排序方式: 共有58条查询结果,搜索用时 234 毫秒
51.
Lewis A. Dunn 《The Nonproliferation Review》2013,20(2):143-172
This article assesses the successes and failures of the Treaty on the Non-Proliferation of Nuclear Weapons (NPT) since its creation in 1968 by developing and applying a set of “metrics” to each of the NPT's substantive articles as well as to its withdrawal provisions. In light of this analysis, the article also puts forward some specific proposals for strengthening the NPT and its implementation, with a view to the debate and decisions at the upcoming 2010 NPT Review Conference. A concluding section turns explicitly to the 2010 NPT Review Conference and proposes pursuit of agreement on three NPT Action Plans: one for nonproliferation, one for peaceful uses, and one for nuclear disarmament. Combining vision and practicable steps, these Action Plans would set out a roadmap for action between the 2010 and the 2015 NPT Review Conferences. They could provide a foundation for substantive exchanges—in this case, on progress toward their implementation—during the preparations for the 2015 conference. 相似文献
52.
Erdem Eskigun Reha Uzsoy Paul V. Preckel George Beaujon Subramanian Krishnan Jeffrey D. Tew 《海军后勤学研究》2007,54(3):282-300
We present a large‐scale network design model for the outbound supply chain of an automotive company that considers transportation mode selection (road vs. rail) and explicitly models the relationship between lead times and the volume of flow through the nodes of the network. We formulate the problem as a nonlinear zero‐one integer program, reformulate it to obtain a linear integer model, and develop a Lagrangian heuristic for its solution that gives near‐optimal results in reasonable time. We also present scenario analyses that examine the behavior of the supply chain under different parameter settings and the performance of the solution procedures under different experimental conditions. © 2006 Wiley Periodicals, Inc. Naval Research Logistics, 2007 相似文献
53.
In this paper the problem of minimizing makespan in a two‐machine openshop is examined. A heuristic algorithm is proposed, and its worst case performance ratio and complexity are analyzed. The average case performance is evaluated using an empirical study. © 1999 John Wiley & Sons, Inc. Naval Research Logistics 46: 129–145, 1999 相似文献
54.
Todas information and communication network requires a design that is secure to tampering. Traditional performance measures of reliability and throughput must be supplemented with measures of security. Recognition of an adversary who can inflict damage leads toward a game‐theoretic model. Through such a formulation, guidelines for network designs and improvements are derived. We opt for a design that is most robust to withstand both natural degradation and adversarial attacks. Extensive computational experience with such a model suggests that a Nash‐equilibrium design exists that can withstand the worst possible damage. Most important, the equilibrium is value‐free in that it is stable irrespective of the unit costs associated with reliability vs. capacity improvement and how one wishes to trade between throughput and reliability. This finding helps to pinpoint the most critical components in network design. From a policy standpoint, the model also allows the monetary value of information‐security to be imputed. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2009 相似文献
55.
56.
We present transient and asymptotic reliability indices for a single‐unit system that is subject to Markov‐modulated shocks and wear. The transient results are derived from the (transform) solution of an integro‐differential equation describing the joint distribution of the cumulative degradation process and the state of the modulating process. Additionally, we prove the asymptotic normality of a properly centered and time‐scaled version of the cumulative degradation at time t. This asymptotic result leads to a simple normal approximation for a properly centered and space‐scaled version of the systes lifetime distribution. Two numerical examples illustrate the quality of the normal approximation. © 2009 Wiley Periodicals, Inc. Naval Research Logistics 2009 相似文献
57.
We consider the problem of optimally maintaining a stochastically degrading, single‐unit system using heterogeneous spares of varying quality. The system's failures are unannounced; therefore, it is inspected periodically to determine its status (functioning or failed). The system continues in operation until it is either preventively or correctively maintained. The available maintenance options include perfect repair, which restores the system to an as‐good‐as‐new condition, and replacement with a randomly selected unit from the supply of heterogeneous spares. The objective is to minimize the total expected discounted maintenance costs over an infinite time horizon. We formulate the problem using a mixed observability Markov decision process (MOMDP) model in which the system's age is observable but its quality must be inferred. We show, under suitable conditions, the monotonicity of the optimal value function in the belief about the system quality and establish conditions under which finite preventive maintenance thresholds exist. A detailed computational study reveals that the optimal policy encourages exploration when the system's quality is uncertain; the policy is more exploitive when the quality is highly certain. The study also demonstrates that substantial cost savings are achieved by utilizing our MOMDP‐based method as compared to more naïve methods of accounting for heterogeneous spares. 相似文献
58.
Chloé Lewis Alfred Banga Ghislain Cimanuka Jean De Dieu Hategekimana Rachael Pierotti 《Civil Wars》2019,21(2):200-227
ABSTRACTIncreasingly, academic research in conflict-affected contexts relies on support from humanitarian organizations. Humanitarian organizations constitute sites of study in and of themselves; they partner with academics to roll out surveys or randomized program interventions; and they frequently facilitate security, logistics and transportation for independent researchers. We use a research partnership between IRC, the World Bank, and academic researchers in the UK, the US and eastern DR Congo, to explore the effects of humanitarian affiliation on conflict field research. In investigating when, how and under what conditions humanitarian identities are adopted by researchers (and how these affiliations shape research dynamics) we identify three paradoxes. First, “wearing humanitarian clothes” to facilitate research logistics can both facilitate and constrain access. Second, humanitarian affiliations invoked by researchers to ensure security and protection in volatile research sites can undermine the “insider” status of local staff. Finally, working through humanitarian organizations allows local and international researchers to benefit from the protections and privileges afforded to humanitarian employees without providing any of the services on which privileged access rests. In this article, we map out decisions faced by local and international researchers concerning when to adopt and discard humanitarian identities, and the fraught logistical, ethical and methodological consequences of these decisions. 相似文献