首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   627篇
  免费   93篇
  国内免费   53篇
  2024年   1篇
  2023年   2篇
  2021年   20篇
  2020年   9篇
  2019年   29篇
  2018年   30篇
  2017年   39篇
  2016年   51篇
  2015年   23篇
  2014年   61篇
  2013年   111篇
  2012年   26篇
  2011年   46篇
  2010年   44篇
  2009年   46篇
  2008年   46篇
  2007年   31篇
  2006年   39篇
  2005年   39篇
  2004年   21篇
  2003年   23篇
  2002年   5篇
  2001年   6篇
  2000年   4篇
  1999年   4篇
  1998年   8篇
  1996年   1篇
  1995年   3篇
  1994年   1篇
  1993年   1篇
  1990年   2篇
  1989年   1篇
排序方式: 共有773条查询结果,搜索用时 78 毫秒
151.
Policies to counter the threat of weapons of mass destruction (WMD) have, for the most part, been modeled on strategies originally devised to counter the danger of nuclear proliferation. While useful in countering a traditional CBN (chemical/biological/nuclear)/WMD threat, current counter-proliferation and non-proliferation regimes are insufficient to meet the challenge of maritime terrorism. Maritime terrorism represents a new category of threat; one that partially overlaps with conventional WMD, but for which – due to the scope and nature of the maritime industry – traditional counter-proliferation policies may be inadequate and even inappropriate. This article outlines the means by which maritime shipping can be used as WMD and discusses the policies implemented to deal with these threats, in light of the challenges presented to traditional conceptualizations of WMD and counter-proliferation strategies.  相似文献   
152.
In 1924, HMCS Thiepval provided logistical support to a British attempt to circumnavigate the world by air. But the ship had another secret mission. Concerned America and Japan were fortifying their north Pacific possessions in violation of the 1922 Washington Treaty, and fearing war might be inevitable, the Canadian navy sent the Thiepval to covertly spy upon American and Japanese facilities. No cheating was discovered, but in the longer run, Canadian concerns about hostilities in the north Pacific were ‘on the mark’ correct.  相似文献   
153.
This article argues that the debate on security sector reform (SSR) needs to be taken further by taking into consideration the fact that, even though the SSR concept was not originally developed as an element in stabilising states undergoing an insurgency, it is very much being used for exactly that. When conducting counterinsurgency with a focus on the creation of stability, the baseline will ultimately have to be security sector stabilisation (SSS) as a precondition for complete SSR implementation. However, the two must be connected to avoid them undermining each other. This is important if a comprehensive approach to programme implementation and especially sustainability is to guide the programme, and not just isolated ‘train and equip’ stand-alone projects that do not solve either the initial need for stabilisation or the long-term need for accountable security forces. Currently, in Afghanistan the surge for security by the international military is in danger of overtaking the other elements of the SSR, thereby undermining the primary end state and thus risking laying the wrong foundation for the long-term process of SSR.  相似文献   
154.
可配置计算系统的优势与系统设计过程的复杂性是一对矛盾,可配置计算框架为此提供了有益的思路。但受限于适用范围与通用性考虑,已有的特别是商业框架仅支持系统的静态重构。本文针对宽带信号侦察这一特定应用领域,提出了一种功能级可配置计算应用框架BSRRCS-RCAF,该框架将领域应用中具有共性的计算与功能模块抽取和集中起来,形成二进制比特流配置文件库,并提供构建此类系统的公共服务体系。基于公共服务体系以及配置文件库,当需要修改或者重新构建宽带信号侦察系统时,只需在现有框架下动态调用配置组件库,或者遵循框架的统一设计接口完善补充组件库中的特定功能部分,整个系统设计框架将得到方便复用,便于实现基于快速重构的多种系统功能。  相似文献   
155.
针对HLA/RTI在接口规范、对象模型模板等关键技术建立分布式仿真平台的复杂性,提出了利用数字武器开发平台进行开发的方法,构建防区外空面导弹攻防对抗系统体系结构,实现了该体系结构联邦成员划分、设计联邦/仿真对象模型表等HLA仿真关键技术,并采用面向对象建模与仿真技术建立了各联邦成员的数学模型.该仿真结果表明,各联邦成员的数学模型与底层支撑环境能够相互分离,仿真模型具有良好的交互性和互操作性,可通过添加或删除联邦成员仿真不同的复杂战场想定,并可作为验证不同算例的仿真平台.  相似文献   
156.
There were several high-profile violent incidents in 2011 in Kazakhstan, including several bombings, shootings that targeted police, and a protest turned clash that resulted in a number of deaths. Some of the perpetrators reportedly had links with radical religious groups. An overlooked aspect of the violence is how it is reported in Kazakhstan. There are active, competent media in Kazakhstan, which are largely unknown in the West. An examination of these incidents using the media in Kazakhstan can provide a unique insight into what took place. While Western sources quickly blamed radical religious groups with international connections, media in Kazakhstan have found that there are other reasons for the violence.  相似文献   
157.
Since the peace agreements of 2002–2003 which ended the second war in the Democratic Republic of Congo, reconstruction of the army has been an inherently political process, in common with other attempts to carry out security sector reform (SSR). This article briefly sketches out the Congolese army's history, then attempts to fill a gap in the literature on Congolese SSR by detailing what can be found of the actual structure and shape of the present army. The efforts that have been made to reform the army are then examined, followed by a conclusion which examines the major issues and possible ways forward.  相似文献   
158.
提出了一种新的三粒子量子安全直接通信协议。通信过程利用decoy光子来检测窃听,保证信道安全。发送方将秘密消息编码在不同幺正操作上,通信双方通过Bell基和Z基测量可直接传递秘密消息。由于所有粒子都用于传输秘密消息,且传输一次可获得两比特信息,该协议具有较高的量子比特及量子密码协议效率;三粒子纠缠态的制备是已实现技术,该协议具有实际操作的意义。此外,该协议在量子信道中也是安全的。  相似文献   
159.
为构建一体化的空天作战信息环境,面向大情报系统的信息共享和应用重组集成目标,探讨了以信息服务理念架构大情报系统的总体思路,总结筛选了大情报系统信息服务组件开发与集成应遵循的技术规范与标准.有助于大情报系统的体系结构设计,高效集成多元化的现有或即将建设的关联系统,并逐步过渡到统一的信息技术体制上.  相似文献   
160.
随着中美实力差距不断缩小和信息技术的发展与扩散,网络安全成为中美新的竞争点和摩擦点,中美在网络安全问题上展开新一轮的博弈,具体体现为网络空间治理权之争、中美网络安全战略博弈和网络技术优势的夺取。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号