z-logo
Premium
An attacker‐defender model for analyzing the vulnerability of initial attack in wildfire suppression
Author(s) -
Rashidi Eghbal,
Medal Hugh,
Hoskins Aaron
Publication year - 2018
Publication title -
naval research logistics (nrl)
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.665
H-Index - 68
eISSN - 1520-6750
pISSN - 0894-069X
DOI - 10.1002/nav.21792
Subject(s) - vulnerability (computing) , computer science , stackelberg competition , environmental science , control (management) , wildfire suppression , environmental resource management , operations research , firefighting , computer security , geography , mathematics , cartography , artificial intelligence , mathematical economics
Abstract Wildfire managers use initial attack (IA) to control wildfires before they grow large and become difficult to suppress. Although the majority of wildfire incidents are contained by IA, the small percentage of fires that escape IA causes most of the damage. Therefore, planning a successful IA is very important. In this article, we study the vulnerability of IA in wildfire suppression using an attacker‐defender Stackelberg model. The attacker's objective is to coordinate the simultaneous ignition of fires at various points in a landscape to maximize the number of fires that cannot be contained by IA. The defender's objective is to optimally dispatch suppression resources from multiple fire stations located across the landscape to minimize the number of wildfires not contained by IA. We use a decomposition algorithm to solve the model and apply the model on a test case landscape. We also investigate the impact of delay in the response, the fire growth rate, the amount of suppression resources, and the locations of fire stations on the success of IA.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here