排序方式: 共有95条查询结果,搜索用时 15 毫秒
61.
Javed Ali 《The Nonproliferation Review》2013,20(1):43-58
Policy makers and scholars have drawn improper lessons from the Ukrainian case of disarmament. Employing a content analysis of Ukrainian and Russian news sources, as well as a series of interviews with Ukrainian officials conducted by the author, this paper argues that Ukraine did not surrender its nuclear arsenal because it received compensation or faced financial and technical hurdles in securing effective command and control over the weapons. Instead, Ukraine surrendered its nuclear weapons due to a lack of demand for them. The historical interactions between Ukrainians and Russians led the majority of Ukrainian leaders to reject a conception of the Ukrainian national identity that cognitively perceived Russia as a security threat. Only with a proper understanding of this case study can the international community understand how the nonproliferation norm succeeded. 相似文献
62.
Mary Raum 《The Nonproliferation Review》2013,20(2):427-431
It is rare to find a well-formulated study that describes the behavioral aspects of leadership in the political realm. Even more infrequent is a combined study of individual behaviors as it applies to a large techno-political issue such as nuclear proliferation. India, Argentina, Australia, and France are used as cases for application of a national identity conception model. The model is based on two dimensions, solidarity and status, that when combined, result in a leader's identification with other nations’ abilities to be a player in the nuclear arms community. While the work is behavioral in context, there is no effort to avoid the technological side of proliferation, so as to provide a balanced review of a complex issue. 相似文献
63.
采用基于COM技术的软件设计方法 ,对数控系统软件进行模块化开发 ,模块间的通信问题是关键。应用COM技术中的“事件”和“事件槽”方式实现了客户组件模块与服务器之间、客户组件模块之间的通信。这为开放式数控系统软件设计中通信问题的解决提供了一种新的软件方法 相似文献
64.
Nicholas G. Hall Gilbert Laporte Esaignani Selvarajah Chelliah Sriskandarajah 《海军后勤学研究》2005,52(3):261-275
We study the problem of minimizing the makespan in no‐wait two‐machine open shops producing multiple products using lot streaming. In no‐wait open shop scheduling, sublot sizes are necessarily consistent; i.e., they remain the same over all machines. This intractable problem requires finding sublot sizes, a product sequence for each machine, and a machine sequence for each product. We develop a dynamic programming algorithm to generate all the dominant schedule profiles for each product that are required to formulate the open shop problem as a generalized traveling salesman problem. This problem is equivalent to a classical traveling salesman problem with a pseudopolynomial number of cities. We develop and test a computationally efficient heuristic for the open shop problem. Our results indicate that solutions can quickly be found for two machine open shops with up to 50 products. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2005 相似文献
65.
证据理论与模糊神经网络相结合的身份估计方法 总被引:7,自引:0,他引:7
重点研究了在数据融合身份估计领域中D-S证据理论与模糊神经网络相结合的多传感器数据融合方法。Demp-ster-Shafer证据理论方法是对Beyes决策检验法的推广,证据理论比概率论满足更弱的公理系统,并且在区分不确定与不知道等方面显示了很大的灵活性,但是在基于证据理论的身份估计融合中,基本可信度的分配是一个与应用密切相关的问题,也是实际应用中最难的一步。利用模糊神经网络来处理证据理论中的基本可信度分配问题,并对几种空中目标进行了身份估计数据融合,经计算机仿真实验证实了该方法的有效性。 相似文献
66.
Patrick Mileham 《Defense & Security Analysis》2016,32(1):97-111
This second part of the review article begins with a definition of military power, when and how it should be used. From a large number of authors, “moral forces” are linked to “codes of conduct”, and the fundamental understandings about the “profession of arms”, based on “fiduciary trust”, “covenanted” service and professional and personal “conscience”. The article covers what authors have written about “culture” and the ethics of “technology” devices and systems, including “cyber” warfare. It concludes with recognition of the increase in ethical sensitivity in this century which is characterized by a phenomenon, the crises of “identity”, personal, national and global. 相似文献
67.
基于3D-IC技术实现的3D SRAM,其电路中使用了大量的TSV。目前TSV制造工艺尚未成熟,使得TSV容易出现开路或短路故障,从而给3D SRAM的测试带来新的挑战。现有的2D BIST测试方式能够探测到3D SRAM中存在的故障,但并不能判定是TSV故障还是存储器本身故障;TSV专用测试电路虽然能够探测出TSV的故障,但需要特定的测试电路来实现,这就增加了额外的面积开销,同时加大了电路设计复杂度。基于此,本文提出了一种使用测试算法来探测TSV开路故障的方法,在不使用TSV专用测试电路且不增加额外面积开销的情况下通过BIST电路解决3D SRAM中TSV的开路故障检测问题。结果显示该TSV测试算法功能正确,能够准确探测到TSV的开路故障,并快速定位TSV的开路位置。 相似文献
68.
The paper analyzes the effects of military spending on economic growth in a small open stochastic endogenous growth model involving the supply-side and demand-side effects produced by military spending. We show that a rise in the military spending affects economic growth through four channels, including the crowding-out effect, the spin-off effect, the resource mobilization effect, and the portfolio effect. The net effect which depends on these four channels is ambiguous. Hence, we demonstrate that there exists an optimal defense burden that maximizes the economic growth rate. 相似文献
69.
70.
龚正虎 《国防科技大学学报》1993,15(1):26-30
国际标准化组织提出的抽象语法ASN-1和传送语法ASN-BER功能强,通用灵活,但在一般实现中存在编码效率低和开销大的缺点。本文讨论提高编码效率和速度的一般方法,以及描述快速传送语法的设计与实现技术。 相似文献