Results 71 to 80 of about 17,305 (218)

How digitisation of herbaria reveals the botanical legacy of the First World War

open access: yesPLANTS, PEOPLE, PLANET, EarlyView.
Digitisation of herbarium collections is bringing greater understanding to bear on the complexity of narratives relating to the First World War and its aftermath – scientific and societal. Plant collecting during the First World War was more widespread than previously understood, contributed to the psychological well‐being of those involved and ...
Christopher Kreuzer, James A. Wearn
wiley   +1 more source

The second mission of the Serbian Armed Forces: Genesis, characteristics and media treatment [PDF]

open access: yesVojno delo, 2018
Starting from the belief that security risks in the modern world confirm indivisibility of security at a global level that is a very high level of interdependence between states and regions, the Republic of Serbia, acting on its foreign policy plan, advocates affirmation of cooperative security concept.1 In accordance with this, it takes an active part
openaire   +2 more sources

Automated processing of data on the use of motor vehicles in the Serbian Armed Forces [PDF]

open access: yesVojnotehnicki glasnik, 2012
The main aim of introducing information technology into the armed forces is the automation of the management process. The management in movement and transport (M&T) in our armed forces has been included in the process of automation from the beginning. For that reason, today we can speak about the automated processing of data on road traffic safety and ...
Nikola S. Osmokrović   +2 more
openaire   +2 more sources

What type of armed forces do we need? [PDF]

open access: yesВојно дело, 2015
The model, organization and strength of armed forces are an issue of strategic importance for any country. At crucial times, of course, the question of the country's armed forces comes on the agenda.
Forca Božidar
doaj   +1 more source

Loanwords and Linguistic Phylogenetics: *pelek̑u‐ ‘axe’ and *(H)a(i̯)g̑‐ ‘goat’1

open access: yesTransactions of the Philological Society, Volume 123, Issue 1, Page 116-136, March 2025.
Abstract This paper assesses the role of borrowings in two different approaches to linguistic phylogenetics: Traditional qualitative analyses of lexemes, and quantitative computational analysis of cognacy. It problematises the assumption that loanwords can be excluded altogether from datasets of lexical cognacy.
Simon Poulsen
wiley   +1 more source

Western Balkans as the Frontline of Russian Hybrid Warfare

open access: yesGlobal Policy, EarlyView.
ABSTRACT Hybrid warfare (HW) scholarship acknowledges the phenomenon's contextual and temporal specificity, yet its dominant conceptual framing has generated a literature largely centred on identifying and categorising hybrid activities. This focus has left the contextual vulnerabilities that enable hybrid threats (HTs) and shape an adversary's ...
Vesna Bojicic‐Dzelilovic
wiley   +1 more source

Satellite vehicle tracking aiming to increase traffic safety within the Serbian Armed Forces

open access: yesVojnotehnicki glasnik, 2012
The purpose of this work is to show how to affect the most important factor of traffic safety - an individual, by using some technical solutions of satellite tracking of vehicles. By using units of the Land Forces as an example, a brief analysis of traffic safety for vehicles less than 5 years old has been performed.
Igor S. Milanović   +1 more
openaire   +2 more sources

International law and the participation of members of the Serbian Armed Forces in multinational operations of the European Union [PDF]

open access: yesВојно дело, 2015
The participation of members of the Serbian Armed Forces in multinational operations of the European Union takes place within the framework set by the rules of the national, European, and international law.
Milić Tatjana
doaj   +1 more source

The logic of secret alliances

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract Alliances are typically understood as agreements intended to deter aggression from enemy states. By signaling an ally's commitment to a protégé state, a shared enemy may be deterred from attacking. In light of this signaling logic, secret alliances are puzzling.
Peter Bils, Bradley C. Smith
wiley   +1 more source

Competitive diplomacy in bargaining and war

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract War is often viewed as a bargaining problem. However, prior to bargaining, countries can vie for leverage by expending effort on diplomacy. This article presents a dynamic model of conflict where agenda‐setting power is endogenous to pre‐bargaining diplomatic competition.
Joseph J. Ruggiero
wiley   +1 more source

Home - About - Disclaimer - Privacy