首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 128 毫秒
1.
ABSTRACT

Sectarian militants have for years launched attacks from Pakistan across the border to Iran. Finding sanctuary in a neighbouring country can make the difference between success and failure for militants. Conventional wisdom holds that a lasting transnational militancy challenge would typically create serious interstate conflict. Militancy has triggered armed encounters between Iran and Pakistan. This article argues that despite some tension militancy has resulted in deeper cooperation in the ambivalent dyad. Both states’ overarching security concerns, having exhausted other options, the believed involvement of third-party states, and economic potential, have moderately alleviated negative pressure caused by militancy.  相似文献   

2.
Since Operation Enduring Freedom, Central Asian militants, such as the Islamic Movement of Uzbekistan, have fled to Pakistan from their previous strongholds in Afghanistan. However, many militants have begun returning to Central Asia. Thus questions are raised as to what extent militancy has the potential to thrive with the pending North Atlantic Treaty Organization withdrawal from Afghanistan set for 2014? Is militancy a legitimate security threat to Central Asia? What strategies might militants implement? Thus, this article examines the current state of militancy, analyzes militant trends, introduces Afghanistan and Pakistan into the Central Asian equation, and determines the militants' capability and overall strategy. The article concludes that militant Islam, regardless of its current numbers, remains a viable threat to regional security, Afghanistan will be an essential factor for the future of Central Asian militancy, and the form this re-emergence will take becomes apparent.  相似文献   

3.
This article explores the phenomenon of herdsmen militancy as a new trajectory for the farmer–herder crisis in Nigeria, with reference to its humanitarian implications. Relying on a systematic analysis of secondary data and aligning with the analytical anchorage of liberal political ecology theory, the article posits that herdsmen militancy depicts a contradiction in agrarian relations in the context of a national security crisis which has been complicated by salient socio-ecological factors such as climate change, armed violence, and identity politics. In view of the dire humanitarian consequences of this situation, the article submits that herdsmen militancy constitutes a major threat to human and national security in Nigeria. It makes a case for a pragmatic policy capable of mitigating the myriad socio-ecological factors that tend to trigger herdsmen militancy, with prohibition on open grazing in critical hotbeds of herder–farmer conflict as a strategic measure.  相似文献   

4.
This article looks at the Kashmir conflict in South Asia, which has been going on since 1947, when India and Pakistan became independent from British colonial rule. After looking at some historical background, the article looks at both the external dimension as well as the internal dimension of the conflict. The external dimension tends to focus on Indo-Pak relations over Kashmir and the internal dimension looks at India's repressive state policies within the state of Kashmir. This article uses Mary Kaldor's “New War” thesis as a theoretical framework to understand the situation and pays special attention to the conflict's very complex and multifaceted nature. The article argues that although the levels of violence have differed from time to time in the region since 1947, today the conflict seems to have less to do with Indo-Pak relations or the external side of things and has more to do with the internal dimension and India's undemocratic ways within Kashmir. Today, Kashmir is one of the most militarised conflict zones in the world. The stationing of the Indian military and paramilitary forces in the region has only exacerbated the situation since it is the security personnel who cause much of the problem. The Armed Forces Special Powers Act gives these security forces extraordinary powers in the region, which they often abuse. The armed forces have no real understanding of the local culture or sympathy for local religious sentiments. Poverty, corruption, administrative failure, police brutality, identity politics and human rights abuses are some of the key features associated with this conflict. Methodologically, a number of interviews were carried out with the local people in the region recently. From the data gathered through the interviews, it is very obvious that the people still feel very oppressed and that the situation is still very volatile, fraught with uncertainty. Finally, after making an assessment of the situation, the article tries to suggest methods of peaceful building and conflict management as the way forward.  相似文献   

5.
This paper considers the case of Kashmir to examine the relation between the people of the contested land (Indian-occupied Kashmir) and one of the nation states claiming it (India, in this case) in a game-theoretic framework. The motivation for this paper was whether it was possible to rationalize the lack of democratic space in Kashmir, relative to other states in India (especially since the founding fathers of the country had announced such democratic practices to be the guiding principles of the new nation) and at the same time, a highly rigid stance of the Indian Government on the Kashmir issue. An otherwise standard political economic model is used to capture how the way in which citizens determine their allegiance to one or the other nation state (India or Pakistan) can, in turn, affect the nation state's (India's) policies towards the contested land. I conclude that if the Indian Government perceives allegiance of the citizens to be determined primarily by partisan preferences of the citizens, not so much by their preferences for policies, then the government rationally concentrates on minimizing its disutility due to deviations from its ‘most-favorite' policy. This understanding rationalizes the policies of the Indian Government towards Kashmir. More importantly, it points towards areas that need consideration for any peace-making process to take-off.  相似文献   

6.
States employ extended deterrence to shield third parties from aggression. The concept is traditionally applied to interstate relations, collective security arrangements, and strategic considerations. The protective relationship that exists between a state sponsor of terrorism and its non-state militant proxy is rarely considered. This article will introduce and explore the sponsor–proxy relationship in the context of extended deterrence, and relate it to Iran’s support and sponsorship of political violence, militancy, and terrorism in Europe. The article reviews the rationale states have for sponsoring terrorism, and illustrates the promises and pitfalls associated with extending deterrence to non-state militants.  相似文献   

7.
Militant jihad as witnessed in Jammu and Kashmir (J&K) is centred around the primary objective of finding a separate homeland for the Muslims of the state. Opinion on whether this homeland would be an independent entity or merged into Pakistan remains inconclusive. And yet, this externally sponsored violent extremism, spearheaded by interlinked militant formations with significant local participation, has remained deeply religious, highlighting the alleged machinations of the Hindu Indians, both in the state and in India in general, against the Muslim population. Over the years, the objective of liberating Kashmir from Indian control has been attempted not just through an armed movement that targets the symbols of Indian state sovereignty within J&K, but has invested resources carrying violence into the Indian heartland and also making the movement transnational in character by aligning with global terror formations like the al Qaeda and the Islamic State. This paper is an examination of the shifting agenda as well as the activities of three primary militant formations operating in J&K: the Hizb-ul-Mujahideen, the Lashkar-e-Toiba and the Jaish-e-Mohammad and an assessment of the transformation of the Jihad that has bilateral, regional and international security implications.  相似文献   

8.
ABSTRACT

The India–Pakistan War of September 1965 has attracted little attention in the larger body of work on South Asia. Further, almost nothing has been written on the earlier skirmish, in April 1965, between Indian and Pakistani security forces in the Rann-of-Kutch, an uninhabited salt marsh. This article argues that the limited conflict in the Rann, its immediate consequences, and its impact on Pakistani military and civilian leaders were central to Pakistan’s consideration of a military solution to the ongoing dispute in Kashmir, which then led to Indian retaliation and the outbreak of war.  相似文献   

9.
The classical repertoire of insurgency types is under-specified, and does not apply well to the case of Pakistan's conduct of insurgency in Kashmir. Pakistan's approach to insurgency has been a consistent tribal variant of focoism, in which there is a reliance on imported itinerant insurgents to conduct raids to stimulate an uprising. This has its basis in the traditional warfare of the region, learned US insurgency doctrine in the 1960s, and an historical disregard for subject populations, which has led to an aversion to fostering grass-roots political movements.  相似文献   

10.
States commonly take one of three approaches to militant groups on their soil: collaboration; benign neglect; or belligerence. All three approaches are present in Pakistan, where some groups also move back and forth among these categories. I employ the term “coopetition” to capture this fluidity. The dynamic nature of militancy in Pakistan makes the country an excellent laboratory for exploring a state’s assessment of the utility an Islamist militant group offers, and the threat it poses relative to other threats informs the state’s treatment of that group. In this article, I put forward a typology that situates Islamist militants in Pakistan in one of the above four categories. I also illustrate how a group’s identity, objectives, and alliances inform assessments of its utility and threat relative to other threats. In addition to enhancing our understanding of militant–state dynamics, this taxonomy builds on and helps to unify earlier typologies of Pakistani militancy.  相似文献   

11.
ABSTRACT

Following the US invasion of Afghanistan in 2001, Pakistan and the merged Tribal Districts, particularly the North Waziristan Tribal District (NWTD), experienced increasing violent conflict. This paper examines the causes of conflict in North Waziristan from the perspective of local communities. The study is based on qualitative primary data collected in NWTD. The study identifies deep-rooted internal factors such as poor socio-economic conditions, political exclusion, degradation of local institutions and culture, introduction and promotion of Jihadi culture and militancy as the main drivers of conflict in NWTD. External factors, like the USSR and US invasions in Afghanistan, a porous border and unseen international actors, have contributed to the start and even escalation of the more recent conflict, but mainly through exacerbating internal factors. The study recommends that policies aiming to reduce violent conflict in this region pay due attention to the significance of addressing the underlying internal drivers of conflict.  相似文献   

12.
We consider a multi‐stage inventory system composed of a single warehouse that receives a single product from a single supplier and replenishes the inventory of n retailers through direct shipments. Fixed costs are incurred for each truck dispatched and all trucks have the same capacity limit. Costs are stationary, or more generally monotone as in Lippman (Management Sci 16, 1969, 118–138). Demands for the n retailers over a planning horizon of T periods are given. The objective is to find the shipment quantities over the planning horizon to satisfy all demands at minimum system‐wide inventory and transportation costs without backlogging. Using the structural properties of optimal solutions, we develop (1) an O(T2) algorithm for the single‐stage dynamic lot sizing problem; (2) an O(T3) algorithm for the case of a single‐warehouse single‐retailer system; and (3) a nested shortest‐path algorithm for the single‐warehouse multi‐retailer problem that runs in polynomial time for a given number of retailers. To overcome the computational burden when the number of retailers is large, we propose aggregated and disaggregated Lagrangian decomposition methods that make use of the structural properties and the efficient single‐stage algorithm. Computational experiments show the effectiveness of these algorithms and the gains associated with coordinated versus decentralized systems. Finally, we show that the decentralized solution is asymptotically optimal. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 2009  相似文献   

13.
Central to the mainstream Sikh identity is the concept of ethically-justified force, used as a last resort. There is no place for absolute pacifism in this conception of ethical living. Fighters and martyrs occupy an important place in the Khalsa narrative, and Sikhs are constantly reminded of the sacrifices and heroism of their co-religionists of the past. This article explores how the Sikh warrior identity is manifested in the contemporary world. It examines the Sikhs who, in the 1980s and 1990s, were involved on both sides of the Punjab crisis: those militants who fought for a Sikh homeland (“Khalistan”) and those Sikhs in the Indian army who suppressed the insurgency. The article also looks beyond the militants and soldiers to Sikhs employed in modern security-related professions, the broader issue of Sikh symbols relating to the use of force, and violence within the Sikh diaspora. An examination of the Sikhs in various parts of the world reveals additional uses and consequences of ideology, whether in enlistment in the armed forces of the states in which they live, or in the support of the militancy in India, particularly in the 1980s. The conclusion is that the modern Sikh warrior is a nuanced actor behaving in various ways, some overt and some subtle: the warrior is willing to physically fight those perceived to be tyrannous, but most initiatives have shifted to pursuing justice through non-violent means, such as legal struggles for civil rights. Although armed Sikh militancy against the Indian government is in the past, there are strong residual resentments still requiring redress. All of this is of great relevance to understanding the ethics of armed force within modern Sikhism.  相似文献   

14.
Scheduling a set of n jobs on a single machine so as to minimize the completion time variance is a well‐known NP‐hard problem. In this paper, we propose a sequence, which can be constructed in O(n log n) time, as a solution for the problem. Our primary concern is to establish the asymptotical optimality of the sequence within the framework of probabilistic analysis. Our main result is that, when the processing times are randomly and independently drawn from the same uniform distribution, the sequence is asymptotically optimal in the sense that its relative error converges to zero in probability as n increases. Other theoretical results are also derived, including: (i) When the processing times follow a symmetric structure, the problem has 2⌊(n−1)/2⌋ optimal sequences, which include our proposed sequence and other heuristic sequences suggested in the literature; and (ii) when these 2⌊(n−1)/2⌋ sequences are used as approximate solutions for a general problem, our proposed sequence yields the best approximation (in an average sense) while another sequence, which is commonly believed to be a good approximation in the literature, is interestingly the worst. © 1999 John Wiley & Sons, Inc. Naval Research Logistics 46: 373–398, 1999  相似文献   

15.
We investigate the solvability of two single‐machine scheduling problems when the objective is to identify among all job subsets with cardinality k,1≤kn, the one that has the minimum objective function value. For the single‐machine minimum maximum lateness problem, we conclude that the problem is solvable in O(n2) time using the proposed REMOVE algorithm. This algorithm can also be used as an alternative to Moore's algorithm to solve the minimum number of tardy jobs problem by actually solving the hierarchical problem in which the objective is to minimize the maximum lateness subject to the minimum number of tardy jobs. We then show that the REMOVE algorithm cannot be used to solve the general case of the single‐machine total‐weighted completion time problem; we derive sufficient conditions among the job parameters so that the total weighted completion time problem becomes solvable in O(n2) time. © 2013 Wiley Periodicals, Inc. Naval Research Logistics 60: 449–453, 2013  相似文献   

16.
A 2‐dimensional rectangular (cylindrical) k‐within‐consecutive‐r × s‐out‐of‐m × n:F system is the rectangular (cylindrical) m × n‐system if the system fails whenever k components in a r × s‐submatrix fail. This paper proposes a recursive algorithm for the reliability of the 2‐dimensional k‐within‐consecutive‐r × s‐out‐m × n:F system, in the rectangular case and the cylindrical case. This algorithm requires min ( O (mkr(n?s)), O (nks(m?r))), and O (mkrn) computing time in the rectangular case and the cylindrical case, respectively. The proposed algorithm will be demonstrated and some numerical examples will be shown. © 2001 John Wiley & Sons, Inc. Naval Research Logistics 48: 625–637, 2001.  相似文献   

17.
The discourse on security challenges in Nigeria has generated much scholarly insight. What is yet to be sufficiently interrogated is the place of forests in the problem. Situating the problem within the context of global occurrences, the study explores security threats posed by the poor management of some Nigerian forests, which has resulted in invasion and exploitation by criminals who engage in militancy, kidnapping, ritual killing, armed robbery, cattle rustling and cannabis cultivation. Using the theory of ungoverned spaces as a foundation, the study locates the major reason for the invasion and use of forested landscape for criminal activities in the Nigerian state, the presence of the authorities in these sanctuaries is either non-existent or, at best, sporadic.  相似文献   

18.
We consider a two‐phase service queueing system with batch Poisson arrivals and server vacations denoted by MX/G1G2/1. The first phase service is an exhaustive or a gated bulk service, and the second phase is given individually to the members of a batch. By a reduction to an MX/G/1 vacation system and applying the level‐crossing method to a workload process with two types of vacations, we obtain the Laplace–Stieltjes transform of the sojourn time distribution in the MX/G1G2/1 with single or multiple vacations. The decomposition expression is derived for the Laplace–Stieltjes transform of the sojourn time distribution, and the first two moments of the sojourn time are provided. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   

19.
We study a deterministic two‐machine flowshop scheduling problem with an assumption that one of the two machines is not available in a specified time period. This period can be due to a breakdown, preventive maintenance, or processing unfinished jobs from a previous planning horizon. The problem is known to be NP‐hard. Pseudopolynomial dynamic programming algorithms and heuristics with worst case error bounds are given in the literature to solve the problem. They are different for the cases when the unavailability interval is for the first or second machine. The existence of a fully polynomial time approximation scheme (FPTAS) was formulated as an open conjecture in the literature. In this paper, we show that the two cases of the problem under study are equivalent to similar partition type problems. Then we derive a generic FPTAS for the latter problems with O(n54) time complexity. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2004.  相似文献   

20.

Designed to harrass and weaken Ian Smith's principal enemy, Robert Mugabe, in his safe haven of Mozambique, Operation ‘Mardon’ involved co‐ordinated incursions over the Rhodesian border on a wide front. The secondary purpose was to persuade the African nationalist insurgents to abandon their incursion routes in the north‐east and south‐east in favour of those from the east where the mountainous terrain favoured their interception. Although other Rhodesian units wreaked more physical damage, D Company, 1st Battalion, the Rhodesian African Rifles, inflicted the heaviest casualties in their classic infantry attack on Mudzi Camp.1  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号