首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   58篇
  免费   4篇
  国内免费   4篇
  2021年   3篇
  2017年   5篇
  2016年   4篇
  2015年   4篇
  2014年   6篇
  2013年   2篇
  2012年   4篇
  2011年   4篇
  2010年   5篇
  2009年   8篇
  2008年   4篇
  2007年   2篇
  2006年   2篇
  2005年   2篇
  2004年   5篇
  2003年   3篇
  2002年   2篇
  1999年   1篇
排序方式: 共有66条查询结果,搜索用时 46 毫秒
41.
Up to the present, there is only very little research on how the population perceives terrorism and its threats, even though support from the population is crucial for effective counterterrorism. By eliciting beliefs and subjecting them to content analyses, six factors were found that determine the protection worthiness of a target in the people's view: the potential damage to “people,” “symbolism,” “economy,” “politics,” “nature,” and “image/publicity.” These empirically found factors are in line with factors specified by terrorist target selection models. They differ in the strength of their cognitive representation among participants and, thus, their subjective importance to the people. The first three factors are shared among all participants, whereas the latter ones could only be found in a part of the participant sample. People's judgments of the targets' protection worthiness differ substantially from their judgments of the targets' attractiveness to terrorists, even though the same factors seem to be involved. This study offers an insight into the people's mental model about protection worthiness of targets. Together with classical risk analysis and knowledge about terrorists, these results can form a basis for setting up a holistic scheme for critical infrastructure protection.  相似文献   
42.
根据活动模型在C3I系统中应用的广泛性、仿真模型生成的困难性,以及二者之间的相似性,提出一种间接生成Petri网仿真模型的方法,即首先建立活动模型,然后在此基础上生成可执行Petri网模型,从而简化仿真模型的建立过程.还简要介绍二者之间的转换规则,并给出应用实例.  相似文献   
43.
王英  陈勇 《指挥控制与仿真》2012,34(4):39-43,60
介绍了基于DoDAF的体系结构建模方法,采用System Architect工具对空间机器人在轨服务进行了可视化建模,得到了典型的作战视图产品;分析了在轨服务任务单元之间的协同关系,研究了空间机器人在轨服务流程,对空间机器人的在轨服务研究具有一定的参考价值。  相似文献   
44.
针对防空导弹系统各作战能力间影响关系难以量化评估的问题,提出利用概率影响图进行分析的方法。在分析防空导弹作战流程、确定各作战活动影响关系的前提下,该方法首先由作战活动影响关系估计各作战能力结点的边缘概率和条件概率;其次利用目标定向法建立防空导弹作战能力概率影响图;最后对概率影响图进行一致性变换,定量评估各作战能力间的影响关系,导找重要能力指标,并动态分析影响关系的概率变化。以战术级爱国者防空导弹系统PAC-3为例借助该方法进行分析。结果证明,利用概率影响图分析防空导弹作战能力影响关系是可行和有效的。  相似文献   
45.
电影因形象直观可视性,失去了文学作品所具有的诸种促使欣赏者进行再创造的艺术元素,从而消弱了欣赏者的审美能动性。因此,电影想要做到含蓄,无疑更富挑战性。如果能使艺术形象体现出一种含蓄美,观众对影片的创造就被激活了。  相似文献   
46.
基于标准化视域的高等教育质量标准体系是参教议教、规范监督、服务社会、利益表达,是为社会发声,是高等教育质量标准体系在表达社会要求。基于标准化视域的高等教育质量标准体系本质是求同存异,即对高等教育质量有基本的标准,也要允许不同类型的高等教育差异化发展。基于标准化视域的高等教育质量标准体系通过建构时间维、逻辑维、条件维、级别维、性质维、对象维的六维一体的建设路径,打造条件维、对象维的规范机制和自我、制度、政府、社会四位一体的保障机制,来推动高等教育质量标准体系的有效运作。  相似文献   
47.
探讨化生恐怖活动中可能使用的化学和生物制品的种类、化生恐怖活动特点及可能使用的手段,研究提出了几点防范构想,希望能有助于在反恐斗争中防化兵作用的研究和发展。  相似文献   
48.
Counterterrorism operations in Kenya have often been hindered by a lack of collaboration, coordination and cooperation among the security agencies involved in such operations. This article examines the relationship between neo-elitism and counterterrorism security interagency activity in Kenya. Using neo-elitism as a framework for analysis, with specific reference to the September 2013 Westgate Mall attack counterterrorism operation, it is argued that the lack of collaboration, coordination and cooperation among Kenya’s counterterrorism security agencies often results in unintended adverse consequences. The interagency conflict over the Westgate operation was primarily about command and control, intelligence sharing and official information shared with the public pertaining to the stages of the siege and operation. These security agencies share similar responsibilities and jurisdictions in the rest of the country’s counterterrorism efforts. The interagency conflicts reveal that the country’s security elites pursue personal and agency-specific interests that are aimed at maintaining organisational supremacy over counterterrorism efforts. Recommendations are offered for how to tackle the problem of interagency conflict in order to enhance the effectiveness of counterterrorism operations in Kenya.  相似文献   
49.
分析了易燃易爆化工单位遭遇恐怖袭击的危害性,着重分析了13种易燃易爆化工单位反恐防范对策,并提出反恐发展建议,欲予易爆易爆危险化学品生产、储存、使用单位反恐工作提供一定借鉴。  相似文献   
50.
We study a problem of scheduling a maintenance activity on parallel identical machines, under the assumption that all the machines must be maintained simultaneously. One example for this setting is a situation where the entire system must be stopped for maintenance because of a required electricity shut‐down. The objective is minimum flow‐time. The problem is shown to be NP‐hard, and moreover impossible to approximate unless P = NP. We introduce a pseudo‐polynomial dynamic programming algorithm, and show how to convert it into a bicriteria FPTAS for this problem. We also present an efficient heuristic and a lower bound. Our numerical tests indicate that the heuristic provides in most cases very close‐to‐optimal schedules. © 2008 Wiley Periodicals, Inc. Naval Research Logistics 2009  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号