首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   78篇
  免费   1篇
  国内免费   2篇
  2021年   6篇
  2020年   2篇
  2019年   4篇
  2018年   1篇
  2017年   5篇
  2016年   3篇
  2015年   4篇
  2014年   7篇
  2013年   37篇
  2012年   2篇
  2011年   1篇
  2010年   2篇
  2004年   1篇
  2001年   2篇
  2000年   1篇
  1998年   1篇
  1996年   1篇
  1991年   1篇
排序方式: 共有81条查询结果,搜索用时 31 毫秒
41.
现代多功能制导站中央控制计算机并行计算技术研究   总被引:1,自引:1,他引:0  
:通过实例分析 ,研究了现代多功能制导站中央控制计算机适合并行计算的软硬件结构与设计思想  相似文献   
42.
在信号时序逻辑约束下规划路径是一项具有挑战性的任务,其计算量非常高.提出了一种终点回溯的规划方法,它是一种适用于连续时间系统的抽象化方法.该规划方法分为离线构建阶段和在线规划阶段.离线构建阶段在Transducer理论的指导下,从能够完成任务的合理的终点构造一棵快速随机搜索树,向初始状态空间进行回溯.当采样点足够多时,...  相似文献   
43.
The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently doing but also predict what their next move might be. However, the ethical implications are unclear and the backlash following Edward Snowden’s revelations have shown that such activities are not without controversy. This leaves the debate stuck between the important, ethical role that intelligence can play and the potential for its unrestrained use to cause undue harm. This paper will resolve this by giving greater detail to cyber-intelligence practices, highlighting the different levels of harm that the various intelligence operations can cause. The essence of this paper is not that cyber-intelligence should be banned outright, but that it can be justified given the necessary circumstances. Therefore, the paper will develop a specialised set of Just Cyber-Intelligence Principles, built on the just war tradition, to outline if and when such activities are justified.  相似文献   
44.
The anchoring effect is a well-studied subject. This article connects the effect with the rules-in-use within a military intelligence institution. Particularly the rules-in-use that dictate that an analyst takes his or hers starting point from recently conducted assessments of the specific area or threat. The threat assessment as well as the written assessment were affected. The results show that officers have an aversion to lower a previous given threat assessment. This gives that to understand risk assessment we not only need to understand the methods used, we also need to understand the institutions in which they are used. This is especially relevant for military intelligence as the assessments are conducted in an environment of high uncertainty.  相似文献   
45.
Secure second strike nuclear forces are frequently held to be easy to procure. Analysts have long argued that targeting intelligence against relocatable targets like submarine launched and land mobile ballistic missiles is difficult to obtain. However, the scholarly consensus on intelligence for counterforce operations is seriously overdrawn. Both during and after the Cold War, the United States developed substantial intelligence capabilities to track and target submarines and mobile missiles. These efforts achieved important and under-appreciated success. Second strike forces have been far more vulnerable than most analysts are willing to credit.  相似文献   
46.
The outbreak of violence following the insurgency by a coalition of armed groups called Séléka represents one of the darkest pages in the contemporary history of the Central African Republic (CAR). Although the country has experienced chronic instability since independence from France in 1960, it has never before descended into the current near-genocidal situation, which has pitted Muslims against Christians. The CAR has been embroiled in conflict since March 2013, with unprecedented security and humanitarian consequences. In December 2013, the United Nations representative for the first time described the situation as an alarming security threat and evoked the likelihood of genocide and humanitarian disaster if nothing is done.  相似文献   
47.
The 2014 Nuclear Security Summit (NSS) in The Hague was a resounding success, both in organizational terms and in terms of substance. The new substance can be found in the Communiqué, as well as in innovative joint statements by participants, all of which may be considered as implementation of actions decided upon in the Final Document of the 2010 Review Conference of the Treaty on the Non-Proliferation of Nuclear Weapons. The next two years in the NSS process cannot be business as usual. This viewpoint makes some suggestions for NSS states to undertake between now and the final summit in 2016, including preparations for winding down the NSS process as we know it.  相似文献   
48.
In the late 1950s, as intercontinental ballistic missiles (ICBMs) replaced bombers, the development of Soviet ICBMs prompted fears of strategic vulnerability in the West. The Eisenhower administration's decision to deploy Intermediate Range Ballistic Missiles (IRBMs) on the territory of NATO allies sought to redress the perceived vulnerability until American ICBMs were ready. British deception planners considered how to enhance the threat posed by the IRBMs. An outline plan codenamed ‘Celestial’ was intended to persuade the Soviets that the otherwise vulnerable missiles could not be readily neutralised. This article explores this deception and how such planning also sought to convey accurate information alongside disinformation. It also suggests that deception planners appear to have given little heed to the potentially counterproductive consequences of such an operation.  相似文献   
49.
As the January 1968 Tet holiday approached, CIA analysts and American commanders in South Vietnam developed more accurate conclusions about communist military strategy than did intelligence analysts at CIA headquarters. Besides valuing different types of intelligence, General William Westmoreland, Lieutenant General Frederick Weyand, and CIA analysts in Saigon also placed greater emphasis on new information about communist military strategy than did CIA analysts at Langley. These different reactions to information highlight reasons why military commanders and intelligence analysts stationed in the theater of operations might develop more accurate conclusions about enemy military strategy than intelligence analysts stationed at their national headquarters.  相似文献   
50.
Many scholars and analysts have studied intelligence failure and surprise and developed theories to explain disasters such as the attack on Pearl Harbor. Others, especially since the 9/11 attacks, have examined the rising threat of terrorism and see it as posing a particularly difficult challenge for the intelligence community. But little work has been done to integrate the earlier literature on intelligence failure with the newer threat of terrorist attack. This article attempts such an integration, by examining the bombing of the US Marine Barracks in Beirut in 1983; it concludes that most studies of the Beirut bombing are mistaken in their assessment of the role played by intelligence in that disaster, and suggests that our understanding of intelligence failure against surprise attacks needs to be revised in the age of terrorism.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号