首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   374篇
  免费   47篇
  国内免费   62篇
  2023年   1篇
  2022年   3篇
  2021年   4篇
  2020年   9篇
  2019年   5篇
  2018年   11篇
  2017年   22篇
  2016年   20篇
  2015年   11篇
  2014年   36篇
  2013年   40篇
  2012年   29篇
  2011年   31篇
  2010年   25篇
  2009年   40篇
  2008年   26篇
  2007年   28篇
  2006年   31篇
  2005年   32篇
  2004年   23篇
  2003年   16篇
  2002年   8篇
  2001年   9篇
  2000年   1篇
  1999年   3篇
  1998年   4篇
  1997年   1篇
  1996年   2篇
  1994年   2篇
  1993年   3篇
  1991年   1篇
  1990年   3篇
  1989年   2篇
  1988年   1篇
排序方式: 共有483条查询结果,搜索用时 15 毫秒
321.
在新形势下,心理学知识与思想政治教育结合是一个必然的发展趋势。在思想政治教育中引入心理学,既尊重思想政治教育者的客观性,又有助于科学的把握教育者与被教育者互动的心理规律。思想政治教育者在开展工作中善于分析高校学生的心理健康的原因,并且能够提出解决策略。努力提高自身的综合素质,重视情感因素,通过了解学生的个体差异、从众心理、逆反心理等更好的引导学生,培养学生健全的人格和正确的思想认识方向,以实现思想政治教育的最终目标,提高当代大学生的全面素质。  相似文献   
322.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity.  相似文献   
323.
利用演化博弈理论,探讨了联合作战中担负相同作战任务的作战单元间其策略选择根据利益变化的演化过程,建立了复制动态方程并求得平衡点解,通过复制动态的相位图直观反映了博弈的演化稳定策略,并通过Malab软件对作战单元策略选择与收益关系进行了仿真,其行为选择的演化结果与相位图展示具有一致性。研究结论表明,收益大小及变化是作战单元策略改变的重要依据,最后针对提高作战单元间的策略稳定性提出对策建议.  相似文献   
324.
张剑  龚波 《国防科技》2014,(2):24-27
信息技术的迅猛发展给军队政治工作带来了机遇,同时也提出了一系列新挑战。本文以军队政治工作主体为视角,深入分析了信息技术对军队政治工作主体的认知思维、工作方式和信息素质等三个方面带来的新挑战,提出了相应的对策,指出了军队政治工作主体需要改进的方向。  相似文献   
325.
针对要地防空指挥控制系统的组成、结构和功能,通过双层图对作战体系结构进行建模,提出体现作战体系作战业务流程、信息连通性的双层信息链搜索和解析方法,实现了将信息链与作战体系能力分析的有机关联。仿真验证表明,该方法有效地体现了在作战体系能力分析中,各类型作战实体的协作性和连通性,提高了作战体系作战能力与体系结构的融合能力,利于作战体系的作战效能评估。  相似文献   
326.
人与自然的关系在社会发展到今天,越来越得到人们的重视。以往的思想政治教育,人们总是把它的价值局限在政治价值、经济价值和文化价值上。高校的道德教育也是主要围绕如何处理人与人、集体和社会的关系等,而相对忽略了如何处理人与自然,包括人与其他生命体的关系的教育内容。正确认识人与自然的关系,对保护自然环境承担起责任,是当代大学生必须拥有的素质。  相似文献   
327.
主要以信息化条件下如何提升海军舰艇编队防空导弹作战能力为背景,重点描述协同指挥和协同制导作战的概念内涵、国内外研究现状、作战模式、主要实现的功能,给出不同指挥层次下各指挥节点的体系结构和功能定位,进而从信息场和功能界面等方面说明协同指挥和协同制导2个功能层次的区别.  相似文献   
328.
We address empirically the question of why international economic sanctions are, or are not, chosen as instruments of foreign policy and the question of what determines their success. We hypothesize that cultural linkages between nations are an important factor in explaining both instrument choice and conflict outcomes. Countries that share significant cultural attributes are found to be less likely to apply economic sanctions against one another than countries lacking such cultural ties. However, it is precisely in the case of culturally similar sender and target nations that sanctions are most likely to succeed.  相似文献   
329.
The economic value, social status and symbolic meaning of small arms are particular and temporal in nature. This is demonstra ted through a historical account of the dynamics of cultural change and adaptation in Nuer society. Specifically, the article shows how attitudes towards small arms shif ted over time from a positive valuation of guns as prestigious objects, to ambivalence between the need for protection and the experience of increased local lawlessness and violence. More generally, it demonstrates how weapon-rela ted activities can only be fully understood when seen against a specific cultural background. Even if the display, use and circulation of weapons appear to carry cross-cultural references, typically as expressions of power and masculine identity, the meaning is always primarily local. Therefore, strategies to reduce the destructive impact of small arms through demand side programs, based on voluntary participation, can only be carried out successfully if built on an in-depth understanding of a particular cultural context.  相似文献   
330.
The Arab Spring, a pro-democracy uprising that has been sweeping through North Africa and the entire Arab world since 2010, has been described as a cataclysmic revolutionary wave that has left the overthrow of political regimes in its wake. Studies have comprehensively x-rayed the political and socio-economic circumstances that gave rise to the uprising. Apart from the impact of the uprising on political developments and democratic governance in the Arab world in particular and the world in general, the circumstances that resulted in the revolutions constitute empirical security implications for Nigeria. This is the focus of this article. Using the Ibrahim Index of African Governance (IIAG) and other selected indicators, this article draws a comparative analysis of the key factors that led to the uprisings in Egypt, Libya and Tunisia, pointing out areas of social and security tensions in Nigeria. Based on these findings, it points out the urgency of and imperative for security sector reforms in Nigeria.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号