首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   204篇
  免费   5篇
  国内免费   1篇
  2024年   1篇
  2021年   2篇
  2020年   1篇
  2019年   13篇
  2018年   3篇
  2017年   9篇
  2016年   3篇
  2015年   2篇
  2014年   18篇
  2013年   107篇
  2012年   10篇
  2011年   3篇
  2010年   2篇
  2009年   2篇
  2008年   1篇
  2007年   4篇
  2006年   1篇
  2005年   7篇
  2004年   4篇
  2003年   4篇
  2002年   2篇
  2001年   4篇
  2000年   2篇
  1998年   1篇
  1997年   1篇
  1995年   1篇
  1992年   1篇
  1989年   1篇
排序方式: 共有210条查询结果,搜索用时 15 毫秒
41.
The Democratic People's Republic of Korea (DPRK) justifies its nuclear weapon arsenal with the concept of deterrence. It means that it will try to miniaturize and modernize its warheads and missiles. This leads to a first-use doctrine of nuclear weapons. Obama's policy of engagement does not offer a solution to the North Korean nuclear issue as yet. In the context of its policy of critical engagement with the DPRK, the European Union has three key interests: regional peace and stability, denuclearization, and human rights. The Conference on Security and Cooperation (CSCE) could be a precedent. The CSCE process was based on three “baskets”: security, economics, and humanitarian. The multilateral Trans-Pacific Partnership is a step in this regard. This article looks at three theoretical approaches: realism, liberal institutionalism, and liberal internationalism. It concludes that a political strategy to create a stable North Korean peninsula has to go beyond nuclear deterrence that is based on the realist notion of balance of power.  相似文献   
42.
核动力装置一回路辅助系统失水事故的仿真研究   总被引:5,自引:2,他引:3  
运用一种操作简便、计算速度快的工具软件对某核动力装置一回路辅助系统典型位置的失水事故进行了仿真.通过分析仿真结果得出不同位置的破口引起不同后果的事故,其中有些事故可以忽略,有些事故则相当严重.  相似文献   
43.
核电磁脉冲模拟器放电回路的数值分析   总被引:4,自引:1,他引:3  
介绍了核电磁脉冲模拟器的组成和主要参数,分析了核电磁脉冲模拟器回路的暂态过程,讨论了电路参数、火花电阻和陡化开关击穿时刻对脉冲波形的影响,并提出了改善输出波形的方法。  相似文献   
44.
International concern over nuclear terrorism has grown during the past few decades. This has driven a broad spectrum of efforts to strengthen nuclear security globally, including the widespread adoption of radiation-detection technology for border monitoring. Detection systems are now deployed at strategic locations for the purported purpose of detecting and deterring the smuggling of nuclear and radioactive materials. However, despite considerable investment in this area, few studies have examined how these programs are implemented or the operational challenges they face on a day-to-day basis. This article seeks to address this with a focus on radiation-detection efforts at maritime facilities. Utilizing practitioner interviews and a survey, this article identifies the factors that influence the planning and use of these systems in this fast-moving environment. The results clearly demonstrate that the implementation of these systems varies significantly across different national and organizational contexts, resulting in a fragmented global nuclear-detection architecture, which arguably undermines efforts to detect trafficked nuclear-threat materials. Greater consideration should therefore be given to developing international standards and guidance, designing and adopting tools to support key parts of the alarm assessment process, and broader sharing of good practice.  相似文献   
45.
This article argues that the nuclear nonproliferation norm (NNPN) is a social fact with a relatively independent life of its own and that it has a powerful impact on the behavior of both nuclear-weapon states (NWS) and non-nuclear-weapon states (NNWS). It challenges the application of critical constructivist research on norms to the NNPN and the idea that its legitimacy and structural power depend on contestation “all the way down.” State and non-state actors play an important role in explaining the dynamics of the NNPN, but agential constructivism runs the danger of “throwing the baby out with the bath water,” neglecting the structural impact of the NNPN on state behavior. The article examines the limitations of norm-contestation theory, arguing that some norms are more resistant to contestation than others. The NNPN is more difficult to contest than new norms (such as the Responsibility to Protect) because it is rooted in fifty years of nonproliferation nuclear diplomacy. The US-India nuclear deal is not a case of “norm change” but a violation of the NNPN. The “core” of the NNPN has not changed since the US-India nuclear deal. The conflict confronting NWS and NNWS is about the implementation of “type 2” norms (organizing principles) and “type 3” norms (standardized procedures), and not about the “hard core” of the NNPN.  相似文献   
46.
Nuclear deterrence requires not only the reliability of a state’s strategic weapons and the willingness of its leaders to employ them but also an adversary’s appreciation of these conditions. Weapons perceived as failing to hold their targets at risk may lack deterrent value, just as retaliatory threats that are not believable may fail to deter, even if a state’s operational capabilities are robust. Both the technical and political credibility of the US nuclear deterrent may have suffered self-inflicted harm since the end of the Cold War, often as casualties of intemperate policy debates. In particular, doubts have been sowed about the reliability of aging US warheads under a science-based stockpile-stewardship regime meant to substitute for nuclear-explosive testing. Likewise, the credibility of US deterrent threats may have waned as American leaders have spoken ever more stridently about the horrors of nuclear war and nuclear terrorism, underscoring their extreme aversion to the risk of nuclear attack. Diminished credibility in both spheres threatens to compromise US national-security objectives ranging from nuclear nonproliferation to the outcomes of nuclear crises.  相似文献   
47.
Why did the United States fail to stop Israeli acquisition of nuclear weapons? Existing research argues that patrons such as the U.S. should have an easy time halting proliferation by militarily and economically vulnerable clients. Nevertheless, Israel acquired nuclear weapons with relatively little American opposition. Utilizing extensive primary source research, we argue that problematic intelligence-policy relations hindered U.S. efforts to arrest Israeli proliferation as (1) policymakers often gave mixed guidance to the intelligence community, resulting in (2) limited information on Israeli efforts that reinforced policy ambiguity. The results carry implications for understanding the dynamics of nuclear proliferation and intelligence-policy relations.  相似文献   
48.
主要研究在高功率电磁环境下高空核爆到达导弹预设作战阵地近地面时的电磁脉冲环境。首先给出高空核爆电磁脉冲场近地面计算的理论基础,然后分析不同条件下近地面的电磁脉冲环境参数,编程实现了基于时域有限差分算法的电磁脉冲波形数值仿真,完成了多种特定预设战场环境下的电磁脉冲计算,最后给出由于电磁脉冲武器的发展和HEMP波形表述形式变化,给导弹武器系统抗电磁脉冲性能研究带来的影响和新动态趋势。结论认为:应加强对前沿更陡、强度更强电磁脉冲的抵抗能力,防御重点放在机动作战样式方面,提高战地战时抗毁生存能力。  相似文献   
49.
The revival of nuclear strategy in US policy and scholarship has been strengthened by arguments that the ‘nuclear revolution’ – the assumption that thermonuclear bombs and missiles had made major war too dangerous to wage – does not affect international behaviour as much as nuclear revolution advocates claim. This article shows that the Soviet leader Nikita Khrushchev indeed regarded nuclear war as too dangerous to wage, a decision which manifested itself not so much in foreign policy or military doctrine but in his determination to avoid war when the possibility arose. We argue that Khrushchev’s experience provides us with a more useful way to characterise the nuclear revolution and suggest some implications of this argument for contemporary debates about nuclear weaponry.  相似文献   
50.
Nuclear deterrence and cyber war seem almost antithetical in their respective intellectual pedigrees. Nuclear weapons are unique in their ability to create mass destruction in a short time. Information or “cyber” weapons, at least for the most part, aim at sowing confusion or mass disruption instead of widespread physical destruction. Nevertheless, there are some intersections between cyber and nuclear matters, and these have the potential to become troublesome for the future of nuclear deterrence. For example, cyber attacks might complicate the management of a nuclear crisis. As well, information attacks on command-control and communications systems might lead to a mistaken nuclear launch based on false warnings, to erroneous interpretations of data or to panic on account of feared information blackout. It is not inconceivable that future nuclear strike planning will include a preliminary wave of cyber strikes or at least a more protracted “preparation of the battlefield” by roaming through enemy networks to plant malware or map vulnerabilities.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号