全文获取类型
收费全文 | 230篇 |
免费 | 100篇 |
国内免费 | 25篇 |
出版年
2022年 | 7篇 |
2021年 | 11篇 |
2020年 | 4篇 |
2019年 | 1篇 |
2018年 | 5篇 |
2017年 | 4篇 |
2016年 | 20篇 |
2015年 | 18篇 |
2014年 | 22篇 |
2013年 | 27篇 |
2012年 | 21篇 |
2011年 | 17篇 |
2010年 | 20篇 |
2009年 | 17篇 |
2008年 | 15篇 |
2007年 | 10篇 |
2006年 | 15篇 |
2005年 | 13篇 |
2004年 | 21篇 |
2003年 | 9篇 |
2002年 | 11篇 |
2001年 | 14篇 |
2000年 | 10篇 |
1999年 | 9篇 |
1998年 | 8篇 |
1997年 | 5篇 |
1996年 | 6篇 |
1995年 | 2篇 |
1994年 | 5篇 |
1993年 | 1篇 |
1992年 | 2篇 |
1991年 | 1篇 |
1990年 | 4篇 |
排序方式: 共有355条查询结果,搜索用时 15 毫秒
101.
Eduardo Morales-Ramos 《Defence and Peace Economics》2013,24(5):365-383
The impact of defence expenditure on the economy has been widely studied through different types of models. However, the results from these studies have not reached definitive conclusions, and have left a gap in the analysis of the impact of defence R&D expenditure at the economy level. Defence R&D has specific characteristics, which lead to market failures: public good, high risk and uncertainty, national security. Also, defence R&D creates two types of externalities: negative (crowding-out), and positive (spin-off). Crowding-out is the major economic debate about defence R&D. This paper analyses the crowding-out hypothesis by applying three types of models for the UK case: supply, demand, and demand-supply models. From these three models the most reliable is chosen and applied to the individual cases of France, Germany, Japan and USA. The paper also reports the results for the pooled data of these five countries, and for four error component models. The results from estimating such models shed light on the defence R&D crowding-out hypothesis. 相似文献
102.
ON THE CHOICE OF MULTI-TASK R&D DEFENSE PROJECTS: A CASE STUDY OF The ISRAELI MISSILE DEFENSE SYSTEM
Investments in R&D constitute a major share of the expenditures of the hi-tech industry since, generally, they enable firms to successfully compete in the rapidly and constantly changing markets for hi-tech products and services. The role of R&D projects is particularly important in the areas of defense and homeland security due to the nature of warfare and the continuous threats posed by arms races and by terror organizations. This study analyzes the choice of the R&D projects designed to counter multiple related military threats. It develops the methodology required to assess whether it is preferable to develop one project to thwart several related threats, or several distinct projects, each of which provides an answer to one specific threat or a partial set of the threats. An analytic solution is provided and assessed for two simple models with two related threats. A solution of the model is then provided for any number of related threats, using a dynamic programming methodology. Finally, we demonstrate the usefulness of our model and methodology to Israel’s missile defense problem; that is, we show how to optimally develop systems aimed at thwarting the multiple threats of short-, medium-, and long-range missiles. 相似文献
103.
ANDILE SOKOMANI 《African Security Review》2013,22(4):81-90
“Lack of money is the root of all evil” George Bernard Shaw In a environment where party financing, private funding in particular, is generally a laissez-faire business, as in most Southern African countries, there is the real risk that interest groups and wealthy individuals will buy influence in political parties and in so doing erode public confidence in the political system. Because they are neither open to public scrutiny nor subject to any legislative restraints, huge private donations can, and often do, come with strings attached. This lack of transparency and openness, as well as mechanisms to prevent it, provides ample ground for influence peddling, where those who pay the piper call the tune. Left unchecked, this party funding scenario will continue to be a serious indictment of the region's democratisation projects, crippling democracy and stunting economic development. This article consid 相似文献
104.
针对云重心和云模型评判方法存在的信息丢失、难于评判以及信息扭曲等问题,从确定权重等级、评价集和评价结果3个方面对模型进行了改进和完善.应用二元语义确定指标权重,避免了评价信息的丢失和扭曲,采用综合云的思想确定评价集,充分利用评价者给出的信息,简化相似云的理论来定量衡量评价结果,从而建立了基于云理论一二元语义的雷达装备保障指挥效能评估模型. 相似文献
105.
106.
107.
末段反导指控与作战管理(Command,Control and Battle Manangement,C2BM)系统是末段反导系统的指挥控制中心.在系统分析末段反导系统的组成及末段反导C2BM系统工作过程的基础上,初步探讨了基于DoDAF(Department of Defense Architecture Framework)的末段反导C2BM系统需求分析方法和步骤,建立了末段反导C2BM系统的作战视图,对末段反导C2BM系统的体系结构及其信息交互进行了深入分析和可视化建模,保证了对末段反导C2BM系统需求理解的一致性,有效促进了军事人员与分析设计人员间的沟通和交流,为后续的开发夯实坚实的基础. 相似文献
108.
基于元模型的体系结构设计思想和基于可执行模型的评估方法是体系结构领域研究的两个热点,但当前的研究没有将两者结合起来。文章基于DoDAF2.0提出的元模型数据(Meta-Model Data,DM2),将元模型的思想和基于可执行模型的评估方法相结合,分析了基于DM2的逻辑数据与可执行模型各构建要素的对应关系,构建了基于DM2的逻辑数据模型直接转可执行模型的过程框架,重点研究了如何直接从体系结构底层数据转可执行模型的方法,从而为进行基于元模型的体系结构可执行评估提供模型基础,也为进一步实现体系结构自动化验证评估提供技术支持。实例验证了文章提出的方法。 相似文献
109.
110.