Search Results

1 - 10 of 22 items :

  • "technology" x
  • Military History x
Clear All
The Hidden Grand Narrative of Western Military Policy: A Linguistic Analysis of American Strategic Communication

://www.strategicstudiesinstitute.army.mil/pubs/download.cfm?q=752 [19 Oct 2010]. Mouffe, C. (2005) On the political. London: Routledge. Rantapelkonen, J. (2006) The Narrative Leadership of War: Presidential Phrases in the 'War on Terror'and their Relation to Information Technology. Doctoral Dissertation. Publication Series 1, Research n:o 34, Helsinki: National Defence University. Shimko, K. L. (2010) The Iraq Wars and America’s Military Revolution, New York: Cambridge University Press. Taylor, P. (2003) Munitions of the Mind: A History of Propaganda from the

Open access
Enhancement of National Collaboration Between Defence Establishment and Industry by Systems Approach

transatlantic defence R&D gap: causes, consequences and controversies. Defence & Peace Economics. [Article]. 2006;17(3):223-38. 20. Bellais R, Guichard R. Defense innovation, technology transfers and public policy. Defence & Peace Economics. [Article]. 2006;17(3):273-86. 21. Kelly T, Rishi M, Hartley K, Warner JT. An empirical study of the spin-off effects of military spending. Defence & Peace Economics. [Article]. 2003;14(1):7. 22. McGuire MC. Uncertainty, risk aversion, and optimal defense against interruptions in supply

Open access
Dependency of Military Capabilities on Technological Development

References Gediminas Adomavicius, Jesse C. Bockstedt, Alok Gupta, Robert J. Kauffman (2005). Technology roles and paths of influence in an ecosystem model of technology evolution, Information Technology and Management, Vol. 8, Issue 2, 185-202. Muhammad Amer, Tugrul U. Daim, Antonie Jetter (2013). A review of scenario planning, Futures 46, 23-40. Patrick T. Biltgen, Dimitri N. Mavris (2007). Capability-based quantitative technology evaluation for systems-of-systems, IEEE System of Systems Engineering Conference

Open access
An Analysis of North Korea’s Satellite Launches

). Explaining the Musudan. Munich: Schmucker Technologie. Schiller, M., & Schmucker, R. H. (2012b). The Assumed KN-08 Technology. Munich: Schmucker Technologie. Sessions, J. (2008). Ballistic Missile Defense: A National Priority. Strategic Studies Quarterly, 22-30. Shampine, L.F., Reichelt, M. W. (1997), The Matlab ODE Suite. SIAM Journal on Scientific Computing 18 (1), 1-22. Vallado, D.A. (2007) Fundamentals of Astrodynamics and applications (3rd ed.), New York : Springer. Vick, C. P. (2012

Open access
Shaped Charge Calculation Models for Explosive Ordnance Disposal Operations

Abstract

The clearance of unexploded ordnance (UXO) and other explosive remnants of war (ERW) containing shaped charge warheads poses a particular technical hazard to consider for explosive ordnance disposal (EOD) personnel. The wide use of light anti-tank weapons, such as rocket propelled grenades and the scattering of sub-munitions in different conflict areas have made the clearance of shaped charge ammunition a frequent task. However, unlike other hazards, for shaped charges, EOD personnel lack adequate means for the establishment of the maximum hazardous area and for the design of measures for hazard confinement against the shaped charge effect.

In this article two different models are suggested, which together give guidance for protective measures during clearance of shaped charge ammunition. The development of these models is based on their military utility, by consideration of the limited information availability, the short time frames, the working methods and the technology level that are characteristic for EOD operations. The two suggested models are developed further into a complete set of design rules for protective measures, giving a versatile tool to replace today´s rough estimates and guesswork, in these safety-related decisions.

Open access
Employing Human Performance Optimization Initiatives from Historically Black Colleges and Universities: The Case of the U.S. Military

Press, June 24. Berwick, D.M. 2002. A User’s Manual for the IoM’s ‘Quality Chasm’ Report. Health Affairs, 21, 3, 60-87. Betancourt, J.R., Green, A.R., Carillo, J.E., and Park, E.R. 2005. Cultural Competence and Health Care Disparities: Key Perspectives on Trends. Health Affairs, 24, 499-505. Bigard, Xavier., Koulmann, Natalie., Banzet, Sebastien., Sanchez, Herve., and Malgoyre, Alexandra. 2009. Are There Ethical Limitations for Improving Physical Performance in Soldiers? The Research and Technology (RTO) Organisation

Open access
The American Way of Remote Air Warfare

Paret. Princeton University Press: Princeton. Cohen, E, 2007. Technology and Warfare. In Baylis, J et al., ed. Strategy in contemporary world: An Introduction to Strategic Studies. Oxford University Press: Oxford. Dawkins, James, 2005. Unmanned Combat Aerial Vehicles: Examining the Political, Moral, and Social Implications. School for Advanced Air and Space Studies: Montgomery. Dunlap, Charles, 1999. Technology and the 21st Century Battlefield. Strategic Studies Institute: Carlisle. Ehrhard, Thomas, 2010

Open access
Non-State Actors in Cyberspace Operations

Militancy,” RAND Corporation, 2001. [5] Arquilla, J. and Ronfeldt, D., “In Athena’s Camp: Preparing for Conflict in the Information Age,” RAND Corporation, 1997. [6] BBC News, “US prepares first-strike cyber-forces,” BBC News Technology, Oct. 12, 2012. Available: http://www.bbc.co.uk/news/technology-19922421 [7] Beidleman, S. W., “Defining and Deterring Cyber War”, Strategy Research Project, U.S. Army War College, Jan. 2009. [8] Bernstein, M. S., Monroy-Hernándex, Harry D., Andreé, P., Panovich, K. and Vargas

Open access
The Strategic Assessment Model (Stratam) Studying and Preventing Strategic Failure

Influence of Clausewitz." Strategic Studies Quarterly 1 (Fall 2007). Mertins, Silke. “Krieg ohne Chronisten.” die tageszeitung, 31 December 2008: 14. Mittelstaedt, Juliane von, Christoph Schult, Daniel Steinvorth, Bernhard Zand. Tage des Krieges, Tage des Zorns. 5 January 2009. http://www.spiegel.de/spiegel/print/d-63344797.html (accessed 09 January 2012). NATO. "Human Systems Integration for Network Centric Warfare." Technical Report, Reserach and Technology Organisation, NATO, 2010. Perrow, Charles. Normal

Open access