首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 609 毫秒
1.
This essay reviews seven recent books and reports that focus upon the use of US armed drones in Pakistan's Federally Administered Tribal Areas (FATA). This essay synthesizes a historical account of the program, critically interrogates key arguments and evidence advanced by the authors, and draws attention the particular problems that confront those who live in the FATA and the second-class citizenship that the Pakistani state has bestowed upon them for reasons of domestic and foreign policy concerns. This review essay does not intend to be the final word on any of the ongoing policy debates. But it does hope to enable a wider audience to take part in these important deliberations.  相似文献   

2.
We extend the qualitative theory of sensitivity analysis for minimum-cost pure network flows of Granot and Veinott [17] to generalized network flow problems, that is, network flow problems where the amount of flow picked up by an arc is multiplied by a (positive) gain while traversing the arc. Three main results are presented. The ripple theorem gives upper bounds on the absolute value of optimal-flow variations as a function of variations in the problem parameter(s). The theory of substitutes and complements provides necessary and sufficient conditions for optimal-flow changes to consistently have the same (or the opposite) sign(s) in two given arcs, whereas the monotonicity theorem links changes in the value of the parameters to changes in optimal arc flows. Bounds on the rates of changes are also discussed. Compared with pure networks, the presence of gains makes qualitative sensitivity analysis here a much harder task. We show the profound effect on computational issues caused by the departure from the pure network structure. © 1996 John Wiley & Sons, Inc.  相似文献   

3.
Energy continues to serve as the bedrock of modern economies and the main driver of modern society. For Africa, the production and supply of energy resources such as crude oil, natural gas, uranium, coal, biomass, biofuels and other renewables are an important source of employment, rents, taxes, royalties and profits. This sector brings in several tens of billions of dollars of revenue annually. The production and delivery of such resources, however, depend on critical infrastructures such as pipelines, refineries, processing plants, terminals, rigs, electrical energy pylons, substations, pump stations, vessels, and tankers. These infrastructures have been attacked by terrorists, insurgents, vandals and saboteurs, all of whom see them as targets against which to register their grievances and extract concessions from the state. This paper is a chronological account of some of the documented incidents of terrorism, insurgency, kidnapping, destruction, sabotage, and human casualties suffered in the oil and gas sectors in Africa between 1999 and 2012. It is based on data extracted from the databases of the RAND Database of World Terrorism Incidents and the University of Maryland's Global Terrorism Database (GTD).  相似文献   

4.
Why did the Ukraine’s 2004 Orange Revolution initiate a peaceful democratic transition, while the 2014 protests were followed by violent conflict? This article complements previous studies on Russia’s role in Ukraine by focusing on domestic explanations of the recent violence. It shows that structural factors were already conducive to violence in 2004, making it fruitful to analyse the role of agency to explain the 2014 conflict. It demonstrates that while the 2004 transition introduced power-sharing guarantees that mitigated commitment problems for the relevant parties, the 2014 transition saw no such guarantees, making violence a rational strategy for the pro-Russian separatists.  相似文献   

5.
This article investigates mediation efforts in Syria from the outbreak of the civil war in 2011 through the spring of 2016. It describes the principal initiatives, analyses differences and similarities across mediators, and identifies strategic obstacles that prevented substantive progress. Focusing on mediation initiatives undertaken by the Arab League and the United Nations, it finds that there is considerable path dependence across efforts and that most of the limited achievements, notably ceasefires in 2012 and 2016, resulted from the application of external leverage. Settlement in Syria was conditioned on overcoming significant commitment problems, aggravated by sectarian mistrust, the fractured nature of the opposition, and international disunity. The article contributes the first review of mediation in Syria that comprehends the conflict in its entirety, systematizes data for research on conflict management, and evaluates existing mediation policy in Syria with an eye to the future.  相似文献   

6.
With the failure of liberal peace strategies in the Global South, resilience has recently become the risk management strategy par excellence in peacebuilding. Since it is not possible to predict when the next crisis will take place, peacebuilders must invest in bottom-up adaptive capacities to cope with external shocks. This article moves away from governmentality accounts of resilience which are overtly deterministic and depoliticizing. Instead, it posits that the uncertainty, ambiguity, and complexity associated with resilience mean that we should expect opportunities for contestation and institutional agency. This argument will be illustrated by drawing upon the European Union’s adoption of the resilience approach in its peacebuilding and security policies. The article argues that while uncertainty, ambiguity, and complexity constitute the ontological conditions that underpin the rise of resilience in peacebuilding, they are also likely to lead to its potential demise.  相似文献   

7.
ABSTRACT

International efforts to hold the government of President Bashar al-Assad accountable for the use of chemical weapons in the Syrian Civil War have entered a new phase. For the first time, the Organisation for the Prohibition of Chemical Weapons (OPCW), the international organization responsible for implementing the 1993 Chemical Weapons Convention, has been empowered to identify the perpetrators of chemical attacks in Syria. The Investigation and Identification Team (IIT), which was formed to conduct the OPCW’s new attribution mission, has announced its intention to investigate and identify the perpetrators of nine chemical attacks in Syria, including the April 7, 2018, attack in Douma. This article reviews recent efforts to attribute chemical attacks in Syria, describes what we know about the nine incidents to be investigated, summarizes what is known about the Syrian government officials, military commanders, and chemical-warfare scientists suspected of being responsible for these attacks, discusses what to expect during the next phase of the attribution process, and offers insights into how the international community can move beyond attribution to accountability. Accountability is necessary to provide justice for victims and to prevent future incidents by demonstrating that perpetrators of chemical attacks will be identified and punished.  相似文献   

8.
9.
This article examines optimal path finding problems where cost function and constraints are direction, location, and time dependent. Recent advancements in sensor and data‐processing technology facilitate the collection of detailed real‐time information about the environment surrounding a ground vehicle, an airplane, or a naval vessel. We present a navigation model that makes use of such information. We relax a number of assumptions from existing literature on path‐finding problems and create an accurate, yet tractable, model suitable for implementation for a large class of problems. We present a dynamic programming model which integrates our earlier results for direction‐dependent, time and space homogeneous environment, and consequently, improves its accuracy, efficiency, and run‐time. The proposed path finding model also addresses limited information about the surrounding environment, control‐feasibility of the considered paths, such as sharpest feasible turns a vehicle can make, and computational demands of a time‐dependent environment. To demonstrate the applicability and performance of our path‐finding algorithm, computational experiments for a short‐range ship routing in dynamic wave‐field problem are presented. © 2012 Wiley Periodicals, Inc. Naval Research Logistics, 2012  相似文献   

10.
Existing production/inventory models with random (variable) yield take the yield distribution as given. This work takes a step towards selecting the optimal yield randomness, jointly with lot sizing decisions. First, we analyze an EOQ model where yield variance and lot size are to be selected simultaneously. Two different cost structures are considered. Secondly, we consider source diversification (‘second sourcing’) as a means of reducing effective yield randomness, and trade its benefits against its costs. Conditions for the superiority of diversification between two sources with distinct yield distributions over a single source are derived. The optimal number of identical sources is also analyzed. Some comments on the congruence of the results with recent JIT practices are provided.  相似文献   

11.
This article argues that deterrence theory can be applied to counterterrorism. Doing so requires broadening the traditional concept of deterrence by punishment, expanding deterrence by denial to include defense, mitigation, and strategic hindrance, and developing deterrence by delegitimization to influence the political, ideological, and religious rationales informing terrorist behavior. In practice, deterring terrorism requires tailoring threats against state and individual facilitators, diffusing the intended consequences of terrorism, and manipulating terrorist self–restraints. When these and other deterrent leverages are applied simultaneously against various actors and processes involved in terrorism, coercion can be achieved.  相似文献   

12.
A retailer or distributor of finished goods, or the manager of a spare-parts inventory system, must generally forecast the major portion of demand. A specific customer-service level p (fraction of replenishment intervals with no stockout) implies two challenges: achieve the service within a small interval plus or minus, and do so with a minimum-cost investment in inventory. The pth fractile of lead-time demand (LTD) is the reorder point (ROP) for this service measure, and is often approximated by that fractile of a normal distribution. With this procedure, it is easy to set safety stocks for an (s, Q) inventory system. However, Bookbinder and Lordahl [2] and others have identified cases where the normal approximation yields excessive costs and/or lower service than desired. This article employs an order-statistic approach. Using available LTD data, the ROP is simply estimated from one or two of the larger values in the sample. This approach is sufficiently automatic and intuitive for routine implementation in industry, yet is distribution free. The order-statistic method requires only a small amount of LTD data, and makes no assumptions on the form of the underlying LTD distribution, nor even its parameters μ and ρ. We compare the order-statistic approach and the normal approximation, first in terms of customer service and then using a model of expected annual cost. Based upon characteristics of the available LTD data, we suggest a procedure to aid a practitioner in choosine between the normal and order-statistic method. © 1994 John Wiley & Sons, Inc.  相似文献   

13.
This article highlights and critiques the underlying conceptualisations and assumptions of the women, peace and security (WPS) agenda that emerged with the adoption of United Nations Security Council Resolution 1325 in 2000. The main argument is that we need to rethink the WPS agenda to produce more holistic and groundbreaking responses for the types of challenges encountered, i.e., that gender inequality and insecurity are deep rooted and multi-layered, and thus negate mechanistic responses that do not deal with cultural and structural issues. It specifically focuses on gender and peace-making and gender and peacekeeping to point to the pitfalls in the current conceptions and practices in this arena.  相似文献   

14.
What explains the variation in states’ nonstate partners in civil warfare? States often use nonstate actors to do what their regular military forces cannot do well – navigate the local population. Some of their nonstate partners are ordinary civilians, while others are battle-hardened fighters with a rebellious or criminal past. The choice of proxy carries serious implications for the patterns and effects of violence during civil war, human rights, and international security. This article is the first to disaggregate the nonstate counterinsurgents and offer an explanation for why and how states use each type. It brings together the politics of collaboration with the politics of exploitation. The article shows that the state’s use of nonstate proxies is shaped by the supply of willing collaborators, the state’s ability to exercise control over them, and the trade-offs underlying the use of the different types of nonstate actors. The empirical evidence used to support this argument comes from a novel, comparative study of Turkey’s counterinsurgency campaign against Kurdish separatists and India’s counterinsurgency against Kashmiri separatists. The original data were collected through fieldwork in the disputed territories of each country.  相似文献   

15.
The correlated improvement in yield and reliability has been observed in the case studies on integrated circuits and electronic assemblies. This paper presents a model that incorporates yield and reliability with the addition of a burn‐in step to explain their correlated improvement. The proposed model includes as special cases several yield and reliability models that have been previously published and thus provides a unifying framework. The model is used to derive a condition for which yield functions can be multiplied to obtain the overall yield. Yield and reliability are compared as a function of operation time, and an analytical condition for burn‐in to be effective is also obtained. Finally, Poisson and negative binomial defects models are further considered to investigate how reliability is based on yield. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004.  相似文献   

16.
17.
Militaries commonly require recruits to pass a test that measures aptitude for military service. In this paper, we show that such tests may also act as a device for screening out low-motivation recruits, even if it is assumed that motivation is not measured by such tests and is not correlated with aptitude.  相似文献   

18.
测定铝合金中锌、镁、铜、铁等元素含量的方法很多,湿法分析由于操作繁琐,时间冗长等缺点,现已应用不多,本法用火焰原子光谱法测定铝合金中锌、镁、铜、铁等元素,方法简便、快速、准确、干扰较少,精密度高。已应用于我公司对LC4、ZL401等铝合金中各元素的分析。  相似文献   

19.
ABSTRACT

Since the early 2000s, the “local turn” has thoroughly transformed the field of peacebuilding. The European Union (EU) policy discourse on peacebuilding has also aligned with this trend, with an increasing number of EU policy statements insisting on the importance of “the local.” However, most studies on EU peacebuilding still adopt a top-down approach and focus on institutions, capabilities, and decision-making at the EU level. This special issue contributes to the literature by focusing on bottom-up and local dynamics of EU peacebuilding. After outlining the rationale and the scope of the special issue, this article discusses the local turn in international peacebuilding and identifies several interrelated concepts relevant to theorizing the role of the local, specifically those of effectiveness, ownership, and resistance. In the conclusion, we summarize the key contributions of this special issue and suggest some avenues for further research.  相似文献   

20.
水体富营养化危害、成因及防治   总被引:1,自引:0,他引:1  
水体富营养化严重影响人类健康、可用水量、水体经济价值和水体寿命,而大量污水超标排放、农业面源污染、水产养殖业失当、周边环境恶化和底泥氮磷溶出是其形成主因。在治理和恢复富营养化水体的实践中,必须强化污染预防意识,从源头上削减污染负荷,同时选用切实可行、系统协调、针对性强的政策和措施并长期坚持实施,才能起到事半功倍的效果。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号