首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   225篇
  免费   9篇
  国内免费   5篇
  239篇
  2023年   1篇
  2022年   1篇
  2021年   3篇
  2020年   7篇
  2019年   13篇
  2018年   20篇
  2017年   19篇
  2016年   25篇
  2015年   9篇
  2014年   24篇
  2013年   73篇
  2012年   5篇
  2011年   11篇
  2010年   4篇
  2009年   4篇
  2008年   1篇
  2007年   2篇
  2006年   3篇
  2005年   4篇
  2004年   5篇
  2003年   3篇
  2002年   1篇
  1996年   1篇
排序方式: 共有239条查询结果,搜索用时 0 毫秒
41.
This article explains the demise of Sierra Leone's Revolutionary United Front (RUF) rebellion. It argues that the main cause of this fate was the group's relationship with its primary sponsor, Charles Taylor. The RUF's dependency on Taylor's patronage, coupled with the rebellion's weak organisational endowments harmed the group's prospects of success. Based on original research, the article shows how Taylor used the RUF as a strategic instrument for his own regional interests, which led to the group's unravelling. More broadly, the article speaks about proxy warfare in Africa and how the relationship between resource flows and rebellion are not always beneficial to rebels as one might expect.  相似文献   
42.
ABSTRACT

Sectarian militants have for years launched attacks from Pakistan across the border to Iran. Finding sanctuary in a neighbouring country can make the difference between success and failure for militants. Conventional wisdom holds that a lasting transnational militancy challenge would typically create serious interstate conflict. Militancy has triggered armed encounters between Iran and Pakistan. This article argues that despite some tension militancy has resulted in deeper cooperation in the ambivalent dyad. Both states’ overarching security concerns, having exhausted other options, the believed involvement of third-party states, and economic potential, have moderately alleviated negative pressure caused by militancy.  相似文献   
43.
This article examines the geopolitical dynamics associated with the African Union (AU) and United Nations hybrid operation in Darfur (UNAMID) from the start of the Darfur conflict in 2003 until the time when UNAMID became fully operational in 2011. It provides an overview of the complex forces and geopolitical dynamics that affected the deployment of UNAMID and shaped its unique hybrid character. It mainly highlights those primary geopolitical factors that hindered the full deployment of UNAMID. It is concluded that this period was a showcase for the newly established AU and its support for its member states, as well as a new approach for the international community to maintain international peace and security in alliance with regional organisations.  相似文献   
44.
ABSTRACT

An arms race in cyberspace is underway. US and Western government efforts to control this process have largely been limited to deterrence and norm development. This article examines an alternative policy option: arms control. To gauge whether arms-control models offer useful lessons for addressing cyber capabilities, this article compiles a new dataset of predominantly twentieth-century arms-control agreements. It also evaluates two case studies of negotiated agreements that regulate dual-use technologies, the 1928 Geneva Protocol prohibiting chemical- and biological-weapon use and the 1944 Chicago Convention on International Civil Aviation. The analysis underscores the limits of norm development for emerging technologies with both civilian and military applications. It finds lessons for developing verifiable, international cooperation mechanisms for cyberwarfare in the regulatory model of international aviation. Conventionally, arms-control agreements take advantage of transparent tests or estimates of arms. To restrict cyberwarfare activities, experts and policy makers must adapt arms-control models to a difficult-to-measure technology at an advanced stage of development and use. Further investigation of international regulatory schemes for dual-use technology of similar diffusion and development to the internet, such as international civil aviation, is needed.  相似文献   
45.
Recent scholarship has largely ignored systematic differences in the existential threats that nuclear-weapon possessors pose to other states. This study theorizes that the capacity to pose existential threats shapes nuclear-armed states’ willingness to use military force against one another. We explore three hypotheses regarding how nuclear-based existential threats can deter conflict or encourage it, including under the conditions proposed by the stability–instability paradox. We rely on a statistical analysis of nuclear-armed dyads from 1950 to 2001 and employ the Nuclear Annihilation Threat (NAT) Index to capture variation in the existential threats nuclear-armed states pose to one another. We find that being able to pose an existential threat to another state emboldens potential initiators to use military force but does not deter attacks. The emboldening effects are particularly strong under the hypothesized conditions of the stability–instability paradox. Our study provides unique contributions to ongoing debates over the political effects of nuclear weapons.  相似文献   
46.
This paper proposes a simple game-theoretic framework for analyzing the relationship between the government, industry and indigenous community, especially in the context of mounting violence surrounding displacement of indigenous communities by governments for the purposes of commercial use of their habitat. It specifically takes into account the possibility of alleged ‘nexus’ between the government and the industry and explores its implications on the level of allocation and utilities of the players. We find that the bias in allocation that occurs when the government and the industry enter a ‘nexus’ can be rectified when there is resistance from the indigenous groups. Moreover, rebellion is a dominant strategy of the indigenous community, irrespective of whether there is ‘nexus’ or not, and being in ‘nexus’ with the government is a best response for the industry. The unique SPNE occurs when there is ‘nexus’ between the industry and the government and resistance by the indigenous groups, corroborating the widespread allegations of ‘nexus’ and evidence of resistance worldwide. We also explore a few extensions of the basic model and present some narrative evidence in support of the theoretical model.  相似文献   
47.
The sword which is the subject of this article and which will be referred to as the Capel sword, is a fine example of what has become known as an Irish basket-hilt. Whilst there are other examples in existence, what makes this sword unique and particularly important is the fact that it is known to have been owned by two important Royalist military leaders, Lord Arthur Capel and Sir John Owen. These two extraordinary men came from different backgrounds but their fate was linked through circumstances beyond their control. The story this sword tells is one of comradeship, loyalty, total belief in a cause, betrayal and ultimate sacrifice.  相似文献   
48.
大量无人机和巡飞弹的参战成为亚美尼亚与阿塞拜疆在纳卡地区持续四十多天的冲突的焦点,引发世界各国对无人机作战应用的关注。本文回顾了冲突过程,对比了两国战损情况,介绍了主要参战无人机的技术指标与性能优势。无人机在冲突中能够实时获取高清战场图像,发挥情报侦察优势,对重点军事目标进行精准而有效的打击,发挥了较高的作战效能;同时,采取灵活高效的诱饵探测、饱和攻击以及心理威慑等战术,能够进一步提升无人机作战能力。通过分析纳卡冲突中无人机在性能、体系运用方面的不足,本研究提出应根据不同作战需求,在低烈度战争中发挥无人机性价比优势,现代空中作战开展近距支援作战,面向未来战争要在目标识别等方面发展智能信息处理技术,结合无人机不同功能构建新型无人机战术与作战体系,以实现无人机智能化作战。  相似文献   
49.
不确定条件下的不完备信息分析是多属性决策中的主要内容之一,Yang提出的证据推理方法可以较好地处理这类信息。研究了证据推理方法中不完备信息的影响因素,包括规则中的不完备信息,规则的权重以及规则的一致性,并以此为基础分析了评估结果中不完备信息的取值范围,得出了初步结论:评估结果中不完备信息的信度必然小于作为输入的规则中不完备信息中的较大者,但不一定大于其中的较小者。进一步分析了规则一致性的逻辑意义和几何意义,指出规则的一致性实际描述了规则之间的冲突程度。  相似文献   
50.
研究新公布的北斗民用导航电文中的两类历书与北斗二号导航电文历书的差异,对比分析各类历书对接收机首次定位时间的影响。利用实际的历书数据,比较不同历书类型的用户算法,分析不同龄期数据对接收机首次定位性能的影响。结果表明,高精度历书在1周的数据龄期内性能较为稳定,中等精度历书精度稍逊于高精度历书,但由于简化了电文空间,能接近高精度历书性能。简约历书进一步简化了参数数目和电文空间,尽管位置误差达到了数百千米,但却能在数月之后保持相应精度,有利于缩短接收机首次定位时间。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号