首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   184篇
  免费   45篇
  国内免费   25篇
  2022年   1篇
  2021年   7篇
  2020年   13篇
  2019年   9篇
  2018年   10篇
  2017年   16篇
  2016年   9篇
  2015年   9篇
  2014年   18篇
  2013年   35篇
  2012年   11篇
  2011年   17篇
  2010年   9篇
  2009年   14篇
  2008年   11篇
  2007年   9篇
  2006年   17篇
  2005年   8篇
  2004年   5篇
  2003年   1篇
  2002年   5篇
  2001年   1篇
  2000年   1篇
  1999年   3篇
  1997年   2篇
  1995年   2篇
  1993年   2篇
  1992年   2篇
  1991年   1篇
  1990年   3篇
  1989年   3篇
排序方式: 共有254条查询结果,搜索用时 15 毫秒
61.
遂行非战争军事行动训练是公安现役部队教育训练的重要内容。近年来其训练效果在公安现役部队履职实践中得到了良好的体现。但面对日益复杂的斗争形势,公安现役部队在进行常规训练的同时,应更加突出应急训练、联合训练和心理训练,以更好地完成党和人民赋予的神圣使命。  相似文献   
62.
近年来我国公路隧道的建设迅速发展,然而公路隧道由于空间相对封闭,发生火灾情况下的烟气排除成为了难点。结合公路隧道通风排烟方式,探讨临界风速在隧道火灾排烟时的应用,并分析了公路隧道纵向空气流对火灾烟气流动的影响,指出不同流速的空气流对火灾烟气的影响效果不同,同时阐述了隧道内移动风机的气流环流现象。最后提出了基于不同火灾位置的排烟方案,为消防部队隧道火灾的排烟战术提供参考。  相似文献   
63.
由于移动Ad Hoc网络具有无需基础设施,可以快速部署,很难完全被摧毁等优点,被作为数字化战场通信的优先选择,设计实现了一种适用于低速率移动Ad Hoc网络的安全路由协议——LSRP,它适用于分层架构的低速移动电台自组网,可以在网络资源有限的情况下,防御来自外部和内部两方面的攻击。LSRP协议利用分布式门限RSA签名方案来阻止非授权接入,防范来自网络外部的攻击;利用邻节点信任度评估机制,进行恶意节点检测和剪除,防范来自网络内部的攻击,增强了网络的安全性。  相似文献   
64.
针对放大转发协议下双向中继网络移动级联信道,为了分析其统计特征,结合用户完成信息交互的过程,将移动级联信道分解为传输部分和干扰部分两个时间过程。依据它们的双高斯乘积特点,分别给出了对应的一阶概率密度分布、二阶自相关函数和多普勒功率谱的表达式。与此同时,通过采用Gamma分布对级联信道进行了概率近似,得到了描述移动级联信道时变特性的电平通过率和平均衰落时间等指标的近似计算式。借助数值仿真验证了上述表达式的正确性。  相似文献   
65.
The creation of an African Capacity for Immediate Response to Crisis (ACIRC) is a sign of Africa's willingness to take its destiny into its own hands. Presented as a reaction to the slowness of the development of the African Standby Force (ASF), it is also a response to some of the ASF's conceptual weaknesses. This decision reflects a wish to establish an instrument better equipped to deal with the challenges Africa is facing. Departing from the (sub)regional logic of the ASF results from a desire to take into account the transnational nature of threats, while its enlarged mandate is meant to offer Africa the capacity to intervene in all kinds of conflicts, including by undertaking peace enforcement activities. But the obstacles on the road towards the actual creation and mobilisation of this capacity should not be underestimated. These include material difficulties, but also political tensions, between ‘small’ and ‘big’ states as well as between the African Union and subregional organisations. The risk then is high that the ACIRC, whose announcement came as a reaction to France's intervention in Mali, ends up joining the ranks of the many ‘anti-imperialist’ phantoms haunting the history of the Organization of African Unity/African Union (OAU/AU). Confronted by events considered ‘neocolonial’ initiatives, African actors have indeed traditionally reacted by launching grand projects that never got off the ground. However, by actually establishing this new instrument, they may also demonstrate that times have definitively changed.  相似文献   
66.
Abstract

The mandate of South Africa's recently appointed National Planning Commission includes addressing ‘defence and security matters’. This article seeks to outline the central elements of the threat environment facing South Africa in the foreseeable future. It is argued that South Africa faces no meaningful existential threat from conventional military forces but that its security forces will need to be prepared to address possible raids and attacks by conventional military forces both on home soil and on vital interests beyond the nation's borders. Other threats highlighted include the threats posed by potential insurgencies, by terrorism, and by crime, social unrest and banditry. Also addressed is the danger of so-called hybrid threats, in which two or more of the single threat types outlined here are combined. Finally, the article challenges the National Planning Commission to rethink South Africa's policy on peace operations in the light of the need to ensure the safety and security of the nation's citizenry.  相似文献   
67.
In Africa, most of the present conflicts are civil, intra-state wars where belligerent groups use guerrilla tactics to achieve various political, economic or ideological objectives. The atrocities and the effect of these on-going wars on innocent civilians, human suffering, poverty and development are beyond comprehension. Not surprisingly, the majority of current peace operations are in Africa, with more than 70 countries contributing forces to these conflict zones. On the continent, South Africa has come to assume a leading role in peace operations and is now a major troop-contributing country to UN and AU missions. In the past 11 years, the South African National Defence Force (SANDF) has taken part in no fewer than 14 peace missions. This article provides a brief background of the conflicts in Burundi, the Democratic Republic of Congo (DRC) and Sudan, the different United Nations (UN) and African Union (AU) mandates under which peacekeepers had to operate as well as their objectives, and the extent of South Africa's involvement in the various missions. In the last section, the major challenges, that these operations have posed are highlighted.  相似文献   
68.
There is widespread acknowledgment that the modus operandi of jihadis affiliated with Al Qaeda and associated movements (AQAM) relies on brutal terror-inducing tactics which, more often than not, target Muslim and non-Muslim non-combatants. This article comparatively analyzes the AQAM modus operandi within the traditional stipulations of Islamic precepts with respect to waging jihad al saghir. The purpose is to glean whether or not such tactics such as suicide bombings, declaring fellow Muslim apostates in order to kill them, use of IEDs and EFPs to target civilians, constitute legitimate rules of engagement in jihad al saghir.  相似文献   
69.
Maritime interests in the twenty-first century are not immune to the growing number of irregular challenges and hybrid threats that have come to dominate land warfare. In order to better understand these challenges a study of naval history can help provide a vital foundation. In the early 1830s the United States Navy dispatched the frigate USS Potomac to Sumatra to investigate a pirate attack on the spice trader Friendship. Potomac's crew of sailors and Marines conducted a landing at the village Quallah Batoo and fought a pitched battle. As the navies of the world approach naval irregular warfare in the new century, studying past examples like Potomac's mission can help illuminate the principles of successful naval irregular warfare.  相似文献   
70.
网络学习模式识别移动代理因素提取方法研究   总被引:1,自引:0,他引:1  
从分析网络学习因素的角度出发,提出了利用数据融合理论和使用移动代理技术解决网络学习模式识别的问题。详细分析了网络学习模式中的主要因素,针对网络学习模式识别提出了使用移动代理(MA)进行因素提取的方法。同时运用数据融合技术中分布式缠绕判决模型进行描述,从而使有效地获取网络学习者的学习状态变为可能。也对网络学习因素提取MA的执行环境进行了具体阐述。设计了因素提取MA体系结构,分析了因素提取的执行过程,采用ATP层代理传输协议作为移动代理系统的应用层协议,负责学习模式识别的因素提取。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号