首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 234 毫秒
1.
Mathematical models of tactical problems in Hntisubmarine Warfare (ASW) are developed. Specifically, a game of pursuit between a hunter-killer force. player 1, and a possible submarine, player 2 is considered. The game consists of a sequence of moves and terminates when player 2 is tcaught or evades player 1. When the players move they observe the actual tactical configuration of the forces (state) and each player choosa-s a tactical plan from a finite collection. This joint choice of tactical plans determines an immediate payoff and a transition probability distribution over the states. Hence an expected payoff function is defined, Formally this game is a Terminating Stochastic Game (TSG). Shapley demonstrated the existence of a value and optimal strategies (solution), An iterative technique to approximate the solution to within desired accuracy is proposed. Each iteration of the technique is obtained by solving a set of linear programs. To introduce more realism into the game several variations of the TSG are also considered. One variation is a finite TSG and linear programming techniques are employed to find the solution.  相似文献   

2.
What explains the variation in states’ nonstate partners in civil warfare? States often use nonstate actors to do what their regular military forces cannot do well – navigate the local population. Some of their nonstate partners are ordinary civilians, while others are battle-hardened fighters with a rebellious or criminal past. The choice of proxy carries serious implications for the patterns and effects of violence during civil war, human rights, and international security. This article is the first to disaggregate the nonstate counterinsurgents and offer an explanation for why and how states use each type. It brings together the politics of collaboration with the politics of exploitation. The article shows that the state’s use of nonstate proxies is shaped by the supply of willing collaborators, the state’s ability to exercise control over them, and the trade-offs underlying the use of the different types of nonstate actors. The empirical evidence used to support this argument comes from a novel, comparative study of Turkey’s counterinsurgency campaign against Kurdish separatists and India’s counterinsurgency against Kashmiri separatists. The original data were collected through fieldwork in the disputed territories of each country.  相似文献   

3.
There is a finite cyclic graph. The hider chooses one of all nodes except the specified one, and he hides an (immobile) object there. At the beginning the seeker is at the specified node. After the seeker chooses an ordering of the nodes except the specified one, he examines each nodes in that order until he finds the object, traveling along edges. It costs an amount when he moves from a node to an adjacent one and also when he checks a node. While the hider wishes to maximize the sum of the traveling costs and the examination costs which are required to find the object, the seeker wishes to minimize it. The problem is modeled as a two‐person zero‐sum game. We solve the game when unit costs (traveling cost + examination cost) have geometrical relations depending on nodes. Then we give properties of optimal strategies of both players. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004.  相似文献   

4.
Counterinsurgency (COIN) has again emerged as a topic of both contemporary and historical interest in the age of what has been called a global counterinsurgency. However, little attention is being paid to the historical lineage of a COIN doctrine that is being rediscovered and promoted by an enthusiastic group of military intellectuals and commanders as the basis for US Army and Marine Corps doctrine. This article argues that historical claims for COIN success, based on courting popular gratitude by improving economic conditions, are at best anchored in selective historical memory, when not fantasy fabrications. The first argument of this article is that COIN does not constitute a distinct form of warfare, but merely a sub-set of minor tactics. Second, ‘hearts and minds’, so-called population-centric warfare, has seldom been a recipe for lasting stability. Rather, historically counterinsurgency succeeded when it has shattered and divided societies by severely disrupting civilian life. In fact, COIN is a nineteenth century legacy of empire whose uniqueness and impact was mythologized in its own day, and that is unlikely to prove a formula for strategic success in the twenty-first century.  相似文献   

5.

Plunder and trade are theoretically and historically entwined in complex ways. This paper examines when rational players will choose one or both by employing a model of plunder within an evolutionary game theoretic framework. Evolutionary stable strategy equilibria are derived and the replicator dynamics are examined for simple two-by-two symmetric games. Not only are positive defense allocations necessary for trade, implying that all trade is of a contested nature, but the defense technology must also exhibit sufficient effectiveness relative to the plunder technology. A continuum of possible exchanges is proposed that is based on the effectiveness of enforcing property claims. For high levels of transactions costs, plunder dominates. As transactions costs decline, mutual trade emerges as one possible exchange mechanism. All market exchange entails some cost of enforcement; it is contested. Insufficient enforcement of property claims produces mutual plunder as the dominant exchange mechanism. Some implications are suggested for institutional evolution. C7 K4 N4  相似文献   

6.
In a caching game introduced by Alpern et al. (Alpern et al., Lecture notes in computer science (2010) 220–233) a Hider who can dig to a total fixed depth normalized to 1 buries a fixed number of objects among n discrete locations. A Searcher who can dig to a total depth of h searches the locations with the aim of finding all of the hidden objects. If he does so, he wins, otherwise the Hider wins. This zero‐sum game is complicated to analyze even for small values of its parameters, and for the case of 2 hidden objects has been completely solved only when the game is played in up to 3 locations. For some values of h the solution of the game with 2 objects hidden in 4 locations is known, but the solution in the remaining cases was an open question recently highlighted by Fokkink et al. (Fokkink et al., Search theory: A game theoretic perspective (2014) 85–104). Here we solve the remaining cases of the game with 2 objects hidden in 4 locations. We also give some more general results for the game, in particular using a geometrical argument to show that when there are 2 objects hidden in n locations and n→∞, the value of the game is asymptotically equal to h/n for hn/2. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 23–31, 2016  相似文献   

7.
Abstract

How do contemporary secessionist movements gain international recognition of their claims to self-determination? I argue that international recognition is forthcoming when a sufficient number of states believe a claim to self-determination ought to be accepted. That is, states recognize claims to self-determination when they perceive them to be legitimate. To convince outsiders of the legitimacy of their claims, separatist movements invoke resonant norms and symbols in a moral economy that structures decision-making. I contrast this argument with prevailing explanations of recognition dynamics. To illustrate the argument, I examine the diplomacy surrounding Kosovo’s independence bid and unilateral secession.  相似文献   

8.
As a result of allied subsidy and the influence of sunk costs, the marginal cost of the Gulf War to the US was reduced to negligible size. This result is at variance with the Olson‐Zeckhauser thesis that in an alliance “the small exploit the large.” A game theoretic alternative explanation suggests that the relation between allies resembles the game of Chicken, successfully played by the US. The ability to shift the marginal costs of war in the short term raises questions about the possible underestimation of long term effects.  相似文献   

9.
This paper explores the notion that US efforts to evade the political costs of war paradoxically contribute to the subsequent exacerbation of costs over time. Leaders seek to purchase political capital in the short term by limiting the costs and requirements of military operations, but in doing so cause strategic and political liabilities to mount in the long run. While identification of such behaviour is not new, insufficient attention has been devoted to explaining its causes, dynamics, and manifestations in relation to key decisions on and in war. Evidence derived from studies of recent American discretionary campaigns is analysed to advance an argument with respect to this pattern of self-defeating strategic behaviour.  相似文献   

10.
In this paper, a condition-based maintenance model for a multi-unit production system is proposed and analyzed using Markov renewal theory. The units of the system are subject to gradual deterioration, and the gradual deterioration process of each unit is described by a three-state continuous time homogeneous Markov chain with two working states and a failure state. The production rate of the system is influenced by the deterioration process and the demand is constant. The states of the units are observable through regular inspections and the decision to perform maintenance depends on the number of units in each state. The objective is to obtain the steady-state characteristics and the formula for the long-run average cost for the controlled system. The optimal policy is obtained using a dynamic programming algorithm. The result is validated using a semi-Markov decision process formulation and the policy iteration algorithm. Moreover, an analytical expression is obtained for the calculation of the mean time to initiate maintenance using the first passage time theory.  相似文献   

11.
The utilization of chemical weapons to quash domestic rebellion is a drastic action for a regime facing domestic challengers to take, especially given the reputation costs and risk of international intervention. However, recent developments have illustrated that some regimes have contemplated and implemented extraordinary measures (including the use of chemical munitions) to quash rebellion. This study addresses the question of why some states utilize chemical weapons against domestic challengers while others refrain from this level of state repression. I argue that the utilization of chemical weapons has both domestic and international elements. Specifically, that ethnic cleavages that lead to secessionist challenges and factors associated with inter-state rivalry impact the likelihood that a state utilizes the employment of chemical munitions. I test my argument and other explanations regarding repression with a casestudy approach utilizing captured Iraqi Government documents comparing Iraq’s Al-Anfal campaigns with developments during the recent Syrian Civil War.  相似文献   

12.
An EMQ model with a production process subject to random deterioration is considered. The process can be monitored through inspections, and both the lot size and the inspection schedule are subject to control. The “in-control” periods are assumed to be generally distributed and the inspections are imperfect, i.e., the true state of the process is not necessarily revealed through an inspection. The objective is the joint determination of the lot size and the inspection schedule, minimizing the long-run expected average cost per unit time. Both discrete and continuous cases are examined. A dynamic programming formulation is considered in the case where the inspections can be performed only at discrete times, which is typical for the parts industry. In the continuous case, an optimum inspection schedule is obtained for a given production time and given number of inspections by solving a nonlinear programming problem. A two-dimensional search procedure can be used to find the optimal policy. In the exponential case, the structure of the optimal inspection policy is established using Lagrange's method, and it is shown that the optimal inspection times can be found by solving a nonlinear equation. Numerical studies indicate that the optimal policy performs much better than the optimal policy with periodic inspections considered previously in the literature. The case of perfect inspections is discussed, and an extension of the results obtained previously in the literature is presented. © 1998 John Wiley & Sons, Inc. Naval Research Logistics 45: 165–186, 1998  相似文献   

13.
Ethno-national territorial disputes typically involve conflicting homeland claims between states and minority ethnic groups. Where such minority ethnic groups have cross-border ethnic kin who themselves constitute a dominant or influential ethnic group in a neighbouring state, separatist goals may take the form of either irredentism or independence. We conjecture that external sympathy for irredentism and independence may vary significantly, and that this variation may be an important influence in situations where secessionist groups and ethnic kin states have a choice between the two goals. Using a bargaining framework that controls for variation in relative power, status quo conditions and minority-side leadership preferences, we present experimental evidence indicating that external audiences are likely to support more confrontational policies in pursuit of independence than in pursuit of irredentism. Our evidence also indicates that independence attracts greater support largely because outsiders perceive it as a more legitimate goal; and that practical efficacy is not important in stimulating sympathy for either independence or irredentism. These results also support a broader argument in the literature on international norms – that such norms receive support not only because they may justify pre-existing goals or interests, but also because they are perceived as having greater legitimacy per se.  相似文献   

14.
ABSTRACT

Is Currency Warfare defined as, the use of monetary or military force directed against an enemy’s monetary power as part of a military campaign, a just way to fight a war? This article explores the ethics of waging currency warfare against the Just War Tradition’s principles of jus in bello (just conduct in war) and its criteria of discrimination and proportionality. The central argument is that currency warfare is inherently indiscriminate but may be proportionate when policy makers consider the nature of the threat confronted and the targeted currency's level of internationalization, that is, to what degree it is used in foreign transactions or used as a foreign currency reserve. I evaluate this argument against historical cases during the Second World War (1939–1945), the Gulf War (1990–1991), subsequent operations against Saddam Hussein in the early 1990s, and the ongoing campaign against ISIS.  相似文献   

15.
This paper considers the problem of computing optimal ordering policies for a product that has a life of exactly two periods when demand is random. Initially costs are charged against runouts (stockouts) and outdating (perishing). By charging outdating costs according to the expected amount of outdating one period into the future, a feasible one period model is constructed. The central theorem deals with the n-stage dynamic problem and demonstrates the appropriate cost functions are convex in the decision variable and also provides bounds on certain derivatives. The model is then generalized to include ordering and holding costs. The paper is concluded with a discussion of the infinite horizon problem.  相似文献   

16.
International safeguards is the system of measures put in place by the International Atomic Energy Agency and states to ensure nuclear programs remain dedicated to peaceful purposes. This international safeguards system consists of agreements, inspections, and evaluations that have never considered the safeguards culture of a state or facility. Neither a common definition nor an understanding of safeguards culture is internationally recognized. This article provides an analysis of the concept of safeguards culture and gauges its value to the international safeguards community. The authors explore distinctions among safeguards culture, safeguards compliance, and safeguards performance, and suggest possible indicators of safeguards culture and methods to promote a strong, positive safeguards culture.  相似文献   

17.
This paper presents a one-period two-echelon inventory model with one warehouse in the first echelon and n warehouses in the second echelon. At the beginning of the period the stock levels at all facilities are adjusted by purchasing or disposing of items at the first echelon, returning or shipping items between the echelons and transshipping items within the second echelon. During the period, demands (which may be negative) are placed on all warehouses in the second echelon and an attempt is made to satisfy shortages either by an expedited shipment from the first echelon to the second echelon or an expedited transshipment within the second echelon. The decision problem is to choose an initial stock level at the first echelon (by a purchase or a disposition) and an initial allocation so as to minimize the initial stock movement costs during the period plus inventory carrying costs and system shortage costs at the end of the period. It is shown that the objective function takes on one of four forms, depending on the relative magnitudes of the various shipping costs. All four forms of the objective function are derived and proven to be convex. Several applications of this general model are considered. We also consider multi-period extensions of the general model and an important special case is solved explicitly.  相似文献   

18.
Ogen Goldman 《Civil Wars》2016,18(4):439-466
This study draws attention to the question: Do democracies fight indirectly through material support to violent non-governmental organizations (VNGOs) which wage intrastate war against other states in general and against democracies in particular, or are democracies less warlike by proxy? The main conclusions are: democracies are less warlike by proxy than non-democratic states, and the more democratic the regime the lower the probability that it will support VNGOs waging war against other states, both in general and against other democracies in particular. The results do not unequivocally support both the monadic or dyadic argument of democratic peaceful behaviour  相似文献   

19.
Why do partitioned successor states engage one another in armed conflict? We explore the drivers of war between successor states by comparing two border crises that followed the partitions of Ethiopia (1993) and Sudan (2011). We argue that the politico-military struggles that give way to partition create important historical memories that shape what successor states think about the utility of military force. While the partition of Ethiopia yielded successor states led by regimes that were victors of the preceding war of partition, the war of partition in Sudan produced successor states that emerged out of military stalemate. This distinction explains why Ethiopia and Eritrea waged a costly border war that Sudan and South Sudan were able to avoid.  相似文献   

20.
We consider two game‐theoretic settings to determine the optimal values of an issuer's interchange fee rate, an acquirer's merchant discount rate, and a merchant's retail price in a credit card network. In the first setting, we investigate a two‐stage game problem in which the issuer and the acquirer first negotiate the interchange fee rate, and the acquirer and the retailer then determine their merchant discount rate and retail price, respectively. In the second setting, motivated by the recent US bill “H.R. 2695,” we develop a three‐player cooperative game in which the issuer, the acquirer, and the merchant form a grand coalition and bargain over the interchange fee rate and the merchant discount rate. Following the cooperative game, the retailer makes its retail pricing decision. We derive both the Shapley value‐ and the nucleolus‐characterized, and globally‐optimal unique rates for the grand coalition. Comparing the two game settings, we find that the participation of the merchant in the negotiation process can result in the reduction of both rates. Moreover, the stability of the grand coalition in the cooperative game setting may require that the merchant should delegate the credit card business only to the issuer and the acquirer with sufficiently low operation costs. We also show that the grand coalition is more likely to be stable and the U.S. bill “H.R. 2695” is thus more effective, if the degree of division of labor in the credit card network is higher as the merchant, acquirer, and issuer are more specialized in the retailing, acquiring, and issuing operations, respectively. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号