Science.gov

Sample records for critical infrastructure control

  1. Cyber Security: Critical Infrastructure Controls Assessment Framework

    DTIC Science & Technology

    2011-05-01

    Industry SANS ‐ CAG OASIS Private   ISA‐99 <more…> SOX <more…> OWASP <more…> And Growing Day by Day……………….. CIP Security Controls Assessment...NERC-CIP NIST-Cyber Grid Chemical Cyber Physical System Security Standards PCI OASIS OWASP Nuclear Transportation ISA-99 CIP Security Controls...the Advancement of Structured Information Standards 22. OWASP  ‐ Open Web Application Security Project  23. PCI – Payment Card Industry 24. PCS

  2. How Critical Is Critical Infrastructure?

    DTIC Science & Technology

    2015-09-01

    be misdirected even though it is the cornerstone mission of the department to prevent terrorism and enhance security. It is likely that the...facilities DHS works to protect from terrorism are not the most likely targets for attacks. The manner in which facilities are designated as critical...security, critical infrastructure, world trade center, military theory, terrorism 15. NUMBER OF PAGES 155 16. PRICE CODE 17. SECURITY CLASSIFICATION

  3. Critical Infrastructure Modeling System

    SciTech Connect

    2004-10-01

    The Critical Infrastructure Modeling System (CIMS) is a 3D modeling and simulation environment designed to assist users in the analysis of dependencies within individual infrastructure and also interdependencies between multiple infrastructures. Through visual cuing and textual displays, a use can evaluate the effect of system perturbation and identify the emergent patterns that evolve. These patterns include possible outage areas from a loss of power, denial of service or access, and disruption of operations. Method of Solution: CIMS allows the user to model a system, create an overlay of information, and create 3D representative images to illustrate key infrastructure elements. A geo-referenced scene, satellite, aerial images or technical drawings can be incorporated into the scene. Scenarios of events can be scripted, and the user can also interact during run time to alter system characteristics. CIMS operates as a discrete event simulation engine feeding a 3D visualization.

  4. Critical Infrastructure Modeling: An Approach to Characterizing Interdependencies of Complex Networks & Control Systems

    SciTech Connect

    Stuart Walsh; Shane Cherry; Lyle Roybal

    2009-05-01

    Critical infrastructure control systems face many challenges entering the 21st century, including natural disasters, cyber attacks, and terrorist attacks. Revolutionary change is required to solve many existing issues, including gaining greater situational awareness and resiliency through embedding modeling and advanced control algorithms in smart sensors and control devices instead of in a central controller. To support design, testing, and component analysis, a flexible simulation and modeling capability is needed. Researchers at Idaho National Laboratory are developing and evaluating such a capability through their CIPRsim modeling and simulation framework.

  5. Complex Networks and Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Setola, Roberto; de Porcellinis, Stefano

    The term “Critical Infrastructures” indicates all those technological infrastructures such as: electric grids, telecommunication networks, railways, healthcare systems, financial circuits, etc. that are more and more relevant for the welfare of our countries. Each one of these infrastructures is a complex, highly non-linear, geographically dispersed cluster of systems, that interact with their human owners, operators, users and with the other infrastructures. Their augmented relevance and the actual political and technological scenarios, which have increased their exposition to accidental failure and deliberate attacks, demand for different and innovative protection strategies (generally indicate as CIP - Critical Infrastructure Protection). To this end it is mandatory to understand the mechanisms that regulate the dynamic of these infrastructures. In this framework, an interesting approach is those provided by the complex networks. In this paper we illustrate some results achieved considering structural and functional properties of the corresponding topological networks both when each infrastructure is assumed as an autonomous system and when we take into account also the dependencies existing among the different infrastructures.

  6. Protecting Critical Rail Infrastructure

    DTIC Science & Technology

    2006-12-01

    Commission Report portrays the new type of Al Qaeda terrorist by describing Khalid Sheikh Mohammed, the master mind behind the attacks, as intelligent and... parking areas, and power, communication and surveillance systems. Freight systems can operate in a closed network where the railroads have control...following methods: • an improvised explosion device (placed on-board or on tracks); • shoulder-fired missiles; • a motorcycle or other vehicle pulling

  7. Critical Infrastructures: Background, Policy, and Implementation

    DTIC Science & Technology

    2010-06-07

    Government Accountability Office, Critical Infrastructure Protection: Challenges for Selected Agencies and Industry Sectors. Repot to the Committee on...the federal government to develop and implement plans that would protect government -operated infrastructures and called for a dialogue between... government and the private sector to develop a National Infrastructure Assurance Plan that would protect all of the nation’s critical infrastructures by

  8. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  9. The Integrated Safety-Critical Advanced Avionics Communication and Control (ISAACC) System Concept: Infrastructure for ISHM

    NASA Technical Reports Server (NTRS)

    Gwaltney, David A.; Briscoe, Jeri M.

    2005-01-01

    Integrated System Health Management (ISHM) architectures for spacecraft will include hard real-time, critical subsystems and soft real-time monitoring subsystems. Interaction between these subsystems will be necessary and an architecture supporting multiple criticality levels will be required. Demonstration hardware for the Integrated Safety-Critical Advanced Avionics Communication & Control (ISAACC) system has been developed at NASA Marshall Space Flight Center. It is a modular system using a commercially available time-triggered protocol, ?Tp/C, that supports hard real-time distributed control systems independent of the data transmission medium. The protocol is implemented in hardware and provides guaranteed low-latency messaging with inherent fault-tolerance and fault-containment. Interoperability between modules and systems of modules using the TTP/C is guaranteed through definition of messages and the precise message schedule implemented by the master-less Time Division Multiple Access (TDMA) communications protocol. "Plug-and-play" capability for sensors and actuators provides automatically configurable modules supporting sensor recalibration and control algorithm re-tuning without software modification. Modular components of controlled physical system(s) critical to control algorithm tuning, such as pumps or valve components in an engine, can be replaced or upgraded as "plug and play" components without modification to the ISAACC module hardware or software. ISAACC modules can communicate with other vehicle subsystems through time-triggered protocols or other communications protocols implemented over Ethernet, MIL-STD- 1553 and RS-485/422. Other communication bus physical layers and protocols can be included as required. In this way, the ISAACC modules can be part of a system-of-systems in a vehicle with multi-tier subsystems of varying criticality. The goal of the ISAACC architecture development is control and monitoring of safety critical systems of a

  10. The Integrated Safety-Critical Advanced Avionics Communication and Control (ISAACC) System Concept: Infrastructure for ISHM

    NASA Technical Reports Server (NTRS)

    Gwaltney, David A.; Briscoe, Jeri M.

    2005-01-01

    Integrated System Health Management (ISHM) architectures for spacecraft will include hard real-time, critical subsystems and soft real-time monitoring subsystems. Interaction between these subsystems will be necessary and an architecture supporting multiple criticality levels will be required. Demonstration hardware for the Integrated Safety-Critical Advanced Avionics Communication & Control (ISAACC) system has been developed at NASA Marshall Space Flight Center. It is a modular system using a commercially available time-triggered protocol, ?Tp/C, that supports hard real-time distributed control systems independent of the data transmission medium. The protocol is implemented in hardware and provides guaranteed low-latency messaging with inherent fault-tolerance and fault-containment. Interoperability between modules and systems of modules using the TTP/C is guaranteed through definition of messages and the precise message schedule implemented by the master-less Time Division Multiple Access (TDMA) communications protocol. "Plug-and-play" capability for sensors and actuators provides automatically configurable modules supporting sensor recalibration and control algorithm re-tuning without software modification. Modular components of controlled physical system(s) critical to control algorithm tuning, such as pumps or valve components in an engine, can be replaced or upgraded as "plug and play" components without modification to the ISAACC module hardware or software. ISAACC modules can communicate with other vehicle subsystems through time-triggered protocols or other communications protocols implemented over Ethernet, MIL-STD- 1553 and RS-485/422. Other communication bus physical layers and protocols can be included as required. In this way, the ISAACC modules can be part of a system-of-systems in a vehicle with multi-tier subsystems of varying criticality. The goal of the ISAACC architecture development is control and monitoring of safety critical systems of a

  11. Emergent Risks In Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Dynes, Scott

    Firms cannot function successfully without managing a host of internal and external organizational and process interdependencies. Part of this involves business continuity planning, which directly aects how resilient arm and its business sector are in the face of disruptions. This paper presents the results of eld studies related to information risk management practices in the health care and retail sectors. The studies explore information risk management coordinating signals within and across rms in these sectors as well as the potential eects of cyber disruptions on the rms as stand-alone entities and as part of a critical infrastructure. The health care case study investigates the impact of the Zotob worm on the ability to deliver medical care and treatment. The retail study examines the resilience of certain elements of the food supply chain to cyber disruptions.

  12. EEW Implementation into Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Zulfikar, Can; Pinar, Ali

    2016-04-01

    In FP7 MARsite project WP9, the integration algorithm of existing strong motion networks with the critical infrastructures strong motion networks have been studied. In Istanbul, the existing Istanbul Earthquake Early Warning (IEEW) strong motion network consists of 15 stations including 10 on land and 5 ocean bottom stations. The system provides continuous online data and earthquake early warning alert depending on the exceedance of the threshold levels in ground motion acceleration in certain number of station within the certain time interval. The data transmission is provided through the fiber optic cable and satellite line alternatively. The early warning alert is transmitted to the critical infrastructures of Istanbul Natural Gas distribution line and Marmaray Tube Tunnel line in order to activate the local strong motion networks for the automatic shut-off mechanism. Istanbul Natural Gas distribution line has 1.800km steel and 15.200km polyethylene in total 18.000km gas pipeline in Istanbul. There are in total 750 district regulators in the city where the gas pressure is reduced from 20bar to 4bar and from there the gas is transmitted with polyethylene lines to service boxes. Currently, Istanbul Natural Gas Distribution Company (IGDAS) has its own strong motion network with 110 strong motion stations installed at the 110 of 750 district regulators. Once the IGDAS strong motion network is activated by the IEEW network, depending on the exceedance of the ground motion parameters threshold levels the gas flow is stopped at the district regulators. Other than the Earthquake Early Warning operation in IGDAS strong motion network, having the calculated ground motion parameters in the network provides damage maps for the buildings and natural gas pipeline network. The Marmaray Tube Tunnel connects the Europe and Asian sides of Istanbul City by a rail line. The tunnel is 1.4km length and consists of 13segments. There is strong motion monitoring network in the tunnel

  13. Critical Infrastructures: Background, Policy, and Implementation

    DTIC Science & Technology

    2008-10-10

    Government Accountability Office, Critical Infrastructure Protection: Challenges for Selected Agencies and Industry Sectors. Repot to the Committee on...set up groups within the federal government to develop and implement plans that would protect government -operated infrastructures and called for a...dialogue between government and the private sector to develop a National Infrastructure Assurance Plan that would protect all of the nation’s critical

  14. Geographic Hotspots of Critical National Infrastructure.

    PubMed

    Thacker, Scott; Barr, Stuart; Pant, Raghav; Hall, Jim W; Alderson, David

    2017-06-12

    Failure of critical national infrastructures can result in major disruptions to society and the economy. Understanding the criticality of individual assets and the geographic areas in which they are located is essential for targeting investments to reduce risks and enhance system resilience. Within this study we provide new insights into the criticality of real-life critical infrastructure networks by integrating high-resolution data on infrastructure location, connectivity, interdependence, and usage. We propose a metric of infrastructure criticality in terms of the number of users who may be directly or indirectly disrupted by the failure of physically interdependent infrastructures. Kernel density estimation is used to integrate spatially discrete criticality values associated with individual infrastructure assets, producing a continuous surface from which statistically significant infrastructure criticality hotspots are identified. We develop a comprehensive and unique national-scale demonstration for England and Wales that utilizes previously unavailable data from the energy, transport, water, waste, and digital communications sectors. The testing of 200,000 failure scenarios identifies that hotspots are typically located around the periphery of urban areas where there are large facilities upon which many users depend or where several critical infrastructures are concentrated in one location. © 2017 Society for Risk Analysis.

  15. 31 CFR 800.208 - Critical infrastructure.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 31 Money and Finance:Treasury 3 2011-07-01 2011-07-01 false Critical infrastructure. 800.208... OF INVESTMENT SECURITY, DEPARTMENT OF THE TREASURY REGULATIONS PERTAINING TO MERGERS, ACQUISITIONS, AND TAKEOVERS BY FOREIGN PERSONS Definitions § 800.208 Critical infrastructure. The term...

  16. 31 CFR 800.208 - Critical infrastructure.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Critical infrastructure. 800.208... OF INVESTMENT SECURITY, DEPARTMENT OF THE TREASURY REGULATIONS PERTAINING TO MERGERS, ACQUISITIONS, AND TAKEOVERS BY FOREIGN PERSONS Definitions § 800.208 Critical infrastructure. The term...

  17. Critical Infrastructures: Background, Policy, and Implementation

    DTIC Science & Technology

    2005-07-12

    order to identify priorities for protective and support measures; ! to develop a comprehensive national plan for securing key resources and critical... plan ,37 a priority asset is one that could be “catastrophically exploited.” It is not clear from the testimony how the list of critical assets was...private sector to develop a National Infrastructure Assurance Plan that would protect all of the nation’s critical infrastructures by the year 2003

  18. Managing Mission-Critical Infrastructure

    ERIC Educational Resources Information Center

    Breeding, Marshall

    2012-01-01

    In the library context, they depend on sophisticated business applications specifically designed to support their work. This infrastructure consists of such components as integrated library systems, their associated online catalogs or discovery services, and self-check equipment, as well as a Web site and the various online tools and services…

  19. Managing Mission-Critical Infrastructure

    ERIC Educational Resources Information Center

    Breeding, Marshall

    2012-01-01

    In the library context, they depend on sophisticated business applications specifically designed to support their work. This infrastructure consists of such components as integrated library systems, their associated online catalogs or discovery services, and self-check equipment, as well as a Web site and the various online tools and services…

  20. Critical Infrastructure Rebuild Prioritization using Simulation Optimization

    DTIC Science & Technology

    2007-03-01

    the water and allowing the water to flow to the turbine. ( SEDA Renewable Energy Web site) 24 2.4.3 Oil infrastructure In the Wikipedia...Critical Infrastructure Protection Workshop, Frankfurt Germany, September 2003 SEDA Renewable Energy & Cogeneration, “Hydro Power,” September 2006

  1. Cyber Security and Critical Energy Infrastructure

    SciTech Connect

    Onyeji, Ijeoma; Bazilian, Morgan; Bronk, Chris

    2014-03-01

    Both the number and security implications of sophisticated cyber attacks on companies providing critical energy infrastructures are increasing. As power networks and, to a certain extent, oil and gas infrastructure both upstream and downstream, are becoming increasingly integrated with information communication technology systems, they are growing more susceptible to cyber attacks.

  2. Critical Infrastructures: Background, Policy, and Implementation

    DTIC Science & Technology

    2008-01-15

    set up groups within the federal government to develop and implement plans that would protect government -operated infrastructures and called for a...dialogue between government and the private sector to develop a National Infrastructure Assurance Plan that would protect all of the nation’s critical...16 Policy Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Government — Sector Coordination

  3. Critical Infrastructures: Background, Policy, and Implementation

    DTIC Science & Technology

    2008-04-02

    set up groups within the federal government to develop and implement plans that would protect government -operated infrastructures and called for a...dialogue between government and the private sector to develop a National Infrastructure Assurance Plan that would protect all of the nation’s critical...Policy Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Government — Sector Coordination

  4. Identifying, understanding, and analyzing critical infrastructure interdependencies.

    SciTech Connect

    Rinaldi, S. M.; Peerenboom, J. P.; Kelly, T. K.; Decision and Information Sciences

    2001-12-01

    The notion that our nation's critical infrastructures are highly interconnected and mutually dependent in complex ways, both physically and through a host of information and communications technologies (so-called 'cyberbased systems'), is more than an abstract, theoretical concept. As shown by the 1998 failure of the Galaxy 4 telecommunications satellite, the prolonged power crisis in California, and many other recent infrastructure disruptions, what happens to one infrastructure can directly and indirectly affect other infrastructures, impact large geographic regions and send ripples throughout the national a global economy. This article presents a conceptual framework for addressing infrastructure interdependencies that could serve as the basis for further understanding and scholarship in this important area. We use this framework to explore the challenges and complexities of interdependency. We set the stage for this discussion by explicitly defining the terms infrastructure, infrastructure dependencies, and infrastructure interdependencies and introducing the fundamental concept of infrastructures as complex adaptive systems. We then focus on the interrelated factors and system conditions that collectively define the six dimensions. Finally, we discuss some of the research challenges involved in developing, applying, and validating modeling and simulation methodologies and tools for infrastructure interdependency analysis.

  5. 76 FR 70730 - The Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-15

    ... SECURITY The Critical Infrastructure Partnership Advisory Council (CIPAC) AGENCY: National Protection and... Security (DHS) announced the establishment of the Critical Infrastructure Partnership Advisory Council... the critical infrastructure sectors defined by Homeland Security Presidential Directive 7 (HSPD-7)...

  6. 78 FR 66038 - Critical Infrastructure Partnership Advisory Council (CIPAC); Correction.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-04

    ... support and coordinate critical infrastructure security and resilience. The November 5, 2013, meeting will... resilience. Topics, such as Critical Infrastructure Security and Resilience and Cybersecurity, will...

  7. 76 FR 29775 - The Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-23

    ... resilience, reconstituting critical infrastructure assets and systems for both man-made as well as naturally... information. Organizational Structure: CIPAC members are organized into eighteen (18) critical infrastructure...

  8. 77 FR 44641 - Critical Infrastructure Private Sector Clearance Program Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-30

    ...: Once. Affected Public: Designated private sector employees of critical infrastructure entities or... SECURITY Critical Infrastructure Private Sector Clearance Program Request AGENCY: National Protection and... Programs Directorate (NPPD), Office of Infrastructure Protection (IP) will submit the following Information...

  9. 77 FR 64818 - The Critical Infrastructure Partnership Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... SECURITY The Critical Infrastructure Partnership Advisory Council AGENCY: National Protection and Programs Directorate, DHS. ACTION: Quarterly Critical Infrastructure Partnership Advisory Council membership update... Infrastructure Partnership Advisory Council (CIPAC) in a Federal Register Notice (71 FR 14930-14933) dated March...

  10. 77 FR 21989 - Critical Infrastructure Private Sector Clearance Program Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-12

    ... SECURITY Critical Infrastructure Private Sector Clearance Program Request AGENCY: National Protection and... Programs Directorate (NPPD), Office of Infrastructure Protection (IP) will submit the following Information... information provided. SUPPLEMENTARY INFORMATION: The Critical Infrastructure Private Sector Clearance Program...

  11. 76 FR 17935 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-31

    ... SECURITY Protected Critical Infrastructure Information (PCII) Stakeholder Survey AGENCY: National... Programs Directorate (NPPD), Office of Infrastructure Protection (IP) will submit the following Information... the Critical Infrastructure Information Act of 2002, (Sections 211-215, Title II, Subtitle B of the...

  12. Fuzzy architecture assessment for critical infrastructure resilience

    SciTech Connect

    Muller, George

    2012-12-01

    This paper presents an approach for the selection of alternative architectures in a connected infrastructure system to increase resilience of the overall infrastructure system. The paper begins with a description of resilience and critical infrastructure, then summarizes existing approaches to resilience, and presents a fuzzy-rule based method of selecting among alternative infrastructure architectures. This methodology includes considerations which are most important when deciding on an approach to resilience. The paper concludes with a proposed approach which builds on existing resilience architecting methods by integrating key system aspects using fuzzy memberships and fuzzy rule sets. This novel approach aids the systems architect in considering resilience for the evaluation of architectures for adoption into the final system architecture.

  13. Critical Infrastructure Information Disclosure and Homeland Security

    DTIC Science & Technology

    2002-08-31

    Information Disclosure and Homeland Security Updated August 31, 2002 John D. Moteff Specialist in Science and Technology Policy Resources, Science...share confidential business information, and the government is reluctant to share information that might compromise intelligence sources or...and exemption 4 ( confidential business information). Congress has considered several proposals to exempt critical infrastructure information from

  14. 76 FR 20995 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-14

    ... sharing threat, vulnerability, risk mitigation, and infrastructure continuity information. Organizational Structure: CIPAC members are organized into eighteen (18) critical infrastructure sectors. Within all of the...

  15. An agent-based microsimulation of critical infrastructure systems

    SciTech Connect

    BARTON,DIANNE C.; STAMBER,KEVIN L.

    2000-03-29

    US infrastructures provide essential services that support the economic prosperity and quality of life. Today, the latest threat to these infrastructures is the increasing complexity and interconnectedness of the system. On balance, added connectivity will improve economic efficiency; however, increased coupling could also result in situations where a disturbance in an isolated infrastructure unexpectedly cascades across diverse infrastructures. An understanding of the behavior of complex systems can be critical to understanding and predicting infrastructure responses to unexpected perturbation. Sandia National Laboratories has developed an agent-based model of critical US infrastructures using time-dependent Monte Carlo methods and a genetic algorithm learning classifier system to control decision making. The model is currently under development and contains agents that represent the several areas within the interconnected infrastructures, including electric power and fuel supply. Previous work shows that agent-based simulations models have the potential to improve the accuracy of complex system forecasting and to provide new insights into the factors that are the primary drivers of emergent behaviors in interdependent systems. Simulation results can be examined both computationally and analytically, offering new ways of theorizing about the impact of perturbations to an infrastructure network.

  16. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    SciTech Connect

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist

  17. 75 FR 60771 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-01

    ... SECURITY Critical Infrastructure Partnership Advisory Council (CIPAC) AGENCY: National Protection and..., Partnership and Outreach Division, Office of Infrastructure Protection, National Protection and Programs... Infrastructure Protection, National Protection and Programs Directorate, United States Department of Homeland...

  18. Security Economics and Critical National Infrastructure

    NASA Astrophysics Data System (ADS)

    Anderson, Ross; Fuloria, Shailendra

    There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure' against online attack. This is commonly interpreted to mean preventing online sabotage against utilities such as electricity,oil and gas, water, and sewage - including pipelines, refineries, generators, storage depots and transport facilities such as tankers and terminals. A consensus is emerging that the protection of such assets is more a matter of business models and regulation - in short, of security economics - than of technology. We describe the problems, and the state of play, in this paper. Industrial control systems operate in a different world from systems previously studied by security economists; we find the same issues (lock-in, externalities, asymmetric information and so on) but in different forms. Lock-in is physical, rather than based on network effects, while the most serious externalities result from correlated failure, whether from cascade failures, common-mode failures or simultaneous attacks. There is also an interesting natural experiment happening, in that the USA is regulating cyber security in the electric power industry, but not in oil and gas, while the UK is not regulating at all but rather encouraging industry's own efforts. Some European governments are intervening, while others are leaving cybersecurity entirely to plant owners to worry about. We already note some perverse effects of the U.S. regulation regime as companies game the system, to the detriment of overall dependability.

  19. 75 FR 48983 - The Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-12

    ... SECURITY The Critical Infrastructure Partnership Advisory Council (CIPAC) AGENCY: National Protection and... Security (DHS) announced the establishment of the Critical Infrastructure Partnership Advisory Council... membership update, (ii) instructions on how the public can obtain the CIPAC membership roster and other...

  20. 75 FR 21011 - Critical Infrastructure Partnership Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-22

    ... SECURITY Critical Infrastructure Partnership Advisory Council AGENCY: National Protection and Programs Directorate, DHS. ACTION: Notice of the Critical Infrastructure Partnership Advisory Council (CIPAC) charter... government officials and representatives of the community of owners and operators for each of the...

  1. 77 FR 32655 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-01

    ... SECURITY Critical Infrastructure Partnership Advisory Council (CIPAC) AGENCY: National Protection and... Security (DHS) announced the establishment of the Critical Infrastructure Partnership Advisory Council... Council (SLTTGCC). FOR FURTHER INFORMATION CONTACT: Larry May, Designated Federal Officer,...

  2. 78 FR 27113 - Version 5 Critical Infrastructure Protection Reliability Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-09

    ...; ] DEPARTMENT OF ENERGY Federal Energy Regulatory Commission 18 CFR Part 40 Version 5 Critical Infrastructure... 5 Critical Infrastructure Protection Reliability Standards, 143 FERC ] 61,055 (2013). This errata...

  3. Self-healing and Resilient Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Gustavsson, Rune; Ståhl, Björn

    The paper describes methods and tools addressing self-healing and resilience of critical infrastructures, specifically power and information networks. Our case study is based on challenges addressed in the ongoing EU project INTEGRAL aiming at integrating DES/RES in cell-based virtual utilities. We propose two experimental environments, EXP II and INSPECT to support a structured approach in identifying, implementing and monitoring suitable self-healing mechanisms entailing an increasing system resilience in our systems. Our approach is based on own results from earlier EU projects and selected approaches from other international projects such as NSF GENI in the US and EU efforts such as SmartGrids and ARECI.

  4. New concept of critical infrastructure strengthening

    SciTech Connect

    Gazizov, Talgat R.; Orlov, Pavel E.; Zabolotsky, Alexander M.; Kuksenko, Sergey P.

    2016-06-08

    Strengthening of critical infrastructure is considered. Modal reservation of electronics is proposed as a new concept of the strengthening. The concept combines a widely used cold backup and a recently proposed modal filtration. It makes electronics reliable as well as protected against electromagnetic interference, especially the ultra-wide band pulses. New printed circuit board structure is suggested for implementation of the proposed concept. Results of simulation in time and frequency domains are presented for the suggested structures. Considerable attenuation of dangerous excitations shows that the new concept and structure are promising.

  5. Volcanic ash impacts on critical infrastructure

    NASA Astrophysics Data System (ADS)

    Wilson, Thomas M.; Stewart, Carol; Sword-Daniels, Victoria; Leonard, Graham S.; Johnston, David M.; Cole, Jim W.; Wardman, Johnny; Wilson, Grant; Barnard, Scott T.

    2012-01-01

    Volcanic eruptions can produce a wide range of hazards. Although phenomena such as pyroclastic flows and surges, sector collapses, lahars and ballistic blocks are the most destructive and dangerous, volcanic ash is by far the most widely distributed eruption product. Although ash falls rarely endanger human life directly, threats to public health and disruption to critical infrastructure services, aviation and primary production can lead to significant societal impacts. Even relatively small eruptions can cause widespread disruption, damage and economic loss. Volcanic eruptions are, in general, infrequent and somewhat exotic occurrences, and consequently in many parts of the world, the management of critical infrastructure during volcanic crises can be improved with greater knowledge of the likely impacts. This article presents an overview of volcanic ash impacts on critical infrastructure, other than aviation and fuel supply, illustrated by findings from impact assessment reconnaissance trips carried out to a wide range of locations worldwide by our international research group and local collaborators. ‘Critical infrastructure’ includes those assets, frequently taken for granted, which are essential for the functioning of a society and economy. Electricity networks are very vulnerable to disruption from volcanic ash falls. This is particularly the case when fine ash is erupted because it has a greater tendency to adhere to line and substation insulators, where it can cause flashover (unintended electrical discharge) which can in turn cause widespread and disruptive outages. Weather conditions are a major determinant of flashover risk. Dry ash is not conductive, and heavy rain will wash ash from insulators, but light rain/mist will mobilise readily-soluble salts on the surface of the ash grains and lower the ash layer’s resistivity. Wet ash is also heavier than dry ash, increasing the risk of line breakage or tower/pole collapse. Particular issues for water

  6. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    NASA Astrophysics Data System (ADS)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  7. Neural Network Based Intrusion Detection System for Critical Infrastructures

    SciTech Connect

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  8. Critical infrastructure systems of systems assessment methodology.

    SciTech Connect

    Sholander, Peter E.; Darby, John L.; Phelan, James M.; Smith, Bryan; Wyss, Gregory Dane; Walter, Andrew; Varnado, G. Bruce; Depoy, Jennifer Mae

    2006-10-01

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies that separately consider physical security and cyber security. This research has developed a risk assessment methodology that explicitly accounts for both physical and cyber security, while preserving the traditional security paradigm of detect, delay, and respond. This methodology also accounts for the condition that a facility may be able to recover from or mitigate the impact of a successful attack before serious consequences occur. The methodology uses evidence-based techniques (which are a generalization of probability theory) to evaluate the security posture of the cyber protection systems. Cyber threats are compared against cyber security posture using a category-based approach nested within a path-based analysis to determine the most vulnerable cyber attack path. The methodology summarizes the impact of a blended cyber/physical adversary attack in a conditional risk estimate where the consequence term is scaled by a ''willingness to pay'' avoidance approach.

  9. Intelligent FRP retrofits for critical civil infrastructures

    NASA Astrophysics Data System (ADS)

    Jiang, Guoliang; Peters, Kara

    2007-04-01

    In this paper, the concept, modeling and preliminary testing of an intelligent FRP retrofit with self-monitoring capabilities for critical civil infrastructures are presented. This intelligent system is based on an easy-to-apply configuration of FRP pre-preg tapes with multiple stacked unidirectional layers of piezoelectric or SMA actuators and integrated optical fiber sensors. This intelligent retrofit will be able to not only monitor conditions including bonding of the FRP to the structure and opening of concrete cracks, but also minimize the crack opening and retard the progression of further FRP debonding. Towards this end, a computationally efficient two-dimensional shear stress-transfer model based on a simplified shear lag analysis is developed, with consideration of the fact that the stress transfer between the FRP, actuator and sensor layers in the intelligent system is complex. The effectiveness of this model is demonstrated through one numerical benchmark problem and one typical FRP configuration, with comparison of each to full threedimensional finite element models. The agreement between the two formulations is shown to be further improved by adjustment of the assumed shape functions. A preliminary experiment is also presented in which pre-fabricated optical fiber ribbons are embedded into the FRP strengthening of a full-scale concrete beam. Results from static loading test of the FRP strengthened beam show the feasibility of this technique for the self-monitoring FRP retrofits.

  10. Critical infrastructure monitoring using UAV imagery

    NASA Astrophysics Data System (ADS)

    Maltezos, Evangelos; Skitsas, Michael; Charalambous, Elisavet; Koutras, Nikolaos; Bliziotis, Dimitris; Themistocleous, Kyriacos

    2016-08-01

    The constant technological evolution in Computer Vision enabled the development of new techniques which in conjunction with the use of Unmanned Aerial Vehicles (UAVs) may extract high quality photogrammetric products for several applications. Dense Image Matching (DIM) is a Computer Vision technique that can generate a dense 3D point cloud of an area or object. The use of UAV systems and DIM techniques is not only a flexible and attractive solution to produce accurate and high qualitative photogrammetric results but also is a major contribution to cost effectiveness. In this context, this study aims to highlight the benefits of the use of the UAVs in critical infrastructure monitoring applying DIM. A Multi-View Stereo (MVS) approach using multiple images (RGB digital aerial and oblique images), to fully cover the area of interest, is implemented. The application area is an Olympic venue in Attica, Greece, at an area of 400 acres. The results of our study indicate that the UAV+DIM approach respond very well to the increasingly greater demands for accurate and cost effective applications when provided with, a 3D point cloud and orthomosaic.

  11. Critical Infrastructure Protection II, The International Federation for Information Processing, Volume 290.

    NASA Astrophysics Data System (ADS)

    Papa, Mauricio; Shenoi, Sujeet

    The information infrastructure -- comprising computers, embedded devices, networks and software systems -- is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: - Themes and Issues - Infrastructure Security - Control Systems Security - Security Strategies - Infrastructure Interdependencies - Infrastructure Modeling and Simulation This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.

  12. Critical Infrastructures: Background, Policy, and Implementation

    DTIC Science & Technology

    2008-01-15

    Directive set up groups within the federal government to develop and implement plans that would protect government -operated infrastructures and called for a...dialogue between government and the private sector to develop a National Infrastructure Assurance Plan that would protect all of the nation’s...16 Policy Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Government — Sector

  13. Network Randomization and Dynamic Defense for Critical Infrastructure Systems

    SciTech Connect

    Chavez, Adrian R.; Martin, Mitchell Tyler; Hamlet, Jason; Stout, William M.S.; Lee, Erik

    2015-04-01

    Critical Infrastructure control systems continue to foster predictable communication paths, static configurations, and unpatched systems that allow easy access to our nation's most critical assets. This makes them attractive targets for cyber intrusion. We seek to address these attack vectors by automatically randomizing network settings, randomizing applications on the end devices themselves, and dynamically defending these systems against active attacks. Applying these protective measures will convert control systems into moving targets that proactively defend themselves against attack. Sandia National Laboratories has led this effort by gathering operational and technical requirements from Tennessee Valley Authority (TVA) and performing research and development to create a proof-of-concept solution. Our proof-of-concept has been tested in a laboratory environment with over 300 nodes. The vision of this project is to enhance control system security by converting existing control systems into moving targets and building these security measures into future systems while meeting the unique constraints that control systems face.

  14. A Federal Response: The President's Critical Infrastructure Protection Board.

    ERIC Educational Resources Information Center

    Schmidt, Howard

    2002-01-01

    Outlines the U.S. Critical Infrastructure Protection Board's purpose, budget, principles, and priorities. Describes the board's role in coordinating all federal activities related to protection of information systems and networks supporting critical infrastructures. Also discusses its responsibility in creating a policy and road map for government…

  15. A Federal Response: The President's Critical Infrastructure Protection Board.

    ERIC Educational Resources Information Center

    Schmidt, Howard

    2002-01-01

    Outlines the U.S. Critical Infrastructure Protection Board's purpose, budget, principles, and priorities. Describes the board's role in coordinating all federal activities related to protection of information systems and networks supporting critical infrastructures. Also discusses its responsibility in creating a policy and road map for government…

  16. 77 FR 59203 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-26

    ... SECURITY Critical Infrastructure Partnership Advisory Council (CIPAC) AGENCY: National Protection and Programs Directorate, DHS. ACTION: Notice of CIPAC meeting. SUMMARY: The Critical Infrastructure... be open to the public. DATES: The CIPAC Plenary Meeting will be held on Wednesday, October 3, 2012...

  17. 76 FR 76021 - Critical Infrastructure Protection Month, 2011

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-06

    ... Infrastructure Protection Month, 2011 By the President of the United States of America A Proclamation From... stability, public health, or safety. This month, we affirm the fundamental importance of our critical... virtual or physical. During Critical Infrastructure Protection Month, we reflect on our responsibility...

  18. 78 FR 76986 - Version 5 Critical Infrastructure Protection Reliability Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-20

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF ENERGY Federal Energy Regulatory Commission 18 CFR Part 40 Version 5 Critical Infrastructure Protection Reliability... proceeding, Version 5 Critical Infrastructure Protection Reliability Standards, 145 FERC ] 61,160 (2013...

  19. Decontamination of Anthrax spores in critical infrastructure and critical assets.

    SciTech Connect

    Boucher, Raymond M.; Crown, Kevin K.; Tucker, Mark David; Hankins, Matthew Granholm

    2010-05-01

    Decontamination of anthrax spores in critical infrastructure (e.g., subway systems, major airports) and critical assets (e.g., the interior of aircraft) can be challenging because effective decontaminants can damage materials. Current decontamination methods require the use of highly toxic and/or highly corrosive chemical solutions because bacterial spores are very difficult to kill. Bacterial spores such as Bacillus anthracis, the infectious agent of anthrax, are one of the most resistant forms of life and are several orders of magnitude more difficult to kill than their associated vegetative cells. Remediation of facilities and other spaces (e.g., subways, airports, and the interior of aircraft) contaminated with anthrax spores currently requires highly toxic and corrosive chemicals such as chlorine dioxide gas, vapor- phase hydrogen peroxide, or high-strength bleach, typically requiring complex deployment methods. We have developed a non-toxic, non-corrosive decontamination method to kill highly resistant bacterial spores in critical infrastructure and critical assets. A chemical solution that triggers the germination process in bacterial spores and causes those spores to rapidly and completely change to much less-resistant vegetative cells that can be easily killed. Vegetative cells are then exposed to mild chemicals (e.g., low concentrations of hydrogen peroxide, quaternary ammonium compounds, alcohols, aldehydes, etc.) or natural elements (e.g., heat, humidity, ultraviolet light, etc.) for complete and rapid kill. Our process employs a novel germination solution consisting of low-cost, non-toxic and non-corrosive chemicals. We are testing both direct surface application and aerosol delivery of the solutions. A key Homeland Security need is to develop the capability to rapidly recover from an attack utilizing biological warfare agents. This project will provide the capability to rapidly and safely decontaminate critical facilities and assets to return them to

  20. Reliable Communication Models in Interdependent Critical Infrastructure Networks

    SciTech Connect

    Lee, Sangkeun; Chinthavali, Supriya; Shankar, Mallikarjun

    2016-01-01

    Modern critical infrastructure networks are becoming increasingly interdependent where the failures in one network may cascade to other dependent networks, causing severe widespread national-scale failures. A number of previous efforts have been made to analyze the resiliency and robustness of interdependent networks based on different models. However, communication network, which plays an important role in today's infrastructures to detect and handle failures, has attracted little attention in the interdependency studies, and no previous models have captured enough practical features in the critical infrastructure networks. In this paper, we study the interdependencies between communication network and other kinds of critical infrastructure networks with an aim to identify vulnerable components and design resilient communication networks. We propose several interdependency models that systematically capture various features and dynamics of failures spreading in critical infrastructure networks. We also discuss several research challenges in building reliable communication solutions to handle failures in these models.

  1. Toward Developing Genetic Algorithms to Aid in Critical Infrastructure Modeling

    SciTech Connect

    Not Available

    2007-05-01

    Today’s society relies upon an array of complex national and international infrastructure networks such as transportation, telecommunication, financial and energy. Understanding these interdependencies is necessary in order to protect our critical infrastructure. The Critical Infrastructure Modeling System, CIMS©, examines the interrelationships between infrastructure networks. CIMS© development is sponsored by the National Security Division at the Idaho National Laboratory (INL) in its ongoing mission for providing critical infrastructure protection and preparedness. A genetic algorithm (GA) is an optimization technique based on Darwin’s theory of evolution. A GA can be coupled with CIMS© to search for optimum ways to protect infrastructure assets. This includes identifying optimum assets to enforce or protect, testing the addition of or change to infrastructure before implementation, or finding the optimum response to an emergency for response planning. This paper describes the addition of a GA to infrastructure modeling for infrastructure planning. It first introduces the CIMS© infrastructure modeling software used as the modeling engine to support the GA. Next, the GA techniques and parameters are defined. Then a test scenario illustrates the integration with CIMS© and the preliminary results.

  2. 78 FR 29375 - Protected Critical Infrastructure Information (PCII) Office Self-Assessment Questionnaire

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-20

    ... critical infrastructure information not customarily in the public domain and related to the security of... SECURITY Protected Critical Infrastructure Information (PCII) Office Self- Assessment Questionnaire AGENCY... Protection and Programs Directorate (NPPD), Office of Infrastructure Protection (IP), Infrastructure...

  3. Critical Infrastructures: Background, Policy, and Implementation

    DTIC Science & Technology

    2009-11-12

    federal government to develop and implement plans that would protect government -operated infrastructures and called for a dialogue between government ...16 Government —Sector Coordination...State and local government capacities to maintain order and deliver minimum essential public services, • damage the private sector’s capability to

  4. 18 CFR 388.113 - Accessing critical energy infrastructure information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... energy infrastructure information. 388.113 Section 388.113 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY PROCEDURAL RULES INFORMATION AND REQUESTS § 388.113 Accessing critical energy infrastructure information. (a) Scope. This section governs access...

  5. 18 CFR 388.113 - Accessing critical energy infrastructure information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... energy infrastructure information. 388.113 Section 388.113 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY PROCEDURAL RULES INFORMATION AND REQUESTS § 388.113 Accessing critical energy infrastructure information. (a) Scope. This section governs access...

  6. 18 CFR 388.113 - Accessing critical energy infrastructure information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... energy infrastructure information. 388.113 Section 388.113 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY PROCEDURAL RULES INFORMATION AND REQUESTS § 388.113 Accessing critical energy infrastructure information. (a) Scope. This section governs access...

  7. 18 CFR 388.113 - Accessing critical energy infrastructure information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... energy infrastructure information. 388.113 Section 388.113 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY PROCEDURAL RULES INFORMATION AND REQUESTS § 388.113 Accessing critical energy infrastructure information. (a) Scope. This section governs access...

  8. 18 CFR 388.113 - Accessing critical energy infrastructure information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... energy infrastructure information. 388.113 Section 388.113 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY PROCEDURAL RULES INFORMATION AND REQUESTS § 388.113 Accessing critical energy infrastructure information. (a) Scope. This section governs access...

  9. 78 FR 66603 - Critical Infrastructure Security and Resilience Month, 2013

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-05

    ... Infrastructure Security and Resilience Month, we resolve to remain vigilant against foreign and domestic threats... resilience to threats from all hazards including terrorism and natural disasters, as well as cyber attacks... November 5, 2013 Part III The President Proclamation 9047--Critical Infrastructure Security and Resilience...

  10. Assessing Terrorist Motivations for Attacking Critical "Chemical" Infrastructure

    SciTech Connect

    Ackerman, G; Bale, J; Moran, K

    2004-12-14

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security, and way of life. One particular type of CI--that relating to chemicals--constitutes both an important element of our nation's infrastructure and a particularly attractive set of potential targets. This is primarily because of the large quantities of toxic industrial chemicals (TICs) it employs in various operations and because of the essential economic functions it serves. This study attempts to minimize some of the ambiguities that presently impede chemical infrastructure threat assessments by providing new insight into the key motivational factors that affect terrorist organizations propensity to attack chemical facilities. Prepared as a companion piece to the Center for Nonproliferation Studies August 2004 study--''Assessing Terrorist Motivations for Attacking Critical Infrastructure''--it investigates three overarching research questions: (1) why do terrorists choose to attack chemical-related infrastructure over other targets; (2) what specific factors influence their target selection decisions concerning chemical facilities; and (3) which, if any, types of groups are most inclined to attack chemical infrastructure targets? The study involved a multi-pronged research design, which made use of four discrete investigative techniques to answer the above questions as comprehensively as possible. These include: (1) a review of terrorism and threat assessment literature to glean expert consensus regarding terrorist interest in targeting chemical facilities; (2) the preparation of case studies to help identify internal group factors and contextual influences that have played a significant role in leading some terrorist groups to attack chemical facilities; (3) an examination of data from the Critical Infrastructure Terrorist Incident Catalog (CrITIC) to further illuminate the nature of terrorist attacks against chemical facilities to date; and (4

  11. 75 FR 75611 - Critical Infrastructure Protection Month, 2010

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-03

    ... Protection Month, we highlight the vast network of systems and structures that sustain the vigor and vitality..., we must work to empower communities, an integral part of critical infrastructure security, to...

  12. 76 FR 50487 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-15

    ... SECURITY Protected Critical Infrastructure Information (PCII) Stakeholder Survey AGENCY: National... Information (PCII) Stakeholder Survey. DHS previously published this ICR in the Federal Register on March 31... Federal, state, and local entities with homeland security duties. This survey is designed to...

  13. Critical Infrastructure: The National Asset Database

    DTIC Science & Technology

    2007-07-16

    business and finance centers, and more. The assets were selected by the newly formed Protective Services Division within the Office of Infrastructure...Banking and Finance , 669 Water, 3842 Telecommunications, 3020 Chemical/Hazardous Materials, 2963 Nuclear Pow er Plants, 178 Emergency Services...and population like New York, Texas, and California; and, fewer banking and finance centers are listed for New York than North Dakota. 19 Office of

  14. Risk Assessment Methodology for Protecting Our Critical Physical Infrastructures

    SciTech Connect

    BIRINGER,BETTY E.; DANNEELS,JEFFREY J.

    2000-12-13

    Critical infrastructures are central to our national defense and our economic well-being, but many are taken for granted. Presidential Decision Directive (PDD) 63 highlights the importance of eight of our critical infrastructures and outlines a plan for action. Greatly enhanced physical security systems will be required to protect these national assets from new and emerging threats. Sandia National Laboratories has been the lead laboratory for the Department of Energy (DOE) in developing and deploying physical security systems for the past twenty-five years. Many of the tools, processes, and systems employed in the protection of high consequence facilities can be adapted to the civilian infrastructure.

  15. Pandemic influenza and critical infrastructure dependencies: possible impact on hospitals.

    PubMed

    Itzwerth, Ralf L; Macintyre, C Raina; Shah, Smita; Plant, Aileen J

    2006-11-20

    Hospitals will be particularly challenged when pandemic influenza spreads. Within the health sector in general, existing pandemic plans focus on health interventions to control outbreaks. The critical relationship between the health sector and other sectors is not well understood and addressed. Hospitals depend on critical infrastructure external to the organisation itself. Existing plans do not adequately consider the complexity and interdependency of systems upon which hospitals rely. The failure of one such system can trigger a failure of another, causing cascading breakdowns. Health is only one of the many systems that struggle at maximum capacity during "normal" times, as current business models operate with no or minimal "excess" staff and have become irreducible operations. This makes interconnected systems highly vulnerable to acute disruptions, such as a pandemic. Companies use continuity plans and highly regulated business continuity management to overcome process interruptions. This methodology can be applied to hospitals to minimise the impact of a pandemic.

  16. Analysis of Critical Infrastructure Dependencies and Interdependencies

    SciTech Connect

    Petit, Frederic; Verner, Duane; Brannegan, David; Buehring, William; Dickinson, David; Guziel, Karen; Haffenden, Rebecca; Phillips, Julia; Peerenboom, James

    2015-06-01

    The report begins by defining dependencies and interdependencies and exploring basic concepts of dependencies in order to facilitate a common understanding and consistent analytical approaches. Key concepts covered include; Characteristics of dependencies: upstream dependencies, internal dependencies, and downstream dependencies; Classes of dependencies: physical, cyber, geographic, and logical; and Dimensions of dependencies: operating environment, coupling and response behavior, type of failure, infrastructure characteristics, and state of operations From there, the report proposes a multi-phase roadmap to support dependency and interdependency assessment activities nationwide, identifying a range of data inputs, analysis activities, and potential products for each phase, as well as key steps needed to progress from one phase to the next. The report concludes by outlining a comprehensive, iterative, and scalable framework for analyzing dependencies and interdependencies that stakeholders can integrate into existing risk and resilience assessment efforts.

  17. Seismic Barrier Protection of Critical Infrastructure

    NASA Astrophysics Data System (ADS)

    Haupt, R.; Liberman, V.; Rothschild, M.

    2016-12-01

    Each year, on average a major magnitude-8 earthquake strikes somewhere in the world. In addition, 10,000 earthquake related deaths occur annually, where collapsing buildings claim by far most lives. Moreover, in recent events, industry activity of oil extraction and wastewater reinjection are suspect to cause earthquake swarms that threaten high-value oil pipeline networks, U.S. oil storage reserves, and civilian homes. Earthquake engineering building structural designs and materials have evolved over many years to minimize the destructive effects of seismic surface waves. However, even under the best engineering practices, significant damage and numbers of fatalities can still occur. In this effort, we present a concept and approach to redirect and attenuate the ground motion amplitudes of earthquake surface waves by implementing an engineered subsurface seismic barrier. The barrier is comprised of a borehole array complex that impedes and diverts destructive surface waves (typically 2-10 km wavelengths). Computational 2D and 3D seismic wave propagation models developed at MIT Lincoln Laboratory suggest that the borehole array arrangement is critical to the redirection and self-interference reduction of broadband hazardous seismic waves in the vicinity of the structure to protect. For validity, the computational models are compared with data obtained from large bench-scale physical models that contain scaled borehole arrays and trenches. Small contact shakers generate elastic waves in solid media, while contact tri-axial accelerometer arrays measure the resultant wave fields. Field tests are presently being conducted to examine the seismic power reduction across a subsurface borehole array generated by controlled, far-field seismic sources. The sources include a weight drop and oriented seismic vibrational sources that generate low frequency surface and body waves. The pre-borehole condition at the site is measured first with a tri-axial geophone arrangement. The

  18. 78 FR 72755 - Version 5 Critical Infrastructure Protection Reliability Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-03

    ...Pursuant to section 215 of the Federal Power Act, the Commission approves the Version 5 Critical Infrastructure Protection Reliability Standards, CIP-002-5 through CIP-011-1, submitted by the North American Electric Reliability Corporation (NERC), the Commission- certified Electric Reliability Organization. The CIP version 5 Standards address the cyber security of the bulk electric system and are an improvement over the current Commission-approved CIP Reliability Standards. The CIP version 5 Standards adopt new cyber security controls and extend the scope of the systems that are protected by the CIP Reliability Standards. The Commission also approves nineteen new or revised definitions associated with the CIP version 5 Standards for inclusion in the Glossary of Terms Used in NERC Reliability Standards. In addition, the Commission directs NERC to develop modifications to the CIP version 5 Standards and submit informational filings.

  19. 3 CFR 8910 - Proclamation 8910 of November 30, 2012. Critical Infrastructure Protection and Resilience Month...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Infrastructure Protection and Resilience Month, 2012 8910 Proclamation 8910 Presidential Documents Proclamations Proclamation 8910 of November 30, 2012 Proc. 8910 Critical Infrastructure Protection and Resilience Month... way of life, and during Critical Infrastructure Protection and Resilience Month, we maintain...

  20. A Scalable Systems Approach for Critical Infrastructure Security

    SciTech Connect

    BAKER, ARNOLD B.; HUTCHINSON, ROBERT L.; EAGAN, ROBERT J.; MOONKA, AJOY K.; FALCONE, PATRICIA K.; SWINSON, MARK L.; HARRIS, JOE M.; WEBB, ERIK K.; HERRERA, GILBERT V.; WOODALL, TOMMY D.; HINES, W. CURTIS

    2002-04-01

    Critical infrastructures underpin the domestic security, health, safety and economic well being of the United States. They are large, widely dispersed, mostly privately owned systems operated under a mixture of federal, state and local government departments, laws and regulations. While there currently are enormous pressures to secure all aspects of all critical infrastructures immediately, budget realities limit available options. The purpose of this study is to provide a clear framework for systematically analyzing and prioritizing resources to most effectively secure US critical infrastructures from terrorist threats. It is a scalable framework (based on the interplay of consequences, threats and vulnerabilities) that can be applied at the highest national level, the component level of an individual infrastructure, or anywhere in between. This study also provides a set of key findings and a recommended approach for framework application. In addition, this study develops three laptop computer-based tools to assist with framework implementation-a Risk Assessment Credibility Tool, a Notional Risk Prioritization Tool, and a County Prioritization tool. This study's tools and insights are based on Sandia National Laboratories' many years of experience in risk, consequence, threat and vulnerability assessments, both in defense- and critical infrastructure-related areas.

  1. Synthesis centers as critical research infrastructure

    USGS Publications Warehouse

    Baron, Jill; Specht, Alison; Garnier, Eric; Bishop, Pamela; Campbell, C. Andrew; Davis, Frank W.; Fady, Bruno; Field, Dawn; Gross, Louis J.; Guru, Siddeswara M.; Halpern, Benjamin S; Hampton, Stephanie E.; Leavitt, Peter R.; Meagher, Thomas R.; Ometto, Jean; Parker, John N.; Price, Richard; Rawson, Casey H.; Rodrigo, Allen; Sheble, Laura A.; Winter, Marten

    2017-01-01

    investment to maximize benefits to science and society is justified. In particular, we argue that synthesis centers represent community infrastructure more akin to research vessels than to term-funded centers of science and technology (e.g., NSF Science and Technology Centers). Through our experience running synthesis centers and, in some cases, developing postfederal funding models, we offer our perspective on the purpose and value of synthesis centers. We present case studies of different outcomes of transition plans and argue for a fundamental shift in the conception of synthesis science and the strategic funding of these centers by government funding agencies.

  2. The European cooperative approach to securing critical information infrastructure.

    PubMed

    Purser, Steve

    2011-10-01

    This paper provides an overview of the EU approach to securing critical information infrastructure, as defined in the Action Plan contained in the Commission Communication of March 2009, entitled 'Protecting Europe from large-scale cyber-attacks and disruptions: enhancing preparedness, security and resilience' and further elaborated by the Communication of May 2011 on critical Information infrastructure protection 'Achievements and next steps: towards global cyber-security'. After explaining the need for pan-European cooperation in this area, the CIIP Action Plan is explained in detail. Finally, the current state of progress is summarised together with the proposed next steps.

  3. Optimal recovery sequencing for critical infrastructure resilience assessment.

    SciTech Connect

    Vugrin, Eric D.; Brown, Nathanael J. K.; Turnquist, Mark Alan

    2010-09-01

    Critical infrastructure resilience has become a national priority for the U. S. Department of Homeland Security. System resilience has been studied for several decades in many different disciplines, but no standards or unifying methods exist for critical infrastructure resilience analysis. This report documents the results of a late-start Laboratory Directed Research and Development (LDRD) project that investigated the identification of optimal recovery strategies that maximize resilience. To this goal, we formulate a bi-level optimization problem for infrastructure network models. In the 'inner' problem, we solve for network flows, and we use the 'outer' problem to identify the optimal recovery modes and sequences. We draw from the literature of multi-mode project scheduling problems to create an effective solution strategy for the resilience optimization model. We demonstrate the application of this approach to a set of network models, including a national railroad model and a supply chain for Army munitions production.

  4. 18 CFR 5.30 - Critical energy infrastructure information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 18 Conservation of Power and Water Resources 1 2011-04-01 2011-04-01 false Critical energy infrastructure information. 5.30 Section 5.30 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT INTEGRATED LICENSE...

  5. 18 CFR 5.30 - Critical energy infrastructure information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Critical energy infrastructure information. 5.30 Section 5.30 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT INTEGRATED LICENSE...

  6. 18 CFR 5.30 - Critical energy infrastructure information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 18 Conservation of Power and Water Resources 1 2013-04-01 2013-04-01 false Critical energy infrastructure information. 5.30 Section 5.30 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT INTEGRATED LICENSE...

  7. 18 CFR 5.30 - Critical energy infrastructure information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 18 Conservation of Power and Water Resources 1 2014-04-01 2014-04-01 false Critical energy infrastructure information. 5.30 Section 5.30 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT INTEGRATED LICENSE...

  8. 18 CFR 5.30 - Critical energy infrastructure information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Critical energy infrastructure information. 5.30 Section 5.30 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT INTEGRATED LICENSE...

  9. 78 FR 57644 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-19

    ... resiliency. Off-topic questions or comments will not be permitted or discussed. Please note that the public... security and resilience. The September 25, 2013, meeting will include topic- specific discussions focused on partnership efforts to enhance critical infrastructure resilience. Topics such as the...

  10. Examining Willingness to Attack Critical Infrastructure Online and Offline

    ERIC Educational Resources Information Center

    Holt, Thomas J.; Kilger, Max

    2012-01-01

    The continuing adoption of technologies by the general public coupled with the expanding reliance of critical infrastructures connected through the Internet has created unique opportunities for attacks by civilians and nation-states alike. Although governments are increasingly focusing on policies to deter nation-state level attacks, it is unclear…

  11. Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

    DTIC Science & Technology

    2015-05-01

    2014 Carnegie Mellon University Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure May 2015 Katie...Approach A Family of Cybersecurity Maturity Models Model Architecture • Domains • Scaling • Diagnostic Methodology Using the Model Relationship to NIST... Cybersecurity Framework 4 CMU – SEI – CERT Division Software Engineering Institute (SEI) • Federally funded research and development center based

  12. Geospatial decision support framework for critical infrastructure interdependency assessment

    NASA Astrophysics Data System (ADS)

    Shih, Chung Yan

    Critical infrastructures, such as telecommunications, energy, banking and finance, transportation, water systems and emergency services are the foundations of modern society. There is a heavy dependence on critical infrastructures at multiple levels within the supply chain of any good or service. Any disruptions in the supply chain may cause profound cascading effect to other critical infrastructures. A 1997 report by the President's Commission on Critical Infrastructure Protection states that a serious interruption in freight rail service would bring the coal mining industry to a halt within approximately two weeks and the availability of electric power could be reduced in a matter of one to two months. Therefore, this research aimed at representing and assessing the interdependencies between coal supply, transportation and energy production. A proposed geospatial decision support framework was established and applied to analyze interdependency related disruption impact. By utilizing the data warehousing approach, geospatial and non-geospatial data were retrieved, integrated and analyzed based on the transportation model and geospatial disruption analysis developed in the research. The results showed that by utilizing this framework, disruption impacts can be estimated at various levels (e.g., power plant, county, state, etc.) for preventative or emergency response efforts. The information derived from the framework can be used for data mining analysis (e.g., assessing transportation mode usages; finding alternative coal suppliers, etc.).

  13. Examining Willingness to Attack Critical Infrastructure Online and Offline

    ERIC Educational Resources Information Center

    Holt, Thomas J.; Kilger, Max

    2012-01-01

    The continuing adoption of technologies by the general public coupled with the expanding reliance of critical infrastructures connected through the Internet has created unique opportunities for attacks by civilians and nation-states alike. Although governments are increasingly focusing on policies to deter nation-state level attacks, it is unclear…

  14. 3 CFR 8607 - Proclamation 8607 of November 30, 2010. Critical Infrastructure Protection Month, 2010

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... from hazards or attack. These critical infrastructure partnerships continue to build their information..., which will make our physical and cyber infrastructure more resilient. Working together, we can raise...

  15. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Protected Critical Infrastructure Information... SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.4 Protected Critical Infrastructure Information... Assistant Secretary for Infrastructure Protection. (b) Appointment of a PCII Program Manager. The Under...

  16. Spatial risk assessment for critical network infrastructure using sensitivity analysis

    NASA Astrophysics Data System (ADS)

    Möderl, Michael; Rauch, Wolfgang

    2011-12-01

    The presented spatial risk assessment method allows for managing critical network infrastructure in urban areas under abnormal and future conditions caused e.g., by terrorist attacks, infrastructure deterioration or climate change. For the spatial risk assessment, vulnerability maps for critical network infrastructure are merged with hazard maps for an interfering process. Vulnerability maps are generated using a spatial sensitivity analysis of network transport models to evaluate performance decrease under investigated thread scenarios. Thereby parameters are varied according to the specific impact of a particular threat scenario. Hazard maps are generated with a geographical information system using raster data of the same threat scenario derived from structured interviews and cluster analysis of events in the past. The application of the spatial risk assessment is exemplified by means of a case study for a water supply system, but the principal concept is applicable likewise to other critical network infrastructure. The aim of the approach is to help decision makers in choosing zones for preventive measures.

  17. Volcanic hazard impacts to critical infrastructure: A review

    NASA Astrophysics Data System (ADS)

    Wilson, G.; Wilson, T. M.; Deligne, N. I.; Cole, J. W.

    2014-10-01

    Effective natural hazard risk assessment requires the characterisation of both hazards and vulnerabilities of exposed elements. Volcanic hazard assessment is at an advanced state and is a considerable focus of volcanic scientific inquiry, whereas comprehensive vulnerability assessment is lacking. Cataloguing and analysing volcanic impacts provide insight on likely societal and physical vulnerabilities during future eruptions. This paper reviews documented disruption and physical damage of critical infrastructure elements resulting from four volcanic hazards (tephra fall, pyroclastic density currents, lava flows and lahars) of eruptions in the last 100 years. We define critical infrastructure as including energy sector infrastructure, water supply and wastewater networks, transportation routes, communications, and critical components. Common trends of impacts and vulnerabilities are summarised, which can be used to assess and reduce volcanic risk for future eruptions. In general, tephra falls cause disruption to these infrastructure sectors, reducing their functionality, whilst flow hazards (pyroclastic density currents, lava flows and lahars) are more destructive causing considerable permanent damage. Volcanic risk assessment should include quantification of vulnerabilities and we challenge the volcanology community to address this through the implementation of a standardised vulnerability assessment methodology and the development and use of fragility functions, as has been successfully implemented in other natural hazard fields.

  18. Safety impacts of bicycle infrastructure: A critical review.

    PubMed

    DiGioia, Jonathan; Watkins, Kari Edison; Xu, Yanzhi; Rodgers, Michael; Guensler, Randall

    2017-06-01

    This paper takes a critical look at the present state of bicycle infrastructure treatment safety research, highlighting data needs. Safety literature relating to 22 bicycle treatments is examined, including findings, study methodologies, and data sources used in the studies. Some preliminary conclusions related to research efficacy are drawn from the available data and findings in the research. While the current body of bicycle safety literature points toward some defensible conclusions regarding the safety and effectiveness of certain bicycle treatments, such as bike lanes and removal of on-street parking, the vast majority treatments are still in need of rigorous research. Fundamental questions arise regarding appropriate exposure measures, crash measures, and crash data sources. This research will aid transportation departments with regard to decisions about bicycle infrastructure and guide future research efforts toward understanding safety impacts of bicycle infrastructure. Copyright © 2017 Elsevier Ltd and National Safety Council. All rights reserved.

  19. Increasing impacts of climate extremes on critical infrastructures in Europe

    NASA Astrophysics Data System (ADS)

    Forzieri, Giovanni; Bianchi, Alessandra; Feyen, Luc; Silva, Filipe Batista e.; Marin, Mario; Lavalle, Carlo; Leblois, Antoine

    2016-04-01

    The projected increases in exposure to multiple climate hazards in many regions of Europe, emphasize the relevance of a multi-hazard risk assessment to comprehensively quantify potential impacts of climate change and develop suitable adaptation strategies. In this context, quantifying the future impacts of climatic extremes on critical infrastructures is crucial due to their key role for human wellbeing and their effects on the overall economy. Critical infrastructures describe the existing assets and systems that are essential for the maintenance of vital societal functions, health, safety, security, economic or social well-being of people, and the disruption or destruction of which would have a significant impact as a result of the failure to maintain those functions. We assess the direct damages of heat and cold waves, river and coastal flooding, droughts, wildfires and windstorms to energy, transport, industry and social infrastructures in Europe along the 21st century. The methodology integrates in a coherent framework climate hazard, exposure and vulnerability components. Overall damage is expected to rise up to 38 billion €/yr, ten time-folds the current climate damage, with drastic variations in risk scenarios. Exemplificative are drought and heat-related damages that could represent 70% of the overall climate damage in 2080s versus the current 12%. Many regions, prominently Southern Europe, will likely suffer multiple stresses and systematic infrastructure failures due to climate extremes if no suitable adaptation measures will be taken.

  20. The monitoring of critical infrastructures using microwave radiometers

    NASA Astrophysics Data System (ADS)

    Peichl, Markus; Dill, Stephan; Jirousek, Matthias; Süß, Helmut

    2008-04-01

    Microwaves in the range of 1-300 GHz are used in many respects for remote sensing applications. Besides radar sensors particularly passive measurement methods are used for two-dimensional imaging. The imaging of persons and critical infrastructures for security purposes is of increasing interest particularly for transportation services or public events. Personnel inspection with respect to weapons and explosives becomes an important mean concerning terrorist attacks. Microwaves can penetrate clothing and a multitude of other materials and allow the detection of hidden objects by monitoring dielectric anomalies. Passive microwave remote sensing allows a daytime independent non-destructive observation and examination of the objects of interest under nearly all weather conditions without artificial exposure of persons or areas. The performance of millimeter-wave radiometric imaging with respect to wide-area surveillance is investigated. Measurement results of some typical critical infrastructure scenarios are discussed. Requirements for future operational systems are outlined exploring a radiometric range equation.

  1. People at risk - nexus critical infrastructure and society

    NASA Astrophysics Data System (ADS)

    Heiser, Micha; Thaler, Thomas; Fuchs, Sven

    2016-04-01

    Strategic infrastructure networks include the highly complex and interconnected systems that are so vital to a city or state that any sudden disruption can result in debilitating impacts on human life, the economy and the society as a whole. Recently, various studies have applied complex network-based models to study the performance and vulnerability of infrastructure systems under various types of attacks and hazards - a major part of them is, particularly after the 9/11 incident, related to terrorism attacks. Here, vulnerability is generally defined as the performance drop of an infrastructure system under a given disruptive event. The performance can be measured by different metrics, which correspond to various levels of resilience. In this paper, we will address vulnerability and exposure of critical infrastructure in the Eastern Alps. The Federal State Tyrol is an international transport route and an essential component of the north-south transport connectivity in Europe. Any interruption of the transport flow leads to incommensurable consequences in terms of indirect losses, since the system does not feature redundant elements at comparable economic efficiency. Natural hazard processes such as floods, debris flows, rock falls and avalanches, endanger this infrastructure line, such as large flood events in 2005 or 2012, rock falls 2014, which had strong impacts to the critical infrastructure, such as disruption of the railway lines (in 2005 and 2012), highways and motorways (in 2014). The aim of this paper is to present how critical infrastructures as well as communities and societies are vulnerable and can be resilient against natural hazard risks and the relative cascading effects to different compartments (industrial, infrastructural, societal, institutional, cultural, etc.), which is the dominant by the type of hazard (avalanches, torrential flooding, debris flow, rock falls). Specific themes will be addressed in various case studies to allow cross

  2. Critical Infrastructure Consequence Modeler v 0.5.0 Beta

    SciTech Connect

    Chavez, Lozanne; & Richardson, Bryan

    2009-08-11

    Implements previously developed methodology to calculate total disutility to an organization caused by impacts imposed upon the physical system in question (electric power transmission system, water system, etc).Critical infrastructure utility personnel will use this as a planning tool to determine where system weaknesses are and where improvements should be made such that the consequence of some impact is no longer higher than acceptable.

  3. A comprehensive R&D Approach for Critical Infrastructure Protection

    NASA Astrophysics Data System (ADS)

    Krauthammer, Theodor

    2007-03-01

    This paper provides background on requirements, capabilities and research recommendations for protecting critical infrastructure systems. These activities are needed to develop much more effective solutions to problems that can be currently addressed primarily with conservative, and/or empirical approaches. The expected contributions will have a profound effect on national and international defense and security. Although essential work must be conducted in several important areas, this paper is primarily focused on scientific and technical issues.

  4. Controlling Infrastructure Costs: Right-Sizing the Mission Control Facility

    NASA Technical Reports Server (NTRS)

    Martin, Keith; Sen-Roy, Michael; Heiman, Jennifer

    2009-01-01

    Johnson Space Center's Mission Control Center is a space vehicle, space program agnostic facility. The current operational design is essentially identical to the original facility architecture that was developed and deployed in the mid-90's. In an effort to streamline the support costs of the mission critical facility, the Mission Operations Division (MOD) of Johnson Space Center (JSC) has sponsored an exploratory project to evaluate and inject current state-of-the-practice Information Technology (IT) tools, processes and technology into legacy operations. The general push in the IT industry has been trending towards a data-centric computer infrastructure for the past several years. Organizations facing challenges with facility operations costs are turning to creative solutions combining hardware consolidation, virtualization and remote access to meet and exceed performance, security, and availability requirements. The Operations Technology Facility (OTF) organization at the Johnson Space Center has been chartered to build and evaluate a parallel Mission Control infrastructure, replacing the existing, thick-client distributed computing model and network architecture with a data center model utilizing virtualization to provide the MCC Infrastructure as a Service. The OTF will design a replacement architecture for the Mission Control Facility, leveraging hardware consolidation through the use of blade servers, increasing utilization rates for compute platforms through virtualization while expanding connectivity options through the deployment of secure remote access. The architecture demonstrates the maturity of the technologies generally available in industry today and the ability to successfully abstract the tightly coupled relationship between thick-client software and legacy hardware into a hardware agnostic "Infrastructure as a Service" capability that can scale to meet future requirements of new space programs and spacecraft. This paper discusses the benefits

  5. An Overview of Swiss Research on Vulnerability of Critical Infrastructure

    NASA Astrophysics Data System (ADS)

    Kröger, Wolfgang

    Throughout history, mankind has developed technologies and integrated them into systems to be deployed for human welfare and security — albeit at the price of becoming dependent on these very same technologies and systems. In recent decades these systems have grown into a large-scale array of interconnected networks that span large distances and are, for the most part, privately owned or operated. These so-called infrastructures function collaboratively and synergistically to produce and/or distribute a continuous flow of goods and services. Infrastructures so vital to a country that their incapacity or destruction would have a debilitating impact on the health, safety, security, economy and social well being of the country, including the effective functioning the government1, are labelled critical. The failure of only a single infrastructure or an interruption of its service can inflict significant damage on a society and its economy. However, cross-boundary cascading bears the potential for multi-infrastructural collapse with unprecedented consequences.

  6. Critical Infrastructure Interdependency Modeling: A Survey of U.S. and International Research

    SciTech Connect

    Not Available

    2006-08-01

    The Nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes, and organizations across which these goods and services move are called "critical infrastructures".1 This statement is as true in the U.S. as in any country in the world. Recent world events such as the 9-11 terrorist attacks, London bombings, and gulf coast hurricanes have highlighted the importance of stable electric, gas and oil, water, transportation, banking and finance, and control and communication infrastructure systems. Be it through direct connectivity, policies and procedures, or geospatial proximity, most critical infrastructure systems interact. These interactions often create complex relationships, dependencies, and interdependencies that cross infrastructure boundaries. The modeling and analysis of interdependencies between critical infrastructure elements is a relatively new and very important field of study. The U.S. Technical Support Working Group (TSWG) has sponsored this survey to identify and describe this current area of research including the current activities in this field being conducted both in the U.S. and internationally. The main objective of this study is to develop a single source reference of critical infrastructure interdependency modeling tools (CIIMT) that could be applied to allow users to objectively assess the capabilities of CIIMT. This information will provide guidance for directing research and development to address the gaps in development. The results will inform researchers of the TSWG Infrastructure Protection Subgroup of research and development efforts and allow a more focused approach to addressing the needs of CIIMT end-user needs. This report first presents the field of infrastructure interdependency analysis, describes the survey methodology, and presents the leading research efforts in both a cumulative table and through individual datasheets. Data was

  7. Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.

    SciTech Connect

    Dawson, Lon Andrew; Stinebaugh, Jennifer A.

    2010-04-01

    The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

  8. Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection

    NASA Astrophysics Data System (ADS)

    Düssel, Patrick; Gehl, Christian; Laskov, Pavel; Bußer, Jens-Uwe; Störmann, Christof; Kästner, Jan

    With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical infrastructures are exposed to a multitude of serious threats that may give rise to severe damage for life and assets without the implementation of proper safeguards. Thus, we propose a method that is capable to reliably detect unknown, exploit-based attacks on cyber-critical infrastructures carried out over the network. We illustrate the effectiveness of the proposed method by conducting experiments on network traffic that can be found in modern industrial control systems. Moreover, we provide results of a throughput measuring which demonstrate the real-time capabilities of our system.

  9. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... Program administration. (a) Preparedness Directorate Program Management. The Secretary of...

  10. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    SciTech Connect

    Suski, N; Wuest, C

    2011-02-04

    Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre

  11. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2013-01-01 2013-01-01 false Protected Critical Infrastructure...

  12. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2014-01-01 2014-01-01 false Protected Critical Infrastructure...

  13. 18 CFR 375.313 - Delegations to the Critical Energy Infrastructure Information Coordinator.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Critical Energy Infrastructure Information Coordinator. 375.313 Section 375.313 Conservation of Power and... COMMISSION Delegations § 375.313 Delegations to the Critical Energy Infrastructure Information Coordinator... requests for critical energy infrastructure information as defined in § 388.113(c)(1). (b) Make...

  14. Challenges in the Protection of US Critical Infrastructure in the Cyber Realm

    DTIC Science & Technology

    2014-05-22

    CHALLENGES IN THE PROTECTION OF US CRITICAL INFRASTRUCTURE IN THE CYBER REALM A Monograph by Lieutenant Colonel (GS) Jan Trobisch...Title: Challenges in the Protection of US Critical Infrastructure in the Cyber Realm Approved by...References to this study should include the foregoing statement.) ii ABSTRACT CHALLENGES IN THE PROTECTION OF US CRITICAL INFRASTRUCTURE IN THE

  15. No Dark Corners: Defending Against Insider Threats to Critical Infrastructure

    DTIC Science & Technology

    2009-09-01

    criminals were aborted, and Kelling did not credit this phenomenon in his theory ( Levitt & Dubner, 2005). Since Kelling did not offer his theory as a...telecommunications utility. (Dr. Ted Lewis, author of Critical Infrastructure Protection in Homeland Security and one of my instructors, rates these...article.jsp ?ml_action=getarticle&articleID=R0409F&pageNumber=1&ml_subscriber =true&uid=24509483&aid=R0409F&rid=24600531&eom=1 Levitt , S. D. & Dubner, S. J

  16. Critical infrastructure: impacts of natural hazards and consequences

    NASA Astrophysics Data System (ADS)

    Petrova, Elena

    2014-05-01

    Critical infrastructure such as oil and gas pipelines, transmission facilities, heat-, and water supply, lines of communications, roads, railways as well as air and water transport play the key role in social and economic development of every country. Therefore, accidents causing failures and breakdowns of critical infrastructure facilities have the most drastic consequences for the society, economy, and environment. For example, road accidents cause the highest number of fatalities and injuries all over the world, especially in the middle-income countries. The so-called "blackouts" or accidental losses of electric power and power outages entail serious social troubles and heavy economic losses. The pipeline ruptures and oil-tanker crashes accompanied by oil releases cause the most severe environmental and large material damages. Critical infrastructure facilities are most vulnerable to the impacts of natural hazards that trigger many accidents in them especially in the regions most at natural risk. The Russian Federation has more than 2.6 million km of transmission facilities, 940,000 km of roads, 102,000 km of inland waterways, 86,000 km of railways, and more than 70,000 km of trunk pipelines. Many facilities are beyond of their service life and need reconstruction. A very high level of deterioration and "human factor" are the main cause of accidents, ruptures, and crashes. However, natural hazards and disasters also play an essential (sometimes a leading) role in triggering or magnifying accidents in these objects. Thus, natural factors cause more than 70 percent of all "blackouts", about 20 percent of accidents at heat- and water supply systems and water accidents, five percent of pipeline ruptures, and about two to three percent of air crashes, road, and railway accidents. The influence of natural factors is stronger in the North-Western and Central parts of the European Russia, in Krasnodarsky Territory (South of Russia) and in Far East that are more exposed

  17. System Dynamics Approach for Critical Infrastructure and Decision Support. A Model for a Potable Water System.

    NASA Astrophysics Data System (ADS)

    Pasqualini, D.; Witkowski, M.

    2005-12-01

    The Critical Infrastructure Protection / Decision Support System (CIP/DSS) project, supported by the Science and Technology Office, has been developing a risk-informed Decision Support System that provides insights for making critical infrastructure protection decisions. The system considers seventeen different Department of Homeland Security defined Critical Infrastructures (potable water system, telecommunications, public health, economics, etc.) and their primary interdependencies. These infrastructures have been modeling in one model called CIP/DSS Metropolitan Model. The modeling approach used is a system dynamics modeling approach. System dynamics modeling combines control theory and the nonlinear dynamics theory, which is defined by a set of coupled differential equations, which seeks to explain how the structure of a given system determines its behavior. In this poster we present a system dynamics model for one of the seventeen critical infrastructures, a generic metropolitan potable water system (MPWS). Three are the goals: 1) to gain a better understanding of the MPWS infrastructure; 2) to identify improvements that would help protect MPWS; and 3) to understand the consequences, interdependencies, and impacts, when perturbations occur to the system. The model represents raw water sources, the metropolitan water treatment process, storage of treated water, damage and repair to the MPWS, distribution of water, and end user demand, but does not explicitly represent the detailed network topology of an actual MPWS. The MPWS model is dependent upon inputs from the metropolitan population, energy, telecommunication, public health, and transportation models as well as the national water and transportation models. We present modeling results and sensitivity analysis indicating critical choke points, negative and positive feedback loops in the system. A general scenario is also analyzed where the potable water system responds to a generic disruption.

  18. Control Infrastructure for a Pulsed Ion Accelerator

    SciTech Connect

    Persaud, A.; Regis, M. J.; Stettler, M. W.; Vytla, V. K.

    2016-07-27

    We report on updates to the accelerator controls for the Neutralized Drift Compression Experiment II, a pulsed induction-type accelerator for heavy ions. The control infrastructure is built around a LabVIEW interface combined with an Apache Cassandra backend for data archiving. Recent upgrades added the storing and retrieving of device settings into the database, as well as ZeroMQ as a message broker that replaces LabVIEW's shared variables. Converting to ZeroMQ also allows easy access via other programming languages, such as Python.

  19. Challenges to Seismic Hazard Analysis of Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Klügel, J.

    2005-12-01

    Based on the background of the review of a large scale probabilistic seismic hazard analysis (PSHA) performed in Switzerland for the sites of Swiss nuclear power plants- the PEGASOS project (2000-2004) - challenges to seismic hazard analysis of critical infrastructures from the perspective of a professional safety analyst are discussed. The PEGASOS study was performed to provide a meaningful input for the update of the plant specific PRAs (Probabilistic Risk Assessment) of Swiss nuclear power plants. Earlier experience had shown that the results of these studies to a large extend are driven by the results of the seismic hazard analysis. The PEGASOS-study was performed in full compliance with the procedures developed by the Senior Seismic Hazard Analysis Committee (SSHAC) of U.S.A (SSHAC, 1997) developed for the treatment of uncertainties by the use of a structured expert elicitation process. The preliminary results derived from the project did show an unexpected amount of uncertainty and were regarded as not suitable for direct application. A detailed review of the SSHAC-methodology revealed a number of critical issues with respect to the treatment of uncertainties and the mathematical models applied, which will be presented in the paper. The most important issued to be discussed are: * The ambiguous solution of PSHA-logic trees * The inadequate mathematical treatment of the results of expert elicitations based on the assumption of bias free expert estimates * The problems associated with the "think model" of the separation of epistemic and aleatory uncertainties * The consequences of the ergodic assumption used to justify the transfer of attenuation equations of other regions to the region of interest. Based on these observations methodological questions with respect to the development of a risk-consistent design basis for new nuclear power plants as required by the U.S. NRC RG 1.165 will be evaluated. As an principal alternative for the development of a

  20. Applications of UAVs for Remote Sensing of Critical Infrastructure

    NASA Technical Reports Server (NTRS)

    Wegener, Steve; Brass, James; Schoenung, Susan

    2003-01-01

    The surveillance of critical facilities and national infrastructure such as waterways, roadways, pipelines and utilities requires advanced technological tools to provide timely, up to date information on structure status and integrity. Unmanned Aerial Vehicles (UAVs) are uniquely suited for these tasks, having large payload and long duration capabilities. UAVs also have the capability to fly dangerous and dull missions, orbiting for 24 hours over a particular area or facility providing around the clock surveillance with no personnel onboard. New UAV platforms and systems are becoming available for commercial use. High altitude platforms are being tested for use in communications, remote sensing, agriculture, forestry and disaster management. New payloads are being built and demonstrated onboard the UAVs in support of these applications. Smaller, lighter, lower power consumption imaging systems are currently being tested over coffee fields to determine yield and over fires to detect fire fronts and hotspots. Communication systems that relay video, meteorological and chemical data via satellite to users on the ground in real-time have also been demonstrated. Interest in this technology for infrastructure characterization and mapping has increased dramatically in the past year. Many of the UAV technological developments required for resource and disaster monitoring are being used for the infrastructure and facility mapping activity. This paper documents the unique contributions from NASA;s Environmental Research Aircraft and Sensor Technology (ERAST) program to these applications. ERAST is a UAV technology development effort by a consortium of private aeronautical companies and NASA. Details of demonstrations of UAV capabilities currently underway are also presented.

  1. Applications of UAVs for Remote Sensing of Critical Infrastructure

    NASA Technical Reports Server (NTRS)

    Wegener, Steve; Brass, James; Schoenung, Susan

    2003-01-01

    The surveillance of critical facilities and national infrastructure such as waterways, roadways, pipelines and utilities requires advanced technological tools to provide timely, up to date information on structure status and integrity. Unmanned Aerial Vehicles (UAVs) are uniquely suited for these tasks, having large payload and long duration capabilities. UAVs also have the capability to fly dangerous and dull missions, orbiting for 24 hours over a particular area or facility providing around the clock surveillance with no personnel onboard. New UAV platforms and systems are becoming available for commercial use. High altitude platforms are being tested for use in communications, remote sensing, agriculture, forestry and disaster management. New payloads are being built and demonstrated onboard the UAVs in support of these applications. Smaller, lighter, lower power consumption imaging systems are currently being tested over coffee fields to determine yield and over fires to detect fire fronts and hotspots. Communication systems that relay video, meteorological and chemical data via satellite to users on the ground in real-time have also been demonstrated. Interest in this technology for infrastructure characterization and mapping has increased dramatically in the past year. Many of the UAV technological developments required for resource and disaster monitoring are being used for the infrastructure and facility mapping activity. This paper documents the unique contributions from NASA;s Environmental Research Aircraft and Sensor Technology (ERAST) program to these applications. ERAST is a UAV technology development effort by a consortium of private aeronautical companies and NASA. Details of demonstrations of UAV capabilities currently underway are also presented.

  2. 3 CFR 13636 - Executive Order 13636 of February 12, 2013. Improving Critical Infrastructure Cybersecurity

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... national security information, include the dissemination of classified reports to critical infrastructure... infrastructure sectors. This voluntary information sharing program will provide classified cyber threat and... Executive Agent for the Classified National Security Information Program created under Executive Order 13549...

  3. Risk assessment for physical and cyber attacks on critical infrastructures.

    SciTech Connect

    Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.; Wyss, Gregory Dane; Varnado, G. Bruce; Depoy, Jennifer Mae

    2005-08-01

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results of a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.

  4. Controlled Hydrogen Fleet and Infrastructure Demonstration Project

    SciTech Connect

    Dr. Scott Staley

    2010-03-31

    This program was undertaken in response to the US Department of Energy Solicitation DE-PS30-03GO93010, resulting in this Cooperative Agreement with the Ford Motor Company and BP to demonstrate and evaluate hydrogen fuel cell vehicles and required fueling infrastructure. Ford initially placed 18 hydrogen fuel cell vehicles (FCV) in three geographic regions of the US (Sacramento, CA; Orlando, FL; and southeast Michigan). Subsequently, 8 advanced technology vehicles were developed and evaluated by the Ford engineering team in Michigan. BP is Ford's principal partner and co-applicant on this project and provided the hydrogen infrastructure to support the fuel cell vehicles. BP ultimately provided three new fueling stations. The Ford-BP program consists of two overlapping phases. The deliverables of this project, combined with those of other industry consortia, are to be used to provide critical input to hydrogen economy commercialization decisions by 2015. The program's goal is to support industry efforts of the US President's Hydrogen Fuel Initiative in developing a path to a hydrogen economy. This program was designed to seek complete systems solutions to address hydrogen infrastructure and vehicle development, and possible synergies between hydrogen fuel electricity generation and transportation applications. This project, in support of that national goal, was designed to gain real world experience with Hydrogen powered Fuel Cell Vehicles (H2FCV) 'on the road' used in everyday activities, and further, to begin the development of the required supporting H2 infrastructure. Implementation of a new hydrogen vehicle technology is, as expected, complex because of the need for parallel introduction of a viable, available fuel delivery system and sufficient numbers of vehicles to buy fuel to justify expansion of the fueling infrastructure. Viability of the fuel structure means widespread, affordable hydrogen which can return a reasonable profit to the fuel provider, while

  5. Trust and Reputation Management for Critical Infrastructure Protection

    NASA Astrophysics Data System (ADS)

    Caldeira, Filipe; Monteiro, Edmundo; Simões, Paulo

    Today's Critical Infrastructures (CI) depend of Information and Communication Technologies (ICT) to deliver their services with the required level of quality and availability. ICT security plays a major role in CI protection and risk prevention for single and also for interconnected CIs were cascading effects might occur because of the interdependencies that exist among different CIs. This paper addresses the problem of ICT security in interconnected CIs. Trust and reputation management using the Policy Based Management paradigm is the proposed solution to be applied at the CI interconnection points for information exchange. The proposed solution is being applied to the Security Mediation Gateway being developed in the European FP7 MICIE project, to allow for information exchange among interconnected CIs.

  6. Federated Modelling and Simulation for Critical Infrastructure Protection

    NASA Astrophysics Data System (ADS)

    Rome, Erich; Langeslag, Peter; Usov, Andrij

    Modelling and simulation is an important tool for Critical Infrastructure (CI) dependency analysis, for testing methods for risk reduction, and as well for the evaluation of past failures. Moreover, interaction of such simulations with external threat models, e.g., a river flood model, or economic models enable consequence analysis and thus may assist in what-if decision-making processes. The simulation of complex scenarios involving several different CI sectors requires the usage of heterogeneous federated simulations of CIs. However, common standards for modelling and interoperability of such federated CI simulations are missing. Also, creating the required abstract models from CIs and other data, setting up the individual federate simulators and integrating all subsystems is a time-consuming and complicated task that requires substantial know-how and resources. In this chapter, we outline applications and benefit of federated modelling, simulation and analysis (MS&A) for Critical Infrastructure Protection (CIP). We review the state of the art in federated MS&A for CIP and categorise common approaches and interoperability concepts like central and lateral coupling of simulators. As examples for the latter two concepts, we will present in more detail an interoperability standard from the military domain, HLA, and an approach developed in the DIESIS project. Special emphasis will also be put on describing the problem of synchronising systems with different time models. Also, we will briefly assess the state of transferring MS&A for CIP research results to practical application by comparing the situations in the USA and in Europe.

  7. Safety issues in cultural heritage management and critical infrastructures management

    NASA Astrophysics Data System (ADS)

    Soldovieri, Francesco; Masini, Nicola; Alvarez de Buergo, Monica; Dumoulin, Jean

    2013-12-01

    This special issue is the fourth of its kind in Journal of Geophysics and Engineering , containing studies and applications of geophysical methodologies and sensing technologies for the knowledge, conservation and security of products of human activity ranging from civil infrastructures to built and cultural heritage. The first discussed the application of novel instrumentation, surface and airborne remote sensing techniques, as well as data processing oriented to both detection and characterization of archaeological buried remains and conservation of cultural heritage (Eppelbaum et al 2010). The second stressed the importance of an integrated and multiscale approach for the study and conservation of architectural, archaeological and artistic heritage, from SAR to GPR to imaging based diagnostic techniques (Masini and Soldovieri 2011). The third enlarged the field of analysis to civil engineering structures and infrastructures, providing an overview of the effectiveness and the limitations of single diagnostic techniques, which can be overcome through the integration of different methods and technologies and/or the use of robust and novel data processing techniques (Masini et al 2012). As a whole, the special issue put in evidence the factors that affect the choice of diagnostic strategy, such as the material, the spatial characteristics of the objects or sites, the value of the objects to be investigated (cultural or not), the aim of the investigation (knowledge, conservation, restoration) and the issues to be addressed (monitoring, decay assessment). In order to complete the overview of the application fields of sensing technologies this issue has been dedicated to monitoring of cultural heritage and critical infrastructures to address safety and security issues. Particular attention has been paid to the data processing methods of different sensing techniques, from infrared thermography through GPR to SAR. Cascini et al (2013) present the effectiveness of a

  8. Economics in Criticality and Restoration of Energy Infrastructures.

    SciTech Connect

    Boyd, Gale A.; Flaim, Silvio J.; Folga, Stephen M.; Gotham, Douglas J.; McLamore, Michael R.; Novak, Mary H.; Roop, Joe M.; Rossmann, Charles G.; Shamsuddin, Shabbir A.; Zeichner, Lee M.; Stamber, Kevin L.

    2005-03-01

    Economists, systems analysts, engineers, regulatory specialists, and other experts were assembled from academia, the national laboratories, and the energy industry to discuss present restoration practices (many have already been defined to the level of operational protocols) in the sectors of the energy infrastructure as well as other infrastructures, to identify whether economics, a discipline concerned with the allocation of scarce resources, is explicitly or implicitly a part of restoration strategies, and if there are novel economic techniques and solution methods that could be used help encourage the restoration of energy services more quickly than present practices or to restore service more efficiently from an economic perspective. AcknowledgementsDevelopment of this work into a coherent product with a useful message has occurred thanks to the thoughtful support of several individuals:Kenneth Friedman, Department of Energy, Office of Energy Assurance, provided the impetus for the work, as well as several suggestions and reminders of direction along the way. Funding from DOE/OEA was critical to the completion of this effort.Arnold Baker, Chief Economist, Sandia National Laboratories, and James Peerenboom, Director, Infrastructure Assurance Center, Argonne National Laboratory, provided valuable contacts that helped to populate the authoring team with the proper mix of economists, engineers, and systems and regulatory specialists to meet the objectives of the work.Several individuals provided valuable review of the document at various stages of completion, and provided suggestions that were valuable to the editing process. This list of reviewers includes Jeffrey Roark, Economist, Tennessee Valley Authority; James R. Dalrymple, Manager of Transmission System Services and Transmission/Power Supply, Tennessee Valley Authority; William Mampre, Vice President, EN Engineering; Kevin Degenstein, EN Engineering; and Patrick Wilgang, Department of Energy, Office of

  9. Onsite and Electric Backup Capabilities at Critical Infrastructure Facilities in the United States

    SciTech Connect

    Phillips, Julia A.; Wallace, Kelly E.; Kudo, Terence Y.; Eto, Joseph H.

    2016-04-01

    The following analysis, conducted by Argonne National Laboratory’s (Argonne’s) Risk and Infrastructure Science Center (RISC), details an analysis of electric power backup of national critical infrastructure as captured through the Department of Homeland Security’s (DHS’s) Enhanced Critical Infrastructure Program (ECIP) Initiative. Between January 1, 2011, and September 2014, 3,174 ECIP facility surveys have been conducted. This study focused first on backup capabilities by infrastructure type and then expanded to infrastructure type by census region.

  10. 78 FR 16861 - The Critical Infrastructure Partnership Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-19

    ... mitigation, and infrastructure continuity information. Organizational Structure: CIPAC members are organized... organizations. CIPAC membership is organizational. Multiple individuals may participate in CIPAC activities...

  11. The Virtual Observatory as Critical Scientific Cyber Infrastructure.

    NASA Astrophysics Data System (ADS)

    Fox, P.

    2006-12-01

    Virtual Observatories can provide access to vast stores of scientific data: observations and models as well as services to analyze, visualize and assimilate multiple data sources. As these electronic resource become widely used, there is potential to improve the efficiency, interoperability, collaborative potential, and impact of a wide range of interdisciplinary scientific research. In addition, we know that as the diversity of collaborative science and volume of accompanying data and data generators/consumers grows so do the challenges. In order for Virtual Observatories to realize their potential and become indispensible infrastructure, social, political and technical challenges need to be addressed concerning (at least) roles and responsibilities, data and services policies, representations and interoperability of services, data search, access, and usability. In this presentation, we discuss several concepts and instances of the Virtual Observatory and related projects that may, and may not, be meeting the abovementioned challanges. We also argue that science driven needs and architecture development are critical in the development of sustainable (and thus agile) cyberinfrastructure. Finally we some present or emerging candidate technologies and organizational constructs that will need to be pursued.

  12. A threat analysis framework as applied to critical infrastructures in the Energy Sector.

    SciTech Connect

    Michalski, John T.; Duggan, David Patrick

    2007-09-01

    The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be used to identify the elements required to quantify threats against critical infrastructure assets and provide a means of distributing actionable threat information to critical infrastructure entities for the protection of infrastructure assets. This document identifies and describes five key elements needed to perform a comprehensive analysis of threat: the identification of an adversary, the development of generic threat profiles, the identification of generic attack paths, the discovery of adversary intent, and the identification of mitigation strategies.

  13. Cybersecurity: The Nation’s Greatest Threat to Critical Infrastructure

    DTIC Science & Technology

    2013-03-01

    Information Technology , Postal and Shipping, Banking and Finance, Communications , the Defense Industrial Base, Government 6 Facilities, National...organizations, and the private sector. Because the globally interconnected digital information and “ communications infrastructure underpin almost every...Policy Review: Assuring a Trusted and Resilient Information and Communications Infrastructure.” 28 http://www.whitehouse.gov/assets/documents

  14. Operations Research Support for Critical Infrastructure Resilience in the Province of British Columbia

    DTIC Science & Technology

    2012-10-01

    OPERATIONS RESEARCH SUPPORT FOR CRITICAL INFRASTRUCTURE RESILIENCE IN THE PROVINCE OF BRITISH COLUMBIA Lynne Genik...October 2012 - 1 - OPERATIONS RESEARCH SUPPORT FOR CRITICAL INFRASTRUCTURE RESILIENCE IN THE PROVINCE...OF BRITISH COLUMBIA Lynne Genik, MSc Operations Research Scientist DRDC Centre for Security Science 222 Nepean St, Ottawa, ON K1A0A2 1-613-943

  15. The Impact of Process Capability on Service Reliability for Critical Infrastructure Providers

    ERIC Educational Resources Information Center

    Houston, Clemith J., Jr.

    2013-01-01

    This study investigated the relationship between organizational processes that have been identified as promoting resiliency and their impact on service reliability within the scope of critical infrastructure providers. The importance of critical infrastructure to the nation is evident from the body of research and is supported by instances where…

  16. The Impact of Process Capability on Service Reliability for Critical Infrastructure Providers

    ERIC Educational Resources Information Center

    Houston, Clemith J., Jr.

    2013-01-01

    This study investigated the relationship between organizational processes that have been identified as promoting resiliency and their impact on service reliability within the scope of critical infrastructure providers. The importance of critical infrastructure to the nation is evident from the body of research and is supported by instances where…

  17. Advanced simulation for analysis of critical infrastructure : abstract cascades, the electric power grid, and Fedwire.

    SciTech Connect

    Glass, Robert John, Jr.; Stamber, Kevin Louis; Beyeler, Walter Eugene

    2004-08-01

    Critical Infrastructures are formed by a large number of components that interact within complex networks. As a rule, infrastructures contain strong feedbacks either explicitly through the action of hardware/software control, or implicitly through the action/reaction of people. Individual infrastructures influence others and grow, adapt, and thus evolve in response to their multifaceted physical, economic, cultural, and political environments. Simply put, critical infrastructures are complex adaptive systems. In the Advanced Modeling and Techniques Investigations (AMTI) subgroup of the National Infrastructure Simulation and Analysis Center (NISAC), we are studying infrastructures as complex adaptive systems. In one of AMTI's efforts, we are focusing on cascading failure as can occur with devastating results within and between infrastructures. Over the past year we have synthesized and extended the large variety of abstract cascade models developed in the field of complexity science and have started to apply them to specific infrastructures that might experience cascading failure. In this report we introduce our comprehensive model, Polynet, which simulates cascading failure over a wide range of network topologies, interaction rules, and adaptive responses as well as multiple interacting and growing networks. We first demonstrate Polynet for the classical Bac, Tang, and Wiesenfeld or BTW sand-pile in several network topologies. We then apply Polynet to two very different critical infrastructures: the high voltage electric power transmission system which relays electricity from generators to groups of distribution-level consumers, and Fedwire which is a Federal Reserve service for sending large-value payments between banks and other large financial institutions. For these two applications, we tailor interaction rules to represent appropriate unit behavior and consider the influence of random transactions within two stylized networks: a regular homogeneous array and a

  18. Identifying Cybersecurity Risks to Critical Infrastructure Act of 2012

    THOMAS, 112th Congress

    Rep. Clarke, Yvette D. [D-NY-11

    2012-07-26

    08/15/2012 Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. Identifying Cybersecurity Risks to Critical Infrastructure Act of 2012

    THOMAS, 112th Congress

    Rep. Clarke, Yvette D. [D-NY-11

    2012-07-26

    08/15/2012 Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  20. Identifying Cybersecurity Risks to Critical Infrastructure Act of 2012

    THOMAS, 112th Congress

    Rep. Clarke, Yvette D. [D-NY-11

    2012-07-26

    House - 08/15/2012 Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Cyber-Physical Systems for Critical Infrastructure Protection: A Wireless Sensor Network Application for Electric Grid Monitoring

    NASA Astrophysics Data System (ADS)

    Saint, Martin

    Critical infrastructure includes resources which are essential to the function of society. Despite an increased focus on protecting U.S. critical infrastructure, some sectors including the electric grid are more vulnerable than ever. Existing critical infrastructure protection (CIP) regulations and the monitoring and control systems used to achieve them have not met performance expectations. This indicates that the next generation of grid control should explore new architectures. This thesis explores the question of whether a cyber-physical system in the form of wireless sensor networks can be used to improve CIP. We examine efforts by others to design a wireless sensor module for monitoring transmission and distribution lines, and note that this work includes little information about the performance of the communications subsystem. Laboratory testing of throughput and reliability for one example communication network are undertaken here, along with consideration of the short message service as one alternative for backhauling sensor data.

  2. Developing Your Evaluation Plans: A Critical Component of Public Health Program Infrastructure.

    PubMed

    Lavinghouze, S Rene; Snyder, Kimberly

    A program's infrastructure is often cited as critical to public health success. The Component Model of Infrastructure (CMI) identifies evaluation as essential under the core component of engaged data. An evaluation plan is a written document that describes how to monitor and evaluate a program, as well as how to use evaluation results for program improvement and decision making. The evaluation plan clarifies how to describe what the program did, how it worked, and why outcomes matter. We use the Centers for Disease Control and Prevention's (CDC) "Framework for Program Evaluation in Public Health" as a guide for developing an evaluation plan. Just as using a roadmap facilitates progress on a long journey, a well-written evaluation plan can clarify the direction your evaluation takes and facilitate achievement of the evaluation's objectives.

  3. Recovery from chemical, biological, and radiological incidents. Critical infrastructure and economic impact considerations

    SciTech Connect

    Franco, David Oliver; Yang, Lynn I.; Hammer, Ann E.

    2012-06-01

    To restore regional lifeline services and economic activity as quickly as possible after a chemical, biological or radiological incident, emergency planners and managers will need to prioritize critical infrastructure across many sectors for restoration. In parallel, state and local governments will need to identify and implement measures to promote reoccupation and economy recovery in the region. This document provides guidance on predisaster planning for two of the National Disaster Recovery Framework Recovery Support Functions: Infrastructure Systems and Economic Recovery. It identifies key considerations for infrastructure restoration, outlines a process for prioritizing critical infrastructure for restoration, and identifies critical considerations for promoting regional economic recovery following a widearea disaster. Its goal is to equip members of the emergency preparedness community to systematically prioritize critical infrastructure for restoration, and to develop effective economic recovery plans in preparation for a widearea CBR disaster.

  4. The impact of natural hazard on critical infrastructure systems: definition of an ontology

    NASA Astrophysics Data System (ADS)

    Dimauro, Carmelo; Bouchon, Sara; Frattini, Paolo; Giusto, Claudia

    2013-04-01

    According to the Council of the European Union Directive (2008), 'critical infrastructure' means an asset, system or part thereof which is essential for the maintenance of vital societal functions, health, safety, security, economic or social well-being of people, and the disruption or destruction of which would have a significant impact as a result of the failure to maintain those functions. Critical infrastructure networks are exposed to natural events, such as floods, storms, landslides, earthquakes, etc. Recent natural disasters show that socio-economic consequences can be very much aggravated by the impact on these infrastructures. Though, there is still a lack of a recognized approach or methodology to assess the vulnerability of critical infrastructure assets against natural threats. The difficulty to define such an approach is increased by the need to consider a very high number of natural events, which differ in nature, magnitude and probability, as well as the need to assess the vulnerability of a high variety of infrastructure assets (e.g. bridges, roads, tunnels, pipelines, etc.) To meet this challenge, the objective of the THREVI2 EU-CIPS project is to create a database linking the relationships between natural hazards and critical infrastructure assets. The query of the database will allow the end-users (critical infrastructure protection authorities and operators) to identify the relevant scenarios according to the own priorities and criteria. The database builds on an ontology optimized for the assessment of the impact of threats on critical infrastructures. The ontology aims at capturing the existing knowledge on natural hazards, critical infrastructures assets and their related vulnerabilities. Natural phenomena that can threaten critical infrastructures are classified as "events", and organized in a genetic-oriented hierarchy. The main attributes associated to each event are the probability, the magnitude and the "modus". The modus refers to the

  5. Controlled Hydrogen Fleet and Infrastructure Analysis (Presentation)

    SciTech Connect

    Wipke, K.; Sprik, S.; Kurtz, J.; Ramsden, T.; Ainscough, C.; Saur, G.

    2012-05-01

    This is a presentation about the Fuel Cell Electric Vehicle Learning Demo, a 7-year project and the largest single FCEV and infrastructure demonstration in the world to date. Information such as its approach, technical accomplishments and progress; collaborations and future work are discussed.

  6. CP corrosion control of municipal infrastructure

    SciTech Connect

    Gummow, R.A.

    2000-02-01

    Since its introduction in 1824, cathodic protection (CP) technology has developed to become a fundamental tool for preventing corrosion on municipal infrastructure. Potable water storage tanks and piping, prestressed concrete cylinder pipe, reinforced concrete structures, bridges, parking structures, underground fuel tanks, and effluent treatment clarifiers now benefit from this technology.

  7. 77 FR 35700 - Protected Critical Infrastructure Information (PCII) Program Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-14

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF HOMELAND...), National Protection and Programs Directorate (NPPD), Office of Infrastructure Protection (IP... DHS/NPPD/IP/IICD, 245 Murray Lane, SW., Mailstop 0602, Arlington, VA 20598-0602. Email requests should...

  8. 2007 National Small Business Conference: Critical Infrastructure Opportunities

    DTIC Science & Technology

    2007-05-18

    Panel: Effective Infrastructure Marketing to the Federal Government Mr. Wayne Simpson, Deputy Director, Office of Small Business, Department of...Mr. Gale Burkett, Chairman and CEO, GB Tech, Inc. Mr. Wayne Simpson, Deputy Director, Office of Small Business, Department...Special Projects Spanky Kirsch Director Agency and Int’l Liaison Randy Zeller & Lil Ramirez Director of Research Director of Innovation Director of

  9. 'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State

    SciTech Connect

    Miles McQueen; Annarita Giani

    2011-09-01

    This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhanced resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.

  10. Critical Infrastructure for Ocean Research and Societal Needs in 2030

    NASA Astrophysics Data System (ADS)

    Glickson, D.; Barron, E. J.; Fine, R. A.; Bellingham, J. G.; Boss, E.; Boyle, E. A.; Edwards, M.; Johnson, K. S.; Kelley, D. S.; Kite-Powell, H.; Ramberg, S. E.; Rudnick, D. L.; Schofield, O.; Tamburri, M.; Wiebe, P. H.; Wright, D. J.; Committee on an Ocean Infrastructure StrategyU. S. Ocean Research in 2030

    2011-12-01

    At the request of the Subcommittee on Ocean Science and Technology, an expert committee was convened by the National Research Council to identify major research questions anticipated to be at the forefront of ocean science in 2030, define categories of infrastructure that should be included in planning, provide advice on criteria and processes that could be used to set priorities, and recommend ways to maximize the value of investments in ocean infrastructure. The committee identified 32 future ocean research questions in four themes: enabling stewardship of the environment, protecting life and property, promoting economic vitality, and increasing fundamental scientific understanding. Many of the questions reflect challenging, multidisciplinary science questions that are clearly relevant now and are likely to take decades to solve. U.S. ocean research will require a growing suite of ocean infrastructure for a range of activities, such as high quality, sustained time series observations and autonomous monitoring at a broad range of spatial and temporal scales. A coordinated national plan for making future strategic investments will be needed and should be based upon known priorities and reviewed every 5-10 years. After assessing trends in ocean infrastructure and technology development, the committee recommended implementing a comprehensive, long-term research fleet plan in order to retain access to the sea; continuing U.S. capability to access fully and partially ice-covered seas; supporting innovation, particularly the development of biogeochemical sensors; enhancing computing and modeling capacity and capability; establishing broadly accessible data management facilities; and increasing interdisciplinary education and promoting a technically-skilled workforce. They also recommended that development, maintenance, or replacement of ocean research infrastructure assets should be prioritized in terms of societal benefit. Particular consideration should be given to

  11. Critical Infrastructure for Ocean Research and Societal Needs in 2030

    SciTech Connect

    National Research Council

    2011-04-22

    The United States has jurisdiction over 3.4 million square miles of ocean expanse greater than the land area of all fifty states combined. This vast marine area offers researchers opportunities to investigate the ocean's role in an integrated Earth system, but also presents challenges to society, including damaging tsunamis and hurricanes, industrial accidents, and outbreaks of waterborne diseases. The 2010 Gulf of Mexico Deepwater Horizon oil spill and 2011 Japanese earthquake and tsunami are vivid reminders that a broad range of infrastructure is needed to advance our still-incomplete understanding of the ocean. The National Research Council (NRC)'s Ocean Studies Board was asked by the National Science and Technology Council's Subcommittee on Ocean Science and Technology, comprised of 25 U.S. government agencies, to examine infrastructure needs for ocean research in the year 2030. This request reflects concern, among a myriad of marine issues, over the present state of aging and obsolete infrastructure, insufficient capacity, growing technological gaps, and declining national leadership in marine technological development; issues brought to the nation's attention in 2004 by the U.S. Commission on Ocean Policy. A 15-member committee of experts identified four themes that encompass 32 future ocean research questions enabling stewardship of the environment, protecting life and property, promoting economic vitality, and increasing fundamental scientific understanding. Many of the questions in the report (e.g., sea level rise, sustainable fisheries, the global water cycle) reflect challenging, multidisciplinary science questions that are clearly relevant today, and are likely to take decades of effort to solve. As such, U.S. ocean research will require a growing suite of ocean infrastructure for a range of activities, such as high quality, sustained time series observations or autonomous monitoring at a broad range of spatial and temporal scales. Consequently, a

  12. The ISTIMES project: a new integrated system for monitoring critical transport infrastructures interested by natural hazards

    NASA Astrophysics Data System (ADS)

    Proto, Monica; Massimo, Bavusi; Francesco, Soldovieri

    2010-05-01

    measurements. The integration of electromagnetic technologies with new ICT information and telecommunications systems enables remotely controlled monitoring and surveillance and real time data imaging of the critical transport infrastructures. Thus, the proposal will concern also with the development of tools for handling, analysing and processing large data volume (Information Fusion) and then providing information and performing behaviour prediction in a quick, easy and intuitive way (Situation Awareness). The proposal is based on several independent non-invasive imaging technologies based on electromagnetic sensing. Sensor cross validation, synergy and new data fusion and correlation schemes will permit a multi-method, multi-resolution and multi-scale electromagnetic detection and monitoring of surface and subsurface changes of the infrastructure. According to GMES and European Spatial Data Infrastructure (ESDI) initiatives, the system will adopt open architectures and will make efforts to achieve full interoperability. The system will be tested on two very challenging test beds such as: a highway-bridge and a railway tunnel. The system will be based on clear end-user requirements, coming from representative end-users and technological choices will be based on a long term cost-benefit analysis. Then, a dissemination plan was included into the project to encourage a wide range of public institutions and private companies to evaluate and adopt our approach for real-time control and distributed monitoring also in the more general framework of critical and civil infrastructure management and protection. Finally, an exploitation plan will develop for the commercialization of any derived technology, software, or monitoring concepts. ISTIMES project is carried out by an international partnership formed by nine partners coming from seven countries: Tecnologie per le Osservazioni della Terra (TeRN), Elsag Datamat (ED) and Dipartimento della Protezione Civile (DPC) from Italy

  13. Implementing Compstat Principles Into Critical Infrastructure Protection And Improvement

    DTIC Science & Technology

    2016-12-01

    evaluating different strategies for improving resilience.”73 Bruce Shaller is a CI researcher at New York University’s (NYU) Wagner School who...New York’s Mobility and Highway Infrastructure Needs for 2005-2010. (New York: NYU Wagner Rudin Center for Transportation Policy & Management, 2005...up on all projects. The Rudin Center for Transportation Policy and Management at New York University’s Wagner School also explores challenges in

  14. Arid Green Infrastructure for Water Control and Conservation ...

    EPA Pesticide Factsheets

    Green infrastructure is an approach to managing wet weather flows using systems and practices that mimic natural processes. It is designed to manage stormwater as close to its source as possible and protect the quality of receiving waters. Although most green infrastructure practices were first developed in temperate climates, green infrastructure also can be a cost-effective approach to stormwater management and water conservation in arid and semi-arid regions, such as those found in the western and southwestern United States. Green infrastructure practices can be applied at the site, neighborhood and watershed scales. In addition to water management and conservation, implementing green infrastructure confers many social and economic benefits and can address issues of environmental justice. The U.S. Environmental Protection Agency (EPA) commissioned a literature review to identify the state-of-the science practices dealing with water control and conservation in arid and semi-arid regions, with emphasis on these regions in the United States. The search focused on stormwater control measures or practices that slow, capture, treat, infiltrate and/or store runoff at its source (i.e., green infrastructure). The material in Chapters 1 through 3 provides background to EPA’s current activities related to the application of green infrastructure practices in arid and semi-arid regions. An introduction to the topic of green infrastructure in arid and semi-arid regions i

  15. Arid Green Infrastructure for Water Control and Conservation ...

    EPA Pesticide Factsheets

    Green infrastructure is an approach to managing wet weather flows using systems and practices that mimic natural processes. It is designed to manage stormwater as close to its source as possible and protect the quality of receiving waters. Although most green infrastructure practices were first developed in temperate climates, green infrastructure also can be a cost-effective approach to stormwater management and water conservation in arid and semi-arid regions, such as those found in the western and southwestern United States. Green infrastructure practices can be applied at the site, neighborhood and watershed scales. In addition to water management and conservation, implementing green infrastructure confers many social and economic benefits and can address issues of environmental justice. The U.S. Environmental Protection Agency (EPA) commissioned a literature review to identify the state-of-the science practices dealing with water control and conservation in arid and semi-arid regions, with emphasis on these regions in the United States. The search focused on stormwater control measures or practices that slow, capture, treat, infiltrate and/or store runoff at its source (i.e., green infrastructure). The material in Chapters 1 through 3 provides background to EPA’s current activities related to the application of green infrastructure practices in arid and semi-arid regions. An introduction to the topic of green infrastructure in arid and semi-arid regions i

  16. An Ontology-Based Approach to Blind Spot Revelation in Critical Infrastructure Protection Planning

    NASA Astrophysics Data System (ADS)

    Blackwell, Joshua; Tolone, William J.; Lee, Seok-Won; Xiang, Wei-Ning; Marsh, Lydia

    One widely perceived yet poorly understood phenomenon in the practice of critical infrastructure protection is that of blind spots. These are certain aspects of the interrelationships among different critical infrastructure systems (CI systems) that could trigger catastrophe across CI systems but are concealed from planners, and discovered only in the aftermath of a crisis. In this paper, we discuss the sources of blind spots, and explore the feasibility of various techniques to help reveal blind spots.

  17. An Overview of Pilot Projects in Support of Critical Infrastructure Resilience

    DTIC Science & Technology

    2015-03-25

    An Overview of Pilot Projects in Support of Critical Infrastructure Resilience Lynne Genik, MSc Critical Infrastructure Resilience Portfolio...Portfolio Manager paul.chouinard@drdc-rddc.gc.ca Abstract — This paper describes two pilot projects undertaken in the Province of British Columbia (BC) by...EMBC) and local communities. The pilot projects occurred between May 2012 and September 2013 with three communities of population ranging from 5000 to

  18. Approaches for assessment of vulnerability of critical infrastructures to weather-related hazards

    NASA Astrophysics Data System (ADS)

    Eidsvig, Unni; Uzielli, Marco; Vidar Vangelsten, Bjørn

    2016-04-01

    Critical infrastructures are essential components for the modern society to maintain its function, and malfunctioning of one of the critical infrastructure systems may have far-reaching consequences. Climate changes may lead to increase in frequency and intensity of weather-related hazards, creating challenges for the infrastructures. This paper outlines approaches to assess vulnerability posed by weather-related hazards to infrastructures. The approaches assess factors that affect the probability of a malfunctioning of the infrastructure should a weather-related threat occur, as well factors that affect the societal consequences of the infrastructure malfunctioning. Even if vulnerability factors are normally very infrastructure specific and hazard dependent, generic factors could be defined and analyzed. For the vulnerability and resilience of the infrastructure, such factors include e.g. robustness, buffer capacity, protection, quality, age, adaptability and transparency. For the vulnerability of the society in relation to the infrastructure, such factors include e.g. redundancy, substitutes and cascading effects. A semi-quantitative, indicator-based approach is proposed, providing schemes for ranking of the most important vulnerability indicators relevant for weather-related hazards on a relative scale. The application of the indicators in a semi-quantitative risk assessment is also demonstrated. In addition, a quantitative vulnerability model is proposed in terms of vulnerability (representing degree of loss) as a function of intensity, which is adaptable to different types of degree of loss (e.g. fraction of infrastructure users that lose their service, fraction of repair costs to full reconstruction costs). The vulnerability model can be calibrated with empirical data using deterministic calibration or a variety of probabilistic calibration approaches to account for the uncertainties within the model. The research leading to these results has received funding

  19. Evaluation of Critical Infrastructure in the Event of Earthquake: A Case Study of Delhi

    NASA Astrophysics Data System (ADS)

    prasad, Suraj

    2016-04-01

    With changing paradigms of disaster preparedness, the safety and security of critical infrastructure in the event of a geo-hazard has become increasingly important. In a developing and densely populated country like India, which is vulnerable to many different geo-hazards, a lack of clear policy directive regarding safety of such infrastructure could be especially damaging both in terms of life and property. The problem is most acute in India's mega cities, where inefficient infrastructure means that facilities like transportation, communication, and electricity generation are obsolete and vulnerable to sudden disruptions. The present study takes the case of the National Capital Territory of Delhi and attempts to examine the critical infrastructures of the city in the event of an earthquake. Delhi lies in a very active seismic zone with various faults in and around the city. The Government of India has classified Delhi in Zone 4 (High Risk Zone) based on past and expected seismic activities in the Indo-Gangetic Plains. With a population of over 20 Million in the Urban Agglomeration of Delhi, any major earthquake in an already overstretched infrastructure could have a devastating impact. This study will test the critical infrastructures of the city in terms of their disaster preparedness and suggest ways and measures to increase the same. Keywords: Geo-hazards, Critical Infrastructure, vulnerable, Earthquakes, Delhi

  20. 76 FR 58730 - Version 4 Critical Infrastructure Protection Reliability Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-22

    ... and protection of ``Critical Cyber Assets'' to support the reliable operation of the Bulk-Power System... Assets associated with Critical Assets that support the reliable operation of the Bulk-Power System. The... operation of the Bulk-Power System.\\3\\ In particular, the Version 4 CIP Reliability Standards propose to...

  1. Controlled Hydrogen Fleet and Infrastructure Demonstration and Validation Project

    SciTech Connect

    Stottler, Gary

    2012-02-08

    General Motors, LLC and energy partner Shell Hydrogen, LLC, deployed a system of hydrogen fuel cell electric vehicles integrated with a hydrogen fueling station infrastructure to operate under real world conditions as part of the U.S. Department of Energy's Controlled Hydrogen Fleet and Infrastructure Validation and Demonstration Project. This technical report documents the performance and describes the learnings from progressive generations of vehicle fuel cell system technology and multiple approaches to hydrogen generation and delivery for vehicle fueling.

  2. Vulnerability of Concentrated Critical Infrastructure: Background and Policy Options

    DTIC Science & Technology

    2005-12-21

    5 Earthquakes and Tsunamis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Infectious Disease ...close the ports of Long Beach and Los Angeles for two months and cause $60 billion in economic losses.22 Infectious Disease . Epidemics and pandemics...of infectious diseases such as Severe Acute Respiratory Syndrome (SARS) and avian influenza (bird flu) have the potential to disrupt critical

  3. A database of volcanic hazards and their physical impacts to critical infrastructure

    NASA Astrophysics Data System (ADS)

    Wilson, Grant; Wilson, Thomas; Deligne, Natalia

    2013-04-01

    Approximately 10% of the world's population lives within 100 km of historically active volcanoes. Consequently, considerable critical infrastructure is at risk of being affected by volcanic eruptions, where critical infrastructure includes: electricity and wastewater networks; water supply systems; transport routes; communications; and buildings. Appropriate risk management strategies are required to minimise the risk to infrastructure, which necessitates detailed understanding of both volcanic hazards and infrastructure parameters and vulnerabilities. To address this, we are developing a database of the physical impacts and vulnerability of critical infrastructure observed during/following historic eruptions, placed in the context of event-specific volcanic hazard and infrastructure parameters. Our database considers: volcanic hazard parameters for each case study eruption (tephra thickness, dynamic pressure of PDCs, etc.); inventory of infrastructure elements present within the study area (geographical extent, age, etc.); the type and number of impacts and disruption caused to particular infrastructure sectors; and the quantified assessment of the vulnerability of built environments. Data have been compiled from a wide range of literature, focussing in particular on impact assessment studies which document in detail the damage sustained by critical infrastructure during a given eruption. We are creating a new vulnerability ranking to quantify the vulnerability of built environments affected by volcanic eruptions. The ranking is based upon a range of physical impacts and service disruption criteria, and is assigned to each case study. This ranking will permit comparison of vulnerabilities between case studies as well as indicate expected vulnerability during future eruptions. We are also developing hazard intensity thresholds indicating when specific damage states are expected for different critical infrastructure sectors. Finally, we have developed a data quality

  4. Seismic Barrier Protection of Critical Infrastructure from Earthquakes

    DTIC Science & Technology

    2017-05-01

    seismic wave propagation models suggest that air or fluid filled subsurface V- shaped muffler structures are critical to the redirection and self...interference of broadband hazardous seismic waves in the vicinity of the structure to protect. The computational models are compared with experimental...data obtained from large bench-sized models containing borehole arrays and trenches. The computer models and bench scale measurements indicate that

  5. Critical Infrastructure Protection Program: Strategy for 2009 and Beyond

    DTIC Science & Technology

    2009-05-01

    operationally focused CIP Program Risk Management Process Model as depicted in Figure 1. This approach starts with a focus on mission and the...budgeting, and execution system (PPBES); and Figure 1: Mission assurance risk Management Process Model Figure 2: risk Decision Process Model 2...and protect both physical and cyber assets deemed d. critical to the DON using the Mission Assurance Risk Process Model ; Periodically review and

  6. Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan

    NASA Astrophysics Data System (ADS)

    Kobayashi, Hideaki; Watanabe, Kenji; Watanabe, Takahito; Nagayasu, Yukinobu

    In recent years, the dilemma of cyber attacks by malicious third parties targeting security vulnerabilities in information and communication systems has emerged, resulting in security incidents. This situation suggests that the establishment of proactive efforts and recurrence prevention measures are becoming imperative, especially in critical infrastructure sectors.This paper provides an analysis of 58 security incident cases, which occurred in critical infrastructures worldwide and were published in media. The purpose of the analysis is to conclude to a valid list of recurrence prevention measures that constitute good practices.

  7. Systematic risk assessment methodology for critical infrastructure elements - Oil and Gas subsectors

    NASA Astrophysics Data System (ADS)

    Gheorghiu, A.-D.; Ozunu, A.

    2012-04-01

    The concern for the protection of critical infrastructure has been rapidly growing in the last few years in Europe. The level of knowledge and preparedness in this field is beginning to develop in a lawfully organized manner, for the identification and designation of critical infrastructure elements of national and European interest. Oil and gas production, refining, treatment, storage and transmission by pipelines facilities, are considered European critical infrastructure sectors, as per Annex I of the Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. Besides identifying European and national critical infrastructure elements, member states also need to perform a risk analysis for these infrastructure items, as stated in Annex II of the above mentioned Directive. In the field of risk assessment, there are a series of acknowledged and successfully used methods in the world, but not all hazard identification and assessment methods and techniques are suitable for a given site, situation, or type of hazard. As Theoharidou, M. et al. noted (Theoharidou, M., P. Kotzanikolaou, and D. Gritzalis 2009. Risk-Based Criticality Analysis. In Critical Infrastructure Protection III. Proceedings. Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Hanover, New Hampshire, USA, March 23-25, 2009: revised selected papers, edited by C. Palmer and S. Shenoi, 35-49. Berlin: Springer.), despite the wealth of knowledge already created, there is a need for simple, feasible, and standardized criticality analyses. The proposed systematic risk assessment methodology includes three basic steps: the first step (preliminary analysis) includes the identification of hazards (including possible natural hazards) for each installation/section within a given site, followed by a criterial analysis and then a detailed analysis step

  8. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

    SciTech Connect

    McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

    2009-03-26

    Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

  9. 78 FR 24107 - Version 5 Critical Infrastructure Protection Reliability Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-04-24

    ... it addresses the malware risk for each BES Cyber System, but the requirement does not prescribe a.... Implementing outbound access permissions can prevent malware from reaching out to a command and control system, potentially reducing the effectiveness of the malware. As another example, pursuant to proposed...

  10. Critical Infrastructure Vulnerability to Spatially Localized Failures with Applications to Chinese Railway System.

    PubMed

    Ouyang, Min; Tian, Hui; Wang, Zhenghua; Hong, Liu; Mao, Zijun

    2017-01-17

    This article studies a general type of initiating events in critical infrastructures, called spatially localized failures (SLFs), which are defined as the failure of a set of infrastructure components distributed in a spatially localized area due to damage sustained, while other components outside the area do not directly fail. These failures can be regarded as a special type of intentional attack, such as bomb or explosive assault, or a generalized modeling of the impact of localized natural hazards on large-scale systems. This article introduces three SLFs models: node centered SLFs, district-based SLFs, and circle-shaped SLFs, and proposes a SLFs-induced vulnerability analysis method from three aspects: identification of critical locations, comparisons of infrastructure vulnerability to random failures, topologically localized failures and SLFs, and quantification of infrastructure information value. The proposed SLFs-induced vulnerability analysis method is finally applied to the Chinese railway system and can be also easily adapted to analyze other critical infrastructures for valuable protection suggestions.

  11. Critical node analysis (CNA) of electrical infrastructure networks

    NASA Astrophysics Data System (ADS)

    Venkateswaran, Venkat; Bennette, Walter

    2016-05-01

    This work addresses the problem of identifying the set of nodes in a power network critical to system operation. Formally, the CNA problem is the problem of identifying a minimum cardinality set of nodes to target in a power network in order to reduce throughput by a given factor. Since the defender may reroute flows in an attempt to restore throughput, the attack must anticipate and defeat this possibility. We develop here an algorithm to solve this problem. In our approach we model the problem as a bi-level optimization problem where the master problem attempts different attack combinations and the sub-problem responds with the best routing. The optimization problems that result from such a framework are mixed integer programs (MIPs), which we solve in our implementation using IBM CPLEX. The algorithm has been tested on several benchmark networks and appears to perform well. We have also developed variants that can be used for determining optimal restoration configuration post damage on large networks (4000 nodes, 8000 links) and for modeling propagation of failures after the initial attack. We report on computational experiments with these variants as well.

  12. Monitoring, control and diagnostics using RFID infrastructure.

    PubMed

    Pleteršek, Anton; Sok, Miha; Trontelj, Janez

    2012-12-01

    This work demonstrates the developed application for disinfection control by the sensing of chemical agents. The objective was to develop an Automatic Disinfectant Tracker (ADT) that would verify the disinfection of the hands of nurses, doctors, staff, patients, and visitors in hospitals within a required time frame. We have successfully investigated the development of hand disinfection control mechanisms and demonstrated two approaches, both based on the wireless Ultra-High-Frequency-based Radio-Frequency Identification (UHF-RFID) technology. The 100 % efficacy of detecting propanol and ethanol concentration was achieved by using the static disinfectant control (SDC-ADT) method. The time domain response provides an accurate determination of their performance in practice simply by measuring the applied disinfectant concentration and the duration of application. The present paper resulted from the measurements of a capacitive chemical sensor fabricated in the Laboratory for Microelectronics, (LMFE) and on measurements, based on a commercially available resistive type of sensor. A graphic user interface (IDS-GUI) is designed to successfully set the logger parameters and display the results.

  13. Volcanic hazards at distant critical infrastructure: A method for bespoke, multi-disciplinary assessment

    NASA Astrophysics Data System (ADS)

    Odbert, H. M.; Aspinall, W.; Phillips, J.; Jenkins, S.; Wilson, T. M.; Scourse, E.; Sheldrake, T.; Tucker, P.; Nakeshree, K.; Bernardara, P.; Fish, K.

    2015-12-01

    Societies rely on critical services such as power, water, transport networks and manufacturing. Infrastructure may be sited to minimise exposure to natural hazards but not all can be avoided. The probability of long-range transport of a volcanic plume to a site is comparable to other external hazards that must be considered to satisfy safety assessments. Recent advances in numerical models of plume dispersion and stochastic modelling provide a formalized and transparent approach to probabilistic assessment of hazard distribution. To understand the risks to critical infrastructure far from volcanic sources, it is necessary to quantify their vulnerability to different hazard stressors. However, infrastructure assets (e.g. power plantsand operational facilities) are typically complex systems in themselves, with interdependent components that may differ in susceptibility to hazard impact. Usually, such complexity means that risk either cannot be estimated formally or that unsatisfactory simplifying assumptions are prerequisite to building a tractable risk model. We present a new approach to quantifying risk by bridging expertise of physical hazard modellers and infrastructure engineers. We use a joint expert judgment approach to determine hazard model inputs and constrain associated uncertainties. Model outputs are chosen on the basis of engineering or operational concerns. The procedure facilitates an interface between physical scientists, with expertise in volcanic hazards, and infrastructure engineers, with insight into vulnerability to hazards. The result is a joined-up approach to estimating risk from low-probability hazards to critical infrastructure. We describe our methodology and show preliminary results for vulnerability to volcanic hazards at a typical UK industrial facility. We discuss our findings in the context of developing bespoke assessment of hazards from distant sources in collaboration with key infrastructure stakeholders.

  14. 77 FR 68795 - Protected Critical Infrastructure Information (PCII) Office Self-Assessment Questionnaire

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-16

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0046] Protected Critical Infrastructure.... SUMMARY: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD... include the words ``Department of Homeland Security'' and the docket number for this action. Comments...

  15. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... requirements will be in conformance with the information technology security requirements in the Federal... 6 Domestic Security 1 2010-01-01 2010-01-01 false Safeguarding of Protected Critical Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE...

  16. PROTECTING THE NATION'S CRITICAL INFRASTRUCTURE: THE VULNERABILITY OF U.S. WATER SUPPLY SYSTEMS

    EPA Science Inventory

    Terrorism in the United States was not considered a serious threat until the second half of the 1990s. However, recent attacks both at home and abroad have forced government planners to consider the possibility that critical elements of the U.S. infrastructure might in fact be vu...

  17. PROTECTING THE NATION'S CRITICAL INFRASTRUCTURE: THE VULNERABILITY OF U.S. WATER SUPPLY SYSTEMS

    EPA Science Inventory

    Terrorism in the United States was not considered a serious threat until the second half of the 1990s. However, recent attacks both at home and abroad have forced government planners to consider the possibility that critical elements of the U.S. infrastructure might in fact be vu...

  18. Report of the Defense Science Board Task Force on Critical Homeland Infrastructure Protection

    DTIC Science & Technology

    2007-01-01

    disaster (e.g., heavy construction equipment, cranes , ships, barrages, high tech equipment, laboratory analysis locations, medical specialists, etc...to Defense Critical Infrastructure Dr. Richard Gault DIA Defense Program Officer for Mission Assurance (DPO-MA) Overview Mr. John Keenan DPO-MA The

  19. 78 FR 39712 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-02

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF COMMERCE International Trade Administration Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi..., until the maximum of 20 participants is selected, all interested U.S. IT and cyber-security firms and...

  20. 6 CFR 29.8 - Disclosure of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... authorized by the Secretary, Under Secretary for Preparedness, Assistant Secretary for Cyber Security and... approval of the Secretary, the Under Secretary for Preparedness, Assistant Secretary for Cyber Security and... 6 Domestic Security 1 2010-01-01 2010-01-01 false Disclosure of Protected Critical Infrastructure...

  1. Ensemble visual analysis architecture with high mobility for large-scale critical infrastructure simulations

    NASA Astrophysics Data System (ADS)

    Eaglin, Todd; Wang, Xiaoyu; Ribarsky, William; Tolone, William

    2015-01-01

    Nowhere is the need to understand large heterogeneous datasets more important than in disaster monitoring and emergency response, where critical decisions have to be made in a timely fashion and the discovery of important events requires an understanding of a collection of complex simulations. To gain enough insights for actionable knowledge, the development of models and analysis of modeling results usually requires that models be run many times so that all possibilities can be covered. Central to the goal of our research is, therefore, the use of ensemble visualization of a large scale simulation space to appropriately aid decision makers in reasoning about infrastructure behaviors and vulnerabilities in support of critical infrastructure analysis. This requires the bringing together of computing-driven simulation results with the human decision-making process via interactive visual analysis. We have developed a general critical infrastructure simulation and analysis system for situationally aware emergency response during natural disasters. Our system demonstrates a scalable visual analytics infrastructure with mobile interface for analysis, visualization and interaction with large-scale simulation results in order to better understand their inherent structure and predictive capabilities. To generalize the mobile aspect, we introduce mobility as a design consideration for the system. The utility and efficacy of this research has been evaluated by domain practitioners and disaster response managers.

  2. Public Health Emergency Operations Center - A critical component of mass gatherings management infrastructure.

    PubMed

    Elachola, Habidah; Al-Tawfiq, Jaffar A; Turkestani, Abdulhafiz; Memish, Ziad A

    2016-08-31

    Mass gatherings (MG) are characterized by the influx of large numbers of people with the need to have infrastructural changes to support these gatherings. Thus, Public Health Emergency Operations Center (PHEOC) is critical management infrastructure for both the delivery of public health functions and for mounting adequate response during emergencies. The recognition of the importance of PHEOC at the leadership and political level is foundational for the success of any public health intervention during MG. The ability of the PHEOC to effectively function depends on appropriate design and infrastructure, staffing and command structure, and plans and procedures developed prior to the event. Multi-ministerial or jurisdictional coordination will be required and PHEOC should be positioned with such authorities. This paper outlines the essential concepts, elements, design, and operational aspects of PHEOC during MG.

  3. Unraveling Structural Infrasound: understanding the science for persistent remote monitoring of critical infrastructure (Invited)

    NASA Astrophysics Data System (ADS)

    McKenna, S. M.; Diaz-Alvarez, H.; McComas, S.; Costley, D.; Whitlow, R. D.; Jordan, A. M.; Taylor, O.

    2013-12-01

    In 2006, the Engineer Research and Development Center (ERDC) began a program designed to meet the capability gap associated with remote assessment of critical infrastructure. This program addresses issues arising from the use of geophysical techniques to solve engineering problems through persistent monitoring of critical infrastructure using infrasound. In the original 2006-2009 study of a railroad bridge in Ft. Leonard Wood, MO, the fundamental modes of motion of the structure were detected at up to 30 km away, with atmospheric excitation deemed to be the source driver. Follow-on research focused on the mechanically driven modes excited by traffic, with directional acoustic emanations. The success of the Ft. Wood ambient excitation study resulted in several subsequent programs to push the boundaries of this new technique for standoff assessment, discussed herein. Detection of scour and river system health monitoring are serious problems for monitoring civil infrastructure, from both civilian and military perspectives. Knowledge of overall system behavior over time is crucial for assessment of bridge foundations and barge navigation. This research focuses on the same steel-truss bridge from the Ft. Wood study, and analyzes 3D and 2D substructure models coupled with the superstructure reaction loads to assess the modal deformations within the infrasound bandwidth and the correlation to scour of embedment material. The Urban infrasound program is infrasound modeling, data analysis, and sensor research leading to the detection, classification and localization of threat activities in complex propagation environments. Three seismo-acoustic arrays were deployed on rooftops across the Southern Methodist University campus in Dallas, Texas, to characterize the urban infrasound environment. Structural sources within 15 km of the arrays have been identified through signal processing and confirmed through acoustical models. Infrasound is also being studied as a means of

  4. Multi-Model Framework for Investigating Potential Climate Change Impacts on Interdependent Critical Infrastructure

    NASA Astrophysics Data System (ADS)

    Sylvester, L.; Allen, M. R.; Wilbanks, T. J.

    2015-12-01

    Built infrastructure consists of a series of interconnected networks with many coupled interdependencies. Traditionally, risk and vulnerability assessments are conducted one infrastructure at a time, considering only direct impacts on built and planned assets. However, extreme events caused by climate change affect local communities in different respects and stress vital interconnected infrastructures in complex ways that cannot be captured with traditional risk assessment methodologies. We employ a combination of high-performance computing, geographical information science, and imaging methods to examine the impacts of climate change on infrastructure for cities in two different climate regions: Chicago, Illinois in the Midwest and Portland, Maine (and Casco Bay area) in the Northeast. In Illinois, we evaluate effects of changes in regional temperature and precipitation, informed by an extreme climate change projection, population growth and migration, water supply, and technological development, on electricity generation and consumption. In Maine, we determine the aggregate effects of sea level rise, changing precipitation patterns, and population shifts on the depth of the freshwater-saltwater interface in coastal aquifers and the implications of these changes for water supply in general. The purpose of these efforts is to develop a multi-model framework for investigating potential climate change impacts on interdependent critical infrastructure assessing both vulnerabilities and alternative adaptive measures.

  5. Developing measurement indices to enhance protection and resilience of critical infrastructure and key resources.

    PubMed

    Fisher, Ronald E; Norman, Michael

    2010-07-01

    The US Department of Homeland Security (DHS) is developing indices to better assist in the risk management of critical infrastructures. The first of these indices is the Protective Measures Index - a quantitative index that measures overall protection across component categories: physical security, security management, security force, information sharing, protective measures and dependencies. The Protective Measures Index, which can also be recalculated as the Vulnerability Index, is a way to compare differing protective measures (eg fence versus security training). The second of these indices is the Resilience Index, which assesses a site's resilience and consists of three primary components: robustness, resourcefulness and recovery. The third index is the Criticality Index, which assesses the importance of a facility. The Criticality Index includes economic, human, governance and mass evacuation impacts. The Protective Measures Index, Resilience Index and Criticality Index are being developed as part of the Enhanced Critical Infrastructure Protection initiative that DHS protective security advisers implement across the nation at critical facilities. This paper describes two core themes: determination of the vulnerability, resilience and criticality of a facility and comparison of the indices at different facilities.

  6. Protection of critical infrastructure using fiber optic sensors embedded in technical textiles

    NASA Astrophysics Data System (ADS)

    Krebber, Katerina; Lenke, Philipp; Liehr, Sascha; Noether, Nils; Wendt, Mario; Wosniok, Aleksander

    2010-04-01

    Terrorists and criminals more and more attack and destroy important infrastructures like routes, railways, bridges, tunnels, dikes and dams, important buildings. Therefore, reliable on-line and long-term monitoring systems are required to protect such critical infrastructures. Fiber optic sensors are well-suited for that. They can be installed over many kilometers and are able to measure continuously distributed strain, pressure, temperature and further mechanical and physical quantities. The very tiny optical fibers can be integrated into structures and materials and can provide information about any significant changes or damages of the structures. These so-called smart materials and smart structures are able to monitor itself or its environment. Particularly smart technical textiles with embedded fiber optic sensors have become very attractive because of their high importance for the structural health monitoring of geotechnical and masonry infrastructures. Such textiles are usually used for reinforcement of the structures; the embedded fiber optic sensors provide information about the condition of the structures and detect the presence of any damages and destructions in real time. Thus, critical infrastructures can be preventively protected. The paper will introduce this innovative field and will present the results achieved within several German and European projects.

  7. Modeling the resilience of critical infrastructure: the role of network dependencies.

    PubMed

    Guidotti, Roberto; Chmielewski, Hana; Unnikrishnan, Vipin; Gardoni, Paolo; McAllister, Therese; van de Lindt, John

    2016-01-01

    Water and wastewater network, electric power network, transportation network, communication network, and information technology network are among the critical infrastructure in our communities; their disruption during and after hazard events greatly affects communities' well-being, economic security, social welfare, and public health. In addition, a disruption in one network may cause disruption to other networks and lead to their reduced functionality. This paper presents a unified theoretical methodology for the modeling of dependent/interdependent infrastructure networks and incorporates it in a six-step probabilistic procedure to assess their resilience. Both the methodology and the procedure are general, can be applied to any infrastructure network and hazard, and can model different types of dependencies between networks. As an illustration, the paper models the direct effects of seismic events on the functionality of a potable water distribution network and the cascading effects of the damage of the electric power network (EPN) on the potable water distribution network (WN). The results quantify the loss of functionality and delay in the recovery process due to dependency of the WN on the EPN. The results show the importance of capturing the dependency between networks in modeling the resilience of critical infrastructure.

  8. System for critical infrastructure security based on multispectral observation-detection module

    NASA Astrophysics Data System (ADS)

    Trzaskawka, Piotr; Kastek, Mariusz; Życzkowski, Marek; Dulski, Rafał; Szustakowski, Mieczysław; Ciurapiński, Wiesław; Bareła, Jarosław

    2013-10-01

    Recent terrorist attacks and possibilities of such actions in future have forced to develop security systems for critical infrastructures that embrace sensors technologies and technical organization of systems. The used till now perimeter protection of stationary objects, based on construction of a ring with two-zone fencing, visual cameras with illumination are efficiently displaced by the systems of the multisensor technology that consists of: visible technology - day/night cameras registering optical contrast of a scene, thermal technology - cheap bolometric cameras recording thermal contrast of a scene and active ground radars - microwave and millimetre wavelengths that record and detect reflected radiation. Merging of these three different technologies into one system requires methodology for selection of technical conditions of installation and parameters of sensors. This procedure enables us to construct a system with correlated range, resolution, field of view and object identification. Important technical problem connected with the multispectral system is its software, which helps couple the radar with the cameras. This software can be used for automatic focusing of cameras, automatic guiding cameras to an object detected by the radar, tracking of the object and localization of the object on the digital map as well as target identification and alerting. Based on "plug and play" architecture, this system provides unmatched flexibility and simplistic integration of sensors and devices in TCP/IP networks. Using a graphical user interface it is possible to control sensors and monitor streaming video and other data over the network, visualize the results of data fusion process and obtain detailed information about detected intruders over a digital map. System provide high-level applications and operator workload reduction with features such as sensor to sensor cueing from detection devices, automatic e-mail notification and alarm triggering. The paper presents

  9. Organizational Strategies for Critical Transportation Infrastructure: Characteristics of Urban Resilience. The Case of Montreal.

    NASA Astrophysics Data System (ADS)

    Beauregard, Stéphane; Therrien, Marie-Christine; Normandin, Julie-Maude

    2010-05-01

    Organizational Strategies for Critical Transportation Infrastructure: Characteristics of Urban Resilience. The Case of Montreal. Stéphane Beauregard M.Sc. Candidate École nationale d'administration publique Julie-Maude Normandin Ph.D. Candidate École nationale d'administration publique Marie-Christine Therrien Professor École nationale d'administration publique The proposed paper presents preliminary results on the resilience of organizations managing critical infrastructure in the Metropolitan Montreal area (Canada). A resilient city is characterized by a network of infrastructures and individuals capable of maintaining their activities in spite of a disturbance (Godschalk, 2002). Critical infrastructures provide essential services for the functioning of society. In a crisis situation, the interruption or a decrease in performance of critical infrastructures could have important impacts on the population. They are also vulnerable to accidents and cascading effects because on their complexity and tight interdependence (Perrow, 1984). For these reasons, protection and security of the essential assets and networks are one of the objectives of organizations and governments. But prevention and recovery are two endpoints of a continuum which include also intermediate concerns: ensuring organizational robustness or failing with elegance rather than catastrophically. This continuum also includes organizational resilience (or system), or the ability to recover quickly after an interruption has occurred. Wildavsky (1988) proposes that anticipation strategies work better against known problems while resilience strategies focus on unknown problems. Anticipation policies can unnecessarily immobilize investments against risks, while resilience strategies include the potential for a certain sacrifice in the interests of a more long-term survival and adaptation to changing threats. In addition, a too large confidence in anticipation strategies can bring loss of capacity of an

  10. Modernization of B-2 Data, Video, and Control Systems Infrastructure

    NASA Technical Reports Server (NTRS)

    Cmar, Mark D.; Maloney, Christian T.; Butala, Vishal D.

    2012-01-01

    The National Aeronautics and Space Administration (NASA) Glenn Research Center (GRC) Plum Brook Station (PBS) Spacecraft Propulsion Research Facility, commonly referred to as B-2, is NASA's third largest thermal-vacuum facility with propellant systems capability. B-2 has completed a modernization effort of its facility legacy data, video and control systems infrastructure to accommodate modern integrated testing and Information Technology (IT) Security requirements. Integrated systems tests have been conducted to demonstrate the new data, video and control systems functionality and capability. Discrete analog signal conditioners have been replaced by new programmable, signal processing hardware that is integrated with the data system. This integration supports automated calibration and verification of the analog subsystem. Modern measurement systems analysis (MSA) tools are being developed to help verify system health and measurement integrity. Legacy hard wired digital data systems have been replaced by distributed Fibre Channel (FC) network connected digitizers where high speed sampling rates have increased to 256,000 samples per second. Several analog video cameras have been replaced by digital image and storage systems. Hard-wired analog control systems have been replaced by Programmable Logic Controllers (PLC), fiber optic networks (FON) infrastructure and human machine interface (HMI) operator screens. New modern IT Security procedures and schemes have been employed to control data access and process control flows. Due to the nature of testing possible at B-2, flexibility and configurability of systems has been central to the architecture during modernization.

  11. Modernization of B-2 Data, Video, and Control Systems Infrastructure

    NASA Technical Reports Server (NTRS)

    Cmar, Mark D.; Maloney, Christian T.; Butala, Vishal D.

    2012-01-01

    The National Aeronautics and Space Administration (NASA) Glenn Research Center (GRC) Plum Brook Station (PBS) Spacecraft Propulsion Research Facility, commonly referred to as B-2, is NASA s third largest thermal-vacuum facility with propellant systems capability. B-2 has completed a modernization effort of its facility legacy data, video and control systems infrastructure to accommodate modern integrated testing and Information Technology (IT) Security requirements. Integrated systems tests have been conducted to demonstrate the new data, video and control systems functionality and capability. Discrete analog signal conditioners have been replaced by new programmable, signal processing hardware that is integrated with the data system. This integration supports automated calibration and verification of the analog subsystem. Modern measurement systems analysis (MSA) tools are being developed to help verify system health and measurement integrity. Legacy hard wired digital data systems have been replaced by distributed Fibre Channel (FC) network connected digitizers where high speed sampling rates have increased to 256,000 samples per second. Several analog video cameras have been replaced by digital image and storage systems. Hard-wired analog control systems have been replaced by Programmable Logic Controllers (PLC), fiber optic networks (FON) infrastructure and human machine interface (HMI) operator screens. New modern IT Security procedures and schemes have been employed to control data access and process control flows. Due to the nature of testing possible at B-2, flexibility and configurability of systems has been central to the architecture during modernization.

  12. Multi Infrastructure Control and Optimization Toolkit, Resilient Design Module (MICOT-RDT), version 2.X

    SciTech Connect

    Bent, Russell; Nagarajan, Harsha; Yamangil, Emre; Coffrin, Carleton

    2016-06-24

    MICOT is a tool for optimizing and controlling infrastructure systems. In includes modules for optimizing the operations of an infrastructure structure (for example optimal dispatch), designing infrastructure systems, restoring infrastructures systems, resiliency, preparing for natural disasters, interdicting networks, state estimation, sensor placement, and simulation of infrastructure systems. It implements algorithms developed at LANL that have been published in the academic community. This is a release of the of resilient design module of the MICOT.

  13. A reference model for model-based design of critical infrastructure protection systems

    NASA Astrophysics Data System (ADS)

    Shin, Young Don; Park, Cheol Young; Lee, Jae-Chon

    2015-05-01

    Today's war field environment is getting versatile as the activities of unconventional wars such as terrorist attacks and cyber-attacks have noticeably increased lately. The damage caused by such unconventional wars has also turned out to be serious particularly if targets are critical infrastructures that are constructed in support of banking and finance, transportation, power, information and communication, government, and so on. The critical infrastructures are usually interconnected to each other and thus are very vulnerable to attack. As such, to ensure the security of critical infrastructures is very important and thus the concept of critical infrastructure protection (CIP) has come. The program to realize the CIP at national level becomes the form of statute in each country. On the other hand, it is also needed to protect each individual critical infrastructure. The objective of this paper is to study on an effort to do so, which can be called the CIP system (CIPS). There could be a variety of ways to design CIPS's. Instead of considering the design of each individual CIPS, a reference model-based approach is taken in this paper. The reference model represents the design of all the CIPS's that have many design elements in common. In addition, the development of the reference model is also carried out using a variety of model diagrams. The modeling language used therein is the systems modeling language (SysML), which was developed and is managed by Object Management Group (OMG) and a de facto standard. Using SysML, the structure and operational concept of the reference model are designed to fulfil the goal of CIPS's, resulting in the block definition and activity diagrams. As a case study, the operational scenario of the nuclear power plant while being attacked by terrorists is studied using the reference model. The effectiveness of the results is also analyzed using multiple analysis models. It is thus expected that the approach taken here has some merits

  14. Development of a structural health monitoring system for the life assessment of critical transportation infrastructure.

    SciTech Connect

    Roach, Dennis Patrick; Jauregui, David Villegas; Daumueller, Andrew Nicholas

    2012-02-01

    Recent structural failures such as the I-35W Mississippi River Bridge in Minnesota have underscored the urgent need for improved methods and procedures for evaluating our aging transportation infrastructure. This research seeks to develop a basis for a Structural Health Monitoring (SHM) system to provide quantitative information related to the structural integrity of metallic structures to make appropriate management decisions and ensuring public safety. This research employs advanced structural analysis and nondestructive testing (NDT) methods for an accurate fatigue analysis. Metal railroad bridges in New Mexico will be the focus since many of these structures are over 100 years old and classified as fracture-critical. The term fracture-critical indicates that failure of a single component may result in complete collapse of the structure such as the one experienced by the I-35W Bridge. Failure may originate from sources such as loss of section due to corrosion or cracking caused by fatigue loading. Because standard inspection practice is primarily visual, these types of defects can go undetected due to oversight, lack of access to critical areas, or, in riveted members, hidden defects that are beneath fasteners or connection angles. Another issue is that it is difficult to determine the fatigue damage that a structure has experienced and the rate at which damage is accumulating due to uncertain history and load distribution in supporting members. A SHM system has several advantages that can overcome these limitations. SHM allows critical areas of the structure to be monitored more quantitatively under actual loading. The research needed to apply SHM to metallic structures was performed and a case study was carried out to show the potential of SHM-driven fatigue evaluation to assess the condition of critical transportation infrastructure and to guide inspectors to potential problem areas. This project combines the expertise in transportation infrastructure at New

  15. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    PubMed

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.

  16. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    NASA Astrophysics Data System (ADS)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  17. An Analysis of IT Governance Practices in the Federal Government: Protecting U.S. Critical Infrastructure from Cyber Terrorist Attacks

    ERIC Educational Resources Information Center

    Johnson, R. LeWayne

    2012-01-01

    Much of the governing process in the United States (U.S.) today depends on a reliable and well protected public information technology (IT) infrastructure. The Department of Homeland Security (DHS) is tasked with the responsibility of protecting the country's IT infrastructure. Critics contend that the DHS has failed to address planning and…

  18. An Analysis of IT Governance Practices in the Federal Government: Protecting U.S. Critical Infrastructure from Cyber Terrorist Attacks

    ERIC Educational Resources Information Center

    Johnson, R. LeWayne

    2012-01-01

    Much of the governing process in the United States (U.S.) today depends on a reliable and well protected public information technology (IT) infrastructure. The Department of Homeland Security (DHS) is tasked with the responsibility of protecting the country's IT infrastructure. Critics contend that the DHS has failed to address planning and…

  19. Informatics Infrastructure for Syndrome Surveillance, Decision Support, Reporting, and Modeling of Critical Illness

    PubMed Central

    Herasevich, Vitaly; Pickering, Brian W.; Dong, Yue; Peters, Steve G.; Gajic, Ognjen

    2010-01-01

    OBJECTIVE: To develop and validate an informatics infrastructure for syndrome surveillance, decision support, reporting, and modeling of critical illness. METHODS: Using open-schema data feeds imported from electronic medical records (EMRs), we developed a near-real-time relational database (Multidisciplinary Epidemiology and Translational Research in Intensive Care Data Mart). Imported data domains included physiologic monitoring, medication orders, laboratory and radiologic investigations, and physician and nursing notes. Open database connectivity supported the use of Boolean combinations of data that allowed authorized users to develop syndrome surveillance, decision support, and reporting (data “sniffers”) routines. Random samples of database entries in each category were validated against corresponding independent manual reviews. RESULTS: The Multidisciplinary Epidemiology and Translational Research in Intensive Care Data Mart accommodates, on average, 15,000 admissions to the intensive care unit (ICU) per year and 200,000 vital records per day. Agreement between database entries and manual EMR audits was high for sex, mortality, and use of mechanical ventilation (κ, 1.0 for all) and for age and laboratory and monitored data (Bland-Altman mean difference ± SD, 1(0) for all). Agreement was lower for interpreted or calculated variables, such as specific syndrome diagnoses (κ, 0.5 for acute lung injury), duration of ICU stay (mean difference ± SD, 0.43±0.2), or duration of mechanical ventilation (mean difference ± SD, 0.2±0.9). CONCLUSION: Extraction of essential ICU data from a hospital EMR into an open, integrative database facilitates process control, reporting, syndrome surveillance, decision support, and outcome research in the ICU. PMID:20194152

  20. Complex Dynamics of the Power Transmission Grid (and other Critical Infrastructures)

    NASA Astrophysics Data System (ADS)

    Newman, David

    2015-03-01

    Our modern societies depend crucially on a web of complex critical infrastructures such as power transmission networks, communication systems, transportation networks and many others. These infrastructure systems display a great number of the characteristic properties of complex systems. Important among these characteristics, they exhibit infrequent large cascading failures that often obey a power law distribution in their probability versus size. This power law behavior suggests that conventional risk analysis does not apply to these systems. It is thought that much of this behavior comes from the dynamical evolution of the system as it ages, is repaired, upgraded, and as the operational rules evolve with human decision making playing an important role in the dynamics. In this talk, infrastructure systems as complex dynamical systems will be introduced and some of their properties explored. The majority of the talk will then be focused on the electric power transmission grid though many of the results can be easily applied to other infrastructures. General properties of the grid will be discussed and results from a dynamical complex systems power transmission model will be compared with real world data. Then we will look at a variety of uses of this type of model. As examples, we will discuss the impact of size and network homogeneity on the grid robustness, the change in risk of failure as generation mix (more distributed vs centralized for example) changes, as well as the effect of operational changes such as the changing the operational risk aversion or grid upgrade strategies. One of the important outcomes from this work is the realization that ``improvements'' in the system components and operational efficiency do not always improve the system robustness, and can in fact greatly increase the risk, when measured as a risk of large failure.

  1. Water infrastructure flexibility through real-time control

    NASA Astrophysics Data System (ADS)

    Wong, B. P.; Kerkez, B.

    2016-12-01

    We present a real-time control framework to enable the management and coordination of distributed urban stormwater systems. We show that by equipping existing stormwater infrastructure with affordable internet-enabled control valves, stormwater systems can be "redesigned" in real-time to adapt to individual storm events. This effectively shrinks the decision window to minutes or seconds, permitting for extended flexibility and true adaptation of stormwater systems. This is crucial particularly in flashy, urban catchments where control enables transient flows to be managed to avoid flooding and water quality impairments. By assimilating streaming sensor data into real-time control models, we show how uncertainty can be reduced across large watersheds to improve control decisions. A use case in southeast Michigan is presented where an urban of three square miles has been instrumented for stormwater control. Unlike traditional stormwater designs, which cannot provide system-level performance guarantees, the addition of remotely controllable valves enables these stormwater assets to resiliently coordinate response under a variety of precipitation and flow conditions.

  2. Agriculture and Food: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    DTIC Science & Technology

    2007-05-01

    extended FSIS jurisdiction over meat and meat products, granting authority to regulate transporters, renderers, cold storage warehouses, and animal food...over meat and meat products granting authority to regulate transporters, renderers, cold storage warehouses, and animal-food manufacturers. Appendix...DHS TSA, DHS Office of Infrastructure Protection, State and local officials (FDA regulates non-meat, poultry, and egg products) Cold storage

  3. Wireless structural health monitoring for critical members of civil infrastructures using piezoelectric active sensors

    NASA Astrophysics Data System (ADS)

    Park, Seunghee; Yun, Chung-Bang; Inman, Daniel J.; Park, Gyuhae

    2008-03-01

    This paper presents several challenging issues on wireless structural health monitoring techniques for critical members of civil infrastructures using piezoelectric active sensors. The basic concept of the techniques is to monitor remotely the structural integrity by observing the impedance variations at the piezoelectric active sensors distributed to critical members of a host structure. An active sensing node incorporating on-board microprocessor and radio frequency telemetry is introduced in a sense of tailoring wireless sensing technology to the impedance method. A data compression algorithm using principal component analysis is embedded into the on-board chip of the active sensing node. The data compression algorithm would promote efficiency in terms of both power management and noise elimination of the active sensor node. Finally, a piezoelectric sensor self-diagnosis issue is touched introducing a new impedance model equation that incorporates the effects of sensor and bonding defects.

  4. Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures

    PubMed Central

    Dai, Guangming

    2016-01-01

    Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user’s public key based on the user’s identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al. PMID:27564373

  5. Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures.

    PubMed

    Wang, Maocai; Dai, Guangming; Choo, Kim-Kwang Raymond; Jayaraman, Prem Prakash; Ranjan, Rajiv

    2016-01-01

    Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user's public key based on the user's identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al.

  6. Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures.

    PubMed

    Johnson, Chris W

    2014-01-01

    We identify four roles that social networking plays in the 'attribution problem', which obscures whether or not cyber-attacks were state-sponsored. First, social networks motivate individuals to participate in Distributed Denial of Service attacks by providing malware and identifying potential targets. Second, attackers use an individual's social network to focus attacks, through spear phishing. Recipients are more likely to open infected attachments when they come from a trusted source. Third, social networking infrastructures create disposable architectures to coordinate attacks through command and control servers. The ubiquitous nature of these architectures makes it difficult to determine who owns and operates the servers. Finally, governments recruit anti-social criminal networks to launch attacks on third-party infrastructures using botnets. The closing sections identify a roadmap to increase resilience against the 'dark side' of social networking.

  7. The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure

    SciTech Connect

    Ackerman, G; Blair, C; Bale, J; Hahn, G; DiLorenzo, E; Vadlamudi, S; Lunsford, C

    2006-08-28

    There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the authors in an earlier report, namely

  8. Communications: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    DTIC Science & Technology

    2007-05-01

    SS7 and Wireline Network Architecture 96 Figure A4-3. Next Generation Networks 97 Figure A4-4. VoIP Networks 97 Figure A4-5. Submarine Cable...systems, or functions that—if destroyed, disrupted, or exploited —would seriously threaten national security, result in catastrophic health effects...services that, if exploited , would have a national impact. The Communications Sector-Specific Plan (CSSP) is the result of a collaborative infrastructure

  9. CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection

    SciTech Connect

    Marco Carvalho; Richard Ford

    2012-05-14

    Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-critical monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).

  10. Landfills as critical infrastructures: analysis of observational datasets after 12 years of non-invasive monitoring

    NASA Astrophysics Data System (ADS)

    Scozzari, Andrea; Raco, Brunella; Battaglini, Raffaele

    2016-04-01

    This work presents the results of more than ten years of observations, performed on a regular basis, on a municipal solid waste disposal located in Italy. Observational data are generated by the combination of non-invasive techniques, involving the direct measurement of biogas release to the atmosphere and thermal infrared imaging. In fact, part of the generated biogas tends to escape from the landfill surface even when collecting systems are installed and properly working. Thus, methodologies for estimating the behaviour of a landfill system by means of direct and/or indirect measurement systems have been developed in the last decades. It is nowadays known that these infrastructures produce more than 20% of the total anthropogenic methane released to the atmosphere, justifying the need for a systematic and efficient monitoring of such infrastructures. During the last 12 years, observational data regarding a solid waste disposal site located in Tuscany (Italy) have been collected on a regular basis. The collected datasets consist in direct measurements of gas flux with the accumulation chamber method, combined with the detection of thermal anomalies by infrared radiometry. This work discusses the evolution of the estimated performance of the landfill system, its trends, the benefits and the critical aspects of such relatively long-term monitoring activity.

  11. Will climate change increase the risk for critical infrastructure failures in Europe due to extreme precipitation?

    NASA Astrophysics Data System (ADS)

    Nissen, Katrin; Ulbrich, Uwe

    2016-04-01

    An event based detection algorithm for extreme precipitation is applied to a multi-model ensemble of regional climate model simulations. The algorithm determines extent, location, duration and severity of extreme precipitation events. We assume that precipitation in excess of the local present-day 10-year return value will potentially exceed the capacity of the drainage systems that protect critical infrastructure elements. This assumption is based on legislation for the design of drainage systems which is in place in many European countries. Thus, events exceeding the local 10-year return value are detected. In this study we distinguish between sub-daily events (3 hourly) with high precipitation intensities and long-duration events (1-3 days) with high precipitation amounts. The climate change simulations investigated here were conducted within the EURO-CORDEX framework and exhibit a horizontal resolution of approximately 12.5 km. The period between 1971-2100 forced with observed and scenario (RCP 8.5 and RCP 4.5) greenhouse gas concentrations was analysed. Examined are changes in event frequency, event duration and size. The simulations show an increase in the number of extreme precipitation events for the future climate period over most of the area, which is strongest in Northern Europe. Strength and statistical significance of the signal increase with increasing greenhouse gas concentrations. This work has been conducted within the EU project RAIN (Risk Analysis of Infrastructure Networks in response to extreme weather).

  12. Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures.

    SciTech Connect

    Jaeger, Calvin Dell; Roehrig, Nathaniel S.; Torres, Teresa M.

    2008-12-01

    This document presents the security automated Risk Assessment Methodology (RAM) prototype tool developed by Sandia National Laboratories (SNL). This work leverages SNL's capabilities and skills in security risk analysis and the development of vulnerability assessment/risk assessment methodologies to develop an automated prototype security RAM tool for critical infrastructures (RAM-CITM). The prototype automated RAM tool provides a user-friendly, systematic, and comprehensive risk-based tool to assist CI sector and security professionals in assessing and managing security risk from malevolent threats. The current tool is structured on the basic RAM framework developed by SNL. It is envisioned that this prototype tool will be adapted to meet the requirements of different CI sectors and thereby provide additional capabilities.

  13. Influence of time-dependent factors in the evaluation of critical infrastructure protection measures.

    SciTech Connect

    Buehring, W. A.; Samsa, M. E.; Decision and Information Sciences

    2008-03-28

    The examination of which protective measures are the most appropriate to be implemented in order to prevent, protect against, respond to, and recover from attacks on critical infrastructures and key resources typically involves a comparison of the consequences that could occur when the protective measure is implemented to those that could occur when it is not. This report describes a framework for evaluation that provides some additional capabilities for comparing optional protective measures. It illustrates some potentially important time-dependent factors, such as the implementation rate, that affect the relative pros and cons associated with widespread implementation of protective measures. It presents example results from the use of protective measures, such as detectors and pretrained responders, for an illustrative biological incident. Results show that the choice of an alternative measure can depend on whether or not policy and financial support can be maintained for extended periods of time. Choice of a time horizon greatly influences the comparison of alternatives.

  14. DEFENSE CRITICAL INFRASTRUCTURE: Actions Needed to Improve the Identificaiton and Management of Electrical Power Risks and Vulnerabilities to DOD Critical Assets

    DTIC Science & Technology

    2009-10-01

    while approximately 85 percent of the energy infrastructure that DOD relies on for electrical power is commercially owned and outside of DOD’s d ...includes Geographic Information System spatial data and imagery of installations’ electrical systems, including data about the systems’ size and...45 GAO-10-147 Defense Critical Infrastructure The Honorable Chet Edwards Chair g Member nstruction, and Related Agencies The Honorable

  15. Chicago metropolitan area critical infrastructure protection program electric power disruption emergency preparedness drill March 5, 2002 summary and lessons learned.

    SciTech Connect

    Cirillo, D.

    2002-04-12

    Since January 2000, the Metropolitan Mayors Caucus, the Chicago Department of Environment, and the U.S. Department of Energy Office of Critical Infrastructure Protection (now part of the Office of Energy Assurance) have been collaborating on the development and implementation of guidelines that municipal governments can use in preparing for electric power disruptions. On March 5, 2002 Commonwealth Edison (ComEd), the electric company serving the Chicago metropolitan area, held a drill to test its emergency preparedness procedures. ComEd invited three communities in the metropolitan area--Buffalo Grove, Oak Brook, Riverside--to participate in the drill as part of their own emergency planning efforts to respond to electric power disruptions. Although ComEd had held joint exercises with the City of Chicago, this was the first time that a cooperative exercise with the suburban communities was conducted. The Infrastructure Assurance Center of Argonne National Laboratory, under the sponsorship of the U.S. Department of Energy's Office of Energy Assurance helped facilitate the drill in the communities. A series of meetings involving ComEd, community controllers (who helped organize the drill but did not participate directly), and Argonne personnel was held to lay out the ground rules for the drill and determine how it would operate. Attachment 1 gives some of the guidance that was developed.

  16. Multisensor system for the protection of critical infrastructure of a seaport

    NASA Astrophysics Data System (ADS)

    Kastek, Mariusz; Dulski, Rafał; Zyczkowski, Marek; Szustakowski, Mieczysław; Trzaskawka, Piotr; Ciurapinski, Wiesław; Grelowska, Grazyna; Gloza, Ignacy; Milewski, Stanislaw; Listewnik, Karol

    2012-06-01

    There are many separated infrastructural objects within a harbor area that may be considered "critical", such as gas and oil terminals or anchored naval vessels. Those objects require special protection, including security systems capable of monitoring both surface and underwater areas, because an intrusion into the protected area may be attempted using small surface vehicles (boats, kayaks, rafts, floating devices with weapons and explosives) as well as underwater ones (manned or unmanned submarines, scuba divers). The paper will present the concept of multisensor security system for a harbor protection, capable of complex monitoring of selected critical objects within the protected area. The proposed system consists of a command centre and several different sensors deployed in key areas, providing effective protection from land and sea, with special attention focused on the monitoring of underwater zone. The initial project of such systems will be presented, its configuration and initial tests of the selected components. The protection of surface area is based on medium-range radar and LLTV and infrared cameras. Underwater zone will be monitored by a sonar and acoustic and magnetic barriers, connected into an integrated monitoring system. Theoretical analyses concerning the detection of fast, small surface objects (such as RIB boats) by a camera system and real test results in various weather conditions will also be presented.

  17. Enhancing the Resilience of Interdependent Critical Infrastructure Systems Using a Common Computational Framework

    NASA Astrophysics Data System (ADS)

    Little, J. C.; Filz, G. M.

    2016-12-01

    As modern societies become more complex, critical interdependent infrastructure systems become more likely to fail under stress unless they are designed and implemented to be resilient. Hurricane Katrina clearly demonstrated the catastrophic and as yet unpredictable consequences of such failures. Resilient infrastructure systems maintain the flow of goods and services in the face of a broad range of natural and manmade hazards. In this presentation, we illustrate a generic computational framework to facilitate high-level decision-making about how to invest scarce resources most effectively to enhance resilience in coastal protection, transportation, and the economy of a region. Coastal Louisiana, our study area, has experienced the catastrophic effects of several land-falling hurricanes in recent years. In this project, we implement and further refine three process models (a coastal protection model, a transportation model, and an economic model) for the coastal Louisiana region. We upscale essential mechanistic features of the three detailed process models to the systems level and integrate the three reduced-order systems models in a modular fashion. We also evaluate the proposed approach in annual workshops with input from stakeholders. Based on stakeholder inputs, we derive a suite of goals, targets, and indicators for evaluating resilience at the systems level, and assess and enhance resilience using several deterministic scenarios. The unifying framework will be able to accommodate the different spatial and temporal scales that are appropriate for each model. We combine our generic computational framework, which encompasses the entire system of systems, with the targets, and indicators needed to systematically meet our chosen resilience goals. We will start with targets that focus on technical and economic systems, but future work will ensure that targets and indicators are extended to other dimensions of resilience including those in the environmental and

  18. National Infrastructure Advisory Council: Chemical, Biological, and Radiological Events and the Critical Infrastructure Workforce. Final Report and Recommendations

    DTIC Science & Technology

    2008-01-08

    delivery Electricity – beyond 24 hours Transportation and shipping Interdependency Service delivery Transportation of critical medical materia ...was neither surprising, nor considered a negative, but a recognition that there continues to be a need to balance all capabilities across a broad

  19. Risk prediction of Critical Infrastructures against extreme natural hazards: local and regional scale analysis

    NASA Astrophysics Data System (ADS)

    Rosato, Vittorio; Hounjet, Micheline; Burzel, Andreas; Di Pietro, Antonio; Tofani, Alberto; Pollino, Maurizio; Giovinazzi, Sonia

    2016-04-01

    Natural hazard events can induce severe impacts on the built environment; they can hit wide and densely populated areas, where there is a large number of (inter)dependent technological systems whose damages could cause the failure or malfunctioning of further different services, spreading the impacts on wider geographical areas. The EU project CIPRNet (Critical Infrastructures Preparedness and Resilience Research Network) is realizing an unprecedented Decision Support System (DSS) which enables to operationally perform risk prediction on Critical Infrastructures (CI) by predicting the occurrence of natural events (from long term weather to short nowcast predictions, correlating intrinsic vulnerabilities of CI elements with the different events' manifestation strengths, and analysing the resulting Damage Scenario. The Damage Scenario is then transformed into an Impact Scenario, where punctual CI element damages are transformed into micro (local area) or meso (regional) scale Services Outages. At the smaller scale, the DSS simulates detailed city models (where CI dependencies are explicitly accounted for) that are of important input for crisis management organizations whereas, at the regional scale by using approximate System-of-Systems model describing systemic interactions, the focus is on raising awareness. The DSS has allowed to develop a novel simulation framework for predicting earthquakes shake maps originating from a given seismic event, considering the shock wave propagation in inhomogeneous media and the subsequent produced damages by estimating building vulnerabilities on the basis of a phenomenological model [1, 2]. Moreover, in presence of areas containing river basins, when abundant precipitations are expected, the DSS solves the hydrodynamic 1D/2D models of the river basins for predicting the flux runoff and the corresponding flood dynamics. This calculation allows the estimation of the Damage Scenario and triggers the evaluation of the Impact Scenario

  20. DRDC Support to Emergency Management British Columbia’s (EMBC) Hazard Risk Vulnerability Analysis (HRVA) and Critical Infrastructure (CI) Programs

    DTIC Science & Technology

    2012-10-01

    Secretariat, available from http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=19422§ion=text [21] All Hazards Risk Assessment Methodology Guidelines 2011-2012...capability based planning, systems engineering, and risk management. Literature reviews on risk management/ assessment and critical infrastructure were...7 2.3 Wicked Problems and Soft Operations Research .......................................................... 8 3 Risk Assessment

  1. Constructing vulnerabilty and protective measures indices for the enhanced critical infrastructure protection program.

    SciTech Connect

    Fisher, R. E.; Buehring, W. A.; Whitfield, R. G.; Bassett, G. W.; Dickinson, D. C.; Haffenden, R. A.; Klett, M. S.; Lawlor, M. A.; Decision and Information Sciences; LANL

    2009-10-14

    The US Department of Homeland Security (DHS) has directed its Protective Security Advisors (PSAs) to form partnerships with the owners and operators of assets most essential to the Nation's well being - a subclass of critical infrastructure and key resources (CIKR) - and to conduct site visits for these and other high-risk assets as part of the Enhanced Critical Infrastructure Protection (ECIP) Program. During each such visit, the PSA documents information about the facility's current CIKR protection posture and overall security awareness. The primary goals for ECIP site visits (DHS 2009) are to: (1) inform facility owners and operators of the importance of their facilities as an identified high-priority CIKR and the need to be vigilant in light of the ever-present threat of terrorism; (2) identify protective measures currently in place at these facilities, provide comparisons of CIKR protection postures across like assets, and track the implementation of new protective measures; and (3) enhance existing relationships among facility owners and operators; DHS; and various Federal, State, local tribal, and territorial partners. PSAs conduct ECIP visits to assess overall site security; educate facility owners and operators about security; help owners and operators identify gaps and potential improvements; and promote communication and information sharing among facility owners and operators, DHS, State governments, and other security partners. Information collected during ECIP visits is used to develop metrics; conduct sector-by-sector and cross-sector vulnerability comparisons; identify security gaps and trends across CIKR sectors and subsectors; establish sector baseline security survey results; and track progress toward improving CIKR security through activities, programs, outreach, and training (Snyder 2009). The data being collected are used in a framework consistent with the National Infrastructure Protection Plan (NIPP) risk criteria (DHS 2009). The NIPP

  2. Constructing a resilience index for the Enhanced Critical Infrastructure Protection Program

    SciTech Connect

    Fisher, R. E.; Bassett, G. W.; Buehring, W. A.; Collins, M. J.; Dickinson, D. C.; Eaton, L. K.; Haffenden, R. A.; Hussar, N. E.; Klett, M. S.; Lawlor, M. A.; Millier, D. J.; Petit, F. D.; Peyton, S. M.; Wallace, K. E.; Whitfield, R. G.; Peerenboom, J P

    2010-10-14

    Following recommendations made in Homeland Security Presidential Directive 7, which established a national policy for the identification and increased protection of critical infrastructure and key resources (CIKR) by Federal departments and agencies, the U.S. Department of Homeland Security (DHS) in 2006 developed the Enhanced Critical Infrastructure Protection (ECIP) program. The ECIP program aimed to provide a closer partnership with state, regional, territorial, local, and tribal authorities in fulfilling the national objective to improve CIKR protection. The program was specifically designed to identify protective measures currently in place in CIKR and to inform facility owners/operators of the benefits of new protective measures. The ECIP program also sought to enhance existing relationships between DHS and owners/operators of CIKR and to build relationships where none existed (DHS 2008; DHS 2009). In 2009, DHS and its protective security advisors (PSAs) began assessing CIKR assets using the ECIP program and ultimately produced individual protective measure and vulnerability values through the protective measure and vulnerability indices (PMI/VI). The PMI/VI assess the protective measures posture of individual facilities at their 'weakest link,' allowing for a detailed analysis of the most vulnerable aspects of the facilities (Schneier 2003), while maintaining the ability to produce an overall protective measures picture. The PMI has six main components (physical security, security management, security force, information sharing, protective measures assessments, and dependencies) and focuses on actions taken by a facility to prevent or deter the occurrence of an incident (Argonne National Laboratory 2009). As CIKR continue to be assessed using the PMI/VI and owners/operators better understand how they can prevent or deter incidents, academic research, practitioner emphasis, and public policy formation have increasingly focused on resilience as a necessary

  3. Evaluating Green/Gray Infrastructure for CSO/Stormwater Control

    EPA Science Inventory

    The NRMRL is conducting this project to evaluate the water quality and quantity benefits of a large-scale application of green infrastructure (low-impact development/best management practices) retrofits in an entire subcatchment. It will document ORD's effort to demonstrate the e...

  4. Evaluating Green/Gray Infrastructure for CSO/Stormwater Control

    EPA Science Inventory

    The NRMRL is conducting this project to evaluate the water quality and quantity benefits of a large-scale application of green infrastructure (low-impact development/best management practices) retrofits in an entire subcatchment. It will document ORD's effort to demonstrate the e...

  5. Real-time threat assessment for critical infrastructure protection: data incest and conflict in evidential reasoning

    NASA Astrophysics Data System (ADS)

    Brandon, R.; Page, S.; Varndell, J.

    2012-06-01

    This paper presents a novel application of Evidential Reasoning to Threat Assessment for critical infrastructure protection. A fusion algorithm based on the PCR5 Dezert-Smarandache fusion rule is proposed which fuses alerts generated by a vision-based behaviour analysis algorithm and a-priori watch-list intelligence data. The fusion algorithm produces a prioritised event list according to a user-defined set of event-type severity or priority weightings. Results generated from application of the algorithm to real data and Behaviour Analysis alerts captured at London's Heathrow Airport under the EU FP7 SAMURAI programme are presented. A web-based demonstrator system is also described which implements the fusion process in real-time. It is shown that this system significantly reduces the data deluge problem, and directs the user's attention to the most pertinent alerts, enhancing their Situational Awareness (SA). The end-user is also able to alter the perceived importance of different event types in real-time, allowing the system to adapt rapidly to changes in priorities as the situation evolves. One of the key challenges associated with fusing information deriving from intelligence data is the issue of Data Incest. Techniques for handling Data Incest within Evidential Reasoning frameworks are proposed, and comparisons are drawn with respect to Data Incest management techniques that are commonly employed within Bayesian fusion frameworks (e.g. Covariance Intersection). The challenges associated with simultaneously dealing with conflicting information and Data Incest in Evidential Reasoning frameworks are also discussed.

  6. Towards Resilient Critical Infrastructures: Application of Type-2 Fuzzy Logic in Embedded Network Security Cyber Sensor

    SciTech Connect

    Ondrej Linda; Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-08-01

    Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL provides a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.

  7. Critical infrastructure protection decision support system decision model : overview and quick-start user's guide.

    SciTech Connect

    Samsa, M.; Van Kuiken, J.; Jusko, M.; Decision and Information Sciences

    2008-12-01

    The Critical Infrastructure Protection Decision Support System Decision Model (CIPDSS-DM) is a useful tool for comparing the effectiveness of alternative risk-mitigation strategies on the basis of CIPDSS consequence scenarios. The model is designed to assist analysts and policy makers in evaluating and selecting the most effective risk-mitigation strategies, as affected by the importance assigned to various impact measures and the likelihood of an incident. A typical CIPDSS-DM decision map plots the relative preference of alternative risk-mitigation options versus the annual probability of an undesired incident occurring once during the protective life of the investment, assumed to be 20 years. The model also enables other types of comparisons, including a decision map that isolates a selected impact variable and displays the relative preference for the options of interest--parameterized on the basis of the contribution of the isolated variable to total impact, as well as the likelihood of the incident. Satisfaction/regret analysis further assists the analyst or policy maker in evaluating the confidence with which one option can be selected over another.

  8. Attenuation of Storm Surge Flooding By Wetlands in the Chesapeake Bay: An Integrated Geospatial Framework Evaluating Impacts to Critical Infrastructure

    NASA Astrophysics Data System (ADS)

    Khalid, A.; Haddad, J.; Lawler, S.; Ferreira, C.

    2014-12-01

    Areas along the Chesapeake Bay and its tributaries are extremely vulnerable to hurricane flooding, as evidenced by the costly effects and severe impacts of recent storms along the Virginia coast, such as Hurricane Isabel in 2003 and Hurricane Sandy in 2012. Coastal wetlands, in addition to their ecological importance, are expected to mitigate the impact of storm surge by acting as a natural protection against hurricane flooding. Quantifying such interactions helps to provide a sound scientific basis to support planning and decision making. Using storm surge flooding from various historical hurricanes, simulated using a coupled hydrodynamic wave model (ADCIRC-SWAN), we propose an integrated framework yielding a geospatial identification of the capacity of Chesapeake Bay wetlands to protect critical infrastructure. Spatial identification of Chesapeake Bay wetlands is derived from the National Wetlands Inventory (NWI), National Land Cover Database (NLCD), and the Coastal Change Analysis Program (C-CAP). Inventories of population and critical infrastructure are extracted from US Census block data and FEMA's HAZUS-Multi Hazard geodatabase. Geospatial and statistical analyses are carried out to develop a relationship between wetland land cover, hurricane flooding, population and infrastructure vulnerability. These analyses result in the identification and quantification of populations and infrastructure in flooded areas that lie within a reasonable buffer surrounding the identified wetlands. Our analysis thus produces a spatial perspective on the potential for wetlands to attenuate hurricane flood impacts in critical areas. Statistical analysis will support hypothesis testing to evaluate the benefits of wetlands from a flooding and storm-surge attenuation perspective. Results from geospatial analysis are used to identify where interactions with critical infrastructure are relevant in the Chesapeake Bay.

  9. Interconnectedness and interdependencies of critical infrastructures in the US economy: Implications for resilience

    NASA Astrophysics Data System (ADS)

    Chopra, Shauhrat S.; Khanna, Vikas

    2015-10-01

    Natural disasters in 2011 yielded close to 55 billion in economic damages alone in the United States (US), which highlights the need to reduce impacts of such disasters or other deliberate attacks. The US Department of Homeland Security (DHS) identifies a list of 16 Critical Infrastructure Sectors (CIS) whose incapacity due to disruptions would have a debilitating impact on the nation's economy. The goal of this work is to understand the implications of interdependencies among CIS on the resilience of the US economic system as a whole. We develop a framework that combines the empirical economic input-output (EIO) model with graph theory based techniques for understanding interdependencies, interconnectedness and resilience in the US economic system. By representing the US economy as a network, we are able to analyze its topology by separately looking at its unweighted and weighted forms. Topological analysis of the US EIO network suggests that it exhibits small world properties for the unweighted case, and in the weighted case, the throughput of industry sectors follows a power-law with an exponential cutoff. Implications of these topological properties are discussed in the paper. We also simulate hypothetical disruptions on CIS in order to identify industrial sectors that experience the largest economic impacts, and to quantify systemic vulnerability in economic terms. In addition, insights from community detection and hypothetical disruption scenarios help assess vulnerability of individual industrial communities to disruptions on individual CIS. These methodologies also provide insights regarding the extent of coupling between each CIS in the US EIO network. Based on our analysis, we observe that excessive interconnectedness and interdependencies of CIS results in high systemic vulnerability. This information can guide policymakers to design policies that improve resilience of economic networks, and evaluate policies that might indirectly increase coupling

  10. Quantitative physical models of volcanic phenomena for hazards assessment of critical infrastructures

    NASA Astrophysics Data System (ADS)

    Costa, Antonio

    2016-04-01

    Volcanic hazards may have destructive effects on economy, transport, and natural environments at both local and regional scale. Hazardous phenomena include pyroclastic density currents, tephra fall, gas emissions, lava flows, debris flows and avalanches, and lahars. Volcanic hazards assessment is based on available information to characterize potential volcanic sources in the region of interest and to determine whether specific volcanic phenomena might reach a given site. Volcanic hazards assessment is focussed on estimating the distances that volcanic phenomena could travel from potential sources and their intensity at the considered site. Epistemic and aleatory uncertainties strongly affect the resulting hazards assessment. Within the context of critical infrastructures, volcanic eruptions are rare natural events that can create severe hazards. In addition to being rare events, evidence of many past volcanic eruptions is poorly preserved in the geologic record. The models used for describing the impact of volcanic phenomena generally represent a range of model complexities, from simplified physics based conceptual models to highly coupled thermo fluid dynamical approaches. Modelling approaches represent a hierarchy of complexity, which reflects increasing requirements for well characterized data in order to produce a broader range of output information. In selecting models for the hazard analysis related to a specific phenomenon, questions that need to be answered by the models must be carefully considered. Independently of the model, the final hazards assessment strongly depends on input derived from detailed volcanological investigations, such as mapping and stratigraphic correlations. For each phenomenon, an overview of currently available approaches for the evaluation of future hazards will be presented with the aim to provide a foundation for future work in developing an international consensus on volcanic hazards assessment methods.

  11. Developing measurement indices to enhance protection and resilience of U.S. critical infrastructure and key resources.

    SciTech Connect

    Fisher, R. E.; Norman, M.

    2010-07-01

    The US Department of Homeland Security (DHS) is developing indices to better assist in the risk management of critical infrastructures. The first of these indices is the Protective Measures Index - a quantitative index that measures overall protection across component categories: physical security, security management, security force, information sharing, protective measures and dependencies. The Protective Measures Index, which can also be recalculated as the Vulnerability Index, is a way to compare differing protective measures (eg fence versus security training). The second of these indices is the Resilience Index, which assesses a site's resilience and consists of three primary components: robustness, resourcefulness and recovery. The third index is the Criticality Index, which assesses the importance of a facility. The Criticality Index includes economic, human, governance and mass evacuation impacts. The Protective Measures Index, Resilience Index and Criticality Index are being developed as part of the Enhanced Critical Infrastructure Protection initiative that DHS protective security advisers implement across the nation at critical facilities. This paper describes two core themes: determination of the vulnerability, resilience and criticality of a facility and comparison of the indices at different facilities.

  12. The effects of green infrastructure on exceedance of critical shear stress in Blunn Creek watershed

    NASA Astrophysics Data System (ADS)

    Shannak, Sa'd.

    2017-09-01

    Green infrastructure (GI) has attracted city planners and watershed management professional as a new approach to control urban stormwater runoff. Several regulatory enforcements of GI implementation created an urgent need for quantitative information on GI practice effectiveness, namely for sediment and stream erosion. This study aims at investigating the capability and performance of GI in reducing stream bank erosion in the Blackland Prairie ecosystem. To achieve the goal of this study, we developed a methodology to represent two types of GI (bioretention and permeable pavement) into the Soil Water Assessment Tool, we also evaluated the shear stress and excess shear stress for stream flows in conjunction with different levels of adoption of GI, and estimated potential stream bank erosion for different median soil particle sizes using real and design storms. The results provided various configurations of GI schemes in reducing the negative impact of urban stormwater runoff on stream banks. Results showed that combining permeable pavement and bioretention resulted in the greatest reduction in runoff volumes, peak flows, and excess shear stress under both real and design storms. Bioretention as a stand-alone resulted in the second greatest reduction, while the installation of detention pond only had the least reduction percentages. Lastly, results showed that the soil particle with median diameter equals to 64 mm (small cobbles) had the least excess shear stress across all design storms, while 0.5 mm (medium sand) soil particle size had the largest magnitude of excess shear stress. The current study provides several insights into a watershed scale for GI planning and watershed management to effectively reduce the negative impact of urban stormwater runoff and control streambank erosion.

  13. Remote Sensing of Arctic Environmental Conditions and Critical Infrastructure using Infra-Red (IR) Cameras and Unmanned Air Vehicles (UAVs)

    NASA Astrophysics Data System (ADS)

    Hatfield, M. C.; Webley, P.; Saiet, E., II

    2014-12-01

    Remote Sensing of Arctic Environmental Conditions and Critical Infrastructure using Infra-Red (IR) Cameras and Unmanned Air Vehicles (UAVs) Numerous scientific and logistical applications exist in Alaska and other arctic regions requiring analysis of expansive, remote areas in the near infrared (NIR) and thermal infrared (TIR) bands. These include characterization of wild land fire plumes and volcanic ejecta, detailed mapping of lava flows, and inspection of lengthy segments of critical infrastructure, such as the Alaska pipeline and railroad system. Obtaining timely, repeatable, calibrated measurements of these extensive features and infrastructure networks requires localized, taskable assets such as UAVs. The Alaska Center for Unmanned Aircraft Systems Integration (ACUASI) provides practical solutions to these problem sets by pairing various IR sensors with a combination of fixed-wing and multi-rotor air vehicles. Fixed-wing assets, such as the Insitu ScanEagle, offer long reach and extended duration capabilities to quickly access remote locations and provide enduring surveillance of the target of interest. Rotary-wing assets, such as the Aeryon Scout or the ACUASI-built Ptarmigan hexcopter, provide a precision capability for detailed horizontal mapping or vertical stratification of atmospheric phenomena. When included with other ground capabilities, we will show how they can assist in decision support and hazard assessment as well as giving those in emergency management a new ability to increase knowledge of the event at hand while reducing the risk to all involved. Here, in this presentation, we illustrate how UAV's can provide the ideal tool to map and analyze the hazardous events and critical infrastructure under extreme environmental conditions.

  14. Toward an ontology framework supporting the integration of geographic information with modeling and simulation for critical infrastructure protection

    SciTech Connect

    Ambrosiano, John J; Bent, Russell W; Linger, Steve P

    2009-01-01

    Protecting the nation's infrastructure from natural disasters, inadvertent failures, or intentional attacks is a major national security concern. Gauging the fragility of infrastructure assets, and understanding how interdependencies across critical infrastructures affect their behavior, is essential to predicting and mitigating cascading failures, as well as to planning for response and recovery. Modeling and simulation (M&S) is an indispensable part of characterizing this complex system of systems and anticipating its response to disruptions. Bringing together the necessary components to perform such analyses produces a wide-ranging and coarse-grained computational workflow that must be integrated with other analysis workflow elements. There are many points in both types of work flows in which geographic information (GI) services are required. The GIS community recognizes the essential contribution of GI in this problem domain as evidenced by past OGC initiatives. Typically such initiatives focus on the broader aspects of GI analysis workflows, leaving concepts crucial to integrating simulations within analysis workflows to that community. Our experience with large-scale modeling of interdependent critical infrastructures, and our recent participation in a DRS initiative concerning interoperability for this M&S domain, has led to high-level ontological concepts that we have begun to assemble into an architecture that spans both computational and 'world' views of the problem, and further recognizes the special requirements of simulations that go beyond common workflow ontologies. In this paper we present these ideas, and offer a high-level ontological framework that includes key geospatial concepts as special cases of a broader view.

  15. Critically stable damping in flexible structure control

    NASA Astrophysics Data System (ADS)

    Xing, Zhigang; Zheng, Gangtie

    2017-10-01

    The concept of critically stable damping and its application to flexible structure control are presented. Critically stable damping was originally noted from the viewpoint of control-structure integration. It was recognized that a slight augmentation of structural damping would result in substantially more robust control without decreased performance and could guarantee the stability margin for any structural frequency increase. This paper illustrates the wide occurrence of critically stable damping phenomenon, establishes its basic relationship for the insight of the general design procedure, and applies the concept into the practical design of a satellite with a large deployable antenna. It is noted that the critically stable damping concept could provide a feasible approach to overcome the difficulty in ultra-large space structure design and control, and enhance the performance of a variety of excellent control design methodologies for flexible structure control. This critically stable damping provides new insight into the integrated design of control and structure.

  16. Report: EPA Needs to Better Implement Plan for Protecting Critical Infrastructure and Key Resources Used to Respond to Terrorist Attacks and Disasters

    EPA Pesticide Factsheets

    Report #2006-P-00022, April 26, 2006. Assignment of formal authority and more accountability is required to ensure the initiatives in the Critical Infrastructure and Key Resources Protection Plan are accomplished in a timely manner.

  17. Determining critical infrastructure for ocean research and societal needs in 2030

    NASA Astrophysics Data System (ADS)

    Glickson, Deborah; Barron, Eric; Fine, Rana

    2011-06-01

    The United States has jurisdiction over 3.4 million square miles of ocean—an expanse greater than the land area of all 50 states combined. This vast marine area offers researchers opportunities to investigate the ocean's role in an integrated Earth system but also presents challenges to society, including damaging tsunamis and hurricanes, industrial accidents, and outbreaks of waterborne diseases. The 2010 Gulf of Mexico Deepwater Horizon oil spill and 2011 Japanese earthquake and tsunami are vivid reminders that a broad range of infrastructure is needed to advance scientists' still incomplete understanding of the ocean. The National Research Council's (NRC) Ocean Studies Board was asked by the National Science and Technology Council's Subcommittee on Ocean Science and Technology, comprising 25 U.S. government agencies, to examine infrastructure needs for ocean research in the year 2030. This request reflects concern, among a myriad of marine issues, over the present state of aging and obsolete infrastructure, insufficient capacity, growing technological gaps, and declining national leadership in marine technological development; these issues were brought to the nation's attention in 2004 by the U.S. Commission on Ocean Policy.

  18. Surety of the nation`s critical infrastructures: The challenge restructuring poses to the telecommunications sector

    SciTech Connect

    Cox, R.; Drennen, T.E.; Gilliom, L.; Harris, D.L.; Kunsman, D.M.; Skroch, M.J.

    1998-04-01

    The telecommunications sector plays a pivotal role in the system of increasingly connected and interdependent networks that make up national infrastructure. An assessment of the probable structure and function of the bit-moving industry in the twenty-first century must include issues associated with the surety of telecommunications. The term surety, as used here, means confidence in the acceptable behavior of a system in both intended and unintended circumstances. This paper outlines various engineering approaches to surety in systems, generally, and in the telecommunications infrastructure, specifically. It uses the experience and expectations of the telecommunications system of the US as an example of the global challenges. The paper examines the principal factors underlying the change to more distributed systems in this sector, assesses surety issues associated with these changes, and suggests several possible strategies for mitigation. It also studies the ramifications of what could happen if this sector became a target for those seeking to compromise a nation`s security and economic well being. Experts in this area generally agree that the U. S. telecommunications sector will eventually respond in a way that meets market demands for surety. Questions remain open, however, about confidence in the telecommunications sector and the nation`s infrastructure during unintended circumstances--such as those posed by information warfare or by cascading software failures. Resolution of these questions is complicated by the lack of clear accountability of the private and the public sectors for the surety of telecommunications.

  19. Developing an Integration Infrastructure for Distributed Engine Control Technologies

    NASA Technical Reports Server (NTRS)

    Culley, Dennis; Zinnecker, Alicia; Aretskin-Hariton, Eliot; Kratz, Jonathan

    2014-01-01

    Turbine engine control technology is poised to make the first revolutionary leap forward since the advent of full authority digital engine control in the mid-1980s. This change aims squarely at overcoming the physical constraints that have historically limited control system hardware on aero-engines to a federated architecture. Distributed control architecture allows complex analog interfaces existing between system elements and the control unit to be replaced by standardized digital interfaces. Embedded processing, enabled by high temperature electronics, provides for digitization of signals at the source and network communications resulting in a modular system at the hardware level. While this scheme simplifies the physical integration of the system, its complexity appears in other ways. In fact, integration now becomes a shared responsibility among suppliers and system integrators. While these are the most obvious changes, there are additional concerns about performance, reliability, and failure modes due to distributed architecture that warrant detailed study. This paper describes the development of a new facility intended to address the many challenges of the underlying technologies of distributed control. The facility is capable of performing both simulation and hardware studies ranging from component to system level complexity. Its modular and hierarchical structure allows the user to focus their interaction on specific areas of interest.

  20. AstroCloud, a Cyber-Infrastructure for Astronomy Research: Data Archiving and Quality Control

    NASA Astrophysics Data System (ADS)

    He, B.; Cui, C.; Fan, D.; Li, C.; Xiao, J.; Yu, C.; Wang, C.; Cao, Z.; Chen, J.; Yi, W.; Li, S.; Mi, L.; Yang, S.

    2015-09-01

    AstroCloud is a cyber-Infrastructure for Astronomy Research initiated by Chinese Virtual Observatory (China-VO) under funding support from NDRC (National Development and Reform commission) and CAS (Chinese Academy of Sciences)1(Cui et al. 2014). To archive the astronomical data in China, we present the implementation of the astronomical data archiving system (ADAS). Data archiving and quality control are the infrastructure for the AstroCloud. Throughout the data of the entire life cycle, data archiving system standardized data, transferring data, logging observational data, archiving ambient data, And storing these data and metadata in database. Quality control covers the whole process and all aspects of data archiving.

  1. Cybersecurity of Critical Control Networks

    DTIC Science & Technology

    2015-07-14

    Wertzberger, Casey Glatter, William Mahoney, Robin Gandhi, Kenneth Dick . An Integrated Framework for Control System Simulation and Regulatory...authors Robin Gandhi, William Mahoney, Ken Dick , Zachary Wilson. ADACS – A Language for Monitoring Regulatory Compliance in Control Systems; Second...Dependable Systems and Networks, Estoril, Portugal, authors Robin Gandhi, William Mahoney, Ken Dick . Cryptanalysis and Improvements of the

  2. Controlling Hazardous Releases while Protecting Passengers in Civil Infrastructure Systems

    NASA Astrophysics Data System (ADS)

    Rimer, Sara P.; Katopodes, Nikolaos D.

    2015-11-01

    The threat of accidental or deliberate toxic chemicals released into public spaces is a significant concern to public safety, and the real-time detection and mitigation of such hazardous contaminants has the potential to minimize harm and save lives. Furthermore, the safe evacuation of occupants during such a catastrophe is of utmost importance. This research develops a comprehensive means to address such scenarios, through both the sensing and control of contaminants, and the modeling of and potential communication to occupants as they evacuate. A computational fluid dynamics model is developed of a simplified public space characterized by a long conduit (e.g. airport terminal) with unidirectional ambient flow that is capable of detecting and mitigating the hazardous contaminant (via boundary ports) over several time horizons using model predictive control optimization. Additionally, a physical prototype is built to test the real-time feasibility of this computational flow control model. The prototype is a blower wind-tunnel with an elongated test section with the capability of sensing (via digital camera) an injected `contaminant' (propylene glycol smoke), and then mitigating that contaminant using actuators (compressed air operated vacuum nozzles) which are operated by a set of pressure regulators and a programmable controller. Finally, an agent-based model is developed to simulate ``agents'' (i.e. building occupants) as they evacuate a public space, and is coupled with the computational flow control model such that agents must interact with a dynamic, threatening environment. NSF-CMMI #0856438.

  3. Green Infrastructure for CSO Control in Kansas City, Missouri

    EPA Science Inventory

    Kansas City Water Services Department (WSD) conducted extensive modeling and economic studies of its combined sewer system over the last 5 years, for submittal of its long term control plan to EPA. These studies and recent funding opportunities have provided the impetus for sele...

  4. THE XAL INFRASTRUCTURE FOR HIGH LEVEL CONTROL ROOM APPLICATIONS

    SciTech Connect

    Shishlo, Andrei P; Allen, Christopher K; Chu, Paul; Galambos, John D; Pelaia II, Tom

    2009-01-01

    XAL is a Java programming framework for building high-level control applications related to accelerator physics. The structure, details of implementation, and interaction between components, auxiliary XAL packages, and the latest modifications are discussed. A general overview of XAL applications created for the SNS project is presented.

  5. Green Infrastructure for CSO Control in Kansas City, Missouri

    EPA Science Inventory

    Kansas City Water Services Department (WSD) conducted extensive modeling and economic studies of its combined sewer system over the last 5 years, for submittal of its long term control plan to EPA. These studies and recent funding opportunities have provided the impetus for sele...

  6. Landfills as critical infrastructures: synergy between non-invasive monitoring technologies

    NASA Astrophysics Data System (ADS)

    Scozzari, Andrea; Raco, Brunella; Battaglini, Raffaele

    2014-05-01

    This work deals with a methodology for estimating the behaviour of a landfill system by means of the integration between two different non-invasive technologies. In fact, there is a widespread agreement on the fact that these infrastructures produce about 23% of the total anthropogenic methane released to the atmosphere. Despite that, there's still no internationally accepted protocol to quantify the leakage of biogas from a landfill with a common standard approach. This work proposes an assessment of the performance of a landfill system in terms of biogas release to the atmosphere. Such evaluation is performed by means of a direct measurement of gas flux with the accumulation chamber method, combined with the detection of thermal anomalies by infrared radiometry. In order to derive flux maps from a set of punctual measurements and calculate an overall quantity of emitted gas, a geostatistical technique is necessarily applied and briefly illustrated. A case study regarding an infrastructure located in Tuscany (Italy) is shown, where a discussion about the evolution of the landfill site through successive campaigns is also suggested. The role played by infrared thermography and its synergy with direct flux measurements is clearly perceivable in this context. The main benefit of the presented approach is a significant increase of the energy recovered from the landfill sites by optimising the collection of biogas, which implies a reduction of the total anthropogenic methane originated from the disposal of wastes released to the atmosphere.

  7. Demonstration of Green/Gray Infrastructure for Combined Sewer Overflow Control

    EPA Science Inventory

    This project is a major national demonstration of the integration of green and gray infrastructure for combined sewer overflow (CSO) control in a cost-effective and environmentally friendly manner. It will use Kansas City, MO, as a case example. The project will have a major in...

  8. Demonstration of Green/Gray Infrastructure for Combined Sewer Overflow Control

    EPA Science Inventory

    This project is a major national demonstration of the integration of green and gray infrastructure for combined sewer overflow (CSO) control in a cost-effective and environmentally friendly manner. It will use Kansas City, MO, as a case example. The project will have a major in...

  9. Cost Comparison of Conventional Gray Combined Sewer Overflow Control Infrastructure versus a Green/Gray Combination

    EPA Science Inventory

    This paper outlines a life-cycle cost analysis comparing a green (rain gardens) and gray (tunnels) infrastructure combination to a gray-only option to control combined sewer overflow in the Turkey Creek Combined Sewer Overflow Basin, in Kansas City, MO. The plan area of this Bas...

  10. Cost Comparison of Conventional Gray Combined Sewer Overflow Control Infrastructure versus a Green/Gray Combination

    EPA Science Inventory

    This paper outlines a life-cycle cost analysis comparing a green (rain gardens) and gray (tunnels) infrastructure combination to a gray-only option to control combined sewer overflow in the Turkey Creek Combined Sewer Overflow Basin, in Kansas City, MO. The plan area of this Bas...

  11. 78 FR 6807 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-01-31

    ... in the safety and security industries, including Information Communications Technology (ICT..., skills and resources from the United States to the Kingdom of Saudi Arabia in the areas of critical... communication systems, electronic detection equipment, cyber intrusion detection and prevention, perimeter...

  12. Neutron absorbing coating for nuclear criticality control

    DOEpatents

    Mizia, Ronald E.; Wright, Richard N.; Swank, William D.; Lister, Tedd E.; Pinhero, Patrick J.

    2007-10-23

    A neutron absorbing coating for use on a substrate, and which provides nuclear criticality control is described and which includes a nickel, chromium, molybdenum, and gadolinium alloy having less than about 5% boron, by weight.

  13. Pipe Penetrating Radar: a New Tool for the Assessment of Critical Infrastructure

    NASA Astrophysics Data System (ADS)

    Ekes, C.; Neducz, B.

    2012-04-01

    This paper describes the development of Pipe Penetrating Radar (PPR), the underground in-pipe application of GPR, a non-destructive testing method that can detect defects and cavities within and outside mainline diameter (>18 in / 450mm) non-metallic (concrete, PVC, HDPE, etc.) underground pipes. The method uses two or more high frequency GPR antennae carried by a robot into underground pipes. The radar data is transmitted to the surface via fibre optic cable and is recorded together with the output from CCTV (and optionally sonar and laser). Proprietary software analyzes the data and pinpoints defects or cavities within and outside the pipe. Thus the testing can identify existing pipe and pipe bedding symptoms that can be addressed to prevent catastrophic failure due to sinkhole development and can provide useful information about the remaining service life of the pipe. The key innovative aspect is the unique ability to map pipe wall thickness and deterioration including cracks and voids outside the pipe, enabling accurate predictability of needed intervention or the timing of replacement. This reliable non-destructive testing method significantly impacts subsurface infrastructure condition based asset management by supplying previously unattainable measurable conditions. Keywords: pipe penetrating radar (PPR), ground penetrating radar (GPR), pipe inspection, concrete deterioration, municipal engineering

  14. AWARE: Adaptive Software Monitoring and Dynamic Reconfiguration for Critical Infrastructure Protection

    DTIC Science & Technology

    2015-04-29

    SECURITY CLASSIFICATION OF: The ARO-supported AWARE project addressed the design and performance of adaptive software technologies for highly trusted... software systems. A dynamically adaptive system (DAS) monitors itself and its execution environment at run time. This monitoring enables a DAS not only...Approved for Public Release; Distribution Unlimited Final Report: AWARE: Adaptive Software Monitoring and Dynamic Reconfiguration for Critical

  15. Critical Infrastructure Protection: How to Assess and Provide Remedy to Vulnerabilities in Telecom Hotels

    DTIC Science & Technology

    2006-09-01

    out-sourced E - commerce solutions to DoD agencies.85 The Navy is taking positive steps to reduce vulnerabilities that were initially discovered...11 D. ASSOCIATED CRITICAL NODES: MAE AND NAP .............................16 E ...50 D. DOD TELECOMMUNICATIONS CASE STUDY....................................51 E . TELCO INITIATIVES

  16. Control of the Public Health IT Physical Infrastructure: Findings From the 2015 Informatics Capacity and Needs Assessment Survey

    PubMed Central

    Massoudi, Barbara L.; Shah, Gulzar H.

    2016-01-01

    Background: Despite improvements in information technology (IT) infrastructure in public health, there is still much that can be done to improve the adoption of IT in state and local health departments, by better understanding the impact of governance and control structures of physical infrastructure. Objective: To report out the current status of the physical infrastructure control of local health departments (LHDs) and to determine whether there is a significant association between an LHD's governance status and control of the physical infrastructure components. Design: Data came from the 2015 Informatics Capacity and Needs Assessment Survey, conducted by Georgia Southern University in collaboration with the National Association of County and City Health Officials. Participants: A total of 324 LHDs from all 50 states completed the survey (response rate: 50%). Main Outcome Measure(s): Outcome measures included control of LHD physical infrastructure components. Predictors of interest included LHD governance category. Results: The majority of the control of the physical infrastructure components in LHDs resides in external entities. The type of governance structure of the LHD is significantly associated with the control of infrastructure. Conclusions: Additional research is needed to determine best practices in IT governance and control of physical infrastructure for public health. PMID:27684612

  17. Control of the Public Health IT Physical Infrastructure: Findings From the 2015 Informatics Capacity and Needs Assessment Survey.

    PubMed

    Chester, Kelley; Massoudi, Barbara L; Shah, Gulzar H

    2016-01-01

    Despite improvements in information technology (IT) infrastructure in public health, there is still much that can be done to improve the adoption of IT in state and local health departments, by better understanding the impact of governance and control structures of physical infrastructure. To report out the current status of the physical infrastructure control of local health departments (LHDs) and to determine whether there is a significant association between an LHD's governance status and control of the physical infrastructure components. Data came from the 2015 Informatics Capacity and Needs Assessment Survey, conducted by Georgia Southern University in collaboration with the National Association of County and City Health Officials. A total of 324 LHDs from all 50 states completed the survey (response rate: 50%). Outcome measures included control of LHD physical infrastructure components. Predictors of interest included LHD governance category. The majority of the control of the physical infrastructure components in LHDs resides in external entities. The type of governance structure of the LHD is significantly associated with the control of infrastructure. Additional research is needed to determine best practices in IT governance and control of physical infrastructure for public health.

  18. Critical Review of Technical Questions Facing Low Impact Development and Green Infrastructure: A Perspective from the Great Plains.

    PubMed

    Vogel, Jason R; Moore, Trisha L; Coffman, Reid R; Rodie, Steven N; Hutchinson, Stacy L; McDonough, Kelsey R; McLemore, Alex J; McMaine, John T

    2015-09-01

    Since its inception, Low Impact Development (LID) has become part of urban stormwater management across the United States, marking progress in the gradual transition from centralized to distributed runoff management infrastructure. The ultimate goal of LID is full, cost-effective implementation to maximize watershed-scale ecosystem services and enhance resilience. To reach that goal in the Great Plains, the multi-disciplinary author team presents this critical review based on thirteen technical questions within the context of regional climate and socioeconomics across increasing complexities in scale and function. Although some progress has been made, much remains to be done including continued basic and applied research, development of local LID design specifications, local demonstrations, and identifying funding mechanisms for these solutions. Within the Great Plains and beyond, by addressing these technical questions within a local context, the goal of widespread acceptance of LID can be achieved, resulting in more effective and resilient stormwater management.

  19. Unraveling the complexities of disaster management: a framework for critical social infrastructure to promote population health and resilience.

    PubMed

    O'Sullivan, Tracey L; Kuziemsky, Craig E; Toal-Sullivan, Darene; Corneil, Wayne

    2013-09-01

    Complexity is a useful frame of reference for disaster management and understanding population health. An important means to unraveling the complexities of disaster management is to recognize the interdependencies between health care and broader social systems and how they intersect to promote health and resilience before, during and after a crisis. While recent literature has expanded our understanding of the complexity of disasters at the macro level, few studies have examined empirically how dynamic elements of critical social infrastructure at the micro level influence community capacity. The purpose of this study was to explore empirically the complexity of disasters, to determine levers for action where interventions can be used to facilitate collaborative action and promote health among high risk populations. A second purpose was to build a framework for critical social infrastructure and develop a model to identify potential points of intervention to promote population health and resilience. A community-based participatory research design was used in nine focus group consultations (n = 143) held in five communities in Canada, between October 2010 and March 2011, using the Structured Interview Matrix facilitation technique. The findings underscore the importance of interconnectedness of hard and soft systems at the micro level, with culture providing the backdrop for the social fabric of each community. Open coding drawing upon the tenets of complexity theory was used to develop four core themes that provide structure for the framework that evolved; they relate to dynamic context, situational awareness and connectedness, flexible planning, and collaboration, which are needed to foster adaptive responses to disasters. Seven action recommendations are presented, to promote community resilience and population health. Copyright © 2012 Elsevier Ltd. All rights reserved.

  20. The Prioritization of Critical Infrastructure for a Pandemic Outbreak in the United States Working Group

    DTIC Science & Technology

    2007-01-16

    potential extreme health impact and containment strategies specific to pandemics. CI/KR owner-operators know the activities and personnel in their...knowledge of the impacts , response strategies, and countermeasures that will be available in a pandemic…1 The Secretaries asked the Council to...needed to improve overall pandemic planning and response, including: identifying cross-sector impacts to specific critical sector operations

  1. The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets

    DTIC Science & Technology

    2003-02-01

    Enhancing countermeasures for any one terrorist tactic or target, therefore, makes it more likely that terrorists will favor another. The Nature of...When we turn a tap, we expect drinkable water . Electricity, clean water , and telecommunications are only a few of the critical infra- structure services...terrorist tactic, therefore, makes it more likely that terrorists will favor another. Terrorists are inventive and resourceful in terms of target

  2. A Tool for Rating the Resilience of Critical Infrastructures in Extreme Fires

    DTIC Science & Technology

    2014-05-01

    against extreme fires. An Advisory Board was formed with 15 members from government departments, fire services, engineering and extreme fire experts...fire resistance evaluation of critical structures or any HJA 43 acceptable curve following an engineering analysis. The RWS time-temperature...Ministry of Transport in the Netherlands based on the assumption that, in a worst case scenario, a 50 m3 fuel, oil or petrol tanker fire, with a fire load

  3. Infection control in equine critical care settings.

    PubMed

    Burgess, Brandy A; Morley, Paul S

    2014-08-01

    There is a recognizable standard of practice for infection control in veterinary medicine. Effort must be given to control and prevention of infectious disease transmission within a facility and among animal populations. In the critical care setting, patients typically have a high degree of systemic illness and immune compromise, are commonly subjected to invasive procedures and placement of indwelling devices, and frequently receive antimicrobials and gastric protectants. Every equine critical care unit is distinctive in its physical and operational features and the types of patients that are managed. Infection control programs must therefore be tailored to each facility's needs. Copyright © 2014 Elsevier Inc. All rights reserved.

  4. Resurrecting social infrastructure as a determinant of urban tuberculosis control in Delhi, India

    PubMed Central

    2014-01-01

    Background The key to universal coverage in tuberculosis (TB) management lies in community participation and empowerment of the population. Social infrastructure development generates social capital and addresses the crucial social determinants of TB, thereby improving program performance. Recently, there has been renewed interest in the concept of social infrastructure development for TB control in developing countries. This study aims to revive this concept and highlight the fact that documentation on ways to operationalize urban TB control is required from a holistic development perspective. Further, it explains how development of social infrastructure impacts health and development outcomes, especially with respect to TB in urban settings. Methods A wide range of published Government records pertaining to social development parameters and TB program surveillance, between 2001 and 2011 in Delhi, were studied. Social infrastructure development parameters like human development index along with other indicators reflecting patient profile and habitation in urban settings were selected as social determinants of TB. These include adult literacy rates, per capita income, net migration rates, percentage growth in slum population, and percentage of urban population living in one-room dwelling units. The impact of the Revised National Tuberculosis Control Program on TB incidence was assessed as an annual decline in new TB cases notified under the program. Univariate linear regression was employed to examine the interrelationship between social development parameters and TB program outcomes. Results The decade saw a significant growth in most of the social development parameters in the State. TB program performance showed 46% increment in lives saved among all types of TB cases per 100,000 population. The 7% reduction in new TB case notifications from the year 2001 to 2011, translates to a logarithmic decline of 5.4 new TB cases per 100,000 population. Except per capita

  5. Resurrecting social infrastructure as a determinant of urban tuberculosis control in Delhi, India.

    PubMed

    Chandra, Shivani; Sharma, Nandini; Joshi, Kulanand; Aggarwal, Nishi; Kannan, Anjur Tupil

    2014-01-17

    The key to universal coverage in tuberculosis (TB) management lies in community participation and empowerment of the population. Social infrastructure development generates social capital and addresses the crucial social determinants of TB, thereby improving program performance. Recently, there has been renewed interest in the concept of social infrastructure development for TB control in developing countries. This study aims to revive this concept and highlight the fact that documentation on ways to operationalize urban TB control is required from a holistic development perspective. Further, it explains how development of social infrastructure impacts health and development outcomes, especially with respect to TB in urban settings. A wide range of published Government records pertaining to social development parameters and TB program surveillance, between 2001 and 2011 in Delhi, were studied. Social infrastructure development parameters like human development index along with other indicators reflecting patient profile and habitation in urban settings were selected as social determinants of TB. These include adult literacy rates, per capita income, net migration rates, percentage growth in slum population, and percentage of urban population living in one-room dwelling units. The impact of the Revised National Tuberculosis Control Program on TB incidence was assessed as an annual decline in new TB cases notified under the program. Univariate linear regression was employed to examine the interrelationship between social development parameters and TB program outcomes. The decade saw a significant growth in most of the social development parameters in the State. TB program performance showed 46% increment in lives saved among all types of TB cases per 100,000 population. The 7% reduction in new TB case notifications from the year 2001 to 2011, translates to a logarithmic decline of 5.4 new TB cases per 100,000 population. Except per capita income, literacy, and net

  6. "In The Dark": Military Planning for a Catastrophic Critical Infrastructure Event

    DTIC Science & Technology

    2011-05-01

    various supervisory control and data acquisition (SCADA) systems controlling power generation and distribution throughout the nation, offer a...Spectrum of Catastrophic Events CSL Study 2-114 2. The vulnerability of United States military and especially civilian systems to an EMP attack, giving...repair and recover from damage inflicted on United States military and civilian systems by an EMP attack; and 4. The feasibility and cost of hardening

  7. Adaptive Critic Nonlinear Robust Control: A Survey.

    PubMed

    Wang, Ding; He, Haibo; Liu, Derong

    2017-10-01

    Adaptive dynamic programming (ADP) and reinforcement learning are quite relevant to each other when performing intelligent optimization. They are both regarded as promising methods involving important components of evaluation and improvement, at the background of information technology, such as artificial intelligence, big data, and deep learning. Although great progresses have been achieved and surveyed when addressing nonlinear optimal control problems, the research on robustness of ADP-based control strategies under uncertain environment has not been fully summarized. Hence, this survey reviews the recent main results of adaptive-critic-based robust control design of continuous-time nonlinear systems. The ADP-based nonlinear optimal regulation is reviewed, followed by robust stabilization of nonlinear systems with matched uncertainties, guaranteed cost control design of unmatched plants, and decentralized stabilization of interconnected systems. Additionally, further comprehensive discussions are presented, including event-based robust control design, improvement of the critic learning rule, nonlinear H∞ control design, and several notes on future perspectives. By applying the ADP-based optimal and robust control methods to a practical power system and an overhead crane plant, two typical examples are provided to verify the effectiveness of theoretical results. Overall, this survey is beneficial to promote the development of adaptive critic control methods with robustness guarantee and the construction of higher level intelligent systems.

  8. A Flight Control System Architecture for the NASA AirSTAR Flight Test Infrastructure

    NASA Technical Reports Server (NTRS)

    Murch, Austin M.

    2008-01-01

    A flight control system architecture for the NASA AirSTAR infrastructure has been designed to address the challenges associated with safe and efficient flight testing of research control laws in adverse flight conditions. The AirSTAR flight control system provides a flexible framework that enables NASA Aviation Safety Program research objectives, and includes the ability to rapidly integrate and test research control laws, emulate component or sensor failures, inject automated control surface perturbations, and provide a baseline control law for comparison to research control laws and to increase operational efficiency. The current baseline control law uses an angle of attack command augmentation system for the pitch axis and simple stability augmentation for the roll and yaw axes.

  9. Landslides affecting critical infrastructures: the use of a GB-InSAR based warning system in Calatabiano (Southern Italy).

    NASA Astrophysics Data System (ADS)

    Nolesini, Teresa; Frodella, William; Bardi, Federica; Intrieri, Emanuele; Carlà, Tommaso; Solari, Lorenzo; Dotta, Giulia; Ferrigno, Federica; Casagli, Nicola

    2017-04-01

    Landslides represent one of the most frequent geo-hazard, not only causing a serious threat to human lives, but also determining socio-economic losses, countable in billions of Euros and expressed in terms of damage to property, infrastructures and environmental degradation. Recent events show a significant increase in the number of disasters with natural and/or technological causes, which could have potentially serious consequences for Critical Infrastructures (CI). Where these infrastructures tend to fail or to be destroyed, the resulting cascade effect (chain of accidents) could lead to catastrophic damage and affect people, the environment and the economy. In the field of landslide detection, mapping, monitoring and management, the availability of advanced remote sensing technologies, which allow systematic and easily updatable acquisitions of data, may enhance the implementation of near real time monitoring activity and the production of landslide maps, optimizing field work. This work aims at presenting an example of the advantages given by the combined use of advanced remote sensing techniques, such as Ground-Based Interferometric Synthetic Aperture Radar (GB-InSAR), Terrestrial Laser Scanning (TLS) and Infrared Thermography (IRT), in order to monitor and map the Calatabiano landslide, located in the Catania Province (Sicily Island, Southern Italy). The landslide occurred on October 24th 2015, after a period of heavy rainfall, causing the rupture of a water pipeline transect of the aqueduct supplying water to the city of Messina. As a consequence of this event a considerable lack in water resources occurred for a large number of the city inhabitants. A provisional by-pass, consisting of three 350 m long pipes passing through the landslide area, was implemented in order to restore the city water supplies during the emergency management phase. In this framework an integrated monitoring network was implemented, in order to assess the residual risk by analyzing

  10. The Role of State and Local Jurisdictions in Identifying and Protecting Critical Infrastructure

    DTIC Science & Technology

    2013-12-01

    Intelligence and Information Sharing Interdiction and Disruption Screening, Search, and Detection Access Control and Identity Verification Cyber... substations ; 6,222 miles of high voltage DC transmission lines, and 143 million customers.123 The petroleum subsector includes: 525,000 producing wells...IDENTIFY ASSETS, SYSTEMS , AND NETWORKS ..............................18 1. Assess Risk

  11. Post-disaster supply chain interdependent critical infrastructure system restoration: A review of data necessary and available for modeling

    USGS Publications Warehouse

    Ramachandran, Varun; Long, Suzanna K.; Shoberg, Thomas G.; Corns, Steven; Carlo, Hector J.

    2016-01-01

    The majority of restoration strategies in the wake of large-scale disasters have focused on short-term emergency response solutions. Few consider medium- to long-term restoration strategies to reconnect urban areas to national supply chain interdependent critical infrastructure systems (SCICI). These SCICI promote the effective flow of goods, services, and information vital to the economic vitality of an urban environment. To re-establish the connectivity that has been broken during a disaster between the different SCICI, relationships between these systems must be identified, formulated, and added to a common framework to form a system-level restoration plan. To accomplish this goal, a considerable collection of SCICI data is necessary. The aim of this paper is to review what data are required for model construction, the accessibility of these data, and their integration with each other. While a review of publically available data reveals a dearth of real-time data to assist modeling long-term recovery following an extreme event, a significant amount of static data does exist and these data can be used to model the complex interdependencies needed. For the sake of illustration, a particular SCICI (transportation) is used to highlight the challenges of determining the interdependencies and creating models capable of describing the complexity of an urban environment with the data publically available. Integration of such data as is derived from public domain sources is readily achieved in a geospatial environment, after all geospatial infrastructure data are the most abundant data source and while significant quantities of data can be acquired through public sources, a significant effort is still required to gather, develop, and integrate these data from multiple sources to build a complete model. Therefore, while continued availability of high quality, public information is essential for modeling efforts in academic as well as government communities, a more

  12. Extreme Storm Data and Analyses in the Southeastern U.S. - Implications for Critical Infrastructure

    NASA Astrophysics Data System (ADS)

    England, J. F.; Sankovich, V.; Caldwell, J.; Nicholson, T. J.; Randall, J. D.; Kanney, J.

    2010-12-01

    Extreme storm rainfall data in the Southeastern United States are being collected and analyzed to assess their potential impacts on design precipitation amounts. Probable Maximum Precipitation (PMP) from National Weather Service Hydromet Report 51 is currently used for design rainfall estimates in the eastern U.S. The design precipitation estimates are based on an Army Corps of Engineers storm depth-area duration (D-A-D) catalog that is nearly 40 years old. We develop an electronic D-A-D database of SE U.S. storms for the period 1889-1972 from existing sources, describe the spatial and temporal limitations of those data, and how design estimates based on these data have changed over time. An electronic database of individual extreme storms that have occurred since 1972 near the Carolinas is under development. NWS WSR-88D archive radar data, NOAA Multisensor Precipitation Reanalysis data, NCDC COOP station precipitation data, and NOAA HURDAT information are used in storm analysis. We focus on warm-season tropical cyclones, as these systems are the critical storm rainfall-producing mechanisms in the SE U.S. that result in extreme floods. We examine orographic enhancement of rainfall in the Appalachians, in addition to Piedmont and coastal areas. Exceedance probabilities and uncertainties of design precipitation amounts are being estimated, so that risk-based hazard assessments can potentially be explored. Potential effects of climate variability on the extreme storm estimates, at time-scales of interest in design precipitation applications, are also under investigation.

  13. Redirecting Seismic Waves with Metamaterials and Sub-wavelength Scatterers for Protection of Critical Infrastructure

    NASA Astrophysics Data System (ADS)

    Liberman, V.; Haupt, R.; Rothschild, M.

    2016-12-01

    Each year, on average a major magnitude-8 earthquake strikes somewhere in the world. Furthermore, in several areas in the U.S. there is a rapidly growing number of industry induced earthquakes, albeit of lower magnitude. Both types of earthquakes can cause damage to critical structures from nuclear power plants to pipelines and dams. Here we propose a novel concept to redirect and attenuate the ground motion of earthquake surface waves by implementing an engineered seismic cloaking barrier around high value structures. These barriers employ seismic metamaterials. Metamaterials are media with sub-wavelength structures which possess unique wave manipulation properties not obtained with conventional media. When applied to seismic phenomena, metamaterial structures allow elastic wave re-direction and attenuation on length scales much smaller than the wavelength. Although sub-wavelength acoustic Helmholtz resonators have been suggested previously, they have significant limitations due to the large impedance mismatch between the soil and the resonator, and the fundamental inability of acoustic resonators to attenuate shear waves. In contrast, we propose an array of sub-wavelength scattering borehole barriers with an appropriate tilt, designed to form subwavelength apertures. We design arrays of such boreholes or wedges to form keep-out zones where substantial reduction of seismic energy occurs due to efficient scattering of the surface waves or, potentially, attenuation of the energy through coupling it to a viscous medium. The performance of such borehole arrays is studied with full 3D simulations with both spectral-element and finite-element codes in a supercomputing environment. Assuming a far field excitation source at realistic earthquake frequencies, the hole size, spacing, and tilt angle are optimized. Then, table-top frequency-scaled system measurements and analysis are performed and validated with simulations. This material is based upon work supported under Air

  14. Controlling superconductivity by tunable quantum critical points.

    PubMed

    Seo, S; Park, E; Bauer, E D; Ronning, F; Kim, J N; Shim, J-H; Thompson, J D; Park, Tuson

    2015-03-04

    The heavy fermion compound CeRhIn5 is a rare example where a quantum critical point, hidden by a dome of superconductivity, has been explicitly revealed and found to have a local nature. The lack of additional examples of local types of quantum critical points associated with superconductivity, however, has made it difficult to unravel the role of quantum fluctuations in forming Cooper pairs. Here, we show the precise control of superconductivity by tunable quantum critical points in CeRhIn5. Slight tin-substitution for indium in CeRhIn5 shifts its antiferromagnetic quantum critical point from 2.3 GPa to 1.3 GPa and induces a residual impurity scattering 300 times larger than that of pure CeRhIn5, which should be sufficient to preclude superconductivity. Nevertheless, superconductivity occurs at the quantum critical point of the tin-doped metal. These results underline that fluctuations from the antiferromagnetic quantum criticality promote unconventional superconductivity in CeRhIn5.

  15. Critical Infrastructures as Complex Systems: A Multi-level Protection Architecture

    NASA Astrophysics Data System (ADS)

    Assogna, Pierluigi; Bertocchi, Glauco; Dicarlo, Antonio; Milicchio, Franco; Paoluzzi, Alberto; Scorzelli, Giorgio; Vicentino, Michele; Zollo, Roberto

    This paper describes a security platform as a complex system of holonic communities, that are hierarchically organized, but self-reconfigurable when some of them are detached or cannot otherwise operate. Furthermore, every possible subset of holons may work autonomously, while maintaining self-conscience of its own mission, action lines and goals. Each holonic unit, either elementary or composite, retains some capabilities for sensing (perception), transmissive apparatus (communication), computational processes (elaboration), authentication/authorization (information security), support for data exchange (visualization & interaction), actuators (mission), ambient representation (geometric reasoning), knowledge representation (logic reasoning), situation representation and forecasting (simulation), intelligent feedback (command & control). The higher the organizational level of the holonic unit, the more complex and sophisticated each of its characteristic features.

  16. Controlled Hydrogen Fleet and Infrastructure Demonstration and Validation Project: Fall 2006 Progress Update

    SciTech Connect

    Wipke, K.; Welch, C.; Thomas, H.; Sprik, S.; Gronich, S.; Garbak, J.

    2006-10-01

    The U.S. Department of Energy (DOE) initiated the Controlled Hydrogen Fleet and Infrastructure Demonstration and Validation Project through a competitive solicitation process in 2003. The purpose of this project is to conduct an integrated field validation that simultaneously examines the performance of fuel cell vehicles and the supporting hydrogen infrastructure. Four industry teams have signed cooperative agreements with DOE and are supporting plans for more than 130 fuel cell vehicles and 20 hydrogen refueling stations over the 5-year project duration. This paper provides a status update covering the progress accomplished by the demonstration and validation project over the last six months; the first composite data products from the project were published in March 2006. The composite data products aggregate individual performance into a range that protects the intellectual property of the companies involved, while publicizing the progress the hydrogen and fuel cell industry is making as a whole relative to the program objectives and timeline. Updates to previously published composite data products, such as on-road fuel economy and vehicle/infrastructure safety, will be presented along with new composite data products, such as fuel cell stack efficiency and refueling behavior.

  17. Assessment of municipal infrastructure development and its critical influencing factors in urban China: A FA and STIRPAT approach.

    PubMed

    Li, Yu; Zheng, Ji; Li, Fei; Jin, Xueting; Xu, Chen

    2017-01-01

    Municipal infrastructure is a fundamental facility for the normal operation and development of an urban city and is of significance for the stable progress of sustainable urbanization around the world, especially in developing countries. Based on the municipal infrastructure data of the prefecture-level cities in China, municipal infrastructure development is assessed comprehensively using a FA (factor analysis) model, and then the stochastic model STIRPAT (stochastic impacts by regression on population, affluence and technology) is examined to investigate key factors that influence municipal infrastructure of cities in various stages of urbanization and economy. This study indicates that the municipal infrastructure development in urban China demonstrates typical characteristics of regional differentiation, in line with the economic development pattern. Municipal infrastructure development in cities is primarily influenced by income, industrialization and investment. For China and similar developing countries under transformation, national public investment remains the primary driving force of economy as well as the key influencing factor of municipal infrastructure. Contribution from urbanization and the relative consumption level, and the tertiary industry is still scanty, which is a crux issue for many developing countries under transformation. With economic growth and the transformation requirements, the influence of the conventional factors such as public investment and industrialization on municipal infrastructure development would be expected to decline, meanwhile, other factors like the consumption and tertiary industry driven model and the innovation society can become key contributors to municipal infrastructure sustainability.

  18. Assessment of municipal infrastructure development and its critical influencing factors in urban China: A FA and STIRPAT approach

    PubMed Central

    Li, Yu; Zheng, Ji; Li, Fei; Jin, Xueting; Xu, Chen

    2017-01-01

    Municipal infrastructure is a fundamental facility for the normal operation and development of an urban city and is of significance for the stable progress of sustainable urbanization around the world, especially in developing countries. Based on the municipal infrastructure data of the prefecture-level cities in China, municipal infrastructure development is assessed comprehensively using a FA (factor analysis) model, and then the stochastic model STIRPAT (stochastic impacts by regression on population, affluence and technology) is examined to investigate key factors that influence municipal infrastructure of cities in various stages of urbanization and economy. This study indicates that the municipal infrastructure development in urban China demonstrates typical characteristics of regional differentiation, in line with the economic development pattern. Municipal infrastructure development in cities is primarily influenced by income, industrialization and investment. For China and similar developing countries under transformation, national public investment remains the primary driving force of economy as well as the key influencing factor of municipal infrastructure. Contribution from urbanization and the relative consumption level, and the tertiary industry is still scanty, which is a crux issue for many developing countries under transformation. With economic growth and the transformation requirements, the influence of the conventional factors such as public investment and industrialization on municipal infrastructure development would be expected to decline, meanwhile, other factors like the consumption and tertiary industry driven model and the innovation society can become key contributors to municipal infrastructure sustainability. PMID:28787031

  19. The Pedagogy of Complex Work Support Systems: Infrastructuring Practices and the Production of Critical Awareness in Risk Auditing

    ERIC Educational Resources Information Center

    Mathisen, Arve; Nerland, Monika

    2012-01-01

    This paper employs a socio-technical perspective to explore the role of complex work support systems in organising knowledge and providing opportunities for learning in professional work. Drawing on concepts from infrastructure studies, such systems are seen as work infrastructures which connect information, knowledge, standards and work…

  20. The Pedagogy of Complex Work Support Systems: Infrastructuring Practices and the Production of Critical Awareness in Risk Auditing

    ERIC Educational Resources Information Center

    Mathisen, Arve; Nerland, Monika

    2012-01-01

    This paper employs a socio-technical perspective to explore the role of complex work support systems in organising knowledge and providing opportunities for learning in professional work. Drawing on concepts from infrastructure studies, such systems are seen as work infrastructures which connect information, knowledge, standards and work…

  1. Critical Infrastructure Protection Act

    THOMAS, 113th Congress

    Rep. Franks, Trent [R-AZ-8

    2013-10-30

    12/02/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  2. Critical Infrastructure Protection Act

    THOMAS, 113th Congress

    Rep. Franks, Trent [R-AZ-8

    2013-10-30

    Senate - 12/02/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  3. Cybersecurity for Critical Infrastructure

    DTIC Science & Technology

    2015-04-01

    burglary, nor do not deploy tanks at restaurants to defend against vandals. The 19 responsibility to provide security for those events and industries ...systems designs from the defense industrial base. However, this is more akin to espionage, which does not evince intent for war. The second reason...and agriculture; DOD is the SSA for the defense industrial base; Department of Energy is the SSA for energy; Department of Health and Human

  4. Critical Infrastructure Protection Act

    THOMAS, 113th Congress

    Rep. Franks, Trent [R-AZ-8

    2013-10-30

    12/02/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  5. Critical Homeland Infrastructure Protection

    DTIC Science & Technology

    2007-01-01

    available not only within the city government, but also private assets that might be needed in a disaster (e.g., heavy construction equipment, cranes ...Program Officer for Mission Mr. John Keenan DPO-MA Assurance (DPO-MA) Overview The Defense Industrial Base (DIB) Mr. Bill Ennis DCMA Operationalizing

  6. Mathematical modelling of tsunami impacts on critical infrastructures: exposure and severity associated with debris transport at Sines port, Portugal.

    NASA Astrophysics Data System (ADS)

    Conde, Daniel; Baptista, Maria Ana; Sousa Oliveira, Carlos; Ferreira, Rui M. L.

    2015-04-01

    a flux-splitting technique with a reviewed Roe-Riemann solver and appropriate source-term formulations to ensure full conservativeness. Additionally, STAV-2D features Lagrangian-Eulerian coupling enabling solid transport simulation under both continuum and discrete approaches, and has been validated with both laboratory data and paleo-tsunami evidence (Conde, 2013a; Conde, 2013b). The interactions between the inundating flow and coal stockpiles or natural mobile bed reaches were simulated using a continuum debris-flow approach, featuring fractional solid transport, while the containers at the new terminal were advected with an explicit Lagrangian method. The meshwork employed at the port models the existing geometry and structures in great detail, enabling explicitly resolved interactions between the current infrastructure and the overland propagating tsunami. The obtained preliminary results suggest that several structures, some of them critical in a nationwide context, are exposed to tsunami actions. The coal deposition pattern and the final location of monitored containers were determined for two magnitude scenarios (8.5 Mw and 9.5 Mw) in the case of a tsunami generated at the Horseshoe fault and one magnitude scenario (9.5 Mw) for a tsunami generated at the Gorringe bank. The inland washing of the coal stockpiles may impose great loss of both economical and environmental value, while the impact of large mobile debris, such as the containers in the terminal area, significantly increases the severity of infrastructural damage. Acknowledgements This work was partially funded by FEDER, program COMPETE, and by national funds through the Portuguese Foundation for Science and Technology (FCT) with project RECI/ECM-HID/0371/2012. References Baptista M.A. & Miranda, J.M. (2009), Revision of the Portuguese catalog of tsunamis. Nat. Hazards Earth Syst. Sci., 9, 25-42. Canelas, R.; Murillo, J. & Ferreira, R.M.L. (2013), Two-dimensional depth-averaged modelling of dam

  7. Introduction to the U.S. Department of Energy's Controlled Hydrogen Fleet and Infrastructure Demonstration and Validation Project

    SciTech Connect

    Wipke, K.; Welch, C.; Gronich, S.; Garbak, J.; Hooker, D.

    2006-05-01

    Early in 2003, the U.S. Department of Energy (DOE) initiated the ''Controlled Hydrogen Fleet and Infrastructure Demonstration and Validation Project'' solicitation. The purpose of this project is to examine the impact and performance of fuel cell vehicles and the requisite hydrogen infrastructure in real-world applications. The integrated nature of the project enables DOE to work with industry to test, demonstrate, and validate optimal system solutions. Information learned from the vehicles and infrastructure will be fed back into DOE's R&D program to guide and refocus future research as needed, making this project truly a ''learning demonstration''.

  8. Local SPTHA through tsunami inundation simulations: a test case for two coastal critical infrastructures in the Mediterranean

    NASA Astrophysics Data System (ADS)

    Volpe, M.; Selva, J.; Tonini, R.; Romano, F.; Lorito, S.; Brizuela, B.; Argyroudis, S.; Salzano, E.; Piatanesi, A.

    2016-12-01

    Seismic Probabilistic Tsunami Hazard Analysis (SPTHA) is a methodology to assess the exceedance probability for different thresholds of tsunami hazard intensity, at a specific site or region in a given time period, due to a seismic source. A large amount of high-resolution inundation simulations is typically required for taking into account the full variability of potential seismic sources and their slip distributions. Starting from regional SPTHA offshore results, the computational cost can be reduced by considering for inundation calculations only a subset of `important' scenarios. We here use a method based on an event tree for the treatment of the seismic source aleatory variability; a cluster analysis on the offshore results to define the important sources; epistemic uncertainty treatment through an ensemble modeling approach. We consider two target sites in the Mediterranean (Milazzo, Italy, and Thessaloniki, Greece) where coastal (non nuclear) critical infrastructures (CIs) are located. After performing a regional SPTHA covering the whole Mediterranean, for each target site, few hundreds of representative scenarios are filtered out of all the potential seismic sources and the tsunami inundation is explicitly modeled, obtaining a site-specific SPTHA, with a complete characterization of the tsunami hazard in terms of flow depth and velocity time histories. Moreover, we also explore the variability of SPTHA at the target site accounting for coseismic deformation (i.e. uplift or subsidence) due to near field sources located in very shallow water. The results are suitable and will be applied for subsequent multi-hazard risk analysis for the CIs. These applications have been developed in the framework of the Italian Flagship Project RITMARE, EC FP7 ASTARTE (Grant agreement 603839) and STREST (Grant agreement 603389) projects, and of the INGV-DPC Agreement.

  9. Research priorities and infrastructure needs of the Family Smoking Prevention and Tobacco Control Act: science to inform FDA policy.

    PubMed

    Leischow, Scott J; Zeller, Mitch; Backinger, Cathy L

    2012-01-01

    A new law in the United States gives the Food and Drug Administration (FDA) wide latitude to regulate tobacco products for the first time. Given the need for science to serve as a foundation for FDA actions, it is critical that a scientific review of the literature relevant to the proposed legislation be undertaken by experts in the field of nicotine and tobacco research in order to develop research priorities. This paper describes an initiative that was implemented to identify research opportunities under "The Family Smoking Prevention and Tobacco Control Act" and summarizes the conclusions and future directions derived from that initiative. Multiple research and surveillance needs were identified, such as characterization of biomarkers and increased analysis of risk perception. It was also recognized that science will play a critical role in policy determinations such as what constitutes "substantial equivalence" and that there will be considerable infrastructure needs (e.g., laboratories for product testing). Science must drive FDA's decision making regarding tobacco regulation. This article provides a summary of research opportunities identified through literature reviews related to various provisions of the new law. However, the science required by the law requires a transdisciplinary approach because of its complexity, so one of the challenges facing the FDA will be to connect the silos of research in recognition that the "system" of tobacco regulation is greater than the sum of its parts.

  10. Use of Green Infrastructure Integrated with Conventional Gray Infrastructure for Combined Sewer Overflow Control: Kansas City, MO

    EPA Science Inventory

    Advanced design concepts such as Low Impact Development (LID) and Green Solutions (or upland runoff control techniques) are currently being encouraged by the United States Environmental Protection Agency (EPA) as a management practice to contain and control stormwater at the lot ...

  11. Use of Green Infrastructure Integrated with Conventional Gray Infrastructure for Combined Sewer Overflow Control: Kansas City, MO

    EPA Science Inventory

    Advanced design concepts such as Low Impact Development (LID) and Green Solutions (or upland runoff control techniques) are currently being encouraged by the United States Environmental Protection Agency (EPA) as a management practice to contain and control stormwater at the lot ...

  12. Prototyping the E-ELT M1 local control system communication infrastructure

    NASA Astrophysics Data System (ADS)

    Argomedo, J.; Kornweibel, N.; Grudzien, T.; Dimmler, M.; Andolfato, L.; Barriga, P.

    2016-08-01

    The primary mirror of the E-ELT is composed of 798 hexagonal segments of about 1.45 meters across. Each segment can be moved in piston and tip-tilt using three position actuators. Inductive edge sensors are used to provide feedback for global reconstruction of the mirror shape. The E-ELT M1 Local Control System will provide a deterministic infrastructure for collecting edge sensor and actuators readings and distribute the new position actuators references while at the same time providing failure detection, isolation and notification, synchronization, monitoring and configuration management. The present paper describes the prototyping activities carried out to verify the feasibility of the E-ELT M1 local control system communication architecture design and assess its performance and potential limitations.

  13. Effects of a significant New Madrid Seismic Zone event on oil and natural gas pipelines and their cascading effects to critical infrastructures

    NASA Astrophysics Data System (ADS)

    Fields, Damon E.

    Critical Infrastructure Protection (CIP) is a construct that relates preparedness and responsiveness to natural or man-made disasters that involve vulnerable assets deemed essential for the functioning of our economy and society. Infrastructure systems (power grids, bridges, airports, etc.) are vulnerable to disastrous types of events--natural or man-made. Failures of these systems can have devastating effects on communities and entire regions. CIP relates our willingness, ability, and capability to defend, mitigate, and re-constitute those assets that succumb to disasters affecting one or more infrastructure sectors. This qualitative research utilized ethnography and employed interviews with subject matter experts (SMEs) from various fields of study regarding CIP with respect to oil and natural gas pipelines in the New Madrid Seismic Zone. The study focused on the research question: What can be done to mitigate vulnerabilities in the oil and natural gas infrastructures, along with the potential cascading effects to interdependent systems, associated with a New Madrid fault event? The researcher also analyzed National Level Exercises (NLE) and real world events, and associated After Action Reports (AAR) and Lessons Learned (LL) in order to place a holistic lens across all infrastructures and their dependencies and interdependencies. Three main themes related to the research question emerged: (a) preparedness, (b) mitigation, and (c) impacts. These themes comprised several dimensions: (a) redundancy, (b) node hardening, (c) education, (d) infrastructure damage, (e) cascading effects, (f) interdependencies, (g) exercises, and (h) earthquake readiness. As themes and dimensions are analyzed, they are considered against findings in AARs and LL from previous real world events and large scale exercise events for validation or rejection.

  14. Real-time contaminant sensing and control in civil infrastructure systems

    NASA Astrophysics Data System (ADS)

    Rimer, Sara; Katopodes, Nikolaos

    2014-11-01

    A laboratory-scale prototype has been designed and implemented to test the feasibility of real-time contaminant sensing and control in civil infrastructure systems. A blower wind tunnel is the basis of the prototype design, with propylene glycol smoke as the ``contaminant.'' A camera sensor and compressed-air vacuum nozzle system is set up at the test section portion of the prototype to visually sense and then control the contaminant; a real-time controller is programmed to read in data from the camera sensor and administer pressure to regulators controlling the compressed air operating the vacuum nozzles. A computational fluid dynamics model is being integrated in with this prototype to inform the correct pressure to supply to the regulators in order to optimally control the contaminant's removal from the prototype. The performance of the prototype has been evaluated against the computational fluid dynamics model and is discussed in this presentation. Furthermore, the initial performance of the sensor-control system implemented in the test section of the prototype is discussed. NSF-CMMI 0856438.

  15. Development and utilization of USGS ShakeCast for rapid post-earthquake assessment of critical facilities and infrastructure

    USGS Publications Warehouse

    Wald, David J.; Lin, Kuo-wan; Kircher, C.A.; Jaiswal, Kishor; Luco, Nicolas; Turner, L.; Slosky, Daniel

    2017-01-01

    The ShakeCast system is an openly available, near real-time post-earthquake information management system. ShakeCast is widely used by public and private emergency planners and responders, lifeline utility operators and transportation engineers to automatically receive and process ShakeMap products for situational awareness, inspection priority, or damage assessment of their own infrastructure or building portfolios. The success of ShakeCast to date and its broad, critical-user base mandates improved software usability and functionality, including improved engineering-based damage and loss functions. In order to make the software more accessible to novice users—while still utilizing advanced users’ technical and engineering background—we have developed a “ShakeCast Workbook”, a well documented, Excel spreadsheet-based user interface that allows users to input notification and inventory data and export XML files requisite for operating the ShakeCast system. Users will be able to select structure based on a minimum set of user-specified facility (building location, size, height, use, construction age, etc.). “Expert” users will be able to import user-modified structural response properties into facility inventory associated with the HAZUS Advanced Engineering Building Modules (AEBM). The goal of the ShakeCast system is to provide simplified real-time potential impact and inspection metrics (i.e., green, yellow, orange and red priority ratings) to allow users to institute customized earthquake response protocols. Previously, fragilities were approximated using individual ShakeMap intensity measures (IMs, specifically PGA and 0.3 and 1s spectral accelerations) for each facility but we are now performing capacity-spectrum damage state calculations using a more robust characterization of spectral deamnd.We are also developing methods for the direct import of ShakeMap’s multi-period spectra in lieu of the assumed three-domain design spectrum (at 0.3s for

  16. Clock genes control cortical critical period timing.

    PubMed

    Kobayashi, Yohei; Ye, Zhanlei; Hensch, Takao K

    2015-04-08

    Circadian rhythms control a variety of physiological processes, but whether they may also time brain development remains largely unknown. Here, we show that circadian clock genes control the onset of critical period plasticity in the neocortex. Within visual cortex of Clock-deficient mice, the emergence of circadian gene expression was dampened, and the maturation of inhibitory parvalbumin (PV) cell networks slowed. Loss of visual acuity in response to brief monocular deprivation was concomitantly delayed and rescued by direct enhancement of GABAergic transmission. Conditional deletion of Clock or Bmal1 only within PV cells recapitulated the results of total Clock-deficient mice. Unique downstream gene sets controlling synaptic events and cellular homeostasis for proper maturation and maintenance were found to be mis-regulated by Clock deletion specifically within PV cells. These data demonstrate a developmental role for circadian clock genes outside the suprachiasmatic nucleus, which may contribute mis-timed brain plasticity in associated mental disorders. Copyright © 2015 Elsevier Inc. All rights reserved.

  17. Tight Glycemic Control in Critically Ill Children.

    PubMed

    Agus, Michael S D; Wypij, David; Hirshberg, Eliotte L; Srinivasan, Vijay; Faustino, E Vincent; Luckett, Peter M; Alexander, Jamin L; Asaro, Lisa A; Curley, Martha A Q; Steil, Garry M; Nadkarni, Vinay M

    2017-02-23

    Background In multicenter studies, tight glycemic control targeting a normal blood glucose level has not been shown to improve outcomes in critically ill adults or children after cardiac surgery. Studies involving critically ill children who have not undergone cardiac surgery are lacking. Methods In a 35-center trial, we randomly assigned critically ill children with confirmed hyperglycemia (excluding patients who had undergone cardiac surgery) to one of two ranges of glycemic control: 80 to 110 mg per deciliter (4.4 to 6.1 mmol per liter; lower-target group) or 150 to 180 mg per deciliter (8.3 to 10.0 mmol per liter; higher-target group). Clinicians were guided by continuous glucose monitoring and explicit methods for insulin adjustment. The primary outcome was the number of intensive care unit (ICU)-free days to day 28. Results The trial was stopped early, on the recommendation of the data and safety monitoring board, owing to a low likelihood of benefit and evidence of the possibility of harm. Of 713 patients, 360 were randomly assigned to the lower-target group and 353 to the higher-target group. In the intention-to-treat analysis, the median number of ICU-free days did not differ significantly between the lower-target group and the higher-target group (19.4 days [interquartile range {IQR}, 0 to 24.2] and 19.4 days [IQR, 6.7 to 23.9], respectively; P=0.58). In per-protocol analyses, the median time-weighted average glucose level was significantly lower in the lower-target group (109 mg per deciliter [IQR, 102 to 118]; 6.1 mmol per liter [IQR, 5.7 to 6.6]) than in the higher-target group (123 mg per deciliter [IQR, 108 to 142]; 6.8 mmol per liter [IQR, 6.0 to 7.9]; P<0.001). Patients in the lower-target group also had higher rates of health care-associated infections than those in the higher-target group (12 of 349 patients [3.4%] vs. 4 of 349 [1.1%], P=0.04), as well as higher rates of severe hypoglycemia, defined as a blood glucose level below 40 mg per

  18. "Measuring Operational Effectiveness of Information Technology Infrastructure Library (IIL) and the Impact of Critical Facilities Inclusion in the Process."

    ERIC Educational Resources Information Center

    Woodell, Eric A.

    2013-01-01

    Information Technology (IT) professionals use the Information Technology Infrastructure Library (ITIL) process to better manage their business operations, measure performance, improve reliability and lower costs. This study examined the operational results of those data centers using ITIL against those that do not, and whether the results change…

  19. "Measuring Operational Effectiveness of Information Technology Infrastructure Library (IIL) and the Impact of Critical Facilities Inclusion in the Process."

    ERIC Educational Resources Information Center

    Woodell, Eric A.

    2013-01-01

    Information Technology (IT) professionals use the Information Technology Infrastructure Library (ITIL) process to better manage their business operations, measure performance, improve reliability and lower costs. This study examined the operational results of those data centers using ITIL against those that do not, and whether the results change…

  20. Cyber Infrastructure: The Forgotten Vulnerability

    DTIC Science & Technology

    2014-05-22

    presidential-policy-directive-critical-infrastructure-security-and- resil (accessed January 18, 2014). 114Department of Homeland Security, “NIPP 2013...Partnering Critical Infrastructure Security and Resilence ”, 2103, http://www.dhs.gov/sites/default/files/publications/NIPP%202013_Partnering%20 for...Critical Infrastructure Security and Resilence ”, 2103, http://www.dhs.gov/sites/default/files/publications/NIPP%202013_Partnering%20 for%20Critical

  1. Securing energy assets and infrastructure 2007

    SciTech Connect

    2006-06-15

    This report describes in detail the energy industry's challenges and solutions for protecting critical assets including oil and gas infrastructure, transmission grids, power plants, storage, pipelines, and all aspects of strategic industry assets. It includes a special section on cyber-terrorism and protecting control systems. Contents: Section I - Introduction; U.S Energy Trends; Vulnerabilities; Protection Measures. Section II - Sector-wise Vulnerabilities Assessments and Security Measures: Coal, Oil and Petroleum, Natural Gas, Electric Power, Cybersecurity and Control Systems, Key Recommendations; Section III - Critical Infrastructure Protection Efforts: Government Initiatives, Agencies, and Checklists.

  2. Accelerating the translation of research into practice in long term services and supports: a critical need for federal infrastructure at the nexus of aging and disability.

    PubMed

    Washko, Michelle M; Campbell, Margaret; Tilly, Jane

    2012-01-01

    The nexus of aging and disability, characterized by the phenomenon of aging with a disability, will become more visible as the population ages and the number of people with disabilities surviving to midlife increases. This article addresses 3 interrelated issues critical to the fields of aging and disability: increasing demand for community-based long-term services and supports, a paucity of evidence-based programs demonstrating effectiveness in facilitating independence for those aging with a disability, and lack of a federal infrastructure to support coordinated investments in research-to-practice for this population. Suggestions for federal interagency collaborations are given, along with roles for key stakeholders.

  3. Reducing combined sewer overflows by using outlet controls for Green Stormwater Infrastructure: Case study in Richmond, Virginia

    NASA Astrophysics Data System (ADS)

    Lucas, William C.; Sample, David J.

    2015-01-01

    Combined sewer overflows (CSOs) are a major problem in many cities. This paper assesses two Low Impact Development (LID) Green Stormwater Infrastructure (GSI) alternatives applied within a 7.05 ha catchment of the Shockoe Creek tributary of the James River in Richmond, Virginia. The LID alternatives were the "Green-Free" (typical free discharge underdrains) and the "Green-Control" (underdrains with flow controlled outlets). These alternatives were compared to two non-LID alternatives: "Existing" (existing conditions) and "Gray" (tunnel storage). A normal year scenario with average rainfall depths and intensities was compared to a scenario with anticipated higher intensity rainfall due to climate change (CC). In the normal year, the Green-Control alternative performed substantially better than both the Green-Free and the Gray alternatives in terms of volume control. However it experienced slightly more CSO events than Grey. The relative performance of both green alternatives improved with the CC climate year, indicating that GSI is more resilient than gray infrastructure. In particular, Green-Control exhibited much better performance. While the gray infrastructure solution reduced CSOs to the fewest number of occurrences, the smallest overflow volumes, lowest peak flows and the most resilient system was obtained by the Green-Control alternative. Since CSO volume is strongly related to the negative ecological impacts from overflows, and CSO occurrences are not, GSI provides a more sustainable solution than gray. These results find that hydraulic control of discharges should be the preferred option when considering GSI in CSO mitigation.

  4. Stormwater Pollutant Control from Critical Source Areas

    EPA Science Inventory

    Critical source areas include: vehicular maintenance facilities, parking lots and bus terminals, junk and lumber yards, industrial storage facilities, loading docks and refueling areas, manufacturing sites, etc. Addressing pollutant runoff from these areas is an important compon...

  5. Stormwater Pollutant Control from Critical Source Areas

    EPA Science Inventory

    Critical source areas include: vehicular maintenance facilities, parking lots and bus terminals, junk and lumber yards, industrial storage facilities, loading docks and refueling areas, manufacturing sites, etc. Addressing pollutant runoff from these areas is an important compon...

  6. Controlling and Harnessing Critical Casimir Forces

    NASA Astrophysics Data System (ADS)

    Gambassi, A.

    2010-04-01

    This contribution provides a brief overview of recent advances in the theoretical and experimental study of the critical Casimir effect originating from the confinement of the enhanced thermal fluctuations which occur close to a critical point. The resulting effect turns out to be highly tunable, it influences the behavior of soft matter, from wetting films of fluids to colloidal dispersions, and therefore might find applications for the manipulation of matter at the micrometer and sub-micrometer scale.

  7. Making green infrastructure healthier infrastructure

    PubMed Central

    Lõhmus, Mare; Balbus, John

    2015-01-01

    Increasing urban green and blue structure is often pointed out to be critical for sustainable development and climate change adaptation, which has led to the rapid expansion of greening activities in cities throughout the world. This process is likely to have a direct impact on the citizens’ quality of life and public health. However, alongside numerous benefits, green and blue infrastructure also has the potential to create unexpected, undesirable, side-effects for health. This paper considers several potential harmful public health effects that might result from increased urban biodiversity, urban bodies of water, and urban tree cover projects. It does so with the intent of improving awareness and motivating preventive measures when designing and initiating such projects. Although biodiversity has been found to be associated with physiological benefits for humans in several studies, efforts to increase the biodiversity of urban environments may also promote the introduction and survival of vector or host organisms for infectious pathogens with resulting spread of a variety of diseases. In addition, more green connectivity in urban areas may potentiate the role of rats and ticks in the spread of infectious diseases. Bodies of water and wetlands play a crucial role in the urban climate adaptation and mitigation process. However, they also provide habitats for mosquitoes and toxic algal blooms. Finally, increasing urban green space may also adversely affect citizens allergic to pollen. Increased awareness of the potential hazards of urban green and blue infrastructure should not be a reason to stop or scale back projects. Instead, incorporating public health awareness and interventions into urban planning at the earliest stages can help insure that green and blue infrastructure achieves full potential for health promotion. PMID:26615823

  8. Making green infrastructure healthier infrastructure.

    PubMed

    Lõhmus, Mare; Balbus, John

    2015-01-01

    Increasing urban green and blue structure is often pointed out to be critical for sustainable development and climate change adaptation, which has led to the rapid expansion of greening activities in cities throughout the world. This process is likely to have a direct impact on the citizens' quality of life and public health. However, alongside numerous benefits, green and blue infrastructure also has the potential to create unexpected, undesirable, side-effects for health. This paper considers several potential harmful public health effects that might result from increased urban biodiversity, urban bodies of water, and urban tree cover projects. It does so with the intent of improving awareness and motivating preventive measures when designing and initiating such projects. Although biodiversity has been found to be associated with physiological benefits for humans in several studies, efforts to increase the biodiversity of urban environments may also promote the introduction and survival of vector or host organisms for infectious pathogens with resulting spread of a variety of diseases. In addition, more green connectivity in urban areas may potentiate the role of rats and ticks in the spread of infectious diseases. Bodies of water and wetlands play a crucial role in the urban climate adaptation and mitigation process. However, they also provide habitats for mosquitoes and toxic algal blooms. Finally, increasing urban green space may also adversely affect citizens allergic to pollen. Increased awareness of the potential hazards of urban green and blue infrastructure should not be a reason to stop or scale back projects. Instead, incorporating public health awareness and interventions into urban planning at the earliest stages can help insure that green and blue infrastructure achieves full potential for health promotion.

  9. Monitoring of levees, bridges, pipelines, and other critical infrastructure during the 2011 flooding in the Mississippi River Basin: Chapter J in 2011 floods of the central United States

    USGS Publications Warehouse

    Densmore, Brenda K.; Burton, Bethany L.; Dietsch, Benjamin J.; Cannia, James C.; Huizinga, Richard J.

    2014-01-01

    During the 2011 Mississippi River Basin flood, the U.S. Geological Survey evaluated aspects of critical river infrastructure at the request of and in support of local, State, and Federal Agencies. Geotechnical and hydrographic data collected by the U.S. Geological Survey at numerous locations were able to provide needed information about 2011 flood effects to those managing the critical infrastructure. These data were collected and processed in a short time frame to provide managers the ability to make a timely evaluation of the safety of the infrastructure and, when needed, to take action to secure and protect critical infrastructure. Critical infrastructure surveyed by the U.S. Geological Survey included levees, bridges, pipeline crossings, power plant intakes and outlets, and an electrical transmission tower. Capacitively coupled resistivity data collected along the flood-protection levees surrounding the Omaha Public Power District Nebraska City power plant (Missouri River Levee Unit R573), mapped the near-subsurface electrical properties of the levee and the materials immediately below it. The near-subsurface maps provided a better understanding of the levee construction and the nature of the lithology beneath the levee. Comparison of the capacitively coupled resistivity surveys and soil borings indicated that low-resistivity value material composing the levee generally is associated with lean clay and silt to about 2 to 4 meters below the surface, overlying a more resistive layer associated with sand deposits. In general, the resistivity structure becomes more resistive to the south and the southern survey sections correlate well with the borehole data that indicate thinner clay and silt at the surface and thicker sand sequences at depth in these sections. With the resistivity data Omaha Public Power District could focus monitoring efforts on areas with higher resistivity values (coarser-grained deposits or more loosely compacted section), which typically are

  10. Creating a New Model for Mainstreaming Climate Change Adaptation for Critical Infrastructure: The New York City Climate Change Adaptation Task Force and the NYC Panel on Climate Change

    NASA Astrophysics Data System (ADS)

    Rosenzweig, C.; Solecki, W. D.; Freed, A. M.

    2008-12-01

    The New York City Climate Change Adaptation Task Force, launched in August 2008, aims to secure the city's critical infrastructure against rising seas, higher temperatures and fluctuating water supplies projected to result from climate change. The Climate Change Adaptation Task Force is part of PlaNYC, the city's long- term sustainability plan, and is composed of over 30 city and state agencies, public authorities and companies that operate the region's roads, bridges, tunnels, mass transit, and water, sewer, energy and telecommunications systems - all with critical infrastructure identified as vulnerable. It is one of the most comprehensive adaptation efforts yet launched by an urban region. To guide the effort, Mayor Michael Bloomberg has formed the New York City Panel on Climate Change (NPCC), modeled on the Intergovernmental Panel on Climate Change (IPCC). Experts on the panel include climatologists, sea-level rise specialists, adaptation experts, and engineers, as well as representatives from the insurance and legal sectors. The NPCC is developing planning tools for use by the Task Force members that provide information about climate risks, adaptation and risk assessment, prioritization frameworks, and climate protection levels. The advisory panel is supplying climate change projections, helping to identify at- risk infrastructure, and assisting the Task Force in developing adaptation strategies and guidelines for design of new structures. The NPCC will also publish an assessment report in 2009 that will serve as the foundation for climate change adaptation in the New York City region, similar to the IPCC reports. Issues that the Climate Change Adaptation Task Force and the NPCC are addressing include decision- making under climate change uncertainty, effective ways for expert knowledge to be incorporated into public actions, and strategies for maintaining consistent and effective attention to long-term climate change even as municipal governments cycle

  11. Green Infrastructure 101

    EPA Science Inventory

    Green Infrastructure 101 • What is it? What does it do? What doesn’t it do? • Green Infrastructure as a stormwater and combined sewer control • GI Controls and Best Management Practices that make sense for Yonkers o (Include operations and maintenance requirements for each)

  12. The TDAQ Analytics Dashboard: a real-time web application for the ATLAS TDAQ control infrastructure

    NASA Astrophysics Data System (ADS)

    Lehmann Miotto, Giovanna; Magnoni, Luca; Sloper, John Erik

    2011-12-01

    The ATLAS Trigger and Data Acquisition (TDAQ) infrastructure is responsible for filtering and transferring ATLAS experimental data from detectors to mass storage systems. It relies on a large, distributed computing system composed of thousands of software applications running concurrently. In such a complex environment, information sharing is fundamental for controlling applications behavior, error reporting and operational monitoring. During data taking, the streams of messages sent by applications and data published via information services are constantly monitored by experts to verify the correctness of running operations and to understand problematic situations. To simplify and improve system analysis and errors detection tasks, we developed the TDAQ Analytics Dashboard, a web application that aims to collect, correlate and visualize effectively this real time flow of information. The TDAQ Analytics Dashboard is composed of two main entities that reflect the twofold scope of the application. The first is the engine, a Java service that performs aggregation, processing and filtering of real time data stream and computes statistical correlation on sliding windows of time. The results are made available to clients via a simple web interface supporting SQL-like query syntax. The second is the visualization, provided by an Ajax-based web application that runs on client's browser. The dashboard approach allows to present information in a clear and customizable structure. Several types of interactive graphs are proposed as widgets that can be dynamically added and removed from visualization panels. Each widget acts as a client for the engine, querying the web interface to retrieve data with desired criteria. In this paper we present the design, development and evolution of the TDAQ Analytics Dashboard. We also present the statistical analysis computed by the application in this first period of high energy data taking operations for the ATLAS experiment.

  13. Validation of acid washes as critical control points in hazard analysis and critical control point systems.

    PubMed

    Dormedy, E S; Brashears, M M; Cutter, C N; Burson, D E

    2000-12-01

    A 2% lactic acid wash used in a large meat-processing facility was validated as an effective critical control point (CCP) in a hazard analysis and critical control point (HACCP) plan. We examined the microbial profiles of beef carcasses before the acid wash, beef carcasses immediately after the acid wash, beef carcasses 24 h after the acid wash, beef subprimal cuts from the acid-washed carcasses, and on ground beef made from acid-washed carcasses. Total mesophilic, psychrotrophic, coliforms, generic Escherichia coli, lactic acid bacteria, pseudomonads, and acid-tolerant microorganisms were enumerated on all samples. The presence of Salmonella spp. was also determined. Acid washing significantly reduced all counts except for pseudomonads that were present at very low numbers before acid washing. All other counts continued to stay significantly lower (P < 0.05) than those on pre-acid-washed carcasses throughout all processing steps. Total bacteria, coliforms, and generic E. coli enumerated on ground beef samples were more than 1 log cycle lower than those reported in the U.S. Department of Agriculture Baseline data. This study suggests that acid washes may be effective CCPs in HACCP plans and can significantly reduce the total number of microorganisms present on the carcass and during further processing.

  14. Validation of Flight Critical Control Systems

    DTIC Science & Technology

    1991-12-01

    Operations and Control System ADIRS Air Data & Inertial Reference Systems AFB Air Force Base AFTI Advanced Fighter Technology Integration AGARD Advisory...redundancy is employed at the aircraft effector plane. The objective is to generate forces and moments about some control axis, in the case of failure of...Flight Control System", Proceedings of the United States Air Force Academy Advanced Flight Controls Symposium, 198 1. 2-13 2 fFlapper, J.A., and

  15. The Infrastructure Necessary to Support a Sustainable Material Protection, Control and Accounting (MPC&A) Program in Russia

    SciTech Connect

    Bachner, Katherine M.; Mladineo, Stephen V.

    2011-07-20

    The NNSA Material Protection, Control, and Accounting (MPC&A) program has been engaged for fifteen years in upgrading the security of nuclear materials in Russia. Part of the effort has been to establish the conditions necessary to ensure the long-term sustainability of nuclear security. A sustainable program of nuclear security requires the creation of an indigenous infrastructure, starting with sustained high level government commitment. This includes organizational development, training, maintenance, regulations, inspections, and a strong nuclear security culture. The provision of modern physical protection, control, and accounting equipment to the Russian Federation alone is not sufficient. Comprehensive infrastructure projects support the Russian Federation's ability to maintain the risk reduction achieved through upgrades to the equipment. To illustrate the contributions to security, and challenges of implementation, this paper discusses the history and next steps for an indigenous Tamper Indication Device (TID) program, and a Radiation Portal Monitoring (RPM) program.

  16. New York Solar Smart DG Hub-Resilient Solar Project: Economic and Resiliency Impact of PV and Storage on New York Critical Infrastructure

    SciTech Connect

    Anderson, Kate; Burman, Kari; Simpkins, Travis; Helson, Erica; Lisell, Lars

    2016-06-01

    Resilient PV, which is solar paired with storage ('solar-plus-storage'), provides value both during normal grid operation and power outages as opposed to traditional solar PV, which functions only when the electric grid is operating. During normal grid operations, resilient PV systems help host sites generate revenue and/or reduce electricity bill charges. During grid outages, resilient PV provides critical emergency power that can help people in need and ease demand on emergency fuel supplies. The combination of grid interruptions during recent storms, the proliferation of solar PV, and the growing deployment of battery storage technologies has generated significant interest in using these assets for both economic and resiliency benefits. This report analyzes the technical and economic viability for resilient PV on three critical infrastructure sites in New York City (NYC): a school that is part of a coastal storm shelter system, a fire station, and a NYCHA senior center that serves as a cooling center during heat emergencies. This analysis differs from previous solar-plus-storage studies by placing a monetary value on resiliency and thus, in essence, modeling a new revenue stream for the avoided cost of a power outage. Analysis results show that resilient PV is economically viable for NYC's critical infrastructure and that it may be similarly beneficial to other commercial buildings across the city. This report will help city building owners, managers, and policymakers better understand the economic and resiliency benefits of resilient PV. As NYC fortifies its building stock against future storms of increasing severity, resilient PV can play an important role in disaster response and recovery while also supporting city greenhouse gas emission reduction targets and relieving stress to the electric grid from growing power demands.

  17. To establish centers of excellence for innovative stormwater control infrastructure, and for other purposes.

    THOMAS, 113th Congress

    Rep. Heck, Denny [D-WA-10

    2017-10-02

    House - 10/02/2017 Referred to the Committee on Transportation and Infrastructure, and in addition to the Committee on Science, Space, and Technology, for a period to be subsequently determined by the Speaker, in each case for consideration of such provisions as fall within the... (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. Is the work flow model a suitable candidate for an observatory supervisory control infrastructure?

    NASA Astrophysics Data System (ADS)

    Daly, Philip N.; Schumacher, Germán.

    2016-08-01

    This paper reports on the early investigation of using the work flow model for observatory infrastructure software. We researched several work ow engines and identified 3 for further detailed, study: Bonita BPM, Activiti and Taverna. We discuss the business process model and how it relates to observatory operations and identify a path finder exercise to further evaluate the applicability of these paradigms.

  19. Green Infrastructure for Stormwater Control: Gauging its Effectiveness with Community Partners, Summary of EPA GI Reports

    EPA Science Inventory

    This document is a summary of the green infrastructure reports, journal articles, and conference proceedings published to date. This summary will be updated as more reports are completed. The Environmental Protection Agency’s Office of Research and Development has an ambitious ...

  20. Infrastructure sensing

    PubMed Central

    Soga, Kenichi; Schooling, Jennifer

    2016-01-01

    Design, construction, maintenance and upgrading of civil engineering infrastructure requires fresh thinking to minimize use of materials, energy and labour. This can only be achieved by understanding the performance of the infrastructure, both during its construction and throughout its design life, through innovative monitoring. Advances in sensor systems offer intriguing possibilities to radically alter methods of condition assessment and monitoring of infrastructure. In this paper, it is hypothesized that the future of infrastructure relies on smarter information; the rich information obtained from embedded sensors within infrastructure will act as a catalyst for new design, construction, operation and maintenance processes for integrated infrastructure systems linked directly with user behaviour patterns. Some examples of emerging sensor technologies for infrastructure sensing are given. They include distributed fibre-optics sensors, computer vision, wireless sensor networks, low-power micro-electromechanical systems, energy harvesting and citizens as sensors. PMID:27499845

  1. Infrastructure sensing.

    PubMed

    Soga, Kenichi; Schooling, Jennifer

    2016-08-06

    Design, construction, maintenance and upgrading of civil engineering infrastructure requires fresh thinking to minimize use of materials, energy and labour. This can only be achieved by understanding the performance of the infrastructure, both during its construction and throughout its design life, through innovative monitoring. Advances in sensor systems offer intriguing possibilities to radically alter methods of condition assessment and monitoring of infrastructure. In this paper, it is hypothesized that the future of infrastructure relies on smarter information; the rich information obtained from embedded sensors within infrastructure will act as a catalyst for new design, construction, operation and maintenance processes for integrated infrastructure systems linked directly with user behaviour patterns. Some examples of emerging sensor technologies for infrastructure sensing are given. They include distributed fibre-optics sensors, computer vision, wireless sensor networks, low-power micro-electromechanical systems, energy harvesting and citizens as sensors.

  2. Critical contribution of sanitation infrastructure and primary medical care to child health status in Japan from 1955 to 2000.

    PubMed

    Ishitani, Seiko; Nakamura, Keiko; Fukuda, Yoshiharu; Kizuki, Masashi; Seino, Kaoruko; Inose, Tomoko

    2005-12-01

    We examined the associations between prefectural health status of children and sanitation infrastructure, medical care services and socioeconomic status in Japan during 1955-2000. Four indicators of child health status: infant mortality rate (IMR), Ascaris lumbricoides prevalence and height and weight of elementary school children, and five prefectural social indicators: water supply, sewerage, number of physicians, income and women's education, were calculated over five-year intervals and examined by correlation and panel data analyses. Associations between paediatric health and five social indicators were significant (p<0.001) until 1970. After adjustment for income or education, water supply diffusion rate showed a significantly negative association with IMR until the 1980s. A significantly positive correlation was observed between the number of physician and paediatric health from 1955-70 after adjustment for income. Water supply development showed a positive association with paediatric health after adjustment for economic or educational impact during the phases of rapid and steady economic growth, while medical care showed a positive correlation with paediatric health after adjustment for income during only the phase of rapid economic growth. Relationships between child health status and social indicators have changed over time with stage of economic development.

  3. Critical length scale controls adhesive wear mechanisms

    PubMed Central

    Aghababaei, Ramin; Warner, Derek H.; Molinari, Jean-Francois

    2016-01-01

    The adhesive wear process remains one of the least understood areas of mechanics. While it has long been established that adhesive wear is a direct result of contacting surface asperities, an agreed upon understanding of how contacting asperities lead to wear debris particle has remained elusive. This has restricted adhesive wear prediction to empirical models with limited transferability. Here we show that discrepant observations and predictions of two distinct adhesive wear mechanisms can be reconciled into a unified framework. Using atomistic simulations with model interatomic potentials, we reveal a transition in the asperity wear mechanism when contact junctions fall below a critical length scale. A simple analytic model is formulated to predict the transition in both the simulation results and experiments. This new understanding may help expand use of computer modelling to explore adhesive wear processes and to advance physics-based wear laws without empirical coefficients. PMID:27264270

  4. Critical review and analysis of the impact of the physical infrastructure on the driving ability, performance, and safety of older adults.

    PubMed

    Bohr, Paula Christine

    2008-01-01

    Literature on the impact of physical infrastructure on older adult safe driving performance was reviewed in 2005 as part of the American Occupational Therapy Association's Evidence-Based Literature Review Project. Existing guidelines for driving environments, related to changes in visual, cognitive, and psychomotor abilities associated with the aging process (as published in the Highway Design Handbook for Older Drivers and Pedestrians, Federal Highway Administration, 2001), are exhaustive, but the authors made no attempt to critically assess the strength of the study design or level of evidence. In laboratory studies since 1999, the interventions lacked applicability to real-life driving environments. Further investigation of the effectiveness of best practice interventions and how the driving environment can better accommodate the needs of older drivers is needed. Occupational therapy interventions that focus on the occupation of driving and compensation and education strategies that allow older adults to drive safely as long as possible are included.

  5. Protecting America: Reorganizing the Nation’s Security Forces to Ensure the Protection of Our Critical Infrastructure

    DTIC Science & Technology

    2004-03-19

    As an example, before the terrorist hijackings of September 11, 2001, airport security was the responsibility of private carriers, state and local...mobilized for airport security , critical site protection, and weapons of mass destruction (WMD) detection, and more than 91,000 HOMELAND SECURITY...Preemptive and Retaliatory Strikes Counter Drugs Missile Defense Military Civil Law Enforcement Airport Security Local and State Consequence Management

  6. Critical Issues in Crime Control Policy.

    ERIC Educational Resources Information Center

    Flynn, Edith Elisabeth, Ed.

    1983-01-01

    Entire issue discusses crime control policy in the United States, including such issues as the relation of social and environmental variables to criminal activity, dealing with the career offender, biological correlates of criminal behavior, juvenile delinquency, and white collar crime. (CS)

  7. Critical Issues in Crime Control Policy.

    ERIC Educational Resources Information Center

    Flynn, Edith Elisabeth, Ed.

    1983-01-01

    Entire issue discusses crime control policy in the United States, including such issues as the relation of social and environmental variables to criminal activity, dealing with the career offender, biological correlates of criminal behavior, juvenile delinquency, and white collar crime. (CS)

  8. An experience of knowledge co-production for setting up landslide risk management processes in a critical infrastructure: the case of Campania Region (Southern Italy)

    NASA Astrophysics Data System (ADS)

    Rianna, Guido; Roca Collell, Marta; Uzielli, Marco; Van Ruiten, Kees; Mercogliano, Paola; Ciervo, Fabio; Reder, Alfredo

    2017-04-01

    In Campania Region (Southern Italy), expected increases in heavy rainfall events under the effect of climate changes and demographic pressure could entail a growth of occurrence of weather induced landslides and associated damages. Indeed, already in recent years, pyroclastic covers mantling the slopes of a large part of the Region have been affected by numerous events often causing victims and damages to infrastructures serving the urban centers. Due to the strategic relevance of the area, landslide events affecting volcanic layers in Campania Region are one of the five case studies investigated in the FP7 European Project INTACT about the impacts of extreme weather on critical infrastructure. The main aim of INTACT project is to increase the resilience of critical infrastructures (CI) facing extreme weather events improving the awareness of stakeholders and asset managers about such phenomena and their potential variations due to Climate Changes and providing tools to support risk management strategies. A WIKI has been designed as a remote support for all stages of the risk process through brief theoretical explanations (in Wiki style) about tools and methods proposed and reports on the findings and hints returned by case studies investigations. In order to have a product tailored to the needs and background of CI owners, managers and policy makers, an intense effort of knowledge co-production between researchers and stakeholders have been carried out in different case studies through questionnaires, meetings, workshops and/or 1-to-1 interviews. This work presents the different tools and approaches adopted to facilitate the exchange with stakeholders in the Campanian case study such as the "Storytelling approach", aiming to stress the need for a comprehensive and overall approach to the issue between the different disaster management phases (mitigation, preparedness, response and recovery) and actors; the CIRCLE approach developed by Deltares, partner in INTACT

  9. Towards risk-based management of critical infrastructures : enabling insights and analysis methodologies from a focused study of the bulk power grid.

    SciTech Connect

    Richardson, Bryan T.; LaViolette, Randall A.; Cook, Benjamin Koger

    2008-02-01

    This report summarizes research on a holistic analysis framework to assess and manage risks in complex infrastructures, with a specific focus on the bulk electric power grid (grid). A comprehensive model of the grid is described that can approximate the coupled dynamics of its physical, control, and market components. New realism is achieved in a power simulator extended to include relevant control features such as relays. The simulator was applied to understand failure mechanisms in the grid. Results suggest that the implementation of simple controls might significantly alter the distribution of cascade failures in power systems. The absence of cascade failures in our results raises questions about the underlying failure mechanisms responsible for widespread outages, and specifically whether these outages are due to a system effect or large-scale component degradation. Finally, a new agent-based market model for bilateral trades in the short-term bulk power market is presented and compared against industry observations.

  10. Stable adaptive control using new critic designs

    NASA Astrophysics Data System (ADS)

    Werbos, Paul J.

    1999-03-01

    Classical adaptive control proves total-system stability for control of linear plants, but only for plants meeting very restrictive assumptions. Approximate Dynamic Programming (ADP) has the potential, in principle, to ensure stability without such tight restrictions. It also offers nonlinear and neural extensions for optimal control, with empirically supported links to what is seen in the brain. However, the relevant ADP methods in use today--TD, HDP, DHP, GDHP--and the Galerkin-based versions of these all have serious limitations when used here as parallel distributed real-time learning systems; either they do not possess quadratic unconditional stability (to be defined) or they lead to incorrect results in the stochastic case. (ADAC or Q- learning designs do not help.) After explaining these conclusions, this paper describes new ADP designs which overcome these limitations. It also addresses the Generalized Moving Target problem, a common family of static optimization problems, and describes a way to stabilize large-scale economic equilibrium models, such as the old long-term energy mode of DOE.

  11. Implementation of hazard analysis critical control point in jameed production.

    PubMed

    Al-Saed, A K; Al-Groum, R M; Al-Dabbas, M M

    2012-06-01

    The average of standard plate count and coliforms, Staphylococcus aureus and Salmonella counts for three home-made jameed samples, a traditional fermented dairy product, before applying hazard analysis critical control point system were 2.1 × 10(3), 8.9 × 10(1), 4 × 10(1) and less than 10 cfu/g, respectively. The developed hazard analysis critical control point plan resulted in identifying ten critical control points in the flow chart of jameed production. The critical control points included fresh milk receiving, pasteurization, addition of starter, water and salt, straining, personnel hygiene, drying and packaging. After applying hazard analysis critical control point system, there was significant improvement in the microbiological quality of the home-made jameed. The standard plate count was reduced to 3.1 × 10(2) cfu/g whereas coliform and Staphylococcus aureus counts were less than 10 cfu/g and Salmonella was not detected. Sensory evaluation results of color and flavor of sauce prepared from jameed showed a significant increase in the average scores given after hazard analysis critical control point application.

  12. [Attributes of forest infrastructure].

    PubMed

    Gao, Jun-kai; Jin, Ying-shan

    2007-06-01

    This paper discussed the origin and evolution of the conception of ecological infrastructure, the understanding of international communities about the functions of forest, the important roles of forest in China' s economic development and ecological security, and the situations and challenges to the ongoing forestry ecological restoration programs. It was suggested that forest should be defined as an essential infrastructure for national economic and social development in a modern society. The critical functions of forest infrastructure played in the transition of forestry ecological development were emphasized. Based on the synthesis of forest ecosystem features, it was considered that the attributes of forest infrastructure are distinctive, due to the fact that it is constructed by living biological material and diversified in ownership. The forestry ecological restoration program should not only follow the basic principles of infrastructural construction, but also take the special characteristics of forests into consideration in studying the managerial system of the programs. Some suggestions for the ongoing programs were put forward: 1) developing a modern concept of ecosystem where man and nature in harmony is the core, 2) formulating long-term stable investments for forestry ecological restoration programs, 3) implementing forestry ecological restoration programs based on infrastructure construction principles, and 4) managing forests according to the principles of infrastructural construction management.

  13. Shadows of Stuxnet: Recommendations for U.S. Policy on Critical Infrastructure Cyber Defense Derived from the Stuxnet Attack

    DTIC Science & Technology

    2016-03-01

    its Cybersecurity Information Sharing Partnership (CISP) in March 2013. CISP provides a collaborative platform for companies to share real time ...0704–0188 Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing...industrial control systems (ICS), information technology (IT), National Institute of Standards and Technology (NIST), presidential decision directive (PDD

  14. Do federal and state audits increase compliance with a grant program to improve municipal infrastructure (AUDIT study): study protocol for a randomized controlled trial.

    PubMed

    De La O, Ana L; Martel García, Fernando

    2014-09-03

    Poor governance and accountability compromise young democracies' efforts to provide public services critical for human development, including water, sanitation, health, and education. Evidence shows that accountability agencies like superior audit institutions can reduce corruption and waste in federal grant programs financing service infrastructure. However, little is know about their effect on compliance with grant reporting and resource allocation requirements, or about the causal mechanisms. This study protocol for an exploratory randomized controlled trial tests the hypothesis that federal and state audits increase compliance with a federal grant program to improve municipal service infrastructure serving marginalized households. The AUDIT study is a block randomized, controlled, three-arm parallel group exploratory trial. A convenience sample of 5 municipalities in each of 17 states in Mexico (n=85) were block randomized to be audited by federal auditors (n=17), by state auditors (n=17), and a control condition outside the annual program of audits (n=51) in a 1:1:3 ratio. Replicable and verifiable randomization was performed using publicly available lottery numbers. Audited municipalities were included in the national program of audits and received standard audits on their use of federal public service infrastructure grants. Municipalities receiving moderate levels of grant transfers were recruited, as these were outside the auditing sampling frame--and hence audit program--or had negligible probabilities of ever being audited. The primary outcome measures capture compliance with the grant program and markers for the causal mechanisms, including deterrence and information effects. Secondary outcome measure include differences in audit reports across federal and state auditors, and measures like career concerns, political promotions, and political clientelism capturing synergistic effects with municipal accountability systems. The survey firm and research

  15. Controlling colloidal phase transitions with critical Casimir forces.

    PubMed

    Nguyen, Van Duc; Faber, Suzanne; Hu, Zhibing; Wegdam, Gerard H; Schall, Peter

    2013-01-01

    The critical Casimir force provides a thermodynamic analogue of the quantum mechanical Casimir force that arises from the confinement of electromagnetic field fluctuations. In its thermodynamic analogue, two surfaces immersed in a critical solvent mixture attract each other due to confinement of solvent concentration fluctuations. Here, we demonstrate the active assembly control of colloidal equilibrium phases using critical Casimir forces. We guide colloidal particles into analogues of molecular liquid and solid phases via exquisite control over their interactions. By measuring the critical Casimir pair potential directly from density fluctuations in the colloidal gas, we obtain insight into liquefaction at small scales. We apply the van der Waals model of molecular liquefaction and show that the colloidal gas-liquid condensation is accurately described by the van der Waals theory, even on the scale of a few particles. These results open up new possibilities in the active assembly control of micro and nanostructures.

  16. A Way to Operationalize the DOD’s Critical Infrastructure Protection Program Using Information Assurance Policies and Technologies

    DTIC Science & Technology

    2005-03-18

    Assurance Support Center ( MASC ), 10 which is an independent operations center, is not integrated into the Global NetOps C2 process. The Global NetOps...Response Center (NSIRC);11 Functional Combatant Commands; and Service/Agency Headquarters. This paper recommends that the MASC , which can also have...This figure has been modified to show an informal reporting relationship with the MASC . FIGURE 1: GLOBAL NETOPS COMMAND AND CONTROL12

  17. Final Technical Report: Controlled Hydrogen Fleet and Infrastructure Demonstration and Validation Project

    SciTech Connect

    Ronald Grasman

    2011-12-31

    This report summarizes the work conducted under U.S. Department of Energy (DOE) under contract DE-FC36-04GO14285 by Mercedes-Benz & Research Development, North America (MBRDNA), Chrysler, Daimler, Mercedes Benz USA (MBUSA), BP, DTE Energy and NextEnergy to validate fuel cell technologies for infrastructure, transportation as well as assess technology and commercial readiness for the market. The Mercedes Team, together with its partners, tested the technology by operating and fueling hydrogen fuel cell vehicles under real world conditions in varying climate, terrain and driving conditions. Vehicle and infrastructure data was collected to monitor the progress toward the hydrogen vehicle and infrastructure performance targets of $2.00 to 3.00/gge hydrogen production cost and 2,000-hour fuel cell durability. Finally, to prepare the public for a hydrogen economy, outreach activities were designed to promote awareness and acceptance of hydrogen technology. DTE, BP and NextEnergy established hydrogen filling stations using multiple technologies for on-site hydrogen generation, storage and dispensing. DTE established a hydrogen station in Southfield, Michigan while NextEnergy and BP worked together to construct one hydrogen station in Detroit. BP constructed another fueling station in Burbank, California and provided a full-time hydrogen trailer at San Francisco, California and a hydrogen station located at Los Angeles International Airport in Southern, California. Stations were operated between 2005 and 2011. The Team deployed 30 Gen I Fuel Cell Vehicles (FCVs) in the beginning of the project. While 28 Gen I F-CELLs used the A-Class platform, the remaining 2 were Sprinter delivery vans. Fuel cell vehicles were operated by external customers for real-world operations in various regions (ecosystems) to capture various driving patterns and climate conditions (hot, moderate and cold). External operators consisted of F-CELL partner organizations in California and Michigan

  18. Infrastructure Vulnerability Assessment Model (I-VAM).

    PubMed

    Ezell, Barry Charles

    2007-06-01

    Quantifying vulnerability to critical infrastructure has not been adequately addressed in the literature. Thus, the purpose of this article is to present a model that quantifies vulnerability. Vulnerability is defined as a measure of system susceptibility to threat scenarios. This article asserts that vulnerability is a condition of the system and it can be quantified using the Infrastructure Vulnerability Assessment Model (I-VAM). The model is presented and then applied to a medium-sized clean water system. The model requires subject matter experts (SMEs) to establish value functions and weights, and to assess protection measures of the system. Simulation is used to account for uncertainty in measurement, aggregate expert assessment, and to yield a vulnerability (Omega) density function. Results demonstrate that I-VAM is useful to decisionmakers who prefer quantification to qualitative treatment of vulnerability. I-VAM can be used to quantify vulnerability to other infrastructures, supervisory control and data acquisition systems (SCADA), and distributed control systems (DCS).

  19. Advanced Neuropsychological Diagnostics Infrastructure (ANDI): A Normative Database Created from Control Datasets

    PubMed Central

    de Vent, Nathalie R.; Agelink van Rentergem, Joost A.; Schmand, Ben A.; Murre, Jaap M. J.; Huizenga, Hilde M.

    2016-01-01

    In the Advanced Neuropsychological Diagnostics Infrastructure (ANDI), datasets of several research groups are combined into a single database, containing scores on neuropsychological tests from healthy participants. For most popular neuropsychological tests the quantity, and range of these data surpasses that of traditional normative data, thereby enabling more accurate neuropsychological assessment. Because of the unique structure of the database, it facilitates normative comparison methods that were not feasible before, in particular those in which entire profiles of scores are evaluated. In this article, we describe the steps that were necessary to combine the separate datasets into a single database. These steps involve matching variables from multiple datasets, removing outlying values, determining the influence of demographic variables, and finding appropriate transformations to normality. Also, a brief description of the current contents of the ANDI database is given. PMID:27812340

  20. Operational models of infrastructure resilience.

    PubMed

    Alderson, David L; Brown, Gerald G; Carlyle, W Matthew

    2015-04-01

    We propose a definition of infrastructure resilience that is tied to the operation (or function) of an infrastructure as a system of interacting components and that can be objectively evaluated using quantitative models. Specifically, for any particular system, we use quantitative models of system operation to represent the decisions of an infrastructure operator who guides the behavior of the system as a whole, even in the presence of disruptions. Modeling infrastructure operation in this way makes it possible to systematically evaluate the consequences associated with the loss of infrastructure components, and leads to a precise notion of "operational resilience" that facilitates model verification, validation, and reproducible results. Using a simple example of a notional infrastructure, we demonstrate how to use these models for (1) assessing the operational resilience of an infrastructure system, (2) identifying critical vulnerabilities that threaten its continued function, and (3) advising policymakers on investments to improve resilience. © 2014 Society for Risk Analysis.

  1. Green Infrastructure

    EPA Science Inventory

    Large paved surfaces keep rain from infiltrating the soil and recharging groundwater supplies. Alternatively, Green infrastructure uses natural processes to reduce and treat stormwater in place by soaking up and storing water. These systems provide many environmental, social, an...

  2. Green Infrastructure

    EPA Science Inventory

    Large paved surfaces keep rain from infiltrating the soil and recharging groundwater supplies. Alternatively, Green infrastructure uses natural processes to reduce and treat stormwater in place by soaking up and storing water. These systems provide many environmental, social, an...

  3. Practice of strict glycemic control in critically ill patients.

    PubMed

    Schultz, Marcus J; de Graaff, Mart J; Royakkers, Annic A N M; van Braam Houckgeest, Floris; van der Sluijs, Johannes P; Kieft, Hans; Spronk, Peter E

    2008-11-01

    Blood glucose control aiming at normoglycemia, frequently referred to as "strict glycemic control", decreases mortality and morbidity of critically ill patients. We searched the medical literature for export opinions, surveys, and clinical reports on blood glucose control in intensive care medicine. While strict glycemic control has been recommended standard of care for critically ill patients, the risk of severe hypoglycemia with strict glycemic control is frequently mentioned by experts. Some rationalize this risk, though others strongly point out the high incidence of hypoglycemia to be (one) reason not to perform strict glycemic control. Implementation of strict glycemic control is far from complete in intensive care units across the world. Frequently local guidelines accept higher blood glucose levels than those with strict glycemic control. Only a minority of retrieved manuscripts are on blood glucose regimens with the lower targets as with strict glycemic control. Hypoglycemia certainly is encountered with blood glucose control, in particular with strict glycemic control. Reports show intensive care-nurses can adequately and safely perform strict glycemic control. Implementation of strict glycemic control is far from complete, at least in part because of the feared risks of hypoglycemia. The preference for hyperglycemia over intermittent hypoglycemia is irrational, however, because there is causal evidence of harm for the former but only associative evidence of harm for the latter. For several reasons it is wise to have strict glycemic control being a nurse-based strategy.

  4. Critical period of weed control in aerobic rice.

    PubMed

    Anwar, M P; Juraimi, A S; Samedani, B; Puteh, A; Man, A

    2012-01-01

    Critical period of weed control is the foundation of integrated weed management and, hence, can be considered the first step to design weed control strategy. To determine critical period of weed control of aerobic rice, field trials were conducted during 2010/2011 at Universiti Putra Malaysia. A quantitative series of treatments comprising two components, (a) increasing duration of weed interference and (b) increasing length of weed-free period, were imposed. Critical period was determined through Logistic and Gompertz equations. Critical period varied between seasons; in main season, it started earlier and lasted longer, as compared to off-season. The onset of the critical period was found relatively stable between seasons, while the end was more variable. Critical period was determined as 7-49 days after seeding in off-season and 7-53 days in main season to achieve 95% of weed-free yield, and 23-40 days in off-season and 21-43 days in main season to achieve 90% of weed-free yield. Since 5% yield loss level is not practical from economic view point, a 10% yield loss may be considered excellent from economic view point. Therefore, aerobic rice should be kept weed-free during 21-43 days for better yield and higher economic return.

  5. Critical Period of Weed Control in Aerobic Rice

    PubMed Central

    Anwar, M. P.; Juraimi, A. S.; Samedani, B.; Puteh, A.; Man, A.

    2012-01-01

    Critical period of weed control is the foundation of integrated weed management and, hence, can be considered the first step to design weed control strategy. To determine critical period of weed control of aerobic rice, field trials were conducted during 2010/2011 at Universiti Putra Malaysia. A quantitative series of treatments comprising two components, (a) increasing duration of weed interference and (b) increasing length of weed-free period, were imposed. Critical period was determined through Logistic and Gompertz equations. Critical period varied between seasons; in main season, it started earlier and lasted longer, as compared to off-season. The onset of the critical period was found relatively stable between seasons, while the end was more variable. Critical period was determined as 7–49 days after seeding in off-season and 7–53 days in main season to achieve 95% of weed-free yield, and 23–40 days in off-season and 21–43 days in main season to achieve 90% of weed-free yield. Since 5% yield loss level is not practical from economic view point, a 10% yield loss may be considered excellent from economic view point. Therefore, aerobic rice should be kept weed-free during 21–43 days for better yield and higher economic return. PMID:22778701

  6. Critical issues in process control system security : DHS spares project.

    SciTech Connect

    Hernandez, Jacquelynne; McIntyre, Annie; Henrie, Morgan

    2010-10-01

    The goals of this event are: (1) Discuss the next-generation issues and emerging risks in cyber security for control systems; (2) Review and discuss common control system architectures; (3) Discuss the role of policy, standards, and supply chain issues; (4) Interact to determine the most pertinent risks and most critical areas of the architecture; and (5) Merge feedback from Control System Managers, Engineers, IT, and Auditors.

  7. MFC Communications Infrastructure Study

    SciTech Connect

    Michael Cannon; Terry Barney; Gary Cook; George Danklefsen, Jr.; Paul Fairbourn; Susan Gihring; Lisa Stearns

    2012-01-01

    Unprecedented growth of required telecommunications services and telecommunications applications change the way the INL does business today. High speed connectivity compiled with a high demand for telephony and network services requires a robust communications infrastructure.   The current state of the MFC communication infrastructure limits growth opportunities of current and future communication infrastructure services. This limitation is largely due to equipment capacity issues, aging cabling infrastructure (external/internal fiber and copper cable) and inadequate space for telecommunication equipment. While some communication infrastructure improvements have been implemented over time projects, it has been completed without a clear overall plan and technology standard.   This document identifies critical deficiencies with the current state of the communication infrastructure in operation at the MFC facilities and provides an analysis to identify needs and deficiencies to be addressed in order to achieve target architectural standards as defined in STD-170. The intent of STD-170 is to provide a robust, flexible, long-term solution to make communications capabilities align with the INL mission and fit the various programmatic growth and expansion needs.

  8. Transforming Our Cities: High-Performance Green Infrastructure (WERF Report INFR1R11)

    EPA Science Inventory

    The objective of this project is to demonstrate that the highly distributed real-time control (DRTC) technologies for green infrastructure being developed by the research team can play a critical role in transforming our nation’s urban infrastructure. These technologies include a...

  9. Transforming Our Cities: High-Performance Green Infrastructure (WERF Report INFR1R11)

    EPA Science Inventory

    The objective of this project is to demonstrate that the highly distributed real-time control (DRTC) technologies for green infrastructure being developed by the research team can play a critical role in transforming our nation’s urban infrastructure. These technologies include a...

  10. Cyber and physical infrastructure interdependencies.

    SciTech Connect

    Phillips, Laurence R.; Kelic, Andjelka; Warren, Drake E.

    2008-09-01

    The goal of the work discussed in this document is to understand the risk to the nation of cyber attacks on critical infrastructures. The large body of research results on cyber attacks against physical infrastructure vulnerabilities has not resulted in clear understanding of the cascading effects a cyber-caused disruption can have on critical national infrastructures and the ability of these affected infrastructures to deliver services. This document discusses current research and methodologies aimed at assessing the translation of a cyber-based effect into a physical disruption of infrastructure and thence into quantification of the economic consequences of the resultant disruption and damage. The document discusses the deficiencies of the existing methods in correlating cyber attacks with physical consequences. The document then outlines a research plan to correct those deficiencies. When completed, the research plan will result in a fully supported methodology to quantify the economic consequences of events that begin with cyber effects, cascade into other physical infrastructure impacts, and result in degradation of the critical infrastructure's ability to deliver services and products. This methodology enables quantification of the risks to national critical infrastructure of cyber threats. The work addresses the electric power sector as an example of how the methodology can be applied.

  11. CRITICALITY CONTROL DURING THE DISMANTLING OF A URANIUM CONVERSION PLANT

    SciTech Connect

    LADURELLE, Laurent; LISBONNE, Pierre

    2003-02-27

    Within the Commissariat a l'Energie Atomique, in the Cadarache Research Center in southern France, the production at the Enriched Uranium Treatment Workshops started in 1965 and ended in 1995. The dismantling is in progress and will last until 2006. The decommissioning is planned in 2007. Since the authorized enrichment in 235U was 10% in some parts of the plant, and unlimited in others, the equipment and procedures were designed for criticality control during the operating period. Despite the best previous removing of the uranium in the inner parts of the equipment, evaluation of the mass of remaining fissile material by in site gamma spectrometry measurement shows that the safety of the ''clean up'' operations requires specific criticality control procedures, this mass being higher than the safe mass. The chosen method is therefore based on the mapping of fissile material in the contaminated parts of the equipment and on the respect of particular rules set for meeting the criticality control standards through mass control. The process equipment is partitioned in separated campaign, and for each campaign the equipment dismantling is conducted with a precise traceability of the pieces, from the equipment to the drum of waste, and the best final evaluation of the mass of fissile material in the drum. The first results show that the mass of uranium found in the dismantled equipment is less than the previous evaluation, and they enable us to confirm that the criticality was safely controlled during the operations. The mass of fissile material remaining in the equipment can be then carefully calculated, when it is lower than the minimal critical mass, and on the basis of a safety analysis, we will be free of any constraints regarding criticality control, this allowing to make procedures easier, and to speed up the operations.

  12. Controlled Hydrogen Fleet and Infrastructure Demonstration and Validation Project Final Technical Report

    SciTech Connect

    Verma, Puneet; Casey, Dan

    2011-03-29

    This report summarizes the work conducted under U.S. Department of Energy (US DOE) contract DE-FC36-04GO14286 by Chevron Technology Ventures (CTV, a division of Chevron U.S.A., Inc.), Hyundai Motor Company (HMC), and UTC Power (UTCP, a United Technologies company) to validate hydrogen (H2) infrastructure technology and fuel cell hybrid vehicles. Chevron established hydrogen filling stations at fleet operator sites using multiple technologies for on-site hydrogen generation, storage, and dispensing. CTV constructed five demonstration stations to support a vehicle fleet of 33 fuel cell passenger vehicles, eight internal combustion engine (ICE) vehicles, three fuel cell transit busses, and eight internal combustion engine shuttle busses. Stations were operated between 2005 and 2010. HMC introduced 33 fuel cell hybrid electric vehicles (FCHEV) in the course of the project. Generation I included 17 vehicles that used UTCP fuel cell power plants and operated at 350 bar. Generation II included 16 vehicles that had upgraded UTC fuel cell power plants and demonstrated options such as the use of super-capacitors and operation at 700 bar. All 33 vehicles used the Hyundai Tucson sports utility vehicle (SUV) platform. Fleet operators demonstrated commercial operation of the vehicles in three climate zones (hot, moderate, and cold) and for various driving patterns. Fleet operators were Southern California Edison (SCE), AC Transit (of Oakland, California), Hyundai America Technical Center Inc. (HATCI), and the U.S. Army Tank Automotive Research, Development and Engineering Center (TARDEC, in a site agreement with Selfridge Army National Guard Base in Selfridge, Michigan).

  13. Resource modelling for control: how hydrogeological modelling can support a water quality monitoring infrastructure

    NASA Astrophysics Data System (ADS)

    Scozzari, Andrea; Doveri, Marco

    2015-04-01

    The knowledge of the physical/chemical processes implied with the exploitation of water bodies for human consumption is an essential tool for the optimisation of the monitoring infrastructure. Due to their increasing importance in the context of human consumption (at least in the EU), this work focuses on groundwater resources. In the framework of drinkable water networks, the physical and data-driven modelling of transport phenomena in groundwater can help optimising the sensor network and validating the acquired data. This work proposes the combined usage of physical and data-driven modelling as a support to the design and maximisation of results from a network of distributed sensors. In particular, the validation of physico-chemical measurements and the detection of eventual anomalies by a set of continuous measurements take benefit from the knowledge of the domain from which water is abstracted, and its expected characteristics. Change-detection techniques based on non-specific sensors (presented by quite a large literature during the last two decades) have to deal with the classical issues of maximising correct detections and minimising false alarms, the latter of the two being the most typical problem to be faced, in the view of designing truly applicable monitoring systems. In this context, the definition of "anomaly" in terms of distance from an expected value or feature characterising the quality of water implies the definition of a suitable metric and the knowledge of the physical and chemical peculiarities of the natural domain from which water is exploited, with its implications in terms of characteristics of the water resource.

  14. CRITICALITY SAFETY CONTROLS AND THE SAFETY BASIS AT PFP

    SciTech Connect

    Kessler, S

    2009-04-21

    With the implementation of DOE Order 420.1B, Facility Safety, and DOE-STD-3007-2007, 'Guidelines for Preparing Criticality Safety Evaluations at Department of Energy Non-Reactor Nuclear Facilities', a new requirement was imposed that all criticality safety controls be evaluated for inclusion in the facility Documented Safety Analysis (DSA) and that the evaluation process be documented in the site Criticality Safety Program Description Document (CSPDD). At the Hanford site in Washington State the CSPDD, HNF-31695, 'General Description of the FH Criticality Safety Program', requires each facility develop a linking document called a Criticality Control Review (CCR) to document performance of these evaluations. Chapter 5, Appendix 5B of HNF-7098, Criticality Safety Program, provided an example of a format for a CCR that could be used in lieu of each facility developing its own CCR. Since the Plutonium Finishing Plant (PFP) is presently undergoing Deactivation and Decommissioning (D&D), new procedures are being developed for cleanout of equipment and systems that have not been operated in years. Existing Criticality Safety Evaluations (CSE) are revised, or new ones written, to develop the controls required to support D&D activities. Other Hanford facilities, including PFP, had difficulty using the basic CCR out of HNF-7098 when first implemented. Interpretation of the new guidelines indicated that many of the controls needed to be elevated to TSR level controls. Criterion 2 of the standard, requiring that the consequence of a criticality be examined for establishing the classification of a control, was not addressed. Upon in-depth review by PFP Criticality Safety staff, it was not clear that the programmatic interpretation of criterion 8C could be applied at PFP. Therefore, the PFP Criticality Safety staff decided to write their own CCR. The PFP CCR provides additional guidance for the evaluation team to use by clarifying the evaluation criteria in DOE-STD-3007-2007. In

  15. Automatic process control in anaerobic digestion technology: A critical review.

    PubMed

    Nguyen, Duc; Gadhamshetty, Venkataramana; Nitayavardhana, Saoharit; Khanal, Samir Kumar

    2015-10-01

    Anaerobic digestion (AD) is a mature technology that relies upon a synergistic effort of a diverse group of microbial communities for metabolizing diverse organic substrates. However, AD is highly sensitive to process disturbances, and thus it is advantageous to use online monitoring and process control techniques to efficiently operate AD process. A range of electrochemical, chromatographic and spectroscopic devices can be deployed for on-line monitoring and control of the AD process. While complexity of the control strategy ranges from a feedback control to advanced control systems, there are some debates on implementation of advanced instrumentations or advanced control strategies. Centralized AD plants could be the answer for the applications of progressive automatic control field. This article provides a critical overview of the available automatic control technologies that can be implemented in AD processes at different scales. Copyright © 2015 Elsevier Ltd. All rights reserved.

  16. Focus control budget analysis for critical layers of flash devices

    NASA Astrophysics Data System (ADS)

    Jang, Jong Hoon; Park, Tony; Park, Kyeong Dong; Hwang, Jong Hyun; Choi, Jin Phil; Kang, Young Seog

    2014-04-01

    As design rule shrinks down, on-product focus control became more important since available depth of focus (DOF) is getting narrower and also required critical dimension uniformity (CDU) becomes tighter. Thus monitoring, control the scanner focus error and reducing the focus control budget of scanner are essential for the production. There are some critical layers which has so narrow DOF margin that hardly be processed on old model scanners. Our study mainly focused on the analysis of the scanner focus control budget of such layers. Among the contributors to the focus budget, inter-field focus uniformity was turned out to be the most dominant. Leveling accuracy and intra-field focus uniformity were also dominant.

  17. Verifying critical control points for Phytophthora introduction into nurseries

    Treesearch

    N.K. Osterbauer; M. Lujan; G. McAninch; A. Trippe; S. Lane

    2013-01-01

    The Oregon Department of Agriculture implemented the Grower Assisted Inspection Program (GAIP) for nurseries in 2007. Participants in GAIP adopted best management practices (BMP) for five critical control points (CCP) (used containers, irrigation water, soil substrate, potting media, and incoming plants), where foliar Phytophthora can be introduced...

  18. Software and cyber-infrastructure development to control the Observatorio Astrofísico de Javalambre (OAJ)

    NASA Astrophysics Data System (ADS)

    Yanes-Díaz, A.; Antón, J. L.; Rueda-Teruel, S.; Guillén-Civera, L.; Bello, R.; Jiménez-Mejías, D.; Chueca, S.; Lasso-Cabrera, N. M.; Suárez, O.; Rueda-Teruel, F.; Cenarro, A. J.; Cristobal-Hornillos, D.; Marin-Franch, A.; Luis-Simoes, R.; López-Alegre, G.; Rodríguez-Hernández, M. A. C.; Moles, M.; Ederoclite, A.; Varela, J.; Vazquez Ramió, H.; Díaz-Martín, M. C.; Iglesias-Marzoa, R.; Maicas, N.; Lamadrid, J. L.; Lopez-Sainz, A.; Hernández-Fuertes, J.; Valdivielso, L.; Mendes de Oliveira, C.; Penteado, P.; Schoenell, W.; Kanaan, A.

    2014-07-01

    The Observatorio Astrofísico de Javalambre (OAJ) is a new astronomical facility located at the Sierra de Javalambre (Teruel, Spain) whose primary role will be to conduct all-sky astronomical surveys with two unprecedented telescopes of unusually large fields of view: the JST/T250, a 2.55m telescope of 3deg field of view, and the JAST/T80, an 83cm telescope of 2deg field of view. CEFCA engineering team has been designing the OAJ control system as a global concept to manage, monitor, control and maintain all the observatory systems including not only astronomical subsystems but also infrastructure and other facilities. In order to provide quality, reliability and efficiency, the OAJ control system (OCS) design is based on CIA (Control Integrated Architecture) and OEE (Overall Equipment Effectiveness) as a key to improve day and night operation processes. The OCS goes from low level hardware layer including IOs connected directly to sensors and actuators deployed around the whole observatory systems, including telescopes and astronomical instrumentation, up to the high level software layer as a tool to perform efficiently observatory operations. We will give an overview of the OAJ control system design and implementation from an engineering point of view, giving details of the design criteria, technology, architecture, standards, functional blocks, model structure, development, deployment, goals, report about the actual status and next steps.

  19. Putting the Critical Back in Critical Infrastructure

    DTIC Science & Technology

    2015-12-01

    technical genius with numbers and data. Many thanks also go to Maulik Sanghavi, Eric Daleo, and Jim Cho for their keen minds and for being a sounding board...to eliminate or bridge much of the artificial distinctions that are currently found between military and civilian doctrine. Integrated national...integration of a HSIB with DPA mandates and authorities could also serve to eliminate or bridge much of the artificial distinctions that currently exist

  20. Communication analysis for feedback control of civil infrastructure using cochlea-inspired sensing nodes

    NASA Astrophysics Data System (ADS)

    Peckens, Courtney A.; Cook, Ireana; Lynch, Jerome P.

    2016-04-01

    Wireless sensor networks (WSNs) have emerged as a reliable, low-cost alternative to the traditional wired sensing paradigm. While such networks have made significant progress in the field of structural monitoring, significantly less development has occurred for feedback control applications. Previous work in WSNs for feedback control has highlighted many of the challenges of using this technology including latency in the wireless communication channel and computational inundation at the individual sensing nodes. This work seeks to overcome some of those challenges by drawing inspiration from the real-time sensing and control techniques employed by the biological central nervous system and in particular the mammalian cochlea. A novel bio-inspired wireless sensor node was developed that employs analog filtering techniques to perform time-frequency decomposition of a sensor signal, thus encompassing the functionality of the cochlea. The node then utilizes asynchronous sampling of the filtered signal to compress the signal prior to communication. This bio-inspired sensing architecture is extended to a feedback control application in order to overcome the traditional challenges currently faced by wireless control. In doing this, however, the network experiences high bandwidths of low-significance information exchange between nodes, resulting in some lost data. This study considers the impact of this lost data on the control capabilities of the bio-inspired control architecture and finds that it does not significantly impact the effectiveness of control.

  1. Flight Test of Composite Model Reference Adaptive Control (CMRAC) Augmentation Using NASA AirSTAR Infrastructure

    NASA Technical Reports Server (NTRS)

    Gregory, Irene M.; Gadient, ROss; Lavretsky, Eugene

    2011-01-01

    This paper presents flight test results of a robust linear baseline controller with and without composite adaptive control augmentation. The flight testing was conducted using the NASA Generic Transport Model as part of the Airborne Subscale Transport Aircraft Research system at NASA Langley Research Center.

  2. An infrastructure with a unified control plane to integrate IP into optical metro networks to provide flexible and intelligent bandwidth on demand for cloud computing

    NASA Astrophysics Data System (ADS)

    Yang, Wei; Hall, Trevor

    2012-12-01

    The Internet is entering an era of cloud computing to provide more cost effective, eco-friendly and reliable services to consumer and business users and the nature of the Internet traffic will undertake a fundamental transformation. Consequently, the current Internet will no longer suffice for serving cloud traffic in metro areas. This work proposes an infrastructure with a unified control plane that integrates simple packet aggregation technology with optical express through the interoperation between IP routers and electrical traffic controllers in optical metro networks. The proposed infrastructure provides flexible, intelligent, and eco-friendly bandwidth on demand for cloud computing in metro areas.

  3. Physical and chemical controls on the critical zone

    USGS Publications Warehouse

    Anderson, S.P.; Von Blanckenburg, F.; White, A.F.

    2007-01-01

    Geochemists have long recognized a correlation between rates of physical denudation and chemical weathering. What underlies this correlation? The Critical Zone can be considered as a feed-through reactor. Downward advance of the weathering front brings unweathered rock into the reactor. Fluids are supplied through precipitation. The reactor is stirred at the top by biological and physical processes. The balance between advance of the weathering front by mechanical and chemical processes and mass loss by denudation fixes the thickness of the Critical Zone reactor. The internal structure of this reactor is controlled by physical processes that create surface area, determine flow paths, and set the residence time of material in the Critical Zone. All of these impact chemical weathering flux.

  4. Tools for 21st Century infrastructure protection

    SciTech Connect

    Trost, S.R.

    1997-07-01

    The President`s Commission on Critical Infrastructure Protection (PCCEP) was formed under Executive Order 13010 to recommend a national strategy for protecting and assuring critical infrastructures. Eight critical infrastructure elements have been identified. This paper provides an overview of tools necessary to conduct in depth analysis and characterization of threats, vulnerabilities, and interdependencies of critical infrastructure subsystems, and their interaction with each other. Particular emphasis is placed on research requirements necessary to develop the next generation of tools. In addition to tools, a number of system level research suggestions are made including developing a system architecture, data flow models, national level resources, and a national test bed.

  5. Modernized build and test infrastructure for control software at ESO: highly flexible building, testing, and automatic quality practices for telescope control software

    NASA Astrophysics Data System (ADS)

    Pellegrin, F.; Jeram, B.; Haucke, J.; Feyrin, S.

    2016-07-01

    The paper describes the introduction of a new automatized build and test infrastructure, based on the open-source software Jenkins1, into the ESO Very Large Telescope control software to replace the preexisting in-house solution. A brief introduction to software quality practices is given, a description of the previous solution, the limitations of it and new upcoming requirements. Modifications required to adapt the new system are described, how these were implemented to current software and the results obtained. An overview on how the new system may be used in future projects is also presented.

  6. Collaborative-Hybrid Multi-Layer Network Control for Emerging Cyber-Infrastructures

    SciTech Connect

    Lehman, Tom; Ghani, Nasir; Boyd, Eric

    2010-08-31

    At a high level, there were four basic task areas identified for the Hybrid-MLN project. They are: o Multi-Layer, Multi-Domain, Control Plane Architecture and Implementation, including OSCARS layer2 and InterDomain Adaptation, Integration of LambdaStation and Terapaths with Layer2 dynamic provisioning, Control plane software release, Scheduling, AAA, security architecture, Network Virtualization architecture, Multi-Layer Network Architecture Framework Definition; o Heterogeneous DataPlane Testing; o Simulation; o Project Publications, Reports, and Presentations.

  7. Hybrid Multi-Layer Network Control for Emerging Cyber-Infrastructures

    SciTech Connect

    Summerhill, Richard

    2009-08-14

    There were four basic task areas identified for the Hybrid-MLN project. They are: o Multi-Layer, Multi-Domain, Control Plane Architecture and Implementation, o Heterogeneous DataPlane Testing, o Simulation, o Project Publications, Reports, and Presentations.

  8. Flow Control of Hazardous Contaminants to Protect Evacuees in Civil Infrastructure Emergency Scenarios

    NASA Astrophysics Data System (ADS)

    Rimer, Sara

    2016-11-01

    The threat of accidental or deliberate toxic chemicals released into public spaces is a significant concern to public safety, and the real-time detection and mitigation of such hazardous contaminants has the potential to minimize harm and save lives. Furthermore, the safe evacuation of occupants during such a catastrophe is of utmost importance. This research develops a comprehensive means to address such scenarios, through both the sensing and control of contaminants, and the modeling of and potential communication to occupants as they evacuate. A computational fluid dynamics model is developed of a simplified public space characterized by a long conduit (e.g. airport terminal) with unidirectional ambient flow that is capable of detecting and mitigating the hazardous contaminant (via boundary ports) over several time horizons using model predictive control optimization. An agent-based model is developed to simulate 'agents' (i.e. building occupants) as they evacuate a public space. The agent-based evacuation model is coupled with the computational flow control model such that agents must interact with a dynamic, threatening environment. Results demonstrate how flow control can be achieved via feedback sensing of location of occupants with desire to minimize contaminant exposure.

  9. Criticality of environmental information obtainable by dynamically controlled quantum probes

    NASA Astrophysics Data System (ADS)

    Zwick, Analia; Álvarez, Gonzalo A.; Kurizki, Gershon

    2016-10-01

    A universal approach to decoherence control combined with quantum estimation theory reveals a critical behavior, akin to a phase transition, of the information obtainable by a qubit probe concerning the memory time of environmental fluctuations of generalized Ornstein-Uhlenbeck processes. The criticality is intrinsic to the environmental fluctuations but emerges only when the probe is subject to suitable dynamical control aimed at inferring the memory time. A sharp transition is anticipated between two dynamical phases characterized by either a short or long memory time compared to the probing time. This phase transition of the environmental information is a fundamental feature that characterizes open quantum-system dynamics and is important for attaining the highest estimation precision of the environment memory time under experimental limitations.

  10. A critical assessment of vector control for dengue prevention.

    PubMed

    Achee, Nicole L; Gould, Fred; Perkins, T Alex; Reiner, Robert C; Morrison, Amy C; Ritchie, Scott A; Gubler, Duane J; Teyssou, Remy; Scott, Thomas W

    2015-05-01

    Recently, the Vaccines to Vaccinate (v2V) initiative was reconfigured into the Partnership for Dengue Control (PDC), a multi-sponsored and independent initiative. This redirection is consistent with the growing consensus among the dengue-prevention community that no single intervention will be sufficient to control dengue disease. The PDC's expectation is that when an effective dengue virus (DENV) vaccine is commercially available, the public health community will continue to rely on vector control because the two strategies complement and enhance one another. Although the concept of integrated intervention for dengue prevention is gaining increasingly broader acceptance, to date, no consensus has been reached regarding the details of how and what combination of approaches can be most effectively implemented to manage disease. To fill that gap, the PDC proposed a three step process: (1) a critical assessment of current vector control tools and those under development, (2) outlining a research agenda for determining, in a definitive way, what existing tools work best, and (3) determining how to combine the best vector control options, which have systematically been defined in this process, with DENV vaccines. To address the first step, the PDC convened a meeting of international experts during November 2013 in Washington, DC, to critically assess existing vector control interventions and tools under development. This report summarizes those deliberations.

  11. A Critical Assessment of Vector Control for Dengue Prevention

    PubMed Central

    Achee, Nicole L.; Gould, Fred; Perkins, T. Alex; Reiner, Robert C.; Morrison, Amy C.; Ritchie, Scott A.; Gubler, Duane J.; Teyssou, Remy; Scott, Thomas W.

    2015-01-01

    Recently, the Vaccines to Vaccinate (v2V) initiative was reconfigured into the Partnership for Dengue Control (PDC), a multi-sponsored and independent initiative. This redirection is consistent with the growing consensus among the dengue-prevention community that no single intervention will be sufficient to control dengue disease. The PDC's expectation is that when an effective dengue virus (DENV) vaccine is commercially available, the public health community will continue to rely on vector control because the two strategies complement and enhance one another. Although the concept of integrated intervention for dengue prevention is gaining increasingly broader acceptance, to date, no consensus has been reached regarding the details of how and what combination of approaches can be most effectively implemented to manage disease. To fill that gap, the PDC proposed a three step process: (1) a critical assessment of current vector control tools and those under development, (2) outlining a research agenda for determining, in a definitive way, what existing tools work best, and (3) determining how to combine the best vector control options, which have systematically been defined in this process, with DENV vaccines. To address the first step, the PDC convened a meeting of international experts during November 2013 in Washington, DC, to critically assess existing vector control interventions and tools under development. This report summarizes those deliberations. PMID:25951103

  12. Critical dimension control using ultrashort laser for improving wafer critical dimension uniformity

    NASA Astrophysics Data System (ADS)

    Avizemer, Dan; Sharoni, Ofir; Oshemkov, Sergey; Cohen, Avi; Dayan, Asaf; Khurana, Ranjan; Kewley, Dave

    2015-07-01

    Requirements for control of critical dimension (CD) become more demanding as the integrated circuit (IC) feature size specifications become tighter and tighter. Critical dimension control, also known as CDC, is a well-known laser-based process in the IC industry that has proven to be robust, repeatable, and efficient in adjusting wafer CD uniformity (CDU) [Proc. SPIE 6152, 615225 (2006)]. The process involves locally and selectively attenuating the deep ultraviolet light which goes through the photomask to the wafer. The input data for the CDC process in the wafer fab is typically taken from wafer CDU data, which is measured by metrology tools such as wafer-critical dimension-scanning electron microscopy (CD-SEM), wafer optical scatterometry, or wafer level CD (WLCD). The CD correction process uses the CDU data in order to create an attenuation correction contour, which is later applied by the in-situ ultrashort laser system of the CDC to locally change the transmission of the photomask. The ultrashort pulsed laser system creates small, partially scattered, Shade-In-Elements (also known as pixels) by focusing the laser beam inside the quartz bulk of the photomask. This results in the formation of a localized, intravolume, quartz modified area, which has a different refractive index than the quartz bulk itself. The CDC process flow for improving wafer CDU in a wafer fab with detailed explanations of the shading elements formation inside the quartz by the ultrashort pulsed laser is reviewed.

  13. Vision and Control for UAVs: A Survey of General Methods and of Inexpensive Platforms for Infrastructure Inspection

    PubMed Central

    Máthé, Koppány; Buşoniu, Lucian

    2015-01-01

    Unmanned aerial vehicles (UAVs) have gained significant attention in recent years. Low-cost platforms using inexpensive sensor payloads have been shown to provide satisfactory flight and navigation capabilities. In this report, we survey vision and control methods that can be applied to low-cost UAVs, and we list some popular inexpensive platforms and application fields where they are useful. We also highlight the sensor suites used where this information is available. We overview, among others, feature detection and tracking, optical flow and visual servoing, low-level stabilization and high-level planning methods. We then list popular low-cost UAVs, selecting mainly quadrotors. We discuss applications, restricting our focus to the field of infrastructure inspection. Finally, as an example, we formulate two use-cases for railway inspection, a less explored application field, and illustrate the usage of the vision and control techniques reviewed by selecting appropriate ones to tackle these use-cases. To select vision methods, we run a thorough set of experimental evaluations. PMID:26121608

  14. The Landscape Evolution Observatory: A large-scale controllable infrastructure to study coupled Earth-surface processes

    NASA Astrophysics Data System (ADS)

    Pangle, Luke A.; DeLong, Stephen B.; Abramson, Nate; Adams, John; Barron-Gafford, Greg A.; Breshears, David D.; Brooks, Paul D.; Chorover, Jon; Dietrich, William E.; Dontsova, Katerina; Durcik, Matej; Espeleta, Javier; Ferre, T. P. A.; Ferriere, Regis; Henderson, Whitney; Hunt, Edward A.; Huxman, Travis E.; Millar, David; Murphy, Brendan; Niu, Guo-Yue; Pavao-Zuckerman, Mitch; Pelletier, Jon D.; Rasmussen, Craig; Ruiz, Joaquin; Saleska, Scott; Schaap, Marcel; Sibayan, Michael; Troch, Peter A.; Tuller, Markus; van Haren, Joost; Zeng, Xubin

    2015-09-01

    Zero-order drainage basins, and their constituent hillslopes, are the fundamental geomorphic unit comprising much of Earth's uplands. The convergent topography of these landscapes generates spatially variable substrate and moisture content, facilitating biological diversity and influencing how the landscape filters precipitation and sequesters atmospheric carbon dioxide. In light of these significant ecosystem services, refining our understanding of how these functions are affected by landscape evolution, weather variability, and long-term climate change is imperative. In this paper we introduce the Landscape Evolution Observatory (LEO): a large-scale controllable infrastructure consisting of three replicated artificial landscapes (each 330 m2 surface area) within the climate-controlled Biosphere 2 facility in Arizona, USA. At LEO, experimental manipulation of rainfall, air temperature, relative humidity, and wind speed are possible at unprecedented scale. The Landscape Evolution Observatory was designed as a community resource to advance understanding of how topography, physical and chemical properties of soil, and biological communities coevolve, and how this coevolution affects water, carbon, and energy cycles at multiple spatial scales. With well-defined boundary conditions and an extensive network of sensors and samplers, LEO enables an iterative scientific approach that includes numerical model development and virtual experimentation, physical experimentation, data analysis, and model refinement. We plan to engage the broader scientific community through public dissemination of data from LEO, collaborative experimental design, and community-based model development.

  15. Vision and Control for UAVs: A Survey of General Methods and of Inexpensive Platforms for Infrastructure Inspection.

    PubMed

    Máthé, Koppány; Buşoniu, Lucian

    2015-06-25

    Unmanned aerial vehicles (UAVs) have gained significant attention in recent years. Low-cost platforms using inexpensive sensor payloads have been shown to provide satisfactory flight and navigation capabilities. In this report, we survey vision and control methods that can be applied to low-cost UAVs, and we list some popular inexpensive platforms and application fields where they are useful. We also highlight the sensor suites used where this information is available. We overview, among others, feature detection and tracking, optical flow and visual servoing, low-level stabilization and high-level planning methods. We then list popular low-cost UAVs, selecting mainly quadrotors. We discuss applications, restricting our focus to the field of infrastructure inspection. Finally, as an example, we formulate two use-cases for railway inspection, a less explored application field, and illustrate the usage of the vision and control techniques reviewed by selecting appropriate ones to tackle these use-cases. To select vision methods, we run a thorough set of experimental evaluations.

  16. The Landscape Evolution Observatory: a large-scale controllable infrastructure to study coupled Earth-surface processes

    USGS Publications Warehouse

    Pangle, Luke A.; DeLong, Stephen B.; Abramson, Nate; Adams, John; Barron-Gafford, Greg A.; Breshears, David D.; Brooks, Paul D.; Chorover, Jon; Dietrich, William E.; Dontsova, Katerina; Durcik, Matej; Espeleta, Javier; Ferre, T. P. A.; Ferriere, Regis; Henderson, Whitney; Hunt, Edward A.; Huxman, Travis E.; Millar, David; Murphy, Brendan; Niu, Guo-Yue; Pavao-Zuckerman, Mitch; Pelletier, Jon D.; Rasmussen, Craig; Ruiz, Joaquin; Saleska, Scott; Schaap, Marcel; Sibayan, Michael; Troch, Peter A.; Tuller, Markus; van Haren, Joost; Zeng, Xubin

    2015-01-01

    Zero-order drainage basins, and their constituent hillslopes, are the fundamental geomorphic unit comprising much of Earth's uplands. The convergent topography of these landscapes generates spatially variable substrate and moisture content, facilitating biological diversity and influencing how the landscape filters precipitation and sequesters atmospheric carbon dioxide. In light of these significant ecosystem services, refining our understanding of how these functions are affected by landscape evolution, weather variability, and long-term climate change is imperative. In this paper we introduce the Landscape Evolution Observatory (LEO): a large-scale controllable infrastructure consisting of three replicated artificial landscapes (each 330 m2 surface area) within the climate-controlled Biosphere 2 facility in Arizona, USA. At LEO, experimental manipulation of rainfall, air temperature, relative humidity, and wind speed are possible at unprecedented scale. The Landscape Evolution Observatory was designed as a community resource to advance understanding of how topography, physical and chemical properties of soil, and biological communities coevolve, and how this coevolution affects water, carbon, and energy cycles at multiple spatial scales. With well-defined boundary conditions and an extensive network of sensors and samplers, LEO enables an iterative scientific approach that includes numerical model development and virtual experimentation, physical experimentation, data analysis, and model refinement. We plan to engage the broader scientific community through public dissemination of data from LEO, collaborative experimental design, and community-based model development.

  17. Probabilistic DHP adaptive critic for nonlinear stochastic control systems.

    PubMed

    Herzallah, Randa

    2013-06-01

    Following the recently developed algorithms for fully probabilistic control design for general dynamic stochastic systems (Herzallah & Káarnáy, 2011; Kárný, 1996), this paper presents the solution to the probabilistic dual heuristic programming (DHP) adaptive critic method (Herzallah & Káarnáy, 2011) and randomized control algorithm for stochastic nonlinear dynamical systems. The purpose of the randomized control input design is to make the joint probability density function of the closed loop system as close as possible to a predetermined ideal joint probability density function. This paper completes the previous work (Herzallah & Káarnáy, 2011; Kárný, 1996) by formulating and solving the fully probabilistic control design problem on the more general case of nonlinear stochastic discrete time systems. A simulated example is used to demonstrate the use of the algorithm and encouraging results have been obtained.

  18. Master-Slave Control Scheme in Electric Vehicle Smart Charging Infrastructure

    PubMed Central

    Chung, Ching-Yen; Chynoweth, Joshua; Chu, Chi-Cheng; Gadh, Rajit

    2014-01-01

    WINSmartEV is a software based plug-in electric vehicle (PEV) monitoring, control, and management system. It not only incorporates intelligence at every level so that charge scheduling can avoid grid bottlenecks, but it also multiplies the number of PEVs that can be plugged into a single circuit. This paper proposes, designs, and executes many upgrades to WINSmartEV. These upgrades include new hardware that makes the level 1 and level 2 chargers faster, more robust, and more scalable. It includes algorithms that provide a more optimal charge scheduling for the level 2 (EVSE) and an enhanced vehicle monitoring/identification module (VMM) system that can automatically identify PEVs and authorize charging. PMID:24982956

  19. Master-slave control scheme in electric vehicle smart charging infrastructure.

    PubMed

    Chung, Ching-Yen; Chynoweth, Joshua; Chu, Chi-Cheng; Gadh, Rajit

    2014-01-01

    WINSmartEV is a software based plug-in electric vehicle (PEV) monitoring, control, and management system. It not only incorporates intelligence at every level so that charge scheduling can avoid grid bottlenecks, but it also multiplies the number of PEVs that can be plugged into a single circuit. This paper proposes, designs, and executes many upgrades to WINSmartEV. These upgrades include new hardware that makes the level 1 and level 2 chargers faster, more robust, and more scalable. It includes algorithms that provide a more optimal charge scheduling for the level 2 (EVSE) and an enhanced vehicle monitoring/identification module (VMM) system that can automatically identify PEVs and authorize charging.

  20. Efficient model learning methods for actor-critic control.

    PubMed

    Grondman, Ivo; Vaandrager, Maarten; Buşoniu, Lucian; Babuska, Robert; Schuitema, Erik

    2012-06-01

    We propose two new actor-critic algorithms for reinforcement learning. Both algorithms use local linear regression (LLR) to learn approximations of the functions involved. A crucial feature of the algorithms is that they also learn a process model, and this, in combination with LLR, provides an efficient policy update for faster learning. The first algorithm uses a novel model-based update rule for the actor parameters. The second algorithm does not use an explicit actor but learns a reference model which represents a desired behavior, from which desired control actions can be calculated using the inverse of the learned process model. The two novel methods and a standard actor-critic algorithm are applied to the pendulum swing-up problem, in which the novel methods achieve faster learning than the standard algorithm.

  1. Water Cycle Implications of Agriculture and Flood Control Infrastructure in the San Francisco Bay-Delta System

    NASA Astrophysics Data System (ADS)

    MacVean, L. J.; Thompson, S. E.; Sivapalan, M.; Hutton, P.

    2016-12-01

    California's Sacramento-San Joaquin Delta sits at the intersection of vast agricultural and population centers, and supplies fresh water for the diverse and often competing needs of ecosystems, farmers, and millions of Californians. In this study, we address the question of how flows into and out of the Delta have evolved in response to human intervention since 1850 in order to augment the scientific foundation of management decisions. In particular, we have developed a numerical model to quantify Delta outflows over the last 165 years, through which we explore the implications of the conversion of native vegetation to agricultural crops and the construction of flood control infrastructure. Our model domain encompasses the watersheds tributary to the San Francisco Bay-Delta system, and simulates the dynamic components of water usage through vegetative uptake and evapotranspiration, groundwater recharge, flood conveyance, and water exports at incremental levels of development from 1850 to the present. The model is run using historical climatological forcing; the climate and the effects of development on the Delta's watersheds are allowed to co-evolve. After verification that the dominant processes are captured in the numerics, the results illustrate the interactions between soil water storage, flood water stored behind levees, and consumption of water through ET and groundwater recharge, and their effects on the inflows to the San Francisco Bay estuary. Our study provides a picture of the changes in magnitude and temporal distribution of freshwater flows brought about by both intentional and unintentional consequences of the development of California's Central Valley.

  2. Safety. [requirements for software to monitor and control critical processes

    NASA Technical Reports Server (NTRS)

    Leveson, Nancy G.

    1991-01-01

    Software requirements, design, implementation, verification and validation, and especially management are affected by the need to produce safe software. This paper discusses the changes in the software life cycle that are necessary to ensure that software will execute without resulting in unacceptable risk. Software is being used increasingly to monitor and control safety-critical processes in which a run-time failure or error could result in unacceptable losses such as death, injury, loss of property, or environmental harm. Examples of such processes maybe found in transportation, energy, aerospace, basic industry, medicine, and defense systems.

  3. Investigation of critical parameters controlling the efficiency of associative ionization

    NASA Astrophysics Data System (ADS)

    Le Padellec, A.; Launoy, T.; Dochain, A.; Urbain, X.

    2017-05-01

    This paper compiles our merged-beam experimental findings for the associative ionization (AI) process from charged reactants, with the aim of guiding future investigations with e.g. the double electrostatic ion storage ring DESIREE in Stockholm. A reinvestigation of the isotopic effect in H-(D-) + He+ collisions is presented, along with a review of {{{H}}}3+ and NO+ production by AI involving ion pairs or excited neutrals, and put in perspective with the mutual neutralization and radiative association reactions. Critical parameters are identified and evaluated for their systematic role in controlling the magnitude of the cross section: isotopic substitution, exothermicity, electronic state density, and spin statistics.

  4. Data Diodes in Support of Trustworthy Cyber Infrastructure

    SciTech Connect

    Sheldon, Frederick T; Okhravi, Hamed

    2010-01-01

    Interconnections between process control networks and en- terprise networks has resulted in the proliferation of stan- dard communication protocols in industrial control systems which exposes instrumentation, control systems, and the critical infrastructure components they operate to a variety of cyber attacks. Various standards and technologies have been proposed to protect industrial control systems against cyber attacks and to provide them with confidentiality, in- tegrity, and availability. Among these technologies, data diodes provide protection of critical systems by the means of physically enforcing traffic direction on the network. In order to deploy data diodes effectively, it is imperative to un- derstand the protection they provide, the protection they do not provide, their limitations, and their place in the larger security infrastructure. In this work, we briefly review the security challenges in an industrial control system, study data diodes, their functionalities and limitations, and pro- pose a scheme for their effective deployment in trusted pro- cess control networks (TPCNs.)

  5. Wireless Infrastructure for Performing Monitoring, Diagnostics, and Control HVAC and Other Energy-Using Systems in Small Commercial Buildings

    SciTech Connect

    Patrick O'Neill

    2009-06-30

    This project focused on developing a low-cost wireless infrastructure for monitoring, diagnosing, and controlling building systems and equipment. End users receive information via the Internet and need only a web browser and Internet connection. The system used wireless communications for: (1) collecting data centrally on site from many wireless sensors installed on building equipment, (2) transmitting control signals to actuators and (3) transmitting data to an offsite network operations center where it is processed and made available to clients on the Web (see Figure 1). Although this wireless infrastructure can be applied to any building system, it was tested on two representative applications: (1) monitoring and diagnostics for packaged rooftop HVAC units used widely on small commercial buildings and (2) continuous diagnosis and control of scheduling errors such as lights and equipment left on during unoccupied hours. This project developed a generic infrastructure for performance monitoring, diagnostics, and control, applicable to a broad range of building systems and equipment, but targeted specifically to small to medium commercial buildings (an underserved market segment). The proposed solution is based on two wireless technologies. The first, wireless telemetry, is used for cell phones and paging and is reliable and widely available. This risk proved to be easily managed during the project. The second technology is on-site wireless communication for acquiring data from sensors and transmitting control signals. The technology must enable communication with many nodes, overcome physical obstructions, operate in environments with other electrical equipment, support operation with on-board power (instead of line power) for some applications, operate at low transmission power in license-free radio bands, and be low cost. We proposed wireless mesh networking to meet these needs. This technology is relatively new and has been applied only in research and tests

  6. Early glycemic control in critically ill patients with burn injury.

    PubMed

    Murphy, Claire V; Coffey, Rebecca; Cook, Charles H; Gerlach, Anthony T; Miller, Sidney F

    2011-01-01

    Glucose management in patients with burn injury is often difficult because of their hypermetabolic state with associated hyperglycemia, hyperinsulinemia, and insulin resistance. Recent studies suggest that time to glycemic control is associated with improved outcomes. The authors sought to determine the influence of early glycemic control on the outcomes of critically ill patients with burn injury. A retrospective analysis was performed at the Ohio State University Medical Center. Patients hospitalized with burn injury were enrolled if they were admitted to the intensive care unit between March 1, 2006, and February 28, 2009. Early glycemic control was defined as the achievement of a mean daily blood glucose of ≤150 mg/dl for at least two consecutive days by postburn day 3. Forty-six patients made up the study cohort with 26 achieving early glycemic control and 20 who did not. The two groups were similar at baseline with regard to age, pre-existing diabetes, APACHE II score and burn size and depth. There were no differences in number of surgical interventions, infectious complications, or length of stay between patients who achieved or failed early glycemic control. Failure of early glycemic control was, however, associated with significantly higher mortality both by univariate (35.0 vs 7.7%, P = .03) and multivariate analyses (hazard ratio 6.754 [1.16-39.24], P = .03) adjusting for age, TBSA, and inhalation injury. Failure to achieve early glycemic control in patients with burn injury is associated with an increased risk of mortality. However, further prospective controlled trials are needed to establish causality of this association.

  7. [Critical control points in the pasteurized milk processing fluxogram].

    PubMed

    Lopes, A C; Stamford, T L

    1997-12-01

    With the aim of evaluating the microbiological quality of raw and pasteurized milk and confirm the critical control points in a dairy processing industry (Recife-PE, Brazil), 84 samples of milk were collected from four points of the flow-chart considered critical (raw milk storage tank, outlet of the pasteurizer unit, pasteurized milk storage tank and packing filling machine). All samples were evaluated for the presence of mesophilic and psychotrophics microorganisms. The most probable number (MPN) of total and faecal coliforms were determined. Samples of raw and pasteurized milk (collected from the packing filling machine) were also assessed for the presence of Staphylococcus aureus. The preservation temperature of raw and pasteurized milk in the storage tanks and the MPN of total and faecal coliforms present in the water used by the industry were simultaneously evaluated. High counts of mesophilic and psychotrophics microorganisms, total and faecal coliforms and S. aureus were detect in raw milk production and processing. The pasteurization process reduced the microorganisms to acceptable numbers in the Brazilian standards, however, the statistics analysis showed that the number of microorganisms increased significantly (p < 0.01) in the pasteurized milk storage tank, representing an important point of contamination. The probable reason for this findings was the presence of coliforms in 60% samples of water which was used to clean the milk equipment and the inadequate temperatures in the storage tank. Therefore, the results of the microbiological analysis confirm that the milk maintenance temperature in the storage tanks, the pasteurization and the packaging are critical control points in the pasteurized milk processing fluxogram.

  8. Risk assessment and critical control points from the production perspective.

    PubMed

    Serra, J A; Domenech, E; Escriche, I; Martorell, S

    1999-01-12

    The implementation of a risk analysis program as risk assessment and critical control points (RACCP) is most necessary in order to accomplish the foodborne industries current objective of total quality. The novelty of this technique, when compared to actual hazard analysis and critical control points (HACCP) and its extension to incorporate elements of quantitative risk analysis (QRA), is that RACCP considers the risk of the consequences produced by the production process performance deviations, both inside and outside the company, and also identifies their causative factors. On the other hand, the techniques to be taken in order to prevent or mitigate the consequences of such deviations must be consistent with the former data, but the need for a cost-benefit assessment must not be ignored so that the chosen technique be most profitable for the company. An example developed in a mineral water bottling plant showed that RACCP application is feasible and useful. During this example case, RACCP demonstrated it could obtain a profitable production process that keeps quality and safety of the final product at its maximum, while providing protection to both company and consumer.

  9. Cyber Threats to Nuclear Infrastructures

    SciTech Connect

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  10. Using bioluminescent biosensors for hazard analysis and critical control point (HACCP) in wastewater control.

    PubMed

    Valat, C; Champiat, D; Degorce-Dumas, J R; Thomas, O

    2004-01-01

    Starting from a new approach for water pollution control and wastewater treatment plant management, the hazard analysis and critical control point (HACCP) quality concept, the interest for the development of new rapid and sensitive methods such as bioluminescence-based methods is evident. After an introduction of the HACCP procedure, a bibliographic study of the bioluminescence potentiality is presented and discussed.

  11. Coiled-coil protein composition of 22 proteomes – differences and common themes in subcellular infrastructure and traffic control

    PubMed Central

    Rose, Annkatrin; Schraegle, Shannon J; Stahlberg, Eric A; Meier, Iris

    2005-01-01

    Background Long alpha-helical coiled-coil proteins are involved in diverse organizational and regulatory processes in eukaryotic cells. They provide cables and networks in the cyto- and nucleoskeleton, molecular scaffolds that organize membrane systems and tissues, motors, levers, rotating arms, and possibly springs. Mutations in long coiled-coil proteins have been implemented in a growing number of human diseases. Using the coiled-coil prediction program MultiCoil, we have previously identified all long coiled-coil proteins from the model plant Arabidopsis thaliana and have established a searchable Arabidopsis coiled-coil protein database. Results Here, we have identified all proteins with long coiled-coil domains from 21 additional fully sequenced genomes. Because regions predicted to form coiled-coils interfere with sequence homology determination, we have developed a sequence comparison and clustering strategy based on masking predicted coiled-coil domains. Comparing and grouping all long coiled-coil proteins from 22 genomes, the kingdom-specificity of coiled-coil protein families was determined. At the same time, a number of proteins with unknown function could be grouped with already characterized proteins from other organisms. Conclusion MultiCoil predicts proteins with extended coiled-coil domains (more than 250 amino acids) to be largely absent from bacterial genomes, but present in archaea and eukaryotes. The structural maintenance of chromosomes proteins and their relatives are the only long coiled-coil protein family clearly conserved throughout all kingdoms, indicating their ancient nature. Motor proteins, membrane tethering and vesicle transport proteins are the dominant eukaryote-specific long coiled-coil proteins, suggesting that coiled-coil proteins have gained functions in the increasingly complex processes of subcellular infrastructure maintenance and trafficking control of the eukaryotic cell. PMID:16288662

  12. Major safety and operational concerns for fuel debris criticality control

    SciTech Connect

    Tonoike, K.; Sono, H.; Umeda, M.; Yamane, Y.; Kugo, T.; Suyama, K.

    2013-07-01

    It can be seen from the criticality control viewpoint that the requirement divides the decommissioning work into two parts. One is the present condition where it is requested to prevent criticality and to monitor subcritical condition while the debris is untouched. The other is future work where the subcritical condition shall be ensured even if the debris condition is changed intentionally by raising water level, debris retrieval, etc. Repair of damages on the containment vessel (CV) walls is one of the most important objectives at present in the site. On completion of this task, it will become possible to raise water levels in the CVs and to shield the extremely high radiation emitted from the debris but there is a dilemma: raising the water level in the CVs implies to bring the debris closer to criticality because of the role of water for slowing down neutrons. This may be solved if the coolant water will start circulating in closed loops, and if a sufficient concentration of soluble neutron poison (borated water for instance) will be introduced in the loop. It should be still noted that this solution has a risk of worsening corrosion of the CV walls. Design of the retrieval operation of debris should be proposed as early as possible, which must include a neutron poison concentration required to ensure that the debris chunk is subcritical. In parallel, the development of the measurement system to monitor subcritical condition of the debris chunk should be conducted in case the borated water cannot be used continuously. The system would be based on a neutron counter with a high sensitivity and an appropriate shield for gamma-rays, and the adequate statistical signal processing.

  13. Control of critical coupling in a coiled coaxial cable resonator

    NASA Astrophysics Data System (ADS)

    Huang, Jie; Wei, Tao; Wang, Tao; Fan, Jun; Xiao, Hai

    2014-05-01

    This paper reports a coiled coaxial cable resonator fabricated by cutting a slot in a spring-like coiled coaxial cable to produce a periodic perturbation. Electromagnetic coupling between two neighboring slots was observed. By manipulating the number of slots, critical coupling of the coiled coaxial cable resonator can be well controlled. An ultrahigh signal-to-noise ratio (over 50 dB) at the resonant frequency band was experimentally achieved from a coiled coaxial cable resonator with 38 turns. A theoretic model is developed to understand the device physics. The proposed device can be potentially used as a high quality and flexibly designed band-stop filter or a sensor in structural health monitoring.

  14. Coherent optical control of polarization with a critical metasurface

    NASA Astrophysics Data System (ADS)

    Kang, Ming; Chong, Y. D.

    2015-10-01

    We present a mechanism by which a metamaterial surface, or metasurface, can act as an ideal phase-controlled rotatable linear polarizer. Using coupled-mode theory and the idea of coherent perfect absorption into auxiliary polarization channels, we show how the losses and near-field couplings on the metasurface can be balanced so that, with equal-power linearly polarized beams incident on each side, varying the relative phase rotates the polarization angles of the output beams while maintaining zero ellipticity. The system can be described by a non-Hermitian effective Hamiltonian which is parity-time (P T ) symmetric, although there is no actual gain present; perfect polarization conversion occurs at the eigenfrequencies of this Hamiltonian, and the polarization rotating behavior occurs at the critical point of its P T -breaking transition.

  15. G proteins: critical control points for transmembrane signals.

    PubMed Central

    Neer, E. J.

    1994-01-01

    Heterotrimeric GTP-binding proteins (G proteins) that are made up of alpha and beta gamma subunits couple many kinds of cell-surface receptors to intracellular effector enzymes or ion channels. Every cell contains several types of receptors, G proteins, and effectors. The specificity with which G protein subunits interact with receptors and effectors defines the range of responses a cell is able to make to an external signal. Thus, the G proteins act as a critical control point that determines whether a signal spreads through several pathways or is focused to a single pathway. In this review, I will summarize some features of the structure and function of mammalian G protein subunits, discuss the role of both alpha and beta gamma subunits in regulation of effectors, the role of the beta gamma subunit in macromolecular assembly, and the mechanisms that might make some responses extremely specific and others rather diffuse. PMID:8142895

  16. Control of critical coupling in a coiled coaxial cable resonator.

    PubMed

    Huang, Jie; Wei, Tao; Wang, Tao; Fan, Jun; Xiao, Hai

    2014-05-01

    This paper reports a coiled coaxial cable resonator fabricated by cutting a slot in a spring-like coiled coaxial cable to produce a periodic perturbation. Electromagnetic coupling between two neighboring slots was observed. By manipulating the number of slots, critical coupling of the coiled coaxial cable resonator can be well controlled. An ultrahigh signal-to-noise ratio (over 50 dB) at the resonant frequency band was experimentally achieved from a coiled coaxial cable resonator with 38 turns. A theoretic model is developed to understand the device physics. The proposed device can be potentially used as a high quality and flexibly designed band-stop filter or a sensor in structural health monitoring.

  17. Rapid microbiological methods with hazard analysis critical control point.

    PubMed

    Griffiths, M W

    1997-01-01

    The proactive approach to ensuring food safety termed hazard analysis critical control point (HACCP) was introduced in the 1960s by the Pillsbury Company, in collaboration with the U.S. Army Natick Laboratories and National Aeronautics and Space Administration, to help guarantee that astronauts would not be incapacitated by the trauma of foodborne illness during space flights. The approach has subsequently been adopted as the standard food safety management system world-wide and is seen as forming the basis for harmonization of food inspection regulations necessitated by trade agreements such as General Agreement on Tariffs and Trade and North American Free Trade Agreement as the move toward globalization of trade in food products gains momentum. The new U.S. Department of Agriculture Mega-Reg requires mandatory introduction of HACCP, and the Food Safety Enhancement Program of Agriculture and Agri-food Canada, as well as the "due diligence" legislation of the European Union, is centered on HACCP principles.

  18. Formulation of a strategy for monitoring control integrity in critical digital control systems

    NASA Technical Reports Server (NTRS)

    Belcastro, Celeste M.; Fischl, Robert; Kam, Moshe

    1991-01-01

    Advanced aircraft will require flight critical computer systems for stability augmentation as well as guidance and control that must perform reliably in adverse, as well as nominal, operating environments. Digital system upset is a functional error mode that can occur in electromagnetically harsh environments, involves no component damage, can occur simultaneously in all channels of a redundant control computer, and is software dependent. A strategy is presented for dynamic upset detection to be used in the evaluation of critical digital controllers during the design and/or validation phases of development. Critical controllers must be able to be used in adverse environments that result from disturbances caused by an electromagnetic source such as lightning, high intensity radiated field (HIRF), and nuclear electromagnetic pulses (NEMP). The upset detection strategy presented provides dynamic monitoring of a given control computer for degraded functional integrity that can result from redundancy management errors and control command calculation error that could occur in an electromagnetically harsh operating environment. The use is discussed of Kalman filtering, data fusion, and decision theory in monitoring a given digital controller for control calculation errors, redundancy management errors, and control effectiveness.

  19. 21 CFR 120.8 - Hazard Analysis and Critical Control Point (HACCP) plan.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 2 2010-04-01 2010-04-01 false Hazard Analysis and Critical Control Point (HACCP... SERVICES (CONTINUED) FOOD FOR HUMAN CONSUMPTION HAZARD ANALYSIS AND CRITICAL CONTROL POINT (HACCP) SYSTEMS General Provisions § 120.8 Hazard Analysis and Critical Control Point (HACCP) plan. (a) HACCP plan....

  20. Critical limits for the control points for halal poultry slaughter.

    PubMed

    Shahdan, Intan Azura; Regenstein, Joe Mac; Rahman, Mohammad Tariqur

    2016-12-13

    This study proposes critical limits (CL) for control points for halal slaughter (CPHS). Previously, 6 control points (CP) were determined, and CL for these 6 CPHS are suggested based on: 1) a literature survey for the CL for CP 1 (poultry breeding, rearing, and poultry feed) and CP 2 (welfare of poultry during transportation and lairage); 2) a field survey of slaughter plants in Kuantan (Malaysia) for CP 3 (immobilization), CP 4 (slaughter), CP 5 (time for full bleed-out), and CP 6 (washing and packaging); and 3) controlled experiments to refine the CL for CP 3, 4, and 5. The CL for CP 1 focused on stress reduction during rearing and use of substances that could compromise poultry meat wholesomeness. The CL for CP 2 emphasizes humane best-practices for handling poultry during lairage. The CL for CP 3 suggests a gap of 5 s between 2 shackles if only one shackler is employed and shackling times of <1 min for live chickens. In countries permitting water-bath electrical stunning of halal poultry, the stunning current needed to induce unconsciousness must be defined for the breed and bird size but not cause any chicken deaths. The CL for CP 4 mandates the recitation of the tasmiyah (the invocation), which if done for every chicken, will require ≥5 s between stunning and neck cutting. The CL for CP 4 also includes information about the slaughter knife. In CP 5 the recommended minimum time between neck cutting and scalding is 9.5 min. Finally, the CL for CP 6 emphasizes good supply chain hygiene and zero adulteration from haram species and substances.

  1. Optimization of active distribution networks: Design and analysis of significative case studies for enabling control actions of real infrastructure

    NASA Astrophysics Data System (ADS)

    Moneta, Diana; Mora, Paolo; Viganò, Giacomo; Alimonti, Gianluca

    2014-12-01

    The diffusion of Distributed Generation (DG) based on Renewable Energy Sources (RES) requires new strategies to ensure reliable and economic operation of the distribution networks and to support the diffusion of DG itself. An advanced algorithm (DISCoVER - DIStribution Company VoltagE Regulator) is being developed to optimize the operation of active network by means of an advanced voltage control based on several regulations. Starting from forecasted load and generation, real on-field measurements, technical constraints and costs for each resource, the algorithm generates for each time period a set of commands for controllable resources that guarantees achievement of technical goals minimizing the overall cost. Before integrating the controller into the telecontrol system of the real networks, and in order to validate the proper behaviour of the algorithm and to identify possible critical conditions, a complete simulation phase has started. The first step is concerning the definition of a wide range of "case studies", that are the combination of network topology, technical constraints and targets, load and generation profiles and "costs" of resources that define a valid context to test the algorithm, with particular focus on battery and RES management. First results achieved from simulation activity on test networks (based on real MV grids) and actual battery characteristics are given, together with prospective performance on real case applications.

  2. Strategic plan for infrastructure optimization

    SciTech Connect

    Donley, C.D.

    1998-05-27

    This document represents Fluor Daniel Hanford`s and DynCorp`s Tri-Cities Strategic Plan for Fiscal Years 1998--2002, the road map that will guide them into the next century and their sixth year of providing safe and cost effective infrastructure services and support to the Department of Energy (DOE) and the Hanford Site. The Plan responds directly to the issues raised in the FDH/DOE Critical Self Assessment specifically: (1) a strategy in place to give DOE the management (systems) and physical infrastructure for the future; (2) dealing with the barriers that exist to making change; and (3) a plan to right-size the infrastructure and services, and reduce the cost of providing services. The Plan incorporates initiatives from several studies conducted in Fiscal Year 1997 to include: the Systems Functional Analysis, 200 Area Water Commercial Practices Plan, $ million Originated Cost Budget Achievement Plan, the 1OO Area Vacate Plan, the Railroad Shutdown Plan, as well as recommendations from the recently completed Review of Hanford Electrical Utility. These and other initiatives identified over the next five years will result in significant improvements in efficiency, allowing a greater portion of the infrastructure budget to be applied to Site cleanup. The Plan outlines a planning and management process that defines infrastructure services and structure by linking site technical base line data and customer requirements to work scope and resources. The Plan also provides a vision of where Site infrastructure is going and specific initiatives to get there.

  3. 21 CFR 113.89 - Deviations in processing, venting, or control of critical factors.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... critical factors. 113.89 Section 113.89 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH..., venting, or control of critical factors. Whenever any process is less than the scheduled process or when critical factors are out of control for any low-acid food or container system as disclosed from records...

  4. Evaluating the impacts of new walking and cycling infrastructure on carbon dioxide emissions from motorized travel: a controlled longitudinal study

    PubMed Central

    Brand, Christian; Goodman, Anna; Ogilvie, David

    2015-01-01

    Walking and cycling is widely assumed to substitute for at least some motorized travel and thereby reduce energy use and carbon dioxide (CO2) emissions. While the evidence suggests that a supportive built environment may be needed to promote walking and cycling, it is unclear whether and how interventions in the built environment that attract walkers and cyclists may reduce transport CO2 emissions. Our aim was therefore to evaluate the effects of providing new infrastructure for walking and cycling on CO2 emissions from motorised travel. A cohort of 1849 adults completed questionnaires at baseline (2010) and one-year follow-up (2011), before and after the construction of new high-quality routes provided as part of the Sustrans Connect2 programme in three UK municipalities. A second cohort of 1510 adults completed questionnaires at baseline and two-year follow-up (2012). The participants reported their past-week travel behaviour and car characteristics from which CO2 emissions by mode and purpose were derived using methods described previously. A set of exposure measures of proximity to and use of the new routes were derived. Overall transport CO2 emissions decreased slightly over the study period, consistent with a secular trend in the case study regions. As found previously the new infrastructure was well used at one- and two-year follow-up, and was associated with population-level increases in walking, cycling and physical activity at two-year follow-up. However, these effects did not translate into sizeable CO2 effects as neither living near the infrastructure nor using it predicted changes in CO2 emissions from motorised travel, either overall or disaggregated by journey purpose. This lack of a discernible effect on travel CO2 emissions are consistent with an interpretation that some of those living nearer the infrastructure may simply have changed where they walked or cycled, while others may have walked or cycled more but few, if any, may have substituted

  5. Evaluating the impacts of new walking and cycling infrastructure on carbon dioxide emissions from motorized travel: a controlled longitudinal study.

    PubMed

    Brand, Christian; Goodman, Anna; Ogilvie, David

    2014-09-01

    Walking and cycling is widely assumed to substitute for at least some motorized travel and thereby reduce energy use and carbon dioxide (CO2) emissions. While the evidence suggests that a supportive built environment may be needed to promote walking and cycling, it is unclear whether and how interventions in the built environment that attract walkers and cyclists may reduce transport CO2 emissions. Our aim was therefore to evaluate the effects of providing new infrastructure for walking and cycling on CO2 emissions from motorised travel. A cohort of 1849 adults completed questionnaires at baseline (2010) and one-year follow-up (2011), before and after the construction of new high-quality routes provided as part of the Sustrans Connect2 programme in three UK municipalities. A second cohort of 1510 adults completed questionnaires at baseline and two-year follow-up (2012). The participants reported their past-week travel behaviour and car characteristics from which CO2 emissions by mode and purpose were derived using methods described previously. A set of exposure measures of proximity to and use of the new routes were derived. Overall transport CO2 emissions decreased slightly over the study period, consistent with a secular trend in the case study regions. As found previously the new infrastructure was well used at one- and two-year follow-up, and was associated with population-level increases in walking, cycling and physical activity at two-year follow-up. However, these effects did not translate into sizeable CO2 effects as neither living near the infrastructure nor using it predicted changes in CO2 emissions from motorised travel, either overall or disaggregated by journey purpose. This lack of a discernible effect on travel CO2 emissions are consistent with an interpretation that some of those living nearer the infrastructure may simply have changed where they walked or cycled, while others may have walked or cycled more but few, if any, may have substituted

  6. Nuclear hybrid energy infrastructure

    SciTech Connect

    Agarwal, Vivek; Tawfik, Magdy S.

    2015-02-01

    The nuclear hybrid energy concept is becoming a reality for the US energy infrastructure where combinations of the various potential energy sources (nuclear, wind, solar, biomass, and so on) are integrated in a hybrid energy system. This paper focuses on challenges facing a hybrid system with a Small Modular Reactor at its core. The core of the paper will discuss efforts required to develop supervisory control center that collects data, supports decision-making, and serves as an information hub for supervisory control center. Such a center will also be a model for integrating future technologies and controls. In addition, advanced operations research, thermal cycle analysis, energy conversion analysis, control engineering, and human factors engineering will be part of the supervisory control center. Nuclear hybrid energy infrastructure would allow operators to optimize the cost of energy production by providing appropriate means of integrating different energy sources. The data needs to be stored, processed, analyzed, trended, and projected at right time to right operator to integrate different energy sources.

  7. International Needs for Infrastructure Nde

    NASA Astrophysics Data System (ADS)

    Popovics, John; Boller, Christian; Cawley, Peter; Spencer, Billie F.; Wang, Ming L.; Washer, Glenn

    2009-03-01

    The Aging of Infrastructure is a world wide problem of increasing importance, with the specifics varying from region to region depending on the age and nature of critical structures. It is clear that the NDE and SHM tools being developed by the QNDE community can play an important role in addressing the Aging Infrastructure problem, and the special evening session is designed to provide perspective to the developers of that technology through an overview of the international needs. A panel of speakers with experience with the unique situations in different regions of the world will first make a series of short presentations. This will be followed by a general discussion period.

  8. How the availability of free satellite data can improve the observation of critical infrastructures: a proposed application to landfills for municipal solid wastes

    NASA Astrophysics Data System (ADS)

    Scozzari, Andrea; Masetti, Giulio; Raco, Brunella; Battaglini, Raffaele

    2017-04-01

    Landfills for Municipal Solid Wastes (MSW) produce about 20% of the total anthropogenic methane released to the atmosphere. As a consequence, these infrastructures require a systematic and efficient monitoring. Various techniques have been proposed until now for the estimation of biogas production and its release, by using more or less direct measurements, mostly characterised by a low or completely absent invasivity. During the last 13 years, observational data about a MSW disposal site located in Tuscany (Italy) have been collected on a regular basis, consisting in direct measurements of gas flux with the accumulation chamber method, combined with infrared radiometry performed in situ with portable radiometers. The availability of free Landsat imagery and the more recent availability of ASTER data (freely available since April 2016) open new monitoring possibilities, in addition to the in situ measurements described above. In particular, we present the preliminary results of a study about the usability of low resolution thermal infrared scenes to build timeseries describing the overall status of a waste disposal site. This work discusses the possibility to complement in situ measurements with satellite observations, taking benefit from the high revisit time with respect to the timings of in situ campaigns.

  9. Securing the United States' power infrastructure

    SciTech Connect

    Happenny, Sean F.

    2015-08-01

    The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.

  10. 75 FR 8239 - School Food Safety Program Based on Hazard Analysis and Critical Control Point Principles (HACCP...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-24

    ... Critical Control Point Principles (HACCP); Approval of Information Collection Request AGENCY: Food and... rule entitled School Food Safety Program Based on Hazard Analysis and Critical Control Point...

  11. Hierarchical Coloured Petrinet Based Healthcare Infrastructure Interdependency Model

    NASA Astrophysics Data System (ADS)

    Nivedita, N.; Durbha, S.

    2014-11-01

    To ensure a resilient Healthcare Critical Infrastructure, understanding the vulnerabilities and analysing the interdependency on other critical infrastructures is important. To model this critical infrastructure and its dependencies, Hierarchal Coloured petri net modelling approach for simulating the vulnerability of Healthcare Critical infrastructure in a disaster situation is studied.. The model enables to analyse and understand various state changes, which occur when there is a disruption or damage to any of the Critical Infrastructure, and its cascading nature. It also enables to explore optimal paths for evacuation during the disaster. The simulation environment can be used to understand and highlight various vulnerabilities of Healthcare Critical Infrastructure during a flood disaster scenario; minimize consequences; and enable timely, efficient response.

  12. 21 CFR 120.8 - Hazard Analysis and Critical Control Point (HACCP) plan.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... General Provisions § 120.8 Hazard Analysis and Critical Control Point (HACCP) plan. (a) HACCP plan. Each.... Sanitation controls may be included in the HACCP plan. However, to the extent that they are monitored in... 21 Food and Drugs 2 2011-04-01 2011-04-01 false Hazard Analysis and Critical Control Point...

  13. Self repair of impacts, higher energy impacts, and earthquake damage in critical targets such as infrastructure components made of polymers and concrete

    NASA Astrophysics Data System (ADS)

    Dry, Carolyn

    2007-04-01

    The goal of our research has been to develop self-repairing matrices with unique toughness and strength for infrastructure and vehicles. Our revolutionary approach involves the autonomous release of repair chemicals from within the matrix itself. The repair agents are contained in hollow, structural fibers or beads that are embedded within the matrix. Under stress, the matrix senses external environmental factors and reacts by releasing the repair agents from within the hollow vessels. This autonomous response occurs wherever and whenever cracking, debonding or other matrix damage transpires. Superior performance over the life of the matrix is achieved through this self-repairing mechanism. The advantages are safely executed trips, fewer repairs and eventually lighter bridges and vehicles. Research to assess and clarify the impact of the various factors involved in self-repair of matrix materials has been the focus of our work for several years. Our research has addressed the issues by correlating the impact of the various factors, such as 1) delivery vessel, shape/size, coating, chemicals released, release trigger and efficacy and impact on matrix properties 2) influence of end use such as the importance of speed and force of release (airplane skin repair) 3) impact of processing methods that involve heat and pressure on the repair vessels. Our self repairing system can: be processed at temperatures of 350F, repairs in less than 30 seconds, and does not damage the matrix by repair fiber insertion. Unique toughness and strength is developed at damaged areas and material interfaces. Findings are based on testing in compression after impact, compression, fatigue, flexural toughness and flexure modes. The presentation will focus on highlighting the issues that were resolved in creating autonomous, self-repairing structures and vehicles.

  14. Critical Technology Assessment of Five Axis Simultaneous Control Machine Tools

    DTIC Science & Technology

    2009-07-01

    assessment, BIS specifically examined: • The application of Export Control Classification Numbers ( ECCN ) 2B001.b.2 and 2B001.c.2 controls and related...availability of certain five axis simultaneous control mills, mill/turns, and machining centers controlled by ECCN 2B001.b.2 (but not grinders controlled by... ECCN 2B001.c.2) exists to China and Taiwan, which both have an indigenous capability to produce five axis simultaneous control machine tools with

  15. Reducing the risk of rear-end collisions with infrastructure-to-vehicle (I2V) integration of variable speed limit control and adaptive cruise control system.

    PubMed

    Li, Ye; Wang, Hao; Wang, Wei; Liu, Shanwen; Xiang, Yun

    2016-08-17

    Adaptive cruise control (ACC) has been investigated recently to explore ways to increase traffic capacity, stabilize traffic flow, and improve traffic safety. However, researchers seldom have studied the integration of ACC and roadside control methods such as the variable speed limit (VSL) to improve safety. The primary objective of this study was to develop an infrastructure-to-vehicle (I2V) integrated system that incorporated both ACC and VSL to reduce rear-end collision risks on freeways. The intelligent driver model was firstly modified to simulate ACC behavior and then the VSL strategy used in this article was introduced. Next, the I2V system was proposed to integrate the 2 advanced techniques, ACC and VSL. Four scenarios of no control, VSL only, ACC only, and the I2V system were tested in simulation experiments. Time exposed time to collision (TET) and time integrated time to collision (TIT), 2 surrogate safety measures derived from time to collision (TTC), were used to evaluate safety issues associated with rear-end collisions. The total travel times of each scenario were also compared. The simulation results indicated that both the VSL-only and ACC-only methods had a positive impact on reducing the TET and TIT values (reduced by 53.0 and 58.6% and 59.0 and 65.3%, respectively). The I2V system combined the advantages of both ACC and VSL to achieve the most safety benefits (reduced by 71.5 and 77.3%, respectively). Sensitivity analysis of the TTC threshold also showed that the I2V system obtained the largest safety benefits with all of the TTC threshold values. The impact of different market penetration rates of ACC vehicles in I2V system indicated that safety benefits increase with an increase in ACC proportions. Compared to VSL-only and ACC-only scenarios, this integrated I2V system is more effective in reducing rear-end collision risks. The findings of this study provide useful information for traffic agencies to implement novel techniques to improve

  16. Cross-CZO Contrasts: Aspect Controls and Critical Zone Architecture

    NASA Astrophysics Data System (ADS)

    Clarke, B. A.; Kirby, E.; Burbank, D. W.; West, N.

    2013-12-01

    We investigate aspect controls on Critical Zone (CZ) architecture, mobile regolith transport, and landscape morphology, based on a cross-CZO comparison of 1) Niwot Ridge, Boulder Creek CZO (BcCZO), a high alpine site with minimal soil/veg cover, characterized by steep S-facing and shallow N-facing hillslopes and 2) Shale Hills CZO (SSHCZO), a temperate, densely-forested, soil-mantled site with steep N-facing slopes and shallow S-facing slopes. We use high-resolution 2D seismic tomography of P- and S-wave velocities (Vp, Vs) to characterize CZ architecture and constrain depths of weathering fronts, as well as the thickness, character, and transport efficiency of mobile regolith layers. The 2D imagery allows assessment of changes in material properties both lateral and vertical (depth), thus mapping variability in CZ structures along the survey profile. The combination of Vp and Vs are used to better quantify material properties, (i.e., elastics moduli, density, fractures porosity), rock-mass strength, and weathering intensity - and when applied to the very shallow subsurface can help constrain the transport efficiency (strength or erodibility) of mobile regolith layers On Niwot Ridge, the depth of the weathering front and thickness of mobile regolith are substantially greater on shallower N-facing slopes, consistent with frost/freeze driven processes. However, the depth of the weathering front far exceeds modeled extents of frost-cracking depth (for past or present climates), suggesting additional processes also influence deep weathering. Mobile regolith is considerably thicker on shallow N-facing aspects and composed of large, disintegrated cobbles, however, velocity-based estimates of transport efficiency are higher on S-facing slopes composed of small talus blocks and thin soil/veg cover. Although, thin mobile regolith on S-facing slopes may be weak (slow V), the lower gradient of N-facing slopes and southward asymmetry of the ridge divide, suggests that

  17. Controlling avalanche criticality in 2D nano arrays.

    PubMed

    Zohar, Y C; Yochelis, S; Dahmen, K A; Jung, G; Paltiel, Y

    2013-01-01

    Many physical systems respond to slowly changing external force through avalanches spanning broad range of sizes. Some systems crackle even without apparent external force, such as bursts of neuronal activity or charge transfer avalanches in 2D molecular layers. Advanced development of theoretical models describing disorder-induced critical phenomena calls for experiments probing the dynamics upon tuneable disorder. Here we show that isomeric structural transitions in 2D organic self-assembled monolayer (SAM) exhibit critical dynamics with experimentally tuneable disorder. The system consists of field effect transistor coupled through SAM to illuminated semiconducting nanocrystals (NCs). Charges photoinduced in NCs are transferred through SAM to the transistor surface and modulate its conductivity. Avalanches of isomeric structural transitions are revealed by measuring the current noise I(t) of the transistor. Accumulated surface traps charges reduce dipole moments of the molecules, decrease their coupling, and thus decrease the critical disorder of the SAM enabling its tuning during experiments.

  18. Controlling avalanche criticality in 2D nano arrays

    PubMed Central

    Zohar, Y. C.; Yochelis, S.; Dahmen, K. A.; Jung, G.; Paltiel, Y.

    2013-01-01

    Many physical systems respond to slowly changing external force through avalanches spanning broad range of sizes. Some systems crackle even without apparent external force, such as bursts of neuronal activity or charge transfer avalanches in 2D molecular layers. Advanced development of theoretical models describing disorder-induced critical phenomena calls for experiments probing the dynamics upon tuneable disorder. Here we show that isomeric structural transitions in 2D organic self-assembled monolayer (SAM) exhibit critical dynamics with experimentally tuneable disorder. The system consists of field effect transistor coupled through SAM to illuminated semiconducting nanocrystals (NCs). Charges photoinduced in NCs are transferred through SAM to the transistor surface and modulate its conductivity. Avalanches of isomeric structural transitions are revealed by measuring the current noise I(t) of the transistor. Accumulated surface traps charges reduce dipole moments of the molecules, decrease their coupling, and thus decrease the critical disorder of the SAM enabling its tuning during experiments. PMID:23677142

  19. TECHNOLOGIES TO ENHANCE THE OPERATION OF EXISTING NATURAL GAS COMPRESSION INFRASTRUCTURE - MANIFOLD DESIGN FOR CONTROLLING ENGINE AIR BALANCE

    SciTech Connect

    Gary D. Bourn; Ford A. Phillips; Ralph E. Harris

    2005-12-01

    This document provides results and conclusions for Task 15.0--Detailed Analysis of Air Balance & Conceptual Design of Improved Air Manifolds in the ''Technologies to Enhance the Operation of Existing Natural Gas Compression Infrastructure'' project. SwRI{reg_sign} is conducting this project for DOE in conjunction with Pipeline Research Council International, Gas Machinery Research Council, El Paso Pipeline, Cooper Compression, and Southern Star, under DOE contract number DE-FC26-02NT41646. The objective of Task 15.0 was to investigate the perceived imbalance in airflow between power cylinders in two-stroke integral compressor engines and develop solutions via manifold redesign. The overall project objective is to develop and substantiate methods for operating integral engine/compressors in gas pipeline service, which reduce fuel consumption, increase capacity, and enhance mechanical integrity.

  20. THE CRITICAL-PATH METHOD OF CONSTRUCTION CONTROL.

    ERIC Educational Resources Information Center

    DOMBROW, RODGER T.; MAUCHLY, JOHN

    THIS DISCUSSION PRESENTS A DEFINITION AND BRIEF DESCRIPTION OF THE CRITICAL-PATH METHOD AS APPLIED TO BUILDING CONSTRUCTION. INTRODUCING REMARKS CONSIDER THE MOST PERTINENT QUESTIONS PERTAINING TO CPM AND THE NEEDS ASSOCIATED WITH MINIMIZING TIME AND COST ON CONSTRUCTION PROJECTS. SPECIFIC DISCUSSION INCLUDES--(1) ADVANTAGES OF NETWORK TECHNIQUES,…

  1. Towards a controlled study of the QCD critical point

    NASA Astrophysics Data System (ADS)

    de Forcrand, Ph; Philipsen, O.

    2008-10-01

    The phase diagram of QCD, as a function of temperature T and quark chemical potential μ, may contain a critical point (μE, TE) whose non-perturbative nature makes it a natural object of lattice studies. However, the sign problem prevents the application of standard Monte Carlo techniques at nonzero baryon density. We have been pursuing an approach free of the sign problem, where the chemical potential is taken as imaginary and the results are Taylor expanded in μ/T about μ = 0, then analytically continued to real μ. Within this approach we have determined the sensitivity of the critical chemical potential μE to the quark mass, d(\\mu_E)^2/dm_q|_{\\mu_E=0} . Our study indicates that the critical point moves to a larger chemical potential as the quark mass decreases. This finding, contrary to common wisdom, implies that the deconfinement crossover, which takes place in QCD at μ = 0 when the temperature is raised, will remain a crossover in the μ-region where our Taylor expansion can be trusted. If this result, obtained on a coarse lattice, is confirmed by simulations on finer lattices now in progress, then we predict that no chiral critical point will be found for μB lsim 500 MeV, unless the phase diagram contains additional transitions.

  2. 77 FR 30589 - SteelRiver Infrastructure Partners LP, SteelRiver Infrastructure Associates LLC, SteelRiver...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-23

    ... Surface Transportation Board SteelRiver Infrastructure Partners LP, SteelRiver Infrastructure Associates LLC, SteelRiver Infrastructure Fund North America LP, and Patriot Funding LLC--Control Exemption--Patriot Rail Corp., et al. SteelRiver Infrastructure Partners LP (SRIP LP), SteelRiver...

  3. Control of finite critical behaviour in a small-scale social system

    PubMed Central

    Daniels, Bryan C.; Krakauer, David C.; Flack, Jessica C.

    2017-01-01

    Many adaptive systems sit near a tipping or critical point. For systems near a critical point small changes to component behaviour can induce large-scale changes in aggregate structure and function. Criticality can be adaptive when the environment is changing, but entails reduced robustness through sensitivity. This tradeoff can be resolved when criticality can be tuned. We address the control of finite measures of criticality using data on fight sizes from an animal society model system (Macaca nemestrina, n=48). We find that a heterogeneous, socially organized system, like homogeneous, spatial systems (flocks and schools), sits near a critical point; the contributions individuals make to collective phenomena can be quantified; there is heterogeneity in these contributions; and distance from the critical point (DFC) can be controlled through biologically plausible mechanisms exploiting heterogeneity. We propose two alternative hypotheses for why a system decreases the distance from the critical point. PMID:28186194

  4. Control of finite critical behaviour in a small-scale social system

    NASA Astrophysics Data System (ADS)

    Daniels, Bryan C.; Krakauer, David C.; Flack, Jessica C.

    2017-02-01

    Many adaptive systems sit near a tipping or critical point. For systems near a critical point small changes to component behaviour can induce large-scale changes in aggregate structure and function. Criticality can be adaptive when the environment is changing, but entails reduced robustness through sensitivity. This tradeoff can be resolved when criticality can be tuned. We address the control of finite measures of criticality using data on fight sizes from an animal society model system (Macaca nemestrina, n=48). We find that a heterogeneous, socially organized system, like homogeneous, spatial systems (flocks and schools), sits near a critical point; the contributions individuals make to collective phenomena can be quantified; there is heterogeneity in these contributions; and distance from the critical point (DFC) can be controlled through biologically plausible mechanisms exploiting heterogeneity. We propose two alternative hypotheses for why a system decreases the distance from the critical point.

  5. Increasing the resilience and security of the United States' power infrastructure

    SciTech Connect

    Happenny, Sean F.

    2015-08-01

    The United States' power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power infrastructure control and distribution paradigms by utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Understanding how these systems behave in real-world conditions will lead to new ways to make our power infrastructure more resilient and secure. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the aging networks protecting them are becoming easier to attack.

  6. Critical control points for avian influenza A H5N1 in live bird markets in low resource settings.

    PubMed

    Samaan, Gina; Gultom, Anita; Indriani, Risa; Lokuge, Kamalini; Kelly, Paul M

    2011-06-01

    Live bird markets can become contaminated with and become a source of transmission for avian influenza viruses including the highly pathogenic H5N1 strain. Many countries affected by the H5N1-virus have limited resources for programs in environmental health, sanitation and disease control in live bird markets. This study proposes five critical control points (CCPs) to reduce the risk of H5N1-virus contamination in markets in low resource settings. The CCPs were developed based on three surveys conducted in Indonesia: a cross-sectional survey in 119 markets, a knowledge, attitudes and practice survey in 3 markets and a microbiological survey in 83 markets. These surveys assessed poultry workflow, market infrastructure, hygiene and regulatory practices and microbiological contamination with the H5N1-virus. The five CCPs identified were (1) reducing risk of receiving infected birds into the market, (2) reducing the risk of virus spread between different bird flocks in holding cages, (3) reducing surface contamination by isolating slaughter processes from other poultry-related processes, (4) minimizing the potential for contamination during evisceration of carcasses and (5) reducing the risk of surface contamination in the sale zone of the market. To be relevant for low resource settings, the CCPs do not necessitate large infrastructure changes. The CCPs are suited for markets that slaughter poultry and have capacity for daily disposal and removal of solid waste from the market. However, it is envisaged that the CCPs can be adapted for the development of risk-based programs in various settings.

  7. Critical Branches and Lucky Loads in Control-Independence Architectures

    ERIC Educational Resources Information Center

    Malik, Kshitiz

    2009-01-01

    Branch mispredicts have a first-order impact on the performance of integer applications. Control Independence (CI) architectures aim to overlap the penalties of mispredicted branches with useful execution by spawning control-independent work as separate threads. Although control independent, such threads may consume register and memory values…

  8. Critical Branches and Lucky Loads in Control-Independence Architectures

    ERIC Educational Resources Information Center

    Malik, Kshitiz

    2009-01-01

    Branch mispredicts have a first-order impact on the performance of integer applications. Control Independence (CI) architectures aim to overlap the penalties of mispredicted branches with useful execution by spawning control-independent work as separate threads. Although control independent, such threads may consume register and memory values…

  9. Critical dynamics in systems controlled by fractional kinetic equations

    NASA Astrophysics Data System (ADS)

    Batalov, Lev; Batalova, Anastasia

    2013-02-01

    The field theory renormalization group is used for analyzing the fractional Langevin equation with the order of the temporal derivative 0<α<1, fractional Laplacian of the order σ, and Gaussian noise correlator. The case of non-linearity φm with odd m≥3 is considered. It is proved that the model is multiplicatively renormalizable. Propagators were found in the momentum and coordinate representation, expressed in terms of Fox’s H functions. Existence of the dissipative scaling regime in the framework of the ε expansion for σ=2, α=1/l, l=1,2,… is proved. Requirement of the continuous dependence of the critical exponents on α imposes the condition m=3. The main quantitative result is the calculation of the dynamical critical exponent z for α=1/2 up to ε2. We have obtained for it the expression z=4+0.1555ε2+O(ε3).

  10. Sustainable Water Infrastructure

    EPA Pesticide Factsheets

    Resources for state and local environmental and public health officials, and water, infrastructure and utility professionals to learn about sustainable water infrastructure, sustainable water and energy practices, and their role.

  11. Green Infrastructure Modeling Tools

    EPA Pesticide Factsheets

    Modeling tools support planning and design decisions on a range of scales from setting a green infrastructure target for an entire watershed to designing a green infrastructure practice for a particular site.

  12. Aging Water Infrastructure

    EPA Science Inventory

    The Aging Water Infrastructure (AWI) research program is part of EPA’s larger effort called the Sustainable Water Infrastructure (SI) initiative. The SI initiative brings together drinking water and wastewater utility managers; trade associations; local watershed protection organ...

  13. Aging Water Infrastructure

    EPA Science Inventory

    The Aging Water Infrastructure (AWI) research program is part of EPA’s larger effort called the Sustainable Water Infrastructure (SI) initiative. The SI initiative brings together drinking water and wastewater utility managers; trade associations; local watershed protection organ...

  14. Green Infrastructure Modeling Toolkit

    EPA Pesticide Factsheets

    EPA's Green Infrastructure Modeling Toolkit is a toolkit of 5 EPA green infrastructure models and tools, along with communication materials, that can be used as a teaching tool and a quick reference resource when making GI implementation decisions.

  15. Climate Action Benefits: Infrastructure

    EPA Pesticide Factsheets

    This page provides background on the relationship between infrastructure and climate change and describes what the CIRA Infrastructure analyses cover. It provides links to the subsectors Bridges, Roads, Urban Drainage, and Coastal Property.

  16. Enhanced INL Power Grid Test Bed Infrastructure – Phase I

    SciTech Connect

    Reid, Carol Ann; West, Grayson Shawn; McBride, Scott Alan

    2014-06-01

    Idaho National Laboratory (INL), a Department of Energy (DOE) laboratory, owns, operates, and maintains transmission and distribution power grid infrastructure to support the INL multi program mission. Sections of this power infrastructure, known as the INL Power Grid Test Bed, have been and are being used by government and industry to develop, demonstrate, and validate technologies for the modern grid, including smart grid, on a full scale utility test bed. INL’s power grid includes 61 miles of 140 MW, 138 kV rated electrical power transmission supplying seven main substations, each feeding a separate facility complex (or ‘city’) within the INL’s 890 square mile Site. This power grid is fed by three commercial utilities into the INL’s main control substation, but is operated independently from the commercial utility through its primary substation and command and control center. Within the INL complex, one of the seven complexes, the Critical Infrastructure Test Range Complex (CITRC), has been designated as the INL complex for supporting critical infrastructure research and testing. This complex includes its own substation and 13.8kV distribution network, all configurable and controlled by the INL research and development programs. Through investment partnership with the DOE Office of Electricity Delivery and Energy Reliability (DOE OE), INL is enhancing its existing distribution infrastructure to expand the types of testing that can be conducted and increase flexibility for testing configurations. The enhancement of the INL Power Grid Test Bed will enable development and full scale testing of smart-grid-related technologies and smart devices including testing interoperability, operational performance, reliability, and resiliency contribution at multiple distribution voltage classes, specifically 15kV, 25kV, and 35kV. The expected time frame for completion of the Phase I portion of the enhancement would be 4th quarter fiscal year (FY) 2015.

  17. Infrastructure for microsystem production

    NASA Astrophysics Data System (ADS)

    van Heeren, Henne; Sanchez, Stefan; Elders, Job; Heideman, Rene G.

    1999-03-01

    Manufacturing of micro-systems differs from IC manufacturing because the market requires a diversity of products and lower volumes per product. In addition, a diversity of micro-technologies has been developed, including non-IC compatible processes and potentially IC compatible processes. An infrastructure for the production of micro- system devices is lacking. On one side the technology for MST is available at the universities and small university related companies. On the other side there are several small and medium enterprises and bigger companies wanting to implement MST devices in their products, but unwilling to be dependent on universities. Philips Electronics in the Netherlands and Twente MicroProducts realized this problem and have started a project to fill this gap. At this moment the basic of the infrastructure is available: OnStream BV, Eindhoven, The Netherlands, opened its waferfab and assembly facilities for the production of MST devices. Twente MicroProducts will take care of the design of the products and of the small-scale production. Integration of quality systems for maintenance, yield, statistical process control and production in a Manufacturing Execution System offers direct access for all people involved to all the relevant information. It also ensures quality of the products made. The available capabilities of the infrastructure in the current status are compared to the market needs. In this article, a description of a seamless Micro-System Engineering Foundry is given. A seamless organization is capable of helping the customer from design to production. Several examples are given.

  18. [Monitoring of a HACCP (Hazard Analysis Critical Control Point) plan for Listeria monocytogenes control].

    PubMed

    Mengoni, G B; Apraiz, P M

    2003-01-01

    The monitoring of a HACCP (Hazard Analysis Critical Control Point) plan for the Listeria monocytogenes control in the cooked and frozen meat section of a thermo-processing meat plant was evaluated. Seventy "non-product-contact" surface samples and fourteen finished product samples were examined. Thirty eight positive sites for the presence of Listeria sp. were obtained. Twenty-two isolates were identified as L. monocytogenes, two as L. seeligeri and fourteen as L. innocua. Non isolates were obtained from finished product samples. The detection of L. monocytogenes in cooked and frozen meat section environment showed the need for the HACCP plan to eliminate or prevent product contamination in the post-thermal step.

  19. Preemergence herbicides affect critical period of weed control in cotton

    USDA-ARS?s Scientific Manuscript database

    Effective weed control systems must eliminate emerged weeds as well as account for subsequent weed emergence. Two common questions associated with herbicide control are: 1) how long can weeds compete with a crop for resources before yield is reduced and 2) when do weeds that emerge late in the seaso...

  20. IMPLEMENTATION OF A HYBRID CONTROLLER FOR CRITICAL BUILDING HVAC SYSTEMS

    SciTech Connect

    Craig Rieger

    2008-11-01

    Many industrial facilities utilize pressure control gradients to prevent migration of hazardous species from containment areas to occupied zones, often using Proportional-Integral-Derivative (PID) control systems. When operators rebalance the plant, variation from the desired gradients can occur and the operating conditions can change enough that the PID parameters are no longer adequate to maintain a stable system. As the goal of the ventilation control system is to optimize the pressure gradients and associated flows for the plant, Linear Quadratic Tracking (LQT) is a method that provides a time-based approach to guiding plant interactions. However, LQT methods are susceptible to modeling and measurement errors, and therefore the additional use of soft computing methods is proposed for implementation to account for these errors and nonlinearities. The performance of the resulting hybrid controller is demonstrated through simulation and experimental testing as compared to a representative PID controller.

  1. Determination of the Critical Parameters for Remote Microscope Control

    NASA Technical Reports Server (NTRS)

    Hahn, R. C.; Herbach, B. A.; Johnston, J. C.; Bethea, M.

    1991-01-01

    As part of a program to determine the capabilities of Telescience as applied to Microgravity Materials Science the need for a remotely controlled microscope was recognized. For this purpose we equipped a microscope with an X-Y-Z positioning device and motors on the zoom and focus controls. Computer control of these devices allowed remote operation. A standard TV camera was mounted to the computer controlled video board which could compress the image in resolution and grey scale. The operator control console was programmed to display three still video pictures as well as provide command access. A standard data transfer network was used to transmit the video data files and the command interaction was via a high speed phone modem. This system, with the microscope in the Microgravity Materials Science Laboratory (MMSL) at LeRC and the control at RPI, was used to determine the accuracy of setting, time required to achieve setting and the operator ease factor. It was found that the focus setting could be established well within the resolution limit of the TV system and that each motion took about 50 seconds and approximately 12 minutes was required to reach ?best? focus. These times could be reduced significantly with operator experience. The operators were provided with ancillary equipment which provided assistance in making the necessary decisions and they reported satisfaction with the control.

  2. Parallel digital forensics infrastructure.

    SciTech Connect

    Liebrock, Lorie M.; Duggan, David Patrick

    2009-10-01

    This report documents the architecture and implementation of a Parallel Digital Forensics infrastructure. This infrastructure is necessary for supporting the design, implementation, and testing of new classes of parallel digital forensics tools. Digital Forensics has become extremely difficult with data sets of one terabyte and larger. The only way to overcome the processing time of these large sets is to identify and develop new parallel algorithms for performing the analysis. To support algorithm research, a flexible base infrastructure is required. A candidate architecture for this base infrastructure was designed, instantiated, and tested by this project, in collaboration with New Mexico Tech. Previous infrastructures were not designed and built specifically for the development and testing of parallel algorithms. With the size of forensics data sets only expected to increase significantly, this type of infrastructure support is necessary for continued research in parallel digital forensics. This report documents the implementation of the parallel digital forensics (PDF) infrastructure architecture and implementation.

  3. Helix Nebula: Enabling federation of existing data infrastructures and data services to an overarching cross-domain e-infrastructure

    NASA Astrophysics Data System (ADS)

    Lengert, Wolfgang; Farres, Jordi; Lanari, Riccardo; Casu, Francesco; Manunta, Michele; Lassalle-Balier, Gerard

    2014-05-01

    Helix Nebula has established a growing public private partnership of more than 30 commercial cloud providers, SMEs, and publicly funded research organisations and e-infrastructures. The Helix Nebula strategy is to establish a federated cloud service across Europe. Three high-profile flagships, sponsored by CERN (high energy physics), EMBL (life sciences) and ESA/DLR/CNES/CNR (earth science), have been deployed and extensively tested within this federated environment. The commitments behind these initial flagships have created a critical mass that attracts suppliers and users to the initiative, to work together towards an "Information as a Service" market place. Significant progress in implementing the following 4 programmatic goals (as outlined in the strategic Plan Ref.1) has been achieved: × Goal #1 Establish a Cloud Computing Infrastructure for the European Research Area (ERA) serving as a platform for innovation and evolution of the overall infrastructure. × Goal #2 Identify and adopt suitable policies for trust, security and privacy on a European-level can be provided by the European Cloud Computing framework and infrastructure. × Goal #3 Create a light-weight governance structure for the future European Cloud Computing Infrastructure that involves all the stakeholders and can evolve over time as the infrastructure, services and user-base grows. × Goal #4 Define a funding scheme involving the three stake-holder groups (service suppliers, users, EC and national funding agencies) into a Public-Private-Partnership model to implement a Cloud Computing Infrastructure that delivers a sustainable business environment adhering to European level policies. Now in 2014 a first version of this generic cross-domain e-infrastructure is ready to go into operations building on federation of European industry and contributors (data, tools, knowledge, ...). This presentation describes how Helix Nebula is being used in the domain of earth science focusing on geohazards. The

  4. Green Infrastructure Models and Tools

    EPA Science Inventory

    The objective of this project is to modify and refine existing models and develop new tools to support decision making for the complete green infrastructure (GI) project lifecycle, including the planning and implementation of stormwater control in urban and agricultural settings,...

  5. Green Infrastructure Models and Tools

    EPA Science Inventory

    The objective of this project is to modify and refine existing models and develop new tools to support decision making for the complete green infrastructure (GI) project lifecycle, including the planning and implementation of stormwater control in urban and agricultural settings,...

  6. Tuberculosis control in Sindh, Pakistan: Critical analysis of its implementation.

    PubMed

    Khan, Ali H

    Tuberculosis (TB) remains one of the main health problems despite preventive and control measures that have been taken in the past few decades. It is responsible for almost 8.8 million cases and 1.4 million deaths around the world. Lack of access to TB services is a barrier for empowering TB patients. In a country like Pakistan, controlling TB has become a challenge because of the lack of private sector involvement in a National Tuberculosis Control Program (NTP). Therefore, collaboration is needed between public, private and government sectors in treating TB as well as in improving the quality of the health care system. Copyright © 2016 King Saud Bin Abdulaziz University for Health Sciences. Published by Elsevier Ltd. All rights reserved.

  7. Infrastructure development for human cell therapy translation.

    PubMed

    Dietz, A B; Padley, D J; Gastineau, D A

    2007-09-01

    The common conception of a drug is that of a chemical with defined medicinal effect. However, cells used as drugs remain critical to patient care. Cell therapy's origins began with the realization that complex tissues such as blood can retain function when transplanted to the patient. More complex transplantation followed, culminating with the understanding that transplantation of some tissues such as bone marrow may act medicinally. Administration of cells with an intended therapeutic effect is a hallmark of cellular therapy. While cells have been used as drugs for decades, testing a specific therapeutic effect of cells has begun clinical testing relatively recently. Lessons learned during the establishment of blood banking (including the importance of quality control, process control, sterility, and product tracking) are key components in the assurance of the safety and potency of cell therapy preparations. As more academic medical centers and private companies move toward exploiting the full potential of cells as drugs, needs arise for the development of the infrastructure necessary to support these investigations. Careful consideration of the design of the structure used to manufacture is important in terms of the significant capital outlay involved and the facility's role in achieving regulatory compliance. This development perspective describes the regulatory environment surrounding the infrastructure support for cell therapy and practical aspects for design consideration with particular focus on those activities associated with early clinical trials.

  8. Development of Bioinformatics Infrastructure for Genomics Research.

    PubMed

    Mulder, Nicola J; Adebiyi, Ezekiel; Adebiyi, Marion; Adeyemi, Seun; Ahmed, Azza; Ahmed, Rehab; Akanle, Bola; Alibi, Mohamed; Armstrong, Don L; Aron, Shaun; Ashano, Efejiro; Baichoo, Shakuntala; Benkahla, Alia; Brown, David K; Chimusa, Emile R; Fadlelmola, Faisal M; Falola, Dare; Fatumo, Segun; Ghedira, Kais; Ghouila, Amel; Hazelhurst, Scott; Isewon, Itunuoluwa; Jung, Segun; Kassim, Samar Kamal; Kayondo, Jonathan K; Mbiyavanga, Mamana; Meintjes, Ayton; Mohammed, Somia; Mosaku, Abayomi; Moussa, Ahmed; Muhammd, Mustafa; Mungloo-Dilmohamud, Zahra; Nashiru, Oyekanmi; Odia, Trust; Okafor, Adaobi; Oladipo, Olaleye; Osamor, Victor; Oyelade, Jellili; Sadki, Khalid; Salifu, Samson Pandam; Soyemi, Jumoke; Panji, Sumir; Radouani, Fouzia; Souiai, Oussama; Tastan Bishop, Özlem

    2017-06-01

    Although pockets of bioinformatics excellence have developed in Africa, generally, large-scale genomic data analysis has been limited by the availability of expertise and infrastructure. H3ABioNet, a pan-African bioinformatics network, was established to build capacity specifically to enable H3Africa (Human Heredity and Health in Africa) researchers to analyze their data in Africa. Since the inception of the H3Africa initiative, H3ABioNet's role has evolved in response to changing needs from the consortium and the African bioinformatics community. H3ABioNet set out to develop core bioinformatics infrastructure and capacity for genomics research in various aspects of data collection, transfer, storage, and analysis. Various resources have been developed to address genomic data management and analysis needs of H3Africa researchers and other scientific communities on the continent. NetMap was developed and used to build an accurate picture of network performance within Africa and between Africa and the rest of the world, and Globus Online has been rolled out to facilitate data transfer. A participant recruitment database was developed to monitor participant enrollment, and data is being harmonized through the use of ontologies and controlled vocabularies. The standardized metadata will be integrated to provide a search facility for H3Africa data and biospecimens. Because H3Africa projects are generating large-scale genomic data, facilities for analysis and interpretation are critical. H3ABioNet is implementing several data analysis platforms that provide a large range of bioinformatics tools or workflows, such as Galaxy, the Job Management System, and eBiokits. A set of reproducible, portable, and cloud-scalable pipelines to support the multiple H3Africa data types are also being developed and dockerized to enable execution on multiple computing infrastructures. In addition, new tools have been developed for analysis of the uniquely divergent African data and for

  9. Glucose control in critically ill patients in 2009: no alarms and no surprises.

    PubMed

    Pitrowsky, Melissa; Shinotsuka, Cassia Righy; Soares, Márcio; Salluh, Jorge Ibrain Figueira

    2009-08-01

    Glucose control is a major issue in critical care since landmark publications from the last decade leading to widespread use of strict glucose control in the clinical practice. Subsequent trials showed discordant results that lead to several questions and concerns about benefits and risks of implementing an intensive glucose control protocol. In the midst of all recent controversy, we propose that a new glycemic target -150mg/dl) should be aimed. This target glucose level could offer protection against the deleterious effects of hyperglycemia and at the same time keep patient's safety avoiding hypoglicemia. The article presents a critical review of the current literature on intensive insulin therapy in critically ill patients.

  10. Toward Control of Universal Scaling in Critical Dynamics

    DTIC Science & Technology

    2016-01-27

    identify frontline research objectives that will close the gap between the hitherto rarely linked fields of statistical physics and control theory. (a...Awards Graduate Students Co-PI Michel Pleimling was elected Fellow of the American Physical Society (APS) in November 2015, upon nomination by its Topical...Group of Nonlinear and Statistical Physics (GSNP). Co-PI Dan Stilwell with a former postdoc won the 2015 Kalman best paper award for the Journal

  11. Insect growth regulators and insect control: a critical appraisal.

    PubMed Central

    Siddall, J B

    1976-01-01

    Insect growth regulators (IGRs) of the juvenile hormone type alter physiological processes essential to insect development and appear to act specifically on insects. Three natural juvenile hormones have been found in insects but not in other organisms. Future use of antagonists or inhibitors of hormone synthesis may be technically possible as an advantageous extension of pest control by IGRs. A documented survey of the properties, metabolism, toxicology, and uses of the most commercially advanced chemical, methoprene, shows it to be environmentally acceptable and toxicologically innocuous. Derivation of its current use patterns is discussed and limitations on these are noted. Residue levels and their measurement in the ppb region have allowed exemption from the requirement of tolerances in the EPA registered use of methoprene for mosquito control. Tolerances for foods accompany its fully approved use for control of manure breeding flies through a cattle feed supplement. The human health effects of using this chemical appear to be purely beneficial, but further advances through new IGR chemicals appear unlikely without major changes in regulatory and legislative policy. PMID:976222

  12. A Comparison of Techniques for Optimal Infrastructure Restoration

    DTIC Science & Technology

    2014-12-01

    failures can have large impacts on critical infrastructure (e.g., telecommunication networks, power networks, transportation networks and distribution...serious impacts on the humans and the economy of a country. Critical civil infrastructures include telecommunication networks, power net- works...use interdependent power de- livery and telecommunication systems as an example to show the capability of their model for the development of design

  13. Decision-Support Software for Grid Operators: Transmission Topology Control for Infrastructure Resilience to the Integration of Renewable Generation

    SciTech Connect

    2012-03-16

    GENI Project: The CRA team is developing control technology to help grid operators more actively manage power flows and integrate renewables by optimally turning on and off entire power lines in coordination with traditional control of generation and load resources. The control technology being developed would provide grid operators with tools to help manage transmission congestion by identifying the facilities whose on/off status must change to lower generation costs, increase utilization of renewable resources and improve system reliability. The technology is based on fast optimization algorithms for the near to real-time change in the on/off status of transmission facilities and their software implementation.

  14. Experiences and Lessons Learnt with Collaborative e-Research Infrastructure and the application of Identity Management and Access Control for the Centre for Environmental Data Analysis

    NASA Astrophysics Data System (ADS)

    Kershaw, P.

    2016-12-01

    CEDA, the Centre for Environmental Data Analysis, hosts a range of services on behalf of NERC (Natural Environment Research Council) for the UK environmental sciences community and its work with international partners. It is host to four data centres covering atmospheric science, earth observation, climate and space data domain areas. It holds this data on behalf of a number of different providers each with their own data policies which has thus required the development of a comprehensive system to manage access. With the advent of CMIP5, CEDA committed to be one of a number of centres to host the climate model outputs and make them available through the Earth System Grid Federation, a globally distributed software infrastructure developed for this purpose. From the outset, a means for restricting access to datasets was required, necessitating the development a federated system for authentication and authorisation so that access to data could be managed across multiple providers around the world. From 2012, CEDA has seen a further evolution with the development of JASMIN, a multi-petabyte data analysis facility. Hosted alongside the CEDA archive, it provides a range of services for users including a batch compute cluster, group workspaces and a community cloud. This has required significant changes and enhancements to the access control system. In common with many other examples in the research community, the experiences of the above underline the difficulties of developing collaborative e-Research infrastructures. Drawing from these there are some recurring themes: Clear requirements need to be established at the outset recognising that implementing strict access policies can incur additional development and administrative overhead. An appropriate balance is needed between ease of access desired by end users and metrics and monitoring required by resource providers. The major technical challenge is not with security technologies themselves but their effective

  15. Topological Methods for Design and Control of Adaptive Stochastic Complex Systems - to Meet the Challenges of Resilient Urban Infrastructure

    DTIC Science & Technology

    2017-03-24

    for Design and Control of Adaptive Stochastic Complex Systems John Baillieul∗ Contents 1 Executive Summary 2 2 Introduction and Issues to Be Addressed...6.3 Elementary aspects of function composition . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 6.4 Right and left inverses , partitions...difficult of real-world Systems-of-Systems challenges is the design and operational control of medical treatment networks that support forces operating

  16. Contamination control in hybrid microelectronic modules. Identification of critical process and contaminants, part 1

    NASA Technical Reports Server (NTRS)

    Himmel, R. P.

    1975-01-01

    Hybrid processes, handling procedures, and materials were examined to identify the critical process steps in which contamination is most likely to occur, to identify the particular contaminants associated with these critical steps, and to propose method for the control of these contaminants.

  17. Cadmium and lead residue control in a hazard analysis and critical control point (HACCP) environment.

    PubMed

    Pagan-Rodríguez, Doritza; O'Keefe, Margaret; Deyrup, Cindy; Zervos, Penny; Walker, Harry; Thaler, Alice

    2007-02-21

    In 2003-2004, the U.S. Department of Agriculture Food Safety and Inspection Service (FSIS) conducted an exploratory assessment to determine the occurrence and levels of cadmium and lead in randomly collected samples of kidney, liver, and muscle tissues of mature chickens, boars/stags, dairy cows, and heifers. The data generated in the study were qualitatively compared to data that FSIS gathered in a 1985-1986 study in order to identify trends in the levels of cadmium and lead in meat and poultry products. The exploratory assessment was necessary to verify that Hazard Analysis and Critical Control Point plans and efforts to control exposure to these heavy metals are effective and result in products that meet U.S. export requirements. A comparison of data from the two FSIS studies suggests that the incidence and levels of cadmium and lead in different slaughter classes have remained stable since the first study was conducted in 1985-1986. This study was conducted to fulfill FSIS mandate to ensure that meat, poultry, and egg products entering commerce in the United States are free of adulterants, including elevated levels of environmental contaminants such as cadmium and lead.

  18. [Critical of the additive model of the randomized controlled trial].

    PubMed

    Boussageon, Rémy; Gueyffier, François; Bejan-Angoulvant, Theodora; Felden-Dominiak, Géraldine

    2008-01-01

    Randomized, double-blind, placebo-controlled clinical trials are currently the best way to demonstrate the clinical effectiveness of drugs. Its methodology relies on the method of difference (John Stuart Mill), through which the observed difference between two groups (drug vs placebo) can be attributed to the pharmacological effect of the drug being tested. However, this additive model can be questioned in the event of statistical interactions between the pharmacological and the placebo effects. Evidence in different domains has shown that the placebo effect can influence the effect of the active principle. This article evaluates the methodological, clinical and epistemological consequences of this phenomenon. Topics treated include extrapolating results, accounting for heterogeneous results, demonstrating the existence of several factors in the placebo effect, the necessity to take these factors into account for given symptoms or pathologies, as well as the problem of the "specific" effect.

  19. Hydrogen Distribution Infrastructure

    NASA Astrophysics Data System (ADS)

    Mintz, Marianne; Molburg, John; Folga, Stephen; Gillette, Jerry

    2003-07-01

    Whether produced from fossil or non-fossil sources, the widespread use of hydrogen will require a new and extensive infrastructure to produce, distribute, store and dispense it as a vehicular fuel or for electric generation. Depending on the source from which hydrogen is produced and the form in which it is delivered, many alternative infrastructures can be envisioned. Tradeoffs in scale economies between process and distribution technologies, and such issues as operating cost, safety, materials, etc. can also favor alternative forms of infrastructure. This paper discusses several infrastructure alternatives and the associated "well-to-pump" or "fuel cycle" cost of delivered hydrogen.

  20. The use of anti-gravity suits for the control of critical intra-abdominal hemmorhage

    NASA Technical Reports Server (NTRS)

    Kravik, S.; Landmark, K.

    1980-01-01

    The history and use as well as the physiology of the use of antigravity suits for the control of critical intra-abdominal hemorrhages is reviewed. The use of this suit is highly recommended, especially for first aid.

  1. Overview of NASA communications infrastructure

    NASA Technical Reports Server (NTRS)

    Arnold, Ray J.; Fuechsel, Charles

    1991-01-01

    The infrastructure of NASA communications systems for effecting coordination across NASA offices and with the national and international research and technological communities is discussed. The offices and networks of the communication system include the Office of Space Science and Applications (OSSA), which manages all NASA missions, and the Office of Space Operations, which furnishes communication support through the NASCOM, the mission critical communications support network, and the Program Support Communications network. The NASA Science Internet was established by OSSA to centrally manage, develop, and operate an integrated computer network service dedicated to NASA's space science and application research. Planned for the future is the National Research and Education Network, which will provide communications infrastructure to enhance science resources at a national level.

  2. Current status of personnel and infrastructure resources for infection prevention and control programs in the Republic of Korea: A national survey.

    PubMed

    Yoon, Young Kyung; Lee, Sung Eun; Seo, Beom Sam; Kim, Hyeon Jeong; Kim, Jong Hun; Yang, Kyung Sook; Kim, Min Ja; Sohn, Jang Wook

    2016-11-01

    There is significant variability in personnel and infrastructural resources for infection prevention and control (IPC) among health care institutions. The aim of this study is to evaluate the current status of individual hospital-based IPC programs in the Republic of Korea (ROK). A multicenter cross-sectional survey of 100 hospitals participating in the national surveillance programs for multidrug-resistant organisms (MDROs) in the ROK was conducted in September 2015. The survey consisted of 140 standardized Web-based questionnaires. The survey response rate was 41.0%. The responding hospitals are largely organized with multibed rooms, with an insufficient numbers of single rooms. Employment status of infection specialists and hand hygiene resources were better in larger hospitals. The responding hospitals had 1 full-time infection control nurse per 400.3 ± 154.1 beds, with wide variations in training and experience. Facilities have great diversity in their approach to preventing MDROs. There appeared to be no difference in supplies consumption and protocols for IPC among the hospitals, stratified according to size. A greater availability of specialist personnel, single rooms, and a comprehensive IPC program, with the support of a policy-oriented management, is necessary to achieve effective IPC. Copyright © 2016 Association for Professionals in Infection Control and Epidemiology, Inc. Published by Elsevier Inc. All rights reserved.

  3. Hazard analysis and critical control point systems applied to public health risks: the example of seafood.

    PubMed

    Williams, R A; Zorn, D J

    1997-08-01

    The authors describe the way in which the two components of risk analysis--risk assessment and risk management--can be used in conjunction with the hazard analysis and critical control points concept to determine the allocation of resources at potential critical control points. This approach is examined in the context of risks to human health associated with seafood, and in particular with regard to ciguatera poisoning.

  4. Critical Review: Future Control of Blackhead Disease (Histomoniasis) in Poultry.

    PubMed

    Clark, Steven; Kimminau, Emily

    2017-09-01

    Blackhead disease (histomoniasis) currently has no efficacious drug approved for use in poultry in the United States. Both chickens and turkeys can get the disease, but mortality is most often associated with turkeys. The lack of any approved therapies for blackhead is of concern, especially in the case of valuable turkey breeder candidate flocks. Due to the availability of efficacious drugs for many years, research focused on blackhead was minimal. However, without any drugs or reliable additives, blackhead will continue to be an issue in turkeys and broiler breeder chickens. The American Association of Avian Pathologists annual meeting in San Antonio, Texas, August 6-9, 2016, held a mini-symposium on blackhead. The mini-symposium included university researchers and industry veterinarians discussing blackhead in the United States and Europe including insights on the disease pathogenesis and epidemiology, as well as an update on the current state of blackhead in the United States since the removal of nitarsone from the market in January 2016. This review summarizes the information presented at the mini-symposium and discusses current control measures in an era without efficacious drugs.

  5. Arid Green Infrastructure for Water Control and Conservation State of the Science and Research Needs for Arid/Semi-Arid Regions

    EPA Science Inventory

    Green infrastructure is an approach to managing wet weather flows using systems and practices that mimic natural processes. It is designed to manage stormwater as close to its source as possible and protect the quality of receiving waters. Although most green infrastructure pract...

  6. Arid Green Infrastructure for Water Control and Conservation State of the Science and Research Needs for Arid/Semi-Arid Regions

    EPA Science Inventory

    Green infrastructure is an approach to managing wet weather flows using systems and practices that mimic natural processes. It is designed to manage stormwater as close to its source as possible and protect the quality of receiving waters. Although most green infrastructure pract...

  7. Critical Electric Infrastructure Protection Act of 2009

    THOMAS, 111th Congress

    Sen. Lieberman, Joseph I. [ID-CT

    2009-04-30

    04/30/2009 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  8. 78 FR 11737 - Improving Critical Infrastructure Cybersecurity

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-19

    ... Homeland Security (the ``Secretary''), and the Director of National Intelligence shall each issue... a specific targeted entity. The instructions shall address the need to protect intelligence and law... coordination with the Director of National Intelligence, shall establish a process that rapidly disseminates...

  9. Critical Infrastructure Earthquake Preparedness Act of 2011

    THOMAS, 112th Congress

    Rep. Cohen, Steve [D-TN-9

    2011-03-16

    House - 03/17/2011 Referred to the Subcommittee on Economic Development, Public Buildings and Emergency Management. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  10. Critical Infrastructure Earthquake Preparedness Act of 2010

    THOMAS, 111th Congress

    Rep. Cohen, Steve [D-TN-9

    2010-03-16

    House - 03/17/2010 Referred to the Subcommittee on Economic Development, Public Buildings and Emergency Management. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  11. Critical Energy Infrastructure Protection in Canada

    DTIC Science & Technology

    2010-12-01

    participation volontaire des différents intervenants des secteurs public et privé et de notre capacité à inculquer une culture de collaboration et de partage...règlementation ou leur application d’un secteur à l’autre. Bien que les menaces émergeantes soient complexes et qu’elles ne respectent aucune...prospérité (PSP), mais des relations transfrontalières plus informelles entre les propriétaires/opérateurs et leurs associations industrielles

  12. Critical Electric Infrastructure Protection Act of 2009

    THOMAS, 111th Congress

    Sen. Lieberman, Joseph I. [ID-CT

    2009-04-30

    04/30/2009 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  13. Critical Electric Infrastructure Protection Act of 2009

    THOMAS, 111th Congress

    Sen. Lieberman, Joseph I. [ID-CT

    2009-04-30

    Senate - 04/30/2009 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. Critical Infrastructure References: Documented Literature Search

    DTIC Science & Technology

    2012-10-01

    report at hand has four parts: 1. The first part focuses on a) cybersecurity definitions and b) threat perceptions – i.e., which threats the strategies...Information: This report covers the following topics: • " Perceptions and the Threat Landscape; • Managing Cyber Dependencies; • Information...DRDC CSS TN 2012-013 109 2.3.5.2 In the Dark - Crucial Industries Confront Cyberattacks Title: In the Dark - Crucial Industries Confront

  15. The Critical Infrastructure Portfolio Selection Model

    DTIC Science & Technology

    2008-06-13

    a Norwegian institute for development studies and human rights wrote the article Economic Aid to Post-Conflict Countries: A Methodological Critique...Staff College in partial fulfillment of the requirements for the degree MASTER OF MILITARY ART AND SCIENCE General Studies by

  16. Paradigm Change: Cybersecurity of Critical Infrastructure

    DTIC Science & Technology

    2013-04-01

    no. 188 (September/October, 2011): 2. In 2011, “Watson,” the famed IBM artificial intelligence (AI) computer, outperformed both Grand Jeopardy...Converging technologies such as biotechnology and artificial intelligence will change entire civilizations to include their security environment...include artificial intelligence and computer chips. 10 However, during the Global War on Terrorism, the agency, now called the Defense Advanced

  17. Critical Infrastructure Earthquake Preparedness Act of 2010

    THOMAS, 111th Congress

    Rep. Cohen, Steve [D-TN-9

    2010-03-16

    03/17/2010 Referred to the Subcommittee on Economic Development, Public Buildings and Emergency Management. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  18. Critical Infrastructure Earthquake Preparedness Act of 2011

    THOMAS, 112th Congress

    Rep. Cohen, Steve [D-TN-9

    2011-03-16

    03/17/2011 Referred to the Subcommittee on Economic Development, Public Buildings and Emergency Management. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  19. Seismic Barrier Protection of Critical Infrastructure

    DTIC Science & Technology

    2017-05-14

    vertical plane. Computational 2D and 3D seismic wave propagation models developed at MIT Lincoln Laboratory suggest that the borehole array and trench...to protect. The computational models are compared with experimental data obtained from large bench-scale physical models that contain scaled... modeling found that only energy at discrete resonances can be dissipated. Furthermore, seismic shear waves cannot couple into acoustic air filled

  20. Strengthening Cybersecurity for Critical Infrastructure Act

    THOMAS, 111th Congress

    Rep. Langevin, James R. [D-RI-2

    2010-09-29

    House - 11/01/2010 Referred to the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  1. Strengthening Cybersecurity for Critical Infrastructure Act

    THOMAS, 111th Congress

    Rep. Langevin, James R. [D-RI-2

    2010-09-29

    11/01/2010 Referred to the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  2. Energy Regulation Effects on Critical Infrastructure Protection

    DTIC Science & Technology

    2008-12-01

    Todd Masse, Siobhan O’Neil and John Rollins, The Department of Homeland Security’s Risk Assessment Methodology: Evolution, Issues, and Options for...The Electricity Crisis, the Global Economy, and what it Means to You (Hoboken, NJ: John Wiley & Sons, 2007); Robert Peltier, "PUHCA Still Stifling...the private sector. 25 Jack ( John ) Casazza, "Blackouts: Is the Risk Increasing?" Electrical World 212, no. 4 (April 1998). 26 See for example

  3. Location-Based Critical Infrastructure Interdependency (LBCII)

    DTIC Science & Technology

    2010-04-01

    a shallow 7.3 on the Modified Mercalli Intensity scale (MMI) subduction earthquake in the Strait of Georgia, British Coloumbia (at latitude 49.45...the Vancouver airport. The potential for building damage was assessed across ground acceleration zones . Three categories of building damage were...building damage zones , and by identifying electrical failure as a consequence of an earthquake. It was possible to visualize the other effected

  4. Strengthening Cybersecurity for Critical Infrastructure Act

    THOMAS, 111th Congress

    Rep. Langevin, James R. [D-RI-2

    2010-09-29

    11/01/2010 Referred to the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. Critical Infrastructure: The National Asset Database

    DTIC Science & Technology

    2006-09-14

    facilities, business and finance centers, and more. The assets were selected by the newly formed Protective Services Division (now called the Risk...Shipping, 417 Energy, 7889 Not Specif ied, 290 Dams, 2029Agriculture and Food, 7542 Information Technology, 757 Transportation, 6141 Banking and Finance ...states larger in area and population like New York, Texas, and California; and, fewer banking and finance centers are listed for New York than North

  6. Identity Verification Systems as a Critical Infrastructure

    DTIC Science & Technology

    2012-03-01

    fraudulent credit card scanners , stolen purse or wallet, or phone and Internet scams.9 The FTC also reports that identity thieves steal information in...alternative to knowledge and token-based verification. Fingerprints, retinal scans, facial recognition software, and DNA provide technically and...utilizing these systems. U.S.-VISIT was intended to automate the entry and exit process for foreign travelers. Biometric fingerprint scanners and

  7. Optimal control of distributed parameter systems using adaptive critic neural networks

    NASA Astrophysics Data System (ADS)

    Padhi, Radhakant

    In this dissertation, two systematic optimal control synthesis techniques are presented for distributed parameter systems based on the adaptive critic neural networks. Following the philosophy of dynamic programming, this adaptive critic optimal control synthesis approach has many desirable features, viz. having a feedback form of the control, ability for on-line implementation, no need for approximating the nonlinear system dynamics, etc. More important, unlike the dynamic programming, it can accomplish these objectives without getting overwhelmed by the computational and storage requirements. First, an approximate dynamic programming based adaptive critic control synthesis formulation was carried out assuming an approximation of the system dynamics in a discrete form. A variety of example problems were solved using this proposed general approach. Next a different formulation is presented, which is capable of directly addressing the continuous form of system dynamics for control design. This was obtained following the methodology of Galerkin projection based weighted residual approximation using a set of orthogonal basis functions. The basis functions were designed by with the help of proper orthogonal decomposition, which leads to a very low-dimensional lumped parameter representation. The regulator problems of linear and nonlinear heat equations were revisited. Optimal controllers were synthesized first assuming a continuous controller and then a set of discrete controllers in the spatial domain. Another contribution of this study is the formulation of simplified adaptive critics for a large class of problems, which can be interpreted as a significant improvement of the existing adaptive critic technique.

  8. On Mixed Data and Event Driven Design for Adaptive-Critic-Based Nonlinear $H∞ Control.

    PubMed

    Wang, Ding; Mu, Chaoxu; Liu, Derong; Ma, Hongwen

    2017-02-01

    In this paper, based on the adaptive critic learning technique, the H∞ control for a class of unknown nonlinear dynamic systems is investigated by adopting a mixed data and event driven design approach. The nonlinear H∞ control problem is formulated as a two-player zero-sum differential game and the adaptive critic method is employed to cope with the data-based optimization. The novelty lies in that the data driven learning identifier is combined with the event driven design formulation, in order to develop the adaptive critic controller, thereby accomplishing the nonlinear H∞ control. The event driven optimal control law and the time driven worst case disturbance law are approximated by constructing and tuning a critic neural network. Applying the event driven feedback control, the closed-loop system is built with stability analysis. Simulation studies are conducted to verify the theoretical results and illustrate the control performance. It is significant to observe that the present research provides a new avenue of integrating data-based control and event-triggering mechanism into establishing advanced adaptive critic systems.

  9. Prompt critical control of the ACRR using a linear quadratic regulator design

    SciTech Connect

    Gilkey, J.C.

    1992-09-01

    This paper describes the application of linear control design techniques to the problem of nuclear reactor control. The control algorithm consists of generating a nominal trajectory within the control authority of the reactor rod drives, and then following this trajectory with a gain scheduled linear quadratic regulator (LQR). A controller based on this algorithm has generated power pulses up to 100 MW on Sandia`s Annular Core Research Reactor (ACRR). Prompt critical control at $1.02 net reactivity and controlled start up rates over 350 DPM have also been demonstrated using tills controller.

  10. Prompt critical control of the ACRR using a linear quadratic regulator design

    SciTech Connect

    Gilkey, J.C.

    1992-01-01

    This paper describes the application of linear control design techniques to the problem of nuclear reactor control. The control algorithm consists of generating a nominal trajectory within the control authority of the reactor rod drives, and then following this trajectory with a gain scheduled linear quadratic regulator (LQR). A controller based on this algorithm has generated power pulses up to 100 MW on Sandia's Annular Core Research Reactor (ACRR). Prompt critical control at $1.02 net reactivity and controlled start up rates over 350 DPM have also been demonstrated using tills controller.

  11. Microclimate Controls on the Evolution of Critical Zone Architecture in the Susquehanna Shale Hills Critical Zone Observatory

    NASA Astrophysics Data System (ADS)

    West, N.; Kirby, E.; Nyblade, A.; Brantley, S. L.

    2016-12-01

    The functioning and structure of the critical zone is largely controlled by the formation of regolith - the physically and chemically altered material formed from in situ parent bedrock. Therefore, understanding how regolith production and transport respond to perturbations in climate and/or tectonic forcing remains a first-order question in critical zone science. At the Susquehanna Shale Hills Critical Zone Observatory (SSHO), high resolution LiDAR-derived topographic data and depths to hand auger refusal reveal a systematic asymmetry in hillslope gradient and mobile regolith thicknesses; both are greater on north-facing hillslopes. Hydrologic and geochemical studies of at the SSHO also suggest asymmetric sediment transport, fluid flow, and mineral weathering with respect to hillslope aspect. Here, we combine shallow seismic surveys completed along 4 hillslope transects (2 north-facing and 2-south facing), 2 ridgetops transects, and subsurface observations in boreholes to investigate the role of climate in inducing fracturing and priming the development of the observed asymmetry. Comparisons of shallow p-wave velocities with borehole and pit observations suggest the presence of three distinct layers at SSHO: 1) a deep, high velocity layer that is consistent with largely unweathered shale bedrock immediately overlain by 2) an intermediate velocity layer that is consistent with fractured and chemically altered bedrock, and 3) a shallow, slow velocity layer that is consistent with mobile material or shallow soil. Shallow p-wave velocity profiles suggest differences in thickness for both the mobile and immobile regolith material with respect to aspect. Patterns of p-wave velocities with depth are consistent with patterns of fracture densities observed in boreholes and with predictive cracking intensity models related to frost action. Similarly, p-wave velocity profiles correspond with chemical depletion profiles measured in the SSHO subsurface. These data suggest that

  12. Development of a public health nursing data infrastructure.

    PubMed

    Monsen, Karen A; Bekemeier, Betty; P Newhouse, Robin; Scutchfield, F Douglas

    2012-01-01

    An invited group of national public health nursing (PHN) scholars, practitioners, policymakers, and other stakeholders met in October 2010 identifying a critical need for a national PHN data infrastructure to support PHN research. This article summarizes the strengths, limitations, and gaps specific to PHN data and proposes a research agenda for development of a PHN data infrastructure. Future implications are suggested, such as issues related to the development of the proposed PHN data infrastructure and future research possibilities enabled by the infrastructure. Such a data infrastructure has potential to improve accountability and measurement, to demonstrate the value of PHN services, and to improve population health.

  13. Critical analysis of cystic echinococcosis control programs and praziquantel use in South America, 1974-2010.

    PubMed

    Larrieu, Edmundo; Zanini, Fabian

    2012-01-01

    Cystic echinococcosis (CE) is one of the most prevalent zoonoses in Argentina, Brazil, Chile, Peru, and Uruguay. Control programs in South America were originally modeled after programs developed in insular territories, such as Tasmania and New Zealand. The advent and proven effectiveness of praziquantel, plus the experience of insular models, produced high expectations for rapid advances; however, after 30 years of praziquantel use, no endemic area in South America has obtained eradication. In fact, only modest gains in CE control have been made and impact on prevalence among humans has been slight. A major impediment has been the infrastructure needed to administer praziquantel to dogs in rural areas 8 times per year over numerous years, a requirement for rapid attack stage 1. Such an infrastructure has not been financially or politically sustainable in endemic areas, which tend to be the poorest. On the other hand, certain areas in Argentina have had success with simple and economically viable alternatives. Based primarily on continuous field work supported by the local community, these strategies have significantly decreased transmission to humans, the health sector's main objective. In addition, new possibilities and tools, such as the EG95 vaccine, are being evaluated; as are early detection and treatment of asymptomatic carriers.

  14. The Ebola threat: China's response to the West African epidemic and national development of prevention and control policies and infrastructure.

    PubMed

    Fan, Hao-Jun; Gao, Hong-Wei; Ding, Hui; Zhang, Bi-Ke; Hou, Shi-Ke

    2015-02-01

    There is growing concern in West Africa about the spread of the Ebola hemorrhagic fever virus. With the increasing global public health risk, a coordinated international response is necessary. The Chinese government is prepared to work in collaboration with West African countries to assist in the containment and control of the epidemic through the contribution of medical expertise and mobile laboratory testing teams. Nationally, China is implementing prevention programs in major cities and provinces, the distribution of Ebola test kits, and the deployment of a new national Ebola research laboratory.

  15. Improving the Resilience of Major Ports and Critical Supply Chains to Extreme Coastal Flooding: a Combined Artificial Neural Network and Hydrodynamic Simulation Approach to Predicting Tidal Surge Inundation of Port Infrastructure and Impact on Operations.

    NASA Astrophysics Data System (ADS)

    French, J.

    2015-12-01

    Ports are vital to the global economy, but assessments of global exposure to flood risk have generally focused on major concentrations of population or asset values. Few studies have examined the impact of extreme inundation events on port operation and critical supply chains. Extreme water levels and recurrence intervals have conventionally been estimated via analysis of historic water level maxima, and these vary widely depending on the statistical assumptions made. This information is supplemented by near-term forecasts from operational surge-tide models, which give continuous water levels but at considerable computational cost. As part of a NERC Infrastructure and Risk project, we have investigated the impact of North Sea tidal surges on the Port of Immingham, eastern, UK. This handles the largest volume of bulk cargo in the UK and flows of coal and biomass that are critically important for national energy security. The port was partly flooded during a major tidal surge in 2013. This event highlighted the need for improved local forecasts of surge timing in relation to high water, with a better indication of flood depth and duration. We address this problem using a combination of data-driven and numerical hydrodynamic models. An Artificial Neural Network (ANN) is first used to predict the surge component of water level from meteorological data. The input vector comprises time-series of local wind (easterly and northerly wind stress) and pressure, as well as regional pressure and pressure gradients from stations between the Shetland Islands and the Humber estuary. The ANN achieves rms errors of around 0.1 m and can generate short-range (~ 3 to 12 hour) forecasts given real-time input data feeds. It can also synthesize water level events for a wider range of tidal and meteorological forcing combinations than contained in the observational records. These are used to force Telemac2D numerical floodplain simulations using a LiDAR digital elevation model of the port

  16. Temperature control of colloidal phases by Critical Casimir forces -- a simulation study

    NASA Astrophysics Data System (ADS)

    Triet Dang, Minh; Nguyen, Van Duc; Vila Verde, Ana; Bolhuis, Peter; Schall, Peter

    2012-02-01

    Critical Casimir forces arising from the confinement of critical solvent fluctuations between the surfaces of colloidal particles have recently been shown a promising route to control colloidal assembly. Such forces are strongly temperature dependent, and thus allow for direct temperature control of colloidal interactions. However, colloidal phase transitions controlled by this highly temperature-dependent potential are still poorly understood. Here, we report Monte Carlo simulations of critical Casimir-driven colloidal phase behavior using input potentials directly measured in experiments. We map the gas-liquid coexistence region using Gibbs ensemble simulations and the solid-fluid coexistence boundaries using Gibbs-Duhem integration, and determine the gas-liquid critical point by applying scaling theory. The constructed gas-liquid-solid phase diagram agrees quantitatively with that observed in experiments. Remarkably, the simulated gas-liquid coexistence curve exhibits 3D Ising scaling despite the strong temperature dependence of the pair potentials.

  17. Infrastructure Survey 2011

    ERIC Educational Resources Information Center

    Group of Eight (NJ1), 2012

    2012-01-01

    In 2011, the Group of Eight (Go8) conducted a survey on the state of its buildings and infrastructure. The survey is the third Go8 Infrastructure survey, with previous surveys being conducted in 2007 and 2009. The current survey updated some of the information collected in the previous surveys. It also collated data related to aspects of the…

  18. Smart Valley Infrastructure.

    ERIC Educational Resources Information Center

    Maule, R. William

    1994-01-01

    Discusses prototype information infrastructure projects in northern California's Silicon Valley. The strategies of the public and private telecommunications carriers vying for backbone services and industries developing end-user infrastructure technologies via office networks, set-top box networks, Internet multimedia, and "smart homes"…

  19. Smart Valley Infrastructure.

    ERIC Educational Resources Information Center

    Maule, R. William

    1994-01-01

    Discusses prototype information infrastructure projects in northern California's Silicon Valley. The strategies of the public and private telecommunications carriers vying for backbone services and industries developing end-user infrastructure technologies via office networks, set-top box networks, Internet multimedia, and "smart homes"…

  20. Uranium-233 waste definition: Disposal options, safeguards, criticality control, and arms control

    SciTech Connect

    Forsberg, C.W.; Storch, S.N.; Lewis, L.C.

    1998-07-07

    The US investigated the use of {sup 233}U for weapons, reactors, and other purposes from the 1950s into the 1970s. Based on the results of these investigations, it was decided not to use {sup 233}U on a large scale. Most of the {sup 233}U-containing materials were placed in long-term storage. At the end of the cold war, the US initiated, as part of its arms control policies, a disposition program for excess fissile materials. Other programs were accelerated for disposal of radioactive wastes placed in storage during the cold war. Last, potential safety issues were identified related to the storage of some {sup 233}U-containing materials. Because of these changes, significant activities associated with {sup 233}U-containing materials are expected. This report is one of a series of reports to provide the technical bases for future decisions on how to manage this material. A basis for defining when {sup 233}U-containing materials can be managed as waste and when they must be managed as concentrated fissile materials has been developed. The requirements for storage, transport, and disposal of radioactive wastes are significantly different than those for fissile materials. Because of these differences, it is important to classify material in its appropriate category. The establishment of a definition of what is waste and what is fissile material will provide the guidance for appropriate management of these materials. Wastes are defined in this report as materials containing sufficiently small masses or low concentrations of fissile materials such that they can be managed as typical radioactive waste. Concentrated fissile materials are defined herein as materials containing sufficient fissile content such as to warrant special handling to address nuclear criticality, safeguards, and arms control concerns.