首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1753篇
  免费   536篇
  国内免费   149篇
  2024年   10篇
  2023年   18篇
  2022年   17篇
  2021年   25篇
  2020年   28篇
  2019年   34篇
  2018年   39篇
  2017年   93篇
  2016年   120篇
  2015年   78篇
  2014年   151篇
  2013年   140篇
  2012年   145篇
  2011年   142篇
  2010年   97篇
  2009年   145篇
  2008年   116篇
  2007年   91篇
  2006年   102篇
  2005年   119篇
  2004年   101篇
  2003年   81篇
  2002年   77篇
  2001年   78篇
  2000年   58篇
  1999年   48篇
  1998年   42篇
  1997年   45篇
  1996年   35篇
  1995年   26篇
  1994年   33篇
  1993年   31篇
  1992年   25篇
  1991年   28篇
  1990年   9篇
  1989年   5篇
  1988年   4篇
  1987年   2篇
排序方式: 共有2438条查询结果,搜索用时 15 毫秒
791.
通信电磁环境模拟器是保障完成通信对抗装备检测与训练的重要设备。提出了一种基于任意波形发生器和嵌入式GPRS/GPS模块的远程模拟器设计方案。同时,讨论了一种模拟器的组网拓扑设计,实现了复杂信号环境生成。解决了远程通信电磁环境生成问题,具有很高的工程应用价值。  相似文献   
792.
任务分配是多UCAV协同控制的核心和有效保证,是一类复杂的多目标优化问题。针对一种扩展的混合整数线性规划(MILP)任务分配模型,通过对模型特点的分析,提出一种基于相似度的遗传退火算法解决该问题并进行仿真实验,仿真结果表明该算法具有较强的收敛性和较好的多样性,验证了改进算法解决该问题模型的有效性。  相似文献   
793.
脉冲力的瞬间作用会引起攻角和侧滑角的急剧变化,对末修弹飞行稳定性产生较大的影响.以线性化运动微分方程组为数学解析手段,对末修弹脉冲作用稳定性进行深入分析研究.数值仿真表明,采用小扰动法分析弹丸脉冲控制弹丸飞行稳定性是可行的.  相似文献   
794.
This paper provides a political economy analysis of the evolution of unmanned aerial vehicles (UAV), or ‘drones’ in the USA. Focus is placed on the interplay between the polity and private economic influences, and their impact on the trajectory of political, economic, and military outcomes. We identify the initial formation of the drone industry, trace how the initial relationships between the military and the private sector expanded over time, and discuss present relationships. Understanding the historical evolution of UAV technology, as well as the major players in the industry today, is important for ongoing policy debates regarding the use of drones both domestically and internationally.  相似文献   
795.
This article puts forth collection action as a unifying theme for the conference essays on arms trade, control, and production. For each of these topics, collective action failures are related to group size and group composition considerations. Other issues are also examined including the manner in which individual contributions determine the overall level of the associated collective good ‐ the so‐called aggregation technology of public supply. Based on alternative aggregation technologies, the game‐theoretic underpinnings of these arms issues are explored.  相似文献   
796.
If international terrorism is on a rising trend, an important source of confirmation or refutation of this is time‐series data on terrorist activity. Using chiefly data collected by the RAND/MIPT consortium we show using basic statistical analysis that in the period 1968–2005 the yearly number of all international terrorist incidents shows no trend over time, but fluctuates year on year in a random manner. On the other hand some indicators do show a definite trend over time, principally the steady rise in the number of incidents that are death‐dealing in nature. A further conclusion is drawn, showing that the proportion of these incidents leading to deaths above a given level is virtually fixed.  相似文献   
797.
This study models the structural sources of variation in the use of selective (discriminate) repression within 89 civil wars fought between 1981 and 2005. The severity of repressive violence is modeled as a function of the amount of territory being contested by the insurgents. This idea is operationalized using measures of the location, size, and density of insurgency violence. The analysis finds evidence that the repressive behavior of both governments and rebel groups is linked to conflict geography. Governments violate physical integrity rights more frequently and kill more civilians the greater the overall amount of territory under contestation. Rebels kill more civilians in highly dispersed insurgencies that lack a clear epicenter.  相似文献   
798.
In the ten years since the establishment of South Africa's first inclusive democratic government, an ambitious, extensive and systematic process of reform has been carried out in the governance of security. The process is widely regarded as having been successful and a model for other processes of ‘security sector reform’ in the context of transitions from authoritarian forms of governance to democratic ones.

That this been achieved with hardly a shot fired in anger is a remarkable achievement and a credit to visionary political leadership as well as organisational capacity, in other words to effective security governance.

At the same time, progress has been uneven and sometimes fragmentary, policy intentions and commitments have not always been translated into practice, the end results have not been to everyone's liking, and transformation has engendered its own pathologies. Thus several challenges remain in improving security governance.

This article provides a broad overview of the roles played by the various actors in the governance of the security sector, including the executive, parliament and civil society. It examines the main policy frameworks and touches on organisational transformation, because it is impossible to deal with governance in isolation from these issues. Policy processes and the frameworks they give rise to—in particular—are critical for effective governance. This article deals with the defence, safety and security and intelligence fields. A comprehensive overview would need to include the governance of criminal justice and foreign policy. The article does not seek to make an overall evaluation of governance, but to identify achievements, shortfalls and challenges.  相似文献   
799.
South Asian Security and International Nuclear Order: Creating a Robust Indo-Pakistani Nuclear Arms Control Regime, by Mario Esteban Carranza. Ashgate, 2009. 208 pages, $99.95.  相似文献   
800.
For many years, non-nuclear weapons states have sought binding commitments from nuclear armed states that they would not be the victim of either the threat or use of nuclear weapons—so-called negative security assurances (NSAs). The nuclear weapon states have traditionally resisted granting such unconditional NSAs. Recent U.S. efforts to use nuclear deterrence against the acquisition and use by other states of chemical, biological and radiological weapons, however, have further exacerbated this divide. This article analyzes the historical development of NSAs and contrasts U.S. commitments not to use nuclear weapons with the empirical realities of current U.S. nuclear weapons employment doctrines. The authors conclude that NSAs are most likely to be issued as unilateral declarations and that such pledges are the worst possible manner in which to handle the issue of security assurance.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号