排序方式: 共有196条查询结果,搜索用时 187 毫秒
191.
192.
In the aftermath of September 11, 2001 and Hurricane Katrina, the United States government has spent tens of billions of dollars to improve the nation's ability to respond to a natural disaster or terrorist attack, but the emphasis on immediate first response has left many long-term environmental, political, and technological challenges unaddressed. Although a dirty bomb attack is unlikely to yield the same amount of physical devastation and death as caused by Katrina or a nuclear weapon, the social, psychological, and economic impact would be enormous. At present, however, the United States lacks the technology necessary to decontaminate a large, densely populated urban area under time, political, and economic constraints. This article reviews past cleanup experiences and current decontamination capabilities to consider the long-term implications of a dirty bomb, identifies weaknesses in America's existing response capabilities, notes possible areas of political friction, and considers the implications of the failure to adequately prepare. Having the appropriate decontamination techniques established and long-term plans in place before an incident occurs will significantly improve the government's ability to protect public and environmental security, establish a viable decontamination strategy, allow residents to return to their homes, and get the local economy back on its feet. 相似文献
193.
针对航母编队对岸电子进攻作战提出了一种航母编队阵位确定的方法。基于航母编队在对岸电子进攻中的任务,提出了航母编队与岸边距离的基本要求,建立了航母编队与岸边距离的数学模型,仿真计算了模型中各个参数对航母编队与岸边距离的影响。这些模型可用于航母编队在对岸电子进攻中确定航母的阵位,满足航母编队作战使用的需要。 相似文献
194.
基于半定制集成电路设计流程,提出一种对CMOS集成电路进行电磁信息泄漏评估的方法。该方法首先利用综合工具生成电路的门级网表,将门级网表中的普通单元替换为防护逻辑单元,然后利用电磁辐射仿真模型和电磁信息泄漏评估模型对集成电路进行电磁辐射仿真和信息泄漏分析。该方法能够在设计阶段对密码芯片的抗电磁旁路攻击能力进行评估,可提高密码芯片的设计效率,减少资源浪费。 相似文献
195.
196.
David J. Lonsdale 《Journal of Military Ethics》2020,19(1):20-39
ABSTRACT Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. The onset of this new instrument in national security has implications for conflict thresholds and military ethics. To serve as a legitimate tool of policy, cyber attack must operate in accordance with moral concerns. To test the viability of cyber attack, this paper provides a new perspective on cyber ethics. Cyber attack is tested against the criteria of the common good. This involves identifying the four core components of the common good from a conflict perspective: respect for the person; social wellbeing; peace and security; and solidarity. The fate of these components is assessed in relation to the six key characteristics of cyber attack from a moral standpoint: security; the role or absence of violence; discrimination; proportionality; cyberharm; and the threshold of conflict. It is concluded that the common good must be incorporated into developing state cyber strategies. 相似文献