排序方式: 共有19条查询结果,搜索用时 15 毫秒
11.
John Turner 《Small Wars & Insurgencies》2013,24(3):563-586
ABSTRACTAl Qaeda following 9-11 experienced a period of stagnation which it sought to remedy through a project of re-branding. Critical of this approach, Islamic State claimed that al Qaeda was an elitist organization that had facilitated the stagnation of the Salafi Jihadist project. In an attempted to claim dominance over the jihad, Islamic State’s endeavored to discredit al Qaeda through a process it presented as ideological correction, linked to Islamic eschatology, sectarian agitation, permissive violence, and the caliphate. Following Islamic State’s acquisition of vast territory in Iraq and Syria, arguments proliferated that Islamic State had surpassed al Qaeda. As the caliphate has collapsed what effects will this have on al Qaeda’s fortunes and strategy? It is argued that Islamic State has provided al Qaeda’s strategic approach with renewed vigour to help ensure its survival and pursue resurgence. Al Qaeda acting in concert with the meta-strategy for survival concept, has altered an existential threat into an advantage through disavowing Islamic State’s methods, continuing to engage with localism, and pursuing rebranding by positioning itself as a moderate alternative. The cases of al Qaeda affiliates in Yemen, Syria, West Africa, and South Asia are instructive in assessing the effectiveness of al Qaeda’s resurgence. 相似文献
12.
Factor screening is performed to eliminate unimportant factors so that the remaining important factors can be more thoroughly studied in later experiments. Controlled sequential bifurcation (CSB) and controlled sequential factorial design (CSFD) are two new screening methods for discrete‐event simulations. Both methods use hypothesis testing procedures to control the Type I Error and power of the screening results. The scenarios for which each method is most efficient are complementary. This study proposes a two‐stage hybrid approach that combines CSFD and an improved CSB called CSB‐X. In Phase 1, a prescreening procedure will estimate each effect and determine whether CSB‐X or CSFD will be used for further screening. In Phase 2, CSB‐X and CSFD are performed separately based on the assignment of Phase 1. The new method usually has the same error control as CSB‐X and CSFD. The efficiency, on the other hand, is usually much better than either component method. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2010 相似文献
13.
14.
States confronting cross-border intrusions of terrorism, illegal immigration, and/or drug trafficking weigh the costs of such intrusions against the costs of imposing barriers to prevent or curb the intrusions. In such situations, the degree of national security afforded a state depends, in large measure, upon the degree of border openness the state chooses. Depending upon the intensity and frequency of the intrusions – expressed in terms of opportunity-cost functions – a state might have little choice but to pursue a border policy of zero openness. It is this relationship of border openness to national security that explains why many states choose to construct security fences. In the 49 cases of security fences examined, many – among them Israel vis-à-vis the West Bank, India vis-à-vis Pakistan, Turkey vis-à-vis Greece in Cyprus – the construction of security fences becomes more complicated by their placement on lands whose sovereignties are disputed. 相似文献
15.
Thomas W. Lucas W. David Kelton Paul J. Sánchez Susan M. Sanchez Ben L. Anderson 《海军后勤学研究》2015,62(4):293-303
Decades ago, simulation was famously characterized as a “method of last resort,” to which analysts should turn only “when all else fails.” In those intervening decades, the technologies supporting simulation—computing hardware, simulation‐modeling paradigms, simulation software, design‐and‐analysis methods—have all advanced dramatically. We offer an updated view that simulation is now a very appealing option for modeling and analysis. When applied properly, simulation can provide fully as much insight, with as much precision as desired, as can exact analytical methods that are based on more restrictive assumptions. The fundamental advantage of simulation is that it can tolerate far less restrictive modeling assumptions, leading to an underlying model that is more reflective of reality and thus more valid, leading to better decisions. Published 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 293–303, 2015 相似文献
16.
A model for a vehicle moving evasively along a fixed path is defined in terms of a two- state semi-Markov process. An important feature of this model is the continuous movement of the vehicle as a function of time. One potential application of this model is the development of a strategy for the deployment of long-range missiles on long underground tracks. 相似文献
17.
Anthony J. W. Turner 《Defence and Peace Economics》2013,24(4):331-342
The Ministry of Defence (MOD) has published estimates of the number of average full‐time UK industry employees dependent on MOD expenditure and defence exports for a number of years. This paper provides the outcome of a recent review of the process used. The method of deriving MOD and defence export final demand vectors, and calculating from these estimates of direct employment (i.e. that in supplying companies) and indirect employment (i.e. that incurred through the supply chain) are described. Difficulties with the data are explored. Alternative approaches, methods used in other countries and challenges posed by changing MOD administrative systems are briefly discussed. 相似文献
18.
Susan Turner Haynes 《The Nonproliferation Review》2019,26(5-6):427-447
ABSTRACTWhile most contemporary analyses of South Asian nuclear dynamics acknowledge the presence of a strategic triangle between the region’s three nuclear players, the primary focus usually remains on the rivalry between India and Pakistan. Discussions of Sino-Indian relations remain limited. This is likely attributed to the stability in the two countries’ relations, yet it is worth asking why this stability exists and whether it is likely to continue in the future. Although China and India have an acrimonious relationship, their asymmetric nuclear capabilities and threat perceptions mitigate the danger of a traditional security dilemma. India may perceive China’s nuclear aggrandizement to be a security threat, but the same is not true of China, which has a vastly superior nuclear force and is largely shaping its nuclear-force structure in response to the threat it perceives from the United States. This dynamic makes a serious conventional or nuclear conflict highly unlikely. 相似文献
19.
Peter Haynes 《Defense & Security Analysis》2020,36(1):101-108
ABSTRACTFor the first time in a generation, the US Navy finds itself in an era of great power competition. As US naval strategists and defense planners begin to organise materially and conceptually to confront the strategic and operational-level challenges posed by China and Russia, what should they keep in mind? What should frame their thinking? Absorbed with the day-to-day tasks associated with managing how the fleet is being built, operated, and rationalised, these busy officers and civilians seldom can step back and gain some perspective on fundamental aspects of the security environment and relate those to naval purpose. To that end, this article provides a primer on what to keep in mind and how to think in an era of maritime great power competition. 相似文献