首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   23篇
  免费   2篇
  2018年   2篇
  2017年   1篇
  2016年   1篇
  2013年   8篇
  2002年   1篇
  2001年   1篇
  1999年   1篇
  1997年   1篇
  1994年   1篇
  1990年   1篇
  1988年   1篇
  1985年   3篇
  1976年   1篇
  1975年   1篇
  1973年   1篇
排序方式: 共有25条查询结果,搜索用时 15 毫秒
1.
Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA.  相似文献   
2.
3.
4.
The embellishment of a warrior biography has a long history but examples of veteran elaboration of traumatic experience have become increasingly apparent. Although legislative change in the UK has removed the penalties for fabrication and a progressive decline in the military footprint may have increased the likelihood of such false trauma narratives, a paradigm shift in explanations for mental illness underpins this phenomenon. The recognition of post-traumatic stress disorder (PTSD) in 1980, followed by studies to identify risk factors, led to a greater appreciation of psychological vulnerability. As a result, the use of shame to discourage acts formerly labelled as “cowardly” or “lacking in morale fibre” is no longer considered appropriate. Recent conflicts in Iraq and Afghanistan generated popular sympathy for service personnel, whilst media focus on PTSD has led the UK public to believe that most veterans have been traumatised by their tours of duty.  相似文献   
5.
6.
Individual characteristics of multiple-constrained resource, project scheduling problems are examined in an attempt to predict the solution obtainable with heuristic methods. Difficulties encountered in performing this type of research are described, and several multiple regression models are developed for predicting heuristic performance. Both single and multiple project data are examined, and results reported demonstrate the efficacy of determining beforehand the method used for problem solution.  相似文献   
7.
The objective of this article is to describe heuristic solutions to the problem of modeling inventories at each node of a large network in the context of a computer simulation model of that network. The heuristic solutions are compared with the mathematical solution which is too unwieldy for use in a simulation model. The Weibull cumulative distribution is used as an approximation for the heuristic models. We question whether the good performance of the Weibull is coincidence or perhaps mathematically justifiable.  相似文献   
8.
9.
Book reviews     
Nationalism and Ethnic Conflict: Threats to European Security. By Stephen Iwan Griffiths. SIPRI Research Report No. 5. Oxford University Press, Oxford (1993), ISBN 0-19-829162-0, £16.50.

Red Storm on the Reich, By C.J. Duffy. Routledge, London (1991) ISBN 0-415-0359-9, £35.00.

Gangsters and Revolutionaries. By R. Cribb. Allen and Unwin, ISBN 0-O4-301296-5 (1992), £12.95.

The Cyanide War. By E. O'Ballance. Brassey's, London (1989). ISBN 0 08 036695 3, Price £18.00.  相似文献   
10.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号