•There is a need for new approaches to uncertainty in water resources decisions.•New method to incorporate surprise potential and uncertainty into decision making.•Arsenic contamination is modeled in ...a nonlinear optimization framework.•Optimal investments need complex hydrologic and economic information.
With ignorance and potential surprise dominating decision making in water resources, a framework for dealing with such uncertainty is a critical need in hydrology. We operationalize the ‘potential surprise’ criterion proposed by Shackle, Vickers, and Katzner (SVK) to derive decision rules to manage water resources under uncertainty and ignorance. We apply this framework to managing water supply systems in Bangladesh that face severe, naturally occurring arsenic contamination. The uncertainty involved with arsenic in water supplies makes the application of conventional analysis of decision-making ineffective. Given the uncertainty and surprise involved in such cases, we find that optimal decisions tend to favor actions that avoid irreversible outcomes instead of conventional cost-effective actions. We observe that a diversification of the water supply system also emerges as a robust strategy to avert unintended outcomes of water contamination. Shallow wells had a slight higher optimal level (36%) compare to deep wells and surface treatment which had allocation levels of roughly 32% under each. The approach can be applied in a variety of other cases that involve decision making under uncertainty and surprise, a frequent situation in natural resources management.
How nonstate military strategies overturn traditional perspectives on warfare Since September 11th, 2001, armed nonstate actors have received increased attention and discussion from scholars, ...policymakers, and the military. Underlying debates about nonstate warfare and how it should be countered is one crucial assumption: that state and nonstate actors fight very differently. In Nonstate Warfare, Stephen Biddle upturns this distinction, arguing that there is actually nothing intrinsic separating state or nonstate military behavior. Through an in-depth look at nonstate military conduct, Biddle shows that many nonstate armies now fight more "conventionally" than many state armies, and that the internal politics of nonstate actors—their institutional maturity and wartime stakes rather than their material weapons or equipment—determines tactics and strategies.Biddle frames nonstate and state methods along a continuum, spanning Fabian-style irregular warfare to Napoleonic-style warfare involving massed armies, and he presents a systematic theory to explain any given nonstate actor's position on this spectrum. Showing that most warfare for at least a century has kept to the blended middle of the spectrum, Biddle argues that material and tribal culture explanations for nonstate warfare methods do not adequately explain observed patterns of warmaking. Investigating a range of historical examples from Lebanon and Iraq to Somalia, Croatia, and the Vietcong, Biddle demonstrates that viewing state and nonstate warfighting as mutually exclusive can lead to errors in policy and scholarship.A comprehensive account of combat methods and military rationale, Nonstate Warfare offers a new understanding for wartime military behavior.
Rad istražuje operativno umijeće operacije Oluja koju su hrvatske vojne i redarstvene snage provele u kolovozu 1995. U Oluji je operativno umijeće učinkovito pozicionirano kao intermedijarno područje ...u kojem je trebalo nadvladati standardne pukotine između strategije, taktike i politike, odnosno učinkovito su orkestrirani svi dostupni izvori vojne i nevojne moći u namjeri da se izvrše krajnji strategijski ciljevi. Na nacionalnoj razini Oluja je bila ključna operacija u oslobađanju okupiranih područja, a na regionalnoj razini je stvorila strategijske preduvjete za uspostavu trajnog mira, sigurnosti i stabilnosti u jugoistočnoj Europi. Osnovna je namjera rada objasniti kauzalnu vezu između brzog sloma ili „evaporacije” takozvane Srpske vojske Krajine, vojnostrateške uloge grada Knina i primijenjenog operativnog umijeća hrvatskih vojnih i redarstvenih snaga, te u sklopu toga istražiti validnost koncepta gravitacijskog težišta Carla von Clausewitza u operaciji Oluja.
We can consider the Riemann-Stieltjes integral
d
g
as an integral of a point function
f
with respect to an interval function
g
. We could extend it to the Henstock-Stieltjes integral. In this paper, ...we extend it to a generalized Stieltjes integral
d
g
of a point function
f
with respect to a function
g
of divisions of an interval. Then we prove for this integral the standard results in the theory of integration, including the controlled convergence theorem.
Because of the complex pore structure and the strong heterogeneity of the Svk carbonate reservoir in the Y Field, water saturation distribution and petrophysical properties, such as porosity, ...permeability and capillary pressure are difficult to be characterized. To solve this problem, a new method to interpret water saturation was presented. By this method, the relationships among porosity, permeability and different pore throat radii are fitted and a typical radius R30 (the pore aperture radius corresponding to 30 % of mercury saturation in a mercury penetration test) selected. By fitting the capillary pressure curves with Corey–Brooks function, the threshold pressure, the irreducible water saturation and the Corey exponent “
n
” of each capillary pressure curve can be determined, and the relationship between R30 and the threshold pressure, R30 and the irreducible water saturation, and R30 and the Corey exponent can all be fitted. If the R30 value is known, the threshold pressure, irreducible water saturation and Corey exponent can be calculated by the fitting equations; hence, the water saturation at a given height from FWL can be calculated by the Corey–Brooks function. The water saturation calculated by saturation height function is consistent with that of the well log interpretation and the error is less than by other methods. During the process of three-dimensional saturation modeling, an R30 criterion is presented to define rock types, six petrophysical rock types with different reservoir properties are distinguished and a link is set up between rock types and log responses by the KNN method. Logs are utilized to predict rock types of non-cored wells according to this link, and a three-dimensional rock-type model is established by the Petrel software. R30 value of each grid can be calculated by R30 formula when three-dimensional porosity and permeability models are built with the restraint of rock-type model. Then, on the basis of the saturation height function, a three-dimensional water saturation model can be obtained.
The Hill cipher algorithm is one of the symmetric key algorithms that have many variations but still not suited for all zeroes plaintext block. Chosen-plaintext attack can be possible on Toorani and ...Falahati Hill Cipher Algorithm by two closely related variants of Hill Cipher. In this paper we have presented a new approach of Hill Cipher (RDHill Cipher) using DNA cryptography and TFHill Cipher to overcome the drawbacks of TFHill. We implement this algorithm for image encryption in which firstly the image will be converted into binary value and the nibble of binary value will be rotated, then it will be converted into DNA, and then DNA to Amino Acids. Secondly TFHill Cipher can be applied on Amino Acids. The output is measured for the security level based on Correlation, histogram and entropy. The experimental results showed that the combination technique resulted in a higher entropy value and lower correlation, and a more uniform histogram, compared to the Hill Cipher, affine Hill, TFHill and SVK Hill Cipher. This implies the good quality of the retrieved image compared to the original one.
Constructing SVKLattices from Cyclic Bases Weichi Yu; Yu Zheng; Dake He
Sixth International Conference on Parallel and Distributed Computing Applications and Technologies (PDCAT'05),
2005
Conference Proceeding
SVK-lattices, in which the shortest vector is known, are proposed for the first time. Two theorems on the relationship between cyclic lattices and SVK-lattices are proposed and proved. By these ...constructive theorems, SVK-lattices can be simply generated. Pseudo-cyclic lattices, whose random properties are better than cyclic lattice, are also investigated for the first time. Two algorithms are designed for generating random SVK-lattices from pseudo-cyclic lattices. A general algorithm for randomizing a lattice basis is presented at the end of this paper.
Various: eclipse of the sun, exhibition of the Social Security Fund of the GDR (SVK), table with written literature and badges from West Germany, French artist at Dresdner Hotel Astoria, freight ...taxi, pieces of evidence for packet smuggling, car at the gas station, July-December 1954
Verschiedenes: Sonnenfinsternis, Ausstellung der Sozialversicherungskasse der DDR (SVK), Tisch mit Schundliteratur und Abzeichen aus Westdeutschland, französischer Künstler im Dresdner Hotel Astoria, Gütertaxi, Beweisstücke für Paketschmuggel, Auto an der Tankstelle, Juli-Dezember 1954