首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1328篇
  免费   417篇
  国内免费   205篇
  1950篇
  2024年   4篇
  2023年   16篇
  2022年   18篇
  2021年   31篇
  2020年   33篇
  2019年   29篇
  2018年   23篇
  2017年   65篇
  2016年   102篇
  2015年   56篇
  2014年   112篇
  2013年   110篇
  2012年   123篇
  2011年   90篇
  2010年   83篇
  2009年   123篇
  2008年   82篇
  2007年   104篇
  2006年   134篇
  2005年   112篇
  2004年   88篇
  2003年   73篇
  2002年   53篇
  2001年   50篇
  2000年   28篇
  1999年   40篇
  1998年   34篇
  1997年   29篇
  1996年   18篇
  1995年   16篇
  1994年   11篇
  1993年   12篇
  1992年   14篇
  1991年   13篇
  1990年   15篇
  1989年   5篇
  1987年   1篇
排序方式: 共有1950条查询结果,搜索用时 0 毫秒
161.
This paper analyses the impact of terrorist activity on international tourist flows. To this end, we have estimated a cross‐sectional gravity equation for tourism from the G‐7 countries to a sample of 134 destinations over the period 2001–2003. Within this framework, we evaluate the deviation from ‘normal’ tourist flows due to terrorist activity, which is considered as negative advertising for the affected country. The analysis suggests that both domestic victims and international attacks are relevant factors when foreign tourists make their choice. This result is robust under alternative specifications. Moreover, the impact of terrorism is more severe in developing countries.  相似文献   
162.
The current approach to countering the threat of improvised explosive devices (IEDs) in Afghanistan has met with limited success. The relative lack of success may be in part because the current approach is not holistic and discounts the social systems that foster the IEDs. Insurgents are using IEDs as a tool to further their strategic aims, but the coalition and to a lesser extent the Government of the Islamic Republic of Afghanistan (GIRoA) are attacking the IEDs as if they are an end in and of themselves. Combining network disruption with information change maximizes the opportunities for mitigating the IED threat. More specifically, to mitigate the IED threat requires disrupting the social and economic systems associated with IEDs, and at the same time providing alternative economic opportunities and improving rule of law and governance at the local level. In other words, counter-IED (C-IED) must be Counter-Insurgency (COIN) centric to be successful. This paper reviews the current state of C-IED efforts, identifies five main problems with the current approach, and suggests changes to reduce or mitigate the IED threat in Afghanistan.  相似文献   
163.
Probing the technology in the production of US national defence by using a dynamic cost‐function model with adjustment costs, this paper evaluates the effect of reducing the level of national defence on the defence budget saving. Our inquiry involves estimating the defence production structure without output data for non‐market goods that are normally unavailable. Our findings include: (i) the United States behaves rationally to minimize cost in the production of national defence; (ii) the adjustment costs are larger in disarmament than in military build‐up; (iii) due to the adjustment costs peculiar to disarmament, the defence budget saving from disarmament appears small, but cutbacks allow great savings on the defence budget.  相似文献   
164.
Previous research has shown that the duration of a civil war is in part a function of how it ends: in government victory, rebel victory, or negotiated settlement. We present a model of how protagonists in a civil war choose to stop fighting. Hypotheses derived from this theory relate the duration of a civil war to its outcome as well as characteristics of the civil war and the civil war nation. Findings from a competing risk model reveal that the effects of predictors on duration vary according to whether the conflict ended in government victory, rebel victory, or negotiated settlement.  相似文献   
165.
TOT培训是对培训者的培训,是欧盟开展成人教育的一种创新模式.通过浅析TOT培训模式,结合我国警务硕士培养目标和要求,从警务硕士培养理念、培养方法、管理与评估等方面提出了开展警务硕士专业学位研究生培养工作的几点思考.  相似文献   
166.
概念模型验证是保证和提高仿真可信性的重要手段,是建模与仿真VV&A中的重点和难点.首先将概念模型的验证方法划分为非形式化方法、静态方法、动态方法和形式化方法4类,并提出了一种基于本体推理的概念模型验证方法,然后对各种方法的基本思想、基本原理、基本过程、适用对象、优缺点进行全面的分析总结,明确了各种方法的优缺点和适用范围,为如何选用各种验证方法提供参考,也明确了下一步应重点研究的问题.  相似文献   
167.
针对军事信息系统规模庞大、组成结构复杂以及越来越短的产品研制周期要求,在深入研究DoDAF(Department of Defense Architecture Framework)体系结构建模思想及理论的基础上,提出一种基于DoDAF的远程目指系统作战体系结构建模方法。通过分析作战体系结构产品的内涵,以及相互关联关系,给出了具体的体系结构设计步骤及产品实现形式。结合具体典型实例给出了体系结构产品的设计过程,最后通过动态仿真实验对所建立的模型进行了验证。实验结果表明,基于该方法建立模型合理可行、直观易懂、步骤简明清晰。  相似文献   
168.
We propose a nonparametric Bayesian lifetime data analysis method using the Dirichlet process mixture model with a lognormal kernel. A simulation‐based algorithm that implements the Gibbs sampling is developed to fit the Dirichlet process lognormal mixture (DPLNM) model using rightly censored failure time data. Five examples are used to illustrate the proposed method, and the DPLNM model is compared to the Dirichlet process Weibull mixture (DPWM) model. Results indicate that the DPLNM model is capable of estimating different lifetime distributions. The DPLNM model outperforms the DPWM model in all the examples, and the DPLNM model shows promising potential to be applied to analyze failure time data when an appropriate parametric model for the data cannot be specified. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013  相似文献   
169.
Abstract

This study estimates a three-sector Feder–Ram model using US annual data for 1965–2014 to confirm the externality of defense expenditure in the United States. Although the model is often used in the literature to scrutinize whether this effect exists, a flaw intrinsic to this model is the appearance of multicollinearity. In this study, I introduced novel techniques, namely: the standardization and estimation of a simple slope, to estimate the model. The results are as follows. First, I prove that the multicollinearity problem can be resolved by standardization. Second, externality, which is judged to conventionally exist, is not found. Third, increases in defense expenditure bring about positive but limited economic growth when the ratio of private to defense expenditure in the previous year ranges from 5.09 to 6.82%. By re-estimating the model, this study contributes to developing the Feder–Ram model within the related literature.  相似文献   
170.
针对一类非线性时滞系统,研究了该系统基于T—S模糊模型的H∞控制器设计问题。采用线性矩阵不等式LMI的方法,设计一个依赖于状态时滞的模糊控制器,得到了系统存在模糊控制器的充分条件,此充分条件等价于一类线性矩阵不等式的可解性,最后通过仿真说明了控制器的有效性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号