Protection of Critical Homeland Assets

Author(s):  
William J. Bailey

The protection of critical infrastructure assets is vital to every government, organisation, business and person. If the asset forms part of the vital critical infrastructure, the loss could be catastrophic and far reaching with considerable knock-on effects. To avoid such negative outcomes requires a wide range of in-built resilient security structures, plans and operating procedures. A more adaptive, proactive, comprehensive security management process needs to be embraced to: prevent, detect, deter, respond and defeat potential damaging events and incidents. Core to security planning is a full understanding of the potential consequences of worst case scenarios. Adopting a process driven model is a proactive approach and grounded upon current operational procedures used by major international companies in hostile and dangerous environments. By utilizing a clearly defined comprehensive risk management tool, a more systematic Security, Threat, Risk and Vulnerability Assessment (STRVA), process can be developed. This process uses a multi-layered intelligence gathering capabilities.

2018 ◽  
pp. 1705-1738
Author(s):  
William J. Bailey

The protection of critical infrastructure assets is vital to every government, organisation, business and person. If the asset forms part of the vital critical infrastructure, the loss could be catastrophic and far reaching with considerable knock-on effects. To avoid such negative outcomes requires a wide range of in-built resilient security structures, plans and operating procedures. A more adaptive, proactive, comprehensive security management process needs to be embraced to: prevent, detect, deter, respond and defeat potential damaging events and incidents. Core to security planning is a full understanding of the potential consequences of worst case scenarios. Adopting a process driven model is a proactive approach and grounded upon current operational procedures used by major international companies in hostile and dangerous environments. By utilizing a clearly defined comprehensive risk management tool, a more systematic Security, Threat, Risk and Vulnerability Assessment (STRVA), process can be developed. This process uses a multi-layered intelligence gathering capabilities.


Author(s):  
Bill Bailey ◽  
Robert Doleman

The belief that a static alarm system will safeguard critical infrastructure without additional support mechanisms is misplaced. This complacency is no longer satisfactory with the increase in worldwide threat levels and the potential social consequences. What is required is a more proactive, comprehensive security management process that adds to the ability to prevent, detect, deter, respond, and defeat potential harmful events and incidents. The model proposed here is proactive and grounded upon current operational procedures used by major companies in hostile and dangerous environments. By utilising a clearly defined comprehensive risk management tool, a more systematic security, threat, risk, and vulnerability assessment (STRVA), process can be developed. This process needs to identify deliberate targeting of assets through multiple intelligence gathering capabilities, plus defeat testing to probe existing security defences. The consequence approach to a potential breakthrough is at the essence of this methodology.


Author(s):  
Bill Bailey ◽  
Robert Doleman

The belief that a static alarm system will safeguard critical infrastructure without additional support mechanisms is misplaced. This complacency is no longer satisfactory with the increase in worldwide threat levels and the potential social consequences. What is required is a more proactive, comprehensive security management process that adds to the ability to prevent, detect, deter, respond, and defeat potential harmful events and incidents. The model proposed here is proactive and grounded upon current operational procedures used by major companies in hostile and dangerous environments. By utilising a clearly defined comprehensive risk management tool, a more systematic security, threat, risk, and vulnerability assessment (STRVA), process can be developed. This process needs to identify deliberate targeting of assets through multiple intelligence gathering capabilities, plus defeat testing to probe existing security defences. The consequence approach to a potential breakthrough is at the essence of this methodology.


2018 ◽  
Author(s):  
Ayelet Ben-Sasson ◽  
Eli Ben-Sasson ◽  
Kayla Jacobs ◽  
Rotem Malinovitch

BACKGROUND To lower barriers to developmental screening, we designed Baby CROINC (CROwd INtelligence Curation), a digital platform to help parents track and assess their children’s development through crowd wisdom. OBJECTIVE To understand users’ experiences using Baby CROINC in relation to users’ technological competence and attitudes, while considering the influence of their children’s presented developmental evaluations and parents’ actual use of the system. METHODS Mothers of 260 children (M age= 17.6 months, SD=13.7) used Baby CROINC for two weeks. They entered developmental milestones on their children’s developmental diary timeline and received statistical developmental percentile reports. Mothers then completed Usability and Technology Profile Questionnaires. RESULTS Mothers’ experiences of the Baby CROINC system usability were associated with their attitudes toward solving technological problems, mediated by frequency of engagement in Internet activities. Mothers with a proactive approach toward solving technology problems, engage in a wide range of Internet activities, and/or view the Internet as integral to their lives had a better experience with Baby CROINC than mothers who did not. The system’s perceived usability was not associated with the crowd-based child developmental percentiles or quantity of mothers’ usage of the system. CONCLUSIONS Parent’s user experiences correlate with their technology competence and problem solving attitude but is not correlated with their child’s developmental status. Developmental screening platforms need to solve the tension between requiring active engagement and encouraging proactive parenting.


2000 ◽  
Vol 1 (2) ◽  
pp. 24-25

The BMJ has always been recognised as a leading medical journal for a wide range of subjects, and has always been useful for nurses to access for up to date and current medical opinion. Recently the BMJ has diversified to take on a more political nature, with its content reflecting a more proactive approach to influencing health care policy in the United Kingdom by the medical profession. As such the BMJ has become extremely useful for identifying opinions of current ‘hot topics’ for nurses that are headline news such as nurse consultants, hospital administration and central government policy. However, one problem remains, trying to find the original copy in the library will remain difficult. After spending the best part of an hour to suddenly realise that ‘how silly you are for not realising that BMJ March 1997 is filed in the British Journal of Nursing section 1998!!’ is often a frustrating and demoralising experience - particularly if after finding the article you find it has nothing to do with the subject that you are researching. This problem is to be banished forever with the BMJ website. The full BMJ is available free on line. The excellent search engine is particularly useful and is accurate when matching target articles. All articles are available for ‘full text’ downloads free of charge.


2000 ◽  
Author(s):  
Emiliano Cioffarelli ◽  
Enrico Sciubba

Abstract A hybrid propulsion system of new conception for medium-size passenger cars is described and its preliminary design developed. The system consists of a turbogas set operating at fixed rpm, and a battery-operated electric motor that constitutes the actual “propulsor”. The battery pack is charged by the thermal engine which works in an electronically controlled on/off mode. Though the idea is not entirely new (there are some concept cars with similar characteristics), the present study has important new aspects, in that it bases the sizing of the thermal engine on the foreseen “worst case” vehicle mission (derived from available data on mileage and consumption derived from road tests and standard EEC driving mission cycles) that they can in fact be accomplished, and then proceeds to develop a control strategy that enables the vehicle to perform at its near–peak efficiency over a wide range of possible missions. To increase the driveability of the car, a variable-inlet vane system is provided for the gas turbine. After developing the mission concept, and showing via a thorough set of energy balances (integrated over various mission profiles), a preliminary sizing of the turbogas set is performed. The results of this first part of the development program show that the concept is indeed feasible, and that it has important advantages over both more traditional (Hybrid Vehicles powered by an Internal Combustion Engine) and novel (All-Electric Vehicle) propulsion systems.


2015 ◽  
Vol 53 (3) ◽  
pp. 477-486 ◽  
Author(s):  
Elke Zuern

South Africa is at a crossroads. The state has not adequately addressed dire human development needs, often failing to provide the services it constitutionally guarantees. As a result, citizens are expressing their frustrations in a variety of ways, at times including violence. These serious challenges are most readily apparent in poverty, inequality and unemployment statistics, but also in electricity provision, billing and affordability as well as a recent spate of racially motivated attacks which highlight the tension both among South Africans and between South Africans and darker skinned foreigners. The country has, however, been on the brink before and avoided the worst-case scenario of full-scale civil war and state collapse. Far too often South Africa's past successes have been attributed to the role of one man, Nelson Mandela. While Mandela was indeed an extraordinary human being who rightly deserved the international awards and accolades as well as the deep admiration of so many, South Africa's triumphs as a society and a state are the product of both cooperative and conflicting contributions by a wide range of actors. A central question at the present juncture is how well equipped domestic actors and institutions are to address the crisis. The following pages seek to provide some insights and through the perspectives of three authors to consider causes and possible responses.


Author(s):  
Edward J. Oughton

Space weather is a collective term for different solar or space phenomena that can detrimentally affect technology. However, current understanding of space weather hazards is still relatively embryonic in comparison to terrestrial natural hazards such as hurricanes, earthquakes, or tsunamis. Indeed, certain types of space weather such as large Coronal Mass Ejections (CMEs) are an archetypal example of a low-probability, high-severity hazard. Few major events, short time-series data, and the lack of consensus regarding the potential impacts on critical infrastructure have hampered the economic impact assessment of space weather. Yet, space weather has the potential to disrupt a wide range of Critical National Infrastructure (CNI) systems including electricity transmission, satellite communications and positioning, aviation, and rail transportation. In the early 21st century, there has been growing interest in these potential economic and societal impacts. Estimates range from millions of dollars of equipment damage from the Quebec 1989 event, to some analysts asserting that losses will be in the billions of dollars in the wider economy from potential future disaster scenarios. Hence, the origin and development of the socioeconomic evaluation of space weather is tracked, from 1989 to 2017, and future research directions for the field are articulated. Since 1989, many economic analyzes of space weather hazards have often completely overlooked the physical impacts on infrastructure assets and the topology of different infrastructure networks. Moreover, too many studies have relied on qualitative assumptions about the vulnerability of CNI. By modeling both the vulnerability of critical infrastructure and the socioeconomic impacts of failure, the total potential impacts of space weather can be estimated, providing vital information for decision makers in government and industry. Efforts on this subject have historically been relatively piecemeal, which has led to little exploration of model sensitivities, particularly in relation to different assumption sets about infrastructure failure and restoration. Improvements may be expedited in this research area by open-sourcing model code, increasing the existing level of data sharing, and improving multidisciplinary research collaborations between scientists, engineers, and economists.


The field of biosciences have advanced to a larger extent and have generated large amounts of information from Electronic Health Records. This have given rise to the acute need of knowledge generation from this enormous amount of data. Data mining methods and machine learning play a major role in this aspect of biosciences. Chronic Kidney Disease(CKD) is a condition in which the kidneys are damaged and cannot filter blood as they always do. A family history of kidney diseases or failure, high blood pressure, type 2 diabetes may lead to CKD. This is a lasting damage to the kidney and chances of getting worser by time is high. The very common complications that results due to a kidney failure are heart diseases, anemia, bone diseases, high potasium and calcium. The worst case situation leads to complete kidney failure and necessitates kidney transplant to live. An early detection of CKD can improve the quality of life to a greater extent. This calls for good prediction algorithm to predict CKD at an earlier stage . Literature shows a wide range of machine learning algorithms employed for the prediction of CKD. This paper uses data preprocessing,data transformation and various classifiers to predict CKD and also proposes best Prediction framework for CKD. The results of the framework show promising results of better prediction at an early stage of CKD


Author(s):  
William C. Regli ◽  
Satyandra K. Gupta ◽  
Dana S. Nau

Abstract While automated recognition of features has been attempted for a wide range of applications, no single existing approach possesses the functionality required to perform manufacturability analysis. In this paper, we present a methodology for taking a CAD model of a part and extracting a set of machinable features that contains the complete set of alternative interpretations of the part as collections of MRSEVs (Material Removal Shape Element Volumes, a STEP-based library of machining features). The approach handles a variety of features including those describing holes, pockets, slots, and chamfering and filleting operations. In addition, the approach considers accessibility constraints for these features, has an worst-case algorithmic time complexity quadratic in the number of solid modeling operations, and modifies features recognized to account for available tooling and produce more realistic volumes for manufacturability analysis.


Sign in / Sign up

Export Citation Format

Share Document