排序方式: 共有168条查询结果,搜索用时 15 毫秒
41.
B.K. GREENER-BARCHAM 《Small Wars & Insurgencies》2013,24(1):90-112
Some scholars would have us believe that the distinctions between military and policing roles, methods and objectives have become increasingly blurred by the security demands of a post-Cold War and post-11 September global and domestic order. This article explores the current state of the police–military divide through a conceptual and case study analysis. It concludes that, in this case, there is some conflation occurring at a macro-level as international and domestic affairs have become increasingly indistinct, but the article also demonstrates that the actual ethos and practice of these agencies still differs strongly. Most importantly, the article argues that this distinction is in fact a very useful one in planning for future peace support operations 相似文献
42.
We analyze theoretically and empirically the effects of economic policy and the receipt of foreign aid on the risk of civil war. We find that aid and policy do not have direct effects upon conflict risk. However, both directly affect the growth rate and the extent of dependence upon primary commodity exports, and these in turn affect the risk of conflict. Simulating the effect of a package of policy reform and increased aid on the average aid recipient country, we find that after five years the risk of conflict is reduced by nearly 30%. 相似文献
43.
44.
在明确了\"工程化\"内涵的基础上,研究了美军依托联合能力集成与开发系统(Joint Capabilities Integrationand Development System,JCIDS)建立的与装备需求生成紧密相关的军队联合能力需求生成机制。指出该机制具有典型的工程化特征和很高的工程化程度,集中体现在程序、任务、方法、成果、描述和管理6个方面。逐一阐述了各个方面中蕴含的工程化思想和方法,对建立符合我军特点的装备需求工程学科有一定参考价值。 相似文献
45.
46.
对于高可靠、长寿命产品,基于性能退化数据分析可靠性是一种行之有效的技术途径。结合航空航天产品性能退化的机理与现场试验小子样的特点,建立了基于Normal-Poisson过程的性能退化模型。论文在对产品性能退化建模的基础上,结合Bayes方法给出了退化模型参数的估计算法和可靠性推断的公式,最后结合实例说明了方法的有效性。 相似文献
47.
计算机网络攻击效果评估技术研究 总被引:32,自引:0,他引:32
计算机网络攻击效果评估技术是信息系统安全评估中一个重要而具有挑战性的课题。目前 ,相关的理论尚不成熟 ,有关的研究报道较少。简要总结了当前已经存在的主要信息安全的评估方法 ,在此基础上 ,从便于实际度量和计算的角度出发 ,提出了基于网络信息熵的评估技术、基于系统安全层次分析的安全评估框架和基于指标分析的网络攻击效果综合评估技术等三种评估模型 ,并分析了各自在使用中应注意的问题 相似文献
48.
This article examines the historical impact of foreign fighters and how the international community has sought to counter this threat. It argues that foreign fighters have contributed significantly to the metastasis of Salafi-jihadism over the past 30 years. They have globalized local conflicts. They have brought advanced skills to battlefields. Further, the logistics infrastructure built by foreign fighters has allowed Salafi-jihadism to expand rapidly. The challenge for security officials today is how to prevent the foreign fighters in Syria and Iraq from expanding the threat of Salafi-jihadism further. To inform this effort, this article derives lessons learned from past efforts against Arab Afghans in Bosnia (1992–1995) and Abu Musab al-Zarqawi’s foreign volunteers in Iraq (2003–2008). 相似文献
49.
本文以美国陆军通用基金企业业务系统为研究对象,从后勤信息化建设发展历程、 军费企业化管理特点和陆军财务转型重要举措三个方面介绍了该系统建设的有关背景,总结了与\"军财工程\"相比,通用基金企业业务系统存在的分配多个用户角色、实时共享数据和重视成本文化等多个突出特点,并提出与军队财务管理信息系统建设有关的六点启示,以期为推进... 相似文献
50.
发展语言智能处理技术是全球新军事科技研发的重要趋势.美军在几十年的发展过程中,不遗余力地推进新的语言智能技术的研发与应用.在人工智能宏观政策和举措的带动下,美国政府与军方在语言智能领域采取了较为清晰的战略路线:明确需求方向,注重长远规划;重视军民融合,调动地方研发活力;创新技术研发资金的管理模式,提高发展效率;推动技术... 相似文献