首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   351篇
  免费   5篇
  356篇
  2025年   1篇
  2024年   2篇
  2023年   3篇
  2022年   1篇
  2021年   3篇
  2020年   7篇
  2019年   27篇
  2018年   9篇
  2017年   16篇
  2016年   19篇
  2015年   8篇
  2014年   30篇
  2013年   129篇
  2012年   25篇
  2011年   14篇
  2010年   17篇
  2009年   9篇
  2008年   4篇
  2007年   1篇
  2006年   1篇
  2005年   6篇
  2004年   3篇
  2003年   3篇
  2002年   2篇
  2001年   7篇
  2000年   1篇
  1999年   2篇
  1998年   3篇
  1997年   2篇
  1992年   1篇
排序方式: 共有356条查询结果,搜索用时 0 毫秒
71.
采用数值模拟方法研究了双箭头负泊松比多胞结构抗子弹侵彻性能,对比分析了顶边撞击、铰点撞击、侧边撞击三种弹靶作用条件下子弹的侵彻行为与双箭头负泊松比结构的破坏形式。研究结果表明:当子弹以较高速度撞击双箭头负泊松比结构时,该结构的负泊松比效应不显著;顶边撞击与铰点撞击时,子弹直接贯穿结构,胞元破坏较小,此时双箭头负泊松比多胞结构抗侵彻性能较差;侧边撞击时,子弹未贯穿多胞结构,胞元破坏较大,双箭头负泊松比结构依靠其双三角结构使子弹发生偏转,显著增大了其侵彻阻力。分析了顶边撞击时子弹的入射角度变化对于双箭头负泊松比结构抗侵彻性能的影响,发现存在30°入射角和60°入射角。当子弹处于这两种入射角附近时,双箭头负泊松比多胞结构具有一定的抗侵彻能力。  相似文献   
72.
    
In this article, we analyze a discrete‐time queue that is motivated from studying hospital inpatient flow management, where the customer count process captures the midnight inpatient census. The stationary distribution of the customer count has no explicit form and is difficult to compute in certain parameter regimes. Using the Stein's method framework, we identify a continuous random variable to approximate the steady‐state customer count. The continuous random variable corresponds to the stationary distribution of a diffusion process with state‐dependent diffusion coefficients. We characterize the error bounds of this approximation under a variety of system load conditions—from lightly loaded to heavily loaded. We also identify the critical role that the service rate plays in the convergence rate of the error bounds. We perform extensive numerical experiments to support the theoretical findings and to demonstrate the approximation quality. In particular, we show that our approximation performs better than those based on constant diffusion coefficients when the number of servers is small, which is relevant to decision making in a single hospital ward.  相似文献   
73.
    
This article studies the optimal capacity investment problem for a risk‐averse decision maker. The capacity can be either purchased or salvaged, whereas both involve a fixed cost and a proportional cost/revenue. We incorporate risk preference and use a consumption model to capture the decision maker's risk sensitivity in a multiperiod capacity investment model. We show that, in each period, capacity and consumption decisions can be separately determined. In addition, we characterize the structure of the optimal capacity strategy. When the parameters are stationary, we present certain conditions under which the optimal capacity strategy could be easily characterized by a static two‐sided (s, S) policy, whereby, the capacity is determined only at the beginning of period one, and held constant during the entire planning horizon. It is purchased up to B when the initial capacity is below b, salvaged down to Σ when it is above σ, and remains constant otherwise. Numerical tests are presented to investigate the impact of demand volatility on the optimal capacity strategy. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 218–235, 2016  相似文献   
74.
ABSTRACT

Even with sizable economic inputs, access to foreign technologies, and considerable political will, China, up until the late 1990s, experienced only limited success when it came to the local design, development, and manufacture of advanced conventional weapons. Not surprisingly, therefore, reforming the local defense industry in order to upgrade its technology base and manufacturing capabilities and to make armaments production more efficient and cost-effective has long preoccupied the Chinese leadership. The fact that most of these efforts had little positive impact on the country’s military technological and industrial capabilities only encouraged Beijing to experiment with additional reforms in the hopes of finally getting it right.  相似文献   
75.
    
Military commanders, policymakers, and analysts have recently embraced the concept of combined action as a powerful tool to improve the effectiveness of Afghan security forces in the fight against the Taliban. In doing so, they explicitly draw inspiration from the Combined Action Program employed by US Marines during the Vietnam War. This program is widely considered to have greatly improved the effectiveness of South Vietnamese government forces and contributed to increased population security in its area of operations and is considered a model worthy of emulation. This study finds that the success of the Vietnam-era Combined Action Program was more qualified than contemporary proponents argue. It argues that successes were tempered, and conditioned, by the choice of junior commanders, the level of operational control enjoyed by the US Marines, and the way the local forces were recruited and deployed. These conditions offer valuable lessons for those seeking to employ combined action not only in present-day Afghanistan, but also in future counterinsurgency campaigns.  相似文献   
76.
    
The UN asks governments to report key figures of their annual military budgets with the aim of creating trust among member states. This goal can only be achieved if the data reported is accurate. However, although there are many reasons for governments to falsify data, the UN does not check for manipulation. In this paper, we apply Benford’s law to the military expenditure data of 27 states taken from the UN register. Our analysis of the first digits shows that the states with the greatest deviations from the expected Benford distribution and therefore the lowest data quality are the USA and the UK.  相似文献   
77.
Among the multiple dimensions of the tous azimuths modernisation of Chinese naval forces, the development of China’s anti-access capacity has recently elicited considerable interest. The important link between this capacity and an overarching vision of the use of force – i.e. a naval doctrine – has, however, often been left implicit. This article shows that the particular development of China’s naval anti-access forces – more precisely, forces with an impact on the naval balance – can be explained by a shift of China’s naval doctrine towards a distinctly pre-emptive posture, which, itself, stems from the set of constraints imposed by the framework of ‘local war under informationised conditions’.  相似文献   
78.
Critical security advocates commonly portray strategic studies as crippled by its narrow focus on Cold War-era military issues, as state-centric and as Western-centric. I argue that this conception of the scope of strategy is flawed and I offer a comprehensive rebuttal by working out the logic of the theories advanced by Carl von Clausewitz and Thomas Schelling. The proponents of critical security overlook the striking expansion of strategy during the Cold War, its longstanding inclusion of competing political actors not just states, as well as its capacity to put Western and non-Western actors in a common analytic frame. By breaking out of the conceptual jails in which strategy has been incarcerated, I seek to reconnect International Relations to strategic thought from which it has become increasingly estranged.  相似文献   
79.
There is a growing view that the emerging brand of Chinese regional diplomacy in recent years is increasingly assertive. This article attempts to make better sense of this perceived more forceful Chinese diplomacy. It argues that Chinese regional behavior is more profitably understood through the lens of a two-pronged foreign policy strategy that combines two particular aspects. One is a tougher and more uncompromising approach toward issues that China regards as concerning its core interests. The other is a more flexible and cooperative position toward interests that, while significant, are of secondary importance.  相似文献   
80.
    
《African Security Review》2012,21(2):110-123
ABSTRACT

Reflecting on young women involved in violence/peace, the dominant views present them as victims. This is understandable, as young women constitute the majority of those who are at the receiving end of violence. Further, young people are generally regarded as a threat. However, this paradigm glosses over the contribution of young women to peacebuilding in their communities. Despite the UN Security Council Resolution 1325 calling for women’s equal participation and full involvement in all efforts for the maintenance and promotion of peace and security, major challenges of its implementation in Africa remain. Therefore, this study sought to establish young women’s understanding of peacebuilding, activities they undertook to contribute to peacebuilding in Mashonaland East in Zimbabwe, and the challenges they encounter. The study prioritised the agency of young women in contributing towards peace in Mashonaland East, Zimbabwe. The research was based on the qualitative method as it sought to establish how women participate in peacebuilding. Findings of the study showed that young women are contributing to peacebuilding, although they face some challenges.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号