首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   208篇
  免费   9篇
  国内免费   11篇
  2022年   1篇
  2021年   1篇
  2020年   3篇
  2019年   9篇
  2018年   11篇
  2017年   11篇
  2016年   18篇
  2015年   9篇
  2014年   16篇
  2013年   59篇
  2012年   11篇
  2011年   12篇
  2010年   8篇
  2009年   10篇
  2008年   4篇
  2007年   7篇
  2006年   12篇
  2005年   4篇
  2004年   9篇
  2003年   3篇
  2002年   3篇
  2001年   3篇
  2000年   1篇
  1997年   1篇
  1996年   1篇
  1993年   1篇
排序方式: 共有228条查询结果,搜索用时 31 毫秒
221.
正确运用刑事证据,是司法实践的重要内容,明确运用刑事证据的指导思想,掌握运用刑事证据的具体原则和步骤,才能把握法定证据和常见刑事案件的证据特点,才能在司法实践中充分认识并发挥证据在认定案件事实中的重要作用。  相似文献   
222.
基于改进的 D-S 证据理论在设备故障诊断中的应用   总被引:1,自引:1,他引:0  
多传感器、多手段检测的信息融合技术在设备检测中的应用日益广泛,而常用的基于D-S证据理论的融合技术除了没有给出可信度的分配方法外,融合结果上还有很多不足之处。探讨了可信度的分配问题,提出了几种改进的融合方法,较好地解决了证据冲突时的否定性、积化性和敏感性问题。  相似文献   
223.
证据理论与模糊神经网络相结合的身份估计方法   总被引:7,自引:0,他引:7  
重点研究了在数据融合身份估计领域中D-S证据理论与模糊神经网络相结合的多传感器数据融合方法。Demp-ster-Shafer证据理论方法是对Beyes决策检验法的推广,证据理论比概率论满足更弱的公理系统,并且在区分不确定与不知道等方面显示了很大的灵活性,但是在基于证据理论的身份估计融合中,基本可信度的分配是一个与应用密切相关的问题,也是实际应用中最难的一步。利用模糊神经网络来处理证据理论中的基本可信度分配问题,并对几种空中目标进行了身份估计数据融合,经计算机仿真实验证实了该方法的有效性。  相似文献   
224.
介绍裂解气相色谱技术的原理和装置 ,并在试验研究的基础上 ,对高分辨裂解色谱技术在火灾物证鉴定中的具体应用加以阐述。  相似文献   
225.
ABSTRACT

Following South Sudan's secession in 2011, the country faced significant political, social and economic challenges. The country emerged from a long andarduous nation-building journey, including almost 50 years of violent conflict, that would continue after declaring independence. This nation-building process would suffer a significant set-back in December 2013 when the most recent civil war broke out. This article provides a new perspective on South Sudan's nation-building trajectory that tends towards violence and complicates peace-building. It does so by utilising the leadership process approach from the Leadership Studies literature. While popular literature and commentary tends to fault the South Sudanese elite for the current crisis, there has not been a systematic effort to understand the leadership challenge and its role in conflict, peace and nation-building in South Sudan. In this article, South Sudan's nation-building process and its three primary components of (a) identity construction, (b) statehood and (c) collective will and responsibility, are analysed from a leadership perspective, focusing on issues of power and influence. The conclusion is reached that South Sudan's nation-building has been and will likely continue to trend towards a violent process due to a leadership process that lacks mutuality and is founded on insufficient sources of power.  相似文献   
226.
ABSTRACT

There is a dearth of studies on indirect victims of sexual violence in counter-terrorism efforts. Using Nigeria as a case study, this paper argues that global and state-level counter-terrorism policies have generally failed to account for the psychological effects of the engagement of female NGO workers in counter-terrorism operations or mitigating the effects of terrorism in conflict zones. Specifically, there has been an increase in sexual violence perpetrated by some members of the security agencies involved in counter-terrorism operations in North-eastern Nigeria. As a result, female NGO workers carry out Medicare, psychosocial counselling and advocacy for these victims. Female NGO workers become exposed to the trauma of victims of sexual violence, which affects their mental health and thus performances in counter-terrorism activities in the country. This altered their worldview on issues of safety even among secured locations or among the presence of security agents and reinforced feelings of powerlessness.  相似文献   
227.
ABSTRACT

Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. The onset of this new instrument in national security has implications for conflict thresholds and military ethics. To serve as a legitimate tool of policy, cyber attack must operate in accordance with moral concerns. To test the viability of cyber attack, this paper provides a new perspective on cyber ethics. Cyber attack is tested against the criteria of the common good. This involves identifying the four core components of the common good from a conflict perspective: respect for the person; social wellbeing; peace and security; and solidarity. The fate of these components is assessed in relation to the six key characteristics of cyber attack from a moral standpoint: security; the role or absence of violence; discrimination; proportionality; cyberharm; and the threshold of conflict. It is concluded that the common good must be incorporated into developing state cyber strategies.  相似文献   
228.
ABSTRACT

Recent efforts aimed at understanding women’s contributions to nonstate armed groups have produced large-scale data sets on female combatants (Wood and Thomas 2017) and more limited data on women’s roles as supporters and leaders in armed groups (Henshaw 2016; 2017, Loken 2018). The present study aims to build on this literature by providing new data on the scope of women’s leadership in insurgent groups. While existing quantitative literature has focused mostly on the experience of female combatants, we argue that the presence of women in leadership roles is crucial to understanding how gender might influence the outcomes of insurgency. We introduce new data on over 200 insurgent groups active since World War II. While our analysis confirms earlier small-sample work demonstrating women’s presence in leadership roles, a qualitative analysis reveals that leadership is often gendered–revealing patterns of tokenization and tracking women to low-prestige leadership roles. At the same time, our findings challenge past research on jihadist organizations, showing limited expansion in the authority of women.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号