首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   51篇
  免费   9篇
  国内免费   2篇
  2023年   1篇
  2019年   1篇
  2018年   3篇
  2017年   3篇
  2016年   4篇
  2015年   1篇
  2014年   7篇
  2013年   15篇
  2012年   4篇
  2011年   5篇
  2010年   2篇
  2009年   2篇
  2008年   1篇
  2007年   2篇
  2006年   2篇
  2005年   3篇
  2004年   2篇
  2003年   2篇
  2001年   1篇
  1993年   1篇
排序方式: 共有62条查询结果,搜索用时 31 毫秒
41.
十八大报告提出了推进公民道德建设工程的重大任务,而亲社会行为的培养正是公民道德建设工程的重要目标。道德认同是激发亲社会行为的重要动机,增进道德认同是培养社会成员亲社会行为的根本途径,因而亟须在道德认同视角下深入探讨亲社会行为的培养机制。当前社会背景下,完善亲社会行为的社会规则认同机制、社会归属认同机制、社会责任认同机制、社会支持暖化机制、社会回报强化机制和社会实践固化机制是针对现存突出问题应做出的理性选择。  相似文献   
42.
The September 11 global crisis prompted by the attacks on the World Trade Center and the Pentagon raises major questions concerning the nature and trajectory of terrorism in the post-Cold War global order. Hitherto, terrorism has been largely debated by analysts at the level of nation states. Terrorist and insurgent movements have also been largely anchored in nationalist and ethnic power bases even when they have sought to mobilise a transnational ideological appeal on religious or class grounds. There have been a few exceptions to this pattern such as the alliance between the German Baader-Meinhof group and the Japanese Red Army Faction, but even such international alliances as this did not, until at least the 1980s, presage anything like a global terrorist network necessitating a global strategic response. This study examines terrorism and global strategic responses.  相似文献   
43.
In conflict studies, identity has been posited as an explanatory factor of the resilience of insurgencies. This article focuses on the identity formation of the National Liberation Army (ELN), a leftist insurgency group in Colombia. As a Marxist–Leninist organisation, the ELN aims to overcome capitalism. In their perception, this is possible via the transformation of the individual into a ‘collective personality’. Along the dimensions of ‘content’ and ‘contestation’, we will demonstrate the mechanisms they impose for such identity formation. Identity, as we will argue, is a main factor in explaining why people participate in this insurgency and thereby enhance its resilience.  相似文献   
44.
接入认证是网络安全防护中的第一道屏障,是实施访问控制的基础.通信安全几乎总是开始于身份认证的握手过程,因此,认证机制对于保证整个网络系统的安全性具有十分重要的意义.在深入研究现有的网络接入认证架构基础之上,提出了一种新的通用的网络接入认证模型并详细说明了认证流程,其中,不仅要求用户使用数字证书进行入网认证,更重要的是在其使用网络资源期间,将对其进行持续的刷新认证及网络行为的信任评价,以此确保用户身份的持久可信性并预防潜在的网络攻击.  相似文献   
45.
This paper explores the impact of moving to accrual budgeting on resources allocation in defence. Standard defence budgeting and investment models are used to assess the theoretical implications of accrual budgeting. In addition, a number of simulations are conducted to assess the long-term implications of moving to accrual accounting and budgeting. The result of the simulations shows that changes to deployed operations and other operational shocks will have manageable impacts on readiness but systematic shocks associated with defence unit prices, procurement policies and defence specific inflation will put considerable strain on the defence department's flexibility.  相似文献   
46.
Policy makers and scholars have drawn improper lessons from the Ukrainian case of disarmament. Employing a content analysis of Ukrainian and Russian news sources, as well as a series of interviews with Ukrainian officials conducted by the author, this paper argues that Ukraine did not surrender its nuclear arsenal because it received compensation or faced financial and technical hurdles in securing effective command and control over the weapons. Instead, Ukraine surrendered its nuclear weapons due to a lack of demand for them. The historical interactions between Ukrainians and Russians led the majority of Ukrainian leaders to reject a conception of the Ukrainian national identity that cognitively perceived Russia as a security threat. Only with a proper understanding of this case study can the international community understand how the nonproliferation norm succeeded.  相似文献   
47.
It is rare to find a well-formulated study that describes the behavioral aspects of leadership in the political realm. Even more infrequent is a combined study of individual behaviors as it applies to a large techno-political issue such as nuclear proliferation. India, Argentina, Australia, and France are used as cases for application of a national identity conception model. The model is based on two dimensions, solidarity and status, that when combined, result in a leader's identification with other nations’ abilities to be a player in the nuclear arms community. While the work is behavioral in context, there is no effort to avoid the technological side of proliferation, so as to provide a balanced review of a complex issue.  相似文献   
48.
梁晓波  武啸剑  曾广 《国防科技》2018,39(3):017-026
话语体系是当今人文社会科学研究的热词,也已成为影响国家安全的一个重要因子。论文首先介绍话语体系的概念及其特点,报告了话语体系研究的缘起和发展脉络、主要学科与核心关键词以及主要相关文献,并对当前研究现状进行总结。分析了话语体系与国家的关系,并从国家的主体思想、发展道路、身份特质、文化自信、文明追求、话语权等方面阐述了话语体系对国家安全的重要性。论文指出,话语体系是影响国家安全的重要领域,也是国家之间博弈的重要阵地。  相似文献   
49.
Security strategies are important sites for narrating the EU into existence as a security actor. The unveiling of a new global strategy on foreign and security policy for the EU immediately post-Brexit could be conceived as a pledge to remain together as a Union for the purposes of contributing to global security in a particular way. This paper offers a brief stock-taking of the EU’s way of writing security from the European Security Strategy (2003) to the EU Global Strategy (2016). A concise exegesis of these documents exposes an interesting dynamic: as exercises in ordering the world, both strategic guidelines have turned out to be major exercises in ordering the self. The comparative snapshot shows the EU as increasingly anxious to prove its relevance for its own citizens, yet notably less confident about its actual convincingness as an ontological security framework for the EU’s constituent members over time.  相似文献   
50.
证据理论与模糊神经网络相结合的身份估计方法   总被引:7,自引:0,他引:7  
重点研究了在数据融合身份估计领域中D-S证据理论与模糊神经网络相结合的多传感器数据融合方法。Demp-ster-Shafer证据理论方法是对Beyes决策检验法的推广,证据理论比概率论满足更弱的公理系统,并且在区分不确定与不知道等方面显示了很大的灵活性,但是在基于证据理论的身份估计融合中,基本可信度的分配是一个与应用密切相关的问题,也是实际应用中最难的一步。利用模糊神经网络来处理证据理论中的基本可信度分配问题,并对几种空中目标进行了身份估计数据融合,经计算机仿真实验证实了该方法的有效性。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号