首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   205篇
  免费   34篇
  国内免费   11篇
  2024年   1篇
  2023年   1篇
  2021年   10篇
  2020年   9篇
  2019年   8篇
  2018年   8篇
  2017年   10篇
  2016年   7篇
  2015年   9篇
  2014年   13篇
  2013年   26篇
  2012年   6篇
  2011年   11篇
  2010年   17篇
  2009年   11篇
  2008年   14篇
  2007年   12篇
  2006年   7篇
  2005年   7篇
  2004年   8篇
  2003年   8篇
  2002年   4篇
  2001年   8篇
  2000年   2篇
  1999年   3篇
  1998年   5篇
  1997年   5篇
  1996年   3篇
  1995年   3篇
  1994年   2篇
  1993年   1篇
  1992年   2篇
  1991年   4篇
  1990年   4篇
  1988年   1篇
排序方式: 共有250条查询结果,搜索用时 0 毫秒
41.
The building of reliable covers has always been of the utmost importance for clandestine Humint. Using both primary and secondary sources, this study seeks to examine how classical authors and modern scholars have dealt with this topic, and which kind of covers have been the most used throughout history in different sociopolitical contexts, and what are the new perspectives for today’s challenges. Findings suggest that a careful reading of the political milieu in which intelligence officers are required to work, and a certain degree of creativity, are the essential premises for the construction of a plausible cover; that some apparently outdated disguises such as merchants, itinerant monks and philosophers should be understood more broadly today to include business people, humanitarian NGOs and academics; that undercover practices have been theoretically and historically recognized as necessary and convenient by a great number of societies, often with scant regard for ethical considerations.  相似文献   
42.
The terrorist attacks in France and Belgium of 2015–2016 that occurred while these countries were in a heightened state of alert raise questions about indications and warning methodology as well as effectiveness of the blanket-protection deployment of security services assisted even by the military. Response and perhaps even more anticipation may require strategic rethinking in light of the predatory attacks that target the most vulnerable spots of the public space. This study looks at threat analysis in Belgium as conducted through her intelligence fusion centre Coordination Unit for Threat Analysis (CUTA)?????? since its inception in 2006. With a special focus on what is known, at the time of writing, about the terrorist attacks in Paris and Brussels, this study hopes to put into context how the system (mal)functions and will also consider the preventive measures that respond to the threat, and the international aspects which have implications far beyond Belgian borders. Therefore, a case is made for not just a Belgian homeland security framework, but one that fits into an EU-wide security concept.  相似文献   
43.
以军事专家系统为主线,阐述了专家系统在军事中的应用前景;分析了专家系统的基本情况及国外发展现状,归纳了人工智能与专家系统研究中的八个基础性应用课题;论述了人工智能在火控指控领域中应用的可能性,并提出了我国在人工智能研究中某些应注意的问题。  相似文献   
44.
认知电子战通常被定义为以具备认知性能的电子战装备为基础,注重自主交互式的电磁环境学习能力与动态智能化的对抗任务处理能力的电子战形态。自其被首次提出以来,以其感知准、推理强、决策快的优势备受国内外研究学者广泛关注。随着人工智能新理念、新技术、新应用的不断涌现,认知电子战步入崭新的发展阶段。为捕捉其未来发展方向,从人工智能角度出发,总结并丰富了认知电子战概念内涵,梳理认知电子战的发展脉络及外国典型项目,搭建认知电子战系统框架及架构,从感知、判断、决策等方面对认知听电子战关键技术进行了全面系统综述,并总结了认知电子战面临的挑战和发展趋势。  相似文献   
45.
主要研究了基于Levenberg-Marquardt算法的人工神经网络的火灾时人员疏散反应时间的可靠性和可行性。首先介绍了人员疏散现状调研和LP神经网络背景特点,然后将问卷调查、疏散演练基于同一平台,建构人员疏散反应数学模型,最后通过LP神经网络进行实际测试和分析,验证了人员疏散反应时间数学模型的可靠性。  相似文献   
46.
机器人集群路径规划技术研究现状   总被引:2,自引:2,他引:0       下载免费PDF全文
受社会型生物群体行为启发,群体智能得到日益广泛的关注,机器人集群作为群体智能的重要承载者得到了大量研发和广泛应用。机器人集群路径规划技术作为一项核心关键技术也得到快速发展。为此全面深入地调研了机器人集群路径规划的技术发展现状,创新性地归纳了适用于不同集群规模、可扩展性要求、通信需求以及算法要求的集群规划基础计算架构,包括冗余计算架构、分布计算架构和分层计算架构。从可扩展性和适用性角度,分类梳理了最适用于机器人集群的路径规划方法,包括仿生学方法、人工势场法、几何学方法、经典搜索法和进化学习法,并为集群仿真验证研究提供了七款可免费下载或开源的机器人集群仿真验证平台。  相似文献   
47.
面对智能化时代的巨大进步,人工智能安全逐渐成为备受关注的议题。以Web of Science数据库收录的核心论文为研究对象,运用科学计量学方法和可视化技术,对包括国家、机构在内的研究力量分布以及热点、前沿和所涉学科在内的主题内容进行分析和总结。针对潜在的人工智能安全议题,构建定性分析框架,对人工智能安全进行定性定量结合的分析,对人工智能安全技术发展进行初步探索与评估。  相似文献   
48.
Throughout the Cold War Sweden pursued a declared policy of non-alignment. Sweden nevertheless established security links with a number of Western powers, first of all Britain and the US. The most extensive links were developed in two areas – military technology and intelligence. Intelligence liaison was of crucial importance for the security of non-aligned Sweden, but also significant for the major Western powers in filling gaps in intelligence collection. But intelligence liaison also served as an instrument in a closed policy arena where Sweden could receive or pay back favours, according to a pattern established already during World War II. However, intelligence liaison contained policy dilemmas, some of a more general nature, some specific for a country with an overt policy of non-alignment.  相似文献   
49.
Thanks to its geographical location and close military ties to the US and Britain, Norway took substantial part in the Western intelligence effort against the Soviet nuclear weapons programme during the Cold War. Norway's relative proximity to the nuclear weapons test sites on Novaya Zemlya and the nuclear submarine bases on the Kola Peninsula was of particular importance in this regard. Whereas the tasks of surveying the development, deployment and possible employment of Soviet nuclear forces always had first priority, Western atomic intelligence conducted from Norwegian soil and waters was occasionally aimed even at gathering information about the geophysical and possible long-term medical and environmental implications of high-yield nuclear explosions in the atmosphere.  相似文献   
50.
Military intelligence forms a vital element of counter-insurgency operations. When the Colombian military suffered setbacks at the hands of the FARC in the 1990s, military intelligence received much of the blame. It was also accused of human rights violations. With the help of US. financed Plan Colombia, military intelligence has been reorganized, expanded, strengthened with upgraded technical capabilities, constrained to operate within defined legal boundaries, and refocused to match the government's strategic priorities. Human intelligence has laid the groundwork for impressive tactical and operational results since 2006. Nevertheless, like all intelligence services, that of the Colombian military continues to experience problems of structure and political outlook.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号