首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   2673篇
  免费   407篇
  国内免费   155篇
  3235篇
  2024年   3篇
  2023年   8篇
  2022年   22篇
  2021年   37篇
  2020年   27篇
  2019年   69篇
  2018年   54篇
  2017年   99篇
  2016年   108篇
  2015年   76篇
  2014年   217篇
  2013年   317篇
  2012年   160篇
  2011年   218篇
  2010年   187篇
  2009年   202篇
  2008年   163篇
  2007年   199篇
  2006年   165篇
  2005年   155篇
  2004年   147篇
  2003年   114篇
  2002年   81篇
  2001年   83篇
  2000年   47篇
  1999年   40篇
  1998年   27篇
  1997年   27篇
  1996年   29篇
  1995年   23篇
  1994年   29篇
  1993年   17篇
  1992年   19篇
  1991年   16篇
  1990年   24篇
  1989年   13篇
  1988年   10篇
  1987年   2篇
  1975年   1篇
排序方式: 共有3235条查询结果,搜索用时 0 毫秒
281.
《Arms and Armour》2013,10(1):3-13
In the following short notice, the authors tell the story of the appearance of Classical armour in the Tower Armouries in the early and mid-nineteenth century. In the first part, Malcolm Mercer describes the interest surrounding armour from Cumae and the circumstances of its purchase by the Ordnance Office; while in the second Thom Richardson presents a specialist analysis of this group.  相似文献   
282.
《Arms and Armour》2013,10(1):40-52
Abstract

Scientifically analysing important artefacts from the site of historic battles is vital if the best information is to be retrieved from the field. A detailed knowledge of the specific equipment that was available to the combatants from a known battle is also required at a high level so that artefacts and fragments resulting from an historic battlefield archaeological survey can be recognised when found. Access to specialists from all walks of life is required throughout each battlefield-related project, from the fieldwork stages to the dissemination of information. The following paper discusses the importance of working alongside museums and specialists and gives examples of how the Towton Battlefield Archaeology Project has successfully worked with the staff at the Royal Armouries Leeds.  相似文献   
283.
After only ten years in existence, the African Union (AU) has already made its mark on the landscape of peace and security in Africa. This paper seeks to explore the relationship between the AU's leading collaborative interstate security policy, the African Peace and Security Architecture (APSA), and sustainable peace in the Horn of Africa. It examines four countries – Djibouti, Eritrea, Ethiopia, and Kenya – and how engaging with the APSA through early warning systems can contribute to developing the elements necessary for sustainable peace, namely regional stability, conflict management, and good governance.  相似文献   
284.
By comparing the Somali experience of piracy with the emerging situation in the Gulf of Guinea, I show that increases in the enforcement aspects of state capacity in the Gulf of Guinea states are necessary but not sufficient tools to combat the emergence, growth, and institutionalisation of piracy. Such tools would require state-building measures that would minimise the incentives of individuals to join piracy organisations and they would have to effectively deal with youth unemployment, income inequality, and environmental degradation.  相似文献   
285.
Paul Collier has produced a well-written and apparently plausible thesis on ‘greed and grievance’, evidenced in several published texts, which concludes unambiguously that greed, not grievance, is overwhelmingly the cause of conflict. However, Collier has based these findings upon narrowly defined quantitative measures–three defined indices of greed and four indices of grievance. Collier consciously omitted indices which he found difficult to measure, such as suppliers of armaments and opportunities for bureaucratic corruption. However, he appears to have unwittingly omitted some further factors, including governance, management mechanisms for natural resources and the influence that charismatic leadership can have on rebel groups. These omissions can be viewed as a major flaw in Collier's work. They also explain why Collier has diagnosed that civil wars are more likely to occur in some countries in the developing world without offering adequate explanation of why this may be so.  相似文献   
286.
Since the July 2009 Boko Haram terrorist outburst in Nigeria, there have been increasing questions on the phenomenon in the country. There has not been any substantial analysis on the emergence of the Boko Haram group and its terrorist activities in Nigeria as the out-rage continues. This study is advanced to explain the phenomenon of Boko Haram terrorism in Nigeria. It employs the levels of analysis framework popular in the field of international relations to explain the terrorism at three major levels: individual, state and international. The study relies on dependable news reports, which include interviews with key actors relevant to the subject matter, and finds that Boko Haram terrorism has its roots in the ideology and motivations of its founder and members, the failures and deficiencies of the Nigerian state, and the modern trend of religious terrorism in the international system.  相似文献   
287.
The criticism of James, Solberg and Wolfson (JSW) (1999) by Oneal and Russett (OR) is not responsive to the methodologica] issues at stake. JSW argued that war is an endogenous feature of the world political and economic system. If its causes are to be measured, it must be as a structural equation in a simultaneous system. Wedded to the idea that “democracies never fight each other,” OR rely on a single equation to justify their view. JSW claim that such an equation may be an ad hoc reduced form with no causal implications unless the equation is explicitly identified as a structural equation. JSW expand the model to explain democracy and conflict as two endogenous variables. JSW do not claim to have discovered the true relationships between these variables by their minimal expansion of the structural relation. They do show that unless these (and other) variables are treated as part of a system, the results are unstable, contradictory, of minimal size and not a reliable guide to public policy.  相似文献   
288.
This paper models and simulates a government‐contractor principal‐agent weapon system repair model. Insights are derived as to how government repair contracts should be constructed so as to induce optimal contractor behavior. The paper's general conclusion is that the best contracting approach combines a lump‐sum payment that does not vary with the number of units repaired, expensive item cost‐sharing, and a contractor‐provided availability guarantee. Provided there is intercontractor competition, this type of contract performs well even if the government is poorly informed about weapon system break patterns or repair costs.  相似文献   
289.
In his 2009 Prague speech and the 2010 Nuclear Posture Review, President Barack Obama committed the United States to take concrete steps toward nuclear disarmament while maintaining a safe, secure, and effective nuclear deterrent. There is an inherent tension between these two goals that is best addressed through improved integration of nuclear weapons objectives with nuclear arms control objectives. This article reviews historical examples of the interaction between the two sets of objectives, develops a framework for analyzing opportunities for future integration, and suggests specific ideas that could benefit the nuclear weapons enterprise as it undergoes transformation and that could make the future enterprise compatible with a variety of arms control futures.  相似文献   
290.
Radioactive sealed sources have a long history and a much wider worldwide distribution than do weapons-usable fissile materials. This article compares the mechanisms for controlling radioactive sources with those of weapons-usable materials and makes the case for improved policy making on the safe and secure management of radioactive sources (often referred to simply as “sources”). Such sources have been widely distributed with commercial and government support to nearly every country, yet there are no legally binding, international agreements or regulations to control any aspect of their life cycle. This is problematic because some sources that are disused, abandoned, or otherwise fall out of regulatory control could be used in the form of a radiological dispersal device (RDD, or dirty bomb). An RDD could pose significant economic and psychological impacts with the potential for detrimental effects on public health. The lack of international measures to control sources is troubling for several reasons: creating an RDD is much easier than fashioning a nuclear weapon from scratch or from stolen fissile materials; given the many incidents involving diversion from regulatory control and the misuse of sources, an RDD attack would be one of the more likely scenarios; materials security for sources is generally weak and inconsistent; it is nearly impossible to determine the total amount of sources manufactured and distributed; used sources are frequently found uncontrolled and transiting borders, and penalties are light at best; the market-based supply and demand of sources facilitates their rapid and loosely regulated distribution; and the “peaceful uses” aspect of the Treaty on the Non-Proliferation of Nuclear Weapons along with norms that began developing around the time of Atoms for Peace have promoted the nearly unchecked global distribution of sources. Several immediate and long-term actions are suggested to reduce the threat posed by radiological sources.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号