排序方式: 共有25条查询结果,搜索用时 15 毫秒
1.
An attacker‐defender model for analyzing the vulnerability of initial attack in wildfire suppression 下载免费PDF全文
Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA. 相似文献
2.
Matthew Stein 《Small Wars & Insurgencies》2013,24(3):394-412
There were several high-profile violent incidents in 2011 in Kazakhstan, including several bombings, shootings that targeted police, and a protest turned clash that resulted in a number of deaths. Some of the perpetrators reportedly had links with radical religious groups. An overlooked aspect of the violence is how it is reported in Kazakhstan. There are active, competent media in Kazakhstan, which are largely unknown in the West. An examination of these incidents using the media in Kazakhstan can provide a unique insight into what took place. While Western sources quickly blamed radical religious groups with international connections, media in Kazakhstan have found that there are other reasons for the violence. 相似文献
3.
Janice Gross Stein 《战略研究杂志》2013,36(3):6-18
A security regime is an uneasy compromise where the relationship among the parties is generally undefined, limited in scope, and transitional. The relationship is undefined, because the parties are usually former adversaries who, for the moment, do not think of war as a feasible or practical, or, under some conditions, even a possible instrument. Yet they are far from being allies. A security regime differs in important ways from an alliance or a security community. A security regime is also limited. What happens inside the regime is only a part of what happens in the larger relationship. Participation in a regime does not imply clear behavioral expectations outside the security arena. Finally, the parties to a security regime are usually in a transitional relationship; although the parties have moved away from a full-scale adversarial relationship, where they are going is less clear. Security regimes do not develop in a linear sequence to become ‘security communities’. 相似文献
4.
5.
6.
Let {Xi} be independent HNBUE (Harmonic New Better Than Used in Expectation) random variables and let {Yi} be independent exponential random variables such that E{Xi}=E{Yi} It is shown that \documentclass{article}\pagestyle{empty}\begin{document}$ E\left[{u\left({\mathop {\min \,X_i}\limits_{l \le i \le n}} \right)} \right] \ge E\left[{u\left({\mathop {\min \,Y_i}\limits_{l \le i \le n}} \right)} \right] $\end{document} for all increasing and concave u. This generalizes a result of Kubat. When comparing two series systems with components of equal cost, one with lifetimes {Xi} and the other with lifetimes {Yi}, it is shown that a risk-averse decision-maker will prefer the HNBUE system. Similar results are obtained for parallel systems. 相似文献
7.
8.
Military reading lists, intended to promote professional reading and in turn enhance education and develop critical thinking skills and sound judgement, recommend key texts to military personnel. This is a noble intent but the lists themselves, while generally good, are not flawless. Critiques of military reading lists often focus on what sources they are missing. This article offers its own critique but from a different perspective. It does so by analysing why some sources, which have become outdated, are based on faulty or incomplete research, have been thoroughly disproven, or some combination of the above, nevertheless linger on military reading lists. It then offers a short list of such sources, which it recommends be either removed from existing reading lists or accompanied by other sources that place the original source in appropriate historical context. Where applicable, it also recommends alternative sources that provide insights into the same subject matter. In so doing, this article is intended generate debate and to assist militaries to achieve a better balance between evaluation, induction and retention of valid knowledge on one hand, and rejection of outdated or flawed knowledge on the other. 相似文献
9.
10.
Dr. Aaron Karp Ambassador Julio Carasales Ministry of Foreign Affairs Argentina 《The Nonproliferation Review》2013,20(1):189-190
Atomic Obsession: Nuclear Alarmism from Hiroshima to Al Qaeda, by John Mueller. Oxford University Press, 2009. 336 pages, $27.95. Les armes nucléaires: Mythes et réalités [Nuclear Weapons: Myths and Realities], by Georges Le Guelte. Actes Sud, 2009. 390 pages, [euro]25. 相似文献