A Training Framework for the Department of Defense Public Key Infrastructure
2001-09-01
and the growth of electronic commerce within the Department of Defense (DoD) has led to the development and implementation of the DoD Public Key...also grown within the Department of Defense. Electronic commerce and business to business transactions have become more commonplace and have
DOE Office of Scientific and Technical Information (OSTI.GOV)
Maiden, Wendy M.
Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensors’ findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficientmore » authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.« less
2010-12-01
food, water, beds , bedding , clothing, and temporary shelters. They utilized vacant warehouses and parking lots to enable receipt, storage, and...Adequate Water Provide Food Provide Clothing and Bedding Provide Beds Develop National and Local Logistics Infrastructure for Receipt, Storage...Defense Support of Civil Authorities FEMA Federal Emergency Management Agency FM Field Manual JTF Joint Task Force NRF National Response Framework
Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fink, Glenn A.; Oehmen, Christopher S.
This report records the work and contributions of the NITRD-funded Bio-Inspired Approaches to Moving-Target Defense Strategies project performed by Pacific Northwest National Laboratory under the technical guidance of the National Security Agency’s R6 division. The project has incorporated a number of bio-inspired cyber defensive technologies within an elastic framework provided by the Digital Ants. This project has created the first scalable, real-world prototype of the Digital Ants Framework (DAF)[11] and integrated five technologies into this flexible, decentralized framework: (1) Ant-Based Cyber Defense (ABCD), (2) Behavioral Indicators, (3) Bioinformatic Clas- sification, (4) Moving-Target Reconfiguration, and (5) Ambient Collaboration. The DAF canmore » be used operationally to decentralize many such data intensive applications that normally rely on collection of large amounts of data in a central repository. In this work, we have shown how these component applications may be decentralized and may perform analysis at the edge. Operationally, this will enable analytics to scale far beyond current limitations while not suffering from the bandwidth or computational limitations of centralized analysis. This effort has advanced the R6 Cyber Security research program to secure digital infrastructures by developing a dynamic means to adaptively defend complex cyber systems. We hope that this work will benefit both our client’s efforts in system behavior modeling and cyber security to the overall benefit of the nation.« less
Public Key Infrastructure Increment 2 (PKI Inc 2)
2016-03-01
DoD - Department of Defense DoDAF - DoD Architecture Framework FD - Full Deployment FDD - Full Deployment Decision FY - Fiscal Year IA...experienced due to a delay in achieving the FDD . The Critical Change Report was provided to Congress on July 11, 2014. Firm, Fixed-Price Feasibility...to a delay in achieving the FDD . To support the Critical Change Report, the NSA Cost Estimating organization prepared a cost estimate that was
Base Information Transport Infrastructure Wired (BITI Wired)
2016-03-01
Executive DoD - Department of Defense DoDAF - DoD Architecture Framework FD - Full Deployment FDD - Full Deployment Decision FY - Fiscal Year IA...Estimate has been accomplished this period leading to an approved Air Force Service Cost Position in support of the program’s December 2014 FDD milestone...validated to ensure alignment with the business case. This certification is based on my review of the December 2014 Service Cost Position and FDD
2015-03-01
unlimited 13. ABSTRACT (maximum 200 words) Physical network maps are important to critical infrastructure defense and planning. Current state-of...the-art network infrastructure geolocation relies on Domain Name System (DNS) inferences. However, not only is using the DNS relatively inaccurate for...INTENTIONALLY LEFT BLANK iv ABSTRACT Physical network maps are important to critical infrastructure defense and planning. Cur- rent state-of-the-art
2010-04-28
Base Critical Infrastructure Protection Conference (DIBCIP) “Risk Reduction & Mitigation in the Defense Industrial Base ” April 26-28, 2010...Philadelphia, PA Agenda Tuesday, April 27, 2010 Keynote Address: The Economic Crisis and Its Impact on the DIB: Defense Industrial Base Forecasts 2010...Ms. Nancy Pomerleau, Exercise Director, Partnership Outreach Division, DHS-IP DIB 2010 DIB CIP DEFENSE INDUSTRIAL BASE CRITICAL
2007-09-01
Office Why GAO Did This Study Highlights Accountability Integrity Reliability September 2007 DEFENSE INFRASTRUCTURE Challenges Increase Risks for...authority to conduct evaluations on his own initiative. It addresses (1) the challenges and associated risks the Army faces in providing for timely...but it faces several complex implementation challenges that risk late provision of needed infrastructure to adequately support incoming personnel
Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models
Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.; ...
2015-04-06
The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less
Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.
The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less
2015-06-01
Designated Leader, GAO-10-645 (Washington, D.C.: June 30, 2010). 35See GAO, Biological Defense: DOD Has Strengthened Coordination on Medical... on track to be designated a Leadership in Energy and Environmental Design facility. metabolic poisons, and pulmonary toxicants; nerve agent...CHEMICAL AND BIOLOGICAL DEFENSE Designated Entity Needed to Identify, Align, and Manage DOD’s Infrastructure
Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.
Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y
2016-04-01
The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. © 2015 Society for Risk Analysis.
Federal Register 2010, 2011, 2012, 2013, 2014
2010-09-01
... Defense of Infrastructure Against Cyber Threats (PREDICT) Program AGENCY: Science and Technology... Defense of Infrastructure Against Cyber Threats (PREDICT) initiative. PREDICT is an initiative to... new models, technologies and products that support effective threat assessment and increase cyber...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-11-23
... (DHS), Science and Technology, Protected Repository for the Defense of Infrastructure Against Cyber... the Defense of Infrastructure against Cyber Threats (PREDICT) program, and is a revision of a... operational data for use in cyber security research and development through the establishment of distributed...
Defense on the Move: Ant-Based Cyber Defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fink, Glenn A.; Haack, Jereme N.; McKinnon, Archibald D.
Many common cyber defenses (like firewalls and IDS) are as static as trench warfare allowing the attacker freedom to probe them at will. The concept of Moving Target Defense (MTD) adds dynamism to the defender side, but puts the systems to be defended themselves in motion, potentially at great cost to the defender. An alternative approach is a mobile resilient defense that removes attackers’ ability to rely on prior experience without requiring motion in the protected infrastructure itself. The defensive technology absorbs most of the cost of motion, is resilient to attack, and is unpredictable to attackers. The Ant-Based Cybermore » Defense (ABCD) is a mobile resilient defense providing a set of roaming, bio-inspired, digital-ant agents working with stationary agents in a hierarchy headed by a human supervisor. The ABCD approach provides a resilient, extensible, and flexible defense that can scale to large, multi-enterprise infrastructures like the smart electric grid.« less
Morris, Michael J; Basch, Ethan M; Wilding, George; Hussain, Maha; Carducci, Michael A; Higano, Celestia; Kantoff, Philip; Oh, William K; Small, Eric J; George, Daniel; Mathew, Paul; Beer, Tomasz M; Slovin, Susan F; Ryan, Charles; Logothetis, Christopher; Scher, Howard I
2009-01-01
In 2005, the US Department of Defense, through the US Army Medical Research and Materiel Command, Office of the Congressionally Directed Medical Research Programs, created a funding mechanism to form a clinical trials consortium to conduct phase I and II studies in prostate cancer. This is the first report of the Prostate Cancer Clinical Trials Consortium (PCCTC). The Department of Defense award supports a consortium of 10 prostate cancer research centers. Memorial Sloan-Kettering Cancer Center was awarded the Coordinating Center grant for the consortium and charged with creating an infrastructure to conduct early-phase multicenter clinical trials. Each participating center was required to introduce >or=1 clinical trial per year and maintain accrual of a minimum of 35 patients per year. The PCCTC was launched in 2006 and now encompasses 10 leading prostate cancer research centers. Fifty-one trials have been opened, and 1386 patients have been accrued at member sites. Members share an online clinical trial management system for protocol tracking, electronic data capture, and data storage. A legal framework has been instituted, and standard operating procedures, an administrative structure, editorial support, centralized budgeting, and mechanisms for scientific review are established. The PCCTC fulfills a congressional directive to create a clinical trials instrument dedicated to early-phase prostate cancer studies. The member institutions have built an administrative, informatics, legal, financial, statistical, and scientific infrastructure to support this endeavor. Clinical trials are open and accruing in excess of federally mandated goals.
2016-04-13
ordnance and munitions components; endangered species habitat; and protected marine resources.1 More recently, DOD stated in its 2014 Sustainable Ranges...House Report 113-446 accompanying a bill for the National Defense Authorization Act for Fiscal Year 2015 directed DOD to submit a report assessing... act on our 2014 recommendations, and we will continue to monitor DOD actions in this area. Page 4 GAO-16-381R Defense Infrastructure DOD Has
Glover, Wiljeana J; Plmanabhan, Jayaprasad; Rhodes, Donna; Nightingale, Deborah
2015-08-01
Although researchers suggest that a systems approach is required to make meaningful advances in the U.S. psychological health care system for service members, limited research has considered such an approach. This research uses an enterprise architecting framework to identify the system's strengths and areas for opportunity as they relate to the Ecosystem, Stakeholders, Strategy, Process, Organization, Knowledge, Information, and Infrastructure. Codifying qualitative data from publicly available U.S. Defense Health Agency and U.S. Service Branch doctrine, policy guidance, and concepts of operations, our findings indicate that the psychological health care system is strongly process-oriented and mentions a variety of key stakeholders and their roles and responsibilities in the enterprise. Potential opportunities of improvement for the system include a stronger emphasis on the development and transfer of knowledge capabilities, and a stronger information-based infrastructure. Reprint & Copyright © 2015 Association of Military Surgeons of the U.S.
Under Secretary of Defense for Policy > OUSDP Offices > ASD for Homeland
Defense Global Security > Defense Critical Infrastructure Program > Roles Skip to main for Asian and Pacific Security Affairs ASD for Homeland Defense Global Security DASD Defense -Intensity Conflict Counternarcotics and Global Threats Stability and Humanitarian Affairs Special Operations
Artificial Diversity and Defense Security (ADDSec) Final Report.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chavez, Adrian R.; Hamlet, Jason; Stout, William M.S.
Critical infrastructure systems continue to foster predictable communication patterns and static configurations over extended periods of time. The static nature of these systems eases the process of gathering reconnaissance information that can be used to design, develop, and launch attacks by adversaries. In this research effort, the early phases of an attack vector will be disrupted by randomizing application port numbers, IP addresses, and communication paths dynamically through the use of overlay networks within Industrial Control Systems (ICS). These protective measures convert static systems into "moving targets," adding an additional layer of defense. Additionally, we have developed a framework thatmore » automatically detects and defends against threats within these systems using an ensemble of machine learning algorithms that classify and categorize abnormal behavior. Our proof-of-concept has been demonstrated within a representative ICS environment. Performance metrics of our proof-of-concept have been captured with latency impacts of less than a millisecond, on average.« less
Federal Register 2010, 2011, 2012, 2013, 2014
2010-10-29
... operation of facilities, infrastructure, and equipment for use by DoD military or civilian should be...-7004, Safety of Facilities, Infrastructure, and Equipment for Military Operations. DFARS 246.270-1... operation of facilities. This includes contracts for facilities, infrastructure, and equipment configured...
Federal Register 2010, 2011, 2012, 2013, 2014
2011-03-17
... facilities, infrastructure, and equipment that are intended for use by military or civilian personnel of the..., maintenance, or operation of facilities, infrastructure, and equipment for use by DoD military or civilian... facilities. This includes contracts for facilities, infrastructure, and equipment configured for occupancy...
2016-09-01
unneeded to support U.S. forces in the CENTCOM area of responsibility and in future contingencies worldwide. View GAO-16-406. For more information...DEFENSE INFRASTRUCTURE Actions Needed to Enhance Oversight of Construction Projects Supporting Military Contingency ...Actions Needed to Enhance Oversight of Construction Projects Supporting Military Contingency Operations Why GAO Did This Study For about 15 years, DOD
2011-01-01
CARE INFRASTRUCTURE AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND...research was conducted within the International Security and Defense Policy Center of the RAND National Defense Research Institute, a federally funded...Marine Corps, the defense agencies, and the defense Intelligence Community. For more information on the International Security and Defense Policy
Attacker-defender game from a network science perspective
NASA Astrophysics Data System (ADS)
Li, Ya-Peng; Tan, Suo-Yi; Deng, Ye; Wu, Jun
2018-05-01
Dealing with the protection of critical infrastructures, many game-theoretic methods have been developed to study the strategic interactions between defenders and attackers. However, most game models ignore the interrelationship between different components within a certain system. In this paper, we propose a simultaneous-move attacker-defender game model, which is a two-player zero-sum static game with complete information. The strategies and payoffs of this game are defined on the basis of the topology structure of the infrastructure system, which is represented by a complex network. Due to the complexity of strategies, the attack and defense strategies are confined by two typical strategies, namely, targeted strategy and random strategy. The simulation results indicate that in a scale-free network, the attacker virtually always attacks randomly in the Nash equilibrium. With a small cost-sensitive parameter, representing the degree to which costs increase with the importance of a target, the defender protects the hub targets with large degrees preferentially. When the cost-sensitive parameter exceeds a threshold, the defender switches to protecting nodes randomly. Our work provides a new theoretical framework to analyze the confrontations between the attacker and the defender on critical infrastructures and deserves further study.
Human Computer Interface Design Criteria. Volume 1. User Interface Requirements
2010-03-19
Television tuners, including tuner cards for use in computers, shall be equipped with secondary audio program playback circuitry. (c) All training...Shelf CSS Cascading Style Sheets DII Defense Information Infrastructure DISA Defense Information Systems Agency DoD Department of Defense
2010-03-01
submenus and toolbar with icon buttons 4. The IFOTA shall conform to Defense Information Infrastructure Common Operating Environment ( DII COE) and...him my business card , but it might come in the package we request via AFRL). PSYOP Instructor IWST is now called IWT (??) SME MD MD Instructor...Engineering and Software Engineering CTA Cognitive Task Analysis DII COE Defense Information Infrastructure Common Operating Environment EJB Enterprise Java
An Evaluation of the High Level Architecture (HLA) as a Framework for NASA Modeling and Simulation
NASA Technical Reports Server (NTRS)
Reid, Michael R.; Powers, Edward I. (Technical Monitor)
2000-01-01
The High Level Architecture (HLA) is a current US Department of Defense and an industry (IEEE-1516) standard architecture for modeling and simulations. It provides a framework and set of functional rules and common interfaces for integrating separate and disparate simulators into a larger simulation. The goal of the HLA is to reduce software costs by facilitating the reuse of simulation components and by providing a runtime infrastructure to manage the simulations. In order to evaluate the applicability of the HLA as a technology for NASA space mission simulations, a Simulations Group at Goddard Space Flight Center (GSFC) conducted a study of the HLA and developed a simple prototype HLA-compliant space mission simulator. This paper summarizes the prototyping effort and discusses the potential usefulness of the HLA in the design and planning of future NASA space missions with a focus on risk mitigation and cost reduction.
System Software Framework for System of Systems Avionics
NASA Technical Reports Server (NTRS)
Ferguson, Roscoe C.; Peterson, Benjamin L; Thompson, Hiram C.
2005-01-01
Project Constellation implements NASA's vision for space exploration to expand human presence in our solar system. The engineering focus of this project is developing a system of systems architecture. This architecture allows for the incremental development of the overall program. Systems can be built and connected in a "Lego style" manner to generate configurations supporting various mission objectives. The development of the avionics or control systems of such a massive project will result in concurrent engineering. Also, each system will have software and the need to communicate with other (possibly heterogeneous) systems. Fortunately, this design problem has already been solved during the creation and evolution of systems such as the Internet and the Department of Defense's successful effort to standardize distributed simulation (now IEEE 1516). The solution relies on the use of a standard layered software framework and a communication protocol. A standard framework and communication protocol is suggested for the development and maintenance of Project Constellation systems. The ARINC 653 standard is a great start for such a common software framework. This paper proposes a common system software framework that uses the Real Time Publish/Subscribe protocol for framework-to-framework communication to extend ARINC 653. It is highly recommended that such a framework be established before development. This is important for the success of concurrent engineering. The framework provides an infrastructure for general system services and is designed for flexibility to support a spiral development effort.
2013-05-01
assistance in planning and carrying out adjustment strategies in response to defense actions. OEA is the primary DOD office responsible for...Chemical Depot, UT; Mississippi Army Ammunition Plant, MS; Naval Air Station Atlanta, GA; and Kulis Air Guard Station, AK did not receive any grants...Infrastructure also preparing to take over the rest of the property when the primary caretaker leaves. Community representatives also said hiring
ATLAS Metadata Infrastructure Evolution for Run 2 and Beyond
NASA Astrophysics Data System (ADS)
van Gemmeren, P.; Cranshaw, J.; Malon, D.; Vaniachine, A.
2015-12-01
ATLAS developed and employed for Run 1 of the Large Hadron Collider a sophisticated infrastructure for metadata handling in event processing jobs. This infrastructure profits from a rich feature set provided by the ATLAS execution control framework, including standardized interfaces and invocation mechanisms for tools and services, segregation of transient data stores with concomitant object lifetime management, and mechanisms for handling occurrences asynchronous to the control framework's state machine transitions. This metadata infrastructure is evolving and being extended for Run 2 to allow its use and reuse in downstream physics analyses, analyses that may or may not utilize the ATLAS control framework. At the same time, multiprocessing versions of the control framework and the requirements of future multithreaded frameworks are leading to redesign of components that use an incident-handling approach to asynchrony. The increased use of scatter-gather architectures, both local and distributed, requires further enhancement of metadata infrastructure in order to ensure semantic coherence and robust bookkeeping. This paper describes the evolution of ATLAS metadata infrastructure for Run 2 and beyond, including the transition to dual-use tools—tools that can operate inside or outside the ATLAS control framework—and the implications thereof. It further examines how the design of this infrastructure is changing to accommodate the requirements of future frameworks and emerging event processing architectures.
DOT National Transportation Integrated Search
2012-12-01
Fully operational highways are necessary for efficient freight movements by the trucking industry. Yet, the combination of limited funding and aging infrastructure creates a grim scenario for states, which are dependent upon the economic benefits of ...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Brown, Nathanael J. K.; Gearhart, Jared Lee; Jones, Dean A.
Currently, much of protection planning is conducted separately for each infrastructure and hazard. Limited funding requires a balance of expenditures between terrorism and natural hazards based on potential impacts. This report documents the results of a Laboratory Directed Research & Development (LDRD) project that created a modeling framework for investment planning in interdependent infrastructures focused on multiple hazards, including terrorism. To develop this framework, three modeling elements were integrated: natural hazards, terrorism, and interdependent infrastructures. For natural hazards, a methodology was created for specifying events consistent with regional hazards. For terrorism, we modeled the terrorists actions based on assumptions regardingmore » their knowledge, goals, and target identification strategy. For infrastructures, we focused on predicting post-event performance due to specific terrorist attacks and natural hazard events, tempered by appropriate infrastructure investments. We demonstrate the utility of this framework with various examples, including protection of electric power, roadway, and hospital networks.« less
Critical Infrastructure Protection: EMP Impacts on the U.S. Electric Grid
NASA Astrophysics Data System (ADS)
Boston, Edwin J., Jr.
The purpose of this research is to identify the United States electric grid infrastructure systems vulnerabilities to electromagnetic pulse attacks and the cyber-based impacts of those vulnerabilities to the electric grid. Additionally, the research identifies multiple defensive strategies designed to harden the electric grid against electromagnetic pulse attack that include prevention, mitigation and recovery postures. Research results confirm the importance of the electric grid to the United States critical infrastructures system and that an electromagnetic pulse attack against the electric grid could result in electric grid degradation, critical infrastructure(s) damage and the potential for societal collapse. The conclusions of this research indicate that while an electromagnetic pulse attack against the United States electric grid could have catastrophic impacts on American society, there are currently many defensive strategies under consideration designed to prevent, mitigate and or recover from an electromagnetic pulse attack. However, additional research is essential to further identify future target hardening opportunities, efficient implementation strategies and funding resources.
Active Computer Network Defense: An Assessment
2001-04-01
sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center
Hoffman, P; Kline, E; George, L; Price, K; Clark, M; Walasin, R
1995-01-01
The Military Health Service System (MHSS) provides health care for the Department of Defense (DOD). This system operates on an annual budget of $15 Billion, supports 127 medical treatment facilities (MTFs) and 500 clinics, and provides support to 8.7 million beneficiaries worldwide. To support these facilities and their patients, the MHSS uses more than 125 different networked automated medical systems. These systems rely on a heterogeneous telecommunications infrastructure for data communications. With the support of the Defense Medical Information Management (DMIM) Program Office, our goal was to identify the network requirements for DMIM migration and target systems and design a communications infrastructure to support all systems with an integrated network. This work used tools from Business Process Reengineering (BPR) and applied it to communications infrastructure design for the first time. The methodology and results are applicable to any health care enterprise, military or civilian.
Hoffman, P.; Kline, E.; George, L.; Price, K.; Clark, M.; Walasin, R.
1995-01-01
The Military Health Service System (MHSS) provides health care for the Department of Defense (DOD). This system operates on an annual budget of $15 Billion, supports 127 medical treatment facilities (MTFs) and 500 clinics, and provides support to 8.7 million beneficiaries worldwide. To support these facilities and their patients, the MHSS uses more than 125 different networked automated medical systems. These systems rely on a heterogeneous telecommunications infrastructure for data communications. With the support of the Defense Medical Information Management (DMIM) Program Office, our goal was to identify the network requirements for DMIM migration and target systems and design a communications infrastructure to support all systems with an integrated network. This work used tools from Business Process Reengineering (BPR) and applied it to communications infrastructure design for the first time. The methodology and results are applicable to any health care enterprise, military or civilian. PMID:8563346
A number of multimedia modeling frameworks are currently being developed. The Multimedia Integrated Modeling System (MIMS) is one of these frameworks. A framework should be seen as more of a multimedia modeling infrastructure than a single software system. This infrastructure do...
Six Information Technology Services Contracts for the Defense Intelligence Community
2000-04-24
This category covers Defense Intelligence Community organizations whose mission is to provide for the planning, development, deployment, operation ... management , and oversight of global information networks and infrastructure supporting intelligence producers. • Information Systems. This category
DOE Office of Scientific and Technical Information (OSTI.GOV)
Moss, R. H.; Blohm, A. J.; Delgado, A.
2015-08-15
U.S. government agencies are now directed to assess the vulnerability of their operations and facilities to climate change and to develop adaptation plans to increase their resilience. Specific guidance on methods is still evolving based on the many different available frameworks. Agencies have been experimenting with these frameworks and approaches. This technical paper synthesizes lessons and insights from a series of research case studies conducted by the investigators at facilities of the U.S. Department of Energy and the Department of Defense. The purpose of the paper is to solicit comments and feedback from interested program managers and analysts before finalmore » conclusions are published. The paper describes the characteristics of a systematic process for prioritizing needs for adaptation planning at individual facilities and examines requirements and methods needed. It then suggests a framework of steps for vulnerability assessments at Federal facilities and elaborates on three sets of methods required for assessments, regardless of the detailed framework used. In a concluding section, the paper suggests a roadmap to further develop methods to support agencies in preparing for climate change. The case studies point to several preliminary conclusions; (1) Vulnerability assessments are needed to translate potential changes in climate exposure to estimates of impacts and evaluation of their significance for operations and mission attainment, in other words into information that is related to and useful in ongoing planning, management, and decision-making processes; (2) To increase the relevance and utility of vulnerability assessments to site personnel, the assessment process needs to emphasize the characteristics of the site infrastructure, not just climate change; (3) A multi-tiered framework that includes screening, vulnerability assessments at the most vulnerable installations, and adaptation design will efficiently target high-risk sites and infrastructure; (4) Vulnerability assessments can be connected to efforts to improve facility resilience to motivate participation; and (5) Efficient, scalable methods for vulnerability assessment can be developed, but additional case studies and evaluation are required.« less
A Virtual Environment for Resilient Infrastructure Modeling and Design
2015-09-01
Security CI Critical Infrastructure CID Center for Infrastructure Defense CSV Comma Separated Value DAD Defender-Attacker-Defender DHS Department...responses to disruptive events (e.g., cascading failure behavior) in a context- rich , controlled environment for exercises, education, and training...The general attacker-defender (AD) and defender-attacker-defender ( DAD ) models for CI are defined in Brown et al. (2006). These models help
We propose a modified eco-efficiency (EE) framework and novel sustainability analysis methodology for green infrastructure (GI) practices used in water resource management. Green infrastructure practices such as rainwater harvesting (RWH), rain gardens, porous pavements, and gree...
Projects without a purpose: Why a top down strategy to resilience matters
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kingery, Kristine M.; Fowler, Kimberly M.; Harrove
Energy resilience is a key focus of the current administration and Department of Defense (DoD) leaders, and is in the title of every energy conference session. Most case studies and success stories focus on resilience projects hardening systems or microgriding critical infrastructure. Some case studies focus on unique financing approaches to bring private sector innovation and increased investment to military installations. Many times, what initially look like innovative resilience projects, end as isolated systems or stranded infrastructure. This article will explore how the DoD can make greater strides advancing resilience objectives and ultimately developing projects that support installation mission readinessmore » by first focusing on top down strategies. The Army established energy and water security/resilience requirements, developed a comprehensive measurement framework, is evolving integrated planning approaches in collaboration with local communities, and is supporting project development activities across third-party and appropriated programs. The Army’s multi-year strategic energy and water security planning activities can provide helpful guidance to both the lifecycle of programs or individual projects, and ensure resilience projects both have and achieve a purpose.« less
A flexible framework has been created for modeling multi-dimensional hydrological and water quality processes within stormwater green infrastructures (GIs). The framework models a GI system using a set of blocks (spatial features) and connectors (interfaces) representing differen...
User-level framework for performance monitoring of HPC applications
NASA Astrophysics Data System (ADS)
Hristova, R.; Goranov, G.
2013-10-01
HP-SEE is an infrastructure that links the existing HPC facilities in South East Europe in a common infrastructure. The analysis of the performance monitoring of the High-Performance Computing (HPC) applications in the infrastructure can be useful for the end user as diagnostic for the overall performance of his applications. The existing monitoring tools for HP-SEE provide to the end user only aggregated information for all applications. Usually, the user does not have permissions to select only the relevant information for him and for his applications. In this article we present a framework for performance monitoring of the HPC applications in the HP-SEE infrastructure. The framework provides standardized performance metrics, which every user can use in order to monitor his applications. Furthermore as a part of the framework a program interface is developed. The interface allows the user to publish metrics data from his application and to read and analyze gathered information. Publishing and reading through the framework is possible only with grid certificate valid for the infrastructure. Therefore the user is authorized to access only the data for his applications.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ehlen, Mark Andrew; Vugrin, Eric D.; Warren, Drake E.
In recent years, the nation has recognized that critical infrastructure protection should consider not only the prevention of disruptive events, but also the processes that infrastructure systems undergo to maintain functionality following disruptions. This more comprehensive approach has been termed critical infrastructure resilience (CIR). Given the occurrence of a particular disruptive event, the resilience of a system to that event is the system's ability to efficiently reduce both the magnitude and duration of the deviation from targeted system performance levels. Sandia National Laboratories (Sandia) has developed a comprehensive resilience assessment framework for evaluating the resilience of infrastructure and economic systems.more » The framework includes a quantitative methodology that measures resilience costs that result from a disruption to infrastructure function. The framework also includes a qualitative analysis methodology that assesses system characteristics that affect resilience in order to provide insight and direction for potential improvements to resilience. This paper describes the resilience assessment framework. This paper further demonstrates the utility of the assessment framework through application to a hypothetical scenario involving the disruption of a petrochemical supply chain by a hurricane.« less
The Impact of Emerging MEMS-Based Microsystems on US Defense Applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
STAPLE,BEVAN D.; JAKUBCZAK II,JEROME F.
2000-01-20
This paper examines the impact of inserting Micro-Electro-Mechanical Systems (MEMS) into US defense applications. As specific examples, the impacts of micro Inertial Measurement Units (IMUs), radio frequency MEMS (RF MEMS), and Micro-Opto-Electro-Mechanical Systems (MOEMS) to provide integrated intelligence, communication, and control to the defense infrastructure with increased affordability, functionality, and performance are highlighted.
Review of defense display research programs
NASA Astrophysics Data System (ADS)
Tulis, Robert W.; Hopper, Darrel G.; Morton, David C.; Shashidhar, Ranganathan
2001-09-01
Display research has comprised a substantial portion of the defense investment in new technology for national security for the past 13 years. These investments have been made by the separate service departments and, especially, via several Defense Research Projects Agency (DARPA) programs, known collectively as the High Definition Systems (HDS) Program (which ended in 2001) and via the Office of the Secretary of Defense (OSD) Defense Production Act (DPA) Title III Program (efforts ended in 2000). Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These completed DARPA and DPA research and infrastructure programs are reviewed. Service investments have been and are being made to transition display technology; examples are described. Display science and technology (S&T) visions are documented for each service to assist the identification of areas meriting consideration for future defense research.
Key Management Infrastructure Increment 2 (KMI Inc 2)
2016-03-01
2016 Major Automated Information System Annual Report Key Management Infrastructure Increment 2 (KMI Inc 2) Defense Acquisition Management...PB - President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be Determined TY - Then...Assigned: April 6, 2015 Program Information Program Name Key Management Infrastructure Increment 2 (KMI Inc 2) DoD Component DoD The acquiring DoD
Innovative Decentralized Decision-Making Enabling Capability on Mobile Edge Devices
2015-09-01
feasibility of adapting mobile device infrastructure into a future tactical cloud ecosystem. F. SCOPE The scope of this research is focused on the...critical to mobility : wireless infrastructure , the mobile device itself, and mobile applications” (Office of the Department of Defense Chief Information... Infrastructure to a Cost Effective and Platform Agnostic Environment; 3) Collaborate with DOD and Industry Partners to Develop a Classified Mobile Device
We introduce a hierarchical optimization framework for spatially targeting green infrastructure (GI) incentive policies in order to meet objectives related to cost and environmental effectiveness. The framework explicitly simulates the interaction between multiple levels of polic...
Defense Strategies for Asymmetric Networked Systems with Discrete Components.
Rao, Nageswara S V; Ma, Chris Y T; Hausken, Kjell; He, Fei; Yau, David K Y; Zhuang, Jun
2018-05-03
We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i) the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii) the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models.
Defense Strategies for Asymmetric Networked Systems with Discrete Components
Rao, Nageswara S. V.; Ma, Chris Y. T.; Hausken, Kjell; He, Fei; Yau, David K. Y.
2018-01-01
We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i) the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii) the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models. PMID:29751588
The Department of Energy Nuclear Criticality Safety Program
NASA Astrophysics Data System (ADS)
Felty, James R.
2005-05-01
This paper broadly covers key events and activities from which the Department of Energy Nuclear Criticality Safety Program (NCSP) evolved. The NCSP maintains fundamental infrastructure that supports operational criticality safety programs. This infrastructure includes continued development and maintenance of key calculational tools, differential and integral data measurements, benchmark compilation, development of training resources, hands-on training, and web-based systems to enhance information preservation and dissemination. The NCSP was initiated in response to Defense Nuclear Facilities Safety Board Recommendation 97-2, Criticality Safety, and evolved from a predecessor program, the Nuclear Criticality Predictability Program, that was initiated in response to Defense Nuclear Facilities Safety Board Recommendation 93-2, The Need for Critical Experiment Capability. This paper also discusses the role Dr. Sol Pearlstein played in helping the Department of Energy lay the foundation for a robust and enduring criticality safety infrastructure.
Code of Federal Regulations, 2013 CFR
2013-01-01
... Department of Defense; (2) the Department of the Interior; (3) the Department of Agriculture; (4) the Department of Commerce; (5) the Department of Transportation; (6) the Department of Veterans Affairs; and (7... local transportation infrastructure, creating significant opportunities for executive departments and...
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jiang, Hanchen, E-mail: jhc13@mails.tsinghua.edu.cn; Qiang, Maoshan, E-mail: qiangms@tsinghua.edu.cn; Lin, Peng, E-mail: celinpe@mail.tsinghua.edu.cn
Public opinion becomes increasingly salient in the ex post evaluation stage of large infrastructure projects which have significant impacts to the environment and the society. However, traditional survey methods are inefficient in collection and assessment of the public opinion due to its large quantity and diversity. Recently, Social media platforms provide a rich data source for monitoring and assessing the public opinion on controversial infrastructure projects. This paper proposes an assessment framework to transform unstructured online public opinions on large infrastructure projects into sentimental and topical indicators for enhancing practices of ex post evaluation and public participation. The framework usesmore » web crawlers to collect online comments related to a large infrastructure project and employs two natural language processing technologies, including sentiment analysis and topic modeling, with spatio-temporal analysis, to transform these comments into indicators for assessing online public opinion on the project. Based on the framework, we investigate the online public opinion of the Three Gorges Project on China's largest microblogging site, namely, Weibo. Assessment results present spatial-temporal distributions of post intensity and sentiment polarity, reveals major topics with different sentiments and summarizes managerial implications, for ex post evaluation of the world's largest hydropower project. The proposed assessment framework is expected to be widely applied as a methodological strategy to assess public opinion in the ex post evaluation stage of large infrastructure projects. - Highlights: • We developed a framework to assess online public opinion on large infrastructure projects with environmental impacts. • Indicators were built to assess post intensity, sentiment polarity and major topics of the public opinion. • We took the Three Gorges Project (TGP) as an example to demonstrate the effectiveness proposed framework. • We revealed spatial-temporal patterns of post intensity and sentiment polarity on the TGP. • We drew implications for a more in-depth understanding of the public opinion on large infrastructure projects.« less
NASA Technical Reports Server (NTRS)
2005-01-01
The Transformational Concept of Operations (CONOPS) provides a long-term, sustainable vision for future U.S. space transportation infrastructure and operations. This vision presents an interagency concept, developed cooperatively by the Department of Defense (DoD), the Federal Aviation Administration (FAA), and the National Aeronautics and Space Administration (NASA) for the upgrade, integration, and improved operation of major infrastructure elements of the nation s space access systems. The interagency vision described in the Transformational CONOPS would transform today s space launch infrastructure into a shared system that supports worldwide operations for a variety of users. The system concept is sufficiently flexible and adaptable to support new types of missions for exploration, commercial enterprise, and national security, as well as to endure further into the future when space transportation technology may be sufficiently advanced to enable routine public space travel as part of the global transportation system. The vision for future space transportation operations is based on a system-of-systems architecture that integrates the major elements of the future space transportation system - transportation nodes (spaceports), flight vehicles and payloads, tracking and communications assets, and flight traffic coordination centers - into a transportation network that concurrently accommodates multiple types of mission operators, payloads, and vehicle fleets. This system concept also establishes a common framework for defining a detailed CONOPS for the major elements of the future space transportation system. The resulting set of four CONOPS (see Figure 1 below) describes the common vision for a shared future space transportation system (FSTS) infrastructure from a variety of perspectives.
Standing Committee on Defense Materials, Manufacturing, and Infrastructure
2012-02-06
advanced materials and processes used in GE’s aeronautical turbine engines and their marine and industrial derivatives. He oversees Materials...DOD to play technologically to assist the industry in smoothing out “rough edges” of initial production. For example, if DOD chooses to use Defense...to critical and strategic materials availability has not kept pace. In addition, the ability of US industry and the defense industrial base to
Eric Kuehler; Jon Hathaway; Andrew Tirpak
2017-01-01
The use of green infrastructure for reducing stormwater runoff is increasingly common. One underâstudied component of the green infrastructure network is the urban forest system. Trees can play an important role as the âfirst line of defenseâ for restoring more natural hydrologic regimes in urban watersheds by intercepting rainfall, delaying runoff, infiltrating, and...
CrossTalk: The Journal of Defense Software Engineering. Volume 27, Number 5, September/October 2014
2014-10-01
CMSP Infrastructure . 24. CMSP Infrastructure sends message via broadcast to mobile devices in the designated area(s). 25. Mobile device users... infrastructure could potentially threaten our way of life. Given the swiftness of technological change, it is excusable that organizations might...system, which is diagramed in Fig. 1, would expand these op- tions to mobile devices. FEMA established the message struc- ture and the approvals needed to
Transportation Challenges in the Hampton Roads, VA, Region
2012-06-01
ORDERS ( PPO ) ...........................................................11 J. HIGHWAYS FOR NATIONAL DEFENSE (HND) ...................................12 K... PPO Port Planning Orders RND Railroads for National Defense SDDCTEA Surface Deployment and Distribution Command Transportation Engineering...important Continental United States (CONUS) port infrastructure in both peacetime and wartime. Strategic Seaports and Port Planning Orders ( PPOs ) were
NASA Astrophysics Data System (ADS)
Ramaswami, A.
2016-12-01
Urban infrastructure - broadly defined to include the systems that provide water, energy, food, shelter, transportation-communication, sanitation and green/public spaces in cities - have tremendous impact on the environment and on human well-being (Ramaswami et al., 2016; Ramaswami et al., 2012). Aggregated globally, these sectors contribute 90% of global greenhouse gas (GHG) emissions and 96% of global water withdrawals. Urban infrastructure contributions to such impacts are beginning to dominate. Cities are therefore becoming the action arena for infrastructure transformations that can achieve high levels of service delivery while reducing environmental impacts and enhancing human well-being. Achieving sustainable urban infrastructure transitions requires: information about the engineered infrastructure, and its interaction with the natural (ecological-environmental) and the social sub-systems In this paper, we apply a multi-sector, multi-scalar Social-Ecological-Infrastructural Systems framework that describes the interactions among biophysical engineered infrastructures, the natural environment and the social system in a systems-approach to inform urban infrastructure transformations. We apply the SEIS framework to inform water and energy sector transformations in cities to achieve environmental and human health benefits realized at multiple scales - local, regional and global. Local scales address pollution, health, wellbeing and inequity within the city; regional scales address regional pollution, scarcity, as well as supply risks in the water-energy sectors; global impacts include greenhouse gas emissions and climate impacts. Different actors shape infrastructure transitions including households, businesses, and policy actors. We describe the development of novel cross-sectoral strategies at the water-energy nexus in cities, focusing on water, waste and energy sectors, in a case study of Delhi, India. Ramaswami, A.; Russell, A.G.; Culligan, P.J.; Sharma, K.R.; Kumar, E. (2016). Meta-Principles for developing smart, sustainable, and healthy cities, Science, 352(6288), 940-3. Ramaswami, A., et al. A Social-Ecological Infrastructural Systems Framework for Inter-Disciplinary Study of Sustainable City-Systems. J. Ind Ecol, 16(6): 801-813, 2012.
Using Machine Learning in Adversarial Environments.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Warren Leon Davis
Intrusion/anomaly detection systems are among the first lines of cyber defense. Commonly, they either use signatures or machine learning (ML) to identify threats, but fail to account for sophisticated attackers trying to circumvent them. We propose to embed machine learning within a game theoretic framework that performs adversarial modeling, develops methods for optimizing operational response based on ML, and integrates the resulting optimization codebase into the existing ML infrastructure developed by the Hybrid LDRD. Our approach addresses three key shortcomings of ML in adversarial settings: 1) resulting classifiers are typically deterministic and, therefore, easy to reverse engineer; 2) ML approachesmore » only address the prediction problem, but do not prescribe how one should operationalize predictions, nor account for operational costs and constraints; and 3) ML approaches do not model attackers’ response and can be circumvented by sophisticated adversaries. The principal novelty of our approach is to construct an optimization framework that blends ML, operational considerations, and a model predicting attackers reaction, with the goal of computing optimal moving target defense. One important challenge is to construct a realistic model of an adversary that is tractable, yet realistic. We aim to advance the science of attacker modeling by considering game-theoretic methods, and by engaging experimental subjects with red teaming experience in trying to actively circumvent an intrusion detection system, and learning a predictive model of such circumvention activities. In addition, we will generate metrics to test that a particular model of an adversary is consistent with available data.« less
ERIC Educational Resources Information Center
Lee, Ashley; Hobson, Joe; Bienkowski, Marie; Midgley, Steve; Currier, Sarah; Campbell, Lorna M.; Novoselova, Tatiana
2012-01-01
In this article, the authors describe an open-source, open-data digital infrastructure for sharing information about open educational resources (OERs) across disparate systems and platforms. The Learning Registry, which began as a project funded by the U.S. Departments of Education and Defense, currently has an active international community…
78 FR 28707 - National Defense Transportation Day and National Transportation Week, 2013
Federal Register 2010, 2011, 2012, 2013, 2014
2013-05-15
... challenges we face. We need to restore our roads, bridges, and ports-- transportation networks that are... security. At a time when our cities face unprecedented threats and hazards, we must do more to ensure our... infrastructure. In recognition of the importance of our Nation's transportation infrastructure, and of the men...
2017-04-13
Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law , no person shall be...policy, and law . The research question is whether the Departments of Homeland Security (DHS) and Defense (DOD) have federal statutory authority to... law ); Department of Homeland Security; Department of Defense; establish standards; physical protection and security; national security 16. SECURITY
2014-12-01
accompanying a bill for the National Defense Authorization Act for Fiscal Year 2014 to review encroachment on DOD’s test and training ranges. This...Defense Authorization Act for Fiscal Year 2014 mandated that we review DOD’s activities to prevent and mitigate encroachment at training ranges. This...Department of Justice Federal Bureau of Investigation Headquarters, Washington, D.C. Reno, Nevada Las Vegas, Nevada Department of the Interior
2013-02-01
Defense Logistics List of Abbreviations aRFID active radio frequency identification DOD Department of Defense RFID...The Navy and the Air Force each have their own Active Radio Frequency Identification ( aRFID ) Migration Program. These two programs are included...with the aRFID Program and the aRFID Infrastructure, respectively and are therefore not listed in the table. Appendix III: Comments from the
Domestic Trends in the United States, China, and Iran. Implications for U.S. Navy Strategic Planning
2008-01-01
ABUSE TERRORISM AND HOMELAND SECURITY TRANSPORTATION AND INFRASTRUCTURE WORKFORCE AND WORKPLACE The RAND Corporation is a nonprofit research...Marine Corps, the defense agencies, and the defense Intelligence Community under Contract W74V8H-06-C-0002. iii Preface This book examines the future... Intelligence Community. For more information on RAND’s International Security and Defense Policy Center, contact the Director, James Dobbins. He can be
A Theoretical Framework for Defense Acquisition Analysis
1989-09-01
Carnegie Reports on this issue discuss the need further. Being imaginative in business means having the ability to visualize systematic...Curriculum in Business and Public Administration," Negotiation Journal, 2: 191-204. (April 1987). 15. Cheney, Dick. Defense Management Report to the...Framework, Framework I and Framework II ....... .................. 105 13. Typical Perspective of an American Business Organization
NASA Astrophysics Data System (ADS)
Ross, A.; Little, M. M.
2013-12-01
NASA's Atmospheric Science Data Center (ASDC) is piloting the use of Geographic Information System (GIS) technology that can be leveraged for crisis planning, emergency response, and disaster management/awareness. Many different organizations currently use GIS tools and geospatial data during a disaster event. ASDC datasets have not been fully utilized by this community in the past due to incompatible data formats that ASDC holdings are archived in. Through the successful implementation of this pilot effort and continued collaboration with the larger Homeland Defense and Department of Defense emergency management community through the Homeland Infrastructure Foundation-Level Data Working Group (HIFLD WG), our data will be easily accessible to those using GIS and increase the ability to plan, respond, manage, and provide awareness during disasters. The HIFLD WG Partnership has expanded to include more than 5,900 mission partners representing the 14 executive departments, 98 agencies, 50 states (and 3 territories), and more than 700 private sector organizations to directly enhance the federal, state, and local government's ability to support domestic infrastructure data gathering, sharing and protection, visualization, and spatial knowledge management.The HIFLD WG Executive Membership is lead by representatives from the Department of Defense (DoD) Office of the Assistant Secretary of Defense for Homeland Defense and Americas' Security Affairs - OASD (HD&ASA); the Department of Homeland Security (DHS), National Protection and Programs Directorate's Office of Infrastructure Protection (NPPD IP); the National Geospatial-Intelligence Agency (NGA) Integrated Working Group - Readiness, Response and Recovery (IWG-R3); the Department of Interior (DOI) United States Geological Survey (USGS) National Geospatial Program (NGP), and DHS Federal Emergency Management Agency (FEMA).
Use of the Homeland-Defense Operational Planning System (HOPS) for Emergency Management
DOE Office of Scientific and Technical Information (OSTI.GOV)
Durling, Jr., R L; Price, D E
2005-12-16
The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors,more » HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.« less
Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)
DOE Office of Scientific and Technical Information (OSTI.GOV)
Price, D E; Durling, R L
2005-10-10
The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors,more » HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.« less
78 FR 54454 - Open Meeting of the Information Security and Privacy Advisory Board
Federal Register 2010, 2011, 2012, 2013, 2014
2013-09-04
... include the following items: --Cybersecurity Executive Order 13636, Improving Critical Infrastructure Cybersecurity (78 FR 11737, February 19, 2013); Development of New Cybersecurity Framework; Request for Information (RFI)--Developing a Framework to Improve Critical Infrastructure Cybersecurity (78 FR 13024...
A Framework For Analysis Of Coastal Infrastructure Vunerabilty To Global Sea Level Rise
NASA Astrophysics Data System (ADS)
Obrien, P. S.; White, K. D.; Veatch, W.; Marzion, R.; Moritz, H.; Moritz, H. R.
2017-12-01
Recorded impacts of global sea rise on coastal water levels have been documented over the past 100 to 150 years. In the recent 40 years the assumption of hydrologic stationarity has been recognized as invalid. New coastal infrastructure designs must recognize the paradigm shift from hydrologic stationarity to non-stationarity in coastal hydrology. A framework for the evaluation of existing coastal infrastructure is proposed to effectively assess design vulnerability. Two data sets developed from existing structures are chosen to test a proposed framework for vunerabilty to global sea level rise, with the proposed name Climate Preparedness and Resilience Register (CPRR). The CPRR framework consists of four major elements; Datum Adjustment, Coastal Water Levels, Scenario Projections and Performance Thresholds.
USDA-ARS?s Scientific Manuscript database
Tradeoffs between plant growth and defense are central to theoretical frameworks used to study the ecology and evolution of plant defense against herbivores. However, these frameworks, as well as the experiments designed to test them, rarely include the remarkable diversity of belowground herbivores...
3 CFR 8977 - Proclamation 8977 of May 10, 2013. National Defense Transportation Day and National...
Code of Federal Regulations, 2014 CFR
2014-01-01
... resilient to the challenges we face. We need to restore our roads, bridges, and ports—transportation...—it is about security. At a time when our cities face unprecedented threats and hazards, we must do... infrastructure. In recognition of the importance of our Nation's transportation infrastructure, and of the men...
78 FR 25254 - Announcing an Open Meeting of the Information Security and Privacy Advisory Board
Federal Register 2010, 2011, 2012, 2013, 2014
2013-04-30
... include the following items: --Cybersecurity Executive Order 13636, Improving Critical Infrastructure Cybersecurity (78 FR 11737, February 19, 2013); Development of New Cybersecurity Framework; Request for Information (RFI)--Developing a Framework to Improve Critical Infrastructure Cybersecurity (78 FR 13024...
NASA Astrophysics Data System (ADS)
Bolton, Richard W.; Dewey, Allen; Horstmann, Paul W.; Laurentiev, John
1997-01-01
This paper examines the role virtual enterprises will have in supporting future business engagements and resulting technology requirements. Two representative end-user scenarios are proposed that define the requirements for 'plug-and-play' information infrastructure frameworks and architectures necessary to enable 'virtual enterprises' in US manufacturing industries. The scenarios provide a high- level 'needs analysis' for identifying key technologies, defining a reference architecture, and developing compliant reference implementations. Virtual enterprises are short- term consortia or alliances of companies formed to address fast-changing opportunities. Members of a virtual enterprise carry out their tasks as if they all worked for a single organization under 'one roof', using 'plug-and-play' information infrastructure frameworks and architectures to access and manage all information needed to support the product cycle. 'Plug-and-play' information infrastructure frameworks and architectures are required to enhance collaboration between companies corking together on different aspects of a manufacturing process. This new form of collaborative computing will decrease cycle-time and increase responsiveness to change.
2002-03-22
may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure
Autonomic Management of Application Workflows on Hybrid Computing Infrastructure
Kim, Hyunjoo; el-Khamra, Yaakoub; Rodero, Ivan; ...
2011-01-01
In this paper, we present a programming and runtime framework that enables the autonomic management of complex application workflows on hybrid computing infrastructures. The framework is designed to address system and application heterogeneity and dynamics to ensure that application objectives and constraints are satisfied. The need for such autonomic system and application management is becoming critical as computing infrastructures become increasingly heterogeneous, integrating different classes of resources from high-end HPC systems to commodity clusters and clouds. For example, the framework presented in this paper can be used to provision the appropriate mix of resources based on application requirements and constraints.more » The framework also monitors the system/application state and adapts the application and/or resources to respond to changing requirements or environment. To demonstrate the operation of the framework and to evaluate its ability, we employ a workflow used to characterize an oil reservoir executing on a hybrid infrastructure composed of TeraGrid nodes and Amazon EC2 instances of various types. Specifically, we show how different applications objectives such as acceleration, conservation and resilience can be effectively achieved while satisfying deadline and budget constraints, using an appropriate mix of dynamically provisioned resources. Our evaluations also demonstrate that public clouds can be used to complement and reinforce the scheduling and usage of traditional high performance computing infrastructure.« less
Common modeling system for digital simulation
NASA Technical Reports Server (NTRS)
Painter, Rick
1994-01-01
The Joint Modeling and Simulation System is a tri-service investigation into a common modeling framework for the development digital models. The basis for the success of this framework is an X-window-based, open systems architecture, object-based/oriented methodology, standard interface approach to digital model construction, configuration, execution, and post processing. For years Department of Defense (DOD) agencies have produced various weapon systems/technologies and typically digital representations of the systems/technologies. These digital representations (models) have also been developed for other reasons such as studies and analysis, Cost Effectiveness Analysis (COEA) tradeoffs, etc. Unfortunately, there have been no Modeling and Simulation (M&S) standards, guidelines, or efforts towards commonality in DOD M&S. The typical scenario is an organization hires a contractor to build hardware and in doing so an digital model may be constructed. Until recently, this model was not even obtained by the organization. Even if it was procured, it was on a unique platform, in a unique language, with unique interfaces, and, with the result being UNIQUE maintenance required. Additionally, the constructors of the model expended more effort in writing the 'infrastructure' of the model/simulation (e.g. user interface, database/database management system, data journalizing/archiving, graphical presentations, environment characteristics, other components in the simulation, etc.) than in producing the model of the desired system. Other side effects include: duplication of efforts; varying assumptions; lack of credibility/validation; and decentralization in policy and execution. J-MASS provides the infrastructure, standards, toolset, and architecture to permit M&S developers and analysts to concentrate on the their area of interest.
78 FR 13024 - Developing a Framework To Improve Critical Infrastructure Cybersecurity
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-26
... review to develop a framework to reduce cyber risks to critical infrastructure \\1\\ (the ``Cybersecurity... processes that align policy, business, and technological approaches to address cyber risks. \\1\\ For the... cyber activity. Such activity is increasing and its consequences can range from theft through disruption...
Collaborative Access Control For Critical Infrastructures
NASA Astrophysics Data System (ADS)
Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed
A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.
A framework to support human factors of automation in railway intelligent infrastructure.
Dadashi, Nastaran; Wilson, John R; Golightly, David; Sharples, Sarah
2014-01-01
Technological and organisational advances have increased the potential for remote access and proactive monitoring of the infrastructure in various domains and sectors - water and sewage, oil and gas and transport. Intelligent Infrastructure (II) is an architecture that potentially enables the generation of timely and relevant information about the state of any type of infrastructure asset, providing a basis for reliable decision-making. This paper reports an exploratory study to understand the concepts and human factors associated with II in the railway, largely drawing from structured interviews with key industry decision-makers and attachment to pilot projects. Outputs from the study include a data-processing framework defining the key human factors at different levels of the data structure within a railway II system and a system-level representation. The framework and other study findings will form a basis for human factors contributions to systems design elements such as information interfaces and role specifications.
IT Infrastructure Projects: A Framework for Analysis. ECAR Research Bulletin
ERIC Educational Resources Information Center
Grochow, Jerrold M.
2014-01-01
Just as maintaining a healthy infrastructure of water delivery and roads is essential to the functioning of cities and towns, maintaining a healthy infrastructure of information technology is essential to the functioning of universities. Deterioration in IT infrastructure can lead to deterioration in research, teaching, and administration. Given…
32 CFR 153.4 - Responsibilities.
Code of Federal Regulations, 2010 CFR
2010-07-01
... Code. (3) Coordinate the assistance to be provided the Department of Defense with the U.S. Attorney's... logistical support, available resources, appropriate personnel, or the communications infrastructure...
NASA Astrophysics Data System (ADS)
Jovanovic, T.; Mejia, A.; Hale, R. L.; Gironas, J. A.
2015-12-01
Urban stormwater infrastructure design has evolved in time, reflecting changes in stormwater policy and regulations, and in engineering design. This evolution makes urban basins heterogeneous socio-ecological-technological systems. We hypothesize that this heterogeneity creates unique impact trajectories in time and impact hotspots in space within and across cities. To explore this, we develop and implement a network hydro-engineering modeling framework based on high-resolution digital elevation and stormwater infrastructure data. The framework also accounts for climatic, soils, land use, and vegetation conditions in an urban basin, thus making it useful to study the impacts of stormwater infrastructure across cities. Here, to evaluate the framework, we apply it to urban basins in the metropolitan areas of Phoenix, Arizona. We use it to estimate different metrics to characterize the storm-event hydrologic response. We estimate both traditional metrics (e.g., peak flow, time to peak, and runoff volume) as well as new metrics (e.g., basin-scale dispersion mechanisms). We also use the dispersion mechanisms to assess the scaling characteristics of urban basins. Ultimately, we find that the proposed framework can be used to understand and characterize the impacts associated with stormwater infrastructure on hydrologic conditions within a basin. Additionally, we find that the scaling approach helps in synthesizing information but it requires further validation using additional urban basins.
Geospatial decision support framework for critical infrastructure interdependency assessment
NASA Astrophysics Data System (ADS)
Shih, Chung Yan
Critical infrastructures, such as telecommunications, energy, banking and finance, transportation, water systems and emergency services are the foundations of modern society. There is a heavy dependence on critical infrastructures at multiple levels within the supply chain of any good or service. Any disruptions in the supply chain may cause profound cascading effect to other critical infrastructures. A 1997 report by the President's Commission on Critical Infrastructure Protection states that a serious interruption in freight rail service would bring the coal mining industry to a halt within approximately two weeks and the availability of electric power could be reduced in a matter of one to two months. Therefore, this research aimed at representing and assessing the interdependencies between coal supply, transportation and energy production. A proposed geospatial decision support framework was established and applied to analyze interdependency related disruption impact. By utilizing the data warehousing approach, geospatial and non-geospatial data were retrieved, integrated and analyzed based on the transportation model and geospatial disruption analysis developed in the research. The results showed that by utilizing this framework, disruption impacts can be estimated at various levels (e.g., power plant, county, state, etc.) for preventative or emergency response efforts. The information derived from the framework can be used for data mining analysis (e.g., assessing transportation mode usages; finding alternative coal suppliers, etc.).
Wake Island Supplemental Environmental Assessment
2007-02-01
operations, the oxidizer transfer system would be flushed with water . This operation is expected to yield approximately 5 grams (0.2 ounces) of nitric...Defense System (BMDS) to provide a defensive capability for the U.S., its deployed forces, friends, and allies from ballistic missile threats. The...infrastructure, land use, physical resources, noise, socioeconomics, transportation, and water resources. MDA determined that six of the thirteen resource
Optimizing Microgrid Architecture on Department of Defense Installations
2014-09-01
PPA power purchase agreement PV photovoltaic QDR Quadrennial Defense Review SNL Sandia National Laboratory SPIDERS Smart Power Infrastructure...a MILP that dispatches fuel-based generators with consideration to an ensemble of forecasted inputs from renewable power sources, subject to physical...wind power project costs by region: 2012 projects, from [30]. 6. Weather Forecasts Weather forecasts are often presented as a single prediction
2011 Defense Industrial Base Critical Infrastructure Protection Conference (DIBCIP)
2011-08-25
Office of the Program Manager, Information Sharing Environment u Mr. Vince Jarvie , Vice President, Corporate Security, L-3 Communications...National Defense University IRM College and in 2008 he obtained the Certified Information System Security Professional certificate. MR. VINCE JARVIE ...Vice President, Corporate Security, L-3 Communciations Corporation Mr. Vincent (Vince) Jarvie is the Vice President, Corporate Security for L-3
On effectiveness of network sensor-based defense framework
NASA Astrophysics Data System (ADS)
Zhang, Difan; Zhang, Hanlin; Ge, Linqiang; Yu, Wei; Lu, Chao; Chen, Genshe; Pham, Khanh
2012-06-01
Cyber attacks are increasing in frequency, impact, and complexity, which demonstrate extensive network vulnerabilities with the potential for serious damage. Defending against cyber attacks calls for the distributed collaborative monitoring, detection, and mitigation. To this end, we develop a network sensor-based defense framework, with the aim of handling network security awareness, mitigation, and prediction. We implement the prototypical system and show its effectiveness on detecting known attacks, such as port-scanning and distributed denial-of-service (DDoS). Based on this framework, we also implement the statistical-based detection and sequential testing-based detection techniques and compare their respective detection performance. The future implementation of defensive algorithms can be provisioned in our proposed framework for combating cyber attacks.
A Conceptual Framework for Defense Acquisition Decision Makers: Giving the Schedule its Due
2014-01-01
Principles from microeconomic theory and operations research can provide insight into acquisition decisions to produce military capabili- ties in an...models based on economic and operations research principles can yield valuable insight into defense acquisition decisions. This article focuses on models...Department Edmund Conrow (1995) developed an excellent microeconomic framework to investigate the incentives of buyers and sellers in the defense
SCALING AN URBAN EMERGENCY EVACUATION FRAMEWORK: CHALLENGES AND PRACTICES
DOE Office of Scientific and Technical Information (OSTI.GOV)
Karthik, Rajasekar; Lu, Wei
2014-01-01
Critical infrastructure disruption, caused by severe weather events, natural disasters, terrorist attacks, etc., has significant impacts on urban transportation systems. We built a computational framework to simulate urban transportation systems under critical infrastructure disruption in order to aid real-time emergency evacuation. This framework will use large scale datasets to provide a scalable tool for emergency planning and management. Our framework, World-Wide Emergency Evacuation (WWEE), integrates population distribution and urban infrastructure networks to model travel demand in emergency situations at global level. Also, a computational model of agent-based traffic simulation is used to provide an optimal evacuation plan for traffic operationmore » purpose [1]. In addition, our framework provides a web-based high resolution visualization tool for emergency evacuation modelers and practitioners. We have successfully tested our framework with scenarios in both United States (Alexandria, VA) and Europe (Berlin, Germany) [2]. However, there are still some major drawbacks for scaling this framework to handle big data workloads in real time. On our back-end, lack of proper infrastructure limits us in ability to process large amounts of data, run the simulation efficiently and quickly, and provide fast retrieval and serving of data. On the front-end, the visualization performance of microscopic evacuation results is still not efficient enough due to high volume data communication between server and client. We are addressing these drawbacks by using cloud computing and next-generation web technologies, namely Node.js, NoSQL, WebGL, Open Layers 3 and HTML5 technologies. We will describe briefly about each one and how we are using and leveraging these technologies to provide an efficient tool for emergency management organizations. Our early experimentation demonstrates that using above technologies is a promising approach to build a scalable and high performance urban emergency evacuation framework that can improve traffic mobility and safety under critical infrastructure disruption in today s socially connected world.« less
2007-04-30
School 4th Annual Acquisition Research Symposium of the Naval Postgraduate School: Approved for public release, distribution unlimited. Prepared ...where he teaches graduate acquisition and contract management courses . Prior to his appointment at the Naval Postgraduate School, he served for ... for the Program Management Infrastructure Published: 30 April 2007 by Rene G. Rendon, Lecturer, and Uday Apte, Professor, Naval Postgraduate
Critical Infrastructures: Background, Policy, and Implementation
2006-04-18
initially approved. The current review process for such purchases, implemented under authority of the Exon- Florio provision of the Defense Production Act (50...legislative proposals “broaden” coverage of Exon- Florio to include the purchase of assets associated with critical infrastructure. As currently written...Exon- Florio covers persons engaged in interstate commerce. While this covers a broad range of “persons,” extending beyond those that might be part
Report of the Defense Science Board Task Force on Critical Homeland Infrastructure Protection
2007-01-01
nuclear, radiation and explosive hazards; • Monitoring “people of interest” while protecting civil liberties; • Detection of hostile intent; • Detect...Guardian DARPA Overview Mr. Roger Gibbs DARPA LLNL Technologies in Support of Infrastructure Protection Mr. Don Prosnitz LLNL Sandia National...Mechanical Engineers AT/FP Antiterrorism/Force Protection CBRNE Chemical Biological Radiological Nuclear Explosive CERT Commuter Emergency Response Team
49 CFR 33.3 - Program eligibility.
Code of Federal Regulations, 2013 CFR
2013-10-01
..., military or critical infrastructure assistance to any foreign nation, homeland security, stockpiling, space... § 33.3 Program eligibility. Certain programs to promote the national defense are eligible for...
49 CFR 33.3 - Program eligibility.
Code of Federal Regulations, 2012 CFR
2012-10-01
..., military or critical infrastructure assistance to any foreign nation, homeland security, stockpiling, space... § 33.3 Program eligibility. Certain programs to promote the national defense are eligible for...
Supplier behaviour and public contracting in the English agency nursing market.
Lonsdale, Chris; Kirkpatrick, Ian; Hoque, Kim; de Ruyter, Alex
2010-01-01
The worldwide expansion in the use of private firms to deliver public services and infrastructure has promoted a substantial literature on public sector contract and relationship management. This literature is currently dominated by the notion that supplier relationships should be based upon trust. Less prominent are more sceptical approaches that emphasize the need to assiduously manage potential supplier exploitation and opportunism. This article addresses this imbalance by focusing upon the recent experience of the English National Health Service (NHS) in its dealings with its nursing agencies. Between 1997 and 2001, the NHS was subjected to considerable exploitation and opportunism. This forced managers to adopt a supply strategy based upon an assiduous use of e-auctions, framework agreements and quality audits. The article assesses the effectiveness of this strategy and reflects upon whether a more defensive approach to contract and relationship management offers a viable alternative to one based upon trust.
DoD Infrastructure: Why It Is & What Does It Cost
1998-09-22
tutorial of the Defense Working Capital Fund (DWCF), describing the fund’s Defense Business Operating Fund (DBOF) origins and the current information...provided for budget submissions. His tutorial concluded by showing the current difficulties of incorporating business plan metrics into a model...using cost as an independent variable in acquisition decisions, outsourcing previously "core" operational activities and using best business
2010-04-01
technology centric operations such as computer network attack and computer network defense. 3 This leads to the question of whether the US military is... information and infrastructure. For the purpose of military operations, CNO are divided into CNA, CND, and computer network exploitation (CNE) enabling...of a CNA if they take undesirable action,” 21 and from a defensive stance in CND, “providing information about non-military threat to computers in
Department Of Defense Science And Technology Invigoration
2002-02-01
38 Army Science Board, Summer Study, 1982. 39 Hamel, G. and Prahalad , C.K., “ Strategic Intent ,” Harvard Business Review, May-June 1989, 63-76... strategic intent (aggressively stretching resources rather than fitting resources) and core competence (collective learning in an organization...system and defense-related industry. 3. Develop a strategic plan for the DOD S&T infrastructure of the future, defining the complementary roles of
Rising Sun Over Africa: Japan’s New Frontier for Military Normalization
2016-06-01
Party MLIT Ministry of Land, Infrastructure, Transport, and Tourism MOD Ministry of Defense MOFA Ministry of Foreign Affairs MSDF Maritime Self...primary go-between, the Ministry of Land, Infrastructure, Transport, and Tourism (MLIT).100 Even shortly after the passing of Japan’s Anti-Piracy Law...construction of its presidential palace, its main administration building, a national war memorial, a stadium, and two sports complexes. More
2008 Defense Industrial Base Critical Infrastructure Protection Conference (DIB-CBIP)
2008-04-09
a cloak -and- dagger thing. It’s about computer architecture and the soundness of electronic systems." Joel Brenner, ODNI Counterintelligence Office...to support advanced network exploitation and launch attacks on the informational and physical elements of our cyber infrastructure. In order to...entities and is vulnerable to attacks and manipulation. Operations in the cyber domain have the ability to impact operations in other war-fighting
2016-03-01
wastewater, oil and natural gas, chemical, transportation, pharmaceutical, pulp and paper, food and beverage, and discrete manufacturing (e.g...dams, energy infrastructure, banks, farms, food processing facilities, hospitals, nuclear reactors, transportation carriers, and water treatment... food and agriculture sector” is, “almost entirely under private ownership and is comprised of an estimated 2.2 million farms, 900,000 restaurants, and
A Framework for Defense Planning
1989-08-01
and hardware, (4) developing outlines of capability goals , (5) the allocation of rt’sources to best overall ef-et(6) a bcctter process for decisio ...annual report to Congress would be issued jointly by the Secretary ’See the Defense Reorganization Act of 1986 ( Public Law 99-433, October 1, 1986...developu - center, Contract No. MDA903- &5-C-0030. Library of CoWgress Cataloging in Publication Data Kent, Glenn A., 1915- A framework for defense
NASA World Wind: Infrastructure for Spatial Data
NASA Technical Reports Server (NTRS)
Hogan, Patrick
2011-01-01
The world has great need for analysis of Earth observation data, be it climate change, carbon monitoring, disaster response, national defense or simply local resource management. To best provide for spatial and time-dependent information analysis, the world benefits from an open standards and open source infrastructure for spatial data. In the spirit of NASA's motto "for the benefit of all" NASA invites the world community to collaboratively advance this core technology. The World Wind infrastructure for spatial data both unites and challenges the world for innovative solutions analyzing spatial data while also allowing absolute command and control over any respective information exchange medium.
Defense.gov Special Report: Travels With Hagel
Halifax International Security Forum. Story U.S., Canada Sign Asia-Pacific Cooperation Framework Defense Cooperation Framework as both leaders take part in the Halifax International Security Forum. Story Travel Visits First Zumwalt-class Destroyer Photo Essays Photo Essay: Hagel Attends Halifax International
A framework for considering externalities in urban water asset management.
Marlow, David; Pearson, Leonie; Macdonald, Darla Hatton; Whitten, Stuart; Burn, Stewart
2011-01-01
Urban communities rely on a complex network of infrastructure assets to connect them to water resources. There is considerable capital investment required to maintain, upgrade and extend this infrastructure. As the remit of a water utility is broader than just financial considerations, infrastructure investment decisions must be made in light of environmental and societal issues. One way of facilitating this is to integrate consideration of externalities into decision making processes. This paper considers the concept of externalities from an asset management perspective. A case study is provided to show the practical implications to a water utility and asset managers. A framework for the inclusion of externalities in asset management decision making is also presented. The potential for application of the framework is highlighted through a brief consideration of its key elements.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Alan M Kaplan
This grant will be used to augment the equipment infrastructure and core support at the University of Kentucky and the University of Alabama particularly in the areas of genomics/informatics, molecular analysis and cell separation. In addition, we will promote collaborative research interactions through scientific workshops and exchange of scientists, as well as joint exploration of the role of immune receptors as targets in autoimmunity and host defense, innate and adaptive immune responses, and mucosal immunity in host defense.
Outsourcing & Privatization of Defense Infrastructure
1997-03-01
Pentagon organizes and prepares to fight. Left out of this equation will be how the Pentagon manages the day to day business of national defense. This...Pentagon initiatives in official travel management and military family housing, show how far the Department has come and what remains to be done. Both...to be in the housing business at all. To succeed, we recommend a decidedly private sector approach to housing servicemembers and their families
Defense Infrastructure: Department of Defense Renewable Energy Initiatives
2010-04-26
Operational 2005 No 2009 10 280 Dept Navy NAVFAC Hawaii HI Solar Water Heating Systems, Fort Kamehameha WWTF Solar Thermal Fully Operational 2006 Yes... Kamehameha WWTF 0.00 50.00 Reduces fossil fuel use, increases energy security Supports 10 USC 2911 renewable energy goal Supports 10 USC 2911...renewable energy goal Solar Water Heating Systems, Fort Kamehameha WWTF 281 Dept Navy NAVFAC Hawaii HI Solar Water Heating System, Building X-11
1983-05-01
advertising. Traditionally defense marketing and advertising focused on decision makers within the defense conuunity and Congress. While it appears that...focus may be- starting to change, marketing and advertising remain highly directed and concentrated in defense oriented media. marketing was oriented to
2016-07-01
CAC common access card DoD Department of Defense FOUO For Official Use Only GIS geographic information systems GUI graphical user interface HISA...as per requirements of this project, is UNCLASS/For Official Use Only (FOUO), with access re- stricted to DOD common access card (CAC) users. Key...Boko Haram Fuel Dump Discovered in Maiduguru.” Available: http://saharareporters.com/2015/10/01/another-boko-haram-fuel- dump - discovered-maiduguri
Franchise Plan. Central Archive for Reusable Defense Software (CARDS)
1994-02-28
learned To achieve maximum benefit from a reuse infrastructure and change the way the organization is doing business, management has to make a long...Purpose For an organization to fully comprehend the benefits of reuse, and to gauge the magnitude of change required to achieve the benefits , information...3.4.3 Identify Technology Infrastructure Rationale In order for an organization to fully comprehend the benefits of reuse and to gauge the magnitude of
Provision of Ecosystem Services Through Market-Based Approaches: Department of Defense Applications
2008-03-17
lands. When undeveloped or rural land is converted to urban uses, valuable ecosystem services are lost. Accounting methods are needed to track the...used for training and testing missions has been ‘held back’ from transformations to commercial forestry, cropland, or urban uses and be- cause it...meet built infrastructure needs. Converting land from natural, to rural, to urban causes the loss of important ‘natural infrastructure.’ As the
ERIC Educational Resources Information Center
Center for Mental Health in Schools at UCLA, 2005
2005-01-01
This report was developed to highlight the current state of affairs and illustrate the value of a unifying framework and integrated infrastructure for the many initiatives, projects, programs, and services schools pursue in addressing barriers to learning and promoting healthy development. Specifically, it highlights how initiatives can be…
Should bioengineering graduates seek employment in the defense industry?
Johnson, Arthur T
2014-01-01
They say that the difference between a mechanical engineer and a civil engineer is that the mechanical engineer develops weapons whereas a civil engineer designs targets. The implication is that some engineers are involved with building peaceful infrastructure whereas others contribute to destruction. This brings to mind the question: what is the proper role for engineers in the creation of weapons and defenses against them? In particular, should engineers specializing in biology or medicine be involved in the defense industry? After all, bioengineers are supposed to be builders or healers rather than warriors or destroyers.
Leveraging the freight network : 10 steps to improved modal connectivity.
DOT National Transportation Integrated Search
2007-11-01
Historically, the U.S. federal government has recognizedand supportedthe : national development of transportation infrastructure necessary for economic : growth and national defense. For many years, any investment was an improvement. : However,...
Cyberwarfare on the Electricity Infrastructure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Murarka, N.; Ramesh, V.C.
2000-03-20
The report analyzes the possibility of cyberwarfare on the electricity infrastructure. The ongoing deregulation of the electricity industry makes the power grid all the more vulnerable to cyber attacks. The report models the power system information system components, models potential threats and protective measures. It therefore offers a framework for infrastructure protection.
Green infrastructure is a widely used framework for conservation planning in the United States and elsewhere. The main components of green infrastructure are hubs and corridors. Hubs are large areas of natural vegetation, and corridors are linear features that connect hubs. W...
A National Assessment of Change in Green Infrastructure Using Mathematical Morphology
Green infrastructure is a popular framework for conservation planning. The main elements of green infrastructure are hubs and links. Hubs tend to be large areas of natural vegetation and links tend to be linear features (e.g., streams) that connect hubs. Within the United States...
J.D Wickham; Kurt H. Riitters; T.G. Wade; P. Vogt
2010-01-01
Green infrastructure is a popular framework for conservation planning. The main elements of green infrastructure are hubs and links. Hubs tend to be large areas of ânaturalâ vegetation and links tend to be linear features (e.g., streams) that connect hubs. Within the United States, green infrastructure projects can be characterized as: (...
1997-09-01
Policy Implications Stephen D. Biddle, IDA Papaer P-3123 Institute for Defense Analysis (IDA), Strategy Forces and Research Division 1801 N...IDA INSTITUTE FOR DEFENSE ANALYSES Information Operations: A Research Aid Includes Coverage of: Information Warfare, Information Assurance...Gray, Principal Investigator [pBC Q^^E^ nsSSPECTBD 8’ 19980303 031 This work was conducted under IDA’S central research program. The publication of
Robustness and Recovery of Lifeline Infrastructure and Ecosystem Networks
NASA Astrophysics Data System (ADS)
Bhatia, U.; Ganguly, A. R.
2015-12-01
Disruptive events, both natural and man-made, can have widespread impacts on both natural systems and lifeline infrastructure networks leading to the loss of biodiversity and essential functionality, respectively. Projected sea-level rise and climate change can further increase the frequency and severity of large-scale floods on urban-coastal megacities. Nevertheless, Failure in infrastructure systems can trigger cascading impacts on dependent ecosystems, and vice-versa. An important consideration in the behavior of the isolated networks and inter-connected networks following disruptive events is their resilience, or the ability of the network to "bounce back" to a pre-disaster state. Conventional risk analysis and subsequent risk management frameworks have focused on identifying the components' vulnerability and strengthening of the isolated components to withstand these disruptions. But high interconnectedness of these systems, and evolving nature of hazards, particularly in the context of climate extremes, make the component level analysis unrealistic. In this study, we discuss the complex network-based resilience framework to understand fragility and recovery strategies for infrastructure systems impacted by climate-related hazards. We extend the proposed framework to assess the response of ecological networks to multiple species loss and design the restoration management framework to identify the most efficient restoration sequence of species, which can potentially lead to disproportionate gains in biodiversity.
2006-03-01
Defense, Editor. 2001. 12. Defense, D.o., Department of Defense Architecture Framework Deskbook. 2004, Department of Defense. 13. Denzin , N. and...Y. Lincoln , Handbook of Qualitative Research. 2000, California: Sage. 14. Flick, U., An Introduction to Qualitative research: Theory, method and
2010-05-01
infrastructure at Los Alamos, Argonne, Oak Ridge, Hanford and elsewhere. But of equal or greater significance for the future strategic posture was the role...nuclear laboratories and defense industrial infrastructure at Los Alamos, Argonne, Oak Ridge, Hanford and elsewhere would design, test, and build...conferences which I attended at Washington, Los Alamos, Argonne, Hanford , and elsewhere, is written in sincere hopes of being helpful to you.... Those
Combating terrorism : observations on options to improve the federal response
DOT National Transportation Integrated Search
2001-04-24
This is the statement of Raymond J. Decker, Director, Defense Capabilities and Management before the Subcommittee on Economic Development, Public Buildings, and Emergency Management, Committee on Transportation and Infrastructure, and the Subcommitte...
78 FR 66603 - Critical Infrastructure Security and Resilience Month, 2013
Federal Register 2010, 2011, 2012, 2013, 2014
2013-11-05
... shore up our defenses against physical and cyber incidents. In tandem with my Executive Order on... hazards including terrorism and natural disasters, as well as cyber attacks. We must ensure that the...
A Strategic Approach to Network Defense: Framing the Cloud
2011-03-10
accepted network defensive principles, to reduce risks associated with emerging virtualization capabilities and scalability of cloud computing . This expanded...defensive framework can assist enterprise networking and cloud computing architects to better design more secure systems.
S3DB core: a framework for RDF generation and management in bioinformatics infrastructures
2010-01-01
Background Biomedical research is set to greatly benefit from the use of semantic web technologies in the design of computational infrastructure. However, beyond well defined research initiatives, substantial issues of data heterogeneity, source distribution, and privacy currently stand in the way towards the personalization of Medicine. Results A computational framework for bioinformatic infrastructure was designed to deal with the heterogeneous data sources and the sensitive mixture of public and private data that characterizes the biomedical domain. This framework consists of a logical model build with semantic web tools, coupled with a Markov process that propagates user operator states. An accompanying open source prototype was developed to meet a series of applications that range from collaborative multi-institution data acquisition efforts to data analysis applications that need to quickly traverse complex data structures. This report describes the two abstractions underlying the S3DB-based infrastructure, logical and numerical, and discusses its generality beyond the immediate confines of existing implementations. Conclusions The emergence of the "web as a computer" requires a formal model for the different functionalities involved in reading and writing to it. The S3DB core model proposed was found to address the design criteria of biomedical computational infrastructure, such as those supporting large scale multi-investigator research, clinical trials, and molecular epidemiology. PMID:20646315
Green infrastructure is a popular framework for conservation planning. The main elements of green infrastructure are hubs and links. Hubs tend to be large areas of ‘natural’ vegetation and links tend to be linear features (e.g., streams) that connect hubs. Within the United State...
Making Network Markets in Education: The Development of Data Infrastructure in Australian Schooling
ERIC Educational Resources Information Center
Sellar, Sam
2017-01-01
This paper examines the development of data infrastructure in Australian schooling with a specific focus on interoperability standards that help to make new markets for education data. The conceptual framework combines insights from studies of infrastructure, economic markets and digital data. The case of the Australian National Schools…
Promising Practices in Citywide Afterschool Initiatives. CityWorks: Focus on Infrastructure.
ERIC Educational Resources Information Center
Hall, Georgia
This brief is the first in a series featuring promising practices in city-wide after-school initiatives, with a focus at the infrastructure level, focusing on the infrastructure representing the underlying elements or framework that hold a system or initiative together. The brief identifies practices to support the public relations function and…
Infrastructure resiliency : a risk-based framework
DOT National Transportation Integrated Search
2013-06-26
We are living in a world of escalating risks. Globalization and spiraling infrastructure interdependencies have created complex and interlinked systems that generate many benefits but also significant risks. High-impact disruptions whether caused...
A framework for quantifying and optimizing the value of seismic monitoring of infrastructure
NASA Astrophysics Data System (ADS)
Omenzetter, Piotr
2017-04-01
This paper outlines a framework for quantifying and optimizing the value of information from structural health monitoring (SHM) technology deployed on large infrastructure, which may sustain damage in a series of earthquakes (the main and the aftershocks). The evolution of the damage state of the infrastructure without or with SHM is presented as a time-dependent, stochastic, discrete-state, observable and controllable nonlinear dynamical system. The pre-posterior Bayesian analysis and the decision tree are used for quantifying and optimizing the value of SHM information. An optimality problem is then formulated how to decide on the adoption of SHM and how to manage optimally the usage and operations of the possibly damaged infrastructure and its repair schedule using the information from SHM. The objective function to minimize is the expected total cost or risk.
The Internet information infrastructure: Terrorist tool or architecture for information defense?
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kadner, S.; Turpen, E.; Rees, B.
The Internet is a culmination of information age technologies and an agent of change. As with any infrastructure, dependency upon the so-called global information infrastructure creates vulnerabilities. Moreover, unlike physical infrastructures, the Internet is a multi-use technology. While information technologies, such as the Internet, can be utilized as a tool of terror, these same technologies can facilitate the implementation of solutions to mitigate the threat. In this vein, this paper analyzes the multifaceted nature of the Internet information infrastructure and argues that policymakers should concentrate on the solutions it provides rather than the vulnerabilities it creates. Minimizing risks and realizingmore » possibilities in the information age will require institutional activities that translate, exploit and convert information technologies into positive solutions. What follows is a discussion of the Internet information infrastructure as it relates to increasing vulnerabilities and positive potential. The following four applications of the Internet will be addressed: as the infrastructure for information competence; as a terrorist tool; as the terrorist`s target; and as an architecture for rapid response.« less
2001-03-01
distinguishing between attacks and other events such as accidents, system failures, or hacking by thrill-seekers. This challenge is exacerbated by the...and is referred to as Signaling System # 7 ( SS7 ). Commercial Intelligent Network Architecture Switching Signal Point (SSP) Service - Originates...Wireless access point to fixed infrastructure Ut c Signaling Transfer Point (STP) - Packet switch in CCITT#7 Network SP SW SS7 System Data Bases Network
Development of JSDF Cyber Warfare Defense Critical Capability
2010-03-01
attack identification capability is essential for a nation to defend her vital infrastructures against offensive cyber warfare . Although the necessity of...cyber-attack identification capability is quite clear, the Japans preparation against cyber warfare is quite limited.
DefenseLink Special: Travels with Pace, June 2006
here today to discuss regional security issues in this strategic nation that, with its 1.1 billion where we are on our moral compass." Story Pace Visits Guam to Assess Infrastructure ANDERSEN AIR
DARPA Orbital Express program: effecting a revolution in space-based systems
NASA Astrophysics Data System (ADS)
Whelan, David A.; Adler, E. A.; Wilson, Samuel B., III; Roesler, Gordon M., Jr.
2000-11-01
A primary goal of the Defense Advanced Research Projects Agency is to develop innovative, high-risk technologies with the potential of a revolutionary impact on missions of the Department of Defense. DARPA is developing a space experiment to prove the feasibility of autonomous on- orbit servicing of spacecraft. The Orbital Express program will demonstrate autonomous on-orbit refueling, as well as autonomous delivery of a small payload representing an avionics upgrade package. The maneuverability provided to spacecraft from a ready refueling infrastructure will enable radical new capabilities for the military, civil and commercial spacecraft. Module replacement has the potential to extend bus lifetimes, and to upgrade the performance of key subsystems (e.g. processors) at the pace of technology development. The Orbital Express technology development effort will include the necessary autonomy for a viable servicing infrastructure; a universal interface for docking, refueling and module transfers; and a spacecraft bus design compatible with this servicing concept. The servicer spacecraft of the future may be able to act as a host platform for microsatellites, extending their capabilities while reducing risk. An infrastructure based on Orbital Express also benefits from, and stimulates the development of, lower-cost launch strategies.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schey, Steve
Several U.S. Department of Defense based studies have been conducted to identify potential U.S. Department of Defense transportation systems that are strong candidates for introduction or expansion of plug-in electric vehicles (PEVs). Task 2 involved identifying daily operational characteristics of select vehicles and initiating data logging of vehicle movements in order to characterize the vehicle’s mission. Individual observations of these selected vehicles provide the basis for recommendations related to PEV adoption and whether a battery electric vehicle or plug-in hybrid electric vehicle (collectively referred to as PEVs) can fulfill the mission requirements and provide observations related to placement of PEVmore » charging infrastructure. This report provides the results of the data analysis and observations related to replacement of current vehicles with PEVs. This fulfills part of the Task 3 requirements. Task 3 also includes an assessment of the charging infrastructure required to support this replacement, which is the subject of a separate report.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rose, Kelly K.; Zavala-Zraiza, Daniel
Here, we summarize an effort to develop a global oil and gas infrastructure (GOGI) taxonomy and geodatabase, using a combination of big data computing, custom search and data integration algorithms, and expert driven spatio-temporal analytics to identify, access, and evaluate open oil and gas data resources and uncertainty trends worldwide. This approach leveraged custom National Energy Technology Laboratory (NETL) tools and capabilities in collaboration with Environmental Defense Fund (EDF) and Carbon Limits subject matter expertise, to identify over 380 datasets and integrate more than 4.8 million features into the GOGI database. In addition to acquisition of open oil and gasmore » infrastructure data, information was collected and analyzed to assess the spatial, temporal, and source quality of these resources, and estimate their completeness relative to the top 40 hydrocarbon producing and consuming countries.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Schey, Steve; Francfort, Jim
2015-07-01
Several U.S. Department of Defense base studies have been conducted to identify potential U.S. Department of Defense transportation systems that are strong candidates for introduction or expansion of plug-in electric vehicles (PEVs). Task 1 consisted of a survey of the non-tactical fleet of vehicles at NASWI to begin the review of vehicle mission assignments and types of vehicles in service. Task 2 selected vehicles for further monitoring and involved identifying daily operational characteristics of these select vehicles. Data logging of vehicle movements was initiated in order to characterize the vehicle’s mission. The Task 3 Vehicle Utilization report provided the resultsmore » of the data analysis and observations related to the replacement of current vehicles with PEVs. This report provides an assessment of charging infrastructure required to support the suggested PEV replacements.« less
NASA Astrophysics Data System (ADS)
Papa, Mauricio; Shenoi, Sujeet
The information infrastructure -- comprising computers, embedded devices, networks and software systems -- is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: - Themes and Issues - Infrastructure Security - Control Systems Security - Security Strategies - Infrastructure Interdependencies - Infrastructure Modeling and Simulation This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.
Building a North American Spatial Data Infrastructure
Coleman, D.J.; Nebert, D.D.
1998-01-01
This paper addresses the state of spatial data infrastructures within North America in late 1997. After providing some background underlying the philosophy and development of the SDI concept, the authors discuss effects of technology, institutions, and standardization that confront the cohesive implementation of a common infrastructure today. The paper concludes with a comparative framework and specific examples of elements and initiatives defining respective spatial data infrastructure initiatives in the United States and Canada.
NASA Astrophysics Data System (ADS)
Kuga, Kazuki; Tanimoto, Jun
2018-02-01
We consider two imperfect ways to protect against an infectious disease such as influenza, namely vaccination giving only partial immunity and a defense against contagion such as wearing a mask. We build up a new analytic framework considering those two cases instead of perfect vaccination, conventionally assumed as a premise, with the assumption of an infinite and well-mixed population. Our framework also considers three different strategy-updating rules based on evolutionary game theory: conventional pairwise comparison with one randomly selected agent, another concept of pairwise comparison referring to a social average, and direct alternative selection not depending on the usual copying concept. We successfully obtain a phase diagram in which vaccination coverage at equilibrium can be compared when assuming the model of either imperfect vaccination or a defense against contagion. The obtained phase diagram reveals that a defense against contagion is marginally inferior to an imperfect vaccination as long as the same coefficient value is used. Highlights - We build a new analytical framework for a vaccination game combined with the susceptible-infected-recovered (SIR) model. - Our model can evaluate imperfect provisions such as vaccination giving only partial immunity and a defense against contagion. - We obtain a phase diagram with which to compare the quantitative effects of partial vaccination and a defense against contagion.
2016-02-01
forecasting the risk of munitions constituents (MC), such as high explosives and metals , that leave firing and training ranges and contaminate the...quality terrestrial natural infrastructure exist down- range of small arms training ranges on Department of Defense (DoD) in- stallations. Live- fire ...CERL TN-16-1 iv Illustrations Figures A-1 Initial horizontal trajectory of a tracer bullet fired at a 600 m target at the Malone 5 range on Fort
ERIC Educational Resources Information Center
Cole, Bruce Kevin
2012-01-01
Evaluations of Public-Private Partnership arrangements as alternatives to traditional government procurement methods for the delivery of public infrastructure projects have been anecdotal at best. This paper proposes a framework to evaluate a public university's infrastructure asset management performance and a specific measure based on a new…
A risk assessment methodology for critical transportation infrastructure.
DOT National Transportation Integrated Search
2002-01-01
Infrastructure protection typifies a problem of risk assessment and management in a large-scale system. This study offers a methodological framework to identify, prioritize, assess, and manage risks. It includes the following major considerations: (1...
Towards sustainable transport infrastructure : a sectoral approach in practice
DOT National Transportation Integrated Search
1996-07-01
These guidelines provide a comprehensive overview of the issues in moving towards more sustainable transport infrastructure in developing countries. They provide a sectoral framework in which project proposals and requests for European Union assistan...
NASA Astrophysics Data System (ADS)
Gao, H.; Yamazaki, D.; Finley, T.; Bohn, T. J.; Low, G.; Sabo, J. L.
2017-12-01
Water infrastructure lies at the heart of the challenges and opportunities of Integrated Water Resource Management (IWRM). Green infrastructure (e.g., wetlands restoration) presents an alternative to its hard-path counterpart - gray infrastructure, which often has external, economic and unmeasured ecological costs. But the science framework to prioritize green infrastructure buildout is nascent. In this study, we addressed this gap in Brazos River basin in Texas, in the context of corporate decisions to secure water supplies for various water stewardship objectives. We developed a physically-based tool to quantify the potential for wetland restoration to restore desired flows (hydrology), and a financial framework for comparing its cost-benefit with heightening an existing dam (conservation finance). Our framework has three components. First, we harnessed a topographic index (HAND) to identify the potential wetlands sites. Second, we coupled a land surface model (VIC) with a hydrodynamic model (CaMa-Flood) to investigate the effects of wetland size, location, and vegetation on hydrology. Finally, we estimated the net present value, indirect rate of return and payback period for green (wetlands) vs. gray (reservoir expansion) infrastructure. We found wetlands have more substantial impact on peak flow than baseflow. Interestingly, wetlands can improve baseflow reliability but not directly except with the largest (>400 km2) projects. Peak flow reduction volumes of wetlands if used as credits towards reservoir flood-control storage provide adequate conservation storage to deliver guaranteed reliability of baseflow. Hence, the synergy of existing dams with newly created wetlands offers a promising natural solution to increase water supply resilience, while green projects also generate revenue compared to their gray counterparts. This study demonstrates the possibility of using innovative engineering design to synergize green and gray infrastructures to convert water conflict to opportunities.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Paranhos, Elizabeth; Kozak, Tracy G.; Boyd, William
This report provides an overview of the regulatory frameworks governing natural gas supply chain infrastructure siting, construction, operation, and maintenance. Information was drawn from a number of sources, including published analyses, government reports, in addition to relevant statutes, court decisions and regulatory language, as needed. The scope includes all onshore facilities that contribute to methane emissions from the natural gas sector, focusing on three areas of state and federal regulations: (1) natural gas pipeline infrastructure siting and transportation service (including gathering, transmission, and distribution pipelines), (2) natural gas pipeline safety, and (3) air emissions associated with the natural gas supplymore » chain. In addition, the report identifies the incentives under current regulatory frameworks to invest in measures to reduce leakage, as well as the barriers facing investment in infrastructure improvement to reduce leakage. Policy recommendations regarding how federal or state authorities could regulate methane emissions are not provided; rather, existing frameworks are identified and some of the options for modifying existing regulations or adopting new regulations to reduce methane leakage are discussed.« less
Processes Asunder: Acquisition & Planning Misfits
2009-03-26
Establishing six Business Enterprise Priorities ( BEPs ) to focus the Department’s business transformation efforts, which now guide DoD investment decisions...three phases which look very much like Milestone A, B, and C of the previously existing Life Cycle Management Framework . With this obvious redundancy...February 2002). 30 6 Defense Acquisition University, “Integrated Defense Acquisition, Technology, & Logistics Life Cycle Management Framework , version 5.2
DHB Task Force Review of DoD Biodefense Infrastructure and Biological Research Portfolio
2009-04-29
Center and Biological Defense and Research Directorate (BORD) biodefense research portfolio includes vaccines, molecular diagnostics , genomics, and...human monoclonal antibodies, and innate immune agonists); molecular diagnostics (including recombinant reagents, assay development, reagent production
I-81 ITS program evaluation framework
DOT National Transportation Integrated Search
2003-07-01
This document presents the evaluation framework for the I-81 ITS Model Safety Corridor Program. The objectives of the framework are threefold: 1) serve as input into the development of infrastructure in the I-81 Corridor to generate baseline data for...
Wide area restoration following biological contamination
NASA Astrophysics Data System (ADS)
Yang, Lynn; Hibbard, Wilthea; Edwards, Donna; Franco, David; Fruetel, Julie; Tucker, Mark; Einfeld, Wayne; Knowlton, Robert; Brown, Gary; Brockmann, John; Greenwalt, Robert; Miles, Robin; Raber, Ellen; Carlsen, Tina; Krauter, Paula; Dillon, Michael; MacQueen, Don; Intrepido, Tony; Hoppes, Bill; Wilson, Wendy; Mancieri, Sav
2008-04-01
Current understanding of how to restore a wide area that has been contaminated following a large biological attack is limited. The Department of Homeland Security and Department of Defense are executing a four-year collaborative program named the Interagency Biological Restoration Demonstration (IBRD) program. This program is aimed at developing technologies, methods, plans and policies necessary to restore a wide area, including military installations and critical infrastructures, in the event of a large outdoor aerosol release of anthrax. The IBRD program partner pilot city is the Seattle Urban Area to include Fort Lewis, WA and McChord Air Force Base. A front-end systems analysis was conducted as part of IBRD, to: 1) assess existing technologies and processes for wide area restoration; from this, 2) develop an "as-is" decision framework for wide area restoration; and 3) identify and prioritize capability gaps. Qualitative assessments and quantitative analyses, including sensitivity, timeline and case study analyses, were conducted to evaluate existing processes and rank capability gaps. This paper describes the approach and results from this front-end systems analysis.
Merging photonics with nanoelectronics (Conference Presentation)
NASA Astrophysics Data System (ADS)
Liehr, Michael
2016-02-01
The recently established American Institute for Manufacturing Photonics (AIM Photonics) is a manufacturing consortium headquartered in New York, with funding from the US Department of Defense (DoD), New York State, and industrial partners to advance the state of the art in the design, manufacture, testing, assembly, and packaging of integrated photonic devices. Dr. Michael Liehr, CEO of AIM Photonics, will describe the technical goals, operational framework, near-term milestones, and opportunities for the broader photonics community. The Institute intends to organize a currently fragmented domestic capability in integrated photonics. AIM Photonics will develop and demonstrate innovative manufacturing technologies for a number of key application sectors for integrated photonics devices. The Institute will furthermore specifically focus on establishing and building out an infrastructure in key areas required to accelerate the further adoption of integrated photonics. Specifically, we will enhance the available hardware development capability to include Si-based Multi-Project Wafer runs, InP-based Photonic Integrated Circuits, first and second level packaging, test and assembly.
2001-03-01
between attacks and other events such as accidents, system failures, or hacking by thrill-seekers. This challenge is exacerbated by the speed of events in...International Telegraph and Telephone (CCITT) international standards body and is referred to as Signaling System # 7 ( SS7 ). Commerc" I Intelligent...point to fixed infrastructure "" Signaling Transfer Point (STP) - Packet switch in CCITT#7 Network STP ... SS7 * System Data Bases i Network
Defense Expenditures in Pakistan: A Source of Stimulus for or Competition With the Private Sector
1994-01-01
private sector activity, particularly investment, is the only viable option open to the authorities. It follows that for policy purposes the most important issue involves restructuring government expenditures and their financing in a manner that would provide the maximum inducement to private sector capital formation, especially in manufacturing. Operationally, this means finding an optimal balance between the government’s three most important budgetary items: defense, public consumption and infrastructural development. More importantly because
Natural Assurance Scheme: A level playing field framework for Green-Grey infrastructure development.
Denjean, Benjamin; Altamirano, Mónica A; Graveline, Nina; Giordano, Raffaele; van der Keur, Peter; Moncoulon, David; Weinberg, Josh; Máñez Costa, María; Kozinc, Zdravko; Mulligan, Mark; Pengal, Polona; Matthews, John; van Cauwenbergh, Nora; López Gunn, Elena; Bresch, David N
2017-11-01
This paper proposes a conceptual framework to systematize the use of Nature-based solutions (NBS) by integrating their resilience potential into Natural Assurance Scheme (NAS), focusing on insurance value as corner stone for both awareness-raising and valuation. As such one of its core goal is to align research and pilot projects with infrastructure development constraints and priorities. Under NAS, the integrated contribution of natural infrastructure to Disaster Risk Reduction is valued in the context of an identified growing need for climate robust infrastructure. The potential of NAS benefits and trade-off are explored by through the alternative lens of Disaster Resilience Enhancement (DRE). Such a system requires a joint effort of specific knowledge transfer from research groups and stakeholders to potential future NAS developers and investors. We therefore match the knowledge gaps with operational stages of the development of NAS from a project designer perspective. We start by highlighting the key role of the insurance industry in incentivizing and assessing disaster and slow onset resilience enhancement strategies. In parallel we place the public sector as potential kick-starters in DRE initiatives through the existing initiatives and constraints of infrastructure procurement. Under this perspective the paper explores the required alignment of Integrated Water resources planning and Public investment systems. Ultimately this will provide the possibility for both planners and investors to design no regret NBS and mixed Grey-Green infrastructures systems. As resources and constraints are widely different between infrastructure development contexts, the framework does not provide explicit methodological choices but presents current limits of knowledge and know-how. In conclusion the paper underlines the potential of NAS to ease the infrastructure gap in water globally by stressing the advantages of investment in the protection, enhancement and restoration of natural capital as an effective climate change adaptation investment. Copyright © 2017. Published by Elsevier Inc.
Sandia National Laboratories: National Security Missions: International
Transportation Energy Energy Research Global Security WMD Counterterrorism & Response Global Threat Reduction Homeland Defense & Force Protection Homeland Security Cyber & Infrastructure Security Global Business Procurement Technical Assistance Program (PTAP) Current Suppliers iSupplier Account Accounts
Code of Federal Regulations, 2014 CFR
2014-01-01
... defenses against physical and cyber incidents. In tandem with my Executive Order on cybersecurity, this... natural disasters, as well as cyber attacks. We must ensure that the Federal Government works with all...
A Risk Mitigation Model: Lessons Learned From Actual Insider Sabotage
2006-11-07
performance Responsibilities removed from projects Suspension of Internet access Death in family ; Divorce Financial Disagreement re: salary/compensation...Infrastructure by Information Technology Insiders, ” Monterrey , CA.: Defense Personnel Security Research and Education Center. Shaw, E.D. (2004). “The
Building the Digital Library Infrastructure: A Primer.
ERIC Educational Resources Information Center
Tebbetts, Diane R.
1999-01-01
Provides a framework for examining the complex infrastructure needed to successfully implement a digital library. Highlights include database development, online public-access catalogs, interactive technical services, full-text documents, hardware and wiring, licensing, access, and security issues. (Author/LRW)
Ecohydrology frameworks for green infrastructure design and ecosystem service provision
NASA Astrophysics Data System (ADS)
Pavao-Zuckerman, M.; Knerl, A.; Barron-Gafford, G.
2014-12-01
Urbanization is a dominant form of landscape change that affects the structure and function of ecosystems and alters control points in biogeochemical and hydrologic cycles. Green infrastructure (GI) has been proposed as a solution to many urban environmental challenges and may be a way to manage biogeochemical control points. Despite this promise, there has been relatively limited empirical focus to evaluate the efficacy of GI, relationships between design and function, and the ability of GI to provide ecosystem services in cities. This work has been driven by goals of adapting GI approaches to dryland cities and to harvest rain and storm water for providing ecosystem services related to storm water management and urban heat island mitigation, as well as other co-benefits. We will present a modification of ecohydrologic theory for guiding the design and function of green infrastructure for dryland systems that highlights how GI functions in context of Trigger - Transfer - Reserve - Pulse (TTRP) dynamic framework. Here we also apply this TTRP framework to observations of established street-scape green infrastructure in Tucson, AZ, and an experimental installation of green infrastructure basins on the campus of Biosphere 2 (Oracle, AZ) where we have been measuring plant performance and soil biogeochemical functions. We found variable sensitivity of microbial activity, soil respiration, N-mineralization, photosynthesis and respiration that was mediated both by elements of basin design (soil texture and composition, choice of surface mulches) and antecedent precipitation inputs and soil moisture conditions. The adapted TTRP framework and field studies suggest that there are strong connections between design and function that have implications for stormwater management and ecosystem service provision in dryland cities.
Defense strategies for asymmetric networked systems under composite utilities
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rao, Nageswara S.; Ma, Chris Y. T.; Hausken, Kjell
We consider an infrastructure of networked systems with discrete components that can be reinforced at certain costs to guard against attacks. The communications network plays a critical, asymmetric role of providing the vital connectivity between the systems. We characterize the correlations within this infrastructure at two levels using (a) aggregate failure correlation function that specifies the infrastructure failure probability giventhe failure of an individual system or network, and (b) first order differential conditions on system survival probabilities that characterize component-level correlations. We formulate an infrastructure survival game between an attacker and a provider, who attacks and reinforces individual components, respectively.more » They use the composite utility functions composed of a survival probability term and a cost term, and the previously studiedsum-form and product-form utility functions are their special cases. At Nash Equilibrium, we derive expressions for individual system survival probabilities and the expected total number of operational components. We apply and discuss these estimates for a simplified model of distributed cloud computing infrastructure« less
Orwin, Robert G; Stein-Seroussi, Alan; Edwards, Jessica M; Landy, Ann L; Flewelling, Robert L
2014-06-01
The Strategic Prevention Framework State Incentive Grant (SPF SIG) program is a national public health initiative sponsored by the U.S. Substance Abuse and Mental Health Services Administration's Center for Substance Abuse Prevention to prevent substance abuse and its consequences. State grantees used a data-driven planning model to allocate resources to 450 communities, which in turn launched over 2,200 intervention strategies to target prevention priorities in their respective populations. An additional goal was to build prevention capacity and infrastructure at the state and community levels. This paper addresses whether the state infrastructure goal was achieved, and what contextual and implementation factors were associated with success. The findings are consistent with claims that, overall, the SPF SIG program met its goal of increasing prevention capacity and infrastructure across multiple infrastructure domains, though the mediating effects of implementation were evident only in the evaluation/monitoring domain. The results also show that an initiative like the SPF SIG, which could easily have been compartmentalized within the states, has the potential to permeate more broadly throughout state prevention systems.
2006-06-01
7 C. THE ENTERPRISE ARCHITECTURE MANAGEMENT MATURITY FRAMEWORK ...43 B. WHAT ARE INFORMATION TECHNOLOGY FRAMEWORKS AND WHY SHOULD THEY BE IMPLEMENTED?................................43 C...THE INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY FRAMEWORK ..........................................................................44 1. What
78 FR 16699 - National Maritime Security Advisory Committee; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-18
... Executive Order \\1\\ to strengthen the cybersecurity of critical infrastructure by increasing information sharing and by jointly developing and implementing a framework of cybersecurity practices with our...-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity . (2...
The MMI Semantic Framework: Rosetta Stones for Earth Sciences
NASA Astrophysics Data System (ADS)
Rueda, C.; Bermudez, L. E.; Graybeal, J.; Alexander, P.
2009-12-01
Semantic interoperability—the exchange of meaning among computer systems—is needed to successfully share data in Ocean Science and across all Earth sciences. The best approach toward semantic interoperability requires a designed framework, and operationally tested tools and infrastructure within that framework. Currently available technologies make a scientific semantic framework feasible, but its development requires sustainable architectural vision and development processes. This presentation outlines the MMI Semantic Framework, including recent progress on it and its client applications. The MMI Semantic Framework consists of tools, infrastructure, and operational and community procedures and best practices, to meet short-term and long-term semantic interoperability goals. The design and prioritization of the semantic framework capabilities are based on real-world scenarios in Earth observation systems. We describe some key uses cases, as well as the associated requirements for building the overall infrastructure, which is realized through the MMI Ontology Registry and Repository. This system includes support for community creation and sharing of semantic content, ontology registration, version management, and seamless integration of user-friendly tools and application programming interfaces. The presentation describes the architectural components for semantic mediation, registry and repository for vocabularies, ontology, and term mappings. We show how the technologies and approaches in the framework can address community needs for managing and exchanging semantic information. We will demonstrate how different types of users and client applications exploit the tools and services for data aggregation, visualization, archiving, and integration. Specific examples from OOSTethys (http://www.oostethys.org) and the Ocean Observatories Initiative Cyberinfrastructure (http://www.oceanobservatories.org) will be cited. Finally, we show how semantic augmentation of web services standards could be performed using framework tools.
Information Technology and Community Restoration Studies/Task 1: Information Technology
DOE Office of Scientific and Technical Information (OSTI.GOV)
Upton, Jaki F.; Lesperance, Ann M.; Stein, Steven L.
2009-11-19
Executive Summary The Interagency Biological Restoration Demonstration—a program jointly funded by the Department of Defense's Defense Threat Reduction Agency and the Department of Homeland Security's (DHS's) Science and Technology Directorate—is developing policies, methods, plans, and applied technologies to restore large urban areas, critical infrastructures, and Department of Defense installations following the intentional release of a biological agent (anthrax) by terrorists. There is a perception that there should be a common system that can share information both vertically and horizontally amongst participating organizations as well as support analyses. A key question is: "How far away from this are we?" As partmore » of this program, Pacific Northwest National Laboratory conducted research to identify the current information technology tools that would be used by organizations in the greater Seattle urban area in such a scenario, to define criteria for use in evaluating information technology tools, and to identify current gaps. Researchers interviewed 28 individuals representing 25 agencies in civilian and military organizations to identify the tools they currently use to capture data needed to support operations and decision making. The organizations can be grouped into five broad categories: defense (Department of Defense), environmental/ecological (Environmental Protection Agency/Ecology), public health and medical services, emergency management, and critical infrastructure. The types of information that would be communicated in a biological terrorism incident include critical infrastructure and resource status, safety and protection information, laboratory test results, and general emergency information. The most commonly used tools are WebEOC (web-enabled crisis information management systems with real-time information sharing), mass notification software, resource tracking software, and NW WARN (web-based information to protect critical infrastructure systems). It appears that the current information management tools are used primarily for information gathering and sharing—not decision making. Respondents identified the following criteria for a future software system. It is easy to learn, updates information in real time, works with all agencies, is secure, uses a visualization or geographic information system feature, enables varying permission levels, flows information from one stage to another, works with other databases, feeds decision support tools, is compliant with appropriate standards, and is reasonably priced. Current tools have security issues, lack visual/mapping functions and critical infrastructure status, and do not integrate with other tools. It is clear that there is a need for an integrated, common operating system. The system would need to be accessible by all the organizations that would have a role in managing an anthrax incident to enable regional decision making. The most useful tool would feature a GIS visualization that would allow for a common operating picture that is updated in real time. To capitalize on information gained from the interviews, the following activities are recommended: • Rate emergency management decision tools against the criteria specified by the interviewees. • Identify and analyze other current activities focused on information sharing in the greater Seattle urban area. • Identify and analyze information sharing systems/tools used in other regions.« less
2014-04-01
must be done to determine current infrastructure and capabilities so that necessary updates and changes can be addressed up front. Mobile biometric...with existing satellite communications infrastructure . 20 PSTP 03-427BIOM 4 State of Mobile Biometric Device Market 4.1 Fingerprint...is a wireless information system highlighted by Real-time wireless data collection mobile device independence, wireless infrastructure independence
A Real-Time Web of Things Framework with Customizable Openness Considering Legacy Devices
Zhao, Shuai; Yu, Le; Cheng, Bo
2016-01-01
With the development of the Internet of Things (IoT), resources and applications based on it have emerged on a large scale. However, most efforts are “silo” solutions where devices and applications are tightly coupled. Infrastructures are needed to connect sensors to the Internet, open up and break the current application silos and move to a horizontal application mode. Based on the concept of Web of Things (WoT), many infrastructures have been proposed to integrate the physical world with the Web. However, issues such as no real-time guarantee, lack of fine-grained control of data, and the absence of explicit solutions for integrating heterogeneous legacy devices, hinder their widespread and practical use. To address these issues, this paper proposes a WoT resource framework that provides the infrastructures for the customizable openness and sharing of users’ data and resources under the premise of ensuring the real-time behavior of their own applications. The proposed framework is validated by actual systems and experimental evaluations. PMID:27690038
A Real-Time Web of Things Framework with Customizable Openness Considering Legacy Devices.
Zhao, Shuai; Yu, Le; Cheng, Bo
2016-09-28
With the development of the Internet of Things (IoT), resources and applications based on it have emerged on a large scale. However, most efforts are "silo" solutions where devices and applications are tightly coupled. Infrastructures are needed to connect sensors to the Internet, open up and break the current application silos and move to a horizontal application mode. Based on the concept of Web of Things (WoT), many infrastructures have been proposed to integrate the physical world with the Web. However, issues such as no real-time guarantee, lack of fine-grained control of data, and the absence of explicit solutions for integrating heterogeneous legacy devices, hinder their widespread and practical use. To address these issues, this paper proposes a WoT resource framework that provides the infrastructures for the customizable openness and sharing of users' data and resources under the premise of ensuring the real-time behavior of their own applications. The proposed framework is validated by actual systems and experimental evaluations.
Hedge, L H; Dafforn, K A; Simpson, S L; Johnston, E L
2017-06-30
Infrastructure associated with coastal communities is likely to not only directly displace natural systems, but also leave environmental footprints' that stretch over multiple scales. Some coastal infrastructure will, there- fore, generate a hidden layer of habitat heterogeneity in sediment systems that is not immediately observable in classical impact assessment frameworks. We examine the hidden heterogeneity associated with one of the most ubiquitous coastal modifications; dense swing moorings fields. Using a model based geo-statistical framework we highlight the variation in sedimentology throughout mooring fields and reference locations. Moorings were correlated with patches of sediment with larger particle sizes, and associated metal(loid) concentrations in these patches were depressed. Our work highlights two important ideas i) mooring fields create a mosaic of habitat in which contamination decreases and grain sizes increase close to moorings, and ii) model- based frameworks provide an information rich, easy-to-interpret way to communicate complex analyses to stakeholders. Crown Copyright © 2017. Published by Elsevier Ltd. All rights reserved.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 32 National Defense 6 2010-07-01 2010-07-01 false Concept. 989.2 Section 989.2 National Defense Department of Defense (Continued) DEPARTMENT OF THE AIR FORCE ENVIRONMENTAL PROTECTION ENVIRONMENTAL IMPACT ANALYSIS PROCESS (EIAP) § 989.2 Concept. (a) This part provides a framework on how to comply with NEPA and...
A Planetary Defense Gateway for Smart Discovery of relevant Information for Decision Support
NASA Technical Reports Server (NTRS)
Bambacus, Myra; Yang, Chaowei Phil; Leung, Ronald Y.; Barbee, Brent; Nuth, Joseph A.; Seery, Bernard; Jiang, Yongyao; Qin, Han; Li, Yun; Yu, Manzhu;
2017-01-01
A Planetary Defense Gateway for Smart Discovery of relevant Information for Decision Support presentation discussing background, framework architecture, current results, ongoing research, conclusions.
Hypersonic Threats to the Homeland
2017-03-28
facilities. This defensive grid initiative can help stimulate R&D for hyper loop transportation and high speed railways for the aging infrastructure...Observe, Orient, Decide, Act (OODA) loop . In a tactical situation a warfighter makes decisions as he or she observes the environment; then the
Sandia National Laboratories: National Security Missions: Defense Systems
Accomplishments Energy Stationary Power Earth Science Transportation Energy Energy Research Global Security WMD Cyber & Infrastructure Security Global Security Remote Sensing & Verification Research Research Robotics R&D 100 Awards Laboratory Directed Research & Development Technology Deployment Centers
Infrastructure Vulnerability Assessment and Defense
2005-03-01
companies or organizations. The connectivity and communications within and among networks are "glued" together by a set of protocols defined by the Internet ... research communities, which are modified and improved over decades of time. Those protocols are usually designed in the principle to achieve
49 CFR 1.84 - The Federal Highway Administration.
Code of Federal Regulations, 2012 CFR
2012-10-01
... environment. (e) Surveying and constructing forest highway system roads, defense highways and access roads... surveillance of accident locations; highway design, construction, and maintenance, including context sensitive...-to-infrastructure research. (i) Managing TIFIA funds, 23 U.S.C. 601-609, in conjunction with the...
49 CFR 1.84 - The Federal Highway Administration.
Code of Federal Regulations, 2014 CFR
2014-10-01
... environment. (e) Surveying and constructing forest highway system roads, defense highways and access roads... surveillance of accident locations; highway design, construction, and maintenance, including context sensitive...-to-infrastructure research. (i) Managing TIFIA funds, 23 U.S.C. 601-609, in conjunction with the...
Top Cyber: Developing the Top One Percent to Defeat the Advanced Persistent Threat
2014-02-13
Critical Infrastructure.” V3-CO-UK, 7 May 2013. http://www.v3.co.uk/v3-uk/news/2266397/us- government-chinese- hackers -have-the-skills-to-take-down...it is a source of great risk; and, for hackers , it is the super-highway to a target-rich environment. For the U.S. Government (USG), cyberspace is...worldwide. Ultimately, for all its benefits, the Internet presents an “Achilles’ Heel” in the defense of the nation’s Critical Infrastructure and Key
2011-06-01
BEIS Business Enterprise Information Services BEP Business Enterprise Priorities BMMP Business Management Modernization Program BTA Business...Scorecard framework . Initially published in December 2005, the FIAR is the DoD’s strategy towards achieving audit readiness. The FIAR provides a timeline and...Secretary of Defense Comptroller, n.d.). The Balanced Scorecard, a strategic management framework developed in 1987 by Arthur Schneiderman and popularized
RAND Arroyo Center Annual Report 2009
2010-01-01
forces to transfer responsibility and authority to other entities outside the U.S. Department of Defense (DoD) at the tactical level. It recommended...SoSE principles and recommended how to use them to efficiently implement and integrate SoSE capability into the Army acquisition framework . Sponsored...exploring how the Department of Defense acquisition system can more rapidly develop, procure, and field effective C2 systems within the framework of
Infrastructure for the Geospatial Web
NASA Astrophysics Data System (ADS)
Lake, Ron; Farley, Jim
Geospatial data and geoprocessing techniques are now directly linked to business processes in many areas. Commerce, transportation and logistics, planning, defense, emergency response, health care, asset management and many other domains leverage geospatial information and the ability to model these data to achieve increased efficiencies and to develop better, more comprehensive decisions. However, the ability to deliver geospatial data and the capacity to process geospatial information effectively in these domains are dependent on infrastructure technology that facilitates basic operations such as locating data, publishing data, keeping data current and notifying subscribers and others whose applications and decisions are dependent on this information when changes are made. This chapter introduces the notion of infrastructure technology for the Geospatial Web. Specifically, the Geography Markup Language (GML) and registry technology developed using the ebRIM specification delivered from the OASIS consortium are presented as atomic infrastructure components in a working Geospatial Web.
Safety impacts of bicycle infrastructure: A critical review.
DiGioia, Jonathan; Watkins, Kari Edison; Xu, Yanzhi; Rodgers, Michael; Guensler, Randall
2017-06-01
This paper takes a critical look at the present state of bicycle infrastructure treatment safety research, highlighting data needs. Safety literature relating to 22 bicycle treatments is examined, including findings, study methodologies, and data sources used in the studies. Some preliminary conclusions related to research efficacy are drawn from the available data and findings in the research. While the current body of bicycle safety literature points toward some defensible conclusions regarding the safety and effectiveness of certain bicycle treatments, such as bike lanes and removal of on-street parking, the vast majority treatments are still in need of rigorous research. Fundamental questions arise regarding appropriate exposure measures, crash measures, and crash data sources. This research will aid transportation departments with regard to decisions about bicycle infrastructure and guide future research efforts toward understanding safety impacts of bicycle infrastructure. Copyright © 2017 Elsevier Ltd and National Safety Council. All rights reserved.
Highway Funding: It's Time to Think Seriously About Operations. A Policy Framework
DOT National Transportation Integrated Search
1998-09-01
This report describes the results of a major data gathering effort aimed at tracking deployment of nine infrastructure components of the metropolitan ITS infrastructure in 78 of the largest metropolitan areas in the nation. The nine components are: F...
78 FR 19277 - National Maritime Security Advisory Committee; Meeting
Federal Register 2010, 2011, 2012, 2013, 2014
2013-03-29
... Obama signed an Executive Order to strengthen the cybersecurity of critical infrastructure by increasing information sharing and by jointly developing and implementing a framework of cybersecurity practices with our...-press-office/2013/02/12/executive-order-improving-critical-infrastructure-cybersecurity . (2...
Scaling an urban emergency evacuation framework : challenges and practices.
DOT National Transportation Integrated Search
2014-01-01
Critical infrastructure disruption, caused by severe weather events, natural disasters, terrorist : attacks, etc., has significant impacts on urban transportation systems. We built a computational : framework to simulate urban transportation systems ...
Advanced Concepts Research for Flywheel Technology Applications
NASA Technical Reports Server (NTRS)
Keith, Theo G., Jr.; Wagner, Robert
2004-01-01
The Missile Defense Agency (MDA) (formerly the Ballistic Missile Defense Organization) is embarking on a program to employ the use of High Altitude Airships (HAAs) for surveillance of coastal areas as a part of homeland defense. It is envisioned that these HAAs will fly at 70,000 feet continuously for at least a year, therefore requiring a regenerative electric power system. As part of a program to entice the MDA to utilize the NASA GRC expertise in electric power and propulsion as a means of risk reduction, an internal study program was performed to examine possible configurations that may be employed on a HAA to meet a theoretical surveillance need. This entailed the development of a set of program requirements which were flowed down to system and subsystem level requirements as well as the identification of environmental and infrastructure constraints. Such infrastructure constraints include the ability to construct a reasonably sized HAA within existing airship hangers, as the size of such vehicles could reach in excess of 600 ft. The issues regarding environments at this altitude are similar to those that would be imposed on satellite in Low Earth Orbit. Additionally, operational constraints, due to high winds at certain times of the year were also examined to determine options that could be examined to allow year round coverage of the US coast.
Stargardt, Tom; Schreyögg, Jonas
2012-05-01
Small area variations in healthcare infrastructure may result in differences in early detection and outcomes for patients with rare diseases. It is our aim to provide a framework for evaluating small area variations in healthcare infrastructure on the diagnostics and health outcomes of rare diseases. We focus on administrative data as it allows (a) for relatively large sample sizes even though the prevalence of rare diseases is very low, and (b) makes it possible to link information on healthcare infrastructure to morbidity, mortality, and utilization. For identifying patients with a rare disease in a database, a combination of different classification systems has to be used due to usually multiple diseases sharing one ICD code. Outcomes should be chosen that are (a) appropriate for the disease, (b) identifiable and reliably coded in the administrative database, and (c) observable during the limited time period of the follow-up. Risk adjustment using summary scores of disease-specific or comprehensive risk adjustment instruments might be preferable over empirical weights because of the lower number of variables needed. The proposed framework will help to identify differences in time to diagnosis and treatment outcomes across areas in the context of rare diseases. Copyright © 2012 Elsevier Ireland Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Low, W. W.; Wong, K. S.; Lee, J. L.
2018-04-01
With the growth of economy and population, there is an increase in infrastructure construction projects. As such, it is unavoidable to have construction projects on soft soil. Without proper risk management plan, construction projects are vulnerable to different types of risks which will have negative impact on project’s time, cost and quality. Literature review showed that little or none of the research is focused on the risk assessment on the infrastructure project in soft soil. Hence, the aim of this research is to propose a risk assessment framework in infrastructure projects in soft soil during the construction stage. This research was focused on the impact of risks on project time and internal risk factors. The research method was Analytical Hierarchy Process and the sample population was experienced industry experts who have experience in infrastructure projects. Analysis was completed and result showed that for internal factors, the five most significant risks on time element are lack of special equipment, potential contractual disputes and claims, shortage of skilled workers, delay/lack of materials supply, and insolvency of contractor/sub-contractor. Results indicated that resources risk factor play a critical role on project time frame in infrastructure projects in soft soil during the construction stage.
1999-11-01
C17 C130 + $2B upgrade SSTOL VTOL Advanced VTOL 6060120150 Vehicle wt. (tons) Ktons 2015 26 U.S. military dominance in future crises . It is also a...improvement between crises . A “pick-up” approach to C4ISR systems is not effective for today’s complex contingencies, yet it has become the norm. Instead...demands during crises and to stress imposed on the system by adversaries. The infrastructure must allow information to be distributed to and from any
2014-01-01
of the 2011–2013 pay freeze, the unpaid furloughs in 2013, a wave of retirements of the baby - boom generation, and recent proposals by lawmakers to...CARE INFRASTRUCTURE AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND...Department of Defense (DoD). These pay actions on top of a wave of baby -boomer retirements and various proposals by lawmakers to reduce federal compensation
NASA Astrophysics Data System (ADS)
Wong, John-Michael; Stojadinovic, Bozidar
2005-05-01
A framework has been defined for storing and retrieving civil infrastructure monitoring data over a network. The framework consists of two primary components: metadata and network communications. The metadata component provides the descriptions and data definitions necessary for cataloging and searching monitoring data. The communications component provides Java classes for remotely accessing the data. Packages of Enterprise JavaBeans and data handling utility classes are written to use the underlying metadata information to build real-time monitoring applications. The utility of the framework was evaluated using wireless accelerometers on a shaking table earthquake simulation test of a reinforced concrete bridge column. The NEESgrid data and metadata repository services were used as a backend storage implementation. A web interface was created to demonstrate the utility of the data model and provides an example health monitoring application.
Klein, Karsten; Wolff, Astrid C; Ziebold, Oliver; Liebscher, Thomas
2008-01-01
The ICW eHealth Framework (eHF) is a powerful infrastructure and platform for the development of service-oriented solutions in the health care business. It is the culmination of many years of experience of ICW in the development and use of in-house health care solutions and represents the foundation of ICW product developments based on the Java Enterprise Edition (Java EE). The ICW eHealth Framework has been leveraged to allow development by external partners - enabling adopters a straightforward integration into ICW solutions. The ICW eHealth Framework consists of reusable software components, development tools, architectural guidelines and conventions defining a full software-development and product lifecycle. From the perspective of a partner, the framework provides services and infrastructure capabilities for integrating applications within an eHF-based solution. This article introduces the ICW eHealth Framework's basic architectural concepts and technologies. It provides an overview of its module and component model, describes the development platform that supports the complete software development lifecycle of health care applications and outlines technological aspects, mainly focusing on application development frameworks and open standards.
2015-03-01
Defense DODAF Department of Defense Architecture Framework DOE design of experiment EMMI energy , mass, material wealth, information FNF fire and... energy or blast power (depending on the type of projectile). Tank munitions have significant penetrative ability and can cause serious damage to...survivability of ground combat vehicles during ground force maneuver operations. The simulation results indicated that the presence of air defense
2015-06-01
Stockholm International Peace Research Institute (SIPRI) yearbooks, published documents of EU governments, annual reports and studies , and others. The main...the framework of impact assessment. In this context, five studies were commissioned, in particular to collect more 48 quantitative information...military spending, in particular in the defense procurement and research and development areas, has been negatively affecting defense companies in
Background Models that allow for design considerations of green infrastructure (GI) practices to control stormwater runoff and associated contaminants have received considerable attention in recent years. While popular, generally, the GI models are relatively simplistic. However,...
Improving FHWA's Ability to Assess Highway Infrastructure Health : National Meeting Report
DOT National Transportation Integrated Search
2011-12-08
The FHWA in coordination with AASHTO conducted a study to define a consistent and reliable method to document infrastructure health with a focus on pavements and bridges on the Interstate System, and to develop a framework for tools that can provide ...
New Zealand Defense Policy Framework, A Strategic Reappraisal
2004-03-19
viii THE NEW ZEALAND DEFENSE POLICY FRAMEWORK – A STRATEGIC APPRAISAL What we demand is that the world be made fit and safe to live in. Woodrow Wilson...pressure on some governments and often results in armed conflict. The former Yugoslavia and Soviet Union stand out as prominent examples of the... demand access to the products, services and lifestyles that are evident in other nations. This is problematic for governments who set values and
A game theory analysis of green infrastructure stormwater management policies
NASA Astrophysics Data System (ADS)
William, Reshmina; Garg, Jugal; Stillwell, Ashlynn S.
2017-09-01
Green stormwater infrastructure has been demonstrated as an innovative water resources management approach that addresses multiple challenges facing urban environments. However, there is little consensus on what policy strategies can be used to best incentivize green infrastructure adoption by private landowners. Game theory, an analysis framework that has historically been under-utilized within the context of stormwater management, is uniquely suited to address this policy question. We used a cooperative game theory framework to investigate the potential impacts of different policy strategies used to incentivize green infrastructure installation. The results indicate that municipal regulation leads to the greatest reduction in pollutant loading. However, the choice of the "best" regulatory approach will depend on a variety of different factors including politics and financial considerations. Large, downstream agents have a disproportionate share of bargaining power. Results also reveal that policy impacts are highly dependent on agents' spatial position within the stormwater network, leading to important questions of social equity and environmental justice.
DOE Office of Scientific and Technical Information (OSTI.GOV)
McCaskey, Alexander J.
Hybrid programming models for beyond-CMOS technologies will prove critical for integrating new computing technologies alongside our existing infrastructure. Unfortunately the software infrastructure required to enable this is lacking or not available. XACC is a programming framework for extreme-scale, post-exascale accelerator architectures that integrates alongside existing conventional applications. It is a pluggable framework for programming languages developed for next-gen computing hardware architectures like quantum and neuromorphic computing. It lets computational scientists efficiently off-load classically intractable work to attached accelerators through user-friendly Kernel definitions. XACC makes post-exascale hybrid programming approachable for domain computational scientists.
The Defender's Role in Cyber Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
The embodiment of this work is a table top game to explore cyber security and network defense concepts and cost. The game structure is such that it provides players an immersive environment to play a given role in cyber security to investigate the result of infrastructure and response decisions.
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-05
... (DHS), Science and Technology, Protected Repository for the Defense of Infrastructure Against Cyber Threats (PREDICT) Program AGENCY: Science and Technology Directorate, DHS. ACTION: 30-Day notice and request for comment. SUMMARY: The Department of Homeland Security (DHS), Science & Technology (S&T...
Valuing public sector risk exposure in transportation public-private partnerships.
DOT National Transportation Integrated Search
2010-10-01
This report presents a methodological framework to evaluate public sector financial risk exposure when : delivering transportation infrastructure through public-private partnership (PPP) agreements in the United : States (U.S.). The framework is base...
Situating Green Infrastructure in Context: A Framework for Adaptive Socio-Hydrology in Cities
Management of urban hydrologic processes using green infrastructure (GI) has largely focused on storm water management. Thus, design and implementation of GI usually rely on physical site characteristics and local rainfall patterns, and do not typically account for human or socia...
NASA Astrophysics Data System (ADS)
Wiggins, H. V.; Warnick, W. K.; Hempel, L. C.; Henk, J.; Sorensen, M.; Tweedie, C. E.; Gaylord, A. G.
2007-12-01
As the creation and use of geospatial data in research, management, logistics, and education applications has proliferated, there is now a tremendous potential for advancing science through a variety of cyber-infrastructure applications, including Spatial Data Infrastructure (SDI) and related technologies. SDIs provide a necessary and common framework of standards, securities, policies, procedures, and technology to support the effective acquisition, coordination, dissemination and use of geospatial data by multiple and distributed stakeholder and user groups. Despite the numerous research activities in the Arctic, there is no established SDI and, because of this lack of a coordinated infrastructure, there is inefficiency, duplication of effort, and reduced data quality and search ability of arctic geospatial data. The urgency for establishing this framework is significant considering the myriad of data that is being collected in celebration of the International Polar Year (IPY) in 2007-2008 and the current international momentum for an improved and integrated circum-arctic terrestrial-marine-atmospheric environmental observatories network. The key objective of this project is to lay the foundation for full implementation of an Arctic Spatial Data Infrastructure (ASDI) through an assessment of community needs, readiness, and resources and through the development of a prototype web-mapping portal.
NASA Astrophysics Data System (ADS)
Chester, M.; Grimm, N. B.; Redman, C.; Miller, T.; McPherson, T.; Munoz-Erickson, T.; Chandler, D. G.
2015-12-01
Climate change is widely considered one of the greatest challenges to global sustainability, with extreme events being the most immediate way that people experience this phenomenon. Urban areas are particularly vulnerable to these events given their location, concentration of people, and increasingly complex and interdependent infrastructure. We are developing a conceptual framework for urban social-ecological-technological systems (SETS) that will allow researchers and practitioners to assess how infrastructure can be resilient, provide ecosystem services, improve social well being, and exploit new technologies in ways that benefit urban populations. The framework integrates the three domains of social and equity issues, environmental quality and protection, and technical/engineering aspects, to form a concept of infrastructure that occurs at the intersection of the domains. Examples show how the more common socioecological systems and socially sensitive engineering approaches that fail to incorporate the third dimension may elevate vulnerability to climate-related disaster. The SETS conceptual framework bridges currently siloed social science, environmental science, and engineering approaches to significantly advance research into the structure, function, and emergent properties of SETS. Extreme events like heat waves in Phoenix; coastal and urban flooding in the wake of superstorm Sandy and following hurricanes in Miami, FL; drought in Mexico; and urban flooding in Baltimore, Portland, San Juan PR, Syracuse, and Valdivia, Chile provide examples of the impacts of and vulnerability to extreme events that demand a new approach. The infrastructure of the future must be resilient, leverage ecosystem services, improve social well being, and exploit new technologies in ways that benefit all segments of urban populations and are appropriate to the particular urban contexts. These contexts are defined not only by the biophysical environment but also by culture and institutions of each place. We apply the SETS conceptual framework to nine western hemisphere cities in diverse settings, presenting hypotheses about the relative efficacy of strategies for resilient SETS infrastructure in cities contrasting in event type, biophysical setting, and cultural and institutional contexts.
Bull, Fiona; Powell, Jane; Cooper, Ashley R.; Brand, Christian; Mutrie, Nanette; Preston, John; Rutter, Harry
2011-01-01
Improving infrastructure for walking and cycling is increasingly recommended as a means to promote physical activity, prevent obesity, and reduce traffic congestion and carbon emissions. However, limited evidence from intervention studies exists to support this approach. Drawing on classic epidemiological methods, psychological and ecological models of behavior change, and the principles of realistic evaluation, we have developed an applied ecological framework by which current theories about the behavioral effects of environmental change may be tested in heterogeneous and complex intervention settings. Our framework guides study design and analysis by specifying the most important data to be collected and relations to be tested to confirm or refute specific hypotheses and thereby refine the underlying theories. PMID:21233429
Spending on School Infrastructure: Does Money Matter?
ERIC Educational Resources Information Center
Crampton, Faith E.
2009-01-01
Purpose: The purpose of this study is to further develop an emerging thread of quantitative research that grounds investment in school infrastructure in a unified theoretical framework of investment in human, social, and physical capital. Design/methodology/approach: To answer the research question, what is the impact of investment in human,…
Clinical Knowledge Governance Framework for Nationwide Data Infrastructure Projects.
Wulff, Antje; Haarbrandt, Birger; Marschollek, Michael
2018-01-01
The availability of semantically-enriched and interoperable clinical information models is crucial for reusing once collected data across institutions like aspired in the German HiGHmed project. Funded by the Federal Ministry of Education and Research, this nationwide data infrastructure project adopts the openEHR approach for semantic modelling. Here, strong governance is required to define high-quality and reusable models. Design of a clinical knowledge governance framework for openEHR modelling in cross-institutional settings like HiGHmed. Analysis of successful practices from international projects, published ideas on archetype governance and own modelling experiences as well as modelling of BPMN processes. We designed a framework by presenting archetype variations, roles and responsibilities, IT support and modelling workflows. Our framework has great potential to make the openEHR modelling efforts manageable. Because practical experiences are rare, prospectively our work will be predestinated to evaluate the benefits of such structured governance approaches.
Attending unintended transformations of health care infrastructure
Wentzer, Helle; Bygholm, Ann
2007-01-01
Introduction Western health care is under pressure from growing demands on quality and efficiency. The development and implementation of information technology, IT is a key mean of health care authorities to improve on health care infrastructure. Theory and methods Against a background of theories on human-computer interaction and IT-mediated communication, different empirical studies of IT implementation in health care are analyzed. The outcome is an analytical discernment between different relations of communication and levels of interaction with IT in health care infrastructure. These relations and levels are synthesized into a framework for identifying tensions and potential problems in the mediation of health care with the IT system. These problems are also known as unexpected adverse consequences, UACs, from IT implementation into clinical health care practices. Results This paper develops a conceptual framework for addressing transformations of communication and workflow in health care as a result of implementing IT. Conclusion and discussion The purpose of the conceptual framework is to support the attention to and continuous screening for errors and unintended consequences of IT implementation into health care practices and outcomes. PMID:18043725
Volden, Gro Holst
2018-08-01
Infrastructure projects in developed countries are rarely evaluated ex-post. Despite their number and scope, our knowledge about their various impacts is surprisingly limited. The paper argues that such projects must be assessed in a broad perspective that includes both operational, tactical and strategic aspects, and unintended as well as intended effects. A generic six-criteria evaluation framework is suggested, inspired by a framework frequently used to evaluate development assistance projects. It is tested on 20 Norwegian projects from various sectors (transport, defence, ICT, buildings). The results indicate that the majority of projects were successful, especially in operational terms, possibly because they underwent external quality assurance up-front. It is argued that applying this type of standardized framework provides a good basis for comparison and learning across sectors. It is suggested that evaluations should be conducted with the aim of promoting accountability, building knowledge about infrastructure projects, and continuously improve the tools, methods and governance arrangements used in the front-end of project development. Copyright © 2018 The Author. Published by Elsevier Ltd.. All rights reserved.
Virtual machine-based simulation platform for mobile ad-hoc network-based cyber infrastructure
Yoginath, Srikanth B.; Perumalla, Kayla S.; Henz, Brian J.
2015-09-29
In modeling and simulating complex systems such as mobile ad-hoc networks (MANETs) in de-fense communications, it is a major challenge to reconcile multiple important considerations: the rapidity of unavoidable changes to the software (network layers and applications), the difficulty of modeling the critical, implementation-dependent behavioral effects, the need to sustain larger scale scenarios, and the desire for faster simulations. Here we present our approach in success-fully reconciling them using a virtual time-synchronized virtual machine(VM)-based parallel ex-ecution framework that accurately lifts both the devices as well as the network communications to a virtual time plane while retaining full fidelity. At themore » core of our framework is a scheduling engine that operates at the level of a hypervisor scheduler, offering a unique ability to execute multi-core guest nodes over multi-core host nodes in an accurate, virtual time-synchronized manner. In contrast to other related approaches that suffer from either speed or accuracy issues, our framework provides MANET node-wise scalability, high fidelity of software behaviors, and time-ordering accuracy. The design and development of this framework is presented, and an ac-tual implementation based on the widely used Xen hypervisor system is described. Benchmarks with synthetic and actual applications are used to identify the benefits of our approach. The time inaccuracy of traditional emulation methods is demonstrated, in comparison with the accurate execution of our framework verified by theoretically correct results expected from analytical models of the same scenarios. In the largest high fidelity tests, we are able to perform virtual time-synchronized simulation of 64-node VM-based full-stack, actual software behaviors of MANETs containing a mix of static and mobile (unmanned airborne vehicle) nodes, hosted on a 32-core host, with full fidelity of unmodified ad-hoc routing protocols, unmodified application executables, and user-controllable physical layer effects including inter-device wireless signal strength, reachability, and connectivity.« less
Virtual machine-based simulation platform for mobile ad-hoc network-based cyber infrastructure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yoginath, Srikanth B.; Perumalla, Kayla S.; Henz, Brian J.
In modeling and simulating complex systems such as mobile ad-hoc networks (MANETs) in de-fense communications, it is a major challenge to reconcile multiple important considerations: the rapidity of unavoidable changes to the software (network layers and applications), the difficulty of modeling the critical, implementation-dependent behavioral effects, the need to sustain larger scale scenarios, and the desire for faster simulations. Here we present our approach in success-fully reconciling them using a virtual time-synchronized virtual machine(VM)-based parallel ex-ecution framework that accurately lifts both the devices as well as the network communications to a virtual time plane while retaining full fidelity. At themore » core of our framework is a scheduling engine that operates at the level of a hypervisor scheduler, offering a unique ability to execute multi-core guest nodes over multi-core host nodes in an accurate, virtual time-synchronized manner. In contrast to other related approaches that suffer from either speed or accuracy issues, our framework provides MANET node-wise scalability, high fidelity of software behaviors, and time-ordering accuracy. The design and development of this framework is presented, and an ac-tual implementation based on the widely used Xen hypervisor system is described. Benchmarks with synthetic and actual applications are used to identify the benefits of our approach. The time inaccuracy of traditional emulation methods is demonstrated, in comparison with the accurate execution of our framework verified by theoretically correct results expected from analytical models of the same scenarios. In the largest high fidelity tests, we are able to perform virtual time-synchronized simulation of 64-node VM-based full-stack, actual software behaviors of MANETs containing a mix of static and mobile (unmanned airborne vehicle) nodes, hosted on a 32-core host, with full fidelity of unmodified ad-hoc routing protocols, unmodified application executables, and user-controllable physical layer effects including inter-device wireless signal strength, reachability, and connectivity.« less
Foreign Investment and National Security: Economic Considerations
2008-06-27
Florio and CFIUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 Critical Infrastructure/Key Resources...from falling under foreign control, primarily for national defense purposes. Exon- Florio and CFIUS The second category of restrictions, characterized...by such approval procedures as the Exon- Florio provision, applies to foreign investment in existing U.S. firms through mergers, acquisitions, or take
Investigating the Application of Moving Target Defenses to Network Security
2013-08-01
developing an MTD testbed using OpenStack [14] to show that our MTD design can actually work. Building an MTD system in a cloud infrastructure will be...Information Intelli- gence Research. New York, USA: ACM, 2013. [14] Openstack , “ Openstack : The folsom release,” http://www.openstack.org/software
Federal Register 2010, 2011, 2012, 2013, 2014
2012-12-11
... Technology Research'' (``The Menlo Report'') for the Department of Homeland Security (DHS), Science and Technology, Cyber Security Division (CSD), Protected Repository for the Defense of Infrastructure Against Cyber Threats (PREDICT) Project AGENCY: Science and Technology Directorate, DHS. ACTION: Response...
Building a Flexible Nework Infrastructure for Moving Target Defense
2017-10-13
testbed. We have published a paper in the CAN Workshop held in conjunction with the ACM CoNext 2016 conference [3]. ML implementations on OpenNetVM...Artificial Intelligence applications in the network Workshop held in conjunction with IEEE ICNP 2017 [4]. [1] Azeem Aqil, Karim Khalil, Ahmed Atya
Bringing the Cybersecurity Challenge to the Social Studies Classroom
ERIC Educational Resources Information Center
Berson, Michael J.; Berson, Ilene R.
2014-01-01
Educators have been increasingly sensitized to the role of schools in developing students' cyberethics, cybercitizenship, and cybersafety, which have emerged as one of the most pressing and yet unexplored areas of education. The Department of Defense has identified challenges to cybersecurity infrastructure as a significant risk for the…
Learn about how EPA Region 9, Hawaii’s Department of Health, U.S. Navy, and Defense Logistics Agency are working tprotect human health and the environment at the Red Hill Bulk Fuel Storage Facility in Hawaii.
Defense Infrastructure: DOD Efforts Regarding Net Zero Goals
2016-01-12
and reducing, reusing, and recovering waste streams to add zero waste to landfills . House Report 114-102, accompanying a bill for the National...Testimony Order by Phone Connect with GAO To Report Fraud, Waste, and Abuse in Federal Programs Congressional Relations Public Affairs Please Print on Recycled Paper.
Towards an Enterprise Level Measure of Security
ERIC Educational Resources Information Center
Marchant, Robert L.
2013-01-01
Vulnerabilities of Information Technology (IT) Infrastructure have grown at the similar pace (at least) as the sophistication and complexity of the technology that is the cornerstone of our IT enterprises. Despite massive increased funding for research, for development, and to support deployment of Information Assurance (IA) defenses, the damages…
76 FR 29135 - National Defense Transportation Day and National Transportation Week, 2011
Federal Register 2010, 2011, 2012, 2013, 2014
2011-05-19
... movement created by America's transportation infrastructure facilitates our Nation's economic vitality. Our... also permits our military to move personnel and supplies at a moment's notice. The ability to deploy... America A Proclamation America has long depended on a robust and reliable transportation network to...
77 FR 18885 - Improving Performance of Federal Permitting and Review of Infrastructure Projects
Federal Register 2010, 2011, 2012, 2013, 2014
2012-03-28
... equivalent officer of the United States: (i) the Department of Defense; (ii) the Department of the Interior... months thereafter, report progress to the CPO on implementing its Agency Plan, as well as specific... that executive departments and agencies (agencies) take all steps within their authority, consistent...
Advanced e-Infrastructures for Civil Protection applications: the CYCLOPS Project
NASA Astrophysics Data System (ADS)
Mazzetti, P.; Nativi, S.; Verlato, M.; Ayral, P. A.; Fiorucci, P.; Pina, A.; Oliveira, J.; Sorani, R.
2009-04-01
During the full cycle of the emergency management, Civil Protection operative procedures involve many actors belonging to several institutions (civil protection agencies, public administrations, research centers, etc.) playing different roles (decision-makers, data and service providers, emergency squads, etc.). In this context the sharing of information is a vital requirement to make correct and effective decisions. Therefore a European-wide technological infrastructure providing a distributed and coordinated access to different kinds of resources (data, information, services, expertise, etc.) could enhance existing Civil Protection applications and even enable new ones. Such European Civil Protection e-Infrastructure should be designed taking into account the specific requirements of Civil Protection applications and the state-of-the-art in the scientific and technological disciplines which could make the emergency management more effective. In the recent years Grid technologies have reached a mature state providing a platform for secure and coordinated resource sharing between the participants collected in the so-called Virtual Organizations. Moreover the Earth and Space Sciences Informatics provide the conceptual tools for modeling the geospatial information shared in Civil Protection applications during its entire lifecycle. Therefore a European Civil Protection e-infrastructure might be based on a Grid platform enhanced with Earth Sciences services. In the context of the 6th Framework Programme the EU co-funded Project CYCLOPS (CYber-infrastructure for CiviL protection Operative ProcedureS), ended in December 2008, has addressed the problem of defining the requirements and identifying the research strategies and innovation guidelines towards an advanced e-Infrastructure for Civil Protection. Starting from the requirement analysis CYCLOPS has proposed an architectural framework for a European Civil Protection e-Infrastructure. This architectural framework has been evaluated through the development of prototypes of two operative applications used by the Italian Civil Protection for Wild Fires Risk Assessment (RISICO) and by the French Civil Protection for Flash Flood Risk Management (SPC-GD). The results of these studies and proof-of-concepts have been used as the basis for the definition of research and innovation strategies aiming to the detailed design and implementation of the infrastructure. In particular the main research themes and topics to be addressed have been identified and detailed. Finally the obstacles to the innovation required for the adoption of this infrastructure and possible strategies to overcome them have been discussed.
Defense.gov Special Report: Law of the Sea Treaty
treaty. It is the bedrock legal instrument underpinning public order across the maritime domain. Defense United States. The convention sets forth a comprehensive legal framework governing uses of the oceans and
An ICT Adoption Framework for Education: A Case Study in Public Secondary School of Indonesia
NASA Astrophysics Data System (ADS)
Nurjanah, S.; Santoso, H. B.; Hasibuan, Z. A.
2017-01-01
This paper presents preliminary research findings on the ICT adoption framework for education. Despite many studies have been conducted on ICT adoption framework in education at various countries, they are lack of analysis on the degree of component contribution to the success to the framework. In this paper a set of components that link to ICT adoption in education is observed based on literatures and explorative analysis. The components are Infrastructure, Application, User Skills, Utilization, Finance, and Policy. The components are used as a basis to develop a questionnaire to capture the current ICT adoption condition in schools. The data from questionnaire are processed using Structured Equation Model (SEM). The results show that each component contributes differently to the ICT adoption framework. Finance provides the strongest affect to Infrastructure readiness, whilst User Skills provides the strongest affect to Utilization. The study concludes that development of ICT adoption framework should consider components contribution weights among the components that can be used to guide the implementation of ICT adoption in education.
A Public Health Grid (PHGrid): Architecture and value proposition for 21st century public health.
Savel, T; Hall, K; Lee, B; McMullin, V; Miles, M; Stinn, J; White, P; Washington, D; Boyd, T; Lenert, L
2010-07-01
This manuscript describes the value of and proposal for a high-level architectural framework for a Public Health Grid (PHGrid), which the authors feel has the capability to afford the public health community a robust technology infrastructure for secure and timely data, information, and knowledge exchange, not only within the public health domain, but between public health and the overall health care system. The CDC facilitated multiple Proof-of-Concept (PoC) projects, leveraging an open-source-based software development methodology, to test four hypotheses with regard to this high-level framework. The outcomes of the four PoCs in combination with the use of the Federal Enterprise Architecture Framework (FEAF) and the newly emerging Federal Segment Architecture Methodology (FSAM) was used to develop and refine a high-level architectural framework for a Public Health Grid infrastructure. The authors were successful in documenting a robust high-level architectural framework for a PHGrid. The documentation generated provided a level of granularity needed to validate the proposal, and included examples of both information standards and services to be implemented. Both the results of the PoCs as well as feedback from selected public health partners were used to develop the granular documentation. A robust high-level cohesive architectural framework for a Public Health Grid (PHGrid) has been successfully articulated, with its feasibility demonstrated via multiple PoCs. In order to successfully implement this framework for a Public Health Grid, the authors recommend moving forward with a three-pronged approach focusing on interoperability and standards, streamlining the PHGrid infrastructure, and developing robust and high-impact public health services. Published by Elsevier Ireland Ltd.
Cyber Security Research Frameworks For Coevolutionary Network Defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rush, George D.; Tauritz, Daniel Remy
Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger,more » more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justify the use of a coevolutionary algorithm.« less
THE EPA MULTIMEDIA INTEGRATED MODELING SYSTEM SOFTWARE SUITE
The U.S. EPA is developing a Multimedia Integrated Modeling System (MIMS) framework that will provide a software infrastructure or environment to support constructing, composing, executing, and evaluating complex modeling studies. The framework will include (1) common software ...
A new vision for fusion energy research: Fusion rocket engines for planetary defense
Wurden, G. A.; Weber, T. E.; Turchi, P. J.; ...
2015-11-16
Here, we argue that it is essential for the fusion energy program to identify an imagination-capturing critical mission by developing a unique product which could command the marketplace. We lay out the logic that this product is a fusion rocket engine, to enable a rapid response capable of deflecting an incoming comet, to prevent its impact on the planet Earth, in defense of our population, infrastructure, and civilization. As a side benefit, deep space solar system exploration, with greater speed and orders-of-magnitude greater payload mass would also be possible.
A new vision for fusion energy research: Fusion rocket engines for planetary defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Wurden, G. A.; Weber, T. E.; Turchi, P. J.
Here, we argue that it is essential for the fusion energy program to identify an imagination-capturing critical mission by developing a unique product which could command the marketplace. We lay out the logic that this product is a fusion rocket engine, to enable a rapid response capable of deflecting an incoming comet, to prevent its impact on the planet Earth, in defense of our population, infrastructure, and civilization. As a side benefit, deep space solar system exploration, with greater speed and orders-of-magnitude greater payload mass would also be possible.
NASA Astrophysics Data System (ADS)
Alpi, Danielle Marie
The 16 sectors of critical infrastructure in the US are susceptible to cyber-attacks. Potential attacks come from internal and external threats. These attacks target the industrial control systems (ICS) of companies within critical infrastructure. Weakness in the energy sector's ICS, specifically the oil and gas industry, can result in economic and ecological disaster. The purpose of this study was to establish means for oil companies to identify and stop cyber-attacks specifically APT threats. This research reviewed current cyber vulnerabilities and ways in which a cyber-attack may be deterred. This research found that there are insecure devices within ICS that are not regularly updated. Therefore, security issues have amassed. Safety procedures and training thereof are often neglected. Jurisdiction is unclear in regard to critical infrastructure. The recommendations this research offers are further examination of information sharing methods, development of analytic platforms, and better methods for the implementation of defense-in-depth security measures.
Sun-Burned: Space Weather's Impact on United States National Security
NASA Astrophysics Data System (ADS)
Stebbins, B.
2014-12-01
The heightened media attention surrounding the 2013-14 solar maximum presented an excellent opportunity to examine the ever-increasing vulnerability of US national security and its Department of Defense to space weather. This vulnerability exists for three principal reasons: 1) a massive US space-based infrastructure; 2) an almost exclusive reliance on an aging and stressed continental US power grid; and 3) a direct dependence upon a US economy adapted to the conveniences of space and uninterrupted power. I tailored my research and work for the national security policy maker and military strategists in an endeavor to initiate and inform a substantive dialogue on America's preparation for, and response to, a major solar event that would severely degrade core national security capabilities, such as military operations. Significant risk to the Department of Defense exists from powerful events that could impact its space-based infrastructure and even the terrestrial power grid. Given this ever-present and increasing risk to the United States, my work advocates raising the issue of space weather and its impacts to the level of a national security threat. With the current solar cycle having already peaked and the next projected solar maximum just a decade away, the government has a relatively small window to make policy decisions that prepare the nation and its Defense Department to mitigate impacts from these potentially catastrophic phenomena.
Energy-Water Microgrid Opportunity Analysis at the University of Arizona's Biosphere 2 Facility
DOE Office of Scientific and Technical Information (OSTI.GOV)
Daw, Jennifer A; Kandt, Alicen J; Macknick, Jordan E
Microgrids provide reliable and cost-effective energy services in a variety of conditions and locations. There has been minimal effort invested in developing energy-water microgrids that demonstrate the feasibility and leverage synergies of operating renewable energy and water systems in a coordinated framework. Water systems can be operated in ways to provide ancillary services to the electrical grid and renewable energy can be utilized to power water-related infrastructure, but the potential for co-managed systems has not yet been quantified or fully characterized. Energy-water microgrids could be a promising solution to improve energy and water resource management for islands, rural communities, distributedmore » generation, Defense operations, and many parts of the world lacking critical infrastructure. NREL and the University of Arizona have been jointly researching energy-water microgrid opportunities at the University's Biosphere 2 (B2) research facility. B2 is an ideal case study for an energy-water microgrid test site, given its size, its unique mission and operations, the criticality of water and energy infrastructure, and its ability to operate connected to or disconnected from the local electrical grid. Moreover, the B2 is a premier facility for undertaking agricultural research, providing an excellent opportunity to evaluate connections and tradeoffs at the food-energy-water nexus. In this study, NREL used the B2 facility as a case study for an energy-water microgrid test site, with the potential to catalyze future energy-water system integration research. The study identified opportunities for energy and water efficiency and estimated the sizes of renewable energy and storage systems required to meet remaining loads in a microgrid, identified dispatchable loads in the water system, and laid the foundation for an in-depth energy-water microgrid analysis. The foundational work performed at B2 serves a model that can be built upon for identifying relevant energy-water microgrid data, analytical requirements, and operational challenges associated with development of future energy-water microgrids.« less
Integrating child welfare, juvenile justice, and other agencies in a continuum of services.
Howell, James C; Kelly, Marion R; Palmer, James; Mangum, Ronald L
2004-01-01
This article presents a comprehensive strategy framework for integrating mental health, child welfare, education, substance abuse, and juvenile justice system services. It proposes an infrastructure of information exchange, cross-agency client referrals, a networking protocol, interagency councils, and service integration models. This infrastructure facilitates integrated service delivery.
The Infrastructure of Accountability: Data Use and the Transformation of American Education
ERIC Educational Resources Information Center
Anagnostopoulos, Dorothea, Ed.; Rutledge, Stacey A., Ed.; Jacobsen, Rebecca, Ed.
2013-01-01
"The Infrastructure of Accountability" brings together leading and emerging scholars who set forth an ambitious conceptual framework for understanding the full impact of large-scale, performance-based accountability systems on education. Over the past 20 years, schools and school systems have been utterly reshaped by the demands of…
InterMine Webservices for Phytozome
DOE Office of Scientific and Technical Information (OSTI.GOV)
Carlson, Joseph; Hayes, David; Goodstein, David
2014-01-10
A data warehousing framework for biological information provides a useful infrastructure for providers and users of genomic data. For providers, the infrastructure give them a consistent mechanism for extracting raw data. While for the users, the web services supported by the software allows them to make either simple and common, or complex and unique, queries of the data
The road against fatalities: infrastructure spending vs. regulation??
Albalate, Daniel; Fernández, Laura; Yarygina, Anastasiya
2013-10-01
The road safety literature is typified by a high degree of compartmentalization between studies that focus on infrastructure and traffic conditions and those devoted to the evaluation of public policies and regulations. As a result, few studies adopt a unified empirical framework in their attempts at evaluating the road safety performance of public interventions, thus limiting our understanding of successful strategies in this regard. This paper considers both types of determinants in an analysis of a European country that has enjoyed considerable success in reducing road fatalities. After constructing a panel data set with road safety outcomes for all Spanish provinces between 1990 and 2009, we evaluate the role of the technical characteristics of infrastructure and recent infrastructure spending together with the main regulatory changes introduced. Our results show the importance of considering both types of determinants in a unified framework. Moreover, we highlight the importance of maintenance spending given its effectiveness in reducing fatalities and casualties in the current economic context of austerity that is having such a marked impact on investment efforts in Spain. Copyright © 2013 Elsevier Ltd. All rights reserved.
FOSS Tools for Research Infrastructures - A Success Story?
NASA Astrophysics Data System (ADS)
Stender, V.; Schroeder, M.; Wächter, J.
2015-12-01
Established initiatives and mandated organizations, e.g. the Initiative for Scientific Cyberinfrastructures (NSF, 2007) or the European Strategy Forum on Research Infrastructures (ESFRI, 2008), promote and foster the development of sustainable research infrastructures. The basic idea behind these infrastructures is the provision of services supporting scientists to search, visualize and access data, to collaborate and exchange information, as well as to publish data and other results. Especially the management of research data is gaining more and more importance. In geosciences these developments have to be merged with the enhanced data management approaches of Spatial Data Infrastructures (SDI). The Centre for GeoInformationTechnology (CeGIT) at the GFZ German Research Centre for Geosciences has the objective to establish concepts and standards of SDIs as an integral part of research infrastructure architectures. In different projects, solutions to manage research data for land- and water management or environmental monitoring have been developed based on a framework consisting of Free and Open Source Software (FOSS) components. The framework provides basic components supporting the import and storage of data, discovery and visualization as well as data documentation (metadata). In our contribution, we present our data management solutions developed in three projects, Central Asian Water (CAWa), Sustainable Management of River Oases (SuMaRiO) and Terrestrial Environmental Observatories (TERENO) where FOSS components build the backbone of the data management platform. The multiple use and validation of tools helped to establish a standardized architectural blueprint serving as a contribution to Research Infrastructures. We examine the question of whether FOSS tools are really a sustainable choice and whether the increased efforts of maintenance are justified. Finally it should help to answering the question if the use of FOSS for Research Infrastructures is a success story.
NASA Astrophysics Data System (ADS)
Yang, Y.; Chui, T. F. M.
2016-12-01
Green infrastructure (GI) is identified as sustainable and environmentally friendly alternatives to the conventional grey stormwater infrastructure. Commonly used GI (e.g. green roof, bioretention, porous pavement) can provide multifunctional benefits, e.g. mitigation of urban heat island effects, improvements in air quality. Therefore, to optimize the design of GI and grey drainage infrastructure, it is essential to account for their benefits together with the costs. In this study, a comprehensive simulation-optimization modelling framework that considers the economic and hydro-environmental aspects of GI and grey infrastructure for small urban catchment applications is developed. Several modelling tools (i.e., EPA SWMM model, the WERF BMP and LID Whole Life Cycle Cost Modelling Tools) and optimization solvers are coupled together to assess the life-cycle cost-effectiveness of GI and grey infrastructure, and to further develop optimal stormwater drainage solutions. A typical residential lot in New York City is examined as a case study. The life-cycle cost-effectiveness of various GI and grey infrastructure are first examined at different investment levels. The results together with the catchment parameters are then provided to the optimization solvers, to derive the optimal investment and contributing area of each type of the stormwater controls. The relationship between the investment and optimized environmental benefit is found to be nonlinear. The optimized drainage solutions demonstrate that grey infrastructure is preferred at low total investments while more GI should be adopted at high investments. The sensitivity of the optimized solutions to the prices the stormwater controls is evaluated and is found to be highly associated with their utilizations in the base optimization case. The overall simulation-optimization framework can be easily applied to other sites world-wide, and to be further developed into powerful decision support systems.
Iowa pavement asset management decision-making framework : [tech transfer summary].
DOT National Transportation Integrated Search
2015-10-01
A structured framework and tool that can reflect local requirements, : practices, and operational conditions would greatly assist local : agencies in making consistent and defensible pavement treatment : selection decisions.
Paying our way : a new framework for transportation finance, final report, February 2009.
DOT National Transportation Integrated Search
2009-02-01
We are pleased to transmit to you the final report of the National Surface Transportation : Infrastructure Financing Commission entitled Paying Our Way: A : New Framework for Transportation Finance. Over the last two years the Commission : has ...
NASA Astrophysics Data System (ADS)
Smith, R.; Kasprzyk, J. R.; Zagona, E. A.
2013-12-01
Population growth and climate change, combined with difficulties in building new infrastructure, motivate portfolio-based solutions to ensuring sufficient water supply. Powerful simulation models with graphical user interfaces (GUI) are often used to evaluate infrastructure portfolios; these GUI based models require manual modification of the system parameters, such as reservoir operation rules, water transfer schemes, or system capacities. Multiobjective evolutionary algorithm (MOEA) based optimization can be employed to balance multiple objectives and automatically suggest designs for infrastructure systems, but MOEA based decision support typically uses a fixed problem formulation (i.e., a single set of objectives, decisions, and constraints). This presentation suggests a dynamic framework for linking GUI-based infrastructure models with MOEA search. The framework begins with an initial formulation which is solved using a MOEA. Then, stakeholders can interact with candidate solutions, viewing their properties in the GUI model. This is followed by changes in the formulation which represent users' evolving understanding of exigent system properties. Our case study is built using RiverWare, an object-oriented, data-centered model that facilitates the representation of a diverse array of water resources systems. Results suggest that assumptions within the initial MOEA search are violated after investigating tradeoffs and reveal how formulations should be modified to better capture stakeholders' preferences.
Middleton, Richard S; Brandt, Adam R
2013-02-05
The Alberta oil sands are a significant source of oil production and greenhouse gas emissions, and their importance will grow as the region is poised for decades of growth. We present an integrated framework that simultaneously considers economic and engineering decisions for the capture, transport, and storage of oil sands CO(2) emissions. The model optimizes CO(2) management infrastructure at a variety of carbon prices for the oil sands industry. Our study reveals several key findings. We find that the oil sands industry lends itself well to development of CO(2) trunk lines due to geographic coincidence of sources and sinks. This reduces the relative importance of transport costs compared to nonintegrated transport systems. Also, the amount of managed oil sands CO(2) emissions, and therefore the CCS infrastructure, is very sensitive to the carbon price; significant capture and storage occurs only above 110$/tonne CO(2) in our simulations. Deployment of infrastructure is also sensitive to CO(2) capture decisions and technology, particularly the fraction of capturable CO(2) from oil sands upgrading and steam generation facilities. The framework will help stakeholders and policy makers understand how CCS infrastructure, including an extensive pipeline system, can be safely and cost-effectively deployed.
Cafe: A Generic Configurable Customizable Composite Cloud Application Framework
NASA Astrophysics Data System (ADS)
Mietzner, Ralph; Unger, Tobias; Leymann, Frank
In this paper we present Cafe (Composite Application Framework) an approach to describe configurable composite service-oriented applications and to automatically provision them across different providers. Cafe enables independent software vendors to describe their composite service-oriented applications and the components that are used to assemble them. Components can be internal to the application or external and can be deployed in any of the delivery models present in the cloud. The components are annotated with requirements for the infrastructure they later need to be run on. Providers on the other hand advertise their infrastructure services by describing them as infrastructure capabilities. The separation of software vendors and providers enables end users and providers to follow a best-of-breed strategy by combining arbitrary applications with arbitrary providers. We show how such applications can be automatically provisioned and present an architecture and a prototype that implements the concepts.
Towards a Research Agenda for Cyber Friendly Fire
DOE Office of Scientific and Technical Information (OSTI.GOV)
Greitzer, Frank L.; Clements, Samuel L.; Carroll, Thomas E.
Historical assessments of combat fratricide reveal principal contributing factors in the effects of stress, degradation of skills due to continuous operations or sleep deprivation, poor situation awareness, and lack of training and discipline in offensive/defense response selection. While these problems are typically addressed in R&D focusing on traditional ground-based combat, there is also an emerging need for improving situation awareness and decision making on defensive/offensive response options in the cyber defense arena, where a mistaken response to an actual or perceived cyber attack could lead to destruction or compromise of friendly cyber assets. The purpose of this report is tomore » examine cognitive factors that may affect cyber situation awareness and describe possible research needs to reduce the likelihood and effects of "friendly cyber fire" on cyber defenses, information infrastructures, and data. The approach is to examine concepts and methods that have been described in research applied to the more traditional problem of mitigating the occurrence of combat identification and fratricide. Application domains of interest include cyber security defense against external or internal (insider) threats.« less
2002-06-01
other issues. In addition, a DOD official stated that the services could capitalize on their historic property by marketing the property to the film ... industry , which could generate substantial revenue. The Department’s report and service officials stated that environmental indemnification (i.e., to
Federal Register 2010, 2011, 2012, 2013, 2014
2013-08-16
... DEPARTMENT OF DEFENSE Department of the Army, Corps of Engineers Notice of Availability of the Final Environmental Impact Statement for the Tarmac King Road Limestone Mine Proposed in Levy County... from limestone extraction, material stockpiling, roads, and other infrastructure over a period of...
Department of Defense Public Key Infrastructure Token Protection Profile. Version 2.0
2001-03-12
Profile Authors: Tamara Cleveland, Booz·Allen & Hamilton Inc. Michael Alexander, Booz·Allen & Hamilton Inc. Asok Ganguly, Booz·Allen & Hamilton Inc...testing, and electron beam testing. • Other attacks, such as UV or X- rays or high temperatures, could cause erasure of memory. However, erasure of selected
Paying for War: Funding U.S. Military Operations Since 2001
2011-08-01
of the RAND Corporation. CHILDREN AND FAMILIES EDUCATION AND THE ARTS ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INFRASTRUCTURE AND...Requests and Appropriations, Less Defense Health .......................................................37 3.5. Difference between Investment...chapter concludes the dissertation with some policy recommendations directed towards the executive and legislative branches designed to moderate budgetary
2016-03-01
they traverse land [e.g., runway, road, rail line, pipeline, fence, pavement , electrical distribution line] and are reported by a linear unit of...locations. Furthermore, these officials stated that the new risk- based Interagency Security Committee standards provide a more flexible risk-based
Assessing urban strategies for reducing the impacts of extreme weather on infrastructure networks.
Pregnolato, Maria; Ford, Alistair; Robson, Craig; Glenis, Vassilis; Barr, Stuart; Dawson, Richard
2016-05-01
Critical infrastructure networks, including transport, are crucial to the social and economic function of urban areas but are at increasing risk from natural hazards. Minimizing disruption to these networks should form part of a strategy to increase urban resilience. A framework for assessing the disruption from flood events to transport systems is presented that couples a high-resolution urban flood model with transport modelling and network analytics to assess the impacts of extreme rainfall events, and to quantify the resilience value of different adaptation options. A case study in Newcastle upon Tyne in the UK shows that both green roof infrastructure and traditional engineering interventions such as culverts or flood walls can reduce transport disruption from flooding. The magnitude of these benefits depends on the flood event and adaptation strategy, but for the scenarios considered here 3-22% improvements in city-wide travel times are achieved. The network metric of betweenness centrality, weighted by travel time, is shown to provide a rapid approach to identify and prioritize the most critical locations for flood risk management intervention. Protecting just the top ranked critical location from flooding provides an 11% reduction in person delays. A city-wide deployment of green roofs achieves a 26% reduction, and although key routes still flood, the benefits of this strategy are more evenly distributed across the transport network as flood depths are reduced across the model domain. Both options should form part of an urban flood risk management strategy, but this method can be used to optimize investment and target limited resources at critical locations, enabling green infrastructure strategies to be gradually implemented over the longer term to provide city-wide benefits. This framework provides a means of prioritizing limited financial resources to improve resilience. This is particularly important as flood management investments must typically exceed a far higher benefit-cost threshold than transport infrastructure investments. By capturing the value to the transport network from flood management interventions, it is possible to create new business models that provide benefits to, and enhance the resilience of, both transport and flood risk management infrastructures. Further work will develop the framework to consider other hazards and infrastructure networks.
Assessing urban strategies for reducing the impacts of extreme weather on infrastructure networks
Pregnolato, Maria; Ford, Alistair; Robson, Craig; Glenis, Vassilis; Barr, Stuart; Dawson, Richard
2016-01-01
Critical infrastructure networks, including transport, are crucial to the social and economic function of urban areas but are at increasing risk from natural hazards. Minimizing disruption to these networks should form part of a strategy to increase urban resilience. A framework for assessing the disruption from flood events to transport systems is presented that couples a high-resolution urban flood model with transport modelling and network analytics to assess the impacts of extreme rainfall events, and to quantify the resilience value of different adaptation options. A case study in Newcastle upon Tyne in the UK shows that both green roof infrastructure and traditional engineering interventions such as culverts or flood walls can reduce transport disruption from flooding. The magnitude of these benefits depends on the flood event and adaptation strategy, but for the scenarios considered here 3–22% improvements in city-wide travel times are achieved. The network metric of betweenness centrality, weighted by travel time, is shown to provide a rapid approach to identify and prioritize the most critical locations for flood risk management intervention. Protecting just the top ranked critical location from flooding provides an 11% reduction in person delays. A city-wide deployment of green roofs achieves a 26% reduction, and although key routes still flood, the benefits of this strategy are more evenly distributed across the transport network as flood depths are reduced across the model domain. Both options should form part of an urban flood risk management strategy, but this method can be used to optimize investment and target limited resources at critical locations, enabling green infrastructure strategies to be gradually implemented over the longer term to provide city-wide benefits. This framework provides a means of prioritizing limited financial resources to improve resilience. This is particularly important as flood management investments must typically exceed a far higher benefit–cost threshold than transport infrastructure investments. By capturing the value to the transport network from flood management interventions, it is possible to create new business models that provide benefits to, and enhance the resilience of, both transport and flood risk management infrastructures. Further work will develop the framework to consider other hazards and infrastructure networks. PMID:27293781
Cyberinfrastructure for the digital brain: spatial standards for integrating rodent brain atlases
Zaslavsky, Ilya; Baldock, Richard A.; Boline, Jyl
2014-01-01
Biomedical research entails capture and analysis of massive data volumes and new discoveries arise from data-integration and mining. This is only possible if data can be mapped onto a common framework such as the genome for genomic data. In neuroscience, the framework is intrinsically spatial and based on a number of paper atlases. This cannot meet today's data-intensive analysis and integration challenges. A scalable and extensible software infrastructure that is standards based but open for novel data and resources, is required for integrating information such as signal distributions, gene-expression, neuronal connectivity, electrophysiology, anatomy, and developmental processes. Therefore, the International Neuroinformatics Coordinating Facility (INCF) initiated the development of a spatial framework for neuroscience data integration with an associated Digital Atlasing Infrastructure (DAI). A prototype implementation of this infrastructure for the rodent brain is reported here. The infrastructure is based on a collection of reference spaces to which data is mapped at the required resolution, such as the Waxholm Space (WHS), a 3D reconstruction of the brain generated using high-resolution, multi-channel microMRI. The core standards of the digital atlasing service-oriented infrastructure include Waxholm Markup Language (WaxML): XML schema expressing a uniform information model for key elements such as coordinate systems, transformations, points of interest (POI)s, labels, and annotations; and Atlas Web Services: interfaces for querying and updating atlas data. The services return WaxML-encoded documents with information about capabilities, spatial reference systems (SRSs) and structures, and execute coordinate transformations and POI-based requests. Key elements of INCF-DAI cyberinfrastructure have been prototyped for both mouse and rat brain atlas sources, including the Allen Mouse Brain Atlas, UCSD Cell-Centered Database, and Edinburgh Mouse Atlas Project. PMID:25309417
Cyberinfrastructure for the digital brain: spatial standards for integrating rodent brain atlases.
Zaslavsky, Ilya; Baldock, Richard A; Boline, Jyl
2014-01-01
Biomedical research entails capture and analysis of massive data volumes and new discoveries arise from data-integration and mining. This is only possible if data can be mapped onto a common framework such as the genome for genomic data. In neuroscience, the framework is intrinsically spatial and based on a number of paper atlases. This cannot meet today's data-intensive analysis and integration challenges. A scalable and extensible software infrastructure that is standards based but open for novel data and resources, is required for integrating information such as signal distributions, gene-expression, neuronal connectivity, electrophysiology, anatomy, and developmental processes. Therefore, the International Neuroinformatics Coordinating Facility (INCF) initiated the development of a spatial framework for neuroscience data integration with an associated Digital Atlasing Infrastructure (DAI). A prototype implementation of this infrastructure for the rodent brain is reported here. The infrastructure is based on a collection of reference spaces to which data is mapped at the required resolution, such as the Waxholm Space (WHS), a 3D reconstruction of the brain generated using high-resolution, multi-channel microMRI. The core standards of the digital atlasing service-oriented infrastructure include Waxholm Markup Language (WaxML): XML schema expressing a uniform information model for key elements such as coordinate systems, transformations, points of interest (POI)s, labels, and annotations; and Atlas Web Services: interfaces for querying and updating atlas data. The services return WaxML-encoded documents with information about capabilities, spatial reference systems (SRSs) and structures, and execute coordinate transformations and POI-based requests. Key elements of INCF-DAI cyberinfrastructure have been prototyped for both mouse and rat brain atlas sources, including the Allen Mouse Brain Atlas, UCSD Cell-Centered Database, and Edinburgh Mouse Atlas Project.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bri Rolston
2005-06-01
Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills,more » and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.« less
Complex Networks and Critical Infrastructures
NASA Astrophysics Data System (ADS)
Setola, Roberto; de Porcellinis, Stefano
The term “Critical Infrastructures” indicates all those technological infrastructures such as: electric grids, telecommunication networks, railways, healthcare systems, financial circuits, etc. that are more and more relevant for the welfare of our countries. Each one of these infrastructures is a complex, highly non-linear, geographically dispersed cluster of systems, that interact with their human owners, operators, users and with the other infrastructures. Their augmented relevance and the actual political and technological scenarios, which have increased their exposition to accidental failure and deliberate attacks, demand for different and innovative protection strategies (generally indicate as CIP - Critical Infrastructure Protection). To this end it is mandatory to understand the mechanisms that regulate the dynamic of these infrastructures. In this framework, an interesting approach is those provided by the complex networks. In this paper we illustrate some results achieved considering structural and functional properties of the corresponding topological networks both when each infrastructure is assumed as an autonomous system and when we take into account also the dependencies existing among the different infrastructures.
76 FR 58730 - Version 4 Critical Infrastructure Protection Reliability Standards
Federal Register 2010, 2011, 2012, 2013, 2014
2011-09-22
... provide a cybersecurity framework for the identification and protection of ``Critical Cyber Assets'' to... the identification and documentation of Critical Cyber Assets associated with Critical Assets that... Standards provide a cybersecurity framework for the identification and protection of ``Critical Cyber Assets...
NASA Astrophysics Data System (ADS)
Angius, S.; Bisegni, C.; Ciuffetti, P.; Di Pirro, G.; Foggetta, L. G.; Galletti, F.; Gargana, R.; Gioscio, E.; Maselli, D.; Mazzitelli, G.; Michelotti, A.; Orrù, R.; Pistoni, M.; Spagnoli, F.; Spigone, D.; Stecchi, A.; Tonto, T.; Tota, M. A.; Catani, L.; Di Giulio, C.; Salina, G.; Buzzi, P.; Checcucci, B.; Lubrano, P.; Piccini, M.; Fattibene, E.; Michelotto, M.; Cavallaro, S. R.; Diana, B. F.; Enrico, F.; Pulvirenti, S.
2016-01-01
The paper is aimed to present the !CHAOS open source project aimed to develop a prototype of a national private Cloud Computing infrastructure, devoted to accelerator control systems and large experiments of High Energy Physics (HEP). The !CHAOS project has been financed by MIUR (Italian Ministry of Research and Education) and aims to develop a new concept of control system and data acquisition framework by providing, with a high level of aaabstraction, all the services needed for controlling and managing a large scientific, or non-scientific, infrastructure. A beta version of the !CHAOS infrastructure will be released at the end of December 2015 and will run on private Cloud infrastructures based on OpenStack.
National Response Framework: Annexes
2008-01-01
to protect transportation infrastructure from the effects of acts of terrorism , and supports efforts to protect transportation infrastructure from...housing counseling services. Provides enforcement of the Fair Housing Act and compliance with other civil rights statutes. USDA – Rural Development...Provides enforcement of the Fair Housing Act and compliance with other civil rights statutes. Provides Community Development Block Grants to support
NASA Technical Reports Server (NTRS)
Turner, Robert T.; Parodi, Andrea V.
2011-01-01
The Team Resource Center (TRC) at Naval Medical Center Portsmouth (NMCP) currently hosts a tri-service healthcare teams training course three times annually . The course consists of didactic learning coupled with simulation exercises to provide an interactive educational experience for healthcare professionals. The course is also the foundation of a research program designed to explore the use of simulation technologies for enhancing team training and evaluation. The TRC has adopted theoretical frameworks for evaluating training readiness and efficacy, and is using these frameworks to guide a systematic reconfiguration of the infrastructure supporting healthcare teams training and research initiatives at NMCP.
The CARMEN software as a service infrastructure.
Weeks, Michael; Jessop, Mark; Fletcher, Martyn; Hodge, Victoria; Jackson, Tom; Austin, Jim
2013-01-28
The CARMEN platform allows neuroscientists to share data, metadata, services and workflows, and to execute these services and workflows remotely via a Web portal. This paper describes how we implemented a service-based infrastructure into the CARMEN Virtual Laboratory. A Software as a Service framework was developed to allow generic new and legacy code to be deployed as services on a heterogeneous execution framework. Users can submit analysis code typically written in Matlab, Python, C/C++ and R as non-interactive standalone command-line applications and wrap them as services in a form suitable for deployment on the platform. The CARMEN Service Builder tool enables neuroscientists to quickly wrap their analysis software for deployment to the CARMEN platform, as a service without knowledge of the service framework or the CARMEN system. A metadata schema describes each service in terms of both system and user requirements. The search functionality allows services to be quickly discovered from the many services available. Within the platform, services may be combined into more complicated analyses using the workflow tool. CARMEN and the service infrastructure are targeted towards the neuroscience community; however, it is a generic platform, and can be targeted towards any discipline.
A Governance Roadmap and Framework for EarthCube
NASA Astrophysics Data System (ADS)
Allison, M. L.
2012-12-01
EarthCube is a process and an outcome, established to transform the conduct of research through the development of community-guided cyberinfrastructure for the Geosciences as the prototype for potential deployment across all domain sciences. EarthCube aims to create a knowledge management system and infrastructure that integrates all Earth system and human dimensions data in an open transparent, and inclusive manner. EarthCube requires broad community participation in concept, framework, and implementation and must not be hindered by rigid preconceptions. We discovered widely varying interpretations, expectations, and assumptions about governance among EarthCube participants. Our definition of governance refers to the processes, structure and organizational elements that determine, within an organization or system of organizations, how power is exercised, how stakeholders have their say, how decisions are made, and how decision makers are held accountable. We have learned, from historic infrastructure case studies, background research on governance and from community feedback during this roadmap process, that other types of large-scale, complex infrastructures, including the Internet, have no central control, administration, or management. No national infrastructure that we examined is governed by a single entity, let alone a single governance archetype. Thus we feel the roadmap process must accommodate a governance system or system of systems that may have a single governing entity, particularly at the start, but can evolve into a collective of governing bodies as warranted, in order to be successful. A fast-track process during Spring, 2012 culminated in a Governance Roadmap delivered to an NSF-sponsored charrette in June with an aggressive timetable to define and implement a governance structure to enable the elements of EarthCube to become operational expeditiously. Our goal is to help ensure the realization of this infrastructure sooner, more efficiently, and more effectively, by providing a community endorsed Governance Framework. The Framework, and corresponding community outreach, will maximize engagement of the broader EarthCube community, which in turn will minimize the risks that the community will not adopt EarthCube in its development and final states. The target community includes academia, government, and the private-sector, both nationally and internationally. Based on community feedback to-date, we compiled and synthesized system-wide governance requirements to draft an initial set of EarthCube Governance functions. These functions will permit us to produce a Governance Framework based on an aggressive community outreach and engagement plan.
Optimal Resource Allocation in Electrical Network Defense
DOE Office of Scientific and Technical Information (OSTI.GOV)
Yao, Y; Edmunds, T; Papageorgiou, D
2004-01-15
Infrastructure networks supplying electricity, natural gas, water, and other commodities are at risk of disruption due to well-engineered and coordinated terrorist attacks. Countermeasures such as hardening targets, acquisition of spare critical components, and surveillance can be undertaken to detect and deter these attacks. Allocation of available countermeasures resources to sites or activities in a manner that maximizes their effectiveness is a challenging problem. This allocation must take into account the adversary's response after the countermeasure assets are in place and consequence mitigation measures the infrastructure operation can undertake after the attack. The adversary may simply switch strategies to avoid countermeasuresmore » when executing the attack. Stockpiling spares of critical energy infrastructure components has been identified as a key element of a grid infrastructure defense strategy in a recent National Academy of Sciences report [1]. Consider a scenario where an attacker attempts to interrupt the service of an electrical network by disabling some of its facilities while a defender wants to prevent or minimize the effectiveness of any attack. The interaction between the attacker and the defender can be described in three stages: (1) The defender deploys countermeasures, (2) The attacker disrupts the network, and (3) The defender responds to the attack by rerouting power to maintain service while trying to repair damage. In the first stage, the defender considers all possible attack scenarios and deploys countermeasures to defend against the worst scenarios. Countermeasures can include hardening targets, acquiring spare critical components, and installing surveillance devices. In the second stage, the attacker, with full knowledge of the deployed countermeasures, attempts to disable some nodes or links in the network to inflict the greatest loss on the defender. In the third stage, the defender re-dispatches power and restores disabled nodes or links to minimize the loss. The loss can be measured in costs, including the costs of using more expensive generators and the economic losses that can be attributed to loss of load. The defender's goal is to minimize the loss while the attacker wants to maximize it. Assuming some level of budget constraint, each side can only defend or attack a limited number of network elements. When an element is attacked, it is assumed that it will be totally disabled. It is assumed that when an element is defended it cannot be disabled, which may mean that it will be restored in a very short time after being attacked. The rest of the paper is organized as follows. Section 2 will briefly review literature related to multilevel programming and network defense. Section 3 presents a mathematical formulation of the electrical network defense problem. Section 4 describes the solution algorithms. Section 5 discusses computational results. Finally, Sec. 6 explores future research directions.« less
Governance - Alignment and Configuration of Business Activities Task Group Report
2006-05-01
governance level and the Enterprise Model as a way of ensuring integration at the management and work/execution levels 3. Ensure shared services (i.e...Management Framework o QDR Organizational Model o Secretary of Defense 2006-2008 Priorities o Shared Services Defense Business Board...support for horizontal and vertical organizations • Move “supporting” organizations to shared services model May 2006 "Team Defense" 18 Task Group
Using an Integrated, Multi-disciplinary Framework to Support Quantitative Microbial Risk Assessments
The Framework for Risk Analysis in Multimedia Environmental Systems (FRAMES) provides the infrastructure to link disparate models and databases seamlessly, giving an assessor the ability to construct an appropriate conceptual site model from a host of modeling choices, so a numbe...
Geels, Mark J; Thøgersen, Regitze L; Guzman, Carlos A; Ho, Mei Mei; Verreck, Frank; Collin, Nicolas; Robertson, James S; McConkey, Samuel J; Kaufmann, Stefan H E; Leroy, Odile
2015-10-05
TRANSVAC was a collaborative infrastructure project aimed at enhancing European translational vaccine research and training. The objective of this four year project (2009-2013), funded under the European Commission's (EC) seventh framework programme (FP7), was to support European collaboration in the vaccine field, principally through the provision of transnational access (TNA) to critical vaccine research and development (R&D) infrastructures, as well as by improving and harmonising the services provided by these infrastructures through joint research activities (JRA). The project successfully provided all available services to advance 29 projects and, through engaging all vaccine stakeholders, successfully laid down the blueprint for the implementation of a permanent research infrastructure for early vaccine R&D in Europe. Copyright © 2015. Published by Elsevier Ltd.
Soares, Sérgio R A; Bernardes, Ricardo S; Netto, Oscar de M Cordeiro
2002-01-01
The understanding of sanitation infrastructure, public health, and environmental relations is a fundamental assumption for planning sanitation infrastructure in urban areas. This article thus suggests elements for developing a planning model for sanitation infrastructure. The authors performed a historical survey of environmental and public health issues related to the sector, an analysis of the conceptual frameworks involving public health and sanitation systems, and a systematization of the various effects that water supply and sanitation have on public health and the environment. Evaluation of these effects should guarantee the correct analysis of possible alternatives, deal with environmental and public health objectives (the main purpose of sanitation infrastructure), and provide the most reasonable indication of actions. The suggested systematization of the sanitation systems effects in each step of their implementation is an advance considering the association between the fundamental elements for formulating a planning model for sanitation infrastructure.
A Governance Roadmap and Framework for EarthCube
NASA Astrophysics Data System (ADS)
Governance Steering Committee, EarthCube
2013-04-01
EarthCube is a process and an outcome, established to transform the conduct of research through the development of community-guided cyberinfrastructure for the Geosciences as the prototype for potential deployment across all domain sciences. EarthCube aims to create a knowledge management system and infrastructure that integrates all Earth system and human dimensions data in an open transparent, and inclusive manner. EarthCube requires broad community participation in concept, framework, and implementation and must not be hindered by rigid preconceptions. We discovered widely varying interpretations, expectations, and assumptions about governance among EarthCube participants. Our definition of governance refers to the processes, structure and organizational elements that determine, within an organization or system of organizations, how power is exercised, how stakeholders have their say, how decisions are made, and how decision makers are held accountable. We have learned, from historic infrastructure case studies, background research on governance and from community feedback during this roadmap process, that other types of large-scale, complex infrastructures, including the Internet, have no central control, administration, or management. No national infrastructure that we examined is governed by a single entity, let alone a single governance archetype. Thus we feel the roadmap process must accommodate a governance system or system of systems that may have a single governing entity, particularly at the start, but can evolve into a collective of governing bodies as warranted, in order to be successful. A fast-track process during Spring, 2012 culminated in a Governance Roadmap delivered to an NSF-sponsored charrette in June with an aggressive timetable to define and implement a governance structure to enable the elements of EarthCube to become operational expeditiously. Our goal is to help ensure the realization of this infrastructure sooner, more efficiently, and more effectively, by providing a community endorsed Governance Framework, released in September of 2012. The Framework, and corresponding community outreach, maximizes engagement of the broader EarthCube community, which in turn minimizes the risks that the community will not adopt EarthCube in its development and final states. The target stakeholder community includes academia, government, and the private-sector, both nationally and internationally. http://earthcube.ning.com/group/governance
Federal Register 2010, 2011, 2012, 2013, 2014
2012-10-11
... Aircraft Carrier Berthing, and Army Air and Missile Defense Task Force'' dated July 2010. Pursuant to 40... day care), some site-specific training, and open space (e.g., parade grounds, open training areas, and open green space in communities). The proposed action also includes the utilities and infrastructure...
ERIC Educational Resources Information Center
Munn, Jamie E.
2017-01-01
Military leaders, both active duty and General Schedule (GS), must understand cyber warfare with its environmental connections and rapid evolution while finding ways to develop strategies that may lessen threats and attacks to government infrastructure. The Department of Defense (DoD) sought training and certification programs from the civilian…
Seven Defense Priorities for the New Administration
2016-12-01
building consume human and financial military resources for decades. New weapons like cyber and autonomous systems are aimed at the heart of the U.S...information infrastructure enables for adversaries and for the U.S.; 5. Anticipating intelligent systems and autonomy including numbers and...challenging in a complex electromagnetic environment ...............................................37 Space and the global positioning system play a
ERIC Educational Resources Information Center
Caudle, Daryl L.
2010-01-01
The nation's critical infrastructure, information systems, and telecommunication networks are vulnerable and threatened by an ever-growing number of attacks in cyberspace. An essential element of the nation's comprehensive approach to cybersecurity is the ability for the Department of Defense to protect and defend its information enterprise.…
Providing the Tools for Information Sharing: Net-Centric Enterprise Services
2007-07-01
The Department of Defense (DoD) is establishing a net-centric environment that increasingly leverages shared services and Service-Oriented...transformational program that delivers a set of shared services as part of the DoD’s common infrastructure to enable networked joint force capabilities, improved interoperability, and increased information sharing across mission area services.
Department of Defense Plan to Establish Public Access to the Results of Federally Funded Research
2015-02-01
journal articles , data management plans, and will track metrics on compliance and public usage. The current DTIC infrastructure will be modified to...tokens to authors who submit digitally formatted scientific data and articles . DTIC will establish compliance metrics in FY15. DoD will explore...15 10. METRICS , COMPLIANCE and EVALUATION
Federal Register 2010, 2011, 2012, 2013, 2014
2011-12-28
...'' (``Menlo Report'') for the Department of Homeland Security (DHS), Science and Technology, Cyber Security Division (CSD), Protected Repository for the Defense of Infrastructure Against Cyber Threats (PREDICT... be found at: http://www.cyber.st.dhs.gov/wp-content/uploads/2011/12/MenloPrinciplesCORE-20110915-r560...
The EDCA Finally Passed. Great! But What Does That Mean? | DoDLive
-made or natural disaster. Last month, the State and Defense Departments announced the slate of five the existing military infrastructure, such as runways, at these five agreed locations. During his trip , Secretary Carter toured one of the five EDCA agreed locations - Antonio Bautista Air Base - and announced
Blueprint for Bologna: University of Prishtina and the European Union
ERIC Educational Resources Information Center
Epp, Juanita Ross; Epp, Walter
2010-01-01
Countries hoping to demonstrate an adequate educational infrastructure need a national framework that meets Bologna requirements, a national accreditation agency which sets out the approved framework, and national accreditation processes by which individual institutions can be measured against the standards set by the national accreditation…
Soak Up the Rain New England Webinar Series: National ...
Presenters will provide an introduction to the most recent EPA green infrastructure tools to R1 stakeholders; and their use in making decisions about implementing green infrastructure. We will discuss structuring your green infrastructure decision, finding appropriate information and tools, evaluating options and selecting the right Best Management Practices mix for your needs.WMOST (Watershed Management Optimization Support Tool)- for screening a wide range of practices for cost-effectiveness in achieving watershed or water utilities management goals.GIWiz (Green Infrastructure Wizard)- a web application connecting communities to EPA Green Infrastructure tools and resources.Opti-Tool-designed to assist in developing technically sound and optimized cost-effective Stormwater management plans. National Stormwater Calculator- a desktop application for estimating the impact of land cover change and green infrastructure controls on stormwater runoff. DASEES-GI (Decision Analysis for a Sustainable Environment, Economy, and Society) – a framework for linking objectives and measures with green infrastructure methods. Presenters will provide an introduction to the most recent EPA green infrastructure tools to R1 stakeholders; and their use in making decisions about implementing green infrastructure. We will discuss structuring your green infrastructure decision, finding appropriate information and tools, evaluating options and selecting the right Best Management Pr
NIST activities in support of space-based radiometric remote sensing
NASA Astrophysics Data System (ADS)
Rice, Joseph P.; Johnson, B. Carol
2001-06-01
We provide an historical overview of NIST research and development in radiometry for space-based remote sensing. The applications in this field can be generally divided into two areas: environmental and defense. In the environmental remote sensing area, NIST has had programs with agencies such as the National Aeronautical and Space Administration (NASA) and the National Oceanic and Atmospheric Administration (NOAA) to verify and improve traceability of the radiometric calibration of sensors that fly on board Earth-observing satellites. These produce data used in climate models and weather prediction. Over the years, the scope of activities has expanded from existing routine calibration services for artifacts such as lamps, diffusers, and filters, to development and off-site deployment of portable radiometers for radiance- and irradiance-scale intercomparisons. In the defense remote sensing area, NIST has had programs with agencies such as the Department of Defense (DOD) for support of calibration of small, low-level infrared sources in a low infrared background. These are used by the aerospace industry to simulate ballistic missiles in a cold space background. Activities have evolved from calibration of point-source cryogenic blackbodies at NIST to measurement of irradiance in off-site calibration chambers by a portable vacuum/cryogenic radiometer. Both areas of application required measurements on the cutting edge of what was technically feasible, thus compelling NIST to develop a state-of-the-art radiometric measurement infrastructure to meet the needs. This infrastructure has led to improved dissemination of the NIST spectroradiometric quantities.
NASA Astrophysics Data System (ADS)
Ragno, Elisa; AghaKouchak, Amir; Love, Charlotte A.; Cheng, Linyin; Vahedifard, Farshid; Lima, Carlos H. R.
2018-03-01
During the last century, we have observed a warming climate with more intense precipitation extremes in some regions, likely due to increases in the atmosphere's water holding capacity. Traditionally, infrastructure design and rainfall-triggered landslide models rely on the notion of stationarity, which assumes that the statistics of extremes do not change significantly over time. However, in a warming climate, infrastructures and natural slopes will likely face more severe climatic conditions, with potential human and socioeconomical consequences. Here we outline a framework for quantifying climate change impacts based on the magnitude and frequency of extreme rainfall events using bias corrected historical and multimodel projected precipitation extremes. The approach evaluates changes in rainfall Intensity-Duration-Frequency (IDF) curves and their uncertainty bounds using a nonstationary model based on Bayesian inference. We show that highly populated areas across the United States may experience extreme precipitation events up to 20% more intense and twice as frequent, relative to historical records, despite the expectation of unchanged annual mean precipitation. Since IDF curves are widely used for infrastructure design and risk assessment, the proposed framework offers an avenue for assessing resilience of infrastructure and landslide hazard in a warming climate.
NASA Technical Reports Server (NTRS)
Zuniga, Allison; Turner, Mark; Rasky, Dan
2017-01-01
A new concept study was initiated to examine the framework needed to gradually develop an economical and sustainable lunar infrastructure using a public private partnerships approach. This approach would establish partnership agreements between NASA and industry teams to develop cis-lunar and surface capabilities for mutual benefit while sharing cost and risk in the development phase and then allowing for transfer of operation of these infrastructure services back to its industry owners in the execution phase. These infrastructure services may include but are not limited to the following: lunar cargo transportation, power stations, energy storage devices, communication relay satellites, local communication towers, and surface mobility operations.
Integrated Strategic Planning and Analysis Network Increment 4 (ISPAN Inc 4)
2016-03-01
Defense Acquisition Executive DoD - Department of Defense DoDAF - DoD Architecture Framework FD - Full Deployment FDD - Full Deployment Decision FY...Inc 4 will achieve FDD completion criteria when: 1) the system meets all the KPP thresholds as verified through an Initial Operational Test and
Integrated Strategic Planning and Analysis Network Increment 5 (ISPAN Inc 5)
2016-03-01
Defense Acquisition Executive DoD - Department of Defense DoDAF - DoD Architecture Framework FD - Full Deployment FDD - Full Deployment Decision...achieve FDD in August 2018. ISPAN Inc 5 is envisioned as a follow-on to ISPAN Inc 4 in order to respond to USSTRATCOM requirements for improved
An Introduction to the Resource Description Framework.
ERIC Educational Resources Information Center
Miller, Eric
1998-01-01
Explains the Resource Description Framework (RDF), an infrastructure developed under the World Wide Web Consortium that enables the encoding, exchange, and reuse of structured metadata. It is an application of Extended Markup Language (XML), which is a subset of Standard Generalized Markup Language (SGML), and helps with expressing semantics.…
Deceived, Disgusted, and Defensive: Motivated Processing of Anti-Tobacco Advertisements.
Leshner, Glenn; Clayton, Russell B; Bolls, Paul D; Bhandari, Manu
2017-08-29
A 2 × 2 experiment was conducted, where participants watched anti-tobacco messages that varied in deception (content portraying tobacco companies as dishonest) and disgust (negative graphic images) content. Psychophysiological measures, self-report, and a recognition test were used to test hypotheses generated from the motivated cognition framework. The results of this study indicate that messages containing both deception and disgust push viewers into a cascade of defensive responses reflected by increased self-reported unpleasantness, reduced resources allocated to encoding, worsened recognition memory, and dampened emotional responses compared to messages depicting one attribute or neither. Findings from this study demonstrate the value of applying a motivated cognition theoretical framework in research on responses to emotional content in health messages and support previous research on defensive processing and message design of anti-tobacco messages.
Hansen, Rieke; Pauleit, Stephan
2014-05-01
Green infrastructure (GI) and ecosystem services (ES) are promoted as concepts that have potential to improve environmental planning in urban areas based on a more holistic understanding of the complex interrelations and dynamics of social-ecological systems. However, the scientific discourses around both concepts still lack application-oriented frameworks that consider such a holistic perspective and are suitable to mainstream GI and ES in planning practice. This literature review explores how multifunctionality as one important principle of GI planning can be operationalized by approaches developed and tested in ES research. Specifically, approaches developed in ES research can help to assess the integrity of GI networks, balance ES supply and demand, and consider trade-offs. A conceptual framework for the assessment of multifunctionality from a social-ecological perspective is proposed that can inform the design of planning processes and support stronger exchange between GI and ES research.
Edwards, Jessica M; Stein-Seroussi, Al; Flewelling, Robert L; Orwin, Robert G; Zhang, Lei
2015-06-01
Recent national substance abuse prevention efforts that have been disseminated at the state level have provided fertile ground for addressing the dearth of systematic research on state-level substance abuse prevention infrastructure. The Strategic Prevention Framework State Incentive Grant Program (SPF SIG), a national public health initiative sponsored by the US Substance Abuse and Mental Health Services Administration and its Center for Substance Abuse Prevention, is one such effort, providing an opportunity to examine state-level substance abuse prevention infrastructure across the country. The aims of the SPF SIG initiative include reducing substance abuse and its related problems, as well as enhancing state and local prevention infrastructure and capacity. In this article, we describe the status of state-level substance abuse prevention infrastructure and capacity 1 year after the first 26 funded states ended their projects, based on follow-up interviews with state prevention decision-makers. We found that, in five of the six prevention domains we measured, prevention infrastructure capacity increased during the 12-month period after the grants ended. The evidence for further SPF capacity development even after the conclusion of the grants suggests that states recognized the benefits of using the SPF and took deliberate steps to sustain and enhance the integration of this framework into their state prevention systems. In addition, the findings suggest that state agencies and organizations can benefit from time-limited resources aimed at increasing their capacity and that such efforts can have a lasting impact on measures of state prevention system capacity.
GEMSS: grid-infrastructure for medical service provision.
Benkner, S; Berti, G; Engelbrecht, G; Fingberg, J; Kohring, G; Middleton, S E; Schmidt, R
2005-01-01
The European GEMSS Project is concerned with the creation of medical Grid service prototypes and their evaluation in a secure service-oriented infrastructure for distributed on demand/supercomputing. Key aspects of the GEMSS Grid middleware include negotiable QoS support for time-critical service provision, flexible support for business models, and security at all levels in order to ensure privacy of patient data as well as compliance to EU law. The GEMSS Grid infrastructure is based on a service-oriented architecture and is being built on top of existing standard Grid and Web technologies. The GEMSS infrastructure offers a generic Grid service provision framework that hides the complexity of transforming existing applications into Grid services. For the development of client-side applications or portals, a pluggable component framework has been developed, providing developers with full control over business processes, service discovery, QoS negotiation, and workflow, while keeping their underlying implementation hidden from view. A first version of the GEMSS Grid infrastructure is operational and has been used for the set-up of a Grid test-bed deploying six medical Grid service prototypes including maxillo-facial surgery simulation, neuro-surgery support, radio-surgery planning, inhaled drug-delivery simulation, cardiovascular simulation and advanced image reconstruction. The GEMSS Grid infrastructure is based on standard Web Services technology with an anticipated future transition path towards the OGSA standard proposed by the Global Grid Forum. GEMSS demonstrates that the Grid can be used to provide medical practitioners and researchers with access to advanced simulation and image processing services for improved preoperative planning and near real-time surgical support.
Assessing Terrorist Motivations for Attacking Critical Infrastructure
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ackerman, G; Abhayaratne, P; Bale, J
Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CImore » facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist organization will attack critical infrastructure. In other words, this research investigates: (1) why terrorists choose to attack critical infrastructure rather than other targets; (2) how groups make such decisions; (3) what, if any, types of groups are most inclined to attack critical infrastructure targets; and (4) which types of critical infrastructure terrorists prefer to attack and why. In an effort to address the above questions as comprehensively as possible, the project team employed four discrete investigative approaches in its research design. These include: (1) a review of existing terrorism and threat assessment literature to glean expert consensus regarding terrorist target selection, as well as to identify theoretical approaches that might be valuable to analysts and decision-makers who are seeking to understand such terrorist group decision-making processes; (2) the preparation of several concise case studies to help identify internal group factors and contextual influences that have played significant roles in leading some terrorist groups to attack critical infrastructure; (3) the creation of a new database--the Critical Infrastructure Terrorist Incident Catalog (CrITC)--to capture a large sample of empirical CI attack data that might be used to illuminate the nature of such attacks to date; and (4) the development of a new analytical framework--the Determinants Effecting Critical Infrastructure Decisions (DECIDe) Framework--designed to make the factors and dynamics identified by the study more ''usable'' in any future efforts to assess terrorist intentions to target critical infrastructure. Although each is addressed separately in the following chapters, none of the four aspects of this study were developed in isolation. Rather, all the constituent elements of the project informed--and were informed by--the others. For example, the review of the available literature on terrorist target selection made possible the identification of several target selection factors that were both important in the development of the analytical framework and subsequently validated by the case studies. Similarly, statistical analysis of the CrITIC data yielded measurable evidence that supported hypotheses derived from the framework, the case studies, and the writings of various experts. Besides providing an important mechanism of self-reinforcement and validation, the project's multifaceted nature made it possible to discern aspects of CI attack motivations that would likely have been missed if any single approach had been adopted.« less
IT Requirements Integration in High-Rise Construction Design Projects
NASA Astrophysics Data System (ADS)
Levina, Anastasia; Ilin, Igor; Esedulaev, Rustam
2018-03-01
The paper discusses the growing role of IT support for the operation of modern high-rise buildings, due to the complexity of managing engineering systems of buildings and the requirements of consumers for the IT infrastructure. The existing regulatory framework for the development of design documentation for construction, including high-rise buildings, is analyzed, and the lack of coherence in the development of this documentation with the requirements for the creation of an automated management system and the corresponding IT infrastructure is stated. The lack of integration between these areas is the cause of delays and inefficiencies both at the design stage and at the stage of putting the building into operation. The paper proposes an approach to coordinate the requirements of the IT infrastructure of high-rise buildings and design documentation for construction. The solution to this problem is possible within the framework of the enterprise architecture concept by coordinating the requirements of the IT and technological layers at the design stage of the construction.
Jali - Unstructured Mesh Infrastructure for Multi-Physics Applications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Garimella, Rao V; Berndt, Markus; Coon, Ethan
2017-04-13
Jali is a parallel unstructured mesh infrastructure library designed for use by multi-physics simulations. It supports 2D and 3D arbitrary polyhedral meshes distributed over hundreds to thousands of nodes. Jali can read write Exodus II meshes along with fields and sets on the mesh and support for other formats is partially implemented or is (https://github.com/MeshToolkit/MSTK), an open source general purpose unstructured mesh infrastructure library from Los Alamos National Laboratory. While it has been made to work with other mesh frameworks such as MOAB and STKmesh in the past, support for maintaining the interface to these frameworks has been suspended formore » now. Jali supports distributed as well as on-node parallelism. Support of on-node parallelism is through direct use of the the mesh in multi-threaded constructs or through the use of "tiles" which are submeshes or sub-partitions of a partition destined for a compute node.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sheppard, Colin; Waraich, Rashid; Campbell, Andrew
This report summarizes the BEAM modeling framework (Behavior, Energy, Mobility, and Autonomy) and its application to simulating plug-in electric vehicle (PEV) mobility, energy consumption, and spatiotemporal charging demand. BEAM is an agent-based model of PEV mobility and charging behavior designed as an extension to MATSim (the Multi-Agent Transportation Simulation model). We apply BEAM to the San Francisco Bay Area and conduct a preliminary calibration and validation of its prediction of charging load based on observed charging infrastructure utilization for the region in 2016. We then explore the impact of a variety of common modeling assumptions in the literature regarding chargingmore » infrastructure availability and driver behavior. We find that accurately reproducing observed charging patterns requires an explicit representation of spatially disaggregated charging infrastructure as well as a more nuanced model of the decision to charge that balances tradeoffs people make with regards to time, cost, convenience, and range anxiety.« less
Enhancing infrastructure resilience through business continuity planning.
Fisher, Ronald; Norman, Michael; Klett, Mary
2017-01-01
Critical infrastructure is crucial to the functionality and wellbeing of the world around us. It is a complex network that works together to create an efficient society. The core components of critical infrastructure are dependent on one another to function at their full potential. Organisations face unprecedented environmental risks such as increased reliance on information technology and telecommunications, increased infrastructure interdependencies and globalisation. Successful organisations should integrate the components of cyber-physical and infrastructure interdependencies into a holistic risk framework. Physical security plans, cyber security plans and business continuity plans can help mitigate environmental risks. Cyber security plans are becoming the most crucial to have, yet are the least commonly found in organisations. As the reliance on cyber continues to grow, it is imperative that organisations update their business continuity and emergency preparedness activities to include this.
Defense Acquisition Transformation Report to Congress
2007-02-01
current initiatives and for the purposes of this report are put into a framework of workforce, acquisition, requirements, budget, industry and organization...requirements. The Capability Portfolio Management Initiative provides a common framework to recognize federated ownership and senior-level teams have been...Performance Trade Off Constraints Risk Based Source Selection techniques are also being piloted to provide an improved framework for
The Civil-Military Gap in the United States. Does It Exist, Why, and Does It Matter?
2007-01-01
and/or the general public. Based on this framework, our analysis then compares the char- acteristics of military and civilian respondents using a...armed forces, three major force structure reviews (1990 Base Force, 1993 Bottom-Up Review, 1997 Quadrennial Defense Review) took place in the space...Defense Planning in a Decade of Change: Lessons from the Base Force, Bottom-Up Review, and Quadrennial Defense Review, Santa Monica, CA: RAND
2015-08-01
Congress concerning requirements for the National Defense Stockpile (NDS) of strategic and critical non- fuel materials. 1 RAMF-SM, which was...critical non- fuel materials. The NDS was established in the World War II era and has been managed by the Department of Defense (DOD) since 1988. By...Department of the Interior. An alternative algorithm is used for materials with intensive defense demands. v Contents 1 . Introduction
The Experiment Factory: Standardizing Behavioral Experiments.
Sochat, Vanessa V; Eisenberg, Ian W; Enkavi, A Zeynep; Li, Jamie; Bissett, Patrick G; Poldrack, Russell A
2016-01-01
The administration of behavioral and experimental paradigms for psychology research is hindered by lack of a coordinated effort to develop and deploy standardized paradigms. While several frameworks (Mason and Suri, 2011; McDonnell et al., 2012; de Leeuw, 2015; Lange et al., 2015) have provided infrastructure and methods for individual research groups to develop paradigms, missing is a coordinated effort to develop paradigms linked with a system to easily deploy them. This disorganization leads to redundancy in development, divergent implementations of conceptually identical tasks, disorganized and error-prone code lacking documentation, and difficulty in replication. The ongoing reproducibility crisis in psychology and neuroscience research (Baker, 2015; Open Science Collaboration, 2015) highlights the urgency of this challenge: reproducible research in behavioral psychology is conditional on deployment of equivalent experiments. A large, accessible repository of experiments for researchers to develop collaboratively is most efficiently accomplished through an open source framework. Here we present the Experiment Factory, an open source framework for the development and deployment of web-based experiments. The modular infrastructure includes experiments, virtual machines for local or cloud deployment, and an application to drive these components and provide developers with functions and tools for further extension. We release this infrastructure with a deployment (http://www.expfactory.org) that researchers are currently using to run a set of over 80 standardized web-based experiments on Amazon Mechanical Turk. By providing open source tools for both deployment and development, this novel infrastructure holds promise to bring reproducibility to the administration of experiments, and accelerate scientific progress by providing a shared community resource of psychological paradigms.
The Experiment Factory: Standardizing Behavioral Experiments
Sochat, Vanessa V.; Eisenberg, Ian W.; Enkavi, A. Zeynep; Li, Jamie; Bissett, Patrick G.; Poldrack, Russell A.
2016-01-01
The administration of behavioral and experimental paradigms for psychology research is hindered by lack of a coordinated effort to develop and deploy standardized paradigms. While several frameworks (Mason and Suri, 2011; McDonnell et al., 2012; de Leeuw, 2015; Lange et al., 2015) have provided infrastructure and methods for individual research groups to develop paradigms, missing is a coordinated effort to develop paradigms linked with a system to easily deploy them. This disorganization leads to redundancy in development, divergent implementations of conceptually identical tasks, disorganized and error-prone code lacking documentation, and difficulty in replication. The ongoing reproducibility crisis in psychology and neuroscience research (Baker, 2015; Open Science Collaboration, 2015) highlights the urgency of this challenge: reproducible research in behavioral psychology is conditional on deployment of equivalent experiments. A large, accessible repository of experiments for researchers to develop collaboratively is most efficiently accomplished through an open source framework. Here we present the Experiment Factory, an open source framework for the development and deployment of web-based experiments. The modular infrastructure includes experiments, virtual machines for local or cloud deployment, and an application to drive these components and provide developers with functions and tools for further extension. We release this infrastructure with a deployment (http://www.expfactory.org) that researchers are currently using to run a set of over 80 standardized web-based experiments on Amazon Mechanical Turk. By providing open source tools for both deployment and development, this novel infrastructure holds promise to bring reproducibility to the administration of experiments, and accelerate scientific progress by providing a shared community resource of psychological paradigms. PMID:27199843
Trade-offs between acquired and innate immune defenses in humans
McDade, Thomas W.; Georgiev, Alexander V.; Kuzawa, Christopher W.
2016-01-01
Immune defenses provide resistance against infectious disease that is critical to survival. But immune defenses are costly, and limited resources allocated to immunity are not available for other physiological or developmental processes. We propose a framework for explaining variation in patterns of investment in two important subsystems of anti-pathogen defense: innate (non-specific) and acquired (specific) immunity. The developmental costs of acquired immunity are high, but the costs of maintenance and activation are relatively low. Innate immunity imposes lower upfront developmental costs, but higher operating costs. Innate defenses are mobilized quickly and are effective against novel pathogens. Acquired responses are less effective against novel exposures, but more effective against secondary exposures due to immunological memory. Based on their distinct profiles of costs and effectiveness, we propose that the balance of investment in innate versus acquired immunity is variable, and that this balance is optimized in response to local ecological conditions early in development. Nutritional abundance, high pathogen exposure and low signals of extrinsic mortality risk during sensitive periods of immune development should all favor relatively higher levels of investment in acquired immunity. Undernutrition, low pathogen exposure, and high mortality risk should favor innate immune defenses. The hypothesis provides a framework for organizing prior empirical research on the impact of developmental environments on innate and acquired immunity, and suggests promising directions for future research in human ecological immunology. PMID:26739325
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sperling, Joshua; Fisher, Stephen; Reiner, Mark B.
The term 'leapfrogging' has been applied to cities and nations that have adopted a new form of infrastructure by bypassing the traditional progression of development, e.g., from no phones to cell phones - bypassing landlines all together. However, leapfrogging from unreliable infrastructure systems to 'smart' cities is too large a jump resulting in unsustainable and unhealthy infrastructure systems. In the Global South, a baseline of unreliable infrastructure is a prevalent problem. The push for sustainable and 'smart' [re]development tends to ignore many of those already living with failing, unreliable infrastructure. Without awareness of baseline conditions, uninformed projects run the riskmore » of returning conditions to the status quo, keeping many urban populations below targets of the United Nations' Sustainable Development Goals. A key part of understanding the baseline is to identify how citizens have long learned to adjust their expectations of basic services. To compensate for poor infrastructure, most residents in the Global South invest in remedial secondary infrastructure (RSI) at the household and business levels. The authors explore three key 'smart' city transformations that address RSI within a hierarchical planning pyramid known as the comprehensive resilient and reliable infrastructure systems (CRISP) planning framework.« less
KODAMA and VPC based Framework for Ubiquitous Systems and its Experiment
NASA Astrophysics Data System (ADS)
Takahashi, Kenichi; Amamiya, Satoshi; Iwao, Tadashige; Zhong, Guoqiang; Kainuma, Tatsuya; Amamiya, Makoto
Recently, agent technologies have attracted a lot of interest as an emerging programming paradigm. With such agent technologies, services are provided through collaboration among agents. At the same time, the spread of mobile technologies and communication infrastructures has made it possible to access the network anytime and from anywhere. Using agents and mobile technologies to realize ubiquitous computing systems, we propose a new framework based on KODAMA and VPC. KODAMA provides distributed management mechanisms by using the concept of community and communication infrastructure to deliver messages among agents without agents being aware of the physical network. VPC provides a method of defining peer-to-peer services based on agent communication with policy packages. By merging the characteristics of both KODAMA and VPC functions, we propose a new framework for ubiquitous computing environments. It provides distributed management functions according to the concept of agent communities, agent communications which are abstracted from the physical environment, and agent collaboration with policy packages. Using our new framework, we conducted a large-scale experiment in shopping malls in Nagoya, which sent advertisement e-mails to users' cellular phones according to user location and attributes. The empirical results showed that our new framework worked effectively for sales in shopping malls.
Thomopoulos, N; Grant-Muller, S; Tight, M R
2009-11-01
Interest has re-emerged on the issue of how to incorporate equity considerations in the appraisal of transport projects and large road infrastructure projects in particular. This paper offers a way forward in addressing some of the theoretical and practical concerns that have presented difficulties to date in incorporating equity concerns in the appraisal of such projects. Initially an overview of current practice within transport regarding the appraisal of equity considerations in Europe is offered based on an extensive literature review. Acknowledging the value of a framework approach, research towards introducing a theoretical framework is then presented. The proposed framework is based on the well established MCA Analytic Hierarchy Process and is also contrasted with the use of a CBA based approach. The framework outlined here offers an additional support tool to decision makers who will be able to differentiate choices based on their views on specific equity principles and equity types. It also holds the potential to become a valuable tool for evaluators as a result of the option to assess predefined equity perspectives of decision makers against both the project objectives and the estimated project impacts. This framework may also be of further value to evaluators outside transport.
Chopra, Shauhrat S; Dillon, Trent; Bilec, Melissa M; Khanna, Vikas
2016-05-01
Modern society is increasingly dependent on the stability of a complex system of interdependent infrastructure sectors. It is imperative to build resilience of large-scale infrastructures like metro systems for addressing the threat of natural disasters and man-made attacks in urban areas. Analysis is needed to ensure that these systems are capable of withstanding and containing unexpected perturbations, and develop heuristic strategies for guiding the design of more resilient networks in the future. We present a comprehensive, multi-pronged framework that analyses information on network topology, spatial organization and passenger flow to understand the resilience of the London metro system. Topology of the London metro system is not fault tolerant in terms of maintaining connectivity at the periphery of the network since it does not exhibit small-world properties. The passenger strength distribution follows a power law, suggesting that while the London metro system is robust to random failures, it is vulnerable to disruptions on a few critical stations. The analysis further identifies particular sources of structural and functional vulnerabilities that need to be mitigated for improving the resilience of the London metro network. The insights from our framework provide useful strategies to build resilience for both existing and upcoming metro systems. © 2016 The Author(s).
Defining resilience within a risk-informed assessment framework
DOE Office of Scientific and Technical Information (OSTI.GOV)
Coles, Garill A.; Unwin, Stephen D.; Holter, Gregory M.
2011-08-01
The concept of resilience is the subject of considerable discussion in academic, business, and governmental circles. The United States Department of Homeland Security for one has emphasised the need to consider resilience in safeguarding critical infrastructure and key resources. The concept of resilience is complex, multidimensional, and defined differently by different stakeholders. The authors contend that there is a benefit in moving from discussing resilience as an abstraction to defining resilience as a measurable characteristic of a system. This paper proposes defining resilience measures using elements of a traditional risk assessment framework to help clarify the concept of resilience andmore » as a way to provide non-traditional risk information. The authors show various, diverse dimensions of resilience can be quantitatively defined in a common risk assessment framework based on the concept of loss of service. This allows the comparison of options for improving the resilience of infrastructure and presents a means to perform cost-benefit analysis. This paper discusses definitions and key aspects of resilience, presents equations for the risk of loss of infrastructure function that incorporate four key aspects of resilience that could prevent or mitigate that loss, describes proposed resilience factor definitions based on those risk impacts, and provides an example that illustrates how resilience factors would be calculated using a hypothetical scenario.« less
A Watershed Scale Life Cycle Assessment Framework for Hydrologic Design
NASA Astrophysics Data System (ADS)
Tavakol-Davani, H.; Tavakol-Davani, PhD, H.; Burian, S. J.
2017-12-01
Sustainable hydrologic design has received attention from researchers with different backgrounds, including hydrologists and sustainability experts, recently. On one hand, hydrologists have been analyzing ways to achieve hydrologic goals through implementation of recent environmentally-friendly approaches, e.g. Green Infrastructure (GI) - without quantifying the life cycle environmental impacts of the infrastructure through the ISO Life Cycle Assessment (LCA) method. On the other hand, sustainability experts have been applying the LCA to study the life cycle impacts of water infrastructure - without considering the important hydrologic aspects through hydrologic and hydraulic (H&H) analysis. In fact, defining proper system elements for a watershed scale urban water sustainability study requires both H&H and LCA specialties, which reveals the necessity of performing an integrated, interdisciplinary study. Therefore, the present study developed a watershed scale coupled H&H-LCA framework to bring the hydrology and sustainability expertise together to contribute moving the current wage definition of sustainable hydrologic design towards onto a globally standard concept. The proposed framework was employed to study GIs for an urban watershed in Toledo, OH. Lastly, uncertainties associated with the proposed method and parameters were analyzed through a robust Monte Carlo simulation using parallel processing. Results indicated the necessity of both hydrologic and LCA components in the design procedure in order to achieve sustainability.
NASA Astrophysics Data System (ADS)
Trindade, B. C.; Reed, P. M.
2017-12-01
The growing access and reduced cost for computing power in recent years has promoted rapid development and application of multi-objective water supply portfolio planning. As this trend continues there is a pressing need for flexible risk-based simulation frameworks and improved algorithm benchmarking for emerging classes of water supply planning and management problems. This work contributes the Water Utilities Management and Planning (WUMP) model: a generalizable and open source simulation framework designed to capture how water utilities can minimize operational and financial risks by regionally coordinating planning and management choices, i.e. making more efficient and coordinated use of restrictions, water transfers and financial hedging combined with possible construction of new infrastructure. We introduce the WUMP simulation framework as part of a new multi-objective benchmark problem for planning and management of regionally integrated water utility companies. In this problem, a group of fictitious water utilities seek to balance the use of the mentioned reliability driven actions (e.g., restrictions, water transfers and infrastructure pathways) and their inherent financial risks. Several traits of this problem make it ideal for a benchmark problem, namely the presence of (1) strong non-linearities and discontinuities in the Pareto front caused by the step-wise nature of the decision making formulation and by the abrupt addition of storage through infrastructure construction, (2) noise due to the stochastic nature of the streamflows and water demands, and (3) non-separability resulting from the cooperative formulation of the problem, in which decisions made by stakeholder may substantially impact others. Both the open source WUMP simulation framework and its demonstration in a challenging benchmarking example hold value for promoting broader advances in urban water supply portfolio planning for regions confronting change.
2016-09-29
independent, relevant, and timely oversight of the Department of Defense that supports the warfighter; promotes accountability , integrity, and...compliance testing for the allowable costs/cost principles compliance requirement to ensure the review of indirect costs is adequately performed...consulting services in logistics, acquisition and financial management, infrastructure management, information management, organizational improvement, and
In Touch With Industry: ICAF Industry Studies, 1997
1997-01-01
Society of Civil Engineers, Washington, DC. . 1994. "Materials for Tomorrow’s Infrastructure: A Ten-Year Plan for Deploying High - Performance ...identified high - performance electronics as a key to modern warfare and conflict prevention. Clearly, the nation’s defense strategy relies heavily on...priced, high performance systems. As a consequence, hardware makers have undergone multiple restructures, consolidations, mergers, and global
1994-09-01
implementation of the services necessary to support transparent "information pull " operation of decision support systems. This infrastructure will be implemented...technology. Some aspects of this area such as user- pull , mobile and highly distributed operation, bandwidth needs and degree of securihy are Dol)-driven...by a variety of statutory requirements. R&D will provide enhanced mission effectiveness and maintenance of fragile ecosystems. The goalis to develop
Climate Change in Myanmar: Impacts and Adaptation
2014-12-01
infrastructure, contaminating food , drinking water, and spreading disease throughout cities and villages. Additionally, unprotected public health...Myanmar Agricultural Atlas,” Food and Agriculture Organization of the United Nations, accessed December 5, 2014, http://dwms.fao.org/atlases/myanmar...availability, food production, health, and local and regional economies,” according to a 2011 report of the Defense Science Board.12 Since 1995, human
Defense strategies for cloud computing multi-site server infrastructures
DOE Office of Scientific and Technical Information (OSTI.GOV)
Rao, Nageswara S.; Ma, Chris Y. T.; He, Fei
We consider cloud computing server infrastructures for big data applications, which consist of multiple server sites connected over a wide-area network. The sites house a number of servers, network elements and local-area connections, and the wide-area network plays a critical, asymmetric role of providing vital connectivity between them. We model this infrastructure as a system of systems, wherein the sites and wide-area network are represented by their cyber and physical components. These components can be disabled by cyber and physical attacks, and also can be protected against them using component reinforcements. The effects of attacks propagate within the systems, andmore » also beyond them via the wide-area network.We characterize these effects using correlations at two levels using: (a) aggregate failure correlation function that specifies the infrastructure failure probability given the failure of an individual site or network, and (b) first-order differential conditions on system survival probabilities that characterize the component-level correlations within individual systems. We formulate a game between an attacker and a provider using utility functions composed of survival probability and cost terms. At Nash Equilibrium, we derive expressions for the expected capacity of the infrastructure given by the number of operational servers connected to the network for sum-form, product-form and composite utility functions.« less
Deliberate and Crisis Action Planning and Execution Segments Increment 2A (DCAPES Inc 2A)
2016-03-01
Document DAE - Defense Acquisition Executive DoD - Department of Defense DoDAF - DoD Architecture Framework FD - Full Deployment FDD - Full...Jun 2009 DT/OT Completion Jan 2015 Jan 2015 FDD Aug 2015 Oct 2015 FD TBD Oct 2015 Memo DCAPES is a National Security System. Acronyms and
Department of Defense Joint Technical Architecture Version 2.0
1998-05-26
Mandates 2.1-5 2.1.4.1 Year 2000 (Y2K) Compliance 2.1-5 2.1.4.2 Defense Information Infrastructure Common Operating Environment (DU COE) 2.1-5 2.1.5...2.2.2.2.1.6 Communications Services 2.2-11 2.2.2.2.1.7 Operating System Services 2.2-11 2.2.2.2.2 Application Platform Cross-Area Services 2.2- 12 ...2.2.2.2.2.1 Internationalization Services 2.2- 12 2.2.2.2.2.2 Security Services 2.2- 12 2.2.2.2.2.3 System Management Services 2.2- 12 2.2.2.2.2.4
DOT National Transportation Integrated Search
2018-01-01
In this research, a policy framework was developed and used as a tool to determine the impacts of change in truck traffic on a regional level as a result of policy change. To achieve the objective, three demand models were used in the framework which...
ERIC Educational Resources Information Center
Magzamen, Sheryl; Mayer, Adam P.; Barr, Stephanie; Bohren, Lenora; Dunbar, Brian; Manning, Dale; Reynolds, Stephen J.; Schaeffer, Joshua W.; Suter, Jordan; Cross, Jennifer E.
2017-01-01
Background: Sustainable school buildings hold much promise to reducing operating costs, improve occupant well-being and, ultimately, teacher and student performance. However, there is a scarcity of evidence on the effects of sustainable school buildings on health and performance indicators. We sought to create a framework for a multidisciplinary…
This report develops a broad framework, or taxonomy, for identifying and organizing the socio-economic impacts of sewer infrastructure projects. It focuses on a green project in Cincinnati, Ohio that has adopted broader economic goals. The report then uses this example to illustr...
HPC Software Stack Testing Framework
DOE Office of Scientific and Technical Information (OSTI.GOV)
Garvey, Cormac
The HPC Software stack testing framework (hpcswtest) is used in the INL Scientific Computing Department to test the basic sanity and integrity of the HPC Software stack (Compilers, MPI, Numerical libraries and Applications) and to quickly discover hard failures, and as a by-product it will indirectly check the HPC infrastructure (network, PBS and licensing servers).
State Energy Resilience Framework
DOE Office of Scientific and Technical Information (OSTI.GOV)
Phillips, J.; Finster, M.; Pillon, J.
2016-12-01
The energy sector infrastructure’s high degree of interconnectedness with other critical infrastructure systems can lead to cascading and escalating failures that can strongly affect both economic and social activities.The operational goal is to maintain energy availability for customers and consumers. For this body of work, a State Energy Resilience Framework in five steps is proposed.
ERIC Educational Resources Information Center
Wilson, Joe M.
2013-01-01
This dissertation uses design science research and engineering to develop a cloud-based simulator for modeling next-generation cybersecurity protection frameworks in the United States. The claim is made that an agile and neutral framework extending throughout the cyber-threat plane is needed for critical infrastructure protection (CIP). This…
Cyber-Physical Attack-Resilient Wide-Area Monitoring, Protection, and Control for the Power Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Ashok, Aditya; Govindarasu, Manimaran; Wang, Jianhui
Cyber security and resiliency of Wide-Area Monitoring, Protection and Control (WAMPAC) applications is critically important to ensure secure, reliable, and economic operation of the bulk power system. WAMPAC relies heavily on the security of measurements and control commands transmitted over wide-area communication networks for real-time operational, protection, and control functions. Also, the current “N-1 security criteria” for grid operation is inadequate to address malicious cyber events and therefore it is important to fundamentally redesign WAMPAC and to enhance Energy Management System (EMS) applications to make them attack-resilient. In this paper, we propose an end-to-end defense-in-depth architecture for attack-resilient WAMPAC thatmore » addresses resilience at both the infrastructure layer and the application layers. Also, we propose an attack-resilient cyber-physical security framework that encompasses the entire security life cycle including risk assessment, attack prevention, attack detection, attack mitigation, and attack resilience. The overarching objective of this paper is to provide a broad scope that comprehensively describes most of the major research issues and potential solutions in the context of cyber-physical security of WAMPAC for the power grid.« less
NASA Technical Reports Server (NTRS)
Watson, Michael D.; Kelley, Gary W.
2012-01-01
The Department of Defense (DoD) defined System Operational Effectiveness (SOE) model provides an exceptional framework for an affordable approach to the development and operation of space launch vehicles and their supporting infrastructure. The SOE model provides a focal point from which to direct and measure technical effectiveness and process efficiencies of space launch vehicles. The application of the SOE model to a space launch vehicle's development and operation effort leads to very specific approaches and measures that require consideration during the design phase. This paper provides a mapping of the SOE model to the development of space launch vehicles for human exploration by addressing the SOE model key points of measurement including System Performance, System Availability, Technical Effectiveness, Process Efficiency, System Effectiveness, Life Cycle Cost, and Affordable Operational Effectiveness. In addition, the application of the SOE model to the launch vehicle development process is defined providing the unique aspects of space launch vehicle production and operations in lieu of the traditional broader SOE context that examines large quantities of fielded systems. The tailoring and application of the SOE model to space launch vehicles provides some key insights into the operational design drivers, capability phasing, and operational support systems.
NASA Astrophysics Data System (ADS)
Ge, Linqiang; Yu, Wei; Shen, Dan; Chen, Genshe; Pham, Khanh; Blasch, Erik; Lu, Chao
2014-06-01
Most enterprise networks are built to operate in a static configuration (e.g., static software stacks, network configurations, and application deployments). Nonetheless, static systems make it easy for a cyber adversary to plan and launch successful attacks. To address static vulnerability, moving target defense (MTD) has been proposed to increase the difficulty for the adversary to launch successful attacks. In this paper, we first present a literature review of existing MTD techniques. We then propose a generic defense framework, which can provision an incentive-compatible MTD mechanism through dynamically migrating server locations. We also present a user-server mapping mechanism, which not only improves system resiliency, but also ensures network performance. We demonstrate a MTD with a multi-user network communication and our data shows that the proposed framework can effectively improve the resiliency and agility of the system while achieving good network timeliness and throughput performance.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hoette, Trisha Marie
Throughout history, as new chemical threats arose, strategies for the defense against chemical attacks have also evolved. As a part of an Early Career Laboratory Directed Research and Development project, a systems analysis of past, present, and future chemical terrorism scenarios was performed to understand how the chemical threats and attack strategies change over time. For the analysis, the difficulty in executing chemical attack was evaluated within a framework of three major scenario elements. First, historical examples of chemical terrorism were examined to determine how the use of chemical threats, versus other weapons, contributed to the successful execution of themore » attack. Using the same framework, the future of chemical terrorism was assessed with respect to the impact of globalization and new technologies. Finally, the efficacy of the current defenses against contemporary chemical terrorism was considered briefly. The results of this analysis justify the need for continued diligence in chemical defense.« less
Sustainable infrastructure system modeling under uncertainties and dynamics
NASA Astrophysics Data System (ADS)
Huang, Yongxi
Infrastructure systems support human activities in transportation, communication, water use, and energy supply. The dissertation research focuses on critical transportation infrastructure and renewable energy infrastructure systems. The goal of the research efforts is to improve the sustainability of the infrastructure systems, with an emphasis on economic viability, system reliability and robustness, and environmental impacts. The research efforts in critical transportation infrastructure concern the development of strategic robust resource allocation strategies in an uncertain decision-making environment, considering both uncertain service availability and accessibility. The study explores the performances of different modeling approaches (i.e., deterministic, stochastic programming, and robust optimization) to reflect various risk preferences. The models are evaluated in a case study of Singapore and results demonstrate that stochastic modeling methods in general offers more robust allocation strategies compared to deterministic approaches in achieving high coverage to critical infrastructures under risks. This general modeling framework can be applied to other emergency service applications, such as, locating medical emergency services. The development of renewable energy infrastructure system development aims to answer the following key research questions: (1) is the renewable energy an economically viable solution? (2) what are the energy distribution and infrastructure system requirements to support such energy supply systems in hedging against potential risks? (3) how does the energy system adapt the dynamics from evolving technology and societal needs in the transition into a renewable energy based society? The study of Renewable Energy System Planning with Risk Management incorporates risk management into its strategic planning of the supply chains. The physical design and operational management are integrated as a whole in seeking mitigations against the potential risks caused by feedstock seasonality and demand uncertainty. Facility spatiality, time variation of feedstock yields, and demand uncertainty are integrated into a two-stage stochastic programming (SP) framework. In the study of Transitional Energy System Modeling under Uncertainty, a multistage stochastic dynamic programming is established to optimize the process of building and operating fuel production facilities during the transition. Dynamics due to the evolving technologies and societal changes and uncertainty due to demand fluctuations are the major issues to be addressed.
Game Intelligence in Team Sports
Lennartsson, Jan; Lidström, Nicklas; Lindberg, Carl
2015-01-01
We set up a game theoretic framework to analyze a wide range of situations from team sports. A fundamental idea is the concept of potential; the probability of the offense scoring the next goal minus the probability that the next goal is made by the defense. We develop categorical as well as continuous models, and obtain optimal strategies for both offense and defense. A main result is that the optimal defensive strategy is to minimize the maximum potential of all offensive strategies. PMID:25970581
Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hernandez Jimenez, Jarilyn M; Chen, Qian; Nichols, Jeff A.
Supervisory control and data acquisition (SCADA) is an industrial automation system that remotely monitor, and control critical infrastructures. SCADA systems are major targets for espionage and sabotage attackers. According to the 2015 Dell security annual threat report, the number of cyber-attacks against SCADA systems has doubled in the past year. Cyber-attacks (i.e., buffer overflow, rootkits and code injection) could cause serious financial losses and physical infrastructure damages. Moreover, some specific cyber-attacks against SCADA systems could become a threat to human life. Current commercial off-the-shelf security solutions are insufficient in protecting SCADA systems against sophisticated cyber-attacks. In 2014 a report bymore » Mandiant stated that only 69% of organizations learned about their breaches from third entities, meaning that these companies lack of their own detection system. Furthermore, these breaches are not detected in real-time or fast enough to prevent further damages. The average time between compromise and detection (for those intrusions that were detected) was 205 days. To address this challenge, we propose an Intrusion Detection System (IDS) that detects SCADA-specific cyber-attacks by analyzing the power consumption of a SCADA device. Specifically, to validate the proposed approach, we chose to monitor in real-time the power usage of a a Programmable Logic Controller (PLC). To this end, we configured the hardware of the tetsbed by installing the required sensors to monitor and collect its power consumption. After that two SCADA-specific cyber-attacks were simulated and TracerDAQ Pro was used to collect the power consumption of the PLC under normal and anomalous scenarios. Results showed that is possible to distinguish between the regular power usage of the PLC and when the PLC was under specific cyber-attacks.« less
Strategic behaviors and governance challenges in social-ecological systems
NASA Astrophysics Data System (ADS)
Muneepeerakul, Rachata; Anderies, John M.
2017-08-01
The resource management and environmental policy literature focuses on devising regulations and incentive structures to achieve desirable goals. It often presumes the existence of public infrastructure that actualizes these incentives and regulations through a process loosely referred to as `governance.' In many cases, it is not clear if and how such governance infrastructure can be created and supported. Here, we take a complex systems view in which `governance' is an emergent phenomenon generated by interactions between social, economic, and environmental (both built and natural) factors. We present a framework and formal stylized model to explore under what circumstances stable governance structures may emerge endogenously in coupled infrastructure systems comprising shared natural, social, and built infrastructures of which social-ecological systems are specific examples. The model allows us to derive general conditions for a sustainable coupled infrastructure system in which critical infrastructure (e.g., canals) is provided by a governing entity that enables resource users (e.g., farmers) to produce outputs from natural infrastructure (e.g., water) to meet their needs while supporting the governing entity.
EuCARD 2010: European coordination of accelerator research and development
NASA Astrophysics Data System (ADS)
Romaniuk, Ryszard S.
2010-09-01
Accelerators are basic tools of the experimental physics of elementary particles, nuclear physics, light sources of the fourth generation. They are also used in myriad other applications in research, industry and medicine. For example, there are intensely developed transmutation techniques for nuclear waste from nuclear power and atomic industries. The European Union invests in the development of accelerator infrastructures inside the framework programs to build the European Research Area. The aim is to build new accelerator research infrastructures, develop the existing ones, and generally make the infrastructures more available to competent users. The paper summarizes the first year of activities of the EU FP7 Project Capacities EuCARD -European Coordination of Accelerator R&D. EuCARD is a common venture of 37 European Accelerator Laboratories, Institutes, Universities and Industrial Partners involved in accelerator sciences and technologies. The project, initiated by ESGARD, is an Integrating Activity co-funded by the European Commission under Framework Program 7 - Capacities for a duration of four years, starting April 1st, 2009. Several teams from this country participate actively in this project. The contribution from Polish research teams concerns: photonic and electronic measurement - control systems, RF-gun co-design, thin-film superconducting technology, superconducting transport infrastructures, photon and particle beam measurements and control.
A Knowledge Discovery framework for Planetary Defense
NASA Astrophysics Data System (ADS)
Jiang, Y.; Yang, C. P.; Li, Y.; Yu, M.; Bambacus, M.; Seery, B.; Barbee, B.
2016-12-01
Planetary Defense, a project funded by NASA Goddard and the NSF, is a multi-faceted effort focused on the mitigation of Near Earth Object (NEO) threats to our planet. Currently, there exists a dispersion of information concerning NEO's amongst different organizations and scientists, leading to a lack of a coherent system of information to be used for efficient NEO mitigation. In this paper, a planetary defense knowledge discovery engine is proposed to better assist the development and integration of a NEO responding system. Specifically, we have implemented an organized information framework by two means: 1) the development of a semantic knowledge base, which provides a structure for relevant information. It has been developed by the implementation of web crawling and natural language processing techniques, which allows us to collect and store the most relevant structured information on a regular basis. 2) the development of a knowledge discovery engine, which allows for the efficient retrieval of information from our knowledge base. The knowledge discovery engine has been built on the top of Elasticsearch, an open source full-text search engine, as well as cutting-edge machine learning ranking and recommendation algorithms. This proposed framework is expected to advance the knowledge discovery and innovation in planetary science domain.
NASA Astrophysics Data System (ADS)
Khalid, A.; Haddad, J.; Lawler, S.; Ferreira, C.
2014-12-01
Areas along the Chesapeake Bay and its tributaries are extremely vulnerable to hurricane flooding, as evidenced by the costly effects and severe impacts of recent storms along the Virginia coast, such as Hurricane Isabel in 2003 and Hurricane Sandy in 2012. Coastal wetlands, in addition to their ecological importance, are expected to mitigate the impact of storm surge by acting as a natural protection against hurricane flooding. Quantifying such interactions helps to provide a sound scientific basis to support planning and decision making. Using storm surge flooding from various historical hurricanes, simulated using a coupled hydrodynamic wave model (ADCIRC-SWAN), we propose an integrated framework yielding a geospatial identification of the capacity of Chesapeake Bay wetlands to protect critical infrastructure. Spatial identification of Chesapeake Bay wetlands is derived from the National Wetlands Inventory (NWI), National Land Cover Database (NLCD), and the Coastal Change Analysis Program (C-CAP). Inventories of population and critical infrastructure are extracted from US Census block data and FEMA's HAZUS-Multi Hazard geodatabase. Geospatial and statistical analyses are carried out to develop a relationship between wetland land cover, hurricane flooding, population and infrastructure vulnerability. These analyses result in the identification and quantification of populations and infrastructure in flooded areas that lie within a reasonable buffer surrounding the identified wetlands. Our analysis thus produces a spatial perspective on the potential for wetlands to attenuate hurricane flood impacts in critical areas. Statistical analysis will support hypothesis testing to evaluate the benefits of wetlands from a flooding and storm-surge attenuation perspective. Results from geospatial analysis are used to identify where interactions with critical infrastructure are relevant in the Chesapeake Bay.
NASA Astrophysics Data System (ADS)
Zeff, Harrison B.; Herman, Jonathan D.; Reed, Patrick M.; Characklis, Gregory W.
2016-09-01
A considerable fraction of urban water supply capacity serves primarily as a hedge against drought. Water utilities can reduce their dependence on firm capacity and forestall the development of new supplies using short-term drought management actions, such as conservation and transfers. Nevertheless, new supplies will often be needed, especially as demands rise due to population growth and economic development. Planning decisions regarding when and how to integrate new supply projects are fundamentally shaped by the way in which short-term adaptive drought management strategies are employed. To date, the challenges posed by long-term infrastructure sequencing and adaptive short-term drought management are treated independently, neglecting important feedbacks between planning and management actions. This work contributes a risk-based framework that uses continuously updating risk-of-failure (ROF) triggers to capture the feedbacks between short-term drought management actions (e.g., conservation and water transfers) and the selection and sequencing of a set of regional supply infrastructure options over the long term. Probabilistic regional water supply pathways are discovered for four water utilities in the "Research Triangle" region of North Carolina. Furthermore, this study distinguishes the status-quo planning path of independent action (encompassing utility-specific conservation and new supply infrastructure only) from two cooperative formulations: "weak" cooperation, which combines utility-specific conservation and infrastructure development with regional transfers, and "strong" cooperation, which also includes jointly developed regional infrastructure to support transfers. Results suggest that strong cooperation aids utilities in meeting their individual objectives at substantially lower costs and with less overall development. These benefits demonstrate how an adaptive, rule-based decision framework can coordinate integrated solutions that would not be identified using more traditional optimization methods.
Measuring infrastructure: A key step in program evaluation and planning
Schmitt, Carol L.; Glasgow, LaShawn; Lavinghouze, S. Rene; Rieker, Patricia P.; Fulmer, Erika; McAleer, Kelly; Rogers, Todd
2016-01-01
State tobacco prevention and control programs (TCPs) require a fully functioning infrastructure to respond effectively to the Surgeon General’s call for accelerating the national reduction in tobacco use. The literature describes common elements of infrastructure; however, a lack of valid and reliable measures has made it difficult for program planners to monitor relevant infrastructure indicators and address observed deficiencies, or for evaluators to determine the association among infrastructure, program efforts, and program outcomes. The Component Model of Infrastructure (CMI) is a comprehensive, evidence-based framework that facilitates TCP program planning efforts to develop and maintain their infrastructure. Measures of CMI components were needed to evaluate the model’s utility and predictive capability for assessing infrastructure. This paper describes the development of CMI measures and results of a pilot test with nine state TCP managers. Pilot test findings indicate that the tool has good face validity and is clear and easy to follow. The CMI tool yields data that can enhance public health efforts in a funding-constrained environment and provides insight into program sustainability. Ultimately, the CMI measurement tool could facilitate better evaluation and program planning across public health programs. PMID:27037655
Measuring infrastructure: A key step in program evaluation and planning.
Schmitt, Carol L; Glasgow, LaShawn; Lavinghouze, S Rene; Rieker, Patricia P; Fulmer, Erika; McAleer, Kelly; Rogers, Todd
2016-06-01
State tobacco prevention and control programs (TCPs) require a fully functioning infrastructure to respond effectively to the Surgeon General's call for accelerating the national reduction in tobacco use. The literature describes common elements of infrastructure; however, a lack of valid and reliable measures has made it difficult for program planners to monitor relevant infrastructure indicators and address observed deficiencies, or for evaluators to determine the association among infrastructure, program efforts, and program outcomes. The Component Model of Infrastructure (CMI) is a comprehensive, evidence-based framework that facilitates TCP program planning efforts to develop and maintain their infrastructure. Measures of CMI components were needed to evaluate the model's utility and predictive capability for assessing infrastructure. This paper describes the development of CMI measures and results of a pilot test with nine state TCP managers. Pilot test findings indicate that the tool has good face validity and is clear and easy to follow. The CMI tool yields data that can enhance public health efforts in a funding-constrained environment and provides insight into program sustainability. Ultimately, the CMI measurement tool could facilitate better evaluation and program planning across public health programs. Copyright © 2016 Elsevier Ltd. All rights reserved.
Defense Infrastructure: The Enhanced Use Lease Program Requires Management Attention
2011-06-01
included in our EUL case studies, the escrow agreements executed by the Army in connection with the EUL at Yuma Proving Ground , Arizona, and the EUL at...research park. 6 Army Redstone Arsenal, Alabama 2009 50 468 acres Site for office and research center development. 7 Army Yuma Proving Ground ...9The three Army EUL case studies were located at Aberdeen Proving Ground , Maryland; Fort
Materiel Solutions for Special Operations Forces
2015-03-28
Continually developed a repository of UNC System-wide defense research expertise and infrastructure resources to enable effective identification of UNC...antennas and more. • Mr. Jim Geurts, USSOCOM Acquisition Executive, visited the campuses of UNC Chapel Hill and NCSU in March 2013. He met with...game theory, and political science. The goal of the workshop was to explore cutting edge techniques to measure the effectiveness of special operations
Data to DecisionsTerminate, Tolerate, Transfer, or Treat
2016-07-25
and patching, a risk-based cyber - security decision model that enables a pre- dictive capability to respond to impending cyber -attacks is needed...States. This sensitive data includes business proprietary information on key programs of record and infrastructure, including government documents at...leverage nationally. The Institute for Defense Analyses (IDA) assisted the DoD CIO in formalizing a proof of concept for cyber initiatives and
Base Realignment and Closure (BRAC) Environmental Restoration Program Management Plan
1999-04-01
ENVIRONMENTAL PROGRAM 5 4.1 Environmental Restoration (Cleanup, Compliance and Unexploded Ordnance) 6 4.2 National Environmental Policy Act (NEPA...Realignment Act) to create a process to close bases and realign the force infrastructure. The law addressed National Environmental Policy Act (NEPA...primarily through provisions contained in the National Defense Authorization Acts for Fiscal Years 1992 through 1997. Appendix A of the BRAC Reuse
Global Positioning System: Observations on Quarterly Reports from the Air Force
2016-10-17
Positioning System : Observations on Quarterly Reports from the Air Force The satellite-based Global Positioning System (GPS) provides positioning, navigation...infrastructure, and transportation safety. The Department of Defense (DOD)—specifically, the Air Force—develops and operates the GPS system , which...programs, including the most recent detailed assessment of the next generation operational control system (OCX) and development of military GPS
CrossTalk. The Journal of Defense Software Engineering. Volume 26, Number 5
2013-10-01
to a backend domain managed by the cyber criminal. Mobile bots can perform piggybacking on legitimate applications and steal data by controlling...technology infrastructure for managing identities, interfaces (web and/or mobile ), and agreements with service providers. The necessary capabilities and...platforms of unknown or dubious origin, global access by mobile (and largely insecure) devices, eroded trust boundaries, and the possibility of malevolent
Countering Small Boat Terrorism in Territorial Sea
2010-12-01
February 07, 2010). 4 coastal state extends, beyond its land territory and internal waters, and in the case of an archipelagic state, its archipelagic ...1970s and early 1980s had direct implications on Israel’s defense doctrines , which called for even harder military retaliation against terrorist... doctrines , which called for even harder military retaliation against terrorist infrastructures, thereby often invading the sovereign territory of third
The Department of Defense and Climate Change: Initiating the Dialogue
2012-01-01
that might be impacted: such as for wetlands, endangered species, and protected marine ecosystems and species. In addition, the rapid implementation...their adaptive capacity. As a result, continued improvements are needed in the representation of biotic and abiotic components of environmental...resilience? 3) What design features of DoD’s built infrastructure should be assessed and modified for improving their adaptive capacity to a
Long-Range Ballistic Missile Defense in Europe
2010-04-26
land-based configurations. • Phase 3 ( 2018 timeframe): Deploy improved area coverage in Europe against medium- and intermediate-range Iranian...military services. “I think that all our military programs should be managed through those regular processes,” he said, and “that would include...10 interceptors itself would likely have comprised an area somewhat larger than a football field. The area of supporting infrastructure was likely
2008-10-01
AD); Aeolos, a distributed intrusion detection and event correlation infrastructure; STAND, a training-set sanitization technique applicable to ADs...UU 18. NUMBER OF PAGES 25 19a. NAME OF RESPONSIBLE PERSON Frank H. Born a. REPORT U b. ABSTRACT U c . THIS PAGE U 19b. TELEPHONE...Summary of findings 2 (a) Automatic Patch Generation 2 (b) Better Patch Management 2 ( c ) Artificial Diversity 3 (d) Distributed Anomaly Detection 3
2015-09-01
property conveyed by the Navy. Installation officials generally have more flexibility in real-estate transactions. According to officials of the...Air Force Civil Engineer Center, in-kind payment projects offer installation officials greater flexibility in executing real-estate transactions...air conditioning, fire protection, utility connections, pavement , and information systems. Agreement between Army and Air Force Exchange Services
2005-12-01
Logistics Support Activity MIT Massachusetts Institution of Technology MRE Meals -Ready-to-Eat MRO Material Release Order MSC Military Sealift... increase once item tagging becomes mandated. Reader, middleware, specialized hardware, and physical infrastructure costs can add up too. Reader’s...that system integration revenues could surpass hardware by 2007 (Asif & Mandviwalla, 2005, p. 26). (4) Training. Training is another challenge
Defense AT and L. Volume 43, Number 4
2014-08-01
nature , guidance can become dated soon after it is published since it is typically anticipatory or reactive in na- ture. Tearing down boundaries and...how we pro- tect and defend the United States and its allies. Those technologies began as ideas that were nurtured , guarded and secured by...intimidation by criminals /insurgents, and safe facilities for their workers. They also need reliable infrastructure for their manufacturing facilities
Engaging a moving target: Adapting to rates of climate change
NASA Astrophysics Data System (ADS)
Shayegh, S.; Caldeira, K.; Moreno-Cruz, J.
2015-12-01
Climate change is affecting the planet and its human and natural systems at an increasing rate. As temperatures continue to rise, the international community has increasingly been considering adaptation measures to prepare for future climate change. However, most discussion around adaptation strategies has focused on preparedness for some expected amount of climate change impacts, e.g. 2 meters sea level rise. In this study, we discuss adaptation to rates of change as an alternative conceptual framework for thinking about adaptation. Adaptation is not only about adapting to amounts of change, but the rate at which these changes occur is also critically important. We ground our discussion with an example of optimal coastal investment in the face of ongoing sea level rise. Sea level rise threatens coastal assets. Finite resources could be devoted to building infrastructure further inland or to building coastal defense systems. A possible policy response could be to create a "no-build" coastal buffer zone that anticipates a future higher sea level. We present a quantitative model that illustrates the interplay among various important factors (rate of sea level rise, discount rate, capital depreciation rate, attractiveness of coastal land, etc). For some cases, strategies that combine periodic defensive investments (e.g. dikes) with planned retreat can maximize welfare when adapting to rates of climate change. In other cases, planned retreat may be optimal. It is important to prepare for ongoing increasing amounts of climate change. Preparing for a fixed amount of climate change can lead to a suboptimal solution. Climate is likely to continue changing throughout this century and beyond. To reduce adverse climate impacts, ecosystems and human systems will need to continuously adapt to a moving target.
Enhanced Logistics Intra-theater Support Tool
DOE Office of Scientific and Technical Information (OSTI.GOV)
Van Groningen, Charles N.; Braun, Mary Duffy; Widing, Mary Ann
2004-01-27
Developed for use by Department of Defense deployment analysts to perform detailed Reception, Staging, Onward movement and Integration (RSO&I) analyses. ELIST requires: o Vehicle characteristics for ships, planes, trucks, railcars, buses, and helicopters. o Network (physical) characteristics defining the airport, seaport, road, rail, waterway and pipeline infrastructure available in a theater of operations. o Assets available for moving the personnel, equipment and supplies over the infrastructure network. o Movement requirements plan defining the deployment requirements of a military force. This includes defining each unit, its cargo (at various levels of resolution) , where it must move from and to, whatmore » modes it is required to travel by, and when it must be delivered through each phase of deployment.« less
Street Level Hydrology: An Urban Application of the WRF-Hydro Framework in Denver, Colorado
NASA Astrophysics Data System (ADS)
Read, L.; Hogue, T. S.; Salas, F. R.; Gochis, D.
2015-12-01
Urban flood modeling at the watershed scale carries unique challenges in routing complexity, data resolution, social and political issues, and land surface - infrastructure interactions. The ability to accurately trace and predict the flow of water through the urban landscape enables better emergency response management, floodplain mapping, and data for future urban infrastructure planning and development. These services are of growing importance as urban population is expected to continue increasing by 1.84% per year for the next 25 years, increasing the vulnerability of urban regions to damages and loss of life from floods. Although a range of watershed-scale models have been applied in specific urban areas to examine these issues, there is a trend towards national scale hydrologic modeling enabled by supercomputing resources to understand larger system-wide hydrologic impacts and feedbacks. As such it is important to address how urban landscapes can be represented in large scale modeling processes. The current project investigates how coupling terrain and infrastructure routing can improve flow prediction and flooding events over the urban landscape. We utilize the WRF-Hydro modeling framework and a high-resolution terrain routing grid with the goal of compiling standard data needs necessary for fine scale urban modeling and dynamic flood forecasting in the urban setting. The city of Denver is selected as a case study, as it has experienced several large flooding events in the last five years and has an urban annual population growth rate of 1.5%, one of the highest in the U.S. Our work highlights the hydro-informatic challenges associated with linking channel networks and drainage infrastructure in an urban area using the WRF-Hydro modeling framework and high resolution urban models for short-term flood prediction.
A global fingerprint of macro-scale changes in urban structure from 1999 to 2009
NASA Astrophysics Data System (ADS)
Frolking, Steve; Milliman, Tom; Seto, Karen C.; Friedl, Mark A.
2013-06-01
Urban population now exceeds rural population globally, and 60-80% of global energy consumption by households, businesses, transportation, and industry occurs in urban areas. There is growing evidence that built-up infrastructure contributes to carbon emissions inertia, and that investments in infrastructure today have delayed climate cost in the future. Although the United Nations statistics include data on urban population by country and select urban agglomerations, there are no empirical data on built-up infrastructure for a large sample of cities. Here we present the first study to examine changes in the structure of the world’s largest cities from 1999 to 2009. Combining data from two space-borne sensors—backscatter power (PR) from NASA’s SeaWinds microwave scatterometer, and nighttime lights (NL) from NOAA’s defense meteorological satellite program/operational linescan system (DMSP/OLS)—we report large increases in built-up infrastructure stock worldwide and show that cities are expanding both outward and upward. Our results reveal previously undocumented recent and rapid changes in urban areas worldwide that reflect pronounced shifts in the form and structure of cities. Increases in built-up infrastructure are highest in East Asian cities, with Chinese cities rapidly expanding their material infrastructure stock in both height and extent. In contrast, Indian cities are primarily building out and not increasing in verticality. This new dataset will help characterize the structure and form of cities, and ultimately improve our understanding of how cities affect regional-to-global energy use and greenhouse gas emissions.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Happenny, Sean F.
The United States’ power infrastructure is aging, underfunded, and vulnerable to cyber attack. Emerging smart grid technologies may take some of the burden off of existing systems and make the grid as a whole more efficient, reliable, and secure. The Pacific Northwest National Laboratory (PNNL) is funding research into several aspects of smart grid technology and grid security, creating a software simulation tool that will allow researchers to test power distribution networks utilizing different smart grid technologies to determine how the grid and these technologies react under different circumstances. Demonstrating security in embedded systems is another research area PNNL ismore » tackling. Many of the systems controlling the U.S. critical infrastructure, such as the power grid, lack integrated security and the networks protecting them are becoming easier to breach. Providing a virtual power substation network to each student team at the National Collegiate Cyber Defense Competition, thereby supporting the education of future cyber security professionals, is another way PNNL is helping to strengthen the security of the nation’s power infrastructure.« less
The adverse outcome pathway (AOP) framework has been developed as a means for assembling scientifically defensible descriptions of how particular molecular perturbations, termed molecular initiating events (MIEs), can evoke a set of predictable responses at different levels of bi...
Energy-Water Microgrid Case Study at the University of Arizona's BioSphere 2
NASA Astrophysics Data System (ADS)
Daw, J.; Macknick, J.; Kandt, A.; Giraldez, J.
2016-12-01
Microgrids can provide reliable and cost-effective energy services in a variety of conditions and locations. To date, there has been minimal effort invested in developing energy-water microgrids that demonstrate the feasibility and leverage the synergies associated with designing and operating renewable energy and water systems in a coordinated framework. Water and wastewater treatment equipment can be operated in ways to provide ancillary services to the electrical grid and renewable energy can be utilized to power water-related infrastructure, but the potential for co-managed systems has not yet been quantified or fully characterized. Co-management and optimization of energy and water resources could lead to improved reliability and economic operating conditions. Energy-water microgrids could be a promising solution to improve energy and water resource management for islands, rural communities, distributed generation, Defense operations, and many parts of the world lacking critical infrastructure.The National Renewable Energy Laboratory (NREL) and the University of Arizona have been jointly researching energy-water microgrid opportunities through an effort at the university's BioSphere 2 (B2) Earth systems science research facility. B2 is an ideal case study for an energy-water microgrid test site, given its size, its unique mission and operations, the existence and criticality of water and energy infrastructure, and its ability to operate connected-to or disconnected-from the local electrical grid. Moreover, the B2 is a premier facility for undertaking agricultural research, providing an excellent opportunity to evaluate connections and tradeoffs in the food-energy-water nexus. The research effort at B2 identified the technical potential and associated benefits of an energy-water microgrid through the evaluation of energy ancillary services and peak load reductions and quantified the potential for B2 water-related loads to be utilized and modified to provide grid services in the context of an optimized energy-water microgrid. The foundational work performed at B2 also serves a model that can be built upon for identifying relevant energy-water microgrid data, analytical requirements, and operational challenges associated with development of future energy-water microgrids.
Bridging the Gap Between Policy and Research Infrastructure: Risk and Vulnerability Case Study
NASA Astrophysics Data System (ADS)
Hugo, Wim; Rogers, Annabelle
2017-04-01
Linking sound scientific data and conclusions to decision and policy support is not a trivial task, and the difficulty in achieving this has been highlighted more than a decade ago (Reid, 2004). There are several reasons why this is the case, inter alia: 1. The language, (vocabularies, framework, and heuristics) adopted by the research community in a specific discipline may not translate into meaningful implementation language (Preston et al., 2015); 2. The researchers may not be in a position of influence (which includes aspects such as writing policy briefs, undertaking personal initiatives, and building up public or industry concern and interest) (Fox and Sitkin, 2015); 3. The frequency, timing, and/or certainty associated with research output is at odds with decision and policy-making cycles. Research typically progresses until there is a defensible level of certainty in statistical assessment of a result, while policy decisions are often made within a regular cycle; 4. Scientists are not trained for, or measured by, the typical work required for decision and policy support: synthesis of scenarios and cost-benefits of such scenarios given sometimes significant uncertainty in the input data, and cross-disciplinary concerns that need to be balanced. There is a significant expectation that research output, being increasingly open, standardised, and managed in formal research data infrastructure, will be useful to policy and decision makers without much additional intervention and modification. We believe that this is unlikely to be feasible in the majority of cases. For most instances, it will be necessary to provide a framework for the translation of scientific output into decision and policy support metrics or indicators at a frequency, with spatial and temporal resolution, and thematic coverage that suits the decision to be made. Such frameworks exist, since the need has been identified - sometimes formally - such as the very detailed framework developed by IPCC for translating climate science into policy - (IPCC, 2007), or less formally - such as the move to develop Essential Biodiversity Variables, loosely designed to support Aichi Targets (Pereira et al., 2013) or the UN Sustainable Development Goals (UN, 2016). In the paper, we examine a number of these frameworks, map them onto a generic framework for the translation of research output into policy and decision support, and discuss an example from the South African Risk and Vulnerability Atlas in detail. References Craig R. Fox & Sim B. Sitkin (2015). Bridging the divide between behavioral science & policy, Behavioral Science & Policy, Spring 2015, https://behavioralpolicy.org/wp-content/uploads/2016/1-1/Bridging-the-divide-between-behavioral-science-and-policy.pdf IPCC (2007). Conceptual framework for the identification and assessment of key vulnerabilities, https://www.ipcc.ch/publications_and_data/ar4/wg2/en/ch19s19-1-2.html Pereira et al. (2013). Essential Biodiversity Variables, Science 18 Jan 2013: Vol. 339, Issue 6117, pp. 277-278 DOI: 10.1126/science.1229931 Preston, B.L., Mustelin, J. & Maloney, M.C. Mitig Adapt Strateg Glob Change (2015) 20: 467. doi:10.1007/s11027-013-9503-x Reid WV (2004) Bridging the Science-Policy Divide. PLoS Biol 2(2): e27. doi:10.1371/journal.pbio.0020027 UN (2016). Sustainable Development Goals, http://www.un.org/sustainabledevelopment/sustainable-development-goals/
NASA Astrophysics Data System (ADS)
Jiménez-Redondo, Noemi; Calle-Cordón, Alvaro; Kandler, Ute; Simroth, Axel; Morales, Francisco J.; Reyes, Antonio; Odelius, Johan; Thaduri, Aditya; Morgado, Joao; Duarte, Emmanuele
2017-09-01
The on-going H2020 project INFRALERT aims to increase rail and road infrastructure capacity in the current framework of increased transportation demand by developing and deploying solutions to optimise maintenance interventions planning. It includes two real pilots for road and railways infrastructure. INFRALERT develops an ICT platform (the expert-based Infrastructure Management System, eIMS) which follows a modular approach including several expert-based toolkits. This paper presents the methodologies and preliminary results of the toolkits for i) nowcasting and forecasting of asset condition, ii) alert generation, iii) RAMS & LCC analysis and iv) decision support. The results of these toolkits in a meshed road network in Portugal under the jurisdiction of Infraestruturas de Portugal (IP) are presented showing the capabilities of the approaches.
Challenges in scaling up biofuels infrastructure.
Richard, Tom L
2010-08-13
Rapid growth in demand for lignocellulosic bioenergy will require major changes in supply chain infrastructure. Even with densification and preprocessing, transport volumes by mid-century are likely to exceed the combined capacity of current agricultural and energy supply chains, including grain, petroleum, and coal. Efficient supply chains can be achieved through decentralized conversion processes that facilitate local sourcing, satellite preprocessing and densification for long-distance transport, and business models that reward biomass growers both nearby and afar. Integrated systems that are cost-effective and energy-efficient will require new ways of thinking about agriculture, energy infrastructure, and rural economic development. Implementing these integrated systems will require innovation and investment in novel technologies, efficient value chains, and socioeconomic and policy frameworks; all are needed to support an expanded biofuels infrastructure that can meet the challenges of scale.
A service-based BLAST command tool supported by cloud infrastructures.
Carrión, Abel; Blanquer, Ignacio; Hernández, Vicente
2012-01-01
Notwithstanding the benefits of distributed-computing infrastructures for empowering bioinformatics analysis tools with the needed computing and storage capability, the actual use of these infrastructures is still low. Learning curves and deployment difficulties have reduced the impact on the wide research community. This article presents a porting strategy of BLAST based on a multiplatform client and a service that provides the same interface as sequential BLAST, thus reducing learning curve and with minimal impact on their integration on existing workflows. The porting has been done using the execution and data access components from the EC project Venus-C and the Windows Azure infrastructure provided in this project. The results obtained demonstrate a low overhead on the global execution framework and reasonable speed-up and cost-efficiency with respect to a sequential version.
Defense Resource Management Studies: Introduction to Capability and Acquisition Planning Processes
2010-08-01
interchangeable and useful in a common contextual framework . Currently, both simulations use a common scenario, the same fictitious country, and...culture, legal framework , and institutions. • Incorporate Principles of Good Governance and Respect for Human Rights: Stress accountability and...Preparing for the assessments requires defining the missions to be analyzed; subdividing the mission definitions to provide a framework for analytic work
The Defense Science Board Task Force on Tactical Battlefield Communications
1999-12-01
impact of the system is clearly under appreciated. It could be the foundation for a common- user , QoS, Internet and could integrate legacy systems...into a common- user framework as is occurring in the private sector. Unfortunately, the networking aspects of the system are being lost; the focus...system-centric framework to a common- user , internetwork framework . Recommendation V—Information Security
DOE Office of Scientific and Technical Information (OSTI.GOV)
Chen, Xiaodong; Hossain, Faisal; Leung, L. Ruby
In this study a numerical modeling framework for simulating extreme storm events was established using the Weather Research and Forecasting (WRF) model. Such a framework is necessary for the derivation of engineering parameters such as probable maximum precipitation that are the cornerstone of large water management infrastructure design. Here this framework was built based on a heavy storm that occurred in Nashville (USA) in 2010, and verified using two other extreme storms. To achieve the optimal setup, several combinations of model resolutions, initial/boundary conditions (IC/BC), cloud microphysics and cumulus parameterization schemes were evaluated using multiple metrics of precipitation characteristics. Themore » evaluation suggests that WRF is most sensitive to IC/BC option. Simulation generally benefits from finer resolutions up to 5 km. At the 15km level, NCEP2 IC/BC produces better results, while NAM IC/BC performs best at the 5km level. Recommended model configuration from this study is: NAM or NCEP2 IC/BC (depending on data availability), 15km or 15km-5km nested grids, Morrison microphysics and Kain-Fritsch cumulus schemes. Validation of the optimal framework suggests that these options are good starting choices for modeling extreme events similar to the test cases. This optimal framework is proposed in response to emerging engineering demands of extreme storm events forecasting and analyses for design, operations and risk assessment of large water infrastructures.« less
Security and Cloud Outsourcing Framework for Economic Dispatch
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sarker, Mushfiqur R.; Wang, Jianhui; Li, Zuyi
The computational complexity and problem sizes of power grid applications have increased significantly with the advent of renewable resources and smart grid technologies. The current paradigm of solving these issues consist of inhouse high performance computing infrastructures, which have drawbacks of high capital expenditures, maintenance, and limited scalability. Cloud computing is an ideal alternative due to its powerful computational capacity, rapid scalability, and high cost-effectiveness. A major challenge, however, remains in that the highly confidential grid data is susceptible for potential cyberattacks when outsourced to the cloud. In this work, a security and cloud outsourcing framework is developed for themore » Economic Dispatch (ED) linear programming application. As a result, the security framework transforms the ED linear program into a confidentiality-preserving linear program, that masks both the data and problem structure, thus enabling secure outsourcing to the cloud. Results show that for large grid test cases the performance gain and costs outperforms the in-house infrastructure.« less
European security framework for healthcare.
Ruotsalainen, Pekka; Pohjonen, Hanna
2003-01-01
eHealth and telemedicine services are promising business areas in Europe. It is clear that eHealth products and services will be sold and ordered from a distance and over national borderlines in the future. However, there are many barriers to overcome. For both national and pan-European eHealth and telemedicine applications a common security framework is needed. These frameworks set security requirements needed for cross-border eHealth services. The next step is to build a security infrastructure which is independent of technical platforms. Most of the European eHealth platforms are regional or territorial. Some countries are looking for a Public Key Infrastructure, but no large scale solutions do exist in healthcare. There is no clear candidate solution for European-wide interoperable eHealth platform. Gross-platform integration seems to be the most practical integration method at a European level in the short run. The use of Internet as a European integration platform is a promising solution in the long run.
Security and Cloud Outsourcing Framework for Economic Dispatch
Sarker, Mushfiqur R.; Wang, Jianhui; Li, Zuyi; ...
2017-04-24
The computational complexity and problem sizes of power grid applications have increased significantly with the advent of renewable resources and smart grid technologies. The current paradigm of solving these issues consist of inhouse high performance computing infrastructures, which have drawbacks of high capital expenditures, maintenance, and limited scalability. Cloud computing is an ideal alternative due to its powerful computational capacity, rapid scalability, and high cost-effectiveness. A major challenge, however, remains in that the highly confidential grid data is susceptible for potential cyberattacks when outsourced to the cloud. In this work, a security and cloud outsourcing framework is developed for themore » Economic Dispatch (ED) linear programming application. As a result, the security framework transforms the ED linear program into a confidentiality-preserving linear program, that masks both the data and problem structure, thus enabling secure outsourcing to the cloud. Results show that for large grid test cases the performance gain and costs outperforms the in-house infrastructure.« less
Co-governing decentralised water systems: an analytical framework.
Yu, C; Brown, R; Morison, P
2012-01-01
Current discourses in urban water management emphasise a diversity of water sources and scales of infrastructure for resilience and adaptability. During the last 2 decades, in particular, various small-scale systems emerged and developed so that the debate has largely moved from centralised versus decentralised water systems toward governing integrated and networked systems of provision and consumption where small-scale technologies are embedded in large-scale centralised infrastructures. However, while centralised systems have established boundaries of ownership and management, decentralised water systems (such as stormwater harvesting technologies for the street, allotment/house scales) do not, therefore the viability for adoption and/or continued use of decentralised water systems is challenged. This paper brings together insights from the literature on public sector governance, co-production and social practices model to develop an analytical framework for co-governing such systems. The framework provides urban water practitioners with guidance when designing co-governance arrangements for decentralised water systems so that these systems continue to exist, and become widely adopted, within the established urban water regime.
NASA Astrophysics Data System (ADS)
Patton, J.; Yeck, W.; Benz, H.
2017-12-01
The U.S. Geological Survey National Earthquake Information Center (USGS NEIC) is implementing and integrating new signal detection methods such as subspace correlation, continuous beamforming, multi-band picking and automatic phase identification into near-real-time monitoring operations. Leveraging the additional information from these techniques help the NEIC utilize a large and varied network on local to global scales. The NEIC is developing an ordered, rapid, robust, and decentralized framework for distributing seismic detection data as well as a set of formalized formatting standards. These frameworks and standards enable the NEIC to implement a seismic event detection framework that supports basic tasks, including automatic arrival time picking, social media based event detections, and automatic association of different seismic detection data into seismic earthquake events. In addition, this framework enables retrospective detection processing such as automated S-wave arrival time picking given a detected event, discrimination and classification of detected events by type, back-azimuth and slowness calculations, and ensuring aftershock and induced sequence detection completeness. These processes and infrastructure improve the NEIC's capabilities, accuracy, and speed of response. In addition, this same infrastructure provides an improved and convenient structure to support access to automatic detection data for both research and algorithmic development.
A flexible framework for process-based hydraulic and water ...
Background Models that allow for design considerations of green infrastructure (GI) practices to control stormwater runoff and associated contaminants have received considerable attention in recent years. While popular, generally, the GI models are relatively simplistic. However, GI model predictions are being relied upon by many municipalities and State/Local agencies to make decisions about grey vs. green infrastructure improvement planning. Adding complexity to GI modeling frameworks may preclude their use in simpler urban planning situations. Therefore, the goal here was to develop a sophisticated, yet flexible tool that could be used by design engineers and researchers to capture and explore the effect of design factors and properties of the media used in the performance of GI systems at a relatively small scale. We deemed it essential to have a flexible GI modeling tool that is capable of simulating GI system components and specific biophysical processes affecting contaminants such as reactions, and particle-associated transport accurately while maintaining a high degree of flexibly to account for the myriad of GI alternatives. The mathematical framework for a stand-alone GI performance assessment tool has been developed and will be demonstrated.Framework Features The process-based model framework developed here can be used to model a diverse range of GI practices such as green roof, retention pond, bioretention, infiltration trench, permeable pavement and
A New Time-varying Concept of Risk in a Changing Climate.
Sarhadi, Ali; Ausín, María Concepción; Wiper, Michael P
2016-10-20
In a changing climate arising from anthropogenic global warming, the nature of extreme climatic events is changing over time. Existing analytical stationary-based risk methods, however, assume multi-dimensional extreme climate phenomena will not significantly vary over time. To strengthen the reliability of infrastructure designs and the management of water systems in the changing environment, multidimensional stationary risk studies should be replaced with a new adaptive perspective. The results of a comparison indicate that current multi-dimensional stationary risk frameworks are no longer applicable to projecting the changing behaviour of multi-dimensional extreme climate processes. Using static stationary-based multivariate risk methods may lead to undesirable consequences in designing water system infrastructures. The static stationary concept should be replaced with a flexible multi-dimensional time-varying risk framework. The present study introduces a new multi-dimensional time-varying risk concept to be incorporated in updating infrastructure design strategies under changing environments arising from human-induced climate change. The proposed generalized time-varying risk concept can be applied for all stochastic multi-dimensional systems that are under the influence of changing environments.
Channeling the Innovation Stream: A Decision Framework for Selecting Emerging Technologies
ERIC Educational Resources Information Center
Sauer, Philip S.
2010-01-01
The proliferation of emerging technologies offers opportunity but also presents challenges to defense acquisition decision makers seeking to incorporate those technologies as part of the acquisition process. Assessment frameworks and methodologies found in the literature typically address the primary focus of a sponsoring organization's interest…
Translingual Literacy, Language Difference, and Matters of Agency
ERIC Educational Resources Information Center
Lu, Min-Zhan; Horner, Bruce
2013-01-01
We argue that composition scholarship's defenses of language differences in student writing reinforce dominant ideology's spatial framework conceiving language difference as deviation from a norm of sameness. We argue instead for adopting a temporal-spatial framework defining difference as the norm of utterances, and defining languages,…
UNH Data Cooperative: A Cyber Infrastructure for Earth System Studies
NASA Astrophysics Data System (ADS)
Braswell, B. H.; Fekete, B. M.; Prusevich, A.; Gliden, S.; Magill, A.; Vorosmarty, C. J.
2007-12-01
Earth system scientists and managers have a continuously growing demand for a wide array of earth observations derived from various data sources including (a) modern satellite retrievals, (b) "in-situ" records, (c) various simulation outputs, and (d) assimilated data products combining model results with observational records. The sheer quantity of data, and formatting inconsistencies make it difficult for users to take full advantage of this important information resource. Thus the system could benefit from a thorough retooling of our current data processing procedures and infrastructure. Emerging technologies, like OPeNDAP and OGC map services, open standard data formats (NetCDF, HDF) data cataloging systems (NASA-Echo, Global Change Master Directory, etc.) are providing the basis for a new approach in data management and processing, where web- services are increasingly designed to serve computer-to-computer communications without human interactions and complex analysis can be carried out over distributed computer resources interconnected via cyber infrastructure. The UNH Earth System Data Collaborative is designed to utilize the aforementioned emerging web technologies to offer new means of access to earth system data. While the UNH Data Collaborative serves a wide array of data ranging from weather station data (Climate Portal) to ocean buoy records and ship tracks (Portsmouth Harbor Initiative) to land cover characteristics, etc. the underlaying data architecture shares common components for data mining and data dissemination via web-services. Perhaps the most unique element of the UNH Data Cooperative's IT infrastructure is its prototype modeling environment for regional ecosystem surveillance over the Northeast corridor, which allows the integration of complex earth system model components with the Cooperative's data services. While the complexity of the IT infrastructure to perform complex computations is continuously increasing, scientists are often forced to spend considerable amount of time to solve basic data management and preprocessing tasks and deal with low level computational design problems like parallelization of model codes. Our modeling infrastructure is designed to take care the bulk of the common tasks found in complex earth system models like I/O handling, computational domain and time management, parallel execution of the modeling tasks, etc. The modeling infrastructure allows scientists to focus on the numerical implementation of the physical processes on a single computational objects(typically grid cells) while the framework takes care of the preprocessing of input data, establishing of the data exchange between computation objects and the execution of the science code. In our presentation, we will discuss the key concepts of our modeling infrastructure. We will demonstrate integration of our modeling framework with data services offered by the UNH Earth System Data Collaborative via web interfaces. We will layout the road map to turn our prototype modeling environment into a truly community framework for wide range of earth system scientists and environmental managers.
Setting the stage for the EPOS ERIC: Integration of the legal, governance and financial framework
NASA Astrophysics Data System (ADS)
Atakan, Kuvvet; Bazin, Pierre-Louis; Bozzoli, Sabrina; Freda, Carmela; Giardini, Domenico; Hoffmann, Thomas; Kohler, Elisabeth; Kontkanen, Pirjo; Lauterjung, Jörn; Pedersen, Helle; Saleh, Kauzar; Sangianantoni, Agata
2017-04-01
EPOS - the European Plate Observing System - is the ESFRI infrastructure serving the need of the solid Earth science community at large. The EPOS mission is to create a single sustainable, and distributed infrastructure that integrates the diverse European Research Infrastructures for solid Earth science under a common framework. Thematic Core Services (TCS) and Integrated Core Services (Central Hub, ICS-C and Distributed, ICS-D) are key elements, together with NRIs (National Research Infrastructures), in the EPOS architecture. Following the preparatory phase, EPOS has initiated formal steps to adopt an ERIC legal framework (European Research Infrastructure Consortium). The statutory seat of EPOS will be in Rome, Italy, while the ICS-C will be jointly operated by France, UK and Denmark. The TCS planned so far cover: seismology, near-fault observatories, GNSS data and products, volcano observations, satellite data, geomagnetic observations, anthropogenic hazards, geological information modelling, multiscale laboratories and geo-energy test beds for low carbon energy. In the ERIC process, EPOS and all its services must achieve sustainability from a legal, governance, financial, and technical point of view, as well as full harmonization with national infrastructure roadmaps. As EPOS is a distributed infrastructure, the TCSs have to be linked to the future EPOS ERIC from legal and governance perspectives. For this purpose the TCSs have started to organize themselves as consortia and negotiate agreements to define the roles of the different actors in the consortium as well as their commitment to contribute to the EPOS activities. The link to the EPOS ERIC shall be made by service agreements of dedicated Service Providers. A common EPOS data policy has also been developed, based on the general principles of Open Access and paying careful attention to licensing issues, quality control, and intellectual property rights, which shall apply to the data, data products, software and services (DDSS) accessible through EPOS. From a financial standpoint, EPOS elaborated common guidelines for all institutions providing services, and selected a costing model and funding approach which foresees a mixed support of the services via national contributions and ERIC membership fees. In the EPOS multi-disciplinary environment, harmonization and integration are required at different levels and with a variety of different stakeholders; to this purpose, a Service Coordination Board (SCB) and technical Harmonization Groups (HGs) were established to develop the EPOS metadata standards with the EPOS Integrated Central Services, and to harmonize data and product standards with other projects at European and international level, including e.g. ENVRI+, EUDAT and EarthCube (US).
In Support of the Common Defense: Homeland Defense and Security Journal. Volume 1
2012-04-01
been, “When the nation is least ready, we must be most ready.” While that rings clear as far as warfare is concerned, it is not nearly so when it...JP) 5.0, Joint Operational Planning, and then examines Colonel John A. Warden III’s theory 28 In Support of the Common Defense (Five Ring Model) of...by a discussion of how an adaptation of Warden’s Five Ring Model can be used as a viable framework to assist in a more comprehensive risk
ERIC Educational Resources Information Center
Benson, Martin K.
2010-01-01
The purpose of the descriptive case study with a multiple case framework was to (a) describe the organizational cultures of education programs and leaders in the United States (U.S.) Department of Defense (DoD) voluntary education system on Oahu, Hawaii; (b) determine if an overlapping common organizational culture exists; and (c) assess the…
2001-01-01
improving defense management requires decentralizing the pursuit of efficiency on a framework of strategic planning, cost accounting , and performance...Office (GAO) report (1999) questions whether assumed sav- ings figures may be overly optimistic in not sufficiently accounting for the costs of...inputs�.� money and personnel spaces from opera- tions and maintenance (O&M) budget lines? Without better systems to account for costs and to measure
Defense Procurement: An Analysis of Contract Management Internal Controls
2015-03-22
monitoring activities component of the internal control framework. Acquisition Research Program Graduate School of Business & Public Policy - 7...Research Program Graduate School of Business & Public Policy - 24 - Naval Postgraduate School Tan, L. H. J. (2013). An analysis of internal controls and...Naval Postgraduate School, Monterey, CA 93943. Defense Procurement: An Analysis of Contract Management Internal Controls 22 March 2015 Dr. Juanita
Internet Civil Defense: Feasibility Study
2002-12-09
quell spread of false rumors that induce fear. Summary: Internet Civil Defense can help to manage fear in various ways. We can continuously poll...timely information to minimize rumors and accelerate recovery from disasters. ICD will create an “umbrella” framework to raise the overall...information to minimize rumors and accelerate recovery from disasters. Overall, ICD will collect and deliver actionable information to enhance public
Global Combat Support System-Marine Corps Logistics Chain Management Increment 1 (GCSS-MC LCM Inc 1)
2016-03-01
Production Document DAE - Defense Acquisition Executive DoD - Department of Defense DoDAF - DoD Architecture Framework FD - Full Deployment FDD ...Jul 2004 Milestone B Jun 2007 Jun 2007 Milestone C May 2010 May 2010 FDD Sep 2014 Mar 2015 FD Dec 2015 Dec 2015 GCSS-MC LCM Inc 1 2016 MAR
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hadley, Mark D.; Clements, Samuel L.
2009-01-01
Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less
Biodiversity analysis in the digital era
2016-01-01
This paper explores what the virtual biodiversity e-infrastructure will look like as it takes advantage of advances in ‘Big Data’ biodiversity informatics and e-research infrastructure, which allow integration of various taxon-level data types (genome, morphology, distribution and species interactions) within a phylogenetic and environmental framework. By overcoming the data scaling problem in ecology, this integrative framework will provide richer information and fast learning to enable a deeper understanding of biodiversity evolution and dynamics in a rapidly changing world. The Atlas of Living Australia is used as one example of the advantages of progressing towards this future. Living in this future will require the adoption of new ways of integrating scientific knowledge into societal decision making. This article is part of the themed issue ‘From DNA barcodes to biomes’. PMID:27481789
2012-01-01
Brief analysis of the legal framework in recent years, both in the sphere of technical regulation, and in the field of sanitary and epidemiological welfare of the population is presented in this article. The necessity of inclusion in the technical regulations for the safety of railway rolling stock and elements of railway infrastructure the requirements for sanitary-epidemiological safety and hygiene regulations has been proved. Fragments of technical regulations for railway equipment and infrastructure elements, including the basic requirements for the sanitary-epidemiological security are presented. The position of authors in the processing of the regulatory framework in the field of sanitary-epidemiological welfare of population in standardization documents in accordance with the requirements of federal law "On technical regulation" has been reflected.
ERIC Educational Resources Information Center
Yuan, S.; Lai, M.C.; Heusel, K.
2011-01-01
In 2006, the Hawai'i State Department of Health (DOH) received the Strategic Prevention Framework State Incentive Grant (SPF-SIG) from the Substance Abuse and Mental Health Services Administration (SAMHSA) to establish a comprehensive, coordinated, and sustainable substance abuse prevention infrastructure in Hawai'i. The SPF-SIG Project is funded…
A data management infrastructure for bridge monitoring
NASA Astrophysics Data System (ADS)
Jeong, Seongwoon; Byun, Jaewook; Kim, Daeyoung; Sohn, Hoon; Bae, In Hwan; Law, Kincho H.
2015-04-01
This paper discusses a data management infrastructure framework for bridge monitoring applications. As sensor technologies mature and become economically affordable, their deployment for bridge monitoring will continue to grow. Data management becomes a critical issue not only for storing the sensor data but also for integrating with the bridge model to support other functions, such as management, maintenance and inspection. The focus of this study is on the effective data management of bridge information and sensor data, which is crucial to structural health monitoring and life cycle management of bridge structures. We review the state-of-the-art of bridge information modeling and sensor data management, and propose a data management framework for bridge monitoring based on NoSQL database technologies that have been shown useful in handling high volume, time-series data and to flexibly deal with unstructured data schema. Specifically, Apache Cassandra and Mongo DB are deployed for the prototype implementation of the framework. This paper describes the database design for an XML-based Bridge Information Modeling (BrIM) schema, and the representation of sensor data using Sensor Model Language (SensorML). The proposed prototype data management framework is validated using data collected from the Yeongjong Bridge in Incheon, Korea.
A Framework for Debugging Geoscience Projects in a High Performance Computing Environment
NASA Astrophysics Data System (ADS)
Baxter, C.; Matott, L.
2012-12-01
High performance computing (HPC) infrastructure has become ubiquitous in today's world with the emergence of commercial cloud computing and academic supercomputing centers. Teams of geoscientists, hydrologists and engineers can take advantage of this infrastructure to undertake large research projects - for example, linking one or more site-specific environmental models with soft computing algorithms, such as heuristic global search procedures, to perform parameter estimation and predictive uncertainty analysis, and/or design least-cost remediation systems. However, the size, complexity and distributed nature of these projects can make identifying failures in the associated numerical experiments using conventional ad-hoc approaches both time- consuming and ineffective. To address these problems a multi-tiered debugging framework has been developed. The framework allows for quickly isolating and remedying a number of potential experimental failures, including: failures in the HPC scheduler; bugs in the soft computing code; bugs in the modeling code; and permissions and access control errors. The utility of the framework is demonstrated via application to a series of over 200,000 numerical experiments involving a suite of 5 heuristic global search algorithms and 15 mathematical test functions serving as cheap analogues for the simulation-based optimization of pump-and-treat subsurface remediation systems.
War-gaming application for future space systems acquisition
NASA Astrophysics Data System (ADS)
Nguyen, Tien M.; Guillen, Andy T.
2016-05-01
Recently the U.S. Department of Defense (DOD) released the Defense Innovation Initiative (DII) [1] to focus DOD on five key aspects; Aspect #1: Recruit talented and innovative people, Aspect #2: Reinvigorate war-gaming, Aspect #3: Initiate long-range research and development programs, Aspect #4: Make DOD practices more innovative, and Aspect #5: Advance technology and new operational concepts. Per DII instruction, this paper concentrates on Aspect #2 and Aspect #4 by reinvigorating the war-gaming effort with a focus on an innovative approach for developing the optimum Program and Technical Baselines (PTBs) and their corresponding optimum acquisition strategies for acquiring future space systems. The paper describes a unified approach for applying the war-gaming concept for future DOD acquisition of space systems. The proposed approach includes a Unified Game-based Acquisition Framework (UGAF) and an Advanced Game-Based Mathematical Framework (AGMF) using Bayesian war-gaming engines to optimize PTB solutions and select the corresponding optimum acquisition strategies for acquiring a space system. The framework defines the action space for all players with a complete description of the elements associated with the games, including Department of Defense Acquisition Authority (DAA), stakeholders, warfighters, and potential contractors, War-Gaming Engines (WGEs) played by DAA, WGEs played by Contractor (KTR), and the players' Payoff and Cost functions (PCFs). The AGMF presented here addresses both complete and incomplete information cases. The proposed framework provides a recipe for the DAA and USAF-Space and Missile Systems Center (SMC) to acquire future space systems optimally.
Development of a Resource Manager Framework for Adaptive Beamformer Selection
2013-12-27
DEVELOPMENT OF A RESOURCE MANAGER FRAMEWORK FOR ADAPTIVE BEAMFORMER SELECTION DISSERTATION Jeremy P. Stringer, Major, USAF AFIT-ENG-DS-13-D-01...Force, the United States Department of Defense or the United States Government. AFIT-ENG-DS-13-D-01 DEVELOPMENT OF A RESOURCE MANAGER FRAMEWORK FOR...ADAPTIVE BEAMFORMER SELECTION DISSERTATION Presented to the Faculty Graduate School of Engineering and Management Air Force Institute of Technology Air
Knowledge-Based Decision Support in Department of Defense Acquisitions
2010-09-01
from the analysis framework developed by Miles and Huberman (1994). The framework describes the major phases of data analysis as data reduction, data... Miles and Huberman , 1994) Survey Effort For this research effort, the survey data was obtained from SAF/ACPO (Air Force Acquisition Chief...rank O-6/GS-15 or above. Data Reduction and Content Analysis Within the Miles and Huberman (1994) framework, the researcher used Microsoft
A Space Surveillance Ontology: Captured in an XML Schema
2000-10-01
characterization in a way most appropriate to a sub- domain. 6. The commercial market is embracing XML, and the military can take advantage of this significant...the space surveillance ontology effort to two key efforts: the Defense Information Infrastructure Common Operating Environment (DII COE) XML...strongly believe XML schemas will supplant them. Some of the advantages that XML schemas provide over DTDs include: • Strong data typing: The XML Schema
Solving Defender-Attacker-Defender Models for Infrastructure Defense
2011-01-01
PRA,” also 28 Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to...information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports , 1215... REPORT DATE 2011 2. REPORT TYPE 3. DATES COVERED 00-00-2011 to 00-00-2011 4. TITLE AND SUBTITLE Solving Defender-Attacker-Defender Models for
Applied Hypergame Theory for Network Defense
2013-06-01
information technology infrastructure as they are perhaps the most wired country on the planet . Government websites, banking systems, and even media...a long way from the simple lone youth down in the basement causing mischief. Organized swaths of intelligent computer savvy attackers now exist and...out of the five hypergames choose the hyperstrategy that is the same as the full game MSNE, with the Mid-Level defender being the lone difference. Thus
Addressing Emerging Infectious Disease Threats A Strategic Plan for the Department of Defense
1998-01-01
Yellow fever in Peru 1995 Leptospirosis in Nicaragua 1995 Japanese encephalitis in Australia 1995 Ebola hemorrhagic fever in Democratic Republic of...unusual or emerging condition being recognized promptly. The necessary infrastructure • Falciparum malaria in Peru includes trained personnel...espe- nearly 700 persons and are based in Thailand, cially as the number of effective drugs for prophy- Indonesia, Kenya, Egypt, Brazil, and Peru and
Defense Infrastructure: DOD Efforts to Prevent and Mitigate Encroachment at Its Installations
2016-11-01
protected habitat, climate change, urban development, and airborne noise. DOD, the military services, and individual installations have a number of...carrying out realistic training because of the cumulative effect of outside influences —such as encroachment from urban growth—that GAO refers to in...airborne noise, urban growth, physical obstructions, and renewable energy projects. DOD Directive 3200.15, Sustaining Access to the Live Training and Test
JPRS Report Proliferation Issues
1991-12-02
Nuclear Arms [Sao Paulo FOLHA DE SAO PAULO 11 Nov] 36 Ukraine Official Views Defense Plans, Nuclear Weapons [Prague RUDE PRAVO 7Nov] 36 Yakutsk...1992 92WP0057A Sao Paulo GAZETA MERCANTIL in Portuguese 22 Oct 91 p 15 [Article by Sao Paulo correspondent Luis Leonel] [Text] The 1992 budget for...Misinterpretation He explained that Minister of the Infrastructure Joao Santana had been misinterpreted when he said two weeks ago that the
National Security Strategy of the United States of America
2017-12-18
require fossil fuels, as well as other forms of energy, to power their economies and lift their people out of pover . e United States will...is tyr- anny. For these reasons, our Founders crafted and ratified the Constitution, establishing the repub- lican form of government we enjoy today...it continues to trans- form the future for all nations and all genera- tions. A strong, defensible cyber infrastructure fosters economic growth
Defense Infrastructure: Actions Needed to Strengthen Utility Resilience Planning
2016-11-01
and design , historical architecture and materials, and overhead; and inflation adjustments. 6We obtained and analyzed records from DOD’s Real...the impacts of those disruptions, and the characteristics of the DOD-owned utility systems, among other things. To inform the design of our survey...managing and operating DOD-owned utility systems. Furthermore, the survey instrument was independently reviewed by a survey design expert within GAO. We
Improving Defense Health Program Medical Research Processes
2017-08-08
needed for DHP medical research , such as the Army’s Clinical and Translational Research Program Office, 38 the Navy’s Research Methods Training Program... research stated, “key infrastructure for a learning health system will encompass three core elements: data networks, methods , and workforce.” 221 A 2012... Research Methods Training Program, 132 which will be further discussed in Appendix D.2. AIR FORCE Air Force Instruction 40-402, Protection of
2017-01-01
fast food restaurants . Because these projects are not authorized and funded through the regular appropriations process for military construction...750,000 threshold for major projects. 5We selected this sample by identifying one project of each type—commissary; exchange; morale, welfare, and...of 212 possible projects. Further details of our selection process are found in appendix I. Page 3 GAO-17-76 Nonappropriated Fund
Recommended E3 HEMP Heave Electric Field Waveform for the Critical Infrastructures. Volume 2
2017-07-31
OF THE COMMISSION TO ASSESS THE THREAT TO THE UNITED STATES FROM ELECTROMAGNETIC PULSE (EMP) ATTACK The cover photo depicts Fishbowl Starfish...Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack. The Commission was established by Congress in the FY2001 National...Department of Defense E electric field EMP electromagnetic pulse EPRI Electric Power Research Institute FERC Federal Energy Regulatory Commission GMD
2013-04-01
auditing standards. Those standards require that we plan and perform the audit to obtain sufficient, appropriate evidence to provide a reasonable basis for...our findings and conclusions based on our audit objectives. We believe that the evidence obtained provides a reasonable basis for our findings and...majority of the project financing is obtained from financial institutions in the form of construction loans or military housing bonds. The servicemembers
Report of the Defense Science Board Task Force on Nuclear Deterrence Skills
2008-09-01
entail modeling and simulation capability analogous to that for weapon design. A minimum “national” nuclear weapons effects simulator enterprise...systems programs (design, develop, produce, deploy, and sustain) relies 18 I C HA P TE R 3 upon a variety of management models . For example, the Air...entry vehicle design, modeling and simulation efforts, command and control, launch system infrastructure, intermediate-range missile concepts, advanced
2007-11-27
underlying technical problem—perhaps as a syndrome (collection of symptoms ) or perhaps in terms of the underlying mechanism. The medical analogy is...be noted that the procuring contracting officer ( PCO ) at the Major Command headquarters, where the services acquisition was centrally planned and...executed, delegated the contract to the administrative contracting officer at the installation where the contract was administered. Thus, the PCO
China’s Air Force Enters the 21st Century.
1995-01-01
to Modernize? 136 Fighter Procurement 139 China’s Defense Industrial Infrastructure 141 The Chinese Weapon Development Cycle 144 Current...needs the same budgetary resources to develop its own technical and industrial capabilities for the future. With occasional exceptions, the aviation...compared to that of the major industrial powers. Moreover, the ground forces are still the dominant service and might resist in- creased spending on the
2007-02-01
neurosciences , 12 I CH APT ER 2 particularly those analytic elements that create models to assist in understanding individual and...precision geo-location 10. Cause-effect models (environment, infrastructure, socio-cultural, DIME, PMESII) 11. Storytelling , gisting and advanced...sources/TRL 5 Storytelling , gisting and advanced visualization)/TRL 2-5 High fidelity, socio-culturally relevant immersive games, training and mission
Protecting Critical Rail Infrastructure
2006-12-01
Gulliver.Trb.Org/Publications/Sr/Sr270.Pdf. 38. Allan J. DeBlasio, Terrance J. Regan, Margaret E . Zirker, Katherine S. Fichter, Kristin Lovejoy ...getrpt?GAO-04-598T. 4. Ibid. 5. Thomas H. Kean, Lee H. Hamilton, Richard Ben-Veniste, Fred F. Fielding, Jamie S. Gorelick, Slade Gorton, Bob Kerrey...Committee, Current and Projected National Security Threats to the United States, Vice Admiral Lowell E . Jacoby, United States Navy, Director, Defense
Aligning Infrastructure Decisions with Strategic Vision
2012-03-22
last ten years and produced several documents such as: Global Defense Posture Review ( GDPR ), Overseas Basing Commission Report, Base Realignment and...significant force structure changes in the form of GDPR , Army Modular Force, and the ARFORGEN process. These concurrent demands forced a holistic...returning to domestic bases as part of the GDPR and the reduction of leased space in the DoD portfolio.26 BRAC 2005 demonstrated failures in cost
Evaluating the Impact of the Department of Defense Regional Centers for Security Studies
2014-01-01
herein are protected by law as indicated in a notice appearing later in this work. This electronic representation of RAND intellectual property is... CARE INFRASTRUCTURE AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND...images: © Jezper, Fotolia.com © Copyright 2014 RAND Corporation This document and trademark(s) contained herein are protected by law. This representation
T-dominance: Prioritized Defense Deployment for BYOD Security (Post Print)
2013-10-01
infrastructure. Employees’ demand/ satisfaction , decreased IT acquisition and support cost, and increased use of cloud/virtualization technologies in...example, a report [8] on hijacking hotel Wi-Fi hotspots for drive-by malware attacks on laptops comes close to what we have in mind; practical man-in...obtaining unwarranted privilege, are often ignored for convenience, or circumvented for customization by the users. Rootkits, like iOS Jailbreak5, are
Tanichi, Masaaki; Tatsuki, Toshitaka; Saito, Taku; Wakizono, Tomoki; Shigemura, Jun
2012-01-01
We assessed the core factors necessary for mental health of disaster workers according to the following experiences: 1) the Japan Self-Defense Force (JSDF) disaster relief missions associated with the Great East Japan Earthquake and the Haiti peacekeeping deployment associated with the Great Haiti Earthquake, 2) conformations of the peacekeeping mission units of various countries deployed to Haiti, and 3) JSDF assistance activities to the Japanese earthquake victims. We learned that the basic life needs were the major premises for maintaining the mental health of the disaster workers. Food, drinking supplies, medical supplies were particularly crucial, yet overlooked in Japanese worker settings compared with forces of other countries. Conversely, the workers tend to feel guilty (moushi wake nai) for the victims when their basic life infrastructures are better than those of the victims. The Japanese workers and disaster victims both tend to find comfort in styles based on their culture, in particular, open-air baths and music performances. When planning workers' environments in disaster settings, provision of basic infrastructure should be prioritized, yet a sense of balance based on cultural background may be useful to enhance the workers' comfort and minimize their guilt.
Review of flat panel display programs and defense applications
NASA Astrophysics Data System (ADS)
Gnade, Bruce; Schulze, Raymond; Henderson, Girardeau L.; Hopper, Darrel G.
1997-07-01
Flat panel display research has comprised a substantial portion of the national investment in new technology for economic and national security for the past nine years. These investments have ben made principally via several Defense Advanced Research Projects Agency (DARPA) programs, known collectively as the continuing High Definition Systems Program, and the Office of the Secretary of Defense Production Act Title III Program. Using input from the Army, Navy, and Air Force to focus research and identify insertion opportunities, DARPA and the Title III Program Office have made investments to develop the national technology base and manufacturing infrastructure necessary to meet the twin challenge of providing affordable displays in current systems and enabling the DoD strategy of winning future conflicts by getting more information to all participants during the battle. These research programs are reviewed and opportunities for applications are described. Future technology development, transfer, and transition requirements are identified. Strategy and vision are documented to assist the identification of areas meriting further consideration.
Applying Aspect-Oriented Programming to Intelligent Synthesis
NASA Technical Reports Server (NTRS)
Filman, Robert E.; Norvig, Peter (Technical Monitor)
2000-01-01
I discuss a component-centered, aspect-oriented system, the Object Infrastructure Framework (OIF), NASA's initiative on Intelligent Synthesis Environments (ISE), and the application of OIF to the architecture of ISE.
Züst, Tobias; Agrawal, Anurag A
2017-04-28
Costs of defense are central to our understanding of interactions between organisms and their environment, and defensive phenotypes of plants have long been considered to be constrained by trade-offs that reflect the allocation of limiting resources. Recent advances in uncovering signal transduction networks have revealed that defense trade-offs are often the result of regulatory "decisions" by the plant, enabling it to fine-tune its phenotype in response to diverse environmental challenges. We place these results in the context of classic studies in ecology and evolutionary biology, and propose a unifying framework for growth-defense trade-offs as a means to study the plant's allocation of limiting resources. Pervasive physiological costs constrain the upper limit to growth and defense traits, but the diversity of selective pressures on plants often favors negative correlations at intermediate trait levels. Despite the ubiquity of underlying costs of defense, the current challenge is using physiological and molecular approaches to predict the conditions where they manifest as detectable trade-offs.
NASA Astrophysics Data System (ADS)
Hodgkins, Alex Liam; Diez, Victor; Hegner, Benedikt
2012-12-01
The Software Process & Infrastructure (SPI) project provides a build infrastructure for regular integration testing and release of the LCG Applications Area software stack. In the past, regular builds have been provided using a system which has been constantly growing to include more features like server-client communication, long-term build history and a summary web interface using present-day web technologies. However, the ad-hoc style of software development resulted in a setup that is hard to monitor, inflexible and difficult to expand. The new version of the infrastructure is based on the Django Python framework, which allows for a structured and modular design, facilitating later additions. Transparency in the workflows and ease of monitoring has been one of the priorities in the design. Formerly missing functionality like on-demand builds or release triggering will support the transition to a more agile development process.
Insights from nature for cybersecurity.
Rzeszutko, Elżbieta; Mazurczyk, Wojciech
2015-01-01
The alarming rise in the quantity of malware in the past few years poses a serious challenge to the security community and requires urgent response. However, current countermeasures seem no longer to be effective. Thus, it is our belief that it is now time for researchers and security experts to turn to nature in the search for novel inspiration for defense systems. Nature has provided species with a whole range of offensive and defensive techniques, which have been developing and improving over the course of billions of years of evolution. Extremely diverse living conditions have promoted a large variation in the devised biosecurity solutions. In this article we introduce a novel Protection framework in which common denominators of the encountered offensive and defensive means are proposed and presented. The bio-inspired solutions are discussed in the context of cybersecurity, where some principles have already been adopted. The deployment of the whole nature-based framework should aid in the design and improvement of modern cyberdefense systems.
50 CFR 86.100 - What is the National Framework?
Code of Federal Regulations, 2010 CFR
2010-10-01
... (CONTINUED) FINANCIAL ASSISTANCE-WILDLIFE SPORT FISH RESTORATION PROGRAM BOATING INFRASTRUCTURE GRANT (BIG.... Through a State survey, you must conduct a boating access needs assessment or data collection to determine...
50 CFR 86.100 - What is the National Framework?
Code of Federal Regulations, 2011 CFR
2011-10-01
... (CONTINUED) FINANCIAL ASSISTANCE-WILDLIFE SPORT FISH RESTORATION PROGRAM BOATING INFRASTRUCTURE GRANT (BIG.... Through a State survey, you must conduct a boating access needs assessment or data collection to determine...
50 CFR 86.100 - What is the National Framework?
Code of Federal Regulations, 2012 CFR
2012-10-01
... (CONTINUED) FINANCIAL ASSISTANCE-WILDLIFE SPORT FISH RESTORATION PROGRAM BOATING INFRASTRUCTURE GRANT (BIG.... Through a State survey, you must conduct a boating access needs assessment or data collection to determine...
NASA Astrophysics Data System (ADS)
Herman, J. D.; Zeff, H. B.; Reed, P. M.; Characklis, G. W.
2013-12-01
In the Eastern United States, water infrastructure and institutional frameworks have evolved in a historically water-rich environment. However, large regional droughts over the past decade combined with continuing population growth have marked a transition to a state of water scarcity, for which current planning paradigms are ill-suited. Significant opportunities exist to improve the efficiency of water infrastructure via regional coordination, namely, regional 'portfolios' of water-related assets such as reservoirs, conveyance, conservation measures, and transfer agreements. Regional coordination offers the potential to improve reliability, cost, and environmental impact in the expected future state of the world, and, with informed planning, to improve robustness to future uncertainty. In support of this challenge, this study advances a multi-agent many-objective robust decision making (multi-agent MORDM) framework that blends novel computational search and uncertainty analysis tools to discover flexible, robust regional portfolios. Our multi-agent MORDM framework is demonstrated for four water utilities in the Research Triangle region of North Carolina, USA. The utilities supply nearly two million customers and have the ability to interact with one another via transfer agreements and shared infrastructure. We show that strategies for this region which are Pareto-optimal in the expected future state of the world remain vulnerable to performance degradation under alternative scenarios of deeply uncertain hydrologic and economic factors. We then apply the Patient Rule Induction Method (PRIM) to identify which of these uncertain factors drives the individual and collective vulnerabilities for the four cooperating utilities. Our results indicate that clear multi-agent tradeoffs emerge for attaining robustness across the utilities. Furthermore, the key factor identified for improving the robustness of the region's water supply is cooperative demand reduction. This type of approach is critically important given the risks and challenges posed by rising supply development costs, limits on new infrastructure, growing water demands and the underlying uncertainties associated with climate change. The proposed framework serves as a planning template for other historically water-rich regions which must now confront the reality of impending water scarcity.
NASA Astrophysics Data System (ADS)
Little, J. C.; Filz, G. M.
2016-12-01
As modern societies become more complex, critical interdependent infrastructure systems become more likely to fail under stress unless they are designed and implemented to be resilient. Hurricane Katrina clearly demonstrated the catastrophic and as yet unpredictable consequences of such failures. Resilient infrastructure systems maintain the flow of goods and services in the face of a broad range of natural and manmade hazards. In this presentation, we illustrate a generic computational framework to facilitate high-level decision-making about how to invest scarce resources most effectively to enhance resilience in coastal protection, transportation, and the economy of a region. Coastal Louisiana, our study area, has experienced the catastrophic effects of several land-falling hurricanes in recent years. In this project, we implement and further refine three process models (a coastal protection model, a transportation model, and an economic model) for the coastal Louisiana region. We upscale essential mechanistic features of the three detailed process models to the systems level and integrate the three reduced-order systems models in a modular fashion. We also evaluate the proposed approach in annual workshops with input from stakeholders. Based on stakeholder inputs, we derive a suite of goals, targets, and indicators for evaluating resilience at the systems level, and assess and enhance resilience using several deterministic scenarios. The unifying framework will be able to accommodate the different spatial and temporal scales that are appropriate for each model. We combine our generic computational framework, which encompasses the entire system of systems, with the targets, and indicators needed to systematically meet our chosen resilience goals. We will start with targets that focus on technical and economic systems, but future work will ensure that targets and indicators are extended to other dimensions of resilience including those in the environmental and social systems. The overall model can be used to optimize decision making in a probabilistic risk-based framework.
System architecture of communication infrastructures for PPDR organisations
NASA Astrophysics Data System (ADS)
Müller, Wilmuth
2017-04-01
The growing number of events affecting public safety and security (PS and S) on a regional scale with potential to grow up to large scale cross border disasters puts an increased pressure on organizations responsible for PS and S. In order to respond timely and in an adequate manner to such events Public Protection and Disaster Relief (PPDR) organizations need to cooperate, align their procedures and activities, share the needed information and be interoperable. Existing PPDR/PMR technologies do not provide broadband capability, which is a major limitation in supporting new services hence new information flows and currently they have no successor. There is also no known standard that addresses interoperability of these technologies. The paper at hands provides an approach to tackle the above mentioned aspects by defining an Enterprise Architecture (EA) of PPDR organizations and a System Architecture of next generation PPDR communication networks for a variety of applications and services on broadband networks, including the ability of inter-system, inter-agency and cross-border operations. The Open Safety and Security Architecture Framework (OSSAF) provides a framework and approach to coordinate the perspectives of different types of stakeholders within a PS and S organization. It aims at bridging the silos in the chain of commands and on leveraging interoperability between PPDR organizations. The framework incorporates concepts of several mature enterprise architecture frameworks including the NATO Architecture Framework (NAF). However, OSSAF is not providing details on how NAF should be used for describing the OSSAF perspectives and views. In this contribution a mapping of the NAF elements to the OSSAF views is provided. Based on this mapping, an EA of PPDR organizations with a focus on communication infrastructure related capabilities is presented. Following the capability modeling, a system architecture for secure and interoperable communication infrastructures for PPDR organizations is presented. This architecture was implemented within a project sponsored by the European Union and successfully demonstrated in a live validation exercise in June 2016.
Analyzing Cyber Security Threats on Cyber-Physical Systems Using Model-Based Systems Engineering
NASA Technical Reports Server (NTRS)
Kerzhner, Aleksandr; Pomerantz, Marc; Tan, Kymie; Campuzano, Brian; Dinkel, Kevin; Pecharich, Jeremy; Nguyen, Viet; Steele, Robert; Johnson, Bryan
2015-01-01
The spectre of cyber attacks on aerospace systems can no longer be ignored given that many of the components and vulnerabilities that have been successfully exploited by the adversary on other infrastructures are the same as those deployed and used within the aerospace environment. An important consideration with respect to the mission/safety critical infrastructure supporting space operations is that an appropriate defensive response to an attack invariably involves the need for high precision and accuracy, because an incorrect response can trigger unacceptable losses involving lives and/or significant financial damage. A highly precise defensive response, considering the typical complexity of aerospace environments, requires a detailed and well-founded understanding of the underlying system where the goal of the defensive response is to preserve critical mission objectives in the presence of adversarial activity. In this paper, a structured approach for modeling aerospace systems is described. The approach includes physical elements, network topology, software applications, system functions, and usage scenarios. We leverage Model-Based Systems Engineering methodology by utilizing the Object Management Group's Systems Modeling Language to represent the system being analyzed and also utilize model transformations to change relevant aspects of the model into specialized analyses. A novel visualization approach is utilized to visualize the entire model as a three-dimensional graph, allowing easier interaction with subject matter experts. The model provides a unifying structure for analyzing the impact of a particular attack or a particular type of attack. Two different example analysis types are demonstrated in this paper: a graph-based propagation analysis based on edge labels, and a graph-based propagation analysis based on node labels.
Teleoncology in the Department of Defense: a tale of two systems.
Hunter, D C; Brustrom, J E; Goldsmith, B J; Davis, L J; Carlos, M; Ashley, E; Gardner, G; Gaal, I
1999-01-01
Two telemedicine networks were developed for the purpose of conducting multidisciplinary oncology ("teleoncology") conferences. The infrastructure of each system differed: one system was Internet-based; the other was delivered via Integrated Services Digital Network (ISDN) lines. The purpose of this study was to describe the infrastructure and cost, consultative process, technical aspects, and conference format of the two teleoncology programs. The two systems' technical aspects, participant satisfaction with the systems, and conference participation were compared qualitatively. Assessment of the technical aspects of the systems suggested that each had distinct advantages. Survey results indicated that provider satisfaction with the technical and logistical aspects of each type of teleoncology conference was high. The present study may prove helpful for individuals who are considering implementing their own teleoncology programs.
Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment
Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran
2013-01-01
Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation’s electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments. PMID:25685516
Cyber-physical security of Wide-Area Monitoring, Protection and Control in a smart grid environment.
Ashok, Aditya; Hahn, Adam; Govindarasu, Manimaran
2014-07-01
Smart grid initiatives will produce a grid that is increasingly dependent on its cyber infrastructure in order to support the numerous power applications necessary to provide improved grid monitoring and control capabilities. However, recent findings documented in government reports and other literature, indicate the growing threat of cyber-based attacks in numbers and sophistication targeting the nation's electric grid and other critical infrastructures. Specifically, this paper discusses cyber-physical security of Wide-Area Monitoring, Protection and Control (WAMPAC) from a coordinated cyber attack perspective and introduces a game-theoretic approach to address the issue. Finally, the paper briefly describes how cyber-physical testbeds can be used to evaluate the security research and perform realistic attack-defense studies for smart grid type environments.
A systems framework for national assessment of climate risks to infrastructure.
Dawson, Richard J; Thompson, David; Johns, Daniel; Wood, Ruth; Darch, Geoff; Chapman, Lee; Hughes, Paul N; Watson, Geoff V R; Paulson, Kevin; Bell, Sarah; Gosling, Simon N; Powrie, William; Hall, Jim W
2018-06-13
Extreme weather causes substantial adverse socio-economic impacts by damaging and disrupting the infrastructure services that underpin modern society. Globally, $2.5tn a year is spent on infrastructure which is typically designed to last decades, over which period projected changes in the climate will modify infrastructure performance. A systems approach has been developed to assess risks across all infrastructure sectors to guide national policy making and adaptation investment. The method analyses diverse evidence of climate risks and adaptation actions, to assess the urgency and extent of adaptation required. Application to the UK shows that despite recent adaptation efforts, risks to infrastructure outweigh opportunities. Flooding is the greatest risk to all infrastructure sectors: even if the Paris Agreement to limit global warming to 2°C is achieved, the number of users reliant on electricity infrastructure at risk of flooding would double, while a 4°C rise could triple UK flood damage. Other risks are significant, for example 5% and 20% of river catchments would be unable to meet water demand with 2°C and 4°C global warming respectively. Increased interdependence between infrastructure systems, especially from energy and information and communication technology (ICT), are amplifying risks, but adaptation action is limited by lack of clear responsibilities. A programme to build national capability is urgently required to improve infrastructure risk assessment.This article is part of the theme issue 'Advances in risk assessment for climate change adaptation policy'. © 2018 The Authors.
A systems framework for national assessment of climate risks to infrastructure
NASA Astrophysics Data System (ADS)
Dawson, Richard J.; Thompson, David; Johns, Daniel; Wood, Ruth; Darch, Geoff; Chapman, Lee; Hughes, Paul N.; Watson, Geoff V. R.; Paulson, Kevin; Bell, Sarah; Gosling, Simon N.; Powrie, William; Hall, Jim W.
2018-06-01
Extreme weather causes substantial adverse socio-economic impacts by damaging and disrupting the infrastructure services that underpin modern society. Globally, $2.5tn a year is spent on infrastructure which is typically designed to last decades, over which period projected changes in the climate will modify infrastructure performance. A systems approach has been developed to assess risks across all infrastructure sectors to guide national policy making and adaptation investment. The method analyses diverse evidence of climate risks and adaptation actions, to assess the urgency and extent of adaptation required. Application to the UK shows that despite recent adaptation efforts, risks to infrastructure outweigh opportunities. Flooding is the greatest risk to all infrastructure sectors: even if the Paris Agreement to limit global warming to 2°C is achieved, the number of users reliant on electricity infrastructure at risk of flooding would double, while a 4°C rise could triple UK flood damage. Other risks are significant, for example 5% and 20% of river catchments would be unable to meet water demand with 2°C and 4°C global warming respectively. Increased interdependence between infrastructure systems, especially from energy and information and communication technology (ICT), are amplifying risks, but adaptation action is limited by lack of clear responsibilities. A programme to build national capability is urgently required to improve infrastructure risk assessment. This article is part of the theme issue `Advances in risk assessment for climate change adaptation policy'.
A systems framework for national assessment of climate risks to infrastructure
Thompson, David; Johns, Daniel; Darch, Geoff; Paulson, Kevin
2018-01-01
Extreme weather causes substantial adverse socio-economic impacts by damaging and disrupting the infrastructure services that underpin modern society. Globally, $2.5tn a year is spent on infrastructure which is typically designed to last decades, over which period projected changes in the climate will modify infrastructure performance. A systems approach has been developed to assess risks across all infrastructure sectors to guide national policy making and adaptation investment. The method analyses diverse evidence of climate risks and adaptation actions, to assess the urgency and extent of adaptation required. Application to the UK shows that despite recent adaptation efforts, risks to infrastructure outweigh opportunities. Flooding is the greatest risk to all infrastructure sectors: even if the Paris Agreement to limit global warming to 2°C is achieved, the number of users reliant on electricity infrastructure at risk of flooding would double, while a 4°C rise could triple UK flood damage. Other risks are significant, for example 5% and 20% of river catchments would be unable to meet water demand with 2°C and 4°C global warming respectively. Increased interdependence between infrastructure systems, especially from energy and information and communication technology (ICT), are amplifying risks, but adaptation action is limited by lack of clear responsibilities. A programme to build national capability is urgently required to improve infrastructure risk assessment. This article is part of the theme issue ‘Advances in risk assessment for climate change adaptation policy’. PMID:29712793
Intelligent systems for strategic power infrastructure defense
NASA Astrophysics Data System (ADS)
Jung, Ju-Hwan
A fault or disturbance in a power system can be severe due to the sources of vulnerability such as human errors, protection and control system failures, a failure of communication networks to deliver critical control signals, and market and load uncertainties. There have been several catastrophic failures resulting from disturbances involving the sources of vulnerability while power systems are designed to withstand disturbances or faults. To avoid catastrophic failures or minimize the impact of a disturbance(s), the state of the power system has to be analyzed correctly and preventive or corrective self-healing control actions have to be deployed. This dissertation addresses two aspects of power systems: Defense system and diagnosis, both concerned with the power system analysis and operation during events involving faults or disturbances. This study is intended to develop a defense system that is able to assess power system vulnerability and to perform self-healing control actions based on the system-wide analysis. In order to meet the requirements of the system-wide analysis, the defense system is designed with multi-agent system technologies. Since power systems are dynamic and uncertain the self-healing control actions need to be adaptive. This study applies the reinforcement learning technique to provide a theoretical basis for adaptation. One of the important issues in adaptation is the convergence of the learning algorithm. An appropriate convergence criterion is derived and an application with a load-shedding scheme is demonstrated in this study. This dissertation also demonstrates the feasibility of the defense system and self-healing control actions through multi-agent system technologies. The other subject of this research is to investigate the methodology for on-line fault diagnosis using the information from Sequence-of-Events Recorders (SER). The proposed multiple-hypothesis analysis generates one or more hypothetical fault scenarios to interpret the SER information. In order to avoid ambiguity of the hypotheses, this study proposes a new method to determine the credibility of each hypothesis. Even if there is not enough SER information, the proposed method is able to perform an accurate fault and malfunction analysis. To avoid exhaustive testing, a minimal set of test scenarios is derived, which is able to handle missing information and SERs. During extreme contingencies or cascading events, fault diagnosis is the first step in the operation of the power system. On-line fault diagnosis provides necessary and correct information for the defense system to make correct and efficient decisions on self-healing control actions. It has been shown in previous studies that incorrect fault diagnosis can lead to catastrophic failures in power systems. Fault diagnosis is an important issue for strategic power infrastructure defense.
Remote sensing of multimodal transportation systems.
DOT National Transportation Integrated Search
2016-09-01
Hyperspectral remote sensing is an emerging field with many potential applications in the observation, management, and maintenance of the global transportation infrastructure. This report describes the development of an affordable framework to captur...
A data protection framework for trans-European genetic research projects.
Claerhout, Brecht; Forgó, Nikolaus; Krügel, Tina; Arning, Marian; De Moor, Georges
2008-01-01
The paper proposes a data protection framework for trans-European medical research projects, which is based on a technical security infrastructure as well as on organizational measures and contractual obligations. It mainly relies on pseudonymization, an internal Data Protection Authority and on a Trusted Third Party. The outcome is an environment that combines both good research conditions and an extensive protection of patients' privacy.
Tool Integration Framework for Bio-Informatics
2007-04-01
Java NetBeans [11] based Integrated Development Environment (IDE) for developing modules and packaging computational tools. The framework is extremely...integrate an Eclipse front-end for Desktop Integration. Eclipse was chosen over Netbeans owing to a higher acceptance, better infrastructure...5.0. This version of Dashboard ran with NetBeans IDE 3.6 requiring Java Runtime 1.4 on a machine with Windows XP. The toolchain is executed by
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bush, B.; Melaina, M.; Penev, M.
This report describes the development and analysis of detailed temporal and spatial scenarios for early market hydrogen fueling infrastructure clustering and fuel cell electric vehicle rollout using the Scenario Evaluation, Regionalization and Analysis (SERA) model. The report provides an overview of the SERA scenario development framework and discusses the approach used to develop the nationwidescenario.
A methodology for statewide intermodal freight transportation planning.
DOT National Transportation Integrated Search
1998-01-01
The researchers developed a methodology for statewide freight transportation planning that focuses on identifying and prioritizing infrastructure needs to improve the intermodal freight transportation system. It is designed to provide the framework f...
Implementing Eco-Logical 2014-2015 Annual Report
DOT National Transportation Integrated Search
2015-12-01
The Eco-Logical approach offers an ecosystem-based framework for integrated infrastructure and natural resource planning, project development, and delivery. The 2014/2015 Implementing Eco-Logical Program Annual Report provides updates on the Federal ...
DOT National Transportation Integrated Search
2016-07-01
The purpose of this research was to provide a framework to guide the development and deployment of an : integrated statewide program for Intelligent Transportation Systems (ITS). ITS is a critical component of the : transportation infrastructure that...
Remote sensing of multimodal transportation systems : research brief.
DOT National Transportation Integrated Search
2016-09-01
Remote Sensing of Multimodal Transportation Systems : Rapid condition monitoring and performance evaluations of the vast and vulnerable transportation infrastructure has been elusive. The framework and models developed in this research will enable th...
Aligning business and information technology domains: strategic planning in hospitals.
Henderson, J C; Thomas, J B
1992-01-01
This article develops a framework for strategic information technology (IT) management in hospitals, termed the Strategic Alignment Model. This model is defined in terms of four domains--business strategy, IT strategy, organizational infrastructure, and IT infrastructure--each with its constituent components. The concept of strategic alignment is developed using two fundamental dimensions--strategic fit and integration. Different perspectives that hospitals use for aligning the various domains are discussed, and a prescriptive model of strategic IT planning is proposed.
Justice and Equity Implications of Climate Change Adaptation: A Theoretical Evaluation Framework
Boeckmann, Melanie; Zeeb, Hajo
2016-01-01
Climate change affects human health, and climate change adaptation aims to reduce these risks through infrastructural, behavioral, and technological measures. However, attributing direct human health effects to climate change adaptation is difficult, causing an ethical dilemma between the need for evidence of strategies and their precautionary implementation before such evidence has been generated. In the absence of conclusive evidence for individual adaptation strategies, alternative approaches to the measurement of adaptation effectiveness need to be developed. This article proposes a theoretical framework and a set of guiding questions to assess effects of adaptation strategies on seven domains of health determinants, including social, economic, infrastructure, institutional, community, environmental, and cultural determinants of health. Its focus on advancing gender equity and environmental justice concurrently with the implementation of health-related adaptation could serve as a template for policymakers and researchers. PMID:27618121
Carinci, Fabrizio
2015-04-01
The European Union needs a common health information infrastructure to support policy and governance on a routine basis. A stream of initiatives conducted in Europe during the last decade resulted into several success stories, but did not specify a unified framework that could be broadly implemented on a continental level. The recent debate raised a potential controversy on the different roles and responsibilities of policy makers vs the public health community in the construction of such a pan-European health information system. While institutional bodies shall clarify the statutory conditions under which such an endeavour is to be carried out, researchers should define a common framework for optimal cross-border information exchange. This paper conceptualizes a general solution emerging from past experiences, introducing a governance structure and overarching framework that can be realized through four main action lines, underpinned by the key principle of "Essential Levels of Health Information" for Europe. The proposed information model is amenable to be applied in a consistent manner at both national and EU level. If realized, the four action lines outlined here will allow developing a EU health information infrastructure that would effectively integrate best practices emerging from EU public health initiatives, including projects and joint actions carried out during the last ten years. The proposed approach adds new content to the ongoing debate on the future activity of the European Commission in the area of health information. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
Clinical and Community Delivery Systems for Preventive Care
Krist, Alex H.; Shenson, Douglas; Woolf, Steven H.; Bradley, Cathy; Liaw, Winston R.; Rothemich, Stephen F.; Slonim, Amy; Benson, William; Anderson, Lynda A.
2015-01-01
Although clinical preventive services (CPS)—screening tests, immunizations, health behavior counseling, and preventive medications—can save lives, Americans receive only half of recommended services. This "prevention gap," if closed, could substantially reduce morbidity and mortality. Opportunities to improve delivery of CPS exist in both clinical and community settings, but these activities are rarely coordinated across these settings, resulting in inefficiencies and attenuated benefits. Through a literature review, semi-structured interviews with 50 national experts, field observations of 53 successful programs, and a national stakeholder meeting, a framework to fully integrate CPS delivery across clinical and community care delivery systems was developed. The framework identifies the necessary participants, their role in care delivery, and the infrastructure, support, and policies necessary to ensure success. Essential stakeholders in integration include clinicians; community members and organizations; spanning personnel and infrastructure; national, state, and local leadership; and funders and purchasers. Spanning personnel and infrastructure are essential to bring clinicians and communities together and to help patients navigate across care settings. The specifics of clinical–community integrations vary depending on the services addressed and the local context. Although broad establishment of effective clinical–community integrations will require substantial changes, existing clinical and community models provide an important starting point. The key policies and elements of the framework are often already in place or easily identified. The larger challenge is for stakeholders to recognize how integration serves their mutual interests and how it can be financed and sustained over time. PMID:24050428
NASA Astrophysics Data System (ADS)
Medellin-Azuara, J.; Fraga, C. C. S.; Marques, G.; Mendes, C. A.
2015-12-01
The expansion and operation of urban water supply systems under rapidly growing demands, hydrologic uncertainty, and scarce water supplies requires a strategic combination of various supply sources for added reliability, reduced costs and improved operational flexibility. The design and operation of such portfolio of water supply sources merits decisions of what and when to expand, and how much to use of each available sources accounting for interest rates, economies of scale and hydrologic variability. The present research provides a framework and an integrated methodology that optimizes the expansion of various water supply alternatives using dynamic programming and combining both short term and long term optimization of water use and simulation of water allocation. A case study in Bahia Do Rio Dos Sinos in Southern Brazil is presented. The framework couples an optimization model with quadratic programming model in GAMS with WEAP, a rain runoff simulation models that hosts the water supply infrastructure features and hydrologic conditions. Results allow (a) identification of trade offs between cost and reliability of different expansion paths and water use decisions and (b) evaluation of potential gains by reducing water system losses as a portfolio component. The latter is critical in several developing countries where water supply system losses are high and often neglected in favor of more system expansion. Results also highlight the potential of various water supply alternatives including, conservation, groundwater, and infrastructural enhancements over time. The framework proves its usefulness for planning its transferability to similarly urbanized systems.
JACOB: an enterprise framework for computational chemistry.
Waller, Mark P; Dresselhaus, Thomas; Yang, Jack
2013-06-15
Here, we present just a collection of beans (JACOB): an integrated batch-based framework designed for the rapid development of computational chemistry applications. The framework expedites developer productivity by handling the generic infrastructure tier, and can be easily extended by user-specific scientific code. Paradigms from enterprise software engineering were rigorously applied to create a scalable, testable, secure, and robust framework. A centralized web application is used to configure and control the operation of the framework. The application-programming interface provides a set of generic tools for processing large-scale noninteractive jobs (e.g., systematic studies), or for coordinating systems integration (e.g., complex workflows). The code for the JACOB framework is open sourced and is available at: www.wallerlab.org/jacob. Copyright © 2013 Wiley Periodicals, Inc.
2018-04-01
Creation, curation and hosting of datasets for cybersecurity researchers; • Serving as a “host of convenience” for datasets from PREDICT and IMPACT non...assumptions and preferences, as cybersecurity investigators and proxies for the broader current and potential user communities. No attempt was made to...understand what would have been of use, i.e., cybersecurity researcher needs were known more anecdotally than systematically.[1] We believe that
Federal Research and Development Funding: FY2010
2009-09-23
Budget activities 6.4 and 6.5 focus on the development of specific weapon systems or components (e.g., the Joint Strike Fighter or missile defense systems...more than the request for chemical and biological basic research and would provide $10 million in the Infrastructure and Geophysical Division for...40 40 Chemical and Biological 208 200 207 222 207 Command, Control, and Interoperability 57 75 80 81 83 Explosives 78 96 121 121 121 Human
Total Quality Management (TQM). Process Action Team Course
1990-05-30
SHET SC EXHAUSTE May 30,1990 DEPARTMENT OF DEFENSE Lfl N CI TOTAL QUALITY MANAGEMENT (TQM) Process Action Team Coursef ©990, Booz.Allen & Hamilton Inc...organization’s TQM infrastructure. If you need additional information, please refer to the student manual, Total Quality Management (TOM) Awareness Seminar that...Programs. These efforts were identified in Appendix A of Booz, Allen’s training manual Qtl Quality Management Awareness Seminar. Revision 5, November 15
Engaging the Nation’s Critical Infrastructure Sector to Deter Cyber Threats
2013-03-01
is the component of CyberOps that extends cyber power beyond the defensive boundaries of the GIG to detect, deter, deny, and defeat adversaries... economy .16 DDOS attacks are based on multiple, malware infected personal computers, organized into networks called botnets, and are directed by...not condemn the actions of those involved. Of the two attacks on Estonia and Georgia, it was Estonia that had the greatest damage to its economy
2012-05-01
basis, based on what they perceive the health threat to be. The sidebar illustrates DOD’s response to the 2011 Fukushima Daiichi disaster in Japan... disasters or nuclear attacks, to protect installations, facilities, and personnel—including military and civilian personnel, dependents of military and...4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with
Public-Private Collaboration in the Department of Defense
2012-07-01
In his 2010 National Security Strategy, President Obama described partnerships between the public and private sector as critical to United States security at home and abroad. These Public-Private Collaborations (PPCs) offer potential opportunities to increase the Department s mission effectiveness by leveraging the capabilities, knowledge, processes, and infrastructure brought to bear by private sector entities. Additionally, given today s constrained budget environment, PPCs also provide opportunities for efficiency and cost reductions.
Department of Defense Use of Commercial Cloud Computing Capabilities and Services
2015-11-01
models (Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service ( SaaS )), and four deployment models (Public...NIST defines three main models for cloud computing: IaaS, PaaS, and SaaS . These models help differentiate the implementation responsibilities that fall...and SaaS . 3. Public, Private, Community, and Hybrid Clouds Cloud services come in different forms, depending on the customer’s specific needs
2002-09-01
ADDRESS(ES) 8. PERFORMING ORGANIZATION REPORT NUMBER Egov 9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) 10. SPONSORING / MONITORING...initiatives. The federal government has 55 databases that deal with security threats, but inter- agency access depends on establishing agreements through...which that information can be shared. True cooperation also will require government -wide commitment to enterprise architecture, integrated
Toward Meaningful Military Compensation Reform: Research in Support of DoD’s Review
2014-01-01
CARE INFRASTRUCTURE AND TRANSPORTATION INTERNATIONAL AFFAIRS LAW AND BUSINESS NATIONAL SECURITY POPULATION AND AGING PUBLIC SAFETY SCIENCE AND...have highlighted the advantages of a hybrid plan for achieving these objectives. For example, the Defense Science Board Task Force on Human...Compensation, as well as the input of Patricia Mulcahy. We are grateful to Joel Sitrin, Chief Actuary , and Peter Rossi and Peter Zouras of the DoD Office of
National Infrastructure Protection Plan: Partnering to Enhance Protection and Resiliency
2009-01-01
Agriculture is responsible for agriculture and food ( meat , poultry , and egg products). b The Department of Health and Human Services is responsible for food...other than meat , poultry , and egg products. c Nothing in this plan impairs or otherwise affects the authority of the Secretary of Defense over the...agriculture and food ( meat , poultry , and egg products). b The Department of Health and Human Services is responsible for food other than meat
U.S. National Arctic Strategy: Preparing Defensive Lines of Effort for the Arctic
2014-04-01
publications hint at new political posturing and suggest China should develop a more assertive approach to the international debates on controlling ...currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS. 1. REPORT DATE (DD-MM-YYYY) 01-04-2014 2. REPORT TYPE...importance of the Arctic, but lacks the infrastructure, command and control structure, and Arctic-capable assets to meet national strategic objectives
2003-09-01
infrastructure, and providing consequence management and mitigation of man-made and natural disasters. The United States Army, Pacifi c (USARPAC), the Offi...Terrorism, Disaster Response and Consequence Management , and Medical Aspects of Environmental Security. The conference brought together military and...consequence management in maintaining governmental legitimacy, and examine salient military roles in preventing, responding to, and mitigating natural
2012-02-01
a public service of the RAND Corporation. CHILDREN AND FAMILIES EDUCATION AND THE ARTS ENERGY AND ENVIRONMENT HEALTH AND HEALTH CARE INFRASTRUCTURE...agencies use capability portfolio management to optimize capa- bility investments and minimize risk in meeting the DoD needs across the defense...broadly expose potential problem areas—that is, which requirements (or areas of demand) are at risk of not being met by that particular portfolio
America’s Achilles Heel: Defense Against High-altitude Electromagnetic Pulse-policy vs. Practice
2014-12-12
Directives SCADA Supervisory Control and Data Acquisition Systems SHIELD Act Secure High-voltage Infrastructure for Electricity from Lethal Damage Act...take place, it is important to understand the effects of the components of EMP from a high-altitude nuclear detonation. The requirements for shielding ...Mass Ejection (CME). A massive, bubble-shaped burst of plasma expanding outward from the Sun’s corona, in which large amounts of superheated
DOE Office of Scientific and Technical Information (OSTI.GOV)
Veeramany, Arun; Unwin, Stephen D.; Coles, Garill A.
2015-12-03
Natural and man-made hazardous events resulting in loss of grid infrastructure assets challenge the electric power grid’s security and resilience. However, the planning and allocation of appropriate contingency resources for such events requires an understanding of their likelihood and the extent of their potential impact. Where these events are of low likelihood, a risk-informed perspective on planning can be problematic as there exists an insufficient statistical basis to directly estimate the probabilities and consequences of their occurrence. Since risk-informed decisions rely on such knowledge, a basis for modeling the risk associated with high-impact low frequency events (HILFs) is essential. Insightsmore » from such a model can inform where resources are most rationally and effectively expended. The present effort is focused on development of a HILF risk assessment framework. Such a framework is intended to provide the conceptual and overarching technical basis for the development of HILF risk models that can inform decision makers across numerous stakeholder sectors. The North American Electric Reliability Corporation (NERC) 2014 Standard TPL-001-4 considers severe events for transmission reliability planning, but does not address events of such severity that they have the potential to fail a substantial fraction of grid assets over a region, such as geomagnetic disturbances (GMD), extreme seismic events, and coordinated cyber-physical attacks. These are beyond current planning guidelines. As noted, the risks associated with such events cannot be statistically estimated based on historic experience; however, there does exist a stable of risk modeling techniques for rare events that have proven of value across a wide range of engineering application domains. There is an active and growing interest in evaluating the value of risk management techniques in the State transmission planning and emergency response communities, some of this interest in the context of grid modernization activities. The availability of a grid HILF risk model, integrated across multi-hazard domains which, when interrogated, can support transparent, defensible and effective decisions, is an attractive prospect among these communities. In this report, we document an integrated HILF risk framework intended to inform the development of risk models. These models would be based on the systematic and comprehensive (to within scope) characterization of hazards to the level of detail required for modeling risk, identification of the stressors associated with the hazards (i.e., the means of impacting grid and supporting infrastructure), characterization of the vulnerability of assets to these stressors and the probabilities of asset compromise, the grid’s dynamic response to the asset failures, and assessment of subsequent severities of consequence with respect to selected impact metrics, such as power outage duration and geographic reach. Specifically, the current framework is being developed to;1. Provide the conceptual and overarching technical paradigms for the development of risk models; 2. Identify the classes of models required to implement the framework - providing examples of existing models, and also identifying where modeling gaps exist; 3. Identify the types of data required, addressing circumstances under which data are sparse and the formal elicitation of informed judgment might be required; and 4. Identify means by which the resultant risk models might be interrogated to form the necessary basis for risk management.« less
NASA Astrophysics Data System (ADS)
Argenti, M.; Giannini, V.; Averty, R.; Bigagli, L.; Dumoulin, J.
2012-04-01
The EC FP7 ISTIMES project has the goal of realizing an ICT-based system exploiting distributed and local sensors for non destructive electromagnetic monitoring in order to make critical transport infrastructures more reliable and safe. Higher situation awareness thanks to real time and detailed information and images of the controlled infrastructure status allows improving decision capabilities for emergency management stakeholders. Web-enabled sensors and a service-oriented approach are used as core of the architecture providing a sys-tem that adopts open standards (e.g. OGC SWE, OGC CSW etc.) and makes efforts to achieve full interoperability with other GMES and European Spatial Data Infrastructure initiatives as well as compliance with INSPIRE. The system exploits an open easily scalable network architecture to accommodate a wide range of sensors integrated with a set of tools for handling, analyzing and processing large data volumes from different organizations with different data models. Situation Awareness tools are also integrated in the system. Definition of sensor observations and services follows a metadata model based on the ISO 19115 Core set of metadata elements and the O&M model of OGC SWE. The ISTIMES infrastructure is based on an e-Infrastructure for geospatial data sharing, with a Data Cata-log that implements the discovery services for sensor data retrieval, acting as a broker through static connections based on standard SOS and WNS interfaces; a Decision Support component which helps decision makers providing support for data fusion and inference and generation of situation indexes; a Presentation component which implements system-users interaction services for information publication and rendering, by means of a WEB Portal using SOA design principles; A security framework using Shibboleth open source middleware based on the Security Assertion Markup Language supporting Single Sign On (SSO). ACKNOWLEDGEMENT - The research leading to these results has received funding from the European Community's Seventh Framework Programme (FP7/2007-2013) under Grant Agreement n° 225663
The Impact Imperative: A Space Infrastructure Enabling a Multi-Tiered Earth Defense
NASA Technical Reports Server (NTRS)
Campbell, Jonathan W.; Phipps, Claude; Smalley, Larry; Reilly, James; Boccio, Dona
2003-01-01
Impacting at hypervelocity, an asteroid struck the Earth approximately 65 million years ago in the Yucatan Peninsula a m . This triggered the extinction of almost 70% of the species of life on Earth including the dinosaurs. Other impacts prior to this one have caused even greater extinctions. Preventing collisions with the Earth by hypervelocity asteroids, meteoroids, and comets is the most important immediate space challenge facing human civilization. This is the Impact Imperative. We now believe that while there are about 2000 earth orbit crossing rocks greater than 1 kilometer in diameter, there may be as many as 200,000 or more objects in the 100 m size range. Can anything be done about this fundamental existence question facing our civilization? The answer is a resounding yes! By using an intelligent combination of Earth and space based sensors coupled with an infrastructure of high-energy laser stations and other secondary mitigation options, we can deflect inbound asteroids, meteoroids, and comets and prevent them &om striking the Earth. This can be accomplished by irradiating the surface of an inbound rock with sufficiently intense pulses so that ablation occurs. This ablation acts as a small rocket incrementally changing the shape of the rock's orbit around the Sun. One-kilometer size rocks can be moved sufficiently in about a month while smaller rocks may be moved in a shorter time span. We recommend that space objectives be immediately reprioritized to start us moving quickly towards an infrastructure that will support a multiple option defense capability. Planning and development for a lunar laser facility should be initiated immediately in parallel with other options. All mitigation options are greatly enhanced by robust early warning, detection, and tracking resources to find objects sufficiently prior to Earth orbit passage in time to allow significant intervention. Infrastructure options should include ground, LEO, GEO, Lunar, and libration point laser and sensor stations for providing early warning, tracking, and deflection. Other options should include space interceptors that will carry both laser and nuclear ablators for close range work. Response options must be developed to deal with the consequences of an impact should we move too slowly.
Pierre, Jon Paul; Young, Michael H; Wolaver, Brad D; Andrews, John R; Breton, Caroline L
2017-11-01
Spatio-temporal trends in infrastructure footprints, energy production, and landscape alteration were assessed for the Eagle Ford Shale of Texas. The period of analysis was over four 2-year periods (2006-2014). Analyses used high-resolution imagery, as well as pipeline data to map EF infrastructure. Landscape conditions from 2006 were used as baseline. Results indicate that infrastructure footprints varied from 94.5 km 2 in 2008 to 225.0 km 2 in 2014. By 2014, decreased land-use intensities (ratio of land alteration to energy production) were noted play-wide. Core-area alteration by period was highest (3331.6 km 2 ) in 2008 at the onset of play development, and increased from 582.3 to 3913.9 km 2 by 2014, though substantial revegetation of localized core areas was observed throughout the study (i.e., alteration improved in some areas and worsened in others). Land-use intensity in the eastern portion of the play was consistently lower than that in the western portion, while core alteration remained relatively constant east to west. Land alteration from pipeline construction was ~65 km 2 for all time periods, except in 2010 when alteration was recorded at 47 km 2 . Percent of total alteration from well-pad construction increased from 27.3% in 2008 to 71.5% in 2014. The average number of wells per pad across all 27 counties increased from 1.15 to 1.7. This study presents a framework for mapping landscape alteration from oil and gas infrastructure development. However, the framework could be applied to other energy development programs, such as wind or solar fields, or any other regional infrastructure development program. Landscape alteration caused by hydrocarbon pipeline installation in Val Verde County, Texas.
NASA Astrophysics Data System (ADS)
Pierre, Jon Paul; Young, Michael H.; Wolaver, Brad D.; Andrews, John R.; Breton, Caroline L.
2017-11-01
Spatio-temporal trends in infrastructure footprints, energy production, and landscape alteration were assessed for the Eagle Ford Shale of Texas. The period of analysis was over four 2-year periods (2006-2014). Analyses used high-resolution imagery, as well as pipeline data to map EF infrastructure. Landscape conditions from 2006 were used as baseline. Results indicate that infrastructure footprints varied from 94.5 km2 in 2008 to 225.0 km2 in 2014. By 2014, decreased land-use intensities (ratio of land alteration to energy production) were noted play-wide. Core-area alteration by period was highest (3331.6 km2) in 2008 at the onset of play development, and increased from 582.3 to 3913.9 km2 by 2014, though substantial revegetation of localized core areas was observed throughout the study (i.e., alteration improved in some areas and worsened in others). Land-use intensity in the eastern portion of the play was consistently lower than that in the western portion, while core alteration remained relatively constant east to west. Land alteration from pipeline construction was 65 km2 for all time periods, except in 2010 when alteration was recorded at 47 km2. Percent of total alteration from well-pad construction increased from 27.3% in 2008 to 71.5% in 2014. The average number of wells per pad across all 27 counties increased from 1.15 to 1.7. This study presents a framework for mapping landscape alteration from oil and gas infrastructure development. However, the framework could be applied to other energy development programs, such as wind or solar fields, or any other regional infrastructure development program.
Abstracting application deployment on Cloud infrastructures
NASA Astrophysics Data System (ADS)
Aiftimiei, D. C.; Fattibene, E.; Gargana, R.; Panella, M.; Salomoni, D.
2017-10-01
Deploying a complex application on a Cloud-based infrastructure can be a challenging task. In this contribution we present an approach for Cloud-based deployment of applications and its present or future implementation in the framework of several projects, such as “!CHAOS: a cloud of controls” [1], a project funded by MIUR (Italian Ministry of Research and Education) to create a Cloud-based deployment of a control system and data acquisition framework, “INDIGO-DataCloud” [2], an EC H2020 project targeting among other things high-level deployment of applications on hybrid Clouds, and “Open City Platform”[3], an Italian project aiming to provide open Cloud solutions for Italian Public Administrations. We considered to use an orchestration service to hide the complex deployment of the application components, and to build an abstraction layer on top of the orchestration one. Through Heat [4] orchestration service, we prototyped a dynamic, on-demand, scalable platform of software components, based on OpenStack infrastructures. On top of the orchestration service we developed a prototype of a web interface exploiting the Heat APIs. The user can start an instance of the application without having knowledge about the underlying Cloud infrastructure and services. Moreover, the platform instance can be customized by choosing parameters related to the application such as the size of a File System or the number of instances of a NoSQL DB cluster. As soon as the desired platform is running, the web interface offers the possibility to scale some infrastructure components. In this contribution we describe the solution design and implementation, based on the application requirements, the details of the development of both the Heat templates and of the web interface, together with possible exploitation strategies of this work in Cloud data centers.
[Diagnosis of the productive capacity of the IMSS regarding health technologies].
Figueroa-Lara, Alejandro; López-Fernández, Fátima Itzel; López-Domínguez, Adriana; Fajardo-Dolci, German
To quantify the production capacity and performance in research and technological developments of the Mexican Social Security Institute (IMSS). We identified and analyzed information of the legislation, human and financial resources, and infrastructure addressed for research and technological development of IMSS. We analyzed whether the information on the legal framework contained key features to boost research and technological development. Information on the human, financial, and infrastructure resources were obtained from official sources. The research productivity was identified by a bibliometric analysis in 2014; productivity in technological developments was identified by intellectual products. The legal framework of the IMSS has several areas for improvement to boost research and technological development, especially the guidelines for technology transfer. The IMSS has 438 researchers, 39 research units, and a budget of US$ 37.4 million for research and technological development. The rate of articles published per 10 researchers was 4.8; while rate patients was 1.8. The IMSS has a great potential to translate research into technological developments, it is only necessary to make some changes to the legal framework.
Mesh infrastructure for coupled multiprocess geophysical simulations
Garimella, Rao V.; Perkins, William A.; Buksas, Mike W.; ...
2014-01-01
We have developed a sophisticated mesh infrastructure capability to support large scale multiphysics simulations such as subsurface flow and reactive contaminant transport at storage sites as well as the analysis of the effects of a warming climate on the terrestrial arctic. These simulations involve a wide range of coupled processes including overland flow, subsurface flow, freezing and thawing of ice rich soil, accumulation, redistribution and melting of snow, biogeochemical processes involving plant matter and finally, microtopography evolution due to melting and degradation of ice wedges below the surface. In addition to supporting the usual topological and geometric queries about themore » mesh, the mesh infrastructure adds capabilities such as identifying columnar structures in the mesh, enabling deforming of the mesh subject to constraints and enabling the simultaneous use of meshes of different dimensionality for subsurface and surface processes. The generic mesh interface is capable of using three different open source mesh frameworks (MSTK, MOAB and STKmesh) under the hood allowing the developers to directly compare them and choose one that is best suited for the application's needs. We demonstrate the results of some simulations using these capabilities as well as present a comparison of the performance of the different mesh frameworks.« less
Shang, Jianga; Gu, Fuqiang; Hu, Xuke; Kealy, Allison
2015-01-01
The utility and adoption of indoor localization applications have been limited due to the complex nature of the physical environment combined with an increasing requirement for more robust localization performance. Existing solutions to this problem are either too expensive or too dependent on infrastructure such as Wi-Fi access points. To address this problem, we propose APFiLoc—a low cost, smartphone-based framework for indoor localization. The key idea behind this framework is to obtain landmarks within the environment and to use the augmented particle filter to fuse them with measurements from smartphone sensors and map information. A clustering method based on distance constraints is developed to detect organic landmarks in an unsupervised way, and the least square support vector machine is used to classify seed landmarks. A series of real-world experiments were conducted in complex environments including multiple floors and the results show APFiLoc can achieve 80% accuracy (phone in the hand) and around 70% accuracy (phone in the pocket) of the error less than 2 m error without the assistance of infrastructure like Wi-Fi access points. PMID:26516858
On modeling complex interplay in small-scale self-organized socio-hydrological systems
NASA Astrophysics Data System (ADS)
Muneepeerakul, Rachata
2017-04-01
Successful and sustainable socio-hydrological systems, as in any coupled natural human-systems, require effective governance, which depends on the existence of proper infrastructure (both hard and soft). Recent work has addressed systems in which resource users and the organization responsible for maintaining the infrastructure are separate entities. However, many socio-hydrological systems, especially in developing countries, are small and without such formal division of labor; rather, such division of labor typically arises from self-organization within the population. In this work, we modify and mathematically operationalize a conceptual framework by developing a system of differential equations that capture the strategic behavior within such a self-organized population, its interplay with infrastructure characteristics and hydrological dynamics, and feedbacks between these elements. The model yields a number of insightful conditions related to long-term sustainability and collapse of the socio-hydrological system in the form of relationships between biophysical and social factors. These relationships encapsulate nonlinear interactions of these factors. The modeling framework is grounded in a solid conceptual foundation upon which additional modifications and realism can be built for potential reconciliation between socio-hydrology with other related fields and further applications.
Unmanned Aerial Vehicles unique cost estimating requirements
NASA Astrophysics Data System (ADS)
Malone, P.; Apgar, H.; Stukes, S.; Sterk, S.
Unmanned Aerial Vehicles (UAVs), also referred to as drones, are aerial platforms that fly without a human pilot onboard. UAVs are controlled autonomously by a computer in the vehicle or under the remote control of a pilot stationed at a fixed ground location. There are a wide variety of drone shapes, sizes, configurations, complexities, and characteristics. Use of these devices by the Department of Defense (DoD), NASA, civil and commercial organizations continues to grow. UAVs are commonly used for intelligence, surveillance, reconnaissance (ISR). They are also use for combat operations, and civil applications, such as firefighting, non-military security work, surveillance of infrastructure (e.g. pipelines, power lines and country borders). UAVs are often preferred for missions that require sustained persistence (over 4 hours in duration), or are “ too dangerous, dull or dirty” for manned aircraft. Moreover, they can offer significant acquisition and operations cost savings over traditional manned aircraft. Because of these unique characteristics and missions, UAV estimates require some unique estimating methods. This paper describes a framework for estimating UAV systems total ownership cost including hardware components, software design, and operations. The challenge of collecting data, testing the sensitivities of cost drivers, and creating cost estimating relationships (CERs) for each key work breakdown structure (WBS) element is discussed. The autonomous operation of UAVs is especially challenging from a software perspective.
Venezuelan policies and responses on climate change and natural hazards
NASA Astrophysics Data System (ADS)
Caponi, Claudio; Rosales, Anibal
1992-06-01
Venezuela is an intertropical country which has the fortune not to suffer the severities of natural hazards which are usual in other countries of this region. It is a developing country, whose economy is heavily dependent on oil production and exports. Its greenhouse gas emissions are relatively low, but it is expected that the planned industrialization development will bring an associated increase in emissions. As a nation, Venezuela has a highly developed environmental consciousness. The Ministry of environment, the first in Latin America, was created in 1977, and has been the main contributor to the national policy of Disaster Prevention and Reduction. As in many developing countries actions and responses in this regard have been rather limited in scope, and even though legislation has been developed, many problems arise for its enforcement. Several local warning systems, civil defense procedures, and infrastructural protection measures are operational, however they have not been designed, revised, or planned taking into consideration the potential impacts of climate change. Presently Venezuela is an active participant state in the negotiation for a framework convention on climate change. That is a very difficult negotiation for our country. Here we have to conciliate enviromental principles with national economic interests. The elements of our position in this contex are presented in this statement.
2013/2014 Eco-Logical program annual report
DOT National Transportation Integrated Search
2014-12-01
The Eco-Logical approach offers an ecosystem-based framework for integrated infrastructure and natural resource planning, project development, and delivery. The 2013/2014 Eco-Logical Program Annual Report provides updates on the Federal Highway Admin...
Total Water Management: A Watershed Based Approach
In this urbanizing world, municipal water managers need to develop planning and management frameworks to meet challenges such as limiting fresh water supplies, degrading receiving waters, increasing regulatory requirements, flooding, aging infrastructure, rising utility (energy) ...
Impact of performance goals on the needs of highway infrastructure maintenance.
DOT National Transportation Integrated Search
2011-07-01
Although it is widely accepted that establishing suitable performance goal is critical for system : maintenance and preservation, a framework that considers the inter-relationship between conflicting : objectives of minimum maintenance and rehabilita...
A framework for planning right of way development : research spotlight.
DOT National Transportation Integrated Search
2013-08-01
Roadside rights of way serve a wide range of societal, economic and : environmental functions. While these functions traditionally include : providing space for transportation infrastructure, utilities and drainage, : Michigan and many other states a...
Total Water Management: A Watershed Based Approach - slides
ABSTRACT In this urbanizing world, municipal water managers need to develop planning and management frameworks to meet challenges such as limiting fresh water supplies, degrading receiving waters, increasing regulatory requirements, flooding, aging infrastructure, rising utility...
Root symbionts: Powerful drivers of plant above- and belowground indirect defenses.
Rasmann, Sergio; Bennett, Alison; Biere, Arjen; Karley, Alison; Guerrieri, Emilio
2017-12-01
Soil microbial mutualists of plants, including mycorrhizal fungi, non-mycorrhizal fungi and plant growth promoting rhizobacteria, have been typically characterized for increasing nutrient acquisition and plant growth. More recently, soil microbes have also been shown to increase direct plant defense against above- and belowground herbivores. Plants, however, do not only rely on direct defenses when attacked, but they can also recruit pest antagonists such as predators and parasitoids, both above and belowground, mainly via the release of volatile organic compounds (i.e., indirect defenses). In this review, we illustrate the main features and effects of soil microbial mutualists of plants on plant indirect defenses and discuss possible applications within the framework of sustainable crop protection against root- and shoot-feeding arthropod pests. We indicate the main knowledge gaps and the future challenges to be addressed in the study and application of these multifaceted interactions. © 2017 Institute of Zoology, Chinese Academy of Sciences.
PACS/information systems interoperability using Enterprise Communication Framework.
alSafadi, Y; Lord, W P; Mankovich, N J
1998-06-01
Interoperability among healthcare applications goes beyond connectivity to allow components to exchange structured information and work together in a predictable, coordinated fashion. To facilitate building an interoperability infrastructure, an Enterprise Communication Framework (ECF) was developed by the members of the Andover Working Group for Healthcare Interoperability (AWG-OHI). The ECF consists of four models: 1) Use Case Model, 2) Domain Information Model (DIM), 3) Interaction Model, and 4) Message Model. To realize this framework, a software component called the Enterprise Communicator (EC) is used. In this paper, we will demonstrate the use of the framework in interoperating a picture archiving and communication system (PACS) with a radiology information system (RIS).
A Framework for Modeling Workflow Execution by an Interdisciplinary Healthcare Team.
Kezadri-Hamiaz, Mounira; Rosu, Daniela; Wilk, Szymon; Kuziemsky, Craig; Michalowski, Wojtek; Carrier, Marc
2015-01-01
The use of business workflow models in healthcare is limited because of insufficient capture of complexities associated with behavior of interdisciplinary healthcare teams that execute healthcare workflows. In this paper we present a novel framework that builds on the well-founded business workflow model formalism and related infrastructures and introduces a formal semantic layer that describes selected aspects of team dynamics and supports their real-time operationalization.
Dinov, Ivo D; Rubin, Daniel; Lorensen, William; Dugan, Jonathan; Ma, Jeff; Murphy, Shawn; Kirschner, Beth; Bug, William; Sherman, Michael; Floratos, Aris; Kennedy, David; Jagadish, H V; Schmidt, Jeanette; Athey, Brian; Califano, Andrea; Musen, Mark; Altman, Russ; Kikinis, Ron; Kohane, Isaac; Delp, Scott; Parker, D Stott; Toga, Arthur W
2008-05-28
The advancement of the computational biology field hinges on progress in three fundamental directions--the development of new computational algorithms, the availability of informatics resource management infrastructures and the capability of tools to interoperate and synergize. There is an explosion in algorithms and tools for computational biology, which makes it difficult for biologists to find, compare and integrate such resources. We describe a new infrastructure, iTools, for managing the query, traversal and comparison of diverse computational biology resources. Specifically, iTools stores information about three types of resources--data, software tools and web-services. The iTools design, implementation and resource meta-data content reflect the broad research, computational, applied and scientific expertise available at the seven National Centers for Biomedical Computing. iTools provides a system for classification, categorization and integration of different computational biology resources across space-and-time scales, biomedical problems, computational infrastructures and mathematical foundations. A large number of resources are already iTools-accessible to the community and this infrastructure is rapidly growing. iTools includes human and machine interfaces to its resource meta-data repository. Investigators or computer programs may utilize these interfaces to search, compare, expand, revise and mine meta-data descriptions of existent computational biology resources. We propose two ways to browse and display the iTools dynamic collection of resources. The first one is based on an ontology of computational biology resources, and the second one is derived from hyperbolic projections of manifolds or complex structures onto planar discs. iTools is an open source project both in terms of the source code development as well as its meta-data content. iTools employs a decentralized, portable, scalable and lightweight framework for long-term resource management. We demonstrate several applications of iTools as a framework for integrated bioinformatics. iTools and the complete details about its specifications, usage and interfaces are available at the iTools web page http://iTools.ccb.ucla.edu.
Dinov, Ivo D.; Rubin, Daniel; Lorensen, William; Dugan, Jonathan; Ma, Jeff; Murphy, Shawn; Kirschner, Beth; Bug, William; Sherman, Michael; Floratos, Aris; Kennedy, David; Jagadish, H. V.; Schmidt, Jeanette; Athey, Brian; Califano, Andrea; Musen, Mark; Altman, Russ; Kikinis, Ron; Kohane, Isaac; Delp, Scott; Parker, D. Stott; Toga, Arthur W.
2008-01-01
The advancement of the computational biology field hinges on progress in three fundamental directions – the development of new computational algorithms, the availability of informatics resource management infrastructures and the capability of tools to interoperate and synergize. There is an explosion in algorithms and tools for computational biology, which makes it difficult for biologists to find, compare and integrate such resources. We describe a new infrastructure, iTools, for managing the query, traversal and comparison of diverse computational biology resources. Specifically, iTools stores information about three types of resources–data, software tools and web-services. The iTools design, implementation and resource meta - data content reflect the broad research, computational, applied and scientific expertise available at the seven National Centers for Biomedical Computing. iTools provides a system for classification, categorization and integration of different computational biology resources across space-and-time scales, biomedical problems, computational infrastructures and mathematical foundations. A large number of resources are already iTools-accessible to the community and this infrastructure is rapidly growing. iTools includes human and machine interfaces to its resource meta-data repository. Investigators or computer programs may utilize these interfaces to search, compare, expand, revise and mine meta-data descriptions of existent computational biology resources. We propose two ways to browse and display the iTools dynamic collection of resources. The first one is based on an ontology of computational biology resources, and the second one is derived from hyperbolic projections of manifolds or complex structures onto planar discs. iTools is an open source project both in terms of the source code development as well as its meta-data content. iTools employs a decentralized, portable, scalable and lightweight framework for long-term resource management. We demonstrate several applications of iTools as a framework for integrated bioinformatics. iTools and the complete details about its specifications, usage and interfaces are available at the iTools web page http://iTools.ccb.ucla.edu. PMID:18509477
Monitoring performance of a highly distributed and complex computing infrastructure in LHCb
NASA Astrophysics Data System (ADS)
Mathe, Z.; Haen, C.; Stagni, F.
2017-10-01
In order to ensure an optimal performance of the LHCb Distributed Computing, based on LHCbDIRAC, it is necessary to be able to inspect the behavior over time of many components: firstly the agents and services on which the infrastructure is built, but also all the computing tasks and data transfers that are managed by this infrastructure. This consists of recording and then analyzing time series of a large number of observables, for which the usage of SQL relational databases is far from optimal. Therefore within DIRAC we have been studying novel possibilities based on NoSQL databases (ElasticSearch, OpenTSDB and InfluxDB) as a result of this study we developed a new monitoring system based on ElasticSearch. It has been deployed on the LHCb Distributed Computing infrastructure for which it collects data from all the components (agents, services, jobs) and allows creating reports through Kibana and a web user interface, which is based on the DIRAC web framework. In this paper we describe this new implementation of the DIRAC monitoring system. We give details on the ElasticSearch implementation within the DIRAC general framework, as well as an overview of the advantages of the pipeline aggregation used for creating a dynamic bucketing of the time series. We present the advantages of using the ElasticSearch DSL high-level library for creating and running queries. Finally we shall present the performances of that system.
How to deal with climate change uncertainty in the planning of engineering systems
NASA Astrophysics Data System (ADS)
Spackova, Olga; Dittes, Beatrice; Straub, Daniel
2016-04-01
The effect of extreme events such as floods on the infrastructure and built environment is associated with significant uncertainties: These include the uncertain effect of climate change, uncertainty on extreme event frequency estimation due to limited historic data and imperfect models, and, not least, uncertainty on future socio-economic developments, which determine the damage potential. One option for dealing with these uncertainties is the use of adaptable (flexible) infrastructure that can easily be adjusted in the future without excessive costs. The challenge is in quantifying the value of adaptability and in finding the optimal sequence of decision. Is it worth to build a (potentially more expensive) adaptable system that can be adjusted in the future depending on the future conditions? Or is it more cost-effective to make a conservative design without counting with the possible future changes to the system? What is the optimal timing of the decision to build/adjust the system? We develop a quantitative decision-support framework for evaluation of alternative infrastructure designs under uncertainties, which: • probabilistically models the uncertain future (trough a Bayesian approach) • includes the adaptability of the systems (the costs of future changes) • takes into account the fact that future decisions will be made under uncertainty as well (using pre-posterior decision analysis) • allows to identify the optimal capacity and optimal timing to build/adjust the infrastructure. Application of the decision framework will be demonstrated on an example of flood mitigation planning in Bavaria.
e!DAL - a framework to store, share and publish research data
2014-01-01
Background The life-science community faces a major challenge in handling “big data”, highlighting the need for high quality infrastructures capable of sharing and publishing research data. Data preservation, analysis, and publication are the three pillars in the “big data life cycle”. The infrastructures currently available for managing and publishing data are often designed to meet domain-specific or project-specific requirements, resulting in the repeated development of proprietary solutions and lower quality data publication and preservation overall. Results e!DAL is a lightweight software framework for publishing and sharing research data. Its main features are version tracking, metadata management, information retrieval, registration of persistent identifiers (DOI), an embedded HTTP(S) server for public data access, access as a network file system, and a scalable storage backend. e!DAL is available as an API for local non-shared storage and as a remote API featuring distributed applications. It can be deployed “out-of-the-box” as an on-site repository. Conclusions e!DAL was developed based on experiences coming from decades of research data management at the Leibniz Institute of Plant Genetics and Crop Plant Research (IPK). Initially developed as a data publication and documentation infrastructure for the IPK’s role as a data center in the DataCite consortium, e!DAL has grown towards being a general data archiving and publication infrastructure. The e!DAL software has been deployed into the Maven Central Repository. Documentation and Software are also available at: http://edal.ipk-gatersleben.de. PMID:24958009
e!DAL--a framework to store, share and publish research data.
Arend, Daniel; Lange, Matthias; Chen, Jinbo; Colmsee, Christian; Flemming, Steffen; Hecht, Denny; Scholz, Uwe
2014-06-24
The life-science community faces a major challenge in handling "big data", highlighting the need for high quality infrastructures capable of sharing and publishing research data. Data preservation, analysis, and publication are the three pillars in the "big data life cycle". The infrastructures currently available for managing and publishing data are often designed to meet domain-specific or project-specific requirements, resulting in the repeated development of proprietary solutions and lower quality data publication and preservation overall. e!DAL is a lightweight software framework for publishing and sharing research data. Its main features are version tracking, metadata management, information retrieval, registration of persistent identifiers (DOI), an embedded HTTP(S) server for public data access, access as a network file system, and a scalable storage backend. e!DAL is available as an API for local non-shared storage and as a remote API featuring distributed applications. It can be deployed "out-of-the-box" as an on-site repository. e!DAL was developed based on experiences coming from decades of research data management at the Leibniz Institute of Plant Genetics and Crop Plant Research (IPK). Initially developed as a data publication and documentation infrastructure for the IPK's role as a data center in the DataCite consortium, e!DAL has grown towards being a general data archiving and publication infrastructure. The e!DAL software has been deployed into the Maven Central Repository. Documentation and Software are also available at: http://edal.ipk-gatersleben.de.
The GILDA t-Infrastructure: grid training activities in Africa and future opportunities
NASA Astrophysics Data System (ADS)
Ardizzone, V.; Barbera, R.; Ciuffo, L.; Giorgio, E.
2009-04-01
Scientists, educators, and students from many parts of the worlds are not able to take advantage of ICT because the digital divide is growing and prevents less developed countries to exploit its benefits. Instead of becoming more empowered and involved in worldwide developments, they are becoming increasingly marginalised as the world of education and science becomes increasingly Internet-dependent. The Grid Infn Laboratory for Dissemination Activities (GILDA) spreads since almost five years the awareness of Grid technology to a large audience, training new communities and fostering new organisations to provide resources. The knowledge dissemination process guided by the training activities is a key factor to ensure that all users can fully understand the characteristics of the Grid services offered by large existing e-Infrastructure. GILDA is becoming a "de facto" standard in training infrastructures (t-Infrastructures) and it is adopted by many grid projects worldwide. In this contribution we will report on the latest status of GILDA services and on the training activities recently carried out in sub-Saharan Africa (Malawi and South Africa). Particular care will be devoted to show how GILDA can be "cloned" to satisfy both education and research demands of African Organisations. The opportunities to benefit from GILDA in the framework of the EPIKH project as well as the plans of the European Commission on grid training and education for the 2010-2011 calls of its 7th Framework Programme will be presented and discussed.
Integrating sea floor observatory data: the EMSO data infrastructure
NASA Astrophysics Data System (ADS)
Huber, Robert; Azzarone, Adriano; Carval, Thierry; Doumaz, Fawzi; Giovanetti, Gabriele; Marinaro, Giuditta; Rolin, Jean-Francois; Beranzoli, Laura; Waldmann, Christoph
2013-04-01
The European research infrastructure EMSO is a European network of fixed-point, deep-seafloor and water column observatories deployed in key sites of the European Continental margin and Arctic. It aims to provide the technological and scientific framework for the investigation of the environmental processes related to the interaction between the geosphere, biosphere, and hydrosphere and for a sustainable management by long-term monitoring also with real-time data transmission. Since 2006, EMSO is on the ESFRI (European Strategy Forum on Research Infrastructures) roadmap and has entered its construction phase in 2012. Within this framework, EMSO is contributing to large infrastructure integration projects such as ENVRI and COOPEUS. The EMSO infrastructure is geographically distributed in key sites of European waters, spanning from the Arctic, through the Atlantic and Mediterranean Sea to the Black Sea. It is presently consisting of thirteen sites which have been identified by the scientific community according to their importance respect to Marine Ecosystems, Climate Changes and Marine GeoHazards. The data infrastructure for EMSO is being designed as a distributed system. Presently, EMSO data collected during experiments at each EMSO site are locally stored and organized in catalogues or relational databases run by the responsible regional EMSO nodes. Three major institutions and their data centers are currently offering access to EMSO data: PANGAEA, INGV and IFREMER. In continuation of the IT activities which have been performed during EMSOs twin project ESONET, EMSO is now implementing the ESONET data architecture within an operational EMSO data infrastructure. EMSO aims to be compliant with relevant marine initiatives such as MyOceans, EUROSITES, EuroARGO, SEADATANET and EMODNET as well as to meet the requirements of international and interdisciplinary projects such as COOPEUS and ENVRI, EUDAT and iCORDI. A major focus is therefore set on standardization and interoperability of the EMSO data infrastructure. Beneath common standards for metadata exchange such as OpenSearch or OAI-PMH, EMSO has chosen to implement core standards of the Open Geospatial Consortium (OGC) Sensor Web Enablement (SWE) suite of standards, such as Catalogue Service for Web (CS-W), Sensor Observation Service (SOS) and Observations and Measurements (O&M). Further, strong integration efforts are currently undertaken to harmonize data formats e.g NetCDF as well as the used ontologies and terminologies. The presentation will also give information to users about the discovery and visualization procedure for the EMSO data presently available.
A Security Architecture for Grid-enabling OGC Web Services
NASA Astrophysics Data System (ADS)
Angelini, Valerio; Petronzio, Luca
2010-05-01
In the proposed presentation we describe an architectural solution for enabling a secure access to Grids and possibly other large scale on-demand processing infrastructures through OGC (Open Geospatial Consortium) Web Services (OWS). This work has been carried out in the context of the security thread of the G-OWS Working Group. G-OWS (gLite enablement of OGC Web Services) is an international open initiative started in 2008 by the European CYCLOPS , GENESI-DR, and DORII Project Consortia in order to collect/coordinate experiences in the enablement of OWS's on top of the gLite Grid middleware. G-OWS investigates the problem of the development of Spatial Data and Information Infrastructures (SDI and SII) based on the Grid/Cloud capacity in order to enable Earth Science applications and tools. Concerning security issues, the integration of OWS compliant infrastructures and gLite Grids needs to address relevant challenges, due to their respective design principles. In fact OWS's are part of a Web based architecture that demands security aspects to other specifications, whereas the gLite middleware implements the Grid paradigm with a strong security model (the gLite Grid Security Infrastructure: GSI). In our work we propose a Security Architectural Framework allowing the seamless use of Grid-enabled OGC Web Services through the federation of existing security systems (mostly web based) with the gLite GSI. This is made possible mediating between different security realms, whose mutual trust is established in advance during the deployment of the system itself. Our architecture is composed of three different security tiers: the user's security system, a specific G-OWS security system, and the gLite Grid Security Infrastructure. Applying the separation-of-concerns principle, each of these tiers is responsible for controlling the access to a well-defined resource set, respectively: the user's organization resources, the geospatial resources and services, and the Grid resources. While the gLite middleware is tied to a consolidated security approach based on X.509 certificates, our system is able to support different kinds of user's security infrastructures. Our central component, the G-OWS Security Framework, is based on the OASIS WS-Trust specifications and on the OGC GeoRM architectural framework. This allows to satisfy advanced requirements such as the enforcement of specific geospatial policies and complex secure web service chained requests. The typical use case is represented by a scientist belonging to a given organization who issues a request to a G-OWS Grid-enabled Web Service. The system initially asks the user to authenticate to his/her organization's security system and, after verification of the user's security credentials, it translates the user's digital identity into a G-OWS identity. This identity is linked to a set of attributes describing the user's access rights to the G-OWS services and resources. Inside the G-OWS Security system, access restrictions are applied making use of the enhanced Geospatial capabilities specified by the OGC GeoXACML. If the required action needs to make use of the Grid environment the system checks if the user is entitled to access a Grid infrastructure. In that case his/her identity is translated to a temporary Grid security token using the Short Lived Credential Services (IGTF Standard). In our case, for the specific gLite Grid infrastructure, some information (VOMS Attributes) is plugged into the Grid Security Token to grant the access to the user's Virtual Organization Grid resources. The resulting token is used to submit the request to the Grid and also by the various gLite middleware elements to verify the user's grants. Basing on the presented framework, the G-OWS Security Working Group developed a prototype, enabling the execution of OGC Web Services on the EGEE Production Grid through the federation with a Shibboleth based security infrastructure. Future plans aim to integrate other Web authentication services such as OpenID, Kerberos and WS-Federation.
Error begat error: design error analysis and prevention in social infrastructure projects.
Love, Peter E D; Lopez, Robert; Edwards, David J; Goh, Yang M
2012-09-01
Design errors contribute significantly to cost and schedule growth in social infrastructure projects and to engineering failures, which can result in accidents and loss of life. Despite considerable research that has addressed their error causation in construction projects they still remain prevalent. This paper identifies the underlying conditions that contribute to design errors in social infrastructure projects (e.g. hospitals, education, law and order type buildings). A systemic model of error causation is propagated and subsequently used to develop a learning framework for design error prevention. The research suggests that a multitude of strategies should be adopted in congruence to prevent design errors from occurring and so ensure that safety and project performance are ameliorated. Copyright © 2011. Published by Elsevier Ltd.
Advances in infrastructure support for flat panel display manufacturing
NASA Astrophysics Data System (ADS)
Bardsley, James N.; Ciesinski, Michael F.; Pinnel, M. Robert
1997-07-01
The success of the US display industry, both in providing high-performance displays for the US Department of Defense at reasonable cost and in capturing a significant share of the global civilian market, depends on maintaining technological leadership and on building efficient manufacturing capabilities. The US Display Consortium (USDC) was set up in 1993 by the US Government and private industry to guide the development of the infrastructure needed to support the manufacturing of flat panel displays. This mainly involves the supply of equipment and materials, but also includes the formation of partnerships and the training of a skilled labor force. Examples are given of successful development projects, some involving USDC participation, others through independent efforts of its member companies. These examples show that US-based companies can achieve leadership positions in this young and rapidly growing global market.
Cybersecurity Awareness in the Power Grid
DOE Office of Scientific and Technical Information (OSTI.GOV)
Scholtz, Jean; Franklin, Lyndsey; Le Blanc, Katya L.
2016-07-10
We report on a series of interviews and observations conducted with control room dispatchers in a bulk electrical system. These dispatchers must react quickly to incidents as they happen in order to ensure the reliability and safe operation of the power grid. They do not have the time to evaluate incidents for signs of cyber-attack as part of their initial response. Cyber-attack detection involves multiple personnel from a variety of roles at both local and regional levels. Smart grid technology will improve detection and defense capabilities of the future grid, however, the current infrastructure remains a mixture of old andmore » new equipment which will continue to operate for some time. Thus, research still needs to focus on strategies for the detection of malicious activity on current infrastructure as well as protection and remediation.« less
NASA Astrophysics Data System (ADS)
Garschagen, Matthias; Sandholz, Simone
2018-04-01
Increased attention has lately been given to the resilience of critical infrastructure in the context of natural hazards and disasters. The major focus therein is on the sensitivity of critical infrastructure technologies and their management contingencies. However, strikingly little attention has been given to assessing and mitigating social vulnerabilities towards the failure of critical infrastructure and to the development, design and implementation of minimum supply standards in situations of major infrastructure failure. Addressing this gap and contributing to a more integrative perspective on critical infrastructure resilience is the objective of this paper. It asks which role social vulnerability assessments and minimum supply considerations can, should and do - or do not - play for the management and governance of critical infrastructure failure. In its first part, the paper provides a structured review on achievements and remaining gaps in the management of critical infrastructure and the understanding of social vulnerabilities towards disaster-related infrastructure failures. Special attention is given to the current state of minimum supply concepts with a regional focus on policies in Germany and the EU. In its second part, the paper then responds to the identified gaps by developing a heuristic model on the linkages of critical infrastructure management, social vulnerability and minimum supply. This framework helps to inform a vision of a future research agenda, which is presented in the paper's third part. Overall, the analysis suggests that the assessment of socially differentiated vulnerabilities towards critical infrastructure failure needs to be undertaken more stringently to inform the scientifically and politically difficult debate about minimum supply standards and the shared responsibilities for securing them.
Infrastructure for Automatic Dynamic Deployment of J2EE Applications in Distributed Environments
2005-01-01
5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER 7. PERFORMING ORGANIZATION NAME(S...AND ADDRESS(ES) Defense Advanced Research Projects Agency,3701 North Fairfax Drive,Arlington,VA,22203-1714 8. PERFORMING ORGANIZATION REPORT...the paper is organized as follows. Section 2 provides necessary background for understanding the specifics of the J2EE component technology which are
Center for Infrastructure Assurance and Security - Attack and Defense Exercises
2010-06-01
conclusion of the research funding under this program. 4.1. Steganography Detection Tools Steganography is the art of hiding information in a cover image ...Some of the more common methods are altering the LSB (least significant bit) of the pixels of the image , altering the palette of an RGB image , or...altering parts of the image in the transform domain. Algorithms that embed information in the transform domain are usually more robust to common
2015-07-01
which were multiday electrical disruptions that occurred as a result of the June 2012 derecho storm, including a disruption at Marine Corps Base...we learned about were a multiday wastewater disruption at Fort Shafter and two electrical disruptions at Aberdeen Proving Ground. 35A derecho is a...D.C.: Jan. 31, 2014). At least seven Marine Corps and Navy installations experienced disruptions as a result of the derecho storm. They are Marine
Missile Defense Information Technology Small Business Conference
2009-09-01
NetOps Survivability 4 • Supported User Base • Number of Workstations • Number of Servers • Number of Special Circuits • Number of Sites • Number...Contracts, MDIOC • Ground Test (DTC) • MDSEC (SS) • Infrastructure (IC) • BMDS Support (BCT) • JTAAS – SETA • Mod & Sim ( DES ) • Analysis (GML) • Tenants...AUG 09) 4 MDA DOCE Engineering Functions • Design Engineers – Develop detailed design artifacts based on architectural specifications – Coordinate