首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   150篇
  免费   23篇
  国内免费   16篇
  2021年   7篇
  2020年   10篇
  2019年   12篇
  2018年   17篇
  2017年   12篇
  2016年   12篇
  2015年   7篇
  2014年   15篇
  2013年   40篇
  2012年   6篇
  2011年   6篇
  2010年   5篇
  2009年   4篇
  2008年   4篇
  2007年   5篇
  2006年   10篇
  2005年   3篇
  2004年   3篇
  2001年   1篇
  1993年   1篇
  1992年   2篇
  1991年   1篇
  1990年   3篇
  1989年   3篇
排序方式: 共有189条查询结果,搜索用时 15 毫秒
121.
September 11 2001 has put the spotlight on terrorism, and it has been at the apex of the international security agenda ever since. Politicians, lawmakers, scholars and others have been debating the meaning and definition of terrorism for many years. Numerous myths and misconceptions persist on this highly debated issue. With the aid of historical case studies, this article aims to demonstrate how broad a concept terrorism has become. It focuses on its subjective and value-laden interpretation and hence the difficulty of arriving at a universally acceptable definition. The author introduces the concept of ‘colonial terror’, which depicts a distinct form of state terrorism perpetrated during the colonial and post-colonial periods. Like many before her, the author concludes that the definition and meaning of terrorism lie in the eye of the beholder.

There are two ways to approach the study of terrorism. One may adopt a literal approach, taking the topic seriously, or a propagandistic approach, construing the concept of terrorism as a weapon to be exploited in the service of some system of power. In each case it is clear how to proceed. Pursuing the literal approach, we begin by determining what constitutes terrorism. We then seek instances of the phenomenon—concentrating on major examples, if we are serious—and try to determine causes and remedies. The propagandistic approach dictates a different course. We begin with the thesis that terrorism is the responsibility of some officially designated enemy. We then designate terrorist acts as ‘terrorist’ just in the cases where they can be attributed (whether plausibly or not) to the required source; otherwise they are to be ignored, suppressed or termed ‘retaliation’ or ‘self-defence’. (Noam Chomsky)  相似文献   
122.
This article studies operations sequencing for a multi‐stage production inventory system with lead times under predictable (deterministic) yield losses and random demand. We consider various cases with either full or partial release of work‐in‐process inventories, for either pre‐operation or post‐operation cost structures, and under either the total discounted or average cost criteria. We derive necessary and sufficient criteria for the optimal sequence of operations in all cases. While the criteria differ in their specific forms, they all lead to the same principal: those operations with (1) lower yields, (2) lower processing costs, (3) longer lead times, and (4) lower inventory holding costs should be placed higher upstream in the system.Copyright © 2014 Wiley Periodicals, Inc. Naval Research Logistics 61: 144–154, 2014  相似文献   
123.
Did participants in small wars in the period 1775–1831 learn from previous or contemporary examples? While this is difficult to prove for participants who left no written records, there is considerable evidence in existing publications by practitioners that they did indeed draw out lessons from recent insurgencies, either from their own experience or from events elsewhere which they studied from afar, especially the Spanish Guerrilla, which had already become legendary. Most authors showed an interest in how to stage insurgencies rather than in how to quell them. Even then, transfer did not come in a package of tactics-cum-values, but in each case in different configurations.  相似文献   
124.
Cyberspace has emerged as a potentially new (and unconventional) domain for warfare. Much debate has focused on understanding cyber conflict. The ability to critically analyse this phenomenon is important; however, the nascent nature of cyberwarfare and the complexity of the systems involved create challenges not met by conventional approaches. As a first step, this requires an analytical construct to frame discussions in a way that highlights distinct characteristics of the cyber domain. An approach proposed is one of the postulating conjectures for debate as a way to achieve this and to demonstrate its use, both at the strategic and operational levels. It is suggested that such an approach provides one component of a mature analytical framework for the analysis of cyber across a range of warfare domains.  相似文献   
125.
The literature on the product mix decision (or master production scheduling) under the Theory of Constraints (TOC), which was developed in the past two decades, has addressed this problem as a static operational decision. Consequently, the developed solution techniques do not consider the system's dynamism and the associated challenges arising from the complexity of operations during the implementation of master production schedules. This paper aims to address this gap by developing a new heuristic approach for master production scheduling under the TOC philosophy that considers the main operational factors that influence actual throughput after implementation of the detailed schedule. We examine the validity of the proposed heuristic by comparison to Integer Linear Programming and two heuristics in a wide range of scenarios using simulation modelling. Statistical analyses indicate that the new algorithm leads to significantly enhanced performance during implementation for problems with setup times. The findings show that the bottleneck identification approach in current methods in the TOC literature is not effective and accurate for complex operations in real‐world job shop systems. This study contributes to the literature on master production scheduling and product mix decisions by enhancing the likelihood of achieving anticipated throughput during the implementation of the detailed schedule. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 357–369, 2015  相似文献   
126.
Motivated by the presence of loss‐averse decision making behavior in practice, this article considers a supply chain consisting of a firm and strategic consumers who possess an S‐shaped loss‐averse utility function. In the model, consumers decide the purchase timing and the firm chooses the inventory level. We find that the loss‐averse consumers' strategic purchasing behavior is determined by their perceived gain and loss from strategic purchase delay, and the given rationing risk. Thus, the firm that is cognizant of this property tailors its inventory stocking policy based on the consumers' loss‐averse behavior such as their perceived values of gain and loss, and their sensitivity to them. We also demonstrate that the firm's equilibrium inventory stocking policy reflects both the economic logic of the traditional newsvendor inventory model, and the loss‐averse behavior of consumers. The equilibrium order quantity is significantly different from those derived from models that assume that the consumers are risk neutral and homogeneous in their valuations. We show that the firm that ignores strategic consumer's loss‐aversion behavior tends to keep an unnecessarily high inventory level that leads to excessive leftovers. Our numerical experiments further reveal that in some extreme cases the firm that ignores strategic consumer's loss‐aversion behavior generates almost 92% more leftovers than the firm that possesses consumers’ loss‐aversion information and takes it into account when making managerial decisions. To mitigate the consumer's forward‐looking behavior, we propose the adoption of the practice of agile supply chain management, which possesses the following attributes: (i) procuring inventory after observing real‐time demand information, (ii) enhanced design (which maintains the current production mix but improves the product performance to a higher level), and (iii) customized design (which maintains the current performance level but increases the variety of the current production line to meet consumers’ specific demands). We show that such a practice can induce the consumer to make early purchases by increasing their rationing risk, increasing the product value, or diversifying the product line. © 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 435–453, 2015  相似文献   
127.
Revenue management is the process of actively managing inventory or capacity to maximize revenues. The active management typically occurs through managerial levers such as price, promotion, or availability. We present a novel real options approach to revenue management that is specifically suited to the car rental business. We illustrate the concept with actual car rental data. The model produces minimally acceptable prices and inventory release quantities (number of cars available for rent at a given price) as a function of remaining time and available inventory. The pricing and inventory release recommendations of the developed model confirm earlier empirical analysis that suggested current practises discount too deeply early in the booking cycle. © 2004 Wiley Periodicals, Inc. Naval Research Logistics, 2004  相似文献   
128.
一体化联合作战对装备保障系统的影响及要求   总被引:2,自引:0,他引:2  
装备保障信息建设要适应一体化联合作战的需求,就必须弄清一体化联合作战对装备保障系统的影响。运用系统方法,着眼环境对系统的影响,从分析一体化联合作战本质入手,阐述了一体化联合作战对装备保障系统功能、结构、运行和组成等要素的影响及要求,并为未来我军装备保障信息化建设提出了几点应对策略。  相似文献   
129.
赵上  王冰切  冯远博 《国防科技》2021,42(6):124-128
在科技引领的现代战争中,空降作战面临着高精度、杀伤力大的制导武器的威胁。电子对抗力量作为电子战中的武装力量,为空降兵提供了重要的安全保障。本文研究了空降作战在复杂的电磁环境中面临的电子武器威胁,分析了空降兵电子对抗力量在空降作战中的地位作用,结合空降作战的特点探索空降兵电子对抗力量的运用模式,如通过电子侦察、电子佯动、压制干扰、综合防护等手段为空降作战快速占据进攻优势奠定良好的电磁环境基础。此外,为完善空降兵电子对抗力量的作战结构,本研究提出空降作战中电子对抗作战运用的要求,以充分发挥电子对抗在空降作战中的能力,确保空降作战中制电磁权的优势,提高空降作战的制胜效能。  相似文献   
130.
Cardiovascular diseases (CVDs) are the leading cause of death and disability both in the United States and worldwide. Despite high morbidity, mortality, and cost in the United States and global healthcare systems, cardiovascular care has been understudied in the healthcare operations management literature. In this paper, we identify research opportunities for healthcare operations management scholars to aid in improving cardiovascular care. We focus on three burdensome conditions, including (1) coronary artery disease, (2) stroke, and (3) heart failure, which, collectively, lead to the vast majority of CVD‐caused mortality and disability. For each condition, we characterize a typical patient's journey in receiving cardiovascular care, elucidating key challenges in improving care and outlining research questions for healthcare operations management scholars. We close with a reference to new research opportunities that emerge as artificial intelligence is likely to transform much of cardiovascular care.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号