نوع مقاله : مقاله علمی پژوهشی
1 دانشیار گروه جغرافیا و برنامهریزی شهری، دانشگاه محقق اردبیلی، اردبیل، ایران
2 کارشناسارشد جغرافیا و برنامهریزی شهری، دانشگاه محقق اردبیلی، اردبیل، ایران
عنوان مقاله [English]
According to Iran’s strategic pisition in the middle east and the ongoing threat of neighboring and non-neighboring countries, unfortunately projects and economic infasturactures have been established without proper defensive considerations as a target for enemy threats and other offensive actions. One of the crucial policiesin passive defense is reduce injuries of people. But what is notably stated here in accordance with the involved policy is the position it has with the area of interest to build public shelters. In order to The present study is an applied and developmental research that aims at studying locate a shelter from the perspective of passive defense in Ardabil, 11 influential indicators were selected. These indicators are made up of 3 components which include: physical features, the condition of the city in a state of war, and environmental criteria. The significance of each of these indicators were measured using network analysis process. The highest value of coefficient of importance was given to the factor namely the distance from the center of the enemy target (.214) and the lowest value of the coefficient belonged to the distance from the fault (.042). Then with the generated information layers and the ovelay of these layers with GIS software, the most preferred locations for building shelters in Ardabil were determined. The results presented that while various locations for the construction of shelters are scattered throughout the city, only east and north-eastern part of the city are the most suitable places to build multi-purpose shelters with regards to passive defense approach.
29.Diego F. Rueda and Eusebi Calle 2017. Using interdependency matrices to mitigate targeted attacks on interdependent networks: A case study involving a power grid and backbone telecommunications networks, International Journal of Critical Infrastructure Protection, 16: 3-12.
30.FEMA, 2003. Risk management series. Reference manual to mitigate potential terrorist attacks against buildings, chapter 2, 3.
31.Li, A., Nozick, L., Xu, N., and Davidson, R. 2012. Shelter location and transportation planning under hurricane conditions. School of civil and environmental engineering, Cornell niversity, transportation research part, 48: 715–729.
32. Chu, M.-T. et al. 2006. Comparison among three analytical methods for knowledge communities group-decision analysis ,Expert Systems with Applications.
33. Opricovic, S., and Tzeng, G.-H. 2004. Compromise solution by MCDM methods: A comparative analysis of VIKOR and TOPSIS, European Journal of Operational Research, 156: 445–455.
34.Stee, B., Randal, et al.,2004. Examining the army’s Future WARRIOR., Rand Arayo center.
35.Richard White, Terrance Boult, Edward Chow. 2014. A computational asset vulnerability model for the strategic protection of the critical infrastructure, International Journal of Critical Infrastructure Protection, 7(3): 167-177.
36.Tang, A., and Wen, A. 2009. An intelligent simulation system for earthquake disaster assessment. Computers & Geosciences, 35: 871-879.