首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   46篇
  免费   2篇
  2022年   1篇
  2019年   1篇
  2018年   2篇
  2017年   4篇
  2016年   1篇
  2014年   9篇
  2013年   17篇
  2012年   2篇
  2011年   1篇
  2009年   1篇
  2007年   1篇
  2005年   1篇
  2003年   1篇
  2001年   2篇
  2000年   1篇
  1998年   2篇
  1997年   1篇
排序方式: 共有48条查询结果,搜索用时 203 毫秒
1.
From the recipients’ perspective, arms transfers have, through the use of offsets, technology transfers, and industrial participation, become an opportunity to receive not only advanced weapons, but also technologies not otherwise available. How important are friendly relations for securing a military export order? To what extent do buyers demand advanced military or commercial technology and how are these demands accepted by the supplier? How does this influence smaller producers in relation to major producers? These questions are addressed by studying (a) the Joint Strike Fighter/F-35 by Lockheed Martin, USA, and the JAS-39 Gripen aircraft by Saab, Sweden, (b) the Medium Multi-Role Combat Aircraft competition in India for 126 combat aircraft, and (c) the Indian offset policy. In the final section, some long-term consequences are discussed.  相似文献   
2.
Standard economic concepts of production and cost minimization subject to a production constraint are used to derive the conditions of optimal deployment of home and forward military forces for the production of home security. United States' participation in the NATO alliance is then analyzed in the context of a two‐ally (U.S. and Western Europe) optimal force deployment model of NATO. Next, U.S. force‐basing policy is adduced as an enforcement mechanism for the “transatlantic contract.” Lastly, statistical evidence on burden sharing within Western Europe, and the effectiveness of the U.S. contract enforcement policy, is presented.  相似文献   
3.
《Arms and Armour》2013,10(1):6-45
Abstract

The Freemasons' Sword of State presented by Thomas, 8th Duke of Norfolk in 1730, a token made by the royal sword-cutler, freemason and swordbearer, George Moody, is described and illustrated. The sword's presentation is discussed, the gift is placed into its historical context, its iconography is assessed and the life of the manufacturer is examined. Two other relevant swords at Freemasons' Hall, London are also discussed.  相似文献   
4.
Croatia's successful bid for independence was one of the defining moments of the immediate post-Cold War period. Nevertheless, the means that Croatia used to obtain independence remains relatively unexamined by academics. This article focuses on the early period of Croatia's bid for secession, and specifically the role that Yugoslavia's policy of Total National Defence played in facilitating its independence. Unlike in Slovenia, where the legacies of Total National Defence facilitated Slovenia's bid for secession, in Croatia the decision of its political leaders meant that the country largely neglected its positive legacies, resulting in a protracted four-year struggle.  相似文献   
5.
On 4 January 1961 in Baixa do Cassange, in the north of Angola, the blacks who worked in the cotton fields began a strike. The army with air support was called to quell the rebellion, and the article emphasizes the importance of air support tethered to the ground forces, particularly in a remote and vast area of operations in the tropical rainy season. In this case, the support originally came in the form a squadron of Lockheed PV-2 Harpoons from Luanda, some 300 kilometers away. These open-ocean reconnaissance aircraft and their crews were ill-suited for the task. When this became apparent, four small Auster D5/160s were relocated from Negage to Malange, among the ground forces. The Austers flew reconnaissance missions over the troubled zones, dropped provisions and messages to the advancing ground forces, and served as a backup communications link. When the strike ceased after three weeks, the Austers assumed a humanitarian role in support of the starving population. The conclusion is that air support to ground forces is indispensable, must be properly tailored to the job, and must operate as an integral part of the ground forces.  相似文献   
6.
This paper studies load balancing for many-server (N servers) systems. Each server has a buffer of size b ? 1, and can have at most one job in service and b ? 1 jobs in the buffer. The service time of a job follows the Coxian-2 distribution. We focus on steady-state performance of load balancing policies in the heavy traffic regime such that the normalized load of system is λ = 1 ? N?α for 0 < α < 0.5. We identify a set of policies that achieve asymptotic zero waiting. The set of policies include several classical policies such as join-the-shortest-queue (JSQ), join-the-idle-queue (JIQ), idle-one-first (I1F) and power-of-d-choices (Po d) with d = O(Nα log N). The proof of the main result is based on Stein's method and state space collapse. A key technical contribution of this paper is the iterative state space collapse approach that leads to a simple generator approximation when applying Stein's method.  相似文献   
7.
This paper develops and applies a nonparametric bootstrap methodology for setting inventory reorder points and a simple inequality for identifying existing reorder points that are unreasonably high. We demonstrate that an empirically based bootstrap method is both feasible and calculable for large inventories by applying it to the 1st Marine Expeditionary Force General Account, an inventory consisting of $20–30 million of stock for 10–20,000 different types of items. Further, we show that the bootstrap methodology works significantly better than the existing methodology based on mean days of supply. In fact, we demonstrate performance equivalent to the existing system with a reduced inventory at one‐half to one‐third the cost; conversely, we demonstrate significant improvement in fill rates and other inventory performance measures for an inventory of the same cost. © 2000 John Wiley & Sons, Inc. Naval Research Logistics 47: 459–478, 2000  相似文献   
8.
In this article, we analyze a discrete‐time queue that is motivated from studying hospital inpatient flow management, where the customer count process captures the midnight inpatient census. The stationary distribution of the customer count has no explicit form and is difficult to compute in certain parameter regimes. Using the Stein's method framework, we identify a continuous random variable to approximate the steady‐state customer count. The continuous random variable corresponds to the stationary distribution of a diffusion process with state‐dependent diffusion coefficients. We characterize the error bounds of this approximation under a variety of system load conditions—from lightly loaded to heavily loaded. We also identify the critical role that the service rate plays in the convergence rate of the error bounds. We perform extensive numerical experiments to support the theoretical findings and to demonstrate the approximation quality. In particular, we show that our approximation performs better than those based on constant diffusion coefficients when the number of servers is small, which is relevant to decision making in a single hospital ward.  相似文献   
9.
多属性、多目标性决策中,针对专家给出各方案偏好关系下的决策问题,提出一种基于乘积偏好关系的专家模糊核聚类赋权方法。该方法运用模糊核聚类的思想实现对决策专家的聚类,并通过放宽归一化约束条件,克服了传统模糊核聚类算法中离群点对聚类结果的影响。同时,在专家类内赋权过程中,运用CI-IOWG算子集结同类专家的意见,依据不同专家对于形成类别一致性意见的贡献程度来确定专家权重;克服了传统基于熵权或判断矩阵一致性的赋权方法的局限性。算例表明,该方法可行、有效。  相似文献   
10.
This paper argues that the crisis of electoral democracy in Zimbabwe and Cote d'Ivoire is a result of underlying structural and institutional deficiencies within national and regional multinational institutions. It assesses the extent to which they have been ‘enablers’ or ‘spoilers’ of electoral-based transitions to democracy. Yet it avoids generalisations of the security sector's involvement in political transitions. In terms of structure, the paper is divided into four sections. Section one will briefly discuss the theoretical perspectives of the election-democracy trajectory. It argues that although elections are a major variable for democracy, unless the ‘ecology of elections’ is conducive, elections may not be an instrument of transition to democracy. The second section analyses the militarisation of politics and the role of the security sector in aiding or stalling democratisation. Section three will assess the role of regional organisations such as the Southern African Development Community, Economic Community of West African States and the African Union in electoral-based political transitions in Africa. Lastly, the paper will discuss how the security sector and multinational African institutions can aid political transitions to democracy in troubled African countries.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号