排序方式: 共有38条查询结果,搜索用时 15 毫秒
31.
32.
To location Li we are to allocate a “generator” and ni “machines” for i = 1, …,k, where n1 … n1 ≧ … ≧ nk. Although the generators and machines function independently of one another, a machine is operable only if it and the generator at its location are functioning. The problem we consider is that of finding the arrangement or allocation optimizing the number of operable machines. We show that if the objective is to maximize the expected number of operable machines at some future time, then it is best to allocate the best generator and the n1 best machines to location L1, the second-best generator and the n2-next-best machines to location L2, etc. However, this arrangement is not always stochastically optimal. For the case of two generators we give a necessary and sufficient condition that this arrangement is stochastically best, and illustrate the result with several examples. 相似文献
33.
Philip Gummett H. P. Wilmott Laurie H. Boulden Malcolm Chalmers R. G. L. von Zugbach de Sugg Mark Phythian Kate Smith 《Defense & Security Analysis》1997,13(2):225-234
Export or Die: Britain's Defence Trade with Iran and Iraq. by Davina Miller, London: Cassell, 1996, ISBN 0-304-33852-4 (hbk), £40.00, 04-33853-2 (pbk), £11.99.
The Storm Passed By: Ireland and the Battle of the Atlantic, 1940-1941. by Trevor Allen, Dublin: Irish Academic Press, 1996, ISBN 0-7165-2616-6, (hbk) £17.50.
Arms Control Toward the 21st Century. by Jeffrey A. Larsen and Greqory J. Rattray (eds). Boulder: Lynne Rienner, 1996.
Asia-Pacific Security, Less Uncertainty, New Opportunities. Edited by Gary Klintworth. Melbourne: Addison Wesley Longman, 1996, ISBN 0-582-80321-7, £24.99.
Masters of War, Military Dissent and Politics in the Vietnam Era. by Robert Buzzanco, Cambridge: Cambridge University Press, 1996, ISBN 0-521-48046-9 (hbk), £29.95
Controlling the Arms Trade: the West Versus the Rest. By Paul Cornish, London: Bowerdean Publishing Co., 1996, ISBN 0-906097-44-4 (pbk), £9.99.
Secret Agencies: US Intelligence in a Hostile World. by Loch K. Johnson, London: Yale University Press, 1997, ISBN 0-300-06611-2 (hbk), £22.50. 相似文献
The Storm Passed By: Ireland and the Battle of the Atlantic, 1940-1941. by Trevor Allen, Dublin: Irish Academic Press, 1996, ISBN 0-7165-2616-6, (hbk) £17.50.
Arms Control Toward the 21st Century. by Jeffrey A. Larsen and Greqory J. Rattray (eds). Boulder: Lynne Rienner, 1996.
Asia-Pacific Security, Less Uncertainty, New Opportunities. Edited by Gary Klintworth. Melbourne: Addison Wesley Longman, 1996, ISBN 0-582-80321-7, £24.99.
Masters of War, Military Dissent and Politics in the Vietnam Era. by Robert Buzzanco, Cambridge: Cambridge University Press, 1996, ISBN 0-521-48046-9 (hbk), £29.95
Controlling the Arms Trade: the West Versus the Rest. By Paul Cornish, London: Bowerdean Publishing Co., 1996, ISBN 0-906097-44-4 (pbk), £9.99.
Secret Agencies: US Intelligence in a Hostile World. by Loch K. Johnson, London: Yale University Press, 1997, ISBN 0-300-06611-2 (hbk), £22.50. 相似文献
34.
Block replacement and modified block replacement policies for two‐component systems with failure dependence and economic dependence are considered in this paper. Opportunistic maintenance policies are also considered. Where tractable, long‐run costs per unit time are calculated using renewal theory based arguments; otherwise simulation studies are carried out. The management implications for the adoption of the various policies are discussed. The usefulness of the results in the paper is illustrated through application to a particular two‐component system. © 2002 Wiley Periodicals, Inc. Naval Research Logistics, 2003 相似文献
35.
Philip Adémọ́lá Ọláyọkù 《African Security Review》2017,26(4):378-398
Postmodern contradictions in postcolonial Nigeria have led to the fetishisation of alternative local security measures often labelled as vigilante activities. The profiling of these groups as ethnic militia often undermines their essential bid to provide security while delimiting security needs to the physical. The fallouts of such profiling are frictions between federal security agents and ethnic-based security groups, often resulting in violence, as exemplified by the 7 May 2013 incident between the Nigerian federal security agents and the Ombatse. This study focuses on the emergence and activities of the Ombatse as an alternative security apparatus of the Eggon. It presents three years of field research which entailed the use of ethnography, key informant interviews and observation. The findings reveal that the Ombatse emerged to assert historical legitimacy for both the physical and spiritual securitisation of the Eggon through a return to the ancestral ways of social engineering. The study considers the security challenges in Nigeria, and also situates the Eggon historical context within political, religious, sociocultural and economic intersections of securitisation. It concludes that the Ombatse situates its legitimacy within the Eggon past and retains its relevance through the holistic focus of providing both physical and spiritual security. 相似文献
36.
Philip G. Dwyer 《战略研究杂志》2013,36(4):605-632
This essay re-examines coalition warfare during the Napoleonic era by looking at the three eastern European powers – Austria, Prussia and Russia – how they interacted over time with France as well as each other, and how they managed French preponderance on the Continent. Before 1812, coalition warfare was dominated by eighteenth-century military and diplomatic attitudes: overall foreign political goals were ill-defined and were characterised by deep mistrust. The result was that the eastern powers pursued their own interests with little regard to coalition cohesion. If the coalition held together in 1813 and 1814, on the other hand, it was largely because individual powers' self-interest coincided with the overall objectives of the coalition – an increased determination to defeat Napoleon – along with a never before seen numerical superiority in allied troops. In this, Austria and especially Chancellor Metternich's role in juggling conflicting interests between the allies so that they could present, for the first time, a united front against France was fundamental. 相似文献
37.
Philip B. Zwart 《海军后勤学研究》1970,17(4):431-438
Rosen's method of Gradient Projection chooses a search direction which is not necessarily the direction of steepest ascent. However, the projection of the gradient onto a “suitably chosen subspace” does yield the direction of steepest ascent. The suitable choice is easily recognized as a result of some theorems relating gradient projection to steepest ascent. These results lead to a modification of Rosen's method. The modification improves the choice of search direction and usually yields the steepest ascent direction without solving a quadratic programming problem. 相似文献
38.
This article examines the evolution of the current British military joint intelligence doctrine. We argue that military intelligence doctrine is dogged by an intrinsic tension between the ethos and expectations of military doctrine and those of the professional practice of intelligence. We further argue not only that prior iterations of UK joint intelligence doctrine failed to effectively deal with this intelligence doctrine dilemma, but also that measures in the current doctrine to address this problem directly created their own problems. Moreover, as a result, otherwise sound innovations in the current UK intelligence doctrine have proven unsuitable to wider diffusion in more recent intelligence doctrine such as the new NATO intelligence doctrine which, otherwise, draws extensively on its British precursor. 相似文献