排序方式: 共有101条查询结果,搜索用时 31 毫秒
81.
82.
Dmitrii Usanov G.A. Guido Legemaate Peter M. van de Ven Rob D. van der Mei 《海军后勤学研究》2019,66(2):105-122
The effectiveness of a fire department is largely determined by its ability to respond to incidents in a timely manner. To do so, fire departments typically have fire stations spread evenly across the region, and dispatch the closest truck(s) whenever a new incident occurs. However, large gaps in coverage may arise in the case of a major incident that requires many nearby fire trucks over a long period of time, substantially increasing response times for emergencies that occur subsequently. We propose a heuristic for relocating idle trucks during a major incident in order to retain good coverage. This is done by solving a mathematical program that takes into account the location of the available fire trucks and the historic spatial distribution of incidents. This heuristic allows the user to balance the coverage and the number of truck movements. Using extensive simulation experiments we test the heuristic for the operations of the Fire Department of Amsterdam‐Amstelland, and compare it against three other benchmark strategies in a simulation fitted using 10 years of historical data. We demonstrate substantial improvement over the current relocation policy, and show that not relocating during major incidents may lead to a significant decrease in performance. 相似文献
83.
Information technology (IT) infrastructure relies on a globalized supply chain that is vulnerable to numerous risks from adversarial attacks. It is important to protect IT infrastructure from these dynamic, persistent risks by delaying adversarial exploits. In this paper, we propose max‐min interdiction models for critical infrastructure protection that prioritizes cost‐effective security mitigations to maximally delay adversarial attacks. We consider attacks originating from multiple adversaries, each of which aims to find a “critical path” through the attack surface to complete the corresponding attack as soon as possible. Decision‐makers can deploy mitigations to delay attack exploits, however, mitigation effectiveness is sometimes uncertain. We propose a stochastic model variant to address this uncertainty by incorporating random delay times. The proposed models can be reformulated as a nested max‐max problem using dualization. We propose a Lagrangian heuristic approach that decomposes the max‐max problem into a number of smaller subproblems, and updates upper and lower bounds to the original problem via subgradient optimization. We evaluate the perfect information solution value as an alternative method for updating the upper bound. Computational results demonstrate that the Lagrangian heuristic identifies near‐optimal solutions efficiently, which outperforms a general purpose mixed‐integer programming solver on medium and large instances. 相似文献
84.
复杂系统的仿真通常具有高维度、高计算量等特点,代理模型因其明晰的数学表达和良好的计算特性可用于逼近真实系统。加权模型对比单个代理模型来说,其稳定性和适应性更广。不同的代理模型其性能不一,根据特定指标,可以构造最优加权代理模型。基于代理模型预测分布以及Kullback-Leibler距离构造各子代理模型之间的离散度,并提出一种新的权函数构造方法。算例表明,该方法与最优子模型的精度相当,同时能提高对真实响应分布的逼近。 相似文献
85.
86.
本文建立了一类流行病动力学的S-I-D-S模型,讨论了该模型的无病平衡点的全局稳定性及有病平衡点的局部稳定性。 相似文献
87.
基于概率分析法的无人攻击机作战效能分析模型研究 总被引:3,自引:0,他引:3
未来防空战场上无人攻击机已成为一种重要的空中威胁。无人攻击机作战过程可分为飞行、突防、攻击三个阶段,运用概率分析方法分别建立了各阶段的数学模型,给出了其作战效能表达式,为进一步进行无人攻击机作战效能分析提供了模型基础。 相似文献
88.
R. Derek Trunkey 《Defence and Peace Economics》2019,30(4):454-461
The rate at which operating costs grow as aircraft age is important for setting operating budgets and for deciding when to replace aging systems. While studies using data from the 1990's typically found 1–3 percent real rates of growth in operating costs as aircraft age, studies using data from the 2000's found greater rates, for example in the 4–6 percent range. Growth in the total U.S. Air Force budget during the 2000s appears to explain much of the higher estimated annual growth rates in operating costs per flying hour beyond the growth rate intrinsic to the aging of the fleet. 相似文献
89.
在分析脆弱性数据库研究现状的基础上 ,指出现有脆弱性数据库系统数据管理方法的不足之处 ,提出基于Krsul脆弱性分类法和联邦模型实现一种脆弱性数据库系统。该脆弱性数据库采用Krsul脆弱性分类法实现脆弱性数据的分类组织 ,采用联邦模型作为数据库系统的体系结构 ,采用Web界面实现数据库的人机接口。 相似文献
90.