Science.gov

Sample records for critical infrastructure control

  1. Cyber Security: Critical Infrastructure Controls Assessment Framework

    DTIC Science & Technology

    2011-05-01

    Industry SANS ‐ CAG OASIS Private   ISA ‐99 <more…> SOX <more…> OWASP <more…> And Growing Day by Day……………….. CIP Security Controls Assessment...NERC-CIP NIST-Cyber Grid Chemical Cyber Physical System Security Standards PCI OASIS OWASP Nuclear Transportation ISA -99 CIP Security Controls...Institute of Electrical and Electronics Engineers.  –           14. ISA  – Industrial Society for Automation 15. ISO – International Standards Organization

  2. Critical Infrastructure Modeling System

    SciTech Connect

    2004-10-01

    The Critical Infrastructure Modeling System (CIMS) is a 3D modeling and simulation environment designed to assist users in the analysis of dependencies within individual infrastructure and also interdependencies between multiple infrastructures. Through visual cuing and textual displays, a use can evaluate the effect of system perturbation and identify the emergent patterns that evolve. These patterns include possible outage areas from a loss of power, denial of service or access, and disruption of operations. Method of Solution: CIMS allows the user to model a system, create an overlay of information, and create 3D representative images to illustrate key infrastructure elements. A geo-referenced scene, satellite, aerial images or technical drawings can be incorporated into the scene. Scenarios of events can be scripted, and the user can also interact during run time to alter system characteristics. CIMS operates as a discrete event simulation engine feeding a 3D visualization.

  3. Critical Infrastructure Modeling: An Approach to Characterizing Interdependencies of Complex Networks & Control Systems

    SciTech Connect

    Stuart Walsh; Shane Cherry; Lyle Roybal

    2009-05-01

    Critical infrastructure control systems face many challenges entering the 21st century, including natural disasters, cyber attacks, and terrorist attacks. Revolutionary change is required to solve many existing issues, including gaining greater situational awareness and resiliency through embedding modeling and advanced control algorithms in smart sensors and control devices instead of in a central controller. To support design, testing, and component analysis, a flexible simulation and modeling capability is needed. Researchers at Idaho National Laboratory are developing and evaluating such a capability through their CIPRsim modeling and simulation framework.

  4. Critical Infrastructures: Background, Policy, and Implementation

    DTIC Science & Technology

    2010-06-07

    Government Accountability Office, Critical Infrastructure Protection: Challenges for Selected Agencies and Industry Sectors. Repot to the Committee on...the federal government to develop and implement plans that would protect government -operated infrastructures and called for a dialogue between... government and the private sector to develop a National Infrastructure Assurance Plan that would protect all of the nation’s critical infrastructures by

  5. Putting the Critical Back in Critical Infrastructure

    DTIC Science & Technology

    2015-12-01

    anonymous online survey to capture the perceptions and views of critical infrastructure professionals across the nation. The survey included an evaluation...on the perceptions and views of the business process, program maturity and implementation, as well as the current state of outcomes. This thesis...foundational nature of this work. A formative program evaluation was conducted through an anonymous online survey to capture the perceptions and views of

  6. Vulnerability of critical infrastructures : identifying critical nodes.

    SciTech Connect

    Cox, Roger Gary; Robinson, David Gerald

    2004-06-01

    The objective of this research was the development of tools and techniques for the identification of critical nodes within critical infrastructures. These are nodes that, if disrupted through natural events or terrorist action, would cause the most widespread, immediate damage. This research focuses on one particular element of the national infrastructure: the bulk power system. Through the identification of critical elements and the quantification of the consequences of their failure, site-specific vulnerability analyses can be focused at those locations where additional security measures could be effectively implemented. In particular, with appropriate sizing and placement within the grid, distributed generation in the form of regional power parks may reduce or even prevent the impact of widespread network power outages. Even without additional security measures, increased awareness of sensitive power grid locations can provide a basis for more effective national, state and local emergency planning. A number of methods for identifying critical nodes were investigated: small-world (or network theory), polyhedral dynamics, and an artificial intelligence-based search method - particle swarm optimization. PSO was found to be the only viable approach and was applied to a variety of industry accepted test networks to validate the ability of the approach to identify sets of critical nodes. The approach was coded in a software package called Buzzard and integrated with a traditional power flow code. A number of industry accepted test networks were employed to validate the approach. The techniques (and software) are not unique to power grid network, but could be applied to a variety of complex, interacting infrastructures.

  7. The Integrated Safety-Critical Advanced Avionics Communication and Control (ISAACC) System Concept: Infrastructure for ISHM

    NASA Technical Reports Server (NTRS)

    Gwaltney, David A.; Briscoe, Jeri M.

    2005-01-01

    Integrated System Health Management (ISHM) architectures for spacecraft will include hard real-time, critical subsystems and soft real-time monitoring subsystems. Interaction between these subsystems will be necessary and an architecture supporting multiple criticality levels will be required. Demonstration hardware for the Integrated Safety-Critical Advanced Avionics Communication & Control (ISAACC) system has been developed at NASA Marshall Space Flight Center. It is a modular system using a commercially available time-triggered protocol, ?Tp/C, that supports hard real-time distributed control systems independent of the data transmission medium. The protocol is implemented in hardware and provides guaranteed low-latency messaging with inherent fault-tolerance and fault-containment. Interoperability between modules and systems of modules using the TTP/C is guaranteed through definition of messages and the precise message schedule implemented by the master-less Time Division Multiple Access (TDMA) communications protocol. "Plug-and-play" capability for sensors and actuators provides automatically configurable modules supporting sensor recalibration and control algorithm re-tuning without software modification. Modular components of controlled physical system(s) critical to control algorithm tuning, such as pumps or valve components in an engine, can be replaced or upgraded as "plug and play" components without modification to the ISAACC module hardware or software. ISAACC modules can communicate with other vehicle subsystems through time-triggered protocols or other communications protocols implemented over Ethernet, MIL-STD- 1553 and RS-485/422. Other communication bus physical layers and protocols can be included as required. In this way, the ISAACC modules can be part of a system-of-systems in a vehicle with multi-tier subsystems of varying criticality. The goal of the ISAACC architecture development is control and monitoring of safety critical systems of a

  8. Emergent Risks In Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Dynes, Scott

    Firms cannot function successfully without managing a host of internal and external organizational and process interdependencies. Part of this involves business continuity planning, which directly aects how resilient arm and its business sector are in the face of disruptions. This paper presents the results of eld studies related to information risk management practices in the health care and retail sectors. The studies explore information risk management coordinating signals within and across rms in these sectors as well as the potential eects of cyber disruptions on the rms as stand-alone entities and as part of a critical infrastructure. The health care case study investigates the impact of the Zotob worm on the ability to deliver medical care and treatment. The retail study examines the resilience of certain elements of the food supply chain to cyber disruptions.

  9. EEW Implementation into Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Zulfikar, Can; Pinar, Ali

    2016-04-01

    In FP7 MARsite project WP9, the integration algorithm of existing strong motion networks with the critical infrastructures strong motion networks have been studied. In Istanbul, the existing Istanbul Earthquake Early Warning (IEEW) strong motion network consists of 15 stations including 10 on land and 5 ocean bottom stations. The system provides continuous online data and earthquake early warning alert depending on the exceedance of the threshold levels in ground motion acceleration in certain number of station within the certain time interval. The data transmission is provided through the fiber optic cable and satellite line alternatively. The early warning alert is transmitted to the critical infrastructures of Istanbul Natural Gas distribution line and Marmaray Tube Tunnel line in order to activate the local strong motion networks for the automatic shut-off mechanism. Istanbul Natural Gas distribution line has 1.800km steel and 15.200km polyethylene in total 18.000km gas pipeline in Istanbul. There are in total 750 district regulators in the city where the gas pressure is reduced from 20bar to 4bar and from there the gas is transmitted with polyethylene lines to service boxes. Currently, Istanbul Natural Gas Distribution Company (IGDAS) has its own strong motion network with 110 strong motion stations installed at the 110 of 750 district regulators. Once the IGDAS strong motion network is activated by the IEEW network, depending on the exceedance of the ground motion parameters threshold levels the gas flow is stopped at the district regulators. Other than the Earthquake Early Warning operation in IGDAS strong motion network, having the calculated ground motion parameters in the network provides damage maps for the buildings and natural gas pipeline network. The Marmaray Tube Tunnel connects the Europe and Asian sides of Istanbul City by a rail line. The tunnel is 1.4km length and consists of 13segments. There is strong motion monitoring network in the tunnel

  10. Critical Infrastructures: Background, Policy, and Implementation

    DTIC Science & Technology

    2008-10-10

    Government Accountability Office, Critical Infrastructure Protection: Challenges for Selected Agencies and Industry Sectors. Repot to the Committee on...set up groups within the federal government to develop and implement plans that would protect government -operated infrastructures and called for a...dialogue between government and the private sector to develop a National Infrastructure Assurance Plan that would protect all of the nation’s critical

  11. 78 FR 11737 - Improving Critical Infrastructure Cybersecurity

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-02-19

    ... Cybersecurity #0; #0; #0; Presidential Documents #0; #0; #0;#0;Federal Register / Vol. 78 , No. 33 / Tuesday... of February 12, 2013 Improving Critical Infrastructure Cybersecurity By the authority vested in me as... improved cybersecurity. The cyber threat to critical infrastructure continues to grow and represents one...

  12. 31 CFR 800.208 - Critical infrastructure.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Critical infrastructure. 800.208 Section 800.208 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE..., AND TAKEOVERS BY FOREIGN PERSONS Definitions § 800.208 Critical infrastructure. The term...

  13. Critical Infrastructures: Background, Policy, and Implementation

    DTIC Science & Technology

    2005-07-12

    order to identify priorities for protective and support measures; ! to develop a comprehensive national plan for securing key resources and critical... plan ,37 a priority asset is one that could be “catastrophically exploited.” It is not clear from the testimony how the list of critical assets was...private sector to develop a National Infrastructure Assurance Plan that would protect all of the nation’s critical infrastructures by the year 2003

  14. Managing Mission-Critical Infrastructure

    ERIC Educational Resources Information Center

    Breeding, Marshall

    2012-01-01

    In the library context, they depend on sophisticated business applications specifically designed to support their work. This infrastructure consists of such components as integrated library systems, their associated online catalogs or discovery services, and self-check equipment, as well as a Web site and the various online tools and services…

  15. Cyber Security and Critical Energy Infrastructure

    SciTech Connect

    Onyeji, Ijeoma; Bazilian, Morgan; Bronk, Chris

    2014-03-01

    Both the number and security implications of sophisticated cyber attacks on companies providing critical energy infrastructures are increasing. As power networks and, to a certain extent, oil and gas infrastructure both upstream and downstream, are becoming increasingly integrated with information communication technology systems, they are growing more susceptible to cyber attacks.

  16. Critical Infrastructure Rebuild Prioritization using Simulation Optimization

    DTIC Science & Technology

    2007-03-01

    the water and allowing the water to flow to the turbine. ( SEDA Renewable Energy Web site) 24 2.4.3 Oil infrastructure In the Wikipedia...Critical Infrastructure Protection Workshop, Frankfurt Germany, September 2003 SEDA Renewable Energy & Cogeneration, “Hydro Power,” September 2006

  17. Critical Infrastructures: Background, Policy, and Implementation

    DTIC Science & Technology

    2008-01-15

    set up groups within the federal government to develop and implement plans that would protect government -operated infrastructures and called for a...dialogue between government and the private sector to develop a National Infrastructure Assurance Plan that would protect all of the nation’s critical...16 Policy Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Government — Sector Coordination

  18. Critical Infrastructures: Background, Policy, and Implementation

    DTIC Science & Technology

    2008-04-02

    set up groups within the federal government to develop and implement plans that would protect government -operated infrastructures and called for a...dialogue between government and the private sector to develop a National Infrastructure Assurance Plan that would protect all of the nation’s critical...Policy Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Government — Sector Coordination

  19. Identifying, understanding, and analyzing critical infrastructure interdependencies.

    SciTech Connect

    Rinaldi, S. M.; Peerenboom, J. P.; Kelly, T. K.; Decision and Information Sciences

    2001-12-01

    The notion that our nation's critical infrastructures are highly interconnected and mutually dependent in complex ways, both physically and through a host of information and communications technologies (so-called 'cyberbased systems'), is more than an abstract, theoretical concept. As shown by the 1998 failure of the Galaxy 4 telecommunications satellite, the prolonged power crisis in California, and many other recent infrastructure disruptions, what happens to one infrastructure can directly and indirectly affect other infrastructures, impact large geographic regions and send ripples throughout the national a global economy. This article presents a conceptual framework for addressing infrastructure interdependencies that could serve as the basis for further understanding and scholarship in this important area. We use this framework to explore the challenges and complexities of interdependency. We set the stage for this discussion by explicitly defining the terms infrastructure, infrastructure dependencies, and infrastructure interdependencies and introducing the fundamental concept of infrastructures as complex adaptive systems. We then focus on the interrelated factors and system conditions that collectively define the six dimensions. Finally, we discuss some of the research challenges involved in developing, applying, and validating modeling and simulation methodologies and tools for infrastructure interdependency analysis.

  20. 75 FR 60771 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-01

    ... SECURITY Critical Infrastructure Partnership Advisory Council (CIPAC) AGENCY: National Protection and... Government and critical infrastructure owners and operators and provides a forum in which they can engage in a broad spectrum of activities to support and coordinate critical infrastructure protection....

  1. 76 FR 70730 - The Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-11-15

    ... SECURITY The Critical Infrastructure Partnership Advisory Council (CIPAC) AGENCY: National Protection and... Security (DHS) announced the establishment of the Critical Infrastructure Partnership Advisory Council... the critical infrastructure sectors defined by Homeland Security Presidential Directive 7 (HSPD-7)...

  2. 77 FR 32656 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-01

    ... SECURITY Critical Infrastructure Partnership Advisory Council (CIPAC) AGENCY: National Protection and... Security (DHS) announced the establishment of the Critical Infrastructure Partnership Advisory Council... FURTHER INFORMATION CONTACT: Larry May, Designated Federal Officer, Critical Infrastructure...

  3. 78 FR 27113 - Version 5 Critical Infrastructure Protection Reliability Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-09

    ...; ] DEPARTMENT OF ENERGY Federal Energy Regulatory Commission 18 CFR Part 40 Version 5 Critical Infrastructure... 5 Critical Infrastructure Protection Reliability Standards, 143 FERC ] 61,055 (2013). This...

  4. 78 FR 66038 - Critical Infrastructure Partnership Advisory Council (CIPAC); Correction.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-04

    ... support and coordinate critical infrastructure security and resilience. The November 5, 2013, meeting will... resilience. Topics, such as Critical Infrastructure Security and Resilience and Cybersecurity, will...

  5. Fuzzy architecture assessment for critical infrastructure resilience

    SciTech Connect

    Muller, George

    2012-12-01

    This paper presents an approach for the selection of alternative architectures in a connected infrastructure system to increase resilience of the overall infrastructure system. The paper begins with a description of resilience and critical infrastructure, then summarizes existing approaches to resilience, and presents a fuzzy-rule based method of selecting among alternative infrastructure architectures. This methodology includes considerations which are most important when deciding on an approach to resilience. The paper concludes with a proposed approach which builds on existing resilience architecting methods by integrating key system aspects using fuzzy memberships and fuzzy rule sets. This novel approach aids the systems architect in considering resilience for the evaluation of architectures for adoption into the final system architecture.

  6. The Critical Infrastructure Portfolio Selection Model

    DTIC Science & Technology

    2008-06-13

    Gregory Ehlers ties together two concepts that are fundamental to enabling a thorough understanding of the Critical Infrastructure Portfolio Selection...work of world-renowned economists, Paul Collier and Anke Hoeffler, and the econometric models that these scholars have developed in an effort to...

  7. Cybersecurity: The Nation’s Greatest Threat to Critical Infrastructure

    DTIC Science & Technology

    2013-03-01

    Cybersecurity: The Nation’s Greatest Threat To Critical Infrastructure by Lieutenant Colonel Nikki L. Griffin Olive...The Nation’s Greatest Threat To Critical Infrastructure 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S... infrastructure has grown to potentially catastrophic dimensions. Critical Infrastructure protection has become a matter of national security, public safety

  8. An agent-based microsimulation of critical infrastructure systems

    SciTech Connect

    BARTON,DIANNE C.; STAMBER,KEVIN L.

    2000-03-29

    US infrastructures provide essential services that support the economic prosperity and quality of life. Today, the latest threat to these infrastructures is the increasing complexity and interconnectedness of the system. On balance, added connectivity will improve economic efficiency; however, increased coupling could also result in situations where a disturbance in an isolated infrastructure unexpectedly cascades across diverse infrastructures. An understanding of the behavior of complex systems can be critical to understanding and predicting infrastructure responses to unexpected perturbation. Sandia National Laboratories has developed an agent-based model of critical US infrastructures using time-dependent Monte Carlo methods and a genetic algorithm learning classifier system to control decision making. The model is currently under development and contains agents that represent the several areas within the interconnected infrastructures, including electric power and fuel supply. Previous work shows that agent-based simulations models have the potential to improve the accuracy of complex system forecasting and to provide new insights into the factors that are the primary drivers of emergent behaviors in interdependent systems. Simulation results can be examined both computationally and analytically, offering new ways of theorizing about the impact of perturbations to an infrastructure network.

  9. 77 FR 44641 - Critical Infrastructure Private Sector Clearance Program Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-30

    ... SECURITY Critical Infrastructure Private Sector Clearance Program Request AGENCY: National Protection and... comments concerning Reinstatement, with change, of a previously approved ICR for the Critical... sector partners who are responsible for critical infrastructure protection but would not otherwise...

  10. 77 FR 21989 - Critical Infrastructure Private Sector Clearance Program Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-12

    ... SECURITY Critical Infrastructure Private Sector Clearance Program Request AGENCY: National Protection and... information provided. SUPPLEMENTARY INFORMATION: The Critical Infrastructure Private Sector Clearance Program (PSCP) sponsors clearances for private sector partners who are responsible for critical...

  11. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    SciTech Connect

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist

  12. Security Economics and Critical National Infrastructure

    NASA Astrophysics Data System (ADS)

    Anderson, Ross; Fuloria, Shailendra

    There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure' against online attack. This is commonly interpreted to mean preventing online sabotage against utilities such as electricity,oil and gas, water, and sewage - including pipelines, refineries, generators, storage depots and transport facilities such as tankers and terminals. A consensus is emerging that the protection of such assets is more a matter of business models and regulation - in short, of security economics - than of technology. We describe the problems, and the state of play, in this paper. Industrial control systems operate in a different world from systems previously studied by security economists; we find the same issues (lock-in, externalities, asymmetric information and so on) but in different forms. Lock-in is physical, rather than based on network effects, while the most serious externalities result from correlated failure, whether from cascade failures, common-mode failures or simultaneous attacks. There is also an interesting natural experiment happening, in that the USA is regulating cyber security in the electric power industry, but not in oil and gas, while the UK is not regulating at all but rather encouraging industry's own efforts. Some European governments are intervening, while others are leaving cybersecurity entirely to plant owners to worry about. We already note some perverse effects of the U.S. regulation regime as companies game the system, to the detriment of overall dependability.

  13. 77 FR 35700 - Protected Critical Infrastructure Information (PCII) Program Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-14

    ... SECURITY Protected Critical Infrastructure Information (PCII) Program Survey AGENCY: National Protection... by this survey serves this purpose. The survey data collected is for internal PCII Program, IICD, and... Information Program. Title: Protected Critical Infrastructure Information (PCII) Program Survey. OMB...

  14. 76 FR 29775 - The Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-23

    ... SECURITY The Critical Infrastructure Partnership Advisory Council (CIPAC) AGENCY: National Protection and... Security (DHS) announced the establishment of the Critical Infrastructure Partnership Advisory Council... FURTHER INFORMATION CONTACT: Nancy J. Wong, Director, Partnership Programs and Information Sharing...

  15. 76 FR 20995 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-04-14

    ... SECURITY Critical Infrastructure Partnership Advisory Council (CIPAC) AGENCY: National Protection and... Security (DHS) announced the establishment of the Critical Infrastructure Partnership Advisory Council... FURTHER INFORMATION CONTACT: Nancy J. Wong, Director, Partnership Programs and Information Sharing...

  16. 75 FR 21011 - Critical Infrastructure Partnership Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-04-22

    ... SECURITY Critical Infrastructure Partnership Advisory Council AGENCY: National Protection and Programs Directorate, DHS. ACTION: Notice of the Critical Infrastructure Partnership Advisory Council (CIPAC) charter... government officials and representatives of the community of owners and operators for each of the...

  17. 78 FR 76986 - Version 5 Critical Infrastructure Protection Reliability Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-20

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF ENERGY Federal Energy Regulatory Commission 18 CFR Part 40 Version 5 Critical Infrastructure Protection Reliability... proceeding, Version 5 Critical Infrastructure Protection Reliability Standards, 145 FERC ] 61,160...

  18. 77 FR 64818 - The Critical Infrastructure Partnership Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-10-23

    ... SECURITY The Critical Infrastructure Partnership Advisory Council AGENCY: National Protection and Programs Directorate, DHS. ACTION: Quarterly Critical Infrastructure Partnership Advisory Council membership update. SUMMARY: The Department of Homeland Security (DHS) announced the ] establishment of the...

  19. 77 FR 32655 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-01

    ... SECURITY Critical Infrastructure Partnership Advisory Council (CIPAC) AGENCY: National Protection and... Security (DHS) announced the establishment of the Critical Infrastructure Partnership Advisory Council... Council (SLTTGCC). FOR FURTHER INFORMATION CONTACT: Larry May, Designated Federal Officer,...

  20. 76 FR 17935 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-31

    ... SECURITY Protected Critical Infrastructure Information (PCII) Stakeholder Survey AGENCY: National... the Critical Infrastructure Information Act of 2002, (Sections 211-215, Title II, Subtitle B of the... owners and operators of critical infrastructure and protected systems. The PCII Program is implemented...

  1. Volcanic ash impacts on critical infrastructure

    NASA Astrophysics Data System (ADS)

    Wilson, Thomas M.; Stewart, Carol; Sword-Daniels, Victoria; Leonard, Graham S.; Johnston, David M.; Cole, Jim W.; Wardman, Johnny; Wilson, Grant; Barnard, Scott T.

    2012-01-01

    Volcanic eruptions can produce a wide range of hazards. Although phenomena such as pyroclastic flows and surges, sector collapses, lahars and ballistic blocks are the most destructive and dangerous, volcanic ash is by far the most widely distributed eruption product. Although ash falls rarely endanger human life directly, threats to public health and disruption to critical infrastructure services, aviation and primary production can lead to significant societal impacts. Even relatively small eruptions can cause widespread disruption, damage and economic loss. Volcanic eruptions are, in general, infrequent and somewhat exotic occurrences, and consequently in many parts of the world, the management of critical infrastructure during volcanic crises can be improved with greater knowledge of the likely impacts. This article presents an overview of volcanic ash impacts on critical infrastructure, other than aviation and fuel supply, illustrated by findings from impact assessment reconnaissance trips carried out to a wide range of locations worldwide by our international research group and local collaborators. ‘Critical infrastructure’ includes those assets, frequently taken for granted, which are essential for the functioning of a society and economy. Electricity networks are very vulnerable to disruption from volcanic ash falls. This is particularly the case when fine ash is erupted because it has a greater tendency to adhere to line and substation insulators, where it can cause flashover (unintended electrical discharge) which can in turn cause widespread and disruptive outages. Weather conditions are a major determinant of flashover risk. Dry ash is not conductive, and heavy rain will wash ash from insulators, but light rain/mist will mobilise readily-soluble salts on the surface of the ash grains and lower the ash layer’s resistivity. Wet ash is also heavier than dry ash, increasing the risk of line breakage or tower/pole collapse. Particular issues for water

  2. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    NASA Astrophysics Data System (ADS)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  3. 78 FR 66603 - Critical Infrastructure Security and Resilience Month, 2013

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-05

    ... November 5, 2013 Part III The President Proclamation 9047--Critical Infrastructure Security and Resilience... Infrastructure Security and Resilience Month, 2013 By the President of the United States of America A... Infrastructure Security and Resilience Month, we resolve to remain vigilant against foreign and domestic...

  4. Neural Network Based Intrusion Detection System for Critical Infrastructures

    SciTech Connect

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  5. Critical infrastructure systems of systems assessment methodology.

    SciTech Connect

    Sholander, Peter E.; Darby, John L.; Phelan, James M.; Smith, Bryan; Wyss, Gregory Dane; Walter, Andrew; Varnado, G. Bruce; Depoy, Jennifer Mae

    2006-10-01

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies that separately consider physical security and cyber security. This research has developed a risk assessment methodology that explicitly accounts for both physical and cyber security, while preserving the traditional security paradigm of detect, delay, and respond. This methodology also accounts for the condition that a facility may be able to recover from or mitigate the impact of a successful attack before serious consequences occur. The methodology uses evidence-based techniques (which are a generalization of probability theory) to evaluate the security posture of the cyber protection systems. Cyber threats are compared against cyber security posture using a category-based approach nested within a path-based analysis to determine the most vulnerable cyber attack path. The methodology summarizes the impact of a blended cyber/physical adversary attack in a conditional risk estimate where the consequence term is scaled by a ''willingness to pay'' avoidance approach.

  6. Critical infrastructure monitoring using UAV imagery

    NASA Astrophysics Data System (ADS)

    Maltezos, Evangelos; Skitsas, Michael; Charalambous, Elisavet; Koutras, Nikolaos; Bliziotis, Dimitris; Themistocleous, Kyriacos

    2016-08-01

    The constant technological evolution in Computer Vision enabled the development of new techniques which in conjunction with the use of Unmanned Aerial Vehicles (UAVs) may extract high quality photogrammetric products for several applications. Dense Image Matching (DIM) is a Computer Vision technique that can generate a dense 3D point cloud of an area or object. The use of UAV systems and DIM techniques is not only a flexible and attractive solution to produce accurate and high qualitative photogrammetric results but also is a major contribution to cost effectiveness. In this context, this study aims to highlight the benefits of the use of the UAVs in critical infrastructure monitoring applying DIM. A Multi-View Stereo (MVS) approach using multiple images (RGB digital aerial and oblique images), to fully cover the area of interest, is implemented. The application area is an Olympic venue in Attica, Greece, at an area of 400 acres. The results of our study indicate that the UAV+DIM approach respond very well to the increasingly greater demands for accurate and cost effective applications when provided with, a 3D point cloud and orthomosaic.

  7. Critical Infrastructure Protection II, The International Federation for Information Processing, Volume 290.

    NASA Astrophysics Data System (ADS)

    Papa, Mauricio; Shenoi, Sujeet

    The information infrastructure -- comprising computers, embedded devices, networks and software systems -- is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: - Themes and Issues - Infrastructure Security - Control Systems Security - Security Strategies - Infrastructure Interdependencies - Infrastructure Modeling and Simulation This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.

  8. Critical Infrastructures: Background, Policy, and Implementation

    DTIC Science & Technology

    2008-01-15

    Directive set up groups within the federal government to develop and implement plans that would protect government -operated infrastructures and called for a...dialogue between government and the private sector to develop a National Infrastructure Assurance Plan that would protect all of the nation’s...16 Policy Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Government — Sector

  9. Network Randomization and Dynamic Defense for Critical Infrastructure Systems

    SciTech Connect

    Chavez, Adrian R.; Martin, Mitchell Tyler; Hamlet, Jason; Stout, William M.S.; Lee, Erik

    2015-04-01

    Critical Infrastructure control systems continue to foster predictable communication paths, static configurations, and unpatched systems that allow easy access to our nation's most critical assets. This makes them attractive targets for cyber intrusion. We seek to address these attack vectors by automatically randomizing network settings, randomizing applications on the end devices themselves, and dynamically defending these systems against active attacks. Applying these protective measures will convert control systems into moving targets that proactively defend themselves against attack. Sandia National Laboratories has led this effort by gathering operational and technical requirements from Tennessee Valley Authority (TVA) and performing research and development to create a proof-of-concept solution. Our proof-of-concept has been tested in a laboratory environment with over 300 nodes. The vision of this project is to enhance control system security by converting existing control systems into moving targets and building these security measures into future systems while meeting the unique constraints that control systems face.

  10. Decontamination of Anthrax spores in critical infrastructure and critical assets.

    SciTech Connect

    Boucher, Raymond M.; Crown, Kevin K.; Tucker, Mark David; Hankins, Matthew Granholm

    2010-05-01

    Decontamination of anthrax spores in critical infrastructure (e.g., subway systems, major airports) and critical assets (e.g., the interior of aircraft) can be challenging because effective decontaminants can damage materials. Current decontamination methods require the use of highly toxic and/or highly corrosive chemical solutions because bacterial spores are very difficult to kill. Bacterial spores such as Bacillus anthracis, the infectious agent of anthrax, are one of the most resistant forms of life and are several orders of magnitude more difficult to kill than their associated vegetative cells. Remediation of facilities and other spaces (e.g., subways, airports, and the interior of aircraft) contaminated with anthrax spores currently requires highly toxic and corrosive chemicals such as chlorine dioxide gas, vapor- phase hydrogen peroxide, or high-strength bleach, typically requiring complex deployment methods. We have developed a non-toxic, non-corrosive decontamination method to kill highly resistant bacterial spores in critical infrastructure and critical assets. A chemical solution that triggers the germination process in bacterial spores and causes those spores to rapidly and completely change to much less-resistant vegetative cells that can be easily killed. Vegetative cells are then exposed to mild chemicals (e.g., low concentrations of hydrogen peroxide, quaternary ammonium compounds, alcohols, aldehydes, etc.) or natural elements (e.g., heat, humidity, ultraviolet light, etc.) for complete and rapid kill. Our process employs a novel germination solution consisting of low-cost, non-toxic and non-corrosive chemicals. We are testing both direct surface application and aerosol delivery of the solutions. A key Homeland Security need is to develop the capability to rapidly recover from an attack utilizing biological warfare agents. This project will provide the capability to rapidly and safely decontaminate critical facilities and assets to return them to

  11. A Federal Response: The President's Critical Infrastructure Protection Board.

    ERIC Educational Resources Information Center

    Schmidt, Howard

    2002-01-01

    Outlines the U.S. Critical Infrastructure Protection Board's purpose, budget, principles, and priorities. Describes the board's role in coordinating all federal activities related to protection of information systems and networks supporting critical infrastructures. Also discusses its responsibility in creating a policy and road map for government…

  12. 75 FR 48983 - The Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-08-12

    ... SECURITY The Critical Infrastructure Partnership Advisory Council (CIPAC) AGENCY: National Protection and... Security (DHS) announced the establishment of the Critical Infrastructure Partnership Advisory Council... government officials and representatives of the community of owners and/or operators for each of the...

  13. 76 FR 76021 - Critical Infrastructure Protection Month, 2011

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-06

    ... Infrastructure Protection Month, 2011 By the President of the United States of America A Proclamation From... stability, public health, or safety. This month, we affirm the fundamental importance of our critical... virtual or physical. During Critical Infrastructure Protection Month, we reflect on our responsibility...

  14. 75 FR 75611 - Critical Infrastructure Protection Month, 2010

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-03

    ... Proclamation 8607--Critical Infrastructure Protection Month, 2010 Proclamation 8608--Helsinki Human Rights Day...;The President ] Proclamation 8607 of November 30, 2010 Critical Infrastructure Protection Month, 2010... Protection Month, we highlight the vast network of systems and structures that sustain the vigor and...

  15. Reliable Communication Models in Interdependent Critical Infrastructure Networks

    SciTech Connect

    Lee, Sangkeun; Chinthavali, Supriya; Shankar, Mallikarjun

    2016-01-01

    Modern critical infrastructure networks are becoming increasingly interdependent where the failures in one network may cascade to other dependent networks, causing severe widespread national-scale failures. A number of previous efforts have been made to analyze the resiliency and robustness of interdependent networks based on different models. However, communication network, which plays an important role in today's infrastructures to detect and handle failures, has attracted little attention in the interdependency studies, and no previous models have captured enough practical features in the critical infrastructure networks. In this paper, we study the interdependencies between communication network and other kinds of critical infrastructure networks with an aim to identify vulnerable components and design resilient communication networks. We propose several interdependency models that systematically capture various features and dynamics of failures spreading in critical infrastructure networks. We also discuss several research challenges in building reliable communication solutions to handle failures in these models.

  16. Toward Developing Genetic Algorithms to Aid in Critical Infrastructure Modeling

    SciTech Connect

    Not Available

    2007-05-01

    Today’s society relies upon an array of complex national and international infrastructure networks such as transportation, telecommunication, financial and energy. Understanding these interdependencies is necessary in order to protect our critical infrastructure. The Critical Infrastructure Modeling System, CIMS©, examines the interrelationships between infrastructure networks. CIMS© development is sponsored by the National Security Division at the Idaho National Laboratory (INL) in its ongoing mission for providing critical infrastructure protection and preparedness. A genetic algorithm (GA) is an optimization technique based on Darwin’s theory of evolution. A GA can be coupled with CIMS© to search for optimum ways to protect infrastructure assets. This includes identifying optimum assets to enforce or protect, testing the addition of or change to infrastructure before implementation, or finding the optimum response to an emergency for response planning. This paper describes the addition of a GA to infrastructure modeling for infrastructure planning. It first introduces the CIMS© infrastructure modeling software used as the modeling engine to support the GA. Next, the GA techniques and parameters are defined. Then a test scenario illustrates the integration with CIMS© and the preliminary results.

  17. Critical Infrastructures: Background, Policy, and Implementation

    DTIC Science & Technology

    2009-11-12

    federal government to develop and implement plans that would protect government -operated infrastructures and called for a dialogue between government ...16 Government —Sector Coordination...State and local government capacities to maintain order and deliver minimum essential public services, • damage the private sector’s capability to

  18. 18 CFR 388.113 - Accessing critical energy infrastructure information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... energy infrastructure information. 388.113 Section 388.113 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY PROCEDURAL RULES INFORMATION AND REQUESTS § 388.113 Accessing critical energy infrastructure information. (a) Scope. This section governs access...

  19. 18 CFR 388.113 - Accessing critical energy infrastructure information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... energy infrastructure information. 388.113 Section 388.113 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY PROCEDURAL RULES INFORMATION AND REQUESTS § 388.113 Accessing critical energy infrastructure information. (a) Scope. This section governs access...

  20. 18 CFR 388.113 - Accessing critical energy infrastructure information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... energy infrastructure information. 388.113 Section 388.113 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY PROCEDURAL RULES INFORMATION AND REQUESTS § 388.113 Accessing critical energy infrastructure information. (a) Scope. This section governs access...

  1. 18 CFR 388.113 - Accessing critical energy infrastructure information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... energy infrastructure information. 388.113 Section 388.113 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY PROCEDURAL RULES INFORMATION AND REQUESTS § 388.113 Accessing critical energy infrastructure information. (a) Scope. This section governs access...

  2. 18 CFR 388.113 - Accessing critical energy infrastructure information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... energy infrastructure information. 388.113 Section 388.113 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY PROCEDURAL RULES INFORMATION AND REQUESTS § 388.113 Accessing critical energy infrastructure information. (a) Scope. This section governs access...

  3. Assessing Terrorist Motivations for Attacking Critical "Chemical" Infrastructure

    SciTech Connect

    Ackerman, G; Bale, J; Moran, K

    2004-12-14

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security, and way of life. One particular type of CI--that relating to chemicals--constitutes both an important element of our nation's infrastructure and a particularly attractive set of potential targets. This is primarily because of the large quantities of toxic industrial chemicals (TICs) it employs in various operations and because of the essential economic functions it serves. This study attempts to minimize some of the ambiguities that presently impede chemical infrastructure threat assessments by providing new insight into the key motivational factors that affect terrorist organizations propensity to attack chemical facilities. Prepared as a companion piece to the Center for Nonproliferation Studies August 2004 study--''Assessing Terrorist Motivations for Attacking Critical Infrastructure''--it investigates three overarching research questions: (1) why do terrorists choose to attack chemical-related infrastructure over other targets; (2) what specific factors influence their target selection decisions concerning chemical facilities; and (3) which, if any, types of groups are most inclined to attack chemical infrastructure targets? The study involved a multi-pronged research design, which made use of four discrete investigative techniques to answer the above questions as comprehensively as possible. These include: (1) a review of terrorism and threat assessment literature to glean expert consensus regarding terrorist interest in targeting chemical facilities; (2) the preparation of case studies to help identify internal group factors and contextual influences that have played a significant role in leading some terrorist groups to attack chemical facilities; (3) an examination of data from the Critical Infrastructure Terrorist Incident Catalog (CrITIC) to further illuminate the nature of terrorist attacks against chemical facilities to date; and (4

  4. 76 FR 50487 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-15

    ... SECURITY Protected Critical Infrastructure Information (PCII) Stakeholder Survey AGENCY: National... Information (PCII) Stakeholder Survey. DHS previously published this ICR in the Federal Register on March 31... Federal, state, and local entities with homeland security duties. This survey is designed to...

  5. 77 FR 59203 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-09-26

    ...The Critical Infrastructure Partnership Advisory Council (CIPAC) Plenary Meeting will be held on Wednesday, October 3, 2012, at the Walter E. Washington Convention Center, 801 Mount Vernon Place NW., Washington, DC 20001. The meeting will be open to the...

  6. Pandemic influenza and critical infrastructure dependencies: possible impact on hospitals.

    PubMed

    Itzwerth, Ralf L; Macintyre, C Raina; Shah, Smita; Plant, Aileen J

    2006-11-20

    Hospitals will be particularly challenged when pandemic influenza spreads. Within the health sector in general, existing pandemic plans focus on health interventions to control outbreaks. The critical relationship between the health sector and other sectors is not well understood and addressed. Hospitals depend on critical infrastructure external to the organisation itself. Existing plans do not adequately consider the complexity and interdependency of systems upon which hospitals rely. The failure of one such system can trigger a failure of another, causing cascading breakdowns. Health is only one of the many systems that struggle at maximum capacity during "normal" times, as current business models operate with no or minimal "excess" staff and have become irreducible operations. This makes interconnected systems highly vulnerable to acute disruptions, such as a pandemic. Companies use continuity plans and highly regulated business continuity management to overcome process interruptions. This methodology can be applied to hospitals to minimise the impact of a pandemic.

  7. Risk Assessment Methodology for Protecting Our Critical Physical Infrastructures

    SciTech Connect

    BIRINGER,BETTY E.; DANNEELS,JEFFREY J.

    2000-12-13

    Critical infrastructures are central to our national defense and our economic well-being, but many are taken for granted. Presidential Decision Directive (PDD) 63 highlights the importance of eight of our critical infrastructures and outlines a plan for action. Greatly enhanced physical security systems will be required to protect these national assets from new and emerging threats. Sandia National Laboratories has been the lead laboratory for the Department of Energy (DOE) in developing and deploying physical security systems for the past twenty-five years. Many of the tools, processes, and systems employed in the protection of high consequence facilities can be adapted to the civilian infrastructure.

  8. Critical Energy Infrastructure Protection in Canada

    DTIC Science & Technology

    2010-12-01

    que le gouvernement attache beaucoup d’importance à la protection des infrastructures énergétiques essentielles. Neuf ans après les attaques du 11...pour la défense Canada – CARO; Décembre 2010. Différents gouvernements ont prétendu que la gestion des urgences et la protection des...nouvelles menaces globales ont émergé et ainsi persuadé le gouvernement du Canada (GC) qu’une approche plus intégrée en matière de sécurité était

  9. The Role of State and Local Jurisdictions in Identifying and Protecting Critical Infrastructure

    DTIC Science & Technology

    2013-12-01

    critical-infrastructure-security-and- resil . 3 Ibid. 4 White House, Presidential Decision Directive 7: Critical Infrastructure Identification...critical-infrastructure-security- and- resil . 77 THIS PAGE INTENTIONALLY LEFT BLANK 78 INITIAL DISTRIBUTION LIST 1. Defense Technical Information

  10. 78 FR 29375 - Protected Critical Infrastructure Information (PCII) Office Self-Assessment Questionnaire

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-20

    ... SECURITY Protected Critical Infrastructure Information (PCII) Office Self- Assessment Questionnaire AGENCY... Information Collection Division (IICD), Protected Critical Infrastructure Information (PCII) Program will...: The PCII Program was created by Congress under the Critical Infrastructure Information Act of...

  11. 77 FR 68795 - Protected Critical Infrastructure Information (PCII) Office Self-Assessment Questionnaire

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-11-16

    ... SECURITY Protected Critical Infrastructure Information (PCII) Office Self- Assessment Questionnaire AGENCY... Information Collection Division (IICD), Protected Critical Infrastructure Information (PCII) Program will... PCII Program under the Critical Infrastructure Information Act of 2002 for DHS to encourage...

  12. Analysis of Critical Infrastructure Dependencies and Interdependencies

    SciTech Connect

    Petit, Frederic; Verner, Duane; Brannegan, David; Buehring, William; Dickinson, David; Guziel, Karen; Haffenden, Rebecca; Phillips, Julia; Peerenboom, James

    2015-06-01

    The report begins by defining dependencies and interdependencies and exploring basic concepts of dependencies in order to facilitate a common understanding and consistent analytical approaches. Key concepts covered include; Characteristics of dependencies: upstream dependencies, internal dependencies, and downstream dependencies; Classes of dependencies: physical, cyber, geographic, and logical; and Dimensions of dependencies: operating environment, coupling and response behavior, type of failure, infrastructure characteristics, and state of operations From there, the report proposes a multi-phase roadmap to support dependency and interdependency assessment activities nationwide, identifying a range of data inputs, analysis activities, and potential products for each phase, as well as key steps needed to progress from one phase to the next. The report concludes by outlining a comprehensive, iterative, and scalable framework for analyzing dependencies and interdependencies that stakeholders can integrate into existing risk and resilience assessment efforts.

  13. Critical Infrastructure References: Documented Literature Search

    DTIC Science & Technology

    2012-10-01

    develops a quantitative all-hazards framework for critical asset and portfolio risk analysis ( CAPRA ) that considers both natural and human-caused...detailed systems analysis. Several illustrative examples of the CAPRA methodology are provided." [p. 789] Key Words: All hazards; consequence

  14. 3 CFR 8910 - Proclamation 8910 of November 30, 2012. Critical Infrastructure Protection and Resilience Month...

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... Infrastructure Protection and Resilience Month, 2012 8910 Proclamation 8910 Presidential Documents Proclamations Proclamation 8910 of November 30, 2012 Proc. 8910 Critical Infrastructure Protection and Resilience Month... way of life, and during Critical Infrastructure Protection and Resilience Month, we maintain...

  15. 3 CFR 9047 - Proclamation 9047 of October 31, 2013. Critical Infrastructure Security and Resilience Month, 2013

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... Infrastructure Security and Resilience Month, 2013 9047 Proclamation 9047 Presidential Documents Proclamations Proclamation 9047 of October 31, 2013 Proc. 9047 Critical Infrastructure Security and Resilience Month, 2013By... massive electrical grids that power our Nation. During Critical Infrastructure Security and...

  16. The European cooperative approach to securing critical information infrastructure.

    PubMed

    Purser, Steve

    2011-10-01

    This paper provides an overview of the EU approach to securing critical information infrastructure, as defined in the Action Plan contained in the Commission Communication of March 2009, entitled 'Protecting Europe from large-scale cyber-attacks and disruptions: enhancing preparedness, security and resilience' and further elaborated by the Communication of May 2011 on critical Information infrastructure protection 'Achievements and next steps: towards global cyber-security'. After explaining the need for pan-European cooperation in this area, the CIIP Action Plan is explained in detail. Finally, the current state of progress is summarised together with the proposed next steps.

  17. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Protected Critical Infrastructure Information... SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.4 Protected Critical Infrastructure Information...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager...

  18. Optimal recovery sequencing for critical infrastructure resilience assessment.

    SciTech Connect

    Vugrin, Eric D.; Brown, Nathanael J. K.; Turnquist, Mark Alan

    2010-09-01

    Critical infrastructure resilience has become a national priority for the U. S. Department of Homeland Security. System resilience has been studied for several decades in many different disciplines, but no standards or unifying methods exist for critical infrastructure resilience analysis. This report documents the results of a late-start Laboratory Directed Research and Development (LDRD) project that investigated the identification of optimal recovery strategies that maximize resilience. To this goal, we formulate a bi-level optimization problem for infrastructure network models. In the 'inner' problem, we solve for network flows, and we use the 'outer' problem to identify the optimal recovery modes and sequences. We draw from the literature of multi-mode project scheduling problems to create an effective solution strategy for the resilience optimization model. We demonstrate the application of this approach to a set of network models, including a national railroad model and a supply chain for Army munitions production.

  19. 18 CFR 5.30 - Critical energy infrastructure information.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Critical energy infrastructure information. 5.30 Section 5.30 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT INTEGRATED LICENSE...

  20. 18 CFR 5.30 - Critical energy infrastructure information.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... 18 Conservation of Power and Water Resources 1 2011-04-01 2011-04-01 false Critical energy infrastructure information. 5.30 Section 5.30 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT INTEGRATED LICENSE...

  1. Geospatial decision support framework for critical infrastructure interdependency assessment

    NASA Astrophysics Data System (ADS)

    Shih, Chung Yan

    Critical infrastructures, such as telecommunications, energy, banking and finance, transportation, water systems and emergency services are the foundations of modern society. There is a heavy dependence on critical infrastructures at multiple levels within the supply chain of any good or service. Any disruptions in the supply chain may cause profound cascading effect to other critical infrastructures. A 1997 report by the President's Commission on Critical Infrastructure Protection states that a serious interruption in freight rail service would bring the coal mining industry to a halt within approximately two weeks and the availability of electric power could be reduced in a matter of one to two months. Therefore, this research aimed at representing and assessing the interdependencies between coal supply, transportation and energy production. A proposed geospatial decision support framework was established and applied to analyze interdependency related disruption impact. By utilizing the data warehousing approach, geospatial and non-geospatial data were retrieved, integrated and analyzed based on the transportation model and geospatial disruption analysis developed in the research. The results showed that by utilizing this framework, disruption impacts can be estimated at various levels (e.g., power plant, county, state, etc.) for preventative or emergency response efforts. The information derived from the framework can be used for data mining analysis (e.g., assessing transportation mode usages; finding alternative coal suppliers, etc.).

  2. 78 FR 57644 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-19

    ... resiliency. Off-topic questions or comments will not be permitted or discussed. Please note that the public... security and resilience. The September 25, 2013, meeting will include topic- specific discussions focused on partnership efforts to enhance critical infrastructure resilience. Topics such as the...

  3. 77 FR 72673 - Critical Infrastructure Protection and Resilience Month, 2012

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-12-05

    ... Resilience Month, 2012 Proclamation 8911--National Impaired Driving Prevention Month, 2012 Proclamation 8912... Resilience Month, 2012 By the President of the United States of America A Proclamation Every day, Americans... essential to our way of life, and during Critical Infrastructure Protection and Resilience Month,...

  4. 18 CFR 5.30 - Critical energy infrastructure information.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... 18 Conservation of Power and Water Resources 1 2013-04-01 2013-04-01 false Critical energy infrastructure information. 5.30 Section 5.30 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT INTEGRATED LICENSE...

  5. 18 CFR 5.30 - Critical energy infrastructure information.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... 18 Conservation of Power and Water Resources 1 2012-04-01 2012-04-01 false Critical energy infrastructure information. 5.30 Section 5.30 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT INTEGRATED LICENSE...

  6. 18 CFR 5.30 - Critical energy infrastructure information.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... 18 Conservation of Power and Water Resources 1 2014-04-01 2014-04-01 false Critical energy infrastructure information. 5.30 Section 5.30 Conservation of Power and Water Resources FEDERAL ENERGY REGULATORY COMMISSION, DEPARTMENT OF ENERGY REGULATIONS UNDER THE FEDERAL POWER ACT INTEGRATED LICENSE...

  7. Security Engineering and Educational Initiatives for Critical Information Infrastructures

    DTIC Science & Technology

    2013-06-01

    invention that may relate to them. This report is the result of contracted fundamental research deemed exempt from public affairs security and... related IA courses. APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED 5 2.2 Critical Infrastructure Protection Laboratory (CIPL) This...TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED STINFO COPY AIR FORCE RESEARCH LABORATORY

  8. Method or Madness: Federal Oversight Structures for Critical Infrastructure Protection

    DTIC Science & Technology

    2007-12-01

    51 x THIS PAGE INTENTIONALLY LEFT BLANK xi ACKNOWLEDGMENTS As with most things ...daughters, Amber and Lauren, who always say just the right things to keep this all in perspective. Bike rides and soccer games helped to provide just...critical to the functioning of American society. These infrastructures include things often taken for granted: food and water supplies, banking

  9. Examining Willingness to Attack Critical Infrastructure Online and Offline

    ERIC Educational Resources Information Center

    Holt, Thomas J.; Kilger, Max

    2012-01-01

    The continuing adoption of technologies by the general public coupled with the expanding reliance of critical infrastructures connected through the Internet has created unique opportunities for attacks by civilians and nation-states alike. Although governments are increasingly focusing on policies to deter nation-state level attacks, it is unclear…

  10. Spatial risk assessment for critical network infrastructure using sensitivity analysis

    NASA Astrophysics Data System (ADS)

    Möderl, Michael; Rauch, Wolfgang

    2011-12-01

    The presented spatial risk assessment method allows for managing critical network infrastructure in urban areas under abnormal and future conditions caused e.g., by terrorist attacks, infrastructure deterioration or climate change. For the spatial risk assessment, vulnerability maps for critical network infrastructure are merged with hazard maps for an interfering process. Vulnerability maps are generated using a spatial sensitivity analysis of network transport models to evaluate performance decrease under investigated thread scenarios. Thereby parameters are varied according to the specific impact of a particular threat scenario. Hazard maps are generated with a geographical information system using raster data of the same threat scenario derived from structured interviews and cluster analysis of events in the past. The application of the spatial risk assessment is exemplified by means of a case study for a water supply system, but the principal concept is applicable likewise to other critical network infrastructure. The aim of the approach is to help decision makers in choosing zones for preventive measures.

  11. Volcanic hazard impacts to critical infrastructure: A review

    NASA Astrophysics Data System (ADS)

    Wilson, G.; Wilson, T. M.; Deligne, N. I.; Cole, J. W.

    2014-10-01

    Effective natural hazard risk assessment requires the characterisation of both hazards and vulnerabilities of exposed elements. Volcanic hazard assessment is at an advanced state and is a considerable focus of volcanic scientific inquiry, whereas comprehensive vulnerability assessment is lacking. Cataloguing and analysing volcanic impacts provide insight on likely societal and physical vulnerabilities during future eruptions. This paper reviews documented disruption and physical damage of critical infrastructure elements resulting from four volcanic hazards (tephra fall, pyroclastic density currents, lava flows and lahars) of eruptions in the last 100 years. We define critical infrastructure as including energy sector infrastructure, water supply and wastewater networks, transportation routes, communications, and critical components. Common trends of impacts and vulnerabilities are summarised, which can be used to assess and reduce volcanic risk for future eruptions. In general, tephra falls cause disruption to these infrastructure sectors, reducing their functionality, whilst flow hazards (pyroclastic density currents, lava flows and lahars) are more destructive causing considerable permanent damage. Volcanic risk assessment should include quantification of vulnerabilities and we challenge the volcanology community to address this through the implementation of a standardised vulnerability assessment methodology and the development and use of fragility functions, as has been successfully implemented in other natural hazard fields.

  12. Increasing impacts of climate extremes on critical infrastructures in Europe

    NASA Astrophysics Data System (ADS)

    Forzieri, Giovanni; Bianchi, Alessandra; Feyen, Luc; Silva, Filipe Batista e.; Marin, Mario; Lavalle, Carlo; Leblois, Antoine

    2016-04-01

    The projected increases in exposure to multiple climate hazards in many regions of Europe, emphasize the relevance of a multi-hazard risk assessment to comprehensively quantify potential impacts of climate change and develop suitable adaptation strategies. In this context, quantifying the future impacts of climatic extremes on critical infrastructures is crucial due to their key role for human wellbeing and their effects on the overall economy. Critical infrastructures describe the existing assets and systems that are essential for the maintenance of vital societal functions, health, safety, security, economic or social well-being of people, and the disruption or destruction of which would have a significant impact as a result of the failure to maintain those functions. We assess the direct damages of heat and cold waves, river and coastal flooding, droughts, wildfires and windstorms to energy, transport, industry and social infrastructures in Europe along the 21st century. The methodology integrates in a coherent framework climate hazard, exposure and vulnerability components. Overall damage is expected to rise up to 38 billion €/yr, ten time-folds the current climate damage, with drastic variations in risk scenarios. Exemplificative are drought and heat-related damages that could represent 70% of the overall climate damage in 2080s versus the current 12%. Many regions, prominently Southern Europe, will likely suffer multiple stresses and systematic infrastructure failures due to climate extremes if no suitable adaptation measures will be taken.

  13. The monitoring of critical infrastructures using microwave radiometers

    NASA Astrophysics Data System (ADS)

    Peichl, Markus; Dill, Stephan; Jirousek, Matthias; Süß, Helmut

    2008-04-01

    Microwaves in the range of 1-300 GHz are used in many respects for remote sensing applications. Besides radar sensors particularly passive measurement methods are used for two-dimensional imaging. The imaging of persons and critical infrastructures for security purposes is of increasing interest particularly for transportation services or public events. Personnel inspection with respect to weapons and explosives becomes an important mean concerning terrorist attacks. Microwaves can penetrate clothing and a multitude of other materials and allow the detection of hidden objects by monitoring dielectric anomalies. Passive microwave remote sensing allows a daytime independent non-destructive observation and examination of the objects of interest under nearly all weather conditions without artificial exposure of persons or areas. The performance of millimeter-wave radiometric imaging with respect to wide-area surveillance is investigated. Measurement results of some typical critical infrastructure scenarios are discussed. Requirements for future operational systems are outlined exploring a radiometric range equation.

  14. Critical Infrastructure Consequence Modeler v 0.5.0 Beta

    SciTech Connect

    Chavez, Lozanne; & Richardson, Bryan

    2009-08-11

    Implements previously developed methodology to calculate total disutility to an organization caused by impacts imposed upon the physical system in question (electric power transmission system, water system, etc).Critical infrastructure utility personnel will use this as a planning tool to determine where system weaknesses are and where improvements should be made such that the consequence of some impact is no longer higher than acceptable.

  15. Operating in Uncertainty; Growing Resilient Critical Infrastructure Organizations

    DTIC Science & Technology

    2011-03-01

    UNCERTAINTY; GROWING RESILIENT CRITICAL INFRASTRUCTURE ORGANIZATIONS by Michael L. Schaefer March 2011 Thesis Advisor: Samuel Clovis Second...Approved by: Dr. Samuel Clovis , PhD Thesis Advisor Dr. Lauren Wollman, PhD Second Reader Harold A Trinkunas, PhD Chair, Department of...my advisor, Dr. Samuel Clovis and second reader Dr. Lauren Wollman, for their invaluable guidance and advice, the Center for Homeland Defense and

  16. A comprehensive R&D Approach for Critical Infrastructure Protection

    NASA Astrophysics Data System (ADS)

    Krauthammer, Theodor

    2007-03-01

    This paper provides background on requirements, capabilities and research recommendations for protecting critical infrastructure systems. These activities are needed to develop much more effective solutions to problems that can be currently addressed primarily with conservative, and/or empirical approaches. The expected contributions will have a profound effect on national and international defense and security. Although essential work must be conducted in several important areas, this paper is primarily focused on scientific and technical issues.

  17. People at risk - nexus critical infrastructure and society

    NASA Astrophysics Data System (ADS)

    Heiser, Micha; Thaler, Thomas; Fuchs, Sven

    2016-04-01

    Strategic infrastructure networks include the highly complex and interconnected systems that are so vital to a city or state that any sudden disruption can result in debilitating impacts on human life, the economy and the society as a whole. Recently, various studies have applied complex network-based models to study the performance and vulnerability of infrastructure systems under various types of attacks and hazards - a major part of them is, particularly after the 9/11 incident, related to terrorism attacks. Here, vulnerability is generally defined as the performance drop of an infrastructure system under a given disruptive event. The performance can be measured by different metrics, which correspond to various levels of resilience. In this paper, we will address vulnerability and exposure of critical infrastructure in the Eastern Alps. The Federal State Tyrol is an international transport route and an essential component of the north-south transport connectivity in Europe. Any interruption of the transport flow leads to incommensurable consequences in terms of indirect losses, since the system does not feature redundant elements at comparable economic efficiency. Natural hazard processes such as floods, debris flows, rock falls and avalanches, endanger this infrastructure line, such as large flood events in 2005 or 2012, rock falls 2014, which had strong impacts to the critical infrastructure, such as disruption of the railway lines (in 2005 and 2012), highways and motorways (in 2014). The aim of this paper is to present how critical infrastructures as well as communities and societies are vulnerable and can be resilient against natural hazard risks and the relative cascading effects to different compartments (industrial, infrastructural, societal, institutional, cultural, etc.), which is the dominant by the type of hazard (avalanches, torrential flooding, debris flow, rock falls). Specific themes will be addressed in various case studies to allow cross

  18. Controlling Infrastructure Costs: Right-Sizing the Mission Control Facility

    NASA Technical Reports Server (NTRS)

    Martin, Keith; Sen-Roy, Michael; Heiman, Jennifer

    2009-01-01

    Johnson Space Center's Mission Control Center is a space vehicle, space program agnostic facility. The current operational design is essentially identical to the original facility architecture that was developed and deployed in the mid-90's. In an effort to streamline the support costs of the mission critical facility, the Mission Operations Division (MOD) of Johnson Space Center (JSC) has sponsored an exploratory project to evaluate and inject current state-of-the-practice Information Technology (IT) tools, processes and technology into legacy operations. The general push in the IT industry has been trending towards a data-centric computer infrastructure for the past several years. Organizations facing challenges with facility operations costs are turning to creative solutions combining hardware consolidation, virtualization and remote access to meet and exceed performance, security, and availability requirements. The Operations Technology Facility (OTF) organization at the Johnson Space Center has been chartered to build and evaluate a parallel Mission Control infrastructure, replacing the existing, thick-client distributed computing model and network architecture with a data center model utilizing virtualization to provide the MCC Infrastructure as a Service. The OTF will design a replacement architecture for the Mission Control Facility, leveraging hardware consolidation through the use of blade servers, increasing utilization rates for compute platforms through virtualization while expanding connectivity options through the deployment of secure remote access. The architecture demonstrates the maturity of the technologies generally available in industry today and the ability to successfully abstract the tightly coupled relationship between thick-client software and legacy hardware into a hardware agnostic "Infrastructure as a Service" capability that can scale to meet future requirements of new space programs and spacecraft. This paper discusses the benefits

  19. An Overview of Swiss Research on Vulnerability of Critical Infrastructure

    NASA Astrophysics Data System (ADS)

    Kröger, Wolfgang

    Throughout history, mankind has developed technologies and integrated them into systems to be deployed for human welfare and security — albeit at the price of becoming dependent on these very same technologies and systems. In recent decades these systems have grown into a large-scale array of interconnected networks that span large distances and are, for the most part, privately owned or operated. These so-called infrastructures function collaboratively and synergistically to produce and/or distribute a continuous flow of goods and services. Infrastructures so vital to a country that their incapacity or destruction would have a debilitating impact on the health, safety, security, economy and social well being of the country, including the effective functioning the government1, are labelled critical. The failure of only a single infrastructure or an interruption of its service can inflict significant damage on a society and its economy. However, cross-boundary cascading bears the potential for multi-infrastructural collapse with unprecedented consequences.

  20. Critical Infrastructure Interdependency Modeling: A Survey of U.S. and International Research

    SciTech Connect

    Not Available

    2006-08-01

    The Nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes, and organizations across which these goods and services move are called "critical infrastructures".1 This statement is as true in the U.S. as in any country in the world. Recent world events such as the 9-11 terrorist attacks, London bombings, and gulf coast hurricanes have highlighted the importance of stable electric, gas and oil, water, transportation, banking and finance, and control and communication infrastructure systems. Be it through direct connectivity, policies and procedures, or geospatial proximity, most critical infrastructure systems interact. These interactions often create complex relationships, dependencies, and interdependencies that cross infrastructure boundaries. The modeling and analysis of interdependencies between critical infrastructure elements is a relatively new and very important field of study. The U.S. Technical Support Working Group (TSWG) has sponsored this survey to identify and describe this current area of research including the current activities in this field being conducted both in the U.S. and internationally. The main objective of this study is to develop a single source reference of critical infrastructure interdependency modeling tools (CIIMT) that could be applied to allow users to objectively assess the capabilities of CIIMT. This information will provide guidance for directing research and development to address the gaps in development. The results will inform researchers of the TSWG Infrastructure Protection Subgroup of research and development efforts and allow a more focused approach to addressing the needs of CIIMT end-user needs. This report first presents the field of infrastructure interdependency analysis, describes the survey methodology, and presents the leading research efforts in both a cumulative table and through individual datasheets. Data was

  1. Cyber-Critical Infrastructure Protection Using Real-Time Payload-Based Anomaly Detection

    NASA Astrophysics Data System (ADS)

    Düssel, Patrick; Gehl, Christian; Laskov, Pavel; Bußer, Jens-Uwe; Störmann, Christof; Kästner, Jan

    With an increasing demand of inter-connectivity and protocol standardization modern cyber-critical infrastructures are exposed to a multitude of serious threats that may give rise to severe damage for life and assets without the implementation of proper safeguards. Thus, we propose a method that is capable to reliably detect unknown, exploit-based attacks on cyber-critical infrastructures carried out over the network. We illustrate the effectiveness of the proposed method by conducting experiments on network traffic that can be found in modern industrial control systems. Moreover, we provide results of a throughput measuring which demonstrate the real-time capabilities of our system.

  2. Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.

    SciTech Connect

    Dawson, Lon Andrew; Stinebaugh, Jennifer A.

    2010-04-01

    The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

  3. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... Program administration. (a) Preparedness Directorate Program Management. The Secretary of...

  4. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    SciTech Connect

    Suski, N; Wuest, C

    2011-02-04

    Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre

  5. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... 6 Domestic Security 1 2012-01-01 2012-01-01 false Protected Critical Infrastructure Information... SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.4 Protected Critical Infrastructure Information... as a PCII Officer in order to carry out the responsibilities stated in paragraph (d) of this...

  6. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2013-01-01 2013-01-01 false Protected Critical Infrastructure...

  7. 6 CFR 29.4 - Protected Critical Infrastructure Information Program administration.

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ...) Protected Critical Infrastructure Information Management System (PCIIMS). The PCII Program Manager shall... be known as the “Protected Critical Infrastructure Information Management System” (PCIIMS), to record... 6 Domestic Security 1 2014-01-01 2014-01-01 false Protected Critical Infrastructure...

  8. 18 CFR 375.313 - Delegations to the Critical Energy Infrastructure Information Coordinator.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... Critical Energy Infrastructure Information Coordinator. 375.313 Section 375.313 Conservation of Power and... COMMISSION Delegations § 375.313 Delegations to the Critical Energy Infrastructure Information Coordinator... requests for critical energy infrastructure information as defined in § 388.113(c)(1). (b)...

  9. Critical infrastructure: impacts of natural hazards and consequences

    NASA Astrophysics Data System (ADS)

    Petrova, Elena

    2014-05-01

    Critical infrastructure such as oil and gas pipelines, transmission facilities, heat-, and water supply, lines of communications, roads, railways as well as air and water transport play the key role in social and economic development of every country. Therefore, accidents causing failures and breakdowns of critical infrastructure facilities have the most drastic consequences for the society, economy, and environment. For example, road accidents cause the highest number of fatalities and injuries all over the world, especially in the middle-income countries. The so-called "blackouts" or accidental losses of electric power and power outages entail serious social troubles and heavy economic losses. The pipeline ruptures and oil-tanker crashes accompanied by oil releases cause the most severe environmental and large material damages. Critical infrastructure facilities are most vulnerable to the impacts of natural hazards that trigger many accidents in them especially in the regions most at natural risk. The Russian Federation has more than 2.6 million km of transmission facilities, 940,000 km of roads, 102,000 km of inland waterways, 86,000 km of railways, and more than 70,000 km of trunk pipelines. Many facilities are beyond of their service life and need reconstruction. A very high level of deterioration and "human factor" are the main cause of accidents, ruptures, and crashes. However, natural hazards and disasters also play an essential (sometimes a leading) role in triggering or magnifying accidents in these objects. Thus, natural factors cause more than 70 percent of all "blackouts", about 20 percent of accidents at heat- and water supply systems and water accidents, five percent of pipeline ruptures, and about two to three percent of air crashes, road, and railway accidents. The influence of natural factors is stronger in the North-Western and Central parts of the European Russia, in Krasnodarsky Territory (South of Russia) and in Far East that are more exposed

  10. System Dynamics Approach for Critical Infrastructure and Decision Support. A Model for a Potable Water System.

    NASA Astrophysics Data System (ADS)

    Pasqualini, D.; Witkowski, M.

    2005-12-01

    The Critical Infrastructure Protection / Decision Support System (CIP/DSS) project, supported by the Science and Technology Office, has been developing a risk-informed Decision Support System that provides insights for making critical infrastructure protection decisions. The system considers seventeen different Department of Homeland Security defined Critical Infrastructures (potable water system, telecommunications, public health, economics, etc.) and their primary interdependencies. These infrastructures have been modeling in one model called CIP/DSS Metropolitan Model. The modeling approach used is a system dynamics modeling approach. System dynamics modeling combines control theory and the nonlinear dynamics theory, which is defined by a set of coupled differential equations, which seeks to explain how the structure of a given system determines its behavior. In this poster we present a system dynamics model for one of the seventeen critical infrastructures, a generic metropolitan potable water system (MPWS). Three are the goals: 1) to gain a better understanding of the MPWS infrastructure; 2) to identify improvements that would help protect MPWS; and 3) to understand the consequences, interdependencies, and impacts, when perturbations occur to the system. The model represents raw water sources, the metropolitan water treatment process, storage of treated water, damage and repair to the MPWS, distribution of water, and end user demand, but does not explicitly represent the detailed network topology of an actual MPWS. The MPWS model is dependent upon inputs from the metropolitan population, energy, telecommunication, public health, and transportation models as well as the national water and transportation models. We present modeling results and sensitivity analysis indicating critical choke points, negative and positive feedback loops in the system. A general scenario is also analyzed where the potable water system responds to a generic disruption.

  11. Entropy as a metric in critical infrastructure situational awareness

    NASA Astrophysics Data System (ADS)

    Klemetti, Markus; Puuska, Samir; Vankka, Jouko

    2016-05-01

    In this paper, we expand our previously proposed critical infrastructure (CI) model with time dependent stochastic elements. In the model, CI is presented as a directed graph where each vertex represents a discrete system and directed edges dependency relations between the systems. Each node is associated with a finite state machine (FSM) which represents the operational status of the system in question. In this paper we associate a probability distribution to each FSM, which accounts for the flow of time and previous confirmed sensor reading. As time passes, the uncertainty about the state of the system increases. By relying on statistical probabilities that have been previously observed or known, it is possible to make predictions about the current state of CI. We present a dependency graph modelling a subset of Finnish electric grid and mobile networks. CI components are modelled using FSM structure augmented by probabilistic elements for entropy-based calculations. The proposed model provides an estimate about the state of the critical infrastructure when only limited information is available, while taking into account the increasing uncertainty created by the passage of time.

  12. Challenges to Seismic Hazard Analysis of Critical Infrastructures

    NASA Astrophysics Data System (ADS)

    Klügel, J.

    2005-12-01

    Based on the background of the review of a large scale probabilistic seismic hazard analysis (PSHA) performed in Switzerland for the sites of Swiss nuclear power plants- the PEGASOS project (2000-2004) - challenges to seismic hazard analysis of critical infrastructures from the perspective of a professional safety analyst are discussed. The PEGASOS study was performed to provide a meaningful input for the update of the plant specific PRAs (Probabilistic Risk Assessment) of Swiss nuclear power plants. Earlier experience had shown that the results of these studies to a large extend are driven by the results of the seismic hazard analysis. The PEGASOS-study was performed in full compliance with the procedures developed by the Senior Seismic Hazard Analysis Committee (SSHAC) of U.S.A (SSHAC, 1997) developed for the treatment of uncertainties by the use of a structured expert elicitation process. The preliminary results derived from the project did show an unexpected amount of uncertainty and were regarded as not suitable for direct application. A detailed review of the SSHAC-methodology revealed a number of critical issues with respect to the treatment of uncertainties and the mathematical models applied, which will be presented in the paper. The most important issued to be discussed are: * The ambiguous solution of PSHA-logic trees * The inadequate mathematical treatment of the results of expert elicitations based on the assumption of bias free expert estimates * The problems associated with the "think model" of the separation of epistemic and aleatory uncertainties * The consequences of the ergodic assumption used to justify the transfer of attenuation equations of other regions to the region of interest. Based on these observations methodological questions with respect to the development of a risk-consistent design basis for new nuclear power plants as required by the U.S. NRC RG 1.165 will be evaluated. As an principal alternative for the development of a

  13. Applications of UAVs for Remote Sensing of Critical Infrastructure

    NASA Technical Reports Server (NTRS)

    Wegener, Steve; Brass, James; Schoenung, Susan

    2003-01-01

    The surveillance of critical facilities and national infrastructure such as waterways, roadways, pipelines and utilities requires advanced technological tools to provide timely, up to date information on structure status and integrity. Unmanned Aerial Vehicles (UAVs) are uniquely suited for these tasks, having large payload and long duration capabilities. UAVs also have the capability to fly dangerous and dull missions, orbiting for 24 hours over a particular area or facility providing around the clock surveillance with no personnel onboard. New UAV platforms and systems are becoming available for commercial use. High altitude platforms are being tested for use in communications, remote sensing, agriculture, forestry and disaster management. New payloads are being built and demonstrated onboard the UAVs in support of these applications. Smaller, lighter, lower power consumption imaging systems are currently being tested over coffee fields to determine yield and over fires to detect fire fronts and hotspots. Communication systems that relay video, meteorological and chemical data via satellite to users on the ground in real-time have also been demonstrated. Interest in this technology for infrastructure characterization and mapping has increased dramatically in the past year. Many of the UAV technological developments required for resource and disaster monitoring are being used for the infrastructure and facility mapping activity. This paper documents the unique contributions from NASA;s Environmental Research Aircraft and Sensor Technology (ERAST) program to these applications. ERAST is a UAV technology development effort by a consortium of private aeronautical companies and NASA. Details of demonstrations of UAV capabilities currently underway are also presented.

  14. Risk assessment for physical and cyber attacks on critical infrastructures.

    SciTech Connect

    Smith, Bryan J.; Sholander, Peter E.; Phelan, James M.; Wyss, Gregory Dane; Varnado, G. Bruce; Depoy, Jennifer Mae

    2005-08-01

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies. Existing risk assessment methodologies consider physical security and cyber security separately. As such, they do not accurately model attacks that involve defeating both physical protection and cyber protection elements (e.g., hackers turning off alarm systems prior to forced entry). This paper presents a risk assessment methodology that accounts for both physical and cyber security. It also preserves the traditional security paradigm of detect, delay and respond, while accounting for the possibility that a facility may be able to recover from or mitigate the results of a successful attack before serious consequences occur. The methodology provides a means for ranking those assets most at risk from malevolent attacks. Because the methodology is automated the analyst can also play 'what if with mitigation measures to gain a better understanding of how to best expend resources towards securing the facilities. It is simple enough to be applied to large infrastructure facilities without developing highly complicated models. Finally, it is applicable to facilities with extensive security as well as those that are less well-protected.

  15. Federated Modelling and Simulation for Critical Infrastructure Protection

    NASA Astrophysics Data System (ADS)

    Rome, Erich; Langeslag, Peter; Usov, Andrij

    Modelling and simulation is an important tool for Critical Infrastructure (CI) dependency analysis, for testing methods for risk reduction, and as well for the evaluation of past failures. Moreover, interaction of such simulations with external threat models, e.g., a river flood model, or economic models enable consequence analysis and thus may assist in what-if decision-making processes. The simulation of complex scenarios involving several different CI sectors requires the usage of heterogeneous federated simulations of CIs. However, common standards for modelling and interoperability of such federated CI simulations are missing. Also, creating the required abstract models from CIs and other data, setting up the individual federate simulators and integrating all subsystems is a time-consuming and complicated task that requires substantial know-how and resources. In this chapter, we outline applications and benefit of federated modelling, simulation and analysis (MS&A) for Critical Infrastructure Protection (CIP). We review the state of the art in federated MS&A for CIP and categorise common approaches and interoperability concepts like central and lateral coupling of simulators. As examples for the latter two concepts, we will present in more detail an interoperability standard from the military domain, HLA, and an approach developed in the DIESIS project. Special emphasis will also be put on describing the problem of synchronising systems with different time models. Also, we will briefly assess the state of transferring MS&A for CIP research results to practical application by comparing the situations in the USA and in Europe.

  16. Controlled Hydrogen Fleet and Infrastructure Demonstration Project

    SciTech Connect

    Dr. Scott Staley

    2010-03-31

    This program was undertaken in response to the US Department of Energy Solicitation DE-PS30-03GO93010, resulting in this Cooperative Agreement with the Ford Motor Company and BP to demonstrate and evaluate hydrogen fuel cell vehicles and required fueling infrastructure. Ford initially placed 18 hydrogen fuel cell vehicles (FCV) in three geographic regions of the US (Sacramento, CA; Orlando, FL; and southeast Michigan). Subsequently, 8 advanced technology vehicles were developed and evaluated by the Ford engineering team in Michigan. BP is Ford's principal partner and co-applicant on this project and provided the hydrogen infrastructure to support the fuel cell vehicles. BP ultimately provided three new fueling stations. The Ford-BP program consists of two overlapping phases. The deliverables of this project, combined with those of other industry consortia, are to be used to provide critical input to hydrogen economy commercialization decisions by 2015. The program's goal is to support industry efforts of the US President's Hydrogen Fuel Initiative in developing a path to a hydrogen economy. This program was designed to seek complete systems solutions to address hydrogen infrastructure and vehicle development, and possible synergies between hydrogen fuel electricity generation and transportation applications. This project, in support of that national goal, was designed to gain real world experience with Hydrogen powered Fuel Cell Vehicles (H2FCV) 'on the road' used in everyday activities, and further, to begin the development of the required supporting H2 infrastructure. Implementation of a new hydrogen vehicle technology is, as expected, complex because of the need for parallel introduction of a viable, available fuel delivery system and sufficient numbers of vehicles to buy fuel to justify expansion of the fueling infrastructure. Viability of the fuel structure means widespread, affordable hydrogen which can return a reasonable profit to the fuel provider, while

  17. Safety issues in cultural heritage management and critical infrastructures management

    NASA Astrophysics Data System (ADS)

    Soldovieri, Francesco; Masini, Nicola; Alvarez de Buergo, Monica; Dumoulin, Jean

    2013-12-01

    This special issue is the fourth of its kind in Journal of Geophysics and Engineering , containing studies and applications of geophysical methodologies and sensing technologies for the knowledge, conservation and security of products of human activity ranging from civil infrastructures to built and cultural heritage. The first discussed the application of novel instrumentation, surface and airborne remote sensing techniques, as well as data processing oriented to both detection and characterization of archaeological buried remains and conservation of cultural heritage (Eppelbaum et al 2010). The second stressed the importance of an integrated and multiscale approach for the study and conservation of architectural, archaeological and artistic heritage, from SAR to GPR to imaging based diagnostic techniques (Masini and Soldovieri 2011). The third enlarged the field of analysis to civil engineering structures and infrastructures, providing an overview of the effectiveness and the limitations of single diagnostic techniques, which can be overcome through the integration of different methods and technologies and/or the use of robust and novel data processing techniques (Masini et al 2012). As a whole, the special issue put in evidence the factors that affect the choice of diagnostic strategy, such as the material, the spatial characteristics of the objects or sites, the value of the objects to be investigated (cultural or not), the aim of the investigation (knowledge, conservation, restoration) and the issues to be addressed (monitoring, decay assessment). In order to complete the overview of the application fields of sensing technologies this issue has been dedicated to monitoring of cultural heritage and critical infrastructures to address safety and security issues. Particular attention has been paid to the data processing methods of different sensing techniques, from infrared thermography through GPR to SAR. Cascini et al (2013) present the effectiveness of a

  18. Economics in Criticality and Restoration of Energy Infrastructures.

    SciTech Connect

    Boyd, Gale A.; Flaim, Silvio J.; Folga, Stephen M.; Gotham, Douglas J.; McLamore, Michael R.; Novak, Mary H.; Roop, Joe M.; Rossmann, Charles G.; Shamsuddin, Shabbir A.; Zeichner, Lee M.; Stamber, Kevin L.

    2005-03-01

    Economists, systems analysts, engineers, regulatory specialists, and other experts were assembled from academia, the national laboratories, and the energy industry to discuss present restoration practices (many have already been defined to the level of operational protocols) in the sectors of the energy infrastructure as well as other infrastructures, to identify whether economics, a discipline concerned with the allocation of scarce resources, is explicitly or implicitly a part of restoration strategies, and if there are novel economic techniques and solution methods that could be used help encourage the restoration of energy services more quickly than present practices or to restore service more efficiently from an economic perspective. AcknowledgementsDevelopment of this work into a coherent product with a useful message has occurred thanks to the thoughtful support of several individuals:Kenneth Friedman, Department of Energy, Office of Energy Assurance, provided the impetus for the work, as well as several suggestions and reminders of direction along the way. Funding from DOE/OEA was critical to the completion of this effort.Arnold Baker, Chief Economist, Sandia National Laboratories, and James Peerenboom, Director, Infrastructure Assurance Center, Argonne National Laboratory, provided valuable contacts that helped to populate the authoring team with the proper mix of economists, engineers, and systems and regulatory specialists to meet the objectives of the work.Several individuals provided valuable review of the document at various stages of completion, and provided suggestions that were valuable to the editing process. This list of reviewers includes Jeffrey Roark, Economist, Tennessee Valley Authority; James R. Dalrymple, Manager of Transmission System Services and Transmission/Power Supply, Tennessee Valley Authority; William Mampre, Vice President, EN Engineering; Kevin Degenstein, EN Engineering; and Patrick Wilgang, Department of Energy, Office of

  19. Onsite and Electric Backup Capabilities at Critical Infrastructure Facilities in the United States

    SciTech Connect

    Phillips, Julia A.; Wallace, Kelly E.; Kudo, Terence Y.; Eto, Joseph H.

    2016-04-01

    The following analysis, conducted by Argonne National Laboratory’s (Argonne’s) Risk and Infrastructure Science Center (RISC), details an analysis of electric power backup of national critical infrastructure as captured through the Department of Homeland Security’s (DHS’s) Enhanced Critical Infrastructure Program (ECIP) Initiative. Between January 1, 2011, and September 2014, 3,174 ECIP facility surveys have been conducted. This study focused first on backup capabilities by infrastructure type and then expanded to infrastructure type by census region.

  20. 78 FR 16861 - The Critical Infrastructure Partnership Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-03-19

    ... mitigation, and infrastructure continuity information. Organizational Structure: CIPAC members are organized... organizations. CIPAC membership is organizational. Multiple individuals may participate in CIPAC activities...

  1. A threat analysis framework as applied to critical infrastructures in the Energy Sector.

    SciTech Connect

    Michalski, John T.; Duggan, David Patrick

    2007-09-01

    The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be used to identify the elements required to quantify threats against critical infrastructure assets and provide a means of distributing actionable threat information to critical infrastructure entities for the protection of infrastructure assets. This document identifies and describes five key elements needed to perform a comprehensive analysis of threat: the identification of an adversary, the development of generic threat profiles, the identification of generic attack paths, the discovery of adversary intent, and the identification of mitigation strategies.

  2. The Impact of Process Capability on Service Reliability for Critical Infrastructure Providers

    ERIC Educational Resources Information Center

    Houston, Clemith J., Jr.

    2013-01-01

    This study investigated the relationship between organizational processes that have been identified as promoting resiliency and their impact on service reliability within the scope of critical infrastructure providers. The importance of critical infrastructure to the nation is evident from the body of research and is supported by instances where…

  3. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Safeguarding of Protected Critical Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.7 Safeguarding of Protected...

  4. Identifying Cybersecurity Risks to Critical Infrastructure Act of 2012

    THOMAS, 112th Congress

    Rep. Clarke, Yvette D. [D-NY-11

    2012-07-26

    08/15/2012 Referred to the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  5. Advanced simulation for analysis of critical infrastructure : abstract cascades, the electric power grid, and Fedwire.

    SciTech Connect

    Glass, Robert John, Jr.; Stamber, Kevin Louis; Beyeler, Walter Eugene

    2004-08-01

    Critical Infrastructures are formed by a large number of components that interact within complex networks. As a rule, infrastructures contain strong feedbacks either explicitly through the action of hardware/software control, or implicitly through the action/reaction of people. Individual infrastructures influence others and grow, adapt, and thus evolve in response to their multifaceted physical, economic, cultural, and political environments. Simply put, critical infrastructures are complex adaptive systems. In the Advanced Modeling and Techniques Investigations (AMTI) subgroup of the National Infrastructure Simulation and Analysis Center (NISAC), we are studying infrastructures as complex adaptive systems. In one of AMTI's efforts, we are focusing on cascading failure as can occur with devastating results within and between infrastructures. Over the past year we have synthesized and extended the large variety of abstract cascade models developed in the field of complexity science and have started to apply them to specific infrastructures that might experience cascading failure. In this report we introduce our comprehensive model, Polynet, which simulates cascading failure over a wide range of network topologies, interaction rules, and adaptive responses as well as multiple interacting and growing networks. We first demonstrate Polynet for the classical Bac, Tang, and Wiesenfeld or BTW sand-pile in several network topologies. We then apply Polynet to two very different critical infrastructures: the high voltage electric power transmission system which relays electricity from generators to groups of distribution-level consumers, and Fedwire which is a Federal Reserve service for sending large-value payments between banks and other large financial institutions. For these two applications, we tailor interaction rules to represent appropriate unit behavior and consider the influence of random transactions within two stylized networks: a regular homogeneous array and a

  6. Cyber-Physical Systems for Critical Infrastructure Protection: A Wireless Sensor Network Application for Electric Grid Monitoring

    NASA Astrophysics Data System (ADS)

    Saint, Martin

    Critical infrastructure includes resources which are essential to the function of society. Despite an increased focus on protecting U.S. critical infrastructure, some sectors including the electric grid are more vulnerable than ever. Existing critical infrastructure protection (CIP) regulations and the monitoring and control systems used to achieve them have not met performance expectations. This indicates that the next generation of grid control should explore new architectures. This thesis explores the question of whether a cyber-physical system in the form of wireless sensor networks can be used to improve CIP. We examine efforts by others to design a wireless sensor module for monitoring transmission and distribution lines, and note that this work includes little information about the performance of the communications subsystem. Laboratory testing of throughput and reliability for one example communication network are undertaken here, along with consideration of the short message service as one alternative for backhauling sensor data.

  7. Developing Your Evaluation Plans: A Critical Component of Public Health Program Infrastructure.

    PubMed

    Lavinghouze, S Rene; Snyder, Kimberly

    A program's infrastructure is often cited as critical to public health success. The Component Model of Infrastructure (CMI) identifies evaluation as essential under the core component of engaged data. An evaluation plan is a written document that describes how to monitor and evaluate a program, as well as how to use evaluation results for program improvement and decision making. The evaluation plan clarifies how to describe what the program did, how it worked, and why outcomes matter. We use the Centers for Disease Control and Prevention's (CDC) "Framework for Program Evaluation in Public Health" as a guide for developing an evaluation plan. Just as using a roadmap facilitates progress on a long journey, a well-written evaluation plan can clarify the direction your evaluation takes and facilitate achievement of the evaluation's objectives.

  8. Recovery from chemical, biological, and radiological incidents. Critical infrastructure and economic impact considerations

    SciTech Connect

    Franco, David Oliver; Yang, Lynn I.; Hammer, Ann E.

    2012-06-01

    To restore regional lifeline services and economic activity as quickly as possible after a chemical, biological or radiological incident, emergency planners and managers will need to prioritize critical infrastructure across many sectors for restoration. In parallel, state and local governments will need to identify and implement measures to promote reoccupation and economy recovery in the region. This document provides guidance on predisaster planning for two of the National Disaster Recovery Framework Recovery Support Functions: Infrastructure Systems and Economic Recovery. It identifies key considerations for infrastructure restoration, outlines a process for prioritizing critical infrastructure for restoration, and identifies critical considerations for promoting regional economic recovery following a widearea disaster. Its goal is to equip members of the emergency preparedness community to systematically prioritize critical infrastructure for restoration, and to develop effective economic recovery plans in preparation for a widearea CBR disaster.

  9. The impact of natural hazard on critical infrastructure systems: definition of an ontology

    NASA Astrophysics Data System (ADS)

    Dimauro, Carmelo; Bouchon, Sara; Frattini, Paolo; Giusto, Claudia

    2013-04-01

    According to the Council of the European Union Directive (2008), 'critical infrastructure' means an asset, system or part thereof which is essential for the maintenance of vital societal functions, health, safety, security, economic or social well-being of people, and the disruption or destruction of which would have a significant impact as a result of the failure to maintain those functions. Critical infrastructure networks are exposed to natural events, such as floods, storms, landslides, earthquakes, etc. Recent natural disasters show that socio-economic consequences can be very much aggravated by the impact on these infrastructures. Though, there is still a lack of a recognized approach or methodology to assess the vulnerability of critical infrastructure assets against natural threats. The difficulty to define such an approach is increased by the need to consider a very high number of natural events, which differ in nature, magnitude and probability, as well as the need to assess the vulnerability of a high variety of infrastructure assets (e.g. bridges, roads, tunnels, pipelines, etc.) To meet this challenge, the objective of the THREVI2 EU-CIPS project is to create a database linking the relationships between natural hazards and critical infrastructure assets. The query of the database will allow the end-users (critical infrastructure protection authorities and operators) to identify the relevant scenarios according to the own priorities and criteria. The database builds on an ontology optimized for the assessment of the impact of threats on critical infrastructures. The ontology aims at capturing the existing knowledge on natural hazards, critical infrastructures assets and their related vulnerabilities. Natural phenomena that can threaten critical infrastructures are classified as "events", and organized in a genetic-oriented hierarchy. The main attributes associated to each event are the probability, the magnitude and the "modus". The modus refers to the

  10. 'Known Secure Sensor Measurements' for Critical Infrastructure Systems: Detecting Falsification of System State

    SciTech Connect

    Miles McQueen; Annarita Giani

    2011-09-01

    This paper describes a first investigation on a low cost and low false alarm, reliable mechanism for detecting manipulation of critical physical processes and falsification of system state. We call this novel mechanism Known Secure Sensor Measurements (KSSM). The method moves beyond analysis of network traffic and host based state information, in fact it uses physical measurements of the process being controlled to detect falsification of state. KSSM is intended to be incorporated into the design of new, resilient, cost effective critical infrastructure control systems. It can also be included in incremental upgrades of already in- stalled systems for enhanced resilience. KSSM is based on known secure physical measurements for assessing the likelihood of an attack and will demonstrate a practical approach to creating, transmitting, and using the known secure measurements for detection.

  11. No Dark Corners: Defending Against Insider Threats to Critical Infrastructure

    DTIC Science & Technology

    2009-09-01

    to public view, such as transmission lines and aqueducts , which may be visible or accessible by members of the public. Why has this not happened...infrastructure may be impossible to secure in some cases, as in transmission lines, aqueducts , and fiber-optic cables stretching across broad expanses of

  12. CP corrosion control of municipal infrastructure

    SciTech Connect

    Gummow, R.A.

    2000-02-01

    Since its introduction in 1824, cathodic protection (CP) technology has developed to become a fundamental tool for preventing corrosion on municipal infrastructure. Potable water storage tanks and piping, prestressed concrete cylinder pipe, reinforced concrete structures, bridges, parking structures, underground fuel tanks, and effluent treatment clarifiers now benefit from this technology.

  13. Controlled Hydrogen Fleet and Infrastructure Analysis (Presentation)

    SciTech Connect

    Wipke, K.; Sprik, S.; Kurtz, J.; Ramsden, T.; Ainscough, C.; Saur, G.

    2012-05-01

    This is a presentation about the Fuel Cell Electric Vehicle Learning Demo, a 7-year project and the largest single FCEV and infrastructure demonstration in the world to date. Information such as its approach, technical accomplishments and progress; collaborations and future work are discussed.

  14. Design and Implementation of a Computation Server for Optimization with Application to the Analysis of Critical Infrastructure

    DTIC Science & Technology

    2013-06-01

    confidentiality, integrity, and availability ( Salehi et al., 2007). The most important tactic to be used at the architectural level will be improving...analyzing critical infrastructure interdependencies. IEEE Control Systems, 21(6):11–25. Salehi , P., Jaferian, P., and Barforoush, A. (2007). Modeling

  15. Critical Infrastructure for Ocean Research and Societal Needs in 2030

    NASA Astrophysics Data System (ADS)

    Glickson, D.; Barron, E. J.; Fine, R. A.; Bellingham, J. G.; Boss, E.; Boyle, E. A.; Edwards, M.; Johnson, K. S.; Kelley, D. S.; Kite-Powell, H.; Ramberg, S. E.; Rudnick, D. L.; Schofield, O.; Tamburri, M.; Wiebe, P. H.; Wright, D. J.; Committee on an Ocean Infrastructure StrategyU. S. Ocean Research in 2030

    2011-12-01

    At the request of the Subcommittee on Ocean Science and Technology, an expert committee was convened by the National Research Council to identify major research questions anticipated to be at the forefront of ocean science in 2030, define categories of infrastructure that should be included in planning, provide advice on criteria and processes that could be used to set priorities, and recommend ways to maximize the value of investments in ocean infrastructure. The committee identified 32 future ocean research questions in four themes: enabling stewardship of the environment, protecting life and property, promoting economic vitality, and increasing fundamental scientific understanding. Many of the questions reflect challenging, multidisciplinary science questions that are clearly relevant now and are likely to take decades to solve. U.S. ocean research will require a growing suite of ocean infrastructure for a range of activities, such as high quality, sustained time series observations and autonomous monitoring at a broad range of spatial and temporal scales. A coordinated national plan for making future strategic investments will be needed and should be based upon known priorities and reviewed every 5-10 years. After assessing trends in ocean infrastructure and technology development, the committee recommended implementing a comprehensive, long-term research fleet plan in order to retain access to the sea; continuing U.S. capability to access fully and partially ice-covered seas; supporting innovation, particularly the development of biogeochemical sensors; enhancing computing and modeling capacity and capability; establishing broadly accessible data management facilities; and increasing interdisciplinary education and promoting a technically-skilled workforce. They also recommended that development, maintenance, or replacement of ocean research infrastructure assets should be prioritized in terms of societal benefit. Particular consideration should be given to

  16. Critical Infrastructure for Ocean Research and Societal Needs in 2030

    SciTech Connect

    National Research Council

    2011-04-22

    The United States has jurisdiction over 3.4 million square miles of ocean expanse greater than the land area of all fifty states combined. This vast marine area offers researchers opportunities to investigate the ocean's role in an integrated Earth system, but also presents challenges to society, including damaging tsunamis and hurricanes, industrial accidents, and outbreaks of waterborne diseases. The 2010 Gulf of Mexico Deepwater Horizon oil spill and 2011 Japanese earthquake and tsunami are vivid reminders that a broad range of infrastructure is needed to advance our still-incomplete understanding of the ocean. The National Research Council (NRC)'s Ocean Studies Board was asked by the National Science and Technology Council's Subcommittee on Ocean Science and Technology, comprised of 25 U.S. government agencies, to examine infrastructure needs for ocean research in the year 2030. This request reflects concern, among a myriad of marine issues, over the present state of aging and obsolete infrastructure, insufficient capacity, growing technological gaps, and declining national leadership in marine technological development; issues brought to the nation's attention in 2004 by the U.S. Commission on Ocean Policy. A 15-member committee of experts identified four themes that encompass 32 future ocean research questions enabling stewardship of the environment, protecting life and property, promoting economic vitality, and increasing fundamental scientific understanding. Many of the questions in the report (e.g., sea level rise, sustainable fisheries, the global water cycle) reflect challenging, multidisciplinary science questions that are clearly relevant today, and are likely to take decades of effort to solve. As such, U.S. ocean research will require a growing suite of ocean infrastructure for a range of activities, such as high quality, sustained time series observations or autonomous monitoring at a broad range of spatial and temporal scales. Consequently, a

  17. The ISTIMES project: a new integrated system for monitoring critical transport infrastructures interested by natural hazards

    NASA Astrophysics Data System (ADS)

    Proto, Monica; Massimo, Bavusi; Francesco, Soldovieri

    2010-05-01

    measurements. The integration of electromagnetic technologies with new ICT information and telecommunications systems enables remotely controlled monitoring and surveillance and real time data imaging of the critical transport infrastructures. Thus, the proposal will concern also with the development of tools for handling, analysing and processing large data volume (Information Fusion) and then providing information and performing behaviour prediction in a quick, easy and intuitive way (Situation Awareness). The proposal is based on several independent non-invasive imaging technologies based on electromagnetic sensing. Sensor cross validation, synergy and new data fusion and correlation schemes will permit a multi-method, multi-resolution and multi-scale electromagnetic detection and monitoring of surface and subsurface changes of the infrastructure. According to GMES and European Spatial Data Infrastructure (ESDI) initiatives, the system will adopt open architectures and will make efforts to achieve full interoperability. The system will be tested on two very challenging test beds such as: a highway-bridge and a railway tunnel. The system will be based on clear end-user requirements, coming from representative end-users and technological choices will be based on a long term cost-benefit analysis. Then, a dissemination plan was included into the project to encourage a wide range of public institutions and private companies to evaluate and adopt our approach for real-time control and distributed monitoring also in the more general framework of critical and civil infrastructure management and protection. Finally, an exploitation plan will develop for the commercialization of any derived technology, software, or monitoring concepts. ISTIMES project is carried out by an international partnership formed by nine partners coming from seven countries: Tecnologie per le Osservazioni della Terra (TeRN), Elsag Datamat (ED) and Dipartimento della Protezione Civile (DPC) from Italy

  18. An Ontology-Based Approach to Blind Spot Revelation in Critical Infrastructure Protection Planning

    NASA Astrophysics Data System (ADS)

    Blackwell, Joshua; Tolone, William J.; Lee, Seok-Won; Xiang, Wei-Ning; Marsh, Lydia

    One widely perceived yet poorly understood phenomenon in the practice of critical infrastructure protection is that of blind spots. These are certain aspects of the interrelationships among different critical infrastructure systems (CI systems) that could trigger catastrophe across CI systems but are concealed from planners, and discovered only in the aftermath of a crisis. In this paper, we discuss the sources of blind spots, and explore the feasibility of various techniques to help reveal blind spots.

  19. Arid Green Infrastructure for Water Control and Conservation ...

    EPA Pesticide Factsheets

    Green infrastructure is an approach to managing wet weather flows using systems and practices that mimic natural processes. It is designed to manage stormwater as close to its source as possible and protect the quality of receiving waters. Although most green infrastructure practices were first developed in temperate climates, green infrastructure also can be a cost-effective approach to stormwater management and water conservation in arid and semi-arid regions, such as those found in the western and southwestern United States. Green infrastructure practices can be applied at the site, neighborhood and watershed scales. In addition to water management and conservation, implementing green infrastructure confers many social and economic benefits and can address issues of environmental justice. The U.S. Environmental Protection Agency (EPA) commissioned a literature review to identify the state-of-the science practices dealing with water control and conservation in arid and semi-arid regions, with emphasis on these regions in the United States. The search focused on stormwater control measures or practices that slow, capture, treat, infiltrate and/or store runoff at its source (i.e., green infrastructure). The material in Chapters 1 through 3 provides background to EPA’s current activities related to the application of green infrastructure practices in arid and semi-arid regions. An introduction to the topic of green infrastructure in arid and semi-arid regions i

  20. Approaches for assessment of vulnerability of critical infrastructures to weather-related hazards

    NASA Astrophysics Data System (ADS)

    Eidsvig, Unni; Uzielli, Marco; Vidar Vangelsten, Bjørn

    2016-04-01

    Critical infrastructures are essential components for the modern society to maintain its function, and malfunctioning of one of the critical infrastructure systems may have far-reaching consequences. Climate changes may lead to increase in frequency and intensity of weather-related hazards, creating challenges for the infrastructures. This paper outlines approaches to assess vulnerability posed by weather-related hazards to infrastructures. The approaches assess factors that affect the probability of a malfunctioning of the infrastructure should a weather-related threat occur, as well factors that affect the societal consequences of the infrastructure malfunctioning. Even if vulnerability factors are normally very infrastructure specific and hazard dependent, generic factors could be defined and analyzed. For the vulnerability and resilience of the infrastructure, such factors include e.g. robustness, buffer capacity, protection, quality, age, adaptability and transparency. For the vulnerability of the society in relation to the infrastructure, such factors include e.g. redundancy, substitutes and cascading effects. A semi-quantitative, indicator-based approach is proposed, providing schemes for ranking of the most important vulnerability indicators relevant for weather-related hazards on a relative scale. The application of the indicators in a semi-quantitative risk assessment is also demonstrated. In addition, a quantitative vulnerability model is proposed in terms of vulnerability (representing degree of loss) as a function of intensity, which is adaptable to different types of degree of loss (e.g. fraction of infrastructure users that lose their service, fraction of repair costs to full reconstruction costs). The vulnerability model can be calibrated with empirical data using deterministic calibration or a variety of probabilistic calibration approaches to account for the uncertainties within the model. The research leading to these results has received funding

  1. Evaluation of Critical Infrastructure in the Event of Earthquake: A Case Study of Delhi

    NASA Astrophysics Data System (ADS)

    prasad, Suraj

    2016-04-01

    With changing paradigms of disaster preparedness, the safety and security of critical infrastructure in the event of a geo-hazard has become increasingly important. In a developing and densely populated country like India, which is vulnerable to many different geo-hazards, a lack of clear policy directive regarding safety of such infrastructure could be especially damaging both in terms of life and property. The problem is most acute in India's mega cities, where inefficient infrastructure means that facilities like transportation, communication, and electricity generation are obsolete and vulnerable to sudden disruptions. The present study takes the case of the National Capital Territory of Delhi and attempts to examine the critical infrastructures of the city in the event of an earthquake. Delhi lies in a very active seismic zone with various faults in and around the city. The Government of India has classified Delhi in Zone 4 (High Risk Zone) based on past and expected seismic activities in the Indo-Gangetic Plains. With a population of over 20 Million in the Urban Agglomeration of Delhi, any major earthquake in an already overstretched infrastructure could have a devastating impact. This study will test the critical infrastructures of the city in terms of their disaster preparedness and suggest ways and measures to increase the same. Keywords: Geo-hazards, Critical Infrastructure, vulnerable, Earthquakes, Delhi

  2. Controlled Hydrogen Fleet and Infrastructure Demonstration and Validation Project

    SciTech Connect

    Stottler, Gary

    2012-02-08

    General Motors, LLC and energy partner Shell Hydrogen, LLC, deployed a system of hydrogen fuel cell electric vehicles integrated with a hydrogen fueling station infrastructure to operate under real world conditions as part of the U.S. Department of Energy's Controlled Hydrogen Fleet and Infrastructure Validation and Demonstration Project. This technical report documents the performance and describes the learnings from progressive generations of vehicle fuel cell system technology and multiple approaches to hydrogen generation and delivery for vehicle fueling.

  3. 77 FR 24594 - Version 4 Critical Infrastructure Protection Reliability Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-04-25

    ... in criterion 1.1 lacks technical justification.\\29\\ \\29\\ NV Energy Comments at 3-4. 29. ISO/RTO... transmission planners by requiring them to designate facilities as Critical Assets.\\31\\ ISO/RTO Council and... that owns or operates a facility identified under these criteria.\\32\\ \\30\\ ISO/RTO Council at 6....

  4. Vulnerability of Concentrated Critical Infrastructure: Background and Policy Options

    DTIC Science & Technology

    2005-12-21

    5 Earthquakes and Tsunamis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Infectious Disease ...close the ports of Long Beach and Los Angeles for two months and cause $60 billion in economic losses.22 Infectious Disease . Epidemics and pandemics...of infectious diseases such as Severe Acute Respiratory Syndrome (SARS) and avian influenza (bird flu) have the potential to disrupt critical

  5. A database of volcanic hazards and their physical impacts to critical infrastructure

    NASA Astrophysics Data System (ADS)

    Wilson, Grant; Wilson, Thomas; Deligne, Natalia

    2013-04-01

    Approximately 10% of the world's population lives within 100 km of historically active volcanoes. Consequently, considerable critical infrastructure is at risk of being affected by volcanic eruptions, where critical infrastructure includes: electricity and wastewater networks; water supply systems; transport routes; communications; and buildings. Appropriate risk management strategies are required to minimise the risk to infrastructure, which necessitates detailed understanding of both volcanic hazards and infrastructure parameters and vulnerabilities. To address this, we are developing a database of the physical impacts and vulnerability of critical infrastructure observed during/following historic eruptions, placed in the context of event-specific volcanic hazard and infrastructure parameters. Our database considers: volcanic hazard parameters for each case study eruption (tephra thickness, dynamic pressure of PDCs, etc.); inventory of infrastructure elements present within the study area (geographical extent, age, etc.); the type and number of impacts and disruption caused to particular infrastructure sectors; and the quantified assessment of the vulnerability of built environments. Data have been compiled from a wide range of literature, focussing in particular on impact assessment studies which document in detail the damage sustained by critical infrastructure during a given eruption. We are creating a new vulnerability ranking to quantify the vulnerability of built environments affected by volcanic eruptions. The ranking is based upon a range of physical impacts and service disruption criteria, and is assigned to each case study. This ranking will permit comparison of vulnerabilities between case studies as well as indicate expected vulnerability during future eruptions. We are also developing hazard intensity thresholds indicating when specific damage states are expected for different critical infrastructure sectors. Finally, we have developed a data quality

  6. 78 FR 72755 - Version 5 Critical Infrastructure Protection Reliability Standards

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-03

    ...-approved CIP Reliability Standards. The CIP version 5 Standards adopt new cyber security controls and... Standards adopt new cyber security controls and extend the scope of the systems that are protected by the... category. The CIP version 5 Standards also include 12 requirements with new cyber security controls,...

  7. Critical Infrastructure Protection Program: Strategy for 2009 and Beyond

    DTIC Science & Technology

    2009-05-01

    operationally focused CIP Program Risk Management Process Model as depicted in Figure 1. This approach starts with a focus on mission and the...budgeting, and execution system (PPBES); and Figure 1: Mission assurance risk Management Process Model Figure 2: risk Decision Process Model 2...and protect both physical and cyber assets deemed d. critical to the DON using the Mission Assurance Risk Process Model ; Periodically review and

  8. Development of Information Security-Focused Incident Prevention Measures for Critical Information Infrastructure in Japan

    NASA Astrophysics Data System (ADS)

    Kobayashi, Hideaki; Watanabe, Kenji; Watanabe, Takahito; Nagayasu, Yukinobu

    In recent years, the dilemma of cyber attacks by malicious third parties targeting security vulnerabilities in information and communication systems has emerged, resulting in security incidents. This situation suggests that the establishment of proactive efforts and recurrence prevention measures are becoming imperative, especially in critical infrastructure sectors.This paper provides an analysis of 58 security incident cases, which occurred in critical infrastructures worldwide and were published in media. The purpose of the analysis is to conclude to a valid list of recurrence prevention measures that constitute good practices.

  9. Systematic risk assessment methodology for critical infrastructure elements - Oil and Gas subsectors

    NASA Astrophysics Data System (ADS)

    Gheorghiu, A.-D.; Ozunu, A.

    2012-04-01

    The concern for the protection of critical infrastructure has been rapidly growing in the last few years in Europe. The level of knowledge and preparedness in this field is beginning to develop in a lawfully organized manner, for the identification and designation of critical infrastructure elements of national and European interest. Oil and gas production, refining, treatment, storage and transmission by pipelines facilities, are considered European critical infrastructure sectors, as per Annex I of the Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. Besides identifying European and national critical infrastructure elements, member states also need to perform a risk analysis for these infrastructure items, as stated in Annex II of the above mentioned Directive. In the field of risk assessment, there are a series of acknowledged and successfully used methods in the world, but not all hazard identification and assessment methods and techniques are suitable for a given site, situation, or type of hazard. As Theoharidou, M. et al. noted (Theoharidou, M., P. Kotzanikolaou, and D. Gritzalis 2009. Risk-Based Criticality Analysis. In Critical Infrastructure Protection III. Proceedings. Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Hanover, New Hampshire, USA, March 23-25, 2009: revised selected papers, edited by C. Palmer and S. Shenoi, 35-49. Berlin: Springer.), despite the wealth of knowledge already created, there is a need for simple, feasible, and standardized criticality analyses. The proposed systematic risk assessment methodology includes three basic steps: the first step (preliminary analysis) includes the identification of hazards (including possible natural hazards) for each installation/section within a given site, followed by a criterial analysis and then a detailed analysis step

  10. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

    SciTech Connect

    McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

    2009-03-26

    Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

  11. Critical node analysis (CNA) of electrical infrastructure networks

    NASA Astrophysics Data System (ADS)

    Venkateswaran, Venkat; Bennette, Walter

    2016-05-01

    This work addresses the problem of identifying the set of nodes in a power network critical to system operation. Formally, the CNA problem is the problem of identifying a minimum cardinality set of nodes to target in a power network in order to reduce throughput by a given factor. Since the defender may reroute flows in an attempt to restore throughput, the attack must anticipate and defeat this possibility. We develop here an algorithm to solve this problem. In our approach we model the problem as a bi-level optimization problem where the master problem attempts different attack combinations and the sub-problem responds with the best routing. The optimization problems that result from such a framework are mixed integer programs (MIPs), which we solve in our implementation using IBM CPLEX. The algorithm has been tested on several benchmark networks and appears to perform well. We have also developed variants that can be used for determining optimal restoration configuration post damage on large networks (4000 nodes, 8000 links) and for modeling propagation of failures after the initial attack. We report on computational experiments with these variants as well.

  12. Critical Infrastructure Vulnerability to Spatially Localized Failures with Applications to Chinese Railway System.

    PubMed

    Ouyang, Min; Tian, Hui; Wang, Zhenghua; Hong, Liu; Mao, Zijun

    2017-01-17

    This article studies a general type of initiating events in critical infrastructures, called spatially localized failures (SLFs), which are defined as the failure of a set of infrastructure components distributed in a spatially localized area due to damage sustained, while other components outside the area do not directly fail. These failures can be regarded as a special type of intentional attack, such as bomb or explosive assault, or a generalized modeling of the impact of localized natural hazards on large-scale systems. This article introduces three SLFs models: node centered SLFs, district-based SLFs, and circle-shaped SLFs, and proposes a SLFs-induced vulnerability analysis method from three aspects: identification of critical locations, comparisons of infrastructure vulnerability to random failures, topologically localized failures and SLFs, and quantification of infrastructure information value. The proposed SLFs-induced vulnerability analysis method is finally applied to the Chinese railway system and can be also easily adapted to analyze other critical infrastructures for valuable protection suggestions.

  13. Volcanic hazards at distant critical infrastructure: A method for bespoke, multi-disciplinary assessment

    NASA Astrophysics Data System (ADS)

    Odbert, H. M.; Aspinall, W.; Phillips, J.; Jenkins, S.; Wilson, T. M.; Scourse, E.; Sheldrake, T.; Tucker, P.; Nakeshree, K.; Bernardara, P.; Fish, K.

    2015-12-01

    Societies rely on critical services such as power, water, transport networks and manufacturing. Infrastructure may be sited to minimise exposure to natural hazards but not all can be avoided. The probability of long-range transport of a volcanic plume to a site is comparable to other external hazards that must be considered to satisfy safety assessments. Recent advances in numerical models of plume dispersion and stochastic modelling provide a formalized and transparent approach to probabilistic assessment of hazard distribution. To understand the risks to critical infrastructure far from volcanic sources, it is necessary to quantify their vulnerability to different hazard stressors. However, infrastructure assets (e.g. power plantsand operational facilities) are typically complex systems in themselves, with interdependent components that may differ in susceptibility to hazard impact. Usually, such complexity means that risk either cannot be estimated formally or that unsatisfactory simplifying assumptions are prerequisite to building a tractable risk model. We present a new approach to quantifying risk by bridging expertise of physical hazard modellers and infrastructure engineers. We use a joint expert judgment approach to determine hazard model inputs and constrain associated uncertainties. Model outputs are chosen on the basis of engineering or operational concerns. The procedure facilitates an interface between physical scientists, with expertise in volcanic hazards, and infrastructure engineers, with insight into vulnerability to hazards. The result is a joined-up approach to estimating risk from low-probability hazards to critical infrastructure. We describe our methodology and show preliminary results for vulnerability to volcanic hazards at a typical UK industrial facility. We discuss our findings in the context of developing bespoke assessment of hazards from distant sources in collaboration with key infrastructure stakeholders.

  14. Monitoring, control and diagnostics using RFID infrastructure.

    PubMed

    Pleteršek, Anton; Sok, Miha; Trontelj, Janez

    2012-12-01

    This work demonstrates the developed application for disinfection control by the sensing of chemical agents. The objective was to develop an Automatic Disinfectant Tracker (ADT) that would verify the disinfection of the hands of nurses, doctors, staff, patients, and visitors in hospitals within a required time frame. We have successfully investigated the development of hand disinfection control mechanisms and demonstrated two approaches, both based on the wireless Ultra-High-Frequency-based Radio-Frequency Identification (UHF-RFID) technology. The 100 % efficacy of detecting propanol and ethanol concentration was achieved by using the static disinfectant control (SDC-ADT) method. The time domain response provides an accurate determination of their performance in practice simply by measuring the applied disinfectant concentration and the duration of application. The present paper resulted from the measurements of a capacitive chemical sensor fabricated in the Laboratory for Microelectronics, (LMFE) and on measurements, based on a commercially available resistive type of sensor. A graphic user interface (IDS-GUI) is designed to successfully set the logger parameters and display the results.

  15. Report of the Defense Science Board Task Force on Critical Homeland Infrastructure Protection

    DTIC Science & Technology

    2007-01-01

    disaster (e.g., heavy construction equipment, cranes , ships, barrages, high tech equipment, laboratory analysis locations, medical specialists, etc...to Defense Critical Infrastructure Dr. Richard Gault DIA Defense Program Officer for Mission Assurance (DPO-MA) Overview Mr. John Keenan DPO-MA The

  16. 78 FR 39712 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-02

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF COMMERCE International Trade Administration Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi..., until the maximum of 20 participants is selected, all interested U.S. IT and cyber-security firms...

  17. PROTECTING THE NATION'S CRITICAL INFRASTRUCTURE: THE VULNERABILITY OF U.S. WATER SUPPLY SYSTEMS

    EPA Science Inventory

    Terrorism in the United States was not considered a serious threat until the second half of the 1990s. However, recent attacks both at home and abroad have forced government planners to consider the possibility that critical elements of the U.S. infrastructure might in fact be vu...

  18. What’s My Lane? Identifying the State Government Role in Critical Infrastructure Protection

    DTIC Science & Technology

    2012-03-01

    2006. Brown, Kathi Ann . Critical Path: A Brief History of Critical Infrastructure Protection in the United States. Arlington, VA: George Mason...E. Auerswald, et al., Cambridge: Cambridge University Press, 2006. Gerencser, Mark, Reginald Van Lee , Fernando Napolitano, and Christopher Kelly...Abroad, Annex A- The Downing Investigation Report.” 1996. Retrieved February 8, 2008, from www.fas.org/irp/threat/downing/report.pdf. Salem, Anita

  19. Ensemble visual analysis architecture with high mobility for large-scale critical infrastructure simulations

    NASA Astrophysics Data System (ADS)

    Eaglin, Todd; Wang, Xiaoyu; Ribarsky, William; Tolone, William

    2015-01-01

    Nowhere is the need to understand large heterogeneous datasets more important than in disaster monitoring and emergency response, where critical decisions have to be made in a timely fashion and the discovery of important events requires an understanding of a collection of complex simulations. To gain enough insights for actionable knowledge, the development of models and analysis of modeling results usually requires that models be run many times so that all possibilities can be covered. Central to the goal of our research is, therefore, the use of ensemble visualization of a large scale simulation space to appropriately aid decision makers in reasoning about infrastructure behaviors and vulnerabilities in support of critical infrastructure analysis. This requires the bringing together of computing-driven simulation results with the human decision-making process via interactive visual analysis. We have developed a general critical infrastructure simulation and analysis system for situationally aware emergency response during natural disasters. Our system demonstrates a scalable visual analytics infrastructure with mobile interface for analysis, visualization and interaction with large-scale simulation results in order to better understand their inherent structure and predictive capabilities. To generalize the mobile aspect, we introduce mobility as a design consideration for the system. The utility and efficacy of this research has been evaluated by domain practitioners and disaster response managers.

  20. Public Health Emergency Operations Center - A critical component of mass gatherings management infrastructure.

    PubMed

    Elachola, Habidah; Al-Tawfiq, Jaffar A; Turkestani, Abdulhafiz; Memish, Ziad A

    2016-08-31

    Mass gatherings (MG) are characterized by the influx of large numbers of people with the need to have infrastructural changes to support these gatherings. Thus, Public Health Emergency Operations Center (PHEOC) is critical management infrastructure for both the delivery of public health functions and for mounting adequate response during emergencies. The recognition of the importance of PHEOC at the leadership and political level is foundational for the success of any public health intervention during MG. The ability of the PHEOC to effectively function depends on appropriate design and infrastructure, staffing and command structure, and plans and procedures developed prior to the event. Multi-ministerial or jurisdictional coordination will be required and PHEOC should be positioned with such authorities. This paper outlines the essential concepts, elements, design, and operational aspects of PHEOC during MG.

  1. Unraveling Structural Infrasound: understanding the science for persistent remote monitoring of critical infrastructure (Invited)

    NASA Astrophysics Data System (ADS)

    McKenna, S. M.; Diaz-Alvarez, H.; McComas, S.; Costley, D.; Whitlow, R. D.; Jordan, A. M.; Taylor, O.

    2013-12-01

    In 2006, the Engineer Research and Development Center (ERDC) began a program designed to meet the capability gap associated with remote assessment of critical infrastructure. This program addresses issues arising from the use of geophysical techniques to solve engineering problems through persistent monitoring of critical infrastructure using infrasound. In the original 2006-2009 study of a railroad bridge in Ft. Leonard Wood, MO, the fundamental modes of motion of the structure were detected at up to 30 km away, with atmospheric excitation deemed to be the source driver. Follow-on research focused on the mechanically driven modes excited by traffic, with directional acoustic emanations. The success of the Ft. Wood ambient excitation study resulted in several subsequent programs to push the boundaries of this new technique for standoff assessment, discussed herein. Detection of scour and river system health monitoring are serious problems for monitoring civil infrastructure, from both civilian and military perspectives. Knowledge of overall system behavior over time is crucial for assessment of bridge foundations and barge navigation. This research focuses on the same steel-truss bridge from the Ft. Wood study, and analyzes 3D and 2D substructure models coupled with the superstructure reaction loads to assess the modal deformations within the infrasound bandwidth and the correlation to scour of embedment material. The Urban infrasound program is infrasound modeling, data analysis, and sensor research leading to the detection, classification and localization of threat activities in complex propagation environments. Three seismo-acoustic arrays were deployed on rooftops across the Southern Methodist University campus in Dallas, Texas, to characterize the urban infrasound environment. Structural sources within 15 km of the arrays have been identified through signal processing and confirmed through acoustical models. Infrasound is also being studied as a means of

  2. Multi-Model Framework for Investigating Potential Climate Change Impacts on Interdependent Critical Infrastructure

    NASA Astrophysics Data System (ADS)

    Sylvester, L.; Allen, M. R.; Wilbanks, T. J.

    2015-12-01

    Built infrastructure consists of a series of interconnected networks with many coupled interdependencies. Traditionally, risk and vulnerability assessments are conducted one infrastructure at a time, considering only direct impacts on built and planned assets. However, extreme events caused by climate change affect local communities in different respects and stress vital interconnected infrastructures in complex ways that cannot be captured with traditional risk assessment methodologies. We employ a combination of high-performance computing, geographical information science, and imaging methods to examine the impacts of climate change on infrastructure for cities in two different climate regions: Chicago, Illinois in the Midwest and Portland, Maine (and Casco Bay area) in the Northeast. In Illinois, we evaluate effects of changes in regional temperature and precipitation, informed by an extreme climate change projection, population growth and migration, water supply, and technological development, on electricity generation and consumption. In Maine, we determine the aggregate effects of sea level rise, changing precipitation patterns, and population shifts on the depth of the freshwater-saltwater interface in coastal aquifers and the implications of these changes for water supply in general. The purpose of these efforts is to develop a multi-model framework for investigating potential climate change impacts on interdependent critical infrastructure assessing both vulnerabilities and alternative adaptive measures.

  3. Developing measurement indices to enhance protection and resilience of critical infrastructure and key resources.

    PubMed

    Fisher, Ronald E; Norman, Michael

    2010-07-01

    The US Department of Homeland Security (DHS) is developing indices to better assist in the risk management of critical infrastructures. The first of these indices is the Protective Measures Index - a quantitative index that measures overall protection across component categories: physical security, security management, security force, information sharing, protective measures and dependencies. The Protective Measures Index, which can also be recalculated as the Vulnerability Index, is a way to compare differing protective measures (eg fence versus security training). The second of these indices is the Resilience Index, which assesses a site's resilience and consists of three primary components: robustness, resourcefulness and recovery. The third index is the Criticality Index, which assesses the importance of a facility. The Criticality Index includes economic, human, governance and mass evacuation impacts. The Protective Measures Index, Resilience Index and Criticality Index are being developed as part of the Enhanced Critical Infrastructure Protection initiative that DHS protective security advisers implement across the nation at critical facilities. This paper describes two core themes: determination of the vulnerability, resilience and criticality of a facility and comparison of the indices at different facilities.

  4. Protection of critical infrastructure using fiber optic sensors embedded in technical textiles

    NASA Astrophysics Data System (ADS)

    Krebber, Katerina; Lenke, Philipp; Liehr, Sascha; Noether, Nils; Wendt, Mario; Wosniok, Aleksander

    2010-04-01

    Terrorists and criminals more and more attack and destroy important infrastructures like routes, railways, bridges, tunnels, dikes and dams, important buildings. Therefore, reliable on-line and long-term monitoring systems are required to protect such critical infrastructures. Fiber optic sensors are well-suited for that. They can be installed over many kilometers and are able to measure continuously distributed strain, pressure, temperature and further mechanical and physical quantities. The very tiny optical fibers can be integrated into structures and materials and can provide information about any significant changes or damages of the structures. These so-called smart materials and smart structures are able to monitor itself or its environment. Particularly smart technical textiles with embedded fiber optic sensors have become very attractive because of their high importance for the structural health monitoring of geotechnical and masonry infrastructures. Such textiles are usually used for reinforcement of the structures; the embedded fiber optic sensors provide information about the condition of the structures and detect the presence of any damages and destructions in real time. Thus, critical infrastructures can be preventively protected. The paper will introduce this innovative field and will present the results achieved within several German and European projects.

  5. System for critical infrastructure security based on multispectral observation-detection module

    NASA Astrophysics Data System (ADS)

    Trzaskawka, Piotr; Kastek, Mariusz; Życzkowski, Marek; Dulski, Rafał; Szustakowski, Mieczysław; Ciurapiński, Wiesław; Bareła, Jarosław

    2013-10-01

    Recent terrorist attacks and possibilities of such actions in future have forced to develop security systems for critical infrastructures that embrace sensors technologies and technical organization of systems. The used till now perimeter protection of stationary objects, based on construction of a ring with two-zone fencing, visual cameras with illumination are efficiently displaced by the systems of the multisensor technology that consists of: visible technology - day/night cameras registering optical contrast of a scene, thermal technology - cheap bolometric cameras recording thermal contrast of a scene and active ground radars - microwave and millimetre wavelengths that record and detect reflected radiation. Merging of these three different technologies into one system requires methodology for selection of technical conditions of installation and parameters of sensors. This procedure enables us to construct a system with correlated range, resolution, field of view and object identification. Important technical problem connected with the multispectral system is its software, which helps couple the radar with the cameras. This software can be used for automatic focusing of cameras, automatic guiding cameras to an object detected by the radar, tracking of the object and localization of the object on the digital map as well as target identification and alerting. Based on "plug and play" architecture, this system provides unmatched flexibility and simplistic integration of sensors and devices in TCP/IP networks. Using a graphical user interface it is possible to control sensors and monitor streaming video and other data over the network, visualize the results of data fusion process and obtain detailed information about detected intruders over a digital map. System provide high-level applications and operator workload reduction with features such as sensor to sensor cueing from detection devices, automatic e-mail notification and alarm triggering. The paper presents

  6. Organizational Strategies for Critical Transportation Infrastructure: Characteristics of Urban Resilience. The Case of Montreal.

    NASA Astrophysics Data System (ADS)

    Beauregard, Stéphane; Therrien, Marie-Christine; Normandin, Julie-Maude

    2010-05-01

    Organizational Strategies for Critical Transportation Infrastructure: Characteristics of Urban Resilience. The Case of Montreal. Stéphane Beauregard M.Sc. Candidate École nationale d'administration publique Julie-Maude Normandin Ph.D. Candidate École nationale d'administration publique Marie-Christine Therrien Professor École nationale d'administration publique The proposed paper presents preliminary results on the resilience of organizations managing critical infrastructure in the Metropolitan Montreal area (Canada). A resilient city is characterized by a network of infrastructures and individuals capable of maintaining their activities in spite of a disturbance (Godschalk, 2002). Critical infrastructures provide essential services for the functioning of society. In a crisis situation, the interruption or a decrease in performance of critical infrastructures could have important impacts on the population. They are also vulnerable to accidents and cascading effects because on their complexity and tight interdependence (Perrow, 1984). For these reasons, protection and security of the essential assets and networks are one of the objectives of organizations and governments. But prevention and recovery are two endpoints of a continuum which include also intermediate concerns: ensuring organizational robustness or failing with elegance rather than catastrophically. This continuum also includes organizational resilience (or system), or the ability to recover quickly after an interruption has occurred. Wildavsky (1988) proposes that anticipation strategies work better against known problems while resilience strategies focus on unknown problems. Anticipation policies can unnecessarily immobilize investments against risks, while resilience strategies include the potential for a certain sacrifice in the interests of a more long-term survival and adaptation to changing threats. In addition, a too large confidence in anticipation strategies can bring loss of capacity of an

  7. The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets

    DTIC Science & Technology

    2003-02-01

    for response and emergency management activities . Various state and local govern- ments and federal agencies have hosted local or regional exercises ...realignment and restructuring activities . Develop standardized guidelines for physical security programs DHS and DOE will work with the sector to define...The Physical Protection of Critical Infrastructures and Key Assets f e b r u a r y 2 0 0 3 REPORT

  8. Design of a Mobile Agent-Based Adaptive Communication Middleware for Federations of Critical Infrastructure Simulations

    NASA Astrophysics Data System (ADS)

    Görbil, Gökçe; Gelenbe, Erol

    The simulation of critical infrastructures (CI) can involve the use of diverse domain specific simulators that run on geographically distant sites. These diverse simulators must then be coordinated to run concurrently in order to evaluate the performance of critical infrastructures which influence each other, especially in emergency or resource-critical situations. We therefore describe the design of an adaptive communication middleware that provides reliable and real-time one-to-one and group communications for federations of CI simulators over a wide-area network (WAN). The proposed middleware is composed of mobile agent-based peer-to-peer (P2P) overlays, called virtual networks (VNets), to enable resilient, adaptive and real-time communications over unreliable and dynamic physical networks (PNets). The autonomous software agents comprising the communication middleware monitor their performance and the underlying PNet, and dynamically adapt the P2P overlay and migrate over the PNet in order to optimize communications according to the requirements of the federation and the current conditions of the PNet. Reliable communications is provided via redundancy within the communication middleware and intelligent migration of agents over the PNet. The proposed middleware integrates security methods in order to protect the communication infrastructure against attacks and provide privacy and anonymity to the participants of the federation. Experiments with an initial version of the communication middleware over a real-life networking testbed show that promising improvements can be obtained for unicast and group communications via the agent migration capability of our middleware.

  9. A reference model for model-based design of critical infrastructure protection systems

    NASA Astrophysics Data System (ADS)

    Shin, Young Don; Park, Cheol Young; Lee, Jae-Chon

    2015-05-01

    Today's war field environment is getting versatile as the activities of unconventional wars such as terrorist attacks and cyber-attacks have noticeably increased lately. The damage caused by such unconventional wars has also turned out to be serious particularly if targets are critical infrastructures that are constructed in support of banking and finance, transportation, power, information and communication, government, and so on. The critical infrastructures are usually interconnected to each other and thus are very vulnerable to attack. As such, to ensure the security of critical infrastructures is very important and thus the concept of critical infrastructure protection (CIP) has come. The program to realize the CIP at national level becomes the form of statute in each country. On the other hand, it is also needed to protect each individual critical infrastructure. The objective of this paper is to study on an effort to do so, which can be called the CIP system (CIPS). There could be a variety of ways to design CIPS's. Instead of considering the design of each individual CIPS, a reference model-based approach is taken in this paper. The reference model represents the design of all the CIPS's that have many design elements in common. In addition, the development of the reference model is also carried out using a variety of model diagrams. The modeling language used therein is the systems modeling language (SysML), which was developed and is managed by Object Management Group (OMG) and a de facto standard. Using SysML, the structure and operational concept of the reference model are designed to fulfil the goal of CIPS's, resulting in the block definition and activity diagrams. As a case study, the operational scenario of the nuclear power plant while being attacked by terrorists is studied using the reference model. The effectiveness of the results is also analyzed using multiple analysis models. It is thus expected that the approach taken here has some merits

  10. Modernization of B-2 Data, Video, and Control Systems Infrastructure

    NASA Technical Reports Server (NTRS)

    Cmar, Mark D.; Maloney, Christian T.; Butala, Vishal D.

    2012-01-01

    The National Aeronautics and Space Administration (NASA) Glenn Research Center (GRC) Plum Brook Station (PBS) Spacecraft Propulsion Research Facility, commonly referred to as B-2, is NASA s third largest thermal-vacuum facility with propellant systems capability. B-2 has completed a modernization effort of its facility legacy data, video and control systems infrastructure to accommodate modern integrated testing and Information Technology (IT) Security requirements. Integrated systems tests have been conducted to demonstrate the new data, video and control systems functionality and capability. Discrete analog signal conditioners have been replaced by new programmable, signal processing hardware that is integrated with the data system. This integration supports automated calibration and verification of the analog subsystem. Modern measurement systems analysis (MSA) tools are being developed to help verify system health and measurement integrity. Legacy hard wired digital data systems have been replaced by distributed Fibre Channel (FC) network connected digitizers where high speed sampling rates have increased to 256,000 samples per second. Several analog video cameras have been replaced by digital image and storage systems. Hard-wired analog control systems have been replaced by Programmable Logic Controllers (PLC), fiber optic networks (FON) infrastructure and human machine interface (HMI) operator screens. New modern IT Security procedures and schemes have been employed to control data access and process control flows. Due to the nature of testing possible at B-2, flexibility and configurability of systems has been central to the architecture during modernization.

  11. Modernization of B-2 Data, Video, and Control Systems Infrastructure

    NASA Technical Reports Server (NTRS)

    Cmar, Mark D.; Maloney, Christian T.; Butala, Vishal D.

    2012-01-01

    The National Aeronautics and Space Administration (NASA) Glenn Research Center (GRC) Plum Brook Station (PBS) Spacecraft Propulsion Research Facility, commonly referred to as B-2, is NASA's third largest thermal-vacuum facility with propellant systems capability. B-2 has completed a modernization effort of its facility legacy data, video and control systems infrastructure to accommodate modern integrated testing and Information Technology (IT) Security requirements. Integrated systems tests have been conducted to demonstrate the new data, video and control systems functionality and capability. Discrete analog signal conditioners have been replaced by new programmable, signal processing hardware that is integrated with the data system. This integration supports automated calibration and verification of the analog subsystem. Modern measurement systems analysis (MSA) tools are being developed to help verify system health and measurement integrity. Legacy hard wired digital data systems have been replaced by distributed Fibre Channel (FC) network connected digitizers where high speed sampling rates have increased to 256,000 samples per second. Several analog video cameras have been replaced by digital image and storage systems. Hard-wired analog control systems have been replaced by Programmable Logic Controllers (PLC), fiber optic networks (FON) infrastructure and human machine interface (HMI) operator screens. New modern IT Security procedures and schemes have been employed to control data access and process control flows. Due to the nature of testing possible at B-2, flexibility and configurability of systems has been central to the architecture during modernization.

  12. Development of a structural health monitoring system for the life assessment of critical transportation infrastructure.

    SciTech Connect

    Roach, Dennis Patrick; Jauregui, David Villegas; Daumueller, Andrew Nicholas

    2012-02-01

    Recent structural failures such as the I-35W Mississippi River Bridge in Minnesota have underscored the urgent need for improved methods and procedures for evaluating our aging transportation infrastructure. This research seeks to develop a basis for a Structural Health Monitoring (SHM) system to provide quantitative information related to the structural integrity of metallic structures to make appropriate management decisions and ensuring public safety. This research employs advanced structural analysis and nondestructive testing (NDT) methods for an accurate fatigue analysis. Metal railroad bridges in New Mexico will be the focus since many of these structures are over 100 years old and classified as fracture-critical. The term fracture-critical indicates that failure of a single component may result in complete collapse of the structure such as the one experienced by the I-35W Bridge. Failure may originate from sources such as loss of section due to corrosion or cracking caused by fatigue loading. Because standard inspection practice is primarily visual, these types of defects can go undetected due to oversight, lack of access to critical areas, or, in riveted members, hidden defects that are beneath fasteners or connection angles. Another issue is that it is difficult to determine the fatigue damage that a structure has experienced and the rate at which damage is accumulating due to uncertain history and load distribution in supporting members. A SHM system has several advantages that can overcome these limitations. SHM allows critical areas of the structure to be monitored more quantitatively under actual loading. The research needed to apply SHM to metallic structures was performed and a case study was carried out to show the potential of SHM-driven fatigue evaluation to assess the condition of critical transportation infrastructure and to guide inspectors to potential problem areas. This project combines the expertise in transportation infrastructure at New

  13. Multi Infrastructure Control and Optimization Toolkit, Resilient Design Module (MICOT-RDT), version 2.X

    SciTech Connect

    Bent, Russell; Nagarajan, Harsha; Yamangil, Emre; Coffrin, Carleton

    2016-06-24

    MICOT is a tool for optimizing and controlling infrastructure systems. In includes modules for optimizing the operations of an infrastructure structure (for example optimal dispatch), designing infrastructure systems, restoring infrastructures systems, resiliency, preparing for natural disasters, interdicting networks, state estimation, sensor placement, and simulation of infrastructure systems. It implements algorithms developed at LANL that have been published in the academic community. This is a release of the of resilient design module of the MICOT.

  14. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    PubMed

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.

  15. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    NASA Astrophysics Data System (ADS)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  16. An Analysis of IT Governance Practices in the Federal Government: Protecting U.S. Critical Infrastructure from Cyber Terrorist Attacks

    ERIC Educational Resources Information Center

    Johnson, R. LeWayne

    2012-01-01

    Much of the governing process in the United States (U.S.) today depends on a reliable and well protected public information technology (IT) infrastructure. The Department of Homeland Security (DHS) is tasked with the responsibility of protecting the country's IT infrastructure. Critics contend that the DHS has failed to address planning and…

  17. Wireless structural health monitoring for critical members of civil infrastructures using piezoelectric active sensors

    NASA Astrophysics Data System (ADS)

    Park, Seunghee; Yun, Chung-Bang; Inman, Daniel J.; Park, Gyuhae

    2008-03-01

    This paper presents several challenging issues on wireless structural health monitoring techniques for critical members of civil infrastructures using piezoelectric active sensors. The basic concept of the techniques is to monitor remotely the structural integrity by observing the impedance variations at the piezoelectric active sensors distributed to critical members of a host structure. An active sensing node incorporating on-board microprocessor and radio frequency telemetry is introduced in a sense of tailoring wireless sensing technology to the impedance method. A data compression algorithm using principal component analysis is embedded into the on-board chip of the active sensing node. The data compression algorithm would promote efficiency in terms of both power management and noise elimination of the active sensor node. Finally, a piezoelectric sensor self-diagnosis issue is touched introducing a new impedance model equation that incorporates the effects of sensor and bonding defects.

  18. Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures.

    PubMed

    Wang, Maocai; Dai, Guangming; Choo, Kim-Kwang Raymond; Jayaraman, Prem Prakash; Ranjan, Rajiv

    2016-01-01

    Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user's public key based on the user's identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al.

  19. Constructing Pairing-Friendly Elliptic Curves under Embedding Degree 1 for Securing Critical Infrastructures

    PubMed Central

    Dai, Guangming

    2016-01-01

    Information confidentiality is an essential requirement for cyber security in critical infrastructure. Identity-based cryptography, an increasingly popular branch of cryptography, is widely used to protect the information confidentiality in the critical infrastructure sector due to the ability to directly compute the user’s public key based on the user’s identity. However, computational requirements complicate the practical application of Identity-based cryptography. In order to improve the efficiency of identity-based cryptography, this paper presents an effective method to construct pairing-friendly elliptic curves with low hamming weight 4 under embedding degree 1. Based on the analysis of the Complex Multiplication(CM) method, the soundness of our method to calculate the characteristic of the finite field is proved. And then, three relative algorithms to construct pairing-friendly elliptic curve are put forward. 10 elliptic curves with low hamming weight 4 under 160 bits are presented to demonstrate the utility of our approach. Finally, the evaluation also indicates that it is more efficient to compute Tate pairing with our curves, than that of Bertoni et al. PMID:27564373

  20. Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures.

    PubMed

    Johnson, Chris W

    2014-01-01

    We identify four roles that social networking plays in the 'attribution problem', which obscures whether or not cyber-attacks were state-sponsored. First, social networks motivate individuals to participate in Distributed Denial of Service attacks by providing malware and identifying potential targets. Second, attackers use an individual's social network to focus attacks, through spear phishing. Recipients are more likely to open infected attachments when they come from a trusted source. Third, social networking infrastructures create disposable architectures to coordinate attacks through command and control servers. The ubiquitous nature of these architectures makes it difficult to determine who owns and operates the servers. Finally, governments recruit anti-social criminal networks to launch attacks on third-party infrastructures using botnets. The closing sections identify a roadmap to increase resilience against the 'dark side' of social networking.

  1. The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure

    SciTech Connect

    Ackerman, G; Blair, C; Bale, J; Hahn, G; DiLorenzo, E; Vadlamudi, S; Lunsford, C

    2006-08-28

    There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the authors in an earlier report, namely

  2. Communications: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    DTIC Science & Technology

    2007-05-01

    SS7 and Wireline Network Architecture 96 Figure A4-3. Next Generation Networks 97 Figure A4-4. VoIP Networks 97 Figure A4-5. Submarine Cable...systems, or functions that—if destroyed, disrupted, or exploited —would seriously threaten national security, result in catastrophic health effects...services that, if exploited , would have a national impact. The Communications Sector-Specific Plan (CSSP) is the result of a collaborative infrastructure

  3. CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection

    SciTech Connect

    Marco Carvalho; Richard Ford

    2012-05-14

    Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-critical monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).

  4. Landfills as critical infrastructures: analysis of observational datasets after 12 years of non-invasive monitoring

    NASA Astrophysics Data System (ADS)

    Scozzari, Andrea; Raco, Brunella; Battaglini, Raffaele

    2016-04-01

    This work presents the results of more than ten years of observations, performed on a regular basis, on a municipal solid waste disposal located in Italy. Observational data are generated by the combination of non-invasive techniques, involving the direct measurement of biogas release to the atmosphere and thermal infrared imaging. In fact, part of the generated biogas tends to escape from the landfill surface even when collecting systems are installed and properly working. Thus, methodologies for estimating the behaviour of a landfill system by means of direct and/or indirect measurement systems have been developed in the last decades. It is nowadays known that these infrastructures produce more than 20% of the total anthropogenic methane released to the atmosphere, justifying the need for a systematic and efficient monitoring of such infrastructures. During the last 12 years, observational data regarding a solid waste disposal site located in Tuscany (Italy) have been collected on a regular basis. The collected datasets consist in direct measurements of gas flux with the accumulation chamber method, combined with the detection of thermal anomalies by infrared radiometry. This work discusses the evolution of the estimated performance of the landfill system, its trends, the benefits and the critical aspects of such relatively long-term monitoring activity.

  5. Will climate change increase the risk for critical infrastructure failures in Europe due to extreme precipitation?

    NASA Astrophysics Data System (ADS)

    Nissen, Katrin; Ulbrich, Uwe

    2016-04-01

    An event based detection algorithm for extreme precipitation is applied to a multi-model ensemble of regional climate model simulations. The algorithm determines extent, location, duration and severity of extreme precipitation events. We assume that precipitation in excess of the local present-day 10-year return value will potentially exceed the capacity of the drainage systems that protect critical infrastructure elements. This assumption is based on legislation for the design of drainage systems which is in place in many European countries. Thus, events exceeding the local 10-year return value are detected. In this study we distinguish between sub-daily events (3 hourly) with high precipitation intensities and long-duration events (1-3 days) with high precipitation amounts. The climate change simulations investigated here were conducted within the EURO-CORDEX framework and exhibit a horizontal resolution of approximately 12.5 km. The period between 1971-2100 forced with observed and scenario (RCP 8.5 and RCP 4.5) greenhouse gas concentrations was analysed. Examined are changes in event frequency, event duration and size. The simulations show an increase in the number of extreme precipitation events for the future climate period over most of the area, which is strongest in Northern Europe. Strength and statistical significance of the signal increase with increasing greenhouse gas concentrations. This work has been conducted within the EU project RAIN (Risk Analysis of Infrastructure Networks in response to extreme weather).

  6. Influence of time-dependent factors in the evaluation of critical infrastructure protection measures.

    SciTech Connect

    Buehring, W. A.; Samsa, M. E.; Decision and Information Sciences

    2008-03-28

    The examination of which protective measures are the most appropriate to be implemented in order to prevent, protect against, respond to, and recover from attacks on critical infrastructures and key resources typically involves a comparison of the consequences that could occur when the protective measure is implemented to those that could occur when it is not. This report describes a framework for evaluation that provides some additional capabilities for comparing optional protective measures. It illustrates some potentially important time-dependent factors, such as the implementation rate, that affect the relative pros and cons associated with widespread implementation of protective measures. It presents example results from the use of protective measures, such as detectors and pretrained responders, for an illustrative biological incident. Results show that the choice of an alternative measure can depend on whether or not policy and financial support can be maintained for extended periods of time. Choice of a time horizon greatly influences the comparison of alternatives.

  7. Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures.

    SciTech Connect

    Jaeger, Calvin Dell; Roehrig, Nathaniel S.; Torres, Teresa M.

    2008-12-01

    This document presents the security automated Risk Assessment Methodology (RAM) prototype tool developed by Sandia National Laboratories (SNL). This work leverages SNL's capabilities and skills in security risk analysis and the development of vulnerability assessment/risk assessment methodologies to develop an automated prototype security RAM tool for critical infrastructures (RAM-CITM). The prototype automated RAM tool provides a user-friendly, systematic, and comprehensive risk-based tool to assist CI sector and security professionals in assessing and managing security risk from malevolent threats. The current tool is structured on the basic RAM framework developed by SNL. It is envisioned that this prototype tool will be adapted to meet the requirements of different CI sectors and thereby provide additional capabilities.

  8. Multisensor system for the protection of critical infrastructure of a seaport

    NASA Astrophysics Data System (ADS)

    Kastek, Mariusz; Dulski, Rafał; Zyczkowski, Marek; Szustakowski, Mieczysław; Trzaskawka, Piotr; Ciurapinski, Wiesław; Grelowska, Grazyna; Gloza, Ignacy; Milewski, Stanislaw; Listewnik, Karol

    2012-06-01

    There are many separated infrastructural objects within a harbor area that may be considered "critical", such as gas and oil terminals or anchored naval vessels. Those objects require special protection, including security systems capable of monitoring both surface and underwater areas, because an intrusion into the protected area may be attempted using small surface vehicles (boats, kayaks, rafts, floating devices with weapons and explosives) as well as underwater ones (manned or unmanned submarines, scuba divers). The paper will present the concept of multisensor security system for a harbor protection, capable of complex monitoring of selected critical objects within the protected area. The proposed system consists of a command centre and several different sensors deployed in key areas, providing effective protection from land and sea, with special attention focused on the monitoring of underwater zone. The initial project of such systems will be presented, its configuration and initial tests of the selected components. The protection of surface area is based on medium-range radar and LLTV and infrared cameras. Underwater zone will be monitored by a sonar and acoustic and magnetic barriers, connected into an integrated monitoring system. Theoretical analyses concerning the detection of fast, small surface objects (such as RIB boats) by a camera system and real test results in various weather conditions will also be presented.

  9. National Infrastructure Advisory Council: Chemical, Biological, and Radiological Events and the Critical Infrastructure Workforce. Final Report and Recommendations

    DTIC Science & Technology

    2008-01-08

    delivery Electricity – beyond 24 hours Transportation and shipping Interdependency Service delivery Transportation of critical medical materia ...was neither surprising, nor considered a negative, but a recognition that there continues to be a need to balance all capabilities across a broad

  10. Risk prediction of Critical Infrastructures against extreme natural hazards: local and regional scale analysis

    NASA Astrophysics Data System (ADS)

    Rosato, Vittorio; Hounjet, Micheline; Burzel, Andreas; Di Pietro, Antonio; Tofani, Alberto; Pollino, Maurizio; Giovinazzi, Sonia

    2016-04-01

    Natural hazard events can induce severe impacts on the built environment; they can hit wide and densely populated areas, where there is a large number of (inter)dependent technological systems whose damages could cause the failure or malfunctioning of further different services, spreading the impacts on wider geographical areas. The EU project CIPRNet (Critical Infrastructures Preparedness and Resilience Research Network) is realizing an unprecedented Decision Support System (DSS) which enables to operationally perform risk prediction on Critical Infrastructures (CI) by predicting the occurrence of natural events (from long term weather to short nowcast predictions, correlating intrinsic vulnerabilities of CI elements with the different events' manifestation strengths, and analysing the resulting Damage Scenario. The Damage Scenario is then transformed into an Impact Scenario, where punctual CI element damages are transformed into micro (local area) or meso (regional) scale Services Outages. At the smaller scale, the DSS simulates detailed city models (where CI dependencies are explicitly accounted for) that are of important input for crisis management organizations whereas, at the regional scale by using approximate System-of-Systems model describing systemic interactions, the focus is on raising awareness. The DSS has allowed to develop a novel simulation framework for predicting earthquakes shake maps originating from a given seismic event, considering the shock wave propagation in inhomogeneous media and the subsequent produced damages by estimating building vulnerabilities on the basis of a phenomenological model [1, 2]. Moreover, in presence of areas containing river basins, when abundant precipitations are expected, the DSS solves the hydrodynamic 1D/2D models of the river basins for predicting the flux runoff and the corresponding flood dynamics. This calculation allows the estimation of the Damage Scenario and triggers the evaluation of the Impact Scenario

  11. Constructing vulnerabilty and protective measures indices for the enhanced critical infrastructure protection program.

    SciTech Connect

    Fisher, R. E.; Buehring, W. A.; Whitfield, R. G.; Bassett, G. W.; Dickinson, D. C.; Haffenden, R. A.; Klett, M. S.; Lawlor, M. A.; Decision and Information Sciences; LANL

    2009-10-14

    The US Department of Homeland Security (DHS) has directed its Protective Security Advisors (PSAs) to form partnerships with the owners and operators of assets most essential to the Nation's well being - a subclass of critical infrastructure and key resources (CIKR) - and to conduct site visits for these and other high-risk assets as part of the Enhanced Critical Infrastructure Protection (ECIP) Program. During each such visit, the PSA documents information about the facility's current CIKR protection posture and overall security awareness. The primary goals for ECIP site visits (DHS 2009) are to: (1) inform facility owners and operators of the importance of their facilities as an identified high-priority CIKR and the need to be vigilant in light of the ever-present threat of terrorism; (2) identify protective measures currently in place at these facilities, provide comparisons of CIKR protection postures across like assets, and track the implementation of new protective measures; and (3) enhance existing relationships among facility owners and operators; DHS; and various Federal, State, local tribal, and territorial partners. PSAs conduct ECIP visits to assess overall site security; educate facility owners and operators about security; help owners and operators identify gaps and potential improvements; and promote communication and information sharing among facility owners and operators, DHS, State governments, and other security partners. Information collected during ECIP visits is used to develop metrics; conduct sector-by-sector and cross-sector vulnerability comparisons; identify security gaps and trends across CIKR sectors and subsectors; establish sector baseline security survey results; and track progress toward improving CIKR security through activities, programs, outreach, and training (Snyder 2009). The data being collected are used in a framework consistent with the National Infrastructure Protection Plan (NIPP) risk criteria (DHS 2009). The NIPP

  12. Constructing a resilience index for the Enhanced Critical Infrastructure Protection Program

    SciTech Connect

    Fisher, R. E.; Bassett, G. W.; Buehring, W. A.; Collins, M. J.; Dickinson, D. C.; Eaton, L. K.; Haffenden, R. A.; Hussar, N. E.; Klett, M. S.; Lawlor, M. A.; Millier, D. J.; Petit, F. D.; Peyton, S. M.; Wallace, K. E.; Whitfield, R. G.; Peerenboom, J P

    2010-10-14

    Following recommendations made in Homeland Security Presidential Directive 7, which established a national policy for the identification and increased protection of critical infrastructure and key resources (CIKR) by Federal departments and agencies, the U.S. Department of Homeland Security (DHS) in 2006 developed the Enhanced Critical Infrastructure Protection (ECIP) program. The ECIP program aimed to provide a closer partnership with state, regional, territorial, local, and tribal authorities in fulfilling the national objective to improve CIKR protection. The program was specifically designed to identify protective measures currently in place in CIKR and to inform facility owners/operators of the benefits of new protective measures. The ECIP program also sought to enhance existing relationships between DHS and owners/operators of CIKR and to build relationships where none existed (DHS 2008; DHS 2009). In 2009, DHS and its protective security advisors (PSAs) began assessing CIKR assets using the ECIP program and ultimately produced individual protective measure and vulnerability values through the protective measure and vulnerability indices (PMI/VI). The PMI/VI assess the protective measures posture of individual facilities at their 'weakest link,' allowing for a detailed analysis of the most vulnerable aspects of the facilities (Schneier 2003), while maintaining the ability to produce an overall protective measures picture. The PMI has six main components (physical security, security management, security force, information sharing, protective measures assessments, and dependencies) and focuses on actions taken by a facility to prevent or deter the occurrence of an incident (Argonne National Laboratory 2009). As CIKR continue to be assessed using the PMI/VI and owners/operators better understand how they can prevent or deter incidents, academic research, practitioner emphasis, and public policy formation have increasingly focused on resilience as a necessary

  13. Towards Resilient Critical Infrastructures: Application of Type-2 Fuzzy Logic in Embedded Network Security Cyber Sensor

    SciTech Connect

    Ondrej Linda; Todd Vollmer; Jim Alves-Foss; Milos Manic

    2011-08-01

    Resiliency and cyber security of modern critical infrastructures is becoming increasingly important with the growing number of threats in the cyber-environment. This paper proposes an extension to a previously developed fuzzy logic based anomaly detection network security cyber sensor via incorporating Type-2 Fuzzy Logic (T2 FL). In general, fuzzy logic provides a framework for system modeling in linguistic form capable of coping with imprecise and vague meanings of words. T2 FL is an extension of Type-1 FL which proved to be successful in modeling and minimizing the effects of various kinds of dynamic uncertainties. In this paper, T2 FL provides a basis for robust anomaly detection and cyber security state awareness. In addition, the proposed algorithm was specifically developed to comply with the constrained computational requirements of low-cost embedded network security cyber sensors. The performance of the system was evaluated on a set of network data recorded from an experimental cyber-security test-bed.

  14. Critical infrastructure protection decision support system decision model : overview and quick-start user's guide.

    SciTech Connect

    Samsa, M.; Van Kuiken, J.; Jusko, M.; Decision and Information Sciences

    2008-12-01

    The Critical Infrastructure Protection Decision Support System Decision Model (CIPDSS-DM) is a useful tool for comparing the effectiveness of alternative risk-mitigation strategies on the basis of CIPDSS consequence scenarios. The model is designed to assist analysts and policy makers in evaluating and selecting the most effective risk-mitigation strategies, as affected by the importance assigned to various impact measures and the likelihood of an incident. A typical CIPDSS-DM decision map plots the relative preference of alternative risk-mitigation options versus the annual probability of an undesired incident occurring once during the protective life of the investment, assumed to be 20 years. The model also enables other types of comparisons, including a decision map that isolates a selected impact variable and displays the relative preference for the options of interest--parameterized on the basis of the contribution of the isolated variable to total impact, as well as the likelihood of the incident. Satisfaction/regret analysis further assists the analyst or policy maker in evaluating the confidence with which one option can be selected over another.

  15. Real-time threat assessment for critical infrastructure protection: data incest and conflict in evidential reasoning

    NASA Astrophysics Data System (ADS)

    Brandon, R.; Page, S.; Varndell, J.

    2012-06-01

    This paper presents a novel application of Evidential Reasoning to Threat Assessment for critical infrastructure protection. A fusion algorithm based on the PCR5 Dezert-Smarandache fusion rule is proposed which fuses alerts generated by a vision-based behaviour analysis algorithm and a-priori watch-list intelligence data. The fusion algorithm produces a prioritised event list according to a user-defined set of event-type severity or priority weightings. Results generated from application of the algorithm to real data and Behaviour Analysis alerts captured at London's Heathrow Airport under the EU FP7 SAMURAI programme are presented. A web-based demonstrator system is also described which implements the fusion process in real-time. It is shown that this system significantly reduces the data deluge problem, and directs the user's attention to the most pertinent alerts, enhancing their Situational Awareness (SA). The end-user is also able to alter the perceived importance of different event types in real-time, allowing the system to adapt rapidly to changes in priorities as the situation evolves. One of the key challenges associated with fusing information deriving from intelligence data is the issue of Data Incest. Techniques for handling Data Incest within Evidential Reasoning frameworks are proposed, and comparisons are drawn with respect to Data Incest management techniques that are commonly employed within Bayesian fusion frameworks (e.g. Covariance Intersection). The challenges associated with simultaneously dealing with conflicting information and Data Incest in Evidential Reasoning frameworks are also discussed.

  16. Evaluating Green/Gray Infrastructure for CSO/Stormwater Control

    EPA Science Inventory

    The NRMRL is conducting this project to evaluate the water quality and quantity benefits of a large-scale application of green infrastructure (low-impact development/best management practices) retrofits in an entire subcatchment. It will document ORD's effort to demonstrate the e...

  17. Attenuation of Storm Surge Flooding By Wetlands in the Chesapeake Bay: An Integrated Geospatial Framework Evaluating Impacts to Critical Infrastructure

    NASA Astrophysics Data System (ADS)

    Khalid, A.; Haddad, J.; Lawler, S.; Ferreira, C.

    2014-12-01

    Areas along the Chesapeake Bay and its tributaries are extremely vulnerable to hurricane flooding, as evidenced by the costly effects and severe impacts of recent storms along the Virginia coast, such as Hurricane Isabel in 2003 and Hurricane Sandy in 2012. Coastal wetlands, in addition to their ecological importance, are expected to mitigate the impact of storm surge by acting as a natural protection against hurricane flooding. Quantifying such interactions helps to provide a sound scientific basis to support planning and decision making. Using storm surge flooding from various historical hurricanes, simulated using a coupled hydrodynamic wave model (ADCIRC-SWAN), we propose an integrated framework yielding a geospatial identification of the capacity of Chesapeake Bay wetlands to protect critical infrastructure. Spatial identification of Chesapeake Bay wetlands is derived from the National Wetlands Inventory (NWI), National Land Cover Database (NLCD), and the Coastal Change Analysis Program (C-CAP). Inventories of population and critical infrastructure are extracted from US Census block data and FEMA's HAZUS-Multi Hazard geodatabase. Geospatial and statistical analyses are carried out to develop a relationship between wetland land cover, hurricane flooding, population and infrastructure vulnerability. These analyses result in the identification and quantification of populations and infrastructure in flooded areas that lie within a reasonable buffer surrounding the identified wetlands. Our analysis thus produces a spatial perspective on the potential for wetlands to attenuate hurricane flood impacts in critical areas. Statistical analysis will support hypothesis testing to evaluate the benefits of wetlands from a flooding and storm-surge attenuation perspective. Results from geospatial analysis are used to identify where interactions with critical infrastructure are relevant in the Chesapeake Bay.

  18. Interconnectedness and interdependencies of critical infrastructures in the US economy: Implications for resilience

    NASA Astrophysics Data System (ADS)

    Chopra, Shauhrat S.; Khanna, Vikas

    2015-10-01

    Natural disasters in 2011 yielded close to 55 billion in economic damages alone in the United States (US), which highlights the need to reduce impacts of such disasters or other deliberate attacks. The US Department of Homeland Security (DHS) identifies a list of 16 Critical Infrastructure Sectors (CIS) whose incapacity due to disruptions would have a debilitating impact on the nation's economy. The goal of this work is to understand the implications of interdependencies among CIS on the resilience of the US economic system as a whole. We develop a framework that combines the empirical economic input-output (EIO) model with graph theory based techniques for understanding interdependencies, interconnectedness and resilience in the US economic system. By representing the US economy as a network, we are able to analyze its topology by separately looking at its unweighted and weighted forms. Topological analysis of the US EIO network suggests that it exhibits small world properties for the unweighted case, and in the weighted case, the throughput of industry sectors follows a power-law with an exponential cutoff. Implications of these topological properties are discussed in the paper. We also simulate hypothetical disruptions on CIS in order to identify industrial sectors that experience the largest economic impacts, and to quantify systemic vulnerability in economic terms. In addition, insights from community detection and hypothetical disruption scenarios help assess vulnerability of individual industrial communities to disruptions on individual CIS. These methodologies also provide insights regarding the extent of coupling between each CIS in the US EIO network. Based on our analysis, we observe that excessive interconnectedness and interdependencies of CIS results in high systemic vulnerability. This information can guide policymakers to design policies that improve resilience of economic networks, and evaluate policies that might indirectly increase coupling

  19. Quantitative physical models of volcanic phenomena for hazards assessment of critical infrastructures

    NASA Astrophysics Data System (ADS)

    Costa, Antonio

    2016-04-01

    Volcanic hazards may have destructive effects on economy, transport, and natural environments at both local and regional scale. Hazardous phenomena include pyroclastic density currents, tephra fall, gas emissions, lava flows, debris flows and avalanches, and lahars. Volcanic hazards assessment is based on available information to characterize potential volcanic sources in the region of interest and to determine whether specific volcanic phenomena might reach a given site. Volcanic hazards assessment is focussed on estimating the distances that volcanic phenomena could travel from potential sources and their intensity at the considered site. Epistemic and aleatory uncertainties strongly affect the resulting hazards assessment. Within the context of critical infrastructures, volcanic eruptions are rare natural events that can create severe hazards. In addition to being rare events, evidence of many past volcanic eruptions is poorly preserved in the geologic record. The models used for describing the impact of volcanic phenomena generally represent a range of model complexities, from simplified physics based conceptual models to highly coupled thermo fluid dynamical approaches. Modelling approaches represent a hierarchy of complexity, which reflects increasing requirements for well characterized data in order to produce a broader range of output information. In selecting models for the hazard analysis related to a specific phenomenon, questions that need to be answered by the models must be carefully considered. Independently of the model, the final hazards assessment strongly depends on input derived from detailed volcanological investigations, such as mapping and stratigraphic correlations. For each phenomenon, an overview of currently available approaches for the evaluation of future hazards will be presented with the aim to provide a foundation for future work in developing an international consensus on volcanic hazards assessment methods.

  20. Developing measurement indices to enhance protection and resilience of U.S. critical infrastructure and key resources.

    SciTech Connect

    Fisher, R. E.; Norman, M.

    2010-07-01

    The US Department of Homeland Security (DHS) is developing indices to better assist in the risk management of critical infrastructures. The first of these indices is the Protective Measures Index - a quantitative index that measures overall protection across component categories: physical security, security management, security force, information sharing, protective measures and dependencies. The Protective Measures Index, which can also be recalculated as the Vulnerability Index, is a way to compare differing protective measures (eg fence versus security training). The second of these indices is the Resilience Index, which assesses a site's resilience and consists of three primary components: robustness, resourcefulness and recovery. The third index is the Criticality Index, which assesses the importance of a facility. The Criticality Index includes economic, human, governance and mass evacuation impacts. The Protective Measures Index, Resilience Index and Criticality Index are being developed as part of the Enhanced Critical Infrastructure Protection initiative that DHS protective security advisers implement across the nation at critical facilities. This paper describes two core themes: determination of the vulnerability, resilience and criticality of a facility and comparison of the indices at different facilities.

  1. Critical Infrastructure Protection: How to Assess and Provide Remedy to Vulnerabilities in Telecom Hotels

    DTIC Science & Technology

    2006-09-01

    infrastructure due to convergence. Not only are phone calls to mom affected in a failure, but also all internet traffic. This includes B2B (Business to...infrastructure in the United States. The study focuses on “telecom hotels”—large facilities that house several network carriers, telephone and internet service...data center, gateway, network exchange center, commercial internet exchange, mondo condo, internet farm, cyber hotel and data bunker. It is a

  2. Remote Sensing of Arctic Environmental Conditions and Critical Infrastructure using Infra-Red (IR) Cameras and Unmanned Air Vehicles (UAVs)

    NASA Astrophysics Data System (ADS)

    Hatfield, M. C.; Webley, P.; Saiet, E., II

    2014-12-01

    Remote Sensing of Arctic Environmental Conditions and Critical Infrastructure using Infra-Red (IR) Cameras and Unmanned Air Vehicles (UAVs) Numerous scientific and logistical applications exist in Alaska and other arctic regions requiring analysis of expansive, remote areas in the near infrared (NIR) and thermal infrared (TIR) bands. These include characterization of wild land fire plumes and volcanic ejecta, detailed mapping of lava flows, and inspection of lengthy segments of critical infrastructure, such as the Alaska pipeline and railroad system. Obtaining timely, repeatable, calibrated measurements of these extensive features and infrastructure networks requires localized, taskable assets such as UAVs. The Alaska Center for Unmanned Aircraft Systems Integration (ACUASI) provides practical solutions to these problem sets by pairing various IR sensors with a combination of fixed-wing and multi-rotor air vehicles. Fixed-wing assets, such as the Insitu ScanEagle, offer long reach and extended duration capabilities to quickly access remote locations and provide enduring surveillance of the target of interest. Rotary-wing assets, such as the Aeryon Scout or the ACUASI-built Ptarmigan hexcopter, provide a precision capability for detailed horizontal mapping or vertical stratification of atmospheric phenomena. When included with other ground capabilities, we will show how they can assist in decision support and hazard assessment as well as giving those in emergency management a new ability to increase knowledge of the event at hand while reducing the risk to all involved. Here, in this presentation, we illustrate how UAV's can provide the ideal tool to map and analyze the hazardous events and critical infrastructure under extreme environmental conditions.

  3. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... requirements will be in conformance with the information technology security requirements in the Federal Information Security Management Act and the Office of Management and Budget's implementing policies. ... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF...

  4. 3 CFR 8607 - Proclamation 8607 of November 30, 2010. Critical Infrastructure Protection Month, 2010

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... Homeland Security leads an unprecedented national partnership dedicated to the security and resilience of... resilience. I have proposed a bold plan for renewing and expanding our Nation's infrastructure, including its... observe this month with appropriate events and training to enhance our national security and...

  5. Toward an ontology framework supporting the integration of geographic information with modeling and simulation for critical infrastructure protection

    SciTech Connect

    Ambrosiano, John J; Bent, Russell W; Linger, Steve P

    2009-01-01

    Protecting the nation's infrastructure from natural disasters, inadvertent failures, or intentional attacks is a major national security concern. Gauging the fragility of infrastructure assets, and understanding how interdependencies across critical infrastructures affect their behavior, is essential to predicting and mitigating cascading failures, as well as to planning for response and recovery. Modeling and simulation (M&S) is an indispensable part of characterizing this complex system of systems and anticipating its response to disruptions. Bringing together the necessary components to perform such analyses produces a wide-ranging and coarse-grained computational workflow that must be integrated with other analysis workflow elements. There are many points in both types of work flows in which geographic information (GI) services are required. The GIS community recognizes the essential contribution of GI in this problem domain as evidenced by past OGC initiatives. Typically such initiatives focus on the broader aspects of GI analysis workflows, leaving concepts crucial to integrating simulations within analysis workflows to that community. Our experience with large-scale modeling of interdependent critical infrastructures, and our recent participation in a DRS initiative concerning interoperability for this M&S domain, has led to high-level ontological concepts that we have begun to assemble into an architecture that spans both computational and 'world' views of the problem, and further recognizes the special requirements of simulations that go beyond common workflow ontologies. In this paper we present these ideas, and offer a high-level ontological framework that includes key geospatial concepts as special cases of a broader view.

  6. Operations Research Support for Critical Infrastructure Resilience in the Province of British Columbia

    DTIC Science & Technology

    2012-10-01

    importance of problem formulation as well as the associated challenges, it is an iterative process and will continue to evolve as the project...trust by association ) and over time trust has increased through regular interactions. Information Sharing Legislation varies from province to...collaboration avec l’EMBC et le comité directeur des infrastructures essentielles en C.-B. Un certain nombre de problèmes liés à la gouvernance , à la

  7. Report: EPA Needs to Better Implement Plan for Protecting Critical Infrastructure and Key Resources Used to Respond to Terrorist Attacks and Disasters

    EPA Pesticide Factsheets

    Report #2006-P-00022, April 26, 2006. Assignment of formal authority and more accountability is required to ensure the initiatives in the Critical Infrastructure and Key Resources Protection Plan are accomplished in a timely manner.

  8. Surety of the nation`s critical infrastructures: The challenge restructuring poses to the telecommunications sector

    SciTech Connect

    Cox, R.; Drennen, T.E.; Gilliom, L.; Harris, D.L.; Kunsman, D.M.; Skroch, M.J.

    1998-04-01

    The telecommunications sector plays a pivotal role in the system of increasingly connected and interdependent networks that make up national infrastructure. An assessment of the probable structure and function of the bit-moving industry in the twenty-first century must include issues associated with the surety of telecommunications. The term surety, as used here, means confidence in the acceptable behavior of a system in both intended and unintended circumstances. This paper outlines various engineering approaches to surety in systems, generally, and in the telecommunications infrastructure, specifically. It uses the experience and expectations of the telecommunications system of the US as an example of the global challenges. The paper examines the principal factors underlying the change to more distributed systems in this sector, assesses surety issues associated with these changes, and suggests several possible strategies for mitigation. It also studies the ramifications of what could happen if this sector became a target for those seeking to compromise a nation`s security and economic well being. Experts in this area generally agree that the U. S. telecommunications sector will eventually respond in a way that meets market demands for surety. Questions remain open, however, about confidence in the telecommunications sector and the nation`s infrastructure during unintended circumstances--such as those posed by information warfare or by cascading software failures. Resolution of these questions is complicated by the lack of clear accountability of the private and the public sectors for the surety of telecommunications.

  9. Determining critical infrastructure for ocean research and societal needs in 2030

    NASA Astrophysics Data System (ADS)

    Glickson, Deborah; Barron, Eric; Fine, Rana

    2011-06-01

    The United States has jurisdiction over 3.4 million square miles of ocean—an expanse greater than the land area of all 50 states combined. This vast marine area offers researchers opportunities to investigate the ocean's role in an integrated Earth system but also presents challenges to society, including damaging tsunamis and hurricanes, industrial accidents, and outbreaks of waterborne diseases. The 2010 Gulf of Mexico Deepwater Horizon oil spill and 2011 Japanese earthquake and tsunami are vivid reminders that a broad range of infrastructure is needed to advance scientists' still incomplete understanding of the ocean. The National Research Council's (NRC) Ocean Studies Board was asked by the National Science and Technology Council's Subcommittee on Ocean Science and Technology, comprising 25 U.S. government agencies, to examine infrastructure needs for ocean research in the year 2030. This request reflects concern, among a myriad of marine issues, over the present state of aging and obsolete infrastructure, insufficient capacity, growing technological gaps, and declining national leadership in marine technological development; these issues were brought to the nation's attention in 2004 by the U.S. Commission on Ocean Policy.

  10. Cybersecurity of Critical Control Networks

    DTIC Science & Technology

    2015-07-14

    information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and...maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other...yielded a large number of publications and conference presentations in the area of Supervisory Control And Data Acquisition (SCADA). Details of each

  11. Developing an Integration Infrastructure for Distributed Engine Control Technologies

    NASA Technical Reports Server (NTRS)

    Culley, Dennis; Zinnecker, Alicia; Aretskin-Hariton, Eliot; Kratz, Jonathan

    2014-01-01

    Turbine engine control technology is poised to make the first revolutionary leap forward since the advent of full authority digital engine control in the mid-1980s. This change aims squarely at overcoming the physical constraints that have historically limited control system hardware on aero-engines to a federated architecture. Distributed control architecture allows complex analog interfaces existing between system elements and the control unit to be replaced by standardized digital interfaces. Embedded processing, enabled by high temperature electronics, provides for digitization of signals at the source and network communications resulting in a modular system at the hardware level. While this scheme simplifies the physical integration of the system, its complexity appears in other ways. In fact, integration now becomes a shared responsibility among suppliers and system integrators. While these are the most obvious changes, there are additional concerns about performance, reliability, and failure modes due to distributed architecture that warrant detailed study. This paper describes the development of a new facility intended to address the many challenges of the underlying technologies of distributed control. The facility is capable of performing both simulation and hardware studies ranging from component to system level complexity. Its modular and hierarchical structure allows the user to focus their interaction on specific areas of interest.

  12. AstroCloud, a Cyber-Infrastructure for Astronomy Research: Data Archiving and Quality Control

    NASA Astrophysics Data System (ADS)

    He, B.; Cui, C.; Fan, D.; Li, C.; Xiao, J.; Yu, C.; Wang, C.; Cao, Z.; Chen, J.; Yi, W.; Li, S.; Mi, L.; Yang, S.

    2015-09-01

    AstroCloud is a cyber-Infrastructure for Astronomy Research initiated by Chinese Virtual Observatory (China-VO) under funding support from NDRC (National Development and Reform commission) and CAS (Chinese Academy of Sciences)1(Cui et al. 2014). To archive the astronomical data in China, we present the implementation of the astronomical data archiving system (ADAS). Data archiving and quality control are the infrastructure for the AstroCloud. Throughout the data of the entire life cycle, data archiving system standardized data, transferring data, logging observational data, archiving ambient data, And storing these data and metadata in database. Quality control covers the whole process and all aspects of data archiving.

  13. Controlling Hazardous Releases while Protecting Passengers in Civil Infrastructure Systems

    NASA Astrophysics Data System (ADS)

    Rimer, Sara P.; Katopodes, Nikolaos D.

    2015-11-01

    The threat of accidental or deliberate toxic chemicals released into public spaces is a significant concern to public safety, and the real-time detection and mitigation of such hazardous contaminants has the potential to minimize harm and save lives. Furthermore, the safe evacuation of occupants during such a catastrophe is of utmost importance. This research develops a comprehensive means to address such scenarios, through both the sensing and control of contaminants, and the modeling of and potential communication to occupants as they evacuate. A computational fluid dynamics model is developed of a simplified public space characterized by a long conduit (e.g. airport terminal) with unidirectional ambient flow that is capable of detecting and mitigating the hazardous contaminant (via boundary ports) over several time horizons using model predictive control optimization. Additionally, a physical prototype is built to test the real-time feasibility of this computational flow control model. The prototype is a blower wind-tunnel with an elongated test section with the capability of sensing (via digital camera) an injected `contaminant' (propylene glycol smoke), and then mitigating that contaminant using actuators (compressed air operated vacuum nozzles) which are operated by a set of pressure regulators and a programmable controller. Finally, an agent-based model is developed to simulate ``agents'' (i.e. building occupants) as they evacuate a public space, and is coupled with the computational flow control model such that agents must interact with a dynamic, threatening environment. NSF-CMMI #0856438.

  14. Neutron absorbing coating for nuclear criticality control

    DOEpatents

    Mizia, Ronald E.; Wright, Richard N.; Swank, William D.; Lister, Tedd E.; Pinhero, Patrick J.

    2007-10-23

    A neutron absorbing coating for use on a substrate, and which provides nuclear criticality control is described and which includes a nickel, chromium, molybdenum, and gadolinium alloy having less than about 5% boron, by weight.

  15. THE XAL INFRASTRUCTURE FOR HIGH LEVEL CONTROL ROOM APPLICATIONS

    SciTech Connect

    Shishlo, Andrei P; Allen, Christopher K; Chu, Paul; Galambos, John D; Pelaia II, Tom

    2009-01-01

    XAL is a Java programming framework for building high-level control applications related to accelerator physics. The structure, details of implementation, and interaction between components, auxiliary XAL packages, and the latest modifications are discussed. A general overview of XAL applications created for the SNS project is presented.

  16. Green Infrastructure for CSO Control in Kansas City, Missouri

    EPA Science Inventory

    Kansas City Water Services Department (WSD) conducted extensive modeling and economic studies of its combined sewer system over the last 5 years, for submittal of its long term control plan to EPA. These studies and recent funding opportunities have provided the impetus for sele...

  17. Landfills as critical infrastructures: synergy between non-invasive monitoring technologies

    NASA Astrophysics Data System (ADS)

    Scozzari, Andrea; Raco, Brunella; Battaglini, Raffaele

    2014-05-01

    This work deals with a methodology for estimating the behaviour of a landfill system by means of the integration between two different non-invasive technologies. In fact, there is a widespread agreement on the fact that these infrastructures produce about 23% of the total anthropogenic methane released to the atmosphere. Despite that, there's still no internationally accepted protocol to quantify the leakage of biogas from a landfill with a common standard approach. This work proposes an assessment of the performance of a landfill system in terms of biogas release to the atmosphere. Such evaluation is performed by means of a direct measurement of gas flux with the accumulation chamber method, combined with the detection of thermal anomalies by infrared radiometry. In order to derive flux maps from a set of punctual measurements and calculate an overall quantity of emitted gas, a geostatistical technique is necessarily applied and briefly illustrated. A case study regarding an infrastructure located in Tuscany (Italy) is shown, where a discussion about the evolution of the landfill site through successive campaigns is also suggested. The role played by infrared thermography and its synergy with direct flux measurements is clearly perceivable in this context. The main benefit of the presented approach is a significant increase of the energy recovered from the landfill sites by optimising the collection of biogas, which implies a reduction of the total anthropogenic methane originated from the disposal of wastes released to the atmosphere.

  18. Cost Comparison of Conventional Gray Combined Sewer Overflow Control Infrastructure versus a Green/Gray Combination

    EPA Science Inventory

    This paper outlines a life-cycle cost analysis comparing a green (rain gardens) and gray (tunnels) infrastructure combination to a gray-only option to control combined sewer overflow in the Turkey Creek Combined Sewer Overflow Basin, in Kansas City, MO. The plan area of this Bas...

  19. Demonstration of Green/Gray Infrastructure for Combined Sewer Overflow Control

    EPA Science Inventory

    This project is a major national demonstration of the integration of green and gray infrastructure for combined sewer overflow (CSO) control in a cost-effective and environmentally friendly manner. It will use Kansas City, MO, as a case example. The project will have a major in...

  20. 78 FR 73202 - Review and Revision of the National Critical Infrastructure Security and Resilience (NCISR...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-12-05

    ... cybersecurity in securing physical assets. \\2\\ EO 13636 can be found at: http://www.gpo.gov/fdsys/pkg/FR-2013-02...) Research and Development (R&D) Plan Outline and Specific Questions Regarding the Content AGENCY: National... contribute highly relevant content for consideration in the development the National Critical...

  1. Unraveling the complexities of disaster management: a framework for critical social infrastructure to promote population health and resilience.

    PubMed

    O'Sullivan, Tracey L; Kuziemsky, Craig E; Toal-Sullivan, Darene; Corneil, Wayne

    2013-09-01

    Complexity is a useful frame of reference for disaster management and understanding population health. An important means to unraveling the complexities of disaster management is to recognize the interdependencies between health care and broader social systems and how they intersect to promote health and resilience before, during and after a crisis. While recent literature has expanded our understanding of the complexity of disasters at the macro level, few studies have examined empirically how dynamic elements of critical social infrastructure at the micro level influence community capacity. The purpose of this study was to explore empirically the complexity of disasters, to determine levers for action where interventions can be used to facilitate collaborative action and promote health among high risk populations. A second purpose was to build a framework for critical social infrastructure and develop a model to identify potential points of intervention to promote population health and resilience. A community-based participatory research design was used in nine focus group consultations (n = 143) held in five communities in Canada, between October 2010 and March 2011, using the Structured Interview Matrix facilitation technique. The findings underscore the importance of interconnectedness of hard and soft systems at the micro level, with culture providing the backdrop for the social fabric of each community. Open coding drawing upon the tenets of complexity theory was used to develop four core themes that provide structure for the framework that evolved; they relate to dynamic context, situational awareness and connectedness, flexible planning, and collaboration, which are needed to foster adaptive responses to disasters. Seven action recommendations are presented, to promote community resilience and population health.

  2. Control of the Public Health IT Physical Infrastructure: Findings From the 2015 Informatics Capacity and Needs Assessment Survey

    PubMed Central

    Massoudi, Barbara L.; Shah, Gulzar H.

    2016-01-01

    Background: Despite improvements in information technology (IT) infrastructure in public health, there is still much that can be done to improve the adoption of IT in state and local health departments, by better understanding the impact of governance and control structures of physical infrastructure. Objective: To report out the current status of the physical infrastructure control of local health departments (LHDs) and to determine whether there is a significant association between an LHD's governance status and control of the physical infrastructure components. Design: Data came from the 2015 Informatics Capacity and Needs Assessment Survey, conducted by Georgia Southern University in collaboration with the National Association of County and City Health Officials. Participants: A total of 324 LHDs from all 50 states completed the survey (response rate: 50%). Main Outcome Measure(s): Outcome measures included control of LHD physical infrastructure components. Predictors of interest included LHD governance category. Results: The majority of the control of the physical infrastructure components in LHDs resides in external entities. The type of governance structure of the LHD is significantly associated with the control of infrastructure. Conclusions: Additional research is needed to determine best practices in IT governance and control of physical infrastructure for public health. PMID:27684612

  3. Controlling superconductivity by tunable quantum critical points.

    PubMed

    Seo, S; Park, E; Bauer, E D; Ronning, F; Kim, J N; Shim, J-H; Thompson, J D; Park, Tuson

    2015-03-04

    The heavy fermion compound CeRhIn5 is a rare example where a quantum critical point, hidden by a dome of superconductivity, has been explicitly revealed and found to have a local nature. The lack of additional examples of local types of quantum critical points associated with superconductivity, however, has made it difficult to unravel the role of quantum fluctuations in forming Cooper pairs. Here, we show the precise control of superconductivity by tunable quantum critical points in CeRhIn5. Slight tin-substitution for indium in CeRhIn5 shifts its antiferromagnetic quantum critical point from 2.3 GPa to 1.3 GPa and induces a residual impurity scattering 300 times larger than that of pure CeRhIn5, which should be sufficient to preclude superconductivity. Nevertheless, superconductivity occurs at the quantum critical point of the tin-doped metal. These results underline that fluctuations from the antiferromagnetic quantum criticality promote unconventional superconductivity in CeRhIn5.

  4. Extreme Storm Data and Analyses in the Southeastern U.S. - Implications for Critical Infrastructure

    NASA Astrophysics Data System (ADS)

    England, J. F.; Sankovich, V.; Caldwell, J.; Nicholson, T. J.; Randall, J. D.; Kanney, J.

    2010-12-01

    Extreme storm rainfall data in the Southeastern United States are being collected and analyzed to assess their potential impacts on design precipitation amounts. Probable Maximum Precipitation (PMP) from National Weather Service Hydromet Report 51 is currently used for design rainfall estimates in the eastern U.S. The design precipitation estimates are based on an Army Corps of Engineers storm depth-area duration (D-A-D) catalog that is nearly 40 years old. We develop an electronic D-A-D database of SE U.S. storms for the period 1889-1972 from existing sources, describe the spatial and temporal limitations of those data, and how design estimates based on these data have changed over time. An electronic database of individual extreme storms that have occurred since 1972 near the Carolinas is under development. NWS WSR-88D archive radar data, NOAA Multisensor Precipitation Reanalysis data, NCDC COOP station precipitation data, and NOAA HURDAT information are used in storm analysis. We focus on warm-season tropical cyclones, as these systems are the critical storm rainfall-producing mechanisms in the SE U.S. that result in extreme floods. We examine orographic enhancement of rainfall in the Appalachians, in addition to Piedmont and coastal areas. Exceedance probabilities and uncertainties of design precipitation amounts are being estimated, so that risk-based hazard assessments can potentially be explored. Potential effects of climate variability on the extreme storm estimates, at time-scales of interest in design precipitation applications, are also under investigation.

  5. A Flight Control System Architecture for the NASA AirSTAR Flight Test Infrastructure

    NASA Technical Reports Server (NTRS)

    Murch, Austin M.

    2008-01-01

    A flight control system architecture for the NASA AirSTAR infrastructure has been designed to address the challenges associated with safe and efficient flight testing of research control laws in adverse flight conditions. The AirSTAR flight control system provides a flexible framework that enables NASA Aviation Safety Program research objectives, and includes the ability to rapidly integrate and test research control laws, emulate component or sensor failures, inject automated control surface perturbations, and provide a baseline control law for comparison to research control laws and to increase operational efficiency. The current baseline control law uses an angle of attack command augmentation system for the pitch axis and simple stability augmentation for the roll and yaw axes.

  6. Post-disaster supply chain interdependent critical infrastructure system restoration: A review of data necessary and available for modeling

    USGS Publications Warehouse

    Ramachandran, Varun; Long, Suzanna K.; Shoberg, Thomas G.; Corns, Steven; Carlo, Hector J.

    2016-01-01

    The majority of restoration strategies in the wake of large-scale disasters have focused on short-term emergency response solutions. Few consider medium- to long-term restoration strategies to reconnect urban areas to national supply chain interdependent critical infrastructure systems (SCICI). These SCICI promote the effective flow of goods, services, and information vital to the economic vitality of an urban environment. To re-establish the connectivity that has been broken during a disaster between the different SCICI, relationships between these systems must be identified, formulated, and added to a common framework to form a system-level restoration plan. To accomplish this goal, a considerable collection of SCICI data is necessary. The aim of this paper is to review what data are required for model construction, the accessibility of these data, and their integration with each other. While a review of publically available data reveals a dearth of real-time data to assist modeling long-term recovery following an extreme event, a significant amount of static data does exist and these data can be used to model the complex interdependencies needed. For the sake of illustration, a particular SCICI (transportation) is used to highlight the challenges of determining the interdependencies and creating models capable of describing the complexity of an urban environment with the data publically available. Integration of such data as is derived from public domain sources is readily achieved in a geospatial environment, after all geospatial infrastructure data are the most abundant data source and while significant quantities of data can be acquired through public sources, a significant effort is still required to gather, develop, and integrate these data from multiple sources to build a complete model. Therefore, while continued availability of high quality, public information is essential for modeling efforts in academic as well as government communities, a more

  7. AWARE: Adaptive Software Monitoring and Dynamic Reconfiguration for Critical Infrastructure Protection

    DTIC Science & Technology

    2015-04-29

    Evolving quorum sensing in digital organisms, Proceedings of the ACM Genetic and Evolutionary Computation Conference. 08-JUL-09, Montreal, Québec...Philip K. McKinley, David B. Knoester. Effects of Communication Impairments on Quorum Sensing , 2009 Third IEEE International Conference on Self...synchronization, and quorum sensing . Later, we applied neuroevolution to the design of controllers for simulated robots, evaluating the effectiveness of

  8. How Critical Is Critical Infrastructure?

    DTIC Science & Technology

    2015-09-01

    www.history.com/topics/oklahoma-city-bombing. 152 Public Broadcasting Service, “History of Biowarfare,” 2002, http://www.pbs.org/wgbh/ nova /bio terror...2002. http://www.pbs.org/wgbh/ nova /bioterror/hist_nf.html#cult. Rogers, Christopher D. F., Christopher J. Bouch, Stephen Williams. Austin R. G

  9. Controlled Hydrogen Fleet and Infrastructure Demonstration and Validation Project: Fall 2006 Progress Update

    SciTech Connect

    Wipke, K.; Welch, C.; Thomas, H.; Sprik, S.; Gronich, S.; Garbak, J.

    2006-10-01

    The U.S. Department of Energy (DOE) initiated the Controlled Hydrogen Fleet and Infrastructure Demonstration and Validation Project through a competitive solicitation process in 2003. The purpose of this project is to conduct an integrated field validation that simultaneously examines the performance of fuel cell vehicles and the supporting hydrogen infrastructure. Four industry teams have signed cooperative agreements with DOE and are supporting plans for more than 130 fuel cell vehicles and 20 hydrogen refueling stations over the 5-year project duration. This paper provides a status update covering the progress accomplished by the demonstration and validation project over the last six months; the first composite data products from the project were published in March 2006. The composite data products aggregate individual performance into a range that protects the intellectual property of the companies involved, while publicizing the progress the hydrogen and fuel cell industry is making as a whole relative to the program objectives and timeline. Updates to previously published composite data products, such as on-road fuel economy and vehicle/infrastructure safety, will be presented along with new composite data products, such as fuel cell stack efficiency and refueling behavior.

  10. Critical Homeland Infrastructure Protection

    DTIC Science & Technology

    2007-01-01

    available not only within the city government, but also private assets that might be needed in a disaster (e.g., heavy construction equipment, cranes ...Program Officer for Mission Mr. John Keenan DPO-MA Assurance (DPO-MA) Overview The Defense Industrial Base (DIB) Mr. Bill Ennis DCMA Operationalizing

  11. Cybersecurity for Critical Infrastructure

    DTIC Science & Technology

    2015-04-01

    incidents as “cyber attacks.” This mislabeling may be a result of ignorance of proper definitions, convenient stereotyping of network incidents into...burglary, nor do not deploy tanks at restaurants to defend against vandals. The 19 responsibility to provide security for those events and industries

  12. Critical Infrastructure Protection Act

    THOMAS, 113th Congress

    Rep. Franks, Trent [R-AZ-8

    2013-10-30

    12/02/2014 Received in the Senate and Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status Passed HouseHere are the steps for Status of Legislation:

  13. The Pedagogy of Complex Work Support Systems: Infrastructuring Practices and the Production of Critical Awareness in Risk Auditing

    ERIC Educational Resources Information Center

    Mathisen, Arve; Nerland, Monika

    2012-01-01

    This paper employs a socio-technical perspective to explore the role of complex work support systems in organising knowledge and providing opportunities for learning in professional work. Drawing on concepts from infrastructure studies, such systems are seen as work infrastructures which connect information, knowledge, standards and work…

  14. Mathematical modelling of tsunami impacts on critical infrastructures: exposure and severity associated with debris transport at Sines port, Portugal.

    NASA Astrophysics Data System (ADS)

    Conde, Daniel; Baptista, Maria Ana; Sousa Oliveira, Carlos; Ferreira, Rui M. L.

    2015-04-01

    a flux-splitting technique with a reviewed Roe-Riemann solver and appropriate source-term formulations to ensure full conservativeness. Additionally, STAV-2D features Lagrangian-Eulerian coupling enabling solid transport simulation under both continuum and discrete approaches, and has been validated with both laboratory data and paleo-tsunami evidence (Conde, 2013a; Conde, 2013b). The interactions between the inundating flow and coal stockpiles or natural mobile bed reaches were simulated using a continuum debris-flow approach, featuring fractional solid transport, while the containers at the new terminal were advected with an explicit Lagrangian method. The meshwork employed at the port models the existing geometry and structures in great detail, enabling explicitly resolved interactions between the current infrastructure and the overland propagating tsunami. The obtained preliminary results suggest that several structures, some of them critical in a nationwide context, are exposed to tsunami actions. The coal deposition pattern and the final location of monitored containers were determined for two magnitude scenarios (8.5 Mw and 9.5 Mw) in the case of a tsunami generated at the Horseshoe fault and one magnitude scenario (9.5 Mw) for a tsunami generated at the Gorringe bank. The inland washing of the coal stockpiles may impose great loss of both economical and environmental value, while the impact of large mobile debris, such as the containers in the terminal area, significantly increases the severity of infrastructural damage. Acknowledgements This work was partially funded by FEDER, program COMPETE, and by national funds through the Portuguese Foundation for Science and Technology (FCT) with project RECI/ECM-HID/0371/2012. References Baptista M.A. & Miranda, J.M. (2009), Revision of the Portuguese catalog of tsunamis. Nat. Hazards Earth Syst. Sci., 9, 25-42. Canelas, R.; Murillo, J. & Ferreira, R.M.L. (2013), Two-dimensional depth-averaged modelling of dam

  15. Introduction to the U.S. Department of Energy's Controlled Hydrogen Fleet and Infrastructure Demonstration and Validation Project

    SciTech Connect

    Wipke, K.; Welch, C.; Gronich, S.; Garbak, J.; Hooker, D.

    2006-05-01

    Early in 2003, the U.S. Department of Energy (DOE) initiated the ''Controlled Hydrogen Fleet and Infrastructure Demonstration and Validation Project'' solicitation. The purpose of this project is to examine the impact and performance of fuel cell vehicles and the requisite hydrogen infrastructure in real-world applications. The integrated nature of the project enables DOE to work with industry to test, demonstrate, and validate optimal system solutions. Information learned from the vehicles and infrastructure will be fed back into DOE's R&D program to guide and refocus future research as needed, making this project truly a ''learning demonstration''.

  16. Use of Green Infrastructure Integrated with Conventional Gray Infrastructure for Combined Sewer Overflow Control: Kansas City, MO

    EPA Science Inventory

    Advanced design concepts such as Low Impact Development (LID) and Green Solutions (or upland runoff control techniques) are currently being encouraged by the United States Environmental Protection Agency (EPA) as a management practice to contain and control stormwater at the lot ...

  17. Prototyping the E-ELT M1 local control system communication infrastructure

    NASA Astrophysics Data System (ADS)

    Argomedo, J.; Kornweibel, N.; Grudzien, T.; Dimmler, M.; Andolfato, L.; Barriga, P.

    2016-08-01

    The primary mirror of the E-ELT is composed of 798 hexagonal segments of about 1.45 meters across. Each segment can be moved in piston and tip-tilt using three position actuators. Inductive edge sensors are used to provide feedback for global reconstruction of the mirror shape. The E-ELT M1 Local Control System will provide a deterministic infrastructure for collecting edge sensor and actuators readings and distribute the new position actuators references while at the same time providing failure detection, isolation and notification, synchronization, monitoring and configuration management. The present paper describes the prototyping activities carried out to verify the feasibility of the E-ELT M1 local control system communication architecture design and assess its performance and potential limitations.

  18. Tight Glycemic Control in Critically Ill Children.

    PubMed

    Agus, Michael S D; Wypij, David; Hirshberg, Eliotte L; Srinivasan, Vijay; Faustino, E Vincent; Luckett, Peter M; Alexander, Jamin L; Asaro, Lisa A; Curley, Martha A Q; Steil, Garry M; Nadkarni, Vinay M

    2017-02-23

    Background In multicenter studies, tight glycemic control targeting a normal blood glucose level has not been shown to improve outcomes in critically ill adults or children after cardiac surgery. Studies involving critically ill children who have not undergone cardiac surgery are lacking. Methods In a 35-center trial, we randomly assigned critically ill children with confirmed hyperglycemia (excluding patients who had undergone cardiac surgery) to one of two ranges of glycemic control: 80 to 110 mg per deciliter (4.4 to 6.1 mmol per liter; lower-target group) or 150 to 180 mg per deciliter (8.3 to 10.0 mmol per liter; higher-target group). Clinicians were guided by continuous glucose monitoring and explicit methods for insulin adjustment. The primary outcome was the number of intensive care unit (ICU)-free days to day 28. Results The trial was stopped early, on the recommendation of the data and safety monitoring board, owing to a low likelihood of benefit and evidence of the possibility of harm. Of 713 patients, 360 were randomly assigned to the lower-target group and 353 to the higher-target group. In the intention-to-treat analysis, the median number of ICU-free days did not differ significantly between the lower-target group and the higher-target group (19.4 days [interquartile range {IQR}, 0 to 24.2] and 19.4 days [IQR, 6.7 to 23.9], respectively; P=0.58). In per-protocol analyses, the median time-weighted average glucose level was significantly lower in the lower-target group (109 mg per deciliter [IQR, 102 to 118]; 6.1 mmol per liter [IQR, 5.7 to 6.6]) than in the higher-target group (123 mg per deciliter [IQR, 108 to 142]; 6.8 mmol per liter [IQR, 6.0 to 7.9]; P<0.001). Patients in the lower-target group also had higher rates of health care-associated infections than those in the higher-target group (12 of 349 patients [3.4%] vs. 4 of 349 [1.1%], P=0.04), as well as higher rates of severe hypoglycemia, defined as a blood glucose level below 40 mg per

  19. Real-time contaminant sensing and control in civil infrastructure systems

    NASA Astrophysics Data System (ADS)

    Rimer, Sara; Katopodes, Nikolaos

    2014-11-01

    A laboratory-scale prototype has been designed and implemented to test the feasibility of real-time contaminant sensing and control in civil infrastructure systems. A blower wind tunnel is the basis of the prototype design, with propylene glycol smoke as the ``contaminant.'' A camera sensor and compressed-air vacuum nozzle system is set up at the test section portion of the prototype to visually sense and then control the contaminant; a real-time controller is programmed to read in data from the camera sensor and administer pressure to regulators controlling the compressed air operating the vacuum nozzles. A computational fluid dynamics model is being integrated in with this prototype to inform the correct pressure to supply to the regulators in order to optimally control the contaminant's removal from the prototype. The performance of the prototype has been evaluated against the computational fluid dynamics model and is discussed in this presentation. Furthermore, the initial performance of the sensor-control system implemented in the test section of the prototype is discussed. NSF-CMMI 0856438.

  20. "Measuring Operational Effectiveness of Information Technology Infrastructure Library (IIL) and the Impact of Critical Facilities Inclusion in the Process."

    ERIC Educational Resources Information Center

    Woodell, Eric A.

    2013-01-01

    Information Technology (IT) professionals use the Information Technology Infrastructure Library (ITIL) process to better manage their business operations, measure performance, improve reliability and lower costs. This study examined the operational results of those data centers using ITIL against those that do not, and whether the results change…

  1. Stormwater Pollutant Control from Critical Source Areas

    EPA Science Inventory

    Critical source areas include: vehicular maintenance facilities, parking lots and bus terminals, junk and lumber yards, industrial storage facilities, loading docks and refueling areas, manufacturing sites, etc. Addressing pollutant runoff from these areas is an important compon...

  2. Securing energy assets and infrastructure 2007

    SciTech Connect

    2006-06-15

    This report describes in detail the energy industry's challenges and solutions for protecting critical assets including oil and gas infrastructure, transmission grids, power plants, storage, pipelines, and all aspects of strategic industry assets. It includes a special section on cyber-terrorism and protecting control systems. Contents: Section I - Introduction; U.S Energy Trends; Vulnerabilities; Protection Measures. Section II - Sector-wise Vulnerabilities Assessments and Security Measures: Coal, Oil and Petroleum, Natural Gas, Electric Power, Cybersecurity and Control Systems, Key Recommendations; Section III - Critical Infrastructure Protection Efforts: Government Initiatives, Agencies, and Checklists.

  3. Accelerating the translation of research into practice in long term services and supports: a critical need for federal infrastructure at the nexus of aging and disability.

    PubMed

    Washko, Michelle M; Campbell, Margaret; Tilly, Jane

    2012-01-01

    The nexus of aging and disability, characterized by the phenomenon of aging with a disability, will become more visible as the population ages and the number of people with disabilities surviving to midlife increases. This article addresses 3 interrelated issues critical to the fields of aging and disability: increasing demand for community-based long-term services and supports, a paucity of evidence-based programs demonstrating effectiveness in facilitating independence for those aging with a disability, and lack of a federal infrastructure to support coordinated investments in research-to-practice for this population. Suggestions for federal interagency collaborations are given, along with roles for key stakeholders.

  4. Validation of acid washes as critical control points in hazard analysis and critical control point systems.

    PubMed

    Dormedy, E S; Brashears, M M; Cutter, C N; Burson, D E

    2000-12-01

    A 2% lactic acid wash used in a large meat-processing facility was validated as an effective critical control point (CCP) in a hazard analysis and critical control point (HACCP) plan. We examined the microbial profiles of beef carcasses before the acid wash, beef carcasses immediately after the acid wash, beef carcasses 24 h after the acid wash, beef subprimal cuts from the acid-washed carcasses, and on ground beef made from acid-washed carcasses. Total mesophilic, psychrotrophic, coliforms, generic Escherichia coli, lactic acid bacteria, pseudomonads, and acid-tolerant microorganisms were enumerated on all samples. The presence of Salmonella spp. was also determined. Acid washing significantly reduced all counts except for pseudomonads that were present at very low numbers before acid washing. All other counts continued to stay significantly lower (P < 0.05) than those on pre-acid-washed carcasses throughout all processing steps. Total bacteria, coliforms, and generic E. coli enumerated on ground beef samples were more than 1 log cycle lower than those reported in the U.S. Department of Agriculture Baseline data. This study suggests that acid washes may be effective CCPs in HACCP plans and can significantly reduce the total number of microorganisms present on the carcass and during further processing.

  5. Validation of Flight Critical Control Systems

    DTIC Science & Technology

    1991-12-01

    Operations and Control System ADIRS Air Data & Inertial Reference Systems AFB Air Force Base AFTI Advanced Fighter Technology Integration AGARD Advisory...redundancy is employed at the aircraft effector plane. The objective is to generate forces and moments about some control axis, in the case of failure of...Flight Control System", Proceedings of the United States Air Force Academy Advanced Flight Controls Symposium, 198 1. 2-13 2 fFlapper, J.A., and

  6. Reducing combined sewer overflows by using outlet controls for Green Stormwater Infrastructure: Case study in Richmond, Virginia

    NASA Astrophysics Data System (ADS)

    Lucas, William C.; Sample, David J.

    2015-01-01

    Combined sewer overflows (CSOs) are a major problem in many cities. This paper assesses two Low Impact Development (LID) Green Stormwater Infrastructure (GSI) alternatives applied within a 7.05 ha catchment of the Shockoe Creek tributary of the James River in Richmond, Virginia. The LID alternatives were the "Green-Free" (typical free discharge underdrains) and the "Green-Control" (underdrains with flow controlled outlets). These alternatives were compared to two non-LID alternatives: "Existing" (existing conditions) and "Gray" (tunnel storage). A normal year scenario with average rainfall depths and intensities was compared to a scenario with anticipated higher intensity rainfall due to climate change (CC). In the normal year, the Green-Control alternative performed substantially better than both the Green-Free and the Gray alternatives in terms of volume control. However it experienced slightly more CSO events than Grey. The relative performance of both green alternatives improved with the CC climate year, indicating that GSI is more resilient than gray infrastructure. In particular, Green-Control exhibited much better performance. While the gray infrastructure solution reduced CSOs to the fewest number of occurrences, the smallest overflow volumes, lowest peak flows and the most resilient system was obtained by the Green-Control alternative. Since CSO volume is strongly related to the negative ecological impacts from overflows, and CSO occurrences are not, GSI provides a more sustainable solution than gray. These results find that hydraulic control of discharges should be the preferred option when considering GSI in CSO mitigation.

  7. Monitoring of levees, bridges, pipelines, and other critical infrastructure during the 2011 flooding in the Mississippi River Basin: Chapter J in 2011 floods of the central United States

    USGS Publications Warehouse

    Densmore, Brenda K.; Burton, Bethany L.; Dietsch, Benjamin J.; Cannia, James C.; Huizinga, Richard J.

    2014-01-01

    During the 2011 Mississippi River Basin flood, the U.S. Geological Survey evaluated aspects of critical river infrastructure at the request of and in support of local, State, and Federal Agencies. Geotechnical and hydrographic data collected by the U.S. Geological Survey at numerous locations were able to provide needed information about 2011 flood effects to those managing the critical infrastructure. These data were collected and processed in a short time frame to provide managers the ability to make a timely evaluation of the safety of the infrastructure and, when needed, to take action to secure and protect critical infrastructure. Critical infrastructure surveyed by the U.S. Geological Survey included levees, bridges, pipeline crossings, power plant intakes and outlets, and an electrical transmission tower. Capacitively coupled resistivity data collected along the flood-protection levees surrounding the Omaha Public Power District Nebraska City power plant (Missouri River Levee Unit R573), mapped the near-subsurface electrical properties of the levee and the materials immediately below it. The near-subsurface maps provided a better understanding of the levee construction and the nature of the lithology beneath the levee. Comparison of the capacitively coupled resistivity surveys and soil borings indicated that low-resistivity value material composing the levee generally is associated with lean clay and silt to about 2 to 4 meters below the surface, overlying a more resistive layer associated with sand deposits. In general, the resistivity structure becomes more resistive to the south and the southern survey sections correlate well with the borehole data that indicate thinner clay and silt at the surface and thicker sand sequences at depth in these sections. With the resistivity data Omaha Public Power District could focus monitoring efforts on areas with higher resistivity values (coarser-grained deposits or more loosely compacted section), which typically are

  8. Creating a New Model for Mainstreaming Climate Change Adaptation for Critical Infrastructure: The New York City Climate Change Adaptation Task Force and the NYC Panel on Climate Change

    NASA Astrophysics Data System (ADS)

    Rosenzweig, C.; Solecki, W. D.; Freed, A. M.

    2008-12-01

    The New York City Climate Change Adaptation Task Force, launched in August 2008, aims to secure the city's critical infrastructure against rising seas, higher temperatures and fluctuating water supplies projected to result from climate change. The Climate Change Adaptation Task Force is part of PlaNYC, the city's long- term sustainability plan, and is composed of over 30 city and state agencies, public authorities and companies that operate the region's roads, bridges, tunnels, mass transit, and water, sewer, energy and telecommunications systems - all with critical infrastructure identified as vulnerable. It is one of the most comprehensive adaptation efforts yet launched by an urban region. To guide the effort, Mayor Michael Bloomberg has formed the New York City Panel on Climate Change (NPCC), modeled on the Intergovernmental Panel on Climate Change (IPCC). Experts on the panel include climatologists, sea-level rise specialists, adaptation experts, and engineers, as well as representatives from the insurance and legal sectors. The NPCC is developing planning tools for use by the Task Force members that provide information about climate risks, adaptation and risk assessment, prioritization frameworks, and climate protection levels. The advisory panel is supplying climate change projections, helping to identify at- risk infrastructure, and assisting the Task Force in developing adaptation strategies and guidelines for design of new structures. The NPCC will also publish an assessment report in 2009 that will serve as the foundation for climate change adaptation in the New York City region, similar to the IPCC reports. Issues that the Climate Change Adaptation Task Force and the NPCC are addressing include decision- making under climate change uncertainty, effective ways for expert knowledge to be incorporated into public actions, and strategies for maintaining consistent and effective attention to long-term climate change even as municipal governments cycle

  9. Making green infrastructure healthier infrastructure.

    PubMed

    Lõhmus, Mare; Balbus, John

    2015-01-01

    Increasing urban green and blue structure is often pointed out to be critical for sustainable development and climate change adaptation, which has led to the rapid expansion of greening activities in cities throughout the world. This process is likely to have a direct impact on the citizens' quality of life and public health. However, alongside numerous benefits, green and blue infrastructure also has the potential to create unexpected, undesirable, side-effects for health. This paper considers several potential harmful public health effects that might result from increased urban biodiversity, urban bodies of water, and urban tree cover projects. It does so with the intent of improving awareness and motivating preventive measures when designing and initiating such projects. Although biodiversity has been found to be associated with physiological benefits for humans in several studies, efforts to increase the biodiversity of urban environments may also promote the introduction and survival of vector or host organisms for infectious pathogens with resulting spread of a variety of diseases. In addition, more green connectivity in urban areas may potentiate the role of rats and ticks in the spread of infectious diseases. Bodies of water and wetlands play a crucial role in the urban climate adaptation and mitigation process. However, they also provide habitats for mosquitoes and toxic algal blooms. Finally, increasing urban green space may also adversely affect citizens allergic to pollen. Increased awareness of the potential hazards of urban green and blue infrastructure should not be a reason to stop or scale back projects. Instead, incorporating public health awareness and interventions into urban planning at the earliest stages can help insure that green and blue infrastructure achieves full potential for health promotion.

  10. Making green infrastructure healthier infrastructure

    PubMed Central

    Lõhmus, Mare; Balbus, John

    2015-01-01

    Increasing urban green and blue structure is often pointed out to be critical for sustainable development and climate change adaptation, which has led to the rapid expansion of greening activities in cities throughout the world. This process is likely to have a direct impact on the citizens’ quality of life and public health. However, alongside numerous benefits, green and blue infrastructure also has the potential to create unexpected, undesirable, side-effects for health. This paper considers several potential harmful public health effects that might result from increased urban biodiversity, urban bodies of water, and urban tree cover projects. It does so with the intent of improving awareness and motivating preventive measures when designing and initiating such projects. Although biodiversity has been found to be associated with physiological benefits for humans in several studies, efforts to increase the biodiversity of urban environments may also promote the introduction and survival of vector or host organisms for infectious pathogens with resulting spread of a variety of diseases. In addition, more green connectivity in urban areas may potentiate the role of rats and ticks in the spread of infectious diseases. Bodies of water and wetlands play a crucial role in the urban climate adaptation and mitigation process. However, they also provide habitats for mosquitoes and toxic algal blooms. Finally, increasing urban green space may also adversely affect citizens allergic to pollen. Increased awareness of the potential hazards of urban green and blue infrastructure should not be a reason to stop or scale back projects. Instead, incorporating public health awareness and interventions into urban planning at the earliest stages can help insure that green and blue infrastructure achieves full potential for health promotion. PMID:26615823

  11. The TDAQ Analytics Dashboard: a real-time web application for the ATLAS TDAQ control infrastructure

    NASA Astrophysics Data System (ADS)

    Lehmann Miotto, Giovanna; Magnoni, Luca; Sloper, John Erik

    2011-12-01

    The ATLAS Trigger and Data Acquisition (TDAQ) infrastructure is responsible for filtering and transferring ATLAS experimental data from detectors to mass storage systems. It relies on a large, distributed computing system composed of thousands of software applications running concurrently. In such a complex environment, information sharing is fundamental for controlling applications behavior, error reporting and operational monitoring. During data taking, the streams of messages sent by applications and data published via information services are constantly monitored by experts to verify the correctness of running operations and to understand problematic situations. To simplify and improve system analysis and errors detection tasks, we developed the TDAQ Analytics Dashboard, a web application that aims to collect, correlate and visualize effectively this real time flow of information. The TDAQ Analytics Dashboard is composed of two main entities that reflect the twofold scope of the application. The first is the engine, a Java service that performs aggregation, processing and filtering of real time data stream and computes statistical correlation on sliding windows of time. The results are made available to clients via a simple web interface supporting SQL-like query syntax. The second is the visualization, provided by an Ajax-based web application that runs on client's browser. The dashboard approach allows to present information in a clear and customizable structure. Several types of interactive graphs are proposed as widgets that can be dynamically added and removed from visualization panels. Each widget acts as a client for the engine, querying the web interface to retrieve data with desired criteria. In this paper we present the design, development and evolution of the TDAQ Analytics Dashboard. We also present the statistical analysis computed by the application in this first period of high energy data taking operations for the ATLAS experiment.

  12. Critical length scale controls adhesive wear mechanisms

    PubMed Central

    Aghababaei, Ramin; Warner, Derek H.; Molinari, Jean-Francois

    2016-01-01

    The adhesive wear process remains one of the least understood areas of mechanics. While it has long been established that adhesive wear is a direct result of contacting surface asperities, an agreed upon understanding of how contacting asperities lead to wear debris particle has remained elusive. This has restricted adhesive wear prediction to empirical models with limited transferability. Here we show that discrepant observations and predictions of two distinct adhesive wear mechanisms can be reconciled into a unified framework. Using atomistic simulations with model interatomic potentials, we reveal a transition in the asperity wear mechanism when contact junctions fall below a critical length scale. A simple analytic model is formulated to predict the transition in both the simulation results and experiments. This new understanding may help expand use of computer modelling to explore adhesive wear processes and to advance physics-based wear laws without empirical coefficients. PMID:27264270

  13. New York Solar Smart DG Hub-Resilient Solar Project: Economic and Resiliency Impact of PV and Storage on New York Critical Infrastructure

    SciTech Connect

    Anderson, Kate; Burman, Kari; Simpkins, Travis; Helson, Erica; Lisell, Lars

    2016-06-01

    Resilient PV, which is solar paired with storage ('solar-plus-storage'), provides value both during normal grid operation and power outages as opposed to traditional solar PV, which functions only when the electric grid is operating. During normal grid operations, resilient PV systems help host sites generate revenue and/or reduce electricity bill charges. During grid outages, resilient PV provides critical emergency power that can help people in need and ease demand on emergency fuel supplies. The combination of grid interruptions during recent storms, the proliferation of solar PV, and the growing deployment of battery storage technologies has generated significant interest in using these assets for both economic and resiliency benefits. This report analyzes the technical and economic viability for resilient PV on three critical infrastructure sites in New York City (NYC): a school that is part of a coastal storm shelter system, a fire station, and a NYCHA senior center that serves as a cooling center during heat emergencies. This analysis differs from previous solar-plus-storage studies by placing a monetary value on resiliency and thus, in essence, modeling a new revenue stream for the avoided cost of a power outage. Analysis results show that resilient PV is economically viable for NYC's critical infrastructure and that it may be similarly beneficial to other commercial buildings across the city. This report will help city building owners, managers, and policymakers better understand the economic and resiliency benefits of resilient PV. As NYC fortifies its building stock against future storms of increasing severity, resilient PV can play an important role in disaster response and recovery while also supporting city greenhouse gas emission reduction targets and relieving stress to the electric grid from growing power demands.

  14. Critical Issues in Crime Control Policy.

    ERIC Educational Resources Information Center

    Flynn, Edith Elisabeth, Ed.

    1983-01-01

    Entire issue discusses crime control policy in the United States, including such issues as the relation of social and environmental variables to criminal activity, dealing with the career offender, biological correlates of criminal behavior, juvenile delinquency, and white collar crime. (CS)

  15. The Infrastructure Necessary to Support a Sustainable Material Protection, Control and Accounting (MPC&A) Program in Russia

    SciTech Connect

    Bachner, Katherine M.; Mladineo, Stephen V.

    2011-07-20

    The NNSA Material Protection, Control, and Accounting (MPC&A) program has been engaged for fifteen years in upgrading the security of nuclear materials in Russia. Part of the effort has been to establish the conditions necessary to ensure the long-term sustainability of nuclear security. A sustainable program of nuclear security requires the creation of an indigenous infrastructure, starting with sustained high level government commitment. This includes organizational development, training, maintenance, regulations, inspections, and a strong nuclear security culture. The provision of modern physical protection, control, and accounting equipment to the Russian Federation alone is not sufficient. Comprehensive infrastructure projects support the Russian Federation's ability to maintain the risk reduction achieved through upgrades to the equipment. To illustrate the contributions to security, and challenges of implementation, this paper discusses the history and next steps for an indigenous Tamper Indication Device (TID) program, and a Radiation Portal Monitoring (RPM) program.

  16. Stable adaptive control using new critic designs

    NASA Astrophysics Data System (ADS)

    Werbos, Paul J.

    1999-03-01

    Classical adaptive control proves total-system stability for control of linear plants, but only for plants meeting very restrictive assumptions. Approximate Dynamic Programming (ADP) has the potential, in principle, to ensure stability without such tight restrictions. It also offers nonlinear and neural extensions for optimal control, with empirically supported links to what is seen in the brain. However, the relevant ADP methods in use today--TD, HDP, DHP, GDHP--and the Galerkin-based versions of these all have serious limitations when used here as parallel distributed real-time learning systems; either they do not possess quadratic unconditional stability (to be defined) or they lead to incorrect results in the stochastic case. (ADAC or Q- learning designs do not help.) After explaining these conclusions, this paper describes new ADP designs which overcome these limitations. It also addresses the Generalized Moving Target problem, a common family of static optimization problems, and describes a way to stabilize large-scale economic equilibrium models, such as the old long-term energy mode of DOE.

  17. Green Infrastructure for Stormwater Control: Gauging its Effectiveness with Community Partners, Summary of EPA GI Reports

    EPA Science Inventory

    This document is a summary of the green infrastructure reports, journal articles, and conference proceedings published to date. This summary will be updated as more reports are completed. The Environmental Protection Agency’s Office of Research and Development has an ambitious ...

  18. Is the work flow model a suitable candidate for an observatory supervisory control infrastructure?

    NASA Astrophysics Data System (ADS)

    Daly, Philip N.; Schumacher, Germán.

    2016-08-01

    This paper reports on the early investigation of using the work flow model for observatory infrastructure software. We researched several work ow engines and identified 3 for further detailed, study: Bonita BPM, Activiti and Taverna. We discuss the business process model and how it relates to observatory operations and identify a path finder exercise to further evaluate the applicability of these paradigms.

  19. Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack: Critical National Infrastructures

    DTIC Science & Technology

    2008-04-01

    113 Figure 6-7. Container Cranes and Stored Containers ................................................... 117...the vessels using sophisticated cranes designed spe- cifically for the purpose (figure 6-7). The containers typically are loaded onto the chassis of...Container Cranes and Stored Containers Cranes are the key element in the operation of the terminal. The criticality of the cranes is underscored by

  20. Critical review and analysis of the impact of the physical infrastructure on the driving ability, performance, and safety of older adults.

    PubMed

    Bohr, Paula Christine

    2008-01-01

    Literature on the impact of physical infrastructure on older adult safe driving performance was reviewed in 2005 as part of the American Occupational Therapy Association's Evidence-Based Literature Review Project. Existing guidelines for driving environments, related to changes in visual, cognitive, and psychomotor abilities associated with the aging process (as published in the Highway Design Handbook for Older Drivers and Pedestrians, Federal Highway Administration, 2001), are exhaustive, but the authors made no attempt to critically assess the strength of the study design or level of evidence. In laboratory studies since 1999, the interventions lacked applicability to real-life driving environments. Further investigation of the effectiveness of best practice interventions and how the driving environment can better accommodate the needs of older drivers is needed. Occupational therapy interventions that focus on the occupation of driving and compensation and education strategies that allow older adults to drive safely as long as possible are included.

  1. Protecting America: Reorganizing the Nation’s Security Forces to Ensure the Protection of Our Critical Infrastructure

    DTIC Science & Technology

    2004-03-19

    As an example, before the terrorist hijackings of September 11, 2001, airport security was the responsibility of private carriers, state and local...mobilized for airport security , critical site protection, and weapons of mass destruction (WMD) detection, and more than 91,000 HOMELAND SECURITY...Preemptive and Retaliatory Strikes Counter Drugs Missile Defense Military Civil Law Enforcement Airport Security Local and State Consequence Management

  2. Implementation of hazard analysis critical control point in jameed production.

    PubMed

    Al-Saed, A K; Al-Groum, R M; Al-Dabbas, M M

    2012-06-01

    The average of standard plate count and coliforms, Staphylococcus aureus and Salmonella counts for three home-made jameed samples, a traditional fermented dairy product, before applying hazard analysis critical control point system were 2.1 × 10(3), 8.9 × 10(1), 4 × 10(1) and less than 10 cfu/g, respectively. The developed hazard analysis critical control point plan resulted in identifying ten critical control points in the flow chart of jameed production. The critical control points included fresh milk receiving, pasteurization, addition of starter, water and salt, straining, personnel hygiene, drying and packaging. After applying hazard analysis critical control point system, there was significant improvement in the microbiological quality of the home-made jameed. The standard plate count was reduced to 3.1 × 10(2) cfu/g whereas coliform and Staphylococcus aureus counts were less than 10 cfu/g and Salmonella was not detected. Sensory evaluation results of color and flavor of sauce prepared from jameed showed a significant increase in the average scores given after hazard analysis critical control point application.

  3. Towards risk-based management of critical infrastructures : enabling insights and analysis methodologies from a focused study of the bulk power grid.

    SciTech Connect

    Richardson, Bryan T.; LaViolette, Randall A.; Cook, Benjamin Koger

    2008-02-01

    This report summarizes research on a holistic analysis framework to assess and manage risks in complex infrastructures, with a specific focus on the bulk electric power grid (grid). A comprehensive model of the grid is described that can approximate the coupled dynamics of its physical, control, and market components. New realism is achieved in a power simulator extended to include relevant control features such as relays. The simulator was applied to understand failure mechanisms in the grid. Results suggest that the implementation of simple controls might significantly alter the distribution of cascade failures in power systems. The absence of cascade failures in our results raises questions about the underlying failure mechanisms responsible for widespread outages, and specifically whether these outages are due to a system effect or large-scale component degradation. Finally, a new agent-based market model for bilateral trades in the short-term bulk power market is presented and compared against industry observations.

  4. Practice of strict glycemic control in critically ill patients.

    PubMed

    Schultz, Marcus J; de Graaff, Mart J; Royakkers, Annic A N M; van Braam Houckgeest, Floris; van der Sluijs, Johannes P; Kieft, Hans; Spronk, Peter E

    2008-11-01

    Blood glucose control aiming at normoglycemia, frequently referred to as "strict glycemic control", decreases mortality and morbidity of critically ill patients. We searched the medical literature for export opinions, surveys, and clinical reports on blood glucose control in intensive care medicine. While strict glycemic control has been recommended standard of care for critically ill patients, the risk of severe hypoglycemia with strict glycemic control is frequently mentioned by experts. Some rationalize this risk, though others strongly point out the high incidence of hypoglycemia to be (one) reason not to perform strict glycemic control. Implementation of strict glycemic control is far from complete in intensive care units across the world. Frequently local guidelines accept higher blood glucose levels than those with strict glycemic control. Only a minority of retrieved manuscripts are on blood glucose regimens with the lower targets as with strict glycemic control. Hypoglycemia certainly is encountered with blood glucose control, in particular with strict glycemic control. Reports show intensive care-nurses can adequately and safely perform strict glycemic control. Implementation of strict glycemic control is far from complete, at least in part because of the feared risks of hypoglycemia. The preference for hyperglycemia over intermittent hypoglycemia is irrational, however, because there is causal evidence of harm for the former but only associative evidence of harm for the latter. For several reasons it is wise to have strict glycemic control being a nurse-based strategy.

  5. Critical period of weed control in aerobic rice.

    PubMed

    Anwar, M P; Juraimi, A S; Samedani, B; Puteh, A; Man, A

    2012-01-01

    Critical period of weed control is the foundation of integrated weed management and, hence, can be considered the first step to design weed control strategy. To determine critical period of weed control of aerobic rice, field trials were conducted during 2010/2011 at Universiti Putra Malaysia. A quantitative series of treatments comprising two components, (a) increasing duration of weed interference and (b) increasing length of weed-free period, were imposed. Critical period was determined through Logistic and Gompertz equations. Critical period varied between seasons; in main season, it started earlier and lasted longer, as compared to off-season. The onset of the critical period was found relatively stable between seasons, while the end was more variable. Critical period was determined as 7-49 days after seeding in off-season and 7-53 days in main season to achieve 95% of weed-free yield, and 23-40 days in off-season and 21-43 days in main season to achieve 90% of weed-free yield. Since 5% yield loss level is not practical from economic view point, a 10% yield loss may be considered excellent from economic view point. Therefore, aerobic rice should be kept weed-free during 21-43 days for better yield and higher economic return.

  6. A Way to Operationalize the DOD’s Critical Infrastructure Protection Program Using Information Assurance Policies and Technologies

    DTIC Science & Technology

    2005-03-18

    Assurance Support Center ( MASC ), 10 which is an independent operations center, is not integrated into the Global NetOps C2 process. The Global NetOps...Response Center (NSIRC);11 Functional Combatant Commands; and Service/Agency Headquarters. This paper recommends that the MASC , which can also have...This figure has been modified to show an informal reporting relationship with the MASC . FIGURE 1: GLOBAL NETOPS COMMAND AND CONTROL12

  7. Critical issues in process control system security : DHS spares project.

    SciTech Connect

    Hernandez, Jacquelynne; McIntyre, Annie; Henrie, Morgan

    2010-10-01

    The goals of this event are: (1) Discuss the next-generation issues and emerging risks in cyber security for control systems; (2) Review and discuss common control system architectures; (3) Discuss the role of policy, standards, and supply chain issues; (4) Interact to determine the most pertinent risks and most critical areas of the architecture; and (5) Merge feedback from Control System Managers, Engineers, IT, and Auditors.

  8. CRITICALITY CONTROL DURING THE DISMANTLING OF A URANIUM CONVERSION PLANT

    SciTech Connect

    LADURELLE, Laurent; LISBONNE, Pierre

    2003-02-27

    Within the Commissariat a l'Energie Atomique, in the Cadarache Research Center in southern France, the production at the Enriched Uranium Treatment Workshops started in 1965 and ended in 1995. The dismantling is in progress and will last until 2006. The decommissioning is planned in 2007. Since the authorized enrichment in 235U was 10% in some parts of the plant, and unlimited in others, the equipment and procedures were designed for criticality control during the operating period. Despite the best previous removing of the uranium in the inner parts of the equipment, evaluation of the mass of remaining fissile material by in site gamma spectrometry measurement shows that the safety of the ''clean up'' operations requires specific criticality control procedures, this mass being higher than the safe mass. The chosen method is therefore based on the mapping of fissile material in the contaminated parts of the equipment and on the respect of particular rules set for meeting the criticality control standards through mass control. The process equipment is partitioned in separated campaign, and for each campaign the equipment dismantling is conducted with a precise traceability of the pieces, from the equipment to the drum of waste, and the best final evaluation of the mass of fissile material in the drum. The first results show that the mass of uranium found in the dismantled equipment is less than the previous evaluation, and they enable us to confirm that the criticality was safely controlled during the operations. The mass of fissile material remaining in the equipment can be then carefully calculated, when it is lower than the minimal critical mass, and on the basis of a safety analysis, we will be free of any constraints regarding criticality control, this allowing to make procedures easier, and to speed up the operations.

  9. [Attributes of forest infrastructure].

    PubMed

    Gao, Jun-kai; Jin, Ying-shan

    2007-06-01

    This paper discussed the origin and evolution of the conception of ecological infrastructure, the understanding of international communities about the functions of forest, the important roles of forest in China' s economic development and ecological security, and the situations and challenges to the ongoing forestry ecological restoration programs. It was suggested that forest should be defined as an essential infrastructure for national economic and social development in a modern society. The critical functions of forest infrastructure played in the transition of forestry ecological development were emphasized. Based on the synthesis of forest ecosystem features, it was considered that the attributes of forest infrastructure are distinctive, due to the fact that it is constructed by living biological material and diversified in ownership. The forestry ecological restoration program should not only follow the basic principles of infrastructural construction, but also take the special characteristics of forests into consideration in studying the managerial system of the programs. Some suggestions for the ongoing programs were put forward: 1) developing a modern concept of ecosystem where man and nature in harmony is the core, 2) formulating long-term stable investments for forestry ecological restoration programs, 3) implementing forestry ecological restoration programs based on infrastructure construction principles, and 4) managing forests according to the principles of infrastructural construction management.

  10. Final Technical Report: Controlled Hydrogen Fleet and Infrastructure Demonstration and Validation Project

    SciTech Connect

    Ronald Grasman

    2011-12-31

    This report summarizes the work conducted under U.S. Department of Energy (DOE) under contract DE-FC36-04GO14285 by Mercedes-Benz & Research Development, North America (MBRDNA), Chrysler, Daimler, Mercedes Benz USA (MBUSA), BP, DTE Energy and NextEnergy to validate fuel cell technologies for infrastructure, transportation as well as assess technology and commercial readiness for the market. The Mercedes Team, together with its partners, tested the technology by operating and fueling hydrogen fuel cell vehicles under real world conditions in varying climate, terrain and driving conditions. Vehicle and infrastructure data was collected to monitor the progress toward the hydrogen vehicle and infrastructure performance targets of $2.00 to 3.00/gge hydrogen production cost and 2,000-hour fuel cell durability. Finally, to prepare the public for a hydrogen economy, outreach activities were designed to promote awareness and acceptance of hydrogen technology. DTE, BP and NextEnergy established hydrogen filling stations using multiple technologies for on-site hydrogen generation, storage and dispensing. DTE established a hydrogen station in Southfield, Michigan while NextEnergy and BP worked together to construct one hydrogen station in Detroit. BP constructed another fueling station in Burbank, California and provided a full-time hydrogen trailer at San Francisco, California and a hydrogen station located at Los Angeles International Airport in Southern, California. Stations were operated between 2005 and 2011. The Team deployed 30 Gen I Fuel Cell Vehicles (FCVs) in the beginning of the project. While 28 Gen I F-CELLs used the A-Class platform, the remaining 2 were Sprinter delivery vans. Fuel cell vehicles were operated by external customers for real-world operations in various regions (ecosystems) to capture various driving patterns and climate conditions (hot, moderate and cold). External operators consisted of F-CELL partner organizations in California and Michigan

  11. Infrastructure Vulnerability Assessment Model (I-VAM).

    PubMed

    Ezell, Barry Charles

    2007-06-01

    Quantifying vulnerability to critical infrastructure has not been adequately addressed in the literature. Thus, the purpose of this article is to present a model that quantifies vulnerability. Vulnerability is defined as a measure of system susceptibility to threat scenarios. This article asserts that vulnerability is a condition of the system and it can be quantified using the Infrastructure Vulnerability Assessment Model (I-VAM). The model is presented and then applied to a medium-sized clean water system. The model requires subject matter experts (SMEs) to establish value functions and weights, and to assess protection measures of the system. Simulation is used to account for uncertainty in measurement, aggregate expert assessment, and to yield a vulnerability (Omega) density function. Results demonstrate that I-VAM is useful to decisionmakers who prefer quantification to qualitative treatment of vulnerability. I-VAM can be used to quantify vulnerability to other infrastructures, supervisory control and data acquisition systems (SCADA), and distributed control systems (DCS).

  12. Advanced Neuropsychological Diagnostics Infrastructure (ANDI): A Normative Database Created from Control Datasets

    PubMed Central

    de Vent, Nathalie R.; Agelink van Rentergem, Joost A.; Schmand, Ben A.; Murre, Jaap M. J.; Huizenga, Hilde M.

    2016-01-01

    In the Advanced Neuropsychological Diagnostics Infrastructure (ANDI), datasets of several research groups are combined into a single database, containing scores on neuropsychological tests from healthy participants. For most popular neuropsychological tests the quantity, and range of these data surpasses that of traditional normative data, thereby enabling more accurate neuropsychological assessment. Because of the unique structure of the database, it facilitates normative comparison methods that were not feasible before, in particular those in which entire profiles of scores are evaluated. In this article, we describe the steps that were necessary to combine the separate datasets into a single database. These steps involve matching variables from multiple datasets, removing outlying values, determining the influence of demographic variables, and finding appropriate transformations to normality. Also, a brief description of the current contents of the ANDI database is given. PMID:27812340

  13. CRITICALITY SAFETY CONTROLS AND THE SAFETY BASIS AT PFP

    SciTech Connect

    Kessler, S

    2009-04-21

    With the implementation of DOE Order 420.1B, Facility Safety, and DOE-STD-3007-2007, 'Guidelines for Preparing Criticality Safety Evaluations at Department of Energy Non-Reactor Nuclear Facilities', a new requirement was imposed that all criticality safety controls be evaluated for inclusion in the facility Documented Safety Analysis (DSA) and that the evaluation process be documented in the site Criticality Safety Program Description Document (CSPDD). At the Hanford site in Washington State the CSPDD, HNF-31695, 'General Description of the FH Criticality Safety Program', requires each facility develop a linking document called a Criticality Control Review (CCR) to document performance of these evaluations. Chapter 5, Appendix 5B of HNF-7098, Criticality Safety Program, provided an example of a format for a CCR that could be used in lieu of each facility developing its own CCR. Since the Plutonium Finishing Plant (PFP) is presently undergoing Deactivation and Decommissioning (D&D), new procedures are being developed for cleanout of equipment and systems that have not been operated in years. Existing Criticality Safety Evaluations (CSE) are revised, or new ones written, to develop the controls required to support D&D activities. Other Hanford facilities, including PFP, had difficulty using the basic CCR out of HNF-7098 when first implemented. Interpretation of the new guidelines indicated that many of the controls needed to be elevated to TSR level controls. Criterion 2 of the standard, requiring that the consequence of a criticality be examined for establishing the classification of a control, was not addressed. Upon in-depth review by PFP Criticality Safety staff, it was not clear that the programmatic interpretation of criterion 8C could be applied at PFP. Therefore, the PFP Criticality Safety staff decided to write their own CCR. The PFP CCR provides additional guidance for the evaluation team to use by clarifying the evaluation criteria in DOE-STD-3007-2007. In

  14. Automatic process control in anaerobic digestion technology: A critical review.

    PubMed

    Nguyen, Duc; Gadhamshetty, Venkataramana; Nitayavardhana, Saoharit; Khanal, Samir Kumar

    2015-10-01

    Anaerobic digestion (AD) is a mature technology that relies upon a synergistic effort of a diverse group of microbial communities for metabolizing diverse organic substrates. However, AD is highly sensitive to process disturbances, and thus it is advantageous to use online monitoring and process control techniques to efficiently operate AD process. A range of electrochemical, chromatographic and spectroscopic devices can be deployed for on-line monitoring and control of the AD process. While complexity of the control strategy ranges from a feedback control to advanced control systems, there are some debates on implementation of advanced instrumentations or advanced control strategies. Centralized AD plants could be the answer for the applications of progressive automatic control field. This article provides a critical overview of the available automatic control technologies that can be implemented in AD processes at different scales.

  15. Focus control budget analysis for critical layers of flash devices

    NASA Astrophysics Data System (ADS)

    Jang, Jong Hoon; Park, Tony; Park, Kyeong Dong; Hwang, Jong Hyun; Choi, Jin Phil; Kang, Young Seog

    2014-04-01

    As design rule shrinks down, on-product focus control became more important since available depth of focus (DOF) is getting narrower and also required critical dimension uniformity (CDU) becomes tighter. Thus monitoring, control the scanner focus error and reducing the focus control budget of scanner are essential for the production. There are some critical layers which has so narrow DOF margin that hardly be processed on old model scanners. Our study mainly focused on the analysis of the scanner focus control budget of such layers. Among the contributors to the focus budget, inter-field focus uniformity was turned out to be the most dominant. Leveling accuracy and intra-field focus uniformity were also dominant.

  16. Operational models of infrastructure resilience.

    PubMed

    Alderson, David L; Brown, Gerald G; Carlyle, W Matthew

    2015-04-01

    We propose a definition of infrastructure resilience that is tied to the operation (or function) of an infrastructure as a system of interacting components and that can be objectively evaluated using quantitative models. Specifically, for any particular system, we use quantitative models of system operation to represent the decisions of an infrastructure operator who guides the behavior of the system as a whole, even in the presence of disruptions. Modeling infrastructure operation in this way makes it possible to systematically evaluate the consequences associated with the loss of infrastructure components, and leads to a precise notion of "operational resilience" that facilitates model verification, validation, and reproducible results. Using a simple example of a notional infrastructure, we demonstrate how to use these models for (1) assessing the operational resilience of an infrastructure system, (2) identifying critical vulnerabilities that threaten its continued function, and (3) advising policymakers on investments to improve resilience.

  17. Green Infrastructure

    EPA Science Inventory

    Large paved surfaces keep rain from infiltrating the soil and recharging groundwater supplies. Alternatively, Green infrastructure uses natural processes to reduce and treat stormwater in place by soaking up and storing water. These systems provide many environmental, social, an...

  18. Transforming Our Cities: High-Performance Green Infrastructure (WERF Report INFR1R11)

    EPA Science Inventory

    The objective of this project is to demonstrate that the highly distributed real-time control (DRTC) technologies for green infrastructure being developed by the research team can play a critical role in transforming our nation’s urban infrastructure. These technologies include a...

  19. MFC Communications Infrastructure Study

    SciTech Connect

    Michael Cannon; Terry Barney; Gary Cook; George Danklefsen, Jr.; Paul Fairbourn; Susan Gihring; Lisa Stearns

    2012-01-01

    Unprecedented growth of required telecommunications services and telecommunications applications change the way the INL does business today. High speed connectivity compiled with a high demand for telephony and network services requires a robust communications infrastructure.   The current state of the MFC communication infrastructure limits growth opportunities of current and future communication infrastructure services. This limitation is largely due to equipment capacity issues, aging cabling infrastructure (external/internal fiber and copper cable) and inadequate space for telecommunication equipment. While some communication infrastructure improvements have been implemented over time projects, it has been completed without a clear overall plan and technology standard.   This document identifies critical deficiencies with the current state of the communication infrastructure in operation at the MFC facilities and provides an analysis to identify needs and deficiencies to be addressed in order to achieve target architectural standards as defined in STD-170. The intent of STD-170 is to provide a robust, flexible, long-term solution to make communications capabilities align with the INL mission and fit the various programmatic growth and expansion needs.

  20. Cyber and physical infrastructure interdependencies.

    SciTech Connect

    Phillips, Laurence R.; Kelic, Andjelka; Warren, Drake E.

    2008-09-01

    The goal of the work discussed in this document is to understand the risk to the nation of cyber attacks on critical infrastructures. The large body of research results on cyber attacks against physical infrastructure vulnerabilities has not resulted in clear understanding of the cascading effects a cyber-caused disruption can have on critical national infrastructures and the ability of these affected infrastructures to deliver services. This document discusses current research and methodologies aimed at assessing the translation of a cyber-based effect into a physical disruption of infrastructure and thence into quantification of the economic consequences of the resultant disruption and damage. The document discusses the deficiencies of the existing methods in correlating cyber attacks with physical consequences. The document then outlines a research plan to correct those deficiencies. When completed, the research plan will result in a fully supported methodology to quantify the economic consequences of events that begin with cyber effects, cascade into other physical infrastructure impacts, and result in degradation of the critical infrastructure's ability to deliver services and products. This methodology enables quantification of the risks to national critical infrastructure of cyber threats. The work addresses the electric power sector as an example of how the methodology can be applied.

  1. Physical and chemical controls on the critical zone

    USGS Publications Warehouse

    Anderson, S.P.; Von Blanckenburg, F.; White, A.F.

    2007-01-01

    Geochemists have long recognized a correlation between rates of physical denudation and chemical weathering. What underlies this correlation? The Critical Zone can be considered as a feed-through reactor. Downward advance of the weathering front brings unweathered rock into the reactor. Fluids are supplied through precipitation. The reactor is stirred at the top by biological and physical processes. The balance between advance of the weathering front by mechanical and chemical processes and mass loss by denudation fixes the thickness of the Critical Zone reactor. The internal structure of this reactor is controlled by physical processes that create surface area, determine flow paths, and set the residence time of material in the Critical Zone. All of these impact chemical weathering flux.

  2. Controlled Hydrogen Fleet and Infrastructure Demonstration and Validation Project Final Technical Report

    SciTech Connect

    Verma, Puneet; Casey, Dan

    2011-03-29

    This report summarizes the work conducted under U.S. Department of Energy (US DOE) contract DE-FC36-04GO14286 by Chevron Technology Ventures (CTV, a division of Chevron U.S.A., Inc.), Hyundai Motor Company (HMC), and UTC Power (UTCP, a United Technologies company) to validate hydrogen (H2) infrastructure technology and fuel cell hybrid vehicles. Chevron established hydrogen filling stations at fleet operator sites using multiple technologies for on-site hydrogen generation, storage, and dispensing. CTV constructed five demonstration stations to support a vehicle fleet of 33 fuel cell passenger vehicles, eight internal combustion engine (ICE) vehicles, three fuel cell transit busses, and eight internal combustion engine shuttle busses. Stations were operated between 2005 and 2010. HMC introduced 33 fuel cell hybrid electric vehicles (FCHEV) in the course of the project. Generation I included 17 vehicles that used UTCP fuel cell power plants and operated at 350 bar. Generation II included 16 vehicles that had upgraded UTC fuel cell power plants and demonstrated options such as the use of super-capacitors and operation at 700 bar. All 33 vehicles used the Hyundai Tucson sports utility vehicle (SUV) platform. Fleet operators demonstrated commercial operation of the vehicles in three climate zones (hot, moderate, and cold) and for various driving patterns. Fleet operators were Southern California Edison (SCE), AC Transit (of Oakland, California), Hyundai America Technical Center Inc. (HATCI), and the U.S. Army Tank Automotive Research, Development and Engineering Center (TARDEC, in a site agreement with Selfridge Army National Guard Base in Selfridge, Michigan).

  3. Resource modelling for control: how hydrogeological modelling can support a water quality monitoring infrastructure

    NASA Astrophysics Data System (ADS)

    Scozzari, Andrea; Doveri, Marco

    2015-04-01

    The knowledge of the physical/chemical processes implied with the exploitation of water bodies for human consumption is an essential tool for the optimisation of the monitoring infrastructure. Due to their increasing importance in the context of human consumption (at least in the EU), this work focuses on groundwater resources. In the framework of drinkable water networks, the physical and data-driven modelling of transport phenomena in groundwater can help optimising the sensor network and validating the acquired data. This work proposes the combined usage of physical and data-driven modelling as a support to the design and maximisation of results from a network of distributed sensors. In particular, the validation of physico-chemical measurements and the detection of eventual anomalies by a set of continuous measurements take benefit from the knowledge of the domain from which water is abstracted, and its expected characteristics. Change-detection techniques based on non-specific sensors (presented by quite a large literature during the last two decades) have to deal with the classical issues of maximising correct detections and minimising false alarms, the latter of the two being the most typical problem to be faced, in the view of designing truly applicable monitoring systems. In this context, the definition of "anomaly" in terms of distance from an expected value or feature characterising the quality of water implies the definition of a suitable metric and the knowledge of the physical and chemical peculiarities of the natural domain from which water is exploited, with its implications in terms of characteristics of the water resource.

  4. A critical assessment of vector control for dengue prevention.

    PubMed

    Achee, Nicole L; Gould, Fred; Perkins, T Alex; Reiner, Robert C; Morrison, Amy C; Ritchie, Scott A; Gubler, Duane J; Teyssou, Remy; Scott, Thomas W

    2015-05-01

    Recently, the Vaccines to Vaccinate (v2V) initiative was reconfigured into the Partnership for Dengue Control (PDC), a multi-sponsored and independent initiative. This redirection is consistent with the growing consensus among the dengue-prevention community that no single intervention will be sufficient to control dengue disease. The PDC's expectation is that when an effective dengue virus (DENV) vaccine is commercially available, the public health community will continue to rely on vector control because the two strategies complement and enhance one another. Although the concept of integrated intervention for dengue prevention is gaining increasingly broader acceptance, to date, no consensus has been reached regarding the details of how and what combination of approaches can be most effectively implemented to manage disease. To fill that gap, the PDC proposed a three step process: (1) a critical assessment of current vector control tools and those under development, (2) outlining a research agenda for determining, in a definitive way, what existing tools work best, and (3) determining how to combine the best vector control options, which have systematically been defined in this process, with DENV vaccines. To address the first step, the PDC convened a meeting of international experts during November 2013 in Washington, DC, to critically assess existing vector control interventions and tools under development. This report summarizes those deliberations.

  5. A Critical Assessment of Vector Control for Dengue Prevention

    PubMed Central

    Achee, Nicole L.; Gould, Fred; Perkins, T. Alex; Reiner, Robert C.; Morrison, Amy C.; Ritchie, Scott A.; Gubler, Duane J.; Teyssou, Remy; Scott, Thomas W.

    2015-01-01

    Recently, the Vaccines to Vaccinate (v2V) initiative was reconfigured into the Partnership for Dengue Control (PDC), a multi-sponsored and independent initiative. This redirection is consistent with the growing consensus among the dengue-prevention community that no single intervention will be sufficient to control dengue disease. The PDC's expectation is that when an effective dengue virus (DENV) vaccine is commercially available, the public health community will continue to rely on vector control because the two strategies complement and enhance one another. Although the concept of integrated intervention for dengue prevention is gaining increasingly broader acceptance, to date, no consensus has been reached regarding the details of how and what combination of approaches can be most effectively implemented to manage disease. To fill that gap, the PDC proposed a three step process: (1) a critical assessment of current vector control tools and those under development, (2) outlining a research agenda for determining, in a definitive way, what existing tools work best, and (3) determining how to combine the best vector control options, which have systematically been defined in this process, with DENV vaccines. To address the first step, the PDC convened a meeting of international experts during November 2013 in Washington, DC, to critically assess existing vector control interventions and tools under development. This report summarizes those deliberations. PMID:25951103

  6. Criticality of environmental information obtainable by dynamically controlled quantum probes

    NASA Astrophysics Data System (ADS)

    Zwick, Analia; Álvarez, Gonzalo A.; Kurizki, Gershon

    2016-10-01

    A universal approach to decoherence control combined with quantum estimation theory reveals a critical behavior, akin to a phase transition, of the information obtainable by a qubit probe concerning the memory time of environmental fluctuations of generalized Ornstein-Uhlenbeck processes. The criticality is intrinsic to the environmental fluctuations but emerges only when the probe is subject to suitable dynamical control aimed at inferring the memory time. A sharp transition is anticipated between two dynamical phases characterized by either a short or long memory time compared to the probing time. This phase transition of the environmental information is a fundamental feature that characterizes open quantum-system dynamics and is important for attaining the highest estimation precision of the environment memory time under experimental limitations.

  7. Critical dimension control using ultrashort laser for improving wafer critical dimension uniformity

    NASA Astrophysics Data System (ADS)

    Avizemer, Dan; Sharoni, Ofir; Oshemkov, Sergey; Cohen, Avi; Dayan, Asaf; Khurana, Ranjan; Kewley, Dave

    2015-07-01

    Requirements for control of critical dimension (CD) become more demanding as the integrated circuit (IC) feature size specifications become tighter and tighter. Critical dimension control, also known as CDC, is a well-known laser-based process in the IC industry that has proven to be robust, repeatable, and efficient in adjusting wafer CD uniformity (CDU) [Proc. SPIE 6152, 615225 (2006)]. The process involves locally and selectively attenuating the deep ultraviolet light which goes through the photomask to the wafer. The input data for the CDC process in the wafer fab is typically taken from wafer CDU data, which is measured by metrology tools such as wafer-critical dimension-scanning electron microscopy (CD-SEM), wafer optical scatterometry, or wafer level CD (WLCD). The CD correction process uses the CDU data in order to create an attenuation correction contour, which is later applied by the in-situ ultrashort laser system of the CDC to locally change the transmission of the photomask. The ultrashort pulsed laser system creates small, partially scattered, Shade-In-Elements (also known as pixels) by focusing the laser beam inside the quartz bulk of the photomask. This results in the formation of a localized, intravolume, quartz modified area, which has a different refractive index than the quartz bulk itself. The CDC process flow for improving wafer CDU in a wafer fab with detailed explanations of the shading elements formation inside the quartz by the ultrashort pulsed laser is reviewed.

  8. Software and cyber-infrastructure development to control the Observatorio Astrofísico de Javalambre (OAJ)

    NASA Astrophysics Data System (ADS)

    Yanes-Díaz, A.; Antón, J. L.; Rueda-Teruel, S.; Guillén-Civera, L.; Bello, R.; Jiménez-Mejías, D.; Chueca, S.; Lasso-Cabrera, N. M.; Suárez, O.; Rueda-Teruel, F.; Cenarro, A. J.; Cristobal-Hornillos, D.; Marin-Franch, A.; Luis-Simoes, R.; López-Alegre, G.; Rodríguez-Hernández, M. A. C.; Moles, M.; Ederoclite, A.; Varela, J.; Vazquez Ramió, H.; Díaz-Martín, M. C.; Iglesias-Marzoa, R.; Maicas, N.; Lamadrid, J. L.; Lopez-Sainz, A.; Hernández-Fuertes, J.; Valdivielso, L.; Mendes de Oliveira, C.; Penteado, P.; Schoenell, W.; Kanaan, A.

    2014-07-01

    The Observatorio Astrofísico de Javalambre (OAJ) is a new astronomical facility located at the Sierra de Javalambre (Teruel, Spain) whose primary role will be to conduct all-sky astronomical surveys with two unprecedented telescopes of unusually large fields of view: the JST/T250, a 2.55m telescope of 3deg field of view, and the JAST/T80, an 83cm telescope of 2deg field of view. CEFCA engineering team has been designing the OAJ control system as a global concept to manage, monitor, control and maintain all the observatory systems including not only astronomical subsystems but also infrastructure and other facilities. In order to provide quality, reliability and efficiency, the OAJ control system (OCS) design is based on CIA (Control Integrated Architecture) and OEE (Overall Equipment Effectiveness) as a key to improve day and night operation processes. The OCS goes from low level hardware layer including IOs connected directly to sensors and actuators deployed around the whole observatory systems, including telescopes and astronomical instrumentation, up to the high level software layer as a tool to perform efficiently observatory operations. We will give an overview of the OAJ control system design and implementation from an engineering point of view, giving details of the design criteria, technology, architecture, standards, functional blocks, model structure, development, deployment, goals, report about the actual status and next steps.

  9. Communication analysis for feedback control of civil infrastructure using cochlea-inspired sensing nodes

    NASA Astrophysics Data System (ADS)

    Peckens, Courtney A.; Cook, Ireana; Lynch, Jerome P.

    2016-04-01

    Wireless sensor networks (WSNs) have emerged as a reliable, low-cost alternative to the traditional wired sensing paradigm. While such networks have made significant progress in the field of structural monitoring, significantly less development has occurred for feedback control applications. Previous work in WSNs for feedback control has highlighted many of the challenges of using this technology including latency in the wireless communication channel and computational inundation at the individual sensing nodes. This work seeks to overcome some of those challenges by drawing inspiration from the real-time sensing and control techniques employed by the biological central nervous system and in particular the mammalian cochlea. A novel bio-inspired wireless sensor node was developed that employs analog filtering techniques to perform time-frequency decomposition of a sensor signal, thus encompassing the functionality of the cochlea. The node then utilizes asynchronous sampling of the filtered signal to compress the signal prior to communication. This bio-inspired sensing architecture is extended to a feedback control application in order to overcome the traditional challenges currently faced by wireless control. In doing this, however, the network experiences high bandwidths of low-significance information exchange between nodes, resulting in some lost data. This study considers the impact of this lost data on the control capabilities of the bio-inspired control architecture and finds that it does not significantly impact the effectiveness of control.

  10. Flight Test of Composite Model Reference Adaptive Control (CMRAC) Augmentation Using NASA AirSTAR Infrastructure

    NASA Technical Reports Server (NTRS)

    Gregory, Irene M.; Gadient, ROss; Lavretsky, Eugene

    2011-01-01

    This paper presents flight test results of a robust linear baseline controller with and without composite adaptive control augmentation. The flight testing was conducted using the NASA Generic Transport Model as part of the Airborne Subscale Transport Aircraft Research system at NASA Langley Research Center.

  11. An infrastructure with a unified control plane to integrate IP into optical metro networks to provide flexible and intelligent bandwidth on demand for cloud computing

    NASA Astrophysics Data System (ADS)

    Yang, Wei; Hall, Trevor

    2012-12-01

    The Internet is entering an era of cloud computing to provide more cost effective, eco-friendly and reliable services to consumer and business users and the nature of the Internet traffic will undertake a fundamental transformation. Consequently, the current Internet will no longer suffice for serving cloud traffic in metro areas. This work proposes an infrastructure with a unified control plane that integrates simple packet aggregation technology with optical express through the interoperation between IP routers and electrical traffic controllers in optical metro networks. The proposed infrastructure provides flexible, intelligent, and eco-friendly bandwidth on demand for cloud computing in metro areas.

  12. Collaborative-Hybrid Multi-Layer Network Control for Emerging Cyber-Infrastructures

    SciTech Connect

    Lehman, Tom; Ghani, Nasir; Boyd, Eric

    2010-08-31

    At a high level, there were four basic task areas identified for the Hybrid-MLN project. They are: o Multi-Layer, Multi-Domain, Control Plane Architecture and Implementation, including OSCARS layer2 and InterDomain Adaptation, Integration of LambdaStation and Terapaths with Layer2 dynamic provisioning, Control plane software release, Scheduling, AAA, security architecture, Network Virtualization architecture, Multi-Layer Network Architecture Framework Definition; o Heterogeneous DataPlane Testing; o Simulation; o Project Publications, Reports, and Presentations.

  13. Efficient model learning methods for actor-critic control.

    PubMed

    Grondman, Ivo; Vaandrager, Maarten; Buşoniu, Lucian; Babuska, Robert; Schuitema, Erik

    2012-06-01

    We propose two new actor-critic algorithms for reinforcement learning. Both algorithms use local linear regression (LLR) to learn approximations of the functions involved. A crucial feature of the algorithms is that they also learn a process model, and this, in combination with LLR, provides an efficient policy update for faster learning. The first algorithm uses a novel model-based update rule for the actor parameters. The second algorithm does not use an explicit actor but learns a reference model which represents a desired behavior, from which desired control actions can be calculated using the inverse of the learned process model. The two novel methods and a standard actor-critic algorithm are applied to the pendulum swing-up problem, in which the novel methods achieve faster learning than the standard algorithm.

  14. Flow Control of Hazardous Contaminants to Protect Evacuees in Civil Infrastructure Emergency Scenarios

    NASA Astrophysics Data System (ADS)

    Rimer, Sara

    2016-11-01

    The threat of accidental or deliberate toxic chemicals released into public spaces is a significant concern to public safety, and the real-time detection and mitigation of such hazardous contaminants has the potential to minimize harm and save lives. Furthermore, the safe evacuation of occupants during such a catastrophe is of utmost importance. This research develops a comprehensive means to address such scenarios, through both the sensing and control of contaminants, and the modeling of and potential communication to occupants as they evacuate. A computational fluid dynamics model is developed of a simplified public space characterized by a long conduit (e.g. airport terminal) with unidirectional ambient flow that is capable of detecting and mitigating the hazardous contaminant (via boundary ports) over several time horizons using model predictive control optimization. An agent-based model is developed to simulate 'agents' (i.e. building occupants) as they evacuate a public space. The agent-based evacuation model is coupled with the computational flow control model such that agents must interact with a dynamic, threatening environment. Results demonstrate how flow control can be achieved via feedback sensing of location of occupants with desire to minimize contaminant exposure.

  15. Hybrid Multi-Layer Network Control for Emerging Cyber-Infrastructures

    SciTech Connect

    Summerhill, Richard

    2009-08-14

    There were four basic task areas identified for the Hybrid-MLN project. They are: o Multi-Layer, Multi-Domain, Control Plane Architecture and Implementation, o Heterogeneous DataPlane Testing, o Simulation, o Project Publications, Reports, and Presentations.

  16. Tools for 21st Century infrastructure protection

    SciTech Connect

    Trost, S.R.

    1997-07-01

    The President`s Commission on Critical Infrastructure Protection (PCCEP) was formed under Executive Order 13010 to recommend a national strategy for protecting and assuring critical infrastructures. Eight critical infrastructure elements have been identified. This paper provides an overview of tools necessary to conduct in depth analysis and characterization of threats, vulnerabilities, and interdependencies of critical infrastructure subsystems, and their interaction with each other. Particular emphasis is placed on research requirements necessary to develop the next generation of tools. In addition to tools, a number of system level research suggestions are made including developing a system architecture, data flow models, national level resources, and a national test bed.

  17. Defense Infrastructure: DOD Should Improve Reporting and Communication on Its Corrosion Prevention and Control Activities

    DTIC Science & Technology

    2013-05-01

    profit corporation, using a method approved by the Corrosion Office’s Corrosion Prevention and Control Integrated Product Team. We did not, however...private, not-for- profit corporation that provides management consulting, research, and analysis to governments and other nonprofit organizations. In...Utilizing IR Drop Free Sensors and In-Situ Data Acquisition for Cross Country Pipelines 13.3 11.4 18 FNV04 Modeling of Advanced Waterfront Metallic

  18. Safety. [requirements for software to monitor and control critical processes

    NASA Technical Reports Server (NTRS)

    Leveson, Nancy G.

    1991-01-01

    Software requirements, design, implementation, verification and validation, and especially management are affected by the need to produce safe software. This paper discusses the changes in the software life cycle that are necessary to ensure that software will execute without resulting in unacceptable risk. Software is being used increasingly to monitor and control safety-critical processes in which a run-time failure or error could result in unacceptable losses such as death, injury, loss of property, or environmental harm. Examples of such processes maybe found in transportation, energy, aerospace, basic industry, medicine, and defense systems.

  19. The Landscape Evolution Observatory: a large-scale controllable infrastructure to study coupled Earth-surface processes

    USGS Publications Warehouse

    Pangle, Luke A.; DeLong, Stephen B.; Abramson, Nate; Adams, John; Barron-Gafford, Greg A.; Breshears, David D.; Brooks, Paul D.; Chorover, Jon; Dietrich, William E.; Dontsova, Katerina; Durcik, Matej; Espeleta, Javier; Ferre, T. P. A.; Ferriere, Regis; Henderson, Whitney; Hunt, Edward A.; Huxman, Travis E.; Millar, David; Murphy, Brendan; Niu, Guo-Yue; Pavao-Zuckerman, Mitch; Pelletier, Jon D.; Rasmussen, Craig; Ruiz, Joaquin; Saleska, Scott; Schaap, Marcel; Sibayan, Michael; Troch, Peter A.; Tuller, Markus; van Haren, Joost; Zeng, Xubin

    2015-01-01

    Zero-order drainage basins, and their constituent hillslopes, are the fundamental geomorphic unit comprising much of Earth's uplands. The convergent topography of these landscapes generates spatially variable substrate and moisture content, facilitating biological diversity and influencing how the landscape filters precipitation and sequesters atmospheric carbon dioxide. In light of these significant ecosystem services, refining our understanding of how these functions are affected by landscape evolution, weather variability, and long-term climate change is imperative. In this paper we introduce the Landscape Evolution Observatory (LEO): a large-scale controllable infrastructure consisting of three replicated artificial landscapes (each 330 m2 surface area) within the climate-controlled Biosphere 2 facility in Arizona, USA. At LEO, experimental manipulation of rainfall, air temperature, relative humidity, and wind speed are possible at unprecedented scale. The Landscape Evolution Observatory was designed as a community resource to advance understanding of how topography, physical and chemical properties of soil, and biological communities coevolve, and how this coevolution affects water, carbon, and energy cycles at multiple spatial scales. With well-defined boundary conditions and an extensive network of sensors and samplers, LEO enables an iterative scientific approach that includes numerical model development and virtual experimentation, physical experimentation, data analysis, and model refinement. We plan to engage the broader scientific community through public dissemination of data from LEO, collaborative experimental design, and community-based model development.

  20. Vision and Control for UAVs: A Survey of General Methods and of Inexpensive Platforms for Infrastructure Inspection.

    PubMed

    Máthé, Koppány; Buşoniu, Lucian

    2015-06-25

    Unmanned aerial vehicles (UAVs) have gained significant attention in recent years. Low-cost platforms using inexpensive sensor payloads have been shown to provide satisfactory flight and navigation capabilities. In this report, we survey vision and control methods that can be applied to low-cost UAVs, and we list some popular inexpensive platforms and application fields where they are useful. We also highlight the sensor suites used where this information is available. We overview, among others, feature detection and tracking, optical flow and visual servoing, low-level stabilization and high-level planning methods. We then list popular low-cost UAVs, selecting mainly quadrotors. We discuss applications, restricting our focus to the field of infrastructure inspection. Finally, as an example, we formulate two use-cases for railway inspection, a less explored application field, and illustrate the usage of the vision and control techniques reviewed by selecting appropriate ones to tackle these use-cases. To select vision methods, we run a thorough set of experimental evaluations.

  1. The Landscape Evolution Observatory: A large-scale controllable infrastructure to study coupled Earth-surface processes

    NASA Astrophysics Data System (ADS)

    Pangle, Luke A.; DeLong, Stephen B.; Abramson, Nate; Adams, John; Barron-Gafford, Greg A.; Breshears, David D.; Brooks, Paul D.; Chorover, Jon; Dietrich, William E.; Dontsova, Katerina; Durcik, Matej; Espeleta, Javier; Ferre, T. P. A.; Ferriere, Regis; Henderson, Whitney; Hunt, Edward A.; Huxman, Travis E.; Millar, David; Murphy, Brendan; Niu, Guo-Yue; Pavao-Zuckerman, Mitch; Pelletier, Jon D.; Rasmussen, Craig; Ruiz, Joaquin; Saleska, Scott; Schaap, Marcel; Sibayan, Michael; Troch, Peter A.; Tuller, Markus; van Haren, Joost; Zeng, Xubin

    2015-09-01

    Zero-order drainage basins, and their constituent hillslopes, are the fundamental geomorphic unit comprising much of Earth's uplands. The convergent topography of these landscapes generates spatially variable substrate and moisture content, facilitating biological diversity and influencing how the landscape filters precipitation and sequesters atmospheric carbon dioxide. In light of these significant ecosystem services, refining our understanding of how these functions are affected by landscape evolution, weather variability, and long-term climate change is imperative. In this paper we introduce the Landscape Evolution Observatory (LEO): a large-scale controllable infrastructure consisting of three replicated artificial landscapes (each 330 m2 surface area) within the climate-controlled Biosphere 2 facility in Arizona, USA. At LEO, experimental manipulation of rainfall, air temperature, relative humidity, and wind speed are possible at unprecedented scale. The Landscape Evolution Observatory was designed as a community resource to advance understanding of how topography, physical and chemical properties of soil, and biological communities coevolve, and how this coevolution affects water, carbon, and energy cycles at multiple spatial scales. With well-defined boundary conditions and an extensive network of sensors and samplers, LEO enables an iterative scientific approach that includes numerical model development and virtual experimentation, physical experimentation, data analysis, and model refinement. We plan to engage the broader scientific community through public dissemination of data from LEO, collaborative experimental design, and community-based model development.

  2. Vision and Control for UAVs: A Survey of General Methods and of Inexpensive Platforms for Infrastructure Inspection

    PubMed Central

    Máthé, Koppány; Buşoniu, Lucian

    2015-01-01

    Unmanned aerial vehicles (UAVs) have gained significant attention in recent years. Low-cost platforms using inexpensive sensor payloads have been shown to provide satisfactory flight and navigation capabilities. In this report, we survey vision and control methods that can be applied to low-cost UAVs, and we list some popular inexpensive platforms and application fields where they are useful. We also highlight the sensor suites used where this information is available. We overview, among others, feature detection and tracking, optical flow and visual servoing, low-level stabilization and high-level planning methods. We then list popular low-cost UAVs, selecting mainly quadrotors. We discuss applications, restricting our focus to the field of infrastructure inspection. Finally, as an example, we formulate two use-cases for railway inspection, a less explored application field, and illustrate the usage of the vision and control techniques reviewed by selecting appropriate ones to tackle these use-cases. To select vision methods, we run a thorough set of experimental evaluations. PMID:26121608

  3. Master-Slave Control Scheme in Electric Vehicle Smart Charging Infrastructure

    PubMed Central

    Chung, Ching-Yen; Chynoweth, Joshua; Chu, Chi-Cheng; Gadh, Rajit

    2014-01-01

    WINSmartEV is a software based plug-in electric vehicle (PEV) monitoring, control, and management system. It not only incorporates intelligence at every level so that charge scheduling can avoid grid bottlenecks, but it also multiplies the number of PEVs that can be plugged into a single circuit. This paper proposes, designs, and executes many upgrades to WINSmartEV. These upgrades include new hardware that makes the level 1 and level 2 chargers faster, more robust, and more scalable. It includes algorithms that provide a more optimal charge scheduling for the level 2 (EVSE) and an enhanced vehicle monitoring/identification module (VMM) system that can automatically identify PEVs and authorize charging. PMID:24982956

  4. Master-slave control scheme in electric vehicle smart charging infrastructure.

    PubMed

    Chung, Ching-Yen; Chynoweth, Joshua; Chu, Chi-Cheng; Gadh, Rajit

    2014-01-01

    WINSmartEV is a software based plug-in electric vehicle (PEV) monitoring, control, and management system. It not only incorporates intelligence at every level so that charge scheduling can avoid grid bottlenecks, but it also multiplies the number of PEVs that can be plugged into a single circuit. This paper proposes, designs, and executes many upgrades to WINSmartEV. These upgrades include new hardware that makes the level 1 and level 2 chargers faster, more robust, and more scalable. It includes algorithms that provide a more optimal charge scheduling for the level 2 (EVSE) and an enhanced vehicle monitoring/identification module (VMM) system that can automatically identify PEVs and authorize charging.

  5. Early glycemic control in critically ill patients with burn injury.

    PubMed

    Murphy, Claire V; Coffey, Rebecca; Cook, Charles H; Gerlach, Anthony T; Miller, Sidney F

    2011-01-01

    Glucose management in patients with burn injury is often difficult because of their hypermetabolic state with associated hyperglycemia, hyperinsulinemia, and insulin resistance. Recent studies suggest that time to glycemic control is associated with improved outcomes. The authors sought to determine the influence of early glycemic control on the outcomes of critically ill patients with burn injury. A retrospective analysis was performed at the Ohio State University Medical Center. Patients hospitalized with burn injury were enrolled if they were admitted to the intensive care unit between March 1, 2006, and February 28, 2009. Early glycemic control was defined as the achievement of a mean daily blood glucose of ≤150 mg/dl for at least two consecutive days by postburn day 3. Forty-six patients made up the study cohort with 26 achieving early glycemic control and 20 who did not. The two groups were similar at baseline with regard to age, pre-existing diabetes, APACHE II score and burn size and depth. There were no differences in number of surgical interventions, infectious complications, or length of stay between patients who achieved or failed early glycemic control. Failure of early glycemic control was, however, associated with significantly higher mortality both by univariate (35.0 vs 7.7%, P = .03) and multivariate analyses (hazard ratio 6.754 [1.16-39.24], P = .03) adjusting for age, TBSA, and inhalation injury. Failure to achieve early glycemic control in patients with burn injury is associated with an increased risk of mortality. However, further prospective controlled trials are needed to establish causality of this association.

  6. [Critical control points in the pasteurized milk processing fluxogram].

    PubMed

    Lopes, A C; Stamford, T L

    1997-12-01

    With the aim of evaluating the microbiological quality of raw and pasteurized milk and confirm the critical control points in a dairy processing industry (Recife-PE, Brazil), 84 samples of milk were collected from four points of the flow-chart considered critical (raw milk storage tank, outlet of the pasteurizer unit, pasteurized milk storage tank and packing filling machine). All samples were evaluated for the presence of mesophilic and psychotrophics microorganisms. The most probable number (MPN) of total and faecal coliforms were determined. Samples of raw and pasteurized milk (collected from the packing filling machine) were also assessed for the presence of Staphylococcus aureus. The preservation temperature of raw and pasteurized milk in the storage tanks and the MPN of total and faecal coliforms present in the water used by the industry were simultaneously evaluated. High counts of mesophilic and psychotrophics microorganisms, total and faecal coliforms and S. aureus were detect in raw milk production and processing. The pasteurization process reduced the microorganisms to acceptable numbers in the Brazilian standards, however, the statistics analysis showed that the number of microorganisms increased significantly (p < 0.01) in the pasteurized milk storage tank, representing an important point of contamination. The probable reason for this findings was the presence of coliforms in 60% samples of water which was used to clean the milk equipment and the inadequate temperatures in the storage tank. Therefore, the results of the microbiological analysis confirm that the milk maintenance temperature in the storage tanks, the pasteurization and the packaging are critical control points in the pasteurized milk processing fluxogram.

  7. Using bioluminescent biosensors for hazard analysis and critical control point (HACCP) in wastewater control.

    PubMed

    Valat, C; Champiat, D; Degorce-Dumas, J R; Thomas, O

    2004-01-01

    Starting from a new approach for water pollution control and wastewater treatment plant management, the hazard analysis and critical control point (HACCP) quality concept, the interest for the development of new rapid and sensitive methods such as bioluminescence-based methods is evident. After an introduction of the HACCP procedure, a bibliographic study of the bioluminescence potentiality is presented and discussed.

  8. Major safety and operational concerns for fuel debris criticality control

    SciTech Connect

    Tonoike, K.; Sono, H.; Umeda, M.; Yamane, Y.; Kugo, T.; Suyama, K.

    2013-07-01

    It can be seen from the criticality control viewpoint that the requirement divides the decommissioning work into two parts. One is the present condition where it is requested to prevent criticality and to monitor subcritical condition while the debris is untouched. The other is future work where the subcritical condition shall be ensured even if the debris condition is changed intentionally by raising water level, debris retrieval, etc. Repair of damages on the containment vessel (CV) walls is one of the most important objectives at present in the site. On completion of this task, it will become possible to raise water levels in the CVs and to shield the extremely high radiation emitted from the debris but there is a dilemma: raising the water level in the CVs implies to bring the debris closer to criticality because of the role of water for slowing down neutrons. This may be solved if the coolant water will start circulating in closed loops, and if a sufficient concentration of soluble neutron poison (borated water for instance) will be introduced in the loop. It should be still noted that this solution has a risk of worsening corrosion of the CV walls. Design of the retrieval operation of debris should be proposed as early as possible, which must include a neutron poison concentration required to ensure that the debris chunk is subcritical. In parallel, the development of the measurement system to monitor subcritical condition of the debris chunk should be conducted in case the borated water cannot be used continuously. The system would be based on a neutron counter with a high sensitivity and an appropriate shield for gamma-rays, and the adequate statistical signal processing.

  9. Data Diodes in Support of Trustworthy Cyber Infrastructure

    SciTech Connect

    Sheldon, Frederick T; Okhravi, Hamed

    2010-01-01

    Interconnections between process control networks and en- terprise networks has resulted in the proliferation of stan- dard communication protocols in industrial control systems which exposes instrumentation, control systems, and the critical infrastructure components they operate to a variety of cyber attacks. Various standards and technologies have been proposed to protect industrial control systems against cyber attacks and to provide them with confidentiality, in- tegrity, and availability. Among these technologies, data diodes provide protection of critical systems by the means of physically enforcing traffic direction on the network. In order to deploy data diodes effectively, it is imperative to un- derstand the protection they provide, the protection they do not provide, their limitations, and their place in the larger security infrastructure. In this work, we briefly review the security challenges in an industrial control system, study data diodes, their functionalities and limitations, and pro- pose a scheme for their effective deployment in trusted pro- cess control networks (TPCNs.)

  10. Control of critical coupling in a coiled coaxial cable resonator

    NASA Astrophysics Data System (ADS)

    Huang, Jie; Wei, Tao; Wang, Tao; Fan, Jun; Xiao, Hai

    2014-05-01

    This paper reports a coiled coaxial cable resonator fabricated by cutting a slot in a spring-like coiled coaxial cable to produce a periodic perturbation. Electromagnetic coupling between two neighboring slots was observed. By manipulating the number of slots, critical coupling of the coiled coaxial cable resonator can be well controlled. An ultrahigh signal-to-noise ratio (over 50 dB) at the resonant frequency band was experimentally achieved from a coiled coaxial cable resonator with 38 turns. A theoretic model is developed to understand the device physics. The proposed device can be potentially used as a high quality and flexibly designed band-stop filter or a sensor in structural health monitoring.

  11. Coherent optical control of polarization with a critical metasurface

    NASA Astrophysics Data System (ADS)

    Kang, Ming; Chong, Y. D.

    2015-10-01

    We present a mechanism by which a metamaterial surface, or metasurface, can act as an ideal phase-controlled rotatable linear polarizer. Using coupled-mode theory and the idea of coherent perfect absorption into auxiliary polarization channels, we show how the losses and near-field couplings on the metasurface can be balanced so that, with equal-power linearly polarized beams incident on each side, varying the relative phase rotates the polarization angles of the output beams while maintaining zero ellipticity. The system can be described by a non-Hermitian effective Hamiltonian which is parity-time (P T ) symmetric, although there is no actual gain present; perfect polarization conversion occurs at the eigenfrequencies of this Hamiltonian, and the polarization rotating behavior occurs at the critical point of its P T -breaking transition.

  12. Control of critical coupling in a coiled coaxial cable resonator.

    PubMed

    Huang, Jie; Wei, Tao; Wang, Tao; Fan, Jun; Xiao, Hai

    2014-05-01

    This paper reports a coiled coaxial cable resonator fabricated by cutting a slot in a spring-like coiled coaxial cable to produce a periodic perturbation. Electromagnetic coupling between two neighboring slots was observed. By manipulating the number of slots, critical coupling of the coiled coaxial cable resonator can be well controlled. An ultrahigh signal-to-noise ratio (over 50 dB) at the resonant frequency band was experimentally achieved from a coiled coaxial cable resonator with 38 turns. A theoretic model is developed to understand the device physics. The proposed device can be potentially used as a high quality and flexibly designed band-stop filter or a sensor in structural health monitoring.

  13. G proteins: critical control points for transmembrane signals.

    PubMed Central

    Neer, E. J.

    1994-01-01

    Heterotrimeric GTP-binding proteins (G proteins) that are made up of alpha and beta gamma subunits couple many kinds of cell-surface receptors to intracellular effector enzymes or ion channels. Every cell contains several types of receptors, G proteins, and effectors. The specificity with which G protein subunits interact with receptors and effectors defines the range of responses a cell is able to make to an external signal. Thus, the G proteins act as a critical control point that determines whether a signal spreads through several pathways or is focused to a single pathway. In this review, I will summarize some features of the structure and function of mammalian G protein subunits, discuss the role of both alpha and beta gamma subunits in regulation of effectors, the role of the beta gamma subunit in macromolecular assembly, and the mechanisms that might make some responses extremely specific and others rather diffuse. PMID:8142895

  14. Formulation of a strategy for monitoring control integrity in critical digital control systems

    NASA Technical Reports Server (NTRS)

    Belcastro, Celeste M.; Fischl, Robert; Kam, Moshe

    1991-01-01

    Advanced aircraft will require flight critical computer systems for stability augmentation as well as guidance and control that must perform reliably in adverse, as well as nominal, operating environments. Digital system upset is a functional error mode that can occur in electromagnetically harsh environments, involves no component damage, can occur simultaneously in all channels of a redundant control computer, and is software dependent. A strategy is presented for dynamic upset detection to be used in the evaluation of critical digital controllers during the design and/or validation phases of development. Critical controllers must be able to be used in adverse environments that result from disturbances caused by an electromagnetic source such as lightning, high intensity radiated field (HIRF), and nuclear electromagnetic pulses (NEMP). The upset detection strategy presented provides dynamic monitoring of a given control computer for degraded functional integrity that can result from redundancy management errors and control command calculation error that could occur in an electromagnetically harsh operating environment. The use is discussed of Kalman filtering, data fusion, and decision theory in monitoring a given digital controller for control calculation errors, redundancy management errors, and control effectiveness.

  15. Wireless Infrastructure for Performing Monitoring, Diagnostics, and Control HVAC and Other Energy-Using Systems in Small Commercial Buildings

    SciTech Connect

    Patrick O'Neill

    2009-06-30

    This project focused on developing a low-cost wireless infrastructure for monitoring, diagnosing, and controlling building systems and equipment. End users receive information via the Internet and need only a web browser and Internet connection. The system used wireless communications for: (1) collecting data centrally on site from many wireless sensors installed on building equipment, (2) transmitting control signals to actuators and (3) transmitting data to an offsite network operations center where it is processed and made available to clients on the Web (see Figure 1). Although this wireless infrastructure can be applied to any building system, it was tested on two representative applications: (1) monitoring and diagnostics for packaged rooftop HVAC units used widely on small commercial buildings and (2) continuous diagnosis and control of scheduling errors such as lights and equipment left on during unoccupied hours. This project developed a generic infrastructure for performance monitoring, diagnostics, and control, applicable to a broad range of building systems and equipment, but targeted specifically to small to medium commercial buildings (an underserved market segment). The proposed solution is based on two wireless technologies. The first, wireless telemetry, is used for cell phones and paging and is reliable and widely available. This risk proved to be easily managed during the project. The second technology is on-site wireless communication for acquiring data from sensors and transmitting control signals. The technology must enable communication with many nodes, overcome physical obstructions, operate in environments with other electrical equipment, support operation with on-board power (instead of line power) for some applications, operate at low transmission power in license-free radio bands, and be low cost. We proposed wireless mesh networking to meet these needs. This technology is relatively new and has been applied only in research and tests

  16. 78 FR 65675 - National Infrastructure Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-01

    ... comments after the presentation of the report from the Regional Resilience Working Group, and after the... security and resilience of the Nation's critical infrastructure sectors. The NIAC will meet to discuss issues relevant to the critical infrastructure security and resilience as directed by the President....

  17. 21 CFR 120.8 - Hazard Analysis and Critical Control Point (HACCP) plan.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 21 Food and Drugs 2 2010-04-01 2010-04-01 false Hazard Analysis and Critical Control Point (HACCP... SERVICES (CONTINUED) FOOD FOR HUMAN CONSUMPTION HAZARD ANALYSIS AND CRITICAL CONTROL POINT (HACCP) SYSTEMS General Provisions § 120.8 Hazard Analysis and Critical Control Point (HACCP) plan. (a) HACCP plan....

  18. Critical dimension uniformity control with combined ellipsometry and reflectometry

    NASA Astrophysics Data System (ADS)

    Opsal, Jon; Leng, Jingmin; Cao, Xuelong

    2005-05-01

    In the 90nm node and beyond, Critical Dimension Uniformity (CDU) control is essential for today's high performance IC devices. The desired control of CDU is just under 2nm (3 sigma) across a 300mm wafer with 577 die. In this study we used an Opti-Probe 7341 RT/CD system that combines broadband (190-840 nm) spectroscopic ellipsometry (SE), spectroscopic reflectometry (BB), single wavelength (673 nm) beam profile reflectometry (BPR) and single wavelength (633nm) absolute ellipsometry (AE). All of the above technologies were used to characterize the optical dispersions of the individual films in the stack of interest, resist/barc/sion/poly/oxide/silicon. We then used these dispersion results and the SE and BB technologies to characterize the CDU of the patterned wafer. With the SE technology we measured CDU's in the range of 1.9-2.0 nm compared with BB measured CDU's in the range of 4-5 nm, both SE and BB wavelength were in the range of 240 nm-780 nm. However, if the wavelength range of SE and BB were extended to 190nm-840 nm, the CDU with SE stayed at the same level while that of BB reduced a factor of 2 to about 2.0-2.5 nm.

  19. Cyber Threats to Nuclear Infrastructures

    SciTech Connect

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  20. Critical limits for the control points for halal poultry slaughter.

    PubMed

    Shahdan, Intan Azura; Regenstein, Joe Mac; Rahman, Mohammad Tariqur

    2016-12-13

    This study proposes critical limits (CL) for control points for halal slaughter (CPHS). Previously, 6 control points (CP) were determined, and CL for these 6 CPHS are suggested based on: 1) a literature survey for the CL for CP 1 (poultry breeding, rearing, and poultry feed) and CP 2 (welfare of poultry during transportation and lairage); 2) a field survey of slaughter plants in Kuantan (Malaysia) for CP 3 (immobilization), CP 4 (slaughter), CP 5 (time for full bleed-out), and CP 6 (washing and packaging); and 3) controlled experiments to refine the CL for CP 3, 4, and 5. The CL for CP 1 focused on stress reduction during rearing and use of substances that could compromise poultry meat wholesomeness. The CL for CP 2 emphasizes humane best-practices for handling poultry during lairage. The CL for CP 3 suggests a gap of 5 s between 2 shackles if only one shackler is employed and shackling times of <1 min for live chickens. In countries permitting water-bath electrical stunning of halal poultry, the stunning current needed to induce unconsciousness must be defined for the breed and bird size but not cause any chicken deaths. The CL for CP 4 mandates the recitation of the tasmiyah (the invocation), which if done for every chicken, will require ≥5 s between stunning and neck cutting. The CL for CP 4 also includes information about the slaughter knife. In CP 5 the recommended minimum time between neck cutting and scalding is 9.5 min. Finally, the CL for CP 6 emphasizes good supply chain hygiene and zero adulteration from haram species and substances.

  1. 21 CFR 113.89 - Deviations in processing, venting, or control of critical factors.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... critical factors. 113.89 Section 113.89 Food and Drugs FOOD AND DRUG ADMINISTRATION, DEPARTMENT OF HEALTH..., venting, or control of critical factors. Whenever any process is less than the scheduled process or when critical factors are out of control for any low-acid food or container system as disclosed from records...

  2. 75 FR 8239 - School Food Safety Program Based on Hazard Analysis and Critical Control Point Principles (HACCP...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-24

    ... Critical Control Point Principles (HACCP); Approval of Information Collection Request AGENCY: Food and... rule entitled School Food Safety Program Based on Hazard Analysis and Critical Control Point...

  3. 21 CFR 120.8 - Hazard Analysis and Critical Control Point (HACCP) plan.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... General Provisions § 120.8 Hazard Analysis and Critical Control Point (HACCP) plan. (a) HACCP plan. Each.... Sanitation controls may be included in the HACCP plan. However, to the extent that they are monitored in... 21 Food and Drugs 2 2011-04-01 2011-04-01 false Hazard Analysis and Critical Control Point...

  4. Critical Technology Assessment of Five Axis Simultaneous Control Machine Tools

    DTIC Science & Technology

    2009-07-01

    assessment, BIS specifically examined: • The application of Export Control Classification Numbers ( ECCN ) 2B001.b.2 and 2B001.c.2 controls and related...availability of certain five axis simultaneous control mills, mill/turns, and machining centers controlled by ECCN 2B001.b.2 (but not grinders controlled by... ECCN 2B001.c.2) exists to China and Taiwan, which both have an indigenous capability to produce five axis simultaneous control machine tools with

  5. Cross-CZO Contrasts: Aspect Controls and Critical Zone Architecture

    NASA Astrophysics Data System (ADS)

    Clarke, B. A.; Kirby, E.; Burbank, D. W.; West, N.

    2013-12-01

    We investigate aspect controls on Critical Zone (CZ) architecture, mobile regolith transport, and landscape morphology, based on a cross-CZO comparison of 1) Niwot Ridge, Boulder Creek CZO (BcCZO), a high alpine site with minimal soil/veg cover, characterized by steep S-facing and shallow N-facing hillslopes and 2) Shale Hills CZO (SSHCZO), a temperate, densely-forested, soil-mantled site with steep N-facing slopes and shallow S-facing slopes. We use high-resolution 2D seismic tomography of P- and S-wave velocities (Vp, Vs) to characterize CZ architecture and constrain depths of weathering fronts, as well as the thickness, character, and transport efficiency of mobile regolith layers. The 2D imagery allows assessment of changes in material properties both lateral and vertical (depth), thus mapping variability in CZ structures along the survey profile. The combination of Vp and Vs are used to better quantify material properties, (i.e., elastics moduli, density, fractures porosity), rock-mass strength, and weathering intensity - and when applied to the very shallow subsurface can help constrain the transport efficiency (strength or erodibility) of mobile regolith layers On Niwot Ridge, the depth of the weathering front and thickness of mobile regolith are substantially greater on shallower N-facing slopes, consistent with frost/freeze driven processes. However, the depth of the weathering front far exceeds modeled extents of frost-cracking depth (for past or present climates), suggesting additional processes also influence deep weathering. Mobile regolith is considerably thicker on shallow N-facing aspects and composed of large, disintegrated cobbles, however, velocity-based estimates of transport efficiency are higher on S-facing slopes composed of small talus blocks and thin soil/veg cover. Although, thin mobile regolith on S-facing slopes may be weak (slow V), the lower gradient of N-facing slopes and southward asymmetry of the ridge divide, suggests that

  6. Controlling avalanche criticality in 2D nano arrays

    PubMed Central

    Zohar, Y. C.; Yochelis, S.; Dahmen, K. A.; Jung, G.; Paltiel, Y.

    2013-01-01

    Many physical systems respond to slowly changing external force through avalanches spanning broad range of sizes. Some systems crackle even without apparent external force, such as bursts of neuronal activity or charge transfer avalanches in 2D molecular layers. Advanced development of theoretical models describing disorder-induced critical phenomena calls for experiments probing the dynamics upon tuneable disorder. Here we show that isomeric structural transitions in 2D organic self-assembled monolayer (SAM) exhibit critical dynamics with experimentally tuneable disorder. The system consists of field effect transistor coupled through SAM to illuminated semiconducting nanocrystals (NCs). Charges photoinduced in NCs are transferred through SAM to the transistor surface and modulate its conductivity. Avalanches of isomeric structural transitions are revealed by measuring the current noise I(t) of the transistor. Accumulated surface traps charges reduce dipole moments of the molecules, decrease their coupling, and thus decrease the critical disorder of the SAM enabling its tuning during experiments. PMID:23677142

  7. Controlling avalanche criticality in 2D nano arrays.

    PubMed

    Zohar, Y C; Yochelis, S; Dahmen, K A; Jung, G; Paltiel, Y

    2013-01-01

    Many physical systems respond to slowly changing external force through avalanches spanning broad range of sizes. Some systems crackle even without apparent external force, such as bursts of neuronal activity or charge transfer avalanches in 2D molecular layers. Advanced development of theoretical models describing disorder-induced critical phenomena calls for experiments probing the dynamics upon tuneable disorder. Here we show that isomeric structural transitions in 2D organic self-assembled monolayer (SAM) exhibit critical dynamics with experimentally tuneable disorder. The system consists of field effect transistor coupled through SAM to illuminated semiconducting nanocrystals (NCs). Charges photoinduced in NCs are transferred through SAM to the transistor surface and modulate its conductivity. Avalanches of isomeric structural transitions are revealed by measuring the current noise I(t) of the transistor. Accumulated surface traps charges reduce dipole moments of the molecules, decrease their coupling, and thus decrease the critical disorder of the SAM enabling its tuning during experiments.

  8. Strategic plan for infrastructure optimization

    SciTech Connect

    Donley, C.D.

    1998-05-27

    This document represents Fluor Daniel Hanford`s and DynCorp`s Tri-Cities Strategic Plan for Fiscal Years 1998--2002, the road map that will guide them into the next century and their sixth year of providing safe and cost effective infrastructure services and support to the Department of Energy (DOE) and the Hanford Site. The Plan responds directly to the issues raised in the FDH/DOE Critical Self Assessment specifically: (1) a strategy in place to give DOE the management (systems) and physical infrastructure for the future; (2) dealing with the barriers that exist to making change; and (3) a plan to right-size the infrastructure and services, and reduce the cost of providing services. The Plan incorporates initiatives from several studies conducted in Fiscal Year 1997 to include: the Systems Functional Analysis, 200 Area Water Commercial Practices Plan, $ million Originated Cost Budget Achievement Plan, the 1OO Area Vacate Plan, the Railroad Shutdown Plan, as well as recommendations from the recently completed Review of Hanford Electrical Utility. These and other initiatives identified over the next five years will result in significant improvements in efficiency, allowing a greater portion of the infrastructure budget to be applied to Site cleanup. The Plan outlines a planning and management process that defines infrastructure services and structure by linking site technical base line data and customer requirements to work scope and resources. The Plan also provides a vision of where Site infrastructure is going and specific initiatives to get there.

  9. The Effect of an Electromagnetic Pulse Strike on the Transportation Infrastructure of Kansas City

    DTIC Science & Technology

    2014-06-13

    System CIKR Critical Infrastructure and Key Resources DCS Digital Control Systems DOD Department of Defense ECM Electronic Control Module EFI... Electronic Fuel Injection EMP Electromagnetic Pulse HEMP High-Altitude Electromagnetic Pulse HMI Human Machine Interface ISO Independent System...and electronic systems to produce damaging current and voltage surges (Riddle 2004, 2). Flash over: A plasma arc initiated by some event such as

  10. Evaluating the impacts of new walking and cycling infrastructure on carbon dioxide emissions from motorized travel: a controlled longitudinal study

    PubMed Central

    Brand, Christian; Goodman, Anna; Ogilvie, David

    2015-01-01

    Walking and cycling is widely assumed to substitute for at least some motorized travel and thereby reduce energy use and carbon dioxide (CO2) emissions. While the evidence suggests that a supportive built environment may be needed to promote walking and cycling, it is unclear whether and how interventions in the built environment that attract walkers and cyclists may reduce transport CO2 emissions. Our aim was therefore to evaluate the effects of providing new infrastructure for walking and cycling on CO2 emissions from motorised travel. A cohort of 1849 adults completed questionnaires at baseline (2010) and one-year follow-up (2011), before and after the construction of new high-quality routes provided as part of the Sustrans Connect2 programme in three UK municipalities. A second cohort of 1510 adults completed questionnaires at baseline and two-year follow-up (2012). The participants reported their past-week travel behaviour and car characteristics from which CO2 emissions by mode and purpose were derived using methods described previously. A set of exposure measures of proximity to and use of the new routes were derived. Overall transport CO2 emissions decreased slightly over the study period, consistent with a secular trend in the case study regions. As found previously the new infrastructure was well used at one- and two-year follow-up, and was associated with population-level increases in walking, cycling and physical activity at two-year follow-up. However, these effects did not translate into sizeable CO2 effects as neither living near the infrastructure nor using it predicted changes in CO2 emissions from motorised travel, either overall or disaggregated by journey purpose. This lack of a discernible effect on travel CO2 emissions are consistent with an interpretation that some of those living nearer the infrastructure may simply have changed where they walked or cycled, while others may have walked or cycled more but few, if any, may have substituted

  11. Evaluating the impacts of new walking and cycling infrastructure on carbon dioxide emissions from motorized travel: a controlled longitudinal study.

    PubMed

    Brand, Christian; Goodman, Anna; Ogilvie, David

    2014-09-01

    Walking and cycling is widely assumed to substitute for at least some motorized travel and thereby reduce energy use and carbon dioxide (CO2) emissions. While the evidence suggests that a supportive built environment may be needed to promote walking and cycling, it is unclear whether and how interventions in the built environment that attract walkers and cyclists may reduce transport CO2 emissions. Our aim was therefore to evaluate the effects of providing new infrastructure for walking and cycling on CO2 emissions from motorised travel. A cohort of 1849 adults completed questionnaires at baseline (2010) and one-year follow-up (2011), before and after the construction of new high-quality routes provided as part of the Sustrans Connect2 programme in three UK municipalities. A second cohort of 1510 adults completed questionnaires at baseline and two-year follow-up (2012). The participants reported their past-week travel behaviour and car characteristics from which CO2 emissions by mode and purpose were derived using methods described previously. A set of exposure measures of proximity to and use of the new routes were derived. Overall transport CO2 emissions decreased slightly over the study period, consistent with a secular trend in the case study regions. As found previously the new infrastructure was well used at one- and two-year follow-up, and was associated with population-level increases in walking, cycling and physical activity at two-year follow-up. However, these effects did not translate into sizeable CO2 effects as neither living near the infrastructure nor using it predicted changes in CO2 emissions from motorised travel, either overall or disaggregated by journey purpose. This lack of a discernible effect on travel CO2 emissions are consistent with an interpretation that some of those living nearer the infrastructure may simply have changed where they walked or cycled, while others may have walked or cycled more but few, if any, may have substituted

  12. THE CRITICAL-PATH METHOD OF CONSTRUCTION CONTROL.

    ERIC Educational Resources Information Center

    DOMBROW, RODGER T.; MAUCHLY, JOHN

    THIS DISCUSSION PRESENTS A DEFINITION AND BRIEF DESCRIPTION OF THE CRITICAL-PATH METHOD AS APPLIED TO BUILDING CONSTRUCTION. INTRODUCING REMARKS CONSIDER THE MOST PERTINENT QUESTIONS PERTAINING TO CPM AND THE NEEDS ASSOCIATED WITH MINIMIZING TIME AND COST ON CONSTRUCTION PROJECTS. SPECIFIC DISCUSSION INCLUDES--(1) ADVANTAGES OF NETWORK TECHNIQUES,…

  13. Towards a controlled study of the QCD critical point

    NASA Astrophysics Data System (ADS)

    de Forcrand, Ph; Philipsen, O.

    2008-10-01

    The phase diagram of QCD, as a function of temperature T and quark chemical potential μ, may contain a critical point (μE, TE) whose non-perturbative nature makes it a natural object of lattice studies. However, the sign problem prevents the application of standard Monte Carlo techniques at nonzero baryon density. We have been pursuing an approach free of the sign problem, where the chemical potential is taken as imaginary and the results are Taylor expanded in μ/T about μ = 0, then analytically continued to real μ. Within this approach we have determined the sensitivity of the critical chemical potential μE to the quark mass, d(\\mu_E)^2/dm_q|_{\\mu_E=0} . Our study indicates that the critical point moves to a larger chemical potential as the quark mass decreases. This finding, contrary to common wisdom, implies that the deconfinement crossover, which takes place in QCD at μ = 0 when the temperature is raised, will remain a crossover in the μ-region where our Taylor expansion can be trusted. If this result, obtained on a coarse lattice, is confirmed by simulations on finer lattices now in progress, then we predict that no chiral critical point will be found for μB lsim 500 MeV, unless the phase diagram contains additional transitions.

  14. Control of finite critical behaviour in a small-scale social system

    NASA Astrophysics Data System (ADS)

    Daniels, Bryan C.; Krakauer, David C.; Flack, Jessica C.

    2017-02-01

    Many adaptive systems sit near a tipping or critical point. For systems near a critical point small changes to component behaviour can induce large-scale changes in aggregate structure and function. Criticality can be adaptive when the environment is changing, but entails reduced robustness through sensitivity. This tradeoff can be resolved when criticality can be tuned. We address the control of finite measures of criticality using data on fight sizes from an animal society model system (Macaca nemestrina, n=48). We find that a heterogeneous, socially organized system, like homogeneous, spatial systems (flocks and schools), sits near a critical point; the contributions individuals make to collective phenomena can be quantified; there is heterogeneity in these contributions; and distance from the critical point (DFC) can be controlled through biologically plausible mechanisms exploiting heterogeneity. We propose two alternative hypotheses for why a system decreases the distance from the critical point.

  15. Control of finite critical behaviour in a small-scale social system

    PubMed Central

    Daniels, Bryan C.; Krakauer, David C.; Flack, Jessica C.

    2017-01-01

    Many adaptive systems sit near a tipping or critical point. For systems near a critical point small changes to component behaviour can induce large-scale changes in aggregate structure and function. Criticality can be adaptive when the environment is changing, but entails reduced robustness through sensitivity. This tradeoff can be resolved when criticality can be tuned. We address the control of finite measures of criticality using data on fight sizes from an animal society model system (Macaca nemestrina, n=48). We find that a heterogeneous, socially organized system, like homogeneous, spatial systems (flocks and schools), sits near a critical point; the contributions individuals make to collective phenomena can be quantified; there is heterogeneity in these contributions; and distance from the critical point (DFC) can be controlled through biologically plausible mechanisms exploiting heterogeneity. We propose two alternative hypotheses for why a system decreases the distance from the critical point. PMID:28186194

  16. Nuclear hybrid energy infrastructure

    SciTech Connect

    Agarwal, Vivek; Tawfik, Magdy S.

    2015-02-01

    The nuclear hybrid energy concept is becoming a reality for the US energy infrastructure where combinations of the various potential energy sources (nuclear, wind, solar, biomass, and so on) are integrated in a hybrid energy system. This paper focuses on challenges facing a hybrid system with a Small Modular Reactor at its core. The core of the paper will discuss efforts required to develop supervisory control center that collects data, supports decision-making, and serves as an information hub for supervisory control center. Such a center will also be a model for integrating future technologies and controls. In addition, advanced operations research, thermal cycle analysis, energy conversion analysis, control engineering, and human factors engineering will be part of the supervisory control center. Nuclear hybrid energy infrastructure would allow operators to optimize the cost of energy production by providing appropriate means of integrating different energy sources. The data needs to be stored, processed, analyzed, trended, and projected at right time to right operator to integrate different energy sources.

  17. Critical Branches and Lucky Loads in Control-Independence Architectures

    ERIC Educational Resources Information Center

    Malik, Kshitiz

    2009-01-01

    Branch mispredicts have a first-order impact on the performance of integer applications. Control Independence (CI) architectures aim to overlap the penalties of mispredicted branches with useful execution by spawning control-independent work as separate threads. Although control independent, such threads may consume register and memory values…

  18. International Needs for Infrastructure Nde

    NASA Astrophysics Data System (ADS)

    Popovics, John; Boller, Christian; Cawley, Peter; Spencer, Billie F.; Wang, Ming L.; Washer, Glenn

    2009-03-01

    The Aging of Infrastructure is a world wide problem of increasing importance, with the specifics varying from region to region depending on the age and nature of critical structures. It is clear that the NDE and SHM tools being developed by the QNDE community can play an important role in addressing the Aging Infrastructure problem, and the special evening session is designed to provide perspective to the developers of that technology through an overview of the international needs. A panel of speakers with experience with the unique situations in different regions of the world will first make a series of short presentations. This will be followed by a general discussion period.

  19. Self repair of impacts, higher energy impacts, and earthquake damage in critical targets such as infrastructure components made of polymers and concrete

    NASA Astrophysics Data System (ADS)

    Dry, Carolyn

    2007-04-01

    The goal of our research has been to develop self-repairing matrices with unique toughness and strength for infrastructure and vehicles. Our revolutionary approach involves the autonomous release of repair chemicals from within the matrix itself. The repair agents are contained in hollow, structural fibers or beads that are embedded within the matrix. Under stress, the matrix senses external environmental factors and reacts by releasing the repair agents from within the hollow vessels. This autonomous response occurs wherever and whenever cracking, debonding or other matrix damage transpires. Superior performance over the life of the matrix is achieved through this self-repairing mechanism. The advantages are safely executed trips, fewer repairs and eventually lighter bridges and vehicles. Research to assess and clarify the impact of the various factors involved in self-repair of matrix materials has been the focus of our work for several years. Our research has addressed the issues by correlating the impact of the various factors, such as 1) delivery vessel, shape/size, coating, chemicals released, release trigger and efficacy and impact on matrix properties 2) influence of end use such as the importance of speed and force of release (airplane skin repair) 3) impact of processing methods that involve heat and pressure on the repair vessels. Our self repairing system can: be processed at temperatures of 350F, repairs in less than 30 seconds, and does not damage the matrix by repair fiber insertion. Unique toughness and strength is developed at damaged areas and material interfaces. Findings are based on testing in compression after impact, compression, fatigue, flexural toughness and flexure modes. The presentation will focus on highlighting the issues that were resolved in creating autonomous, self-repairing structures and vehicles.

  20. Securing the United States' power infrastructure

    SciTech Connect

    Happenny, Sean F.

    2015-08-01

    The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.

  1. Critical control points for avian influenza A H5N1 in live bird markets in low resource settings.

    PubMed

    Samaan, Gina; Gultom, Anita; Indriani, Risa; Lokuge, Kamalini; Kelly, Paul M

    2011-06-01

    Live bird markets can become contaminated with and become a source of transmission for avian influenza viruses including the highly pathogenic H5N1 strain. Many countries affected by the H5N1-virus have limited resources for programs in environmental health, sanitation and disease control in live bird markets. This study proposes five critical control points (CCPs) to reduce the risk of H5N1-virus contamination in markets in low resource settings. The CCPs were developed based on three surveys conducted in Indonesia: a cross-sectional survey in 119 markets, a knowledge, attitudes and practice survey in 3 markets and a microbiological survey in 83 markets. These surveys assessed poultry workflow, market infrastructure, hygiene and regulatory practices and microbiological contamination with the H5N1-virus. The five CCPs identified were (1) reducing risk of receiving infected birds into the market, (2) reducing the risk of virus spread between different bird flocks in holding cages, (3) reducing surface contamination by isolating slaughter processes from other poultry-related processes, (4) minimizing the potential for contamination during evisceration of carcasses and (5) reducing the risk of surface contamination in the sale zone of the market. To be relevant for low resource settings, the CCPs do not necessitate large infrastructure changes. The CCPs are suited for markets that slaughter poultry and have capacity for daily disposal and removal of solid waste from the market. However, it is envisaged that the CCPs can be adapted for the development of risk-based programs in various settings.

  2. Hierarchical Coloured Petrinet Based Healthcare Infrastructure Interdependency Model

    NASA Astrophysics Data System (ADS)

    Nivedita, N.; Durbha, S.

    2014-11-01

    To ensure a resilient Healthcare Critical Infrastructure, understanding the vulnerabilities and analysing the interdependency on other critical infrastructures is important. To model this critical infrastructure and its dependencies, Hierarchal Coloured petri net modelling approach for simulating the vulnerability of Healthcare Critical infrastructure in a disaster situation is studied.. The model enables to analyse and understand various state changes, which occur when there is a disruption or damage to any of the Critical Infrastructure, and its cascading nature. It also enables to explore optimal paths for evacuation during the disaster. The simulation environment can be used to understand and highlight various vulnerabilities of Healthcare Critical Infrastructure during a flood disaster scenario; minimize consequences; and enable timely, efficient response.

  3. [Monitoring of a HACCP (Hazard Analysis Critical Control Point) plan for Listeria monocytogenes control].

    PubMed

    Mengoni, G B; Apraiz, P M

    2003-01-01

    The monitoring of a HACCP (Hazard Analysis Critical Control Point) plan for the Listeria monocytogenes control in the cooked and frozen meat section of a thermo-processing meat plant was evaluated. Seventy "non-product-contact" surface samples and fourteen finished product samples were examined. Thirty eight positive sites for the presence of Listeria sp. were obtained. Twenty-two isolates were identified as L. monocytogenes, two as L. seeligeri and fourteen as L. innocua. Non isolates were obtained from finished product samples. The detection of L. monocytogenes in cooked and frozen meat section environment showed the need for the HACCP plan to eliminate or prevent product contamination in the post-thermal step.

  4. TECHNOLOGIES TO ENHANCE THE OPERATION OF EXISTING NATURAL GAS COMPRESSION INFRASTRUCTURE - MANIFOLD DESIGN FOR CONTROLLING ENGINE AIR BALANCE

    SciTech Connect

    Gary D. Bourn; Ford A. Phillips; Ralph E. Harris

    2005-12-01

    This document provides results and conclusions for Task 15.0--Detailed Analysis of Air Balance & Conceptual Design of Improved Air Manifolds in the ''Technologies to Enhance the Operation of Existing Natural Gas Compression Infrastructure'' project. SwRI{reg_sign} is conducting this project for DOE in conjunction with Pipeline Research Council International, Gas Machinery Research Council, El Paso Pipeline, Cooper Compression, and Southern Star, under DOE contract number DE-FC26-02NT41646. The objective of Task 15.0 was to investigate the perceived imbalance in airflow between power cylinders in two-stroke integral compressor engines and develop solutions via manifold redesign. The overall project objective is to develop and substantiate methods for operating integral engine/compressors in gas pipeline service, which reduce fuel consumption, increase capacity, and enhance mechanical integrity.

  5. IMPLEMENTATION OF A HYBRID CONTROLLER FOR CRITICAL BUILDING HVAC SYSTEMS

    SciTech Connect

    Craig Rieger

    2008-11-01

    Many industrial facilities utilize pressure control gradients to prevent migration of hazardous species from containment areas to occupied zones, often using Proportional-Integral-Derivative (PID) control systems. When operators rebalance the plant, variation from the desired gradients can occur and the operating conditions can change enough that the PID parameters are no longer adequate to maintain a stable system. As the goal of the ventilation control system is to optimize the pressure gradients and associated flows for the plant, Linear Quadratic Tracking (LQT) is a method that provides a time-based approach to guiding plant interactions. However, LQT methods are susceptible to modeling and measurement errors, and therefore the additional use of soft computing methods is proposed for implementation to account for these errors and nonlinearities. The performance of the resulting hybrid controller is demonstrated through simulation and experimental testing as compared to a representative PID controller.

  6. Increasing the resilience and security of the United States' power infrastructure

    SciTech Connect

    Happenny, Sean F.

    2015-08-01

    The United States' power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power infrastructure control and distribution paradigms by utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Understanding how these systems behave in real-world conditions will lead to new ways to make our power infrastructure more resilient and secure. Demonstrating security in embedded systems is another research area PNNL is tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the aging networks protecting them are becoming easier to attack.

  7. 77 FR 30589 - SteelRiver Infrastructure Partners LP, SteelRiver Infrastructure Associates LLC, SteelRiver...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-23

    ... Surface Transportation Board SteelRiver Infrastructure Partners LP, SteelRiver Infrastructure Associates LLC, SteelRiver Infrastructure Fund North America LP, and Patriot Funding LLC--Control Exemption--Patriot Rail Corp., et al. SteelRiver Infrastructure Partners LP (SRIP LP), SteelRiver...

  8. Enhanced INL Power Grid Test Bed Infrastructure – Phase I

    SciTech Connect

    Reid, Carol Ann; West, Grayson Shawn; McBride, Scott Alan

    2014-06-01

    Idaho National Laboratory (INL), a Department of Energy (DOE) laboratory, owns, operates, and maintains transmission and distribution power grid infrastructure to support the INL multi program mission. Sections of this power infrastructure, known as the INL Power Grid Test Bed, have been and are being used by government and industry to develop, demonstrate, and validate technologies for the modern grid, including smart grid, on a full scale utility test bed. INL’s power grid includes 61 miles of 140 MW, 138 kV rated electrical power transmission supplying seven main substations, each feeding a separate facility complex (or ‘city’) within the INL’s 890 square mile Site. This power grid is fed by three commercial utilities into the INL’s main control substation, but is operated independently from the commercial utility through its primary substation and command and control center. Within the INL complex, one of the seven complexes, the Critical Infrastructure Test Range Complex (CITRC), has been designated as the INL complex for supporting critical infrastructure research and testing. This complex includes its own substation and 13.8kV distribution network, all configurable and controlled by the INL research and development programs. Through investment partnership with the DOE Office of Electricity Delivery and Energy Reliability (DOE OE), INL is enhancing its existing distribution infrastructure to expand the types of testing that can be conducted and increase flexibility for testing configurations. The enhancement of the INL Power Grid Test Bed will enable development and full scale testing of smart-grid-related technologies and smart devices including testing interoperability, operational performance, reliability, and resiliency contribution at multiple distribution voltage classes, specifically 15kV, 25kV, and 35kV. The expected time frame for completion of the Phase I portion of the enhancement would be 4th quarter fiscal year (FY) 2015.

  9. Green Infrastructure Modeling Toolkit

    EPA Pesticide Factsheets

    EPA's Green Infrastructure Modeling Toolkit is a toolkit of 5 EPA green infrastructure models and tools, along with communication materials, that can be used as a teaching tool and a quick reference resource when making GI implementation decisions.

  10. Aging Water Infrastructure

    EPA Science Inventory

    The Aging Water Infrastructure (AWI) research program is part of EPA’s larger effort called the Sustainable Water Infrastructure (SI) initiative. The SI initiative brings together drinking water and wastewater utility managers; trade associations; local watershed protection organ...

  11. Green Infrastructure Modeling Tools

    EPA Pesticide Factsheets

    Modeling tools support planning and design decisions on a range of scales from setting a green infrastructure target for an entire watershed to designing a green infrastructure practice for a particular site.

  12. Sustainable Water Infrastructure

    EPA Pesticide Factsheets

    Resources for state and local environmental and public health officials, and water, infrastructure and utility professionals to learn about sustainable water infrastructure, sustainable water and energy practices, and their role.

  13. Climate Action Benefits: Infrastructure

    EPA Pesticide Factsheets

    This page provides background on the relationship between infrastructure and climate change and describes what the CIRA Infrastructure analyses cover. It provides links to the subsectors Bridges, Roads, Urban Drainage, and Coastal Property.

  14. Glucose control in critically ill patients in 2009: no alarms and no surprises.

    PubMed

    Pitrowsky, Melissa; Shinotsuka, Cassia Righy; Soares, Márcio; Salluh, Jorge Ibrain Figueira

    2009-08-01

    Glucose control is a major issue in critical care since landmark publications from the last decade leading to widespread use of strict glucose control in the clinical practice. Subsequent trials showed discordant results that lead to several questions and concerns about benefits and risks of implementing an intensive glucose control protocol. In the midst of all recent controversy, we propose that a new glycemic target -150mg/dl) should be aimed. This target glucose level could offer protection against the deleterious effects of hyperglycemia and at the same time keep patient's safety avoiding hypoglicemia. The article presents a critical review of the current literature on intensive insulin therapy in critically ill patients.

  15. Insect growth regulators and insect control: a critical appraisal.

    PubMed Central

    Siddall, J B

    1976-01-01

    Insect growth regulators (IGRs) of the juvenile hormone type alter physiological processes essential to insect development and appear to act specifically on insects. Three natural juvenile hormones have been found in insects but not in other organisms. Future use of antagonists or inhibitors of hormone synthesis may be technically possible as an advantageous extension of pest control by IGRs. A documented survey of the properties, metabolism, toxicology, and uses of the most commercially advanced chemical, methoprene, shows it to be environmentally acceptable and toxicologically innocuous. Derivation of its current use patterns is discussed and limitations on these are noted. Residue levels and their measurement in the ppb region have allowed exemption from the requirement of tolerances in the EPA registered use of methoprene for mosquito control. Tolerances for foods accompany its fully approved use for control of manure breeding flies through a cattle feed supplement. The human health effects of using this chemical appear to be purely beneficial, but further advances through new IGR chemicals appear unlikely without major changes in regulatory and legislative policy. PMID:976222

  16. Infrastructure for microsystem production

    NASA Astrophysics Data System (ADS)

    van Heeren, Henne; Sanchez, Stefan; Elders, Job; Heideman, Rene G.

    1999-03-01

    Manufacturing of micro-systems differs from IC manufacturing because the market requires a diversity of products and lower volumes per product. In addition, a diversity of micro-technologies has been developed, including non-IC compatible processes and potentially IC compatible processes. An infrastructure for the production of micro- system devices is lacking. On one side the technology for MST is available at the universities and small university related companies. On the other side there are several small and medium enterprises and bigger companies wanting to implement MST devices in their products, but unwilling to be dependent on universities. Philips Electronics in the Netherlands and Twente MicroProducts realized this problem and have started a project to fill this gap. At this moment the basic of the infrastructure is available: OnStream BV, Eindhoven, The Netherlands, opened its waferfab and assembly facilities for the production of MST devices. Twente MicroProducts will take care of the design of the products and of the small-scale production. Integration of quality systems for maintenance, yield, statistical process control and production in a Manufacturing Execution System offers direct access for all people involved to all the relevant information. It also ensures quality of the products made. The available capabilities of the infrastructure in the current status are compared to the market needs. In this article, a description of a seamless Micro-System Engineering Foundry is given. A seamless organization is capable of helping the customer from design to production. Several examples are given.

  17. Contamination control in hybrid microelectronic modules. Identification of critical process and contaminants, part 1

    NASA Technical Reports Server (NTRS)

    Himmel, R. P.

    1975-01-01

    Hybrid processes, handling procedures, and materials were examined to identify the critical process steps in which contamination is most likely to occur, to identify the particular contaminants associated with these critical steps, and to propose method for the control of these contaminants.

  18. Cadmium and lead residue control in a hazard analysis and critical control point (HACCP) environment.

    PubMed

    Pagan-Rodríguez, Doritza; O'Keefe, Margaret; Deyrup, Cindy; Zervos, Penny; Walker, Harry; Thaler, Alice

    2007-02-21

    In 2003-2004, the U.S. Department of Agriculture Food Safety and Inspection Service (FSIS) conducted an exploratory assessment to determine the occurrence and levels of cadmium and lead in randomly collected samples of kidney, liver, and muscle tissues of mature chickens, boars/stags, dairy cows, and heifers. The data generated in the study were qualitatively compared to data that FSIS gathered in a 1985-1986 study in order to identify trends in the levels of cadmium and lead in meat and poultry products. The exploratory assessment was necessary to verify that Hazard Analysis and Critical Control Point plans and efforts to control exposure to these heavy metals are effective and result in products that meet U.S. export requirements. A comparison of data from the two FSIS studies suggests that the incidence and levels of cadmium and lead in different slaughter classes have remained stable since the first study was conducted in 1985-1986. This study was conducted to fulfill FSIS mandate to ensure that meat, poultry, and egg products entering commerce in the United States are free of adulterants, including elevated levels of environmental contaminants such as cadmium and lead.

  19. [Critical of the additive model of the randomized controlled trial].

    PubMed

    Boussageon, Rémy; Gueyffier, François; Bejan-Angoulvant, Theodora; Felden-Dominiak, Géraldine

    2008-01-01

    Randomized, double-blind, placebo-controlled clinical trials are currently the best way to demonstrate the clinical effectiveness of drugs. Its methodology relies on the method of difference (John Stuart Mill), through which the observed difference between two groups (drug vs placebo) can be attributed to the pharmacological effect of the drug being tested. However, this additive model can be questioned in the event of statistical interactions between the pharmacological and the placebo effects. Evidence in different domains has shown that the placebo effect can influence the effect of the active principle. This article evaluates the methodological, clinical and epistemological consequences of this phenomenon. Topics treated include extrapolating results, accounting for heterogeneous results, demonstrating the existence of several factors in the placebo effect, the necessity to take these factors into account for given symptoms or pathologies, as well as the problem of the "specific" effect.

  20. The use of anti-gravity suits for the control of critical intra-abdominal hemmorhage

    NASA Technical Reports Server (NTRS)

    Kravik, S.; Landmark, K.

    1980-01-01

    The history and use as well as the physiology of the use of antigravity suits for the control of critical intra-abdominal hemorrhages is reviewed. The use of this suit is highly recommended, especially for first aid.

  1. Hazard analysis and critical control point systems applied to public health risks: the example of seafood.

    PubMed

    Williams, R A; Zorn, D J

    1997-08-01

    The authors describe the way in which the two components of risk analysis--risk assessment and risk management--can be used in conjunction with the hazard analysis and critical control points concept to determine the allocation of resources at potential critical control points. This approach is examined in the context of risks to human health associated with seafood, and in particular with regard to ciguatera poisoning.

  2. Helix Nebula: Enabling federation of existing data infrastructures and data services to an overarching cross-domain e-infrastructure

    NASA Astrophysics Data System (ADS)

    Lengert, Wolfgang; Farres, Jordi; Lanari, Riccardo; Casu, Francesco; Manunta, Michele; Lassalle-Balier, Gerard

    2014-05-01

    Helix Nebula has established a growing public private partnership of more than 30 commercial cloud providers, SMEs, and publicly funded research organisations and e-infrastructures. The Helix Nebula strategy is to establish a federated cloud service across Europe. Three high-profile flagships, sponsored by CERN (high energy physics), EMBL (life sciences) and ESA/DLR/CNES/CNR (earth science), have been deployed and extensively tested within this federated environment. The commitments behind these initial flagships have created a critical mass that attracts suppliers and users to the initiative, to work together towards an "Information as a Service" market place. Significant progress in implementing the following 4 programmatic goals (as outlined in the strategic Plan Ref.1) has been achieved: × Goal #1 Establish a Cloud Computing Infrastructure for the European Research Area (ERA) serving as a platform for innovation and evolution of the overall infrastructure. × Goal #2 Identify and adopt suitable policies for trust, security and privacy on a European-level can be provided by the European Cloud Computing framework and infrastructure. × Goal #3 Create a light-weight governance structure for the future European Cloud Computing Infrastructure that involves all the stakeholders and can evolve over time as the infrastructure, services and user-base grows. × Goal #4 Define a funding scheme involving the three stake-holder groups (service suppliers, users, EC and national funding agencies) into a Public-Private-Partnership model to implement a Cloud Computing Infrastructure that delivers a sustainable business environment adhering to European level policies. Now in 2014 a first version of this generic cross-domain e-infrastructure is ready to go into operations building on federation of European industry and contributors (data, tools, knowledge, ...). This presentation describes how Helix Nebula is being used in the domain of earth science focusing on geohazards. The

  3. Parallel digital forensics infrastructure.

    SciTech Connect

    Liebrock, Lorie M.; Duggan, David Patrick

    2009-10-01

    This report documents the architecture and implementation of a Parallel Digital Forensics infrastructure. This infrastructure is necessary for supporting the design, implementation, and testing of new classes of parallel digital forensics tools. Digital Forensics has become extremely difficult with data sets of one terabyte and larger. The only way to overcome the processing time of these large sets is to identify and develop new parallel algorithms for performing the analysis. To support algorithm research, a flexible base infrastructure is required. A candidate architecture for this base infrastructure was designed, instantiated, and tested by this project, in collaboration with New Mexico Tech. Previous infrastructures were not designed and built specifically for the development and testing of parallel algorithms. With the size of forensics data sets only expected to increase significantly, this type of infrastructure support is necessary for continued research in parallel digital forensics. This report documents the implementation of the parallel digital forensics (PDF) infrastructure architecture and implementation.

  4. Optimal control of distributed parameter systems using adaptive critic neural networks

    NASA Astrophysics Data System (ADS)

    Padhi, Radhakant

    In this dissertation, two systematic optimal control synthesis techniques are presented for distributed parameter systems based on the adaptive critic neural networks. Following the philosophy of dynamic programming, this adaptive critic optimal control synthesis approach has many desirable features, viz. having a feedback form of the control, ability for on-line implementation, no need for approximating the nonlinear system dynamics, etc. More important, unlike the dynamic programming, it can accomplish these objectives without getting overwhelmed by the computational and storage requirements. First, an approximate dynamic programming based adaptive critic control synthesis formulation was carried out assuming an approximation of the system dynamics in a discrete form. A variety of example problems were solved using this proposed general approach. Next a different formulation is presented, which is capable of directly addressing the continuous form of system dynamics for control design. This was obtained following the methodology of Galerkin projection based weighted residual approximation using a set of orthogonal basis functions. The basis functions were designed by with the help of proper orthogonal decomposition, which leads to a very low-dimensional lumped parameter representation. The regulator problems of linear and nonlinear heat equations were revisited. Optimal controllers were synthesized first assuming a continuous controller and then a set of discrete controllers in the spatial domain. Another contribution of this study is the formulation of simplified adaptive critics for a large class of problems, which can be interpreted as a significant improvement of the existing adaptive critic technique.

  5. On Mixed Data and Event Driven Design for Adaptive-Critic-Based Nonlinear $H∞ Control.

    PubMed

    Wang, Ding; Mu, Chaoxu; Liu, Derong; Ma, Hongwen

    2017-02-01

    In this paper, based on the adaptive critic learning technique, the H∞ control for a class of unknown nonlinear dynamic systems is investigated by adopting a mixed data and event driven design approach. The nonlinear H∞ control problem is formulated as a two-player zero-sum differential game and the adaptive critic method is employed to cope with the data-based optimization. The novelty lies in that the data driven learning identifier is combined with the event driven design formulation, in order to develop the adaptive critic controller, thereby accomplishing the nonlinear H∞ control. The event driven optimal control law and the time driven worst case disturbance law are approximated by constructing and tuning a critic neural network. Applying the event driven feedback control, the closed-loop system is built with stability analysis. Simulation studies are conducted to verify the theoretical results and illustrate the control performance. It is significant to observe that the present research provides a new avenue of integrating data-based control and event-triggering mechanism into establishing advanced adaptive critic systems.

  6. Infrastructure development for human cell therapy translation.

    PubMed

    Dietz, A B; Padley, D J; Gastineau, D A

    2007-09-01

    The common conception of a drug is that of a chemical with defined medicinal effect. However, cells used as drugs remain critical to patient care. Cell therapy's origins began with the realization that complex tissues such as blood can retain function when transplanted to the patient. More complex transplantation followed, culminating with the understanding that transplantation of some tissues such as bone marrow may act medicinally. Administration of cells with an intended therapeutic effect is a hallmark of cellular therapy. While cells have been used as drugs for decades, testing a specific therapeutic effect of cells has begun clinical testing relatively recently. Lessons learned during the establishment of blood banking (including the importance of quality control, process control, sterility, and product tracking) are key components in the assurance of the safety and potency of cell therapy preparations. As more academic medical centers and private companies move toward exploiting the full potential of cells as drugs, needs arise for the development of the infrastructure necessary to support these investigations. Careful consideration of the design of the structure used to manufacture is important in terms of the significant capital outlay involved and the facility's role in achieving regulatory compliance. This development perspective describes the regulatory environment surrounding the infrastructure support for cell therapy and practical aspects for design consideration with particular focus on those activities associated with early clinical trials.

  7. Green Infrastructure Models and Tools

    EPA Science Inventory

    The objective of this project is to modify and refine existing models and develop new tools to support decision making for the complete green infrastructure (GI) project lifecycle, including the planning and implementation of stormwater control in urban and agricultural settings,...

  8. Decision-Support Software for Grid Operators: Transmission Topology Control for Infrastructure Resilience to the Integration of Renewable Generation

    SciTech Connect

    2012-03-16

    GENI Project: The CRA team is developing control technology to help grid operators more actively manage power flows and integrate renewables by optimally turning on and off entire power lines in coordination with traditional control of generation and load resources. The control technology being developed would provide grid operators with tools to help manage transmission congestion by identifying the facilities whose on/off status must change to lower generation costs, increase utilization of renewable resources and improve system reliability. The technology is based on fast optimization algorithms for the near to real-time change in the on/off status of transmission facilities and their software implementation.

  9. Critical analysis of cystic echinococcosis control programs and praziquantel use in South America, 1974-2010.

    PubMed

    Larrieu, Edmundo; Zanini, Fabian

    2012-01-01

    Cystic echinococcosis (CE) is one of the most prevalent zoonoses in Argentina, Brazil, Chile, Peru, and Uruguay. Control programs in South America were originally modeled after programs developed in insular territories, such as Tasmania and New Zealand. The advent and proven effectiveness of praziquantel, plus the experience of insular models, produced high expectations for rapid advances; however, after 30 years of praziquantel use, no endemic area in South America has obtained eradication. In fact, only modest gains in CE control have been made and impact on prevalence among humans has been slight. A major impediment has been the infrastructure needed to administer praziquantel to dogs in rural areas 8 times per year over numerous years, a requirement for rapid attack stage 1. Such an infrastructure has not been financially or politically sustainable in endemic areas, which tend to be the poorest. On the other hand, certain areas in Argentina have had success with simple and economically viable alternatives. Based primarily on continuous field work supported by the local community, these strategies have significantly decreased transmission to humans, the health sector's main objective. In addition, new possibilities and tools, such as the EG95 vaccine, are being evaluated; as are early detection and treatment of asymptomatic carriers.

  10. Uranium-233 waste definition: Disposal options, safeguards, criticality control, and arms control

    SciTech Connect

    Forsberg, C.W.; Storch, S.N.; Lewis, L.C.

    1998-07-07

    The US investigated the use of {sup 233}U for weapons, reactors, and other purposes from the 1950s into the 1970s. Based on the results of these investigations, it was decided not to use {sup 233}U on a large scale. Most of the {sup 233}U-containing materials were placed in long-term storage. At the end of the cold war, the US initiated, as part of its arms control policies, a disposition program for excess fissile materials. Other programs were accelerated for disposal of radioactive wastes placed in storage during the cold war. Last, potential safety issues were identified related to the storage of some {sup 233}U-containing materials. Because of these changes, significant activities associated with {sup 233}U-containing materials are expected. This report is one of a series of reports to provide the technical bases for future decisions on how to manage this material. A basis for defining when {sup 233}U-containing materials can be managed as waste and when they must be managed as concentrated fissile materials has been developed. The requirements for storage, transport, and disposal of radioactive wastes are significantly different than those for fissile materials. Because of these differences, it is important to classify material in its appropriate category. The establishment of a definition of what is waste and what is fissile material will provide the guidance for appropriate management of these materials. Wastes are defined in this report as materials containing sufficiently small masses or low concentrations of fissile materials such that they can be managed as typical radioactive waste. Concentrated fissile materials are defined herein as materials containing sufficient fissile content such as to warrant special handling to address nuclear criticality, safeguards, and arms control concerns.

  11. A Comparison of Techniques for Optimal Infrastructure Restoration

    DTIC Science & Technology

    2014-12-01

    failures can have large impacts on critical infrastructure (e.g., telecommunication networks, power networks, transportation networks and distribution...serious impacts on the humans and the economy of a country. Critical civil infrastructures include telecommunication networks, power net- works...use interdependent power de- livery and telecommunication systems as an example to show the capability of their model for the development of design

  12. Criticism of drinking as informal social control: a study in 18 countries

    PubMed Central

    Joosten, Jan; Knibbe, Ronald A.; Derickx, Mieke; Selin, Klara Hradilova; Holmila, Marja

    2009-01-01

    The focus of this paper is on informal control of drinking, indicated by criticism of people in the social network on someone's alcohol consumption. It studies country and gender differences in the extent drinkers suffering from typical symptoms of heavy or prolonged alcohol use report informal control from others (reactive informal control), and country and gender differences in the extent comments on someone's drinking are (also) directed at those who do not suffer from these symptoms (pro-active informal control). The data come from eighteen general population surveys, selected from an integrated dataset on drinking and drinking-related factors including more than 35 countries. The criteria for inclusion were that data for both men and women were available and that at least 3 items about symptoms of severe physiological consequences and about criticism of drinking had valid responses. The results show that men suffering from typical symptoms of heavy or prolonged alcohol use are more likely to be criticized than equivalent women (reactive control). Irrespective of gender, reactive informal control is more prevalent in poorer countries and in countries with a high proportion of abstainers. Concerning pro-active control, among women a larger part of criticism appeared to be directed at those who (as yet) do not suffer from symptoms typical for heavy or prolonged alcohol use. There is a lot of variation between countries in pro-active informal control. This variation is only weakly related to prosperity of a country but not to its proportion of abstainers. PMID:21691455

  13. Critical Infrastructure Earthquake Preparedness Act of 2011

    THOMAS, 112th Congress

    Rep. Cohen, Steve [D-TN-9

    2011-03-16

    03/17/2011 Referred to the Subcommittee on Economic Development, Public Buildings and Emergency Management. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  14. Critical Infrastructure Earthquake Preparedness Act of 2010

    THOMAS, 111th Congress

    Rep. Cohen, Steve [D-TN-9

    2010-03-16

    03/17/2010 Referred to the Subcommittee on Economic Development, Public Buildings and Emergency Management. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  15. Strengthening Cybersecurity for Critical Infrastructure Act

    THOMAS, 111th Congress

    Rep. Langevin, James R. [D-RI-2

    2010-09-29

    11/01/2010 Referred to the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  16. Critical Electric Infrastructure Protection Act of 2009

    THOMAS, 111th Congress

    Sen. Lieberman, Joseph I. [ID-CT

    2009-04-30

    04/30/2009 Read twice and referred to the Committee on Homeland Security and Governmental Affairs. (All Actions) Tracker: This bill has the status IntroducedHere are the steps for Status of Legislation:

  17. Paradigm Change: Cybersecurity of Critical Infrastructure

    DTIC Science & Technology

    2013-04-01

    no. 188 (September/October, 2011): 2. In 2011, “Watson,” the famed IBM artificial intelligence (AI) computer, outperformed both Grand Jeopardy...Converging technologies such as biotechnology and artificial intelligence will change entire civilizations to include their security environment...include artificial intelligence and computer chips. 10 However, during the Global War on Terrorism, the agency, now called the Defense Advanced

  18. Energy Regulation Effects on Critical Infrastructure Protection

    DTIC Science & Technology

    2008-12-01

    Todd Masse, Siobhan O’Neil and John Rollins, The Department of Homeland Security’s Risk Assessment Methodology: Evolution, Issues, and Options for...The Electricity Crisis, the Global Economy, and what it Means to You (Hoboken, NJ: John Wiley & Sons, 2007); Robert Peltier, "PUHCA Still Stifling...the private sector. 25 Jack ( John ) Casazza, "Blackouts: Is the Risk Increasing?" Electrical World 212, no. 4 (April 1998). 26 See for example

  19. Location-Based Critical Infrastructure Interdependency (LBCII)

    DTIC Science & Technology

    2010-04-01

    a shallow 7.3 on the Modified Mercalli Intensity scale (MMI) subduction earthquake in the Strait of Georgia, British Coloumbia (at latitude 49.45...the Vancouver airport. The potential for building damage was assessed across ground acceleration zones . Three categories of building damage were...building damage zones , and by identifying electrical failure as a consequence of an earthquake. It was possible to visualize the other effected

  20. Identity Verification Systems as a Critical Infrastructure

    DTIC Science & Technology

    2012-03-01

    economic security. Systemic fragility has been exploited to facilitate terrorist travel and criminal evasion. The widespread dissemination and use of...facilitate terrorist travel and criminal evasion. The widespread dissemination and use of fraudulent identity documents exponentially complicates efforts...28 III. CRIMINAL ORGANIZATIONS AND IDENTITY MANAGEMENT ...............29 A. INTRODUCTION

  1. Hazard analysis and critical control point (HACCP) history and conceptual overview.

    PubMed

    Hulebak, Karen L; Schlosser, Wayne

    2002-06-01

    The concept of Hazard Analysis and Critical Control Point (HACCP) is a system that enables the production of safe meat and poultry products through the thorough analysis of production processes, identification of all hazards that are likely to occur in the production establishment, the identification of critical points in the process at which these hazards may be introduced into product and therefore should be controlled, the establishment of critical limits for control at those points, the verification of these prescribed steps, and the methods by which the processing establishment and the regulatory authority can monitor how well process control through the HACCP plan is working. The history of the development of HACCP is reviewed, and examples of practical applications of HACCP are described.

  2. Arid Green Infrastructure for Water Control and Conservation State of the Science and Research Needs for Arid/Semi-Arid Regions

    EPA Science Inventory

    Green infrastructure is an approach to managing wet weather flows using systems and practices that mimic natural processes. It is designed to manage stormwater as close to its source as possible and protect the quality of receiving waters. Although most green infrastructure pract...

  3. Implementation of CTRLPOS, a VENTURE module for control rod position criticality searches, control rod worth curve calculations, and general criticality searches

    SciTech Connect

    Smith, L.A.; Renier, J.P.

    1994-06-01

    A module in the VENTURE reactor analysis code system, CTRLPOS, is developed to position control rods and perform control rod position criticality searches. The module is variably dimensioned so that calculations can be performed with any number of control rod banks each having any number of control rods. CTRLPOS can also calculate control rod worth curves for a single control rod or a bank of control rods. Control rod depletion can be calculated to provide radiation source terms. These radiation source terms can be used to predict radiation doses to personnel and estimate the shielding and long-term storage requirements for spent control rods. All of these operations are completely automated. The numerous features of the module are discussed in detail. The necessary input data for the CTRLPOS module is explained. Several sample problems are presented to show the flexibility of the module. The results presented with the sample problems show that the CTRLPOS module is a powerful tool which allows a wide variety of calculations to be easily performed.

  4. Critical period of weed control in oilseed rape in two Moroccan regions.

    PubMed

    Maataoui, A; Bouhache, M; Benbella, M; Talouizte, A

    2003-01-01

    The determination of critical period of weed control in oilseed rape is necessary to know the weed control period. To determine the critical period, two fields experiments were carried out during 1995-96 growth season in Loukkos and Saïs regions at two oilseed densities (D1 = 24 and D2 = 36 plants m(-2)). Ten treatments corresponding to plots left weed free or weeded plots until four leaves, flowers bud, flowering, puds formation, and maturity stages of oilseed rape were tested. Density and biomass of weeds were determined at each oilseed stages. Results showed that weed density and biomass were higher in Saïs than in Loukkos sites. For a 10% yield loss, critical period of weed control in Loukkos was from 458 to 720 degree days after emergence (D degrees AE) and from 480 to 720 D degrees AE in oilseed conducted at densities D1 and D2, respectively. In Saïs, critical period of weed control was from 474 to 738 D degrees AE and from 468 to 675 D degrees AE in oilseed conducted at D1 and D2, respectively. It was concluded that the length of the critical period of weed control in oilseed rape grain yield seems to be dependant of the level of the infestation.

  5. Improving the Resilience of Major Ports and Critical Supply Chains to Extreme Coastal Flooding: a Combined Artificial Neural Network and Hydrodynamic Simulation Approach to Predicting Tidal Surge Inundation of Port Infrastructure and Impact on Operations.

    NASA Astrophysics Data System (ADS)

    French, J.

    2015-12-01

    Ports are vital to the global economy, but assessments of global exposure to flood risk have generally focused on major concentrations of population or asset values. Few studies have examined the impact of extreme inundation events on port operation and critical supply chains. Extreme water levels and recurrence intervals have conventionally been estimated via analysis of historic water level maxima, and these vary widely depending on the statistical assumptions made. This information is supplemented by near-term forecasts from operational surge-tide models, which give continuous water levels but at considerable computational cost. As part of a NERC Infrastructure and Risk project, we have investigated the impact of North Sea tidal surges on the Port of Immingham, eastern, UK. This handles the largest volume of bulk cargo in the UK and flows of coal and biomass that are critically important for national energy security. The port was partly flooded during a major tidal surge in 2013. This event highlighted the need for improved local forecasts of surge timing in relation to high water, with a better indication of flood depth and duration. We address this problem using a combination of data-driven and numerical hydrodynamic models. An Artificial Neural Network (ANN) is first used to predict the surge component of water level from meteorological data. The input vector comprises time-series of local wind (easterly and northerly wind stress) and pressure, as well as regional pressure and pressure gradients from stations between the Shetland Islands and the Humber estuary. The ANN achieves rms errors of around 0.1 m and can generate short-range (~ 3 to 12 hour) forecasts given real-time input data feeds. It can also synthesize water level events for a wider range of tidal and meteorological forcing combinations than contained in the observational records. These are used to force Telemac2D numerical floodplain simulations using a LiDAR digital elevation model of the port

  6. The Ebola threat: China's response to the West African epidemic and national development of prevention and control policies and infrastructure.

    PubMed

    Fan, Hao-Jun; Gao, Hong-Wei; Ding, Hui; Zhang, Bi-Ke; Hou, Shi-Ke

    2015-02-01

    There is growing concern in West Africa about the spread of the Ebola hemorrhagic fever virus. With the increasing global public health risk, a coordinated international response is necessary. The Chinese government is prepared to work in collaboration with West African countries to assist in the containment and control of the epidemic through the contribution of medical expertise and mobile laboratory testing teams. Nationally, China is implementing prevention programs in major cities and provinces, the distribution of Ebola test kits, and the deployment of a new national Ebola research laboratory.

  7. Development of a public health nursing data infrastructure.

    PubMed

    Monsen, Karen A; Bekemeier, Betty; P Newhouse, Robin; Scutchfield, F Douglas

    2012-01-01

    An invited group of national public health nursing (PHN) scholars, practitioners, policymakers, and other stakeholders met in October 2010 identifying a critical need for a national PHN data infrastructure to support PHN research. This article summarizes the strengths, limitations, and gaps specific to PHN data and proposes a research agenda for development of a PHN data infrastructure. Future implications are suggested, such as issues related to the development of the proposed PHN data infrastructure and future research possibilities enabled by the infrastructure. Such a data infrastructure has potential to improve accountability and measurement, to demonstrate the value of PHN services, and to improve population health.

  8. Infrastructure Survey 2011

    ERIC Educational Resources Information Center

    Group of Eight (NJ1), 2012

    2012-01-01

    In 2011, the Group of Eight (Go8) conducted a survey on the state of its buildings and infrastructure. The survey is the third Go8 Infrastructure survey, with previous surveys being conducted in 2007 and 2009. The current survey updated some of the information collected in the previous surveys. It also collated data related to aspects of the…

  9. Smart Valley Infrastructure.

    ERIC Educational Resources Information Center

    Maule, R. William

    1994-01-01

    Discusses prototype information infrastructure projects in northern California's Silicon Valley. The strategies of the public and private telecommunications carriers vying for backbone services and industries developing end-user infrastructure technologies via office networks, set-top box networks, Internet multimedia, and "smart homes"…

  10. Settlement characteristics of major infrastructures in Shanghai

    NASA Astrophysics Data System (ADS)

    Jiao, X.; Yan, X. X.; Wang, H. M.

    2015-11-01

    Critical infrastructures in Shanghai have undergone uneven settlement since their operation, which plays an important role in affecting the security of Shanghai. This paper, taking rail transportation as example, investigates settlement characteristics and influencing factors of this linear engineering, based on long-term settlement monitoring data. Results show that rail settlement is related to geological conditions, regional ground subsidence, surrounding construction activities and structural differences in the rail systems. In order to effectively decrease the impact of regional ground subsidence, a monitoring and early-warning mechanism for critical infrastructure is established by the administrative department and engineering operators, including monitoring network construction, settlement monitoring, information sharing, settlement warning, and so on.

  11. The 3D Elevation Program and America's infrastructure

    USGS Publications Warehouse

    Lukas, Vicki; Carswell, Jr., William J.

    2016-11-07

    Infrastructure—the physical framework of transportation, energy, communications, water supply, and other systems—and construction management—the overall planning, coordination, and control of a project from beginning to end—are critical to the Nation’s prosperity. The American Society of Civil Engineers has warned that, despite the importance of the Nation’s infrastructure, it is in fair to poor condition and needs sizable and urgent investments to maintain and modernize it, and to ensure that it is sustainable and resilient. Three-dimensional (3D) light detection and ranging (lidar) elevation data provide valuable productivity, safety, and cost-saving benefits to infrastructure improvement projects and associated construction management. By providing data to users, the 3D Elevation Program (3DEP) of the U.S. Geological Survey reduces users’ costs and risks and allows them to concentrate on their mission objectives. 3DEP includes (1) data acquisition partnerships that leverage funding, (2) contracts with experienced private mapping firms, (3) technical expertise, lidar data standards, and specifications, and (4) most important, public access to high-quality 3D elevation data. The size and breadth of improvements for the Nation’s infrastructure and construction management needs call for an efficient, systematic approach to acquiring foundational 3D elevation data. The 3DEP approach to national data coverage will yield large cost savings over individual project-by-project acquisitions and will ensure that data are accessible for other critical applications.

  12. Green infrastructure monitoring in Camden, NJ

    EPA Science Inventory

    The Camden County Municipal Utilities Authority (CCMUA) installed green infrastructure Stormwater Control Measures (SCMs) at multiple locations around the city of Camden, NJ. The SCMs include raised downspout planter boxes, rain gardens, and cisterns. The cisterns capture water ...

  13. Critical controllability in proteome-wide protein interaction network integrating transcriptome

    NASA Astrophysics Data System (ADS)

    Ishitsuka, Masayuki; Akutsu, Tatsuya; Nacher, Jose C.

    2016-04-01

    Recently, the number of essential gene entries has considerably increased. However, little is known about the relationships between essential genes and their functional roles in critical network control at both the structural (protein interaction network) and dynamic (transcriptional) levels, in part because the large size of the network prevents extensive computational analysis. Here, we present an algorithm that identifies the critical control set of nodes by reducing the computational time by 180 times and by expanding the computable network size up to 25 times, from 1,000 to 25,000 nodes. The developed algorithm allows a critical controllability analysis of large integrated systems composed of a transcriptome- and proteome-wide protein interaction network for the first time. The data-driven analysis captures a direct triad association of the structural controllability of genes, lethality and dynamic synchronization of co-expression. We believe that the identified optimized critical network control subsets may be of interest as drug targets; thus, they may be useful for drug design and development.

  14. Critical controllability in proteome-wide protein interaction network integrating transcriptome

    PubMed Central

    Ishitsuka, Masayuki; Akutsu, Tatsuya; Nacher, Jose C.

    2016-01-01

    Recently, the number of essential gene entries has considerably increased. However, little is known about the relationships between essential genes and their functional roles in critical network control at both the structural (protein interaction network) and dynamic (transcriptional) levels, in part because the large size of the network prevents extensive computational analysis. Here, we present an algorithm that identifies the critical control set of nodes by reducing the computational time by 180 times and by expanding the computable network size up to 25 times, from 1,000 to 25,000 nodes. The developed algorithm allows a critical controllability analysis of large integrated systems composed of a transcriptome- and proteome-wide protein interaction network for the first time. The data-driven analysis captures a direct triad association of the structural controllability of genes, lethality and dynamic synchronization of co-expression. We believe that the identified optimized critical network control subsets may be of interest as drug targets; thus, they may be useful for drug design and development. PMID:27040162

  15. Adaptive critic learning techniques for engine torque and air-fuel ratio control.

    PubMed

    Liu, Derong; Javaherian, Hossein; Kovalenko, Olesia; Huang, Ting

    2008-08-01

    A new approach for engine calibration and control is proposed. In this paper, we present our research results on the implementation of adaptive critic designs for self-learning control of automotive engines. A class of adaptive critic designs that can be classified as (model-free) action-dependent heuristic dynamic programming is used in this research project. The goals of the present learning control design for automotive engines include improved performance, reduced emissions, and maintained optimum performance under various operating conditions. Using the data from a test vehicle with a V8 engine, we developed a neural network model of the engine and neural network controllers based on the idea of approximate dynamic programming to achieve optimal control. We have developed and simulated self-learning neural network controllers for both engine torque (TRQ) and exhaust air-fuel ratio (AFR) control. The goal of TRQ control and AFR control is to track the commanded values. For both control problems, excellent neural network controller transient performance has been achieved.

  16. Links between critical proteins drive the controllability of protein interaction networks.

    PubMed

    Wuchty, Stefan; Boltz, Toni; Küçük-McGinty, Hande

    2017-04-10

    Focusing on the interactomes of H. sapiens, S. cerevisiae, and E. coli, we investigated interactions between controlling proteins. In particular, we determined critical, intermittent, and redundant proteins based on their tendency to participate in minimum dominating sets (MDSets). Independently of the organisms considered, we found that interactions that involved critical nodes had the most prominent effects on the topology of their corresponding networks. Furthermore, we observed that phosphorylation and regulatory events were considerably enriched when the corresponding transcription factors and kinases were critical proteins, while such interactions were depleted when they were redundant proteins. Moreover, interactions involving critical proteins were enriched with essential genes, disease genes and drug targets, suggesting that such characteristics may be key for the detection of novel drug targets as well as assess their efficacy. This article is protected by copyright. All rights reserved.

  17. Flexible Computational Science Infrastructure

    SciTech Connect

    Bergen, Ben; Moss, Nicholas; Charest, Marc Robert Joseph

    2016-04-06

    FleCSI is a compile-time configurable framework designed to support multi-physics application development. As such, FleCSI attempts to provide a very general set of infrastructure design patterns that can be specialized and extended to suit the needs of a broad variety of solver and data requirements. Current support includes multi-dimensional mesh topology, mesh geometry, and mesh adjacency information, n-dimensional hashed-tree data structures, graph partitioning interfaces, and dependency closures. FleCSI also introduces a functional programming model with control, execution, and data abstractions that are consistent with both MPI and state-of-the-art task-based runtimes such as Legion and Charm++. The FleCSI abstraction layer provides the developer with insulation from the underlying runtime, while allowing support for multiple runtime systems, including conventional models like asynchronous MPI. The intent is to give developers a concrete set of user-friendly programming tools that can be used now, while allowing flexibility in choosing runtime implementations and optimizations that can be applied to architectures and runtimes that arise in the future. The control and execution models in FleCSI also provide formal nomenclature for describing poorly understood concepts like kernels and tasks.

  18. Modeling and Managing Risk in Billing Infrastructures

    NASA Astrophysics Data System (ADS)

    Baiardi, Fabrizio; Telmon, Claudio; Sgandurra, Daniele

    This paper discusses risk modeling and risk management in information and communications technology (ICT) systems for which the attack impact distribution is heavy tailed (e.g., power law distribution) and the average risk is unbounded. Systems with these properties include billing infrastructures used to charge customers for services they access. Attacks against billing infrastructures can be classified as peripheral attacks and backbone attacks. The goal of a peripheral attack is to tamper with user bills; a backbone attack seeks to seize control of the billing infrastructure. The probability distribution of the overall impact of an attack on a billing infrastructure also has a heavy-tailed curve. This implies that the probability of a massive impact cannot be ignored and that the average impact may be unbounded - thus, even the most expensive countermeasures would be cost effective. Consequently, the only strategy for managing risk is to increase the resilience of the infrastructure by employing redundant components.

  19. The national database of hospital-based cancer registries: a nationwide infrastructure to support evidence-based cancer care and cancer control policy in Japan.

    PubMed

    Higashi, Takahiro; Nakamura, Fumiaki; Shibata, Akiko; Emori, Yoshiko; Nishimoto, Hiroshi

    2014-01-01

    Monitoring the current status of cancer care is essential for effective cancer control and high-quality cancer care. To address the information needs of patients and physicians in Japan, hospital-based cancer registries are operated in 397 hospitals designated as cancer care hospitals by the national government. These hospitals collect information on all cancer cases encountered in each hospital according to precisely defined coding rules. The Center for Cancer Control and Information Services at the National Cancer Center supports the management of the hospital-based cancer registry by providing training for tumor registrars and by developing and maintaining the standard software and continuing communication, which includes mailing lists, a customizable web site and site visits. Data from the cancer care hospitals are submitted annually to the Center, compiled, and distributed as the National Cancer Statistics Report. The report reveals the national profiles of patient characteristics, route to discovery, stage distribution, and first-course treatments of the five major cancers in Japan. A system designed to follow up on patient survival will soon be established. Findings from the analyses will reveal characteristics of designated cancer care hospitals nationwide and will show how characteristics of patients with cancer in Japan differ from those of patients with cancer in other countries. The database will provide an infrastructure for future clinical and health services research and will support quality measurement and improvement of cancer care. Researchers and policy-makers in Japan are encouraged to take advantage of this powerful tool to enhance cancer control and their clinical practice.

  20. Infrastructure of electronic information management

    USGS Publications Warehouse

    Twitchell, G.D.

    2004-01-01

    The information technology infrastructure of an organization, whether it is a private, non-profit, federal, or academic institution, is key to delivering timely and high-quality products and services to its customers and stakeholders. With the evolution of the Internet and the World Wide Web, resources that were once "centralized" in nature are now distributed across the organization in various locations and often remote regions of the country. This presents tremendous challenges to the information technology managers, users, and CEOs of large world-wide corporations who wish to exchange information or get access to resources in today's global marketplace. Several tools and technologies have been developed over recent years that play critical roles in ensuring that the proper information infrastructure exists within the organization to facilitate this global information marketplace Such tools and technologies as JAVA, Proxy Servers, Virtual Private Networks (VPN), multi-platform database management solutions, high-speed telecommunication technologies (ATM, ISDN, etc.), mass storage devices, and firewall technologies most often determine the organization's success through effective and efficient information infrastructure practices. This session will address several of these technologies and provide options related to those that may exist and can be readily applied within Eastern Europe. ?? 2004 - IOS Press and the authors. All rights reserved.

  1. Hazard Analysis and Critical Control Points among Chinese Food Business Operators

    PubMed Central

    Amadei, Paolo; Masotti, Gianfranco; Condoleo, Roberto; Guidi, Alessandra

    2014-01-01

    The purpose of the present paper is to highlight some critical situations emerged during the implementation of long-term projects locally managed by Prevention Services, to control some manufacturing companies in Rome and Prato, Central Italy. In particular, some critical issues on the application of self-control in marketing and catering held by Chinese operators are underlined. The study showed serious flaws in preparing and controlling of manuals for good hygiene practice, participating of the consultants among food business operators (FBOs) to the control of the procedures. Only after regular actions by the Prevention Services, there have been satisfying results. This confirms the need to have qualified and expert partners able to promptly act among FBOs and to give adequate support to authorities in charge in order to guarantee food safety. PMID:27800356

  2. The Relationship between Critical Thinking Disposition and Locus of Control in Pre-Service Teachers

    ERIC Educational Resources Information Center

    Oguz, Aytunga; Sariçam, Hakan

    2016-01-01

    The aim of the current research study was to examine the link between critical thinking dispositions and locus of control in pre-service teachers. The participants of this study were selected via easily accessible sampling technique. The participants consist of 347 pre-service teachers (203 female, 144 male) in Kütahya, Turkey. The Rotter…

  3. 21 CFR 113.89 - Deviations in processing, venting, or control of critical factors.

    Code of Federal Regulations, 2013 CFR

    2013-04-01

    ... that portion of the production involved, keeping full records of the reprocessing conditions or... critical factors are out of control for any low-acid food or container system as disclosed from records by... destroyed. A record shall be made of the evaluation procedures used and the results. Either upon...

  4. 21 CFR 113.89 - Deviations in processing, venting, or control of critical factors.

    Code of Federal Regulations, 2011 CFR

    2011-04-01

    ... that portion of the production involved, keeping full records of the reprocessing conditions or... critical factors are out of control for any low-acid food or container system as disclosed from records by... destroyed. A record shall be made of the evaluation procedures used and the results. Either upon...

  5. 21 CFR 113.89 - Deviations in processing, venting, or control of critical factors.

    Code of Federal Regulations, 2014 CFR

    2014-04-01

    ... that portion of the production involved, keeping full records of the reprocessing conditions or... critical factors are out of control for any low-acid food or container system as disclosed from records by... destroyed. A record shall be made of the evaluation procedures used and the results. Either upon...

  6. 21 CFR 113.89 - Deviations in processing, venting, or control of critical factors.

    Code of Federal Regulations, 2012 CFR

    2012-04-01

    ... that portion of the production involved, keeping full records of the reprocessing conditions or... critical factors are out of control for any low-acid food or container system as disclosed from records by... destroyed. A record shall be made of the evaluation procedures used and the results. Either upon...

  7. [Biobanks European infrastructure].

    PubMed

    Kinkorová, Judita; Topolčan, Ondřej

    2016-01-01

    Biobanks are structured repositories of human tissue samples connected with specific information. They became an integral part of personalized medicine in the new millennium. At the European research area biobanks are isolated not well coordinated and connected to the network. European commission supports European infrastructure BBMRI-ERIC (Biobanks and Biomolecular Resources Research Infrastructure European Research Infrastructure Consortium), consortium of 54 members with more than 225 associated organizations, largely biobanks from over 30 countries. The aim is to support biomedical research using stored samples. Czech Republic is a member of the consortium as a national node BBMRI_CZ, consisting of five partners.

  8. Supervisory-level interruption recovery in time-critical control tasks.

    PubMed

    Sasangohar, Farzan; Scott, Stacey D; Cummings, M L

    2014-07-01

    This paper investigates the effectiveness of providing interruption recovery assistance in the form of an interactive visual timeline of historical events on a peripheral display in support of team supervision in time-critical settings. As interruptions can have detrimental effects on task performance, particularly in time-critical work environments, there is growing interest in the design of tools to assist people in resuming their pre-interruption activity. A user study was conducted to evaluate the use of an interactive event timeline that provides assistance to human supervisors in time-critical settings. The study was conducted in an experimental platform that emulated a team of operators and a mission commander performing a time-critical unmanned aerial vehicle (UAV) mission. The study results showed that providing interruption assistance enabled people to recover from interruptions faster and more accurately. These results have implications for interface design that could be adopted in similar time-critical environments such as air-traffic control, process control, and first responders.

  9. Securing Infrastructure from High Explosive Threats

    SciTech Connect

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  10. IPHE Infrastructure Workshop Proceedings

    SciTech Connect

    2010-02-01

    This proceedings contains information from the IPHE Infrastructure Workshop, a two-day interactive workshop held on February 25-26, 2010, to explore the market implementation needs for hydrogen fueling station development.

  11. Green Infrastructure Modeling Toolkit

    EPA Science Inventory

    Green infrastructure, such as rain gardens, green roofs, porous pavement, cisterns, and constructed wetlands, is becoming an increasingly attractive way to recharge aquifers and reduce the amount of stormwater runoff that flows into wastewater treatment plants or into waterbodies...

  12. MOEMS industrial infrastructure

    NASA Astrophysics Data System (ADS)

    van Heeren, Henne; Paschalidou, Lia

    2004-08-01

    numbers they want (several millions per year). The crossover point where building a dedicated facility becomes a realistic option, can differ very much depending on technology complexity, numbers and market value. Also history plays a role, companies with past experience in the production of a product and the necessary facilities and equipment will tend to achieve captive production. Companies not having a microtechnology history will tend to outsource, offering business opportunities for foundries. The number of foundries shows a steady growth over the years. The total availability of foundries, however, and their flexibility will, undoubtedly, rely on market potential and its size. Unlike design houses, foundries need to realise a substantial return on the "large" investments they make in terms of capital and infrastructure. These returns will be maximised through mass-produced products aimed at "killer" applications (accelerometers are only one example). The existence of professional suppliers of MOEMS packaging and assembly is an essential element in the supply chain and critical for the manufacturing and commercialisation of MOEMS products. In addition, the incorporation of packaging and assembly techniques at the front-end of the engineering cycle will pay back in terms of financial savings and shorter timescales to market. Packaging and assembly for MOEMS are, in general, more costly than their equivalents for standard integrated circuits. This is, primarily, due to the diversity of the interconnections (which are multi-functional and may incorporate: electrical, optical, fluidic etc). In addition, the high levels of accuracy and the potential sensitivity of the devices to mechanical and external influences play a major role in the cost aspects of the final MNT product. This article will give an overview of the package/assembly providers and foundry business models and analyse their contribution to the MOEMS supply chain illustrated with some typical examples. As

  13. Sea Level Rise Impacts On Infrastructure Vulnerability

    NASA Astrophysics Data System (ADS)

    Pasqualini, D.; Mccown, A. W.; Backhaus, S.; Urban, N. M.

    2015-12-01

    Increase of global sea level is one of the potential consequences of climate change and represents a threat for the U.S.A coastal regions, which are highly populated and home of critical infrastructures. The potential danger caused by sea level rise may escalate if sea level rise is coupled with an increase in frequency and intensity of storms that may strike these regions. These coupled threats present a clear risk to population and critical infrastructure and are concerns for Federal, State, and particularly local response and recovery planners. Understanding the effect of sea level rise on the risk to critical infrastructure is crucial for long planning and for mitigating potential damages. In this work we quantify how infrastructure vulnerability to a range of storms changes due to an increase of sea level. Our study focuses on the Norfolk area of the U.S.A. We assess the direct damage of drinking water and wastewater facilities and the power sector caused by a distribution of synthetic hurricanes. In addition, our analysis estimates indirect consequences of these damages on population and economic activities accounting also for interdependencies across infrastructures. While projections unanimously indicate an increase in the rate of sea level rise, the scientific community does not agree on the size of this rate. Our risk assessment accounts for this uncertainty simulating a distribution of sea level rise for a specific climate scenario. Using our impact assessment results and assuming an increase of future hurricanes frequencies and intensities, we also estimate the expected benefits for critical infrastructure.

  14. Clarkesville Green Infrastructure Implementation Strategy

    EPA Pesticide Factsheets

    The report outlines the 2012 technical assistance for Clarkesville, GA to develop a Green Infrastructure Implementation Strategy, which provides the basic building blocks for a green infrastructure plan:

  15. Controlling a truck with an adaptive critic temporal difference CMAC design

    NASA Technical Reports Server (NTRS)

    Shelton, Robert O.; Peterson, James K.

    1993-01-01

    In this study, CMAC (Cerebellar Model Articulated Controller) neural architectures are shown to be viable for the purposes of real-time learning and control. An adaptive critic temporal difference neurocontrol design has been implemented that learns in real-time how to back up a trailer truck along a fixed straight line trajectory. The truck backer-upper experiment is a standard performance measure in the neural network literature, but previously the training of the controllers was done off-line. With the CMAC neural architectures, it was possible to train the neurocontrollers on-line in real-time on a MS-DOS PC 386.

  16. Building safeguards infrastructure

    SciTech Connect

    Stevens, Rebecca S; Mcclelland - Kerr, John

    2009-01-01

    Much has been written in recent years about the nuclear renaissance - the rebirth of nuclear power as a clean and safe source of electricity around the world. Those who question the nuclear renaissance often cite the risk of proliferation, accidents or an attack on a facility as concerns, all of which merit serious consideration. The integration of these three areas - sometimes referred to as 3S, for safety, security and safeguards - is essential to supporting the growth of nuclear power, and the infrastructure that supports them should be strengthened. The focus of this paper will be on the role safeguards plays in the 3S concept and how to support the development of the infrastructure necessary to support safeguards. The objective of this paper has been to provide a working definition of safeguards infrastructure, and to discuss xamples of how building safeguards infrastructure is presented in several models. The guidelines outlined in the milestones document provide a clear path for establishing both the safeguards and the related infrastructures needed to support the development of nuclear power. The model employed by the INSEP program of engaging with partner states on safeguards-related topics that are of current interest to the level of nuclear development in that state provides another way of approaching the concept of building safeguards infrastructure. The Next Generation Safeguards Initiative is yet another approach that underscored five principal areas for growth, and the United States commitment to working with partners to promote this growth both at home and abroad.

  17. 78 FR 40487 - National Infrastructure Advisory Council

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-05

    ... Resilience Working Group. We request that comments be limited to the issues listed in the meeting agenda and... on the security and resilience of the Nation's critical infrastructure sectors and their information... resilience as directed by the President. At this meeting, the committee will receive and discuss...

  18. A Scalable Tools Communication Infrastructure

    SciTech Connect

    Buntinas, Darius; Bosilca, George; Graham, Richard L; Vallee, Geoffroy R; Watson, Gregory R.

    2008-01-01

    The Scalable Tools Communication Infrastructure (STCI) is an open source collaborative effort intended to provide high-performance, scalable, resilient, and portable communications and process control services for a wide variety of user and system tools. STCI is aimed specifically at tools for ultrascale computing and uses a component architecture to simplify tailoring the infrastructure to a wide range of scenarios. This paper describes STCI's design philosophy, the various components that will be used to provide an STCI implementation for a range of ultrascale platforms, and a range of tool types. These include tools supporting parallel run-time environments, such as MPI, parallel application correctness tools and performance analysis tools, as well as system monitoring and management tools.

  19. Improving the Critic Learning for Event-Based Nonlinear H∞ Control Design.

    PubMed

    Wang, Ding; He, Haibo; Liu, Derong

    2017-01-30

    In this paper, we aim at improving the critic learning criterion to cope with the event-based nonlinear H∞ state feedback control design. First of all, the H∞ control problem is regarded as a two-player zero-sum game and the adaptive critic mechanism is used to achieve the minimax optimization under event-based environment. Then, based on an improved updating rule, the event-based optimal control law and the time-based worst-case disturbance law are obtained approximately by training a single critic neural network. The initial stabilizing control is no longer required during the implementation process of the new algorithm. Next, the closed-loop system is formulated as an impulsive model and its stability issue is handled by incorporating the improved learning criterion. The infamous Zeno behavior of the present event-based design is also avoided through theoretical analysis on the lower bound of the minimal intersample time. Finally, the applications to an aircraft dynamics and a robot arm plant are carried out to verify the efficient performance of the present novel design method.

  20. Determining Associations between Human Diseases and non-coding RNAs with Critical Roles in Network Control

    NASA Astrophysics Data System (ADS)

    Kagami, Haruna; Akutsu, Tatsuya; Maegawa, Shingo; Hosokawa, Hiroshi; Nacher, Jose C.

    2015-10-01

    Deciphering the association between life molecules and human diseases is currently an important task in systems biology. Research over the past decade has unveiled that the human genome is almost entirely transcribed, producing a vast number of non-protein-coding RNAs (ncRNAs) with potential regulatory functions. More recent findings suggest that many diseases may not be exclusively linked to mutations in protein-coding genes. The combination of these arguments poses the question of whether ncRNAs that play a critical role in network control are also enriched with disease-associated ncRNAs. To address this question, we mapped the available annotated information of more than 350 human disorders to the largest collection of human ncRNA-protein interactions, which define a bipartite network of almost 93,000 interactions. Using a novel algorithmic-based controllability framework applied to the constructed bipartite network, we found that ncRNAs engaged in critical network control are also statistically linked to human disorders (P-value of P = 9.8 × 10-109). Taken together, these findings suggest that the addition of those genes that encode optimized subsets of ncRNAs engaged in critical control within the pool of candidate genes could aid disease gene prioritization studies.

  1. Determining Associations between Human Diseases and non-coding RNAs with Critical Roles in Network Control.

    PubMed

    Kagami, Haruna; Akutsu, Tatsuya; Maegawa, Shingo; Hosokawa, Hiroshi; Nacher, Jose C

    2015-10-13

    Deciphering the association between life molecules and human diseases is currently an important task in systems biology. Research over the past decade has unveiled that the human genome is almost entirely transcribed, producing a vast number of non-protein-coding RNAs (ncRNAs) with potential regulatory functions. More recent findings suggest that many diseases may not be exclusively linked to mutations in protein-coding genes. The combination of these arguments poses the question of whether ncRNAs that play a critical role in network control are also enriched with disease-associated ncRNAs. To address this question, we mapped the available annotated information of more than 350 human disorders to the largest collection of human ncRNA-protein interactions, which define a bipartite network of almost 93,000 interactions. Using a novel algorithmic-based controllability framework applied to the constructed bipartite network, we found that ncRNAs engaged in critical network control are also statistically linked to human disorders (P-value of P = 9.8 × 10(-109)). Taken together, these findings suggest that the addition of those genes that encode optimized subsets of ncRNAs engaged in critical control within the pool of candidate genes could aid disease gene prioritization studies.

  2. Investigation of criticality safety control infraction data at a nuclear facility

    SciTech Connect

    Cournoyer, Michael E.; Merhege, James F.; Costa, David A.; Art, Blair M.; Gubernatis, David C.

    2014-10-27

    Chemical and metallurgical operations involving plutonium and other nuclear materials account for most activities performed at the LANL's Plutonium Facility (PF-4). The presence of large quantities of fissile materials in numerous forms at PF-4 makes it necessary to maintain an active criticality safety program. The LANL Nuclear Criticality Safety (NCS) Program provides guidance to enable efficient operations while ensuring prevention of criticality accidents in the handling, storing, processing and transportation of fissionable material at PF-4. In order to achieve and sustain lower criticality safety control infraction (CSCI) rates, PF-4 operations are continuously improved, through the use of Lean Manufacturing and Six Sigma (LSS) business practices. Employing LSS, statistically significant variations (trends) can be identified in PF-4 CSCI reports. In this study, trends have been identified in the NCS Program using the NCS Database. An output metric has been developed that measures ADPSM Management progress toward meeting its NCS objectives and goals. Using a Pareto Chart, the primary CSCI attributes have been determined in order of those requiring the most management support. Data generated from analysis of CSCI data help identify and reduce number of corresponding attributes. In-field monitoring of CSCI's contribute to an organization's scientific and technological excellence by providing information that can be used to improve criticality safety operation safety. This increases technical knowledge and augments operational safety.

  3. Investigation of criticality safety control infraction data at a nuclear facility

    DOE PAGES

    Cournoyer, Michael E.; Merhege, James F.; Costa, David A.; ...

    2014-10-27

    Chemical and metallurgical operations involving plutonium and other nuclear materials account for most activities performed at the LANL's Plutonium Facility (PF-4). The presence of large quantities of fissile materials in numerous forms at PF-4 makes it necessary to maintain an active criticality safety program. The LANL Nuclear Criticality Safety (NCS) Program provides guidance to enable efficient operations while ensuring prevention of criticality accidents in the handling, storing, processing and transportation of fissionable material at PF-4. In order to achieve and sustain lower criticality safety control infraction (CSCI) rates, PF-4 operations are continuously improved, through the use of Lean Manufacturing andmore » Six Sigma (LSS) business practices. Employing LSS, statistically significant variations (trends) can be identified in PF-4 CSCI reports. In this study, trends have been identified in the NCS Program using the NCS Database. An output metric has been developed that measures ADPSM Management progress toward meeting its NCS objectives and goals. Using a Pareto Chart, the primary CSCI attributes have been determined in order of those requiring the most management support. Data generated from analysis of CSCI data help identify and reduce number of corresponding attributes. In-field monitoring of CSCI's contribute to an organization's scientific and technological excellence by providing information that can be used to improve criticality safety operation safety. This increases technical knowledge and augments operational safety.« less

  4. National Infrastructure Protection Plan: Partnering to Enhance Protection and Resiliency

    ERIC Educational Resources Information Center

    US Department of Homeland Security, 2009

    2009-01-01

    The overarching goal of the National Infrastructure Protection Plan (NIPP) is to build a safer, more secure, and more resilient America by preventing, deterring, neutralizing, or mitigating the effects of deliberate efforts by terrorists to destroy, incapacitate, or exploit elements of our Nation's critical infrastructure and key resources (CIKR)…

  5. Predictive Anomaly Management for Resilient Virtualized Computing Infrastructures

    DTIC Science & Technology

    2015-05-27

    SECURITY CLASSIFICATION OF: Large-scale distributed virtualized computing infrastructures have become important platforms for many critical real-world... virtualized computing infrastructures are inevitably prone to various system anomalies caused by software bugs, hardware failures, and resource contentions...2014 Approved for Public Release; Distribution Unlimited Final Report: Predictive Anomaly Management for Resilient Virtualized Computing

  6. Sustainable Infrastructure in the Department of Defense

    DTIC Science & Technology

    2010-06-16

    Sustainable Infrastructure in the Department of Defense Col Bart Barnhart ODUSD(I&E)/EM June 16, 2010 Report Documentation Page Form ApprovedOMB No...collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE 16 JUN 2010 2. REPORT TYPE 3. DATES COVERED 00...00-2010 to 00-00-2010 4. TITLE AND SUBTITLE Sustainable Infrastructure in the Department of Defense 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c

  7. Maintaining a Critical Spectra within Monteburns for a Gas-Cooled Reactor Array by Way of Control Rod Manipulation

    SciTech Connect

    Adigun, Babatunde John; Fensin, Michael Lorne; Galloway, Jack D.; Trellue, Holly Renee

    2016-10-01

    Our burnup study examined the effect of a predicted critical control rod position on the nuclide predictability of several axial and radial locations within a 4×4 graphite moderated gas cooled reactor fuel cluster geometry. To achieve this, a control rod position estimator (CRPE) tool was developed within the framework of the linkage code Monteburns between the transport code MCNP and depletion code CINDER90, and four methodologies were proposed within the tool for maintaining criticality. Two of the proposed methods used an inverse multiplication approach - where the amount of fissile material in a set configuration is slowly altered until criticality is attained - in estimating the critical control rod position. Another method carried out several MCNP criticality calculations at different control rod positions, then used a linear fit to estimate the critical rod position. The final method used a second-order polynomial fit of several MCNP criticality calculations at different control rod positions to guess the critical rod position. The results showed that consistency in prediction of power densities as well as uranium and plutonium isotopics was mutual among methods within the CRPE tool that predicted critical position consistently well. Finall, while the CRPE tool is currently limited to manipulating a single control rod, future work could be geared toward implementing additional criticality search methodologies along with additional features.

  8. Resilience in social insect infrastructure systems.

    PubMed

    Middleton, Eliza J T; Latty, Tanya

    2016-03-01

    Both human and insect societies depend on complex and highly coordinated infrastructure systems, such as communication networks, supply chains and transportation networks. Like human-designed infrastructure systems, those of social insects are regularly subject to disruptions such as natural disasters, blockages or breaks in the transportation network, fluctuations in supply and/or demand, outbreaks of disease and loss of individuals. Unlike human-designed systems, there is no deliberate planning or centralized control system; rather, individual insects make simple decisions based on local information. How do these highly decentralized, leaderless systems deal with disruption? What factors make a social insect system resilient, and which factors lead to its collapse? In this review, we bring together literature on resilience in three key social insect infrastructure systems: transportation networks, supply chains and communication networks. We describe how systems differentially invest in three pathways to resilience: resistance, redirection or reconstruction. We suggest that investment in particular resistance pathways is related to the severity and frequency of disturbance. In the final section, we lay out a prospectus for future research. Human infrastructure networks are rapidly becoming decentralized and interconnected; indeed, more like social insect infrastructures. Human infrastructure management might therefore learn from social insect researchers, who can in turn make use of the mature analytical and simulation tools developed for the study of human infrastructure resilience.

  9. Resilience in social insect infrastructure systems

    PubMed Central

    2016-01-01

    Both human and insect societies depend on complex and highly coordinated infrastructure systems, such as communication networks, supply chains and transportation networks. Like human-designed infrastructure systems, those of social insects are regularly subject to disruptions such as natural disasters, blockages or breaks in the transportation network, fluctuations in supply and/or demand, outbreaks of disease and loss of individuals. Unlike human-designed systems, there is no deliberate planning or centralized control system; rather, individual insects make simple decisions based on local information. How do these highly decentralized, leaderless systems deal with disruption? What factors make a social insect system resilient, and which factors lead to its collapse? In this review, we bring together literature on resilience in three key social insect infrastructure systems: transportation networks, supply chains and communication networks. We describe how systems differentially invest in three pathways to resilience: resistance, redirection or reconstruction. We suggest that investment in particular resistance pathways is related to the severity and frequency of disturbance. In the final section, we lay out a prospectus for future research. Human infrastructure networks are rapidly becoming decentralized and interconnected; indeed, more like social insect infrastructures. Human infrastructure management might therefore learn from social insect researchers, who can in turn make use of the mature analytical and simulation tools developed for the study of human infrastructure resilience. PMID:26962030

  10. Akara Ogbomoso: microbiological examination and identification of hazards and critical control points.

    PubMed

    Lateef, A; Davies, T E; Adelekan, A; Adelere, I A; Adedeji, A A; Fadahunsi, A H

    2010-10-01

    Akara Ogbomoso was examined toward the establishment of hazard analysis and critical control point (HACCP). The akara was produced in residential buildings with the attendant consequence of contamination. There was ample growth of aerobes, coliforms, staphylococci, Shigella and yeast/mold from the samples, water and cowpea pastes. Microbial contaminations occur through the processing, which can be corrected through education by adopting good hygienic and manufacturing practices. The critical control points were identified as frying, storage and refrying. It may be heated in the microwave for 10 s before consumption. Akara, prepared in the laboratory through the implementation of HACCP was not contaminated. Several bacterial isolates, namely; Escherichia coli, Staphylococcus aureus, Staphylococcus epidermidis, Citrobacter freundii, Serratia marcescens, Proteus vulgaris, Bacillus cereus, Streptococcus pyogenes, Bacillus sp. and Shigella sp., showed multiple resistance to antibiotics ranging from two to nine. Seven strains were not resistant to the antibiotics, while five were resistant to one type of antibiotic.

  11. Virtualizing observation computing infrastructure at Subaru Telescope

    NASA Astrophysics Data System (ADS)

    Jeschke, Eric; Inagaki, Takeshi; Kackley, Russell; Schubert, Kiaina; Tait, Philip

    2016-08-01

    Subaru Telescope, an 8-meter class optical telescope located in Hawaii, has been using a high-availability commodity cluster as a platform for our Observation Control System (OCS). Until recently, we have followed a tried-and-tested practice of running the system under a native (Linux) OS installation with dedicated attached RAID systems and following a strict cluster deployment model to facilitate failover handling of hardware problems,1.2 Following the apparent benefits of virtualizing (i.e. running in Virtual Machines (VMs)) many of the non- observation critical systems at the base facility, we recently began to explore the idea of migrating other parts of the observatory's computing infrastructure to virtualized systems, including the summit OCS, data analysis systems and even the front ends of various Instrument Control Systems. In this paper we describe our experience with the initial migration of the Observation Control System to virtual machines running on the cluster and using a new generation tool - ansible - to automate installation and deployment. This change has significant impacts for ease of cluster maintenance, upgrades, snapshots/backups, risk-management, availability, performance, cost-savings and energy use. In this paper we discuss some of the trade-offs involved in this virtualization and some of the impacts for the above-mentioned areas, as well as the specific techniques we are using to accomplish the changeover, simplify installation and reduce management complexity.

  12. Early presentation of symptomatic individuals is critical in controlling sexually transmissible infections.

    PubMed

    Fairley, Christopher K; Chow, Eric P F; Hocking, Jane S

    2015-06-01

    Two papers in this issue by Williams et al. and Scott et al. describe the sexual risks and health-seeking behaviour of young Indigenous Australians. Their sexual risks and health-seeking behaviours are similar to the general Australian population, yet their risk of past sexually transmissible infections (STIs) is higher. These findings are consistent with previous findings and suggest that access to health care, and not sexual risk, remain critical to STI control in remote Indigenous communities.

  13. Use of intravenous propranolol for control of a large cervicofacial hemangioma in a critically ill neonate.

    PubMed

    Fernando, Shanik J; Leitenberger, Sabra; Majerus, Matt; Krol, Alfons; MacArthur, Carol J

    2016-05-01

    Cervicofacial segmental infantile hemangiomas (IH) may result in airway obstruction requiring use of propranolol to induce hemangioma regression and reestablish the airway. We present the first case using intravenous (IV) propranolol for control of airway obstruction and rapid expansion of cervicofacial IH in the setting of necrotizing enterocolitis (NEC) impaired gastrointestinal function. Intravenous dosing of propranolol was tolerated well in a critically ill neonate with multisystem complications of prematurity.

  14. Final Report on National NGV Infrastructure

    SciTech Connect

    GM Sverdrup; JG DeSteese; ND Malcosky

    1999-01-07

    This report summarizes work fimded jointly by the U.S. Department of Energy (DOE) and by the Gas Research Institute (GRI) to (1) identi& barriers to establishing sustainable natural gas vehicle (NGV) infrastructure and (2) develop planning information that can help to promote a NGV infrastructure with self-sustaining critical maw. The need for this work is driven by the realization that demand for NGVS has not yet developed to a level that provides sufficient incentives for investment by the commercial sector in all necessary elements of a supportive infrastructure. The two major objectives of this project were: (1) to identifi and prioritize the technical barriers that may be impeding growth of a national NGV infrastructure and (2) to develop input that can assist industry in overcoming these barriers. The approach used in this project incorporated and built upon the accumulated insights of the NGV industry. The project was conducted in three basic phases: (1) review of the current situation, (2) prioritization of technical infrastructure btiiers, and (3) development of plans to overcome key barriers. An extensive and diverse list of barriers was obtained from direct meetings and telephone conferences with sixteen industry NGV leaders and seven Clean Cities/Clean Corridors coordinators. This information is filly documented in the appendix. A distillation of insights gained in the interview process suggests that persistent barriers to developing an NGV market and supporting infrastructure can be grouped into four major categories: 1. Fuel station economics 2. Value of NGVs from the owner/operator perspective 3. Cooperation necessary for critical mass 4. Commitment by investors. A principal conclusion is that an efficient and effective approach for overcoming technical barriers to developing an NGV infrastructure can be provided by building upon and consolidating the relevant efforts of the NGV industry and government. The major recommendation of this project is the

  15. Strain-controlled criticality governs the nonlinear mechanics of fibre networks

    NASA Astrophysics Data System (ADS)

    Sharma, A.; Licup, A. J.; Jansen, K. A.; Rens, R.; Sheinman, M.; Koenderink, G. H.; Mackintosh, F. C.

    2016-06-01

    Disordered fibrous networks are ubiquitous in nature as major structural components of living cells and tissues. The mechanical stability of networks generally depends on the degree of connectivity: only when the average number of connections between nodes exceeds the isostatic threshold are networks stable. On increasing the connectivity through this point, such networks undergo a mechanical phase transition from a floppy to a rigid phase. However, even sub-isostatic networks become rigid when subjected to sufficiently large deformations. To study this strain-controlled transition, we perform a combination of computational modelling of fibre networks and experiments on networks of type I collagen fibres, which are crucial for the integrity of biological tissues. We show theoretically that the development of rigidity is characterized by a strain-controlled continuous phase transition with signatures of criticality. Our experiments demonstrate mechanical properties consistent with our model, including the predicted critical exponents. We show that the nonlinear mechanics of collagen networks can be quantitatively captured by the predictions of scaling theory for the strain-controlled critical behaviour over a wide range of network concentrations and strains up to failure of the material.

  16. Analysis of a boron-carbide-drum-controlled critical reactor experiment

    NASA Technical Reports Server (NTRS)

    Mayo, W. T.

    1972-01-01

    In order to validate methods and cross sections used in the neutronic design of compact fast-spectrum reactors for generating electric power in space, an analysis of a boron-carbide-drum-controlled critical reactor was made. For this reactor the transport analysis gave generally satisfactory results. The calculated multiplication factor for the most detailed calculation was only 0.7-percent Delta k too high. Calculated reactivity worth of the control drums was $11.61 compared to measurements of $11.58 by the inverse kinetics methods and $11.98 by the inverse counting method. Calculated radial and axial power distributions were in good agreement with experiment.

  17. Identification and Control of Aircrafts using Multiple Models and Adaptive Critics

    NASA Technical Reports Server (NTRS)

    Principe, Jose C.

    2007-01-01

    nutshell, the states of the reservoir of recurrent processing elements implement a projection space, where the desired response is optimally projected. This architecture trades training efficiency by a large increase in the dimension of the recurrent layer. However, the power of the recurrent neural networks can be brought to bear on practical difficult problems. Our goal was to implement an adaptive critic architecture implementing Bellman s approach to optimal control. However, we could only characterize the ESN performance as a critic in value function evaluation, which is just one of the pieces of the overall adaptive critic controller. The results were very convincing, and the simplicity of the implementation was unparalleled.

  18. Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence

    PubMed Central

    Korkali, Mert; Veneman, Jason G.; Tivnan, Brian F.; Bagrow, James P.; Hines, Paul D. H.

    2017-01-01

    Increased interconnection between critical infrastructure networks, such as electric power and communications systems, has important implications for infrastructure reliability and security. Others have shown that increased coupling between networks that are vulnerable to internetwork cascading failures can increase vulnerability. However, the mechanisms of cascading in these models differ from those in real systems and such models disregard new functions enabled by coupling, such as intelligent control during a cascade. This paper compares the robustness of simple topological network models to models that more accurately reflect the dynamics of cascading in a particular case of coupled infrastructures. First, we compare a topological contagion model to a power grid model. Second, we compare a percolation model of internetwork cascading to three models of interdependent power-communication systems. In both comparisons, the more detailed models suggest substantially different conclusions, relative to the simpler topological models. In all but the most extreme case, our model of a “smart” power network coupled to a communication system suggests that increased power-communication coupling decreases vulnerability, in contrast to the percolation model. Together, these results suggest that robustness can be enhanced by interconnecting networks with complementary capabilities if modes of internetwork failure propagation are constrained. PMID:28317835

  19. Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence.

    PubMed

    Korkali, Mert; Veneman, Jason G; Tivnan, Brian F; Bagrow, James P; Hines, Paul D H

    2017-03-20

    Increased interconnection between critical infrastructure networks, such as electric power and communications systems, has important implications for infrastructure reliability and security. Others have shown that increased coupling between networks that are vulnerable to internetwork cascading failures can increase vulnerability. However, the mechanisms of cascading in these models differ from those in real systems and such models disregard new functions enabled by coupling, such as intelligent control during a cascade. This paper compares the robustness of simple topological network models to models that more accurately reflect the dynamics of cascading in a particular case of coupled infrastructures. First, we compare a topological contagion model to a power grid model. Second, we compare a percolation model of internetwork cascading to three models of interdependent power-communication systems. In both comparisons, the more detailed models suggest substantially different conclusions, relative to the simpler topological models. In all but the most extreme case, our model of a "smart" power network coupled to a communication system suggests that increased power-communication coupling decreases vulnerability, in contrast to the percolation model. Together, these results suggest that robustness can be enhanced by interconnecting networks with complementary capabilities if modes of internetwork failure propagation are constrained.

  20. Reducing Cascading Failure Risk by Increasing Infrastructure Network Interdependence

    NASA Astrophysics Data System (ADS)

    Korkali, Mert; Veneman, Jason G.; Tivnan, Brian F.; Bagrow, James P.; Hines, Paul D. H.

    2017-03-01

    Increased interconnection between critical infrastructure networks, such as electric power and communications systems, has important implications for infrastructure reliability and security. Others have shown that increased coupling between networks that are vulnerable to internetwork cascading failures can increase vulnerability. However, the mechanisms of cascading in these models differ from those in real systems and such models disregard new functions enabled by coupling, such as intelligent control during a cascade. This paper compares the robustness of simple topological network models to models that more accurately reflect the dynamics of cascading in a particular case of coupled infrastructures. First, we compare a topological contagion model to a power grid model. Second, we compare a percolation model of internetwork cascading to three models of interdependent power-communication systems. In both comparisons, the more detailed models suggest substantially different conclusions, relative to the simpler topological models. In all but the most extreme case, our model of a “smart” power network coupled to a communication system suggests that increased power-communication coupling decreases vulnerability, in contrast to the percolation model. Together, these results suggest that robustness can be enhanced by interconnecting networks with complementary capabilities if modes of internetwork failure propagation are constrained.

  1. ITER Cryoplant Infrastructures

    NASA Astrophysics Data System (ADS)

    Fauve, E.; Monneret, E.; Voigt, T.; Vincent, G.; Forgeas, A.; Simon, M.

    2017-02-01

    The ITER Tokamak requires an average 75 kW of refrigeration power at 4.5 K and 600 kW of refrigeration Power at 80 K to maintain the nominal operation condition of the ITER thermal shields, superconducting magnets and cryopumps. This is produced by the ITER Cryoplant, a complex cluster of refrigeration systems including in particular three identical Liquid Helium Plants and two identical Liquid Nitrogen Plants. Beyond the equipment directly part of the Cryoplant, colossal infrastructures are required. These infrastructures account for a large part of the Cryoplants lay-out, budget and engineering efforts. It is ITER Organization responsibility to ensure that all infrastructures are adequately sized and designed to interface with the Cryoplant. This proceeding presents the overall architecture of the cryoplant. It provides order of magnitude related to the cryoplant building and utilities: electricity, cooling water, heating, ventilation and air conditioning (HVAC).

  2. Contamination Control in Hybrid Microelectronic Modules. Part 1: Identification of Critical Process and Contaminants

    NASA Technical Reports Server (NTRS)

    Himmel, R. P.

    1975-01-01

    Various hybrid processing steps, handling procedures, and materials are examined in an attempt to identify sources of contamination and to propose methods for the control of these contaminants. It is found that package sealing, assembly, and rework are especially susceptible to contamination. Moisture and loose particles are identified as the worst contaminants. The points at which contaminants are most likely to enter the hybrid package are also identified, and both general and specific methods for their detection and control are developed. In general, the most effective controls for contaminants are: clean working areas, visual inspection at each step of the process, and effective cleaning at critical process steps. Specific methods suggested include the detection of loose particles by a precap visual inspection, by preseal and post-seal electrical testing, and by a particle impact noise test. Moisture is best controlled by sealing all packages in a clean, dry, inert atmosphere after a thorough bake-out of all parts.

  3. Maintaining a Critical Spectra within Monteburns for a Gas-Cooled Reactor Array by Way of Control Rod Manipulation

    DOE PAGES

    Adigun, Babatunde John; Fensin, Michael Lorne; Galloway, Jack D.; ...

    2016-10-01

    Our burnup study examined the effect of a predicted critical control rod position on the nuclide predictability of several axial and radial locations within a 4×4 graphite moderated gas cooled reactor fuel cluster geometry. To achieve this, a control rod position estimator (CRPE) tool was developed within the framework of the linkage code Monteburns between the transport code MCNP and depletion code CINDER90, and four methodologies were proposed within the tool for maintaining criticality. Two of the proposed methods used an inverse multiplication approach - where the amount of fissile material in a set configuration is slowly altered until criticalitymore » is attained - in estimating the critical control rod position. Another method carried out several MCNP criticality calculations at different control rod positions, then used a linear fit to estimate the critical rod position. The final method used a second-order polynomial fit of several MCNP criticality calculations at different control rod positions to guess the critical rod position. The results showed that consistency in prediction of power densities as well as uranium and plutonium isotopics was mutual among methods within the CRPE tool that predicted critical position consistently well. Finall, while the CRPE tool is currently limited to manipulating a single control rod, future work could be geared toward implementing additional criticality search methodologies along with additional features.« less

  4. Dependency and self-criticism in post-partum depression and anxiety: a case control study.

    PubMed

    Vliegen, Nicole; Luyten, Patrick

    2009-01-01

    This study investigates the role of self-criticism and dependency in inpatient post-partum depressed women (n = 55) and non-depressed controls (n = 37) as well as the relationship between both personality dimensions and severity of depression and anxiety. As expected, mothers with post-partum depression showed not only increased levels of depression but also anxiety compared with non-depressed mothers. Furthermore, they had significantly higher levels of self-criticism, but not of dependency. In the post-partum depressed mothers, both personality dimensions were positively associated with severity of depression. However, in non-depressed mothers, self-criticism was positively associated with depression, while there was an inverse relationship between dependency and severity of depression. In both samples, self-criticism, but not dependency, was related to state anxiety. The cross-sectional nature of this study limits the ability to draw causal conclusions. The study was based on self-report and conducted in relatively small samples.

  5. ANSI/ANS-8.15-1981(R87): Nuclear criticality control of special actinide elements

    SciTech Connect

    Brewer, R.W.; Pruvost, N.L.; Rombough, C.T.

    1996-12-31

    The American National Standard, {open_quotes}Nuclear Criticality Safety in Operations with Fissionable Materials Outside Reactotors{close_quotes} American National Standards Institute/American Nuclear Society (ANSI/ANS)-8.1-1983(R88) provides guidance for the nuclides {sup 233}U, {sup 235}U, and {sup 239}Pu. These three nuclides are of primary interest in out-of-reactor criticality safety since they are the most commonly encountered in the vast majority of operations. However, some operations can involve nuclides other than {sup 233}U, {sup 235}U, and {sup 239}Pu in sufficient quantities that their effect on criticality safety could be of concern. ANSI/ANS-8.15-1981(R87) {open_quotes}Nuclear Criticality Control of Special Actinide Elements,{close_quotes} provides guidance for 15 such nuclides. The standard was approved for use on November 9, 1981. When it received its first 5-yr review, no changes were made, and it was reaffirmed effective October 30, 1987. The standard was again reviewed and reaffirmed without changes in December 1995. The next 5-yr review of the standard is due in December 2000. The affected nuclides are {sup 237}Np, {sup 238}Pu, {sup 240}Pu, {sup 242}Pu, {sup 241}Am, {sup 243}Am, {sup 244}Cm, {sup 239}Pu, {sup 241}Pu, {sup 242m}Am, {sup 243}Cm, {sup 245}Cm, {sup 247}Cm, {sup 249}Cf, and {sup 251}Cf.

  6. Recommended Practice for Patch Management of Control Systems

    SciTech Connect

    Steven Tom; Dale Christiansen; Dan Berrett

    2008-12-01

    A key component in protecting a nation’s critical infrastructure and key resources is the security of control systems. The term industrial control system refers to supervisory control and data acquisition, process control, distributed control, and any other systems that control, monitor, and manage the nation’s critical infrastructure. Critical Infrastructure and Key Resources (CIKR) consists of electric power generators, transmission systems, transportation systems, dam and water systems, communication systems, chemical and petroleum systems, and other critical systems that cannot tolerate sudden interruptions in service. Simply stated, a control system gathers information and then performs a function based on its established parameters and the information it receives. The patch management of industrial control systems software used in CIKR is inconsistent at best and nonexistent at worst. Patches are important to resolve security vulnerabilities and functional issues. This report recommends patch management practices for consideration and deployment by industrial control systems owners.

  7. Gas Bearing Control for Safe Operation in Critical Speed Regions - Experimental Verification

    NASA Astrophysics Data System (ADS)

    Theisen, Lukas R. S.; Niemann, Hans H.; Galeazzi, Roberto; Santos, Ilmar F.

    2015-11-01

    Gas bearings are popular for their high speed capabilities, low friction and clean operation, but require low clearances and suffer from poor damping properties. The poor damping properties cause high disturbance amplification near the natural frequencies. These become critical when the rotation speed coincides with a natural frequency. In these regions, even low mass unbalances can cause rub and damage the machine. To prevent rubbing, the variation of the rotation speed of machines supported by gas bearings has to be carefully conducted during run-ups and run-downs, by acceleration and deceleration patterns and avoidance of operation near the critical speeds, which is a limiting factor during operation, specially during run-downs. An approach for reducing the vibrations is by feedback controlled lubrication. This paper addresses the challenge of reducing vibrations in rotating machines supported by gas bearings to extend their operating range. Using H∞-design methods, active lubrication techniques are proposed to enhance the damping, which in turn reduces the vibrations to a desired safe level. The control design is validated experimentally on a laboratory test rig, and shown to allow safe shaft rotation speeds up to, in and above the two first critical speeds, which significantly extends the operating range.

  8. Quantization-Based Adaptive Actor-Critic Tracking Control With Tracking Error Constraints.

    PubMed

    Fan, Quan-Yong; Yang, Guang-Hong; Ye, Dan

    2017-02-01

    In this paper, the problem of adaptive actor-critic (AC) tracking control is investigated for a class of continuous-time nonlinear systems with unknown nonlinearities and quantized inputs. Different from the existing results based on reinforcement learning, the tracking error constraints are considered and new critic functions are constructed to improve the performance further. To ensure that the tracking errors keep within the predefined time-varying boundaries, a tracking error transformation technique is used to constitute an augmented error system. Specific critic functions, rather than the long-term cost function, are introduced to supervise the tracking performance and tune the weights of the AC neural networks (NNs). A novel adaptive controller with a special structure is designed to reduce the effect of the NN reconstruction errors, input quantization, and disturbances. Based on the Lyapunov stability theory, the boundedness of the closed-loop signals and the desired tracking performance can be guaranteed. Finally, simulations on two connected inverted pendulums are given to illustrate the effectiveness of the proposed method.

  9. Recovery of infrastructure networks after localised attacks.

    PubMed

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-04-14

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction.

  10. Recovery of infrastructure networks after localised attacks

    PubMed Central

    Hu, Fuyu; Yeung, Chi Ho; Yang, Saini; Wang, Weiping; Zeng, An

    2016-01-01

    The stability of infrastructure network is always a critical issue studied by researchers in different fields. A lot of works have been devoted to reveal the robustness of the infrastructure networks against random and malicious attacks. However, real attack scenarios such as earthquakes and typhoons are instead localised attacks which are investigated only recently. Unlike previous studies, we examine in this paper the resilience of infrastructure networks by focusing on the recovery process from localised attacks. We introduce various preferential repair strategies and found that they facilitate and improve network recovery compared to that of random repairs, especially when population size is uneven at different locations. Moreover, our strategic repair methods show similar effectiveness as the greedy repair. The validations are conducted on simulated networks, and on real networks with real disasters. Our method is meaningful in practice as it can largely enhance network resilience and contribute to network risk reduction. PMID:27075559

  11. Critically appraising noninferiority randomized controlled trials: a primer for emergency physicians.

    PubMed

    Al Deeb, Mohammad; Azad, Aftab; Barbic, David

    2015-05-01

    Noninferiority (NI) trials aim to show that a new treatment or drug is not inferior to a standard, accepted treatment. The rapid proliferation of NI trials within the literature makes it imperative for emergency physicians to be able to read, interpret, and appraise critically this type of research study. Using several emergency medicine examples from the recent literature, this article outlines the key differences between traditional, superiority randomized controlled trials and NI trials. We summarize four important points that an emergency physician should consider when critically appraising an NI trial: 1) Does the new treatment have tangible benefits over the standard treatment? 2) Was the choice of the NI margin appropriate? 3) Was the effect of the standard treatment preserved? Does the trial have assay sensitivity? and 4) What type of analysis strategy was employed: intention-to-treat (ITT) or per protocol (PP)?

  12. Kwajalein Infrastructure Prioritization Methodology

    DTIC Science & Technology

    2012-07-01

    GROUNDS-MAINTENANCE-SERVICE- CONTRACT-GUIDE-US-Army-Center>. David, Leonard. “ SpaceX Private Rocket Shifts to Island Launch.” 12 Aug. 2005. TechMedia...Network. 11 Sept. 2011. <http://www.space.com/1422- spacex -private-rocket-shifts-island-launch.html>. Kwajalein Infrastructure Prioritization

  13. An Infrastructure Roadmap.

    ERIC Educational Resources Information Center

    Furgeson, Steven P.

    2002-01-01

    Describes how a master infrastructure plan for electrical and mechanical systems can help determine annual maintenance budgets, form annual capital-improvement budgets, take a snapshot of existing conditions, and lead to better energy management. Discusses important elements in such plans. (EV)

  14. Infrastructure Survey 2009

    ERIC Educational Resources Information Center

    Group of Eight (NJ1), 2010

    2010-01-01

    In 2008 the Group of Eight (Go8) released a first report on the state of its buildings and infrastructure, based on a survey undertaken in 2007. A further survey was undertaken in 2009, updating some information about the assessed quality, value and condition of buildings and use of space. It also collated data related to aspects of the estate not…

  15. An Infrastructure Museum

    ERIC Educational Resources Information Center

    Roman, Harry T.

    2013-01-01

    This article invites teachers to let their students' imaginations soar as they become part of a team that will design a whole new kind of living technological museum, a facility that celebrates the world of infrastructure. In this activity, a new two-story building will be built, occupying a vacant corner parcel of land, approximately 150…

  16. Nutrition Support Team-Led Glycemic Control Program for Critically Ill Patients.

    PubMed

    Dickerson, Roland N; Maish, George O; Minard, Gayle; Brown, Rex O

    2014-08-01

    Glycemic control is an important component of the metabolic management of the critically ill patient. Nutrition support teams are frequently challenged by complicated patients who exhibit multiple concurrent etiologies for hyperglycemia. Nutrition support teams can serve in a pivotal role in the development and evaluation of safe and effective techniques for achieving glycemic control. This review describes the efforts of a nutrition support team in achieving safe and effective glycemic control at their institution. Identification of target blood glucose concentration range, development, initiation, monitoring of a continuous intravenous insulin infusion algorithm, nursing adherence to the algorithm, modification of the algorithm based on the presence of conditions that alter insulin metabolism and glucose homeostasis, and transition of the patient who receives continuous enteral nutrition from a continuous intravenous insulin infusion to intermittent subcutaneous insulin therapy are discussed.

  17. Online learning control using adaptive critic designs with sparse kernel machines.

    PubMed

    Xu, Xin; Hou, Zhongsheng; Lian, Chuanqiang; He, Haibo

    2013-05-01

    In the past decade, adaptive critic designs (ACDs), including heuristic dynamic programming (HDP), dual heuristic programming (DHP), and their action-dependent ones, have been widely studied to realize online learning control of dynamical systems. However, because neural networks with manually designed features are commonly used to deal with continuous state and action spaces, the generalization capability and learning efficiency of previous ACDs still need to be improved. In this paper, a novel framework of ACDs with sparse kernel machines is presented by integrating kernel methods into the critic of ACDs. To improve the generalization capability as well as the computational efficiency of kernel machines, a sparsification method based on the approximately linear dependence analysis is used. Using the sparse kernel machines, two kernel-based ACD algorithms, that is, kernel HDP (KHDP) and kernel DHP (KDHP), are proposed and their performance is analyzed both theoretically and empirically. Because of the representation learning and generalization capability of sparse kernel machines, KHDP and KDHP can obtain much better performance than previous HDP and DHP with manually designed neural networks. Simulation and experimental results of two nonlinear control problems, that is, a continuous-action inverted pendulum problem and a ball and plate control problem, demonstrate the effectiveness of the proposed kernel ACD methods.

  18. Critical control points of complementary food preparation and handling in eastern Nigeria.

    PubMed Central

    Ehiri, J. E.; Azubuike, M. C.; Ubbaonu, C. N.; Anyanwu, E. C.; Ibe, K. M.; Ogbonna, M. O.

    2001-01-01

    OBJECTIVE: To investigate microbial contamination and critical control points (CCPs) in the preparation and handling of complementary foods in 120 households in Imo state, Nigeria. METHODS: The Hazard Analysis Critical Control Point (HACCP) approach was used to investigate processes and procedures that contributed to microbial contamination, growth and survival, and to identify points where controls could be applied to prevent or eliminate these microbiological hazards or reduce them to acceptable levels. Food samples were collected and tested microbiologically at different stages of preparation and handling. FINDINGS: During cooking, all foods attained temperatures capable of destroying vegetative forms of food-borne pathogens. However, the risk of contamination increased by storage of food at ambient temperature, by using insufficiently high temperatures to reheat the food, and by adding contaminated ingredients such as dried ground crayfish and soybean powder at stages where no further heat treatment was applied. The purchasing of contaminated raw foodstuffs and ingredients, particularly raw akamu, from vendors in open markets is also a CCP. CONCLUSION: Although an unsafe environment poses many hazards for children's food, the hygienic quality of prepared food can be assured if basic food safety principles are observed. When many factors contribute to food contamination, identification of CCPs becomes particularly important and can facilitate appropriate targeting of resources and prevention efforts. PMID:11417038

  19. ACCELERATED TESTING OF NEUTRON-ABSORBING ALLOYS FOR NUCLEAR CRITICALITY CONTROL

    SciTech Connect

    Ronald E. Mizia

    2011-10-01

    The US Department of Energy requires nuclear criticality control materials be used for storage of highly enriched spent nuclear fuel used in government programs and the storage of commercial spent nuclear fuel at the proposed High-Level Nuclear Waste Geological Repository located at Yucca Mountain, Nevada. Two different metallic alloys (Ni-Cr-Mo-Gd and borated stainless steel) have been chosen for this service. An accelerated corrosion test program to validate these materials for this application is described and a performance comparison is made.

  20. Fabrication of sub-10 nm metal nanowire arrays with sub-1 nm critical dimension control

    NASA Astrophysics Data System (ADS)

    Pi, Shuang; Lin, Peng; Xia, Qiangfei

    2016-11-01

    Sub-10 nm metal nanowire arrays are important electrodes for building high density emerging ‘beyond CMOS’ devices. We made Pt nanowire arrays with sub-10 nm feature size using nanoimprint lithography on silicon substrates with 100 nm thick thermal oxide. We further studied the critical dimension (CD) evolution in the fabrication procedure and achieved 0.4 nm CD control, providing a viable solution to the imprint lithography CD challenge as specified by the international technology roadmap for semiconductors. Finally, we fabricated Pt/TiO2/Pt memristor crossbar arrays with the 8 nm electrodes, demonstrating great potential in dimension scaling of this emerging device.

  1. The hazard analysis and critical control point system in food safety.

    PubMed

    Herrera, Anavella Gaitan

    2004-01-01

    The Hazard Analysis and Critical Control Point (HACCP) system is a preventive method of ensuring food safety. Its objectives are the identification of consumer safety hazards that can occur in the production line and the establishment of a control process to guarantee a safer product for the consumer; it is based on the identification of potential hazards to food safety and on measures aimed at preventing these hazards. HACCP is the system of choice in the management of food safety. The principles of HACCP are applicable to all phases of food production, including basic husbandry practices, food preparation and handling, food processing, food service, distribution systems, and consumer handling and use. The HACCP system is involved in every aspect of food safety production (according to the UN Food and Agriculture Organization [FAO] and the International Commission on Microbiological Specifications for Foods [ICMSF]). The most basic concept underlying the HACCP system is that of prevention rather than inspection. The control of processes and conditions comprises the critical control point (CCP) element. HACCP is simply a methodical, flexible, and systematic application of the appropriate science and technology for planning, controlling, and documenting the safe production of foods. The successful application of HACCP requires the full commitment and involvement of management and the workforce, using a multidisciplinary approach that should include, as appropriate, expertise in agronomy, veterinary health, microbiology, public health, food technology, environmental health, chemistry, engineering, and so on according to the particular situation. Application of the HACCP system is compatible with the implementation of total quality management (TQM) systems such as the ISO 9000 series.

  2. The Component Model of Infrastructure: A Practical Approach to Understanding Public Health Program Infrastructure

    PubMed Central

    Snyder, Kimberly; Rieker, Patricia P.

    2014-01-01

    Functioning program infrastructure is necessary for achieving public health outcomes. It is what supports program capacity, implementation, and sustainability. The public health program infrastructure model presented in this article is grounded in data from a broader evaluation of 18 state tobacco control programs and previous work. The newly developed Component Model of Infrastructure (CMI) addresses the limitations of a previous model and contains 5 core components (multilevel leadership, managed resources, engaged data, responsive plans and planning, networked partnerships) and 3 supporting components (strategic understanding, operations, contextual influences). The CMI is a practical, implementation-focused model applicable across public health programs, enabling linkages to capacity, sustainability, and outcome measurement. PMID:24922125

  3. The component model of infrastructure: a practical approach to understanding public health program infrastructure.

    PubMed

    Lavinghouze, S René; Snyder, Kimberly; Rieker, Patricia P

    2014-08-01

    Functioning program infrastructure is necessary for achieving public health outcomes. It is what supports program capacity, implementation, and sustainability. The public health program infrastructure model presented in this article is grounded in data from a broader evaluation of 18 state tobacco control programs and previous work. The newly developed Component Model of Infrastructure (CMI) addresses the limitations of a previous model and contains 5 core components (multilevel leadership, managed resources, engaged data, responsive plans and planning, networked partnerships) and 3 supporting components (strategic understanding, operations, contextual influences). The CMI is a practical, implementation-focused model applicable across public health programs, enabling linkages to capacity, sustainability, and outcome measurement.

  4. Critical Point Facility (CPE) Group in the Spacelab Payload Operations Control Center (SL POCC)

    NASA Technical Reports Server (NTRS)

    1992-01-01

    The primary payload for Space Shuttle Mission STS-42, launched January 22, 1992, was the International Microgravity Laboratory-1 (IML-1), a pressurized manned Spacelab module. The goal of IML-1 was to explore in depth the complex effects of weightlessness of living organisms and materials processing. Around-the-clock research was performed on the human nervous system's adaptation to low gravity and effects of microgravity on other life forms such as shrimp eggs, lentil seedlings, fruit fly eggs, and bacteria. Materials processing experiments were also conducted, including crystal growth from a variety of substances such as enzymes, mercury iodide, and a virus. The Huntsville Operations Support Center (HOSC) Spacelab Payload Operations Control Center (SL POCC) at the Marshall Space Flight Center (MSFC) was the air/ground communication channel used between the astronauts and ground control teams during the Spacelab missions. Featured is the Critical Point Facility (CPE) group in the SL POCC during STS-42, IML-1 mission.

  5. Critical Point Facility (CPF) Team in the Spacelab Payload Operations Control Center (SL POCC)

    NASA Technical Reports Server (NTRS)

    1982-01-01

    The primary payload for Space Shuttle Mission STS-42, launched January 22, 1992, was the International Microgravity Laboratory-1 (IML-1), a pressurized manned Spacelab module. The goal of IML-1 was to explore in depth the complex effects of weightlessness of living organisms and materials processing. Around-the-clock research was performed on the human nervous system's adaptation to low gravity and effects of microgravity on other life forms such as shrimp eggs, lentil seedlings, fruit fly eggs, and bacteria. Materials processing experiments were also conducted, including crystal growth from a variety of substances such as enzymes, mercury iodide, and a virus. The Huntsville Operations Support Center (HOSC) Spacelab Payload Operations Control Center (SL POCC) at the Marshall Space Flight Center (MSFC) was the air/ground communication channel used between the astronauts and ground control teams during the Spacelab missions. Featured is the Critical Point Facility (CPF) team in the SL POCC during the IML-1 mission.

  6. Continuum Fatigue Damage Modeling for Critical Design, Control, and Fault Prognosis

    NASA Technical Reports Server (NTRS)

    Lorenzo, Carl F.

    1996-01-01

    This paper develops a simplified continuum (continuous with respect to time, stress, etc.) fatigue damage model for use in critical design, Life Extending Control and fault prognosis. The work is based on the local strain cyclic damage modeling method. New nonlinear explicit equation forms of cyclic damage in terms of stress amplitude are derived to facilitate the continuum modelling. Stress based continuum models are derived. Extension to plastic strain-strain rate models is also presented. Progress toward a non-zero mean stress based is presented. Also new nonlinear explicit equation forms in terms of stress amplitude are derived for this case. Application of the various models to design, control, and fault prognosis is considered.

  7. [The Hazard Analysis Critical Control Point approach (HACCP) in meat production].

    PubMed

    Berends, B R; Snijders, J M

    1994-06-15

    The Hazard Analysis Critical Control Point (HACCP) approach is a method that could transform the current system of safety and quality assurance of meat into a really effective and flexible integrated control system. This article discusses the origin and the basic principles of the HACCP approach. It also discusses why the implementation of the approach is not as widespread as might be expected. It is concluded that a future implementation of the approach in the entire chain of meat production, i.e. from conception to consumption, is possible. Prerequisites are, however, that scientifically validated risk analyses become available, that future legislation forms a framework that actively supports the approach, and that all parties involved in meat production not only become convinced of the advantages, but also are trained to implement the HACCP approach with insight.

  8. PeerShield: determining control and resilience criticality of collaborative cyber assets in networks

    NASA Astrophysics Data System (ADS)

    Cam, Hasan

    2012-06-01

    As attackers get more coordinated and advanced in cyber attacks, cyber assets are required to have much more resilience, control effectiveness, and collaboration in networks. Such a requirement makes it essential to take a comprehensive and objective approach for measuring the individual and relative performances of cyber security assets in network nodes. To this end, this paper presents four techniques as to how the relative importance of cyber assets can be measured more comprehensively and objectively by considering together the main variables of risk assessment (e.g., threats, vulnerabilities), multiple attributes (e.g., resilience, control, and influence), network connectivity and controllability among collaborative cyber assets in networks. In the first technique, a Bayesian network is used to include the random variables for control, recovery, and resilience attributes of nodes, in addition to the random variables of threats, vulnerabilities, and risk. The second technique shows how graph matching and coloring can be utilized to form collaborative pairs of nodes to shield together against threats and vulnerabilities. The third technique ranks the security assets of nodes by incorporating multiple weights and thresholds of attributes into a decision-making algorithm. In the fourth technique, the hierarchically well-separated tree is enhanced to first identify critical nodes of a network with respect to their attributes and network connectivity, and then selecting some nodes as driver nodes for network controllability.

  9. IMPROVING GLYCEMIC CONTROL SAFELY IN CRITICAL CARE PATIENTS A COLLABORATIVE SYSTEMS APPROACH IN NINE HOSPITALS.

    PubMed

    Maynard, Gregory A; Holdych, Janet; Kendall, Heather; Harrison, Karen; Montgomery, Patricia A; Kulasa, Kristen

    2017-02-22

    Objective Safely improve glycemic control in the critical care units of nine hospitals. Methods Critical care adult inpatients from nine hospitals with ≥ 4 point-of-care (POC) blood glucose (BG) readings over ≥ 2 days were targeted by collaborative improvement efforts to reduce hyper- and hypo-glycemia. Balanced glucometric goals for each hospital were set targeting improvement from baseline, or goals deemed desirable from Society of Hospital Medicine (SHM) benchmarking data. Collaborative interventions included standardized insulin infusion protocols, hypoglycemia prevention bundles, audit and feedback, education, and measure-vention (coupling measurement of patients "off protocol" with concurrent interventions to correct suboptimal care). Results All sites improved glycemic control. Six reached pre-specified levels of improvement of the day-weighted mean (DWM) BG. The DWM BG for the cohort decreased by 7.7 mg/dL [95% CI 7.0 - 8.4] to 151.3 mg/dL. Six of nine sites showed improvement in the percent ICU days with severe hyperglycemia (any BG > 299 mg/dL). ICU severe hyperglycemic days declined from 8.6% to 7.2% for the cohort [RR 0.84, 95% CI 0.80 - 0.88]. Patient days with any BG < 70 mg / dL were reduced by 0.4% [95% CI 0.06 - 0.6%] from 4.5% to 4.1% for a small but statistically significant reduction in hypoglycemia. Seven of nine sites showed improvement. Conclusion Multi-hospital improvements in ICU glycemic control, severe hyperglycemia, and hypoglycemia are feasible. Balanced goals for glycemic control and hypoglycemia in the ICU using SHM benchmarks and metrics enhanced successful improvement efforts with good staff acceptance and sustainability.

  10. In Situ Nuclear Characterization Infrastructure

    SciTech Connect

    James A. Smith; J. Rory Kennedy

    2011-11-01

    To be able to evolve microstructure with a prescribed in situ process, an effective measurement infrastructure must exist. This interdisciplinary infrastructure needs to be developed in parallel with in situ sensor technology. This paper discusses the essential elements in an effective infrastructure.

  11. Critical Code: Software Producibility for Defense

    DTIC Science & Technology

    2012-04-26

    to be combined in a patterned way. – Web services stacks, iOS, Android, LAMP stack, AUTOSAR, SCADA and controls, ERP/ SCM / CRM infrastructure, network...ecosystem lead Challenge issues • Technology leadership focal point • Smart customer: inside expertise • Accelerate the pipeline 5 Software has a critical...Disproportionate benefits from software in economic growth – ICT industries since 1995 ICT drives 20-15% of economic growth is US and Europe ICT drives 40

  12. Development of a Free-Flight Simulation Infrastructure

    NASA Technical Reports Server (NTRS)

    Miles, Eric S.; Wing, David J.; Davis, Paul C.

    1999-01-01

    In anticipation of a projected rise in demand for air transportation, NASA and the FAA are researching new air-traffic-management (ATM) concepts that fall under the paradigm known broadly as ":free flight". This paper documents the software development and engineering efforts in progress by Seagull Technology, to develop a free-flight simulation (FFSIM) that is intended to help NASA researchers test mature-state concepts for free flight, otherwise referred to in this paper as distributed air / ground traffic management (DAG TM). Under development is a distributed, human-in-the-loop simulation tool that is comprehensive in its consideration of current and envisioned communication, navigation and surveillance (CNS) components, and will allow evaluation of critical air and ground traffic management technologies from an overall systems perspective. The FFSIM infrastructure is designed to incorporate all three major components of the ATM triad: aircraft flight decks, air traffic control (ATC), and (eventually) airline operational control (AOC) centers.

  13. California Hydrogen Infrastructure Project

    SciTech Connect

    Heydorn, Edward C

    2013-03-12

    Air Products and Chemicals, Inc. has completed a comprehensive, multiyear project to demonstrate a hydrogen infrastructure in California. The specific primary objective of the project was to demonstrate a model of a real-world retail hydrogen infrastructure and acquire sufficient data within the project to assess the feasibility of achieving the nation's hydrogen infrastructure goals. The project helped to advance hydrogen station technology, including the vehicle-to-station fueling interface, through consumer experiences and feedback. By encompassing a variety of fuel cell vehicles, customer profiles and fueling experiences, this project was able to obtain a complete portrait of real market needs. The project also opened its stations to other qualified vehicle providers at the appropriate time to promote widespread use and gain even broader public understanding of a hydrogen infrastructure. The project engaged major energy companies to provide a fueling experience similar to traditional gasoline station sites to foster public acceptance of hydrogen. Work over the course of the project was focused in multiple areas. With respect to the equipment needed, technical design specifications (including both safety and operational considerations) were written, reviewed, and finalized. After finalizing individual equipment designs, complete station designs were started including process flow diagrams and systems safety reviews. Material quotes were obtained, and in some cases, depending on the project status and the lead time, equipment was placed on order and fabrication began. Consideration was given for expected vehicle usage and station capacity, standard features needed, and the ability to upgrade the station at a later date. In parallel with work on the equipment, discussions were started with various vehicle manufacturers to identify vehicle demand (short- and long-term needs). Discussions included identifying potential areas most suited for hydrogen fueling stations

  14. Quantitative resilience analysis through control design.

    SciTech Connect

    Sunderland, Daniel; Vugrin, Eric D.; Camphouse, Russell Chris

    2009-09-01

    Critical infrastructure resilience has become a national priority for the U. S. Department of Homeland Security. System resilience has been studied for several decades in many different disciplines, but no standards or unifying methods exist for critical infrastructure resilience analysis. Few quantitative resilience methods exist, and those existing approaches tend to be rather simplistic and, hence, not capable of sufficiently assessing all aspects of critical infrastructure resilience. This report documents the results of a late-start Laboratory Directed Research and Development (LDRD) project that investigated the development of quantitative resilience through application of control design methods. Specifically, we conducted a survey of infrastructure models to assess what types of control design might be applicable for critical infrastructure resilience assessment. As a result of this survey, we developed a decision process that directs the resilience analyst to the control method that is most likely applicable to the system under consideration. Furthermore, we developed optimal control strategies for two sets of representative infrastructure systems to demonstrate how control methods could be used to assess the resilience of the systems to catastrophic disruptions. We present recommendations for future work to continue the development of quantitative resilience analysis methods.

  15. Visual angle is the critical variable mediating gain-related effects in manual control

    PubMed Central

    Haibach, Pamela. S.; Newell, Karl. M.

    2008-01-01

    Theoretically visual gain has been identified as a control variable in models of isometric force. However, visual gain is typically confounded with visual angle and distance, and the relative contribution of visual gain, distance, and angle to the control of force remains unclear. This study manipulated visual gain, distance, and angle in three experiments to examine the visual information properties used to regulate the control of a constant level of isometric force. Young adults performed a flexion motion of the index finger of the dominant hand in 20 s trials under a range of parameter values of the three visual variables. The findings demonstrate that the amount and structure of the force fluctuations were organized around the variable of visual angle, rather than gain or distance. Furthermore, the amount and structure of the force fluctuations changed considerably up to 1°, with little change higher than a 1° visual angle. Visual angle is the critical informational variable for the visuomotor system during the control of isometric force. PMID:16604313

  16. Apropos: critical analysis of molluscicide application in schistosomiasis control programs in Brazil.

    PubMed

    Li, Hongjun; Wang, Wei

    2017-03-07

    Schistosomiasis is a snail-transmitted infectious disease affecting over 200 million people worldwide. Snail control has been recognized as an effective approach to interrupt the transmission of schistosomiasis, since the geographic distribution of this neglected tropical disease is determined by the presence of the intermediate host snails. In a recent Scoping Review published in Infectious Diseases of Poverty, Coelho and Caldeira performed a critical review of using molluscicides in the national schistosomiasis control programs in Brazil. They also described some chemical and plant-derived molluscicides used in China. In addition to the molluscicides described by Coelho and Caldeira, a large number of chemicals, plant extracts and microorganisms have been screened and tested for molluscicidal actions against Oncomelania hupensis, the intermediate host of Schistosoma japonicum in China. Here, we presented the currently commercial molluscicides available in China, including 26% suspension concentrate of metaldehyde and niclosamide (MNSC), 25% suspension concentrate of niclosamide ethanolamine salt (SCNE), 50% niclosamide ethanolamine salt wettable powder (WPN), 4% niclosamide ethanolamine salt dustable powder (NESP), 5% niclosamide ethanolamine salt granule (NESG) and the plant-derived molluscicide "Luowei". These molluscicides have been proved to be active against O. hupensis in both laboratory and endemic fields, playing an important role in the national schistosomiasis control program of China. Currently, China is transferring its successful experiences on schistosomiasis control to African countries. The introduction of Chinese commercial molluscicides to Africa, with adaptation to local conditions, may facilitate the progress towards the elimination of schisosomiasis in Africa.

  17. Critical analysis of molluscicide application in schistosomiasis control programs in Brazil.

    PubMed

    Coelho, Pmz; Caldeira, R L

    2016-07-04

    In Brazil, Biomphalaria glabrata, B. tenagophila, and B. straminea are naturally infected by the trematode Schistosoma mansoni, the causative agent of schistosomiasis. Despite decades of governmental efforts through official control programs, schistosomiasis remains an important public health problem in the country: thousands of people are infected with the trematode each year and millions live in endemic areas. The World Health Organization recommends using a combination of molluscicide (niclosamide) and mass chemotherapy to control the transmission of schistosomiasis, with this treatment successfully reducing the morbidity of the disease. In the past, niclosamide has been used in official schistosomiasis control programs in Brazil. However, as B. glabrata recolonizes even after molluscicide application, the use of molluscicides has gradually decreased in the country until they were discontinued in 2002, mainly due to the rising global pressure to preserve the environment and the difficulties of obtaining licenses from the Brazilian Ministry of Environment to use toxic substances in aquatic ecosystems. Therefore, the discovery of new molluscicides, which could be more selective to Biomphalaria species and less harmful to the aquatic ecosystem, is necessary. In addition, political efforts to sensitize funders to provide grants for this field of research are required. In this context, this article aims to make a critical analysis of molluscicide application in schistosomiasis control programs in Brazil.

  18. Integral-based filtering of continuous glucose sensor measurements for glycaemic control in critical care.

    PubMed

    Chase, J Geoffrey; Hann, Christopher E; Jackson, Monique; Lin, Jessica; Lotz, Thomas; Wong, Xing-Wei; Shaw, Geoffrey M

    2006-06-01

    Hyperglycaemia is prevalent in critical illness and increases the risk of further complications and mortality, while tight control can reduce mortality up to 43%. Adaptive control methods are capable of highly accurate, targeted blood glucose regulation using limited numbers of manual measurements due to patient discomfort and labour intensity. Therefore, the option to obtain greater data density using emerging continuous glucose sensing devices is attractive. However, the few such systems currently available can have errors in excess of 20-30%. In contrast, typical bedside testing kits have errors of approximately 7-10%. Despite greater measurement frequency larger errors significantly impact the resulting glucose and patient specific parameter estimates, and thus the control actions determined creating an important safety and performance issue. This paper models the impact of the continuous glucose monitoring system (CGMS, Medtronic, Northridge, CA) on model-based parameter identification and glucose prediction. An integral-based fitting and filtering method is developed to reduce the effect of these errors. A noise model is developed based on CGMS data reported in the literature, and is slightly conservative with a mean Clarke Error Grid (CEG) correlation of R=0.81 (range: 0.68-0.88) as compared to a reported value of R=0.82 in a critical care study. Using 17 virtual patient profiles developed from retrospective clinical data, this noise model was used to test the methods developed. Monte-Carlo simulation for each patient resulted in an average absolute 1-h glucose prediction error of 6.20% (range: 4.97-8.06%) with an average standard deviation per patient of 5.22% (range: 3.26-8.55%). Note that all the methods and results are generalizable to similar applications outside of critical care, such as less acute wards and eventually ambulatory individuals. Clinically, the results show one possible computational method for managing the larger errors encountered in

  19. Assessment of hygiene standards and Hazard Analysis Critical Control Points implementation on passenger ships.

    PubMed

    Mouchtouri, Varavara; Malissiova, Eleni; Zisis, Panagiotis; Paparizou, Evina; Hadjichristodoulou, Christos

    2013-01-01

    The level of hygiene on ferries can have impact on travellers' health. The aim of this study was to assess the hygiene standards of ferries in Greece and to investigate whether Hazard Analysis Critical Control Points (HACCP) implementation contributes to the hygiene status and particularly food safety aboard passenger ships. Hygiene inspections on 17 ferries in Greece were performed using a standardized inspection form, with a 135-point scale. Thirty-four water and 17 food samples were collected and analysed. About 65% (11/17) of ferries were scored with >100 points. Ferries with HACCP received higher scores during inspection compared to those without HACCP (p value <0.001). All 34 microbiological water test results were found negative and, from the 17 food samples, only one was found positive for Salmonella spp. Implementation of management systems including HACCP principles can help to raise the level of hygiene aboard passenger ships.

  20. Validation of Safety-Critical Systems for Aircraft Loss-of-Control Prevention and Recovery

    NASA Technical Reports Server (NTRS)

    Belcastro, Christine M.

    2012-01-01

    Validation of technologies developed for loss of control (LOC) prevention and recovery poses significant challenges. Aircraft LOC can result from a wide spectrum of hazards, often occurring in combination, which cannot be fully replicated during evaluation. Technologies developed for LOC prevention and recovery must therefore be effective under a wide variety of hazardous and uncertain conditions, and the validation framework must provide some measure of assurance that the new vehicle safety technologies do no harm (i.e., that they themselves do not introduce new safety risks). This paper summarizes a proposed validation framework for safety-critical systems, provides an overview of validation methods and tools developed by NASA to date within the Vehicle Systems Safety Project, and develops a preliminary set of test scenarios for the validation of technologies for LOC prevention and recovery

  1. Pathogen Reduction and Hazard Analysis and Critical Control Point (HACCP) systems for meat and poultry. USDA.

    PubMed

    Hogue, A T; White, P L; Heminover, J A

    1998-03-01

    The United States Department of Agriculture (USDA) Food Safety Inspection Service (FSIS) adopted Hazard Analysis and Critical Control Point Systems and established finished product standards for Salmonella in slaughter plants to improve food safety for meat and poultry. In order to make significant improvements in food safety, measures must be taken at all points in the farm-to-table chain including production, transportation, slaughter, processing, storage, retail, and food preparation. Since pathogens can be introduced or multiplied anywhere along the continuum, success depends on consideration and comparison of intervention measures throughout the continuum. Food animal and public health veterinarians can create the necessary preventative environment that mitigates risks for food borne pathogen contamination.

  2. The Emerging Role of Protein Phosphorylation as a Critical Regulatory Mechanism Controlling Cellulose Biosynthesis

    PubMed Central

    Jones, Danielle M.; Murray, Christian M.; Ketelaar, KassaDee J.; Thomas, Joseph J.; Villalobos, Jose A.; Wallace, Ian S.

    2016-01-01

    Plant cell walls are extracellular matrices that surround plant cells and critically influence basic cellular processes, such as cell division and expansion. Cellulose is a major constituent of plant cell walls, and this paracrystalline polysaccharide is synthesized at the plasma membrane by a large protein complex known as the cellulose synthase complex (CSC). Recent efforts have identified numerous protein components of the CSC, but relatively little is known about regulation of cellulose biosynthesis. Numerous phosphoproteomic surveys have identified phosphorylation events in CSC associated proteins, suggesting that protein phosphorylation may represent an important regulatory control of CSC activity. In this review, we discuss the composition and dynamics of the CSC in vivo, the catalog of CSC phosphorylation sites that have been identified, the function of experimentally examined phosphorylation events, and potential kinases responsible for these phosphorylation events. Additionally, we discuss future directions in cellulose synthase kinase identification and functional analyses of CSC phosphorylation sites. PMID:27252710

  3. ACRF Data Collection and Processing Infrastructure

    SciTech Connect

    Macduff, M; Egan, D

    2004-12-01

    We present a description of the data flow from measurement to long-term archive. We also discuss data communications infrastructure. The data handling processes presented include collection, transfer, ingest, quality control, creation of Value-Added Products (VAP), and data archiving.

  4. Seeking Equity in the National Information Infrastructure.

    ERIC Educational Resources Information Center

    Doctor, Ronald D.

    1994-01-01

    Proposals for shaping the National Information Infrastructure (NII) lack sufficient provision for supporting locally controlled information delivery systems, which could serve all the people, regardless of class or community environment. A system of federally sponsored National and Regional Institutes for Information Democracy could help meet this…

  5. Mission Critical Networking

    SciTech Connect

    Eltoweissy, Mohamed Y.; Du, David H.C.; Gerla, Mario; Giordano, Silvia; Gouda, Mohamed; Schulzrinne, Henning; Youssef, Moustafa

    2010-06-01

    Mission-Critical Networking (MCN) refers to networking for application domains where life or livelihood may be at risk. Typical application domains for MCN include critical infrastructure protection and operation, emergency and crisis intervention, healthcare services, and military operations. Such networking is essential for safety, security and economic vitality in our complex world characterized by uncertainty, heterogeneity, emergent behaviors, and the need for reliable and timely response. MCN comprise networking technology, infrastructures and services that may alleviate the risk and directly enable and enhance connectivity for mission-critical information exchange among diverse, widely dispersed, mobile users.

  6. MAVS Expressed by Hematopoietic Cells Is Critical for Control of West Nile Virus Infection and Pathogenesis

    PubMed Central

    Vijay, Rahul; Zhao, Jingxian; Gale, Michael; Diamond, Michael S.

    2016-01-01

    ABSTRACT West Nile virus (WNV) is the most important cause of epidemic encephalitis in North America. Innate immune responses, which are critical for control of WNV infection, are initiated by signaling through pathogen recognition receptors, RIG-I and MDA5, and their downstream adaptor molecule, MAVS. Here, we show that a deficiency of MAVS in hematopoietic cells resulted in increased mortality and delayed WNV clearance from the brain. In Mavs−/− mice, a dysregulated immune response was detected, characterized by a massive influx of macrophages and virus-specific T cells into the infected brain. These T cells were polyfunctional and lysed peptide-pulsed target cells in vitro. However, virus-specific T cells in the brains of infected Mavs−/− mice exhibited lower functional avidity than those in wild-type animals, and even virus-specific memory T cells generated by prior immunization could not protect Mavs−/− mice from WNV-induced lethal disease. Concomitant with ineffective virus clearance, macrophage numbers were increased in the Mavs−/− brain, and both macrophages and microglia exhibited an activated phenotype. Microarray analyses of leukocytes in the infected Mavs−/− brain showed a preferential expression of genes associated with activation and inflammation. Together, these results demonstrate a critical role for MAVS in hematopoietic cells in augmenting the kinetics of WNV clearance and thereby preventing a dysregulated and pathogenic immune response. IMPORTANCE West Nile virus (WNV) is the most important cause of mosquito-transmitted encephalitis in the United States. The innate immune response is known to be critical for protection in infected mice. Here, we show that expression of MAVS, a key adaptor molecule in the RIG-I-like receptor RNA-sensing pathway, in hematopoietic cells is critical for protection from lethal WNV infection. In the absence of MAVS, there is a massive infiltration of myeloid cells and virus-specific T cells into the

  7. NASA World Wind: Infrastructure for Spatial Data

    NASA Technical Reports Server (NTRS)

    Hogan, Patrick

    2011-01-01

    The world has great need for analysis of Earth observation data, be it climate change, carbon monitoring, disaster response, national defense or simply local resource management. To best provide for spatial and time-dependent information analysis, the world benefits from an open standards and open source infrastructure for spatial data. In the spirit of NASA's motto "for the benefit of all" NASA invites the world community to collaboratively advance this core technology. The World Wind infrastructure for spatial data both unites and challenges the world for innovative solutions analyzing spatial data while also allowing absolute command and control over any respective information exchange medium.

  8. The benefits of tight glycemic control in critical illness: Sweeter than assumed?

    PubMed

    Gardner, Andrew John

    2014-12-01

    Hyperglycemia has long been observed amongst critically ill patients and associated with increased mortality and morbidity. Tight glycemic control (TGC) is the clinical practice of controlling blood glucose (BG) down to the "normal" 4.4-6.1 mmol/L range of a healthy adult, aiming to avoid any potential deleterious effects of hyperglycemia. The ground-breaking Leuven trials reported a mortality benefit of approximately 10% when using this technique, which led many to endorse its benefits. In stark contrast, the multi-center normoglycemia in intensive care evaluation-survival using glucose algorithm regulation (NICE-SUGAR) trial, not only failed to replicate this outcome, but showed TGC appeared to be harmful. This review attempts to re-analyze the current literature and suggests that hope for a benefit from TGC should not be so hastily abandoned. Inconsistencies in study design make a like-for-like comparison of the Leuven and NICE-SUGAR trials challenging. Inadequate measures preventing hypoglycemic events are likely to have contributed to the increased mortality observed in the NICE-SUGAR treatment group. New technologies, including predictive models, are being developed to improve the safety of TGC, primarily by minimizing hypoglycemia. Intensive Care Units which are unequipped in trained staff and monitoring capacity would be unwise to attempt TGC, especially considering its yet undefined benefit and the deleterious nature of hypoglycemia. International recommendations now advise clinicians to ensure critically ill patients maintain a BG of <10 mmol/L. Despite encouraging evidence, currently we can only speculate and remain optimistic that the benefit of TGC in clinical practice is sweeter than assumed.

  9. Agile Infrastructure Monitoring

    NASA Astrophysics Data System (ADS)

    Andrade, P.; Ascenso, J.; Fedorko, I.; Fiorini, B.; Paladin, M.; Pigueiras, L.; Santos, M.

    2014-06-01

    At the present time, data centres are facing a massive rise in virtualisation and cloud computing. The Agile Infrastructure (AI) project is working to deliver new solutions to ease the management of CERN data centres. Part of the solution consists in a new "shared monitoring architecture" which collects and manages monitoring data from all data centre resources. In this article, we present the building blocks of this new monitoring architecture, the different open source technologies selected for each architecture layer, and how we are building a community around this common effort.

  10. The INSC Security Infrastructure

    DTIC Science & Technology

    2004-12-01

    Le but était de démontrer une infrastructure de réseau qui soutient la sécurité, l’interopérabilité, la maintenance, et la mobilité . La sécurité a...l’interopérabilité, la maintenance, et la mobilité . La sécurité a été fournie à la couche réseau en utilisant le protocole d’IPsec. Aucune sécurité

  11. Green Infrastructure, Groundwater and the Sustainable City

    NASA Astrophysics Data System (ADS)

    Band, L. E.

    2014-12-01

    The management of water is among the most important attributes of urbanization. Provision of sufficient quantities and quality of freshwater, treatment and disposal of wastewater and flood protection are critical for urban sustainability. Over the last century, two major shifts in water management paradigms have occurred, the first to improve public health with the provision of infrastructure for centralized sanitary effluent collection and treatment, and the rapid drainage and routing of stormwater. A current shift in paradigm is now occurring in response to the unintended consequences of sanitary and stormwater management, which have degraded downstream water bodies and shifted flood hazard downstream. Current infrastructure is being designed and implemented to retain, rather than rapidly drain, stormwater, with a focus on infiltration based methods. In urban areas, this amounts to a shift in hydrologic behavior to depression focused recharge. While stormwater is defined as surface flow resulting from developed areas, an integrated hydrologic systems approach to urban water management requires treatment of the full critical zone. In urban areas this extends from the top of the vegetation and building canopy, to a subsurface depth including natural soils, fill, saprolite and bedrock. In addition to matric and network flow in fracture systems, an urban "karst" includes multiple generations of current and past infrastructure, which has developed extensive subsurface pipe networks for supply and drainage, enhancing surface/groundwater flows and exchange. In this presentation, Band will discuss the need to focus on the urban critical zone, and the development and adaptation of new modeling and analytical approaches to understand and plan green infrastructure based on surface/groundwater/ecosystem interactions, and implications for the restoration and new design of cities.

  12. Safety and efficacy of saxagliptin for glycemic control in non-critically ill hospitalized patients

    PubMed Central

    Garg, Rajesh; Schuman, Brooke; Hurwitz, Shelley; Metzger, Cheyenne; Bhandari, Shreya

    2017-01-01

    Objective To evaluate whether saxagliptin is non-inferior to basal-bolus insulin therapy for glycemic control in patients with controlled type 2 diabetes mellitus (T2DM) admitted to hospital with non-critical illnesses. Research design and methods This was an open-label, randomized controlled clinical trial. Patients received either saxagliptin or basal-bolus insulin, both with correctional insulin doses. The main study outcome was the mean daily blood glucose (BG) after the first day of randomization. Results Of 66 patients completing the study, 33 (age 69±10 years, 40% men) were randomized to saxagliptin and 33 (age 67±10 years, 52% men) to basal-bolus insulin therapy. The mean daily BG was 149.8±22.0 mg/dL in the saxagliptin group and 146.9±30.5 mg/dL in the insulin group (p=0.59). With an observed group difference of 2.9 mg/dL and an a priori margin of 20 mg/dL, inferiority of saxagliptin was rejected in favor of non-inferiority (p=0.007). There was no significant difference in the percentage of high or low BG values. The insulin group received a higher number of insulin injections (2.3±1.7/day vs 1.2±1.9/day; p<0.001) as well as a higher daily insulin dose (13.3±12.9 units/day vs 2.4±3.3 units/day; p<0.001) than did the saxagliptin group. Continuous BG monitoring showed that glycemic variability was lower in the saxagliptin group as compared to the insulin group. Patient satisfaction scores were similar in the two groups. Conclusions We conclude that saxagliptin use is non-inferior to basal-bolus insulin in non-critically ill hospitalized patients with T2DM controlled on 0–2 oral agents without insulin. Saxagliptin use may decrease glycemic variability in these patients. Trial registration number NCT02182895.

  13. Explorations Around "Graceful Failure" in Transportation Infrastructure: Lessons Learned By the Infrastructure and Climate Network (ICNet)

    NASA Astrophysics Data System (ADS)

    Jacobs, J. M.; Thomas, N.; Mo, W.; Kirshen, P. H.; Douglas, E. M.; Daniel, J.; Bell, E.; Friess, L.; Mallick, R.; Kartez, J.; Hayhoe, K.; Croope, S.

    2014-12-01

    Recent events have demonstrated that the United States' transportation infrastructure is highly vulnerable to extreme weather events which will likely increase in the future. In light of the 60% shortfall of the $900 billion investment needed over the next five years to maintain this aging infrastructure, hardening of all infrastructures is unlikely. Alternative strategies are needed to ensure that critical aspects of the transportation network are maintained during climate extremes. Preliminary concepts around multi-tier service expectations of bridges and roads with reference to network capacity will be presented. Drawing from recent flooding events across the U.S., specific examples for roads/pavement will be used to illustrate impacts, disruptions, and trade-offs between performance during events and subsequent damage. This talk will also address policy and cultural norms within the civil engineering practice that will likely challenge the application of graceful failure pathways during extreme events.

  14. Study of the critical points of HPMC hydrophilic matrices for controlled drug delivery.

    PubMed

    Miranda, Antonia; Millán, Mónica; Caraballo, Isidoro

    2006-03-27

    The knowledge of the percolation thresholds of a system results in a clear improvement of the design of controlled release dosage forms such as inert matrices. Despite hydrophilic matrices are one of the most used controlled delivery systems in the world, but actuality, the mechanisms of drug release from these systems continue to be a matter of debate nowadays. The objective of the present paper is to apply the percolation theory to study the release and hydration rate of hydrophilic matrices. Matrix tablets have been prepared using KCl as a drug model and HPMC K4M as matrix-forming material, employing five different excipient/drug particle size ratios (ranging from 0.42 to 2.33). The formulations studied containing a drug loading in the range of 20-90% (w/w). Dissolution studies were carried out using the paddle method and the water uptake measurements were performed using a modified Enslin apparatus. In order to estimate the percolation threshold, the behaviour of the kinetic parameters with respect to the volumetric fraction of each component at time zero, was studied. The percolation theory has been applied for the first time to the study of matrix type controlled delivery systems. The application of this theory allowed to explain changes in the release and hydration kinetics of these matrices. The critical points observed in dissolution and water uptake studies can be attributed to the excipient percolation threshold, being this threshold one of the main factors governing the gel layer formation and consequently, the drug release control from hydrophilic matrices.

  15. 78 FR 34112 - Review and Revision of the National Infrastructure Protection Plan

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-06-06

    ... Security and Resilience, and, as part of a comprehensive national review process, solicits public comment...\\ (PPD-21), Critical Infrastructure Security and Resilience, which builds on the extensive work done to date to protect and enhance the resilience of the Nation's critical infrastructure. This directive...

  16. Governance of Large Scale Research Infrastructures: Tailoring Infrastructures to Fit the Research Needs

    NASA Astrophysics Data System (ADS)

    Kohler, E.; Pedersen, H.; Clémenceau, A.; Evans, R.

    2012-04-01

    The legal and governance structures of a pan-European large scale research infrastructure (RI) are critical. They shape the very operation of the undertaking - decision making processes, allocation of tasks and resources, and the relationships amongst the various interested parties - and its eventual success is crucially dependent on choosing these structures wisely. The experience of several examples is used to illustrate how legal and governance schemes for pan-European Research Infrastructures can be used as vehicles to tailor the infrastructure according to its scientific objectives. Indeed, the chosen model can: 1) foster multi-disciplinary research by having representatives of different communities deciding on joint programs; 2) better coordinate scattered communities, both geographically and thematically, increasing their cooperation; 3) implement an innovative Research organization; 4) leverage additional funding; 5) develop a strong identity and elevate international visibility for the communities served; 6) clarify responsibilities, accountability and authority. The ESFRI roadmap has extended the "classical" concept of single-sited RIs (as exemplified in the field of physics by facilities such as CERN) to that of distributed and virtual infrastructures but these raise new issues, especially regarding data exchange and management. As this concept of infrastructure at a European level is relatively new to the major part of the science community, it is especially important that governance models are thoroughly discussed and carefully adapted to fit the specific needs of each of these new distributed facilities. Alongside the legal frameworks which have previously been used for existing infrastructures, the European Commission has established a new legal vehicle, the European Research Infrastructure Consortium or "ERIC", to meet the requirements of the pan-European facilities. It will be shown that this flexible model can be used in a "customized" way to meet

  17. Intelligent systems for strategic power infrastructure defense

    NASA Astrophysics Data System (ADS)

    Jung, Ju-Hwan

    A fault or disturbance in a power system can be severe due to the sources of vulnerability such as human errors, protection and control system failures, a failure of communication networks to deliver critical control signals, and market and load uncertainties. There have been several catastrophic failures resulting from disturbances involving the sources of vulnerability while power systems are designed to withstand disturbances or faults. To avoid catastrophic failures or minimize the impact of a disturbance(s), the state of the power system has to be analyzed correctly and preventive or corrective self-healing control actions have to be deployed. This dissertation addresses two aspects of power systems: Defense system and diagnosis, both concerned with the power system analysis and operation during events involving faults or disturbances. This study is intended to develop a defense system that is able to assess power system vulnerability and to perform self-healing control actions based on the system-wide analysis. In order to meet the requirements of the system-wide analysis, the defense system is designed with multi-agent system technologies. Since power systems are dynamic and uncertain the self-healing control actions need to be adaptive. This study applies the reinforcement learning technique to provide a theoretical basis for adaptation. One of the important issues in adaptation is the convergence of the learning algorithm. An appropriate convergence criterion is derived and an application with a load-shedding scheme is demonstrated in this study. This dissertation also demonstrates the feasibility of the defense system and self-healing control actions through multi-agent system technologies. The other subject of this research is to investigate the methodology for on-line fault diagnosis using the information from Sequence-of-Events Recorders (SER). The proposed multiple-hypothesis analysis generates one or more hypothetical fault scenarios to interpret the

  18. Criticality Safety Controls for 55-Gallon Drums with a Mass Limit of 200 grams Pu-239

    SciTech Connect

    Chou, P

    2011-12-14

    The following 200-gram Pu drum criticality safety controls are applicable to RHWM drum storage operations: (1) Mass (Fissile/Pu) - each 55-gallon drum or its equivalent shall be limited to 200 gram Pu or Pu equivalent; (2) Moderation - Hydrogen materials with a hydrogen density greater than that (0.133 g H/cc) of polyethylene and paraffin are not allowed and hydrogen materials with a hydrogen density no greater than that of polyethylene and paraffin are allowed with unlimited amounts; (3) Interaction - a spacing of 30-inches (76 cm) is required between arrays and 200-gram Pu drums shall be placed in arrays for 200-gram Pu drums only (no mingling of 200-gram Pu drums with other drums not meeting the drum controls associated with the 200-gram limit); (4) Reflection - no beryllium and carbon/graphite (other than the 50-gram waiver amount) is allowed, (note that Nat-U exceeding the waiver amount is allowed when its U-235 content is included in the fissile mass limit of 200 grams); and (5) Geometry - drum geometry, only 55-gallon drum or its equivalent shall be used and array geometry, 55-gallon drums are allowed for 2-high stacking. Steel waste boxes may be stacked 3-high if constraint.

  19. Redundant Flight-Critical Control System Evaluation: Analog and Digital Systems Failure Analyses and Preflight Test Designs

    DTIC Science & Technology

    1975-01-01

    systems. Specifically , the study evaluates analog and digital electronic designs for implementing a triplex fail-operational flight-critical control...SST Technology Follow-On, phase II) deals with the mechanization of redundant electronic subsystems. Specifically , the study compares analog and...electronics suppliers. Specific areas identified for examination during the FCD task were: • General control function operational performance • Sensor

  20. Qualification of the flight-critical AFTI/F-16 digital flight control system. [Advanced Fighter Technology Integration

    NASA Technical Reports Server (NTRS)

    Mackall, D. A.; Ishmael, S. D.; Regenie, V. A.

    1983-01-01

    Qualification considerations for assuring the safety of a life-critical digital flight control system include four major areas: systems interactions, verification, validation, and configuration control. The AFTI/F-16 design, development, and qualification illustrate these considerations. In this paper, qualification concepts, procedures, and methodologies are discussed and illustrated through specific examples.