排序方式: 共有32条查询结果,搜索用时 0 毫秒
1.
穿甲弹对自行火炮易损性分析与计算 总被引:1,自引:0,他引:1
分析了自行火炮在穿甲弹作用下的易损性,建立了自行火炮易损性计算模型,并以某型自行火炮为例,分别计算了该炮在120mm穿甲弹正面命中与侧面命中时的毁伤概率。 相似文献
2.
运用松耦合设计思想,对计算机脆弱性测评系统中两个子系统的组成和实现进行了研究。提出多准则测评子系统的Web数据库实现和CVE测评子系统的多层MAS实现方法,并对其实现算法和技术要点进行了论述。 相似文献
3.
组织如何制定优化的信息安全技术方案以降低脆弱性对其信息系统的威胁,是信息安全管理领域的关键问题。在描述信息系统安全技术方案决策模型的基础上,提出了一种求解信息系统安全技术方案优化问题的自适应遗传算法,使得组织能以最少的方案实施费用最大限度地处置脆弱性,并以实例说明了该算法的有效性。 相似文献
4.
提出了一个基于可信度方法的网络安全性分析模型。该模型在脆弱点信息、脆弱点之间的关系、脆弱点与安全性的关系的表示中引入可信度因子,通过不确定推理对主机和网络的安全性进行分析。该模型能综合考虑诸多因素,有效处理安全性分析中的不确定知识。 相似文献
5.
Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA. 相似文献
6.
Mark Malan 《African Security Review》2013,22(3):27-41
Abstract Pastoralist groups in Eastern Africa are extremely vulnerable as a result of inter-community conflicts, the harsh terrain, and unfavourable climatic conditions. They have been neglected by successive regimes on matters of socio-economic development. At present pastoralist areas in Eastern Africa have the lowest literacy rates and insufficient health care facilities. This article interrogates the historical relationship between governments, humanitarian groups and pastoralists. It notes with great concern that pastoralists have been branded as hunger-stricken populations with insignificant economic potential that can be harnessed from their day-to-day livelihood. They are treated as sedentary populations who need a constant supply of relief food to keep going. In order to reverse these misconceptions, the article places emphasis on mitigating the threats of intra-community conflicts, diseases and natural disasters through investment in social schemes and infrastructure in order to open up the areas for service provision. Indeed, for a majority of the pastoralists, insecurity comes not so much from traditional security concerns, but from human insecurity concerns about their survival, preservation of their lifestyle and well-being in a day-to-day context. 相似文献
7.
8.
针对脆弱性信息系统中脆弱性数据质量保证问题,研究基于改进Co-word分析法的脆弱性数据分析技术。依据脆弱性分类法分类特征确定分析关键字,通过对Co-word分析法的改进设计了脆弱性数据分析算法,实现了脆弱性信息系统中脆弱性数据的验证、完善和补充。 相似文献
9.
Majak D'Agoôt 《Defense & Security Analysis》2013,29(2):104-116
In a world virtually free of slavery and colonialism and one mainly driven by the sovereign state rationale, allusion to manifestations or the existence of some form of these phenomena within a state is often received with dumbfounding indifference or denial. However, a form of rule that had continued in South Sudan long after the departure of the British in 1956 was colonial both in its quintessence and flair in that it disenfranchised its citizens and denied them the most basic freedoms, services and development. Under this establishment, resistance against the coercive vision of the state was brutally suppressed for many decades. This state of affairs finally ended in July 2011. Nonetheless, there is a miscellany of unresolved post-colonial issues between the two countries that warrant attention. These include security and the demarcation of borders, the issue of ludicrous transit fees for South Sudan's oil exportation through Sudan, citizenship, external debt repayment, etc. These issues are part of traps inherited from the anti-colonial struggle, which have now supplanted the old ensemble of North–South conflict paroxysm. As a matter of urgency, the two countries will have to wrap up the incomplete process of negotiation on these substantive issues. The talks should be approached with a new mindset based on the new reality of two sovereign states. To the extent that it is widely established that South Sudan and Sudan must coexist peacefully in order to develop into viable entities, such mutual dependency must be based on equality and respect. 相似文献
10.
采用灰关联分析法,通过对大量工程震害数据分析,得出了各砖混结构建筑抗震易损性评价指标与震害的灰关联系数,建立了建筑抗震易损性评价指标重要性模型,并以此依据对结构抗震易损性评价指标的影响程度进一步分析,筛选出影响其灾害损失的主要因素,使得砖混结构建筑抗震易损性预测结果定量化、合理化。 相似文献