首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   74篇
  免费   18篇
  国内免费   3篇
  2019年   1篇
  2018年   3篇
  2017年   3篇
  2016年   6篇
  2015年   5篇
  2014年   8篇
  2013年   15篇
  2012年   3篇
  2011年   10篇
  2010年   4篇
  2009年   3篇
  2008年   4篇
  2007年   3篇
  2006年   6篇
  2005年   6篇
  2004年   4篇
  2003年   2篇
  2002年   2篇
  2001年   2篇
  1998年   3篇
  1993年   2篇
排序方式: 共有95条查询结果,搜索用时 15 毫秒
81.
Analysis of the failures of African security forces generally focuses on structural issues such as corruption of senior leadership, insufficient equipment and training, and coup d’état fears driving mistrust of armies that are too strong or effective. However, less examined is the role that sub-state identity plays; using Libya, South Sudan, and Mali as case studies, this paper examines how ethnicity inhibits the development of national armies, divides them, and exposes a critical flaw that adversaries are able to exploit. Given the increasingly ethnic nature of conflict throughout the world, and the rising threat that ethnic conflicts in Africa pose to regional and Western partners, it may be prudent for researchers, policymakers and other stakeholders to examine the critical role that sub-state identity plays in undermining African security forces.  相似文献   
82.
大学生专业认同研究   总被引:1,自引:0,他引:1  
大学生的专业认同对大学生所学专业的兴趣和深入程度有重要影响。本文采用大学生专业认同调查问卷了解了学生当前专业认同的现状,并探讨了造成现状的原因。研究发现女生的专业发展认同显著高于男生;在年级上,专业身份认同存在差异,大一学生的专业身份认同得分高于大二学生;在地域差异上,专业身份认同和专业发展都存在显著差异。  相似文献   
83.
We prove a Chernoff‐type upper variance bound for the multinomial and the negative multinomial distribution. An application is also given.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 179–183, 2014  相似文献   
84.
概括介绍"心脏出血"漏洞的基本概念、发现和公布、攻击和演变、处理和防范等有关情况,从安全通信协议软件、开源软件地位作用、开源软件代码管理和开源软件分析运用等方面分析特点并提出对策建议。  相似文献   
85.
基于智能卡的身份认证在军事领域中具有广泛的应用前景,由于军事信息具有高度的敏感性与机密性,传统的、静态的、单向的身份认证方案不能满足军事应用的需求,通过对几种认证方案的研究,提出了一种基于RSA密码体制的实时的、动态的、极小泄漏的双向身份认证方案,不仅证明了它的完备性,并对其安全性进行了分析,结果表明它具有比以上几种认证方案更高的安全性.  相似文献   
86.
The paper considers the open shop scheduling problem to minimize the make-span, provided that one of the machines has to process the jobs according to a given sequence. We show that in the preemptive case the problem is polynomially solvable for an arbitrary number of machines. If preemption is not allowed, the problem is NP-hard in the strong sense if the number of machines is variable, and is NP-hard in the ordinary sense in the case of two machines. For the latter case we give a heuristic algorithm that runs in linear time and produces a schedule with the makespan that is at most 5/4 times the optimal value. We also show that the two-machine problem in the nonpreemptive case is solvable in pseudopolynomial time by a dynamic programming algorithm, and that the algorithm can be converted into a fully polynomial approximation scheme. © 1998 John Wiley & Sons, Inc. Naval Research Logistics 45: 705–731, 1998  相似文献   
87.
We develop polynomial algorithms for several cases of the NP-hard open shop scheduling problem of minimizing the number of late jobs by utilizing some recent results for the open shop makespan problem. For the two machine common due date problem, we assume that either the machines or the jobs are ordered. For the m machine common due date problem, we assume that one machine is maximal and impose a restriction on its load. © 1998 John Wiley & Sons, Inc. Naval Research Logistics 45: 525–532, 1998  相似文献   
88.
The rise of private military and security companies (PMSCs) challenges our notion of military professionals. PMSCs bring new claims to professional status and legitimacy outside military institutions and represent an increasing diffusion of - and competition over - military and security expertise. In light of this development, understanding the formation of professional identities in military and private security organisations is as an important undertaking. This paper contributes to this endeavour by analysing professional self-images in the Swedish Armed Forces and how these relate to PMSCs. The study is based on data collected from official documents, semi-structured interviews and a small-scale survey among senior military officers. Focusing on military understandings of PMSCs and contractors, the analysis provides much-needed insight into relational aspects of professional identity formation outside the US context. Furthermore, it points to discrepancies in organisational and group levels in understandings of commercial security actors, and paves the way for future research.  相似文献   
89.
基于3D-IC技术实现的3D SRAM,其电路中使用了大量的TSV。目前TSV制造工艺尚未成熟,使得TSV容易出现开路或短路故障,从而给3D SRAM的测试带来新的挑战。现有的2D BIST测试方式能够探测到3D SRAM中存在的故障,但并不能判定是TSV故障还是存储器本身故障;TSV专用测试电路虽然能够探测出TSV的故障,但需要特定的测试电路来实现,这就增加了额外的面积开销,同时加大了电路设计复杂度。基于此,本文提出了一种使用测试算法来探测TSV开路故障的方法,在不使用TSV专用测试电路且不增加额外面积开销的情况下通过BIST电路解决3D SRAM中TSV的开路故障检测问题。结果显示该TSV测试算法功能正确,能够准确探测到TSV的开路故障,并快速定位TSV的开路位置。  相似文献   
90.
The paper analyzes the effects of military spending on economic growth in a small open stochastic endogenous growth model involving the supply-side and demand-side effects produced by military spending. We show that a rise in the military spending affects economic growth through four channels, including the crowding-out effect, the spin-off effect, the resource mobilization effect, and the portfolio effect. The net effect which depends on these four channels is ambiguous. Hence, we demonstrate that there exists an optimal defense burden that maximizes the economic growth rate.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号