排序方式: 共有275条查询结果,搜索用时 15 毫秒
241.
Characteristically, a small subset of operational problems admit risk neutrality when contingent claims methodology were used in their analysis. That is, for the majority of manufacturing and production problems, operating cash flows are not directly linked to prices of traded assets. However, to the extent that correlations can be estimated, the methodology's applicability to a broader set of operational problems is supported. Our article addresses this issue with the objective of extending the use of contingent claims techniques to a larger set of operational problems. In broad terms, this objective entails a partial equilibrium approach to the problem of valuing uncertain cash flows. To this end, we assume risk aversion and cast our approach within Merton's intertemporal capital asset pricing model. In this context, we formulate a “generic” production valuation model that is framed as an exercise in stochastic optimal control. The model is versatile in its characterization and can easily be adapted to accommodate a wide‐ranging set of risk‐based operational problems where the underlying sources of uncertainty are not traded. To obtain results, the model is recast as a stochastic dynamic program to be solved numerically. The article addresses a number of fundamental issues in the analysis risk based decision problems in operations. First, in the approach provided, decisions are analyzed under a properly defined risk structure. Second, the process of analysis leads to suitably adjusted probability distributions through which, appropriately discounted expectations are derived. Third, through consolidating existing concepts into a standard and adaptable framework, we extend the applicability of contingent claims methodology to a broader set of operational problems. The approach is advantageous as it obviates the need for exogenously specifying utility functions or discount rates.© 2011 Wiley Periodicals, Inc. Naval Research Logistics, 2011 相似文献
242.
We introduce a generalized orienteering problem (OP) where, as usual, a vehicle is routed from a prescribed start node, through a directed network, to a prescribed destination node, collecting rewards at each node visited, to maximize the total reward along the path. In our generalization, transit on arcs in the network and reward collection at nodes both consume a variable amount of the same limited resource. We exploit this resource trade‐off through a specialized branch‐and‐bound algorithm that relies on partial path relaxation problems that often yield tight bounds and lead to substantial pruning in the enumeration tree. We present the smuggler search problem (SSP) as an important real‐world application of our generalized OP. Numerical results show that our algorithm applied to the SSP outperforms standard mixed‐integer nonlinear programming solvers for moderate to large problem instances. We demonstrate model enhancements that allow practitioners to represent realistic search planning scenarios by accounting for multiple heterogeneous searchers and complex smuggler motion. © 2013 Wiley Periodicals, Inc. Naval Research Logistics, 2013 相似文献
243.
CHRISTOPHER SPEARIN 《Small Wars & Insurgencies》2013,24(4):541-558
Washington's growing reliance upon international private security companies (PSCs) will lead to these firms becoming prominent vehicles in the prosecution of the counterinsurgency in Iraq. This shift, however, risks labeling PSCs as mercenaries and presents considerable challenges regarding the control of non-state violence. Moreover, tradeoffs exist regarding the different nationalities of PSC personnel. Utilization of personnel from the developed world risks compromising the capabilities of Special Operations Forces. Additionally, shifts in casualty recognition amongst US policymakers and the media suggest that the private option is becoming politically salient and thus less useful. Many developing world states are increasingly concerned about how the global outsourcing of security sector expertise risks their stability and ability to execute coherent policy. Finally, the employment of Iraqis in PSCs sends mixed messages to the Iraqi populace about the need for and the effectiveness of a cohesive and responsible indigenous security sector. Frankly, I'd like to see the government get out of war altogether and leave the whole feud to private industry. [Catch-22 – Major Milo Minderbinder] 相似文献
244.
Justin O. Smith 《Small Wars & Insurgencies》2013,24(3):448-466
A comprehensive maritime interdiction strategy to attack the insurgent's logistic system was a key element in the defeat of the Tamil Tigers. The campaign of maritime interdiction required the Sri Lankan Navy (SLN) to attack LTTE arms smuggling, sea piracy, and maritime terrorism. The SLN degraded the insurgency's robust maritime logistical network while also devising tactics to engage the maritime insurgents who reacted with swarm and suicide boat tactics. The efforts of the SLN forced the Tamil Tigers to confront the government's final land offensives with diminished resources, thus collapsing a three decades’ old insurgency in a matter of months. 相似文献
245.
Stephen Pampinella 《Small Wars & Insurgencies》2013,24(5):721-743
As US counterinsurgency campaigns draw to a close, doctrine for asymmetric warfare written during the War on Terror has come under heavy criticism. While many have argued that this shift to ‘winning hearts and minds’ is evidence that the United States is taking humanitarianism and nation-building seriously, others argue that a wide gap exists between US counterinsurgency doctrine and the protection of civilians afflicted by conflict. In this article, I show that the latter is true by comparing theories of instrumental and communicative action to US doctrine for operational design, stability operations, and counterinsurgency. I argue that these texts treat the people as an object to be manipulated for the achievement of pre-determined self-interested strategic goals rather than members of a community that jointly designs operations to fulfill shared objectives. However, US doctrine does contain communicative elements that, if prioritized, would better support humanitarian and state-building objectives otherwise subordinated in the War on Terror. 相似文献
246.
Jaïr van der Lijn 《Small Wars & Insurgencies》2013,24(1):72-89
Since 2000, international organisations such as the UN, NATO and the EU, but also countries, have started to apply what has been called the comprehensive approach to crisis management. This article unpacks this comprehensive approach implemented by the Dutch in Uruzgan province, Afghanistan. It first borrows and expands a conceptual framework developed by De Coning and Friis. Subsequently, it maps the different sorts of coherence in the mission by applying the framework. It shows how in practice there was not one single comprehensive approach, but many different forms of interaction between a number of organisational units. Each interaction had its own distinct issues and its own level of coherence. The level of coherence differed depending on the level at which the interaction took place – strategic at headquarters level versus operational at field level – and at what point in the mission it happened – in most cases it moved towards more cohesion. 相似文献
247.
电子证据相较于传统证据,其具有的独有特征,给公安边防情报部门确认其证明力带来了困难.分析公安边防情报工作中电子证据的概念、特征和来源,探讨公安边防情报工作中电子证据的认定和保障问题. 相似文献
248.
249.
Mbekezeli C. Mkhize 《African Security Review》2013,22(2):190-206
This article assesses South Africa's 20 years of democracy, which has frequently been bedevilled by local protests. This article is particularly interested in those unrest incidents that have been distinct for one reason or another. In South Africa, the surge in local unrest incidents is often linked to police behaviour, which has become increasingly militant and brutal when quelling protests. While the right to protest is constitutional, the damage caused during protest action can be immense owing to acts of violence. Protestors' resorting to violent protest action is often linked to increased frustrations as a result of the government's inability to live up to the expectations of marginalised and poor communities. While this article draws primarily on existing scholarly debates focusing on social protests, the primary objective is to examine the impact of unrest incidents on local protests in post-apartheid South Africa. The article further argues that ‘spaces’ for participation in local governance should be created so that citizens can become architects of development and their own future. 相似文献
250.
The Secret War with Iran: The 30-Year Clandestine Struggle Against the World's Most Dangerous Terrorist Power, by Ronen Bergman. Free Press, 2008. 432 pages, $28 Fallout: The True Story of the CIA's Secret War on Nuclear Trafficking, by Catherine Collins and Douglas Frantz. Free Press, 2011. 304 pages, $26. The Twilight War: The Secret History of America's Thirty-Year War with Iran, by David Crist. Penguin Press, 2012. 638 pages, $36. Israel vs. Iran: The Shadow War, by Yaakov Katz and Yoaz Hendel. Potomac Books Inc., 2012. 254 pages, $30. Spies Against Armageddon: Inside Israel's Secret Wars, by Dan Raviv. Levant, 2012. 356 pages, $17. Confront and Conceal: Obama's Secret Wars and Surprising Use of American Power, by David E. Sanger. Crown Publishers, 2012. 476 pages, $28. 相似文献