首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   55篇
  免费   15篇
  国内免费   4篇
  2022年   1篇
  2020年   1篇
  2019年   1篇
  2018年   1篇
  2017年   5篇
  2016年   4篇
  2015年   1篇
  2014年   3篇
  2013年   4篇
  2012年   6篇
  2011年   4篇
  2010年   2篇
  2009年   7篇
  2008年   1篇
  2007年   3篇
  2006年   7篇
  2005年   4篇
  2004年   6篇
  2003年   3篇
  2002年   4篇
  2001年   1篇
  2000年   1篇
  1999年   1篇
  1996年   1篇
  1995年   1篇
  1994年   1篇
排序方式: 共有74条查询结果,搜索用时 0 毫秒
71.
Since the mid-twentieth century, the East and Southern African regions have been mired in complex and overlapping security and development challenges, including ethnopolitical conflicts, terrorist insurgencies, the proliferation of small arms and light weapons (SALWs), and overwhelming economic crisis. These challenges have had implications for human security, socio-economic development, territorial authority, sovereignty and the stability and legitimacy of political regimes in the affected states. The adequacy and relevance of the regional responses to these challenges is the subject of ongoing debate, to which this paper now adds. Among other factors, this paper identifies competition for regional dominance and institutional inadequacies as accounting for the inability of regional governance bodies to respond adequately to the challenges they face. Consequently, it recommends the expansion of the mandate of the Regional Economic Communities (RECs) beyond regional economic integration to include peacebuilding and a deepening of the institutional efforts focused on security cooperation and conflict management.  相似文献   
72.
任务分析是一个认识和了解任务本质的过程,作为作战计划拟制过程中的一个核心环节,作战任务分析的结论是否准确决定着作战计划的好与坏,并影响战争的结局。为了解决目前任务分析没有统一的标准及合适方法的问题,分析了层级任务网络(HTN)在任务分析中的不足之处,给出了OOR框架进行任务细化的方法和步骤,将其作为领域知识引入HTN规划,为任务分析提供了一个有效的方法,并设计了图元素用于表示任务树中任务之间的层级关系以及时序逻辑关系。最后以空间信息支援作战为例,验证了方法的可行性和有效性。  相似文献   
73.
Many observers anticipate “arms races” between states seeking to deploy artificial intelligence (AI) in diverse military applications, some of which raise concerns on ethical and legal grounds, or from the perspective of strategic stability or accident risk. How viable are arms control regimes for military AI? This article draws a parallel with the experience in controlling nuclear weapons, to examine the opportunities and pitfalls of efforts to prevent, channel, or contain the militarization of AI. It applies three analytical lenses to argue that (1) norm institutionalization can counter or slow proliferation; (2) organized “epistemic communities” of experts can effectively catalyze arms control; (3) many military AI applications will remain susceptible to “normal accidents,” such that assurances of “meaningful human control” are largely inadequate. I conclude that while there are key differences, understanding these lessons remains essential to those seeking to pursue or study the next chapter in global arms control.  相似文献   
74.
The paper’s main argument is that Israel’s security policy, which traditionally focused on defending its territorial integrity against regular Arab armed forces, was, by the 2010s, transformed into one that focuses on facing a variety of state- and non-state-based threats. Neo-realist explanations could neither account for the contested nature of the security debate during this period, nor the inconsistent evolution of the policy. The present study aims to solve this conundrum by introducing an alternative approach known as 4th generation strategic culture research. The paper is comprised of four parts. First, the origins and evolution of strategic culture are reviewed, with emphasis placed on the commonly accepted weaknesses that, to date, have prevented it from being used as a testable theoretical concept, and subsequently as an explanatory factor for security policy changes. The second part presents the “modernist constructivism” approach that bridges the gap between traditional constructivism and hypothesis-driven research design. Next, the paper introduces the emerging fourth generation in strategic culture literature, followed by a conceptual framework designed to resolve the inherent weaknesses of the more traditional approaches. Finally, this conceptual framework is applied to analyse the transformation of Israel’s security policy between 1982 and 2014.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号