首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   5490篇
  免费   1025篇
  国内免费   437篇
  2024年   12篇
  2023年   26篇
  2022年   61篇
  2021年   82篇
  2020年   88篇
  2019年   119篇
  2018年   124篇
  2017年   251篇
  2016年   259篇
  2015年   166篇
  2014年   459篇
  2013年   500篇
  2012年   404篇
  2011年   470篇
  2010年   365篇
  2009年   444篇
  2008年   346篇
  2007年   372篇
  2006年   349篇
  2005年   333篇
  2004年   305篇
  2003年   241篇
  2002年   194篇
  2001年   183篇
  2000年   109篇
  1999年   103篇
  1998年   85篇
  1997年   78篇
  1996年   70篇
  1995年   61篇
  1994年   66篇
  1993年   51篇
  1992年   51篇
  1991年   47篇
  1990年   37篇
  1989年   21篇
  1988年   14篇
  1987年   5篇
  1975年   1篇
排序方式: 共有6952条查询结果,搜索用时 15 毫秒
291.
There has been near-universal condemnation of the use of chemical weapons in the Syrian conflict. The international community has nevertheless struggled to make progress on holding the perpetrators to account. This article reviews developments at the international level in terms of Syrian chemical weapon justice between 2011 and 2017. It argues that there have been substantive disagreements between states on the rationale and means of justice in the Syrian case. It also argues that international initiatives have been tightly intertwined with developments in chemical disarmament and conflict resolution processes as well as the broader war. The article describes progress and challenges to chemical weapon justice in a number of distinct formal international mechanisms during the period studied. The analysis concludes by contextualizing international responses—including the U.S. tomahawk strikes against a Syrian airbase—to the Khan Shaykhun chemical attacks of April 2017.  相似文献   
292.
Some U.S. military leaders have asserted that the United States, Japan, Australia, and India and the Republic of Korea are developing multilateral defense cooperation to deter aggression and uphold norms much like North Atlantic Treaty Organization (NATO) has in Europe. Frequent military exercises and China’s threats to freedom of navigation (FoN) and North Korea’s nuclear missiles comprise the motive force for such cooperation. However, cooperation thus far has been trilateral and minimal, given divergent national interests and dispersed geopolitical locations. Cooperation among Japan, Republic of Korea (ROK), and the United States is increasing given the threat, but ROK’s public opinion is divided about Japan. Australia, Japan, and India have increased cooperation with the United States but are reluctant to conduct FoN operations with the United States to challenge China’s expansionism in the South China Sea. If China becomes more aggressive and blocks FoN or seizes territory, development toward an Asian NATO is possible.  相似文献   
293.
ABSTRACT

This article explores the interaction between local and international power structures in EU peacebuilding. While citizens in a state only face order from one authority (the state), local actors in a peacebuilding context are subject to orders from two institutions (the domestic state and the peacebuilding mission). This article explores the nature of interactions of these two institutions and their effect on local police officers’ compliance and resistance. Specifically, it analyzes the example of the police restructuring process in Bosnia and Herzegovina. It demonstrates that the choices of local officers to comply or resist depended on whether the interactions between the EU Police Mission and the local police organization were positive and mutually supportive, or whether they were competitive and contradictory. The findings of the article contribute to the debates on the role of local power and the importance of local legitimacy in peacebuilding.  相似文献   
294.
Abstract

Insomnia is prevalent among Veterans with post-traumatic stress disorder (PTSD), it exacerbates PTSD symptoms, and it contributes to impaired functioning and quality of life. To improve treatment outcomes, it is important to identify risk factors for insomnia and sedative-hypnotic use. Classification and regression trees and logistic regression models were used to identify variables associated with insomnia or sedative-hypnotic use. Key findings include low insomnia diagnosis rates (3.5–5.6%) and high rates of sedative-hypnotics (44.2–49.0%). Younger Veterans and those without a breathing-related sleep disorder (BRSD) were more likely to receive an insomnia diagnosis. Veterans with greater service connection and those with an alcohol/substance use disorder were more likely to be prescribed sedative-hypnotics. Interaction terms may have identified potential groups at risk of being under-diagnosed with insomnia (i.e. non-black Veterans with psychiatric co-morbidity, black Veterans without psychiatric co-morbidity) as well as groups at risk for sedative-hypnotic use (i.e. younger Veterans without BRSD). In sum, Veterans with PTSD have high rates of sedative-hypnotic use despite minimal evidence they are effective. This is counter to recommendations indicating behavioral interventions are the first-line treatment. Policy changes are needed to reduce use of sedative-hypnotics and increase access to behavioral insomnia interventions.  相似文献   
295.
This article surveys the body of available evidence regarding the spill-over effects of defence R&D. It reviews the routes through which defence R&D spills over to the economy with positive externalities – in terms of new products, technologies or processes; the barriers that impede or block such a process; potential negative repercussions, and the measure of such effects. The main conclusion is that the uncertainty of these effects, and the inaccurate appraisal of their value, hardly supports informed decisions concerning defence R&D policies.  相似文献   
296.
针对机载航电系统自身辐射源特性,提出一种不依赖敌方探测设备的机载航电系统射频隐身性能评估方法。分析机载航电系统设备在极化域、波形域、能量域中影响射频隐身性能的因素,构建极化域、能量域、波形域射频隐身指标,打破常规的"辐射-接收"模型的隐身性能评估方法,建立基于机载航电系统自身辐射信号工作状态和工作参数的射频隐身定量评估方法。对机载雷达系统进行仿真评估,结果表明,该评估方法能正确反映机载雷达系统的射频隐身性能。  相似文献   
297.
可展开遮阳罩一般是由多层轻质柔性高精度无褶皱薄膜和展开支撑臂及其控制装置组成,在轨后展开支撑臂有序展开多层大面积薄膜实现光控制和热控制性能,能有效改善和防护空间航天器。针对可展开遮阳罩结构,依据一维轴向、二维平面与三维周向的展开方式分类总结国内外可展开遮阳罩技术的研究进展,并对不同遮阳罩结构形状、薄膜材料、层数与展开方式等进行对比分析;梳理出遮阳罩在杂光抑制、折叠与展开变形机理、极端环境下薄膜多场耦合、低温热控、太阳辐射光压力矩及其计算方法等方面的关键科学问题,并给出了中国研究遮阳罩的发展建议。  相似文献   
298.
Abstract

Libya in 2011 witnessed a real process of political change, though different from all the policy-oriented jargon equating transition with a teleological transition to democracy. Due to the resilience of the Qadhafi regime in power and with the essential role of NATO intervention, the process was eased out by a eight-month civil war. Governance in post-Qadhafi Libya was not done through the rebuilding of centralized authorities. But it took the specific form of the emergence of multiple non-state actors embedded in local dynamics and then connected with weakened central authorities that had access to the huge Libyan resources. That raised complex questions about the quality of this mode of governance, especially at a time of pressing problems for Libya and its neighbors, whether direct ones (Tunisia, Egypt, Mali) or farther countries across the Mediterranean sea: terrorism with the expansion of Da’esh into the country and flows of refugees crossing Libya’s uncontrolled borders and flowing into Italy and then Europe by thousands.  相似文献   
299.
Since the fall of the Taliban in late 2001, the Islamic Republic of Afghanistan (GIRoA), the United States, the United Nations, and the International Security Assistance Force (ISAF) have funded and led three different Disarmament, Demobilization, and Reintegration (DDR) programs. Despite a significant investment in time and treasure, all of them have failed to significantly reduce the number of insurgents or arbaki (militia). This article explores why these programs failed despite incorporating ideas from the prominent DDR schools of thought. Utilizing Stathis Kalyvas’ theory of The Logic of Violence in Civil War as a lens, this article argues that GIRoA and ISAF did not have sufficient control of territory to entice insurgents or arbaki to reconcile and/or reintegrate with the government. Further, in areas GIRoA nominally controlled in northern and western Afghanistan, regional powerbrokers who controlled these areas balked at these programs.  相似文献   
300.
Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号