首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   1503篇
  免费   454篇
  国内免费   211篇
  2024年   4篇
  2023年   18篇
  2022年   18篇
  2021年   36篇
  2020年   40篇
  2019年   39篇
  2018年   25篇
  2017年   69篇
  2016年   105篇
  2015年   60篇
  2014年   126篇
  2013年   127篇
  2012年   136篇
  2011年   103篇
  2010年   101篇
  2009年   140篇
  2008年   93篇
  2007年   116篇
  2006年   145篇
  2005年   121篇
  2004年   96篇
  2003年   76篇
  2002年   59篇
  2001年   57篇
  2000年   34篇
  1999年   43篇
  1998年   35篇
  1997年   30篇
  1996年   20篇
  1995年   16篇
  1994年   13篇
  1993年   13篇
  1992年   14篇
  1991年   13篇
  1990年   20篇
  1989年   6篇
  1987年   1篇
排序方式: 共有2168条查询结果,搜索用时 15 毫秒
331.
差分跳频是一种新的扩展频谱通信技术.在介绍差分跳频基本原理的基础上,将差分跳频的频率跳变过程建模成齐次马尔可夫链.分析了G函数的功能,重点讨论了差分跳频码性能的检验方法,包括不可约性、频隙滞留、均匀性和随机性检验,其中频隙滞留是首次提出应用于差分跳频码性能的检验.这些检验方法对于差分跳频G函数的设计具有一定的指导意义.  相似文献   
332.
一种基于变权的军事决策模型   总被引:1,自引:0,他引:1  
根据军队信息化建设所需全面型和专长型军事人才的特点,需要采取一定的方法选拔不同岗位所需的人才.该文试图利用变权理论,采取惩罚型状态变权向量和激励型状态变权向量,完成因素之间权重的转移,进而实现因素之间的均衡或突出某些因素的作用,由此建立了一个不同岗位需求的军事人才选优的综合决策模型.  相似文献   
333.
设计安全策略模型时应考虑安全策略的时序特性和灰色特性,还应综合考虑保密性、完整性和可用性三方面的需求。已有的安全模型没有描述时序性和灰色特性,而且一般只侧重描述保密性或完整性。为此,本文提出了动态灰色时序系统(简称DGTS)。本文详细描述了DGTS,以及基于DGTS的动态语义设计的灰色时序安全策略规范语言GTSL。  相似文献   
334.
This paper analyses the impact of terrorist activity on international tourist flows. To this end, we have estimated a cross‐sectional gravity equation for tourism from the G‐7 countries to a sample of 134 destinations over the period 2001–2003. Within this framework, we evaluate the deviation from ‘normal’ tourist flows due to terrorist activity, which is considered as negative advertising for the affected country. The analysis suggests that both domestic victims and international attacks are relevant factors when foreign tourists make their choice. This result is robust under alternative specifications. Moreover, the impact of terrorism is more severe in developing countries.  相似文献   
335.
Previous research has shown that the duration of a civil war is in part a function of how it ends: in government victory, rebel victory, or negotiated settlement. We present a model of how protagonists in a civil war choose to stop fighting. Hypotheses derived from this theory relate the duration of a civil war to its outcome as well as characteristics of the civil war and the civil war nation. Findings from a competing risk model reveal that the effects of predictors on duration vary according to whether the conflict ended in government victory, rebel victory, or negotiated settlement.  相似文献   
336.
Industrial supply chains have emerged as the focus of much economic and business research over the previous decade and defence is no exception. This paper reviews contributions made to the body of knowledge in this field with particular attention given to primary research undertaken on the UK defence industrial supply system. In doing so, the author assesses the quantity and quality of knowledge available to researchers, analysts and policy makers. There have been a number of valuable contributions to the literature and this paper reveals a subject that is extremely complicated, dynamic and yet under‐researched. It is suggested that it may well be this complexity and dynamism, coupled with difficulty in accessing data, that has inhibited research development in this field. Defence industry supply systems are repeatedly referred to as ‘chains’; however, primary research consistently suggests this is a misnomer – the author concludes that future analysis of the UK defence sector must embrace directly the economics of networks if understanding of the same is to progress and industrial ‘invisibility’ is to be avoided.  相似文献   
337.
Probing the technology in the production of US national defence by using a dynamic cost‐function model with adjustment costs, this paper evaluates the effect of reducing the level of national defence on the defence budget saving. Our inquiry involves estimating the defence production structure without output data for non‐market goods that are normally unavailable. Our findings include: (i) the United States behaves rationally to minimize cost in the production of national defence; (ii) the adjustment costs are larger in disarmament than in military build‐up; (iii) due to the adjustment costs peculiar to disarmament, the defence budget saving from disarmament appears small, but cutbacks allow great savings on the defence budget.  相似文献   
338.
Abstract

This study estimates a three-sector Feder–Ram model using US annual data for 1965–2014 to confirm the externality of defense expenditure in the United States. Although the model is often used in the literature to scrutinize whether this effect exists, a flaw intrinsic to this model is the appearance of multicollinearity. In this study, I introduced novel techniques, namely: the standardization and estimation of a simple slope, to estimate the model. The results are as follows. First, I prove that the multicollinearity problem can be resolved by standardization. Second, externality, which is judged to conventionally exist, is not found. Third, increases in defense expenditure bring about positive but limited economic growth when the ratio of private to defense expenditure in the previous year ranges from 5.09 to 6.82%. By re-estimating the model, this study contributes to developing the Feder–Ram model within the related literature.  相似文献   
339.
I develop a dynamic model of social conflict whereby manifest grievances of the poor generate the incentive of taking over political power violently. Rebellion can be an equilibrium outcome depending on the level of preexisting inequality between the poor and the ruling elite, the relative military capabilities of the two groups and the destructiveness of conflict. Once a technology of repression is introduced, widespread fear reduces the parameter space for which rebellion is an equilibrium outcome. However, I show that repression-driven peace comes at a cost as it produces a welfare loss to society.  相似文献   
340.
概念模型验证是保证和提高仿真可信性的重要手段,是建模与仿真VV&A中的重点和难点.首先将概念模型的验证方法划分为非形式化方法、静态方法、动态方法和形式化方法4类,并提出了一种基于本体推理的概念模型验证方法,然后对各种方法的基本思想、基本原理、基本过程、适用对象、优缺点进行全面的分析总结,明确了各种方法的优缺点和适用范围,为如何选用各种验证方法提供参考,也明确了下一步应重点研究的问题.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号