排序方式: 共有228条查询结果,搜索用时 31 毫秒
221.
正确运用刑事证据,是司法实践的重要内容,明确运用刑事证据的指导思想,掌握运用刑事证据的具体原则和步骤,才能把握法定证据和常见刑事案件的证据特点,才能在司法实践中充分认识并发挥证据在认定案件事实中的重要作用。 相似文献
222.
基于改进的 D-S 证据理论在设备故障诊断中的应用 总被引:1,自引:1,他引:0
多传感器、多手段检测的信息融合技术在设备检测中的应用日益广泛,而常用的基于D-S证据理论的融合技术除了没有给出可信度的分配方法外,融合结果上还有很多不足之处。探讨了可信度的分配问题,提出了几种改进的融合方法,较好地解决了证据冲突时的否定性、积化性和敏感性问题。 相似文献
223.
证据理论与模糊神经网络相结合的身份估计方法 总被引:7,自引:0,他引:7
重点研究了在数据融合身份估计领域中D-S证据理论与模糊神经网络相结合的多传感器数据融合方法。Demp-ster-Shafer证据理论方法是对Beyes决策检验法的推广,证据理论比概率论满足更弱的公理系统,并且在区分不确定与不知道等方面显示了很大的灵活性,但是在基于证据理论的身份估计融合中,基本可信度的分配是一个与应用密切相关的问题,也是实际应用中最难的一步。利用模糊神经网络来处理证据理论中的基本可信度分配问题,并对几种空中目标进行了身份估计数据融合,经计算机仿真实验证实了该方法的有效性。 相似文献
224.
介绍裂解气相色谱技术的原理和装置 ,并在试验研究的基础上 ,对高分辨裂解色谱技术在火灾物证鉴定中的具体应用加以阐述。 相似文献
225.
Sonja Theron 《African Security Review》2020,29(1):58-81
ABSTRACT Following South Sudan's secession in 2011, the country faced significant political, social and economic challenges. The country emerged from a long andarduous nation-building journey, including almost 50 years of violent conflict, that would continue after declaring independence. This nation-building process would suffer a significant set-back in December 2013 when the most recent civil war broke out. This article provides a new perspective on South Sudan's nation-building trajectory that tends towards violence and complicates peace-building. It does so by utilising the leadership process approach from the Leadership Studies literature. While popular literature and commentary tends to fault the South Sudanese elite for the current crisis, there has not been a systematic effort to understand the leadership challenge and its role in conflict, peace and nation-building in South Sudan. In this article, South Sudan's nation-building process and its three primary components of (a) identity construction, (b) statehood and (c) collective will and responsibility, are analysed from a leadership perspective, focusing on issues of power and influence. The conclusion is reached that South Sudan's nation-building has been and will likely continue to trend towards a violent process due to a leadership process that lacks mutuality and is founded on insufficient sources of power. 相似文献
226.
Emeka Thaddues Njoku 《Small Wars & Insurgencies》2019,30(6-7):1233-1263
ABSTRACTThere is a dearth of studies on indirect victims of sexual violence in counter-terrorism efforts. Using Nigeria as a case study, this paper argues that global and state-level counter-terrorism policies have generally failed to account for the psychological effects of the engagement of female NGO workers in counter-terrorism operations or mitigating the effects of terrorism in conflict zones. Specifically, there has been an increase in sexual violence perpetrated by some members of the security agencies involved in counter-terrorism operations in North-eastern Nigeria. As a result, female NGO workers carry out Medicare, psychosocial counselling and advocacy for these victims. Female NGO workers become exposed to the trauma of victims of sexual violence, which affects their mental health and thus performances in counter-terrorism activities in the country. This altered their worldview on issues of safety even among secured locations or among the presence of security agents and reinforced feelings of powerlessness. 相似文献
227.
David J. Lonsdale 《Journal of Military Ethics》2020,19(1):20-39
ABSTRACT Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. The onset of this new instrument in national security has implications for conflict thresholds and military ethics. To serve as a legitimate tool of policy, cyber attack must operate in accordance with moral concerns. To test the viability of cyber attack, this paper provides a new perspective on cyber ethics. Cyber attack is tested against the criteria of the common good. This involves identifying the four core components of the common good from a conflict perspective: respect for the person; social wellbeing; peace and security; and solidarity. The fate of these components is assessed in relation to the six key characteristics of cyber attack from a moral standpoint: security; the role or absence of violence; discrimination; proportionality; cyberharm; and the threshold of conflict. It is concluded that the common good must be incorporated into developing state cyber strategies. 相似文献
228.
Alexis Henshaw June Eric-Udorie Hannah Godefa Kathryn Howley Cat Jeon Elise Sweezy 《Small Wars & Insurgencies》2019,30(6-7):1089-1116
ABSTRACTRecent efforts aimed at understanding women’s contributions to nonstate armed groups have produced large-scale data sets on female combatants (Wood and Thomas 2017) and more limited data on women’s roles as supporters and leaders in armed groups (Henshaw 2016; 2017, Loken 2018). The present study aims to build on this literature by providing new data on the scope of women’s leadership in insurgent groups. While existing quantitative literature has focused mostly on the experience of female combatants, we argue that the presence of women in leadership roles is crucial to understanding how gender might influence the outcomes of insurgency. We introduce new data on over 200 insurgent groups active since World War II. While our analysis confirms earlier small-sample work demonstrating women’s presence in leadership roles, a qualitative analysis reveals that leadership is often gendered–revealing patterns of tokenization and tracking women to low-prestige leadership roles. At the same time, our findings challenge past research on jihadist organizations, showing limited expansion in the authority of women. 相似文献