首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   78篇
  免费   1篇
  国内免费   2篇
  2021年   6篇
  2020年   2篇
  2019年   4篇
  2018年   1篇
  2017年   5篇
  2016年   3篇
  2015年   4篇
  2014年   7篇
  2013年   37篇
  2012年   2篇
  2011年   1篇
  2010年   2篇
  2004年   1篇
  2001年   2篇
  2000年   1篇
  1998年   1篇
  1996年   1篇
  1991年   1篇
排序方式: 共有81条查询结果,搜索用时 78 毫秒
1.
本文介绍了context研究的现状,定义了一个新的context逻辑CL,定义并证明了与之相关的一些概念和定理。  相似文献   
2.
This article examines the evolution of the current British military joint intelligence doctrine. We argue that military intelligence doctrine is dogged by an intrinsic tension between the ethos and expectations of military doctrine and those of the professional practice of intelligence. We further argue not only that prior iterations of UK joint intelligence doctrine failed to effectively deal with this intelligence doctrine dilemma, but also that measures in the current doctrine to address this problem directly created their own problems. Moreover, as a result, otherwise sound innovations in the current UK intelligence doctrine have proven unsuitable to wider diffusion in more recent intelligence doctrine such as the new NATO intelligence doctrine which, otherwise, draws extensively on its British precursor.  相似文献   
3.
本文运用SWOT分析方法对新疆高校开发中亚教育市场中面临的优势、劣势、机遇、威胁四个方面进行了全面分析。新疆留学生教育的发展,优势与劣势并存、机会与威胁同在,关键是如何充分利用优势、消除劣势。并借助SWOT模型中的不同战略组合提出了新疆开发中亚留学市场的的LCVP战略选择方式,为发展新疆留学生教育提供了依据。  相似文献   
4.
Insurgencies thrive in regions where government legitimacy is absent. In the post-war Philippines, Captain Charles T. R. Bohannan of the Army’s Counter Intelligence Corps became actively aware of this dynamic. Bohannan is best known for his later work with Edward Lansdale and Ramon Magsaysay in defeating the Huk Rebellion (1950–1954). Here the author examines Bohannan’s early investigative work against Japanese war criminals, wartime Filipino collaborators, and the rising threat of communist subversion most associated with the Huk. All of these experiences fed into what would be the successful campaign against the Huk, chronicled in his seminal work, Counter Guerrilla Operations: The Philippines Experience, and offers lessons on the investigative (as opposed to tactical or psychological) nature of effective counter-insurgency work, as it relates to both legitimacy in governance and the rise of insurgencies.  相似文献   
5.
This study develops a dynamic model that integrates military intelligence into the defense capability of the country and the optimal allocation of its government budget. We assert that the effectiveness of the country’s military intelligence is contingent on the quality of its human capital, which, in turn, implies a long-term positive relationship between the government’s various civilian expenditures and its capacity to achieve a cost-effective intelligence and, hence, military capability. This relationship is developed within a multiple-period arms race model between two rivals. Using this model and stylized data for the Israeli–Syrian arms race, we show that an appropriate budget shift from defense to civilian expenditures during the initial periods of the planning horizon will gradually (over a decade, say) increase the quality of human capital in the country and, thus, the effectiveness of its intelligence, which, in turn, will increase the country’s future security and welfare.  相似文献   
6.
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? — This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges.  相似文献   
7.
本文通过对新疆师范大学的中亚来华留学生学习动机进行调查,用差异性检验方法,从性别、学历方面进行数据统计分析,从而发现问题,得出结论,为留学生汉语学习动机问题的研究提供参考。  相似文献   
8.
近年来,人工智能技术在图像处理领域取得了突破性进展,使得目标识别和目标检测算法的性能得到大幅提高,也为军用光电装备智能化创造了有利条件。本文从算法、数据和计算能力等人工智能三要素入手,分析了快速实现军用光电装备智能化的有效途径及过程中可能面临的问题,指出:现有的技术理论基本满足装备升级需求,智能化过程中还应重点加强实时性算法的研究,提早对专用数据集的收集整理进行布局完善,采用低功耗高性能边缘计算设备为装备计算能力水平提升提供支撑等。同时,在工程化过程中仍存在部分实际问题,需根据装备进行个性化设计,以解决理论与应用之间的差距。最后,建议重点加强国产化水平与能力的提高,以实现关键技术自主可控。  相似文献   
9.
The evolutions of military expenditures in Eastern and Central European countries are difficult to estimate and to compare, due to the lack of available data for these states. Some results of the extent of cuts in defence spending since 1990 are interesting to interpret, but it is difficult for econometricians to use these figures even carefully. The structures of national military expenditure have been modified to the detriment of arms equipment. Thus, the disarmament process needs a special analysis of the arms industry.  相似文献   
10.
Radioactive sealed sources have a long history and a much wider worldwide distribution than do weapons-usable fissile materials. This article compares the mechanisms for controlling radioactive sources with those of weapons-usable materials and makes the case for improved policy making on the safe and secure management of radioactive sources (often referred to simply as “sources”). Such sources have been widely distributed with commercial and government support to nearly every country, yet there are no legally binding, international agreements or regulations to control any aspect of their life cycle. This is problematic because some sources that are disused, abandoned, or otherwise fall out of regulatory control could be used in the form of a radiological dispersal device (RDD, or dirty bomb). An RDD could pose significant economic and psychological impacts with the potential for detrimental effects on public health. The lack of international measures to control sources is troubling for several reasons: creating an RDD is much easier than fashioning a nuclear weapon from scratch or from stolen fissile materials; given the many incidents involving diversion from regulatory control and the misuse of sources, an RDD attack would be one of the more likely scenarios; materials security for sources is generally weak and inconsistent; it is nearly impossible to determine the total amount of sources manufactured and distributed; used sources are frequently found uncontrolled and transiting borders, and penalties are light at best; the market-based supply and demand of sources facilitates their rapid and loosely regulated distribution; and the “peaceful uses” aspect of the Treaty on the Non-Proliferation of Nuclear Weapons along with norms that began developing around the time of Atoms for Peace have promoted the nearly unchecked global distribution of sources. Several immediate and long-term actions are suggested to reduce the threat posed by radiological sources.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号