首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   16篇
  免费   2篇
  2018年   2篇
  2017年   1篇
  2016年   1篇
  2014年   5篇
  2013年   7篇
  2009年   1篇
  1986年   1篇
排序方式: 共有18条查询结果,搜索用时 15 毫秒
1.
Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA.  相似文献   
2.
3.
4.
Atomic Obsession: Nuclear Alarmism from Hiroshima to Al Qaeda, by John Mueller. Oxford University Press, 2009. 336 pages, $27.95.

Les armes nucléaires: Mythes et réalités [Nuclear Weapons: Myths and Realities], by Georges Le Guelte. Actes Sud, 2009. 390 pages, [euro]25.  相似文献   
5.
6.
There is significant value in the data collected by satellites during and after a natural disaster. The current operating paradigm in practice is for satellites to passively collect data when they happen to fly over a disaster location. Conversely, this article considers the alternative approach of actively maneuvering satellites to fly directly overhead of the disaster site on a routine basis. Toward this end, we seek to compute a satellite constellation design that minimizes the expected maneuver costs for monitoring an unknown forest fire. In this article, we present a 2‐stage stochastic programing model for this problem as well as a accelerated L‐shaped decomposition approach. A comparison between our approach and the current operating paradigm indicates that our solution provides longer duration data collections and a greater number of data collections. Analysis also shows that our proposed solution is robust over a wide array of scenarios.  相似文献   
7.
8.
Contributors     
ABSTRACT

Over the past two decades, the United States has increasingly turned to targeted sanctions and export restrictions, such as those imposed against Iran and North Korea, in order to curb the spread of weapons of mass destruction. One vexing problem, however, is how to contend with jurisdictional hurdles when the violations occur overseas, in countries that are unable or unwilling to assist US enforcement efforts. To solve this problem, US prosecutors are turning to strategies with significant extraterritorial implications— that is, exercising legal authority beyond national borders. One such tool is to use civil legal procedures to seize assets linked to sanctions or export-control violations in jurisdictions that lack cooperative arrangements with US enforcement agencies. While this may be an attractive strategy to bolster enforcement efforts against overseas illicit procurement, using such tools is not without consequence. This article explores the political, legal, and technical implications of enforcing extraterritorial controls against overseas non-state actors by exploring the recent uses of civil-asset forfeiture against Iranian and North Korean procurement networks.  相似文献   
9.
This article examines the British Army's deployment in support of the civil power in Northern Ireland. It argues that the core guiding principles of the British approach to counterinsurgency (COIN) – employing the minimum use of force, firm and timely action, and unity of control in civil–military relations – were misapplied by the Army in its haste to combat Irish Republican Army (IRA) terrorism between 1971 and 1976. Moreover, it suggests that the Army's COIN strategy was unsuccessful in the 1970s because commanders adhered too closely to the customs, doctrine, and drill applied under very different circumstances in Aden between 1963 and 1967, generally regarded as a failure in Britain's post-war internal security operations. The article concludes with a discussion of the British government's decision to scale back the Army's role in favour of giving the Royal Ulster Constabulary primacy in counter-terrorist operations, a decision which led ultimately to success in combating IRA violence.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号