Skip to main content
Decisive Events (DEs) in the Australian Army are the principal building blocks to designbattle at the tactical level. Unfortunately from an organisational perspective, the Armyhas fostered a culture of mediocrity as it has tolerated,... more
    • by  and +1
    •   4  
      Australian ArmyAustralian military historyStrategy and Military OperationsMilitary Tactics
: During the most recent rounds of Base Closure and Realignment Commission activities in 2005, a significant number of training bases were closed. In light of the introduction of new technologies and the great expansion of unmanned... more
    • by 
    •   4  
      StrategyDronesRequirementsMilitary Tactics
    • by 
    •   3  
      ArtilleryInfantryMilitary Tactics
The advent of precision-guided weapons has changed the nature of war and, by extension, political power throughout the world and the perception and use of nuclear arms.
    • by 
    •   19  
      Military HistoryMilitary ScienceStrategy (Military Science)Tactics (Military Science)
This volume contains six essays with a focus on how to conduct and lead ground operations. The essays are written by officers of the Swedish Higher Joint Command and Staff Programme. The contributions in the volume all have a focus on... more
    • by  and +1
    •   16  
      Military HistoryMilitary ScienceStrategy (Military Science)Tactics (Military Science)
Drones are one of the new threats to tactical units. The armed forces use them with various successes in operations. However, the smallest tactical unit such as rifle section is generally still unprepared to operate drones and perform... more
    • by  and +1
    •   20  
      Tactics (Military Science)Leadership Influence TacticsCommand and ControlDrones, Targeted Killing, Ethics of War
    • by 
    •   8  
      RoboticsEthicsInternational LawRobots
Drones are one of the new threats to tactical units. The armed forces use them with various successes in operations. However, the smallest tactical unit such as rifle section is generally still unprepared to operate drones and perform... more
    • by 
    •   18  
      Tactics (Military Science)Leadership Influence TacticsCommand and ControlUnmanned Aerial Vehicle (UAV)
    • by 
    •   7  
      Military HistoryGeographyTheoryIslam
    • by 
    •   4  
      StrategyDronesRequirementsMilitary Tactics
    • by 
    •   3  
      Military HistoryCase StudiesMilitary Tactics
    • by 
    •   4  
      Game TheorySITUATIONAL AWARENESSAsymmetryMilitary Tactics
    • by 
    •   5  
      EngineeringMilitary IntelligenceGuerrilla WarfareMilitary Tactics
After a brief description of the units in Alexander’s army and those of the Persian and Indian forces that faced him, Alexander’s four great battles (Granikos, Issos, Gaugamela and Hydaspes) are analysed in detail using the relevant... more
    • by 
    •   3  
      Alexander the GreatAncient WarfareMilitary Tactics
    • by 
    •   5  
      LeadershipCognitionAwarenessTerrain
    • by 
    •   4  
      EngineeringFire ProtectionInfantryMilitary Tactics
: Many scholars of the First World War have examined the European armies in new ways that have shown not only how those armies actually fought along the Western Front, but how they changed their ideas and methods over time, and why they... more
    • by 
    •   2  
      Military HistoryMilitary Tactics
    • by 
    •   8  
      EngineeringTerrorismInternational AffairsPlanning
    • by 
    •   2  
      Military HistoryMilitary Tactics
    • by 
    •   2  
      Radio BroadcastingMilitary Tactics
Conceptualization of Local Combat Identity revealed through Battle of Gannoruwa. (AIPAR & AIPA Loop Concept) Major Thusara Witharana The Portuguese, who has invaded Kandyan Kingdom in 1592, 1603 and 1630, faced massive defeats from... more
    • by 
    •   5  
      Military HistoryTactics (Military Science)History of WarMilitary Tactics
    • by 
    •   9  
      LearningVirtual RealityBest practiceShared Knowledge
    • by 
    •   9  
      Artificial IntelligenceCognitionInformation ProcessingLearning
    • by 
    •   7  
      Military HistoryLeadershipAmerican RevolutionAmerican Revolutionary War
: Hezbollah has emerged as the most dangerous terrorist group in the world. It has about 25,000 active armed members and it can muster a million more in the streets. These terrorists are disciplined, highly trained, and have incredibly... more
    • by 
    •   5  
      EngineeringPublic OpinionIsraelOrganizations
    • by 
    •   5  
      EthicsEmbedded SystemsRobotsLethality
    • by 
    •   6  
      Systems EngineeringDecision Support SystemsQueueing theoryMathematical Models
    • by 
    •   3  
      MediaInformation ExchangeMilitary Tactics
    • by 
    •   5  
      LeadershipBiotechnologyTheoryLearning
... Also see Siddharth Varadarajan, “After Evi-dence Dossier, Direct Accusation Against Pakistan Strikes Discordant Note,” The Hindu, January 8, 2009. Page 22. Implications The LeT attacks on Mumbai have serious implications for India,... more
    • by 
    •   7  
      TerrorismInternational AffairsPlanningEmergency Preparedness
AsDefense agencies and services expand their reliance on computer networks, risk to information availability and integrity increases. It is no longer adequate to rely solely on the now traditional defense-in-depthstrategy. We... more
    • by 
    •   14  
      Computer ScienceInformation SecurityComputer NetworksRisk
    • by 
    •   13  
      EngineeringHistoryPerceptionSurprise
Abstract : The outcome of the conflicts that the American military is likely to fight in the decades ahead will increasingly depend on tactical success and the empowerment of small unit leaders. Recent advances in technology have the... more
    • by 
    •   8  
      EngineeringMilitary IntelligenceIntelligenceLeadership
Abstract : Technological innovation brings with it the promise of greater efficiency. This is particularly true for innovations applied to the implements of war. Moreover, at punctuated intervals throughout human history technical and... more
    • by 
    •   6  
      RoboticsEthicsInternational LawRobots
Abstract : This monograph conducts an analysis of historical data to detect trends in war and the evolution to modern tactical battle. It also investigates the continued use of Lanchester-based attrition models. Military analysts have... more
    • by 
    •   7  
      CatalystsDynamicsLethalityAccuracy
    • by 
    •   3  
      InterviewingOrganization TheoryMilitary Tactics
Drones are one of the new threats to tactical units. The armed forces use them with various successes in operations. However, the smallest tactical unit such as rifle section is generally still unprepared to operate drones and perform... more
    • by 
    •   18  
      Tactics (Military Science)Leadership Influence TacticsCommand and ControlUnmanned Aerial Vehicle (UAV)
    • by 
    •   9  
      LearningVirtual RealityBest practiceShared Knowledge
    • by 
    •   9  
      Artificial IntelligenceCognitionInformation ProcessingLearning
The use of Combined Arms, a very important set of tactics, techniques, and procedures to the Marine Corps, is complex and requires considerable practice and training of the entire Combined Arms (CA) team. Simulations exist and are being... more
    • by 
    •   6  
      FeedbackIntelligent Tutoring SystemDevelopment MethodologyLessons Learned
    • by 
    •   11  
      EngineeringComputer ScienceCognitionGroup Dynamics
... decay and incessant crvrl wars 5 Philip of Macedon, a prince from a petty and senn-barbanc northern kmgdom, had been ... wars We can only afford to fight a big one, and d there is one that 1s the kmd rt will be “30 15 Page 20. ...
    • by 
    •   7  
      Military HistoryPolitical ScienceInformation WarfareCyberwarfare
Chapter 10 Dialogue as Medium (and Message) for Training Critical Thinking Marvin S. Cohen Cognitive Technologies, Inc., Arlington, VA Leonard Adelman George Mason University Terry Bresnick F. Freeman Marvin Innovative Decisions, Inc.,... more
    • by 
    •   9  
      PsychologyDecision MakingTeamsCritical Thinking
: This research paper addresses different (e.g. historical, ideological, operational, tactical, technical) aspects related to the unique asymmetric naval warfare doctrine of the Islamic Republic of Iran (IRI) and its naval forces. It is... more
    • by 
    •   5  
      Asymmetric WarfareMilitary StrategyMilitary TacticsUnconventional Warfare
: A psychologically-oriented conceptual framework of distributed tactical decision making (DTDM), applicable to future Naval Battle Groups/Forces operating within a reconfigurable command and control system in a multithreat environment,... more
    • by 
    •   10  
      EngineeringCognitionGroup DynamicsVisual perception (Psychology)
: This study attempts to analyze the decisions made by Field Marshal Albert Kesselring prior to and during the battle of Anzio in February 1944. The focus of the investigation is on Kesselring's decision to shift Army Group reserves... more
    • by 
    •   7  
      EngineeringHistoryPersonalityLeadership
: Just over a century ago, a British admiral condemned the newly invented submarine as an "underhand, unfair, and damned un-English weapon." The officer underscored his disdain for the craft by urging that submarine crews be... more
    • by 
    •   9  
      Military HistorySecond World WarVietnam WarIdentification
If you really want to be smarter, reading can be one of the lots ways to evoke and realize. Many people who like reading will have more knowledge and experiences. Reading can be a way to gain information from economics, politics, science,... more
    • by 
    •   3  
      EngineeringMilitary TacticsUnconventional Warfare
: The penalty for undertaking urban combat operations without first performing reconnaissance has historically proven very costly on more than one occasion. Yet reconnaissance is considerably more difficult in villages, towns, and cities... more
    • by 
    •   2  
      Military IntelligenceMilitary Tactics
: As Defense agencies and services expand their reliance on computer networks, risk to information availability and integrity increases. It is no longer adequate to rely solely on the now traditional defense-in-depth strategy. We must... more
    • by 
    •   16  
      EngineeringComputer ScienceInformation SecurityComputer Networks