首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   152篇
  免费   22篇
  国内免费   10篇
  2024年   1篇
  2023年   1篇
  2021年   9篇
  2020年   9篇
  2019年   6篇
  2018年   8篇
  2017年   8篇
  2016年   5篇
  2015年   4篇
  2014年   11篇
  2013年   24篇
  2012年   3篇
  2011年   8篇
  2010年   13篇
  2009年   6篇
  2008年   7篇
  2007年   8篇
  2006年   5篇
  2005年   5篇
  2004年   5篇
  2003年   7篇
  2002年   2篇
  2001年   6篇
  2000年   1篇
  1999年   2篇
  1998年   2篇
  1997年   4篇
  1996年   2篇
  1994年   1篇
  1993年   1篇
  1992年   2篇
  1991年   4篇
  1990年   3篇
  1988年   1篇
排序方式: 共有184条查询结果,搜索用时 15 毫秒
21.
为了识别跳频序列,提出了采用遗传算法并结合跳频信号特点来完成跳频序列的分析与重组,从而实现跳频信号的侦察。在采用传统遗传算法的基础上,针对序列特点提出了5种改进手段,从而大大提高了算法的效率和可用性。最后利用采样的语音信号,对分析与重组过程进行模拟来验证算法的可行性。  相似文献   
22.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article.  相似文献   
23.
军事情报的收集、处理和分析是情报部门的重要工作,当今时代,依靠人工搜集处理方法在效率上已经不能满足需要,采用先进的信息处理技术对情报进行自动处理技术正是解决这一问题的有效途径。大部分的情报载体是文字和语音.因此自然语言和语音处理技术在情报处理方面发挥着重要作用。针对军事情报处理方法中的语言、语音处理技术进行简单的介绍,包括机器翻译、信息检索,语音分析、语音识别等方面。  相似文献   
24.
针对未来联合作战活动中陆军作战部队的战术应用需求,提炼出陆军战术情报系统建设的组织体系模型和情报生产区域模型,同时,以某一陆军战术作战单位为例,提出并深入分析对应情报系统节点的功能参考模型,建立了基于组织体系模型和功能参考模型的陆军战术情报系统模型化分析方法,详细描述了该模型化分析方法涉及的陆军战术情报系统的6个主要功能单元;最后简要分析了该模型化分析方法的军事应用前景.  相似文献   
25.
This article discusses the validity of national security threats in Botswana and whether they justified the creation of the Directorate of Intelligence and Security Services (DISS), which has been controversial since its formation. Since its inception in 2008, the DISS has been accused of many human rights violations and politicisation. Without fully deliberating on the basis for its creation, some discourses have focused on the politicised operations without relation to what the DISS is supposed to be doing. The author works under the assumption that debates should be shaped by whether it was necessary to create the DISS, and, if so, how we can shape and steer debates on its oversight, management, reform and operations. This article argues that despite the politicisation of the DISS, Botswana's national security threats are both real and imagined; and that domestic threats to national security have moved from the conceptual ‘imagined’ category to the ‘real’. However, that in itself did not warrant the design and mandate of the DISS, and the article argues that it was external threats that really warranted the creation of a civilian intelligence agency. The article concludes that Botswana faces a plethora of external security threats – traditional and non-traditional – that warranted the creation and continuance of the DISS.  相似文献   
26.
This article deals with Scandinavian intelligence cooperation and its significance for Swedish security policy during the first part of the Cold War. First, the development of the cooperation is described. Second, it is related to a wider context. Third, intelligence in Swedish security policy-making is discussed. Common security interests caused the cooperation. For Sweden, it represented an important part of the wider contacts with the West. Although military intelligence was important for Swedish security policy-making in some respects (e.g. military readiness), it did not have a significant influence in others (e.g. the politicians' threat perceptions). One important reason is the Swedish tradition of weak connections between the political and military leadership.  相似文献   
27.
为构建一体化的空天作战信息环境,面向大情报系统的信息共享和应用重组集成目标,探讨了以信息服务理念架构大情报系统的总体思路,总结筛选了大情报系统信息服务组件开发与集成应遵循的技术规范与标准.有助于大情报系统的体系结构设计,高效集成多元化的现有或即将建设的关联系统,并逐步过渡到统一的信息技术体制上.  相似文献   
28.
王群 《国防科技》2014,(3):47-50
从水下航母的历史出发,简述了现代战争对潜射无人机的需求,分析了潜艇(尤其是核潜艇)装备潜射无人机的优势和给作战带来的变化,说明了它对发展水下航母的重要性。之后,以美国潜射无人机研发为例,总结了其研究进展,探讨了它目前面临或需要解决的问题,表明了其发展方向。  相似文献   
29.
Why did the United States fail to stop Israeli acquisition of nuclear weapons? Existing research argues that patrons such as the U.S. should have an easy time halting proliferation by militarily and economically vulnerable clients. Nevertheless, Israel acquired nuclear weapons with relatively little American opposition. Utilizing extensive primary source research, we argue that problematic intelligence-policy relations hindered U.S. efforts to arrest Israeli proliferation as (1) policymakers often gave mixed guidance to the intelligence community, resulting in (2) limited information on Israeli efforts that reinforced policy ambiguity. The results carry implications for understanding the dynamics of nuclear proliferation and intelligence-policy relations.  相似文献   
30.
美国作为较早受到恐怖主义威胁的西方发达国家,自20世纪70年代逐渐发展起了一套完善的执法体系,并积累了成熟的执法经验,特别是信息化时代背景下,美国执法部门的反恐斗争渗透着强烈而鲜明的信息情报色彩,是“情报导侦”理念和模式的现实体现,为我国执法与行动部门提供了一定的经验。其中的“威胁评估”综合情报分析模式是美国反恐情报工作的典型代表,对于预防恐怖主义犯罪起着特殊的作用。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号