首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18篇
  免费   0篇
  2019年   1篇
  2017年   1篇
  2015年   1篇
  2013年   9篇
  2007年   1篇
  1992年   1篇
  1982年   1篇
  1979年   1篇
  1974年   1篇
  1971年   1篇
排序方式: 共有18条查询结果,搜索用时 15 毫秒
11.
Machine maintenance is modeled in the setting of a single‐server queue. Machine deterioration corresponds to slower service rates and failure. This leads to higher congestion and an increase in customer holding costs. The decision‐maker decides when to perform maintenance, which may be done pre‐emptively; before catastrophic failures. Similar to classic maintenance control models, the information available to the decision‐maker includes the state of the server. Unlike classic models, the information also includes the number of customers in queue. Considered are both a repair model and a replacement model. In the repair model, with random replacement times, fixed costs are assumed to be constant in the server state. In the replacement model, both constant and variable fixed costs are considered. It is shown in general that the optimal maintenance policies have switching curve structure that is monotone in the server state. However, the switching curve policies for the repair model are not always monotone in the number of customers in the queue. Numerical examples and two heuristics are also presented. © 2007 Wiley Periodicals, Inc. Naval Research Logistics, 2007  相似文献   
12.
Policy research and scholarship on food has rapidly increased in recent decades. The attention to ‘gender' within this work appears to signal important practical and academic efforts to mainstream gendered understandings of food consumption, distribution and production into expansive conceptualisations of human security. This article argues that the gender-related work on food has wide-ranging and often troubling political and theoretical foundations and implications. Often growing out of knowledge regimes for managing social crises and advancing neo-liberal solutions, much gender and food security work provides limited interventions into mainstream gender-blind work on the nexus of power struggles, food resources and globalisation. A careful analysis of knowledge production about gender and food is therefore crucial to understanding how and why feminist food studies often transcends and challenges dominant forms of scholarship and research on food security. This article's critical assessment of what food security studies in South Africa has entailed at the regional level and in global terms also focuses on the methodological and theoretical feminist interventions that can stimulate rigorous conceptual, research and practical attention to what has come to be understood as food sovereignty.  相似文献   
13.
ALL TOGETHER NOW     
Banning Weapons of Mass Destruction, by Frederick N. Mattis. Praeger Security International, 2009. 129 pages, $39.95.  相似文献   
14.
In discussing China's January 2007 hit-to-kill intercept of the Chinese weather satellite FengYun-1C, most American analysts sought the “message” for the United States—either by asserting that China's test was a deliberate step toward a comprehensive counterspace capability to offset U.S. conventional military superiority or an attempt to force the United States to the negotiating table on “the prevention of an arms race in outer space.” Chinese officials, after a long silence, eventually claimed the test was an “experiment” that was “not targeted at any country.” We traveled to China several times in 2007 and had a series of conversations with Chinese individuals knowledgeable about the history of this particular antisatellite program and with access to information about the decision-making process prior to and after the final test. These discussions were off the record, not for attribution, given the sensitivity of the subject. They reflected the views of some of the key institutions involved in the test from the State, the Communist Party, the People's Liberation Army, and aerospace experts involved in debris calculations. The information conveyed to us suggests that American commentators tend to place much greater importance on the United States as a driver in China's decision to develop the technology and conduct the test than do the Chinese.  相似文献   
15.
Ethics training has become a common phenomenon in the training of military professionals at all levels. However, the perceived outcomes of this training remain open. In this article, we analyze the experiences of course participants who were interviewed 6–12 months after they had participated in a train-the-trainer course in military ethics developed by the Faculty of Military Sciences of the Netherlands Defence Academy. Through qualitative inductive analysis, it is shown how participants evaluate the training, how they perceive the development of their moral competence, and how they see the impact of the training on their own training practice.  相似文献   
16.
In this paper we address a bin-packing problem which possesses a variety of modifications of the classic theme. Among these are bin-dependent chip weights, bin costs, and bin-dependent penalties for unused capacity. Lagrangian relaxations are employed in the context of a branch-and-bound framework in order to solve the problem after which substantial computational experience is provided.  相似文献   
17.
THE NPT     
This article assesses the successes and failures of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) since its creation in 1968 by developing and applying a set of “metrics” to each of the NPT's substantive articles as well as to its withdrawal provisions. In light of this analysis, the article also puts forward some specific proposals for strengthening the NPT and its implementation, with a view to the debate and decisions at the upcoming 2010 NPT Review Conference. A concluding section turns explicitly to the 2010 NPT Review Conference and proposes pursuit of agreement on three NPT Action Plans: one for nonproliferation, one for peaceful uses, and one for nuclear disarmament. Combining vision and practicable steps, these Action Plans would set out a roadmap for action between the 2010 and the 2015 NPT Review Conferences. They could provide a foundation for substantive exchanges—in this case, on progress toward their implementation—during the preparations for the 2015 conference.  相似文献   
18.
ABSTRACT

Increasingly, academic research in conflict-affected contexts relies on support from humanitarian organizations. Humanitarian organizations constitute sites of study in and of themselves; they partner with academics to roll out surveys or randomized program interventions; and they frequently facilitate security, logistics and transportation for independent researchers. We use a research partnership between IRC, the World Bank, and academic researchers in the UK, the US and eastern DR Congo, to explore the effects of humanitarian affiliation on conflict field research. In investigating when, how and under what conditions humanitarian identities are adopted by researchers (and how these affiliations shape research dynamics) we identify three paradoxes. First, “wearing humanitarian clothes” to facilitate research logistics can both facilitate and constrain access. Second, humanitarian affiliations invoked by researchers to ensure security and protection in volatile research sites can undermine the “insider” status of local staff. Finally, working through humanitarian organizations allows local and international researchers to benefit from the protections and privileges afforded to humanitarian employees without providing any of the services on which privileged access rests. In this article, we map out decisions faced by local and international researchers concerning when to adopt and discard humanitarian identities, and the fraught logistical, ethical and methodological consequences of these decisions.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号