首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   9篇
  免费   0篇
  2019年   2篇
  2017年   1篇
  2016年   2篇
  2013年   2篇
  1999年   1篇
  1980年   1篇
排序方式: 共有9条查询结果,搜索用时 46 毫秒
1
1.
The United Arab Emirates (UAE) has laid out an ambitious plan to become the first Arab country to possess a civilian nuclear energy program. Central to that effort has been the Emirati government's ability to obtain foreign nuclear assistance. This article traces the UAE's strategies for overcoming the obstacles that stood in the way of nuclear suppliers providing assistance. It examines the approach taken by the UAE to assuage the safety and security concerns of nuclear suppliers, how the UAE leveraged its alliances with France and the United States to obtain their cooperation, and its strategies for engaging domestic interest groups in supplier states. The generalizable elements of the UAE's strategies are discussed and used to provide insight into the prospects for other Middle Eastern states' bids to obtain similar assistance. The article concludes with a discussion of the potentially transformative aspects of the strategies employed by the UAE in shaping other countries' pursuit of nuclear energy in the region.  相似文献   
2.
Recent scholarship has largely ignored systematic differences in the existential threats that nuclear-weapon possessors pose to other states. This study theorizes that the capacity to pose existential threats shapes nuclear-armed states’ willingness to use military force against one another. We explore three hypotheses regarding how nuclear-based existential threats can deter conflict or encourage it, including under the conditions proposed by the stability–instability paradox. We rely on a statistical analysis of nuclear-armed dyads from 1950 to 2001 and employ the Nuclear Annihilation Threat (NAT) Index to capture variation in the existential threats nuclear-armed states pose to one another. We find that being able to pose an existential threat to another state emboldens potential initiators to use military force but does not deter attacks. The emboldening effects are particularly strong under the hypothesized conditions of the stability–instability paradox. Our study provides unique contributions to ongoing debates over the political effects of nuclear weapons.  相似文献   
3.
South Korea is threatened by its troubled relationship with North Korea. North Korea possesses a large cache of missiles as well as chemical and biological weapons, and the future potential to mount nuclear weapons on its missiles. The United States is also challenged because of its defense commitments to Seoul. As a countermeasure, the United States and South Korea decided to deploy Terminal High Altitude Area Defense (THAAD) missile defenses in South Korea. However, China has objected. Chinese scholars believe the THAAD radar would be able to track Chinese inter-continental ballistic missiles, thereby weakening their deterrent. A technical analysis does not support this assertion. However, it is vital for South Korea, given its proximity and economic interdependence, to reassure China. South Korea should highlight that THAAD will be deployed by the United States Forces Korea and is not a commitment by Seoul to become part of U.S.-led missile defenses in the Asia-Pacific.  相似文献   
4.
This paper develops a single period model for a specific class of multiproduct perishable inventory systems where demands are interdependent. This class of inventory systems has the property that there is economic substitution between products. It is shown that the optimal policy has the economic substitution property, and that the rate of substitution is age dependent. The model serves as a generalization of a theorem discovered by Ignall and Veinott.  相似文献   
5.
The U.S. spends billions of dollars in its security cooperation program to develop “professional, accountable, and capable security forces” in other nations, part of a grand strategy to improve global stability and counter violent extremism. Despite its great investment in professionalizing foreign militaries, however, the U.S. has no functional definition of military professionalism – a term that until now has been considered too vague and multi-faceted to operationalize. In this article, the author seeks to remedy this oversight, drawing from twenty years of security cooperation fieldwork in Latin America and Africa, as well as a vigorous literature review, to define four important components of military professionalism: (1) formal military education and vocational training, (2) military subordination to elected civilian officials, (3) knowledge and practice of the law of armed conflict and human rights law, and (4) a clearly established program of professional military ethics. This article provides guidelines for U.S. and European officials who work with partner nations to develop more professional military forces and, in particular, for officials managing security assistance programs with developing countries.  相似文献   
6.
This paper considers the scheduling problem to minimize total tardiness given multiple machines, ready times, sequence dependent setups, machine downtime and scarce tools. We develop a genetic algorithm based on random keys representation, elitist reproduction, Bernoulli crossover and immigration type mutation. Convergence of the algorithm is proved. We present computational results on data sets from the auto industry. To demonstrate robustness of the approach, problems from the literature of different structure are solved by essentially the same algorithm. © 1999 John Wiley & Sons, Inc. Naval Research Logistics 46: 199–211, 1999  相似文献   
7.
Qualitative studies of terrorist movements frequently highlight the importance of diaspora communities as important factors in producing and sustaining terrorist activity in countries. The underlying theoretical argument is that bifurcation of tight-knit minority communities between countries nurtures separatist or irredentist sentiments among affected community members, thus prompting terrorist activity, while minority community members in other countries might mobilize financial and political resources to support terrorist activity among their compatriots. In this study, we empirically test whether transnational dispersion, versus domestic concentration, of minority communities in countries produces higher incidents of terrorism. Conducting a series of negative binomial estimations on a reshaped database of around 170 countries from 1981 to 2006, derived from the Minorities at Risk database and the Global Terrorism Database, we determine that both transnational dispersion of kin minority communities and domestic concentration of minorities within countries increase terrorism and that transnational dispersion is a particularly robust predictor of terrorist attacks.  相似文献   
8.
Recent literature on whether military spending affects economic growth argues that the relationship may be a conditional one. We add to this literature by considering the role that ‘good institutions’ play in the effect of military spending on growth. Using data from a sample of over 100 countries from 1988 to 2010, our analysis suggests that the effect of military spending on growth is generally negative or zero at best, and this effect is mitigated in the presence of good economic and political institutions.  相似文献   
9.
We study an (R, s, S) inventory control policy with stochastic demand, lost sales, zero lead‐time and a target service level to be satisfied. The system is modeled as a discrete time Markov chain for which we present a novel approach to derive exact closed‐form solutions for the limiting distribution of the on‐hand inventory level at the end of a review period, given the reorder level (s) and order‐up‐to level (S). We then establish a relationship between the limiting distributions for adjacent values of the reorder point that is used in an efficient recursive algorithm to determine the optimal parameter values of the (R, s, S) replenishment policy. The algorithm is easy to implement and entails less effort than solving the steady‐state equations for the corresponding Markov model. Point‐of‐use hospital inventory systems share the essential characteristics of the inventory system we model, and a case study using real data from such a system shows that with our approach, optimal policies with significant savings in inventory management effort are easily obtained for a large family of items.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号