首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   134篇
  免费   3篇
  2022年   1篇
  2021年   1篇
  2019年   5篇
  2018年   9篇
  2017年   4篇
  2016年   4篇
  2015年   3篇
  2014年   4篇
  2013年   48篇
  2011年   1篇
  2009年   1篇
  2008年   2篇
  2007年   2篇
  2006年   3篇
  2005年   5篇
  2004年   3篇
  2003年   3篇
  2002年   1篇
  2001年   1篇
  1998年   2篇
  1997年   1篇
  1996年   1篇
  1995年   3篇
  1994年   2篇
  1993年   2篇
  1992年   1篇
  1991年   1篇
  1989年   2篇
  1988年   1篇
  1987年   1篇
  1986年   1篇
  1985年   2篇
  1984年   3篇
  1982年   1篇
  1980年   1篇
  1977年   1篇
  1976年   1篇
  1974年   2篇
  1973年   3篇
  1972年   1篇
  1970年   1篇
  1969年   1篇
  1966年   1篇
排序方式: 共有137条查询结果,搜索用时 15 毫秒
61.
Evaluating Insurgent/Counterinsurgent Performance ‘starts on the streets’, so to speak. Specifically, the five rules of assessment are common sense: (1) become familiar with the area in question; (2) slice up the analytical target into manageable slices; (3) carry out longitudinal studies; (4) look at the role played by ideas in this political warfare; and (5) assess the relationship between structural and purposive elements. Though various efforts have been made to quantify outcome, these have not been particularly successful and encourage emphasis upon process at the expense of analysis. The most common flaw in assessments is to view insurgency in static perspective. Societal causes are a necessary but not sufficient factor in upheaval. Once the insurgency becomes a going concern, organizational dynamics become important. Similar factors obtain on the counter‐insurgent side. In the end, both compete for domination of human terrain.  相似文献   
62.
63.
ABSTRACT

This article systematically assesses the 2014 Afghanistan Presidential Election, the first transfer of power from President Hamid Karzai to an elected successor, using provincial voting data as well as explicit data from polling centers. The analysis finds unusual voting results in the April election, where no candidate received 50%+1 votes required by the Afghan constitution, versus the voting results realized for the June ‘runoff election.’ As in other Afghan voting analyses, this article finds voting based on ethno-linguistic preferences, and interestingly found Dr. Ashraf Ghani receiving almost all the swing votes in the runoff election even though the other leading candidate from the April election all endorsed Dr. Abdullah Abdullah. More importantly, however, the research presented here clearly finds extremely strange voting patterns. For example, the polling data center analysis finds 606 polling places where Ghani received all 600 votes and Abdullah received none and another 900 polling centers that gave virtually all its votes to Ghani. These results in combination with other analyses raise the very real possibility that the election results were illegitimate. The article concludes with a discussion of the implications of the research to future Afghan elections and their processes as well as to the long-standing conflict in the country.  相似文献   
64.
Abstract

In counterinsurgency, the population is the center of gravity. This insight has become a key doctrinal tenet of modern armed conflict. But where does it come from? The razzia, a tactic introduced by the French in North Africa around 1840, first thrust tribal populations into the focus of modern operational thinking. Soon the pioneering bureaux arabes added an administrative, civil, and political element. Eventually, in the 1890s, French operations in Madagascar gave rise to a mature counterinsurgency doctrine. David Galula, a French writer who heavily influenced the American Counterinsurgency manual, is merely the joint that connects the nineteenth century to the twenty-first.  相似文献   
65.
It is the purpose of this article to illustrate how the British government reached its decision to upgrade the Polaris strategic nuclear deterrent in 1973. Using British and American documentation it is demonstrated that the strategic imperatives for upgrading Polaris were fundamental to the project. Existing accounts of the Polaris Improvement Project, however, have not given the appropriate attention to the wider US–UK political differences in this period. By doing so it is shown how in addition to the wider economic, strategic and political factors, this was of paramount significance in the Heath government opting for the ‘Super Antelope’ method in upgrading Polaris.1 1‘Super Antelope’ was the codename for the upgrade of Polaris. This was eventually changed to ‘Chevaline’. Peter Hennessy, Cabinets and the Bomb (Oxford: OUP 2007), 28–9. View all notes  相似文献   
66.
Interpreting the Nuclear Non-Proliferation Treaty, by Daniel H. Joyner. Oxford University Press, 2011. 192 pages, $100.  相似文献   
67.
The United States has multiple nuclear detection initiatives to secure against a terrorist nuclear attack, including the Container Security Initiative, installation of radiation detectors at U.S. border points of entry, and establishment of the Domestic Nuclear Detection Office (DNDO). The current nuclear detection system architecture falls short of being able to reliably catch fissile nuclear material in transit, specifically shielded Highly Enriched Uranium (HEU) and Plutonium (Pu), both within the US and abroad. Checkpoints at border crossings can be circumvented, and no adequate system is under development to deter the transport of fissile materials. Using nuclear link-budget calculations, we show why a network relying primarily on handhelds, fixed detectors, and portals is not sufficient. We examine the technical, economic, and operational feasibility of a comprehensive national network incorporating in-vehicle detectors to reliably detect and deter the transport of fissile material inside the vehicle itself.  相似文献   
68.
As many states in the Middle East are considering whether to embark on nuclear power programs, there is an urgent need to develop confidence-building measures to reassure states in the region that the programs are peaceful. One possible path would be to consider multilateral approaches to the fuel cycle in order to foster nuclear cooperation between states in the region, instead of each state going it alone, which would likely increase suspicions and the risk of a cascade of nuclear proliferation. With its policy of “zero problems with neighbors,” strategic connection to the West, and long-standing experience in the nuclear field, Turkey would be well-placed to take the lead on such a nuclear confidence-building agenda. Over time and under the right political conditions, Turkey could initiate or participate in measures including cooperation on nuclear education, safety and security, research and development, and joint fuel cycle facilities such as a regional fuel fabrication center.  相似文献   
69.
In a general and economical view, this article analyzes methods and mechanisms for the pooling and sharing of military forces and weapons inside the European Union (EU) in times of scarcity. Pooling and sharing could improve the EU military capabilities significantly if differences in location factors were taken into account and all states would focus on their respective strengths. More competition and less concentration are the keys to ensuring guaranteed access to military assets. Pooling and sharing are likely to be successful only if large states enhance their emphasis on collective defense by mutual aid and self-help, and reduce particularistic and parochial interests of local gain. The realm of personnel has the most potential for improvement but any change is likely to generate policy implications.  相似文献   
70.
The simulations that many defense analysts rely upon in their studies continue to grow in size and complexity. This paper contrasts the guidance that the authors have received—from some of the giants of military operations research—with the current practice. In particular, the analytic utility of Hughes' simple salvo equations is compared with that of the complex Joint Warfighting System (JWARS), with respect to JWARS' key performance parameters. The comparison suggests that a family of analytic tools supports the best analyses. It follows that smaller, more agile, and transparent models, such as Hughes' salvo equations, are underutilized in defense analyses. We believe that these models should receive more attention, use, and funding. To illustrate this point, this paper uses two very simple models (by modern standards) to rapidly generate insights on the value of information relative to force strength. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2003  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号