首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   326篇
  免费   11篇
  国内免费   1篇
  2021年   6篇
  2019年   10篇
  2018年   4篇
  2017年   7篇
  2016年   11篇
  2015年   6篇
  2014年   6篇
  2013年   75篇
  2012年   6篇
  2011年   6篇
  2010年   5篇
  2009年   4篇
  2008年   6篇
  2007年   5篇
  2006年   8篇
  2005年   5篇
  2004年   5篇
  2003年   3篇
  2002年   5篇
  2001年   3篇
  2000年   4篇
  1998年   2篇
  1997年   6篇
  1996年   3篇
  1993年   2篇
  1992年   2篇
  1991年   2篇
  1990年   2篇
  1989年   5篇
  1987年   2篇
  1986年   7篇
  1985年   8篇
  1984年   5篇
  1983年   5篇
  1982年   6篇
  1981年   4篇
  1980年   9篇
  1979年   7篇
  1978年   8篇
  1977年   2篇
  1976年   7篇
  1975年   10篇
  1974年   6篇
  1973年   8篇
  1972年   5篇
  1971年   4篇
  1970年   5篇
  1969年   4篇
  1968年   5篇
  1967年   3篇
排序方式: 共有338条查询结果,搜索用时 31 毫秒
331.
If one could look through the familiar artificial political lines and colors of a current world map into the twenty-first century strategic reality, one could see a complex new security arena. A deeper look into that picture would provide magical snapshots that show several types of ambiguous and asymmetric conflicts, and state failure - and their causes and consequences. Then, with some additional adjustments of focus, one can discern a number of issues that cannot be shown in two-dimensional space. They are briefly discussed as follows. First and importantly, one can get a better idea of the complex threat situation and the ultimate threat - state failure. Second, an even deeper examination of the vision of contemporary wars reveals the shadows of things that have been and of those that will be on the road ahead. Third, a closer look at the familiar and troubling world map exposes some signposts on the road ahead that indicate the most significant changes in the landscape. Finally, our magical microscope reveals a short list of the basic challenges and tasks that can help discerning civilian and military leaders negotiate the road through the new global security environment.  相似文献   
332.
In 2014, Colonel M. Shane Riza published an article in this journal arguing that remotely piloted aircraft (RPA) and robotic weapons threaten the US Air Force’s warrior ethos. Riza has clearly articulated the sentiments of one side of a vibrant debate within our service. This paper presents an alternative view; a view held by some who have experienced these new forms and tools of war, and who have wrestled with their implications first-hand. In this paper, we address some methodological concerns with Riza’s approach and then engage some misunderstandings about RPA’s relationship to military history and to risk. The second part of this paper takes a close look at some of the early Just War thinkers to determine what implications the tradition may have on the warrior ethos. We propose, as an alternative to Riza’s position, a return to an ethos grounded in humility, charity, and a conception of war as a last resort; in short, a return to the Just Warrior Ethos.  相似文献   
333.
In hinterland container transportation the use of barges is getting more and more important. We propose a real‐life operational planning problem model from an inland terminal operating company, in which the number of containers shipped per barge is maximized and the number of terminals visited per barge is minimized. This problem is solved with an integer linear program (ILP), yielding strong cost reductions, about 20%, compared to the method used currently in practice. Besides, we develop a heuristic that solves the ILP in two stages. First, it decides for each barge which terminals to visit and second it assigns containers to the barges. This heuristic produces almost always optimal solutions and otherwise near‐optimal solutions. Moreover, the heuristic runs much faster than the ILP, especially for large‐sized instances.  相似文献   
334.
ABSTRACT

Increasing attention paid to US casualties in far-flung places such as Tongo Tongo, Niger, and headlines claiming ‘secret wars’ have fueled discussion about American military’s involvement in Africa. Though the continent has been a part of the American way of war since the beginnings of the US – consider the early combat actions of US Marines in Tripoli –, current African conflicts are challenging our understanding of war and approaches to winning it. This article examines the ways America seeks to achieve its ends in Africa with a particular focus upon the last 10 years of US counter-terrorism and stability operations in Niger and the Sahel Region. The author proposes unifying American, Allied, and partner efforts through a strategy of Active Containment.  相似文献   
335.
This article analyzes two general warranty policies involving an initial free replacement period, followed by a pro rata period. We examine the short-run total costs and longrun average costs under these policies. Formulas for both consumer costs and manufacturer profits under warranty are derived. We also study the expected number of purchases over the product life cycle under both policies. Bounds for the expected total costs and expected number of purchases are obtained for the case where the failure distribution of the item is new better than used.  相似文献   
336.
Building regional security cooperation in the Western Hemisphere is not a strictly short-term, unilateral or bilateral defense effort. Regional security will only result from a long-term, cooperative, multilateral civil-military effort. A viable framework for success includes the need to advance hemispheric understanding of the security concerns of each country and those that the region as a whole faces (for example, the internal and external threat(s) to security). Finally, these issues and associated recommendations demand a carefully staffed and phased regional security plan of action, with measurable short- and long-term objectives to validate its planning and implementation. The basic directions for a regional security plan, as identified at the Miami conference, are as follow.  相似文献   
337.
338.
Military operations increasingly require cooperation between agencies within the same nation, but also collaboration with security and military organizations internationally. Throughout history multinational military cooperation has often been an appropriate way to conduct major operations; national manpower and material resources are generally insufficient to address the demands of missions worldwide. The desire to optimize the use of scarce research and development and investment capabilities, the need for international legitimacy and political support, and the fact that today’s risks transcend national borders, have rendered multinational cooperation in the security domain unavoidable. With joint operations comes the requirement for multi-partner- and multinational information sharing. However, information sharing has both advantages and costs, and is subject to both enabling factors as well as barriers. This paper reflects on theories, both classical and current, as well as empirical case studies, to examine the pros and cons of multinational information sharing, and the factors that conduce or interfere with the transmission and the receipt of intelligence. The importance of a holistic approach and of learning lessons learned are two key lessons gleaned from the analysis, along with an emphasis on developing both the organizational and the interpersonal enablers of information sharing.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号