排序方式: 共有30条查询结果,搜索用时 15 毫秒
21.
We study an (R, s, S) inventory control policy with stochastic demand, lost sales, zero lead‐time and a target service level to be satisfied. The system is modeled as a discrete time Markov chain for which we present a novel approach to derive exact closed‐form solutions for the limiting distribution of the on‐hand inventory level at the end of a review period, given the reorder level (s) and order‐up‐to level (S). We then establish a relationship between the limiting distributions for adjacent values of the reorder point that is used in an efficient recursive algorithm to determine the optimal parameter values of the (R, s, S) replenishment policy. The algorithm is easy to implement and entails less effort than solving the steady‐state equations for the corresponding Markov model. Point‐of‐use hospital inventory systems share the essential characteristics of the inventory system we model, and a case study using real data from such a system shows that with our approach, optimal policies with significant savings in inventory management effort are easily obtained for a large family of items. 相似文献
22.
描述了基于.NET的持久化框架NHibernate,分析了NHibernate的工作原理,构建了基于NHibernate的Web-MIS的框架结构,给出了系统开发的实现步骤。实践表明,NHibernate能有效地实现关系型数据与对象模型之间的转换,提高系统的开发效率。 相似文献
23.
Christopher Zambakari 《African Security Review》2016,25(1):44-62
In this paper, I critically analyse the doctrine of the Responsibility to Protect (RtoP), as it relates to the responsibility of intervening forces towards the people they claim to protect and the challenges that the situation in Libya now poses in the region and for the African Union (AU). I focus most of my attention on the coercive elements of the RtoP framework (Pillar III). This is the most contested element in the framework. Three questions guide this article: were there legitimate grounds to justify an external intervention in Libya? In the words of Hugh Roberts in Who Said Gaddafi Had to Go, ‘[w]hat if anything has Libya got in exchange for all the death and destruction that have been visited on it’ since 2011? What are the practical implications and consequences of the North Atlantic Treaty Organization (NATO) intervention, led by the United States (US), for regional peace? I discuss the problems surrounding the US–NATO intervention, followed by an analysis of the various positions and narratives leading up to the intervention, the framing and justifications provided for the intervention, and an analysis of the AU's proposal for the resolution of the Libyan crisis. I analyse the various debates that took place in the US (Pentagon/White House), at the United Nations, among scholars in the West and in Africa, and among various actors who tried to broker a ceasefire in Libya before and during the intervention. I conclude with a discussion of the implications for regional peace. 相似文献
24.
为实现对T/R组件剩余寿命的准确预测,及时掌握装备当前健康状态和提高装备维修保障水平,分析T/R组件的故障特点,筛选出反映T/R组件状态退化过程的状态监测指标,通过计算每个指标对应的剩余寿命信息和权重,得到T/R组件的剩余寿命预测结果。通过算例分析与比较,验证了预测方法的实用性与有效性。研究结果可为电子装备剩余寿命预测提供理论指导,对合理计划维修资源和提高装备战斗力具有重要意义。 相似文献
25.
26.
介绍了产品数据管理(PDM)的概念和基本功能,结合当前型号研制的特点和计算机信息技术应用的状况、发展,研究了型号研制产品数据管理的需求、功能及实施,为当前型号研制依靠CIMS技术实现产品数据管理提出了8条基本原则。 相似文献
27.
对软件可靠性分配的遗传模型进行了研究,结合相关知识缩小了基本遗传算法的搜索区域,比较灵活地处理了非线性约束条件,提高了搜索效率,避免了早熟收敛现象.此外,在基本遗传算法中增加了保优操作,从而能够在理论上保证实现分配的最优化.算例表明,该算法十分有效. 相似文献
28.
Saroj Kumar Rath 《Defense & Security Analysis》2014,30(3):196-208
The spectacular commando-style terrorist strike on Mumbai in November 2008 exposed India's lax internal security structure. As nearly all the security apparatus broke down during the long spell of attacks, massive public outrage flared up across the country calling for a firmer government response. Shockingly, India has done little to prevent a recurrence and a new security threat faces the country every single day not merely before but even after the Mumbai attacks. In contrast, Pakistan's Inter Services Intelligence and the Lashkar-e-Taiba have successfully evaded pressures from both India and the international community and continue their terror campaign against India under the “Karachi Project” with the explicit intention to unsettle South Asia. Classified documents indicated that India is at the forefront of a cataclysmic “nuclear terrorism” threat from a “combination of Pakistan-based terrorists and homegrown radicals.” This article analyses the danger posed by the Indo-Pak radical groups targeting India and India's lack of preparedness to the new security threat from the “Karachi Project.” 相似文献
29.
科研选题中,周期短、见效快的课题重复率较高,其原因与科技人员晋级需求,社会集团易对“短、平、快”选题投资,科研管理人员的情报意识淡漠等因素有关。改变现状需要科技政策的制定者对基础科学研究和从事基础科学研究的人员给予更多的重视和政策的倾斜。科研管理部门应把握科研方向、人才培养、选题调整及发挥专家对审题的充分论证。采取各项综合措施,可望降低科研选题的重复。 相似文献
30.
This paper proposes a skewness correction (SC) method for constructing the and R control charts for skewed process distributions. Their asymmetric control limits (about the central line) are based on the degree of skewness estimated from the subgroups, and no parameter assumptions are made on the form of process distribution. These charts are simply adjustments of the conventional Shewhart control charts. Moreover, the chart is almost the same as the Shewhart chart if the process distribution is known to be symmetrical. The new charts are compared with the Shewhart charts and weighted variance (WV) control charts. When the process distribution is in some neighborhood of Weibull, lognormal, Burr or binomial family, simulation shows that the SC control charts have Type I risk (i.e., probability of a false alarm) closer to 0.27% of the normal case. Even in the case where the process distribution is exponential with known mean, not only the control limits and Type I risk, but also the Type II risk of the SC charts are closer to those of the exact and R charts than those of the WV and Shewhart charts. © 2003 Wiley Periodicals, Inc. Naval Research Logistics 50: 555–573, 2003 相似文献