首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   171篇
  免费   4篇
  2022年   1篇
  2021年   1篇
  2020年   1篇
  2019年   6篇
  2018年   12篇
  2017年   4篇
  2016年   6篇
  2015年   3篇
  2014年   4篇
  2013年   58篇
  2011年   1篇
  2009年   1篇
  2008年   2篇
  2007年   3篇
  2006年   3篇
  2005年   5篇
  2004年   4篇
  2003年   5篇
  2002年   3篇
  2001年   1篇
  2000年   2篇
  1998年   3篇
  1997年   2篇
  1996年   1篇
  1995年   4篇
  1994年   4篇
  1993年   2篇
  1992年   3篇
  1991年   1篇
  1990年   1篇
  1989年   4篇
  1988年   2篇
  1987年   2篇
  1986年   1篇
  1985年   2篇
  1984年   3篇
  1983年   1篇
  1982年   1篇
  1980年   1篇
  1977年   1篇
  1976年   1篇
  1974年   2篇
  1973年   3篇
  1972年   1篇
  1970年   1篇
  1969年   1篇
  1966年   1篇
排序方式: 共有175条查询结果,搜索用时 15 毫秒
101.
The security sector reform (SSR) programme in the Democratic Republic of the Congo (DRC) has failed, according to a former high-level member of the United Nations (UN) mission in the DRC, as a large section of the country remains outside government control, and the security institutions of the state continue to constitute one of the predominant sources of insecurity for the local population in a number of ways. Based on several field studies, this article critically scrutinises the SSR of the Congolese National Police (Police nationale congolaise; PNC) and the efforts to reform it between 2004 and 2016. It further attempts to explain why so little progress was made in the SSR of the PNC, despite extensive involvement from donors. The article shows that the instrumental and traditional approach to SSR is partly to blame, because in this case it failed to address the root problems and initiate the needed fundamental reform and reconstruction of the police force. It also shows that reforming local security institutions becomes even more difficult when the local authorities do not support the effort.  相似文献   
102.
103.
The malaise that the United States, and the West, have experienced in recent campaigns stems in large part from unclear thinking about war, its political essence, and the strategies needed to join the two. Instead, analysis and response are predicated on entrenched theoretical concepts with limited practical utility. The inadequacy of understanding has spawned new, and not so new, terms to capture unanticipated trends, starting with the re-discovery of “insurgency” and “counterinsurgency” and leading to discussion of “hybrid threats” and “gray-zone” operations. New terminology can help, but the change must go deeper. Challenging analytical orthodoxy, this article sets out a unifying approach for the study of political violence, or more accurately: violent politics. It provides a conceptual foundation that helps to make sense of recent shifts in warfare. In effect, it offers sorely needed theoretical insights into the nature of strategy and guides the process of responding to nontraditional threats.  相似文献   
104.
Most ammunition is produced long before its ultimate consumption and stored in a series of different depots for a considerably long period of time. During storage, the quality of the ammunition stockpile deteriorates proportionally to the condition of the depots. We view different conditions associated with a series of depots as step stress. A random effects logistic regression model is employed to predict the quality of ammunition stockpile in terms of the routing information such as a series of locations and duration of storage of ammunition lots. The resultant prediction model can be used to determine the appropriate time for reorder or renovation of ammunition before the quality becomes substandard. An example is given to illustrate the implementation procedure of the prediction model suggested in this article. © 1994 John Wiley & Sons, Inc.  相似文献   
105.
The simulations that many defense analysts rely upon in their studies continue to grow in size and complexity. This paper contrasts the guidance that the authors have received—from some of the giants of military operations research—with the current practice. In particular, the analytic utility of Hughes' simple salvo equations is compared with that of the complex Joint Warfighting System (JWARS), with respect to JWARS' key performance parameters. The comparison suggests that a family of analytic tools supports the best analyses. It follows that smaller, more agile, and transparent models, such as Hughes' salvo equations, are underutilized in defense analyses. We believe that these models should receive more attention, use, and funding. To illustrate this point, this paper uses two very simple models (by modern standards) to rapidly generate insights on the value of information relative to force strength. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2003  相似文献   
106.
107.
In a caching game introduced by Alpern et al. (Alpern et al., Lecture notes in computer science (2010) 220–233) a Hider who can dig to a total fixed depth normalized to 1 buries a fixed number of objects among n discrete locations. A Searcher who can dig to a total depth of h searches the locations with the aim of finding all of the hidden objects. If he does so, he wins, otherwise the Hider wins. This zero‐sum game is complicated to analyze even for small values of its parameters, and for the case of 2 hidden objects has been completely solved only when the game is played in up to 3 locations. For some values of h the solution of the game with 2 objects hidden in 4 locations is known, but the solution in the remaining cases was an open question recently highlighted by Fokkink et al. (Fokkink et al., Search theory: A game theoretic perspective (2014) 85–104). Here we solve the remaining cases of the game with 2 objects hidden in 4 locations. We also give some more general results for the game, in particular using a geometrical argument to show that when there are 2 objects hidden in n locations and n→∞, the value of the game is asymptotically equal to h/n for hn/2. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 23–31, 2016  相似文献   
108.
Traditionally, policy and planning have been institutionally weak in the Naval Staff (Office of the Chief of Naval Operations – OPNAV). In their place, the N8 (Programming) has dominated resource decision-making, and, by default, decisions relating to policy and planning. Recent uncertainty over defense authorization and appropriations has resulted in calls for a greater role to be played by the N3/5, Policy and Plans Directorate. The article argues that reform of the Department of the Navy’s planning process is urgently needed. OPNAV’s weak planning and overly dominant programming practices are compared with those of the Departments of the Army and Air Force and are shown to be out of conformance with them. The article concludes with specific and detailed recommendations for reform of both the current planning and programming processes.  相似文献   
109.
ABSTRACT

Extended deterrence has been a main pillar of the security alliance between the United States and South Korea (Republic of Korea [ROK]) since the end of the Korean War. The changing dynamics of US extended deterrence in Korea, however, affected Seoul’s strategic choices within its bilateral alliance relationship with Washington. Examining the evolution of US extended deterrence in the Korean Peninsula until the Nixon administration, this article explains why South Korea began its nuclear weapons programme in a historical context of the US–ROK alliance relationship. This article argues that President Park Chung-hee’s increasing uncertainty about the US security commitment to South Korea in the 1960s led to his decision to develop nuclear weapons in the early 1970s despite the fact that US tactical nuclear weapons were still stationed in South Korea.  相似文献   
110.
To meet customer demand, delivery companies are offering an increasing number of time‐definite services. In this article, we examine the strategic design of delivery networks which can efficiently provide these services. Because of the high cost of direct connections, we focus on tree‐structured networks. As it may not be possible to identify a tree‐structured network that satisfies all of the delivery guarantees, we allow these guarantees to be violated but seek to minimize the sum of the violations. We establish the complexity of the problem and exploit an empirically identified solution structure to create new neighborhoods which improve solution values over more general neighborhood structures. © 2008 Wiley Periodicals, Inc. Naval Research Logistics, 2008  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号