首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   340篇
  免费   41篇
  国内免费   18篇
  2023年   1篇
  2022年   3篇
  2021年   3篇
  2020年   6篇
  2019年   5篇
  2018年   7篇
  2017年   9篇
  2016年   16篇
  2015年   2篇
  2014年   27篇
  2013年   34篇
  2012年   31篇
  2011年   37篇
  2010年   25篇
  2009年   26篇
  2008年   25篇
  2007年   23篇
  2006年   20篇
  2005年   18篇
  2004年   14篇
  2003年   16篇
  2002年   8篇
  2001年   8篇
  2000年   7篇
  1999年   6篇
  1998年   2篇
  1997年   2篇
  1996年   5篇
  1995年   3篇
  1994年   1篇
  1993年   2篇
  1992年   1篇
  1991年   2篇
  1989年   2篇
  1988年   2篇
排序方式: 共有399条查询结果,搜索用时 15 毫秒
141.
This paper models and estimates Greek defence spending over the 1950–1989 period. It employs the Stone‐Geary welfare function and estimates levels of defence expenditures by the Engle‐Granger two‐step procedure. The Dickey‐Fuller test regression for cointegration is specified in terms of the significance of additional augmentations. The Deaton‐Muellbauer functional form is then employed and an estimating equation for the expenditure share of defence is derived. This specification is compared with the levels equation through a number of non‐nested tests involving model transformation.  相似文献   
142.
Kovenock and Roberson's (2012a, b) replication of Hausken’s (2008a) equations and parameter restrictions do not enhance our insight into the defense and attack of reliability systems. This reply intends to fill the remaining understanding gaps.  相似文献   
143.
According to the International Committee of the Red Cross (ICRC) publication Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law, all civilians (including child soldiers) lose their immunity from direct targeting ‘for so long as’ their actions amount to direct participation in hostilities. All civilians can, however, access the revolving door of protection and return to their civilian activities – complete with full immunity from direct targeting – provided the nature of their direct participation was spontaneous and disorganised. Once it can be ascertained that their participation in hostilities amounts to continuous combative functions, they relinquish their access to the revolving door of protection, and can be targeted at all times until they abandon their formal or functional membership of the belligerent group. This piece analyses how the revolving door phenomenon and the notion of continuous combative functions apply in instances where civilian child soldiers are directly participating in hostilities.  相似文献   
144.
The roots of the information technology Revolution in Military Affairs (RMA) can be traced to the mid-1970s, when the West capitalized on scientific-technological developments to neutralize the threat posed by Soviet second echelons. However, the cultivation of the technological seeds of the American RMA preceded the maturation of the conceptual ones. Although it was the US that was laying the technological groundwork for the RMA, Soviet, rather than the American military theorists, were the first to argue that the new range of technological innovations constituted a fundamental discontinuity in the nature of war, which they dubbed the ‘Military-Technical Revolution’ (MTR). About a decade later, this fundamental Soviet approach to the transformations in military affairs was analyzed, adapted and adopted by the US, and designated the RMA. This article deals with the intellectual history of the Soviet MTR and the American RMA.  相似文献   
145.
This article explores a perennial theme in the literature of strategic studies: the relationship between military theory and the military profession. It begins with a conceptual analysis of this relationship. It then investigates what military theorists themselves have had to say about the utility of their craft. It concludes by assessing the actual influence of military theory on selected individuals and institutions. The individuals are George S. Patton, Jr., and Ulysses S. Grant. The institutions are the United States Army and the United States Air Force in the late twentieth century. The fundamental finding is suggested in the title: military theory can indeed be quite useful in the maturation of military commanders and in the development of martial institutions, but it is not always necessary and by no means perfect. It should thus be studied assiduously but used with caution.  相似文献   
146.
高校干部"双肩挑"是目前高校普遍存在的管理模式,在高校教学科研中发挥着重要作用,是学校管理干部队伍中一支重要力量,同时又存在着不可回避的矛盾和问题。本文对"双肩挑"模式发挥的作用和存在的问题进行分析,最后有针对性的提出了几点改革对策。  相似文献   
147.
本研究以"中国大学生学习性投入调查问卷"(NSSE-China)为工具,对新疆8所高校的少数民族大学生的学习动力、学业成就期望、专业兴趣、学习快乐感、学习意义感进行了实证研究,总体揭示其在学习心理状况上的表现情况。结果显示:新疆少数民族大学生的学习动力并不乐观;学业成就期望有待提高;专业兴趣并不理想;学习快乐感和意义感有待进一步改善。本研究针对以上问题对进一步改善新疆少数民族大学生学习心理状况提出具体建议。  相似文献   
148.
当今国内的英美文学研究已呈现出从赏析到文论探讨的趋势,英美文学课程的教学也应该适应这一趋势。广义的文论也称为诗学,包括形式诗学和文化诗学两大部分。形式诗学要求英美文学的教学注重文本分析等技术手段,文化诗学则要求英美文学的教学与历史、文化等因素相结合,扩展视野,增加深度。两者的有效结合将给国内高校的英美文学教学带来全新的体验和特色。  相似文献   
149.
本文从中国古代诗学的意境论出发,分析意境论的内涵以及宋词的美学特征,并以李清照的《醉花阴》和豪放派的代表苏轼的《水调歌头》为例,对宋词的意境孵现、翻译原则和方法进行探讨、以求译者能最大限度得展现中国古涛词的优美意境。  相似文献   
150.
本文研究了雷达目标识别过程中关于目标的编码、分类特征的提取与选择等问题。提出了利用极小极大原则从频域中获取目标特征系数的方法,论述了它的数学框架以及寻求最佳解的算法步骤。利用实测的目标散射数据进行试验研究,结果表明了本文理论的正确性及其方法的有效性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号