首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   228篇
  免费   11篇
  国内免费   2篇
  2022年   1篇
  2021年   1篇
  2020年   4篇
  2019年   8篇
  2018年   14篇
  2017年   20篇
  2016年   13篇
  2015年   4篇
  2014年   24篇
  2013年   126篇
  2012年   1篇
  2011年   3篇
  2010年   4篇
  2009年   3篇
  2008年   2篇
  2007年   2篇
  2006年   2篇
  2005年   5篇
  1998年   1篇
  1997年   1篇
  1991年   1篇
  1988年   1篇
排序方式: 共有241条查询结果,搜索用时 15 毫秒
31.
针对在大场景、高分辨率的光学遥感图像舰船目标检测中,传统的阈值检测方法效果不佳,而恒虚警法计算量大的缺点,研究一种根据检测舰船目标的特征,对每个可能的目标区域,快速计算检测阈值的方法。同时,研究基于RNN网络及信噪比的特征选择方法,对目标的特征进行优选并对候选目标进行鉴别。实验结果表明,采用本文方法进行舰船目标检测能获得较好的检测结果.  相似文献   
32.
Deploying cyber weapons to damage Industrial Control Systems (ICS) is relatively easy because such systems are insecure by design. Maintaining communication with an activated cyber weapon, and ensuring its persistence, is harder but feasible.  相似文献   
33.
National security conception or securitization theory frames threats and conceptualizes the responses towards them. But in many cases, and especially in the Israeli context, there is a tendency to blur the nature and essence of different threats; security threats become strategic threats and then existential threats. In the Israeli context, because the broad concept of security is perceived, in most cases, as equivalent to military security, the meaning of the strategic threat will be framed, mostly, militarily, derived from military thought.

The article examines the nature of existential threats in the Israeli context and seeks to find the implications of securitization theory in this regard by analyzing the unique role of the military establishment and the influence of the military thought on strategic thought in Israel. The article also deals with the centrality of ‘military wisdom’ in the Israeli ethos and the sense of insecurity embedded in the Israeli narrative that leads to an ‘intellectual symbiosis’ between the political and the military echelons and finds this phenomenon as one of the major explanations for the influence of the military establishment on defining the nature of security threats as well as on the crucial decision to launch wars.  相似文献   
34.
35.
This article explains the demise of Sierra Leone's Revolutionary United Front (RUF) rebellion. It argues that the main cause of this fate was the group's relationship with its primary sponsor, Charles Taylor. The RUF's dependency on Taylor's patronage, coupled with the rebellion's weak organisational endowments harmed the group's prospects of success. Based on original research, the article shows how Taylor used the RUF as a strategic instrument for his own regional interests, which led to the group's unravelling. More broadly, the article speaks about proxy warfare in Africa and how the relationship between resource flows and rebellion are not always beneficial to rebels as one might expect.  相似文献   
36.
Since the peace agreements of 2002–2003 which ended the second war in the Democratic Republic of Congo, reconstruction of the army has been an inherently political process, in common with other attempts to carry out security sector reform (SSR). This article briefly sketches out the Congolese army's history, then attempts to fill a gap in the literature on Congolese SSR by detailing what can be found of the actual structure and shape of the present army. The efforts that have been made to reform the army are then examined, followed by a conclusion which examines the major issues and possible ways forward.  相似文献   
37.
Following the emergence of a communist regime in South Yemen and the multiplication of subversive movements in the United Kingdom's Gulf protectorates, British policymakers genuinely feared the spread of communism throughout southern Arabia. Defeating the People's Front for the Liberation for the Occupied Arabian Gulf (PFLOAG) insurgency in Oman's Dhofar province was considered central to preventing such an outcome. In their pursuit of victory, British officers overthrew the sultan of Oman, escalated the war by conducting attacks in South Yemen, and, ultimately, appealed to Islam as a means of rallying support against communism. However, lessons learned in previous counterinsurgencies (Malaya, Kenya, and Borneo) proved of only limited value in Oman's physical and cultural environment. Unfortunately, none of these measures worked as anticipated. Only Iran's direct military intervention and the dramatic growth of Oman's financial resources after the 1973 oil crisis provided the resources to conduct large-scale offensive operations. Even so, victory was only achieved in 1975 because the rebellion's leaders unwisely attempted to oppose the Anglo–Omani offensives conventionally.  相似文献   
38.
安理会决议表达联合国的意见或意志,具有强制性和法律效力。以安理会第1509号决议为基础,对联合国利比里亚特派团的授权任务进行解析,并论述利政府和联合国利比里亚特派团面临的挑战和相应办法,利于我维和人员了解特派团任务进展情况,有利于更好地执行使命。  相似文献   
39.
通过文献和网络调查等方法,对英国警务情报教育培训机制、课程设置等内容进行了介绍和解析,力求通过研究英国警务情报教育培训的现状,为我国新兴的警务情报教育提供可资借鉴的内容和方法。  相似文献   
40.
联合国维持和平行动的法律性质在国际法学界一直存在争议。在维和行动与其他国际军事或准军事行动的辨析中我们可以看到维和行动自身所独具的法律特征。维和行动的法律依据尽管未有定论,但依据其实践与发展的现实状况,我们可以将它的法律性质概括为:联合国属准军事行动性质,国际法约定的默示授权性质,维护国家间独立平等的工具性质等。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号