首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   180篇
  免费   8篇
  2023年   1篇
  2021年   1篇
  2020年   2篇
  2019年   3篇
  2018年   1篇
  2017年   2篇
  2016年   3篇
  2015年   1篇
  2014年   22篇
  2013年   9篇
  2012年   5篇
  2011年   27篇
  2010年   28篇
  2009年   20篇
  2008年   21篇
  2007年   8篇
  2006年   7篇
  2005年   1篇
  2004年   9篇
  2002年   2篇
  2001年   5篇
  1999年   4篇
  1995年   1篇
  1994年   2篇
  1993年   1篇
  1989年   2篇
排序方式: 共有188条查询结果,搜索用时 15 毫秒
81.
This article sets out to investigate the current paradoxical roles of border control agencies in order to contribute to the theoretical debate on border porosity and related security issues in West Africa. The colonial demarcation of African borders accounts for their porous nature initially, as borderland populations challenged the unjust scission of their cultural, economic, geographical and geopolitical spaces. However, new forms of porosity also evolved over time, masterminded by new actors. Drawing on the Ghana–Togo border case, and through interviews, observation and documentary analysis, this article argues that border control agencies are partly responsible for the current border porosity and attendant security problems as their jurisdiction has shifted to a multi-layered border parasitism. The article is not, however, an attack on border law enforcement agencies; rather it attempts to explore their roles in shielding the region, already exposed to terrorism and piracy, from further security threats.  相似文献   
82.
Mixed censoring is useful extension of Type I and Type II censoring and combines some advantages of both types of censoring. This paper proposes a general Bayesian framework for designing a variable acceptance sampling scheme with mixed censoring. A general loss function which includes the sampling cost, the time‐consuming cost, the salvage value, and the decision loss is employed to determine the Bayes risk and the corresponding optimal sampling plan. An explicit expression of the Bayes risk is derived. The new model can easily be adapted to create life testing models for different distributions. Specifically, two commonly used distributions including the exponential distribution and the Weibull distribution are considered with a special decision loss function. We demonstrate that the proposed model is superior to models with Type I or Type II censoring. Numerical examples are reported to illustrate the effectiveness of the method proposed. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004  相似文献   
83.
多样化军事任务纪检监察工作应把握以下着力点:把严格执行和维护各项纪律作为纪检监察工作的首要任务,确保部队令行禁止;把确保打赢作为纪检监察工作的根本目标,坚持正确的思想方法;把坚持依法执行任务作为纪检监察工作的重点环节,确保政策法规落到实处;把加强纪检监察队伍自身建设作为发挥职能作用的重要前提,建立完善的组织机构和工作机制。  相似文献   
84.
Following work of Stroud and Saeger (Proceedings of ISI, Springer Verlag, New York, 2006) and Anand et al. (Proceedings of Computer, Communication and Control Technologies, 2003), we formulate a port of entry inspection sequencing task as a problem of finding an optimal binary decision tree for an appropriate Boolean decision function. We report on new algorithms for finding such optimal trees that are more efficient computationally than those presented by Stroud and Saeger and Anand et al. We achieve these efficiencies through a combination of specific numerical methods for finding optimal thresholds for sensor functions and two novel binary decision tree search algorithms that operate on a space of potentially acceptable binary decision trees. The improvements enable us to analyze substantially larger applications than was previously possible. © 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011  相似文献   
85.
创新兵种战术学研究生培养机制是为公安边防部队造就具备指挥作战及管理能力的高素质复合应用型人才的重要保证。在兵种战术学研究生的培养过程中应转变理念,推动兵种战术学研究生教育转型,把研究生培养成"理论水平高、实战能力强"的高层次应用型复合型人才。研究生教育必须以部队战斗力建设为指针,把边防部队对研究生培养的满意程度作为评价研究生教育质量的惟一标准。  相似文献   
86.
随着公安边防检查站信息化建设的不断推进,基层边防检查站暴露出了大量信息安全隐患,并发生了多起信息安全事故。针对边防检查站信息安全建设中普遍存在的问题,提出了提高官兵信息安全意识、构建信息安全技术人才保障体系、健全信息安全管理机构等措施,以期为边防检查站信息安全建设提供借鉴。  相似文献   
87.
中国丰富的边防实践以及边防安全稳定所面临的机遇和挑战,为边防学研究提供了丰富的素材和重要的契机,也是边防学研究的价值所在。作为一门研究边防现象、边防规律和边防对策的专门学问,边防学既古老又年轻,也是一门边缘学科。这门学科与军事学、政治学、法学有着密切的亲缘关系,但这并不妨碍它拥有本学科独特的范畴和概念体系。这一概念体系应当围绕边防系统、边防空间、边防主体、边防行为、边防对象等基本范畴进行建构。  相似文献   
88.
比例原则是边防行政执法的一项重要指导原则,对于实现边防行政执法的公平与正义,保护边防行政执法相对人的合法权益,节省社会资源,提高边防行政执法的效率,促进政府职能转变,乃至构建和谐边境都具有重大意义;在边防行政执法中贯彻比例原则,主要从规范边防行政执法、加强监督、规范自由裁量权、完善救济途径等方面入手。  相似文献   
89.
This paper deals with an inspection game of customs and a smuggler. The customs can take two options of assigning a patrol or not. The smuggler has two strategies of shipping its cargo of contraband or not. Two players have several opportunities to take actions during a limited number of days. When both players do, there are some possibilities that the customs captures the smuggler and, simultaneously, the smuggler possibly makes a success of the smuggling. If the smuggler is captured or there remain no days for playing the game, the game ends. In this paper, we formulate the problem into a multi‐stage two‐person zero‐sum stochastic game and investigate some characteristics of the equilibrium solution, some of which are given in a closed form in a special case. There have been some studies so far on the inspection game. However, some consider the case that the smuggler has only one opportunity of smuggling or the perfect‐capture case that the customs can certainly arrest the smuggler on patrol, and others think of a recursive game without the probabilities of fulfilling the players' purposes. In this paper, we consider the inspection game taking account of the fulfillment probabilities of the players' aims. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2006  相似文献   
90.
A simultaneous non‐zero‐sum game is modeled to extend the classical network interdiction problem. In this model, an interdictor (e.g., an enforcement agent) decides how much of an inspection resource to spend along each arc in the network to capture a smuggler. The smuggler (randomly) selects a commodity to smuggle—a source and destination pair of nodes, and also a corresponding path for traveling between the given pair of nodes. This model is motivated by a terrorist organization that can mobilize its human, financial, or weapon resources to carry out an attack at one of several potential target destinations. The probability of evading each of the network arcs nonlinearly decreases in the amount of resource that the interdictor spends on its inspection. We show that under reasonable assumptions with respect to the evasion probability functions, (approximate) Nash equilibria of this game can be determined in polynomial time; depending on whether the evasion functions are exponential or general logarithmically‐convex functions, exact Nash equilibria or approximate Nash equilibria, respectively, are computed. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 139–153, 2017  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号