首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   75篇
  免费   0篇
  2019年   3篇
  2018年   2篇
  2017年   2篇
  2016年   2篇
  2015年   2篇
  2014年   4篇
  2013年   31篇
  2012年   3篇
  2011年   2篇
  2010年   1篇
  2008年   4篇
  2007年   2篇
  2006年   1篇
  2005年   2篇
  2003年   1篇
  1998年   1篇
  1997年   1篇
  1995年   1篇
  1994年   1篇
  1993年   1篇
  1991年   2篇
  1989年   1篇
  1987年   1篇
  1983年   1篇
  1981年   2篇
  1980年   1篇
排序方式: 共有75条查询结果,搜索用时 31 毫秒
51.
A range of theories have sought to explain and predict secession with varying degrees of success. Arguing that a disproportionate focus upon the seceding group as the unit of analysis has frustrated the development of a comprehensive theoretical framework that is universally valid, this article highlights the role of predecessor institutions of governance and the failure of states to successfully incorporate these as an important, but neglected, causal factor in the study of secession. The inclusion of pre-state institutions of governance and processes of state formation not only results in a more complete, and therefore accurate, explanatory account of secession, but also explains why some regions have been more prone to secession than others.  相似文献   
52.
53.
The Weapons Acquisition Process: An Economic Analysis By M.J. Peck and F.M. Scherer Boston: Harvard University Press, (1962).  相似文献   
54.
We study how changes to the composition and employment of the US Navy combat logistic force (CLF) influence our ability to supply our navy worldwide. The CLF consists of about 30 special transport ships that carry ship and aircraft fuel, ordnance, dry stores, and food, and deliver these to client combatant ships underway, making it possible for our naval forces to operate at sea for extended periods. We have modeled CLF operations to evaluate a number of transforming initiatives that simplify its operation while supporting an even larger number of client ships for a greater variety of missions. Our input is an employment schedule for navy battle groups of ships operating worldwide, extending over a planning horizon of 90–180 days. We show how we use optimization to advise how to sustain these ships. We have used this model to evaluate new CLF ship designs, advise what number of ships in a new ship class would be needed, test concepts for forward at‐sea logistics bases in lieu of conventional ports, demonstrate the effects of changes to operating policy, and generally try to show whether and how the CLF can support planned naval operations. Published 2008 Wiley Periodicals, Inc. Naval Research Logistics 2008  相似文献   
55.
56.
The debate over whether there exists a British counter-insurgency tradition of minimum force is one that has been thoroughly discussed. Is there anything left to say? This study suggests there is further insight to be attained if one explicitly evaluates the concept of minimum force in relation to the conduct of the security forces in the years of the Northern Ireland conflict. Through an examination of three key periods in the conflict, it will be shown that while there was invariably an awareness of the need to act with restraint among senior officers at the strategic level, this was often difficult to apply at the tactical level in the heat of confrontation. The argument demonstrates that the British Army, and other instruments of the state, rarely acted in a manner that could be described as ‘minimal’. Instead, it was the broader liberal values of the British state that explains largely the degrees of restraint exhibited by the government and security forces.  相似文献   
57.
58.
This work is about how the United States military has become dependent on networked technology. As arguably the largest contributor to national security, it has become so dependent that its chief doctrine integrates networked technology into nearly every specialty, with particularly intense focus on Network Centric Warfare. As the military’s old guard is replaced by the highly technical Millenial Generation, there is cause to pause when assuming this techno-acuity brings nothing but advantage and success. Vulnerabilities stemming from such extensive dependence offer opportunities for exploitation that have not gone unnoticed. The first step to moving forward from this point is to fully understand the extent to which the military has become dependent on computer networks. It might be the Millenials’ war today, but it would be quite unwise for the United States military to think about it and fight it in a purely Millenial way.  相似文献   
59.
This article focuses on the relationship between the threat perception analyses of the British Admiralty and the strategic orientation of the Royal Navy at the outset of the twentieth century. The current view is that this was an era when fear of France and Russia drove British naval policy. However, as this article will show, Britain's Naval Intelligence Department formed a low opinion of French and Russian naval capabilities at this time and this negative evaluation exerted considerable influence over decision making. The belief that, owing to multiple qualitative deficiencies, these powers could definitely be beaten in battle lessened the standing of the Franco-Russian naval challenge and freed the Admiralty to consider the danger posed by other possible enemies, most notably Germany.  相似文献   
60.
In recent years, China has made stunning progress in its satellite reconnaissance capabilities. Starting from almost no capacity for live surveillance ten years ago, today the PLA has gained the capability to support real-time tactical naval operations from space. China's suite of electro-optical, synthetic aperture radar, and electronic intelligence satellites would be key to its anti-access/area denial capabilities, through which the PLA could deny the United States military the capability to operate with impunity close to its shores. Furthermore, these achievements suggest a shift towards more military-dedicated space assets and form the contours of a crucial support system for expanded PLA operations.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号