specific levels of covariate balance are both necessary and sufficient for the treatment effect estimate to be unbiased. There is a trade‐off, however: as balance decreases, stronger assumptions are required to guarantee estimator unbiasedness. These results unify parametric and nonparametric adjustment methods for causal inference and are actualized by the Balance Optimization Subset Selection framework, which identifies the best level of balance that can be achieved within a dataset. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 323–344, 2017  相似文献   
207.
It is commonly assumed in the foreign policy literature that narratives are uniquely persuasive and thus integral to obtaining public support for war. Yet, empirical research on “strategic narrative” is often vague on both the concept of narrative and how it persuades. Moreover, the stories publics use to interpret war are rarely examined. This paper offers a novel approach to studying “from the ground up” the war stories of individual British citizens. It examines public interpretations of war through emplotment: the way people select and link events to create a coherent story. Examining the wars people include and those they silence, it illustrates how a diverse range of citizens morally evaluates Britain’s military role, be it as a Force for Good, a Force for Ill or a country Learning from its Mistakes. In doing so, the paper offers an alternative methodological approach to studying how individual citizens understand war.  相似文献   
208.
The present paper studies the relative magnitudes of expected waiting times in extended machine-repair models, when processing times are of two Erlang types. © 1999 John Wiley & Sons, Inc. Naval Research Logistics 46: 864–870, 1999  相似文献   
209.
This paper uses the holding time model (HTM) method to derive an approximate analytic formula for the calculation of the mean throughput of a K-station production line with no buffers between any two successive stations. Service times follow the two-stage Coxian (C2) distribution at all stations. The paper provides a formula that relates the third moment of the service completion (or virtual service) time with the respective parameters of the service time, the repair time and the time to breakdown (the latter is assumed to follow the exponential distribution). In this way, it concludes that under certain conditions the two-stage Coxian distribution can be used to approximate any general distribution matching the first three moments of the service completion time distribution. The mean holding times (consisting of the service and blocking periods) of all stations of the line are obtained in an analytical form. Numerical results are provided for the mean throughput of lines with up to 20 stations. These results are shown to have a good accuracy compared against results obtained from the Markovian state method (for short lines) and results from simulation (for longer lines). © 1998 John Wiley & Sons, Inc. Naval Research Logistics 45: 669–685, 1998  相似文献   
210.
This paper considers a combined system composed of multiple stand-by remotely piloted vehicles (RPVs) and a single battery against a single passive enemy target, where the target, if not killed, is allowed to change its location after each attack. The RPV has the duty to report on target acquisition, to confirm a target kill, and to pass information on any change in target location after each battery attack. The battery has the duty to attack the target on the basis of the target location information provided to it by the RPV. We develop a closed-form expression for the time-dependent state probabilities of the system, which can be used to compute several important combat measures of effectiveness, including (a) the time-varying mean and variance of the number of the RPVs being alive and of the surviving enemy target, (b) the mission success, mission failure, and combat draw probabilities, and (c) the mean and variance of the combat duration time. Illustrative numerical examples are solved for these combat measures, and sensitivity analyses are performed with respect to target acquisition time and target kill probability. © 1998 John Wiley & Sons, Inc. Naval Research Logistics 45: 645–667, 1998  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号