首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   236篇
  免费   24篇
  国内免费   15篇
  2021年   6篇
  2020年   10篇
  2019年   9篇
  2018年   14篇
  2017年   14篇
  2016年   9篇
  2015年   7篇
  2014年   32篇
  2013年   40篇
  2012年   7篇
  2011年   28篇
  2010年   19篇
  2009年   13篇
  2008年   15篇
  2007年   13篇
  2006年   18篇
  2005年   4篇
  2004年   4篇
  2003年   1篇
  2001年   1篇
  1998年   1篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1990年   3篇
  1989年   3篇
排序方式: 共有275条查询结果,搜索用时 15 毫秒
261.
联合国维和任务日益复杂,维和警察在任务区面临的危险无法预知。从维和培训以及任务区执法着手,通过合理的安全教育,有助于不断提高维和警察的安全意识和白我防护能力。  相似文献   
262.
公安文化理论是公安工作、公安文化实践的理论阐述,公安文化理论的创造活力与创新精神,对公安工作和公安队伍建设发挥着积极作用。公安文化软实力是一个在新的学术背景和文化发展战略中的关注度高、研究度高的新课题,提升公安文化软实力,必将对公安队伍建设、对公安文化的普及与提高发挥更重要的作用。  相似文献   
263.
深化对初级任职教育培训的改革与探索,需要针对任职教育特点,深入抓好“四个转变”;破解制约建设发展因素,明确搞好“三个关系”;积极推动教学改革,努力做到“三个坚持”。  相似文献   
264.
公安边防派出所辖区刑事情报的收集是一项十分重要的基础工作。针对公安边防派出所在辖区刑事情报收集工作中存在的问题,提出提高素质,苦练“基本功”;加强协作,实现信息共享;密切联系,充分调动群众积极性;规范管理,强化秘密力量作用;深入发掘,积极拓宽收集渠道;改变观念,以情报主导侦查等对策。  相似文献   
265.
信息对抗行动是陆军作战的重要行动之一,对陆军作战进程和结局影响重大。通过对信息进攻、信息防御和信息保障等主要内容的定性与定量分析,建立评估指标体系、评估数学模型,得出综合评估结果,为指挥员和指挥机关筹划后续行动提供可靠依据,使效果评估工作更加合理准确。  相似文献   
266.
Consider a set of product variants that are differentiated by some secondary attributes such as flavor, color, or size. The retailer's problem is to jointly determine the set of variants to include in her product line (“assortment”), together with their prices and inventory levels, so as to maximize her expected profit. We model the consumer choice process using a multinomial logit choice model and consider a newsvendor type inventory setting. We derive the structure of the optimal assortment for some important special cases, including the case of horizontally differentiated items, and propose a dominance relationship for the general case that simplifies the search for an optimal assortment. We also discuss structural properties of the optimal prices. Finally, motivated by our analytical results, we propose a heuristic solution procedure, which is shown to be quite effective through a numerical study. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
267.
This paper derives optimal policies for when to hire, train, and lay off employees in service organizations when worker productivity appreciates deterministically or stochastically under constant, monotonic, and cyclic service demand. The model, an extension of the machine replacement problem from the engineering economy literature, uses infinite horizon linear programming to produce optimal personnel planning strategies and dual prices that characterize the workforce's economic value. The effect of employee attrition is also considered. In its valuation of human assets, unlike pure accounting approaches that only try to measure, this paper proposes an approach to capture the interaction between firm decisions pertaining to human resources and human resource value. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
268.
ABSTRACT

This article analyses the positions of the Chinese civilian leaders and military elites on Military Operations Other Than War in order to shed light on their preferences about the use of the armed forces in foreign policy between the late 1990s and the early 2010s. Over time, a significant divergence developed between civilians and soldiers until 2011, when the Libyan crisis happened. The study also prompts important considerations about our understanding of civil–military relations in China and future role of the People’s Liberation Army as a tool of statecraft in foreign policy.  相似文献   
269.
ABSTRACT

Despite its portrayal as something new, the concept of the ‘gray zone’ is not novel. It was the Cold War battleground in which the USA and the Soviet Union waged rival unconventional campaigns, and it was there that the newly formed Central Intelligence Agency (CIA) was given responsibility for operating. This was not the organization’s original purpose, but Cold War exigencies forced Washington to improvise and build an organization with unique capabilities. These early years shaped the CIA’s operations directorate, creating two distinct cultures within the larger agency, one focused on intelligence collection and the other focused on covert action.  相似文献   
270.
ABSTRACT

Under what conditions are cyber-weapons effective in nuclear counter-proliferation? With continued interest in nuclear proliferation professed by Iran, North Korea, and Saudi Arabia, a discussion of the effectiveness of counter-proliferation measures remains relevant. Cyber-attacks as military option in a state-on-state conflict still requires additional corroborating evidence to make conclusions about its long-term effectiveness. This work analyses the general applicability of cyber-weapons and their usefulness in nuclear counter-proliferation. Through a comparative case study of Operation Orchard, Stuxnet, and recent “Left-of-Launch” operations against North Korea, the essay finds that cyber-operations are not particularly effective against nuclear programmes that are in the later stages of their development. They can disrupt and delay a nuclear programme temporarily, if the attack remains clandestine, but cannot halt nuclear proliferation all together. However, effectiveness increases if they are used in combination with conventional weapons. The article addresses a topic of interest to national-level decision-makers: whether cyber-operations can and should play a role in nuclear counter-proliferation.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号