Military Operations Research最新文献

筛选
英文 中文
Operations Analysis in Iraq: Sifting Through the Fog of War 伊拉克的行动分析:透过战争迷雾筛选
IF 0.7 4区 管理学
Military Operations Research Pub Date : 2011-08-24 DOI: 10.5711/1082598316263
Lieutenant Colonel Robert Shearer
{"title":"Operations Analysis in Iraq: Sifting Through the Fog of War","authors":"Lieutenant Colonel Robert Shearer","doi":"10.5711/1082598316263","DOIUrl":"https://doi.org/10.5711/1082598316263","url":null,"abstract":"","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"16 1","pages":"63-71"},"PeriodicalIF":0.7,"publicationDate":"2011-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70947688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Defending Against a Terrorist Who Accumulates Resources 防范积累资源的恐怖分子
IF 0.7 4区 管理学
Military Operations Research Pub Date : 2011-03-15 DOI: 10.5711/1082598316121
K. Hausken, J. Zhuang
{"title":"Defending Against a Terrorist Who Accumulates Resources","authors":"K. Hausken, J. Zhuang","doi":"10.5711/1082598316121","DOIUrl":"https://doi.org/10.5711/1082598316121","url":null,"abstract":"I n this paper we study a two-period game between a government and a terrorist, where the terrorist decides whether to stockpile attack resources from the first to the second period. Our results show that the terrorist chooses stockpiling when: (a) the following parameters are in intermediate ranges: the government’s asset valuation, the terrorist’s first-period resource, the government’s unit defense cost, and the terrorist’s unit attack cost; (b) the terrorist’s secondperiod resource is small; and (c) the terrorist’s resource growth factor or discount factor is large. We also compare our model with the one that does not allow terrorist stockpiling. For moderate growth factors and secondperiod resources for the terrorist, the terrorist does not prefer the option of stockpiling. The terrorist prefers stockpiling for the more uncommon case that the growth factor for the terrorist’s stockpiled resource is very large and the second-period resource is very small. In contrast, the government always prefers that the terrorist has the stockpiling option.","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"16 1","pages":"21-39"},"PeriodicalIF":0.7,"publicationDate":"2011-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70947544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Optimum Selection of conservation reserves: Extensions to multiple Land use 保育范围的最佳选择:扩展至多种土地用途
IF 0.7 4区 管理学
Military Operations Research Pub Date : 2011-03-15 DOI: 10.5711/1082598316165
S. Dissanayake, Hayri Önal, J. Westervelt
{"title":"Optimum Selection of conservation reserves: Extensions to multiple Land use","authors":"S. Dissanayake, Hayri Önal, J. Westervelt","doi":"10.5711/1082598316165","DOIUrl":"https://doi.org/10.5711/1082598316165","url":null,"abstract":"","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"16 1","pages":"65-76"},"PeriodicalIF":0.7,"publicationDate":"2011-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70947604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Game Theory Implementation of Capability Investment Problem 能力投资问题的博弈论实现
IF 0.7 4区 管理学
Military Operations Research Pub Date : 2011-03-15 DOI: 10.5711/1082598316141
Justin Beck
{"title":"Game Theory Implementation of Capability Investment Problem","authors":"Justin Beck","doi":"10.5711/1082598316141","DOIUrl":"https://doi.org/10.5711/1082598316141","url":null,"abstract":"","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"16 1","pages":"41-55"},"PeriodicalIF":0.7,"publicationDate":"2011-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70947726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Probabilistic Analysis of a Country's Program to Acquire Nuclear Weapons 一个国家获得核武器计划的概率分析
IF 0.7 4区 管理学
Military Operations Research Pub Date : 2011-03-15 DOI: 10.5711/108259831615
David J. Caswell, M. Paté-Cornell
{"title":"Probabilistic Analysis of a Country's Program to Acquire Nuclear Weapons","authors":"David J. Caswell, M. Paté-Cornell","doi":"10.5711/108259831615","DOIUrl":"https://doi.org/10.5711/108259831615","url":null,"abstract":"","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"16 1","pages":"5-20"},"PeriodicalIF":0.7,"publicationDate":"2011-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70947739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Review and Assessment of Chlorine Mammalian Lethality Data and the Development of a Human Estimate R-1 氯致哺乳动物死亡数据的回顾和评估以及人类估计R-1的发展
IF 0.7 4区 管理学
Military Operations Research Pub Date : 2010-04-01 DOI: 10.5711/MORJ.15.3.59
D. Sommerville, J. J. Bray, Sharon A Reutter-Christy, Raymond E. Jablonski, E. Shelly
{"title":"Review and Assessment of Chlorine Mammalian Lethality Data and the Development of a Human Estimate R-1","authors":"D. Sommerville, J. J. Bray, Sharon A Reutter-Christy, Raymond E. Jablonski, E. Shelly","doi":"10.5711/MORJ.15.3.59","DOIUrl":"https://doi.org/10.5711/MORJ.15.3.59","url":null,"abstract":"Abstract : New human estimates for chlorine inhalation lethality as a function of exposure duration were derived via a review and statistical analysis of existing mammalian lethality data. Such estimates are needed to support risk assessments and casualty predictions involving airborne releases of chlorine. At present, casualty predictions for such releases are at odds with what has been observed historically; the predicted downwind hazard area has often been much larger than what was actually observed. Either the present estimates for median lethal dosages (LCT50) are too low, the currently popular atmospheric transport and dispersion (ATD) models cannot adequately model chlorine releases, or both.LCT50 and quantal response data were analyzed for eight species (mouse, rat, guinea pig, rabbit, cat, dog, goat and sheep), for exposure durations from 8 to 235 minutes. The base 10 probit slope (concentration) was estimated via the weighted average of experimentally measured slopes in mammalian lethality studies. Resulting human lethality (military) estimates as a function of exposure duration were expressed via the toxic load model. General population estimates were derived from the military estimates using the mathematical method of Crosier (2007). Previous human estimates were reviewed and compared to the new general population estimate. The impact of the new estimate was evaluated through a series of transport and dispersion modeling runs for the catastrophic accidental release of 50 tons of chlorine from a tanker car. The sensitivity of downwind hazard distances was also investigated as a function of median lethal toxic load (TL), toxic load exponent and probit slope values.","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"15 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2010-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70951583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
MORS Oral History Project Interview of Mr. Brian R. McEnany, FS MORS口述历史计划专访Brian R. McEnany先生,FS
IF 0.7 4区 管理学
Military Operations Research Pub Date : 2010-01-01 DOI: 10.5711/MORJ.15.3.87
Bill Dunn
{"title":"MORS Oral History Project Interview of Mr. Brian R. McEnany, FS","authors":"Bill Dunn","doi":"10.5711/MORJ.15.3.87","DOIUrl":"https://doi.org/10.5711/MORJ.15.3.87","url":null,"abstract":"","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"15 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2010-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70951597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pure Network-Based Procedures for Constrained Assignment Problems in Naval Personnel Planning 海军人员规划中约束分配问题的纯网络求解方法
IF 0.7 4区 管理学
Military Operations Research Pub Date : 2010-01-01 DOI: 10.5711/MORJ.15.4.27
A. Ali
{"title":"Pure Network-Based Procedures for Constrained Assignment Problems in Naval Personnel Planning","authors":"A. Ali","doi":"10.5711/MORJ.15.4.27","DOIUrl":"https://doi.org/10.5711/MORJ.15.4.27","url":null,"abstract":"","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"15 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2010-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70951640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimal Satellite Payload Selection and Specification 最佳卫星有效载荷选择和规范
IF 0.7 4区 管理学
Military Operations Research Pub Date : 2010-01-01 DOI: 10.5711/MORJ.15.3.42
J. Flory, Jefirey P. Kharoufeh
{"title":"Optimal Satellite Payload Selection and Specification","authors":"J. Flory, Jefirey P. Kharoufeh","doi":"10.5711/MORJ.15.3.42","DOIUrl":"https://doi.org/10.5711/MORJ.15.3.42","url":null,"abstract":"We consider the problem of optimally selecting and specifying satellite payloads for inclusion on a sequence of satellite launches to maximize the total expected utility of a constellation. The satellite bus is constrained by energy, weight, volume, and cost limitations. We formulate the problem as a variant of the multidimensional knapsack problem and provide exact and heuristic solution methods. Exact solutions are obtained for small and moderately-sized constellations. For larger constellations, the heuristic techniques provide solutions within 4% of the best-known integer solution.","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"15 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2010-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70951681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Tactical Identification of Wide Intruders 宽入侵者的战术识别
IF 0.7 4区 管理学
Military Operations Research Pub Date : 2010-01-01 DOI: 10.5711/MORJ.15.2.51
K. Hausken
{"title":"Tactical Identification of Wide Intruders","authors":"K. Hausken","doi":"10.5711/MORJ.15.2.51","DOIUrl":"https://doi.org/10.5711/MORJ.15.2.51","url":null,"abstract":"","PeriodicalId":54242,"journal":{"name":"Military Operations Research","volume":"15 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2010-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70951486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信