排序方式: 共有25条查询结果,搜索用时 15 毫秒
1.
An attacker‐defender model for analyzing the vulnerability of initial attack in wildfire suppression 下载免费PDF全文
Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA. 相似文献
2.
3.
4.
The embellishment of a warrior biography has a long history but examples of veteran elaboration of traumatic experience have become increasingly apparent. Although legislative change in the UK has removed the penalties for fabrication and a progressive decline in the military footprint may have increased the likelihood of such false trauma narratives, a paradigm shift in explanations for mental illness underpins this phenomenon. The recognition of post-traumatic stress disorder (PTSD) in 1980, followed by studies to identify risk factors, led to a greater appreciation of psychological vulnerability. As a result, the use of shame to discourage acts formerly labelled as “cowardly” or “lacking in morale fibre” is no longer considered appropriate. Recent conflicts in Iraq and Afghanistan generated popular sympathy for service personnel, whilst media focus on PTSD has led the UK public to believe that most veterans have been traumatised by their tours of duty. 相似文献
5.
6.
James H. Patterson 《海军后勤学研究》1976,23(1):95-123
Individual characteristics of multiple-constrained resource, project scheduling problems are examined in an attempt to predict the solution obtainable with heuristic methods. Difficulties encountered in performing this type of research are described, and several multiple regression models are developed for predicting heuristic performance. Both single and multiple project data are examined, and results reported demonstrate the efficacy of determining beforehand the method used for problem solution. 相似文献
7.
The objective of this article is to describe heuristic solutions to the problem of modeling inventories at each node of a large network in the context of a computer simulation model of that network. The heuristic solutions are compared with the mathematical solution which is too unwieldy for use in a simulation model. The Weibull cumulative distribution is used as an approximation for the heuristic models. We question whether the good performance of the Weibull is coincidence or perhaps mathematically justifiable. 相似文献
8.
9.
Nationalism and Ethnic Conflict: Threats to European Security. By Stephen Iwan Griffiths. SIPRI Research Report No. 5. Oxford University Press, Oxford (1993), ISBN 0-19-829162-0, £16.50.
Red Storm on the Reich, By C.J. Duffy. Routledge, London (1991) ISBN 0-415-0359-9, £35.00.
Gangsters and Revolutionaries. By R. Cribb. Allen and Unwin, ISBN 0-O4-301296-5 (1992), £12.95.
The Cyanide War. By E. O'Ballance. Brassey's, London (1989). ISBN 0 08 036695 3, Price £18.00. 相似文献
Red Storm on the Reich, By C.J. Duffy. Routledge, London (1991) ISBN 0-415-0359-9, £35.00.
Gangsters and Revolutionaries. By R. Cribb. Allen and Unwin, ISBN 0-O4-301296-5 (1992), £12.95.
The Cyanide War. By E. O'Ballance. Brassey's, London (1989). ISBN 0 08 036695 3, Price £18.00. 相似文献
10.