首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 812 毫秒
1.
This article had its genesis in a background study for the development of a new Australian Army counter-insurgency doctrine. Archival research showed that the Australian counter-insurgency doctrine employed in such post-1945 conflicts as Burma, Malaya, Borneo and Vietnam originated in the jungle campaigns of the South West Pacific Area during World War II. The historical record also showed that the Army's counter-insurgency doctrine, as with its World War II-jungle warfare doctrine, was a pragmatic amalgam of Australian experience and British doctrine. The article traces this process through the development of a series of doctrine manuals. It also considers the contribution of key individuals to both counter-insurgency theory and practice. This distinctively Australian approach to the development of doctrine was responsible for producing a highly successful manual, The Division in Battle: Pamphlet No. 11, Counter-Revolutionary Warfare (DIB 11), which the Army used during its involvement in Vietnam.  相似文献   

2.
Abstract

This paper examines the nexus between the Japanese strategy and economic–industrial mobilization during the period 1937–1945. From 1937 to December 1941, the country was engaged in a land war of attrition in China. This war requested an immense amount of resources and was associated with armaments procurement strategy with emphasis in the army. However, the Japanese strategic vision assumed that the state was strong enough to engage in one land war against China and in a naval war in the Pacific simultaneously. The basis of Japanese strategy was a utopia. Making things worse, the naval war in the Pacific was conducted against the most industrialized powers in the world [the US and the British Empire (Britain, Australia, India, etc.)]. Finally, the internal Japanese industrial mobilization was associated with immense errors in armaments production (absence of economies of scale and scope, limited raw materials, etc.). Under these circumstances, the defeat was an expected outcome.  相似文献   

3.
This paper discusses the operations analysis in the underwater search for the remains of the submarine Scorpion The a priori target location probability distribution for the search was obtained by monte-carlo procedures based upon nine different scenarios concerning the Scorpion loss and associated credibility weights. These scenarios and weights were postulated by others. Scorpion was found within 260 yards of the search grid cell having the largest a priori probability Frequent computations of local effectiveness probabilities (LEPs) were carried out on scene during the search and were used to determine an updated (a posteriori) target location distribution. This distribution formed the basis for recommendation of the current high probability areas for search The sum of LEPs weighted by the a priori target location probabilities is called search effectiveness probability (SEP) and was used as the overall measure of effectiveness for the operation. SEP and LEPs were used previously in the Mediterranean H-bomb search On-scene and stateside operations analysis are discussed and the progress of the search is indicated by values of SEP for various periods during the operation.  相似文献   

4.
The discounted return associated with a finite state Markov chain X1, X2… is given by g(X1)+ αg(X2) + α2g(X3) + …, where g(x) represents the immediate return from state x. Knowing the transition matrix of the chain, it is desired to compute the expected discounted return (present worth) given the initial state. This type of problem arises in inventory theory, dynamic programming, and elsewhere. Usually the solution is approximated by solving the system of linear equations characterizing the expected return. These equations can be solved by a variety of well-known methods. This paper describes yet another method, which is a slight modification of the classical iterative scheme. The method gives sequences of upper and lower bounds which converge mono-tonely to the solution. Hence, the method is relatively free of error control problems. Computational experiments were conducted which suggest that for problems with a large number of states, the method is quite efficient. The amount of computation required to obtain the solution increases much slower with an increase in the number of states, N, than with the conventional methods. In fact, computational time is more nearly proportional to N2, than to N3.  相似文献   

5.
This paper applies the well-known reflection principle for random walks to the analysis of the transient M/M/1 queueing system. A closed-form solution is obtained for the probability that exactly i arrivals and j departures occur over an interval of length t in an M/M/1 queueing system that contains n users at the beginning of the interval. The derivation of this probability is based on the calculation of the number of paths between two points in a two-dimensional −y coordinate system that lie above the x axis and touch the x axis exactly r times. This calculation is readily performed through the application of the reflection principle.  相似文献   

6.
The p-center problem involves finding the best locations for p facilities such that the furthest among n points is as close as possible to one of the facilities. Rectangular (sometimes called rectilinear, Manhattan, or l1) distances are considered. An O(n) algorithm for the 1-center problem, an O(n) algorithm for the 2-center problem, and an O(n logn) algorithm for the 3-center problem are given. Generalizations to general p-center problems are also discussed.  相似文献   

7.
For a given set S of nonnegative integers the partitioning problem asks for a partition of S into two disjoint subsets S1 and S2 such that the sum of elements in S1 is equal to the sum of elements in S2. If additionally two elements (the kernels) r1, r2S are given which must not be assigned to the same set Si, we get the partitioning problem with kernels. For these NP‐complete problems the authors present two compound algorithms which consist both of three linear greedylike algorithms running independently. It is shown that the worst‐case performance of the heuristic for the ordinary partitioning problem is 12/11, while the second procedure for partitioning with kernels has a bound of 8/7. © 2000 John Wiley & Sons, Inc. Naval Research Logistics 47: 593–601, 2000  相似文献   

8.
Tolerance limits which control both tails of the normal distribution so that there is no more than a proportion β1 in one tail and no more than β2 in the other tail with probability γ may be computed for any size sample. They are computed from X? - k1S and X? - k2S, where X? and S are the usual sample mean and standard deviation and k1 and k2 are constants previously tabulated in Odeh and Owen [3]. The question addressed is, “Just how accurate are the coverages of these intervals (– Infin;, X?k1S) and (X? + k2S, ∞) for various size samples?” The question is answered in terms of how widely the coverage of each tail interval differs from the corresponding required content with a given confidence γ′.  相似文献   

9.
A single server is faced with a collection of jobs of varying duration and urgency. Each job has a random lifetime during which it is available for nonpreemptive service. Should a job's lifetime expire before its service begins then it is lost from the system unserved. The goal is to schedule the jobs for service to maximize the expected number served to completion. Two heuristics have been proposed in the literature. One (labeled πS) operates a static priority among the job classes and works well in a “no premature job loss” limit, whereas the second (πM) is a myopic heuristic which works well when lifetimes are short. Both can exhibit poor performance for problems at some distance from the regimes for which they were designed. We develop a robustly good heuristic by an approximative approach to the application of a policy improvement step to the asymptotically optimal heuristic πS, in which we use a fluid model to obtain an approximation for the value function of πS. The performance of the proposed heuristic is investigated in an extensive numerical study. © 2010 Wiley Periodicals, Inc. Naval Research Logistics 2010  相似文献   

10.
When twentieth-century authors wrote about ‘partisan warfare’, they usually meant an insurgency or asymmetric military operations conducted against a superior force by small bands of ideologically driven irregular fighters. By contrast, originally (i.e. before the French Revolution) ‘partisan’ in French, English, and German referred only to the leader of a detachment of special forces (party, partie, Parthey, détachement) which the major European powers used to conduct special operations alongside their regular forces. Such special operations were the classic definition of ‘small war’ (petite guerre) in the late seventeenth and in the eighteenth centuries. The Spanish word ‘la guerrilla’, meaning nothing other than ‘small war’, only acquired an association with rebellion with the Spanish War of Independence against Napoleon. Even after this, however, armies throughout the world have continued to employ special forces. In the late nineteenth century, their operations have still been referred to as prosecuting ‘la guerrilla’ or ‘small war’, which existed side by side with, and was often mixed with, ‘people's war’ or popular uprisings against hated regimes.  相似文献   

11.
Suppose one object is hidden in the k-th of n boxes with probability p(k). The boxes are to be searched sequentially. Associated with the j-th search of box k is a cost c(j,k) and a conditional probability q(j,k) that the first j - 1 searches of box k are unsuccessful while the j-th search is successful given that the object is hidden in box k. The problem is to maximize the probability that we find the object if we are not allowed to offer more than L for the search. We prove the existence of an optimal allocation of the search effort L and state an algorithm for the construction of an optimal allocation. Finally, we discuss some problems concerning the complexity of our problem.  相似文献   

12.
This article uses a vertex-closing approach to investigate the p-center problem. The optimal set of vertices to close are found in imbedded subgraphs of the original graph. Properties of these subgraphs are presented and then used to characterize the optimal solution, to establish a priori upper and lower bounds, to establish refined lower bounds, and to verify the optimality of solutions. These subgraphs form the foundation of two polynomial algorithms of complexity O(|E| log |E|) and O(|E|2). The algorithms are proven to converge to an optimum for special cases, and computational evidence is provided which suggests that they produce very good solutions more generally. Both algorithms perform very well on problems where p is large relative to the number of vertices n, specifically, when p/n ≥ 0.30. One of the algorithms is especially efficient for solving a sequence of problems on the same graph.  相似文献   

13.
14.
The effectiveness of Johnson's Approximate Method (JAM) for the 3 × n job shop scheduling problems was examined on 1,500 test cases with n ranging from 6 to 50 and with the processing times Ai, Bi, Ci (for item i on machines A, B, C) being uniformly and normally distributed. JAM proved to be quite effective for the case Bi ? max (Ai, Ci) and optimal for Bi, ? min (Ai, Ci).  相似文献   

15.
Suppose X1,X2, ?,Xn is a random sample of size n from a continuous distribution function F(x) and let X1,n, ≦ X2,n ≦ ? ≦ Xn,n be the corresponding order statistics. We define the jth-order gap gi,j as gi,j = Xi+j,n ? Xi,n, 1 ≦ i < n, 1 ≦ jn ? i. In this article characterizations of the exponential distribution are given by considering the distributional properties of gk,n-k, 1 ≦ kn.  相似文献   

16.
Suppose X is a random variable having an absolutely continuous distribution function F(x). We assume that F(x) has the Wald distribution. A relation between the probability density function of X−1 with that of X is used to characterize the Wald distribution.  相似文献   

17.
Under a free-replacement warranty of duration W, the customer is provided, for an initial cost of C, as many replacement items as needed to provide service for a period W. Payments of C are not made at fixed intervals of length W, but in random cycles of length Y = W + γ(W), where γ(W) is the (random) remaining life-time of the item in service W time units after the beginning of a cycle. The expected number of payments over the life cycle, L, of the item is given by MY(L), the renewal function for the random variable Y. We investigate this renewal function analytically and numerically and compare the latter with known asymptotic results. The distribution of Y, and hence the renewal function, depends on the underlying failure distribution of the items. Several choices for this distribution, including the exponential, uniform, gamma and Weibull, are considered.  相似文献   

18.
This paper is concerned with estimating p = P(X1 < Y …, Xn < Y) or q =P (X < Y1, …, X < Yn) where the X's and Y's are all independent random variables. Applications to estimation of the reliability p from stress-strength relationships are considered where a component is subject to several stresses X1, X2, …, XN whereas its strength, Y, is a single random variable. Similarly, the reliability q is of interest where a component is made of several parts all with their individual strengths Y1, Y2 …, YN and a single stress X is applied to the component. When the X's and Y's are independent and normal, maximum likelihood estimates of p and q have been obtained. For the case N = 2 and in some special cases, minimum variance unbiased estimates have been given. When the Y's are all exponential and the X is normal with known variance, but unknown mean (or uniform between 0 and θ, θ being unknown) the minimum variance unbiased estimate of q is established in this paper.  相似文献   

19.
Variations of Hale's channel assignment problem, the L(j, k)‐labeling problem and the radio labeling problem require the assignment of integers to the vertices of a graph G subject to various distance constraints. The λj,k‐number of G and the radio number of G are respectively the minimum span among all L(j, k)‐labelings, and the minimum span plus 1 of all radio labelings of G (defined in the Introduction). In this paper, we establish the λj,k‐number of ∏ K for pairwise relatively prime integers t1 < t2 < … < tq, t1 ≥ 2. We also show the existence of an infinite class of graphs G with radio number |V(G)| for any diameter d(G). © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2005  相似文献   

20.
Atomic Obsession: Nuclear Alarmism from Hiroshima to Al Qaeda, by John Mueller. Oxford University Press, 2009. 336 pages, $27.95.

Les armes nucléaires: Mythes et réalités [Nuclear Weapons: Myths and Realities], by Georges Le Guelte. Actes Sud, 2009. 390 pages, [euro]25.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号