首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   30篇
  免费   3篇
  2021年   1篇
  2020年   2篇
  2019年   2篇
  2018年   1篇
  2017年   4篇
  2016年   1篇
  2014年   2篇
  2013年   11篇
  2012年   1篇
  2011年   1篇
  2007年   1篇
  2005年   1篇
  2002年   1篇
  2001年   1篇
  1999年   1篇
  1998年   1篇
  1986年   1篇
排序方式: 共有33条查询结果,搜索用时 15 毫秒
1.
We consider the integrated problem of optimally maintaining an imperfect, deteriorating sensor and the safety‐critical system it monitors. The sensor's costless observations of the binary state of the system become less informative over time. A costly full inspection may be conducted to perfectly discern the state of the system, after which the system is replaced if it is in the out‐of‐control state. In addition, a full inspection provides the opportunity to replace the sensor. We formulate the problem of adaptively scheduling full inspections and sensor replacements using a partially observable Markov decision process (POMDP) model. The objective is to minimize the total expected discounted costs associated with system operation, full inspection, system replacement, and sensor replacement. We show that the optimal policy has a threshold structure and demonstrate the value of coordinating system and sensor maintenance via numerical examples. © 2017 Wiley Periodicals, Inc. Naval Research Logistics 64: 399–417, 2017  相似文献   
2.
We study a setting with a single type of resource and with several players, each associated with a single resource (of this type). Unavailability of these resources comes unexpectedly and with player‐specific costs. Players can cooperate by reallocating the available resources to the ones that need the resources most and let those who suffer the least absorb all the costs. We address the cost savings allocation problem with concepts of cooperative game theory. In particular, we formulate a probabilistic resource pooling game and study them on various properties. We show that these games are not necessarily convex, do have non‐empty cores, and are totally balanced. The latter two are shown via an interesting relationship with Böhm‐Bawerk horse market games. Next, we present an intuitive class of allocation rules for which the resulting allocations are core members and study an allocation rule within this class of allocation rules with an appealing fairness property. Finally, we show that our results can be applied to a spare parts pooling situation.  相似文献   
3.
We consider the salvo policy problem, in which there are k moments, called salvos, at which we can fire multiple missiles simultaneously at an incoming object. Each salvo is characterized by a probability pi: the hit probability of a single missile. After each salvo, we can assess whether the incoming object is still active. If it is, we fire the missiles assigned to the next salvo. In the salvo policy problem, the goal is to assign at most n missiles to salvos in order to minimize the expected number of missiles used. We consider three problem versions. In Gould's version, we have to assign all n missiles to salvos. In the Big Bomb version, a cost of B is incurred when all salvo's are unsuccessful. Finally, we consider the Quota version in which the kill probability should exceed some quota Q. We discuss the computational complexity and the approximability of these problem versions. In particular, we show that Gould's version and the Big Bomb version admit pseudopolynomial time exact algorithms and fully polynomial time approximation schemes. We also present an iterative approximation algorithm for the Quota version, and show that a related problem is NP-complete.  相似文献   
4.
Multiple Objectives Optimization is much seen in combination with linear functions and even with linear programming, together with an adding of the objectives by using weights. With distance functions, normalization instead of weights is used. It is also possible that together with an additive direct influence of the objectives on the utility function a mutual utility of the objectives exists under the form of a multiplicative representation. A critical comment is brought on some representations of this kind. A full‐multiplicative form may offer other opportunities, which will be discussed at length in an effort to exclude weights and normalization. This theoretical approach is followed by an application for arms procurement. © 2002 Wiley Periodicals, Inc. Naval Research Logistics 49: 327–340, 2002; Published online in Wiley InterScience (www.interscience.wiley.com). DOI 10.1002/nav.10014  相似文献   
5.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article.  相似文献   
6.
This article examines the geopolitical dynamics associated with the African Union (AU) and United Nations hybrid operation in Darfur (UNAMID) from the start of the Darfur conflict in 2003 until the time when UNAMID became fully operational in 2011. It provides an overview of the complex forces and geopolitical dynamics that affected the deployment of UNAMID and shaped its unique hybrid character. It mainly highlights those primary geopolitical factors that hindered the full deployment of UNAMID. It is concluded that this period was a showcase for the newly established AU and its support for its member states, as well as a new approach for the international community to maintain international peace and security in alliance with regional organisations.  相似文献   
7.
This paper contributes to the growing literature on the milex-growth nexus, by providing a case study of South Africa and considering the possibility of structural breaks by applying newly developed econometric methods. Using full sample bootstrap Granger non-causality tests, no Granger causal link is found between military expenditure and GDP for 1951–2010, but parameter instability tests show the estimated VARs to be unstable. Using a bootstrap rolling window estimation procedure, however, finds evidence of bidirectional Granger causality in various subsamples. This implies standard Granger non-causality tests, which neither account for structural breaks nor time variation may be invalid.  相似文献   
8.
9.
Observers of United States (US) interventions have almost universally characterized the 1994 Haiti intervention as multilateral, a model for how international cooperation can achieve common security goals. A closer analysis of the intervention reveals that the planning and execution of the intervention were almost entirely unilateral and therefore cost the US few if any of the theoretical costs of coalition warfare, including interoperability and policy compromise. Mapped onto the unilateral strategy and operation of the intervention, however, was a multilateral diplomatic effort that secured United Nations Security Council authorization and provided a cover for an intervention that the US had already planned and intended to execute with or without that authorization. That the US sought a multilateral cover for an intervention that it could easily accomplish unilaterally shows the importance of two factors: A domestic audience that opposed unilateral peacekeeping but would accept using US resources as part of a broader multilateral operation, and a local population that would be more responsive to a multilateral coalition than a use of force that was perceived to be unilateral. The Haiti intervention shows that the determinants of success in operations other than war are as much political as military. When the US already has overwhelming military superiority vis-à-vis its adversary, building military coalitions becomes as much about enlisting political support as aggregating material capability.  相似文献   
10.
Since the introduction of flexible manufacturing systems, researchers have investigated various planning and scheduling problems faced by the users of such systems. Several of these problems are not encountered in more classical production settings, and so‐called tool management problems appear to be among the more fundamental ones of these problems. Most tool management problems are hard to solve, so that numerous approximate solution techniques have been proposed to tackle them. In this paper, we investigate the quality of such algorithms by means of worst‐case analysis. We consider several polynomial‐time approximation algorithms described in the literature, and we show that all these algorithms exhibit rather poor worst‐case behavior. We also study the complexity of solving tool management problems approximately. In this respect, we investigate the interrelationships among tool management problems, as well as their relationships with other well‐known combinatorial problems such as the maximum clique problem or the set covering problem, and we prove several negative results on the approximability of various tool management problems. © 1999 John Wiley & Sons, Inc. Naval Research Logistics 46: 445–462, 1999  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号