首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   42篇
  免费   2篇
  2021年   1篇
  2019年   1篇
  2017年   1篇
  2016年   2篇
  2015年   5篇
  2014年   1篇
  2013年   19篇
  2012年   2篇
  2007年   1篇
  2004年   1篇
  2003年   1篇
  2002年   1篇
  1998年   1篇
  1995年   2篇
  1994年   1篇
  1991年   1篇
  1986年   1篇
  1985年   1篇
  1973年   1篇
排序方式: 共有44条查询结果,搜索用时 15 毫秒
31.
This article deals with the problem of setting priorities for the execution of maintenance packages at randomly occurring opportunities. These opportunities are of restricted duration, implying that only a limited number of packages can be executed. The main idea proposed is to set up a model for determining the optimal execution time for the individual maintenance packages and to develop cost criteria for deviations from the optimal time. In this article we use the block replacement model, but the approach can be easily extended to include other optimization models as well. Using Monte Carlo simulation the performance of the method is compared with various heuristics, both for a two-package and a multipackage case. © 1994 John Wiley & Sons, Inc.  相似文献   
32.
Abstract

Previous research has identified a variety of general mechanisms to explain how insurgents build legitimacy. Yet, there is often a gap between these mechanisms and the interactional dynamics of insurgencies. This article attempts to bridge this gap through a theoretically informed analysis of the Kurdistan Workers’ Party’s (PKK) insurgency in Turkey. I show how the PKK’s efforts to cultivate legitimacy, Turkey’s counterinsurgency strategies, and civilian perceptions of the PKK, all mutually influenced one another. Based on this analysis, I argue that the mechanisms that produce popular legitimacy coevolve with insurgents’ behaviors, states’ interventions, and civilians’ perceptions.  相似文献   
33.
34.
In recent years, China has made stunning progress in its satellite reconnaissance capabilities. Starting from almost no capacity for live surveillance ten years ago, today the PLA has gained the capability to support real-time tactical naval operations from space. China's suite of electro-optical, synthetic aperture radar, and electronic intelligence satellites would be key to its anti-access/area denial capabilities, through which the PLA could deny the United States military the capability to operate with impunity close to its shores. Furthermore, these achievements suggest a shift towards more military-dedicated space assets and form the contours of a crucial support system for expanded PLA operations.  相似文献   
35.
This chapter discusses the impact Provincial Reconstruction Teams (PRTs) have on the security situation in Afghanistan, specifically in countering the terrorist threat and in counter-narcotics.

The Afghan people define the lack of security as their country's greatest problem. The terrorist activities of groups opposed to the central government and the political process compounded by violence related to the opium trade are seen as the main sources of insecurity. The authors argue that, currently, PRTs should not assume active counterterrorism as an additional main area of operation. The complexity of Afghanistan's security environment and the pressure to have PRTs involved in the counter-narcotics effort underscore the necessity of local knowledge and experience in the PRTs. Participation of indigenous actors, such as NGOs, in the PRT-organisational structure could provide this required expertise.  相似文献   
36.
37.
India and Pakistan are currently engaged in a competition for escalation dominance. While New Delhi is preparing for a limited conventional campaign against Pakistan, Islamabad is pursuing limited nuclear options to deter India. Together, these trends could increase the likelihood of nuclear conflict. India, for example, might conclude that it can launch an invasion without provoking a nuclear reprisal, while Pakistan might believe that it can employ nuclear weapons without triggering a nuclear exchange. Even if war can be avoided, these trends could eventually compel India to develop its own limited nuclear options in an effort to enhance deterrence and gain coercive leverage over Pakistan.  相似文献   
38.
39.
Maintenance scheduling for modular systems: Modeling and algorithms   总被引:1,自引:0,他引:1       下载免费PDF全文
We study new models of scheduled maintenance management for modular systems, consisting of multiple components with respective cycle limits. The cycle limit of each component specifies the time interval in which this component must be repaired or replaced. The goal is to compute a feasible maintenance schedule that minimizes the cost associated with component maintenance. Applications of these models arise in Air Force aircraft maintenance as well as in other arenas with required preventive maintenance. The typical cost structures that arise in practical settings are submodular, which make the resulting models computationally challenging. We develop two efficient and operationally tenable approximation algorithms. We prove constant factor worst‐case guarantees for both algorithms, and present computational experiments showing that these algorithms perform within a few percent of optimality on operationally relevant instances. © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 472–488, 2014  相似文献   
40.
This article generalizes the classical periodical replacement model with minimal repair by considering the effect of the overhaul, which is assumed to be able to rejuvenate the system. The generalization is based on the notion of the virtual age of a system introduced by Kijima, Morimura, and Suzuki [“Periodical Replacement Problem without Assuming Minimal Repair,” European Journal of Operational Research, 37 , 194–203 (1988)]. © 1995 John Wiley & Sons, Inc.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号