排序方式: 共有51条查询结果,搜索用时 0 毫秒
21.
程洪宝 《中国人民武装警察部队学院学报》2008,24(1):64-66
村民自治对农村社会稳定起着正面效应;异化的村民自治对农村社会稳定起着负面效应。鉴于此,为在农村社会发展中实现农村社会稳定,就要不断强化其正面效应,弱化其负面效应。 相似文献
22.
面对复杂严酷的战场环境,红外成像精打产品的智能化水平和抗干扰能力是产品生存的重要因素,而图像大数据技术是红外成像精打产品提升技术能力的重要保障。本文结合红外成像精打产品智能化能力提升的需求,提出了面向精打产品的图像数据获取、历史数据及新增数据治理、数据挖掘应用的全过程实用方法,实现了特定目标红外图像数据增补及海量图像数据的高效管理与智能应用;并在图像大数据的支持下,研发了智能信息处理算法性能评价平台和目标检测算法,有效提升了精打产品的智能化水平和实际应用能力。开展基于实际应用需求的图像数据采集、治理和应用技术研究是提升精打产品性能的重要途径,也能够为智能信息处理技术在精打产品上的落地应用提供有力支撑。 相似文献
23.
张倩倩 《兵团教育学院学报》2010,20(2):16-19
人性善恶问题,一个千古争论的哲学命题。本文将以文学作为视角,分别从作品中英雄人物形象、作者文学创作动机两个方面,对这一问题作出较新的阐释。从而得出结论:在人的本质属性中,善与恶是对立统一的。但人类总可以避恶扬善,以谋求自身的存在和发展。 相似文献
24.
Enock Ndawana 《African Security Review》2013,22(3-4):253-277
ABSTRACTThis article uses the case of illegal street vending in Harare to explore the interface between urban governance and politics. Drawing on the ideas of urban governance and informal governance, it illustrates how polarisation between the opposition political party Movement for Democratic Change-dominated municipal council and the Zimbabwe African National Union Patriotic Front-led government is affecting governance in general and in particular Harare municipality’s ability to handle the illegal street vending problem. While the paper essentially identifies political expediency as the major reason why a lasting solution is elusive in handling the illegal street vending problem, it acknowledges that there are broad reasons for its persistence. Consequently, the article demonstrates some of the reasons why illegal street vending is difficult to end using the conventional methods and provides some alternatives. 相似文献
25.
Laura Freeman 《Small Wars & Insurgencies》2013,24(5):790-810
To date, warlordism in Africa has been viewed solely negatively. This has come about, in part, because of the analytical lenses that have been used. Typically, warlordism has been examined at the state level; and behavioural traits, rather than definitionally necessary components, have been the focus. In effect, ‘warlord’ has been confused with other violent actors. I suggest here a reconceptualisation ‘from below’, which takes into account variation in types of warlordism, and which allows for both positive and negative effects of warlordism on society and the state. 相似文献
26.
In this article, we consider an online retailer who sells two similar products (A and B) over a finite selling period. Any stock left at the end of the period has no value (like clothes going out of fashion at the end of a season). Aside from selling the products at regular prices, he may offer an additional option that sells a probabilistic good, “A or B,” at a discounted price. Whenever a customer buys a probabilistic good, he needs to assign one of the products for the fulfillment. Considering the choice behavior of potential customers, we model the problem using continuous‐time, discrete‐state, finite‐horizon dynamic programming. We study the optimal admission decisions and devise two scenarios, whose value functions can be used as benchmarks to evaluate the demand induction effect and demand dilution effect of probabilistic selling (PS). We further investigate an extension of the base MDP (Markov Decision Process) model in which the fulfillment of probabilistic sales is uncontrollable by the retailer. A special case of the extended model can be used as a benchmark to quantify the potential inventory pooling effect of PS. Finally, numerical experiments are conducted to evaluate the overall profit improvement, and the effects from adopting the PS strategy. © 2014 Wiley Periodicals, Inc. Naval Research Logistics, 61: 604–620, 2014 相似文献
27.
28.
David J. Lonsdale 《Journal of Military Ethics》2020,19(1):20-39
ABSTRACT Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. The onset of this new instrument in national security has implications for conflict thresholds and military ethics. To serve as a legitimate tool of policy, cyber attack must operate in accordance with moral concerns. To test the viability of cyber attack, this paper provides a new perspective on cyber ethics. Cyber attack is tested against the criteria of the common good. This involves identifying the four core components of the common good from a conflict perspective: respect for the person; social wellbeing; peace and security; and solidarity. The fate of these components is assessed in relation to the six key characteristics of cyber attack from a moral standpoint: security; the role or absence of violence; discrimination; proportionality; cyberharm; and the threshold of conflict. It is concluded that the common good must be incorporated into developing state cyber strategies. 相似文献
29.
Raymond Hinnebusch 《Small Wars & Insurgencies》2018,29(3):391-413
AbstractThe problematic export of the Westphalian system to MENA is examined, taking Syria as exemplar. The export model is juxtaposed to actual non-lineal trajectories, semi-sovereignty and hybrid or failing states. This is manifested in post-uprising Syria in failing statehood, fragmented and overlapping governance, permeable and collapsing borders, the loss of sovereignty to trans-state movements, “competitive regime-building” between the Asad regime and jihadist warlords, and “competitive interventionism” by external powers filling the governance vacuum with their own proxies. The result is heterarchic zones of limited statehood in which state sovereignty is contested by both international (supra-state) penetration and sub-state fragmentation. 相似文献
30.
公共政策,既是时代的产物,又为时代服务。新时代要求公共政策的创新必须更加聚焦,一切以调动广大人民群众的积极性,增强民族的凝聚力、创造力为出发点;要求公共政策的创新以人民为中心,一切以人民是否满意,是否具有获得感、幸福感、安全感、自豪感为落脚点;要求公共政策的创新,应当以社会问题为重点,以推动解决主要矛盾、化解社会各领域的主要问题为根本要求;要求公共政策的研究应当提高定位、开阔视野,跟上时代步伐,多出系统性、前瞻性研究成果和高质量研究人才,为党和国家的科学决策贡献更多的智慧力量。 相似文献