首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   654篇
  免费   115篇
  国内免费   44篇
  813篇
  2024年   1篇
  2023年   3篇
  2022年   9篇
  2021年   17篇
  2020年   15篇
  2019年   17篇
  2018年   12篇
  2017年   30篇
  2016年   32篇
  2015年   24篇
  2014年   45篇
  2013年   58篇
  2012年   51篇
  2011年   55篇
  2010年   36篇
  2009年   61篇
  2008年   29篇
  2007年   40篇
  2006年   56篇
  2005年   41篇
  2004年   32篇
  2003年   28篇
  2002年   14篇
  2001年   19篇
  2000年   18篇
  1999年   11篇
  1998年   6篇
  1997年   4篇
  1996年   9篇
  1995年   9篇
  1994年   3篇
  1993年   5篇
  1992年   3篇
  1991年   9篇
  1990年   9篇
  1989年   2篇
排序方式: 共有813条查询结果,搜索用时 15 毫秒
81.
82.
The current approach to countering the threat of improvised explosive devices (IEDs) in Afghanistan has met with limited success. The relative lack of success may be in part because the current approach is not holistic and discounts the social systems that foster the IEDs. Insurgents are using IEDs as a tool to further their strategic aims, but the coalition and to a lesser extent the Government of the Islamic Republic of Afghanistan (GIRoA) are attacking the IEDs as if they are an end in and of themselves. Combining network disruption with information change maximizes the opportunities for mitigating the IED threat. More specifically, to mitigate the IED threat requires disrupting the social and economic systems associated with IEDs, and at the same time providing alternative economic opportunities and improving rule of law and governance at the local level. In other words, counter-IED (C-IED) must be Counter-Insurgency (COIN) centric to be successful. This paper reviews the current state of C-IED efforts, identifies five main problems with the current approach, and suggests changes to reduce or mitigate the IED threat in Afghanistan.  相似文献   
83.
The Congolese security sector reform – disarmament demobilisation and reintegration (SSR-DDR) process has suffered from setbacks in its military sector during the last 10 years, such as insufficient funding, lack of coordination and domestic reluctance to major changes, with as a result, a very fragile and disjointed Army. These problems have deepened as officers have defected from the Army and caused new instability in the East of the Congo. This article aims to analyse the recent mutinies and the reaction by the Congolese government by applying a capabilities-based approach in combination with a typology of spoilers. The objective is to identify and classify the spoilers and answer the questions of why they emerge now and how they are dealt with on a national level. From the analysis, the author suggests that there are several spoilers involved in the current situation – the most powerful being the Congolese and the Rwandan governments, prompting the question of whether an international involvement is necessary to solve the problem.  相似文献   
84.
为解决小子样条件下进行产品固有可用度试验验证的问题,基于Bayes理论,提出了一种固有可用度定时截尾试验方案.该试验方案在假设故障间隔时间和修复时间均服从指数分布的前提下,将现场试验分为同时进行的可靠性和维修性定时截尾试验2个部分,要求在利用验前试验信息的基础上,使本次试验获得的验后分布还可以作为下一次现场试验的验前分布,提高了试验数据的利用率,具有较好的经济效益.  相似文献   
85.
The July 2005 terrorist attacks in London demonstrated the resilience of Western society in the face of low-level conventional terrorism. But the psychological damage from the London bombings would likely pale next to the severe, unpredictable, long-lasting effects of a radiological attack. One unique hazard of radiation exposure beyond the obvious physiological effects is that it is colorless, odorless, and tasteless, making it difficult for ordinary citizens to evaluate, quantify, and rationally understand the dangers confronting them. Radiological weapons stand out among the tools available to terrorists for their capacity to inflict far-reaching psychological damage to civilian populaces well beyond the immediate victims. A possible solution to mitigate the psychological consequences is to build a “resilience culture,” an interlocking set of beliefs, attitudes, approaches, and behaviors that help people fare better in any disaster or extraordinary circumstance. The “all-hazards approach,” which emphasizes the identifiable similarities among the “disaster triad”—that is, natural, accidentally man-made, and intentionally man-made disasters—extends to acts of terrorism and could help demystify the fears associated with radiological terrorist weapons.  相似文献   
86.
Kovenock and Roberson's [2011] comment provides initial work which has the potential, when suitably extended, to advance the research frontier. Kovenock and Roberson's paper consists of three sections. The first section is an interesting introduction. The second section, titled ‘Model and Main Result,’ provides no contribution beyond Hausken [2008a]. It consists of Equations (1)–(10) which are equivalent to equations developed by Hausken, and Equation (11) which is equivalent to the utility requirements u???0 and U???0 provided after Equation (17) in Hausken. The third section provides interesting ideas about mixed-strategy equilibria that can be extended in future research.  相似文献   
87.
人本主义教育思想的德育解读与借鉴   总被引:1,自引:0,他引:1  
人本主义教育思想在教育理念、教育目标、教育过程、教育方法、教育评价等方面均对德育具有借鉴意义。德育的目标指向:培育受教育者的完美人性;实施途径:强调受教育者的直接经验;德育模式:凸显受教育者的主体地位。  相似文献   
88.
在任职教育中开发学员任职经验的探讨   总被引:1,自引:0,他引:1  
任职教育是在受训学员有着一定的任职经验基础上,提高岗位任职能力的一种短期培训。在教学实施过程中,必须注重挖掘任职经验,交流任职经验,再把经验上升为理论从而去指导部队实践。这种任职经验的开发,有利于在教学过程中按需施教,扩大师生的视野,丰富教学资源,实现理论与实践的统一,有效达成任职教育的目标。  相似文献   
89.
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009  相似文献   
90.
加强公安现役部队文化建设,必须把握文化建设的方向,坚持社会主义核心价值体系,坚持抵制腐朽文化的影响和继承与创新的统一;必须抓住文化建设的关键环节,坚持以人为本,注重结合部队职能任务,建设学习型警营;必须筑牢文化建设的基础支撑,注重队伍建设,加大基础设施建设和制度建设。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号