全文获取类型
收费全文 | 295篇 |
免费 | 219篇 |
国内免费 | 17篇 |
出版年
2023年 | 4篇 |
2022年 | 2篇 |
2021年 | 6篇 |
2020年 | 9篇 |
2019年 | 3篇 |
2018年 | 6篇 |
2017年 | 17篇 |
2016年 | 18篇 |
2015年 | 20篇 |
2014年 | 21篇 |
2013年 | 32篇 |
2012年 | 26篇 |
2011年 | 24篇 |
2010年 | 12篇 |
2009年 | 17篇 |
2008年 | 14篇 |
2007年 | 13篇 |
2006年 | 22篇 |
2005年 | 31篇 |
2004年 | 17篇 |
2003年 | 7篇 |
2002年 | 13篇 |
2001年 | 11篇 |
2000年 | 17篇 |
1999年 | 10篇 |
1998年 | 14篇 |
1997年 | 1篇 |
1995年 | 62篇 |
1994年 | 80篇 |
1991年 | 1篇 |
1990年 | 1篇 |
排序方式: 共有531条查询结果,搜索用时 15 毫秒
171.
172.
Why should deployment affect re‐enlistment? In our model, members enter the military with naïve beliefs about deployment and use actual deployment experience to update their beliefs and revise their expected utility of re‐enlisting. Empirically, re‐enlistment is related to the type and number of deployments, consistent with the learning model. Non‐hostile deployment increases first‐term re‐enlistment but hostile deployment has little effect except for the Army, where the effect is positive. Both types increase second‐term re‐enlistment. Interestingly, first‐term members with dependants tend to respond to deployment like second‐term members. In addition, deployment acts directly to affect re‐enlistment, not indirectly through time to promotion. 相似文献
173.
Jean‐Paul Azam † 《Defence and Peace Economics》2013,24(4):343-364
We model an oppressor aiming at victimizing an excluded group in his country, with two main variants. A foreign power affects his behaviour using either conditional aid, subject to the dictator’s participation constraint, or the threat of sanctions, broadly defined, subject to the credibility constraint. The choice between the two is either determined by the latter, or by their relative cost. Aid is preferred when the threat of sanctions is ineffective, and sanctions are too expensive. Sanctions might be imposed, if the threat is ineffective. A case study of the Iraqi Kurds after Iraq was subject to sanctions is presented. 相似文献
174.
If international terrorism is on a rising trend, an important source of confirmation or refutation of this is time‐series data on terrorist activity. Using chiefly data collected by the RAND/MIPT consortium we show using basic statistical analysis that in the period 1968–2005 the yearly number of all international terrorist incidents shows no trend over time, but fluctuates year on year in a random manner. On the other hand some indicators do show a definite trend over time, principally the steady rise in the number of incidents that are death‐dealing in nature. A further conclusion is drawn, showing that the proportion of these incidents leading to deaths above a given level is virtually fixed. 相似文献
175.
In a rendezvous search problem, two players are placed in a network and must try to meet each other in the least possible expected time. We look at rendezvous search on a discrete interval in which the players are initially placed using independent draws (usually assumed to be from the same distribution). Some optimal solutions are known if this distribution is uniform, and also for certain other special types of distribution. In this article, we present two new results. First, we characterize the complete set of solutions for the uniform case, showing that all optimal strategies must have two specific properties (namely, of being swept and strictly geodesic). Second, we relate search strategies on the interval to proper binary trees, and use this correspondence to derive a recurrence relation for solutions to the symmetric rendezvous problem for any initial distribution. This relation allows us to solve any such problem computationally by dynamic programming. Finally, some ideas for future research are discussed. © Wiley Periodicals, Inc. Naval Research Logistics 60: 454–467, 2013 相似文献
176.
Full‐system testing for large‐scale systems is often infeasible or very costly. Thus, when estimating system reliability, it is desirable to use a method that uses subsystem tests, which are often less expensive and more feasible. This article presents a method for bounding full‐system reliabilities based on subsystem tests and, if available, full‐system tests. The method does not require that subsystems be independent. It accounts for dependencies through the use of certain probability inequalities. The inequalities provide the basis for valid reliability calculations while not requiring independent subsystems or full‐system tests. The inequalities allow for test information on pairwise subsystem failure modes to be incorporated, thereby improving the bound on system reliability. We illustrate some of the properties of the estimates via an example application. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013 相似文献
177.
Ordered flow shop models have appeared in the literature since the mid‐1970s and proportionate flow shop models have appeared since the early 1980s. We provide a detailed review of these models along with some analysis and potential topics for future research. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2013 相似文献
178.
Roger Arditti 《Small Wars & Insurgencies》2013,24(5):764-789
It has long been held that the Federation of Malaya’s counter-insurgency campaign during the First Malayan Emergency (1948–60) was determined by the use of intelligence. Special Branch — the Federation’s primary intelligence agency — dominates the prevailing paradigm of how the insurgent threat was tackled. Conversely, the role of the Royal Air Force (RAF) within this paradigm is very limited. Most observers simply dismiss the role of photoreconnaissance or airstrikes as being largely inconsequential to the counter-insurgency effort. This is perhaps understandable: the Emergency was after all a ‘policing action’ and the insurgents were largely hidden under Malaya’s jungle canopy and amongst the Chinese community. However, further scrutiny reveals that the RAF made a much more significant contribution to the intelligence element of the counter-insurgency campaign than previously realised. First, the RAF decided to locate their Advanced Headquarters with the Army’s General Headquarters. This led to the creation of the Land/Air Operations Room, through which intelligence, tasking and resources were coordinated. Moreover, the RAF put its intelligence teams into the field to provide a practical link between local units and theatre-level assets. Second, with the support of the Army, the RAF established at the beginning of the Emergency the Joint Air Photographic Intelligence Board (Far East). This coordinated all photographic intelligence requirements throughout the Emergency, which was then delivered via the Joint Air Photographic Centre (Far East). Hence, via Joint Operations Centre and JAPIB (FE), the RAF provided both the practical means for effective joint intelligence operations at theatre level throughout the Emergency. 相似文献
179.
180.
在金属切削原理中,用切削用量可以估计理论表面粗糙度。由于切削过程的复杂性,实际加工表面粗糙度和理论表面粗糙度有较大差距。本文采用模糊模式识别方法,对切削用量和表面粗糙度的关系进行了实验研究。本人介绍的理论方法、实现技术路线和实验结果,为以后开展FMS或CIMS中智能化质量监控技术的进一步研究打下了基础。 相似文献