首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   78篇
  免费   1篇
  2022年   1篇
  2021年   5篇
  2020年   2篇
  2019年   6篇
  2018年   4篇
  2017年   4篇
  2016年   4篇
  2015年   2篇
  2014年   4篇
  2013年   33篇
  2012年   5篇
  2011年   1篇
  2010年   1篇
  2009年   2篇
  2007年   1篇
  2004年   1篇
  2002年   1篇
  2000年   1篇
  1988年   1篇
排序方式: 共有79条查询结果,搜索用时 140 毫秒
41.
A benefit‐cost framework and the associated evidence is used to evaluate UK arms exports. Two issues are examined in detail. First, trade externalities; and second, a case study of the problems and costs of maintaining the UK submarine industrial base without exports.  相似文献   
42.
Abstract

The article evaluates the security challenges that are likely to occur along international borders in East Africa with the advent of the East African Community Common Market in July 2010. In an attempt to illustrate the porosity of borders and the likelihood that criminals could take advantage of the situation, the author describes the ease with which transnational crime could thrive (in the absence of efficient border security measures) under the guise of informal cross-border trade that derives its basis largely from the customs and historical linkages in the region. Border towns in the region are considered zones of risk but also opportunities for quick money-making ventures and deals that tend to attract a variety of criminals. While the danger is not alarmingly high, there is a likelihood that with the opening up of the East African Community to the free movement of goods and people, criminals will exploit this freedom to commit crimes such as human trafficking, drug smuggling and moving terrorists and contraband goods unless mechanisms are put in place to curtail these activities. Should this not happen, the mission of the East African Community could be jeopardised.  相似文献   
43.
Turkey has been investing in its national defence industrial base since the 1980s. As with other developing countries, Turkey’s motivations for investing in national defence industries can be boiled down to the pursuit of defence autarky, economic benefits and international prestige. However, after 40 years of investment, Turkey is unable to reach the primary goals of defence industrialisation. We argue that three factors are important to understanding Turkey’s persistence in these primary goals. First, Turkey believes that there is an overall improvement in its defence industrial capabilities and the goal of autarky is still reachable. Second, increased defence exports support the belief that Turkish defence industries have become sustainable and the trend will continue in the future. The third reason, perhaps most important of all, has to do with the domestic political gains of defence industrialisation: the AKP uses defence industry and indigenous weapon systems for prestige and, therefore, garners broader support.  相似文献   
44.
We consider two opponents that compete in developing asymmetric technologies where each party's technology is aimed at damaging (or neutralizing) the other's technology. The situation we consider is different than the classical problem of commercial R&D races in two ways: First, while in commercial R&D races the competitors compete over the control of market share, in our case the competition is about the effectiveness of technologies with respect to certain capabilities. Second, in contrast with the “winner‐takes‐all” assumption that characterizes much of the literature on this field in the commercial world, we assume that the party that wins the race gains a temporary advantage that expires when the other party develops a superior technology. We formulate a variety of models that apply to a one‐sided situation, where one of the two parties has to determine how much to invest in developing a technology to counter another technology employed by the other party. The decision problems are expressed as (convex) nonlinear optimization problems. We present an application that provides some operational insights regarding optimal resource allocation. We also consider a two‐sided situation and develop a Nash equilibrium solution that sets investment values, so that both parties have no incentive to change their investments. © 2012 Wiley Periodicals, Inc. Naval Research Logistics 59: 128–145, 2012  相似文献   
45.
Russia has sharply objected to US plans for ballistic missile defense. The Russian official explanation is that the real purpose of the US missile defense plan is to make it impossible for Russia to retaliate against a US nuclear (or massive conventional) attack, thus making Russia subject to military blackmail by the US. The Russian response has been the result of a sum total of various factors, mostly political and cultural, while the technical capabilities of the proposed system have played a secondary role.  相似文献   
46.
The paper presents the possibilities of, and methods for, acquiring, analysing and processing optical signals in order to recognise, identify and counteract threats on the contemporary battleground. The main ways electronic warfare is waged in the optical band of the electromagnetic wave spectrum have been formulated, including the acquisition of optical emitter signatures, as well as ultraviolet (UV) and thermal (IR) signatures. The physical parameters and values describing the emission of laser radiation are discussed, including their importance in terms of creating optical signatures. Moreover, it has been shown that in the transformation of optical signals into signatures, only their spectral and temporal parameters can be applied. This was confirmed in experimental part of the paper, which includes our own measurements of spectral and temporal emission characteristics for three types of binocular laser rangefinders. It has been further shown that through simple registration and quick analysis involving comparison of emission time parameters in the case of UV signatures in “solar-blind” band, various events can be identified quickly and faultlessly. The same is true for IR signatures, where the amplitudes of the recorded signal for several wavelengths are compared. This was confirmed experimentally for UV signatures by registering and then analyzing signals from several events during military exercises at a training ground, namely Rocket Propelled Grenade (RPG) launches and explosions after hitting targets, trinitrotoluene (TNT) explosions, firing armour-piercing, fin-stabilised, discarding sabots (APFSDS) or high explosive (HE) projectiles. The final section describes a proposed model database of emitters, created as a result of analysing and transforming the recorded signals into optical signatures.  相似文献   
47.
This second part of the review article begins with a definition of military power, when and how it should be used. From a large number of authors, “moral forces” are linked to “codes of conduct”, and the fundamental understandings about the “profession of arms”, based on “fiduciary trust”, “covenanted” service and professional and personal “conscience”. The article covers what authors have written about “culture” and the ethics of “technology” devices and systems, including “cyber” warfare. It concludes with recognition of the increase in ethical sensitivity in this century which is characterized by a phenomenon, the crises of “identity”, personal, national and global.  相似文献   
48.
Possession of a brand is a sine qua non for economic success, not least because it connotes trust in delivering the value promised. Although Western arms exporters offer branded systems whose sales are influenced by price, there is a plethora of other economic variables, such as offset requirements and life-cycle support. Entrants to the international arms market will struggle without such arms “packages.” China’s entry, however, goes beyond the traditional economic paradigm. A four-stage historical model offers the backdrop for identifying the drivers that have forged its market entry into 55 countries worldwide. The strategy initially focused on sales of rudimentary military equipment for political purposes, but recently it has begun to commercialize exports, repositioning them from a low- to a high-tech sales trajectory. A Sino “brand” is thus emerging, reflecting both competitiveness and diplomatic considerations, especially non-interference in client state domestic affairs.  相似文献   
49.
We develop a model of military technology competition among states. States can choose to introduce new military technology, mimic rivals’ level of technology, or withdraw from the contest. States can choose to implement any level of technology within their current feasible technologies. We find that states with significant technological leads should sometimes withhold new technologies, only strategically releasing them to trump rivals’ efforts. We develop the model by refining Admiral Jackie Fisher’s roughly articulated concept of ‘plunging’. We then use this refined argument to reanalyze the case of naval rivalries among European powers between the Crimean War and the First World War. Finally, we conclude by discussing the model’s implications for current US military force structure planning.  相似文献   
50.
Peace parks are a modern means of conflict resolution through nature conservation. The Great Limpopo Peace Park (GLPP), which spans South Africa, Zimbabwe and Mozambique, was established to bring new hope to an area that is infamous for racial and political divisions, civil war and widespread poverty. This paper discusses the impact of international laws governing landmines, the current priority choices of the countries involved, and the situation in the two mine-affected countries: Mozambique and Zimbabwe. Minefields and politics are interrelated, and have an impact at local, national and international level. Using the GLPP as a case study, the article argues that although they have been presented as excellent examples of integrated biodiversity conservation and socio-economic development in developing countries, peace parks will not fulfil their main objective of promoting an image of peace in the aftermath of conflict without addressing landmine contamination.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号