首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   759篇
  免费   8篇
  国内免费   8篇
  775篇
  2025年   3篇
  2024年   3篇
  2023年   5篇
  2022年   4篇
  2021年   14篇
  2020年   9篇
  2019年   30篇
  2018年   34篇
  2017年   38篇
  2016年   39篇
  2015年   24篇
  2014年   69篇
  2013年   113篇
  2012年   24篇
  2011年   45篇
  2010年   45篇
  2009年   45篇
  2008年   50篇
  2007年   36篇
  2006年   28篇
  2005年   30篇
  2004年   23篇
  2003年   19篇
  2002年   9篇
  2001年   5篇
  2000年   8篇
  1999年   4篇
  1998年   3篇
  1997年   3篇
  1996年   1篇
  1995年   5篇
  1994年   3篇
  1993年   3篇
  1990年   1篇
排序方式: 共有775条查询结果,搜索用时 15 毫秒
551.
单硬件实现的高效电磁环境绘制适用范围更广;但是,并行光线投射绘制电磁环境时,其效率受硬件性能制约。在研究硬件限制并行光线投射效率的基础上,提出一种面向硬件制约的像素插值方法。当硬件限制并行光线投射绘制不能实时完成时,减少并行投射的光线数量,即部分图像像素由光线投射生成,其余像素插值生成。像素插值以图像质量换取执行效率,当图像更新停顿时重新使用光线投射生成插值获得的像素,以恢复图像内容。实验结果表明,低硬件配置条件下,像素插值能够大幅度提高绘制图像的生成效率。同时,对比多个体数据的绘制效果和误差统计得出:电磁环境数据场最适合使用像素插值方法。  相似文献   
552.
    
This article analyzes the North Korean nuclear crisis from a balance-of-power perspective. It is in the long-term interests of international peace for a secure and independent North Korea to serve as a buffer between US and Chinese ground forces. However, the conventional military advantage of the South Korean-American alliance over North Korea has grown drastically since the end of the Cold War, threatening North Korea’s survival. Since North Korea lacks any reliable ally, nuclear weapons represent its most cost-effective way to restore a balance of power and thus secure itself. Accepting security guarantees in exchange for its nuclear arsenal is rhetorically appealing but not a viable approach. North Korea’s development of intercontinental ballistic missiles (ICBMs), however, has overcompensated for the post-Cold War imbalance, inviting talk in Washington of waging a preventive war. Persuading North Korea to give up its ICBM capability, not its nuclear arsenal, should therefore be the primary objective of US diplomacy.  相似文献   
553.
ABSTRACT

Bagayoko, Hutchful, and Luckham correctly argue that the structures, characteristics, and operating methods of official security institutions in Africa have been somewhat neglected, with a lack of much recent research. The Somali National Army (SNA) sits among these lacunae. Its formal structures can be used as a skeletal starting point and springboard to start to draw the network diagrams that chart informal linkages. This is why recent declassification decisions by U.S. intelligence bodies, coupled with period documents released to the UK National Archives, hold significance in helping us understand early hierarchical SNA arrangements. They show the steady build-up in size of the force, to 1987, to about the time the civil war began to fragment the state.  相似文献   
554.
    
In the last decade, cyber conflict has become a main feature of international politics and a growing concern for strategic stability and collective security. Unfortunately, cyber conflict suffers from a lack of conceptual clarity about its impact on collective security and a lack of consensus among international actors on how to interpret it. This article proposes to understand cyber conflict as an evolving process driven by two factors: the way in which digital space is configured and the way in which tactical, organizational, strategic, and doctrinal characteristics related to cyber have been included in the field of national and international security. Both tend to encourage offensive behavior but also demonstrate features pointing to restraint.  相似文献   
555.
    
Most counterinsurgency campaigns have featured the use of some form of local defense forces. Such forces have had a somewhat mixed record, both in their usefulness in actually countering insurgents and in their longer-term impact on internal security. This article focuses on historical cases that provide lessons for the best operational and strategic uses of local defense forces and measures to control their activities.  相似文献   
556.
ABSTRACT

Attempts to explain the failure to reform the security sectors in post-conflict countries have often resorted to two sets of explanatory factors: international and local factors. This article seeks to move from that unhelpful dichotomy to an explanation linking both factors. Drawing on a Foucauldian approach and the concept of “counter-conduct,” it examines the rationality and practices of European Union (EU) governmentality and how governing technologies are resisted and reversed by local elites involved in security sector reform (SSR). Instead of understanding power and resistance as binary opposites, this article argues that counter-conduct can be conceived as implicated in the very relations of power that it seeks to resist. To tease out these relations, the article analyzes the EU's efforts in SSR in Bosnia and Herzegovina, where it identifies four forms of counter-conduct: upholding European standards, using the local ownership trap, simulating reforms, and lowering the bar.  相似文献   
557.
ABSTRACT

The European Union Police Mission for the Palestinian Territories (EUPOL COPPS) was established in 2006 to contribute to the establishment of effective policing in support of an independent and democratic Palestinian state. EUPOL COPPS is often commended for its contribution to the professionalization of the Palestinian security sector under local ownership. Drawing on 40 interviews, we argue that the mission can be considered effective and locally owned only from a narrow technocratic perspective, which denies the political reality of continued occupation and absence of democracy. A broader analysis, which includes the voices of ordinary Palestinians, reveals that EUPOL COPPS contributed to the professionalization of authoritarian policing under continued Israeli occupation. Our findings show the limits of technocratic approaches to peacebuilding interventions and call for a stronger engagement with the ultimate beneficiaries of peacebuilding missions.  相似文献   
558.
Since the 2003 war in Iraq, private military and security companies (PMSCs) have become increasingly legitimate actors in modern conflicts. Despite this normative shift, rumours in March 2015 regarding the use of South African mercenaries in Nigeria to combat Boko Haram insurgents caused an international outrage, while the Nigerian government remained nonchalantly silent on the matter. This article investigates the impact of mercenaries on the conflict in the last six months of the Jonathan government. Using primary and secondary qualitative research, it assesses the role that PMSCs played in Nigeria’s counterinsurgency strategy, along with the ensuing reaction of international and local media to the outsourcing of violence to foreign companies. The article concludes that – notwithstanding the improved image of PMSCs in the world, and the actual impact of the contractors on the Nigerian counterinsurgency effort – the stigma of mercenaries continues to plague the industry, particularly on the African continent.  相似文献   
559.
梁晓波  武啸剑  曾广 《国防科技》2018,39(3):017-026
话语体系是当今人文社会科学研究的热词,也已成为影响国家安全的一个重要因子。论文首先介绍话语体系的概念及其特点,报告了话语体系研究的缘起和发展脉络、主要学科与核心关键词以及主要相关文献,并对当前研究现状进行总结。分析了话语体系与国家的关系,并从国家的主体思想、发展道路、身份特质、文化自信、文明追求、话语权等方面阐述了话语体系对国家安全的重要性。论文指出,话语体系是影响国家安全的重要领域,也是国家之间博弈的重要阵地。  相似文献   
560.
王亮  贺朗月  牛敬华 《国防科技》2018,39(2):065-073
随着地理观测技术、计算机网络和地理信息系统、社会调查统计的迅速发展,具有空间位置的自然环境数据正在急剧增长,上升到大数据级别。而传统的数据库已经无法满足现有地学大数据的规模和增长速度。在资源访问方面,人们更加担心数据安全与隐私保护问题。由于数据交易的双方和交易中介都是互不信任的,这显然不利于数据的共享与流通,将阻碍地学大数据产业的发展。常用地学数据管理系统主要由单一机构进行维护管理,在多方用户参与的情形下,由于无法信任数据库中的数据,每一方用户都需要一个专用数据库,这样不同数据库之间数据的差异将产生繁琐的争议。区块链的到来却给这一问题的解决带来了希望,区块链技术实现了不完全可信网络环境中的可信数据管理,具有去中心化、防篡改、不可抵赖、完整性等特性,从而为解决目前依靠中心或第三方机构存在的高成本低效率和信息安全问题提供了切实的方法。本文从区块链的共识机制、智能合约、身份验证、数据溯源等方面进行阐述,并重点分析区块链如何解决流通和共享数据的问题,让地学大数据真正得以广泛应用。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号