首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1921篇
  免费   63篇
  国内免费   29篇
  2013篇
  2025年   14篇
  2024年   10篇
  2023年   27篇
  2022年   19篇
  2021年   31篇
  2020年   35篇
  2019年   31篇
  2018年   25篇
  2017年   65篇
  2016年   103篇
  2015年   56篇
  2014年   114篇
  2013年   112篇
  2012年   125篇
  2011年   91篇
  2010年   86篇
  2009年   126篇
  2008年   83篇
  2007年   104篇
  2006年   135篇
  2005年   112篇
  2004年   89篇
  2003年   73篇
  2002年   53篇
  2001年   50篇
  2000年   30篇
  1999年   41篇
  1998年   35篇
  1997年   30篇
  1996年   18篇
  1995年   17篇
  1994年   12篇
  1993年   12篇
  1992年   15篇
  1991年   13篇
  1990年   15篇
  1989年   5篇
  1987年   1篇
排序方式: 共有2013条查询结果,搜索用时 0 毫秒
271.
    
The aim of this paper is to investigate the determinants of international arms transfers in a gravity model framework. By distinguishing between the decision to export arms (extensive margin) and the value of the arms exported (intensive margin), while also considering its interdependence, is what differentiates this paper from previous research. A theoretically justified gravity model of trade augmented with political and security motives is estimated using a two-stage panel data approach for 104 exporting countries over the period from 1950 to 2007. In addition to the usual gravity variables related to the economic mass of the trading countries and the trade cost factors, the model is extended with political and security factors. The level of democracy in both trading partners, political differences between trading partners and voting similarity with the United States in the UN General Assembly of the countries engaged in trade are the main political factors, whereas the existence of conflicts, military pacts, and embargoes are taken as security motives. The key result indicates that both political and security motives are an important determinant of an arms trade, but their effects on the extensive margin of exports (the decision to order a transfer) differs from their effect on the intensive margin (average value of exports). Moreover, the relative importance of the factors under study has changed since 1989. In the post-cold war period, countries that are less democratic are more likely to export arms, military pacts are less relevant and embargoes play a role.  相似文献   
272.
    
We consider a general linear filtering operation on an autoregressive moving average (ARMA) time series. The variance of the filter output, which is an important quantity in many applications, is not known with certainty because it depends on the true ARMA parameters. We derive an expression for the sensitivity (i.e., the partial derivative) of the output variance with respect to deviations in the model parameters. The results provide insight into the robustness of many common statistical methods that are based on linear filtering and also yield approximate confidence intervals for the output variance. We discuss applications to time series forecasting, statistical process control, and automatic feedback control of industrial processes. © 2010 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
273.
基于改进粒子群算法的联合火力打击目标分配研究   总被引:1,自引:1,他引:0  
针对联合火力打击目标分配涉及影响因素多、存在大量参数和变量的特点,建立了联合火力打击目标分配模型,采用改进的粒子群算法探讨了目标最优化分配问题。对粒子群算法中解空间存在的可能解进行编码,将可能解进行交叉、变异和选择操作得到新的粒子个体,不断迭代,从而得到可行的最优解。通过对一个作战想定的多次仿真,进一步表明了算法的可行性和有效性,为指挥员科学决策提供了依据。  相似文献   
274.
针对目标回波小尺度幅度起伏特性模型进行了介绍。对雷达线性接收机和对数接收机的特性和模型进行了对比。对雷达信号级仿真中,由于雷达采用非线性对数接收机造成的目标回波小尺度幅度起伏特性模型与接收机模型相互耦合的原因和所产生的影响进行了分析。提出对这样的模型耦合问题必须解决,以保证仿真研究结果的有效性。  相似文献   
275.
    
This article presents new tools and methods for finding optimum step‐stress accelerated life test plans. First, we present an approach to calculate the large‐sample approximate variance of the maximum likelihood estimator of a quantile of the failure time distribution at use conditions from a step‐stress accelerated life test. The approach allows for multistep stress changes and censoring for general log‐location‐scale distributions based on a cumulative exposure model. As an application of this approach, the optimum variance is studied as a function of shape parameter for both Weibull and lognormal distributions. Graphical comparisons among test plans using step‐up, step‐down, and constant‐stress patterns are also presented. The results show that depending on the values of the model parameters and quantile of interest, each of the three test plans can be preferable in terms of optimum variance. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
276.
运用多目标决策分析原理,依据选择防御要点的基本要求,从\"地位重要、地形有利、地幅适当\"的角度分析了防御要点的影响因素集,运用灰色理论建立了防御要点灰色关联优选模型,达到了对防御要点进行排序和优选的目的,为指挥员实施防御作战的科学决策提供辅助依据。  相似文献   
277.
由于粒子滤波的算法原理,其计算量很大。研究了针对机动目标的交互式多模型粒子滤波器(IMMPF)算法和多速率交互式多模型(MRIMM)算法,提出了多速率交互式多模型粒子滤波器(MRIMMPF)算法。该算法是在交互式多模型粒子滤波器(IMMPF)的基础上引入多速率技术,期望在保持IMMPF的性能同时能够减少因为粒子滤波带来的计算量;最后通过和一般基于EKF的IMM算法、IMMPF算法的比较,验证了该算法的有效性。  相似文献   
278.
    
The current approach to countering the threat of improvised explosive devices (IEDs) in Afghanistan has met with limited success. The relative lack of success may be in part because the current approach is not holistic and discounts the social systems that foster the IEDs. Insurgents are using IEDs as a tool to further their strategic aims, but the coalition and to a lesser extent the Government of the Islamic Republic of Afghanistan (GIRoA) are attacking the IEDs as if they are an end in and of themselves. Combining network disruption with information change maximizes the opportunities for mitigating the IED threat. More specifically, to mitigate the IED threat requires disrupting the social and economic systems associated with IEDs, and at the same time providing alternative economic opportunities and improving rule of law and governance at the local level. In other words, counter-IED (C-IED) must be Counter-Insurgency (COIN) centric to be successful. This paper reviews the current state of C-IED efforts, identifies five main problems with the current approach, and suggests changes to reduce or mitigate the IED threat in Afghanistan.  相似文献   
279.
ABSTRACT

When on the wrong end of an asymmetry in the projection of hard power, weaker sides countenance the grim arithmetic of avoiding direct and massed confrontations. Invariably, insurgents have over the ages tended to employ indirect tactical methods to render their stronger opponents ineffective. Ultimately – interest asymmetry, regime type, asymmetries of strategy, and external intervention – combine in a complex interplay and pattern, to militate against a strong side. In Sudan, these factors interacted throughout the civil wars to produce regional autonomy and finally an independent South Sudan in 2011. Similar strategic logic had confronted many large African states battling insurgencies in Ethiopia, Angola, Nigeria, Zaire, and apartheid-era South Africa. Oftentimes, weakening public resolve has caused these governments to accommodate, capitulate or withdraw even if they try not to blink. Notwithstanding the regime type, it can be concluded that the majority of strong actors are prone to fail in a protracted, asymmetric conflict. Hence, the notion of linking victory in counterinsurgency to the degree of openness (democratic polyarchies); or closeness (totalitarianism) – is still valid but highly contestable in the case of Africa’s large dysfunctional states.  相似文献   
280.
    
This paper analyses the impact of terrorist activity on international tourist flows. To this end, we have estimated a cross‐sectional gravity equation for tourism from the G‐7 countries to a sample of 134 destinations over the period 2001–2003. Within this framework, we evaluate the deviation from ‘normal’ tourist flows due to terrorist activity, which is considered as negative advertising for the affected country. The analysis suggests that both domestic victims and international attacks are relevant factors when foreign tourists make their choice. This result is robust under alternative specifications. Moreover, the impact of terrorism is more severe in developing countries.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号