首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   18篇
  免费   1篇
  19篇
  2020年   1篇
  2019年   2篇
  2016年   1篇
  2015年   1篇
  2013年   7篇
  2010年   1篇
  1989年   2篇
  1986年   1篇
  1984年   1篇
  1980年   1篇
  1971年   1篇
排序方式: 共有19条查询结果,搜索用时 15 毫秒
11.
ABSTRACT

Al Qaeda following 9-11 experienced a period of stagnation which it sought to remedy through a project of re-branding. Critical of this approach, Islamic State claimed that al Qaeda was an elitist organization that had facilitated the stagnation of the Salafi Jihadist project. In an attempted to claim dominance over the jihad, Islamic State’s endeavored to discredit al Qaeda through a process it presented as ideological correction, linked to Islamic eschatology, sectarian agitation, permissive violence, and the caliphate. Following Islamic State’s acquisition of vast territory in Iraq and Syria, arguments proliferated that Islamic State had surpassed al Qaeda. As the caliphate has collapsed what effects will this have on al Qaeda’s fortunes and strategy? It is argued that Islamic State has provided al Qaeda’s strategic approach with renewed vigour to help ensure its survival and pursue resurgence. Al Qaeda acting in concert with the meta-strategy for survival concept, has altered an existential threat into an advantage through disavowing Islamic State’s methods, continuing to engage with localism, and pursuing rebranding by positioning itself as a moderate alternative. The cases of al Qaeda affiliates in Yemen, Syria, West Africa, and South Asia are instructive in assessing the effectiveness of al Qaeda’s resurgence.  相似文献   
12.
Factor screening is performed to eliminate unimportant factors so that the remaining important factors can be more thoroughly studied in later experiments. Controlled sequential bifurcation (CSB) and controlled sequential factorial design (CSFD) are two new screening methods for discrete‐event simulations. Both methods use hypothesis testing procedures to control the Type I Error and power of the screening results. The scenarios for which each method is most efficient are complementary. This study proposes a two‐stage hybrid approach that combines CSFD and an improved CSB called CSB‐X. In Phase 1, a prescreening procedure will estimate each effect and determine whether CSB‐X or CSFD will be used for further screening. In Phase 2, CSB‐X and CSFD are performed separately based on the assignment of Phase 1. The new method usually has the same error control as CSB‐X and CSFD. The efficiency, on the other hand, is usually much better than either component method. © 2009 Wiley Periodicals, Inc. Naval Research Logistics, 2010  相似文献   
13.
14.
States confronting cross-border intrusions of terrorism, illegal immigration, and/or drug trafficking weigh the costs of such intrusions against the costs of imposing barriers to prevent or curb the intrusions. In such situations, the degree of national security afforded a state depends, in large measure, upon the degree of border openness the state chooses. Depending upon the intensity and frequency of the intrusions – expressed in terms of opportunity-cost functions – a state might have little choice but to pursue a border policy of zero openness. It is this relationship of border openness to national security that explains why many states choose to construct security fences. In the 49 cases of security fences examined, many – among them Israel vis-à-vis the West Bank, India vis-à-vis Pakistan, Turkey vis-à-vis Greece in Cyprus – the construction of security fences becomes more complicated by their placement on lands whose sovereignties are disputed.  相似文献   
15.
Decades ago, simulation was famously characterized as a “method of last resort,” to which analysts should turn only “when all else fails.” In those intervening decades, the technologies supporting simulation—computing hardware, simulation‐modeling paradigms, simulation software, design‐and‐analysis methods—have all advanced dramatically. We offer an updated view that simulation is now a very appealing option for modeling and analysis. When applied properly, simulation can provide fully as much insight, with as much precision as desired, as can exact analytical methods that are based on more restrictive assumptions. The fundamental advantage of simulation is that it can tolerate far less restrictive modeling assumptions, leading to an underlying model that is more reflective of reality and thus more valid, leading to better decisions. Published 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 293–303, 2015  相似文献   
16.
A model for a vehicle moving evasively along a fixed path is defined in terms of a two- state semi-Markov process. An important feature of this model is the continuous movement of the vehicle as a function of time. One potential application of this model is the development of a strategy for the deployment of long-range missiles on long underground tracks.  相似文献   
17.
The Ministry of Defence (MOD) has published estimates of the number of average full‐time UK industry employees dependent on MOD expenditure and defence exports for a number of years. This paper provides the outcome of a recent review of the process used. The method of deriving MOD and defence export final demand vectors, and calculating from these estimates of direct employment (i.e. that in supplying companies) and indirect employment (i.e. that incurred through the supply chain) are described. Difficulties with the data are explored. Alternative approaches, methods used in other countries and challenges posed by changing MOD administrative systems are briefly discussed.  相似文献   
18.
ABSTRACT

While most contemporary analyses of South Asian nuclear dynamics acknowledge the presence of a strategic triangle between the region’s three nuclear players, the primary focus usually remains on the rivalry between India and Pakistan. Discussions of Sino-Indian relations remain limited. This is likely attributed to the stability in the two countries’ relations, yet it is worth asking why this stability exists and whether it is likely to continue in the future. Although China and India have an acrimonious relationship, their asymmetric nuclear capabilities and threat perceptions mitigate the danger of a traditional security dilemma. India may perceive China’s nuclear aggrandizement to be a security threat, but the same is not true of China, which has a vastly superior nuclear force and is largely shaping its nuclear-force structure in response to the threat it perceives from the United States. This dynamic makes a serious conventional or nuclear conflict highly unlikely.  相似文献   
19.
ABSTRACT

For the first time in a generation, the US Navy finds itself in an era of great power competition. As US naval strategists and defense planners begin to organise materially and conceptually to confront the strategic and operational-level challenges posed by China and Russia, what should they keep in mind? What should frame their thinking? Absorbed with the day-to-day tasks associated with managing how the fleet is being built, operated, and rationalised, these busy officers and civilians seldom can step back and gain some perspective on fundamental aspects of the security environment and relate those to naval purpose. To that end, this article provides a primer on what to keep in mind and how to think in an era of maritime great power competition.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号