排序方式: 共有18条查询结果,搜索用时 15 毫秒
1.
An attacker‐defender model for analyzing the vulnerability of initial attack in wildfire suppression 下载免费PDF全文
Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA. 相似文献
2.
3.
4.
Dr. Aaron Karp Ambassador Julio Carasales Ministry of Foreign Affairs Argentina 《The Nonproliferation Review》2013,20(1):189-190
Atomic Obsession: Nuclear Alarmism from Hiroshima to Al Qaeda, by John Mueller. Oxford University Press, 2009. 336 pages, $27.95. Les armes nucléaires: Mythes et réalités [Nuclear Weapons: Myths and Realities], by Georges Le Guelte. Actes Sud, 2009. 390 pages, [euro]25. 相似文献
5.
6.
Satellite constellation design for forest fire monitoring via a stochastic programing approach 下载免费PDF全文
There is significant value in the data collected by satellites during and after a natural disaster. The current operating paradigm in practice is for satellites to passively collect data when they happen to fly over a disaster location. Conversely, this article considers the alternative approach of actively maneuvering satellites to fly directly overhead of the disaster site on a routine basis. Toward this end, we seek to compute a satellite constellation design that minimizes the expected maneuver costs for monitoring an unknown forest fire. In this article, we present a 2‐stage stochastic programing model for this problem as well as a accelerated L‐shaped decomposition approach. A comparison between our approach and the current operating paradigm indicates that our solution provides longer duration data collections and a greater number of data collections. Analysis also shows that our proposed solution is robust over a wide array of scenarios. 相似文献
7.
8.
Aaron Arnold 《The Nonproliferation Review》2013,20(3-4):285-288
ABSTRACTOver the past two decades, the United States has increasingly turned to targeted sanctions and export restrictions, such as those imposed against Iran and North Korea, in order to curb the spread of weapons of mass destruction. One vexing problem, however, is how to contend with jurisdictional hurdles when the violations occur overseas, in countries that are unable or unwilling to assist US enforcement efforts. To solve this problem, US prosecutors are turning to strategies with significant extraterritorial implications— that is, exercising legal authority beyond national borders. One such tool is to use civil legal procedures to seize assets linked to sanctions or export-control violations in jurisdictions that lack cooperative arrangements with US enforcement agencies. While this may be an attractive strategy to bolster enforcement efforts against overseas illicit procurement, using such tools is not without consequence. This article explores the political, legal, and technical implications of enforcing extraterritorial controls against overseas non-state actors by exploring the recent uses of civil-asset forfeiture against Iranian and North Korean procurement networks. 相似文献
9.
Aaron Edwards 《Small Wars & Insurgencies》2013,24(2):303-330
This article examines the British Army's deployment in support of the civil power in Northern Ireland. It argues that the core guiding principles of the British approach to counterinsurgency (COIN) – employing the minimum use of force, firm and timely action, and unity of control in civil–military relations – were misapplied by the Army in its haste to combat Irish Republican Army (IRA) terrorism between 1971 and 1976. Moreover, it suggests that the Army's COIN strategy was unsuccessful in the 1970s because commanders adhered too closely to the customs, doctrine, and drill applied under very different circumstances in Aden between 1963 and 1967, generally regarded as a failure in Britain's post-war internal security operations. The article concludes with a discussion of the British government's decision to scale back the Army's role in favour of giving the Royal Ulster Constabulary primacy in counter-terrorist operations, a decision which led ultimately to success in combating IRA violence. 相似文献
10.