首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   656篇
  免费   63篇
  国内免费   43篇
  762篇
  2024年   1篇
  2023年   3篇
  2022年   4篇
  2021年   14篇
  2020年   8篇
  2019年   30篇
  2018年   33篇
  2017年   38篇
  2016年   39篇
  2015年   24篇
  2014年   69篇
  2013年   113篇
  2012年   22篇
  2011年   45篇
  2010年   44篇
  2009年   45篇
  2008年   50篇
  2007年   36篇
  2006年   28篇
  2005年   30篇
  2004年   23篇
  2003年   19篇
  2002年   9篇
  2001年   5篇
  2000年   8篇
  1999年   4篇
  1998年   3篇
  1997年   3篇
  1995年   5篇
  1994年   3篇
  1993年   3篇
  1990年   1篇
排序方式: 共有762条查询结果,搜索用时 0 毫秒
551.
The Arab Spring, a pro-democracy uprising that has been sweeping through North Africa and the entire Arab world since 2010, has been described as a cataclysmic revolutionary wave that has left the overthrow of political regimes in its wake. Studies have comprehensively x-rayed the political and socio-economic circumstances that gave rise to the uprising. Apart from the impact of the uprising on political developments and democratic governance in the Arab world in particular and the world in general, the circumstances that resulted in the revolutions constitute empirical security implications for Nigeria. This is the focus of this article. Using the Ibrahim Index of African Governance (IIAG) and other selected indicators, this article draws a comparative analysis of the key factors that led to the uprisings in Egypt, Libya and Tunisia, pointing out areas of social and security tensions in Nigeria. Based on these findings, it points out the urgency of and imperative for security sector reforms in Nigeria.  相似文献   
552.
为提高灭雷具的作战效率,从灭雷具缆体系统在流体中的动力学特性出发,指出缆索对灭雷具的阻力是影响灭雷具操纵性的重要因素,并采用节点离散法建立了缆体系统在海流中的动力学计算模型;根据仿真数据分析了灭雷具操纵性受缆体系统阻力的影响,并提出了合理的操纵建议。  相似文献   
553.
In the aftermath of the tragic events of 11 September 2001, numerous changes have been made to aviation security policy and operations throughout the nation's airports. The allocation and utilization of checked baggage screening devices is a critical component in aviation security systems. This paper formulates problems that model multiple sets of flights originating from multiple stations (e.g., airports, terminals), where the objective is to optimize a baggage screening performance measure subject to a finite amount of resources. These measures include uncovered flight segments (UFS) and uncovered passenger segments (UPS). Three types of multiple station security problems are identified and their computational complexity is established. The problems are illustrated on two examples that use data extracted from the Official Airline Guide. The examples indicate that the problems can provide widely varying solutions based on the type of performance measure used and the restrictions imposed by the security device allocations. Moreover, the examples suggest that the allocations based on the UFS measure also provide reasonable solutions with respect to the UPS measure; however, the reverse may not be the case. This suggests that the UFS measure may provide more robust screening device allocations. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2005.  相似文献   
554.
义务教育的新课标对教师提出了新的要求。本文分析了师范教育的现状,指出师范教育应适应中学要求,加快对教育观念、教学方式和评价方式等的改革。  相似文献   
555.
办学特色是高等学校生存发展的前提和办学优势的集中体现,也是形成核心竞争力的关键。公安现役高等院校突出办学特色,要着力创新办学理念,强化学科专业特色和人才培养特色。  相似文献   
556.
对加强公安边防群众工作的思考   总被引:2,自引:0,他引:2  
加强公安边防群众工作对维护沿边沿海地区社会稳定,推进新时期公安边防工作具有重要意义。从主、客观两方面分析了当前公安边防群众工作中存在的问题,提出公安边防群众工作要坚持为现实斗争服务、为打造服务型机关服务的原则,消除四个误区,提高专业化、信息化和社会化水平,加强保障机制、考核评估机制、奖惩激励机制和监督制约机制建设,推动公安边防群众工作深入开展。  相似文献   
557.
环境安全概念探讨   总被引:3,自引:0,他引:3  
安全与环境概念的内涵非常丰富,相关研究不够深入,导致目前环境安全概念存在歧义性,这严重影响到环境安全理论的深入研究和我国环境安全战略的实施效果。考虑到各国的国情差异,人们对环境安全需求的层次性,安全具有质与量的要求以及环境科学学科以人为中心事物的特点,作者认为:环境安全,应当是指存在于自然生态系统中,能够维持人类个体或者群体进行正常生理活动和社会活动所需要的最基本、最起码品质和数量的自然条件的总和。  相似文献   
558.
While unmanned aerial vehicles (UAVs) have become a standard element of modern armed forces, African countries have been reluctant to acquire remotely piloted aircraft for military purposes until recently. This is mainly due to a lack of industrial capabilities and, for military purposes so far, procurement policies that have concentrated on small arms and light weapons, more prestigious armoured vehicles and combat aircraft. Moreover, counter-insurgency strategies in Africa tend to focus on manoeuvre warfare, co-opting rebels or fighting them using armed proxies. As a consequence, international counterterrorism operations against fanatical and reckless groups like al-Qaeda in the Islamic Maghreb and Boko Haram in sub-Saharan Africa are characterised by a strong dependence on Western forces providing UAV-based reconnaissance and, in some cases for the United States, military strikes by drones. This essay reviews some of the incentives and problems of the use of UAVs in the African context. Given the geographical and military conditions of asymmetric warfare in Africa, and potential problems concerning international law, ethical aspects of the use of arms, and civil–military relations notwithstanding, it is argued that African security forces should develop their own UAV capabilities by intensifying their cooperation with Western armed forces.  相似文献   
559.
The literature on how European states have adapted to the post-cold war security environment ffocuses invariably on different understandings of military transformation, a process which is seen as inherently different from other forms of organizational change. However, as this paper argues, new management practices, going back to the introduction of so-called New Public Management (NPM) reforms throughout Europe in the 1980s, have eventually penetrated also the last bastion of the old state – the defense sector. Taking a critical approach to the idea of military transformation and existing theories of military change, the paper demonstrates how other international developments have pushed towards what may be seen as a “normalization” of Europe’s defense sectors. This has important implications for how we approach and understand change in contemporary defense organizations.  相似文献   
560.
为在复杂旁路攻击敌手环境下对密码芯片进行安全评估,通过物理可观测密码术模型框架对旁路分析过程进行建模;借鉴传统面向实际的可证明安全性理论,定义旁路环境下的两类旁路敌手:密钥恢复旁路分析敌手与不可分辨性判定旁路分析敌手,并给出了密码实现针对这两类旁路敌手的安全性度量模型;对安全性评估中的重要参数指标进行定义与推导;最后根据旁路分析定义、模型及安全性度量指标,提出针对旁路分析的通用评估框架,为研究可抵抗旁路分析攻击的密码设备打下基础。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号