首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   11篇
  免费   1篇
  2021年   2篇
  2018年   1篇
  2016年   2篇
  2015年   1篇
  2014年   2篇
  2013年   3篇
  2005年   1篇
排序方式: 共有12条查询结果,搜索用时 15 毫秒
1.
The Indian Army, a force trained primarily for conventional warfare, has been engaged in internal counter-insurgency operations since the 1950s. Despite such a long innings on a counter-insurgency mode, little attention has been accorded within military circles to doctrinal innovation for waging sub-conventional warfare in India's democratic political context. At best, the Army continues to view counter-insurgency duty as secondary to its primary duty of defending India from external conventional threats. By conceptualizing a counter-insurgency strategy of ‘trust and nurture’, this article aims to fill this critical doctrinal gap in India's military policy. The author argues that a counter-insurgency strategy of ‘trust and nurture’ based on democratic political culture, measured military methods, special counter-insurgency forces, local social and cultural awareness and an integrative nation-building approach will result in positive handling of India's internal security problems. The author utilizes India's counter-insurgency experiences in Assam, Mizoram, Nagaland, Punjab, and Operation ‘Sadhbhavana’ in Jammu and Kashmir as illustrative empirical indicants in order to validate the ‘trust and nurture’ strategy.  相似文献   
2.
增强信誉机制对信誉信息的有效聚合能力是信誉系统成功的基础。已有的基于局部信誉信息的信誉系统难以有效处理节点的复杂策略不诚实推荐行为,并且可能把提供诚实推荐的节点错误划分为不诚实节点。对此,提出了一种可信度增强的信誉机制CERep。该机制中,节点基于自身的经验产生的直接信任评价,包含直接信任评价值和关于此评价值的信心因子两个部分。在此基础上,提出了新的基于信誉的信任评价算法和推荐可信度计算模型,并给出了信誉机制的分布式实现策略。分析和模拟实验表明,CERep信誉机制能够有效应对复杂策略的不诚实推荐行为,提高信任评价的准确性,实现对节点推荐可信度更公平的评价。  相似文献   
3.
由于移动Ad Hoc网络具有无需基础设施,可以快速部署,很难完全被摧毁等优点,被作为数字化战场通信的优先选择,设计实现了一种适用于低速率移动Ad Hoc网络的安全路由协议——LSRP,它适用于分层架构的低速移动电台自组网,可以在网络资源有限的情况下,防御来自外部和内部两方面的攻击。LSRP协议利用分布式门限RSA签名方案来阻止非授权接入,防范来自网络外部的攻击;利用邻节点信任度评估机制,进行恶意节点检测和剪除,防范来自网络内部的攻击,增强了网络的安全性。  相似文献   
4.
ABSTRACT

This article explores the paradox of trust in the largest nuclear smuggling operation involving highly enriched uranium (HEU) discussed in open source literature. In the first effort to understand the type, extent, and role of trust in nuclear smuggling enterprises, it draws from literature on trust development in legitimate businesses as well as criminal enterprises. Observed behavioral patterns in this case challenge traditional notions of the internal dynamics of temporary groups engaged in nuclear smuggling and operational realities of such activities. The article seeks to explain why individuals agree (and continue) to operate in this high-risk environment, unbound by close personal ties, without any effort to verify the background, motives, or qualifications of the fellow conspirators. It offers ways to advance current nonproliferation efforts in non-state actor interdiction by exploiting the environment of shallow trust in temporary groups.  相似文献   
5.
吴量  徐东  刘伟 《国防科技》2021,42(1):84-88
应急物流是应对突发事件的重要支撑,也在此次抗击疫情中发挥了重要作用。区块链技术的特点与应急物流有许多内在的契合点,有利于推动实现高效、可信、智能化的保障,提升应急物流建设水平,助力疫情防控与应急管理。本文基于疫情防控物资保障视角,着眼保障过程、信任机制和运行特点,采取理论论证与案例结合、技术分析与应用结合的方法,论证区块链在推动应急物流实现高效保障、信任治理和智能运行方面的现实应用和预期效果,并结合抗击疫情的现实提出相关对策建议,推动区块链技术在应急物流领域的创新应用,助力应急物流的高效保障、信任治理和智能运行,提升应急物资供应保障效率、信任治理水平和智能化程度。  相似文献   
6.
数学课堂教学应营造浓厚的自主学习氛围,唤起学生的主体意识,激起学生的学习兴趣,使学生调动自身的学习潜能,进行自主学习,成为课堂学习的主人。有效的学习活动不能单纯依赖模仿与记忆,动手实践,自主探索,合作交流是学生学习的重要方式。  相似文献   
7.
朱翼 《国防科技》2021,42(4):4-9
发展值得人类用户信任的人工智能系统是影响人机合作发展的核心问题之一。目前,人机合作中信任的研究主要来自于计算机领域,侧重于研究如何构建、实现和优化人工智能系统面对特定任务的计算能力与处理能力。针对"什么因素影响了人对人工智能系统的信任,如何准确测量人对人工智能系统的信任"等问题的研究仍处于起步阶段,尚缺乏人类用户参与的实证研究或实验研究中缺乏严谨的行为科学实验方法。本文回顾了行为科学领域中对人际信任的研究方法,在人机合作框架下,探讨了人与人工智能系统之间的信任关系,梳理了人类个体对人工智能系统信任态度的影响因素。希冀该研究成果能够为构建人机合作中的信任度计算模型提供一定理论依据。  相似文献   
8.
This second part of the review article begins with a definition of military power, when and how it should be used. From a large number of authors, “moral forces” are linked to “codes of conduct”, and the fundamental understandings about the “profession of arms”, based on “fiduciary trust”, “covenanted” service and professional and personal “conscience”. The article covers what authors have written about “culture” and the ethics of “technology” devices and systems, including “cyber” warfare. It concludes with recognition of the increase in ethical sensitivity in this century which is characterized by a phenomenon, the crises of “identity”, personal, national and global.  相似文献   
9.
Trust in institutions is an important issue of political science and sociology. This article contributes to the discussion by exploring public trust in the military at the global, regional and national levels, and the causes of trust and distrust in the military. Analyses of public opinion data reveal that the military is a highly trusted social institution across the world. In Slovenia, the trust in the military is high as well; however, it is lower than international data would suggest, averaging at 50%. Against this background, the article focuses on the causes of trust. The original empirical survey was accomplished and shows that the most significant causes of a high level of trust in the military are its frequent and successful involvement in disaster relief, its professional qualifications and high performance, as well as its national defense role. Whereas the key causes of distrust are: the poor levels of transparency in its procurement process; the politicization of the military and organizational problems.  相似文献   
10.
采用端部半刚性连接梁单元模型进行模拟焊接节点的损伤,并基于应变模态理论,提出了一种焊接节点损伤识别两步法。第一步,先整体测量结构的位移模态并推导出应变模态,然后采用改进后的目标函数,通过信赖域优化算法对损伤节点位置进行准确判定;第二步,采用提出的杆端应变模态变化比指标,实现焊接节点损伤程度的精确识别。经工程实例的数值仿真及试验分析,验证了该方法的有效性及优越性,为解决这类大型焊接结构焊接节点的损伤识别问题提供了新思路。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号