首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   22篇
  免费   3篇
  25篇
  2018年   2篇
  2017年   1篇
  2016年   2篇
  2014年   5篇
  2013年   10篇
  2009年   1篇
  1990年   1篇
  1987年   1篇
  1986年   1篇
  1984年   1篇
排序方式: 共有25条查询结果,搜索用时 15 毫秒
1.
Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA.  相似文献   
2.
There were several high-profile violent incidents in 2011 in Kazakhstan, including several bombings, shootings that targeted police, and a protest turned clash that resulted in a number of deaths. Some of the perpetrators reportedly had links with radical religious groups. An overlooked aspect of the violence is how it is reported in Kazakhstan. There are active, competent media in Kazakhstan, which are largely unknown in the West. An examination of these incidents using the media in Kazakhstan can provide a unique insight into what took place. While Western sources quickly blamed radical religious groups with international connections, media in Kazakhstan have found that there are other reasons for the violence.  相似文献   
3.
A security regime is an uneasy compromise where the relationship among the parties is generally undefined, limited in scope, and transitional. The relationship is undefined, because the parties are usually former adversaries who, for the moment, do not think of war as a feasible or practical, or, under some conditions, even a possible instrument. Yet they are far from being allies. A security regime differs in important ways from an alliance or a security community. A security regime is also limited. What happens inside the regime is only a part of what happens in the larger relationship. Participation in a regime does not imply clear behavioral expectations outside the security arena. Finally, the parties to a security regime are usually in a transitional relationship; although the parties have moved away from a full-scale adversarial relationship, where they are going is less clear. Security regimes do not develop in a linear sequence to become ‘security communities’.  相似文献   
4.
5.
6.
Let {Xi} be independent HNBUE (Harmonic New Better Than Used in Expectation) random variables and let {Yi} be independent exponential random variables such that E{Xi}=E{Yi} It is shown that \documentclass{article}\pagestyle{empty}\begin{document}$ E\left[{u\left({\mathop {\min \,X_i}\limits_{l \le i \le n}} \right)} \right] \ge E\left[{u\left({\mathop {\min \,Y_i}\limits_{l \le i \le n}} \right)} \right] $\end{document} for all increasing and concave u. This generalizes a result of Kubat. When comparing two series systems with components of equal cost, one with lifetimes {Xi} and the other with lifetimes {Yi}, it is shown that a risk-averse decision-maker will prefer the HNBUE system. Similar results are obtained for parallel systems.  相似文献   
7.
8.
Military reading lists, intended to promote professional reading and in turn enhance education and develop critical thinking skills and sound judgement, recommend key texts to military personnel. This is a noble intent but the lists themselves, while generally good, are not flawless. Critiques of military reading lists often focus on what sources they are missing. This article offers its own critique but from a different perspective. It does so by analysing why some sources, which have become outdated, are based on faulty or incomplete research, have been thoroughly disproven, or some combination of the above, nevertheless linger on military reading lists. It then offers a short list of such sources, which it recommends be either removed from existing reading lists or accompanied by other sources that place the original source in appropriate historical context. Where applicable, it also recommends alternative sources that provide insights into the same subject matter. In so doing, this article is intended generate debate and to assist militaries to achieve a better balance between evaluation, induction and retention of valid knowledge on one hand, and rejection of outdated or flawed knowledge on the other.  相似文献   
9.
10.
Atomic Obsession: Nuclear Alarmism from Hiroshima to Al Qaeda, by John Mueller. Oxford University Press, 2009. 336 pages, $27.95.

Les armes nucléaires: Mythes et réalités [Nuclear Weapons: Myths and Realities], by Georges Le Guelte. Actes Sud, 2009. 390 pages, [euro]25.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号