首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   124篇
  免费   22篇
  国内免费   9篇
  2021年   6篇
  2020年   9篇
  2019年   9篇
  2018年   10篇
  2017年   12篇
  2016年   8篇
  2015年   6篇
  2014年   13篇
  2013年   28篇
  2012年   5篇
  2011年   6篇
  2010年   4篇
  2009年   4篇
  2008年   4篇
  2007年   4篇
  2006年   10篇
  2005年   2篇
  2004年   4篇
  2001年   1篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1990年   3篇
  1989年   3篇
排序方式: 共有155条查询结果,搜索用时 18 毫秒
81.
A nation's structure and culture of civil-military relations are important and largely overlooked factors in explaining the performance of armed forces involved in complex expeditionary operations. The US model of ‘Huntingtonian’, divided civil-military structures and poor interagency cooperation, makes the US military less suited for complex expeditionary operations. British civil-military relations involve a Defence Ministry that conscientiously integrates military and civilian personnel, as well as extensive interagency cooperation and coordination. This ‘Janowitzean’, integrated form of civil-military relations makes the British military more likely to provide for the planning and implementation of comprehensive campaigns that employ and coordinate all instruments of power available to the state, as well as troops in the field displaying the flexibility and cultural and political understanding that are necessary in complex expeditionary operations.  相似文献   
82.
Today there are many calls for other elements of the government to do more to ‘do their part’, assist the military to restore order and stability and ‘win the peace’ in Iraq and Afghanistan, and prepare for similar roles in future conflicts. The authors here instead briefly review the history of US armed forces’ involvement in military governance operations from the Mexican War through World War II, and recommend the re-establishment of a School of Military Government similar to that created during the latter conflict.  相似文献   
83.
This article describes and analyzes a little understood Afghan Taliban propaganda tool: chants or taranas . These melodic refrains effectively use historical narratives, symbology, and iconic portraits. The chants are engendered in emotions of sorrow, pride, desperation, hope, and complaints to mobilize and convince the Afghan population of the Taliban's worldview. The chants represent culturally relevant and simple messages that are communicated in a narrative and poetic form that is familiar to and resonates with the local people. They are virtually impossible for the United States and NATO to counter because of Western sensitivities concerning religious themes that dominate the Taliban narrative space, not to mention the lack of Western linguistic capabilities, including the understanding and mastering the poetic nature of local dialects.  相似文献   
84.
对赛博空间和赛博战概念进行解析,研究了赛博安全、赛博空间、赛博力量、赛博作战等领域所面临的威胁与挑战,认为赛博优势和赛博能力决定了一个国家在下一轮军事和综合国力较量中的地位。从国家赛博安全战略、信息基础设施建设和赛博力量建设等方面,给出了应对赛博空间威胁与挑战的思考与策略。  相似文献   
85.
Abstract

Military burden sharing has been a subject of repeated debates in NATO and the UN. Despite more modest goals, the European Union’s (EU) Common Security and Defense Policy (CSDP) has experienced no fewer difficulties in garnering men, money, and materiel. While this may not come as a surprise, the fact that some EU member states have carried disproportionate shares of the burden of CSDP operations is a puzzle that remains unaccounted for. We address this gap by analyzing determinants of contribution levels to CSDP operations. In employing an innovative multi-method design that combines insights from collection action theory with those from integrated theories of military burden sharing, our results indicate that EU countries tend to contribute in positive disproportion with their capabilities when they have a strong peacekeeping tradition and elections are distant. In contrast, they undercontribute when small trade volumes with the area of operations combine with a weak peacekeeping tradition.  相似文献   
86.
This article studies operations sequencing for a multi‐stage production inventory system with lead times under predictable (deterministic) yield losses and random demand. We consider various cases with either full or partial release of work‐in‐process inventories, for either pre‐operation or post‐operation cost structures, and under either the total discounted or average cost criteria. We derive necessary and sufficient criteria for the optimal sequence of operations in all cases. While the criteria differ in their specific forms, they all lead to the same principal: those operations with (1) lower yields, (2) lower processing costs, (3) longer lead times, and (4) lower inventory holding costs should be placed higher upstream in the system.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 144–154, 2014  相似文献   
87.
Did participants in small wars in the period 1775–1831 learn from previous or contemporary examples? While this is difficult to prove for participants who left no written records, there is considerable evidence in existing publications by practitioners that they did indeed draw out lessons from recent insurgencies, either from their own experience or from events elsewhere which they studied from afar, especially the Spanish Guerrilla, which had already become legendary. Most authors showed an interest in how to stage insurgencies rather than in how to quell them. Even then, transfer did not come in a package of tactics-cum-values, but in each case in different configurations.  相似文献   
88.
Cyberspace has emerged as a potentially new (and unconventional) domain for warfare. Much debate has focused on understanding cyber conflict. The ability to critically analyse this phenomenon is important; however, the nascent nature of cyberwarfare and the complexity of the systems involved create challenges not met by conventional approaches. As a first step, this requires an analytical construct to frame discussions in a way that highlights distinct characteristics of the cyber domain. An approach proposed is one of the postulating conjectures for debate as a way to achieve this and to demonstrate its use, both at the strategic and operational levels. It is suggested that such an approach provides one component of a mature analytical framework for the analysis of cyber across a range of warfare domains.  相似文献   
89.
The literature on the product mix decision (or master production scheduling) under the Theory of Constraints (TOC), which was developed in the past two decades, has addressed this problem as a static operational decision. Consequently, the developed solution techniques do not consider the system's dynamism and the associated challenges arising from the complexity of operations during the implementation of master production schedules. This paper aims to address this gap by developing a new heuristic approach for master production scheduling under the TOC philosophy that considers the main operational factors that influence actual throughput after implementation of the detailed schedule. We examine the validity of the proposed heuristic by comparison to Integer Linear Programming and two heuristics in a wide range of scenarios using simulation modelling. Statistical analyses indicate that the new algorithm leads to significantly enhanced performance during implementation for problems with setup times. The findings show that the bottleneck identification approach in current methods in the TOC literature is not effective and accurate for complex operations in real‐world job shop systems. This study contributes to the literature on master production scheduling and product mix decisions by enhancing the likelihood of achieving anticipated throughput during the implementation of the detailed schedule. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 357–369, 2015  相似文献   
90.
Motivated by the presence of loss‐averse decision making behavior in practice, this article considers a supply chain consisting of a firm and strategic consumers who possess an S‐shaped loss‐averse utility function. In the model, consumers decide the purchase timing and the firm chooses the inventory level. We find that the loss‐averse consumers' strategic purchasing behavior is determined by their perceived gain and loss from strategic purchase delay, and the given rationing risk. Thus, the firm that is cognizant of this property tailors its inventory stocking policy based on the consumers' loss‐averse behavior such as their perceived values of gain and loss, and their sensitivity to them. We also demonstrate that the firm's equilibrium inventory stocking policy reflects both the economic logic of the traditional newsvendor inventory model, and the loss‐averse behavior of consumers. The equilibrium order quantity is significantly different from those derived from models that assume that the consumers are risk neutral and homogeneous in their valuations. We show that the firm that ignores strategic consumer's loss‐aversion behavior tends to keep an unnecessarily high inventory level that leads to excessive leftovers. Our numerical experiments further reveal that in some extreme cases the firm that ignores strategic consumer's loss‐aversion behavior generates almost 92% more leftovers than the firm that possesses consumers’ loss‐aversion information and takes it into account when making managerial decisions. To mitigate the consumer's forward‐looking behavior, we propose the adoption of the practice of agile supply chain management, which possesses the following attributes: (i) procuring inventory after observing real‐time demand information, (ii) enhanced design (which maintains the current production mix but improves the product performance to a higher level), and (iii) customized design (which maintains the current performance level but increases the variety of the current production line to meet consumers’ specific demands). We show that such a practice can induce the consumer to make early purchases by increasing their rationing risk, increasing the product value, or diversifying the product line. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 435–453, 2015  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号