首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   32篇
  免费   0篇
  2023年   1篇
  2019年   2篇
  2017年   4篇
  2016年   1篇
  2015年   1篇
  2014年   3篇
  2013年   12篇
  2009年   1篇
  2004年   1篇
  1994年   2篇
  1986年   1篇
  1979年   1篇
  1976年   1篇
  1969年   1篇
排序方式: 共有32条查询结果,搜索用时 187 毫秒
21.
22.
23.
This study aims to determine and evaluate dynamic idling policies where an agent can idle while some customers remain waiting. This type of policies can be employed in situations where the flow of urgent customers does not allow the agent to spend sufficient time on back-office tasks. We model the system as a single-agent exponential queue with abandonment. The objective is to minimize the system's congestion while ensuring a certain proportion of idling time for the agent. Using a Markov decision process approach, we prove that the optimal policy is a threshold policy according to which the agent should idle above (below) a certain threshold on the queue length if the congestion-related performance measure is concave (convex) with respect to the number of customers present. We subsequently obtain the stationary probabilities, performance measures, and idling time duration, expressed using complex integrals. We show how these integrals can be numerically computed and provide simpler expressions for fast-agent and heavy-traffic asymptotic cases. In practice, the most common way to regulate congestion is to control access to the service by rejecting some customers upon arrival. Our analysis reveals that idling policies allow high levels of idling probability that such rejection policies cannot reach. Furthermore, the greatest benefit of implementing an optimal idling policy occurs when the objective occupation rate is close to 50% in highly congested situations.  相似文献   
24.
For most of the 1950s, manned aircraft were the prime nuclear bomb delivery method, and were therefore a vital metric for British and American intelligence when calculating the Soviet threat. Each community reached very different conclusions from the same raw intelligence, generating the ‘bomber gap’ myth in the US but not in the UK. The information available was inconclusive, so in order to understand it estimators had to rely on their assumptions, which were different. Contrasting scopes for parochial capitalisation drew their conclusions further apart. Contrary to orthodox accounts of this episode, Soviet deception did not play a central role.  相似文献   
25.
How are refugees mobilised in identity based conflicts? How do internally displaced persons and refugees become utilised as a multidimensional source of agitation and escalation? Are there steps the international community can take to limit the political radicalisation and militarisation of refugees? The research and policy recommendations that arise in addressing these broad-based research questions represent a test of how the assistance the international community provides to transitional states operates in relation to the internal dialectic of national security. Specifically, a detailed case study of the Abkhaz-Georgian conflict and the degree of refugee militarisation is analysed through a series of state-centric, sociological and military models in order to form a basis for creating new US policy options able to demilitarise existing demographic pressures.  相似文献   
26.
For 74 days in mid-1999, India waged an intense war against intruding Pakistani forces on the Indian side of the Line of Control dividing Kashmir in the Himalayas. The Indian Air Force (IAF) was a key contributor to India's eventual victory in that war. Among other things, the IAF's combat performance showed how the skillful application of air-delivered firepower, especially if unmatched by the other side, can shorten and facilitate the outcome of an engagement that might otherwise have persisted indefinitely. It also showed that a favorable position in the conventional balance remains strategically useful even in conditions of mutual nuclear deterrence.  相似文献   
27.
Advances in the study of civil war have led to the proliferation of event count data, and to a corresponding increase in the use of (zero-inflated) count models for the quantitative analysis of civil conflict events. Our ability to effectively use these techniques is met with two current limitations. First, researchers do not yet have a definitive answer as to whether zero-inflated count models are a verifiably better approach to civil conflict modeling than are ‘less assuming’ approaches such as negative binomial count models. Second, the accurate analysis of conflict-event counts with count models – zero-inflated or otherwise – is severely limited by the absence of an effective framework for the evaluation of predictive accuracy, which is an empirical approach that is of increasing importance to conflict modelers. This article rectifies both of these deficiencies. Specifically, this study presents count forecasting techniques for the evaluation and comparison of count models' predictive accuracies. Using these techniques alongside out-of-sample forecasts, it then definitively verifies – for the first time – that zero-inflated count models are superior to comparable non-inflated models for the study of intrastate conflict events.  相似文献   
28.
The first conceptual, theoretical treatises about small war (la petite guerre) as special operations appeared only from the middle of the seventeenth century. The term is not used in the eighteenth-century sense of ‘special operations’ in older sources. The supposed absence of any treatment of the subject is surprising considering the obsession with the ‘art of war’ in the Renaissance, but other authors attribute it to a supposed antinomy between chivalric ideals and irregular warfare. But the absence of explicit manuals on the subject is not evidence of absence of advanced reflection on this kind of operations in the Middle Ages and in Early Modern times. We should thus look elsewhere, in other genres, for writings that contain and pass on military knowledge. Epics, romances, educational and military treatises, and memoirs in fact contain elements of a theory of special operations, even though these genres differ from our conception of rationality inherited from the Enlightenment.  相似文献   
29.
Militaries rely on secure communications. Despite the permeation of cyber-systems throughout the operational environment, there is little readily available doctrine on cyber-warfare. Doctrine that does exist has not been coherently integrated. This paper introduces a Cyber Conceptual Framework, consisting of five questions pertinent to the future use of cyberspace. The authors enunciate a definition of cyberspace, expand on existing military doctrine to reject the conceptualisation of cyberspace as a domain, define cyber-conflict, define cyber-attack and describe the four components and five levels of a cyber-attack. This work develops a common framework from available doctrine and a lexicon for future discussion.  相似文献   
30.
In progressive censoring, items are removed at certain times during the life test. Commonly, it is assumed that the removed items are used for further testing. In order to take into account information about these additional testing in inferential procedures, we propose a two‐step model of stage life testing with one fixed stage‐change time which incorporates information about both the removed items (further tested under different conditions) and those remaining in the current life test. We show that some marginal distributions in our model correspond either to progressive censoring with a fixed censoring time or to a simple‐step stress model. Furthermore, assuming a cumulative exposure model, we establish exact inferential results for the distribution parameters when the lifetimes are exponentially distributed. An extension to Weibull distributed lifetimes is also discussed.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号