排序方式: 共有118条查询结果,搜索用时 296 毫秒
11.
12.
ROCKY WILLIAMS 《African Security Review》2013,22(3):3-4
Political violence, at times perceived as terrorism, remains a major security challenge in Swaziland. The common view is that this violence is perpetrated by those who feel marginalised from the political process. Central to the hypothesis advanced in this paper is that any effective solution to the menace of political violence and the security challenges it poses begins with an awareness of the symbiotic relation between security, human rights and democracy. It has been empirically proven that abuse of human rights can lead to violence, which negates peace and security in any society. In terms of content the paper looks at the shape of political violence in Swaziland. Next, it discusses the strategies and ideas behind efforts by the Swazi state to combat political violence and the counter-arguments. The final section shows the inextricable link between security, human rights and democracy; and argues that recognising this linkage can provide the key to unlocking the security puzzle in Swaziland. 相似文献
13.
针对我军后方仓库弹药装卸运输环节对人员叉车操作的安全性需求,设计出了叉车操作测试场地路线,归纳总结了人员操作叉车进行弹药装卸运输环节中的安全失效形式及失效原因,构建了HRA评估数学模型.选取我军某后方仓库搬运机械建制班人员为对象,进行了实地测试,得到了弹药装卸运输环节的人为失误概率.测试结果表明,基于CREAM方法能够较好地解决后方仓库弹药装卸运输环节人为失误概率的量化问题. 相似文献
14.
15.
三通是管道机器人经常遇到的典型障碍之一,克服该障碍的能力用管道机器人在三通处通过性来描述。文中提出一种描述差压驱动式管道机器人三通通过性的数学模型,该模型由一组组合约束构成。通过对约束方程的分析讨论、与管道机器人弯道通过性的对比分析,得出了规律性的结论。管道机器人在三通处的姿态、单元体的几何尺寸、行走轮结构形式对其通过性都有不同程度的影响。所提出数学模型是管道机器人三通自主行走控制策略设计和相应结构设计的理论基础。 相似文献
16.
17.
深入探讨油库人因安全事故发生的根原因,对油库人因安全事故的分析评估和油库人因安全事故进行定量化预测及隐患排查具有重要意义。基于认知可靠性和失误分析追溯方法建立了适用于油库人因安全事故根原因分析和追溯的失误模式及后果一前因追溯表,并应用于油库人因安全事故实例分析中,证明了该方法应用于油库人因安全事故根原因分析的实用性和有效性。 相似文献
18.
为了保证人为差错分类的全面性和一致性,在详细分析现有人为差错分类方法的基础上,提出了一种新的人为差错分类框架.该框架以"执行差错,忽略"为起点进行细化,得到五种基本的人为差错类别.以此作为人为差错原语,结合认知模型,分析了不同认知阶段可能出现的人为差错模式.实例证明,在这种分类方法指导下来分析人为差错,对提高人为差错分类结果的全面性和一致性有着重要意义. 相似文献
19.
Carlos Solar 《战略研究杂志》2019,42(3-4):507-531
This article explores current developments in Chile, where since the return to democracy in 1990, the elected authorities have reconfigured the nation’s military resources in favour of four action pillars: peacekeeping and international conflict management, landmine removal and gun disarmament, emergency and catastrophe response, and a concern for human, economic and social rights. Successive defence policies offer a valuable case study for exploring the trade-offs between security, traditional and non-traditional threat management and institutional capabilities. The article argues that human security policymaking is not free from undesired outcomes; specifically, regarding how to reconvene the role of the armed forces when conventional war seems a thing of the past. The paper focuses on the interagency policy implications and the challenges ahead for civilians and the military. 相似文献
20.
介绍了Win95虚拟设备驱动程序、WinNT内核模式驱动程序与Win32设备驱动程序的概念与结构特性.讨论在不同Windows开发平台下设备驱动程序的兼容性. 相似文献