WorldWideScience

Sample records for enhanced critical infrastructure

  1. TCIA Secure Cyber Critical Infrastructure Modernization.

    Energy Technology Data Exchange (ETDEWEB)

    Keliiaa, Curtis M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.

  2. Constructing a resilience index for the Enhanced Critical Infrastructure Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    Fisher, R. E.; Bassett, G. W.; Buehring, W. A.; Collins, M. J.; Dickinson, D. C.; Eaton, L. K.; Haffenden, R. A.; Hussar, N. E.; Klett, M. S.; Lawlor, M. A.; Millier, D. J.; Petit, F. D.; Peyton, S. M.; Wallace, K. E.; Whitfield, R. G.; Peerenboom, J P

    2010-10-14

    Following recommendations made in Homeland Security Presidential Directive 7, which established a national policy for the identification and increased protection of critical infrastructure and key resources (CIKR) by Federal departments and agencies, the U.S. Department of Homeland Security (DHS) in 2006 developed the Enhanced Critical Infrastructure Protection (ECIP) program. The ECIP program aimed to provide a closer partnership with state, regional, territorial, local, and tribal authorities in fulfilling the national objective to improve CIKR protection. The program was specifically designed to identify protective measures currently in place in CIKR and to inform facility owners/operators of the benefits of new protective measures. The ECIP program also sought to enhance existing relationships between DHS and owners/operators of CIKR and to build relationships where none existed (DHS 2008; DHS 2009). In 2009, DHS and its protective security advisors (PSAs) began assessing CIKR assets using the ECIP program and ultimately produced individual protective measure and vulnerability values through the protective measure and vulnerability indices (PMI/VI). The PMI/VI assess the protective measures posture of individual facilities at their 'weakest link,' allowing for a detailed analysis of the most vulnerable aspects of the facilities (Schneier 2003), while maintaining the ability to produce an overall protective measures picture. The PMI has six main components (physical security, security management, security force, information sharing, protective measures assessments, and dependencies) and focuses on actions taken by a facility to prevent or deter the occurrence of an incident (Argonne National Laboratory 2009). As CIKR continue to be assessed using the PMI/VI and owners/operators better understand how they can prevent or deter incidents, academic research, practitioner emphasis, and public policy formation have increasingly focused on resilience as a

  3. Counter terrorism functions to enhance critical infrastructure resilience against CBRNe terrorism

    NARCIS (Netherlands)

    Bonsen, I.M.; Gaasbeek, R.C.

    2009-01-01

    Current approaches in critical infrastructure protection use long lists of items that fail to give its user a structured answer to the state of protection of its object. The functionality approach uses different terrorist functions to structure the threat (which are to have intent, to scout, to

  4. Critical infrastructure protection

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, F. [Canadian Electricity Association, Toronto, ON (Canada)

    2003-04-01

    The need to protect critical electrical infrastructure from terrorist attacks, or other physical damage, including weather related events, or the potential impact of computer viruses and other attacks on IT resources are discussed. Activities of the North American Electric Reliability Council (NERC) are highlighted which seek to safeguard the North American bulk electric power system principally through the Information Sharing and Analysis Sector (ES-ISAC). ES-ISAC serves the electricity sector by facilitating communication between electric sector participants, federal government and other critical infrastructure industries by disseminating threat indications, analyses and warnings, together with interpretations, to assist the industry in taking infrastructure protection actions. Attention is drawn to the numerous cyber incidents in recent years, which although resulted in no loss of service to electricity customers so far, in at least one instance (the January 25th SOL-Slammer worm incident) resulted in degradation of service in a number of sectors, including financial, transportation and telecommunication services. The increasing frequency of cyber-based attacks, coupled with the industry's growing dependence on e-commerce and electronic controls, are good reasons to believe that critical infrastructure protection (CIP) poses a serious challenge to the industry's risk management practices. The Canadian Electricity Association (CEA) is an active participant in ES-ISAC and works cooperatively with a range of partners, such as the Edison Electric Institute and the American Public Power Association to ensure coordination and effective protection program delivery for the electric power sector. The Early Warning System (EWS) developed by the CIP Working Group is one of the results of this cooperation. EWS uses the Internet, e-mail, web-enabled cell phones and Blackberry hand-held devices to deliver real-time threat information to members on a 24/7 basis. EWS

  5. Constructing vulnerabilty and protective measures indices for the enhanced critical infrastructure protection program.

    Energy Technology Data Exchange (ETDEWEB)

    Fisher, R. E.; Buehring, W. A.; Whitfield, R. G.; Bassett, G. W.; Dickinson, D. C.; Haffenden, R. A.; Klett, M. S.; Lawlor, M. A.; Decision and Information Sciences; LANL

    2009-10-14

    The US Department of Homeland Security (DHS) has directed its Protective Security Advisors (PSAs) to form partnerships with the owners and operators of assets most essential to the Nation's well being - a subclass of critical infrastructure and key resources (CIKR) - and to conduct site visits for these and other high-risk assets as part of the Enhanced Critical Infrastructure Protection (ECIP) Program. During each such visit, the PSA documents information about the facility's current CIKR protection posture and overall security awareness. The primary goals for ECIP site visits (DHS 2009) are to: (1) inform facility owners and operators of the importance of their facilities as an identified high-priority CIKR and the need to be vigilant in light of the ever-present threat of terrorism; (2) identify protective measures currently in place at these facilities, provide comparisons of CIKR protection postures across like assets, and track the implementation of new protective measures; and (3) enhance existing relationships among facility owners and operators; DHS; and various Federal, State, local tribal, and territorial partners. PSAs conduct ECIP visits to assess overall site security; educate facility owners and operators about security; help owners and operators identify gaps and potential improvements; and promote communication and information sharing among facility owners and operators, DHS, State governments, and other security partners. Information collected during ECIP visits is used to develop metrics; conduct sector-by-sector and cross-sector vulnerability comparisons; identify security gaps and trends across CIKR sectors and subsectors; establish sector baseline security survey results; and track progress toward improving CIKR security through activities, programs, outreach, and training (Snyder 2009). The data being collected are used in a framework consistent with the National Infrastructure Protection Plan (NIPP) risk criteria (DHS 2009). The

  6. Geographic Hotspots of Critical National Infrastructure.

    Science.gov (United States)

    Thacker, Scott; Barr, Stuart; Pant, Raghav; Hall, Jim W; Alderson, David

    2017-12-01

    Failure of critical national infrastructures can result in major disruptions to society and the economy. Understanding the criticality of individual assets and the geographic areas in which they are located is essential for targeting investments to reduce risks and enhance system resilience. Within this study we provide new insights into the criticality of real-life critical infrastructure networks by integrating high-resolution data on infrastructure location, connectivity, interdependence, and usage. We propose a metric of infrastructure criticality in terms of the number of users who may be directly or indirectly disrupted by the failure of physically interdependent infrastructures. Kernel density estimation is used to integrate spatially discrete criticality values associated with individual infrastructure assets, producing a continuous surface from which statistically significant infrastructure criticality hotspots are identified. We develop a comprehensive and unique national-scale demonstration for England and Wales that utilizes previously unavailable data from the energy, transport, water, waste, and digital communications sectors. The testing of 200,000 failure scenarios identifies that hotspots are typically located around the periphery of urban areas where there are large facilities upon which many users depend or where several critical infrastructures are concentrated in one location. © 2017 Society for Risk Analysis.

  7. Durability of critical infrastructures

    OpenAIRE

    Raluca Pascu; Ramiro Sofronie

    2011-01-01

    The paper deals with those infrastructures by which world society, under the pressure ofdemographic explosion, self-survives. The main threatening comes not from terrorist attacks, but fromthe great natural catastrophes and global climate change. It’s not for the first time in history when suchmeasures of self-protection are built up. First objective of this paper is to present the background fordurability analysis. Then, with the aid of these mathematical tools the absolute durability of thr...

  8. Cyberspace and Critical Information Infrastructures

    Directory of Open Access Journals (Sweden)

    Dan COLESNIUC

    2013-01-01

    Full Text Available Every economy of an advanced nation relies on information systems and interconnected networks, thus in order to ensure the prosperity of a nation, making cyberspace a secure place becomes as crucial as securing society. Cyber security means ensuring the safety of this cyberspace from threats which can take different forms, such as stealing secret information from national companies and government institutions, attacking infrastructure vital for the functioning of the nation or attacking the privacy of the single citizen. The critical information infrastructure (CII represents the indispensable "nervous system", that allow modern societies to work and live. Besides, without it, there would be no distribution of energy, no services like banking or finance, no air traffic control and so on. But at the same time, in the development process of CII, security was never considered a top priority and for this reason they are subject to a high risk in relation to the organized crime.

  9. Critical Energy Infrastructure Protection in Canada

    Science.gov (United States)

    2010-12-01

    department for the Energy sector, has been pro- active and innovative in enhancing protection for national critical energy infrastructure (NCI). While...prospérité (PSP), mais des relations transfrontalières plus informelles entre les propriétaires/opérateurs et leurs associations industrielles ...create innovative solutions for CIP. 9. International Cooperation: participate in international CIP initiatives and to strengthen information-sharing

  10. Emergent Risks In Critical Infrastructures

    Science.gov (United States)

    Dynes, Scott

    Firms cannot function successfully without managing a host of internal and external organizational and process interdependencies. Part of this involves business continuity planning, which directly aects how resilient arm and its business sector are in the face of disruptions. This paper presents the results of eld studies related to information risk management practices in the health care and retail sectors. The studies explore information risk management coordinating signals within and across rms in these sectors as well as the potential eects of cyber disruptions on the rms as stand-alone entities and as part of a critical infrastructure. The health care case study investigates the impact of the Zotob worm on the ability to deliver medical care and treatment. The retail study examines the resilience of certain elements of the food supply chain to cyber disruptions.

  11. Risk and Interdependencies in Critical Infrastructures A Guideline for Analysis

    CERN Document Server

    Utne, Ingrid; Vatn, Jørn

    2012-01-01

    Today’s society is completely dependent on critical networks such as  water supply, sewage, electricity, ICT and transportation. Risk and vulnerability analyses are needed to grasp the impact of threats and hazards. However, these become quite complex as there are strong interdependencies both within and between infrastructure systems. Risk and Interdependencies in Critical Infrastructures: A  guideline for analysis provides methods for analyzing risks and interdependencies of critical infrastructures.  A number of analysis approaches are described and are adapted to each of these infrastructures. Various approaches are also revised, and all are supported by several examples and illustrations. Particular emphasis is given to the analysis of various interdependencies that often exist between the infrastructures.  Risk and Interdependencies in Critical Infrastructures: A  guideline for analysis provides a good tool to identify the hazards that are threatening your infrastructures, and will enhance the un...

  12. Critical infrastructure protection research results of the first critical infrastructure protection research project in Hungary

    CERN Document Server

    Padányi, József

    2016-01-01

    This book presents recent research in the recognition of vulnerabilities of national systems and assets which gained special attention for the Critical Infrastructures in the last two decades. The book concentrates on R&D activities in the relation of Critical Infrastructures focusing on enhancing the performance of services as well as the level of security. The objectives of the book are based on a project entitled "Critical Infrastructure Protection Researches" (TÁMOP-4.2.1.B-11/2/KMR-2011-0001) which concentrated on innovative UAV solutions, robotics, cybersecurity, surface engineering, and mechatrinics and technologies providing safe operations of essential assets. This report is summarizing the methodologies and efforts taken to fulfill the goals defined. The project has been performed by the consortium of the Óbuda University and the National University of Public Service.

  13. Critical infrastructure system security and resiliency

    CERN Document Server

    Biringer, Betty; Warren, Drake

    2013-01-01

    Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard. With an emphasis on protecting an infrastructure's ability to perform its mission or function, Critical Infrastructure System Security and Resiliency presents a practical methodology for developing an effective protection system that can either prevent undesired events or mitigate the consequences of such events.Developed at Sandia National Labs, the authors' analytical approach and

  14. After the year 2000: Critical infrastructure protection

    International Nuclear Information System (INIS)

    Dreicer, M.

    1999-01-01

    Presentation defines the critical infrastructure which includes: telecommunication, banking, transportation, electric energy, oil and gas supply, water supply, emergency services and government operations. The problem of protecting the critical infrastructure is is exposed in detail concerning physical protection and protection of information systems against cyberthreats

  15. Critical Infrastructure Protection: Maintenance is National Security

    Directory of Open Access Journals (Sweden)

    Kris Hemme

    2015-10-01

    Full Text Available U.S. critical infrastructure protection (CIP necessitates both the provision of security from internal and external threats and the repair of physically damaged critical infrastructure which may disrupt services. For years, the U.S. infrastructure has been deteriorating, triggering enough damage and loss of life to give cause for major concern. CIP is typically only addressed after a major disaster or catastrophe due to the extreme scrutiny that follows these events. In fact, CIP has been addressed repeatedly since Presidential Decision Directive Sixty-Three (PDD Sixty-Three signed by President Bill Clinton on May Twenty-Second, 1998.[1] This directive highlighted critical infrastructure as “a growing potential vulnerability” and recognized that the United States has to view the U.S. national infrastructure from a security perspective due to its importance to national and economic security. CIP must be addressed in a preventive, rather than reactive, manner.[2] As such, there are sixteen critical infrastructure sectors, each with its own protection plan and unique natural and man-made threats, deteriorations, and risks. A disaster or attack on any one of these critical infrastructures could cause serious damage to national security and possibly lead to the collapse of the entire infrastructure. [1] The White House, Presidential Decision Directive/NSC–63 (Washington D.C.: The White House, May 22, 1998: 1–18, available at: http://www.epa.gov/watersecurity/tools/trainingcd/Guidance/pdd-63.pdf. [2] Ibid, 1.

  16. Enhancing Critical Infrastructure and Key Resources (CIKR) Level-0 Physical Process Security Using Field Device Distinct Native Attribute Features

    Energy Technology Data Exchange (ETDEWEB)

    Lopez, Juan [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Liefer, Nathan C. [Wright-Patterson AFB, Dayton, OH (United States); Busho, Colin R. [Wright-Patterson AFB, Dayton, OH (United States); Temple, Michael A. [Wright-Patterson AFB, Dayton, OH (United States)

    2017-12-04

    Here, the need for improved Critical Infrastructure and Key Resource (CIKR) security is unquestioned and there has been minimal emphasis on Level-0 (PHY Process) improvements. Wired Signal Distinct Native Attribute (WS-DNA) Fingerprinting is investigated here as a non-intrusive PHY-based security augmentation to support an envisioned layered security strategy. Results are based on experimental response collections from Highway Addressable Remote Transducer (HART) Differential Pressure Transmitter (DPT) devices from three manufacturers (Yokogawa, Honeywell, Endress+Hauer) installed in an automated process control system. Device discrimination is assessed using Time Domain (TD) and Slope-Based FSK (SB-FSK) fingerprints input to Multiple Discriminant Analysis, Maximum Likelihood (MDA/ML) and Random Forest (RndF) classifiers. For 12 different classes (two devices per manufacturer at two distinct set points), both classifiers performed reliably and achieved an arbitrary performance benchmark of average cross-class percent correct of %C > 90%. The least challenging cross-manufacturer results included near-perfect %C ≈ 100%, while the more challenging like-model (serial number) discrimination results included 90%< %C < 100%, with TD Fingerprinting marginally outperforming SB-FSK Fingerprinting; SB-FSK benefits from having less stringent response alignment and registration requirements. The RndF classifier was most beneficial and enabled reliable selection of dimensionally reduced fingerprint subsets that minimize data storage and computational requirements. The RndF selected feature sets contained 15% of the full-dimensional feature sets and only suffered a worst case %CΔ = 3% to 4% performance degradation.

  17. 31 CFR 800.208 - Critical infrastructure.

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 3 2010-07-01 2010-07-01 false Critical infrastructure. 800.208 Section 800.208 Money and Finance: Treasury Regulations Relating to Money and Finance (Continued) OFFICE... infrastructure means, in the context of a particular covered transaction, a system or asset, whether physical or...

  18. Extensible threat taxonomy for critical infrastructures

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Nieuwenhuijs, A.H.

    2008-01-01

    The European Union-sponsored project Vital Infrastructure Threats and Assurance (VITA) has the objective of exploring and showing new paths in Critical Infrastructure Protection (CIP) R&D. This paper describes one of VITA’s results: the idea and the development of a novel extensible and generic

  19. Critical Infrastructures: Background, Policy, and Implementation

    National Research Council Canada - National Science Library

    Moteff, John D

    2005-01-01

    .... electricity, the power plants that generate it, and the electric grid upon which it is distributed). The national security community has been concerned for sometime about the vulnerability of critical infrastructure to both physical and cyber attack...

  20. Critical Infrastructure Information Disclosure and Homeland Security

    National Research Council Canada - National Science Library

    Moteff, John D; Stevens, Gina M

    2003-01-01

    Critical infrastructures have been defined as those systems and assets so vital to the United States that the incapacity of such systems and assets would have a debilitating impact on the United States...

  1. Critical Infrastructure Protection- Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Bofman, Ryan K. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-02-24

    Los Alamos National Laboratory (LANL) has been a key facet of Critical National Infrastructure since the nuclear bombing of Hiroshima exposed the nature of the Laboratory’s work in 1945. Common knowledge of the nature of sensitive information contained here presents a necessity to protect this critical infrastructure as a matter of national security. This protection occurs in multiple forms beginning with physical security, followed by cybersecurity, safeguarding of classified information, and concluded by the missions of the National Nuclear Security Administration.

  2. International Conference on Durability of Critical Infrastructure

    CERN Document Server

    Cherepetskaya, Elena; Pospichal, Vaclav

    2017-01-01

    This book presents the proceedings of the International Conference on Durability of Critical Infrastructure. Monitoring and Testing held in Satov, Czech Republic from 6 to 9 December 2016. It discusses the developments in the theoretical and practical aspects in the fields of Safety, Sustainability and Durability of the Critical Infrastructure. The contributions are dealing with monitoring and testing of structural and composite materials with a new methods for their using for protection and prevention of the selected objects.

  3. Collaborative Access Control For Critical Infrastructures

    Science.gov (United States)

    Baina, Amine; El Kalam, Anas Abou; Deswarte, Yves; Kaaniche, Mohamed

    A critical infrastructure (CI) can fail with various degrees of severity due to physical and logical vulnerabilities. Since many interdependencies exist between CIs, failures can have dramatic consequences on the entire infrastructure. This paper focuses on threats that affect information and communication systems that constitute the critical information infrastructure (CII). A new collaborative access control framework called PolyOrBAC is proposed to address security problems that are specific to CIIs. The framework offers each organization participating in a CII the ability to collaborate with other organizations while maintaining control of its resources and internal security policy. The approach is demonstrated on a practical scenario involving the electrical power grid.

  4. CRITICAL INFRASTRUCTURE PROTECTION WITHIN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Vasile N. POPA

    2013-01-01

    Full Text Available The new dynamics and intensity of the risks and threats posed to societal functioning and citizens’ security have acquired new meanings. Consequently, an integrated approach to the concept of ”critical infrastructure” is necessary. The critical nature of some of the basic characteristics of the critical infrastructures has made them acquire new meanings within the national/transnational strategic planning. Moreover, the complexity and importance of critical infrastructure protection for social stability have generated the correlaton of the strategies developed by states and organizations.

  5. Risk Assessment Methodology for Protecting Our Critical Physical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    BIRINGER,BETTY E.; DANNEELS,JEFFREY J.

    2000-12-13

    Critical infrastructures are central to our national defense and our economic well-being, but many are taken for granted. Presidential Decision Directive (PDD) 63 highlights the importance of eight of our critical infrastructures and outlines a plan for action. Greatly enhanced physical security systems will be required to protect these national assets from new and emerging threats. Sandia National Laboratories has been the lead laboratory for the Department of Energy (DOE) in developing and deploying physical security systems for the past twenty-five years. Many of the tools, processes, and systems employed in the protection of high consequence facilities can be adapted to the civilian infrastructure.

  6. 78 FR 11737 - Improving Critical Infrastructure Cybersecurity

    Science.gov (United States)

    2013-02-19

    ..., security, business confidentiality, privacy, and civil liberties. We can achieve these goals through a... security measures or controls on business confidentiality, and to protect individual privacy and civil... critical infrastructure demonstrate the need for improved cybersecurity. The cyber threat to critical...

  7. Critical infrastructure security assessment, prevention, detection, response

    CERN Document Server

    FLAMMINI, F

    2012-01-01

    The most comprehensive handbook on critical infrastructures (CI), addressing both logical and physical security from an engineering point of view. The book surveys state-of-the-art methodologies and tools for CI analysis as well as strategies and technologies for CI protection.

  8. Critical infrastructure dependencies 1-0-1

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Nieuwenhuijs, A.H.; Klaver, M.H.A.

    2008-01-01

    Most of our critical infrastructures consist of complex systems-of-systems that provide services or products. The coupling mechanism between the chained systems in such complex systems of systems is dependencies. Dependencies may propagate cascading failures. Most studies on dependencies in

  9. CHDS Sponsors Critical Infrastructure Protection Workshop

    OpenAIRE

    Center for Homeland Defense and Security

    2008-01-01

    Center for Homeland Defense and Security, PRESS RELEASES The NPS Center for Homeland Defense and Security in partnership with the U.S. Department of Homeland Security recently hosted its first Critical Infrastructure Protection Workshop. The workshop brought together practitioners and...

  10. The European cooperative approach to securing critical information infrastructure.

    Science.gov (United States)

    Purser, Steve

    2011-10-01

    This paper provides an overview of the EU approach to securing critical information infrastructure, as defined in the Action Plan contained in the Commission Communication of March 2009, entitled 'Protecting Europe from large-scale cyber-attacks and disruptions: enhancing preparedness, security and resilience' and further elaborated by the Communication of May 2011 on critical Information infrastructure protection 'Achievements and next steps: towards global cyber-security'. After explaining the need for pan-European cooperation in this area, the CIIP Action Plan is explained in detail. Finally, the current state of progress is summarised together with the proposed next steps.

  11. 78 FR 57644 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Science.gov (United States)

    2013-09-19

    ... committee has completed its business. To accommodate as many speakers as possible, oral presentations will... infrastructure resilience. Topics such as the Executive Order for Improving Critical Infrastructure Cybersecurity...

  12. Critical Foundations: Protecting America's Infrastructures. The Report of the President's Commission on Critical Infrastructure Protection

    National Research Council Canada - National Science Library

    1997-01-01

    There is no doubt that our critical infrastructures are the best in the world-largely the result of the tremendous efficiency and global reach made possible by incorporation of our rapidly advancing...

  13. Dynamic Hazards In Critical Infrastructure Of State

    Directory of Open Access Journals (Sweden)

    Ostrowska Teresa

    2015-06-01

    Full Text Available The authors are interested in some aspects of a development project entitled “The methodology of risk assessment for the purposes of crisis management system RP (ID 193751”. The project funded by the National Research and Development Centre under the Competition 3/2012 (security and defense. As part of the project the following items were reviewed and analyzed: materials related to the Government Security Centre, already completed and available products of the project ID 193751, and literature relating to, among other things, crisis management, critical infrastructure, business continuity, security, and threats. The basic emphasis of the article is focused on the resource-critical infrastructure interpretation of the state, whereby the state is perceived as a complex administrative structure in which, on the basis of external and internal interactions of resources, the risk of threats measurement is done.

  14. Critical Infrastructure References: Documented Literature Search

    Science.gov (United States)

    2012-10-01

    that the economy typically experiences following extreme events: (i) significant changes in consumption patterns due to lingering public fear and (ii...when making choices related to critical infrastructure and security. • The case studies are drawn from the Victorian Bushfires of 2009. o The first...case study covers the impact of the Victorian bushfires on environmental security, or more specifically, water supply. This case study highlights

  15. Defending Critical Infrastructure as Cyber Key Terrain

    Science.gov (United States)

    2016-08-01

    to Secure Cyberspace (NSSC) is as it lists three strategic objectives:4 1) Prevent cyber attacks against America’s critical infrastructures; 2...House, “National Strategy to Secure Cyberspace,” (Washington, DC: The White House, 2003) Trey Herr, "PrEP: A framework for malware & cyber weapons...David Kuipers and Mark Fabro. “Control Systems Cyber Security : Defense in Depth Strategies,” [United States: Department of Energy, 2006]: 4

  16. DETERMINANTS OF RISK ASSESSMENT PROCESS IN CRITICAL ENERGY INFRASTRUCTURE

    Directory of Open Access Journals (Sweden)

    Przemysław Borkowski

    2016-06-01

    Full Text Available Article deals with the problem of risk assessment in critical energy infrastructure. Firstly the critical infrastructure in energy sector is discussed than risk identification methodology for application to critical infrastructure is proposed. Specific conditions resulting from features of critical infrastructure are addressed in the context of risk assessment procedure. The limits of such a procedure are outlined and critical factors influencing different stages of risk assessment process are researched in view of specificity of the sector.

  17. 76 FR 55693 - Critical Infrastructure Partnership Advisory Council

    Science.gov (United States)

    2011-09-08

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0055] Critical Infrastructure Partnership... Advisory Committee Meeting. SUMMARY: The Critical Infrastructure Partnership Advisory Council (CIPAC... meeting may adjourn early if the committee has completed its business. For additional information, please...

  18. Critical success factors in infrastructure projects

    Science.gov (United States)

    Zakaria, Siti Fairus; Zin, Rosli Mohamad; Mohamad, Ismail; Balubaid, Saeed; Mydin, Shaik Hussein; Mohd Rahim, E. M. Roodienyanto

    2017-11-01

    Construction of infrastructure project is different from buildings. The main difference is term of project site where infrastructure project need to command a long stretch while building mostly confine to a limited area. As such factors that are critical to infrastructure project may not be that significant to building project and vice versa. Flood mitigation can be classified under infrastructure projects under which their developments are planned by the government with the specific objective to reduce or avoid the negative effects of flood to the environment and livelihood. One of the indicators in project success is delay. The impact of project delay in construction industry is significant that it decelerates the projects implementation, specifically the government projects. This study attempted to identify and compare the success factors between infrastructure and building projects, as such comparison rarely found in the current literature. A model of flood mitigation projects' success factors was developed by merging the experts' views and reports from the existing literature. The experts' views were obtained from the responses to open-ended questions on the required fundamentals to achieve successful completion of flood mitigation projects. An affinity analysis was applied to these responses to develop the model. The developed model was then compared to the established success factors found in building project, extracted from the previous studies to identify the similarities and differences between the two models. This study would assist the government and construction players to become more effective in constructing successful flood mitigation projects for the future practice in a flood-prone country like Malaysia.

  19. New concept of critical infrastructure strengthening

    International Nuclear Information System (INIS)

    Gazizov, Talgat R.; Orlov, Pavel E.; Zabolotsky, Alexander M.; Kuksenko, Sergey P.

    2016-01-01

    Strengthening of critical infrastructure is considered. Modal reservation of electronics is proposed as a new concept of the strengthening. The concept combines a widely used cold backup and a recently proposed modal filtration. It makes electronics reliable as well as protected against electromagnetic interference, especially the ultra-wide band pulses. New printed circuit board structure is suggested for implementation of the proposed concept. Results of simulation in time and frequency domains are presented for the suggested structures. Considerable attenuation of dangerous excitations shows that the new concept and structure are promising.

  20. New concept of critical infrastructure strengthening

    Energy Technology Data Exchange (ETDEWEB)

    Gazizov, Talgat R.; Orlov, Pavel E.; Zabolotsky, Alexander M.; Kuksenko, Sergey P. [Tomsk State University of Control Systems and Radioelectronics, 634050, Lenin Ave., Tomsk (Russian Federation)

    2016-06-08

    Strengthening of critical infrastructure is considered. Modal reservation of electronics is proposed as a new concept of the strengthening. The concept combines a widely used cold backup and a recently proposed modal filtration. It makes electronics reliable as well as protected against electromagnetic interference, especially the ultra-wide band pulses. New printed circuit board structure is suggested for implementation of the proposed concept. Results of simulation in time and frequency domains are presented for the suggested structures. Considerable attenuation of dangerous excitations shows that the new concept and structure are promising.

  1. Volcanic ash impacts on critical infrastructure

    Science.gov (United States)

    Wilson, Thomas M.; Stewart, Carol; Sword-Daniels, Victoria; Leonard, Graham S.; Johnston, David M.; Cole, Jim W.; Wardman, Johnny; Wilson, Grant; Barnard, Scott T.

    2012-01-01

    Volcanic eruptions can produce a wide range of hazards. Although phenomena such as pyroclastic flows and surges, sector collapses, lahars and ballistic blocks are the most destructive and dangerous, volcanic ash is by far the most widely distributed eruption product. Although ash falls rarely endanger human life directly, threats to public health and disruption to critical infrastructure services, aviation and primary production can lead to significant societal impacts. Even relatively small eruptions can cause widespread disruption, damage and economic loss. Volcanic eruptions are, in general, infrequent and somewhat exotic occurrences, and consequently in many parts of the world, the management of critical infrastructure during volcanic crises can be improved with greater knowledge of the likely impacts. This article presents an overview of volcanic ash impacts on critical infrastructure, other than aviation and fuel supply, illustrated by findings from impact assessment reconnaissance trips carried out to a wide range of locations worldwide by our international research group and local collaborators. ‘Critical infrastructure’ includes those assets, frequently taken for granted, which are essential for the functioning of a society and economy. Electricity networks are very vulnerable to disruption from volcanic ash falls. This is particularly the case when fine ash is erupted because it has a greater tendency to adhere to line and substation insulators, where it can cause flashover (unintended electrical discharge) which can in turn cause widespread and disruptive outages. Weather conditions are a major determinant of flashover risk. Dry ash is not conductive, and heavy rain will wash ash from insulators, but light rain/mist will mobilise readily-soluble salts on the surface of the ash grains and lower the ash layer’s resistivity. Wet ash is also heavier than dry ash, increasing the risk of line breakage or tower/pole collapse. Particular issues for water

  2. 77 FR 59203 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Science.gov (United States)

    2012-09-26

    ... Infrastructure Partnership Advisory Council. [FR Doc. 2012-23666 Filed 9-25-12; 8:45 am] BILLING CODE 9910-9P-P ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2012-0051] Critical Infrastructure Partnership... meeting. SUMMARY: The Critical Infrastructure Partnership Advisory Council (CIPAC) Plenary Meeting will be...

  3. RISK DISCLOSURE AGAINST ATTACK ON CRITICAL INFRASTRUCTURES

    Science.gov (United States)

    Yoshida, Mamoru; Kobayashi, Kiyoshi

    This paper analyzes the government's defensive and disclosure strategies to reduce the damage caused by terrorists that attack critical infrastructures using subjective game theory. The government recognizes a terrorist as a hidden opponent and the government's decision making about the policies against terror attacks depends on the belief about the existence of terrorist. In addition, it is not necessarily true that the government and the terrorist play the common game and make their decisions. Considering these points, the paper formulates the model in which the government and the terrorist formulate the subjective games respectively, and they induce the strategies using the equilibriums of their subjective games. The paper concluded that the government's disclosure about the implementation of the countermeasure, rather than the disclosure of warning level related with the belief about the existence of terrorist, brings about the higher increment of the subjective payoffs of the government.

  4. Enhancing infrastructure resilience through business continuity planning.

    Science.gov (United States)

    Fisher, Ronald; Norman, Michael; Klett, Mary

    2017-01-01

    Critical infrastructure is crucial to the functionality and wellbeing of the world around us. It is a complex network that works together to create an efficient society. The core components of critical infrastructure are dependent on one another to function at their full potential. Organisations face unprecedented environmental risks such as increased reliance on information technology and telecommunications, increased infrastructure interdependencies and globalisation. Successful organisations should integrate the components of cyber-physical and infrastructure interdependencies into a holistic risk framework. Physical security plans, cyber security plans and business continuity plans can help mitigate environmental risks. Cyber security plans are becoming the most crucial to have, yet are the least commonly found in organisations. As the reliance on cyber continues to grow, it is imperative that organisations update their business continuity and emergency preparedness activities to include this.

  5. 75 FR 75611 - Critical Infrastructure Protection Month, 2010

    Science.gov (United States)

    2010-12-03

    ...; and the public--to identify and protect our infrastructure from hazards or attack. These critical... cyber infrastructure more resilient. Working together, we can raise awareness of the important role our...

  6. 75 FR 60771 - Critical Infrastructure Partnership Advisory Council (CIPAC)

    Science.gov (United States)

    2010-10-01

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0080] Critical Infrastructure Partnership... that the meeting may adjourn early if the committee has completed its business. For additional..., Section Chief Partnership Programs, Partnership and Outreach Division, Office of Infrastructure Protection...

  7. Visualizing common operating picture of critical infrastructure

    Science.gov (United States)

    Rummukainen, Lauri; Oksama, Lauri; Timonen, Jussi; Vankka, Jouko

    2014-05-01

    This paper presents a solution for visualizing the common operating picture (COP) of the critical infrastructure (CI). The purpose is to improve the situational awareness (SA) of the strategic-level actor and the source system operator in order to support decision making. The information is obtained through the Situational Awareness of Critical Infrastructure and Networks (SACIN) framework. The system consists of an agent-based solution for gathering, storing, and analyzing the information, and a user interface (UI) is presented in this paper. The UI consists of multiple views visualizing information from the CI in different ways. Different CI actors are categorized in 11 separate sectors, and events are used to present meaningful incidents. Past and current states, together with geographical distribution and logical dependencies, are presented to the user. The current states are visualized as segmented circles to represent event categories. Geographical distribution of assets is displayed with a well-known map tool. Logical dependencies are presented in a simple directed graph, and users also have a timeline to review past events. The objective of the UI is to provide an easily understandable overview of the CI status. Therefore, testing methods, such as a walkthrough, an informal walkthrough, and the Situation Awareness Global Assessment Technique (SAGAT), were used in the evaluation of the UI. Results showed that users were able to obtain an understanding of the current state of CI, and the usability of the UI was rated as good. In particular, the designated display for the CI overview and the timeline were found to be efficient.

  8. Onsite and Electric Backup Capabilities at Critical Infrastructure Facilities in the United States

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, Julia A. [Argonne National Lab. (ANL), Argonne, IL (United States); Wallace, Kelly E. [Argonne National Lab. (ANL), Argonne, IL (United States); Kudo, Terence Y. [Argonne National Lab. (ANL), Argonne, IL (United States); Eto, Joseph H. [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States)

    2016-04-01

    The following analysis, conducted by Argonne National Laboratory’s (Argonne’s) Risk and Infrastructure Science Center (RISC), details an analysis of electric power backup of national critical infrastructure as captured through the Department of Homeland Security’s (DHS’s) Enhanced Critical Infrastructure Program (ECIP) Initiative. Between January 1, 2011, and September 2014, 3,174 ECIP facility surveys have been conducted. This study focused first on backup capabilities by infrastructure type and then expanded to infrastructure type by census region.

  9. Critical Infrastructure Awareness Required by Civil Emergency Planning

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Klaver, M.H.A.

    2005-01-01

    Modern societies are increasingly dependent on a set of critical products and services which comprise the Critical Infrastructure (CI). This makes Critical infrastructures increasingly important as a planning factor in case of emergencies. For that reason, we studied a number of emergencies and a

  10. Critical infrastructure systems of systems assessment methodology.

    Energy Technology Data Exchange (ETDEWEB)

    Sholander, Peter E.; Darby, John L.; Phelan, James M.; Smith, Bryan; Wyss, Gregory Dane; Walter, Andrew; Varnado, G. Bruce; Depoy, Jennifer Mae

    2006-10-01

    Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies that separately consider physical security and cyber security. This research has developed a risk assessment methodology that explicitly accounts for both physical and cyber security, while preserving the traditional security paradigm of detect, delay, and respond. This methodology also accounts for the condition that a facility may be able to recover from or mitigate the impact of a successful attack before serious consequences occur. The methodology uses evidence-based techniques (which are a generalization of probability theory) to evaluate the security posture of the cyber protection systems. Cyber threats are compared against cyber security posture using a category-based approach nested within a path-based analysis to determine the most vulnerable cyber attack path. The methodology summarizes the impact of a blended cyber/physical adversary attack in a conditional risk estimate where the consequence term is scaled by a ''willingness to pay'' avoidance approach.

  11. Critical infrastructure monitoring using UAV imagery

    Science.gov (United States)

    Maltezos, Evangelos; Skitsas, Michael; Charalambous, Elisavet; Koutras, Nikolaos; Bliziotis, Dimitris; Themistocleous, Kyriacos

    2016-08-01

    The constant technological evolution in Computer Vision enabled the development of new techniques which in conjunction with the use of Unmanned Aerial Vehicles (UAVs) may extract high quality photogrammetric products for several applications. Dense Image Matching (DIM) is a Computer Vision technique that can generate a dense 3D point cloud of an area or object. The use of UAV systems and DIM techniques is not only a flexible and attractive solution to produce accurate and high qualitative photogrammetric results but also is a major contribution to cost effectiveness. In this context, this study aims to highlight the benefits of the use of the UAVs in critical infrastructure monitoring applying DIM. A Multi-View Stereo (MVS) approach using multiple images (RGB digital aerial and oblique images), to fully cover the area of interest, is implemented. The application area is an Olympic venue in Attica, Greece, at an area of 400 acres. The results of our study indicate that the UAV+DIM approach respond very well to the increasingly greater demands for accurate and cost effective applications when provided with, a 3D point cloud and orthomosaic.

  12. Security Economics and Critical National Infrastructure

    Science.gov (United States)

    Anderson, Ross; Fuloria, Shailendra

    There has been considerable effort and expenditure since 9/11 on the protection of ‘Critical National Infrastructure' against online attack. This is commonly interpreted to mean preventing online sabotage against utilities such as electricity,oil and gas, water, and sewage - including pipelines, refineries, generators, storage depots and transport facilities such as tankers and terminals. A consensus is emerging that the protection of such assets is more a matter of business models and regulation - in short, of security economics - than of technology. We describe the problems, and the state of play, in this paper. Industrial control systems operate in a different world from systems previously studied by security economists; we find the same issues (lock-in, externalities, asymmetric information and so on) but in different forms. Lock-in is physical, rather than based on network effects, while the most serious externalities result from correlated failure, whether from cascade failures, common-mode failures or simultaneous attacks. There is also an interesting natural experiment happening, in that the USA is regulating cyber security in the electric power industry, but not in oil and gas, while the UK is not regulating at all but rather encouraging industry's own efforts. Some European governments are intervening, while others are leaving cybersecurity entirely to plant owners to worry about. We already note some perverse effects of the U.S. regulation regime as companies game the system, to the detriment of overall dependability.

  13. Integration of resilience capabilities for Critical Infrastructures into the Emergency Management set-up

    DEFF Research Database (Denmark)

    Kozine, Igor; Andersen, Henning Boje

    2015-01-01

    We suggest an approach for maintaining and enhancing resilience that integrates the resilience capabilities of Critical Infrastructures (CIs) into the emergency management cycle (prevention, preparedness, response, and recovery). This allows emergency services to explicitly address resilience...

  14. Assessing dependability and resilience in critical infrastructures: challenges and opportunities

    NARCIS (Netherlands)

    Avritzer, Alberto; Di Giandomenico, Felicita; Remke, Anne Katharina Ingrid; Riedl, Martin; Wolter, Katinka; Avritzer, Alberto; Vieira, Marco; van Moorsel, Aad

    2012-01-01

    Critical infrastructures (CI) are very complex and highly interdependent systems, networks and assets that provide essential services in our daily life. Most CI are either built upon or monitored and controlled by vulnerable information and communication technology (ICT) systems. Critical

  15. How to Quantify Deterrence and Reduce Critical Infrastructure Risk

    OpenAIRE

    Taquechel, Eric F.; Lewis, Ted G.

    2012-01-01

    This article appeared in Homeland Security Affairs (August 2012), v.8, article 12 "We propose a definition of critical infrastructure deterrence and develop a methodology to explicitly quantify the deterrent effects of critical infrastructure security strategies. We leverage historical work on analyzing deterrence, game theory and utility theory. Our methodology quantifies deterrence as the extent to which an attacker's expected utility from an infrastructure attack changes after a defende...

  16. CRITICAL INFORMATION INFRASTRUCTURE SECURITY - NETWORK INTRUSION DETECTION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Cristea DUMITRU

    2011-12-01

    Full Text Available Critical Information Infrastructure security will always be difficult to ensure, just because of the features that make it irreplaceable tor other critical infrastructures normal operation. It is decentralized, interconnected interdependent, controlled by multiple actors (mainly private and incorporating diverse types of technologies. It is almost axiomatic that the disruption of the Critical Information Infrastructure affects systems located much farther away, and the cyber problems have direct consequences on the real world. Indeed the Internet can be used as a multiplier in order to amplify the effects of an attack on some critical infrastructures. Security challenges increase with the technological progress. One of the last lines of defense which comes to complete the overall security scheme of the Critical Information Infrastructure is represented by the Network Intrusion Detection Systems.

  17. Protecting National Critical Infrastructure against Radiological Threat

    International Nuclear Information System (INIS)

    Yaar, I.; Halevy, I.; Berenstein, Z.; Sharon, A.

    2014-01-01

    National Critical Infrastructure (NCI) such as transportation, water, energy etc., are essential elements in a developed country's economy. As learned after the 9/11 attackxx, a terror attack on these complex system may cause thousands of casualties and significant economic damage. The attack can be a conventional one; like the train bombing in Spainxxi or the bus bombing in Londonxxii, or a non-conventional one; like the Sarin attack on the underground train in Tokyo, Japanxxiii. A radiological attack on a NCI is also feasiblexxiv. This type of attack must be taken into consideration due to the vulnerability of ani infrastructure to such an attack, and the severe economic outcome of itxxv. The radioactive materials that might be used by terrorists were recently identified and categorized in one of the IAEA Nuclear Security Series publicationxxvi,xxvii. The most common and therefore reachable radio nuclides are the gamma emitters 60Co, 137Cs and 192Ir, the beta emitter 90Sr and the alpha emitters 241Pu, 238Pu and 241Am. A radiological event can be any of two principle scenarios. In the first scenario, a radiological dispersion device (RDD) or ôdirtyö bomb is used. This device consists of a radiation source which is detonated using conventional or improvised explosivesxxviii. Most of the casualties in this event will be from the explosion blast wave. However, some people might become contaminated with different levels of radiationxxix, some might need to go through some type of medical screening process and the costs of the total actions might be significantxxx. The second scenario involves a silent dispersion of radioactive material in a public site. In this event, there are no immediate known casualties, and the fact that people were exposed to radioactive material will be discovered only in the uncommon event when symptoms of radiation sickness will be identified due to exposure to high radiation dosexxxi, or if the radioactive material is discovered by a first

  18. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure

    International Nuclear Information System (INIS)

    Suski, N.; Wuest, C.

    2011-01-01

    Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre

  19. Network Randomization and Dynamic Defense for Critical Infrastructure Systems

    Energy Technology Data Exchange (ETDEWEB)

    Chavez, Adrian R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Martin, Mitchell Tyler [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hamlet, Jason [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Stout, William M.S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Lee, Erik [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-04-01

    Critical Infrastructure control systems continue to foster predictable communication paths, static configurations, and unpatched systems that allow easy access to our nation's most critical assets. This makes them attractive targets for cyber intrusion. We seek to address these attack vectors by automatically randomizing network settings, randomizing applications on the end devices themselves, and dynamically defending these systems against active attacks. Applying these protective measures will convert control systems into moving targets that proactively defend themselves against attack. Sandia National Laboratories has led this effort by gathering operational and technical requirements from Tennessee Valley Authority (TVA) and performing research and development to create a proof-of-concept solution. Our proof-of-concept has been tested in a laboratory environment with over 300 nodes. The vision of this project is to enhance control system security by converting existing control systems into moving targets and building these security measures into future systems while meeting the unique constraints that control systems face.

  20. Flood vulnerability of critical infrastructure in Cork, Ireland

    Directory of Open Access Journals (Sweden)

    de Bruijn Karin M.

    2016-01-01

    Full Text Available Recent flood events in Ireland and particularly in County Cork have caused significant disruption to health service provisions, interruption of water and power supplies, and damage to roads and other transportation infrastructure, affecting the lives of hundreds of thousands of people over a prolonged period of weeks. These events clearly reveal- the vulnerability of the critical infrastructure to flooding and the dependence of society on critical infrastructure. In order to reduce the flood vulnerability and increase the resilience of the critical infrastructure networks in the future, detailed evidence-based analysis and assessment is essential. To this end a case study has been carried out on Cork City which analyses this vulnerability as it was in 2009, and as it is currently, and identifies adaptation options to reduce the future vulnerability of critical infrastructure to flooding and to build a more resilient society. This paper describes the storyline approach and CIrcle tool and their application to Cork City which focused on the analysis of the flood vulnerability of critical infrastructure and the impacts of failure of the infrastructure for other critical functions and on society.

  1. 78 FR 76986 - Version 5 Critical Infrastructure Protection Reliability Standards

    Science.gov (United States)

    2013-12-20

    ...; Order No. 791] Version 5 Critical Infrastructure Protection Reliability Standards AGENCY: Federal Energy... 72755). The regulations approved certain reliability standards proposed by the North American Electric... Infrastructure Protection Reliability Standards, 145 FERC ] 61,160 (2013). This errata notice serves to correct P...

  2. 78 FR 27113 - Version 5 Critical Infrastructure Protection Reliability Standards

    Science.gov (United States)

    2013-05-09

    ... approve certain reliability standards proposed by the North American Electric Reliability Corporation... Infrastructure Protection Reliability Standards, 143 FERC ] 61,055 (2013). This errata notice serves to correct P... Commission 18 CFR Part 40 [Docket No. RM13-5-000] Version 5 Critical Infrastructure Protection Reliability...

  3. Critical Infrastructure Protection and Information Assurance (CIPIA) Fellow Program

    National Research Council Canada - National Science Library

    Chen, Peter

    2003-01-01

    LSU was one of the universities chosen to participate in the project of training new researchers to work on the Critical Infrastructure Protection and Information Assurance (CIPIA) areas. Three Ph.D...

  4. 76 FR 50487 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Science.gov (United States)

    2011-08-15

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0018] Protected Critical Infrastructure Information (PCII) Stakeholder Survey AGENCY: National Protection and Programs Directorate, DHS. ACTION: 30... Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office of...

  5. 76 FR 17935 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Science.gov (United States)

    2011-03-31

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0018] Protected Critical Infrastructure Information (PCII) Stakeholder Survey AGENCY: National Protection and Programs Directorate, DHS. ACTION: 60... Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office of...

  6. Critical infrastructure – content, structure and problems of its protection

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2014-06-01

    Full Text Available Security, economic and social stability of the country, its functionality but also protecting the lives and property of citizens are dependent on the proper functioning of many infrastructure systems of state. Disruptions, lack or destruction of such systems, institutions, facilities and other services could cause disruption of social stability and national security, provoke a crisis situation or seriously affect the operation of state and local governments in crisis situations. This is known as critical infrastructure. It is in the interest of the State to the critical infrastructure effectively protected.

  7. Critical energy infrastructure protection in Canada

    Energy Technology Data Exchange (ETDEWEB)

    Gendron, Angela [Canadian Centre for Intelligence and Security Studies, Carleton University (Canada)

    2010-12-15

    In Canada government acknowledged the need to protect energy assets against attacks. However, so far no strategy has been developed. The aim of this report is to present the characteristics of the energy sector in Canada, the threats, and how the government is responding to those threats. The energy sector in Canada is concentrated and diverse and is under not only terrorism or cyber attacks threats but also environmental threats. This report shows that the Government of Canada is focusing on the protection and assurance of important energy infrastructures but that they are facing several challenges resulting in long delays in the adoption of a formal strategy.

  8. Bike Infrastructures and Design Qualities: Enhancing Cycling

    DEFF Research Database (Denmark)

    Silva, Victor; Jensen, Ole B.; Harder, Henrik

    2011-01-01

    as well as to describe what specific design element primarily motivated them to travel by bike. The findings highlight the critical role of fast connectivity and fast bike lanes in motivating cyclists to ride their bikes more often. It also indicates that it is challenging to ensure the perception...... infrastructures. This article aims to present findings of the research project titled Bikeability – funded by the Danish Research Council. The overall purpose of the Bikeability project is to investigate and document relations between cycling motivation from different socio- demographic groups and distinct design...

  9. Review on modeling and simulation of interdependent critical infrastructure systems

    International Nuclear Information System (INIS)

    Ouyang, Min

    2014-01-01

    Modern societies are becoming increasingly dependent on critical infrastructure systems (CISs) to provide essential services that support economic prosperity, governance, and quality of life. These systems are not alone but interdependent at multiple levels to enhance their overall performance. However, recent worldwide events such as the 9/11 terrorist attack, Gulf Coast hurricanes, the Chile and Japanese earthquakes, and even heat waves have highlighted that interdependencies among CISs increase the potential for cascading failures and amplify the impact of both large and small scale initial failures into events of catastrophic proportions. To better understand CISs to support planning, maintenance and emergency decision making, modeling and simulation of interdependencies across CISs has recently become a key field of study. This paper reviews the studies in the field and broadly groups the existing modeling and simulation approaches into six types: empirical approaches, agent based approaches, system dynamics based approaches, economic theory based approaches, network based approaches, and others. Different studies for each type of the approaches are categorized and reviewed in terms of fundamental principles, such as research focus, modeling rationale, and the analysis method, while different types of approaches are further compared according to several criteria, such as the notion of resilience. Finally, this paper offers future research directions and identifies critical challenges in the field. - Highlights: • Modeling approaches on interdependent critical infrastructure systems are reviewed. • I mainly review empirical, agent-based, system-dynamics, economic, network approaches. • Studies by each approach are sorted out in terms of fundamental principles. • Different approaches are further compared with resilience as the main criterion

  10. Intelligent monitoring, control, and security of critical infrastructure systems

    CERN Document Server

    Polycarpou, Marios

    2015-01-01

    This book describes the challenges that critical infrastructure systems face, and presents state of the art solutions to address them. How can we design intelligent systems or intelligent agents that can make appropriate real-time decisions in the management of such large-scale, complex systems? What are the primary challenges for critical infrastructure systems? The book also provides readers with the relevant information to recognize how important infrastructures are, and their role in connection with a society’s economy, security and prosperity. It goes on to describe state-of-the-art solutions to address these points, including new methodologies and instrumentation tools (e.g. embedded software and intelligent algorithms) for transforming and optimizing target infrastructures. The book is the most comprehensive resource to date for professionals in both the private and public sectors, while also offering an essential guide for students and researchers in the areas of modeling and analysis of critical in...

  11. LIMES Large Infrastructure in Mathematics - Enhanced Services

    CERN Document Server

    Fachinformationszentrum Energie, Physik, Mathematik. Karlsruhe

    The Large Infrastructure in Mathematics - Enhanced Services (LIMES) Project is a RTD project within the Fifth (EC) Framework Programme - Horizontal Programme "Improving human research potential and the socio-economic knowledge base", Access to Resear The objective of this project is to upgrade the existing database Zentralblatt-MATH into a European based world class database for mathematics (pure and applied) by a process of technical improvement and wide Europeanisation, improving the present distribuited system. The goal is to make Zentralblatt MATH a world reference database, offering full coverage of the mathematics literature worldwide ncluding bibliographic data, peer reviews and/or abstracts, indexing, classification and search,

  12. Analysis of Critical Infrastructure Dependencies and Interdependencies

    Energy Technology Data Exchange (ETDEWEB)

    Petit, Frederic [Argonne National Lab. (ANL), Argonne, IL (United States); Verner, Duane [Argonne National Lab. (ANL), Argonne, IL (United States); Brannegan, David [Argonne National Lab. (ANL), Argonne, IL (United States); Buehring, William [Argonne National Lab. (ANL), Argonne, IL (United States); Dickinson, David [Argonne National Lab. (ANL), Argonne, IL (United States); Guziel, Karen [Argonne National Lab. (ANL), Argonne, IL (United States); Haffenden, Rebecca [Argonne National Lab. (ANL), Argonne, IL (United States); Phillips, Julia [Argonne National Lab. (ANL), Argonne, IL (United States); Peerenboom, James [Argonne National Lab. (ANL), Argonne, IL (United States)

    2015-06-01

    The report begins by defining dependencies and interdependencies and exploring basic concepts of dependencies in order to facilitate a common understanding and consistent analytical approaches. Key concepts covered include; Characteristics of dependencies: upstream dependencies, internal dependencies, and downstream dependencies; Classes of dependencies: physical, cyber, geographic, and logical; and Dimensions of dependencies: operating environment, coupling and response behavior, type of failure, infrastructure characteristics, and state of operations From there, the report proposes a multi-phase roadmap to support dependency and interdependency assessment activities nationwide, identifying a range of data inputs, analysis activities, and potential products for each phase, as well as key steps needed to progress from one phase to the next. The report concludes by outlining a comprehensive, iterative, and scalable framework for analyzing dependencies and interdependencies that stakeholders can integrate into existing risk and resilience assessment efforts.

  13. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  14. Seismic Barrier Protection of Critical Infrastructure

    Science.gov (United States)

    2017-05-14

    structures , earthquake mitigation I. Introduction Damage caused by earthquakes to critical structures such as nuclear power plants, regional hospitals...the seismic power drop in dB to magnitude drop using the seismic moment magnitude scale, Mw. In figures 5 and 6, the V-trench structure as modeled...representing geological media and V-shaped muffler borehole / trench component structures . Bottom: In this simple analysis, the power drop observed

  15. Handbook on Securing Cyber-Physical Critical Infrastructure

    CERN Document Server

    Das, Sajal K; Zhang, Nan

    2012-01-01

    The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports a

  16. Synthesis centers as critical research infrastructure

    Science.gov (United States)

    Baron, Jill S.; Specht, Alison; Garnier, Eric; Bishop, Pamela; Campbell, C. Andrew; Davis, Frank W.; Fady, Bruno; Field, Dawn; Gross, Louis J.; Guru, Siddeswara M.; Halpern, Benjamin S; Hampton, Stephanie E.; Leavitt, Peter R.; Meagher, Thomas R.; Ometto, Jean; Parker, John N.; Price, Richard; Rawson, Casey H.; Rodrigo, Allen; Sheble, Laura A.; Winter, Marten

    2017-01-01

    investment to maximize benefits to science and society is justified. In particular, we argue that synthesis centers represent community infrastructure more akin to research vessels than to term-funded centers of science and technology (e.g., NSF Science and Technology Centers). Through our experience running synthesis centers and, in some cases, developing postfederal funding models, we offer our perspective on the purpose and value of synthesis centers. We present case studies of different outcomes of transition plans and argue for a fundamental shift in the conception of synthesis science and the strategic funding of these centers by government funding agencies.

  17. Situational Management Of Critical Infrastructure Resources Under Threat

    Directory of Open Access Journals (Sweden)

    Krupa Tadeusz

    2015-06-01

    Full Text Available This article presents a synthesis of knowledge about safety management procedures for critical infrastructure in the context of risk management theory and the provisions of the Polish law on emergency management launched on of April 26, 2007. In this paper, the inadequacy of the accepted procedures at present is highlighted, as well as their continuous improvement and adaptation to prevailing political, legal, social, and economic conditions. This paper proposes using the concept of situational management and knowledge management to develop a new method of predicting, preventing, and responding to emerging crises within critical infrastructure. The considerations presented in this paper lead to a proposed concept system supporting critical infrastructure safety management through the implementation of knowledge management methods.

  18. Resilience? Insights into the role of Critical Infrastructures Disaster Mitigation Strategies

    Directory of Open Access Journals (Sweden)

    Sara Bouchon

    2012-11-01

    Full Text Available Critical infrastructures (CI systems provide essential services “for the maintenance of critical societal functions, including the supply chain, health, safety, security and economic or social well-being of the people” (European Commission, 2008. These systems are exposed to a great number of hazards and threats, which may result in severe consequences for the population, the socio-economic system, and the environment. The issue is particularly relevant at urban level, where the disruption of one CI system can propagate to the other systems and paralyze the entire area. It is therefore necessary, not only to protect CIs through Critical Infrastructure Protection (CIP strategies, but also to enhance the resilience of these areas. This article aims thus at providing some insights related to the evolution of the critical infrastructures disaster mitigation strategies from the sole protection towards resilience: what kind of strategies based on resilience can be developed to address CIs disruption at local or regional level? To what extent do these strategies contribute to increase the resilience level of the entire urban or metropolitan area? The first section focuses on the urban critical infrastructures systems as well as on the way their disruption can impact urban areas. The second section provides with some examples of key measures to operationalize resilience in the field of critical infrastructure disaster mitigation strategies. The last section highlights how the key measures developed to enhance the resilience against CI disruptions can benefit also to broader urban resilience. 

  19. Challenges in the vulnerability and risk analysis of critical infrastructures

    International Nuclear Information System (INIS)

    Zio, Enrico

    2016-01-01

    The objective of this paper is to provide a systematic view on the problem of vulnerability and risk analysis of critical infrastructures. Reflections are made on the inherent complexities of these systems, related challenges are identified and possible ways forward for their analysis and management are indicated. Specifically: the framework of vulnerability and risk analysis is examined in relation to its application for the protection and resilience of critical infrastructures; it is argued that the complexity of these systems is a challenging characteristic, which calls for the integration of different modeling perspectives and new approaches of analysis; examples of are given in relation to the Internet and, particularly, the electric power grid, as representative of critical infrastructures and the associated complexity; the integration of different types of analyses and methods of system modeling is put forward for capturing the inherent structural and dynamic complexities of critical infrastructures and eventually evaluating their vulnerability and risk characteristics, so that decisions on protections and resilience actions can be taken with the required confidence. - Highlights: • The problem of the protection and resilience of CIs is the focus of the work. • The vulnerability and risk analysis framework for this is critically examined. • The complexity of CIs is presented as a challenge for system modeling and analysis. • The integration of different modeling perspectives of analysis is put forward as a solution. • The extension of the analysis framework to new methods for dealing with surprises and black swans is advocated.

  20. The legal imperative to protect critical energy infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Shore, J.J.M.

    2008-03-15

    Canada's critical infrastructure is comprised of energy facilities, communications centres, finance, health care, food, government and transportation sectors. All sectors face a range of physical or cyber threats from terrorism and natural phenomenon. Failures or disruptions in the sectors can cascade through other systems and disrupt essential services. The power outage in 2003 demonstrated gaps in North America's emergency preparedness. In 2006, al-Qaida called for terrorist attacks on North American oil fields and pipelines, specifically targeting Canada. Studies have confirmed that Canada is vulnerable to attacks on energy infrastructure. Government agencies and the private sector must work ensure the safety of Canada's energy infrastructure, as the primary responsibility of government is the protection of its citizenry. The fulfilment of the government's commitment to national security cannot be achieved without protecting Canada's critical energy infrastructure. However, Canada has not yet provided a framework linking federal government with critical infrastructures, despite the fact that a draft strategy has been under development for several years. It was concluded that governments and the private sector should work together to reduce risks, protect the public, and secure the economy. National security litigation against the government and legal imperatives for energy facility owners and operators were also reviewed. 98 refs., 20 figs.

  1. Risk analysis of critical infrastructures emphasizing electricity supply and interdependencies

    International Nuclear Information System (INIS)

    Kjølle, G.H.; Utne, I.B.; Gjerde, O.

    2012-01-01

    Failures in critical infrastructures can cause major damage to society. Wide-area interruptions (blackouts) in the electricity supply system have severe impacts on societal critical functions and other critical infrastructures, but there is no agreed-upon framework on how to analyze and predict the reliability of electricity supply. Thus, there is a need for an approach to cross-sector risk analyses, which facilitates risk analysis of outages in the electricity supply system and enables investigation of cascading failures and consequences in other infrastructures. This paper presents such an approach, which includes contingency analysis (power flow) and reliability analysis of power systems, as well as use of a cascade diagram for investigating interdependencies. A case study was carried out together with the Emergency Preparedness Group in the city of Oslo, Norway and the network company Hafslund Nett. The case study results highlight the need for cross-sector analyses by showing that the total estimated societal costs are substantially higher when cascading effects and consequences to other infrastructures are taken into account compared to only considering the costs of electricity interruptions as seen by the network company. The approach is a promising starting point for cross-sector risk analysis of electricity supply interruptions and consequences for dependent infrastructures.

  2. A Comprehensive Assessment Model for Critical Infrastructure Protection

    Directory of Open Access Journals (Sweden)

    Häyhtiö Markus

    2017-12-01

    Full Text Available International business demands seamless service and IT-infrastructure throughout the entire supply chain. However, dependencies between different parts of this vulnerable ecosystem form a fragile web. Assessment of the financial effects of any abnormalities in any part of the network is demanded in order to protect this network in a financially viable way. Contractual environment between the actors in a supply chain, different business domains and functions requires a management model, which enables a network wide protection for critical infrastructure. In this paper authors introduce such a model. It can be used to assess financial differences between centralized and decentralized protection of critical infrastructure. As an end result of this assessment business resilience to unknown threats can be improved across the entire supply chain.

  3. Optimal recovery sequencing for critical infrastructure resilience assessment.

    Energy Technology Data Exchange (ETDEWEB)

    Vugrin, Eric D.; Brown, Nathanael J. K.; Turnquist, Mark Alan (Cornell University, Ithaca, NY)

    2010-09-01

    Critical infrastructure resilience has become a national priority for the U. S. Department of Homeland Security. System resilience has been studied for several decades in many different disciplines, but no standards or unifying methods exist for critical infrastructure resilience analysis. This report documents the results of a late-start Laboratory Directed Research and Development (LDRD) project that investigated the identification of optimal recovery strategies that maximize resilience. To this goal, we formulate a bi-level optimization problem for infrastructure network models. In the 'inner' problem, we solve for network flows, and we use the 'outer' problem to identify the optimal recovery modes and sequences. We draw from the literature of multi-mode project scheduling problems to create an effective solution strategy for the resilience optimization model. We demonstrate the application of this approach to a set of network models, including a national railroad model and a supply chain for Army munitions production.

  4. Protecting Critical Infrastructure by Identifying Pathways of Exposure to Risk

    Directory of Open Access Journals (Sweden)

    Philip O’Neill

    2013-08-01

    Full Text Available Increasingly, our critical infrastructure is managed and controlled by computers and the information networks that connect them. Cyber-terrorists and other malicious actors understand the economic and social impact that a successful attack on these systems could have. While it is imperative that we defend against such attacks, it is equally imperative that we realize how best to react to them. This article presents the strongest-path method of analyzing all potential pathways of exposure to risk – no matter how indirect or circuitous they may be – in a network model of infrastructure and operations. The method makes direct use of expert knowledge about entities and dependency relationships without the need for any simulation or any other models. By using path analysis in a directed graph model of critical infrastructure, planners can model and assess the effects of a potential attack and develop resilient responses.

  5. relevance of information warfare models to critical infrastructure

    African Journals Online (AJOL)

    ismith

    Critical infrastructure models, strategies and policies should take information ... gain an advantage over a competitor or adversary through the use of one's own .... digital communications system, where the vehicles are analogous to bits or packets, ..... performance degraded, causing an increase in traffic finding a new route.

  6. NEW ASPECTS REGARDING THE EVALUATION OF INVESTMENTS IN CRITICAL INFRASTRUCTURE

    Directory of Open Access Journals (Sweden)

    Lupan Mariana

    2009-05-01

    Full Text Available The additional risks associated to the actual global and contagious crisis put a severe pressure on the investments in critical infrastructure and there is a real need for new valuations especially those regarding the synergic financing strategies in crit

  7. DNS as critical infrastructure, the energy system case study

    NARCIS (Netherlands)

    Casalicchio, E.; Gheorghe, A.V.; Caselli, M.; Coletta, A.; Nai Fovino, I.

    2013-01-01

    Modern critical infrastructures (e.g., power plants, energy grids, oil pipelines, etc.), make nowadays extensive use of information and communication technologies (ICT). As a direct consequence their exposure to cyber-attacks is becoming a matter of public security. In this paper, we analyse a

  8. DIESIS : An Interoperable European Federated Simulation Network for Critical Infrastructures

    NARCIS (Netherlands)

    Rome, E.; Bologna, S.; Gelenbe, E.; Luiijf, H.A.M.; Masucci, V.

    2009-01-01

    Critical Infrastructures (CI) that are vital for a society and an economy, such as telecommunication systems, energy supply systems, transport systems and others, are getting more and more complex. Dependencies emerge in various ways, due to the use of information and communication technologies,

  9. Identification of critical locations across multiple infrastructures for terrorist actions

    International Nuclear Information System (INIS)

    Patterson, S.A.; Apostolakis, G.E.

    2007-01-01

    This paper presents a possible approach to ranking geographic regions that can influence multiple infrastructures. Once ranked, decision makers can determine whether these regions are critical locations based on their susceptibility to terrorist acts. We identify these locations by calculating a value for a geographic region that represents the combined values to the decision makers of all the infrastructures crossing through that region. These values, as well as the size of the geographic region, are conditional on an assumed destructive threat of a given size. In our case study, the threat is assumed to be minor, e.g., a bomb that can affect objects within 7 m of it. This approach first requires an assessment of the users of the system. During this assessment, each user is assigned a performance index (PI) based on the disutility of the loss of each infrastructure's resource via multi-attribute utility theory (MAUT). A Monte Carlo network analysis is then performed to develop importance measures (IM) for the elements of each infrastructure for their ability to service each user. We combine the IMs with the user PIs to a value that we call valued worth (VW) for each infrastructure's elements independently. Then we use spatial analysis techniques within a geographic information system (GIS) to combine the VWs of each infrastructure's elements in a geographic area, conditional on the threat, into a total value we call geographic valued worth (GVW). The GVW is displayed graphically in the GIS system in a color scheme that shows the numerical ranking of these geographic areas. The map and rankings are then submitted to the decision makers to better allocate anti-terrorism resources. A case study of this methodology is performed on the Massachusetts Institute of Technology (MIT) campus. The results of the study show how the methodology can bring attention to areas that are important when several infrastructures are considered, but may be ignored when infrastructures

  10. Enhancing Sustainable Communities With Green Infrastructure

    Science.gov (United States)

    This publication aims to help local governments, water utilities, nonprofit organizations, neighborhood groups, and other stakeholders integrate green infrastructure strategies into plans that can transform their communities.

  11. 6 CFR 29.8 - Disclosure of Protected Critical Infrastructure Information.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Disclosure of Protected Critical Infrastructure... PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.8 Disclosure of Protected Critical Infrastructure... Infrastructure Protection, or either's designee may choose to provide or authorize access to PCII under one or...

  12. Safety impacts of bicycle infrastructure: A critical review.

    Science.gov (United States)

    DiGioia, Jonathan; Watkins, Kari Edison; Xu, Yanzhi; Rodgers, Michael; Guensler, Randall

    2017-06-01

    This paper takes a critical look at the present state of bicycle infrastructure treatment safety research, highlighting data needs. Safety literature relating to 22 bicycle treatments is examined, including findings, study methodologies, and data sources used in the studies. Some preliminary conclusions related to research efficacy are drawn from the available data and findings in the research. While the current body of bicycle safety literature points toward some defensible conclusions regarding the safety and effectiveness of certain bicycle treatments, such as bike lanes and removal of on-street parking, the vast majority treatments are still in need of rigorous research. Fundamental questions arise regarding appropriate exposure measures, crash measures, and crash data sources. This research will aid transportation departments with regard to decisions about bicycle infrastructure and guide future research efforts toward understanding safety impacts of bicycle infrastructure. Copyright © 2017 Elsevier Ltd and National Safety Council. All rights reserved.

  13. 'System-of-systems' approach for interdependent critical infrastructures

    International Nuclear Information System (INIS)

    Eusgeld, Irene; Nan, Cen; Dietz, Sven

    2011-01-01

    The study of the interdependencies within critical infrastructures (CI) is a growing field of research as the importance of potential failure propagation among infrastructures may lead to cascades affecting all supply networks. New powerful methods are required to model and describe such 'systems-of-systems' (SoS) as a whole. An overall model is required to provide security and reliability assessment taking into account various kinds of threats and failures. A significant challenge associated with this model may be to create 'what-if' scenarios for the analysis of interdependencies. In this paper the interdependencies between industrial control systems (ICS), in particular SCADA (Supervisory Control and Data Acquisition), and the underlying critical infrastructures to address the vulnerabilities related to the coupling of these systems are analyzed. The modeling alternatives for system-of-systems, integrated versus coupled models, are discussed. An integrated model contains detailed low level models of (sub)systems as well as a high level model, covering all hierarchical levels. On the other hand, a coupled model aggregates different simulated outputs of the low level models as inputs at a higher level. Strengths and weaknesses of both approaches are analyzed and a model architecture for SCADA and the 'system under control' are proposed. Furthermore, the HLA simulation standard is introduced and discussed in this paper as a promising approach to represent interdependencies between infrastructures. To demonstrate the capabilities of the HLA standard for the interdependencies study, an exemplary application and some first results are also briefly presented in this paper.

  14. Increasing impacts of climate extremes on critical infrastructures in Europe

    Science.gov (United States)

    Forzieri, Giovanni; Bianchi, Alessandra; Feyen, Luc; Silva, Filipe Batista e.; Marin, Mario; Lavalle, Carlo; Leblois, Antoine

    2016-04-01

    The projected increases in exposure to multiple climate hazards in many regions of Europe, emphasize the relevance of a multi-hazard risk assessment to comprehensively quantify potential impacts of climate change and develop suitable adaptation strategies. In this context, quantifying the future impacts of climatic extremes on critical infrastructures is crucial due to their key role for human wellbeing and their effects on the overall economy. Critical infrastructures describe the existing assets and systems that are essential for the maintenance of vital societal functions, health, safety, security, economic or social well-being of people, and the disruption or destruction of which would have a significant impact as a result of the failure to maintain those functions. We assess the direct damages of heat and cold waves, river and coastal flooding, droughts, wildfires and windstorms to energy, transport, industry and social infrastructures in Europe along the 21st century. The methodology integrates in a coherent framework climate hazard, exposure and vulnerability components. Overall damage is expected to rise up to 38 billion €/yr, ten time-folds the current climate damage, with drastic variations in risk scenarios. Exemplificative are drought and heat-related damages that could represent 70% of the overall climate damage in 2080s versus the current 12%. Many regions, prominently Southern Europe, will likely suffer multiple stresses and systematic infrastructure failures due to climate extremes if no suitable adaptation measures will be taken.

  15. Ontario-U.S. power outages : impacts on critical infrastructure

    International Nuclear Information System (INIS)

    2006-01-01

    This paper described the power outage and resulting blackout that occurred on August 14, 2003 and identified how critical infrastructure was directly and interdependently impacted in Canada. The aim of the paper was to assist critical infrastructure protection and emergency management professionals in assessing the potential impacts of large-scale critical infrastructure disruptions. Information for the study was acquired from Canadian and American media reports and cross-sectoral information sharing with provincial and federal governments and the private sector. The blackout impacted most of the sources and means of generating, transmitting and distributing power within the area, which in turn impacted all critical infrastructure sectors. Landline and cellular companies experienced operational difficulties, which meant that emergency responders were impacted. Newspapers and the electronic media struggled to release information to the public. The banking and finance industry experienced an immediate degradation of services. The power outage caused shipping and storage difficulties for commercial retailers and dairy producers. A number of incidents were reported where only partially treated waste water was released into neighbouring waterways. The timing of the blackout coincided with the closures of workplaces and created additional difficulties on transportation networks. Many gas station pumps were inoperable. Police, fire departments and ambulance services experienced a dramatic increase in the volume of calls received, and all branches of the emergency services sector encountered transportation delays and difficulties with communications equipment. Nuclear reactors were also impacted. An estimated 150,000 Government of Canada employees were unable to report to work. Estimates have indicated that the power outage cost Ontario's economy between $1 and $2 billion. The outage negatively impacted 82 per cent of small businesses in Ontario. 170 refs., 3 figs

  16. People at risk - nexus critical infrastructure and society

    Science.gov (United States)

    Heiser, Micha; Thaler, Thomas; Fuchs, Sven

    2016-04-01

    Strategic infrastructure networks include the highly complex and interconnected systems that are so vital to a city or state that any sudden disruption can result in debilitating impacts on human life, the economy and the society as a whole. Recently, various studies have applied complex network-based models to study the performance and vulnerability of infrastructure systems under various types of attacks and hazards - a major part of them is, particularly after the 9/11 incident, related to terrorism attacks. Here, vulnerability is generally defined as the performance drop of an infrastructure system under a given disruptive event. The performance can be measured by different metrics, which correspond to various levels of resilience. In this paper, we will address vulnerability and exposure of critical infrastructure in the Eastern Alps. The Federal State Tyrol is an international transport route and an essential component of the north-south transport connectivity in Europe. Any interruption of the transport flow leads to incommensurable consequences in terms of indirect losses, since the system does not feature redundant elements at comparable economic efficiency. Natural hazard processes such as floods, debris flows, rock falls and avalanches, endanger this infrastructure line, such as large flood events in 2005 or 2012, rock falls 2014, which had strong impacts to the critical infrastructure, such as disruption of the railway lines (in 2005 and 2012), highways and motorways (in 2014). The aim of this paper is to present how critical infrastructures as well as communities and societies are vulnerable and can be resilient against natural hazard risks and the relative cascading effects to different compartments (industrial, infrastructural, societal, institutional, cultural, etc.), which is the dominant by the type of hazard (avalanches, torrential flooding, debris flow, rock falls). Specific themes will be addressed in various case studies to allow cross

  17. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  18. What's My Lane? Identifying the State Government Role in Critical Infrastructure Protection

    OpenAIRE

    Donnelly, Timothy S.

    2012-01-01

    Approved for public release; distribution is unlimited What constitutes an effective Critical Infrastructure and Key Resources (CIKR) protection program for Massachusetts This study evaluates existing literature regarding CIKR to extrapolate an infrastructure protection role for Massachusetts. By reviewing historical events and government strategies regarding infrastructure protection, Chapters I and II will provide scope and context for issues surrounding critical infrastructure. Chapter ...

  19. CRITICAL SUCCESS FACTORS FOR INFRASTRUCTURE EUROPEAN FUNDED PROJECTS

    Directory of Open Access Journals (Sweden)

    Sebastian-Ion Ceptureanu

    2016-07-01

    Full Text Available Absorption of European funds is on top of Romania’s public agenda for the last years although the first programming period has ended and the necessary lessons were learned so far. To have a high degree of absorption of funds provided by the EU must be of quality projects and their implementation to be successful. Through this work we aimed to investigate the success factors of infrastructure projects with European funding in Romania, Bulgaria, Moldova, Ukraine, Serbia and Kosovo, and identify critical success factors of these projects through a research surveying the teams of consultants and support personnel from the countries in an international consulting company. The research results are therefore constitute the empirical evidence of what constitutes critical success factors of infrastructure projects financed by the European Union and can be used as a starting point for scientific studies of the management of European projects or other actions that investigates measures that can be taken to improve the success rate of projects implemented in the area mentioned above.One of the contributions of this paper is to identify the critical success factors of success factors present in literature. With more so as they are critical success factors of infrastructure projects with European funding still required field studies and analysis performed in the present context. In addition, the critical factors were operationalized in a conceptual framework. Moreover, this framework includes leadership style of project manager as critical success factor has been identified in the research as the most important in the context in which it was conducted. As such, this paper demonstrates, with the necessary limitations, the importance of management style of project managers in the context of specific European funded infrastructure projects. And this is happening even though there are sophisticated project management tools availabe and relevant knowledge exists

  20. 78 FR 6807 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Science.gov (United States)

    2013-01-31

    ... coordinating and sponsoring an executive-led Critical Infrastructure Protection and Cyber Security mission to... on the cyber security, critical infrastructure protection, and emergency management, ports of entry... security, including border protection, civil defense capabilities, and coast guard and maritime...

  1. Cyber security deterrence and it protection for critical infrastructures

    CERN Document Server

    Martellini, Maurizio

    2013-01-01

    The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber attacks and argues that nations are entering a new cyber arms race. The brief also provides a technical analysis of possible cyber attacks towards critical infrastructures in the chemical industry and chemical safety industry. The authors also propose modern analyses and a holistic approach to resil

  2. Protective design of critical infrastructure with high performance concretes

    International Nuclear Information System (INIS)

    Riedel, W.; Nöldgen, M.; Stolz, A.; Roller, C.

    2012-01-01

    Conclusions: High performance concrete constructions will allow innovative design solutions for critical infrastructures. Validation of engineering methods can reside on large and model scale experiments conducted on conventional concrete structures. New consistent impact experiments show extreme protection potential for UHPC. Modern FEM with concrete models and explicit rebar can model HPC and UHPC penetration resistance. SDOF and TDOF approaches are valuable design tools on local and global level. Combination of at least 2 out of 3 design methods FEM – XDOF- EXP allow reliable prediction and efficient innovative designs

  3. Managing the complexity of critical infrastructures a modelling and simulation approach

    CERN Document Server

    Rosato, Vittorio; Kyriakides, Elias; Rome, Erich

    2016-01-01

    This book is open access under a CC BY 4.0 license. This book summarizes work being pursued in the context of the CIPRNet (Critical Infrastructure Preparedness and Resilience Research Network) research project, co-funded by the European Union under the Seventh Framework Programme (FP7). The project is intended to provide concrete and on-going support to the Critical Infrastructure Protection (CIP) research communities, enhancing their preparedness for CI-related emergencies, while also providing expertise and technologies for other stakeholders to promote their understanding and mitigation of the consequences of CI disruptions, leading to enhanced resilience. The book collects the tutorial material developed by the authors for several courses on the modelling, simulation and analysis of CIs, representing extensive and integrated CIP expertise. It will help CI stakeholders, CI operators and civil protection authorities understand the complex system of CIs, and help them adapt to these changes and threats in or...

  4. Enabling software defined networking experiments in networked critical infrastructures

    Directory of Open Access Journals (Sweden)

    Béla Genge

    2014-05-01

    Full Text Available Nowadays, the fact that Networked Critical Infrastructures (NCI, e.g., power plants, water plants, oil and gas distribution infrastructures, and electricity grids, are targeted by significant cyber threats is well known. Nevertheless, recent research has shown that specific characteristics of NCI can be exploited in the enabling of more efficient mitigation techniques, while novel techniques from the field of IP networks can bring significant advantages. In this paper we explore the interconnection of NCI communication infrastructures with Software Defined Networking (SDN-enabled network topologies. SDN provides the means to create virtual networking services and to implement global networking decisions. It relies on OpenFlow to enable communication with remote devices and has been recently categorized as the “Next Big Technology”, which will revolutionize the way decisions are implemented in switches and routers. Therefore, the paper documents the first steps towards enabling an SDN-NCI and presents the impact of a Denial of Service experiment over traffic resulting from an XBee sensor network which is routed across an emulated SDN network.

  5. RISK ANALYSIS AND EVALUATION FOR CRITICAL LOGISTICAL INFRASTRUCTURE

    Directory of Open Access Journals (Sweden)

    Sascha Düerkop

    2016-12-01

    Full Text Available Logistical infrastructure builds the backbone of an economy. Without an effective logistical infrastructure in place, the supply for both enterprises and consumers might not be met. But even a high-quality logistical infrastructure can be threatened by risks. Thus, it is important to identify, analyse, and evaluate risks for logistical infrastructure that might threaten logistical processes. Only if those risks are known and their impact estimated, decision makers can implement counteractive measures to reduce risks. In this article, we develop a network-based approach that allows for the evaluation of risks and their consequences onto the logistical network. We will demonstrate the relevance of this approach by applying it to the logistics network of the central German state of Hesse. Even though transport data is extensively tracked and recorded nowadays, typical daily risks, like accidents on a motorway, and extraordinary risks, like a bridge at risk to collapse, terrorist attacks or climate-related catastrophes, are not systematically anticipated. Several studies unveiled recently that the overall impact for an economy of possible failures of single nodes and/or edges in a network are not calculated, and particularly critical edges are not identified in advance. We address this information gap by a method that helps to identify and quantify risks in a given network. To reach this objective, we define a mathematical optimization model that quantifies the current “risk-related costs” of the overall network and quantify the risk by investigating the change of the overall costs in the case a risk is realized.

  6. Geovisualization applications to examine and explore high-density and hierarchical critical infrastructure data

    Science.gov (United States)

    Edsall, Robert; Hembree, Harvey

    2018-05-01

    The geospatial research and development team in the National and Homeland Security Division at Idaho National Laboratory was tasked with providing tools to derive insight from the substantial amount of data currently available - and continuously being produced - associated with the critical infrastructure of the US. This effort is in support of the Department of Homeland Security, whose mission includes the protection of this infrastructure and the enhancement of its resilience to hazards, both natural and human. We present geovisual-analytics-based approaches for analysis of vulnerabilities and resilience of critical infrastructure, designed so that decision makers, analysts, and infrastructure owners and managers can manage risk, prepare for hazards, and direct resources before and after an incident that might result in an interruption in service. Our designs are based on iterative discussions with DHS leadership and analysts, who in turn will use these tools to explore and communicate data in partnership with utility providers, law enforcement, and emergency response and recovery organizations, among others. In most cases these partners desire summaries of large amounts of data, but increasingly, our users seek the additional capability of focusing on, for example, a specific infrastructure sector, a particular geographic region, or time period, or of examining data in a variety of generalization or aggregation levels. These needs align well with tenets of in-formation-visualization design; in this paper, selected applications among those that we have designed are described and positioned within geovisualization, geovisual analytical, and information visualization frameworks.

  7. Safety issues in cultural heritage management and critical infrastructures management

    Science.gov (United States)

    Soldovieri, Francesco; Masini, Nicola; Alvarez de Buergo, Monica; Dumoulin, Jean

    2013-12-01

    This special issue is the fourth of its kind in Journal of Geophysics and Engineering , containing studies and applications of geophysical methodologies and sensing technologies for the knowledge, conservation and security of products of human activity ranging from civil infrastructures to built and cultural heritage. The first discussed the application of novel instrumentation, surface and airborne remote sensing techniques, as well as data processing oriented to both detection and characterization of archaeological buried remains and conservation of cultural heritage (Eppelbaum et al 2010). The second stressed the importance of an integrated and multiscale approach for the study and conservation of architectural, archaeological and artistic heritage, from SAR to GPR to imaging based diagnostic techniques (Masini and Soldovieri 2011). The third enlarged the field of analysis to civil engineering structures and infrastructures, providing an overview of the effectiveness and the limitations of single diagnostic techniques, which can be overcome through the integration of different methods and technologies and/or the use of robust and novel data processing techniques (Masini et al 2012). As a whole, the special issue put in evidence the factors that affect the choice of diagnostic strategy, such as the material, the spatial characteristics of the objects or sites, the value of the objects to be investigated (cultural or not), the aim of the investigation (knowledge, conservation, restoration) and the issues to be addressed (monitoring, decay assessment). In order to complete the overview of the application fields of sensing technologies this issue has been dedicated to monitoring of cultural heritage and critical infrastructures to address safety and security issues. Particular attention has been paid to the data processing methods of different sensing techniques, from infrared thermography through GPR to SAR. Cascini et al (2013) present the effectiveness of a

  8. Critical Infrastructure for Ocean Research and Societal Needs in 2030

    Energy Technology Data Exchange (ETDEWEB)

    National Research Council

    2011-04-22

    . Consequently, a coordinated national plan for making future strategic investments becomes an imperative to address societal needs. Such a plan should be based upon known priorities and should be reviewed every 5-10 years to optimize the federal investment. The committee examined the past 20 years of technological advances and ocean infrastructure investments (such as the rise in use of self-propelled, uncrewed, underwater autonomous vehicles), assessed infrastructure that would be required to address future ocean research questions, and characterized ocean infrastructure trends for 2030. One conclusion was that ships will continue to be essential, especially because they provide a platform for enabling other infrastructure autonomous and remotely operated vehicles; samplers and sensors; moorings and cabled systems; and perhaps most importantly, the human assets of scientists, technical staff, and students. A comprehensive, long-term research fleet plan should be implemented in order to retain access to the sea. The current report also calls for continuing U.S. capability to access fully and partially ice-covered seas; supporting innovation, particularly the development of biogeochemical sensors; enhancing computing and modeling capacity and capability; establishing broadly accessible data management facilities; and increasing interdisciplinary education and promoting a technically-skilled workforce. The committee also provided a framework for prioritizing future investment in ocean infrastructure. They recommend that development, maintenance, or replacement of ocean research infrastructure assets should be prioritized in terms of societal benefit, with particular consideration given to usefulness for addressing important science questions; affordability, efficiency, and longevity; and ability to contribute to other missions or applications. These criteria are the foundation for prioritizing ocean research infrastructure investments by estimating the economic costs and benefits

  9. Defense Industrial Base: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    National Research Council Canada - National Science Library

    2007-01-01

    This Defense Industrial Base (DIB) Sector-Specific Plan (SSP), developed in collaboration with industry and government security partners, provides sector-level critical infrastructure and key resources (CI/KR...

  10. Complexity and Vulnerability Analysis of Critical Infrastructures: A Methodological Approach

    Directory of Open Access Journals (Sweden)

    Yongliang Deng

    2017-01-01

    Full Text Available Vulnerability analysis of network models has been widely adopted to explore the potential impacts of random disturbances, deliberate attacks, and natural disasters. However, almost all these models are based on a fixed topological structure, in which the physical properties of infrastructure components and their interrelationships are not well captured. In this paper, a new research framework is put forward to quantitatively explore and assess the complexity and vulnerability of critical infrastructure systems. Then, a case study is presented to prove the feasibility and validity of the proposed framework. After constructing metro physical network (MPN, Pajek is employed to analyze its corresponding topological properties, including degree, betweenness, average path length, network diameter, and clustering coefficient. With a comprehensive understanding of the complexity of MPN, it would be beneficial for metro system to restrain original near-miss or accidents and support decision-making in emergency situations. Moreover, through the analysis of two simulation protocols for system component failure, it is found that the MPN turned to be vulnerable under the condition that the high-degree nodes or high-betweenness edges are attacked. These findings will be conductive to offer recommendations and proposals for robust design, risk-based decision-making, and prioritization of risk reduction investment.

  11. Trust and Reputation Management for Critical Infrastructure Protection

    Science.gov (United States)

    Caldeira, Filipe; Monteiro, Edmundo; Simões, Paulo

    Today's Critical Infrastructures (CI) depend of Information and Communication Technologies (ICT) to deliver their services with the required level of quality and availability. ICT security plays a major role in CI protection and risk prevention for single and also for interconnected CIs were cascading effects might occur because of the interdependencies that exist among different CIs. This paper addresses the problem of ICT security in interconnected CIs. Trust and reputation management using the Policy Based Management paradigm is the proposed solution to be applied at the CI interconnection points for information exchange. The proposed solution is being applied to the Security Mediation Gateway being developed in the European FP7 MICIE project, to allow for information exchange among interconnected CIs.

  12. Cyber Security Insider Threats :: Government’s Role in Protecting India’s Critical Infrastructure Sectors

    OpenAIRE

    Vohra, Pulkit

    2014-01-01

    This research identifies the problem of insider threats in the critical infrastructure sectors of India. It is structured to answer the research question: "Why insider threats should be the primary concern for Indian government to protect its critical infrastructure sectors.” It defines the critical infrastructure sectors and portrays the cyber security scenario of India. Also, through the research study, it identifies the lack of awareness and non-seriousness of employees in the critical sec...

  13. Development of the efficient emergency preparedness system for the nuclear critical infrastructure

    International Nuclear Information System (INIS)

    Kostadinov, V.; Marn, J.; Petelin, S.

    2007-01-01

    The evaluation of the critical nuclear infrastructure vulnerability to threats like human occurrences, terrorist attacks and natural disasters and the preparation of emergency response plans with the estimation of optimized costs are of the vital importance for the assurance of a safe nuclear facilities operation and the national security. In the past national emergency systems did not include vulnerability assessments of the critical nuclear infrastructure as the important part of the comprehensive preparedness framework. The fundamental aims of the efficient emergency preparedness and response system are to provide a sustained emergency readiness and to prevent an emergency situation and accidents. But when an event happens the mission is to mitigate consequences and to protect the people and environment against the nuclear and radiological damage. The efficient emergency response system, which would be activated in the case of the nuclear and/or radiological emergency and release of the radioactivity to the environment, is an important element of a comprehensive system of the nuclear and radiation safety. In the article the new methodology for the critical nuclear infrastructure vulnerability assessment as a missing part of an efficient emergency preparedness system is presented. It can help the overall national energy sectors to identify and better understand the terrorist threats and vulnerabilities of their critical infrastructure. The presented methodology could also facilitate national agencies to develop and implement a vulnerability awareness and education programs for their critical assets to enhance the security, reliability and safe operation of the whole energy infrastructure. The vulnerability assessment methodology will also assist nuclear power plants to develop, validate, and disseminate the assessment and survey of new efficient countermeasures. The significant benefits of the new vulnerability assessment research are to increase nuclear power

  14. the GFCE-Meridian Good Practice Guide on Critical Information Infrastructure Protection for governmental policy-makers

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Schie, T.C.C. van; Ruijven, T.W.J. van; Huistra, A.W.W.

    2016-01-01

    Critical Information Infrastructure Protection (CIIP) is a complex but important topic for nations. Nations at large critically depend on Critical Infrastructure (CI) services such as energy supply, telecommunications, financial systems, drinking water, and governmental services. Critical

  15. INFRASTRUCTURE

    CERN Document Server

    A.Gaddi

    2011-01-01

    Between the end of March to June 2011, there has been no detector downtime during proton fills due to CMS Infrastructures failures. This exceptional performance is a clear sign of the high quality work done by the CMS Infrastructures unit and its supporting teams. Powering infrastructure At the end of March, the EN/EL group observed a problem with the CMS 48 V system. The problem was a lack of isolation between the negative (return) terminal and earth. Although at that moment we were not seeing any loss of functionality, in the long term it would have led to severe disruption to the CMS power system. The 48 V system is critical to the operation of CMS: in addition to feeding the anti-panic lights, essential for the safety of the underground areas, it powers all the PLCs (Twidos) that control AC power to the racks and front-end electronics of CMS. A failure of the 48 V system would bring down the whole detector and lead to evacuation of the cavern. EN/EL technicians have made an accurate search of the fault, ...

  16. Economics in Criticality and Restoration of Energy Infrastructures.

    Energy Technology Data Exchange (ETDEWEB)

    Boyd, Gale A.; Flaim, Silvio J.; Folga, Stephen M.; Gotham, Douglas J.; McLamore, Michael R.; Novak, Mary H.; Roop, Joe M.; Rossmann, Charles G.; Shamsuddin, Shabbir A.; Zeichner, Lee M.; Stamber, Kevin L.

    2005-03-01

    Economists, systems analysts, engineers, regulatory specialists, and other experts were assembled from academia, the national laboratories, and the energy industry to discuss present restoration practices (many have already been defined to the level of operational protocols) in the sectors of the energy infrastructure as well as other infrastructures, to identify whether economics, a discipline concerned with the allocation of scarce resources, is explicitly or implicitly a part of restoration strategies, and if there are novel economic techniques and solution methods that could be used help encourage the restoration of energy services more quickly than present practices or to restore service more efficiently from an economic perspective. AcknowledgementsDevelopment of this work into a coherent product with a useful message has occurred thanks to the thoughtful support of several individuals:Kenneth Friedman, Department of Energy, Office of Energy Assurance, provided the impetus for the work, as well as several suggestions and reminders of direction along the way. Funding from DOE/OEA was critical to the completion of this effort.Arnold Baker, Chief Economist, Sandia National Laboratories, and James Peerenboom, Director, Infrastructure Assurance Center, Argonne National Laboratory, provided valuable contacts that helped to populate the authoring team with the proper mix of economists, engineers, and systems and regulatory specialists to meet the objectives of the work.Several individuals provided valuable review of the document at various stages of completion, and provided suggestions that were valuable to the editing process. This list of reviewers includes Jeffrey Roark, Economist, Tennessee Valley Authority; James R. Dalrymple, Manager of Transmission System Services and Transmission/Power Supply, Tennessee Valley Authority; William Mampre, Vice President, EN Engineering; Kevin Degenstein, EN Engineering; and Patrick Wilgang, Department of Energy, Office of

  17. Cyber Attack on Critical Infrastructure and Its Influence on International Security

    OpenAIRE

    出口 雅史

    2017-01-01

     Since the internet appeared, with increasing cyber threats, the vulnerability of critical infrastructure has become a vital issue for international security. Although cyber attack was not lethal in the past, new type of cyber assaults such as stuxnet are able to damage not only computer system digitally, but also critical infrastructure physically. This article will investigate how the recent cyber attacks have threatened critical infrastructure and their influence on international security....

  18. Protecting America: Reorganizing the Nation's Security Forces to Ensure the Protection of Our Critical Infrastructure

    National Research Council Canada - National Science Library

    Williams

    2004-01-01

    .... This national strategy amplified the significant responsibilities of states, localities, the private sector, and private citizens to protect and defend our communities and our critical infrastructure...

  19. Methodologies and applications for critical infrastructure protection: State-of-the-art

    International Nuclear Information System (INIS)

    Yusta, Jose M.; Correa, Gabriel J.; Lacal-Arantegui, Roberto

    2011-01-01

    This work provides an update of the state-of-the-art on energy security relating to critical infrastructure protection. For this purpose, this survey is based upon the conceptual view of OECD countries, and specifically in accordance with EU Directive 114/08/EC on the identification and designation of European critical infrastructures, and on the 2009 US National Infrastructure Protection Plan. The review discusses the different definitions of energy security, critical infrastructure and key resources, and shows some of the experie'nces in countries considered as international reference on the subject, including some information-sharing issues. In addition, the paper carries out a complete review of current methodologies, software applications and modelling techniques around critical infrastructure protection in accordance with their functionality in a risk management framework. The study of threats and vulnerabilities in critical infrastructure systems shows two important trends in methodologies and modelling. A first trend relates to the identification of methods, techniques, tools and diagrams to describe the current state of infrastructure. The other trend accomplishes a dynamic behaviour of the infrastructure systems by means of simulation techniques including systems dynamics, Monte Carlo simulation, multi-agent systems, etc. - Highlights: → We examine critical infrastructure protection experiences, systems and applications. → Some international experiences are reviewed, including EU EPCIP Plan and the US NIPP programme. → We discuss current methodologies and applications on critical infrastructure protection, with emphasis in electric networks.

  20. INFRASTRUCTURE

    CERN Multimedia

    Andrea Gaddi

    2010-01-01

    In addition to the intense campaign of replacement of the leaky bushing on the Endcap circuits, other important activities have also been completed, with the aim of enhancing the overall reliability of the cooling infrastructures at CMS. Remaining with the Endcap circuit, the regulating valve that supplies cold water to the primary side of the circuit heat-exchanger, is not well adapted in flow capability and a new part has been ordered, to be installed during a stop of LHC. The instrumentation monitoring of the refilling rate of the circuits has been enhanced and we can now detect leaks as small as 0.5 cc/sec, on circuits that have nominal flow rates of some 20 litres/sec. Another activity starting now that the technical stop is over is the collection of spare parts that are difficult to find on the market. These will be stored at P5 with the aim of reducing down-time in case of component failure. Concerning the ventilation infrastructures, it has been noticed that in winter time the relative humidity leve...

  1. Integrating Critical Disability Studies into the Historiography of Infrastructures

    DEFF Research Database (Denmark)

    Galis, Vasilis; Tympas, Aristotle; Tzokas, Spyros

    Infrastructures are habitually associated with enabling, with facilitating mobility. Attention to accidents and related failures of infrastructures, due to accidental or endemic reasons, has substantially enriched the historiography of infrastructures while, at the same time, pointing to limits...... infrastructures became sites for regulating and controlling certain groups. Seen like this, transport technologies, at remote national borders and in the heart of a national metropolis, were a key field for sociotechnical battles that produced dis/abled-displaced bodies, that is, a new corporeal subject. Dis...... idea of the human being “(Shildrick, 2010)....

  2. 77 FR 35700 - Protected Critical Infrastructure Information (PCII) Program Survey

    Science.gov (United States)

    2012-06-14

    ... (NPPD), Office of Infrastructure Protection (IP), Infrastructure Information Collection Division (IICD... Information Collection Request should be forwarded to DHS/NPPD/IP/IICD, 245 Murray Lane, SW., Mailstop 0602, Arlington, VA 20598-0602. Email requests should go to Vickie Bovell, [email protected] . Written...

  3. A threat analysis framework as applied to critical infrastructures in the Energy Sector.

    Energy Technology Data Exchange (ETDEWEB)

    Michalski, John T.; Duggan, David Patrick

    2007-09-01

    The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be used to identify the elements required to quantify threats against critical infrastructure assets and provide a means of distributing actionable threat information to critical infrastructure entities for the protection of infrastructure assets. This document identifies and describes five key elements needed to perform a comprehensive analysis of threat: the identification of an adversary, the development of generic threat profiles, the identification of generic attack paths, the discovery of adversary intent, and the identification of mitigation strategies.

  4. Guarding America: Security Guards and U.S. Critical Infrastructure Protection

    National Research Council Canada - National Science Library

    Parfomak, Paul W

    2004-01-01

    The Bush Administration's 2003 National Strategy for the Physical Protection of Critical Infrastructures and Key Assets indicates that security guards are an important source of protection for critical facilities...

  5. INFRASTRUCTURE

    CERN Multimedia

    A. Gaddi

    2012-01-01

    The CMS Infrastructures teams are constantly ensuring the smooth operation of the different services during this critical period when the detector is taking data at full speed. A single failure would spoil hours of high luminosity beam and everything is put in place to avoid such an eventuality. In the meantime however, the fast approaching LS1 requires that we take a look at the various activities to take place from the end of the year onwards. The list of infrastructures consolidation and upgrade tasks is already long and will touch all the services (cooling, gas, inertion, powering, etc.). The definitive list will be available just before the LS1 start. One activity performed by the CMS cooling team that is worth mentioning is the maintenance of the cooling circuits at the CMS Electronics Integration Centre (EIC) at building 904. The old chiller has been replaced by a three-units cooling plant that also serves the HVAC system for the new CSC and RPC factories. The commissioning of this new plant has tak...

  6. Using Gamification to Raise Awareness of Cyber Threats to Critical National Infrastructure

    OpenAIRE

    Cook, Allan; Smith, Richard; Maglaras, Leandros; Janicke, Helge

    2016-01-01

    Linked to the SCIPS tabletop game Senior executives of critical national infrastructure facilities face competing requirements for investment budgets. Whilst the impact of a cyber attack upon such utilities is potentially catastrophic, the risks to continued operations from failing to upgrade ageing infrastructure, or not meeting mandated regulatory regimes, are considered higher given the demonstrable impact of such circumstances. As cyber attacks on critical national infrastructure remai...

  7. 78 FR 73202 - Review and Revision of the National Critical Infrastructure Security and Resilience (NCISR...

    Science.gov (United States)

    2013-12-05

    ... critical physical and cyber infrastructure. IV. NCISR R&D Plan Outline Below is the list of the topic areas... research and development topics are welcomed. V. Specific Questions Answers to the below specific questions... Critical Infrastructure Security and Resilience (NCISR) Research and Development (R&D) Plan Outline and...

  8. Advanced simulation for analysis of critical infrastructure : abstract cascades, the electric power grid, and Fedwire.

    Energy Technology Data Exchange (ETDEWEB)

    Glass, Robert John, Jr.; Stamber, Kevin Louis; Beyeler, Walter Eugene

    2004-08-01

    Critical Infrastructures are formed by a large number of components that interact within complex networks. As a rule, infrastructures contain strong feedbacks either explicitly through the action of hardware/software control, or implicitly through the action/reaction of people. Individual infrastructures influence others and grow, adapt, and thus evolve in response to their multifaceted physical, economic, cultural, and political environments. Simply put, critical infrastructures are complex adaptive systems. In the Advanced Modeling and Techniques Investigations (AMTI) subgroup of the National Infrastructure Simulation and Analysis Center (NISAC), we are studying infrastructures as complex adaptive systems. In one of AMTI's efforts, we are focusing on cascading failure as can occur with devastating results within and between infrastructures. Over the past year we have synthesized and extended the large variety of abstract cascade models developed in the field of complexity science and have started to apply them to specific infrastructures that might experience cascading failure. In this report we introduce our comprehensive model, Polynet, which simulates cascading failure over a wide range of network topologies, interaction rules, and adaptive responses as well as multiple interacting and growing networks. We first demonstrate Polynet for the classical Bac, Tang, and Wiesenfeld or BTW sand-pile in several network topologies. We then apply Polynet to two very different critical infrastructures: the high voltage electric power transmission system which relays electricity from generators to groups of distribution-level consumers, and Fedwire which is a Federal Reserve service for sending large-value payments between banks and other large financial institutions. For these two applications, we tailor interaction rules to represent appropriate unit behavior and consider the influence of random transactions within two stylized networks: a regular homogeneous array

  9. 77 FR 21989 - Critical Infrastructure Private Sector Clearance Program Request

    Science.gov (United States)

    2012-04-12

    ... Advisors email the form to the individual who then emails back the completed form, minus their date and... official who nominated the applicant and by the Assistant Secretary for Infrastructure Protection. Upon...

  10. Critical Infrastructure: Control Systems and the Terrorist Threat

    National Research Council Canada - National Science Library

    Shea, Dana A

    2003-01-01

    .... Industrial control computer systems involved in this infrastructure are specific points of vulnerability, as cyber-security for these systems has not been previously perceived as a high priority...

  11. Critical Infrastructure: Control Systems and the Terrorist Threat

    National Research Council Canada - National Science Library

    Shea, Dana A

    2004-01-01

    .... Industrial control computer systems involved in this infrastructure are specific points of vulnerability, as cyber-security for these systems has not been previously perceived as a high priority...

  12. Resilience framework for critical infrastructures: An empirical study in a nuclear plant

    International Nuclear Information System (INIS)

    Labaka, Leire; Hernantes, Josune; Sarriegi, Jose M.

    2015-01-01

    The safety and proper functioning of Critical Infrastructures (CIs) are essential for ensuring the welfare of society, which puts the issue of improving their resilience level at the forefront of the field of crisis management. Most of the resilience-building principles defined in the literature do not cover all the dimensions that make up resilience and most of them only focus within the boundaries of the CI, neglecting the role of the external agents that also have an influence on enhancing resilience. Furthermore, most of the principles that are present in the literature are theoretical and difficult to implement in practice. In light of this situation, the aim of this research is to present a holistic resilience framework for critical infrastructures in order to improve their resilience level by taking into account internal and external agents and covering all the resilience dimensions. Furthermore, this framework has been defined in close collaboration with the general management of CIs to facilitate its implementation in practice. Finally, in order to illustrate the value added of this framework it was implemented in a nuclear plant. - Highlights: • Resilience protects against foreseen and unpredicted events. • There are two types of resilience: internal resilience and external resilience. • Sixteen policies and thirty sub-policies assist on building resilience. • Power nuclear plant focused on risk management approach rather than resilience. • The plant’s event driven risk management was enhanced with an all hazard approach

  13. Recovery from chemical, biological, and radiological incidents. Critical infrastructure and economic impact considerations

    Energy Technology Data Exchange (ETDEWEB)

    Franco, David Oliver [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Yang, Lynn I. [Sandia National Lab. (SNL-CA), Livermore, CA (United States); Hammer, Ann E. [Sandia National Lab. (SNL-CA), Livermore, CA (United States)

    2012-06-01

    To restore regional lifeline services and economic activity as quickly as possible after a chemical, biological or radiological incident, emergency planners and managers will need to prioritize critical infrastructure across many sectors for restoration. In parallel, state and local governments will need to identify and implement measures to promote reoccupation and economy recovery in the region. This document provides guidance on predisaster planning for two of the National Disaster Recovery Framework Recovery Support Functions: Infrastructure Systems and Economic Recovery. It identifies key considerations for infrastructure restoration, outlines a process for prioritizing critical infrastructure for restoration, and identifies critical considerations for promoting regional economic recovery following a widearea disaster. Its goal is to equip members of the emergency preparedness community to systematically prioritize critical infrastructure for restoration, and to develop effective economic recovery plans in preparation for a widearea CBR disaster.

  14. Critical location identification and vulnerability analysis of interdependent infrastructure systems under spatially localized attacks

    International Nuclear Information System (INIS)

    Ouyang, Min

    2016-01-01

    Infrastructure systems are usually spatially distributed in a wide area and are subject to many types of hazards. For each type of hazards, modeling their direct impact on infrastructure components and analyzing their induced system-level vulnerability are important for identifying mitigation strategies. This paper mainly studies spatially localized attacks that a set of infrastructure components located within or crossing a circle shaped spatially localized area is subject to damage while other components do not directly fail. For this type of attacks, taking interdependent power and gas systems in Harris County, Texas, USA as an example, this paper proposes an approach to exactly identify critical locations in interdependent infrastructure systems and make pertinent vulnerability analysis. Results show that (a) infrastructure interdependencies and attack radius largely affect the position of critical locations; (b) spatially localized attacks cause less vulnerability than equivalent random failures; (c) in most values of attack radius critical locations identified by considering only node failures do not change when considering both node and edge failures in the attack area; (d) for many values of attack radius critical locations identified by topology-based model are also critical from the flow-based perspective. - Highlights: • We propose a method to identify critical locations in interdependent infrastructures. • Geographical interdependencies and attack radius largely affect critical locations. • Localized attacks cause less vulnerability than equivalent random failures. • Whether considering both node and edge failures affects critical locations. • Topology-based critical locations are also critical from flow-based perspective.

  15. The impact of natural hazard on critical infrastructure systems: definition of an ontology

    Science.gov (United States)

    Dimauro, Carmelo; Bouchon, Sara; Frattini, Paolo; Giusto, Claudia

    2013-04-01

    According to the Council of the European Union Directive (2008), 'critical infrastructure' means an asset, system or part thereof which is essential for the maintenance of vital societal functions, health, safety, security, economic or social well-being of people, and the disruption or destruction of which would have a significant impact as a result of the failure to maintain those functions. Critical infrastructure networks are exposed to natural events, such as floods, storms, landslides, earthquakes, etc. Recent natural disasters show that socio-economic consequences can be very much aggravated by the impact on these infrastructures. Though, there is still a lack of a recognized approach or methodology to assess the vulnerability of critical infrastructure assets against natural threats. The difficulty to define such an approach is increased by the need to consider a very high number of natural events, which differ in nature, magnitude and probability, as well as the need to assess the vulnerability of a high variety of infrastructure assets (e.g. bridges, roads, tunnels, pipelines, etc.) To meet this challenge, the objective of the THREVI2 EU-CIPS project is to create a database linking the relationships between natural hazards and critical infrastructure assets. The query of the database will allow the end-users (critical infrastructure protection authorities and operators) to identify the relevant scenarios according to the own priorities and criteria. The database builds on an ontology optimized for the assessment of the impact of threats on critical infrastructures. The ontology aims at capturing the existing knowledge on natural hazards, critical infrastructures assets and their related vulnerabilities. Natural phenomena that can threaten critical infrastructures are classified as "events", and organized in a genetic-oriented hierarchy. The main attributes associated to each event are the probability, the magnitude and the "modus". The modus refers to the

  16. INFRASTRUCTURE

    CERN Multimedia

    Andrea Gaddi

    With all the technical services running, the attention has moved toward the next shutdown that will be spent to perform those modifications needed to enhance the reliability of CMS Infrastructures. Just to give an example for the cooling circuit, a set of re-circulating bypasses will be installed into the TS/CV area to limit the pressure surge when a circuit is partially shut-off. This problem has affected especially the Endcap Muon cooling circuit in the past. Also the ventilation of the UXC55 has to be revisited, allowing the automatic switching to full extraction in case of magnet quench. (Normally 90% of the cavern air is re-circulated by the ventilation system.) Minor modifications will concern the gas distribution, while the DSS action-matrix has to be refined according to the experience gained with operating the detector for a while. On the powering side, some LV power lines have been doubled and the final schematics of the UPS coverage for the counting rooms have been released. The most relevant inte...

  17. Fragility: The Next Wave in Critical Infrastructure Protection

    OpenAIRE

    Allan McDougall

    2009-01-01

    In North America today, we are about to embark on a significant effort to repair, or even upgrade, many aspects of our infrastructure. Many of these efforts are linked to economic recovery packages. Others are based on sheer need. The challenge for decision makers and planners involves ensuring that scarce economic resources are put to their best use. Understanding the concept of fragility plays a pivotal part in reaching that understanding.Fragility, like many other systems—particularly Info...

  18. Government of Canada position paper on a national strategy for critical infrastructure protection

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-11-01

    The Government of Canada's position on the development of a comprehensive national approach to critical infrastructure protection (CIP) was presented along with a policy framework for developing a national cyber security strategy and a review of the Emergency Preparedness Act. Canada's national critical infrastructure (NCI) is defined as physical and information technology facilities, networks, services and assets, which if destroyed, would have a serious impact on health, safety, security and economics. The CIP strategy includes an NCI assurance program for various sectors of the economy, including the energy, transportation, finance, health care, food, communications, water, safety and manufacturing sectors. It also includes CIP for the government sector. This report described the key elements of an NCI protection strategy. These include guiding principles, risk management, information sharing, inventory of critical infrastructure assets, threats and warnings, critical infrastructure interdependencies, governance mechanisms, research and development, and international cooperation. refs., tabs., figs.

  19. Planning virtual infrastructures for time critical applications with multiple deadline constraints

    NARCIS (Netherlands)

    Wang, J.; Taal, A.; Martin, P.; Hu, Y.; Zhou, H.; Pang, J.; de Laat, C.; Zhao, Z.

    2017-01-01

    Executing time critical applications within cloud environments while satisfying execution deadlines and response time requirements is challenging due to the difficulty of securing guaranteed performance from the underlying virtual infrastructure. Cost-effective solutions for hosting such

  20. 78 FR 39712 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Science.gov (United States)

    2013-07-02

    ... DEPARTMENT OF COMMERCE International Trade Administration Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait Clarification and Amendment AGENCY... cyber-security firms and trade organizations which have not already submitted an application are...

  1. Reliability issues related to the usage of Cloud Computing in Critical Infrastructures

    OpenAIRE

    Diez Gonzalez, Oscar Manuel; Silva Vazquez, Andrés

    2011-01-01

    The use of cloud computing is extending to all kind of systems, including the ones that are part of Critical Infrastructures, and measuring the reliability is becoming more difficult. Computing is becoming the 5th utility, in part thanks to the use of cloud services. Cloud computing is used now by all types of systems and organizations, including critical infrastructure, creating hidden inter-dependencies on both public and private cloud models. This paper investigates the use of cloud co...

  2. On the Effectiveness of Security Countermeasures for Critical Infrastructures.

    Science.gov (United States)

    Hausken, Kjell; He, Fei

    2016-04-01

    A game-theoretic model is developed where an infrastructure of N targets is protected against terrorism threats. An original threat score is determined by the terrorist's threat against each target and the government's inherent protection level and original protection. The final threat score is impacted by the government's additional protection. We investigate and verify the effectiveness of countermeasures using empirical data and two methods. The first is to estimate the model's parameter values to minimize the sum of the squared differences between the government's additional resource investment predicted by the model and the empirical data. The second is to develop a multivariate regression model where the final threat score varies approximately linearly relative to the original threat score, sectors, and threat scenarios, and depends nonlinearly on the additional resource investment. The model and method are offered as tools, and as a way of thinking, to determine optimal resource investments across vulnerable targets subject to terrorism threats. © 2014 Society for Risk Analysis.

  3. Fragility: The Next Wave in Critical Infrastructure Protection

    Directory of Open Access Journals (Sweden)

    Allan McDougall

    2009-01-01

    Full Text Available In North America today, we are about to embark on a significant effort to repair, or even upgrade, many aspects of our infrastructure. Many of these efforts are linked to economic recovery packages. Others are based on sheer need. The challenge for decision makers and planners involves ensuring that scarce economic resources are put to their best use. Understanding the concept of fragility plays a pivotal part in reaching that understanding.Fragility, like many other systems—particularly Information Technology (IT systems—works on the concept of subjects and objects. Subjects are those entities that seek to exploit the services (or capacity offered by the object. Objects, on the other hand, are those entities that deliver some good or service to the overall system. Of course, something may act as the object in one pairing and the subject in another pairing—they are not exclusive in nature.

  4. Enhanced computational infrastructure for data analysis at the DIII-D National Fusion Facility

    International Nuclear Information System (INIS)

    Schissel, D.P.; Peng, Q.; Schachter, J.; Terpstra, T.B.; Casper, T.A.; Freeman, J.; Jong, R.; Keith, K.M.; McHarg, B.B.; Meyer, W.H.; Parker, C.T.

    2000-01-01

    Recently a number of enhancements to the computer hardware infrastructure have been implemented at the DIII-D National Fusion Facility. Utilizing these improvements to the hardware infrastructure, software enhancements are focusing on streamlined analysis, automation, and graphical user interface (GUI) systems to enlarge the user base. The adoption of the load balancing software package LSF Suite by Platform Computing has dramatically increased the availability of CPU cycles and the efficiency of their use. Streamlined analysis has been aided by the adoption of the MDSplus system to provide a unified interface to analyzed DIII-D data. The majority of MDSplus data is made available in between pulses giving the researcher critical information before setting up the next pulse. Work on data viewing and analysis tools focuses on efficient GUI design with object-oriented programming (OOP) for maximum code flexibility. Work to enhance the computational infrastructure at DIII-D has included a significant effort to aid the remote collaborator since the DIII-D National Team consists of scientists from nine national laboratories, 19 foreign laboratories, 16 universities, and five industrial partnerships. As a result of this work, DIII-D data is available on a 24x7 basis from a set of viewing and analysis tools that can be run on either the collaborators' or DIII-D's computer systems. Additionally, a web based data and code documentation system has been created to aid the novice and expert user alike

  5. Enhanced Computational Infrastructure for Data Analysis at the DIII-D National Fusion Facility

    International Nuclear Information System (INIS)

    Schissel, D.P.; Peng, Q.; Schachter, J.; Terpstra, T.B.; Casper, T.A.; Freeman, J.; Jong, R.; Keith, K.M.; Meyer, W.H.; Parker, C.T.; McCharg, B.B.

    1999-01-01

    Recently a number of enhancements to the computer hardware infrastructure have been implemented at the DIII-D National Fusion Facility. Utilizing these improvements to the hardware infrastructure, software enhancements are focusing on streamlined analysis, automation, and graphical user interface (GUI) systems to enlarge the user base. The adoption of the load balancing software package LSF Suite by Platform Computing has dramatically increased the availability of CPU cycles and the efficiency of their use. Streamlined analysis has been aided by the adoption of the MDSplus system to provide a unified interface to analyzed DIII-D data. The majority of MDSplus data is made available in between pulses giving the researcher critical information before setting up the next pulse. Work on data viewing and analysis tools focuses on efficient GUI design with object-oriented programming (OOP) for maximum code flexibility. Work to enhance the computational infrastructure at DIII-D has included a significant effort to aid the remote collaborator since the DIII-D National Team consists of scientists from 9 national laboratories, 19 foreign laboratories, 16 universities, and 5 industrial partnerships. As a result of this work, DIII-D data is available on a 24 x 7 basis from a set of viewing and analysis tools that can be run either on the collaborators' or DIII-Ds computer systems. Additionally, a Web based data and code documentation system has been created to aid the novice and expert user alike

  6. Enhancing critical current density of cuprate superconductors

    Science.gov (United States)

    Chaudhari, Praveen

    2015-06-16

    The present invention concerns the enhancement of critical current densities in cuprate superconductors. Such enhancement of critical current densities include using wave function symmetry and restricting movement of Abrikosov (A) vortices, Josephson (J) vortices, or Abrikosov-Josephson (A-J) vortices by using the half integer vortices associated with d-wave symmetry present in the grain boundary.

  7. 76 FR 58730 - Version 4 Critical Infrastructure Protection Reliability Standards

    Science.gov (United States)

    2011-09-22

    ... Critical Cyber Assets; (3) internal, management, approval of the risk-based assessment; (4) external review... consider applicable features of the NIST Risk Management Framework to ensure protection of all cyber... activities in the Risk Management Framework has an associated NIST security standard and/or guidance document...

  8. 77 FR 72673 - Critical Infrastructure Protection and Resilience Month, 2012

    Science.gov (United States)

    2012-12-05

    ... why my Administration continues to make cybersecurity a national security priority. As we continue to... secure. This month, we rededicate ourselves to raising awareness of the importance of critical... of the United States to recognize the importance of protecting our Nation's resources and to observe...

  9. Critical Infrastructure Protection: EMP Impacts on the U.S. Electric Grid

    Science.gov (United States)

    Boston, Edwin J., Jr.

    The purpose of this research is to identify the United States electric grid infrastructure systems vulnerabilities to electromagnetic pulse attacks and the cyber-based impacts of those vulnerabilities to the electric grid. Additionally, the research identifies multiple defensive strategies designed to harden the electric grid against electromagnetic pulse attack that include prevention, mitigation and recovery postures. Research results confirm the importance of the electric grid to the United States critical infrastructures system and that an electromagnetic pulse attack against the electric grid could result in electric grid degradation, critical infrastructure(s) damage and the potential for societal collapse. The conclusions of this research indicate that while an electromagnetic pulse attack against the United States electric grid could have catastrophic impacts on American society, there are currently many defensive strategies under consideration designed to prevent, mitigate and or recover from an electromagnetic pulse attack. However, additional research is essential to further identify future target hardening opportunities, efficient implementation strategies and funding resources.

  10. Seismic Barrier Protection of Critical Infrastructure from Earthquakes

    Science.gov (United States)

    2017-05-01

    We observe that such barrier structures reduce seismic wave powers by 10 – 40 dB that would otherwise reach the foundation location. Moreover, the... structure composed of opposing boreholes or trenches to mitigate seismic waves from diffracting and traveling in the vertical plane. Computational...seismic wave propagation models suggest that air or fluid filled subsurface V- shaped muffler structures are critical to the redirection and self

  11. No Dark Corners: Defending Against Insider Threats to Critical Infrastructure

    Science.gov (United States)

    2009-09-01

    latter do not unfairly affect an applicant’s livelihood by making adverse hiring decisions before the legal system has decided actual guilt (Pre...object that changing demographics may also account for crime, thus bringing into question Broken Windows as a panacea . One criticism even went so... panacea or as the sole explanation for decreases in crime, himself taking account of other factors, including Newman’s work, it is more accurate to

  12. Critical Infrastructure Interdependency Modeling: A Survey of U.S. and International Research

    Energy Technology Data Exchange (ETDEWEB)

    2006-08-01

    The Nation’s health, wealth, and security rely on the production and distribution of certain goods and services. The array of physical assets, processes, and organizations across which these goods and services move are called "critical infrastructures".1 This statement is as true in the U.S. as in any country in the world. Recent world events such as the 9-11 terrorist attacks, London bombings, and gulf coast hurricanes have highlighted the importance of stable electric, gas and oil, water, transportation, banking and finance, and control and communication infrastructure systems. Be it through direct connectivity, policies and procedures, or geospatial proximity, most critical infrastructure systems interact. These interactions often create complex relationships, dependencies, and interdependencies that cross infrastructure boundaries. The modeling and analysis of interdependencies between critical infrastructure elements is a relatively new and very important field of study. The U.S. Technical Support Working Group (TSWG) has sponsored this survey to identify and describe this current area of research including the current activities in this field being conducted both in the U.S. and internationally. The main objective of this study is to develop a single source reference of critical infrastructure interdependency modeling tools (CIIMT) that could be applied to allow users to objectively assess the capabilities of CIIMT. This information will provide guidance for directing research and development to address the gaps in development. The results will inform researchers of the TSWG Infrastructure Protection Subgroup of research and development efforts and allow a more focused approach to addressing the needs of CIIMT end-user needs. This report first presents the field of infrastructure interdependency analysis, describes the survey methodology, and presents the leading research efforts in both a cumulative table and through individual datasheets. Data was

  13. A database of volcanic hazards and their physical impacts to critical infrastructure

    Science.gov (United States)

    Wilson, Grant; Wilson, Thomas; Deligne, Natalia

    2013-04-01

    Approximately 10% of the world's population lives within 100 km of historically active volcanoes. Consequently, considerable critical infrastructure is at risk of being affected by volcanic eruptions, where critical infrastructure includes: electricity and wastewater networks; water supply systems; transport routes; communications; and buildings. Appropriate risk management strategies are required to minimise the risk to infrastructure, which necessitates detailed understanding of both volcanic hazards and infrastructure parameters and vulnerabilities. To address this, we are developing a database of the physical impacts and vulnerability of critical infrastructure observed during/following historic eruptions, placed in the context of event-specific volcanic hazard and infrastructure parameters. Our database considers: volcanic hazard parameters for each case study eruption (tephra thickness, dynamic pressure of PDCs, etc.); inventory of infrastructure elements present within the study area (geographical extent, age, etc.); the type and number of impacts and disruption caused to particular infrastructure sectors; and the quantified assessment of the vulnerability of built environments. Data have been compiled from a wide range of literature, focussing in particular on impact assessment studies which document in detail the damage sustained by critical infrastructure during a given eruption. We are creating a new vulnerability ranking to quantify the vulnerability of built environments affected by volcanic eruptions. The ranking is based upon a range of physical impacts and service disruption criteria, and is assigned to each case study. This ranking will permit comparison of vulnerabilities between case studies as well as indicate expected vulnerability during future eruptions. We are also developing hazard intensity thresholds indicating when specific damage states are expected for different critical infrastructure sectors. Finally, we have developed a data quality

  14. Assessing the dynamic material criticality of infrastructure transitions: A case of low carbon electricity

    International Nuclear Information System (INIS)

    Roelich, Katy; Dawson, David A.; Purnell, Phil; Knoeri, Christof; Revell, Ruairi; Busch, Jonathan; Steinberger, Julia K.

    2014-01-01

    Highlights: • We present a method to analyse material criticality of infrastructure transitions. • Criticality is defined as the potential for, and exposure to, supply disruption. • Our method is dynamic reducing the probability of lock-in to at-risk technologies. • We show that supply disruption potential is reducing but exposure is increasing. - Abstract: Decarbonisation of existing infrastructure systems requires a dynamic roll-out of technology at an unprecedented scale. The potential disruption in supply of critical materials could endanger such a transition to low-carbon infrastructure and, by extension, compromise energy security more broadly because low carbon technologies are reliant on these materials in a way that fossil-fuelled energy infrastructure is not. Criticality is currently defined as the combination of the potential for supply disruption and the exposure of a system of interest to that disruption. We build on this definition and develop a dynamic approach to quantifying criticality, which monitors the change in criticality during the transition towards a low-carbon infrastructure goal. This allows us to assess the relative risk of different technology pathways to reach a particular goal and reduce the probability of being ‘locked in’ to currently attractive but potentially future-critical technologies. To demonstrate, we apply our method to criticality of the proposed UK electricity system transition, with a focus on neodymium. We anticipate that the supply disruption potential of neodymium will decrease by almost 30% by 2050; however, our results show the criticality of low carbon electricity production increases ninefold over this period, as a result of increasing exposure to neodymium-reliant technologies

  15. Modelling a critical infrastructure-driven spatial database for proactive disaster management: A developing country context

    Directory of Open Access Journals (Sweden)

    David O. Baloye

    2016-04-01

    Full Text Available The understanding and institutionalisation of the seamless link between urban critical infrastructure and disaster management has greatly helped the developed world to establish effective disaster management processes. However, this link is conspicuously missing in developing countries, where disaster management has been more reactive than proactive. The consequence of this is typified in poor response time and uncoordinated ways in which disasters and emergency situations are handled. As is the case with many Nigerian cities, the challenges of urban development in the city of Abeokuta have limited the effectiveness of disaster and emergency first responders and managers. Using geospatial techniques, the study attempted to design and deploy a spatial database running a web-based information system to track the characteristics and distribution of critical infrastructure for effective use during disaster and emergencies, with the purpose of proactively improving disaster and emergency management processes in Abeokuta. Keywords: Disaster Management; Emergency; Critical Infrastructure; Geospatial Database; Developing Countries; Nigeria

  16. INFRASTRUCTURE

    CERN Multimedia

    A. Gaddi and P. Tropea

    2011-01-01

    Most of the work relating to Infrastructure has been concentrated in the new CSC and RPC manufactory at building 904, on the Prevessin site. Brand new gas distribution, powering and HVAC infrastructures are being deployed and the production of the first CSC chambers has started. Other activities at the CMS site concern the installation of a new small crane bridge in the Cooling technical room in USC55, in order to facilitate the intervention of the maintenance team in case of major failures of the chilled water pumping units. The laser barrack in USC55 has been also the object of a study, requested by the ECAL community, for the new laser system that shall be delivered in few months. In addition, ordinary maintenance works have been performed during the short machine stops on all the main infrastructures at Point 5 and in preparation to the Year-End Technical Stop (YETS), when most of the systems will be carefully inspected in order to ensure a smooth running through the crucial year 2012. After the incide...

  17. INFRASTRUCTURE

    CERN Multimedia

    A. Gaddi and P. Tropea

    2012-01-01

    The CMS Infrastructures teams are preparing for the LS1 activities. A long list of maintenance, consolidation and upgrade projects for CMS Infrastructures is on the table and is being discussed among Technical Coordination and sub-detector representatives. Apart from the activities concerning the cooling infrastructures (see below), two main projects have started: the refurbishment of the SX5 building, from storage area to RP storage and Muon stations laboratory; and the procurement of a new dry-gas (nitrogen and dry air) plant for inner detector flushing. We briefly present here the work done on the first item, leaving the second one for the next CMS Bulletin issue. The SX5 building is entering its third era, from main assembly building for CMS from 2000 to 2007, to storage building from 2008 to 2012, to RP storage and Muon laboratory during LS1 and beyond. A wall of concrete blocks has been erected to limit the RP zone, while the rest of the surface has been split between the ME1/1 and the CSC/DT laborat...

  18. Applying the Msharpp Method in Risk Assessment for the Water Supply Critical Infrastructure Sector

    Directory of Open Access Journals (Sweden)

    Badea Dorel

    2015-06-01

    Full Text Available The paper highlights a manner to assess risks for an important sector of critical infrastructure, that of water supply, frequently regulated in international legal systems. We took into consideration the fact that risk is a problem related to the processes of decision making under conditions of uncertainty in most cases, so that by this approach we bring to the attention of critical infrastructure managers, drawing on their experience, a simple method that can be considered in a preliminary stage of risk assessment specific to water supply.

  19. Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.

    Energy Technology Data Exchange (ETDEWEB)

    Dawson, Lon Andrew; Stinebaugh, Jennifer A.

    2010-04-01

    The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

  20. Systematic risk assessment methodology for critical infrastructure elements - Oil and Gas subsectors

    Science.gov (United States)

    Gheorghiu, A.-D.; Ozunu, A.

    2012-04-01

    The concern for the protection of critical infrastructure has been rapidly growing in the last few years in Europe. The level of knowledge and preparedness in this field is beginning to develop in a lawfully organized manner, for the identification and designation of critical infrastructure elements of national and European interest. Oil and gas production, refining, treatment, storage and transmission by pipelines facilities, are considered European critical infrastructure sectors, as per Annex I of the Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. Besides identifying European and national critical infrastructure elements, member states also need to perform a risk analysis for these infrastructure items, as stated in Annex II of the above mentioned Directive. In the field of risk assessment, there are a series of acknowledged and successfully used methods in the world, but not all hazard identification and assessment methods and techniques are suitable for a given site, situation, or type of hazard. As Theoharidou, M. et al. noted (Theoharidou, M., P. Kotzanikolaou, and D. Gritzalis 2009. Risk-Based Criticality Analysis. In Critical Infrastructure Protection III. Proceedings. Third Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection. Hanover, New Hampshire, USA, March 23-25, 2009: revised selected papers, edited by C. Palmer and S. Shenoi, 35-49. Berlin: Springer.), despite the wealth of knowledge already created, there is a need for simple, feasible, and standardized criticality analyses. The proposed systematic risk assessment methodology includes three basic steps: the first step (preliminary analysis) includes the identification of hazards (including possible natural hazards) for each installation/section within a given site, followed by a criterial analysis and then a detailed analysis step

  1. System Dynamics Approach for Critical Infrastructure and Decision Support. A Model for a Potable Water System.

    Science.gov (United States)

    Pasqualini, D.; Witkowski, M.

    2005-12-01

    The Critical Infrastructure Protection / Decision Support System (CIP/DSS) project, supported by the Science and Technology Office, has been developing a risk-informed Decision Support System that provides insights for making critical infrastructure protection decisions. The system considers seventeen different Department of Homeland Security defined Critical Infrastructures (potable water system, telecommunications, public health, economics, etc.) and their primary interdependencies. These infrastructures have been modeling in one model called CIP/DSS Metropolitan Model. The modeling approach used is a system dynamics modeling approach. System dynamics modeling combines control theory and the nonlinear dynamics theory, which is defined by a set of coupled differential equations, which seeks to explain how the structure of a given system determines its behavior. In this poster we present a system dynamics model for one of the seventeen critical infrastructures, a generic metropolitan potable water system (MPWS). Three are the goals: 1) to gain a better understanding of the MPWS infrastructure; 2) to identify improvements that would help protect MPWS; and 3) to understand the consequences, interdependencies, and impacts, when perturbations occur to the system. The model represents raw water sources, the metropolitan water treatment process, storage of treated water, damage and repair to the MPWS, distribution of water, and end user demand, but does not explicitly represent the detailed network topology of an actual MPWS. The MPWS model is dependent upon inputs from the metropolitan population, energy, telecommunication, public health, and transportation models as well as the national water and transportation models. We present modeling results and sensitivity analysis indicating critical choke points, negative and positive feedback loops in the system. A general scenario is also analyzed where the potable water system responds to a generic disruption.

  2. Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling

    Energy Technology Data Exchange (ETDEWEB)

    McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

    2009-03-26

    Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

  3. Enhancing Critical Thinking Skills among Authoritarian Students

    Science.gov (United States)

    Henderson Hurley, Martha; Hurley, David

    2013-01-01

    This article focuses on assignments designed to enhance critical thinking skills for authoritarian personality types. This paper seeks to add to the literature by exploring instructional methods to overcome authoritarian traits that could inhibit the development of critical thinking skills. The article presents a strategy which can be employed…

  4. Enhancing discovery in spatial data infrastructures using a search engine

    Directory of Open Access Journals (Sweden)

    Paolo Corti

    2018-05-01

    Full Text Available A spatial data infrastructure (SDI is a framework of geospatial data, metadata, users and tools intended to provide an efficient and flexible way to use spatial information. One of the key software components of an SDI is the catalogue service which is needed to discover, query and manage the metadata. Catalogue services in an SDI are typically based on the Open Geospatial Consortium (OGC Catalogue Service for the Web (CSW standard which defines common interfaces for accessing the metadata information. A search engine is a software system capable of supporting fast and reliable search, which may use ‘any means necessary’ to get users to the resources they need quickly and efficiently. These techniques may include full text search, natural language processing, weighted results, fuzzy tolerance results, faceting, hit highlighting, recommendations and many others. In this paper we present an example of a search engine being added to an SDI to improve search against large collections of geospatial datasets. The Centre for Geographic Analysis (CGA at Harvard University re-engineered the search component of its public domain SDI (Harvard WorldMap which is based on the GeoNode platform. A search engine was added to the SDI stack to enhance the CSW catalogue discovery abilities. It is now possible to discover spatial datasets from metadata by using the standard search operations of the catalogue and to take advantage of the new abilities of the search engine, to return relevant and reliable content to SDI users.

  5. A fault diagnosis system for interdependent critical infrastructures based on HMMs

    International Nuclear Information System (INIS)

    Ntalampiras, Stavros; Soupionis, Yannis; Giannopoulos, Georgios

    2015-01-01

    Modern society depends on the smooth functioning of critical infrastructures which provide services of fundamental importance, e.g. telecommunications and water supply. These infrastructures may suffer from faults/malfunctions coming e.g. from aging effects or they may even comprise targets of terrorist attacks. Prompt detection and accommodation of these situations is of paramount significance. This paper proposes a probabilistic modeling scheme for analyzing malicious events appearing in interdependent critical infrastructures. The proposed scheme is based on modeling the relationship between datastreams coming from two network nodes by means of a hidden Markov model (HMM) trained on the parameters of linear time-invariant dynamic systems which estimate the relationships existing among the specific nodes over consecutive time windows. Our study includes an energy network (IEEE 30 model bus) operated via a telecommunications infrastructure. The relationships among the elements of the network of infrastructures are represented by an HMM and the novel data is categorized according to its distance (computed in the probabilistic space) from the training ones. We considered two types of cyber-attacks (denial of service and integrity/replay) and report encouraging results in terms of false positive rate, false negative rate and detection delay. - Highlights: • An HMM-based scheme is proposed for analyzing malicious events in critical infrastructures. • We use the IEEE 30 model bus operated via an emulated ICT infrastructure. • Novel data is categorized based on its probabilistic distance from the training one. • We considered two types of cyber-attacks and report results of extensive experiments

  6. Interdependency control : compensation strategies for the inherent vulnerability of critical infrastructure networks

    International Nuclear Information System (INIS)

    Mao, D.; Sotoodeh, M.; Monu, K.; Marti, J.R.; Srivastava, K.D.

    2009-01-01

    Today's increasingly interacting national critical infrastructures (NCIs) can tolerate most stochastic local disturbances. However, they are extremely fragile under global disturbances, as the latter may either push the whole system into a critical state or reveal many unexpected hidden interdependencies, inducing or triggering cascading failures among all possible layers. This robust yet fragile duality is an inherent vulnerability of modern infrastructures. It is therefore expected that weather-related disasters will be more frequent under a changing climate. This paper proposed an interdependency control strategy (ICS) that would maintain the survival of the most critical services, and compensate for this inherent vulnerability during emergency states. The paper also proposed a generalized adjacency matrix (GAM) to represent the physical interdependencies intra/inter of various infrastructure networks. The vulnerable section in the network can be identified, based on computed results of GAM, number of islands in the network, and influence domain(s) of each component. These features render ICS more effective and convincing. Last, the paper proposed a survivability index for isolated sub-networks and described relevant measures for improving this index during the four phases of emergency management. It was concluded that the proposed strategy is an effective means to reduce the inherent vulnerability and increase the resiliency of these critical infrastructures networks. 20 refs., 5 figs

  7. A Good Practice Guide on Critical Infor-mation Infrastructure Protection

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Schie, T.C.C. van

    2017-01-01

    Early 2016, the Meridian Process and the GFCE tasked the Netherlands Organisation for Applied Scientific Research TNO to develop a Good Practice Guide on Critical Information Infrastructure Protection (CIIP) for governmental policy-makers [1]. The guide primarily aims at governmental policy-makers,

  8. INFRASTRUCTURE

    CERN Multimedia

    A. Gaddi and P. Tropea

    2013-01-01

      Most of the CMS infrastructures at P5 will go through a heavy consolidation-work period during LS1. All systems, from the cryogenic plant of the superconducting magnet to the rack powering in the USC55 counting rooms, from the cooling circuits to the gas distribution, will undergo consolidation work. As announced in the last issue of the CMS Bulletin, we present here one of the consolidation projects of LS1: the installation of a new dry-gas plant for inner detectors inertion. So far the oxygen and humidity suppression inside the CMS Tracker and Pixel volumes were assured by flushing dry nitrogen gas evaporated from a large liquid nitrogen tank. For technical reasons, the maximum flow is limited to less than 100 m3/h and the cost of refilling the tank every two weeks with liquid nitrogen is quite substantial. The new dry-gas plant will supply up to 400 m3/h of dry nitrogen (or the same flow of dry air, during shut-downs) with a comparatively minimal operation cost. It has been evaluated that the...

  9. INFRASTRUCTURE

    CERN Document Server

    Andrea Gaddi

    2010-01-01

    During the last six months, the main activity on the cooling circuit has essentially been preventive maintenance. At each short machine technical stop, a water sample is extracted out of every cooling circuit to measure the induced radioactivity. Soon after, a visual check of the whole detector cooling network is done, looking for water leaks in sensitive locations. Depending on sub-system availability, the main water filters are replaced; the old ones are inspected and sent to the CERN metallurgical lab in case of suspicious sediments. For the coming winter technical stop, a number of corrective maintenance activities and infrastructure consolidation work-packages are foreseen. A few faulty valves, found on the muon system cooling circuit, will be replaced; the cooling gauges for TOTEM and CASTOR, in the CMS Forward region, will be either changed or shielded against the magnetic stray field. The demineralizer cartridges will be replaced as well. New instrumentation will also be installed in the SCX5 PC farm ...

  10. INFRASTRUCTURE

    CERN Multimedia

    Andrea Gaddi.

    The various water-cooling circuits ran smoothly over the summer. The overall performance of the cooling system is satisfactory, even if some improvements are possible, concerning the endcap water-cooling and the C6F14 circuits. In particular for the endcap cooling circuit, we aim to lower the water temperature, to provide more margin for RPC detectors. An expert-on-call piquet has been established during the summer global run, assuring the continuous supervision of the installations. An effort has been made to collect and harmonize the existing documentation on the cooling infrastructures at P5. The last six months have seen minor modifications to the electrical power network at P5. Among these, the racks in USC55 for the Tracker and Sniffer systems, which are backed up by the diesel generator in case of power outage, have been equipped with new control boxes to allow a remote restart. Other interventions have concerned the supply of assured power to those installations that are essential for CMS to run eff...

  11. INFRASTRUCTURE

    CERN Multimedia

    A. Gaddi

    The long winter shut-down allows for modifications that will improve the reliability of the detector infrastructures at P5. The annual maintenance of detector services is taking place as well. This means a full stop of water-cooling circuits from November 24th with a gradual restart from mid January 09. The annual maintenance service includes the cleaning of the two SF5 cooling towers, service of the chiller plants on the surface, and the cryogenic plant serving the CMS Magnet. In addition, the overall site power is reduced from 8MW to 2MW, compatible with the switchover to the Swiss power network in winter. Full power will be available again from end of January. Among the modification works planned, the Low Voltage cabinets are being refurbished; doubling the cable sections and replacing the 40A circuit breakers with 60A types. This will reduce the overheating that has been experienced. Moreover, two new LV transformers will be bought and pre-cabled in order to assure a quick swap in case of failure of any...

  12. INFRASTRUCTURE

    CERN Document Server

    A. Gaddi

    2011-01-01

    During the last winter technical stop, a number of corrective maintenance activities and infrastructure consolidation work-packages were completed. On the surface, the site cooling facility has passed the annual maintenance process that includes the cleaning of the two evaporative cooling towers, the maintenance of the chiller units and the safety checks on the software controls. In parallel, CMS teams, reinforced by PH-DT group personnel, have worked to shield the cooling gauges for TOTEM and CASTOR against the magnetic stray field in the CMS Forward region, to add labels to almost all the valves underground and to clean all the filters in UXC55, USC55 and SCX5. Following the insertion of TOTEM T1 detector, the cooling circuit has been branched off and commissioned. The demineraliser cartridges have been replaced as well, as they were shown to be almost saturated. New instrumentation has been installed in the SCX5 PC farm cooling and ventilation network, in order to monitor the performance of the HVAC system...

  13. Trustworthy Critical Infrastructures via Physics-Aware Just-Ahead-Of-Time Verification

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    Dr. Saman Zonouz, assistant professor at Rutgers University, NJ and the director of the 4N6 Cyber Security and Forensics Laboratory is visiting CERN for a collaboration meeting. His previous works and research interests include PLC program analysis, security of embedded systems, and malware analysis and reverse engineering. Before the collaboration meeting, Dr. Zonouz is giving a 30-minutes-long talk, titled 'Trustworthy Critical Infrastructures via Physics-Aware Just-Ahead-Of-Time Verification', followed by Q&A and discussions. You can find the abstract of the talk below. The presentation is open to anyone interested, but please register on Indico to know the size of the room needed. (Please note the new room: 31/3-004, IT Auditorium.) Abstract Critical cyber-physical infrastructures, such as the power grid, integrate networks of computational and physical processes to provide the people across the globe with essential functionalities and services. Protecting these critical infrastructu...

  14. Enhancing Critical Thinking in a PBL Environment

    DEFF Research Database (Denmark)

    Guerra, Aida; Holgaard, Jette Egelund

    2016-01-01

    Engineering education accreditation bodies emphasize the need for competencies beyond technical expertise. Critical thinking is one of these competencies, which is also considered as a precursor for the development of other competencies such as multidisciplinary collaboration, problem......-solving skills and lifelong learning. There is an urgent need to enhance engineering students’ critical thinking and one way to do this is to make use of active, student-centred learning approaches such as Problem Based Learning (PBL). This study aims to provide a model for understanding and enhancing critical...... thinking in a PBL environment. The development of the model takes its point of departure from a conceptual model for critical thinking that is concretized in a PBL context by including theoretical as well as empirical perspectives. The empirical study was conducted at the Faculty of Engineering and Science...

  15. Supervisory Control and Data Acquisition (SCADA) Systems and Cyber-Security: Best Practices to Secure Critical Infrastructure

    Science.gov (United States)

    Morsey, Christopher

    2017-01-01

    In the critical infrastructure world, many critical infrastructure sectors use a Supervisory Control and Data Acquisition (SCADA) system. The sectors that use SCADA systems are the electric power, nuclear power and water. These systems are used to control, monitor and extract data from the systems that give us all the ability to light our homes…

  16. Enhancing Resilience Of Urban Ecosystems through Green Infrastructure (EnRoute): Progress report

    OpenAIRE

    ZULIAN GRAZIA; THIJSSEN MARTIJN; GUENTHER SUSANN; MAES JOACHIM

    2017-01-01

    EnRoute stands for Enhancing Resilience of urban ecosystems through green infrastructure. EnRoute is a project of the European Commission in the framework of the EU Biodiversity Strategy and the Green Infrastructure Strategy. EnRoute provides scientific knowledge of how urban ecosystems can support urban planning at different stages of policy and for various spatial scales and how to help policy-making for sustainable cities. It aims to promote the application of urban green infrastructur...

  17. A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

    Directory of Open Access Journals (Sweden)

    Faouzi Jaïdi

    2018-01-01

    Full Text Available Substantial advances in Information and Communication Technologies (ICT bring out novel concepts, solutions, trends, and challenges to integrate intelligent and autonomous systems in critical infrastructures. A new generation of ICT environments (such as smart cities, Internet of Things, edge-fog-social-cloud computing, and big data analytics is emerging; it has different applications to critical domains (such as transportation, communication, finance, commerce, and healthcare and different interconnections via multiple layers of public and private networks, forming a grid of critical cyberphysical infrastructures. Protecting sensitive and private data and services in critical infrastructures is, at the same time, a main objective and a great challenge for deploying secure systems. It essentially requires setting up trusted security policies. Unfortunately, security solutions should remain compliant and regularly updated to follow and track the evolution of security threats. To address this issue, we propose an advanced methodology for deploying and monitoring the compliance of trusted access control policies. Our proposal extends the traditional life cycle of access control policies with pertinent activities. It integrates formal and semiformal techniques allowing the specification, the verification, the implementation, the reverse-engineering, the validation, the risk assessment, and the optimization of access control policies. To automate and facilitate the practice of our methodology, we introduce our system SVIRVRO that allows managing the extended life cycle of access control policies. We refer to an illustrative example to highlight the relevance of our contributions.

  18. Protection of critical infrastructure using fiber optic sensors embedded in technical textiles

    Science.gov (United States)

    Krebber, Katerina; Lenke, Philipp; Liehr, Sascha; Noether, Nils; Wendt, Mario; Wosniok, Aleksander

    2010-04-01

    Terrorists and criminals more and more attack and destroy important infrastructures like routes, railways, bridges, tunnels, dikes and dams, important buildings. Therefore, reliable on-line and long-term monitoring systems are required to protect such critical infrastructures. Fiber optic sensors are well-suited for that. They can be installed over many kilometers and are able to measure continuously distributed strain, pressure, temperature and further mechanical and physical quantities. The very tiny optical fibers can be integrated into structures and materials and can provide information about any significant changes or damages of the structures. These so-called smart materials and smart structures are able to monitor itself or its environment. Particularly smart technical textiles with embedded fiber optic sensors have become very attractive because of their high importance for the structural health monitoring of geotechnical and masonry infrastructures. Such textiles are usually used for reinforcement of the structures; the embedded fiber optic sensors provide information about the condition of the structures and detect the presence of any damages and destructions in real time. Thus, critical infrastructures can be preventively protected. The paper will introduce this innovative field and will present the results achieved within several German and European projects.

  19. Safeguarding information intensive critical infrastructures against novel types of emerging failures

    Energy Technology Data Exchange (ETDEWEB)

    Balducelli, C. [ENEA-Italian National Agency for new Technology, Energy and the Environment Via Anguillasere 301, 00060 Rome (Italy)]. E-mail: claudio.balducelli@casaccia.enea.it; Bologna, S. [ENEA-Italian National Agency for new Technology, Energy and the Environment Via Anguillasere 301, 00060 Rome (Italy); Lavalle, L. [ENEA-Italian National Agency for new Technology, Energy and the Environment Via Anguillasere 301, 00060 Rome (Italy); Vicoli, G. [ENEA-Italian National Agency for new Technology, Energy and the Environment Via Anguillasere 301, 00060 Rome (Italy)

    2007-09-15

    The complexity of information intensive critical infrastructures, like electricity networks, telecommunication networks and public transportation networks is today augmented much more than in the past: such complexity augments the number of possible failures and anomalous working conditions and consequently decreases the survivability of the infrastructures. In this paper, the possibility is investigated to detect early anomalies and failures inside information intensive critical infrastructures by the introduction of anomaly detectors being 'self-aware' about the normal working conditions of the infrastructure itself. This approach has the objective to improve the performance of the most popular signature-based algorithms for intrusion detection, and makes use of different classes of time-oriented algorithms based on artificial intelligence paradigm. It has the advantage to work also in presence of unknown and unexpected types of attacks or failures. The tests, to evaluate the performance of the utilised detectors, are executed inside an emulated supervisory control and data acquisition (SCADA) system of an electrical power transmission grid, and a proposal for the future integration inside real SCADA systems is also reported.

  20. Safeguarding information intensive critical infrastructures against novel types of emerging failures

    International Nuclear Information System (INIS)

    Balducelli, C.; Bologna, S.; Lavalle, L.; Vicoli, G.

    2007-01-01

    The complexity of information intensive critical infrastructures, like electricity networks, telecommunication networks and public transportation networks is today augmented much more than in the past: such complexity augments the number of possible failures and anomalous working conditions and consequently decreases the survivability of the infrastructures. In this paper, the possibility is investigated to detect early anomalies and failures inside information intensive critical infrastructures by the introduction of anomaly detectors being 'self-aware' about the normal working conditions of the infrastructure itself. This approach has the objective to improve the performance of the most popular signature-based algorithms for intrusion detection, and makes use of different classes of time-oriented algorithms based on artificial intelligence paradigm. It has the advantage to work also in presence of unknown and unexpected types of attacks or failures. The tests, to evaluate the performance of the utilised detectors, are executed inside an emulated supervisory control and data acquisition (SCADA) system of an electrical power transmission grid, and a proposal for the future integration inside real SCADA systems is also reported

  1. Enhancing Critical Thinking: Accounting Students' Perceptions

    Science.gov (United States)

    Wilkin, Carla L.

    2017-01-01

    Purpose: The purpose of this paper is to demonstrate how assessment design was used to enhance students' critical thinking in a subject concerned with business enterprise systems. The study shows positive results and favorable perceptions of the merit of the approach. Design/Methodology/Approach: A case study approach was used to examine how the…

  2. A novel critical infrastructure resilience assessment approach using dynamic Bayesian networks

    Science.gov (United States)

    Cai, Baoping; Xie, Min; Liu, Yonghong; Liu, Yiliu; Ji, Renjie; Feng, Qiang

    2017-10-01

    The word resilience originally originates from the Latin word "resiliere", which means to "bounce back". The concept has been used in various fields, such as ecology, economics, psychology, and society, with different definitions. In the field of critical infrastructure, although some resilience metrics are proposed, they are totally different from each other, which are determined by the performances of the objects of evaluation. Here we bridge the gap by developing a universal critical infrastructure resilience metric from the perspective of reliability engineering. A dynamic Bayesian networks-based assessment approach is proposed to calculate the resilience value. A series, parallel and voting system is used to demonstrate the application of the developed resilience metric and assessment approach.

  3. Organizational Strategies for Critical Transportation Infrastructure: Characteristics of Urban Resilience. The Case of Montreal.

    Science.gov (United States)

    Beauregard, Stéphane; Therrien, Marie-Christine; Normandin, Julie-Maude

    2010-05-01

    Organizational Strategies for Critical Transportation Infrastructure: Characteristics of Urban Resilience. The Case of Montreal. Stéphane Beauregard M.Sc. Candidate École nationale d'administration publique Julie-Maude Normandin Ph.D. Candidate École nationale d'administration publique Marie-Christine Therrien Professor École nationale d'administration publique The proposed paper presents preliminary results on the resilience of organizations managing critical infrastructure in the Metropolitan Montreal area (Canada). A resilient city is characterized by a network of infrastructures and individuals capable of maintaining their activities in spite of a disturbance (Godschalk, 2002). Critical infrastructures provide essential services for the functioning of society. In a crisis situation, the interruption or a decrease in performance of critical infrastructures could have important impacts on the population. They are also vulnerable to accidents and cascading effects because on their complexity and tight interdependence (Perrow, 1984). For these reasons, protection and security of the essential assets and networks are one of the objectives of organizations and governments. But prevention and recovery are two endpoints of a continuum which include also intermediate concerns: ensuring organizational robustness or failing with elegance rather than catastrophically. This continuum also includes organizational resilience (or system), or the ability to recover quickly after an interruption has occurred. Wildavsky (1988) proposes that anticipation strategies work better against known problems while resilience strategies focus on unknown problems. Anticipation policies can unnecessarily immobilize investments against risks, while resilience strategies include the potential for a certain sacrifice in the interests of a more long-term survival and adaptation to changing threats. In addition, a too large confidence in anticipation strategies can bring loss of capacity of an

  4. METHODS OF MANAGING TRAFFIC DISTRIBUTION IN INFORMATION AND COMMUNICATION NETWORKS OF CRITICAL INFRASTRUCTURE SYSTEMS

    OpenAIRE

    Kosenko, Viktor; Persiyanova, Elena; Belotskyy, Oleksiy; Malyeyeva, Olga

    2017-01-01

    The subject matter of the article is information and communication networks (ICN) of critical infrastructure systems (CIS). The goal of the work is to create methods for managing the data flows and resources of the ICN of CIS to improve the efficiency of information processing. The following tasks were solved in the article: the data flow model of multi-level ICN structure was developed, the method of adaptive distribution of data flows was developed, the method of network resource assignment...

  5. Vulnerability assessment as a missing part of efficient regulatory emergency preparedness system for nuclear critical infrastructure

    International Nuclear Information System (INIS)

    Kostadinov, V.

    2007-01-01

    One introduces a new model to assess the vulnerability of the nuclear infrastructure critical facilities. The new procedure of the vulnerability assessment (the VA) aims to reevaluate the efficiency of the present-day safeguards. On the basis of deeper insight into the VA new strategy and of the elaborated procedure to analyze the hazards for the nuclear power facilities one recommends the key safeguards affecting the damage magnitude [ru

  6. Design of a Mobile Agent-Based Adaptive Communication Middleware for Federations of Critical Infrastructure Simulations

    Science.gov (United States)

    Görbil, Gökçe; Gelenbe, Erol

    The simulation of critical infrastructures (CI) can involve the use of diverse domain specific simulators that run on geographically distant sites. These diverse simulators must then be coordinated to run concurrently in order to evaluate the performance of critical infrastructures which influence each other, especially in emergency or resource-critical situations. We therefore describe the design of an adaptive communication middleware that provides reliable and real-time one-to-one and group communications for federations of CI simulators over a wide-area network (WAN). The proposed middleware is composed of mobile agent-based peer-to-peer (P2P) overlays, called virtual networks (VNets), to enable resilient, adaptive and real-time communications over unreliable and dynamic physical networks (PNets). The autonomous software agents comprising the communication middleware monitor their performance and the underlying PNet, and dynamically adapt the P2P overlay and migrate over the PNet in order to optimize communications according to the requirements of the federation and the current conditions of the PNet. Reliable communications is provided via redundancy within the communication middleware and intelligent migration of agents over the PNet. The proposed middleware integrates security methods in order to protect the communication infrastructure against attacks and provide privacy and anonymity to the participants of the federation. Experiments with an initial version of the communication middleware over a real-life networking testbed show that promising improvements can be obtained for unicast and group communications via the agent migration capability of our middleware.

  7. Flood Risk Assessment on Selected Critical Infrastructure in Kota Marudu Town, Sabah, Malaysia

    Directory of Open Access Journals (Sweden)

    Ayog Janice Lynn

    2017-01-01

    Full Text Available This study investigates the risk of flood on selected critical infrastructure in a flood-prone catchment in Sabah, Malaysia. Kota Marudu, located in the Bandau floodplain, one of the Sabah’s northern water catchments, was selected as the study site due to its frequent flood occurrence and large floodplain coverage. Two of its largest rivers, namely Sungai Bongon and Sungai Bandau, tends to flood during rainy season and cause temporary displacements of thousands of people living in the floodplain. A total of 362 respondents participated in the questionnaire survey in order to gather information on historical flood occurrence. Three flood depth groups were determined, which are 1 less than 0.3 meter, 2 0.3 – 0.6 meter and 3 more than 0.6 meter, while three categories of critical infrastructure were defined, namely transportation system, communication system and buildings. It is found that the transportation system encounters the most severe impact as flood inundation increases, where 92% of the respondents believe that the transportation access should be abandoned when flood depth is more than 0.6m. The findings of this study will be used for detailed risk assessment, specifically on the vulnerability of the critical infrastructures to flood in this floodplain.

  8. The strategy for the development of information society in Serbia by 2020: Information security and critical infrastructure

    Directory of Open Access Journals (Sweden)

    Danijela D. Protić

    2012-10-01

    Full Text Available The development of technology has changed the world economy and induced new political trends. The European Union (EU and many non-EU member states apply the strategies of information society development that raise the level of information security (IS. The Serbian Government (Government has adopted the Strategy for Information Society in Serbia by 2020 (Strategy, and pointed to the challenges for the development of a modern Serbian information society. This paper presents an overview of the open-ended questions about IS, critical infrastructures and protection of critical infrastructures. Based on publicly available data, some critical national infrastructures are listed. As a possible solution to the problem of IS, the Public Key Infrastructure (PKI-based Information security integrated information system (ISIIS is presented. The ISIIS provides modularity and interoperability of critical infrastructures both in Serbia and neighboring countries.

  9. Insurance and critical infrastructure protection : is there a connection in an environment of terrorism?

    International Nuclear Information System (INIS)

    Rowlands, D.; Devlin, R.A.

    2006-01-01

    This paper investigated the potential role of the insurance industry in enhancing the protection of critical energy infrastructure (CEI). This analysis was conducted in the context of increased concerns about deliberate acts of sabotage related to terrorist activities. A theoretical insurance market analysis was applied to a CEI scenario in order to examine the effects that insurance might have on the vulnerability of the system and subsequent remediation activities. Classical insurance market structures were examined, and problems associated with adverse selection, moral hazards and the role of government were identified. Issues concerning incentive effects induced by insurance were reviewed, as well as issues concerning the interdependence between different operators of the CEI system. An updated literature review was also provided. Results of the study suggested that corporate losses to CEI owners may be far less than the social cost of energy disruption, which in turn provides a reasonable rationale for government as opposed to private intervention. In terms of remediation, the immediate impact of a crippled CEI would overwhelm any private organization, and response would need to be coordinated through public structures. Terrorism insurance, while available, provides relatively large deductibles, as insurance companies are unwilling to accept the risks of moderate damage that may arise. There does not appear to be any evidence that private insurers will be able to provide significant relief from terrorist attacks, and it is unlikely that a private insurance market for terrorism will emerge. An absence of information regarding terrorist activities constrains both insurance purchasers from choosing the best mix of risk management tools, as well as insurance companies seeking to establish the appropriate pricing and conditions for different contracts. It was concluded that governments should support CEI firms in their own efforts to understand the threats; aid in

  10. The role of minimum supply and social vulnerability assessment for governing critical infrastructure failure: current gaps and future agenda

    Directory of Open Access Journals (Sweden)

    M. Garschagen

    2018-04-01

    Full Text Available Increased attention has lately been given to the resilience of critical infrastructure in the context of natural hazards and disasters. The major focus therein is on the sensitivity of critical infrastructure technologies and their management contingencies. However, strikingly little attention has been given to assessing and mitigating social vulnerabilities towards the failure of critical infrastructure and to the development, design and implementation of minimum supply standards in situations of major infrastructure failure. Addressing this gap and contributing to a more integrative perspective on critical infrastructure resilience is the objective of this paper. It asks which role social vulnerability assessments and minimum supply considerations can, should and do – or do not – play for the management and governance of critical infrastructure failure. In its first part, the paper provides a structured review on achievements and remaining gaps in the management of critical infrastructure and the understanding of social vulnerabilities towards disaster-related infrastructure failures. Special attention is given to the current state of minimum supply concepts with a regional focus on policies in Germany and the EU. In its second part, the paper then responds to the identified gaps by developing a heuristic model on the linkages of critical infrastructure management, social vulnerability and minimum supply. This framework helps to inform a vision of a future research agenda, which is presented in the paper's third part. Overall, the analysis suggests that the assessment of socially differentiated vulnerabilities towards critical infrastructure failure needs to be undertaken more stringently to inform the scientifically and politically difficult debate about minimum supply standards and the shared responsibilities for securing them.

  11. The role of minimum supply and social vulnerability assessment for governing critical infrastructure failure: current gaps and future agenda

    Science.gov (United States)

    Garschagen, Matthias; Sandholz, Simone

    2018-04-01

    Increased attention has lately been given to the resilience of critical infrastructure in the context of natural hazards and disasters. The major focus therein is on the sensitivity of critical infrastructure technologies and their management contingencies. However, strikingly little attention has been given to assessing and mitigating social vulnerabilities towards the failure of critical infrastructure and to the development, design and implementation of minimum supply standards in situations of major infrastructure failure. Addressing this gap and contributing to a more integrative perspective on critical infrastructure resilience is the objective of this paper. It asks which role social vulnerability assessments and minimum supply considerations can, should and do - or do not - play for the management and governance of critical infrastructure failure. In its first part, the paper provides a structured review on achievements and remaining gaps in the management of critical infrastructure and the understanding of social vulnerabilities towards disaster-related infrastructure failures. Special attention is given to the current state of minimum supply concepts with a regional focus on policies in Germany and the EU. In its second part, the paper then responds to the identified gaps by developing a heuristic model on the linkages of critical infrastructure management, social vulnerability and minimum supply. This framework helps to inform a vision of a future research agenda, which is presented in the paper's third part. Overall, the analysis suggests that the assessment of socially differentiated vulnerabilities towards critical infrastructure failure needs to be undertaken more stringently to inform the scientifically and politically difficult debate about minimum supply standards and the shared responsibilities for securing them.

  12. A reference model for model-based design of critical infrastructure protection systems

    Science.gov (United States)

    Shin, Young Don; Park, Cheol Young; Lee, Jae-Chon

    2015-05-01

    Today's war field environment is getting versatile as the activities of unconventional wars such as terrorist attacks and cyber-attacks have noticeably increased lately. The damage caused by such unconventional wars has also turned out to be serious particularly if targets are critical infrastructures that are constructed in support of banking and finance, transportation, power, information and communication, government, and so on. The critical infrastructures are usually interconnected to each other and thus are very vulnerable to attack. As such, to ensure the security of critical infrastructures is very important and thus the concept of critical infrastructure protection (CIP) has come. The program to realize the CIP at national level becomes the form of statute in each country. On the other hand, it is also needed to protect each individual critical infrastructure. The objective of this paper is to study on an effort to do so, which can be called the CIP system (CIPS). There could be a variety of ways to design CIPS's. Instead of considering the design of each individual CIPS, a reference model-based approach is taken in this paper. The reference model represents the design of all the CIPS's that have many design elements in common. In addition, the development of the reference model is also carried out using a variety of model diagrams. The modeling language used therein is the systems modeling language (SysML), which was developed and is managed by Object Management Group (OMG) and a de facto standard. Using SysML, the structure and operational concept of the reference model are designed to fulfil the goal of CIPS's, resulting in the block definition and activity diagrams. As a case study, the operational scenario of the nuclear power plant while being attacked by terrorists is studied using the reference model. The effectiveness of the results is also analyzed using multiple analysis models. It is thus expected that the approach taken here has some merits

  13. New developments enhancing MCNP for criticality safety

    International Nuclear Information System (INIS)

    Hendricks, J.S.; McKinney, G.W.; Forster, R.A.

    1993-01-01

    Since the early 80's MCNP has had three estimates of k eff : collision, absorption, and track length. MCNP has also had collision and absorption estimators of removal lifetime. These are calculated for every cycle and are averaged over the cycles as simple averages and covariance weighted averages. Correlation coefficients between estimators are also calculated. These criticality estimators are all in addition to the extensive summary information and tally edits used in shielding and other problems. A number of significant new developments have been made to enhance the MCNP Monte Carlo radiation transport code for criticality safety applications. These are available in the newly released MCNP4A version of the code

  14. Development of a structural health monitoring system for the life assessment of critical transportation infrastructure.

    Energy Technology Data Exchange (ETDEWEB)

    Roach, Dennis Patrick; Jauregui, David Villegas (New Mexico State University, Las Cruces, NM); Daumueller, Andrew Nicholas (New Mexico State University, Las Cruces, NM)

    2012-02-01

    Recent structural failures such as the I-35W Mississippi River Bridge in Minnesota have underscored the urgent need for improved methods and procedures for evaluating our aging transportation infrastructure. This research seeks to develop a basis for a Structural Health Monitoring (SHM) system to provide quantitative information related to the structural integrity of metallic structures to make appropriate management decisions and ensuring public safety. This research employs advanced structural analysis and nondestructive testing (NDT) methods for an accurate fatigue analysis. Metal railroad bridges in New Mexico will be the focus since many of these structures are over 100 years old and classified as fracture-critical. The term fracture-critical indicates that failure of a single component may result in complete collapse of the structure such as the one experienced by the I-35W Bridge. Failure may originate from sources such as loss of section due to corrosion or cracking caused by fatigue loading. Because standard inspection practice is primarily visual, these types of defects can go undetected due to oversight, lack of access to critical areas, or, in riveted members, hidden defects that are beneath fasteners or connection angles. Another issue is that it is difficult to determine the fatigue damage that a structure has experienced and the rate at which damage is accumulating due to uncertain history and load distribution in supporting members. A SHM system has several advantages that can overcome these limitations. SHM allows critical areas of the structure to be monitored more quantitatively under actual loading. The research needed to apply SHM to metallic structures was performed and a case study was carried out to show the potential of SHM-driven fatigue evaluation to assess the condition of critical transportation infrastructure and to guide inspectors to potential problem areas. This project combines the expertise in transportation infrastructure at New

  15. Online discussion: Enhancing students' critical thinking skills

    Science.gov (United States)

    Rathakrishnan, Mohan; Ahmad, Rahayu; Suan, Choo Ling

    2017-10-01

    Online discussion has become one of the important strategies for the teacher to teach the students to think critically when conveying their ideas and become more proactive and creative. In this paper, padlet online discussion communication was conducted to examine its effectiveness in enhancing critical thinking. In this study, there are two types of critical thinking: macro and micro critical thinking. A total of 70 Universiti Utara Malaysia Management Foundation Programme students involved in this experimental research design. The students in treatment class are divided to few groups. Every group uses padlet online discussion to discuss the topic given. All the group members discuss and write their ideas in padlet. Ideas that are posted in padlet will be displayed in front of the class so that the entire group in the treatment class could see the given ideas. Paul's (1993) model was used to analyze student's macro and micro critical thinking in padlet online discussion and communication. The finding shows that students who used padlet online discussion backchannel communication have greater macro and micro critical thinking level than students who do not use online discussion.

  16. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    Science.gov (United States)

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.

  17. Cyber Security Threats to Safety-Critical, Space-Based Infrastructures

    Science.gov (United States)

    Johnson, C. W.; Atencia Yepez, A.

    2012-01-01

    Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of security threats. The following pages focus on concerns associated with potential cyber-attacks. These are important because future attacks may invalidate many of the safety assumptions that support the provision of critical space-based services. These safety assumptions are based on standard forms of hazard analysis that ignore cyber-security considerations This is a significant limitation when, for instance, security attacks can simultaneously exploit multiple vulnerabilities in a manner that would never occur without a deliberate enemy seeking to damage space based systems and ground infrastructures. We address this concern through the development of a combined safety and security risk assessment methodology. The aim is to identify attack scenarios that justify the allocation of additional design resources so that safety barriers can be strengthened to increase our resilience against security threats.

  18. Critical current enhancement in high Tc superconductors

    International Nuclear Information System (INIS)

    Jin, S.; Graebner, J.E.; Tiefel, T.H.

    1990-01-01

    Progress toward major technological applications of the bulk, high T c superconductors has been hindered by two major barriers, i.e., the Josephson weak-links at grain boundaries and the lack of sufficient intragrain flux pinning. It has been demonstrated that the weak link problem can be overcome by extreme alignment of grains such as in melt-textured-growth (MTG) materials. Modified or improved processing by various laboratories has produced further increased critical currents. However, the insufficient flux pinning seems to limit the critical current density in high fields to about 10 4 --10 5 A/cm 2 at 77K, which is not satisfactory for many applications. In this paper, processing, microstructure, and critical current behavior of the MTG type superconductors are described, and various processing possibilities for flux pinning enhancement are discussed

  19. Concepts to Analyze the Vulnerability of Critical Infrastructures - Taking into account Cybernetics

    Directory of Open Access Journals (Sweden)

    Frédéric Petit

    2010-02-01

    Full Text Available Critical Infrastructures (CIs are complex systems. For their operations, these infrastructures are increasingly using Supervisory Control And Data Acquisition (SCADA systems. Management practices are therefore highly dependent on the cyber tools, but also on the data needed to make these tools work. Therefore, CIs are greatly vulnerable to degradation of data. In this context, this paper aims at presenting the fundamentals of a method for analyzing the vulnerabilities of CIs towards the use of cyber data. By characterizing cyber vulnerability of CIs, it will be possible to improve the resilience of these networks and to foster a proactive approach to risk management not only by considering cybernetics from a cyber-attack point of view but also by considering the consequences of the use of corrupted data.

  20. Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools

    International Nuclear Information System (INIS)

    Kroeger, Wolfgang

    2008-01-01

    Recent decades have witnessed on the one hand a much greater and tighter integration of goods or services supply systems and growing interconnectedness as well as changing organizational and operational factors, and on the other hand an increased social vulnerability in the face of accidental or intentional disruption. The work of the International Risk Governance Council (IRGC) in the field of critical infrastructures has focused on both the risks associated with five individual infrastructures and the issues associated with the increasing interdependence between them. This paper presents a selection of system weaknesses and a number of policy options that have been identified and highlights issues for further investigation and dialogue with stakeholders. Furthermore, the need to extend current modeling and simulation techniques in order to cope with the increasing system complexity is elaborated. An object-oriented, hybrid modeling approach promising to overcome some of the shortcomings of traditional methods is presented

  1. An Analysis of IT Governance Practices in the Federal Government: Protecting U.S. Critical Infrastructure from Cyber Terrorist Attacks

    Science.gov (United States)

    Johnson, R. LeWayne

    2012-01-01

    Much of the governing process in the United States (U.S.) today depends on a reliable and well protected public information technology (IT) infrastructure. The Department of Homeland Security (DHS) is tasked with the responsibility of protecting the country's IT infrastructure. Critics contend that the DHS has failed to address planning and…

  2. PROTECTING CRITICAL DATABASES – TOWARDS A RISK-BASED ASSESSMENT OF CRITICAL INFORMATION INFRASTRUCTURES (CIIS IN SOUTH AFRICA

    Directory of Open Access Journals (Sweden)

    Mzukisi N Njotini

    2013-04-01

    Full Text Available South Africa has made great strides towards protecting critical information infrastructures (CIIs. For example, South Africa recognises the significance of safeguarding places or areas that are essential to the national security of South Africa or the economic and social well-being of South African citizens. For this reason South Africa has established mechanisms to assist in preserving the integrity and security of CIIs. The measures provide inter alia for the identification of CIIs; the registration of the full names, address and contact details of the CII administrators (the persons who manage CIIs; the identification of the location(s of CIIs or their component parts; and the outlining of the general descriptions of information or data stored in CIIs.It is argued that the measures to protect CIIs in South Africa are inadequate. In particular, the measures rely on a one-size-fits-all approach to identify and classify CIIs. For this reason the South African measures are likely to lead to the adoption of a paradigm that considers every infrastructure, data or database, regardless of its significance or importance, to be key or critical.

  3. Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP) Attack: Critical National Infrastructures

    National Research Council Canada - National Science Library

    Foster, Jr., John S; Gjelde, Earl; Graham, William R; Hermann, Robert J; Kluepfel, Henry M; Lawson, Richard L; Soper, Gordon K; Wood, Lowell L; Woodard, Joan B

    2008-01-01

    ...) attack on our critical national infrastructures. An earlier report, Report of the Commission to Assess the Threat to the United States from Electromagnetic Pulse (EMP), Volume 1: Executive Report (2004...

  4. The ISTIMES project: a new integrated system for monitoring critical transport infrastructures interested by natural hazards

    Science.gov (United States)

    Proto, Monica; Massimo, Bavusi; Francesco, Soldovieri

    2010-05-01

    The research project "Integrated System for Transport Infrastructure surveillance and Monitoring by Electromagnetic Sensing" (ISTIMES), was approved in the 7th Framework Programme, in the Joint Call ICT and Security and started on 1st July 2009. The purpose of ISTIMES project is to design, assess and promote an ICT-based system, exploiting distributed and local sensors, for non-destructive electromagnetic monitoring in order to achieve the critical transport infrastructures more reliable and safe. The transportation sector's components are susceptible to the consequences of natural disasters and can also be attractive as terrorist targets. The sector's size, its physically dispersed and decentralized nature, the many public and private entities involved in its operations, the critical importance of cost considerations, and the inherent requirement of convenient accessibility to its services by all users - make the transportation particularly vulnerable to security and safety threats. As well known, the surface transportation system consists of interconnected infrastructures including highways, transit systems, railroads, airports, waterways, pipelines and ports, and the vehicles, aircraft, and vessels that operate along these networks. Thus, interdependencies exist between transportation and nearly every other sector of the economy and the effective operation of this system is essential to the European economic productivity; therefore, transportation sector protection is of paramount importance since threats to it may impact other industries that rely on it. The system exploits an open network architecture that can accommodate a wide range of sensors, static and mobile, and can be easily scaled up to allow the integration of additional sensors and interfacing with other networks. It relies on heterogeneous state-of-the-art electromagnetic sensors, enabling a self-organizing, self-healing, ad-hoc networking of terrestrial sensors, supported by specific satellite

  5. Reliability and vulnerability analyses of critical infrastructures: Comparing two approaches in the context of power systems

    International Nuclear Information System (INIS)

    Johansson, Jonas; Hassel, Henrik; Zio, Enrico

    2013-01-01

    Society depends on services provided by critical infrastructures, and hence it is important that they are reliable and robust. Two main approaches for gaining knowledge required for designing and improving critical infrastructures are reliability analysis and vulnerability analysis. The former analyses the ability of the system to perform its intended function; the latter analyses its inability to withstand strains and the effects of the consequent failures. The two approaches have similarities but also some differences with respect to what type of information they generate about the system. In this view, the main purpose of this paper is to discuss and contrast these approaches. To strengthen the discussion and exemplify its findings, a Monte Carlo-based reliability analysis and a vulnerability analysis are considered in their application to a relatively simple, but representative, system the IEEE RTS96 electric power test system. The exemplification reveals that reliability analysis provides a good picture of the system likely behaviour, but fails to capture a large portion of the high consequence scenarios, which are instead captured in the vulnerability analysis. Although these scenarios might be estimated to have small probabilities of occurrence, they should be identified, considered and treated cautiously, as probabilistic analyses should not be the only input to decision-making for the design and protection of critical infrastructures. The general conclusion that can be drawn from the findings of the example is that vulnerability analysis should be used to complement reliability studies, as well as other forms of probabilistic risk analysis. Measures should be sought for reducing both the vulnerability, i.e. improving the system ability to withstand strains and stresses, and the reliability, i.e. improving the likely behaviour

  6. Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems

    OpenAIRE

    Aaron Zimba; Zhaoshun Wang; Hongsong Chen

    2018-01-01

    The inevitable integration of critical infrastructure to public networks has exposed the underlying industrial control systems to various attack vectors. In this paper, we model multi-stage crypto ransomware attacks, which are today an emerging cyber threat to critical infrastructure. We evaluate our modeling approach using multi-stage attacks by the infamous WannaCry ransomware. The static malware analysis results uncover the techniques employed by the ransomware to discover vulnerable nodes...

  7. Raising the Bar on External Research Funding: Infrastructure and Strategies for Enhancing Faculty Productivity

    Science.gov (United States)

    Chval, Kathryn B.; Nossaman, Larry D.

    2014-01-01

    Administrators seek faculty who have the expertise to secure external funding to support their research agenda. Administrators also seek strategies to support and enhance faculty productivity across different ranks. In this manuscript, we describe the infrastructure we established and strategies we implemented to enhance the research enterprise at…

  8. The Ex Hoc Infrastructure - Enhancing Traffic Safety through LIfe WArning Systems

    DEFF Research Database (Denmark)

    Hansen, Klaus Marius; Kristensen, Lars Michael; Eskildsen, Toke

    2004-01-01

    New pervasive computing technologies for sensing and communication open up novel possibilities for enhancing traffic safety. We are currently designing and implementing the Ex Hoc infrastructure framework for communication among mobile and stationary units including vehicles. The infrastructure...... will connect sensing devices on vehicles with sensing devices on other vehicles and with stationary communication units placed alongside roads. The current application of Ex Hoc is to enable the collection and dissemination of information on road condition through LIfe Warning Systems (LIWAS) units....

  9. The Influence of State Policies on Critical Infrastructure Resilience: An Approach for Analyzing Transportation and Capital Investment

    Energy Technology Data Exchange (ETDEWEB)

    Wall, Thomas [Argonne National Lab. (ANL), Argonne, IL (United States); Trail, Jessica [Argonne National Lab. (ANL), Argonne, IL (United States); Gevondyan, Erna [Argonne National Lab. (ANL), Argonne, IL (United States); Phillips, Julia [Argonne National Lab. (ANL), Argonne, IL (United States); Ford, Janet [Argonne National Lab. (ANL), Argonne, IL (United States); Marks, James [Argonne National Lab. (ANL), Argonne, IL (United States)

    2017-09-01

    During times of crisis, communities and regions rely heavily on critical infrastructure systems to support their emergency management response and recovery activities. Therefore, the resilience of critical infrastructure systems to crises is a pivotal factor to a community’s overall resilience. Critical infrastructure resilience can be influenced by many factors, including State policies – which are not always uniform in their structure or application across the United States – were identified by the U.S. Department of Homeland Security as an area of particular interest with respect to their the influence on the resilience of critical infrastructure systems. This study focuses on developing an analytical methodology to assess links between policy and resilience, and applies that methodology to critical infrastructure in the Transportation Systems Sector. Specifically, this study seeks to identify potentially influential linkages between State transportation capital funding policies and the resilience of bridges located on roadways that are under the management of public agencies. This study yielded notable methodological outcomes, including the general capability of the analytical methodology to yield – in the case of some States – significant results connecting State policies with critical infrastructure resilience, with the suggestion that further refinement of the methodology may be beneficial.

  10. Critical Review of Technical Questions Facing Low Impact Development and Green Infrastructure: A Perspective from the Great Plains.

    Science.gov (United States)

    Vogel, Jason R; Moore, Trisha L; Coffman, Reid R; Rodie, Steven N; Hutchinson, Stacy L; McDonough, Kelsey R; McLemore, Alex J; McMaine, John T

    2015-09-01

    Since its inception, Low Impact Development (LID) has become part of urban stormwater management across the United States, marking progress in the gradual transition from centralized to distributed runoff management infrastructure. The ultimate goal of LID is full, cost-effective implementation to maximize watershed-scale ecosystem services and enhance resilience. To reach that goal in the Great Plains, the multi-disciplinary author team presents this critical review based on thirteen technical questions within the context of regional climate and socioeconomics across increasing complexities in scale and function. Although some progress has been made, much remains to be done including continued basic and applied research, development of local LID design specifications, local demonstrations, and identifying funding mechanisms for these solutions. Within the Great Plains and beyond, by addressing these technical questions within a local context, the goal of widespread acceptance of LID can be achieved, resulting in more effective and resilient stormwater management.

  11. Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis.

    Science.gov (United States)

    Wang, Hao; Lau, Nathan; Gerdes, Ryan M

    2018-04-01

    The aim of this study was to apply work domain analysis for cybersecurity assessment and design of supervisory control and data acquisition (SCADA) systems. Adoption of information and communication technology in cyberphysical systems (CPSs) for critical infrastructures enables automated and distributed control but introduces cybersecurity risk. Many CPSs employ SCADA industrial control systems that have become the target of cyberattacks, which inflict physical damage without use of force. Given that absolute security is not feasible for complex systems, cyberintrusions that introduce unanticipated events will occur; a proper response will in turn require human adaptive ability. Therefore, analysis techniques that can support security assessment and human factors engineering are invaluable for defending CPSs. We conducted work domain analysis using the abstraction hierarchy (AH) to model a generic SCADA implementation to identify the functional structures and means-ends relations. We then adopted a case study approach examining the Stuxnet cyberattack by developing and integrating AHs for the uranium enrichment process, SCADA implementation, and malware to investigate the interactions between the three aspects of cybersecurity in CPSs. The AHs for modeling a generic SCADA implementation and studying the Stuxnet cyberattack are useful for mapping attack vectors, identifying deficiencies in security processes and features, and evaluating proposed security solutions with respect to system objectives. Work domain analysis is an effective analytical method for studying cybersecurity of CPSs for critical infrastructures in a psychologically relevant manner. Work domain analysis should be applied to assess cybersecurity risk and inform engineering and user interface design.

  12. Critical health infrastructure for refugee resettlement in rural Australia: case study of four rural towns.

    Science.gov (United States)

    Sypek, Scott; Clugston, Gregory; Phillips, Christine

    2008-12-01

    To explore the reported impact of regional resettlement of refugees on rural health services, and identify critical health infrastructure for refugee resettlement. Comparative case study, using interviews and situational analysis. Four rural communities in New South Wales, which had been the focus of regional resettlement of refugees since 1999. Refugees, general practitioners, practice managers and volunteer support workers in each town (n = 24). The capacity of health care workers to provide comprehensive care is threatened by low numbers of practitioners, and high levels of turnover of health care staff, which results in attrition of specialised knowledge among health care workers treating refugees. Critical health infrastructure includes general practices with interest and surge capacity, subsidised dental services, mental health support services; clinical support services for rural practitioners; care coordination in the early settlement period; and a supported volunteer network. The need for intensive medical support is greatest in the early resettlement period for 'catch-up' primary health care. The difficulties experienced by rural Australia in securing equitable access to health services are amplified for refugees. While there are economic arguments about resettlement of refugees in regional Australia, the fragility of health services in regional Australia should also be factored into considerations about which towns are best suited to regional resettlement.

  13. Investing in soils as an infrastructure to maintain and enhance food water and carbon services

    Science.gov (United States)

    Davies, Jessica

    2017-04-01

    Soils are a life support system for global society and our planet. In addition to providing the vast majority of our food; soils regulate water quality and quantity reducing the risk of floods, droughts and pollution; and as the largest store of carbon in the earth system they are critical to climate change. By providing these multiple essential services, soils act a natural form of infrastructure that is critical to supporting both rural and urban communities and economies. Can natural infrastructure and natural capital concepts be used to motivate and enable investment and regulation of soils for purposes such as soil carbon sequestration? What scientific knowledge and tools would we need to support soil infrastructure decision making - in policy arenas and elsewhere? This poster will present progress from a new research project supported by the UK research council (EP/N030532/1) that addresses these questions.

  14. Will climate change increase the risk for critical infrastructure failures in Europe due to extreme precipitation?

    Science.gov (United States)

    Nissen, Katrin; Ulbrich, Uwe

    2016-04-01

    An event based detection algorithm for extreme precipitation is applied to a multi-model ensemble of regional climate model simulations. The algorithm determines extent, location, duration and severity of extreme precipitation events. We assume that precipitation in excess of the local present-day 10-year return value will potentially exceed the capacity of the drainage systems that protect critical infrastructure elements. This assumption is based on legislation for the design of drainage systems which is in place in many European countries. Thus, events exceeding the local 10-year return value are detected. In this study we distinguish between sub-daily events (3 hourly) with high precipitation intensities and long-duration events (1-3 days) with high precipitation amounts. The climate change simulations investigated here were conducted within the EURO-CORDEX framework and exhibit a horizontal resolution of approximately 12.5 km. The period between 1971-2100 forced with observed and scenario (RCP 8.5 and RCP 4.5) greenhouse gas concentrations was analysed. Examined are changes in event frequency, event duration and size. The simulations show an increase in the number of extreme precipitation events for the future climate period over most of the area, which is strongest in Northern Europe. Strength and statistical significance of the signal increase with increasing greenhouse gas concentrations. This work has been conducted within the EU project RAIN (Risk Analysis of Infrastructure Networks in response to extreme weather).

  15. Emergency preparedness and its enhancement in Japan: From perspectives of infrastructure preparation, and exercise enhancement

    International Nuclear Information System (INIS)

    Funahashi, T.

    2010-01-01

    The organizational structure, procedures and infrastructures for the nuclear emergency response were established in Japan in the aftermath of the JCO accident and have been improved through exercises, drills and training. This paper overviews the infrastructure for the emergency response prepared by JNES and exercises implemented or supported by JNES for nuclear emergency preparedness. Approaches to feeding back exercise results are also addressed. (author)

  16. Enhancing Trusted Cloud Computing Platform for Infrastructure as a Service

    Directory of Open Access Journals (Sweden)

    KIM, H.

    2017-02-01

    Full Text Available The characteristics of cloud computing including on-demand self-service, resource pooling, and rapid elasticity have made it grow in popularity. However, security concerns still obstruct widespread adoption of cloud computing in the industry. Especially, security risks related to virtual machine make cloud users worry about exposure of their private data in IaaS environment. In this paper, we propose an enhanced trusted cloud computing platform to provide confidentiality and integrity of the user's data and computation. The presented platform provides secure and efficient virtual machine management protocols not only to protect against eavesdropping and tampering during transfer but also to guarantee the virtual machine is hosted only on the trusted cloud nodes against inside attackers. The protocols utilize both symmetric key operations and public key operations together with efficient node authentication model, hence both the computational cost for cryptographic operations and the communication steps are significantly reduced. As a result, the simulation shows the performance of the proposed platform is approximately doubled compared to the previous platforms. The proposed platform eliminates cloud users' worry above by providing confidentiality and integrity of their private data with better performance, and thus it contributes to wider industry adoption of cloud computing.

  17. Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures.

    Energy Technology Data Exchange (ETDEWEB)

    Jaeger, Calvin Dell; Roehrig, Nathaniel S.; Torres, Teresa M.

    2008-12-01

    This document presents the security automated Risk Assessment Methodology (RAM) prototype tool developed by Sandia National Laboratories (SNL). This work leverages SNL's capabilities and skills in security risk analysis and the development of vulnerability assessment/risk assessment methodologies to develop an automated prototype security RAM tool for critical infrastructures (RAM-CITM). The prototype automated RAM tool provides a user-friendly, systematic, and comprehensive risk-based tool to assist CI sector and security professionals in assessing and managing security risk from malevolent threats. The current tool is structured on the basic RAM framework developed by SNL. It is envisioned that this prototype tool will be adapted to meet the requirements of different CI sectors and thereby provide additional capabilities.

  18. Monitoring and Control of Urban Critical Infrastructures: A Novel Approach to System Design and Data Fusion

    Directory of Open Access Journals (Sweden)

    Mario La Manna

    2015-02-01

    Full Text Available The monitoring and control of urban critical infrastructures consists of the protection of assets such as houses, offices, government and private buildings, with low cost, high quality and high dependability. In order to satisfy all these requirements at the same time, the control of a number of assets has to be performed by means of automated systems based on networks of heterogeneous sensors. This new concept idea is based on the use of unmanned operations at each of the many remote assets (each asset is monitored through a network of sensors and a man-in-the-loop automated control in a central site (Operational Center, which performs alarm detection and system management.

  19. Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security

    Science.gov (United States)

    Breiing, Marcus; Cole, Mara; D'Avanzo, John; Geiger, Gebhard; Goldner, Sascha; Kuhlmann, Andreas; Lorenz, Claudia; Papproth, Alf; Petzel, Erhard; Schwetje, Oliver

    This paper outlines the scientific goals, ongoing work and first results of the SiVe research project on critical infrastructure security. The methodology is generic while pilot studies are chosen from airport security. The outline proceeds in three major steps, (1) building a threat scenario, (2) development of simulation models as scenario refinements, and (3) assessment of alternatives. Advanced techniques of systems analysis and simulation are employed to model relevant airport structures and processes as well as offences. Computer experiments are carried out to compare and optimise alternative solutions. The optimality analyses draw on approaches to quantitative risk assessment recently developed in the operational sciences. To exploit the advantages of the various techniques, an integrated simulation workbench is build up in the project.

  20. Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems

    Directory of Open Access Journals (Sweden)

    Aaron Zimba

    2018-03-01

    Full Text Available The inevitable integration of critical infrastructure to public networks has exposed the underlying industrial control systems to various attack vectors. In this paper, we model multi-stage crypto ransomware attacks, which are today an emerging cyber threat to critical infrastructure. We evaluate our modeling approach using multi-stage attacks by the infamous WannaCry ransomware. The static malware analysis results uncover the techniques employed by the ransomware to discover vulnerable nodes in different SCADA and production subnets, and for the subsequent network propagation. Based on the uncovered artifacts, we recommend a cascaded network segmentation approach, which prioritizes the security of production network devices. Keywords: Critical infrastructure, Cyber-attack, Industrial control system, Crypto ransomware, Vulnerability

  1. Cyber Vulnerabilities Within Critical Infrastructure: The Flaws of Industrial Control Systems in the Oil and Gas Industry

    Science.gov (United States)

    Alpi, Danielle Marie

    The 16 sectors of critical infrastructure in the US are susceptible to cyber-attacks. Potential attacks come from internal and external threats. These attacks target the industrial control systems (ICS) of companies within critical infrastructure. Weakness in the energy sector's ICS, specifically the oil and gas industry, can result in economic and ecological disaster. The purpose of this study was to establish means for oil companies to identify and stop cyber-attacks specifically APT threats. This research reviewed current cyber vulnerabilities and ways in which a cyber-attack may be deterred. This research found that there are insecure devices within ICS that are not regularly updated. Therefore, security issues have amassed. Safety procedures and training thereof are often neglected. Jurisdiction is unclear in regard to critical infrastructure. The recommendations this research offers are further examination of information sharing methods, development of analytic platforms, and better methods for the implementation of defense-in-depth security measures.

  2. Funding models for financing water infrastructure in South Africa: framework and critical analysis of alternatives

    CSIR Research Space (South Africa)

    Ruiters, C

    2013-04-01

    Full Text Available by putting in place new institutional structures and funding models for effective strategies leading to prompt water infrastructure provision. The research identified several funding models for financing water infrastructure development projects. The existing...

  3. Building Critical Infrastructure resilience capacities into the Emergency Management set-up: a reference framework

    DEFF Research Database (Denmark)

    Trucco, P.; Petrenj, B.; Kozine, Igor

    proposes a comprehensive framework to identify, build and enhance specific capabilities, both intra- and inter-organisational, needed to manage (prepare, cope and recover from) CI disruptions. This allows emergency services to assess and explicitly address resilience improvement measures while planning......, resources and processes specifically arranged to accomplish a critical task and assure a key objective. Each capability contributes to one or more resilience capacities (preventive, absorptive, adaptive and restorative). An overall resilience capability building cycle completes the framework, enabling...... a systematic implementation of relevant capabilities and making gap analysis with regard to resilience deficits. The planning of training exercises to enhance CI resilience can also benefit from the approach....

  4. Unraveling Structural Infrasound: understanding the science for persistent remote monitoring of critical infrastructure (Invited)

    Science.gov (United States)

    McKenna, S. M.; Diaz-Alvarez, H.; McComas, S.; Costley, D.; Whitlow, R. D.; Jordan, A. M.; Taylor, O.

    2013-12-01

    In 2006, the Engineer Research and Development Center (ERDC) began a program designed to meet the capability gap associated with remote assessment of critical infrastructure. This program addresses issues arising from the use of geophysical techniques to solve engineering problems through persistent monitoring of critical infrastructure using infrasound. In the original 2006-2009 study of a railroad bridge in Ft. Leonard Wood, MO, the fundamental modes of motion of the structure were detected at up to 30 km away, with atmospheric excitation deemed to be the source driver. Follow-on research focused on the mechanically driven modes excited by traffic, with directional acoustic emanations. The success of the Ft. Wood ambient excitation study resulted in several subsequent programs to push the boundaries of this new technique for standoff assessment, discussed herein. Detection of scour and river system health monitoring are serious problems for monitoring civil infrastructure, from both civilian and military perspectives. Knowledge of overall system behavior over time is crucial for assessment of bridge foundations and barge navigation. This research focuses on the same steel-truss bridge from the Ft. Wood study, and analyzes 3D and 2D substructure models coupled with the superstructure reaction loads to assess the modal deformations within the infrasound bandwidth and the correlation to scour of embedment material. The Urban infrasound program is infrasound modeling, data analysis, and sensor research leading to the detection, classification and localization of threat activities in complex propagation environments. Three seismo-acoustic arrays were deployed on rooftops across the Southern Methodist University campus in Dallas, Texas, to characterize the urban infrasound environment. Structural sources within 15 km of the arrays have been identified through signal processing and confirmed through acoustical models. Infrasound is also being studied as a means of

  5. System for critical infrastructure security based on multispectral observation-detection module

    Science.gov (United States)

    Trzaskawka, Piotr; Kastek, Mariusz; Życzkowski, Marek; Dulski, Rafał; Szustakowski, Mieczysław; Ciurapiński, Wiesław; Bareła, Jarosław

    2013-10-01

    Recent terrorist attacks and possibilities of such actions in future have forced to develop security systems for critical infrastructures that embrace sensors technologies and technical organization of systems. The used till now perimeter protection of stationary objects, based on construction of a ring with two-zone fencing, visual cameras with illumination are efficiently displaced by the systems of the multisensor technology that consists of: visible technology - day/night cameras registering optical contrast of a scene, thermal technology - cheap bolometric cameras recording thermal contrast of a scene and active ground radars - microwave and millimetre wavelengths that record and detect reflected radiation. Merging of these three different technologies into one system requires methodology for selection of technical conditions of installation and parameters of sensors. This procedure enables us to construct a system with correlated range, resolution, field of view and object identification. Important technical problem connected with the multispectral system is its software, which helps couple the radar with the cameras. This software can be used for automatic focusing of cameras, automatic guiding cameras to an object detected by the radar, tracking of the object and localization of the object on the digital map as well as target identification and alerting. Based on "plug and play" architecture, this system provides unmatched flexibility and simplistic integration of sensors and devices in TCP/IP networks. Using a graphical user interface it is possible to control sensors and monitor streaming video and other data over the network, visualize the results of data fusion process and obtain detailed information about detected intruders over a digital map. System provide high-level applications and operator workload reduction with features such as sensor to sensor cueing from detection devices, automatic e-mail notification and alarm triggering. The paper presents

  6. Landslides affecting critical infrastructures: the use of a GB-InSAR based warning system in Calatabiano (Southern Italy).

    Science.gov (United States)

    Nolesini, Teresa; Frodella, William; Bardi, Federica; Intrieri, Emanuele; Carlà, Tommaso; Solari, Lorenzo; Dotta, Giulia; Ferrigno, Federica; Casagli, Nicola

    2017-04-01

    Landslides represent one of the most frequent geo-hazard, not only causing a serious threat to human lives, but also determining socio-economic losses, countable in billions of Euros and expressed in terms of damage to property, infrastructures and environmental degradation. Recent events show a significant increase in the number of disasters with natural and/or technological causes, which could have potentially serious consequences for Critical Infrastructures (CI). Where these infrastructures tend to fail or to be destroyed, the resulting cascade effect (chain of accidents) could lead to catastrophic damage and affect people, the environment and the economy. In the field of landslide detection, mapping, monitoring and management, the availability of advanced remote sensing technologies, which allow systematic and easily updatable acquisitions of data, may enhance the implementation of near real time monitoring activity and the production of landslide maps, optimizing field work. This work aims at presenting an example of the advantages given by the combined use of advanced remote sensing techniques, such as Ground-Based Interferometric Synthetic Aperture Radar (GB-InSAR), Terrestrial Laser Scanning (TLS) and Infrared Thermography (IRT), in order to monitor and map the Calatabiano landslide, located in the Catania Province (Sicily Island, Southern Italy). The landslide occurred on October 24th 2015, after a period of heavy rainfall, causing the rupture of a water pipeline transect of the aqueduct supplying water to the city of Messina. As a consequence of this event a considerable lack in water resources occurred for a large number of the city inhabitants. A provisional by-pass, consisting of three 350 m long pipes passing through the landslide area, was implemented in order to restore the city water supplies during the emergency management phase. In this framework an integrated monitoring network was implemented, in order to assess the residual risk by analyzing

  7. Natural disaster risk analysis for critical infrastructure systems: An approach based on statistical learning theory

    International Nuclear Information System (INIS)

    Guikema, Seth D.

    2009-01-01

    Probabilistic risk analysis has historically been developed for situations in which measured data about the overall reliability of a system are limited and expert knowledge is the best source of information available. There continue to be a number of important problem areas characterized by a lack of hard data. However, in other important problem areas the emergence of information technology has transformed the situation from one characterized by little data to one characterized by data overabundance. Natural disaster risk assessments for events impacting large-scale, critical infrastructure systems such as electric power distribution systems, transportation systems, water supply systems, and natural gas supply systems are important examples of problems characterized by data overabundance. There are often substantial amounts of information collected and archived about the behavior of these systems over time. Yet it can be difficult to effectively utilize these large data sets for risk assessment. Using this information for estimating the probability or consequences of system failure requires a different approach and analysis paradigm than risk analysis for data-poor systems does. Statistical learning theory, a diverse set of methods designed to draw inferences from large, complex data sets, can provide a basis for risk analysis for data-rich systems. This paper provides an overview of statistical learning theory methods and discusses their potential for greater use in risk analysis

  8. The Resource Hazards Model for the Critical Infrastructure of the State Emergency Management Process

    Directory of Open Access Journals (Sweden)

    Ostrowska Teresa

    2014-08-01

    Full Text Available This paper presents an investigation of the relevant factors related to the construction of a resource model which is designed to be useful in the management processes of the operation of critical infrastructure (CI for state emergencies. The genesis of the research lay in the perceived need for effective protection of multidimensional CI methodologies, and it was influenced by the nature of the physical characteristics of the available resources. It was necessary to establish a clear structure and well defined objectives and to assess the functional and structural resources required, as well as the potential relational susceptibilities deriving from a number of possible threats and the possible seriousness of a specific range of incidents and their possible consequences. The interdependence of CI stocks is shown by the use of tables of resource classes. The dynamics of the interaction of CI resources are modeled by examining how using clusters of potential risks can at any given time create a class of compounds related to susceptibilities and threats to the resources. As a result, the model can be used to conduct multi-dimensional risk calculations for crisis management CI resource configurations.

  9. THE SECURITY OF CRITICAL ENERGY INFRASTRUCTURE IN THE AGE OF MULTIPLE ATTACK VECTORS: NATO’S MULTI-FACETED APPROACH

    Directory of Open Access Journals (Sweden)

    Sorin Dumitru Ducaru

    2017-06-01

    Full Text Available The current NATO threat landscape is characterized by a combination or “hybrid blend” of unconventional emerging challenges (like cyber and terrorist attacks and re-emerging conventional ones (like Russia’s recent military resurgence and assertiveness, that led to the illegal annexation of Crimea and destabilization in Eastern Ukraine. While the resurgence of the Russian military activity pushed the Alliance in the direction of re-discovering its deterrence and collective defence role, the new, not-traditional, trans-national and essentially non-military treats that generate effects below the threshold of an armed attack require a new paradigm shift with a focus on resilience although the protection of critical energy infrastructure is first and foremost a national responsibility, NATO can contribute to meeting the infrastructure protection challenge on many levels. Given the fact that its core deterrence and defence mandate relies in a great measure on the security of Allies’ energy infrastructure NATO’s role and actions in reducing the vulnerabilities and strengthening the resilience of such infrastructure can only increase. A multi-faceted, multi-stakeholder and networked approach is needed to be able to strengthen defences and resilience of critical infrastructure such as energy. Understanding and defending against cyber or terrorist threat vectors, increased situational awareness, education, training, exercises, trusted partnerships as well as increasing strategic security dialogue and cooperation are key for such a comprehensive/network approach to the challenge.

  10. Water: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    Science.gov (United States)

    2007-05-01

    National Association of Clean Water Agencies Shelly Foston Meridian Institute Michael Gritzuk Pima County (AZ) Wastewater Management Department Genevieve...agencies to assist small and medium systems, and it has helped fund and develop a variety of Web casts and security trainings. Although drinking water...warning systems and consequence man - agement planning. • Water Laboratory Alliance (WLA). EPA will fulfill its requirement under HSPD-9 to enhance the

  11. 802.11 Wireless Infrastructure To Enhance Medical Response to Disasters

    Science.gov (United States)

    Arisoylu, Mustafa; Mishra, Rajesh; Rao, Ramesh; Lenert, Leslie A.

    2005-01-01

    802.11 (WiFi) is a well established network communications protocol that has wide applicability in civil infrastructure. This paper describes research that explores the design of 802.11 networks enhanced to support data communications in disaster environments. The focus of these efforts is to create network infrastructure to support operations by Metropolitan Medical Response System (MMRS) units and Federally-sponsored regional teams that respond to mass casualty events caused by a terrorist attack with chemical, biological, nuclear or radiological weapons or by a hazardous materials spill. In this paper, we describe an advanced WiFi-based network architecture designed to meet the needs of MMRS operations. This architecture combines a Wireless Distribution Systems for peer-to-peer multihop connectivity between access points with flexible and shared access to multiple cellular backhauls for robust connectivity to the Internet. The architecture offers a high bandwidth data communications infrastructure that can penetrate into buildings and structures while also supporting commercial off-the-shelf end-user equipment such as PDAs. It is self-configuring and is self-healing in the event of a loss of a portion of the infrastructure. Testing of prototype units is ongoing. PMID:16778990

  12. A Conceptual Framework for Vulnerability Assessment of Climate Change Impact on Critical Oil and Gas Infrastructure in the Niger Delta

    Directory of Open Access Journals (Sweden)

    Justin Udie

    2018-02-01

    Full Text Available The impact of climate change on the Niger Delta is severe, as extreme weather events have inflicted various degrees of stress on critical oil/gas infrastructure. Typically, assets managers and government agencies lack a clear framework for evaluating the vulnerability of these systems. This paper presents a participatory framework for the vulnerability assessment of critical oil/gas infrastructure to climate change impacts in the Niger Delta context. Through a critical review of relevant literature and triangulating observational and exploratory data from the field, this paper has developed a conceptual framework with three elements: (1 a preliminary scoping activity; (2 the vulnerability assessment; and (3 mainstreaming the results into institutional asset management codes. Scoping involves the definition of research aims and objectives, review of prevailing climate burdens and impacts, exploratory investigation, screening for new (planned assets and selection of relevant infrastructure. The emphasis on screening for planned infrastructure is to facilitate the incorporation of sustainable adaptive capacities into the original design of identified systems. A conceptual framework for vulnerability assessment is presented as a robust systematic iterative model for the evaluation of selected assets using an appropriate methodology. In this study, analytic hierarchy process (AHP is applied while mainstreaming as part of the research framework is emphasised to aid commercial implementation from an expert-based perspective. The study recommends the use of other suitable methodologies and systematic approaches to test the flexibility of the framework.

  13. Quantitative physical models of volcanic phenomena for hazards assessment of critical infrastructures

    Science.gov (United States)

    Costa, Antonio

    2016-04-01

    Volcanic hazards may have destructive effects on economy, transport, and natural environments at both local and regional scale. Hazardous phenomena include pyroclastic density currents, tephra fall, gas emissions, lava flows, debris flows and avalanches, and lahars. Volcanic hazards assessment is based on available information to characterize potential volcanic sources in the region of interest and to determine whether specific volcanic phenomena might reach a given site. Volcanic hazards assessment is focussed on estimating the distances that volcanic phenomena could travel from potential sources and their intensity at the considered site. Epistemic and aleatory uncertainties strongly affect the resulting hazards assessment. Within the context of critical infrastructures, volcanic eruptions are rare natural events that can create severe hazards. In addition to being rare events, evidence of many past volcanic eruptions is poorly preserved in the geologic record. The models used for describing the impact of volcanic phenomena generally represent a range of model complexities, from simplified physics based conceptual models to highly coupled thermo fluid dynamical approaches. Modelling approaches represent a hierarchy of complexity, which reflects increasing requirements for well characterized data in order to produce a broader range of output information. In selecting models for the hazard analysis related to a specific phenomenon, questions that need to be answered by the models must be carefully considered. Independently of the model, the final hazards assessment strongly depends on input derived from detailed volcanological investigations, such as mapping and stratigraphic correlations. For each phenomenon, an overview of currently available approaches for the evaluation of future hazards will be presented with the aim to provide a foundation for future work in developing an international consensus on volcanic hazards assessment methods.

  14. Interconnectedness and interdependencies of critical infrastructures in the US economy: Implications for resilience

    Science.gov (United States)

    Chopra, Shauhrat S.; Khanna, Vikas

    2015-10-01

    Natural disasters in 2011 yielded close to 55 billion in economic damages alone in the United States (US), which highlights the need to reduce impacts of such disasters or other deliberate attacks. The US Department of Homeland Security (DHS) identifies a list of 16 Critical Infrastructure Sectors (CIS) whose incapacity due to disruptions would have a debilitating impact on the nation's economy. The goal of this work is to understand the implications of interdependencies among CIS on the resilience of the US economic system as a whole. We develop a framework that combines the empirical economic input-output (EIO) model with graph theory based techniques for understanding interdependencies, interconnectedness and resilience in the US economic system. By representing the US economy as a network, we are able to analyze its topology by separately looking at its unweighted and weighted forms. Topological analysis of the US EIO network suggests that it exhibits small world properties for the unweighted case, and in the weighted case, the throughput of industry sectors follows a power-law with an exponential cutoff. Implications of these topological properties are discussed in the paper. We also simulate hypothetical disruptions on CIS in order to identify industrial sectors that experience the largest economic impacts, and to quantify systemic vulnerability in economic terms. In addition, insights from community detection and hypothetical disruption scenarios help assess vulnerability of individual industrial communities to disruptions on individual CIS. These methodologies also provide insights regarding the extent of coupling between each CIS in the US EIO network. Based on our analysis, we observe that excessive interconnectedness and interdependencies of CIS results in high systemic vulnerability. This information can guide policymakers to design policies that improve resilience of economic networks, and evaluate policies that might indirectly increase coupling

  15. The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures

    International Nuclear Information System (INIS)

    Eusgeld, Irene; Kroeger, Wolfgang; Sansavini, Giovanni; Schlaepfer, Markus; Zio, Enrico

    2009-01-01

    A framework for the analysis of the vulnerability of critical infrastructures has been proposed by some of the authors. The framework basically consists of two successive stages: (i) a screening analysis for identifying the parts of the critical infrastructure most relevant with respect to its vulnerability and (ii) a detailed modeling of the operational dynamics of the identified parts for gaining insights on the causes and mechanisms responsible for the vulnerability. In this paper, a critical presentation is offered of the results of a set of investigations aimed at evaluating the potentials of (i) using network analysis based on measures of topological interconnection and reliability efficiency, for the screening task; (ii) using object-oriented modeling as the simulation framework to capture the detailed dynamics of the operational scenarios involving the most vulnerable parts of the critical infrastructure as identified by the preceding network analysis. A case study based on the Swiss high-voltage transmission system is considered. The results are cross-compared and evaluated; the needs of further research are defined

  16. A GIS Inventory of Critical Coastal Infrastructure Land Use in Caribbean Island Small Island Developing States: Classification and Criteria Methodology

    Science.gov (United States)

    D'aversa, N.; Becker, A.; Bove, G.

    2017-12-01

    Caribbean Small Island Developing States (SIDS) face significant natural hazard risks, as demonstrated by recent Hurricanes Jose, Irma, and Maria. Scientists project storms to become more intense and sea level rise to increase over the next century. As a result, the Inter-American Development Bank projections suggest that Caribbean nations could face climate-related losses in excess of $22 billion annually by 2050. Critical infrastructure that supports island economies, such as airports, seaports, cruise ports, and energy facilities, are typically located in the coastal zone with high exposure to natural hazards. Despite the increasing danger from climate driven natural hazards in coastal zones in the region, there is very little data available to identify how much land and associated infrastructure is at risk. This work focuses on the criteria and data standards developed for this new region-wide GIS database, which will then be used to formulate a risk assessment. Results will be integrated into a single, comprehensive source for data of lands identified as critical coastal infrastructure and used to address such questions as: How much of the Caribbean SIDS infrastructure lands are at risk from sea level rise? How might demand for such lands change in the future, based on historical trends? Answers to these questions will help decision makers understand how to prioritize resilience investment decisions in the coming decades.

  17. Center for Strategic Leadership. Issue Paper, August 2003, Volume 06-03. The National Infrastructure Simulation and Analysis Center (NISAC): A New Contributor to Strategic Leader Education and Formulation of Critical Infrastructure Policies and Decisions

    National Research Council Canada - National Science Library

    Wimbish, William

    2003-01-01

    ...) community in educating future strategic leaders about the realities of the Nation's infrastructure system and in researching the effects that new government security policies and actions would have on the nation's critical assets and public and private sector services.

  18. TECHNOLOGIES TO ENHANCE THE OPERATION OF EXISTING NATURAL GAS COMPESSION INFRASTRUCTURE

    Energy Technology Data Exchange (ETDEWEB)

    Anthony J. Smalley; Ralph E. Harris; Gary D. Bourn; Danny M. Deffenbaugh

    2006-01-24

    This quarterly report documents work performed under Tasks 15, 16, and 18 through 23 of the project entitled: ''Technologies to Enhance the Operation of Existing Natural Gas Compression Infrastructure''. The project objective is to develop and substantiate methods for operating integral engine/compressors in gas pipeline service, which reduce fuel consumption, increase capacity, and enhance mechanical integrity. The report presents results of design analysis performed on the TCVC10 engine/compressor installed at Dominion's Groveport Compressor Station to develop options and guide decisions for reducing pulsations and enhancing compressor system efficiency and capacity. The report further presents progress on modifying and testing the laboratory GMVH6 at SwRI for correcting air imbalance.

  19. TECHNOLOGIES TO ENHANCE THE OPERATION OF EXISTING NATURAL GAS COMPRESSION INFRASTRUCTURE

    Energy Technology Data Exchange (ETDEWEB)

    Anthony J. Smalley; Ralph E. Harris; Gary D. Bourn; Danny M. Deffenbaugh

    2005-10-27

    This quarterly report documents work performed under Tasks 15, 16, and 18 through 23 of the project entitled: ''Technologies to Enhance the Operation of Existing Natural Gas Compression Infrastructure''. The project objective is to develop and substantiate methods for operating integral engine/compressors in gas pipeline service, which reduce fuel consumption, increase capacity, and enhance mechanical integrity. The report first summarizes key results from survey site tests performed on an HBA-6 installed at Duke Energy's Bedford compressor station, and on a TCVC10 engine/compressor installed at Dominion's Groveport Compressor Station. The report then presents results of design analysis performed on the Bedford HBA-6 to develop options and guide decisions for reducing pulsations and enhancing compressor system efficiency and capacity. The report further presents progress on modifying and testing the laboratory GMVH6 at SwRI for correcting air imbalance.

  20. Understanding and enhancing future infrastructure resiliency: a socio-ecological approach.

    Science.gov (United States)

    Sage, Daniel; Sircar, Indraneel; Dainty, Andrew; Fussey, Pete; Goodier, Chris

    2015-07-01

    The resilience of any system, human or natural, centres on its capacity to adapt its structure, but not necessarily its function, to a new configuration in response to long-term socio-ecological change. In the long term, therefore, enhancing resilience involves more than simply improving a system's ability to resist an immediate threat or to recover to a stable past state. However, despite the prevalence of adaptive notions of resilience in academic discourse, it is apparent that infrastructure planners and policies largely continue to struggle to comprehend longer-term system adaptation in their understanding of resilience. Instead, a short-term, stable system (STSS) perspective on resilience is prevalent. This paper seeks to identify and problematise this perspective, presenting research based on the development of a heuristic 'scenario-episode' tool to address, and challenge, it in the context of United Kingdom infrastructure resilience. The aim is to help resilience practitioners to understand better the capacities of future infrastructure systems to respond to natural, malicious threats. © 2015 The Author(s). Disasters © Overseas Development Institute, 2015.

  1. Freight railway transport: Critical variables to improve the transport applied to infrastructure costs and its associated traffic flow

    Energy Technology Data Exchange (ETDEWEB)

    Zakowska, L.; Pulawska-Obiedowska, S.

    2016-07-01

    The developed societies have as challenge, among others, to achieve a mobility development based on economic models of low carbon and energy efficient, making it accessible to the entire population. In this context, the sustainable mobility seems to meet the economic, social and environmental needs, minimizing their negative impact. There are three factors that are relevant: (1) infrastructures; (2) modes of transport more ecological and safe, and (3) operations and services for passengers and freights.The objective of this research is to provide guidance to investment in sustainable transport infrastructures that are truly useful and effective. In particular we have studied the case of the railway, using the following information: details of the infrastructure; cost of construction (per kilometre); maintenance cost, and life cycle. This information may be relevant to consider their possible business models.The methodology of this research was focused in the detailed analysis of the infrastructure use and maintenance criteria, the market opportunities for freight development and the available data to validate the obtained results from the software tool reached in this work. Our research includes the different following aspects:• Evaluation of the supported traffic by the rail line.• Relevant items to be considered in the rail infrastructure. Defining the track, we can group items in two sets: civil and rail installations.• Rolling stock available. Locomotives and wagons are modelled to introduce the data as convenience for the user.Besides our research includes the development of software, Decision System Tool (DST), for studying the construction and maintenance cost of railway infrastructure. It is developed in a common and open source program, providing the user the interaction with the critical variable of the line. It has been adjusted using the following references: MOM PlanCargorail; EcoTransIT, and Projects funded by Framework Program of EU (New

  2. Advanced methodology for risk and vulnerability assessment of interdependency of critical infrastructure in respect to urban floods

    Directory of Open Access Journals (Sweden)

    Serre Damien

    2016-01-01

    Full Text Available The behaviour of the urban network infrastructures, and their interactions during flood events, will have direct and indirect consequences on the flood risk level in the built environment. By urban network infrastructures we include all the urban technical networks like transportation, energy, water supply, waste water, telecommunication…able to spread the flood risk in cities, qualified as critical infrastructures due to their major roles for modern living standards. From history, most of cities in the world have been built close to coast lines or to river to beneficiate this means of communication and trade. Step by step, to avoid being flooded, defences like levees have been built. The capacity of the levees to retain the floods depends on their conditions, their performance level and the capacity of the authorities to well maintain these infrastructures. But recent history shows the limits of a flood risk management strategy focused on protection, leading to levee breaks these last decades. Then, in case of levee break, cities will be flooded. The urban technical networks, due to the way they have been designed, their conditions and their locations in the city, will play a major role in the diffusion of the flood extent. Also, the flood risk will have consequences in some not flooded neighbourhoods due to networks collapses and complex interdependencies. This article describes some methods to design spatial decision support systems in that context.

  3. TECHNOLOGIES TO ENHANCE THE OPERATION OF EXISTING NATURAL GAS COMPRESSION INFRASTRUCTURE

    Energy Technology Data Exchange (ETDEWEB)

    Anthony J. Smalley; Ralph E. Harris; Gary D. Bourn; Danny M. Deffenbaugh

    2005-07-27

    This quarterly report documents work performed under Tasks 15, 16, and 18 through 23 of the project entitled: ''Technologies to Enhance the Operation of Existing Natural Gas Compression Infrastructure''. The project objective is to develop and substantiate methods for operating integral engine/compressors in gas pipeline service, which reduce fuel consumption, increase capacity, and enhance mechanical integrity. The report first documents a survey site test performed on a TCVC10 engine/compressor installed at Dominion's Groveport Compressor Station. This test completes planned screening efforts designed to guide selection of one or more units for design analysis and testing with emphasis on identification and reduction of compressor losses. The report further presents the validation of the simulation model for the Air Balance tasks and outline of conceptual manifold designs.

  4. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Science.gov (United States)

    2010-01-01

    ... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE..., and consistent with the Act, for Automated Information Systems that contain PCII. Such security requirements will be in conformance with the information technology security requirements in the Federal...

  5. 77 FR 37060 - Critical Infrastructure and Key Resources (CIKR) Asset Protection Technical Assistance Program...

    Science.gov (United States)

    2012-06-20

    .../IP/IICD, 245 Murray Lane SW., Mailstop 0602, Arlington, VA 20598-0602. Email requests should go to...), National Protection and Programs Directorate (NPPD), Office of Infrastructure Protection (IP... the following methods: Federal eRulemaking Portal: http://www.regulations.gov . Email: Include the...

  6. U.S. National Cyberstrategy and Critical Infrastructure: The Protection Mandate and Its Execution

    Science.gov (United States)

    2013-09-01

    revising this thesis, and balancing the coordination needed for: (1) Piano; (2) Soccer /Baseball; (3) Cubmaster Cub Scout Pack-135; (4) Hospitality...disease and pest response; and provides nutritional assistance. Provides the financial infrastructure of the nation. This sector consists of commercial

  7. Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures.

    Science.gov (United States)

    Johnson, Chris W

    2014-01-01

    We identify four roles that social networking plays in the 'attribution problem', which obscures whether or not cyber-attacks were state-sponsored. First, social networks motivate individuals to participate in Distributed Denial of Service attacks by providing malware and identifying potential targets. Second, attackers use an individual's social network to focus attacks, through spear phishing. Recipients are more likely to open infected attachments when they come from a trusted source. Third, social networking infrastructures create disposable architectures to coordinate attacks through command and control servers. The ubiquitous nature of these architectures makes it difficult to determine who owns and operates the servers. Finally, governments recruit anti-social criminal networks to launch attacks on third-party infrastructures using botnets. The closing sections identify a roadmap to increase resilience against the 'dark side' of social networking.

  8. 2008 Defense Industrial Base Critical Infrastructure Protection Conference (DIB-CBIP)

    Science.gov (United States)

    2008-04-09

    a cloak -and- dagger thing. It’s about computer architecture and the soundness of electronic systems." Joel Brenner, ODNI Counterintelligence Office...to support advanced network exploitation and launch attacks on the informational and physical elements of our cyber infrastructure. In order to...entities and is vulnerable to attacks and manipulation. Operations in the cyber domain have the ability to impact operations in other war-fighting

  9. Surety of the nation`s critical infrastructures: The challenge restructuring poses to the telecommunications sector

    Energy Technology Data Exchange (ETDEWEB)

    Cox, R.; Drennen, T.E.; Gilliom, L.; Harris, D.L.; Kunsman, D.M.; Skroch, M.J.

    1998-04-01

    The telecommunications sector plays a pivotal role in the system of increasingly connected and interdependent networks that make up national infrastructure. An assessment of the probable structure and function of the bit-moving industry in the twenty-first century must include issues associated with the surety of telecommunications. The term surety, as used here, means confidence in the acceptable behavior of a system in both intended and unintended circumstances. This paper outlines various engineering approaches to surety in systems, generally, and in the telecommunications infrastructure, specifically. It uses the experience and expectations of the telecommunications system of the US as an example of the global challenges. The paper examines the principal factors underlying the change to more distributed systems in this sector, assesses surety issues associated with these changes, and suggests several possible strategies for mitigation. It also studies the ramifications of what could happen if this sector became a target for those seeking to compromise a nation`s security and economic well being. Experts in this area generally agree that the U. S. telecommunications sector will eventually respond in a way that meets market demands for surety. Questions remain open, however, about confidence in the telecommunications sector and the nation`s infrastructure during unintended circumstances--such as those posed by information warfare or by cascading software failures. Resolution of these questions is complicated by the lack of clear accountability of the private and the public sectors for the surety of telecommunications.

  10. Enhancing future resilience in urban drainage system: Green versus grey infrastructure.

    Science.gov (United States)

    Dong, Xin; Guo, Hao; Zeng, Siyu

    2017-11-01

    In recent years, the concept transition from fail-safe to safe-to-fail makes the application of resilience analysis popular in urban drainage systems (UDSs) with various implications and quantifications. However, most existing definitions of UDSs resilience are confined to the severity of flooding, while uncertainties from climate change and urbanization are not considered. In this research, we take into account the functional variety, topological complexity, and disturbance randomness of UDSs and define a new formula of resilience based on three parts of system severity, i.e. social severity affected by urban flooding, environmental severity caused by sewer overflow, and technological severity considering the safe operation of downstream facilities. A case study in Kunming, China is designed to compare the effect of green and grey infrastructure strategies on the enhancement of system resilience together with their costs. Different system configurations with green roofs, permeable pavement and storage tanks are compared by scenario analysis with full consideration of future uncertainties induced by urbanization and climate change. The research contributes to the development of sustainability assessment of urban drainage system with consideration of the resilience of green and grey infrastructure under future change. Finding the response measures with high adaptation across a variety of future scenarios is crucial to establish sustainable urban drainage system in a long term. Copyright © 2017. Published by Elsevier Ltd.

  11. New enhancements to SCALE for criticality safety analysis

    International Nuclear Information System (INIS)

    Hollenbach, D.F.; Bowman, S.M.; Petrie, L.M.; Parks, C.V.

    1995-01-01

    As the speed, available memory, and reliability of computer hardware increases and the cost decreases, the complexity and usability of computer software will increase, taking advantage of the new hardware capabilities. Computer programs today must be more flexible and user friendly than those of the past. Within available resources, the SCALE staff at Oak Ridge National Laboratory (ORNL) is committed to upgrading its computer codes to keep pace with the current level of technology. This paper examines recent additions and enhancements to the criticality safety analysis sections of the SCALE code package. These recent additions and enhancements made to SCALE can be divided into nine categories: (1) new analytical computer codes, (2) new cross-section libraries, (3) new criticality search sequences, (4) enhanced graphical capabilities, (5) additional KENO enhancements, (6) enhanced resonance processing capabilities, (7) enhanced material information processing capabilities, (8) portability of the SCALE code package, and (9) other minor enhancements, modifications, and corrections to SCALE. Each of these additions and enhancements to the criticality safety analysis capabilities of the SCALE code system are discussed below

  12. Methods of securing and controlling critical infrastructure assets allocated in information and communications technology sector companies in leading

    Directory of Open Access Journals (Sweden)

    Piotr Sieńko

    2015-12-01

    Full Text Available Critical Infrastructure (CI plays a significant role in maintaining public order and national security. The state may use many different methods to protect and control CI allocated to commercial companies. This article describes the three most important ones: legislation, ownership and government institutions and agencies. The data presented in this paper is the result of research done on the most developed countries in the EU (United Kingdom, France, Germany and Italy and their strategic enterprises in the ICT sector, one of the most important sectors in any national security system.

  13. TECHNOLOGIES TO ENHANCE OPERATION OF THE EXISTING NATURAL GAS COMPRESSION INFRASTRUCTURE

    Energy Technology Data Exchange (ETDEWEB)

    Anthony J. Smalley; Ralph E. Harris; Gary D. Bourn; Danny M. Deffenbaugh

    2005-01-01

    This quarterly report documents work performed under Tasks 10 through 14 of the project entitled: ''Technologies to Enhance Operation of the Existing Natural Gas Compression Infrastructure''. The project objective is to develop and substantiate methods for operating integral engine/compressors in gas pipeline service, which reduce fuel consumption, increase capacity, and enhance mechanical integrity. The report first documents tests performed on a KVG103 engine/compressor installed at Duke's Thomaston Compressor Station. This is the first series of tests performed on a four-stroke engine under this program. Additionally, this report presents results, which complete a comparison of performance before and after modification to install High Pressure Fuel Injection and a Turbocharger on a GMW10 at Williams Station 60. Quarterly Reports 7 and 8 already presented detailed data from tests before and after this modification, but the final quantitative comparison required some further analysis, which is presented in Section 5 of this report. The report further presents results of detailed geometrical measurements and flow bench testing performed on the cylinders and manifolds of the Laboratory Cooper GMVH6 engine being employed for two-stroke engine air balance investigations. These measurements are required to enhance the detailed accuracy in modeling the dynamic interaction of air manifold, exhaust manifold, and in-cylinder fuel-air balance.

  14. Public private partnerships - risk management in engineering infrastructure projects

    OpenAIRE

    2012-01-01

    M.Phil. Economic growth and the provision of adequate infrastructure are highly interrelated. Infrastructure- plays a critical role in promoting economic growth through enhancing productivity, improving competitiveness, reducing poverty, linking people and organisations together through telecommunications and contributing to environmental sustainability. Population growth and rapid urbanisation have placed enormous pressure on existing infrastructure, thus presenting a daunting challenge t...

  15. Enhancement of critical temperature in fractal metamaterial superconductors

    Energy Technology Data Exchange (ETDEWEB)

    Smolyaninov, Igor I., E-mail: smoly@umd.edu [Department of Electrical and Computer Engineering, University of Maryland, College Park, MD 20742 (United States); Smolyaninova, Vera N. [Department of Physics Astronomy and Geosciences, Towson University, 8000 York Road, Towson, MD 21252 (United States)

    2017-04-15

    Fractal metamaterial superconductor geometry has been suggested and analyzed based on the recently developed theoretical description of critical temperature increase in epsilon near zero (ENZ) metamaterial superconductors. Considerable enhancement of critical temperature has been predicted in such materials due to appearance of large number of additional poles in the inverse dielectric response function of the fractal. Our results agree with the recent observation (Fratini et al. Nature 466, 841 (2010)) that fractal defect structure promotes superconductivity.

  16. Development and utilization of USGS ShakeCast for rapid post-earthquake assessment of critical facilities and infrastructure

    Science.gov (United States)

    Wald, David J.; Lin, Kuo-wan; Kircher, C.A.; Jaiswal, Kishor; Luco, Nicolas; Turner, L.; Slosky, Daniel

    2017-01-01

    The ShakeCast system is an openly available, near real-time post-earthquake information management system. ShakeCast is widely used by public and private emergency planners and responders, lifeline utility operators and transportation engineers to automatically receive and process ShakeMap products for situational awareness, inspection priority, or damage assessment of their own infrastructure or building portfolios. The success of ShakeCast to date and its broad, critical-user base mandates improved software usability and functionality, including improved engineering-based damage and loss functions. In order to make the software more accessible to novice users—while still utilizing advanced users’ technical and engineering background—we have developed a “ShakeCast Workbook”, a well documented, Excel spreadsheet-based user interface that allows users to input notification and inventory data and export XML files requisite for operating the ShakeCast system. Users will be able to select structure based on a minimum set of user-specified facility (building location, size, height, use, construction age, etc.). “Expert” users will be able to import user-modified structural response properties into facility inventory associated with the HAZUS Advanced Engineering Building Modules (AEBM). The goal of the ShakeCast system is to provide simplified real-time potential impact and inspection metrics (i.e., green, yellow, orange and red priority ratings) to allow users to institute customized earthquake response protocols. Previously, fragilities were approximated using individual ShakeMap intensity measures (IMs, specifically PGA and 0.3 and 1s spectral accelerations) for each facility but we are now performing capacity-spectrum damage state calculations using a more robust characterization of spectral deamnd.We are also developing methods for the direct import of ShakeMap’s multi-period spectra in lieu of the assumed three-domain design spectrum (at 0.3s for

  17. Policies to Avoid Cost Overruns in Infrastructure Projects: Critical Evaluation and Recommendations

    Directory of Open Access Journals (Sweden)

    Hans Lind

    2014-09-01

    Full Text Available Many infrastructure projects have cost overruns and there has been a lot of research both on why these cost overruns occur and what can be done to reduce hem. Bent Flyvbjerg is the leading researcher in the area and in this article his proposals are used as the starting point. Besides a literature review, a questionnaire was sent out to experienced Swedish project managers to find out what they thought could reduce cost overruns. The literature review and the questionnaire were the foundation for the proposals formulated in this article. Proposals concerned three areas: (1. Organisational macro-structure, e.g. using more PPP projects but also decentralisation of budgets where cost overruns in one project in a region lead to less alternative projects in the specific region. (2. Organisational quality: It should be easy to see when and where cost overruns occur and who was responsible. There should be a well-developed knowledge management system in the organisation and an organisation culture of openness with a focus on improvements. (3. Organisational processes, e.g. a systematic use of external reviewers in different stages of a project.   Keywords: Cost overruns, Infrastructure projects, Policy measures

  18. Detection and Identification of People at a Critical Infrastructure Facilities of Trafic Buildings

    Directory of Open Access Journals (Sweden)

    Rastislav PIRNÍK

    2014-12-01

    Full Text Available This paper focuses on identification of persons entering objects of crucial infrastructure and subsequent detection of movement in parts of objects. It explains some of the technologies and approaches to processing specific image information within existing building apparatus. The article describes the proposed algorithm for detection of persons. It brings a fresh approach to detection of moving objects (groups of persons involved in enclosed areas focusing on securing freely accessible places in buildings. Based on the designed algorithm of identification with presupposed utilisation of 3D application, motion trajectory of persons in delimited space can be automatically identified. The application was created in opensource software tool using the OpenCV library.

  19. EU-INTACT-case studies: Impact of extreme weather on critical Infrastructure

    Directory of Open Access Journals (Sweden)

    van Ruiten Kees

    2016-01-01

    One of the case studies is located in the Netherlands and deals with the port of Rotterdam. The situation in Rotterdam is representative for many other main ports in Europe. These ports are all situated in a delta area, near the sea and rivers or canals. Also, these ports are close to urban areas and industrial complexes. Finally, these ports have a multimodal transport infrastructure to and from its hinterland, which is also vulnerable for extreme weather events. The case study is not only significant for the development of methods and tools, but also of direct interest for the region itself. The combination of the National Water safety policy and the best practices from the INTACT cases offer challenges to create better adaptation options and coping capacity to these relatively unforeseen and unexpected impacts based on climate change scenario’s and socio-economic megatrends.

  20. A Systems-Based Risk Assessment Framework for Intentional Electromagnetic Interference (IEMI) on Critical Infrastructures.

    Science.gov (United States)

    Oakes, Benjamin Donald; Mattsson, Lars-Göran; Näsman, Per; Glazunov, Andrés Alayón

    2018-01-03

    Modern infrastructures are becoming increasingly dependent on electronic systems, leaving them more vulnerable to electrical surges or electromagnetic interference. Electromagnetic disturbances appear in nature, e.g., lightning and solar wind; however, they may also be generated by man-made technology to maliciously damage or disturb electronic equipment. This article presents a systematic risk assessment framework for identifying possible, consequential, and plausible intentional electromagnetic interference (IEMI) attacks on an arbitrary distribution network infrastructure. In the absence of available data on IEMI occurrences, we find that a systems-based risk assessment is more useful than a probabilistic approach. We therefore modify the often applied definition of risk, i.e., a set of triplets containing scenario, probability, and consequence, to a set of quadruplets: scenario, resource requirements, plausibility, and consequence. Probability is "replaced" by resource requirements and plausibility, where the former is the minimum amount and type of equipment necessary to successfully carry out an attack scenario and the latter is a subjective assessment of the extent of the existence of attackers who possess the motivation, knowledge, and resources necessary to carry out the scenario. We apply the concept of intrusion areas and classify electromagnetic source technology according to key attributes. Worst-case scenarios are identified for different quantities of attacker resources. The most plausible and consequential of these are deemed the most important scenarios and should provide useful decision support in a countermeasures effort. Finally, an example of the proposed risk assessment framework, based on notional data, is provided on a hypothetical water distribution network. © 2017 Society for Risk Analysis.

  1. Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292)

    NARCIS (Netherlands)

    Dacer, Marc; Kargl, Frank; König, Hartmut; Valdes, Alfonso

    2014-01-01

    This report documents the program and the outcomes of Dagstuhl Seminar 14292 “Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures”. The main objective of the seminar was to discuss new approaches and ideas for securing industrial control systems. It

  2. A Tool for Rating the Resilience of Critical Infrastructures in Extreme Fires

    Science.gov (United States)

    2014-05-01

    Rapid Rise Fire Tests of Protection Materials for Structural Steel - Efectis Nederland Report – 2008-Efectis-R0695, Fire Testing Procedure for Concrete...extreme fire conditions such as ASTM E1529 [5], NFPA 502 [8], UL 1709 [4] and Efectis Nederland BV report [9]. One of the critical features of a

  3. What’s My Lane? Identifying the State Government Role in Critical Infrastructure Protection

    Science.gov (United States)

    2012-03-01

    Marsh Commission. The GMU research program was developed with Congressional funding, the results of which have produced numerous research papers ...acknowledging that not all attacks or accidents can be prevented, turn to criticality as a crutch —pouring more and more resources into all

  4. Pipe Penetrating Radar: a New Tool for the Assessment of Critical Infrastructure

    Science.gov (United States)

    Ekes, C.; Neducz, B.

    2012-04-01

    This paper describes the development of Pipe Penetrating Radar (PPR), the underground in-pipe application of GPR, a non-destructive testing method that can detect defects and cavities within and outside mainline diameter (>18 in / 450mm) non-metallic (concrete, PVC, HDPE, etc.) underground pipes. The method uses two or more high frequency GPR antennae carried by a robot into underground pipes. The radar data is transmitted to the surface via fibre optic cable and is recorded together with the output from CCTV (and optionally sonar and laser). Proprietary software analyzes the data and pinpoints defects or cavities within and outside the pipe. Thus the testing can identify existing pipe and pipe bedding symptoms that can be addressed to prevent catastrophic failure due to sinkhole development and can provide useful information about the remaining service life of the pipe. The key innovative aspect is the unique ability to map pipe wall thickness and deterioration including cracks and voids outside the pipe, enabling accurate predictability of needed intervention or the timing of replacement. This reliable non-destructive testing method significantly impacts subsurface infrastructure condition based asset management by supplying previously unattainable measurable conditions. Keywords: pipe penetrating radar (PPR), ground penetrating radar (GPR), pipe inspection, concrete deterioration, municipal engineering

  5. Use of a web site to enhance criticality safety training

    International Nuclear Information System (INIS)

    Huang, Song T.; Morman, James A.

    2003-01-01

    Establishment of the NCSP (Nuclear Criticality Safety Program) website represents one attempt by the NCS (Nuclear Criticality Safety) community to meet the need to enhance communication and disseminate NCS information to a wider audience. With the aging work force in this important technical field, there is a common recognition of the need to capture the corporate knowledge of these people and provide an easily accessible, web-based training opportunity to those people just entering the field of criticality safety. A multimedia-based site can provide a wide range of possibilities for criticality safety training. Training modules could range from simple text-based material, similar to the NCSET (Nuclear Criticality Safety Engineer Training) modules, to interactive web-based training classes, to video lecture series. For example, the Los Alamos National Laboratory video series of interviews with pioneers of criticality safety could easily be incorporated into training modules. Obviously, the development of such a program depends largely upon the need and participation of experts who share the same vision and enthusiasm of training the next generation of criticality safety engineers. The NCSP website is just one example of the potential benefits that web-based training can offer. You are encouraged to browse the NCSP website at http://ncsp.llnl.gov. We solicit your ideas in the training of future NCS engineers and welcome your participation with us in developing future multimedia training modules. (author)

  6. Resource-poor settings: infrastructure and capacity building: care of the critically ill and injured during pandemics and disasters: CHEST consensus statement.

    Science.gov (United States)

    Geiling, James; Burkle, Frederick M; Amundson, Dennis; Dominguez-Cherit, Guillermo; Gomersall, Charles D; Lim, Matthew L; Luyckx, Valerie; Sarani, Babak; Uyeki, Timothy M; West, T Eoin; Christian, Michael D; Devereaux, Asha V; Dichter, Jeffrey R; Kissoon, Niranjan

    2014-10-01

    Planning for mass critical care (MCC) in resource-poor or constrained settings has been largely ignored, despite their large populations that are prone to suffer disproportionately from natural disasters. Addressing MCC in these settings has the potential to help vast numbers of people and also to inform planning for better-resourced areas. The Resource-Poor Settings panel developed five key question domains; defining the term resource poor and using the traditional phases of disaster (mitigation/preparedness/response/recovery), literature searches were conducted to identify evidence on which to answer the key questions in these areas. Given a lack of data upon which to develop evidence-based recommendations, expert-opinion suggestions were developed, and consensus was achieved using a modified Delphi process. The five key questions were then separated as follows: definition, infrastructure and capacity building, resources, response, and reconstitution/recovery of host nation critical care capabilities and research. Addressing these questions led the panel to offer 33 suggestions. Because of the large number of suggestions, the results have been separated into two sections: part 1, Infrastructure/Capacity in this article, and part 2, Response/Recovery/Research in the accompanying article. Lack of, or presence of, rudimentary ICU resources and limited capacity to enhance services further challenge resource-poor and constrained settings. Hence, capacity building entails preventative strategies and strengthening of primary health services. Assistance from other countries and organizations is needed to mount a surge response. Moreover, planning should include when to disengage and how the host nation can provide capacity beyond the mass casualty care event.

  7. Implementation and evaluation of critical thinking strategies to enhance critical thinking skills in Middle Eastern nurses.

    Science.gov (United States)

    Simpson, Elaine; Courtney, Mary

    2008-12-01

    The purpose of this study was to develop, implement and evaluate critical thinking strategies to enhance critical thinking skills in Middle Eastern nurses. Critical thinking strategies such as questioning, debate, role play and small group activity were developed and used in a professional development programme, which was trialled on a sample of Middle Eastern nurses (n = 20), to promote critical thinking skills, encourage problem solving, development of clinical judgment making and care prioritization in order to improve patient care and outcomes. Classroom learning was transformed from memorization to interaction and active participation. The intervention programme was successful in developing critical thinking skills in both the nurse educators and student nurses in this programme. This programme successfully integrated critical thinking strategies into a Middle Eastern nursing curriculum. Recommendations are as follows: (1) utilize evidence-based practice and stem questions to encourage the formulation of critical thinking questions; (2) support the needs of nurse educators for them to effectively implement teaching strategies to foster critical thinking skills; and (3) adopt creative approaches to (i) transform students into interactive participants and (ii) open students' minds and stimulate higher-level thinking and problem-solving abilities.

  8. The effects of green infrastructure on exceedance of critical shear stress in Blunn Creek watershed

    Science.gov (United States)

    Shannak, Sa'd.

    2017-10-01

    Green infrastructure (GI) has attracted city planners and watershed management professional as a new approach to control urban stormwater runoff. Several regulatory enforcements of GI implementation created an urgent need for quantitative information on GI practice effectiveness, namely for sediment and stream erosion. This study aims at investigating the capability and performance of GI in reducing stream bank erosion in the Blackland Prairie ecosystem. To achieve the goal of this study, we developed a methodology to represent two types of GI (bioretention and permeable pavement) into the Soil Water Assessment Tool, we also evaluated the shear stress and excess shear stress for stream flows in conjunction with different levels of adoption of GI, and estimated potential stream bank erosion for different median soil particle sizes using real and design storms. The results provided various configurations of GI schemes in reducing the negative impact of urban stormwater runoff on stream banks. Results showed that combining permeable pavement and bioretention resulted in the greatest reduction in runoff volumes, peak flows, and excess shear stress under both real and design storms. Bioretention as a stand-alone resulted in the second greatest reduction, while the installation of detention pond only had the least reduction percentages. Lastly, results showed that the soil particle with median diameter equals to 64 mm (small cobbles) had the least excess shear stress across all design storms, while 0.5 mm (medium sand) soil particle size had the largest magnitude of excess shear stress. The current study provides several insights into a watershed scale for GI planning and watershed management to effectively reduce the negative impact of urban stormwater runoff and control streambank erosion.

  9. Use of a Web Site to Enhance Criticality Safety Training

    International Nuclear Information System (INIS)

    Huang, S T; Morman, J

    2003-01-01

    Currently, a website dedicated to enhancing communication and dissemination of criticality safety information is sponsored by the U.S. Department of Energy (DOE) Nuclear Criticality Safety Program (NCSP). This website was developed as part of the DOE response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 97-2, which reflected the need to make criticality safety information available to a wide audience. The website is the focal point for DOE nuclear criticality safety (NCS) activities, resources and references, including hyperlinks to other sites actively involved in the collection and dissemination of criticality safety information. The website is maintained by the Lawrence Livermore National Laboratory (LLNL) under auspices of the NCSP management. One area of the website contains a series of Nuclear Criticality Safety Engineer Training (NCSET) modules. During the past few years, many users worldwide have accessed the NCSET section of the NCSP website and have downloaded the training modules as an aid for their training programs. This trend was remarkable in that it points out a continuing need of the criticality safety community across the globe. It has long been recognized that training of criticality safety professionals is a continuing process involving both knowledge-based training and experience-based operations floor training. As more of the experienced criticality safety professionals reach retirement age, the opportunities for mentoring programs are reduced. It is essential that some method be provided to assist the training of young criticality safety professionals to replenish this limited human expert resource to support on-going and future nuclear operations. The main objective of this paper is to present the features of the NCSP website, including its mission, contents, and most importantly its use for the dissemination of training modules to the criticality safety community. We will discuss lessons learned and several ideas

  10. Railway infrastructure security

    CERN Document Server

    Sforza, Antonio; Vittorini, Valeria; Pragliola, Concetta

    2015-01-01

    This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railway infrastructure security. Based on analyses by academics, technology providers, and railway operators, it explains how to assess terrorist and criminal threats, design countermeasures, and implement effective security strategies. In so doing, it draws upon a range of experiences from different countries in Europe and beyond. The book is the first to be devoted entirely to this subject. It will serve as a timely reminder of the attractiveness of the railway infrastructure system as a target for criminals and terrorists and, more importantly, as a valuable resource for stakeholders and professionals in the railway security field aiming to develop effective security based on a mix of methodological, technological, and organizational tools. Besides researchers and decision makers in the field, the book will appeal to students interested in critical infrastructur...

  11. Examining the Interrelationship among Critical Success Factors of Public Private Partnership Infrastructure Projects

    Directory of Open Access Journals (Sweden)

    Shiying Shi

    2016-12-01

    Full Text Available Examining the interrelationships among critical success factors (CSFs for public private partnership (PPP projects is of importance for improving PPP project performance and maintaining the sustainability of PPP project implementation. Previous studies mostly focused on the identification of the CSFs for PPP projects; limited studies investigated the interrelationships among CSFs. Hence, the research objectives are (a to determine the interrelationships among CSFs of PPP projects taking into account the public and (b to identify influence paths contributing to take advantage of CSFs in the process of PPP implementation. A literature review and expert interviews were adopted to construct the CSFs framework; nine hypotheses were constructed and tested by the structural equation modelling (SEM based on the data collected from a questionnaire survey. This research reveals that the relationship between public and private partners is the leader-follower relationship, not the partnership relationship, in PPP projects, indicating that the responsibilities, power or resources existing among partners are very unequal. It also highlights that public involvement has a negative effect on the process of service provisions, and costs and risks exist in the process of public involvement in PPP projects. The determined interrelationships among CSFs will contribute to the sustainability and success of a PPP project.

  12. Adding temporal data enhancements to the advanced spatial data infrastructure platform

    CSIR Research Space (South Africa)

    Sibolla, B

    2014-10-01

    Full Text Available Users of Spatial Data Infrastructure (SDI) increasingly require provision to data holdings beyond the traditional static raster, map or vector based data sets within their organisations. The modern GIS practitioner and Spatial Data Scientist...

  13. How Critical Is Critical Infrastructure?

    Science.gov (United States)

    2015-09-01

    manager conducting a risk self-assessment will likely be subconsciously biased to assess greater risks than actually exist. This problem can be... bias .” The optimism bias extends beyond MBA students. People under estimate their risk for car accidents, think the chances of divorce are low, and...Decisions about Health, Wealth, and Happiness (New Haven, CT: Yale University Press, 2008), 20. 29 others.80 Optimism bias is evident in compulsive

  14. A Decision Matrix and Monitoring based Framework for Infrastructure Performance Enhancement in A Cloud based Environment

    OpenAIRE

    Alam, Mansaf; Shakil, Kashish Ara

    2014-01-01

    Cloud environment is very different from traditional computing environment and therefore tracking the performance of cloud leverages additional requirements. The movement of data in cloud is very fast. Hence, it requires that resources and infrastructure available at disposal must be equally competent. Infrastructure level performance in cloud involves the performance of servers, network and storage which act as the heart and soul for driving the entire cloud business. Thus a constant improve...

  15. Post-Disaster Supply Chain Interdependent Critical Infrastructure System Restoration: A Review of Data Necessary and Available for Modeling

    Directory of Open Access Journals (Sweden)

    Varun Ramachandran

    2016-01-01

    Full Text Available The majority of restoration strategies in the wake of large-scale disasters have focused on short-term emergency response solutions. Few consider medium- to long-term restoration strategies to reconnect urban areas to national 'supply chain interdependent critical infrastructure systems' (SCICI. These SCICI promote the effective flow of goods, services, and information vital to the economic vitality of an urban environment. To re-establish the connectivity that has been broken during a disaster between the different SCICI, relationships between these systems must be identified, formulated, and added to a common framework to form a system-level restoration plan. To accomplish this goal, a considerable collection of SCICI data is necessary. The aim of this paper is to review what data are required for model construction, the accessibility of these data, and their integration with each other. While a review of publically available data reveals a dearth of real-time data to assist modeling long-term recovery following an extreme event, a significant amount of static data does exist and these data can be used to model the complex interdependencies needed. For the sake of illustration, a particular SCICI (transportation is used to highlight the challenges of determining the interdependencies and creating models capable of describing the complexity of an urban environment with the data publically available. Integration of such data as is derived from public domain sources is readily achieved in a geospatial environment, after all geospatial infrastructure data are the most abundant data source and while significant quantities of data can be acquired through public sources, a significant effort is still required to gather, develop, and integrate these data from multiple sources to build a complete model. Therefore, while continued availability of high quality, public information is essential for modeling efforts in academic as well as government

  16. Post-disaster supply chain interdependent critical infrastructure system restoration: A review of data necessary and available for modeling

    Science.gov (United States)

    Ramachandran, Varun; Long, Suzanna K.; Shoberg, Thomas G.; Corns, Steven; Carlo, Hector J.

    2016-01-01

    The majority of restoration strategies in the wake of large-scale disasters have focused on short-term emergency response solutions. Few consider medium- to long-term restoration strategies to reconnect urban areas to national supply chain interdependent critical infrastructure systems (SCICI). These SCICI promote the effective flow of goods, services, and information vital to the economic vitality of an urban environment. To re-establish the connectivity that has been broken during a disaster between the different SCICI, relationships between these systems must be identified, formulated, and added to a common framework to form a system-level restoration plan. To accomplish this goal, a considerable collection of SCICI data is necessary. The aim of this paper is to review what data are required for model construction, the accessibility of these data, and their integration with each other. While a review of publically available data reveals a dearth of real-time data to assist modeling long-term recovery following an extreme event, a significant amount of static data does exist and these data can be used to model the complex interdependencies needed. For the sake of illustration, a particular SCICI (transportation) is used to highlight the challenges of determining the interdependencies and creating models capable of describing the complexity of an urban environment with the data publically available. Integration of such data as is derived from public domain sources is readily achieved in a geospatial environment, after all geospatial infrastructure data are the most abundant data source and while significant quantities of data can be acquired through public sources, a significant effort is still required to gather, develop, and integrate these data from multiple sources to build a complete model. Therefore, while continued availability of high quality, public information is essential for modeling efforts in academic as well as government communities, a more

  17. THE STRATEGY OF THE SMALL BUSINESS INFRASTRUCTURE DEVELOPMENT IN THE SERVICE SPHERE IN THE CONDITIONS OF ENTREPRENEURIAL ENVIRONMENT ENHANCEMENT

    Directory of Open Access Journals (Sweden)

    A. A. Dolinskay

    2013-01-01

    Full Text Available The necessity of strategic approach to the option of the most perspective directions of small business development in the service sphere has been stipulated in the article. The organizational infrastructure of small business in the conditions of international entrepreneurial environment enhancement in the service sphere on the basis of analytical generalization of the existing forms of small business support in the service sphere has been developed.

  18. Enhanced upper critical fields in binary Nb-Ti alloys

    International Nuclear Information System (INIS)

    Hariharan, Y.; Sastry, V.S.; Janawadkar, M.P.; Radhakrishnan, T.S.

    1986-01-01

    The authors report the enhancement of H/sub c2/ in quenched and suitably heat treated binary Nb-65 at % Ti alloys. The inherent metastability of the bcc β phase and its instability towards athermal ω are used to realise high values of normal state resistivity ε/sub n/. The consequences of this on the upper critical field have been experimentally determined by the measurement of dH/sub c2//dT at T/sub c/ and of T/sub c/. These together with our similar measurements on Nb-83 at % Ti alloy to which at 1 at % N was added (to retain it in the β phase) are analysed in terms of the existing theories for upper critical fields. It is shown that a peak in H/sub c2/(o) occurs at 17 - 18 T when ε/sub n/ has a value of approximately 100 μΩcm

  19. Criticality safety enhancements for SCALE 6.2 and beyond

    International Nuclear Information System (INIS)

    Rearden, Bradley T.; Bekar, Kursat B.; Celik, Cihangir; Clarno, Kevin T.; Dunn, Michael E.; Hart, Shane W.; Ibrahim, Ahmad M.; Johnson, Seth R.; Langley, Brandon R.; Lefebvre, Jordan P.; Lefebvre, Robert A.; Marshall, William J.; Mertyurek, Ugur; Mueller, Don; Peplow, Douglas E.; Perfetti, Christopher M.; Petrie Jr, Lester M.; Thompson, Adam B.; Wiarda, Dorothea; Wieselquist, William A.; Williams, Mark L.

    2015-01-01

    SCALE is a widely used suite of tools for nuclear systems modeling and simulation that provides comprehensive, verified and validated, user-friendly capabilities for criticality safety, reactor physics, radiation shielding, and sensitivity and uncertainty analysis. Since 1980, regulators, industry, and research institutions around the world have relied on SCALE for nuclear safety analysis and design. SCALE 6.2 provides several new capabilities and significant improvements in many existing features for criticality safety analysis. Enhancements are realized for nuclear data; multigroup resonance self-shielding; continuous-energy Monte Carlo analysis for sensitivity/uncertainty analysis, radiation shielding, and depletion; and graphical user interfaces. An overview of these capabilities is provided in this paper, and additional details are provided in several companion papers.

  20. TECHNOLOGIES TO ENHANCE THE OPERATION OF EXISTING NATURAL GAS COMPRESSION INFRASTRUCTURE

    Energy Technology Data Exchange (ETDEWEB)

    Anthony J. Smalley; Ralph E. Harris; Gary D. Bourn; Ford A. Phillips; Danny M. Deffenbaugh

    2006-05-31

    This project has documented and demonstrated the feasibility of technologies and operational choices for companies who operate the large installed fleet of integral engine compressors in pipeline service. Continued operations of this fleet is required to meet the projected growth of the U.S. gas market. Applying project results will meet the goals of the DOE-NETL Natural Gas Infrastructure program to enhance integrity, extend life, improve efficiency, and increase capacity, while managing NOx emissions. These benefits will translate into lower cost, more reliable gas transmission, and options for increasing deliverability from the existing infrastructure on high demand days. The power cylinders on large bore slow-speed integral engine/compressors do not in general combust equally. Variations in cylinder pressure between power cylinders occur cycle-to-cycle. These variations affect both individual cylinder performance and unit average performance. The magnitude of the variations in power cylinder combustion is dependent on a variety of parameters, including air/fuel ratio. Large variations in cylinder performance and peak firing pressure can lead to detonation and misfires, both of which can be damaging to the unit. Reducing the variation in combustion pressure, and moving the high and low performing cylinders closer to the mean is the goal of engine balancing. The benefit of improving the state of the engine ''balance'' is a small reduction in heat rate and a significant reduction in both crankshaft strain and emissions. A new method invented during the course of this project is combustion pressure ratio (CPR) balancing. This method is more effective than current methods because it naturally accounts for differences in compression pressure, which results from cylinder-to-cylinder differences in the amount of air flowing through the inlet ports and trapped at port closure. It also helps avoid compensation for low compression pressure by the

  1. Critical Thinking and Collaboration: A Strategy to Enhance Student Learning

    Directory of Open Access Journals (Sweden)

    Ronald A. Styron, Jr.

    2014-12-01

    Full Text Available In numerous studies relative to collaboration and critical thinking, an instructional strategy called Team- Based Learning has proven to be an effective approach to teaching and learning. Team-Based Learning utilizes a specific sequence of individual work, group work and immediate feedback to create a motivational framework in which students increasingly hold each other accountable for coming to class prepared and contributing to discussion. Using an action research conceptual model diffusion of innovation theory, the process of P-20 quality enhancement using Team-Based Learning is examined.

  2. Critical infrastructure protection decision support system decision model : overview and quick-start user's guide.

    Energy Technology Data Exchange (ETDEWEB)

    Samsa, M.; Van Kuiken, J.; Jusko, M.; Decision and Information Sciences

    2008-12-01

    The Critical Infrastructure Protection Decision Support System Decision Model (CIPDSS-DM) is a useful tool for comparing the effectiveness of alternative risk-mitigation strategies on the basis of CIPDSS consequence scenarios. The model is designed to assist analysts and policy makers in evaluating and selecting the most effective risk-mitigation strategies, as affected by the importance assigned to various impact measures and the likelihood of an incident. A typical CIPDSS-DM decision map plots the relative preference of alternative risk-mitigation options versus the annual probability of an undesired incident occurring once during the protective life of the investment, assumed to be 20 years. The model also enables other types of comparisons, including a decision map that isolates a selected impact variable and displays the relative preference for the options of interest--parameterized on the basis of the contribution of the isolated variable to total impact, as well as the likelihood of the incident. Satisfaction/regret analysis further assists the analyst or policy maker in evaluating the confidence with which one option can be selected over another.

  3. Critical Data Source; Tool or Even Infrastructure? Challenges of Geographic Information Systems and Remote Sensing for Disaster Risk Governance

    Directory of Open Access Journals (Sweden)

    Alexander Fekete

    2015-09-01

    Full Text Available Disaster risk information is spatial in nature and Geographic Information Systems (GIS and Remote Sensing (RS play an important key role by the services they provide to society. In this context, to risk management and governance, in general, and to civil protection, specifically (termed differently in many countries, and includes, for instance: civil contingencies in the UK, homeland security in the USA, disaster risk reduction at the UN level. The main impetus of this article is to summarize key contributions and challenges in utilizing and accepting GIS and RS methods and data for disaster risk governance, which includes public bodies, but also risk managers in industry and practitioners in search and rescue organizations. The article analyzes certain method developments, such as vulnerability indicators, crowdsourcing, and emerging concepts, such as Volunteered Geographic Information, but also investigates the potential of the topic Critical Infrastructure as it could be applied on spatial assets and GIS and RS itself. Intended to stimulate research on new and emerging fields, this article’s main contribution is to move spatial research toward a more reflective stance where opportunities and challenges are equally and transparently addressed in order to gain more scientific quality. As a conclusion, GIS and RS can play a pivotal role not just in delivering data but also in connecting and analyzing data in a more integrative, holistic way.

  4. One-sided muon tomography - A portable method for imaging critical infrastructure with a single muon detector

    Energy Technology Data Exchange (ETDEWEB)

    Boniface, K., E-mail: bonifak@mcmaster.ca [McMaster Univ., Hamilton, Ontario (Canada); Jonkmans, G. [Defence R& D Canada, Centre for Security Science, Ottawa, Ontario (Canada); Anghel, V.; Erlandson, A.; Thompson, M.; Livingstone, S. [Canadian Nuclear Laboratories, Chalk River, Ontario (Canada)

    2014-07-01

    High-energy muons generated from cosmic-ray particle showers have been shown to exhibit properties ideal for imaging the interior of large structures. This paper explores the possibility of using a single portable muon detector in conjunction with image reconstruction methods used in nuclear medicine to reconstruct a 3D image of the interior of man-made large structures such as the Zero Energy Deuterium (ZED-2) research reactor at Atomic Energy of Canada Ltd (AECL) Chalk River Laboratories (CRL). The ZED-2 reactor core and muon detector arrangement are modeled in GEANT4 and measurements of the resultant muon throughput and angular distribution at several angles of rotation around the reactor are generated. Statistical analysis is then performed on these measurements based on the well-defined flux and angular distribution of muons expected near the surface of the earth. The results of this analysis are shown to produce reconstructed images of the spatial distribution of nuclear fuel within the core for multiple fuel configurations. This “one-sided tomography” concept is a possible candidate for examining the internal structure of larger critical facilities, for example the Fukushima Daiichi power plant where the integrity of the containment infrastructure and the location of the reactor fuel is unknown. (author)

  5. Handling Worldwide LHC Computing Grid Critical Service Incidents : The infrastructure and experience behind nearly 5 years of GGUS ALARMs

    CERN Multimedia

    Dimou, M; Dulov, O; Grein, G

    2013-01-01

    In the Wordwide LHC Computing Grid (WLCG) project the Tier centres are of paramount importance for storing and accessing experiment data and for running the batch jobs necessary for experiment production activities. Although Tier2 sites provide a significant fraction of the resources a non-availability of resources at the Tier0 or the Tier1s can seriously harm not only WLCG Operations but also the experiments' workflow and the storage of LHC data which are very expensive to reproduce. This is why availability requirements for these sites are high and committed in the WLCG Memorandum of Understanding (MoU). In this talk we describe the workflow of GGUS ALARMs, the only 24/7 mechanism available to LHC experiment experts for reporting to the Tier0 or the Tier1s problems with their Critical Services. Conclusions and experience gained from the detailed drills performed in each such ALARM for the last 4 years are explained and the shift with time of Type of Problems met. The physical infrastructure put in place to ...

  6. Assessment of municipal infrastructure development and its critical influencing factors in urban China: A FA and STIRPAT approach.

    Directory of Open Access Journals (Sweden)

    Yu Li

    Full Text Available Municipal infrastructure is a fundamental facility for the normal operation and development of an urban city and is of significance for the stable progress of sustainable urbanization around the world, especially in developing countries. Based on the municipal infrastructure data of the prefecture-level cities in China, municipal infrastructure development is assessed comprehensively using a FA (factor analysis model, and then the stochastic model STIRPAT (stochastic impacts by regression on population, affluence and technology is examined to investigate key factors that influence municipal infrastructure of cities in various stages of urbanization and economy. This study indicates that the municipal infrastructure development in urban China demonstrates typical characteristics of regional differentiation, in line with the economic development pattern. Municipal infrastructure development in cities is primarily influenced by income, industrialization and investment. For China and similar developing countries under transformation, national public investment remains the primary driving force of economy as well as the key influencing factor of municipal infrastructure. Contribution from urbanization and the relative consumption level, and the tertiary industry is still scanty, which is a crux issue for many developing countries under transformation. With economic growth and the transformation requirements, the influence of the conventional factors such as public investment and industrialization on municipal infrastructure development would be expected to decline, meanwhile, other factors like the consumption and tertiary industry driven model and the innovation society can become key contributors to municipal infrastructure sustainability.

  7. Assessment of municipal infrastructure development and its critical influencing factors in urban China: A FA and STIRPAT approach.

    Science.gov (United States)

    Li, Yu; Zheng, Ji; Li, Fei; Jin, Xueting; Xu, Chen

    2017-01-01

    Municipal infrastructure is a fundamental facility for the normal operation and development of an urban city and is of significance for the stable progress of sustainable urbanization around the world, especially in developing countries. Based on the municipal infrastructure data of the prefecture-level cities in China, municipal infrastructure development is assessed comprehensively using a FA (factor analysis) model, and then the stochastic model STIRPAT (stochastic impacts by regression on population, affluence and technology) is examined to investigate key factors that influence municipal infrastructure of cities in various stages of urbanization and economy. This study indicates that the municipal infrastructure development in urban China demonstrates typical characteristics of regional differentiation, in line with the economic development pattern. Municipal infrastructure development in cities is primarily influenced by income, industrialization and investment. For China and similar developing countries under transformation, national public investment remains the primary driving force of economy as well as the key influencing factor of municipal infrastructure. Contribution from urbanization and the relative consumption level, and the tertiary industry is still scanty, which is a crux issue for many developing countries under transformation. With economic growth and the transformation requirements, the influence of the conventional factors such as public investment and industrialization on municipal infrastructure development would be expected to decline, meanwhile, other factors like the consumption and tertiary industry driven model and the innovation society can become key contributors to municipal infrastructure sustainability.

  8. Protecting Critical Rail Infrastructure

    Science.gov (United States)

    2006-12-01

    Gulliver.Trb.Org/Publications/Sr/Sr270.Pdf. 38. Allan J. DeBlasio, Terrance J. Regan, Margaret E . Zirker, Katherine S. Fichter, Kristin Lovejoy ...getrpt?GAO-04-598T. 4. Ibid. 5. Thomas H. Kean, Lee H. Hamilton, Richard Ben-Veniste, Fred F. Fielding, Jamie S. Gorelick, Slade Gorton, Bob Kerrey...Committee, Current and Projected National Security Threats to the United States, Vice Admiral Lowell E . Jacoby, United States Navy, Director, Defense

  9. Cybersecurity for Critical Infrastructure

    Science.gov (United States)

    2015-04-01

    mere intrusion and resulted in physical damage to some computers, an incident of this nature on a private company such as Sony should not be...Baker, Major, USAF A Research Report Submitted to the Faculty In Partial Fulfillment of the Graduation Requirements for the Degree of MASTER...iv Introduction……………………………………………………………………………….……....1 Was the Sony Incident a Cyber Attack………………………………………………….………..3 Defining Cyber

  10. Defense Infrastructure: Actions Needed to Enhance Oversight of Construction Projects Supporting Military Contingency Operations

    Science.gov (United States)

    2016-09-01

    supporting documentation for reviews that the U.S. Forces-Afghanistan conducted beginning in November 2011 of planned or ongoing contingency ...12 Contingency basing includes the planning , designing, constructing, operating, managing, and transitioning or closing of a non-enduring location...2016). Background Definition of “ Contingency Construction” Project Page 7 GAO-16-406 Defense Infrastructure statutory authority

  11. Enhancing construction infrastructure delivery through restructuring of the Vuk’uphile Learnership Programme

    CSIR Research Space (South Africa)

    Hauptfleisch, AC

    2014-07-01

    Full Text Available The purpose of the paper is to provide an overview on review and restructuring of a construction contractor learnership programme and the quality management under the infrastructure sector of the government’s Expanded Public Works Programme (EPWP...

  12. Black-Box Optimization for Buildings and Its Enhancement by Advanced Communication Infrastructure

    Czech Academy of Sciences Publication Activity Database

    Macek, Karel; Rojíček, J.; Kontes, G.; Rovas, D. V.

    2013-01-01

    Roč. 1, č. 5 (2013), s. 53-64 ISSN 2255-2863 R&D Projects: GA ČR GA13-13502S Institutional support: RVO:67985556 Keywords : Evolutionary algorithms * Black box modeling * Simplification * Refining * HVAC * Load shedding * Communication infrastructure Subject RIV: BC - Control Systems Theory http://library.utia.cas.cz/separaty/2014/AS/macek-0423196.pdf

  13. SPECIAL AND MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS AS VITAL PART OF THE CRITICAL INFRASTRUCTURES IN ROMANIA. SECURING THEIR PHYSICAL AND INFORMATIONAL PROTECTION

    Directory of Open Access Journals (Sweden)

    Constantin MINCU

    2012-11-01

    Full Text Available The article presents several arguments on the need to study the critical infrastructure in Romania including various systems (networks and special military communications. It emphasizes the role and place of such systems and networks to provide national defense and security and the risks and vulnerabilities faced by these infrastructures, and some necessary measures to be taken for the physical and informational protection in the case of hostile military actions, natural disasters or other negative phenomena. Finally some conclusions and proposals are formulated.

  14. The Pedagogy of Complex Work Support Systems: Infrastructuring Practices and the Production of Critical Awareness in Risk Auditing

    Science.gov (United States)

    Mathisen, Arve; Nerland, Monika

    2012-01-01

    This paper employs a socio-technical perspective to explore the role of complex work support systems in organising knowledge and providing opportunities for learning in professional work. Drawing on concepts from infrastructure studies, such systems are seen as work infrastructures which connect information, knowledge, standards and work…

  15. Mathematical modelling of tsunami impacts on critical infrastructures: exposure and severity associated with debris transport at Sines port, Portugal.

    Science.gov (United States)

    Conde, Daniel; Baptista, Maria Ana; Sousa Oliveira, Carlos; Ferreira, Rui M. L.

    2015-04-01

    a flux-splitting technique with a reviewed Roe-Riemann solver and appropriate source-term formulations to ensure full conservativeness. Additionally, STAV-2D features Lagrangian-Eulerian coupling enabling solid transport simulation under both continuum and discrete approaches, and has been validated with both laboratory data and paleo-tsunami evidence (Conde, 2013a; Conde, 2013b). The interactions between the inundating flow and coal stockpiles or natural mobile bed reaches were simulated using a continuum debris-flow approach, featuring fractional solid transport, while the containers at the new terminal were advected with an explicit Lagrangian method. The meshwork employed at the port models the existing geometry and structures in great detail, enabling explicitly resolved interactions between the current infrastructure and the overland propagating tsunami. The obtained preliminary results suggest that several structures, some of them critical in a nationwide context, are exposed to tsunami actions. The coal deposition pattern and the final location of monitored containers were determined for two magnitude scenarios (8.5 Mw and 9.5 Mw) in the case of a tsunami generated at the Horseshoe fault and one magnitude scenario (9.5 Mw) for a tsunami generated at the Gorringe bank. The inland washing of the coal stockpiles may impose great loss of both economical and environmental value, while the impact of large mobile debris, such as the containers in the terminal area, significantly increases the severity of infrastructural damage. Acknowledgements This work was partially funded by FEDER, program COMPETE, and by national funds through the Portuguese Foundation for Science and Technology (FCT) with project RECI/ECM-HID/0371/2012. References Baptista M.A. & Miranda, J.M. (2009), Revision of the Portuguese catalog of tsunamis. Nat. Hazards Earth Syst. Sci., 9, 25-42. Canelas, R.; Murillo, J. & Ferreira, R.M.L. (2013), Two-dimensional depth-averaged modelling of dam

  16. Enhancing Critical Thinking Via a Clinical Scholar Approach.

    Science.gov (United States)

    Simpson, Vicki; McComb, Sara A; Kirkpatrick, Jane M

    2017-11-01

    Safety, quality improvement, and a systems perspective are vital for nurses to provide quality evidence-based care. Responding to the call to prepare nurses with these perspectives, one school of nursing used a clinical scholar approach, enhanced by systems engineering to more intentionally develop the ability to clinically reason and apply evidence-based practice. A two-group, repeated-measures control trial was used to determine the effects of systems engineering content and support on nursing students' clinical judgment and critical thinking skills. Findings indicated this approach had a positive effects on student's clinical judgment and clinical reasoning skills. This approach helped students view health care issues from a broader perspective and use evidence to guide solution development, enhancing the focus on evidence-based practice, and quality improvement. Intentional integration of an evidence-based, systems perspective by nursing faculty supports development of nurses who can function safely and effectively in the current health care system. [J Nurs Educ. 2017;56(11):679-682.]. Copyright 2017, SLACK Incorporated.

  17. Technologies for Protection and Resistance Enhancement of Critical Infrastructures againstExtreme Fire

    Science.gov (United States)

    2014-05-01

    involving hydrocarbon fires, such as gasoline or crude oil carried in a tanker truck/train, or any other fuel fire of equivalent intensity. Examples of...and impact of weather exposure on the insulation, as well as possible health risk by inhalation (mainly concern for interior application), application

  18. The Application of Biometrics in Critical Infrastructures Operations: Guidance for Security Managers. ERNCIP Thematic Group Applied Biometrics for CIP. Deliverable: Guidance for Security Managers - Task 2

    OpenAIRE

    REJMAN-GREENE Marek; BRZOZOWSKI Krzysztof; MANSFIELD Tony; SANCHEZ-REILLO Raul; WAGGETT Peter; WHITAKER Geoff

    2015-01-01

    Biometric technologies have advanced considerably over the past decade, and have paved the way for more widespread use by governments, commercial enterprises and, more recently, by the consumer through the introduction of sensors and apps on mobile phones. This report provides introductory information about the application of these technologies to achieve secure recognition of individuals by organisations which form part of critical infrastructures in the EU. As a specific example, it offers ...

  19. TECHNOLOGIES TO ENHANCE THE OPERATION OF EXISTING NATURAL GAS COMPRESSION INFRASTRUCTURE - MANIFOLD DESIGN FOR CONTROLLING ENGINE AIR BALANCE

    Energy Technology Data Exchange (ETDEWEB)

    Gary D. Bourn; Ford A. Phillips; Ralph E. Harris

    2005-12-01

    This document provides results and conclusions for Task 15.0--Detailed Analysis of Air Balance & Conceptual Design of Improved Air Manifolds in the ''Technologies to Enhance the Operation of Existing Natural Gas Compression Infrastructure'' project. SwRI{reg_sign} is conducting this project for DOE in conjunction with Pipeline Research Council International, Gas Machinery Research Council, El Paso Pipeline, Cooper Compression, and Southern Star, under DOE contract number DE-FC26-02NT41646. The objective of Task 15.0 was to investigate the perceived imbalance in airflow between power cylinders in two-stroke integral compressor engines and develop solutions via manifold redesign. The overall project objective is to develop and substantiate methods for operating integral engine/compressors in gas pipeline service, which reduce fuel consumption, increase capacity, and enhance mechanical integrity.

  20. An operational-oriented approach to the assessment of low probability seismic ground motions for critical infrastructures

    Science.gov (United States)

    Garcia-Fernandez, Mariano; Assatourians, Karen; Jimenez, Maria-Jose

    2018-01-01

    Extreme natural hazard events have the potential to cause significant disruption to critical infrastructure (CI) networks. Among them, earthquakes represent a major threat as sudden-onset events with limited, if any, capability of forecast, and high damage potential. In recent years, the increased exposure of interdependent systems has heightened concern, motivating the need for a framework for the management of these increased hazards. The seismic performance level and resilience of existing non-nuclear CIs can be analyzed by identifying the ground motion input values leading to failure of selected key elements. Main interest focuses on the ground motions exceeding the original design values, which should correspond to low probability occurrence. A seismic hazard methodology has been specifically developed to consider low-probability ground motions affecting elongated CI networks. The approach is based on Monte Carlo simulation, which allows for building long-duration synthetic earthquake catalogs to derive low-probability amplitudes. This approach does not affect the mean hazard values and allows obtaining a representation of maximum amplitudes that follow a general extreme-value distribution. This facilitates the analysis of the occurrence of extremes, i.e., very low probability of exceedance from unlikely combinations, for the development of, e.g., stress tests, among other applications. Following this methodology, extreme ground-motion scenarios have been developed for selected combinations of modeling inputs including seismic activity models (source model and magnitude-recurrence relationship), ground motion prediction equations (GMPE), hazard levels, and fractiles of extreme ground motion. The different results provide an overview of the effects of different hazard modeling inputs on the generated extreme motion hazard scenarios. This approach to seismic hazard is at the core of the risk analysis procedure developed and applied to European CI transport

  1. Effects of a significant New Madrid Seismic Zone event on oil and natural gas pipelines and their cascading effects to critical infrastructures

    Science.gov (United States)

    Fields, Damon E.

    Critical Infrastructure Protection (CIP) is a construct that relates preparedness and responsiveness to natural or man-made disasters that involve vulnerable assets deemed essential for the functioning of our economy and society. Infrastructure systems (power grids, bridges, airports, etc.) are vulnerable to disastrous types of events--natural or man-made. Failures of these systems can have devastating effects on communities and entire regions. CIP relates our willingness, ability, and capability to defend, mitigate, and re-constitute those assets that succumb to disasters affecting one or more infrastructure sectors. This qualitative research utilized ethnography and employed interviews with subject matter experts (SMEs) from various fields of study regarding CIP with respect to oil and natural gas pipelines in the New Madrid Seismic Zone. The study focused on the research question: What can be done to mitigate vulnerabilities in the oil and natural gas infrastructures, along with the potential cascading effects to interdependent systems, associated with a New Madrid fault event? The researcher also analyzed National Level Exercises (NLE) and real world events, and associated After Action Reports (AAR) and Lessons Learned (LL) in order to place a holistic lens across all infrastructures and their dependencies and interdependencies. Three main themes related to the research question emerged: (a) preparedness, (b) mitigation, and (c) impacts. These themes comprised several dimensions: (a) redundancy, (b) node hardening, (c) education, (d) infrastructure damage, (e) cascading effects, (f) interdependencies, (g) exercises, and (h) earthquake readiness. As themes and dimensions are analyzed, they are considered against findings in AARs and LL from previous real world events and large scale exercise events for validation or rejection.

  2. Magnetic Criticality Enhanced Hybrid Nanodiamond Thermometer under Ambient Conditions

    Science.gov (United States)

    Wang, Ning; Liu, Gang-Qin; Leong, Weng-Hang; Zeng, Hualing; Feng, Xi; Li, Si-Hong; Dolde, Florian; Fedder, Helmut; Wrachtrup, Jörg; Cui, Xiao-Dong; Yang, Sen; Li, Quan; Liu, Ren-Bao

    2018-01-01

    Nitrogen-vacancy (NV) centers in diamond are attractive as quantum sensors owing to their superb coherence under ambient conditions. However, the NV center spin resonances are relatively insensitive to some important parameters such as temperature and pressure. Here we design and experimentally demonstrate a hybrid nanothermometer composed of NV centers and a magnetic nanoparticle (MNP), in which the temperature sensitivity is enhanced by the critical magnetization of the MNP near the ferromagnetic-paramagnetic transition temperature. The temperature susceptibility of the NV center spin resonance reaches 14 MHz /K , nearly 200 times larger than that of bare NV centers. The sensitivity of a hybrid nanothermometer composed of a Cu1 -xNix MNP and a nanodiamond is measured to be 11 mK /√{Hz } under ambient conditions. The working range of the hybrid thermometer can be designed from cryogenic temperature to about 600 K by tuning the chemical composition of the Cu1 -xNix MNP. We demonstrate in situ detection of the magnetic phase transition of a single magnetic nanoparticle using the hybrid nanothermometer. This hybrid nanothermometer provides a novel approach to studying a broad range of thermal processes at nanoscales such as nanoplasmonics, heat-stimulated subcellular processes, and thermodynamics of nanosystems.

  3. Magnetic Criticality Enhanced Hybrid Nanodiamond Thermometer under Ambient Conditions

    Directory of Open Access Journals (Sweden)

    Ning Wang

    2018-03-01

    Full Text Available Nitrogen-vacancy (NV centers in diamond are attractive as quantum sensors owing to their superb coherence under ambient conditions. However, the NV center spin resonances are relatively insensitive to some important parameters such as temperature and pressure. Here we design and experimentally demonstrate a hybrid nanothermometer composed of NV centers and a magnetic nanoparticle (MNP, in which the temperature sensitivity is enhanced by the critical magnetization of the MNP near the ferromagnetic-paramagnetic transition temperature. The temperature susceptibility of the NV center spin resonance reaches 14  MHz/K, nearly 200 times larger than that of bare NV centers. The sensitivity of a hybrid nanothermometer composed of a Cu_{1-x}Ni_{x} MNP and a nanodiamond is measured to be 11  mK/sqrt[Hz] under ambient conditions. The working range of the hybrid thermometer can be designed from cryogenic temperature to about 600 K by tuning the chemical composition of the Cu_{1-x}Ni_{x} MNP. We demonstrate in situ detection of the magnetic phase transition of a single magnetic nanoparticle using the hybrid nanothermometer. This hybrid nanothermometer provides a novel approach to studying a broad range of thermal processes at nanoscales such as nanoplasmonics, heat-stimulated subcellular processes, and thermodynamics of nanosystems.

  4. Enhancing the Earth System Grid Authentication Infrastructure through Single Sign-On and Autoprovisioning

    Energy Technology Data Exchange (ETDEWEB)

    Siebenlist, Frank [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Bernholdt, David E. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Williams, Dean N. [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2009-01-01

    Climate scientists face an overarching need to efficiently access and manipulate climate model data. Increasingly, researchers must assemble and analyze large datasets that are archived in different formats on disparate platforms and must extract portions of datasets to compute statistical or diagnostic metrics in place. The need for a common virtual environment in which to access both climate model datasets and analysis tools is therefore keenly felt. The software infrastructure to support such an environment must not only provide ready access to climate data but must also facilitate the use of visualization software, diagnostic algorithms, and related resources. To this end, the Earth System Grid Center for Enabling Technologies (ESG-CET) was established in 2006 by the Scientific Discovery through Advanced Computing program of the U.S. Department of Energy through the Office of Advanced Scientific Computing Research and the Office Biological and Environmental Research within the Office of Science. ESG-CET is working to advance climate science by developing computational resources for accessing and managing model data that are physically located in distributed multiplatform archives. In this paper, we discuss recent development and implementation efforts by the Earth System Grid (ESG) concerning its security infrastructure. ESG's requirements are to make user logon as easy as possible and to facilitate the integration of security services and Grid components for both developers and system administrators. To meet that goal, we leverage existing primary authentication mechanisms, deploy a 'lightweight' but secure OpenID WebSSO, deploy a 'lightweight' X.509-PKI, and use autoprovisioning to ease the burden of security configuration management. We are close to completing the associated development and deployment.

  5. "Measuring Operational Effectiveness of Information Technology Infrastructure Library (IIL) and the Impact of Critical Facilities Inclusion in the Process."

    Science.gov (United States)

    Woodell, Eric A.

    2013-01-01

    Information Technology (IT) professionals use the Information Technology Infrastructure Library (ITIL) process to better manage their business operations, measure performance, improve reliability and lower costs. This study examined the operational results of those data centers using ITIL against those that do not, and whether the results change…

  6. Criticality analysis of the EU gas infrastructure: heightened security requirements for gas control and management centres; Kritikalitaetsanalyse der EU-Gasinfrastruktur: Erhoehte Sicherheitsanforderungen an Gasleit- und -kontrollzentren

    Energy Technology Data Exchange (ETDEWEB)

    Nerlich, Uwe; Umbach, Frank [Centre for European Security Strategies (CESS), Muenchen/Berlin (Germany)

    2009-11-15

    Since the terror attacks of 2001 critical infrastructure objects have gained substantially in strategic importance in the eyes of the German government and EU authorities as well as the European industry. This has not only been due to the worldwide increase in terrorist attacks on energy infrastructure objects but also to the attacks of Madrid on 11 March 2004 and London on 7 July 2005, which have shown that Europe is no longer being spared from terrorism. Strategies for the abatement of these hazards and their repercussions are therefore more urgently needed than ever before. This requires a differentiated assessment of the situation, as has been carried out, for example, in raising the security requirements and investigating the vulnerability of the gas management and control centres of the EU's Octavio project.

  7. Identifying Critical Thinking Styles to Enhance Volunteer Development

    Science.gov (United States)

    Gay, Keegan D.; Terry, Bryan; Lamm, Alexa J.

    2015-01-01

    Diversity in learning options can increase efficacy of volunteer development systems. The University of Florida Critical Thinking Inventory (UFCTI) is designed to explicate an individual's critical thinking style based upon a continuum from Seeking Information to Engagement. Static and interpretive materials are best used with individuals of a…

  8. Environmental Enhancements and Navigation Infrastructure: A Study of Existing Practices, Innovative Ideas, Impediments, and Research Needs

    Science.gov (United States)

    2011-07-01

    prefabricated reef modules either extending linearly from the ends of breakwaters, piers, and jetties, or placed in concentric arcs near the ends Use rubble...creation of aquatic and ecologically related habitats, including wetlands, in connection with dredging in new project construction and maintenance of...attractants for species raises the concern that sensitive ecological receptors will begin to use these enhancements, potentially resulting in increased

  9. Enhancing Rationality: Heuristics, Biases, and The Critical Thinking Project

    Directory of Open Access Journals (Sweden)

    Mark Battersby

    2016-07-01

    Full Text Available Abstract: This paper develops four related claims: 1. Critical thinking should focus more on decision making, 2. the heuristics and bias literature developed by cognitive psychologists and behavioral economists provides many insights into human irrationality which can be useful in critical thinking instruction, 3. unfortunately the “rational choice” norms used by behavioral economists to identify “biased” decision making narrowly equate rational decision making with the efficient pursuit of individual satisfaction; deviations from these norms should not be treated as an irrational bias, 4. a richer, procedural theory of rational decision making should be the basis for critical thinking instruction in decision making.

  10. Phonon-induced enhancement of the energy gap and critical current of superconducting aluminum films

    International Nuclear Information System (INIS)

    Seligson, D.; Clarke, J.

    1983-01-01

    Enhancements of the energy gap Δ and the critical current I/sub c/ have been induced in thin superconducting aluminum films near the transition temperature T/sub c/ by pulses of phonons at approximately 9 GHz. In terms of the change in temperature Vertical BardeltaT/T/sub c/Vertical Bar necessary to produce the same enhancement in equilibrium, the gap enhancement increased smoothly with phonon power at fixed temperature and decreasing temperature at fixed phonon power; however, very close to T/sub c/ the enhancement rolled off. At relatively low phonon powers, the data were in good agreement with the theory of Eckern, Schmid, Schmutz, and Schoen, but at higher power levels the data fell markedly below the predictions of the theory. The critical-current enhancements in terms of Vertical BardeltaT/T/sub c/Vertical Bar were always larger than the gap enhancements at the same temperature and phonon power. At fixed phonon power the critical-current enhancements were nearly independent of temperature, except very close to T/sub c/ where the enhancement became small. The inclusion of the nonequilibrium quasiparticle distribution and the kinetic energy of the supercurrent in the theory relating the critical-current enhancement to the gap enhancement did not resolve the discrepancies between the two enhancements. It appears likely that there is an additional mechanism for critical-current enhancement that has not yet been identified

  11. The Use of Argument Mapping to Enhance Critical Thinking Skills in Business Education

    Science.gov (United States)

    Kunsch, David W.; Schnarr, Karin; van Tyle, Russell

    2014-01-01

    Complex business problems require enhanced critical thinking skills. In a dedicated, in-person critical thinking class, argument mapping techniques were used in conjunction with business and nonbusiness case studies to build the critical thinking skills of a group of master of business administration students. Results demonstrated that the…

  12. Enhanced Critical Thinking Skills through Problem-Solving Games in Secondary Schools

    Science.gov (United States)

    McDonald, Scott Douglas

    2017-01-01

    Aim/Purpose: Students face many challenges improving their soft skills such as critical thinking. This paper offers one possible solution to this problem. Background: This paper considers one method of enhancing critical thinking through a problem-solving game called the Coffee Shop. Problem-solving is a key component to critical thinking, and…

  13. Enhanced Critical Thinking Skills through Problem-Solving Games in Secondary Schools

    OpenAIRE

    Scott D McDonald

    2017-01-01

    Aim/Purpose: Students face many challenges improving their soft skills such as critical thinking. This paper offers one possible solution to this problem. Background: This paper considers one method of enhancing critical thinking through a problem-solving game called the Coffee Shop. Problem-solving is a key component to critical thinking, and game-playing is one method of enhancing this through an interactive teaching method. Methodology: Three classes of Vietnamese high school stude...

  14. Coastal terrorism: using tabletop discussions to enhance coastal community infrastructure through relationship building.

    Science.gov (United States)

    Richter, Jane; Livet, Melanie; Stewart, Jill; Feigley, Charles E; Scott, Geoff; Richter, Donna L

    2005-11-01

    The unique vulnerability of the nation's ports to terrorist attacks and other major disasters requires development of specialized training approaches that integrate and connect critical stakeholders. In 2003, the University of South Carolina Center for Public Health Preparedness developed and held its first Coastal Terrorism workshop in conjunction with the National Oceanic and Atmospheric Administration. Key federal, regional, state, and coastal agency leaders were invited to the 2-day event to explore, in a no-risk environment, the crucial role that public health agencies would play in a covert biological agent incident aboard a cruise ship. The incident began as a possible outbreak of a Norwalk-like viral agent; however, as the scenario unfolded, evidence of a terrorist plot emerged. This immediately shifted the scenario from a public health-dominated incident to one directed by law enforcement. Communication and coordination issues surfaced illustrating potential conflicts between disciplines and jurisdictions in terms of roles and responsibilities of responding agencies. The goals of the workshop were to facilitate communication and interagency networking among coastal stakeholders while assessing their training and research needs and increasing their familiarity with resources and protocols regarding a bioterrorist coastal event. Positive systems changes were observed.

  15. Monitoring of levees, bridges, pipelines, and other critical infrastructure during the 2011 flooding in the Mississippi River Basin: Chapter J in 2011 floods of the central United States

    Science.gov (United States)

    Densmore, Brenda K.; Burton, Bethany L.; Dietsch, Benjamin J.; Cannia, James C.; Huizinga, Richard J.

    2014-01-01

    During the 2011 Mississippi River Basin flood, the U.S. Geological Survey evaluated aspects of critical river infrastructure at the request of and in support of local, State, and Federal Agencies. Geotechnical and hydrographic data collected by the U.S. Geological Survey at numerous locations were able to provide needed information about 2011 flood effects to those managing the critical infrastructure. These data were collected and processed in a short time frame to provide managers the ability to make a timely evaluation of the safety of the infrastructure and, when needed, to take action to secure and protect critical infrastructure. Critical infrastructure surveyed by the U.S. Geological Survey included levees, bridges, pipeline crossings, power plant intakes and outlets, and an electrical transmission tower. Capacitively coupled resistivity data collected along the flood-protection levees surrounding the Omaha Public Power District Nebraska City power plant (Missouri River Levee Unit R573), mapped the near-subsurface electrical properties of the levee and the materials immediately below it. The near-subsurface maps provided a better understanding of the levee construction and the nature of the lithology beneath the levee. Comparison of the capacitively coupled resistivity surveys and soil borings indicated that low-resistivity value material composing the levee generally is associated with lean clay and silt to about 2 to 4 meters below the surface, overlying a more resistive layer associated with sand deposits. In general, the resistivity structure becomes more resistive to the south and the southern survey sections correlate well with the borehole data that indicate thinner clay and silt at the surface and thicker sand sequences at depth in these sections. With the resistivity data Omaha Public Power District could focus monitoring efforts on areas with higher resistivity values (coarser-grained deposits or more loosely compacted section), which typically are

  16. Enhancing students’ critical thinking skills through critical thinking assessment in calculus course

    Science.gov (United States)

    Zulfaneti; Edriati, S.; Mukhni

    2018-01-01

    This study aims to determine the development of students’ critical thinking skills through the implementation of critical thinking instruments in Calculus lectures. The instruments consist of observation sheets, critical thinking test, self-assessment, peer assessment and portfolio. The research was a qualitative research; with the participants were 53 first-year students who take Integral Calculus in Mathematics Education Department STKIP PGRI Sumatera Barat representing high-ability students, medium and low. The data in this study were collected by tests, interviews, observations and field notes. Data were analyzed descriptively; data reduction, data presentation, and conclusions. For testing the validity of data, it was used credibility test data by increasing persistence and triangulation. The results showed that in high-level students there is a change of ability from Critical enough to be Very Critical, in the students with moderate and low ability there is a change of ability from Uncritical to Critical. So it can be concluded that the assessment instruments have a good contribution and can improve the ability of critical thinking.

  17. Medical Education to Enhance Critical Consciousness: Facilitators' Experiences.

    Science.gov (United States)

    Zaidi, Zareen; Vyas, Rashmi; Verstegen, Danielle; Morahan, Page; Dornan, Tim

    2017-11-01

    To analyze educators' experiences of facilitating cultural discussions in two global health professions education programs and what these experiences had taught them about critical consciousness. A multicultural research team conducted in-depth interviews with 16 faculty who had extensive experience facilitating cultural discussions. They analyzed transcripts of the interviews thematically, drawing sensitizing insights from Gramsci's theory of cultural hegemony. Collaboration and conversation helped the team self-consciously examine their positions toward the data set and be critically reflexive. Participant faculty used their prior experience facilitating cultural discussions to create a "safe space" in which learners could develop critical consciousness. During multicultural interactions they recognized and explicitly addressed issues related to power differentials, racism, implicit bias, and gender bias. They noted the need to be "facile in attending to pain" as learners brought up traumatic experiences and other sensitive issues including racism and the impact of power dynamics. They built relationships with learners by juxtaposing and exploring the sometimes-conflicting norms of different cultures. Participants were reflective about their own understanding and tendency to be biased. They aimed to break free of such biases while role modeling how to have the courage to speak up. Experience had given facilitators in multicultural programs an understanding of their responsibility to promote critical consciousness and social justice. How faculty without prior experience or expertise could develop those values and skills is a topic for future research.

  18. Enhancing Critical Thinking by Teaching Two Distinct Approaches to Management

    Science.gov (United States)

    Dyck, Bruno; Walker, Kent; Starke, Frederick A.; Uggerslev, Krista

    2012-01-01

    The authors explore the effect on students' critical thinking of teaching only one approach to management versus teaching two approaches to management. Results from a quasiexperiment--which included a survey, interviews, and case analysis--suggest that compared with students who are taught only a conventional approach to management (which…

  19. New York Solar Smart DG Hub-Resilient Solar Project: Economic and Resiliency Impact of PV and Storage on New York Critical Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Anderson, Kate; Burman, Kari; Simpkins, Travis; Helson, Erica; Lisell, Lars, Case, Tria

    2016-06-01

    Resilient PV, which is solar paired with storage ('solar-plus-storage'), provides value both during normal grid operation and power outages as opposed to traditional solar PV, which functions only when the electric grid is operating. During normal grid operations, resilient PV systems help host sites generate revenue and/or reduce electricity bill charges. During grid outages, resilient PV provides critical emergency power that can help people in need and ease demand on emergency fuel supplies. The combination of grid interruptions during recent storms, the proliferation of solar PV, and the growing deployment of battery storage technologies has generated significant interest in using these assets for both economic and resiliency benefits. This report analyzes the technical and economic viability for resilient PV on three critical infrastructure sites in New York City (NYC): a school that is part of a coastal storm shelter system, a fire station, and a NYCHA senior center that serves as a cooling center during heat emergencies. This analysis differs from previous solar-plus-storage studies by placing a monetary value on resiliency and thus, in essence, modeling a new revenue stream for the avoided cost of a power outage. Analysis results show that resilient PV is economically viable for NYC's critical infrastructure and that it may be similarly beneficial to other commercial buildings across the city. This report will help city building owners, managers, and policymakers better understand the economic and resiliency benefits of resilient PV. As NYC fortifies its building stock against future storms of increasing severity, resilient PV can play an important role in disaster response and recovery while also supporting city greenhouse gas emission reduction targets and relieving stress to the electric grid from growing power demands.

  20. Does Podcast Use Enhance Critical Thinking in Nursing Education?

    Science.gov (United States)

    Blum, Cynthia A

    The purpose of this pilot interventional study was to examine relationships between adjunctive podcast viewing and nursing students' critical thinking (CT) abilities. Participants were last semester/preceptorship nursing students. The intervention group was given unrestricted access to a CT podcast. There was no statistical significance between Health Sciences Reasoning Test pretest and posttest scores, the number of times the podcast was viewed, and specific demographic factors. The results suggest that CT podcast viewing did not improve CT abilities. However, Likert scale results indicated students liked this method of learning. Demographic factors and sample size were limited, and further research is recommended.

  1. Scenario-based resilience assessment framework for critical infrastructure systems: Case study for seismic resilience of seaports

    International Nuclear Information System (INIS)

    Shafieezadeh, Abdollah; Ivey Burden, Lindsay

    2014-01-01

    A number of metrics in the past have been proposed and numerically implemented to assess the overall performance of large systems during natural disasters and their recovery in the aftermath of the events. Among such performance measures, resilience is a reliable metric. This paper proposes a probabilistic framework for scenario-based resilience assessment of infrastructure systems. The method accounts for uncertainties in the process including the correlation of the earthquake intensity measures, fragility assessment of structural components, estimation of repair requirements, the repair process, and finally the service demands. The proposed method is applied to a hypothetical seaport terminal and the system level performance of the seaport is assessed using various performance metrics. Results of this analysis have shown that medium to large seismic events may significantly disrupt the operation of seaports right after the event and the recovery process may take months. The proposed framework will enable port stakeholders to systematically assess the most-likely performance of the system during expected future earthquake events. - Highlights: • A scenario-based framework for seismic resilience assessment of systems is presented. • Seismic resilience of a hypothetical seaport with realistic settings is studied. • Berth availability is found to govern seaport functionality following earthquakes

  2. Making green infrastructure healthier infrastructure

    Directory of Open Access Journals (Sweden)

    Mare Lõhmus

    2015-11-01

    Full Text Available Increasing urban green and blue structure is often pointed out to be critical for sustainable development and climate change adaptation, which has led to the rapid expansion of greening activities in cities throughout the world. This process is likely to have a direct impact on the citizens’ quality of life and public health. However, alongside numerous benefits, green and blue infrastructure also has the potential to create unexpected, undesirable, side-effects for health. This paper considers several potential harmful public health effects that might result from increased urban biodiversity, urban bodies of water, and urban tree cover projects. It does so with the intent of improving awareness and motivating preventive measures when designing and initiating such projects. Although biodiversity has been found to be associated with physiological benefits for humans in several studies, efforts to increase the biodiversity of urban environments may also promote the introduction and survival of vector or host organisms for infectious pathogens with resulting spread of a variety of diseases. In addition, more green connectivity in urban areas may potentiate the role of rats and ticks in the spread of infectious diseases. Bodies of water and wetlands play a crucial role in the urban climate adaptation and mitigation process. However, they also provide habitats for mosquitoes and toxic algal blooms. Finally, increasing urban green space may also adversely affect citizens allergic to pollen. Increased awareness of the potential hazards of urban green and blue infrastructure should not be a reason to stop or scale back projects. Instead, incorporating public health awareness and interventions into urban planning at the earliest stages can help insure that green and blue infrastructure achieves full potential for health promotion.

  3. Making green infrastructure healthier infrastructure.

    Science.gov (United States)

    Lõhmus, Mare; Balbus, John

    2015-01-01

    Increasing urban green and blue structure is often pointed out to be critical for sustainable development and climate change adaptation, which has led to the rapid expansion of greening activities in cities throughout the world. This process is likely to have a direct impact on the citizens' quality of life and public health. However, alongside numerous benefits, green and blue infrastructure also has the potential to create unexpected, undesirable, side-effects for health. This paper considers several potential harmful public health effects that might result from increased urban biodiversity, urban bodies of water, and urban tree cover projects. It does so with the intent of improving awareness and motivating preventive measures when designing and initiating such projects. Although biodiversity has been found to be associated with physiological benefits for humans in several studies, efforts to increase the biodiversity of urban environments may also promote the introduction and survival of vector or host organisms for infectious pathogens with resulting spread of a variety of diseases. In addition, more green connectivity in urban areas may potentiate the role of rats and ticks in the spread of infectious diseases. Bodies of water and wetlands play a crucial role in the urban climate adaptation and mitigation process. However, they also provide habitats for mosquitoes and toxic algal blooms. Finally, increasing urban green space may also adversely affect citizens allergic to pollen. Increased awareness of the potential hazards of urban green and blue infrastructure should not be a reason to stop or scale back projects. Instead, incorporating public health awareness and interventions into urban planning at the earliest stages can help insure that green and blue infrastructure achieves full potential for health promotion.

  4. Enhancement of Students' Independent Learning through Their Critical Thinking Skills Development

    Science.gov (United States)

    Kopzhassarova, Umit; Akbayeva, Gulden; Eskazinova, Zhanar; Belgibayeva, Gulbarshyn; Tazhikeyeva, Akerke

    2016-01-01

    The article focuses on the problem of developing students' critical thinking skills, which help them become independent learners. Analysis of research works of educators and scholars enable the authors to reveal qualities, necessary for students to enhance their critical thinking skills and become independent learners. Different points of view on…

  5. An experience of knowledge co-production for setting up landslide risk management processes in a critical infrastructure: the case of Campania Region (Southern Italy)

    Science.gov (United States)

    Rianna, Guido; Roca Collell, Marta; Uzielli, Marco; Van Ruiten, Kees; Mercogliano, Paola; Ciervo, Fabio; Reder, Alfredo

    2017-04-01

    In Campania Region (Southern Italy), expected increases in heavy rainfall events under the effect of climate changes and demographic pressure could entail a growth of occurrence of weather induced landslides and associated damages. Indeed, already in recent years, pyroclastic covers mantling the slopes of a large part of the Region have been affected by numerous events often causing victims and damages to infrastructures serving the urban centers. Due to the strategic relevance of the area, landslide events affecting volcanic layers in Campania Region are one of the five case studies investigated in the FP7 European Project INTACT about the impacts of extreme weather on critical infrastructure. The main aim of INTACT project is to increase the resilience of critical infrastructures (CI) facing extreme weather events improving the awareness of stakeholders and asset managers about such phenomena and their potential variations due to Climate Changes and providing tools to support risk management strategies. A WIKI has been designed as a remote support for all stages of the risk process through brief theoretical explanations (in Wiki style) about tools and methods proposed and reports on the findings and hints returned by case studies investigations. In order to have a product tailored to the needs and background of CI owners, managers and policy makers, an intense effort of knowledge co-production between researchers and stakeholders have been carried out in different case studies through questionnaires, meetings, workshops and/or 1-to-1 interviews. This work presents the different tools and approaches adopted to facilitate the exchange with stakeholders in the Campanian case study such as the "Storytelling approach", aiming to stress the need for a comprehensive and overall approach to the issue between the different disaster management phases (mitigation, preparedness, response and recovery) and actors; the CIRCLE approach developed by Deltares, partner in INTACT

  6. Enhancing Context Analysis with Intelligence in Providing e-Health Services: Less Infrastructure Dependency in Supporting Cardio-Vascular Patients

    OpenAIRE

    Verbraeck, A.; Widya, I.A.; Shishkov, Boris; Cordeiro, J.; Ranchordas, A.

    2009-01-01

    In Europe, we observe an increasing number of people with health problems, who could theoretically receive care outside of a hospital when their condition could be properly monitored. Not being able to provide this monitoring leads to an increasing pressure on an already overcrowded hospital system and increased costs. Ubiquitous technology on top of a high-quality IT infra-structure has already proven to be able to provide partial solutions. However, such infrastructure is not available thro...

  7. Vulnerability assessment of critical infrastructure : activity 2 final report : information on SCADA systems and other security monitoring techniques used in oil and gas pipelines

    Energy Technology Data Exchange (ETDEWEB)

    Gu, G.P.; Revie, R.W. [Natural Resources Canada, Ottawa, ON (Canada). CANMET Materials Technology Laboratory

    2008-03-15

    This study evaluated various technologies for monitoring the security of remote pipeline infrastructure. The technologies included flow, pressure and mass variations; negative pressure waves; dynamic and statistical modelling; hydrocarbon-sensitive cables; fiber optic systems; infrared thermography; spectral imaging; and synthetic aperture radar and radio frequency identification methods. A brief outline of the technologies was provided, along with suggestions for integrating the technology with other commercially available tools designed to manage security and reduce risk. The study demonstrated that many monitoring technologies are suitable for detecting pipeline leaks and identifying third party intrusions. A combination of different methods may provide optimal security and accuracy in leak detection and location. Automatic range and plausibility checks can be used to enhance system security and to recognize invalid changes in measuring devices and poorly parameterized media. Detailed reviews of the technologies were included in 2 appendices. 28 refs., 2 appendices.

  8. Critical thinking instruction and technology enhanced learning from the student perspective: A mixed methods research study.

    Science.gov (United States)

    Swart, Ruth

    2017-03-01

    Critical thinking is acclaimed as a valuable asset for graduates from higher education programs. Technology has advanced in quantity and quality; recognized as a requirement of 21st century learners. A mixed methods research study was undertaken, examining undergraduate nursing student engagement with critical thinking instruction, platformed on two technology-enhanced learning environments: a classroom response system face-to-face in-class and an online discussion forum out-of-class. The Community of Inquiry framed the study capturing constructivist collaborative inquiry to support learning, and facilitate critical thinking capability. Inclusion of quantitative and qualitative data sources aimed to gather a comprehensive understanding of students' development of critical thinking and engagement with technology-enhanced learning. The findings from the students' perspectives were positive toward the inclusion of technology-enhanced learning, and use in supporting their development of critical thinking. Students considered the use of two forms of technology beneficial in meeting different needs and preferences, offering varied means to actively participate in learning. They valued critical thinking instruction being intentionally aligned with subject-specific content facilitating understanding, application, and relevance of course material. While the findings are limited to student participants, the instructional strategies and technology-enhanced learning identified as beneficial can inform course design for the development of critical thinking. Copyright © 2017 Elsevier Ltd. All rights reserved.

  9. Using the 5E Learning Cycle with Metacognitive Technique to Enhance Students’ Mathematical Critical Thinking Skills

    Directory of Open Access Journals (Sweden)

    Runisah Runisah

    2017-02-01

    Full Text Available This study aims to describe enhancement and achievement of mathematical critical thinking skills of students who received the 5E Learning Cycle with Metacognitive technique, the 5E Learning Cycle, and conventional learning. This study use experimental method with pretest-posttest control group design. Population are junior high school students in Indramayu city, Indonesia. Sample are three classes of eighth grade students from high level school and three classes from medium level school. The study reveal that in terms of overall, mathematical critical thinking skills enhancement and achievement of students who received the 5E Learning Cycle with Metacognitive technique is better than students who received the 5E Learning Cycle and conventional learning. Mathematical critical thinking skills of students who received the 5E Learning Cycle is better than students who received conventional learning. There is no interaction effect between learning model and school level toward enhancement and achievement of students’ mathematical critical thinking skills.

  10. Greening infrastructure

    CSIR Research Space (South Africa)

    Van Wyk, Llewellyn V

    2014-10-01

    Full Text Available The development and maintenance of infrastructure is crucial to improving economic growth and quality of life (WEF 2013). Urban infrastructure typically includes bulk services such as water, sanitation and energy (typically electricity and gas...

  11. Hierarchical modular structure enhances the robustness of self-organized criticality in neural networks

    International Nuclear Information System (INIS)

    Wang Shengjun; Zhou Changsong

    2012-01-01

    One of the most prominent architecture properties of neural networks in the brain is the hierarchical modular structure. How does the structure property constrain or improve brain function? It is thought that operating near criticality can be beneficial for brain function. Here, we find that networks with modular structure can extend the parameter region of coupling strength over which critical states are reached compared to non-modular networks. Moreover, we find that one aspect of network function—dynamical range—is highest for the same parameter region. Thus, hierarchical modularity enhances robustness of criticality as well as function. However, too much modularity constrains function by preventing the neural networks from reaching critical states, because the modular structure limits the spreading of avalanches. Our results suggest that the brain may take advantage of the hierarchical modular structure to attain criticality and enhanced function. (paper)

  12. Bike Infrastructures

    DEFF Research Database (Denmark)

    Silva, Victor; Harder, Henrik; Jensen, Ole B.

    Bike Infrastructures aims to identify bicycle infrastructure typologies and design elements that can help promote cycling significantly. It is structured as a case study based research where three cycling infrastructures with distinct typologies were analyzed and compared. The three cases......, the findings of this research project can also support bike friendly design and planning, and cyclist advocacy....

  13. The critical success factor approach to strategic alignment: seeking a trail from a health organization's goals to its management information infrastructure.

    Science.gov (United States)

    Tan, J K

    1999-11-01

    The critical success factor (CSF) approach is a technique that will aid health administrators, planners and managers to identify, specify and sort among the most relevant and critical factors determining an organization's survival and success. Following a top-down management perspective, this paper discusses the CSF methodology as a strategic information management process comprising several important phases: (i) understanding the external factors such as the organization's industry, market and environment; (ii) achieving strong support and championship from top management; (iii) encouraging the proactive involvement of management and staff in generic CSF identification; (iv) educating and directing the participation of staff members in CSF verification and further refinement of generic CSFs into specific CSFs; and (v) aggregating, prioritizing and translating activity-related CSFs into organizational information requirements for the design of the organization's management information infrastructure. The implementation of this CSF approach is illustrated in the context of a British Columbia community hospital, with insights provided into key issues for future health researchers and practitioners.

  14. Experiment of enhancing critical current in Bi-2223/Ag tape by means of ferromagnetic shielding

    Energy Technology Data Exchange (ETDEWEB)

    Alamgir, A.K.M. [Applied Superconductivity Research Center, Department of Physics, Tsinghua University, Beijing 100084 (China)]. E-mail: alam643@hotmail.com; Gu, C. [Applied Superconductivity Research Center, Department of Physics, Tsinghua University, Beijing 100084 (China); Han, Z. [Applied Superconductivity Research Center, Department of Physics, Tsinghua University, Beijing 100084 (China)

    2005-11-15

    Critical current in multifilamentary Ag-sheath Bi-2223 tape is enhanced to some extent by means of thin and narrow coating of pure nickel. The concept of enhancing critical current is based on the magnetic shielding effect resulting in redirection of self-field flux lines. The Ni coating was introduced at the edge regime of the tape in order to redirect the perpendicular component of self-field lines which is severe at the edges. Critical current in a typical Ag-sheath Bi-2223 tape was enhanced up to {approx}11% by 50 {mu}m thick and 0.4 mm long Ni coating without any change of self-field loss. This fact reveals that additional ferromagnetic loss could be compensated by the shielding effect and increased critical current of the tape. The degree of enhancement in critical current as well as ferromagnetic impact on ac losses depend on the length and thickness of ferromagnetic coating introduced. Therefore, it is very important to control the geometry of ferromagnetic coating in order to balance the critical current and ac loss for optimum superconductor performance. Introduction of ferromagnetic coating and its effect on electromagnetic properties in multifilamentary Bi-2223/Ag tape will be reported in this article.

  15. Experiment of enhancing critical current in Bi-2223/Ag tape by means of ferromagnetic shielding

    International Nuclear Information System (INIS)

    Alamgir, A.K.M.; Gu, C.; Han, Z.

    2005-01-01

    Critical current in multifilamentary Ag-sheath Bi-2223 tape is enhanced to some extent by means of thin and narrow coating of pure nickel. The concept of enhancing critical current is based on the magnetic shielding effect resulting in redirection of self-field flux lines. The Ni coating was introduced at the edge regime of the tape in order to redirect the perpendicular component of self-field lines which is severe at the edges. Critical current in a typical Ag-sheath Bi-2223 tape was enhanced up to ∼11% by 50 μm thick and 0.4 mm long Ni coating without any change of self-field loss. This fact reveals that additional ferromagnetic loss could be compensated by the shielding effect and increased critical current of the tape. The degree of enhancement in critical current as well as ferromagnetic impact on ac losses depend on the length and thickness of ferromagnetic coating introduced. Therefore, it is very important to control the geometry of ferromagnetic coating in order to balance the critical current and ac loss for optimum superconductor performance. Introduction of ferromagnetic coating and its effect on electromagnetic properties in multifilamentary Bi-2223/Ag tape will be reported in this article

  16. Using a kinesthetic learning strategy to engage nursing student thinking, enhance retention, and improve critical thinking.

    Science.gov (United States)

    Wagner, Elissa A

    2014-06-01

    This article reports the outcomes of a kinesthetic learning strategy used during a cardiac lecture to engage students and to improve the use of classroom-acquired knowledge in today's challenging clinical settings. Nurse educators are constantly faced with finding new ways to engage students, stimulate critical thinking, and improve clinical application in a rapidly changing and complex health care system. Educators who deviate from the traditional pedagogy of didactic, content-driven teaching to a concept-based, student-centered approach using active and kinesthetic learning activities can enhance engagement and improve clinical problem solving, communication skills, and critical thinking to provide graduates with the tools necessary to be successful. The goals of this learning activity were to decrease the well-known classroom-clinical gap by enhancing engagement, providing deeper understanding of cardiac function and disorders, enhancing critical thinking, and improving clinical application. Copyright 2014, SLACK Incorporated.

  17. Phonon-induced enhancements of the energy gap and critical current in superconducting aluminum

    International Nuclear Information System (INIS)

    Seligson, D.

    1983-05-01

    8 to 10 GHz phonons were generated by piezoelectric transduction of a microwave and by means of a quartz delay line, were allowed to enter the aluminum only after the microwaves had long since disappeared. The maximum enhancements detected were [deltaT/T/sub c/] = -0.07, for i/sub c/ and [deltaT/T/sub c/] = -0.03 for Δ. The power- and temperature-dependence (0.82 less than or equal to T/T/sub c/ less than or equal to 0.994) of the enhancements were compared with the prediction of a theory given by Eliashberg. The gap-enhancement was in good agreement with the theory only for low input lower. The critical current measurements are predicted to be in rough agreement with the Δ measurements but this was not observed. The magnitude of the critical current enhancements was typically more than twice the observed gap enhancements. The measured critical current enhancement was relatively independent of temperature whereas the gap enhancement decreased rapidly as the temperature was lowered

  18. Public-Private Partnerships for the Provision of Port Infrastructure: An Explorative Multi-Actor Perspective on Critical Success Factors1

    Directory of Open Access Journals (Sweden)

    Geoffrey Aerts

    2014-12-01

    Full Text Available Public-private cooperation on the level of project finance, and provision of large-scale infrastructure projects, is increasing on the global level. This paper uses a multi-actor analysis, in order to explore the critical success factors (CSFs for sound implementation of public-private partnerships (PPPs in the port context, and to determine the diverging opinions of stakeholders with regard to the importance of these CSFs. The results indicate that eight CSFs are of superior importance in port PPPs: the concreteness and preciseness of the concession agreement, the ability to appropriately allocate and share risk, the technical feasibility of the project, the commitment made by partners, the attractiveness of the financial package, a clear definition of responsibilities, the presence of a strong private consortium and a realistic cost/benefit assessment. The reason for their importance is their deal-breaking character, which can lead to a total failure of PPP projects during the early stages of project conception.

  19. Advanced methods for the risk, vulnerability and resilience assessment of safety-critical engineering components, systems and infrastructures, in the presence of uncertainties

    International Nuclear Information System (INIS)

    Pedroni, Nicolas

    2016-01-01

    Safety-critical industrial installations (e.g., nuclear plants) and infrastructures (e.g., power transmission networks) are complex systems composed by a multitude and variety of heterogeneous 'elements', which are highly interconnected and mutually dependent. In addition, such systems are affected by large uncertainties in the characterization of the failure and recovery behavior of their components, interconnections and interactions. Such characteristics raise concerns with respect to the system risk, vulnerability and resilience properties, which have to be accurately and precisely assessed for decision making purposes. In general, this entails the following main steps: (1) representation of the system to capture its main features; (2) construction of a mathematical model of the system; (3) simulation of the behavior of the system under various uncertain conditions to evaluate the relevant risk, vulnerability and resilience metrics by propagating the uncertainties through the mathematical model; (4) decision making to (optimally) determine the set of protective actions to effectively reduce (resp., increase) the system risk and vulnerability (resp., resilience). New methods to address these issues have been developed in this dissertation. Specifically, the research works have been carried out along two main axes: (1) the study of approaches for uncertainty modeling and quantification; (2) the development of advanced computational methods for the efficient system modeling, simulation and analysis in the presence of uncertainties. (author)

  20. Determinants of Critical Infrastructure Resources

    Directory of Open Access Journals (Sweden)

    Ostrowska Teresa

    2017-12-01

    Full Text Available This article is devoted to the issue of how resources are interpreted in the form of technology reactors that, as a result of unexpected circumstances, turn into pyramidal or avalanche threat dynamics. Counteracting such catastrophic, terrorist, or war situations cannot begin in the face of mass casualties or significant material losses that will require reconstruction and the work of many generations. The decisive factor is the correct long-term operation and management of the economy. The starting point of this article is the concept of resource and structural-functional relationships of resources and all their possible interpretations consistent with the functionalities they play in the human environment, human aggregates, and whole nations. The aim is to draw the reader's attention to the importance (semiotics of qualitative specifications and dynamically changing determinants contained in the material and structural-functional properties of the resources and their channel (information communication.

  1. Cyber security of critical infrastructures

    Directory of Open Access Journals (Sweden)

    Leandros A. Maglaras

    2018-03-01

    Full Text Available Modern Supervisory Control and Data Acquisition (SCADA systems are essential for monitoring and managing electric power generation, transmission and distribution. In the age of the Internet of Things, SCADA has evolved into big, complex and distributed systems that are prone to be conventional in addition to new threats. Many security methods can be applied to such systems, having in mind that both high efficiency, real time intrusion identification and low overhead are required. Keywords: SCADA systems, Security

  2. Enhancement of critical currents in superconducting cylindrical samples by circular magnetization

    Energy Technology Data Exchange (ETDEWEB)

    Sikora, A; Makiej, B

    1986-07-16

    Evidence is presented for an enhancement of the critical current by a circular magnetization in cylindrical samples of superconductors such as Sn, In, and In-Pb alloy containing 20 wt% ferromagnetic carbon steel particles. The mechanism of this phenomenon is explained.

  3. Putting the Critical Back in Critical Infrastructure

    Science.gov (United States)

    2015-12-01

    more clearly understood, programmatically consumable, and 95 Carmen Ferro, David Henry , and...Bassett, W. A. Buehring, M. J. Collins, D. C. Dickinson, L. K. Eaton, K. E. Wallace , R. G. Whitfield, and J. P. Peerenboom. Constructing a Resilience

  4. Critical current enhancement by Lorentz force reduction in superconductor-ferromagnet nanocomposites

    International Nuclear Information System (INIS)

    Blamire, M G; Dinner, R B; Wimbush, S C; MacManus-Driscoll, J L

    2009-01-01

    Ferromagnetic pinning centres in superconductors form much deeper potential wells than equivalent insulating or metallic non-superconducting inclusions. However, the resultant pinning forces arising from magnetic inclusions are low because the magnetic interaction takes place over the length scale of the magnetic penetration depth which is large in technological superconductors. Nonetheless, we show that a magnetic inclusion can also reduce the Lorentz force on a vortex, yielding a substantially enhanced critical current density for a given pinning force. We calculate this enhancement for a single vortex pinned by a paramagnetic cylinder as well as a vortex lattice interacting with magnetic inclusions, and find that the inclusion of ferromagnetic particles or rods offers a practical means of enhancing the critical currents in oxide high temperature superconductors.

  5. Phonon-induced enhancements of the energy gap and critical current in superconducting aluminum

    International Nuclear Information System (INIS)

    Seligson, D.

    1983-01-01

    The enhancement of the energy gap, Δ, and critical current, i/sub c/, in superconducting aluminum thin films were under the influence of 8 to 10 GHz phonons. The phonons were generated by piezoelectric transduction of a 1 kW microwave pulse of about 1 μsec duration. By means of a quartz delay line, the phonons were allowed to enter the aluminum only after the microwaves had long since disappeared. The critical current was measured in long narrow Al strips, in which the current flow is 1-dimensional and well described by Ginsburg-Landau theory. To measure Δ the Al film was used as one electrode in a superconductor-insulator-superconductor tunnel junction whose current-voltage characteristic gave Δ directly. For the measurements of i/sub c/, the total critical current was measured in the presence of the phonon perturbation. For the measurements of Δ the change of Δ away from its equilibrium value was measured. In both cases the first measurements of enhancement of these macroscopic variables under phonon irradiation is reported. The gap-enhancement was found to be in good agreement with theory, but only for relatively and surprisingly low input power. The critical current measurements are predicted to be in rough agreement with the Δ measurements but this was not observed

  6. Optimizing critical heat flux enhancement through nano-particle-based surface modifications

    International Nuclear Information System (INIS)

    Truong, B.; Hu, L. W.; Buongiorno, J.

    2008-01-01

    Colloidal dispersions of nano-particles, also known as nano-fluids, have shown to yield significant Critical Heat Flux (CHF) enhancement. The CHF enhancement mechanism in nano-fluids is due to the buildup of a porous layer of nano-particles upon boiling. Unlike microporous coatings that had been studied extensively, nano-particles have the advantages of forming a thin layer on the substrate with surface roughness ranges from the sub-micron to several microns. By tuning the chemical properties it is possible to coat the nano-particles in colloidal dispersions onto the desired surface, as has been demonstrated in engineering thin film industry. Building on recent work conducted at MIT, this paper illustrates the maximum CHF enhancement that can be achieved based on existing correlations. Optimization of the CHF enhancement by incorporation of key factors, such as the surface wettability and roughness, will also be discussed. (authors)

  7. Current distribution and enhancement of the engineering critical current density in multifilament Bi-2223 tapes

    DEFF Research Database (Denmark)

    Wang, W.G.; Jensen, M.B.; Kindl, B.

    2000-01-01

    The spatial distribution of the critical current density (Jc) and engineering critical current density (Je) along the tape width direction was studied by a cutting technique on Bi-2223 multifilamentary tapes. In general, an increase of Jc towards the centre of the tape was measured. We attribute...... microstructure with a great amount of secondary phases. Local variation of Jc was measured within the centre segment of the tape. This indicates the influence of other factors on Jc, such as filament shape, connectivity of the filaments, and sausaging. Enhancement of Je has been pursued in which average Je of 12...

  8. Environmental assessment: Solid waste retrieval complex, enhanced radioactive and mixed waste storage facility, infrastructure upgrades, and central waste support complex, Hanford Site, Richland, Washington

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-09-01

    The U.S. Department of Energy (DOE) needs to take action to: retrieve transuranic (TRU) waste because interim storage waste containers have exceeded their 20-year design life and could fail causing a radioactive release to the environment provide storage capacity for retrieved and newly generated TRU, Greater-than-Category 3 (GTC3), and mixed waste before treatment and/or shipment to the Waste Isolation Pilot Project (WIPP); and upgrade the infrastructure network in the 200 West Area to enhance operational efficiencies and reduce the cost of operating the Solid Waste Operations Complex. This proposed action would initiate the retrieval activities (Retrieval) from Trench 4C-T04 in the 200 West Area including the construction of support facilities necessary to carry out the retrieval operations. In addition, the proposed action includes the construction and operation of a facility (Enhanced Radioactive Mixed Waste Storage Facility) in the 200 West Area to store newly generated and the retrieved waste while it awaits shipment to a final disposal site. Also, Infrastructure Upgrades and a Central Waste Support Complex are necessary to support the Hanford Site`s centralized waste management area in the 200 West Area. The proposed action also includes mitigation for the loss of priority shrub-steppe habitat resulting from construction. The estimated total cost of the proposed action is $66 million.

  9. Environmental assessment: Solid waste retrieval complex, enhanced radioactive and mixed waste storage facility, infrastructure upgrades, and central waste support complex, Hanford Site, Richland, Washington

    International Nuclear Information System (INIS)

    1995-09-01

    The U.S. Department of Energy (DOE) needs to take action to: retrieve transuranic (TRU) waste because interim storage waste containers have exceeded their 20-year design life and could fail causing a radioactive release to the environment provide storage capacity for retrieved and newly generated TRU, Greater-than-Category 3 (GTC3), and mixed waste before treatment and/or shipment to the Waste Isolation Pilot Project (WIPP); and upgrade the infrastructure network in the 200 West Area to enhance operational efficiencies and reduce the cost of operating the Solid Waste Operations Complex. This proposed action would initiate the retrieval activities (Retrieval) from Trench 4C-T04 in the 200 West Area including the construction of support facilities necessary to carry out the retrieval operations. In addition, the proposed action includes the construction and operation of a facility (Enhanced Radioactive Mixed Waste Storage Facility) in the 200 West Area to store newly generated and the retrieved waste while it awaits shipment to a final disposal site. Also, Infrastructure Upgrades and a Central Waste Support Complex are necessary to support the Hanford Site's centralized waste management area in the 200 West Area. The proposed action also includes mitigation for the loss of priority shrub-steppe habitat resulting from construction. The estimated total cost of the proposed action is $66 million

  10. Critical dimension and pattern size enhancement using pre-strained lithography

    Energy Technology Data Exchange (ETDEWEB)

    Hong, Jian-Wei [Department of Power Mechanical Engineering, National Tsing Hua University, 101, Section 2, Kuang Fu Road, Hsin Chu 30013, Taiwan (China); Yang, Chung-Yuan [Institute of NanoEngineering and MicroSystems, National Tsing Hua University, 101, Section 2, Kuang Fu Road, Hsin Chu 30013, Taiwan (China); Lo, Cheng-Yao, E-mail: chengyao@mx.nthu.edu.tw [Department of Power Mechanical Engineering, National Tsing Hua University, 101, Section 2, Kuang Fu Road, Hsin Chu 30013, Taiwan (China); Institute of NanoEngineering and MicroSystems, National Tsing Hua University, 101, Section 2, Kuang Fu Road, Hsin Chu 30013, Taiwan (China)

    2014-10-13

    This paper proposes a non-wavelength-shortening-related critical dimension and pattern size reduction solution for the integrated circuit industry that entails generating strain on the substrate prior to lithography. Pattern size reduction of up to 49% was achieved regardless of shape, location, and size on the xy plane, and complete theoretical calculations and process steps are described in this paper. This technique can be applied to enhance pattern resolution by employing materials and process parameters already in use and, thus, to enhance the capability of outdated lithography facilities, enabling them to particularly support the manufacturing of flexible electronic devices with polymer substrates.

  11. Cyber and physical infrastructure interdependencies.

    Energy Technology Data Exchange (ETDEWEB)

    Phillips, Laurence R.; Kelic, Andjelka; Warren, Drake E.

    2008-09-01

    The goal of the work discussed in this document is to understand the risk to the nation of cyber attacks on critical infrastructures. The large body of research results on cyber attacks against physical infrastructure vulnerabilities has not resulted in clear understanding of the cascading effects a cyber-caused disruption can have on critical national infrastructures and the ability of these affected infrastructures to deliver services. This document discusses current research and methodologies aimed at assessing the translation of a cyber-based effect into a physical disruption of infrastructure and thence into quantification of the economic consequences of the resultant disruption and damage. The document discusses the deficiencies of the existing methods in correlating cyber attacks with physical consequences. The document then outlines a research plan to correct those deficiencies. When completed, the research plan will result in a fully supported methodology to quantify the economic consequences of events that begin with cyber effects, cascade into other physical infrastructure impacts, and result in degradation of the critical infrastructure's ability to deliver services and products. This methodology enables quantification of the risks to national critical infrastructure of cyber threats. The work addresses the electric power sector as an example of how the methodology can be applied.

  12. MFC Communications Infrastructure Study

    Energy Technology Data Exchange (ETDEWEB)

    Michael Cannon; Terry Barney; Gary Cook; George Danklefsen, Jr.; Paul Fairbourn; Susan Gihring; Lisa Stearns

    2012-01-01

    Unprecedented growth of required telecommunications services and telecommunications applications change the way the INL does business today. High speed connectivity compiled with a high demand for telephony and network services requires a robust communications infrastructure.   The current state of the MFC communication infrastructure limits growth opportunities of current and future communication infrastructure services. This limitation is largely due to equipment capacity issues, aging cabling infrastructure (external/internal fiber and copper cable) and inadequate space for telecommunication equipment. While some communication infrastructure improvements have been implemented over time projects, it has been completed without a clear overall plan and technology standard.   This document identifies critical deficiencies with the current state of the communication infrastructure in operation at the MFC facilities and provides an analysis to identify needs and deficiencies to be addressed in order to achieve target architectural standards as defined in STD-170. The intent of STD-170 is to provide a robust, flexible, long-term solution to make communications capabilities align with the INL mission and fit the various programmatic growth and expansion needs.

  13. Global information infrastructure.

    Science.gov (United States)

    Lindberg, D A

    1994-01-01

    The High Performance Computing and Communications Program (HPCC) is a multiagency federal initiative under the leadership of the White House Office of Science and Technology Policy, established by the High Performance Computing Act of 1991. It has been assigned a critical role in supporting the international collaboration essential to science and to health care. Goals of the HPCC are to extend USA leadership in high performance computing and networking technologies; to improve technology transfer for economic competitiveness, education, and national security; and to provide a key part of the foundation for the National Information Infrastructure. The first component of the National Institutes of Health to participate in the HPCC, the National Library of Medicine (NLM), recently issued a solicitation for proposals to address a range of issues, from privacy to 'testbed' networks, 'virtual reality,' and more. These efforts will build upon the NLM's extensive outreach program and other initiatives, including the Unified Medical Language System (UMLS), MEDLARS, and Grateful Med. New Internet search tools are emerging, such as Gopher and 'Knowbots'. Medicine will succeed in developing future intelligent agents to assist in utilizing computer networks. Our ability to serve patients is so often restricted by lack of information and knowledge at the time and place of medical decision-making. The new technologies, properly employed, will also greatly enhance our ability to serve the patient.

  14. Importance of critical micellar concentration for the prediction of solubility enhancement in biorelevant media.

    Science.gov (United States)

    Ottaviani, G; Wendelspiess, S; Alvarez-Sánchez, R

    2015-04-06

    This study evaluated if the intrinsic surface properties of compounds are related to the solubility enhancement (SE) typically observed in biorelevant media like fasted state simulated intestinal fluids (FaSSIF). The solubility of 51 chemically diverse compounds was measured in FaSSIF and in phosphate buffer and the surface activity parameters were determined. This study showed that the compound critical micellar concentration parameter (CMC) correlates strongly with the solubility enhancement (SE) observed in FaSSIF compared to phosphate buffer. Thus, the intrinsic capacity of molecules to form micelles is also a determinant for each compound's affinity to the micelles of biorelevant surfactants. CMC correlated better with SE than lipophilicity (logD), especially over the logD range typically covered by drugs (2 < logD < 4). CMC can become useful to guide drug discovery scientists to better diagnose, improve, and predict solubility in biorelevant media, thereby enhancing oral bioavailability of drug candidates.

  15. Transportation Security : federal action needed to enhance security efforts : statement of Peter Guerrero, Director, Physical Infrastructure Issues

    Science.gov (United States)

    2003-09-09

    Mr. Guerrero's testimony examines (1) challenges in securing the nation's transportation system; (2) actions transportation operators, as well as state and local governments, have taken since September 11 to enhance security; (3) the federal role in ...

  16. Professional Criticism in the Secondary Classroom: Opposing Judgements of Contemporary Art Enhance the Teaching of Art Criticism.

    Science.gov (United States)

    Lee, Sun-Young

    1993-01-01

    Presents an instructional unit containing five activities centered around paintings by Leon Golub. Helps students understand the processes of art criticism and the social context in which art works are analyzed and criticized. Provides guidelines and questions for a comparative analysis of three contemporary art critics. (CFR)

  17. Building safeguards infrastructure

    International Nuclear Information System (INIS)

    McClelland-Kerr, J.; Stevens, J.

    2010-01-01

    Much has been written in recent years about the nuclear renaissance - the rebirth of nuclear power as a clean and safe source of electricity around the world. Those who question the nuclear renaissance often cite the risk of proliferation, accidents or an attack on a facility as concerns, all of which merit serious consideration. The integration of three areas - sometimes referred to as 3S, for safety, security and safeguards - is essential to supporting the clean and safe growth of nuclear power, and the infrastructure that supports these three areas should be robust. The focus of this paper will be on the development of the infrastructure necessary to support safeguards, and the integration of safeguards infrastructure with other elements critical to ensuring nuclear energy security

  18. Using Quantitative Literacy to Enhance Critical Thinking Skills in Undergraduate Nursing Students.

    Science.gov (United States)

    Asknes, Edna

    2017-04-01

    Critical thinking and quantitative literacy (QL) are similarly grounded: both focus on analyzing and evaluating evidence, identifying implications and consequences, drawing inferences, and communicating information. This teaching strategy was based on those commonalities and was designed so that undergraduate nursing students would enhance their critical thinking skills as they used their QL skills. QL skills are most effective when taught, learned, and used to solve significant, pertinent problems. Using the principles of learner-centered, team-based learning, QL was integrated into the curriculum of the Maternal-Newborn Nursing course at an urban community college with a diverse student population. Students were engaged and demonstrated enhanced and ongoing development of their critical thinking and problem-solving skills. They also reported a better understanding of data interpretation and use. The positive outcome of this project revealed further opportunities for incorporating QL into nursing curricula and highlighted the need for research on the use of QL in nursing education. [J Nurs Educ. 2017;56(4):240-242.]. Copyright 2017, SLACK Incorporated.

  19. Chapter 2. Surge capacity and infrastructure considerations for mass critical care. Recommendations and standard operating procedures for intensive care unit and hospital preparations for an influenza epidemic or mass disaster.

    Science.gov (United States)

    Hick, John L; Christian, Michael D; Sprung, Charles L

    2010-04-01

    To provide recommendations and standard operating procedures for intensive care unit (ICU) and hospital preparations for a mass disaster or influenza epidemic with a specific focus on surge capacity and infrastructure considerations. Based on a literature review and expert opinion, a Delphi process was used to define the essential topics including surge capacity and infrastructure considerations. Key recommendations include: (1) hospitals should increase their ICU beds to the maximal extent by expanding ICU capacity and expanding ICUs into other areas; (2) hospitals should have appropriate beds and monitors for these expansion areas; hospitals should develop contingency plans at the facility and government (local, state, provincial, national) levels to provide additional ventilators; (3) hospitals should develop a phased staffing plan (nursing and physician) for ICUs that provides sufficient patient care supervision during contingency and crisis situations; (4) hospitals should provide expert input to the emergency management personnel at the hospital both during planning for surge capacity as well as during response; (5) hospitals should assure that adequate infrastructure support is present to support critical care activities; (6) hospitals should prioritize locations for expansion by expanding existing ICUs, using postanesthesia care units and emergency departments to capacity, then step-down units, large procedure suites, telemetry units and finally hospital wards. Judicious planning and adoption of protocols for surge capacity and infrastructure considerations are necessary to optimize outcomes during a pandemic.

  20. Infrastructural Fractals

    DEFF Research Database (Denmark)

    Bruun Jensen, Casper

    2007-01-01

    . Instead, I outline a fractal approach to the study of space, society, and infrastructure. A fractal orientation requires a number of related conceptual reorientations. It has implications for thinking about scale and perspective, and (sociotechnical) relations, and for considering the role of the social...... and a fractal social theory....

  1. Public Tourism Infrastructure: Challenges in the Development and Maintenance Activities

    Directory of Open Access Journals (Sweden)

    Abdullah Shardy

    2014-01-01

    Full Text Available In Malaysia, the tourism sector is a major contributor to the nation’s development and is spearheaded by the government’s efforts in investing heavily towards providing sufficient and well-functioning public tourism infrastructure. This infrastructure should be ideally developed with a clear and systematic maintenance plan in hand. The challenge herein is not merely providing the necessary infrastructure to sustain tourism activities but rather a pro-active approach towards establishing and subsequently maintaining this infrastructure at its optimal level. The aim of this paper therefore is to identify critical aspects that need to be in place to further enhance the Malaysian tourism industry. The paper discusses the issues and challenges that need to be addressed as a precursor towards an effectively developed and maintained tourism infrastructure system. Development issues that have been identified revolve around the dimensions of quality, quantity and ability of the public agencies involved, particularly issues of inadequate infrastructure, quality of infrastructure and the capability of the agencies in undertaking efficient maintenance activities. These issues were found to lead towards challenges of working with resource constraints, lack of an effective maintenance culture and system as well as the need for clear and effective policies and strategies.

  2. INQUIRY –BASED LEARNING FOR ENHANCING CRITICAL THINKING SKILLS: INDONESIAN STUDENTS‘ PERSPECTIVES

    Directory of Open Access Journals (Sweden)

    Hersulastuti Hersulastuti

    2017-12-01

    Full Text Available This paper was mainly intended to shed light on students‘ response towards the implementation of Inquiry-Based Learning (IBL in Reading and Writing subject, and explore its benefits for enhancing critical thinking skills from students‘perspectives in ELT context. This research was conducted through a qualitative case study approach. Three students of graduate program were purposively selected to be the participants. Data were gathered primarily from observation notes and interviews, and then further analyzed using interractive model analysis as proposed by Miles & Huberman (1994. The findings demonstrate that students have good responses towards the implementation of IBL. Moreover, IBL is beneficial to make students become more self-directed, selfdisciplined, self-monitored thinkers. Through IBL, students develop their critical thinking abilities: 1 raise vital questions and problems; 2 gather and assess relevant information; 3 drawing well-reasoned conclusions; and 4 communicate effectively with others to seek solution to complex problems.

  3. The Impacts of 'Problem-Based Learning’ Approach in Enhancing Critical Thinking Skills to Teaching Literature

    Directory of Open Access Journals (Sweden)

    Mairas Abd Rahman

    2016-11-01

    Full Text Available Teaching can be challenging task especially when the students are categorized as reluctant readers, low self-motivated and lack of critical thinking skills. Therefore, this study focuses on a successful problem-based learning approach on university course called ‘Literature for Language Purposes' taken by Bachelor of English with Communication students at a local Malaysian university. The aim of this study is to investigate the impacts of carrying out problem-based learning in teaching literature. The project involved 55 undergraduates and part of their major course assignments was to organize and participate in an annual English language drama competition. The data was collected through students’ reflective journals, researchers’ reflective journals, response from end of semester questionnaire given and, lecturers’ evaluation on FILA tables. The findings show that problem-based learning is suitable and beneficial in teaching and enhancing critical thinking skills.

  4. Accuracy of subcutaneous continuous glucose monitoring in critically ill adults: improved sensor performance with enhanced calibrations.

    Science.gov (United States)

    Leelarathna, Lalantha; English, Shane W; Thabit, Hood; Caldwell, Karen; Allen, Janet M; Kumareswaran, Kavita; Wilinska, Malgorzata E; Nodale, Marianna; Haidar, Ahmad; Evans, Mark L; Burnstein, Rowan; Hovorka, Roman

    2014-02-01

    Accurate real-time continuous glucose measurements may improve glucose control in the critical care unit. We evaluated the accuracy of the FreeStyle(®) Navigator(®) (Abbott Diabetes Care, Alameda, CA) subcutaneous continuous glucose monitoring (CGM) device in critically ill adults using two methods of calibration. In a randomized trial, paired CGM and reference glucose (hourly arterial blood glucose [ABG]) were collected over a 48-h period from 24 adults with critical illness (mean±SD age, 60±14 years; mean±SD body mass index, 29.6±9.3 kg/m(2); mean±SD Acute Physiology and Chronic Health Evaluation score, 12±4 [range, 6-19]) and hyperglycemia. In 12 subjects, the CGM device was calibrated at variable intervals of 1-6 h using ABG. In the other 12 subjects, the sensor was calibrated according to the manufacturer's instructions (1, 2, 10, and 24 h) using arterial blood and the built-in point-of-care glucometer. In total, 1,060 CGM-ABG pairs were analyzed over the glucose range from 4.3 to 18.8 mmol/L. Using enhanced calibration median (interquartile range) every 169 (122-213) min, the absolute relative deviation was lower (7.0% [3.5, 13.0] vs. 12.8% [6.3, 21.8], P<0.001), and the percentage of points in the Clarke error grid Zone A was higher (87.8% vs. 70.2%). Accuracy of the Navigator CGM device during critical illness was comparable to that observed in non-critical care settings. Further significant improvements in accuracy may be obtained by frequent calibrations with ABG measurements.

  5. The critical particle size for enhancing thermal conductivity in metal nanoparticle-polymer composites

    Science.gov (United States)

    Lu, Zexi; Wang, Yan; Ruan, Xiulin

    2018-02-01

    Polymers used as thermal interface materials are often filled with high-thermal conductivity particles to enhance the thermal performance. Here, we have combined molecular dynamics and the two-temperature model in 1D to investigate the impact of the metal filler size on the overall thermal conductivity. A critical particle size has been identified above which thermal conductivity enhancement can be achieved, caused by the interplay between high particle thermal conductivity and the added electron-phonon and phonon-phonon thermal boundary resistance brought by the particle fillers. Calculations on the SAM/Au/SAM (self-assembly-monolayer) system show a critical thickness Lc of around 10.8 nm. Based on the results, we define an effective thermal conductivity and propose a new thermal circuit analysis approach for the sandwiched metal layer that can intuitively explain simulation and experimental data. The results show that when the metal layer thickness decreases to be much smaller than the electron-phonon cooling length (or as the "thin limit"), the effective thermal conductivity is just the phonon portion, and electrons do not participate in thermal transport. As the thickness increases to the "thick limit," the effective thermal conductivity recovers the metal bulk value. Several factors that could affect Lc are discussed, and it is discovered that the thermal conductivity, thermal boundary resistance, and the electron-phonon coupling factor are all important in controlling Lc.

  6. Criticality safety evaluation for the Advanced Test Reactor enhanced low enriched uranium fuel elements

    International Nuclear Information System (INIS)

    Montierth, Leland M.

    2016-01-01

    The Global Threat Reduction Initiative (GTRI) convert program is developing a high uranium density fuel based on a low enriched uranium (LEU) uranium-molybdenum alloy. Testing of prototypic GTRI fuel elements is necessary to demonstrate integrated fuel performance behavior and scale-up of fabrication techniques. GTRI Enhanced LEU Fuel (ELF) elements based on the ATR-Standard Size elements (all plates fueled) are to be fabricated for testing in the Advanced Test Reactor (ATR). While a specific ELF element design will eventually be provided for detailed analyses and in-core testing, this criticality safety evaluation (CSE) is intended to evaluate a hypothetical ELF element design for criticality safety purposes. Existing criticality analyses have analyzed Standard (HEU) ATR elements from which controls have been derived. This CSE documents analysis that determines the reactivity of the hypothetical ELF fuel elements relative to HEU ATR elements and whether the existing HEU ATR element controls bound the ELF element. The initial calculations presented in this CSE analyzed the original ELF design, now referred to as Mod 0.1. In addition, as part of a fuel meat thickness optimization effort for reactor performance, other designs have been evaluated. As of early 2014 the most current conceptual designs are Mk1A and Mk1B, that were previously referred to as conceptual designs Mod 0.10 and Mod 0.11, respectively. Revision 1 evaluates the reactivity of the ATR HEU Mark IV elements for a comparison with the Mark VII elements.

  7. Criticality safety evaluation for the Advanced Test Reactor enhanced low enriched uranium fuel elements

    Energy Technology Data Exchange (ETDEWEB)

    Montierth, Leland M. [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2016-07-19

    The Global Threat Reduction Initiative (GTRI) convert program is developing a high uranium density fuel based on a low enriched uranium (LEU) uranium-molybdenum alloy. Testing of prototypic GTRI fuel elements is necessary to demonstrate integrated fuel performance behavior and scale-up of fabrication techniques. GTRI Enhanced LEU Fuel (ELF) elements based on the ATR-Standard Size elements (all plates fueled) are to be fabricated for testing in the Advanced Test Reactor (ATR). While a specific ELF element design will eventually be provided for detailed analyses and in-core testing, this criticality safety evaluation (CSE) is intended to evaluate a hypothetical ELF element design for criticality safety purposes. Existing criticality analyses have analyzed Standard (HEU) ATR elements from which controls have been derived. This CSE documents analysis that determines the reactivity of the hypothetical ELF fuel elements relative to HEU ATR elements and whether the existing HEU ATR element controls bound the ELF element. The initial calculations presented in this CSE analyzed the original ELF design, now referred to as Mod 0.1. In addition, as part of a fuel meat thickness optimization effort for reactor performance, other designs have been evaluated. As of early 2014 the most current conceptual designs are Mk1A and Mk1B, that were previously referred to as conceptual designs Mod 0.10 and Mod 0.11, respectively. Revision 1 evaluates the reactivity of the ATR HEU Mark IV elements for a comparison with the Mark VII elements.

  8. Green Infrastructure, Groundwater and the Sustainable City

    Science.gov (United States)

    Band, L. E.

    2014-12-01

    The management of water is among the most important attributes of urbanization. Provision of sufficient quantities and quality of freshwater, treatment and disposal of wastewater and flood protection are critical for urban sustainability. Over the last century, two major shifts in water management paradigms have occurred, the first to improve public health with the provision of infrastructure for centralized sanitary effluent collection and treatment, and the rapid drainage and routing of stormwater. A current shift in paradigm is now occurring in response to the unintended consequences of sanitary and stormwater management, which have degraded downstream water bodies and shifted flood hazard downstream. Current infrastructure is being designed and implemented to retain, rather than rapidly drain, stormwater, with a focus on infiltration based methods. In urban areas, this amounts to a shift in hydrologic behavior to depression focused recharge. While stormwater is defined as surface flow resulting from developed areas, an integrated hydrologic systems approach to urban water management requires treatment of the full critical zone. In urban areas this extends from the top of the vegetation and building canopy, to a subsurface depth including natural soils, fill, saprolite and bedrock. In addition to matric and network flow in fracture systems, an urban "karst" includes multiple generations of current and past infrastructure, which has developed extensive subsurface pipe networks for supply and drainage, enhancing surface/groundwater flows and exchange. In this presentation, Band will discuss the need to focus on the urban critical zone, and the development and adaptation of new modeling and analytical approaches to understand and plan green infrastructure based on surface/groundwater/ecosystem interactions, and implications for the restoration and new design of cities.

  9. Protecting and securing the energy infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Gillham, B. [Conoco Canada Ltd., Calgary, AB (Canada)

    2002-07-01

    Critical Infrastructure Protection (CIP) includes protection against physical and cyber attacks as well as potential interruptions and vulnerabilities such as natural disasters and human error. CIP makes it possible to deal with the consequences of infrastructure failures that can have regional, national and international impacts. The energy sector is challenged because there has been an irreversible move to automated control systems and electronic transactions. In addition, due to mergers and joint ventures, the line between traditional oil, natural gas companies and power companies is not perfectly clear. Energy industries can no longer be seen in isolation of each other because they depend on other critical infrastructures. Industry should lead CIP programs through risk management assessments, develop and implement global information technology standards, and enhance response and recovery planning. The National Petroleum Council (NPC) will continue to develop the capabilities of the newly formed Information Sharing and Assessment Centre (ISAC). The sector will also continue to develop common vulnerability assessment goals. It was noted that response and recovery plans must include the cyber dimension, because there has been an increasing number of scans and probes from the Internet since the events of September 11, 2001. It was noted that physical incidents can often turn into cyber incidents and vice versa.

  10. Critical Thinking Skills and Academic Maturity: Emerging Results from a Five-Year Quality Enhancement Plan (QEP) Study

    Science.gov (United States)

    Toppin, Ian N.; Chitsonga, Shadreck

    2016-01-01

    The QEP that was implemented in this study focused on enhancing students' critical thinking skills. A pretest/posttest approach was used to assess students' critical thinking progress in freshman level core English and Math courses. An intervention was performed involving intensive instruction and assignments relating to a set of reasoning…

  11. Regulação de Riscos e Proteção de Infraestruturas Críticas: os novos ventos do fenômeno regulatório / Risk Regulation and Critical Infrastructure Protection: The New Winds of the Regulatory Phenomenon

    Directory of Open Access Journals (Sweden)

    Egon C. Guterres

    2016-05-01

    Full Text Available Purpose – This article analyzes the origins of the Risk Regulation Theory and Critical Infrastructure Protection Programs, and shows their contribution to the Brazilian regulatory experience. Methodology/approach/design – Through several examples, this study presents regulatory policies that emerged as responses to events that caused a significant impact on society. Findings – The unique way that the Critical Infrastructure Protection Programs evolved within the Brazilian regulatory experience is greatly attributable to demands of major international sporting events.

  12. Evaluative Infrastructures

    DEFF Research Database (Denmark)

    Kornberger, Martin; Pflueger, Dane; Mouritsen, Jan

    2017-01-01

    Platform organizations such as Uber, eBay and Airbnb represent a growing disruptive phenomenon in contemporary capitalism, transforming economic organization, the nature of work, and the distribution of wealth. This paper investigates the accounting practices that underpin this new form...... of organizing, and in doing so confronts a significant challenge within the accounting literature: the need to escape what Hopwood (1996) describes as its “hierarchical consciousness”. In order to do so, this paper develops the concept of evaluative infrastructure which describes accounting practices...

  13. Ritual Infrastructure

    DEFF Research Database (Denmark)

    Sjørslev, Inger

    2017-01-01

    within urban life. There is a certain parallel between these different locations and the difference in ritual roads to certainty in the two religions. The article draws out connections between different levels of infrastructure – material, spatial and ritual. The comparison between the two religions......This article compares the ways in which two different religions in Brazil generate roads to certainty through objectification, one through gods, the other through banknotes. The Afro-Brazilian religion Candomblé provides a road to certainty based on cosmological ideas about gods whose presence...

  14. Contextual-Analysis for Infrastructure Awareness Systems

    DEFF Research Database (Denmark)

    Ramos, Juan David Hincapie; Tabard, Aurelien; Alt, Florian

    Infrastructures are persistent socio-technical systems used to deliver different kinds of services. Researchers have looked into how awareness of infrastructures in the areas of sustainability [6, 10] and software appropriation [11] can be provided. However, designing infrastructure-aware systems...... has specific requirements, which are often ignored. In this paper we explore the challenges when developing infrastructure awareness systems based on contextual analysis, and propose guidelines for enhancing the design process....

  15. Experimental study of critical heat flux enhancement with hypervapotron structure under natural circulation conditions

    Energy Technology Data Exchange (ETDEWEB)

    Hou, Fangxin [Institute of Nuclear and New Energy Technology, Tsinghua University, Beijing (China); Chang, Huajian [Institute of Nuclear and New Energy Technology, Tsinghua University, Beijing (China); State Nuclear Power Technology R& D Center (Beijing), Beijing (China); Zhao, Yufeng, E-mail: zhaoyufeng@snptc.com.cn [State Nuclear Power Technology R& D Center (Beijing), Beijing (China); Zhang, Ming; Gao, Tianfang [State Nuclear Power Technology R& D Center (Beijing), Beijing (China); Chen, Peipei [State Power Investment Corporation, Beijing (China)

    2017-05-15

    Highlights: • Natural circulation tests are performed to study the effect of hypervapotron on CHF. • Hypervapotron structure improves CHF under natural circulation conditions. • Visualization data illustrate vapor blanket behavior under subcooled flow conditions. - Abstract: The enhancement of critical heat flux with a hypervapotron structure under natural circulation conditions is investigated in this study. Subcooled flow boiling CHF experiments are performed using smooth and hypervapotron surfaces at different inclination angles under natural circulation conditions. The experimental facility, TESEC (Test of External Vessel Surface with Enhanced Cooling), is designed to conduct CHF experiments in a 30 mm by 61 mm rectangular flow channel with a 200 mm long heated surface along the flow direction. The two-phase flow of subcooled flow boiling on both smooth and hypervapotron heating plates is observed and analyzed by the high-speed visualization technology. The results show that both smooth surface and hypervapotron surface CHF data exhibit a similar trend against inclination angles compared with the CHF results under forced flow condition on the same facility in earlier studies. However, the CHF enhancement of the hypervapotron structure is evidently more significant than the one under forced flow conditions. The experiments also indicate that the natural flow rates are higher with hypervapotron structure. The initiation of CHF is analyzed under transient subcooling and flow rate conditions for both smooth and hypervapotron heating surfaces. An explanation is given for the significant enhancement effect caused by the hypervapotron surface under natural circulation conditions. The visualization data are exhibited to demonstrate the behavior of the vapor blanket at various inclination angles and on different surfaces. The geometric data of the vapor blanket are quantified by an image post-processing method. It is found that the thickness of the vapor blanket

  16. Review of issues relating to enhancement of critical heat flux in nuclear reactors - 15220

    International Nuclear Information System (INIS)

    Hasan, S.M.K.; Chowdhury, M.A.Z.; Sarkar, M.A.R.

    2015-01-01

    Critical heat flux (CHF) is manifested by sharp reduction in heat transfer coefficient and a drastic rise in fuel rod surface temperature, which may lead to failure of the fuel cladding and is of immense importance in reactor design and operation. In this paper, the existing literature on CHF is studied and analyzed. Different modeling techniques such as geometry modeling and fluid modeling are highlighted. CHF enhancement techniques such as swirl flow, porous coating, nano-fluids or mechanical vibrations are analyzed and their suitability for different applications is discussed. The advances in prediction methods for tubes and rod bundles are also presented. CHF correlations and their applications have been compiled to estimate the CHF for fluids other than water or other geometries. Finally, future research needs are identified and presented. (authors)

  17. Adjuvant-enhanced CD4 T Cell Responses are Critical to Durable Vaccine Immunity

    Directory of Open Access Journals (Sweden)

    Karen A.O. Martins

    2016-01-01

    Full Text Available Protein-based vaccines offer a safer alternative to live-attenuated or inactivated vaccines but have limited immunogenicity. The identification of adjuvants that augment immunogenicity, specifically in a manner that is durable and antigen-specific, is therefore critical for advanced development. In this study, we use the filovirus virus-like particle (VLP as a model protein-based vaccine in order to evaluate the impact of four candidate vaccine adjuvants on enhancing long term protection from Ebola virus challenge. Adjuvants tested include poly-ICLC (Hiltonol, MPLA, CpG 2395, and alhydrogel. We compared and contrasted antibody responses, neutralizing antibody responses, effector T cell responses, and T follicular helper (Tfh cell frequencies with each adjuvant's impact on durable protection. We demonstrate that in this system, the most effective adjuvant elicits a Th1-skewed antibody response and strong CD4 T cell responses, including an increase in Tfh frequency. Using immune-deficient animals and adoptive transfer of serum and cells from vaccinated animals into naïve animals, we further demonstrate that serum and CD4 T cells play a critical role in conferring protection within effective vaccination regimens. These studies inform on the requirements of long term immune protection, which can potentially be used to guide screening of clinical-grade adjuvants for vaccine clinical development.

  18. Adjuvant-enhanced CD4 T Cell Responses are Critical to Durable Vaccine Immunity.

    Science.gov (United States)

    Martins, Karen A O; Cooper, Christopher L; Stronsky, Sabrina M; Norris, Sarah L W; Kwilas, Steven A; Steffens, Jesse T; Benko, Jacqueline G; van Tongeren, Sean A; Bavari, Sina

    2016-01-01

    Protein-based vaccines offer a safer alternative to live-attenuated or inactivated vaccines but have limited immunogenicity. The identification of adjuvants that augment immunogenicity, specifically in a manner that is durable and antigen-specific, is therefore critical for advanced development. In this study, we use the filovirus virus-like particle (VLP) as a model protein-based vaccine in order to evaluate the impact of four candidate vaccine adjuvants on enhancing long term protection from Ebola virus challenge. Adjuvants tested include poly-ICLC (Hiltonol), MPLA, CpG 2395, and alhydrogel. We compared and contrasted antibody responses, neutralizing antibody responses, effector T cell responses, and T follicular helper (Tfh) cell frequencies with each adjuvant's impact on durable protection. We demonstrate that in this system, the most effective adjuvant elicits a Th1-skewed antibody response and strong CD4 T cell responses, including an increase in Tfh frequency. Using immune-deficient animals and adoptive transfer of serum and cells from vaccinated animals into naïve animals, we further demonstrate that serum and CD4 T cells play a critical role in conferring protection within effective vaccination regimens. These studies inform on the requirements of long term immune protection, which can potentially be used to guide screening of clinical-grade adjuvants for vaccine clinical development.

  19. Critical Concentration of Lecithin Enhances the Antimicrobial Activity of Eugenol against Escherichia coli

    Science.gov (United States)

    Zhang, Haoshu; Dudley, Edward G.; Davidson, P. Michael

    2017-01-01

    ABSTRACT Lecithin is a natural emulsifier used in a wide range of food and nonfood applications to improve physical stability, with no known bioactive effects. In this study, the effect of lecithin on the antimicrobial performance of a constant eugenol concentration was tested against three Escherichia coli strains (C600, 0.1229, and O157:H7 strain ATCC 700728). This is the first study, to our knowledge, focusing on lecithin at concentrations below those commonly used in foods to improve the stability of oil in water emulsions (≤10 mg/100 ml). For all three cultures, significant synergistic antimicrobial effects were observed when E. coli cultures were exposed to a constant eugenol concentration (ranging from 0.043 to 0.050% [wt/wt]) together with critical lecithin concentrations ranging from 0.5 to 1 mg/100 ml. Increasing the concentration of lecithin above 1 mg/100 ml (up to 10 mg/100 ml lecithin) diminished the antibacterial effect to values similar to those with eugenol-only treatments. The formation of aggregates (lecithin concentration was observed using cryo-transmission electron microscopy (cryo-TEM), together with a reduction in light absorbance at 284 nm. At critically low concentrations of lecithin, the formation of nanoscale aggregates is responsible for improving eugenol antimicrobial effects. IMPORTANCE Essential oils (EOs) are effective natural antimicrobials. However, their hydrophobicity and strong aromatic character limit the use of essential oils in food systems. Emulsifiers (e.g., lecithin) increase the stability of EOs in water-based systems but fail to consistently improve antimicrobial effects. We demonstrate that lecithin, within a narrow critical concentration window, can enhance the antimicrobial properties of eugenol. This study highlights the potential bioactivity of lecithin when utilized to effectively control foodborne pathogens. PMID:28213539

  20. Critical Concentration of Lecithin Enhances the Antimicrobial Activity of Eugenol against Escherichia coli.

    Science.gov (United States)

    Zhang, Haoshu; Dudley, Edward G; Davidson, P Michael; Harte, Federico

    2017-04-15

    Lecithin is a natural emulsifier used in a wide range of food and nonfood applications to improve physical stability, with no known bioactive effects. In this study, the effect of lecithin on the antimicrobial performance of a constant eugenol concentration was tested against three Escherichia coli strains (C600, 0.1229, and O157:H7 strain ATCC 700728). This is the first study, to our knowledge, focusing on lecithin at concentrations below those commonly used in foods to improve the stability of oil in water emulsions (≤10 mg/100 ml). For all three cultures, significant synergistic antimicrobial effects were observed when E. coli cultures were exposed to a constant eugenol concentration (ranging from 0.043 to 0.050% [wt/wt]) together with critical lecithin concentrations ranging from 0.5 to 1 mg/100 ml. Increasing the concentration of lecithin above 1 mg/100 ml (up to 10 mg/100 ml lecithin) diminished the antibacterial effect to values similar to those with eugenol-only treatments. The formation of aggregates (lecithin concentration was observed using cryo-transmission electron microscopy (cryo-TEM), together with a reduction in light absorbance at 284 nm. At critically low concentrations of lecithin, the formation of nanoscale aggregates is responsible for improving eugenol antimicrobial effects. IMPORTANCE Essential oils (EOs) are effective natural antimicrobials. However, their hydrophobicity and strong aromatic character limit the use of essential oils in food systems. Emulsifiers (e.g., lecithin) increase the stability of EOs in water-based systems but fail to consistently improve antimicrobial effects. We demonstrate that lecithin, within a narrow critical concentration window, can enhance the antimicrobial properties of eugenol. This study highlights the potential bioactivity of lecithin when utilized to effectively control foodborne pathogens. Copyright © 2017 American Society for Microbiology.

  1. Pool boiling characteristics and critical heat flux mechanisms of microporous surfaces and enhancement through structural modification

    Science.gov (United States)

    Ha, Minseok; Graham, Samuel

    2017-08-01

    Experimental studies have shown that microporous surfaces induce one of the highest enhancements in critical heat flux (CHF) during pool boiling. However, microporous surfaces may also induce a very large surface superheat (>100 °C) which is not desirable for applications such as microelectronics cooling. While the understanding of the CHF mechanism is the key to enhancing boiling heat transfer, a comprehensive understanding is not yet available. So far, three different theories for the CHF of microporous surfaces have been suggested: viscous-capillary model, hydrodynamic instability model, and dryout of the porous coatings. In general, all three theories account for some aspects of boiling phenomena. In this study, the theories are examined through their correlations with experimental data on microporous surfaces during pool boiling using deionized (DI) water. It was found that the modulation of the vapor-jet through the pore network enables a higher CHF than that of a flat surface based on the hydrodynamic instability theory. In addition, it was found that as the heat flux increases, a vapor layer grows in the porous coatings described by a simple thermal resistance model which is responsible for the large surface superheat. Once the vapor layer grows to fill the microporous structure, transition to film boiling occurs and CHF is reached. By disrupting the formation of this vapor layer through the fabrication of channels to allow vapor escape, an enhancement in the CHF and heat transfer coefficient was observed, allowing CHF greater than 3500 kW/m2 at a superheat less than 50 °C.

  2. Vulnerability assessment of critical infrastructure : activity 2 progress report : information of SCADA systems and other security monitoring systems used in oil and gas pipelines

    Energy Technology Data Exchange (ETDEWEB)

    Gu, G.P. [Natural Resources Canada, Ottawa, ON (Canada). CANMET Materials Technology Laboratory

    2007-12-15

    Many pipelines are located in remote regions and subjected to harsh environmental conditions. Damage to pipelines can have significant economic and environmental impacts. This paper discussed the use of supervisory control and data acquisition (SCADA) systems to monitor and control oil and gas pipeline infrastructure. SCADA systems are a real time, distributed computerized system with an intelligent capability for condition identification and fault diagnosis. SCADA systems can be used to capture thousands of miles of pipeline system process data and distribute it to pipeline operators, whose work stations are networked with the SCADA central host computer. SCADA architectures include monolithic, distributed, and networked systems that can be distributed across wide area networks (WANs). SCADA security strategies must be implemented to ensure corporate network security. Case studies of SCADA systems currently used by oil and gas operators in Alberta were also presented. 15 refs., 1 fig.

  3. Towards risk-based management of critical infrastructures : enabling insights and analysis methodologies from a focused study of the bulk power grid.

    Energy Technology Data Exchange (ETDEWEB)

    Richardson, Bryan T.; LaViolette, Randall A.; Cook, Benjamin Koger

    2008-02-01

    This report summarizes research on a holistic analysis framework to assess and manage risks in complex infrastructures, with a specific focus on the bulk electric power grid (grid). A comprehensive model of the grid is described that can approximate the coupled dynamics of its physical, control, and market components. New realism is achieved in a power simulator extended to include relevant control features such as relays. The simulator was applied to understand failure mechanisms in the grid. Results suggest that the implementation of simple controls might significantly alter the distribution of cascade failures in power systems. The absence of cascade failures in our results raises questions about the underlying failure mechanisms responsible for widespread outages, and specifically whether these outages are due to a system effect or large-scale component degradation. Finally, a new agent-based market model for bilateral trades in the short-term bulk power market is presented and compared against industry observations.

  4. Does mindfulness enhance critical thinking? Evidence for the mediating effects of executive functioning in the relationship between mindfulness and critical thinking

    Directory of Open Access Journals (Sweden)

    Chris eNoone

    2016-01-01

    Full Text Available Mindfulness originated in the Buddhist tradition as a way of cultivating clarity of thought. Despite the fact that this behaviour is best captured using critical thinking assessments, no studies have examined the effects of mindfulness on critical thinking or the mechanisms underlying any such possible relationship. Even so, mindfulness has been suggested as being beneficial for critical thinking in higher education. Critical thinking is recognised as an important higher-order cognitive process which involves the ability to analyse and evaluate evidence and arguments. Such non-automatic, reflective responses generally require the engagement of executive functioning which includes updating, inhibition and shifting of representations in working memory. Based on research showing that mindfulness enhances aspects of executive functioning and certain higher-order cognitive processes, we hypothesised that individuals higher in facets of dispositional mindfulness would demonstrate greater critical thinking performance, and that this relationship would be mediated by executive functioning. Cross-sectional assessment of these constructs in a sample of 178 university students was achieved using the observing and non-reactivity sub-scales of the Five Factor Mindfulness Questionnaire, a battery of executive functioning tasks and the Halpern Critical Thinking Assessment. Our hypotheses were tested by constructing a multiple meditation model which was analysed using Structural Equation Modelling. Evidence was found for inhibition mediating the relationships between both observing and non-reactivity and critical thinking in different ways. Indirect-only (or full mediation was demonstrated for the relationship between observing, inhibition and critical thinking. Competitive mediation was demonstrated for the relationship between non-reactivity, inhibition and critical thinking. This suggests additional mediators of the relationship between non-reactivity and

  5. The Department of Energy nuclear criticality safety program

    International Nuclear Information System (INIS)

    Felty, J.R.

    2004-01-01

    This paper broadly covers key events and activities from which the Department of Energy Nuclear Criticality Safety Program (NCSP) evolved. The NCSP maintains fundamental infrastructure that supports operational criticality safety programs. This infrastructure includes continued development and maintenance of key calculational tools, differential and integral data measurements, benchmark compilation, development of training resources, hands-on training, and web-based systems to enhance information preservation and dissemination. The NCSP was initiated in response to Defense Nuclear Facilities Safety Board Recommendation 97-2, Criticality Safety, and evolved from a predecessor program, the Nuclear Criticality Predictability Program, that was initiated in response to Defense Nuclear Facilities Safety Board Recommendation 93-2, The Need for Critical Experiment Capability. This paper also discusses the role Dr. Sol Pearlstein played in helping the Department of Energy lay the foundation for a robust and enduring criticality safety infrastructure.

  6. Acute enhancement of the upper critical field for superconductivity approaching a quantum critical point in URhGe

    Energy Technology Data Exchange (ETDEWEB)

    Levy, F; Huxley, A [CEA, SPSMS, DRFMC, F-38054 Grenoble, (France); Levy, F; Sheikin, I [CNRS, GHMFL, F-38042 Grenoble, (France); Huxley, A [Univ Edinburgh, Scottish Univ Phys Alliance, Sch Phys, Edinburgh EH9 3JZ, Midlothian, (United Kingdom)

    2007-07-01

    When a pure material is tuned to the point where a continuous phase-transition line is crossed at zero temperature, known as a quantum critical point (QCP), completely new correlated quantum ordered states can form. These phases include exotic forms of superconductivity. However, as superconductivity is generally suppressed by a magnetic field, the formation of superconductivity ought not to be possible at extremely high field. Here, we report that as we tune the ferromagnet, URhGe, towards a QCP by applying a component of magnetic field in the material's easy magnetic plane, superconductivity survives in progressively higher fields applied simultaneously along the material's magnetic hard axis. Thus, although superconductivity never occurs above a temperature of 0.5 K, we find that it can survive in extremely high magnetic fields, exceeding 28 T. (authors)

  7. Enhancement of the Investigations of Global Marine Challenges Through the European Multidisciplinary Seafloor and water-column Observatory (EMSO) Research Infrastructure (RI)

    Science.gov (United States)

    Lo Bue, N.; Materia, P.; Embriaco, D.; Beranzoli, L.; Favali, P.; Leijala, U.; Pavan, G.; Best, M.; Ó Conchubhair, D.; O'Rourke, E.

    2017-12-01

    The approach of ocean observations has changed significantly over the past decades. Thanks to the development of new technologies improving the monitoring systems and also to the recent marine strategies such as the blue growth that support long term sustainable growth in marine sectors as a whole, it is now possible to better assess environmental issues. Long term multiparametric observations enable concurrent monitoring of a variety of natural and anthropogenic processes responsible for the alteration of marine ecosystems. This innovative process has been adopted by RIs, which have the ability to promote these unique cooperation opportunities via their global networks of observational infrastructures. EMSO (http://www.emso-eu.org) is a marine RI that contributes to further exploration and monitoring of European-scale oceans. This monitoring allows for a better understanding of various parameters from the upper layer of the water column through the deep sea and into the seafloor. The multidisciplinary approach taken by the EMSO RI assists in addressing questions across issues of climate change, marine ecosystems, and geohazards. For example, the growing societal implications due to geohazards require accurate and cross-disciplinary research involving a global community. A global and multidisciplinary approach is the key driver that allows us to better investigate the causes of geohazards in their worldwide distribution, and to produce reliable regional and global models. RIs, also represent a powerful tool in assessing the impacts of anthropogenic noise levels on marine fauna. Several studies have already shown how the significant variety of submarine acoustic pollution on a daily basis can have a substantial effect on the health and communication abilities of marine fauna. The constant noise pollution may produce physiological degradation in marine fauna and may also negatively impact several ecosystems. Finally, RIs play a crucial role in the sharing of

  8. Homeland Security -- Reducing the Vulnerability of Public and Private Information Infrastructures to Terrorism: An Overview

    National Research Council Canada - National Science Library

    Seifert, Jeffrey W

    2002-01-01

    This report assesses the impact of the September 11, 2001 attacks on public and private information infrastructures in the context of critical infrastructure protection, continuity of operations (COOP...

  9. Papers of the Canadian Institute's 8. annual North American pipelines and storage conference : update on critical infrastructure developments and market dynamics shaping the North American grid

    International Nuclear Information System (INIS)

    2003-01-01

    Leaders and experts from the petroleum and natural gas industry outlined some of the recent changes that have taken place in the North America gas and electricity industry. The relationship between pipeline and storage capacity was discussed with reference to how the connection affects prices at North American storage hubs. The topics of discussion ranged from the challenges associated with declines in capacity and market dynamics, to how gas marketability will be affected by the slowdown in pipeline development in North America. The investment community offered advice on long-run value creation in natural gas. The current state of development of Arctic gas was highlighted along with a review of how growth in liquefied natural gas (LNG) is changing the role of gas infrastructure in North America. It was noted that although markets will work to balance supply and demand, there is a need for new sources of North American supply to meet growing long-term demand. The fall-off in U.S. domestic natural gas supplies combined with low storage levels has created a supply crisis. The conference featured 19 presentations, of which 4 have been indexed separately for inclusion in this database. refs., tabs., figs

  10. Critical period of memory enhancement during taste avoidance conditioning in Lymnaea stagnalis.

    Science.gov (United States)

    Takahashi, Tomoyo; Takigami, Satoshi; Sunada, Hiroshi; Lukowiak, Ken; Sakakibara, Manabu

    2013-01-01

    The present study investigated the optimal training procedure leading to long-lasting taste avoidance behavior in Lymnaea. A training procedure comprising 5 repeated pairings of a conditional stimulus (CS, sucrose), with an unconditional stimulus (US, a tactile stimulation to the animal's head), over a 4-day period resulted in an enhanced memory formation than 10 CS-US repeated pairings over a 2-day period or 20 CS-US repeated pairings on a single day. Backward conditioning (US-CS) pairings did not result in conditioning. Thus, this taste avoidance conditioning was CS-US pairing specific. Food avoidance behavior was not observed following training, however, if snails were immediately subjected to a cold-block (4°C for 10 min). It was critical that the cold-block be applied within 10 min to block long-term memory (LTM) formation. Further, exposure to the cold-block 180 min after training also blocked both STM and LTM formation. The effects of the cold-block on subsequent learning and memory formation were also examined. We found no long lasting effects of the cold-block on subsequent memory formation. If protein kinase C was activated before the conditioning paradigm, snails could still acquire STM despite exposure to the cold-block.

  11. Critical period of memory enhancement during taste avoidance conditioning in Lymnaea stagnalis.

    Directory of Open Access Journals (Sweden)

    Tomoyo Takahashi

    Full Text Available The present study investigated the optimal training procedure leading to long-lasting taste avoidance behavior in Lymnaea. A training procedure comprising 5 repeated pairings of a conditional stimulus (CS, sucrose, with an unconditional stimulus (US, a tactile stimulation to the animal's head, over a 4-day period resulted in an enhanced memory formation than 10 CS-US repeated pairings over a 2-day period or 20 CS-US repeated pairings on a single day. Backward conditioning (US-CS pairings did not result in conditioning. Thus, this taste avoidance conditioning was CS-US pairing specific. Food avoidance behavior was not observed following training, however, if snails were immediately subjected to a cold-block (4°C for 10 min. It was critical that the cold-block be applied within 10 min to block long-term memory (LTM formation. Further, exposure to the cold-block 180 min after training also blocked both STM and LTM formation. The effects of the cold-block on subsequent learning and memory formation were also examined. We found no long lasting effects of the cold-block on subsequent memory formation. If protein kinase C was activated before the conditioning paradigm, snails could still acquire STM despite exposure to the cold-block.

  12. Particle contamination effects in EUVL: enhanced theory for the analytical determination of critical particle sizes

    Science.gov (United States)

    Brandstetter, Gerd; Govindjee, Sanjay

    2012-03-01

    Existing analytical and numerical methodologies are discussed and then extended in order to calculate critical contamination-particle sizes, which will result in deleterious effects during EUVL E-chucking in the face of an error budget on the image-placement-error (IPE). The enhanced analytical models include a gap dependant clamping pressure formulation, the consideration of a general material law for realistic particle crushing and the influence of frictional contact. We present a discussion of the defects of the classical de-coupled modeling approach where particle crushing and mask/chuck indentation are separated from the global computation of mask bending. To repair this defect we present a new analytic approach based on an exact Hankel transform method which allows a fully coupled solution. This will capture the contribution of the mask indentation to the image-placement-error (estimated IPE increase of 20%). A fully coupled finite element model is used to validate the analytical models and to further investigate the impact of a mask back-side CrN-layer. The models are applied to existing experimental data with good agreement. For a standard material combination, a given IPE tolerance of 1 nm and a 15 kPa closing pressure, we derive bounds for single particles of cylindrical shape (radius × height < 44 μm) and spherical shape (diameter < 12 μm).

  13. A Critical Test of Self-Enhancement, Exposure, and Self-Categorization Explanations for First- and Third-Person Perceptions

    Science.gov (United States)

    Reid, Scott A.; Byrne, Sahara; Brundidge, Jennifer S.; Shoham, Mirit D.; Marlow, Mikaela L.

    2007-01-01

    The third-person perception is the tendency for people to believe that others are more influenced by media content than themselves (W. P. Davison, 1983). The current study provides a critical test of self-enhancement, exposure, and self-categorization explanations for first- (i.e., self more influenced than others) and third-person perceptions.…

  14. Enhancing Critical Thinking Skills in First Year Environmental Management Students: A Tale of Curriculum Design, Application and Reflection

    Science.gov (United States)

    Whiley, Dona; Witt, Bradd; Colvin, R. M.; Sapiains Arrue, Rodolfo; Kotir, Julius

    2017-01-01

    This paper chronicles the experience of academic staff in developing a course to enhance the critical thinking skills of environmental management undergraduates. We outline our considerations and process for course development, discuss insights from course evaluations, and reflect on the challenges encountered. We believe these perspectives will…

  15. Enhancing Seasonal Water Outlooks: Needs and Opportunities in the Critical Runoff Season

    Science.gov (United States)

    Ray, A. J.; Barsugli, J. J.; Yocum, H.; Stokes, M.; Miskus, D.

    2017-12-01

    The runoff season is a critical period for the management of water supply in the western U.S., where in many places over 70% of the annual runoff occurs in the snowmelt period. Managing not only the volume, but the intra-seasonal timing of the runoff is important for optimizing storage, as well as achieving other goals such as mitigating flood risk, and providing peak flows for riparian habitat management, for example, for endangered species. Western river forecast centers produce volume forecasts for western reservoirs that are key input into many water supply decisions, and also short term river forecasts out to 10 days. The early volume forecasts each year typically begin in December, and are updated throughout the winter and into the runoff season (April-July for many areas, but varies). This presentation will discuss opportunities for enhancing this existing suite of RFC water outlooks, including the needs for and potential use for "intraseasonal" products beyond those provided by the Ensemble Streamflow Prediction system and the volume forecasts. While precipitation outlooks have little skill for many areas and seasons, and may not contribute significantly to the outlook, late winter and spring temperature forecasts have meaningful skill in certain areas and sub-seasonal to seasonal time scales. This current skill in CPC temperature outlooks is an opportunity to translate these products into information about the snowpack and potential runoff timing, even where the skill in precipitation is low. Temperature is important for whether precipitation falls as snow or rain, which is critical for streamflow forecasts, especially in the melt season in snowpack-dependent watersheds. There is a need for better outlooks of the evolution of snowpack, conditions influencing the April-July runoff, and the timing of spring peak or shape of the spring hydrograph. The presentation will also discuss a our work with stakeholders of the River Forecast Centers and the NIDIS

  16. Low carbon technology performance vs infrastructure vulnerability: analysis through the local and global properties space.

    Science.gov (United States)

    Dawson, David A; Purnell, Phil; Roelich, Katy; Busch, Jonathan; Steinberger, Julia K

    2014-11-04

    Renewable energy technologies, necessary for low-carbon infrastructure networks, are being adopted to help reduce fossil fuel dependence and meet carbon mitigation targets. The evolution of these technologies has progressed based on the enhancement of technology-specific performance criteria, without explicitly considering the wider system (global) impacts. This paper presents a methodology for simultaneously assessing local (technology) and global (infrastructure) performance, allowing key technological interventions to be evaluated with respect to their effect on the vulnerability of wider infrastructure systems. We use exposure of low carbon infrastructure to critical material supply disruption (criticality) to demonstrate the methodology. A series of local performance changes are analyzed; and by extension of this approach, a method for assessing the combined criticality of multiple materials for one specific technology is proposed. Via a case study of wind turbines at both the material (magnets) and technology (turbine generators) levels, we demonstrate that analysis of a given intervention at different levels can lead to differing conclusions regarding the effect on vulnerability. Infrastructure design decisions should take a systemic approach; without these multilevel considerations, strategic goals aimed to help meet low-carbon targets, that is, through long-term infrastructure transitions, could be significantly jeopardized.

  17. Communications and information infrastructure security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Communication and Information Systems Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering strategies for protecting the telecommunications sector, wireless security, advanced web based technology for emergency situations. Science and technology for critical infrastructure consequence mitigation are also discussed.

  18. Central Region Green Infrastructure

    Data.gov (United States)

    Minnesota Department of Natural Resources — This Green Infrastructure data is comprised of 3 similar ecological corridor data layers ? Metro Conservation Corridors, green infrastructure analysis in counties...

  19. Armenia - Irrigation Infrastructure

    Data.gov (United States)

    Millennium Challenge Corporation — This study evaluates irrigation infrastructure rehabilitation in Armenia. The study separately examines the impacts of tertiary canals and other large infrastructure...

  20. Quality of Service Model on Data Link Layer for Mission Critical Traffic on IEEE 802.11g Networks in Infrastructure Mode

    Directory of Open Access Journals (Sweden)

    Gerald B. Fuenmayor-Rivadeneira

    2013-11-01

    Full Text Available This article presents a synthesized review as state of the art of the study of QoS for mission-critical traffic in wireless local area networks that use the IEEE 802.11g protocol. This is to highlight previous research for their contribution will constitute a reference to guide a proposed new approach to ensuring the quality of service for this type of traffic using the above protocol. The review is based on academic and business items made during the current five years. As a result of this review it is evident that there have been many efforts to address the issue but there are still gaps in the characterization of mission-critical traffic and ensuring quality of service for the same, due the new applications and the large host of WiFi networks in business and government, which has led to increased demand for access channels and, therefore, a challenge to the progress already known, such as IEEE 802.1q.

  1. Spatial planning, infrastructure and implementation: Implications for ...

    African Journals Online (AJOL)

    Infrastructure plays key roles in shaping the spatial form of the city at a macro- and a more local scale, and it influences the sustainability, efficiency and inclusiveness of cities and local areas. Linking infrastructure and spatial planning is therefore critical. Wide-ranging sets of knowledge and skills are required to enable ...

  2. Kenya's Integrated Nuclear Infrastructure Review Experience

    International Nuclear Information System (INIS)

    Ayacko, Ochilo G.M.

    2015-01-01

    Lessons learnt for INIR preparation: → A detailed Self Evaluation report is critical to proper evaluation of each infrastructure; → Involvement of all relevant organizations in preparation of self evaluation report and the main mission; → Meetings on individual infrastructure issues to consolidate the country position; → Openness during interviews and provision of adequate information

  3. Understanding the infrastructure of European Research Infrastructures

    DEFF Research Database (Denmark)

    Lindstrøm, Maria Duclos; Kropp, Kristoffer

    2017-01-01

    European Research Infrastructure Consortia (ERIC) are a new form of legal and financial framework for the establishment and operation of research infrastructures in Europe. Despite their scope, ambition, and novelty, the topic has received limited scholarly attention. This article analyses one ER....... It is also a promising theoretical framework for addressing the relationship between the ERIC construct and the large diversity of European Research Infrastructures.......European Research Infrastructure Consortia (ERIC) are a new form of legal and financial framework for the establishment and operation of research infrastructures in Europe. Despite their scope, ambition, and novelty, the topic has received limited scholarly attention. This article analyses one ERIC...... became an ERIC using the Bowker and Star’s sociology of infrastructures. We conclude that focusing on ERICs as a European standard for organising and funding research collaboration gives new insights into the problems of membership, durability, and standardisation faced by research infrastructures...

  4. Fostering Skills to Enhance Critical Educators: A Pedagogical Proposal for Pre-service Teachers

    Directory of Open Access Journals (Sweden)

    Jahir Aguirre Morales

    2011-12-01

    Full Text Available This article aims to share with teacher-educators a pedagogical proposal which we have applied in the past year. This investigation analyzes issues linked to critical pedagogy using movies connected to educational themes and readings based on critical pedagogy. We have used this study to generate class discussions in order to analyze educational topics from a critical point of view. This experience has guided us to help pre-service teachers acquire skills to eventually become critical educators of the future.

  5. Financing for Infrastructure Investment in G-20 Countries.

    OpenAIRE

    Sengupta, Ramprasad; Mukherjee, Sacchidananda; Gupta, Manish

    2015-01-01

    This study looks into various sources of financing infrastructure and the demands for infrastructure investments and highlights the mismatch between demand and supply of funds for infrastructure financing in India. In order to address this mismatch, and given the constraints of traditional sources of infrastructure finance in India, this paper suggests credit enhancement scheme (CES) as an alternative framework for mobilizing long-term infrastructure finance. It suggests for scaling up CES as...

  6. Enhanced critical currents in (Gd,Y)Ba2Cu3Ox superconducting tapes with high levels of Zr addition

    Energy Technology Data Exchange (ETDEWEB)

    Selvamanickam, V; Chen, Y; Shi, T; Liu, Y; Khatri, ND; Liu, J; Yao, Y; Xiong, X; Lei, C; Soloveichik, S; Galstyan, E; Majkic, G

    2013-01-21

    The critical current and structural properties of (Gd,Y)BaCuO tapes made by metal organic chemical vapor deposition (MOCVD) with Zr addition levels up to 30 at.% have been investigated. The reduction in critical current beyond the previously optimized Zr addition level of 7.5 at.% was found to be due to structural deterioration of the (Gd,Y)Ba2Cu3Ox film. By a modified MOCVD process,enhanced critical current densities have been achieved with high levels of Zr addition,including 3.83 MA cm(-2) in 15 at.% Zr- added 1.1 mu m thick film at 77 K in zero magnetic field. Critical currents as high as 1072 A/ 12 mm have been reached in (Gd,Y) BaCuO tapes with 15 at.% Zr addition at 30 K in a field of 3 T applied perpendicular to the tape,corresponding to a pinning force value of 268 GN m(-3). The enhanced critical currents achievable with a high density of nanoscale defects by employing high levels of second- phase additions enable the performance targets needed for the use of HTS tapes in coil applications involving high magnetic fields at temperatures below 50 K to be met.

  7. Enhanced critical currents in (Gd,Y)Ba2Cu3Ox superconducting tapes with high levels of Zr addition

    International Nuclear Information System (INIS)

    Selvamanickam, V; Shi, T; Liu, Y; Khatri, N D; Liu, J; Yao, Y; Galstyan, E; Majkic, G; Chen, Y; Xiong, X; Lei, C; Soloveichik, S

    2013-01-01

    The critical current and structural properties of (Gd,Y)BaCuO tapes made by metal organic chemical vapor deposition (MOCVD) with Zr addition levels up to 30 at.% have been investigated. The reduction in critical current beyond the previously optimized Zr addition level of 7.5 at.% was found to be due to structural deterioration of the (Gd,Y)Ba 2 Cu 3 O x film. By a modified MOCVD process, enhanced critical current densities have been achieved with high levels of Zr addition, including 3.83 MA cm −2 in 15 at.% Zr-added 1.1 μm thick film at 77 K in zero magnetic field. Critical currents as high as 1072 A/12 mm have been reached in (Gd,Y)BaCuO tapes with 15 at.% Zr addition at 30 K in a field of 3 T applied perpendicular to the tape, corresponding to a pinning force value of 268 GN m −3 . The enhanced critical currents achievable with a high density of nanoscale defects by employing high levels of second-phase additions enable the performance targets needed for the use of HTS tapes in coil applications involving high magnetic fields at temperatures below 50 K to be met. (paper)

  8. TRANSVAC research infrastructure - Results and lessons learned from the European network of vaccine research and development.

    Science.gov (United States)

    Geels, Mark J; Thøgersen, Regitze L; Guzman, Carlos A; Ho, Mei Mei; Verreck, Frank; Collin, Nicolas; Robertson, James S; McConkey, Samuel J; Kaufmann, Stefan H E; Leroy, Odile

    2015-10-05

    TRANSVAC was a collaborative infrastructure project aimed at enhancing European translational vaccine research and training. The objective of this four year project (2009-2013), funded under the European Commission's (EC) seventh framework programme (FP7), was to support European collaboration in the vaccine field, principally through the provision of transnational access (TNA) to critical vaccine research and development (R&D) infrastructures, as well as by improving and harmonising the services provided by these infrastructures through joint research activities (JRA). The project successfully provided all available services to advance 29 projects and, through engaging all vaccine stakeholders, successfully laid down the blueprint for the implementation of a permanent research infrastructure for early vaccine R&D in Europe. Copyright © 2015. Published by Elsevier Ltd.

  9. Fostering Skills to Enhance Critical Educators: A Pedagogical Proposal for Pre-Service Teachers

    Science.gov (United States)

    Aguirre Morales, Jahir; Ramos Holguín, Bertha

    2011-01-01

    This article aims to share with teacher-educators a pedagogical proposal which we have applied in the past year. This investigation analyzes issues linked to critical pedagogy using movies connected to educational themes and readings based on critical pedagogy. We have used this study to generate class discussions in order to analyze educational…

  10. Enhanced Critical Care Air Transport Team Training for Mitigation of Task Saturation

    Science.gov (United States)

    2013-03-01

    specialized members (physician, critical care nurse , and respiratory therapist) trained to handle the complex, critical nature of patients in hemodynamic ...with complex medical conditions have been poorly studied. 3.0 BACKGROUND Teams are composed of three medical personnel (a physician, a nurse , and

  11. Think Pair Share: A Teaching Learning Strategy to Enhance Students' Critical Thinking

    Science.gov (United States)

    Kaddoura, Mahmoud

    2013-01-01

    This study investigated the change in critical thinking (CT) skills of baccalaureate nursing students who were educated using a Think-Pair-Share (TPS) or an equivalent Non-Think-Pair-Share (Non-TPS) teaching method. Critical thinking has been an essential outcome of nursing students to prepare them to provide effective and safe quality care for…

  12. Enhancing Critical Thinking across the Undergraduate Experience: An Exemplar from Engineering

    Science.gov (United States)

    Ralston, Patricia A.; Bays, Cathy L.

    2013-01-01

    Faculty in a large, urban school of engineering designed a longitudinal study to assess the critical thinking skills of undergraduate students as they progressed through the engineering program. The Paul-Elder critical thinking framework was used to design course assignments and develop a holistic assessment rubric. The curriculum was re-designed…

  13. Using Teacher Questions to Enhance EFL Students' Critical Thinking Ability

    Science.gov (United States)

    Feng, Zhiwen

    2013-01-01

    In this era of information and economic globalization, developing critical thinking skills in college students has been set as a primary goal and learning outcome in higher education. Teaching critical thinking, however, is a great challenge to most EFL teachers. This article, therefore, attempts to examine the nature and teachability of critical…

  14. Critical analysis of mechanisms of incentive regulation operators of electricity and natural gas networks and infrastructures. Final report. Public version, 23 November 2015

    International Nuclear Information System (INIS)

    2015-01-01

    As the first mechanisms of incentive regulation of electricity and gas network operators have been introduced by the French Commission for Energy Regulation (CRE) since 2008 (the report recalls the main objectives of these mechanisms and their consequences), this report proposes a critical analysis of such mechanisms related to investments and to exploitation expenses of operators and which have been implemented in Germany, Spain, Ireland and in the United Kingdom. For each country, the report proposes a detailed description of these mechanisms for the electric power sector and the gas sector (general overview of the regulation framework, objectives, determination of the authorised income, shift processing, specific incentive mechanisms, modalities of management by the regulator), and a feedback of the different concerned actors (operators and regulators). The last part proposes a description of the status of the French regulation, and an analysis of transposition of the four foreign regulations, and states some propositions for evolutions (objectives, overview of recommended evolutions, focus on three types of regulation evolution: processing of arbitral charges, processing of other incited capital charges, processing of arbitral charges)

  15. The role of interfacial defects in enhancing the critical current density of YBa2Cu3O7-delta coatings

    Energy Technology Data Exchange (ETDEWEB)

    Foltyn, Stephen R [Los Alamos National Laboratory; Wang, Haiyan [Los Alamos National Laboratory; Civale, Leonardo [Los Alamos National Laboratory; Maiorov, Boris A [Los Alamos National Laboratory; Jia, Quanxi [Los Alamos National Laboratory

    2009-01-01

    The critical current density (J{sub c}) of YBa{sub 2}Cu{sub 3}0{sub 7-{delta}} (YBCO) films can approach 10 MA/cm{sup 2} at 77 K in self field , but only for very thin films. We have shown previously that strong thickness dependence results if J{sub c} is enhanced near the film-substrate interface. In the present work we investigate interfacial enhancement using laser-deposited YBCO films on NdGaO{sub 3} substrates, and find that we can adjust deposition conditions to switch the enhancement on and off. Interestingly, we find that the 'on' state is accompanied by interfacial misfit dislocations, establishing an unambiguous correlation between enhanced J{sub c} and dislocations at the film-substrate interface.

  16. Anomalous enhancement of the lower critical field deep in the superconducting state of LaRu4As12

    Science.gov (United States)

    Juraszek, J.; Bochenek, Ł.; Wawryk, R.; Henkie, Z.; Konczykowski, M.; Cichorek, T.

    2018-05-01

    LaRu4As12 with the critical temperature Tc = 10.4 K displays several features which point at a non-singlet superconducting order parameter, although the bcc crystal structure of the filled skutterudites does not favour the emergence of multiple energy gaps. LaRu4As12 displays an unexpected enhancement of the lower critical field deep in superconducting state which can be attributed to the existence of two superconducting gaps. At T = 0.4 K, the local magnetization measurements were performed utilizing miniaturized Hall sensors.

  17. Problem based learning and involvement in off campus organization enhance students’ critical participation behavior

    Directory of Open Access Journals (Sweden)

    Endang Lestari

    2009-09-01

    Full Text Available Aim Developing students’ critical thinking and critical participation in solving patients’ as well as a community’s problem should become the concern of medical education. This study aimed to identify several factors related to medical students’ critical participation behavior.Methods The subjects consisted of students of Sultan Agung Medical School (Unissula, year entry 2005, 2006, and 2007. Critical participation behavior was assessed using modified EMI: Critical Thinking Disposition Assessment. Relative risks (RR were calculated using Cox regression analysis with constant time.Results 64,6% (388 out of 600 of the students participated in this study. Those who were involved in PBL for two and three years, rather than one year, had twice as high good critical thinking behavior [adjusted relative risk (RR = 2.07; 95% confidence interval (CI = 1.37–3.14; and RR = 2.33; 95% CI = 155–3.49, respectively.] Students who were more involved in off-campus organizations had a good critical participation behavior; 75% higher than those who were not involved in off-campus organizations (RR = 1.75; 95% CI = 0.99–3.11.Conclusion Besides involving in PBL learning approach, students should be motivated to be involved in off-campus organizations in order to improve their critical participation behavior (Med J Indones 2009;18:215-20Key words: critical participation behavior, PBL, off-campus organization

  18. Critically Reflective Pedagogical Model: a Pragmatic Blueprint for Enhancing Learning and Teaching in Construction Disciplines

    OpenAIRE

    Kamardeen, Imriyas

    2015-01-01

    University lecturers who aspire to provide an improved learning experience for their students continually, and be recognised for high quality teaching should embrace a critically reflective practice. Nonetheless, developing as a reflective lecturer is challenging, although there are pedagogical literatures as general guidelines. This study introduces a new pedagogical model of critically reflective practice to simplify the efforts for lecturers and to shorten their journey to becoming effecti...

  19. Mastering Microsoft Azure infrastructure services

    CERN Document Server

    Savill, John

    2015-01-01

    Understand, create, deploy, and maintain a public cloud using Microsoft Azure Mastering Microsoft Azure Infrastructure Services guides you through the process of creating and managing a public cloud and virtual network using Microsoft Azure. With step-by-step instruction and clear explanation, this book equips you with the skills required to provide services both on-premises and off-premises through full virtualization, providing a deeper understanding of Azure's capabilities as an infrastructure service. Each chapter includes online videos that visualize and enhance the concepts presented i

  20. A Teacher Action Research Study: Enhancing Student Critical Thinking Knowledge, Skills, Dispositions, Application and Transfer in a Higher Education Technology Course

    Science.gov (United States)

    Phelan, Jack Gordon

    2012-01-01

    This study examined the effects of a critical thinking instructional intervention in a higher education technology course with the purpose of determining the extent to which the intervention enhanced student critical thinking knowledge, skills, dispositions, application and transfer abilities. Historically, critical thinking has been considered…

  1. Rigorous Mathematical Thinking Approach to Enhance Students’ Mathematical Creative and Critical Thinking Abilities

    Science.gov (United States)

    Hidayat, D.; Nurlaelah, E.; Dahlan, J. A.

    2017-09-01

    The ability of mathematical creative and critical thinking are two abilities that need to be developed in the learning of mathematics. Therefore, efforts need to be made in the design of learning that is capable of developing both capabilities. The purpose of this research is to examine the mathematical creative and critical thinking ability of students who get rigorous mathematical thinking (RMT) approach and students who get expository approach. This research was quasi experiment with control group pretest-posttest design. The population were all of students grade 11th in one of the senior high school in Bandung. The result showed that: the achievement of mathematical creative and critical thinking abilities of student who obtain RMT is better than students who obtain expository approach. The use of Psychological tools and mediation with criteria of intentionality, reciprocity, and mediated of meaning on RMT helps students in developing condition in critical and creative processes. This achievement contributes to the development of integrated learning design on students’ critical and creative thinking processes.

  2. Representing nature : Late twentieth century green infrastructures in Paris

    NARCIS (Netherlands)

    Van der Velde, J.R.T.; De Wit, S.I.

    2015-01-01

    The appreciation of green infrastructures as ‘nature’ by urban communities presents a critical challenge for the green infrastructure concept. While many green infrastructures focus on functional considerations, their refinement as places where concepts of nature are represented and where nature can

  3. Critical variables in the performance of a productivity-enhanced solar still

    KAUST Repository

    Ayoub, George M.; Malaeb, Lilian; Saikaly, Pascal

    2013-01-01

    A new and sustainable modification has been introduced into the conventional solar still, considerably increasing its productivity. This enhancement in the solar still productivity is achieved without forsaking the basic features of the still

  4. Enhancement of superconducting critical current by injection of quasiparticles in superconductor semiconductor devices

    DEFF Research Database (Denmark)

    Kutchinsky, Jonatan; Taboryski, Rafael Jozef; Sørensen, C. B.

    2000-01-01

    We report new measurements on 3-terminal superconductor semiconductor injection devices, demonstrating enhancement of the supercurrent by injection from a superconducting injector electrode. Two other electrodes were used as detectors. Applying a small voltage to the injector, reduced the maximum...

  5. Investigation on the enhancement of the critical current densities in bronze-process Nb3Sn

    International Nuclear Information System (INIS)

    Hong, M.; Wu, I.W.; Morris, J.W. Jr.; Gilbert, W.; Hassenzahl, W.V.; Taylor, C.

    1981-10-01

    The work reported here addressed the problem of improving the critical current characteristic of a comercial multifilamentary Nb 3 Sn strand by varying its heat treatment. The work was done from the perspective that the critical current characteristic is controlled by the metallurgical state of the reacted layer, which is, in turn, fixed by the processing the wire has undergone. The research was carried out in parallel with metallographic studies which analyzed the microstructure and composition profile within the reacted Nb 3 Sn layer as a function of heat treatment. The combined results of metallographic and processing research suggest that it is possible to engineer the microstructure of the reacted layer to improve J/sub c/(H). The specific product of the work is a tailored double-aging treatment which introduces a favorable combination of microstructure and composition in the reacted layer and causes a substantial improvement in the critical current characteristic of the strand

  6. Simulation experience enhances physical therapist student confidence in managing a patient in the critical care environment.

    Science.gov (United States)

    Ohtake, Patricia J; Lazarus, Marcilene; Schillo, Rebecca; Rosen, Michael

    2013-02-01

    Rehabilitation of patients in critical care environments improves functional outcomes. This finding has led to increased implementation of intensive care unit (ICU) rehabilitation programs, including early mobility, and an associated increased demand for physical therapists practicing in ICUs. Unfortunately, many physical therapists report being inadequately prepared to work in this high-risk environment. Simulation provides focused, deliberate practice in safe, controlled learning environments and may be a method to initiate academic preparation of physical therapists for ICU practice. The purpose of this study was to examine the effect of participation in simulation-based management of a patient with critical illness in an ICU setting on levels of confidence and satisfaction in physical therapist students. A one-group, pretest-posttest, quasi-experimental design was used. Physical therapist students (N=43) participated in a critical care simulation experience requiring technical (assessing bed mobility and pulmonary status), behavioral (patient and interprofessional communication), and cognitive (recognizing a patient status change and initiating appropriate responses) skill performance. Student confidence and satisfaction were surveyed before and after the simulation experience. Students' confidence in their technical, behavioral, and cognitive skill performance increased from "somewhat confident" to "confident" following the critical care simulation experience. Student satisfaction was highly positive, with strong agreement the simulation experience was valuable, reinforced course content, and was a useful educational tool. Limitations of the study were the small sample from one university and a control group was not included. Incorporating a simulated, interprofessional critical care experience into a required clinical course improved physical therapist student confidence in technical, behavioral, and cognitive performance measures and was associated with high

  7. Assessment of myocardial enhancement during coronary CT angiography in critically ill patients

    Energy Technology Data Exchange (ETDEWEB)

    Mírka, Hynek, E-mail: mirka@fnplzen.cz [Department of Imaging Methods, Faculty of Medicine and University Teaching Hospital in Pilsen, Alej Svobody 80, 304 60 Plzeň (Czech Republic); Biomedical Centre, Faculty of Medicine in Plzen, Charles University in Prague, Alej Svobody 76, 304 60 Plzeň (Czech Republic); Ferda, Jiří, E-mail: ferda@fnplzen.cz [Department of Imaging Methods, Faculty of Medicine and University Teaching Hospital in Pilsen, Alej Svobody 80, 304 60 Plzeň (Czech Republic); Baxa, Jan, E-mail: baxaj@fnplzen.cz [Department of Imaging Methods, Faculty of Medicine and University Teaching Hospital in Pilsen, Alej Svobody 80, 304 60 Plzeň (Czech Republic)

    2016-10-15

    Highlights: • There are still unmet needs for the imaging, such as conditions with unknown cause that are not associated with dominant symptoms indicating primarily cardiac cause. • The contribution of the myocardial enhancement evaluation improves to determining the diagnosis of acute myocardial injury and choosing appropriate treatment. • When incorporating the myocardial enhancement assessment into the imaging algorithm, emphasis is placed on a uniform evaluation approach. • The color coded images of the myocardial enhancement in emergency situations help identify the most serious pathologies and shorten the time to adequate therapy. - Abstract: There are still challenges and unmet needs for the imaging techniques, such as conditions of uncertain origin in patients with clinically serious, life-threatening conditions with unknown cause that are not associated with dominant chest pain, ECG changes or other symptoms indicating a possible primarily cardiac or coronary cause. The contribution of the myocardial enhancement evaluation of urgent cardiac CTA scans significantly improves to determining the diagnosis of acute myocardial injury and choosing appropriate treatment. When incorporating the myocardial enhancement assessment into the imaging algorithm of an emergency department, emphasis is placed on a uniform imaging procedure and a uniform evaluation approach. The color coded images of the myocardial enhancement in emergency situations helps identify the most serious pathologies and shorten the time to adequate targeted therapy in patients.

  8. Assessment of myocardial enhancement during coronary CT angiography in critically ill patients

    International Nuclear Information System (INIS)

    Mírka, Hynek; Ferda, Jiří; Baxa, Jan

    2016-01-01

    Highlights: • There are still unmet needs for the imaging, such as conditions with unknown cause that are not associated with dominant symptoms indicating primarily cardiac cause. • The contribution of the myocardial enhancement evaluation improves to determining the diagnosis of acute myocardial injury and choosing appropriate treatment. • When incorporating the myocardial enhancement assessment into the imaging algorithm, emphasis is placed on a uniform evaluation approach. • The color coded images of the myocardial enhancement in emergency situations help identify the most serious pathologies and shorten the time to adequate therapy. - Abstract: There are still challenges and unmet needs for the imaging techniques, such as conditions of uncertain origin in patients with clinically serious, life-threatening conditions with unknown cause that are not associated with dominant chest pain, ECG changes or other symptoms indicating a possible primarily cardiac or coronary cause. The contribution of the myocardial enhancement evaluation of urgent cardiac CTA scans significantly improves to determining the diagnosis of acute myocardial injury and choosing appropriate treatment. When incorporating the myocardial enhancement assessment into the imaging algorithm of an emergency department, emphasis is placed on a uniform imaging procedure and a uniform evaluation approach. The color coded images of the myocardial enhancement in emergency situations helps identify the most serious pathologies and shorten the time to adequate targeted therapy in patients.

  9. STORIES OF TECHNOLOGY-ENHANCEMENT IN HIGHER EDUCATION – A CRITICAL APPROACH

    Directory of Open Access Journals (Sweden)

    Trine Fossland

    2016-11-01

    Full Text Available There is a large body of research on technology-enhanced learning, but questions related to the educational effectiveness of technology use still needs to be questioned. In this paper, I argue that digital innovators’ stories about technology enhancement may constitute a rich source for understanding this complex educational phenomenon both in relation to teachers’ daily practices and the implementation of ICT in higher education at large. Based on biographical interviews with “digital innovators”, the aim of this paper is to investigate how [their] digital competence is used to enhance teaching and learning in higher education. This paper asks; how do digital innovators approach the use of ICT to enhance students’ learning and what are the organisational conditions for this approach? The findings suggests that technology-enhancement is linked to nine key characteristics: different educational models, authenticity, pedagogical added values, meaningful student activities, changing approaches to feedback, assessment and connection with the outside world, as well as holistic planning, supportive leaders and strong micro-cultures. This paper proposes a more nuanced understanding of the term technology enhanced learning and suggests strategies for educational development and further investigations related to this phenomenon in higher education.

  10. Prospects for enhancement of critical current of HTSC: thin films with artificial pinning centres

    Energy Technology Data Exchange (ETDEWEB)

    Mozhaev, P.B. (Institute of Physics and Technology RAS, Moscow (Russian Federation)); Mozhaev, J.E.; Khoryushin, A.V.; Bindslev Hansen, J.; Jacobsen, C.S. (Technical Univ. of Denmark, Dept. of Physics, Kgs. Lyngby (Denmark)); Kotelyanskil, I.M.; Luzanov, V.A. (Institute of Radio Engineering and Electronics RAS, Moscow (Russian Federation)); Puriy, A.V. (Moscow Institute of Physics and Technology, Moscow (Russian Federation)); Yurchenko, V.; Johansen, T. (Univ. of Oslo, Dept. of Physics, Oslo (Norway))

    2008-10-15

    Improvement of the critical current of YBCO thin films and heterostructures remains one of the main tasks for fabrication of modern superconducting wires and connectors. Possible ways of achieving the goal are choice of superconductor composition, engineering of artificial pinning centres, and combination of the superconducting layer with other materials. The team of the Department of Physics at Technical University of Denmark is working in all these fields and this paper is a short review of our achievements in an attempt to improve the critical current density of YBCO thin films. (au)

  11. Wiki Activities in Blended Learning for Health Professional Students: Enhancing Critical Thinking and Clinical Reasoning Skills

    Science.gov (United States)

    Snodgrass, Suzanne

    2011-01-01

    Health professionals use critical thinking, a key problem solving skill, for clinical reasoning which is defined as the use of knowledge and reflective inquiry to diagnose a clinical problem. Teaching these skills in traditional settings with growing class sizes is challenging, and students increasingly expect learning that is flexible and…

  12. Meaningful Gamification for Journalism Students to Enhance Their Critical Thinking Skills

    Science.gov (United States)

    Huang, Ling-Yi; Yeh, Yu-Chu

    2017-01-01

    Training in critical thinking is essential for the professional development of journalism students. To achieve this goal, this study developed a gamified platform and a blended learning curriculum. During an 18-week experimental instruction period, a series of instructional activities, which included online discussions as well as classroom…

  13. Enhancing Student Learning and Critical Thinking through Academic Controversy in Post Secondary Macroeconomics

    Science.gov (United States)

    Santicola, Craig F.

    2011-01-01

    There is a lack of student learning and critical thinking skills in post-secondary macroeconomics courses. The literature indicates that the lack of learning outcomes can be attributed to the reliance on traditional lecture and the failure to adopt innovative instructional techniques. The purpose of this study was to investigate the student…

  14. Using Debate as a Pedagogical Tool in Enhancing Pre-Service Teachers' Learning and Critical Thinking

    Science.gov (United States)

    Yang, Chien-Hui; Rusli, Enniati

    2012-01-01

    Research has shown that using debate in higher education as a pedagogical tool has effect on promoting higher order and critical thinking (Camp & Schnader, 2010; Ng et al., 2004; Roy & Macchiette, 2005; Ryan & College, 2006). Debate has been implemented in various disciplines with adult learners, such as psychology (Budesheim &…

  15. Using Online Learning Platforms to Enhance Students' Reflective and Critical Thinking

    Science.gov (United States)

    Lennon, Sean M.

    2010-01-01

    A working paper on how to use common E-Learning platforms to incorporate critical thinking and reflection into traditional and hybrid formatted curriculums. Definitions and conceptual framework of both constructs are discussed and their benefits towards cognitions and reflection are highlighted. Best practices, including examples of previous…

  16. Enhancing Students' Critical Awareness in a Second Chance School in Greece: Reality or Wishful Thinking?

    Science.gov (United States)

    Efstathiou, Ioannis

    2009-01-01

    This paper is about a case study investigating into a Second Chance School in Greece as an institution for raising students' social awareness along the principles of critical pedagogy. Through the prism of symbolic interactionism, students' and teachers' negotiated perspectives formulating school and classroom culture reveal that students'…

  17. The home hemodialysis hub: physical infrastructure and integrated governance structure.

    Science.gov (United States)

    Marshall, Mark R; Young, Bessie A; Fox, Sally J; Cleland, Calli J; Walker, Robert J; Masakane, Ikuto; Herold, Aaron M

    2015-04-01

    An effective home hemodialysis program critically depends on adequate hub facilities and support functions and on transparent and accountable organizational processes. The likelihood of optimal service delivery and patient care will be enhanced by fit-for-purpose facilities and implementation of a well-considered governance structure. In this article, we describe the required accommodation and infrastructure for a home hemodialysis program and a generic organizational structure that will support both patient-facing clinical activities and business processes. © 2015 International Society for Hemodialysis.

  18. Sustainable Water Infrastructure

    Science.gov (United States)

    Resources for state and local environmental and public health officials, and water, infrastructure and utility professionals to learn about sustainable water infrastructure, sustainable water and energy practices, and their role.

  19. Fostering critical thinking skills: a strategy for enhancing evidence based wellness care

    Directory of Open Access Journals (Sweden)

    Jamison Jennifer R

    2005-09-01

    Full Text Available Abstract Chiropractic has traditionally regarded itself a wellness profession. As wellness care is postulated to play a central role in the future growth of chiropractic, the development of a wellness ethos acceptable within conventional health care is desirable. This paper describes a unit which prepares chiropractic students for the role of "wellness coaches". Emphasis is placed on providing students with exercises in critical thinking in an effort to prepare them for the challenge of interfacing with an increasingly evidence based health care system. Methods This case study describes how health may be promoted and disease prevented through development of personalized wellness programs. As critical thinking is essential to the provision of evidence based wellness care, diverse learning opportunities for developing and refining critical thinking skills have been created. Three of the learning opportunities are an intrinsic component of the subject and, taken together, contributed over 50% of the final grade of the unit. They include a literature review, developing a client wellness contract and peer evaluation. In addition to these 3 compulsory exercises, students were also given an opportunity to develop their critical appraisal skills by undertaking voluntary self- and unit evaluation. Several opportunities for informal self-appraisal were offered in a structured self-study guide, while unit appraisal was undertaken by means of a questionnaire and group discussion at which the Head of School was present. Results Formal assessment showed all students capable of preparing a wellness program consistent with current thinking in contemporary health care. The small group of students who appraised the unit seemed to value the diversity of learning experiences provided. Opportunities for voluntary unit and self-appraisal were used to varying degrees. Unit evaluation provided useful feedback that led to substantial changes in unit structure

  20. Green(ing) infrastructure

    CSIR Research Space (South Africa)

    Van Wyk, Llewellyn V

    2014-03-01

    Full Text Available the generation of electricity from renewable sources such as wind, water and solar. Grey infrastructure – In the context of storm water management, grey infrastructure can be thought of as the hard, engineered systems to capture and convey runoff..., pumps, and treatment plants.  Green infrastructure reduces energy demand by reducing the need to collect and transport storm water to a suitable discharge location. In addition, green infrastructure such as green roofs, street trees and increased...

  1. The Critical Infrastructure Portfolio Selection Model

    Science.gov (United States)

    2008-06-13

    metering/ billing 7 Rehabilitation of WTP 20 Maintain potable water production capacity and improve quality (esp. turbidity and color) 8 Construction of...junction/ segment of rail (rehab) 5 Shrine (rehab) 6 Rehabilitation of water distribution network 7 Rehabilitation of WTP 8 Construction of...

  2. Cyber Security: Critical Infrastructure Controls Assessment Framework

    Science.gov (United States)

    2011-05-01

    the threats to and 3 • Patch and configuration management • Vulnerability and incident t 2 vulnerabilities • Recommendations to reduce 4 managemen 5... Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other...unclassified c. THIS PAGE unclassified Standard Form 298 (Rev. 8-98) Prescribed by ANSI Std Z39-18 Purpose P id i t hrov e an overv ew on assessmen

  3. Critical infrastructure cyber-security risk management

    OpenAIRE

    Spyridopoulos, T.; Maraslis, K.; Tryfonas, T.; Oikonomou, G.

    2017-01-01

    Traditional IT cyber-security risk management methods are based on the evaluation of risks calculated as the likelihood of cyber-security incidents occurring. However, these probabilities are usually estimations or guesses based on past experience and incomplete data. Incorrect estimations can lead to errors in the evaluation of risks that can ultimately affect the protection of the system. This issue is also transferred to methods used in Industrial Control Systems (ICSs), as they are mainly...

  4. Paradigm Change: Cybersecurity of Critical Infrastructure

    Science.gov (United States)

    2013-04-01

    IT budget management insights from industry leading Chief Information Officers (CIO). The former CIO of PNC Financial Services Group, Tim Shack...tweltfh largest Financial Services Instituition within the United States. ($300B) 50 Overby, “Tips From the Budget Masters.” 51 Ibid. 52 Ibid. 56...47 The Federal Information Security Management Act of 2002 .....................................48 The 2003 National

  5. Enhancement of biomembrane functions under phase-separated conditions: A self-organized criticality phenomenon?

    International Nuclear Information System (INIS)

    Eze, M.O.; Chela Flores, J.

    1993-12-01

    Self-organized criticality (SOC) is hereby proposed as a possible physical basis for explaining observations in the temperature-dependence of the rates of biological membrane-associated events. The biomembrane undergoes a reversible, cooperative, thermotropic gel-to-liquid crystalline phase transition which is broad, and involves lateral phase separation. The lateral phase separated (rather than the totally gel-, or the totally liquid crystalline-) membrane state has been observed to be the state in which vital membrane functions are facilitated. The membrane in this unique state is viewed, for our purposes here, as a dynamical, extended dissipative system with spatial and temporal degrees of freedom, exhibiting power law behaviour, typical of the self-organized critical state. Experiments are suggested for verifying this hypothesis. (author). 30 refs

  6. Critical issues in enhancing brightness in thin film phosphors for flat-panel display applications

    International Nuclear Information System (INIS)

    Singh, R.K.; Chen, Z.; Kumar, D.; Cho, K.; Ollinger, M.

    2002-01-01

    Thin film phosphors have potential applications in field emission flat-panel displays. However, they are limited by the lower cathodoluminescent brightness in comparison to phosphor powders. In this paper, we have investigated the critical parameters that need to be optimized to increase the brightness of phosphor thin films. Specifically, we studied the role of surface roughness and optical properties of the substrate on the brightness of the phosphor films. Thin Y 2 O 3 :Eu phosphor films were deposited on various substrates (lanthanum aluminate, quartz, sapphire, and silicon) with thicknesses varying from 50 to 500 nm. A model that accounts for diffuse and specular or scattering effects has been developed to understand the effects of the microstructure on the emission characteristics of the cathodoluminescent films. The results from the model show that both the optical properties of the substrate and the surface roughness of the films play a critical role in controlling the brightness of laser deposited phosphor films

  7. Critically Reflective Pedagogical Model: a Pragmatic Blueprint for Enhancing Learning and Teaching in Construction Disciplines

    Directory of Open Access Journals (Sweden)

    Imriyas Kamardeen

    2015-11-01

    Full Text Available University lecturers who aspire to provide an improved learning experience for their students continually, and be recognised for high quality teaching should embrace a critically reflective practice. Nonetheless, developing as a reflective lecturer is challenging, although there are pedagogical literatures as general guidelines. This study introduces a new pedagogical model of critically reflective practice to simplify the efforts for lecturers and to shorten their journey to becoming effective teachers. A two-phased action research strategy was adopted for the development and validation of the new model. The first phase operationalised the Brookfield’s four-lens framework to create a reflective teaching practice model, which was then validated with a case study in the second phase. The model offers a pragmatic blueprint for lecturers to build a career with sustained quality of teaching, which in turn translates into improved learning experiences for students.

  8. TGT for chemistry learning to enhance students' achievement and critical thinking skills

    Science.gov (United States)

    Bolhassan, Norlailatulakma; Taha, Hafsah

    2017-05-01

    The form of cooperative learning known as Teams-Games-Tournament (TGT) in this study favors the use of teams work and learning tools combined with student play and practice to foster students' achievement and critical thinking skills. Using this paradigm, this study incorporates Teams-Games-Tournament and Flash Cards Games Kit during an 8-weeks experimental instruction period that includes 67 Form Four students; 34 students in the experimental group and 33 in the control group. The learning design in experimental group emphasizes scaffolding, guided practices, cooperative learning, and active participation in learning. While the experimental group experienced the TGT approach, the control group encountered the conventional teaching approach of chemistry drills. An achievement chemistry test and Watson Glaser Critical Thinking Appraisal (WGCTA) were used for the pretest and posttest. The finding indicates that TGT learning was more effective than drills in promoting chemistry performance, and the playful competiveness among students promotes students' critical thinking. In addition, TGT cooperative learning also creates an active learning environment in solving problems and discussions among students and teachers.

  9. Enhancing Comprehension and Production of Argumentation through Critical Thinking Awareness-Raising

    Directory of Open Access Journals (Sweden)

    Mahlagha Akbari

    2018-02-01

    Full Text Available Language pedagogy aims to equip learners with tools to cope critically with the complexity of the language input and rationally evaluate the authenticity of the data. An indispensable part of learning to read and write a foreign language should, hence, develop critical thinking skills that allow interpretation and accurate expression of overt and covert propositions. The purpose of this quasi-experimental study was to examine the impact of an eleven-session critical thinking (CT awareness-raising (AR mingled with an Advanced Writing Course on 50 male and female Iranian postgraduate TEFL students’ reading comprehension and the accuracy, complexity, and organization of their writing of argumentative texts. The participants in two intact classes were randomly assigned as the experimental and control groups. The treatment followed a reading to writing direction with a stronger focus on explicit presentation and practice of reading-embedded argumentation elements and CT skills in the experimental group. The control group, however, started off with the same materials with now CT focus and proceeded to the detailed process-oriented writing phase. Comparison of the groups’ reading and writing post-test scores verified superior performance of the experimental group in reading and writing of argumentative texts and offer pedagogical implications.

  10. Enhancements of the critical currents of YBaCuO single crystals by neutron (n) and proton (p) irradiation

    International Nuclear Information System (INIS)

    Vlcek, B.M.; Frischherz, M.C.; Vishwanathan, H.K.; Welp, U.; Crabtree, G.W.; Kirk, M.A.

    1992-01-01

    We present results of magnetization hysteresis and T c measurements of neutron and proton irradiated YBaCuO single crystals. The crystals used for comparison were irradiated to a fluence of 2x10 7 n/cm 2 (n,E > 0.1MeV) and 1x10 16 p/cm 2 (p,E=3.5MeV). The critical currents at 1T and 10K are enhanced by a factor of 5 for the neutron irradiated and a factor of 9 for the proton irradiated sample respectively. After irradiation the crystals were annealed at 100, 200 and 300C for 8h each in air. Following each annealing step the critical temperature and the magnetization hysteresis at 10 and 70K was measured. Upon annealing, we observe a decrease of the critical currents, which is more pronounced for the proton irradiated sample. This decrease is related to the removal of point defects or their small clusters. Thus, their contribution to pinning can be studied. The critical temperature decreases after both types of irradiation by about 0.5K and is fully recovered after annealing

  11. Improving the Resilience of Major Ports and Critical Supply Chains to Extreme Coastal Flooding: a Combined Artificial Neural Network and Hydrodynamic Simulation Approach to Predicting Tidal Surge Inundation of Port Infrastructure and Impact on Operations.

    Science.gov (United States)

    French, J.

    2015-12-01

    Ports are vital to the global economy, but assessments of global exposure to flood risk have generally focused on major concentrations of population or asset values. Few studies have examined the impact of extreme inundation events on port operation and critical supply chains. Extreme water levels and recurrence intervals have conventionally been estimated via analysis of historic water level maxima, and these vary widely depending on the statistical assumptions made. This information is supplemented by near-term forecasts from operational surge-tide models, which give continuous water levels but at considerable computational cost. As part of a NERC Infrastructure and Risk project, we have investigated the impact of North Sea tidal surges on the Port of Immingham, eastern, UK. This handles the largest volume of bulk cargo in the UK and flows of coal and biomass that are critically important for national energy security. The port was partly flooded during a major tidal surge in 2013. This event highlighted the need for improved local forecasts of surge timing in relation to high water, with a better indication of flood depth and duration. We address this problem using a combination of data-driven and numerical hydrodynamic models. An Artificial Neural Network (ANN) is first used to predict the surge component of water level from meteorological data. The input vector comprises time-series of local wind (easterly and northerly wind stress) and pressure, as well as regional pressure and pressure gradients from stations between the Shetland Islands and the Humber estuary. The ANN achieves rms errors of around 0.1 m and can generate short-range (~ 3 to 12 hour) forecasts given real-time input data feeds. It can also synthesize water level events for a wider range of tidal and meteorological forcing combinations than contained in the observational records. These are used to force Telemac2D numerical floodplain simulations using a LiDAR digital elevation model of the port

  12. Nursing care plans versus concept maps in the enhancement of critical thinking skills in nursing students enrolled in a baccalaureate nursing program.

    Science.gov (United States)

    Sinatra-Wilhelm, Tina

    2012-01-01

    Appropriate and effective critical thinking and problem solving is necessary for all nurses in order to make complex decisions that improve patient outcomes, safety, and quality of nursing care. With the current emphasis on quality improvement, critical thinking ability is a noteworthy concern within the nursing profession. An in-depth review of literature related to critical thinking was performed. The use of nursing care plans and concept mapping to improve critical thinking skills was among the recommendations identified. This study compares the use of nursing care plans and concept mapping as a teaching strategy for the enhancement of critical thinking skills in baccalaureate level nursing students. The California Critical Thinking Skills Test was used as a method of comparison and evaluation. Results indicate that concept mapping enhances critical thinking skills in baccalaureate nursing students.

  13. ENEA infrastructures toward the LFR development

    International Nuclear Information System (INIS)

    Tarantino, M.; Agostini, P.; Del Nevo, A.; Di Piazza, I.; Rozzia, D.

    2013-01-01

    ENEA has one of the most relevant EU R&D infrastructures for HLM technological development, and it is strongly involved in the main research programs worldwide supporting the development of sub-critical (MYRRHA) and critical lead cooled reactors (ALFRED). In these frames a large experimental program ranging from HLM thermal-hydraulic to large scale experiment has been implemented

  14. Enhanced vortex pinning and critical current density in proton-irradiated YBa2Cu3O7-δ thin films

    International Nuclear Information System (INIS)

    Venturini, E.L.; Siegal, M.P.; White, A.E.; Hou, S.Y.; Phillips, J.M.

    1993-01-01

    The appropriate fluence of 2.0 MeV H + ions has been shown previously to enhance the critical current density J c by a factor of two at a magnetic field of 0.9 tesla in 1,000 angstrom thick epitaxial films of YBa 2 Cu 3 O 7-δ grown by the ex situ BaF 2 process. The as-grown films exhibit single crystal-like behavior in both atomic ordering and J c versus temperature and magnetic field. TRIM simulations suggest that H + irradiation generates mainly point defects throughout the crystal structure. The authors show here that such defects result in an even greater enhancement of J c for fields above 1 tesla plus a significant increase in the apparent vortex pinning potential deduced from magnetization relaxation data

  15. Enhanced vortex pinning and critical current density in proton-irradiated YBa2Cu3O7-δ thin films

    International Nuclear Information System (INIS)

    Venturini, E.L.; Siegal, M.P.; White, A.E.; Hou, S.Y.; Phillips, J.M.

    1992-01-01

    The appropriate fluence of 2.0 MeV H + ions has been shown previously to enhance the critical current density J c by a factor of two at a magnetic field of 0.9 tesla in 1000 Angstrom thick epitaxial films of YBa 2 Cu 3 O 7-δ grown by the ex situ BaF 2 process. The as-grown films exhibit single crystal-like behavior in both atomic ordering and J c versus temperature and magnetic field. TRIM simulations suggest that H + irradiation generates mainly point defects throughout the crystal structure. We show here that such defects produce both a large enhancement of J c for fields above 1 tesla and a significant increase in the apparent vortex pinning potential deduced from magnetization relaxation data

  16. Enhanced vortex pinning and critical current density in proton-irradiated YBa2Cu3O(7-delta) thin films

    Science.gov (United States)

    Venturini, E. L.; Siegal, M. P.; White, A. E.; Hou, S. Y.; Phillips, J. M.

    1992-11-01

    The appropriate fluence of 2.0 MeV H(sup +) ions has been shown previously to enhance the critical current density J(sub c) by a factor of two at a magnetic field of 0.9 tesla in 1000 (Angstrom) thick epitaxial films of YBa(2)Cu(3)O(7-delta) grown by the ex situ BaF2 process. The as-grown films exhibit single crystal-like behavior in both atomic ordering and J(sub c) versus temperature and magnetic field. TRIM simulations suggest that H(sup +) irradiation generates mainly point defects throughout the crystal structure. We show here that such defects produce both a large enhancement of J(sub c) for fields above 1 tesla and a significant increase in the apparent vortex pinning potential deduced from magnetization relaxation data.

  17. The Voiceless Victim: A critical analysis of the impact of enhanced victim participation in the criminal justice process

    Directory of Open Access Journals (Sweden)

    Sarah Moynihan

    2015-12-01

    Full Text Available In contrast to many European jurisdictions, the victim of an alleged crime in England, Wales and Northern Ireland is denied any form of meaningful participation at the trial stage of the criminal justice process. This is by reason of the unyielding structure of the Anglo-American adversarial system, which facilitates a dispute between two parties only - the prosecution, acting on behalf of the collective public interest and the defence. In recent years, however, the victims’ movement has gained momentum as advocates of victims’ rights have been engaged in an impassioned campaign to enhance the participatory rights of victims in the criminal justice process. Fervent arguments have been articulated pertaining to the value of various forms of victim input. This paper cogitates some of these arguments and critically evaluates how enhanced victim participation in the criminal justice process has the potential to undercut the integrity of the Anglo- American adversarial system; a system with objective adjudication at its core.

  18. Enhanced pool boiling critical heat flux induced by capillary wicking effect of a Cr-sputtered superhydrophilic surfaces

    Energy Technology Data Exchange (ETDEWEB)

    Son, Hong Hyun; Seo, Gwang Hyeok; Kim, Sung Joong [Hanyang University, Seoul (Korea, Republic of)

    2016-10-15

    In light of boiling heat transfer, the smooth surface potentially reduces active nucleation of bubbles and rewetting of dry spots near the critical heat flux (CHF). This kind of process is highly likely to deteriorate the CHF. Thus, it is essential to produce appropriate microstructures on the surface for the enhancement of the CHF. In this study, to investigate the microstructural effect of thin film-fabricated surfaces on the pool boiling CHF, we controlled the surface roughness in a narrow range of 0.1-0.25 μm and its morphologies, in the form of micro-scratches using PVD sputtering technique. Specifically for DC magnetron sputtering, pure chromium (Cr) was selected as a target material owing to its high oxidation resistance. In order to analyze the CHF trend with changes in roughness, we introduced existing capillary wicking-based models because superhydrophilic characteristics of microstructures are highly related to the capillary wicking behaviors in micro-flow channels. After Cr sputtering under given conditions, the Cr-sputtered surfaces showed superhydrophilic characteristics and its capability became more enhanced with an increase of surface roughness. Judging from spreading behavior of a liquid droplet, the presence of micro-wicking channels, coupled with Cr nanostructures, effectively enhanced the advancing rate of drop base diameter. The CHF exhibited an increasing trend with increasing surface roughness. However, the enhancement ratio agreed poorly with the predictions of the roughness factor-based models, all of which originated from a conventional static force balance.

  19. Enhancing the informed consent process for critical care research: strategies from a thromboprophylaxis trial.

    Science.gov (United States)

    Smith, Orla M; McDonald, Ellen; Zytaruk, Nicole; Foster, Denise; Matte, Andrea; Clarke, France; Fleury, Suzie; Krause, Katie; McArdle, Tracey; Skrobik, Yoanna; Cook, Deborah J

    2013-12-01

    Critically ill patients lack capacity for decisions about research participation. Consent to enrol these patients in studies is typically obtained from substitute decision-makers. To present strategies that may optimise the process of obtaining informed consent from substitute decision-makers for participation of critically ill patients in trials. We use examples from a randomised trial of heparin thromboprophylaxis in the intensive care unit (PROTECT, clinicaltrials.gov NCT00182143). 3764 patients were randomised, with an informed consent rate of 82%; 90% of consents were obtained from substitute decision-makers. North American PROTECT research coordinators attended three meetings to discuss enrolment: (1) Trial start-up (January 2006); (2) Near trial closure (January 2010); and (3) Post-publication (April 2011). Data were derived from slide presentations, field notes from break-out groups and plenary discussions, then analysed inductively. We derived three phases for the informed consent process: (1) Preparation for the Consent Encounter; (2) The Consent Encounter; and (3) Follow-up to the Consent Encounter. Specific strategies emerged for each phase: Phase 1 (four strategies); Phase 2 (six strategies); and Phase 3 (three strategies). We identified 13 strategies that may improve the process of obtaining informed consent from substitute decision-makers and be generalisable to other settings and studies. Copyright © 2013 The Authors. Published by Elsevier Ltd.. All rights reserved.

  20. Enhanced Vascular Endothelial Growth Factor Gene Expression in Ischaemic Skin of Critical Limb Ischaemia Patients

    Directory of Open Access Journals (Sweden)

    Silvia Bleda

    2012-01-01

    Full Text Available Objectives. To perform a quantitative analysis of the vascular endothelial growth factor (VEGF gene transcription in the skin of ischemic legs and provide information for VEGF in the pathogenesis in critical limb ischemia (CLI. Methods. Skin biopsies were obtained from 40 patients with CLI. Control samples came from 44 patients with chronic venous disease. VEGF gene expression was analysed using quantitative polymerase chain reaction. Results. Patients with CLI had higher skin VEGF expression than control group (RQ: 1.3 ± 0.1 versus 1, P=0.04. Conclusions. We found an association between ischemic skin and an elevated VEGF expression in legs from patients with CLI. These data support that the mechanism for VEGF upregulation in hypoxia conditions is intact and acts appropriately in the ischaemic limbs from patients with CLI.

  1. Site Support Program Plan Infrastructure Program

    International Nuclear Information System (INIS)

    1995-01-01

    The Fiscal Year 1996 Infrastructure Program Site Support Program Plan addresses the mission objectives, workscope, work breakdown structures (WBS), management approach, and resource requirements for the Infrastructure Program. Attached to the plan are appendices that provide more detailed information associated with scope definition. The Hanford Site's infrastructure has served the Site for nearly 50 years during defense materials production. Now with the challenges of the new environmental cleanup mission, Hanford's infrastructure must meet current and future mission needs in a constrained budget environment, while complying with more stringent environmental, safety, and health regulations. The infrastructure requires upgrading, streamlining, and enhancement in order to successfully support the site mission of cleaning up the Site, research and development, and economic transition

  2. Site Support Program Plan Infrastructure Program

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-09-26

    The Fiscal Year 1996 Infrastructure Program Site Support Program Plan addresses the mission objectives, workscope, work breakdown structures (WBS), management approach, and resource requirements for the Infrastructure Program. Attached to the plan are appendices that provide more detailed information associated with scope definition. The Hanford Site`s infrastructure has served the Site for nearly 50 years during defense materials production. Now with the challenges of the new environmental cleanup mission, Hanford`s infrastructure must meet current and future mission needs in a constrained budget environment, while complying with more stringent environmental, safety, and health regulations. The infrastructure requires upgrading, streamlining, and enhancement in order to successfully support the site mission of cleaning up the Site, research and development, and economic transition.

  3. Does Mindfulness Enhance Critical Thinking? Evidence for the Mediating Effects of Executive Functioning in the Relationship between Mindfulness and Critical Thinking

    OpenAIRE

    Noone, Chris; Bunting, Brendan; Hogan, Michael J.

    2016-01-01

    Mindfulness originated in the Buddhist tradition as a way of cultivating clarity of thought. Despite the fact that this behaviour is best captured using critical thinking assessments, no studies have examined the effects of mindfulness on critical thinking or the mechanisms underlying any such possible relationship. Even so, mindfulness has been suggested as being beneficial for critical thinking in higher education. Critical thinking is recognised as an important higher-order cognitive proce...

  4. Telemental health evaluations enhance access and efficiency in a critical access hospital emergency department.

    Science.gov (United States)

    Southard, Erik P; Neufeld, Jonathan D; Laws, Stephanie

    2014-07-01

    Mentally ill patients in crisis presenting to critical access hospital emergency rooms often face exorbitant wait times to be evaluated by a trained mental health provider. Patients may be discharged from the hospital before receiving an evaluation or boarded in a hospital bed for observation, reducing quality and increasing costs. This study examined the effectiveness of an emergency telemental health evaluation service implemented in a rural hospital emergency room. Retrospective data collection was implemented to consider patients presenting to the emergency room for 212 days prior to telemedicine interventions and for 184 days after. The study compared measures of time to treatment, length of stay (regardless of inpatient or outpatient status), and door-to-consult time. There were 24 patients seen before telemedicine was implemented and 38 seen using telemedicine. All patients had a mental health evaluation ordered by a physician and completed by a mental health specialist. Significant reductions in all three time measures were observed. Mean and median times to consult were reduced from 16.2 h (standard deviation=13.2 h) and 14.2 h, respectively, to 5.4 h (standard deviation =6.4 h) and 2.6 h. Similar reductions in length of stay and door-to-consult times were observed. By t tests, use of telemedicine was associated with a statistically significant reduction in all three outcome measures. Telemedicine appears to be an effective intervention for mentally ill patients by providing more timely access to mental health evaluations in rural hospital emergency departments.

  5. Nuclear criticality safety and time reactivity enhancement aspects of energy amplifier system devices

    Energy Technology Data Exchange (ETDEWEB)

    Siciliano, F [ENEA, Centro Ricerche Trisaia, Rotondelle, Matera (Italy). Direzione INFO

    1995-12-01

    As far as the Rubbia`s and colleagues proposal of innovating Energy Amplifier system (E.A.s.) device driven by a particle beam accelerator is concerned, four basic topics are comprised in the present paper: (1) A short outline of the nuclear aspects of Th-U and U-Pu fuel cycles regarding their general breeding and efficiency features. (2) The needed nuclear criticality control requirements have been studied in terms of safety regulating parameters on the basis of the ThO2 mixed oxides selected as fuel kind for the E.A.s. device technology development. Particular attention is devoted to time evolution of neutron multiplication factor since delayed development of the 233U buildup and so system reactivity are expected in the Th-U cycle. (3) Code E.A.s. device irradiation and post-irradiation modelling for determining higher actinides buildup, fission products formation and fuel consumption trends as function of time, system enrichment degree and flux level parameters. (4) The confirmation, on the basis of the same specific power irradiation, of expected actinides waste obtainment cleaner than the one deriving from the U-Pu cycle utilization. For this end, a model comparison of equivalent enriched fissile nuclides in both cycles has been devised as having, within the range of 0-700 days, ten irradiation periods of about 53 MW/ton specific power and equivalent cooling time post-irradiation periods.

  6. Energy Transmission and Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Mathison, Jane

    2012-12-31

    The objective of Energy Transmission and Infrastructure Northern Ohio (OH) was to lay the conceptual and analytical foundation for an energy economy in northern Ohio that will: • improve the efficiency with which energy is used in the residential, commercial, industrial, agricultural, and transportation sectors for Oberlin, Ohio as a district-wide model for Congressional District OH-09; • identify the potential to deploy wind and solar technologies and the most effective configuration for the regional energy system (i.e., the ratio of distributed or centralized power generation); • analyze the potential within the district to utilize farm wastes to produce biofuels; • enhance long-term energy security by identifying ways to deploy local resources and building Ohio-based enterprises; • identify the policy, regulatory, and financial barriers impeding development of a new energy system; and • improve energy infrastructure within Congressional District OH-09. This objective of laying the foundation for a renewable energy system in Ohio was achieved through four primary areas of activity: 1. district-wide energy infrastructure assessments and alternative-energy transmission studies; 2. energy infrastructure improvement projects undertaken by American Municipal Power (AMP) affiliates in the northern Ohio communities of Elmore, Oak Harbor, and Wellington; 3. Oberlin, OH-area energy assessment initiatives; and 4. a district-wide conference held in September 2011 to disseminate year-one findings. The grant supported 17 research studies by leading energy, policy, and financial specialists, including studies on: current energy use in the district and the Oberlin area; regional potential for energy generation from renewable sources such as solar power, wind, and farm-waste; energy and transportation strategies for transitioning the City of Oberlin entirely to renewable resources and considering pedestrians, bicyclists, and public transportation as well as drivers

  7. Effects of School-Based Educational Interventions for Enhancing Adolescents Abilities in Critical Appraisal of Health Claims: A Systematic Review.

    Directory of Open Access Journals (Sweden)

    Lena V Nordheim

    Full Text Available Adolescents are frequent media users who access health claims from various sources. The plethora of conflicting, pseudo-scientific, and often misleading health claims in popular media makes critical appraisal of health claims an essential ability. Schools play an important role in educating youth to critically appraise health claims. The objective of this systematic review was to evaluate the effects of school-based educational interventions for enhancing adolescents' abilities in critically appraising health claims.We searched MEDLINE, Embase, PsycINFO, AMED, Cinahl, Teachers Reference Centre, LISTA, ERIC, Sociological Abstracts, Social Services Abstracts, The Cochrane Library, Science Citation Index Expanded, Social Sciences Citation Index, and sources of grey literature. Studies that evaluated school-based educational interventions to improve adolescents' critical appraisal ability for health claims through advancing the students' knowledge about science were included. Eligible study designs were randomised and non-randomised controlled trials, and interrupted time series. Two authors independently selected studies, extracted data, and assessed risk of bias in included studies. Due to heterogeneity in interventions and inadequate reporting of results, we performed a descriptive synthesis of studies. We used GRADE (Grading of Recommendations, Assessment, Development, and Evaluation to assess the certainty of the evidence.Eight studies were included: two compared different teaching modalities, while the others compared educational interventions to instruction as usual. Studies mostly reported positive short-term effects on critical appraisal-related knowledge and skills in favour of the educational interventions. However, the certainty of the evidence for all comparisons and outcomes was very low.Educational interventions in schools may have beneficial short-term effects on knowledge and skills relevant to the critical appraisal of health

  8. Effects of School-Based Educational Interventions for Enhancing Adolescents Abilities in Critical Appraisal of Health Claims: A Systematic Review.

    Science.gov (United States)

    Nordheim, Lena V; Gundersen, Malene W; Espehaug, Birgitte; Guttersrud, Øystein; Flottorp, Signe

    2016-01-01

    Adolescents are frequent media users who access health claims from various sources. The plethora of conflicting, pseudo-scientific, and often misleading health claims in popular media makes critical appraisal of health claims an essential ability. Schools play an important role in educating youth to critically appraise health claims. The objective of this systematic review was to evaluate the effects of school-based educational interventions for enhancing adolescents' abilities in critically appraising health claims. We searched MEDLINE, Embase, PsycINFO, AMED, Cinahl, Teachers Reference Centre, LISTA, ERIC, Sociological Abstracts, Social Services Abstracts, The Cochrane Library, Science Citation Index Expanded, Social Sciences Citation Index, and sources of grey literature. Studies that evaluated school-based educational interventions to improve adolescents' critical appraisal ability for health claims through advancing the students' knowledge about science were included. Eligible study designs were randomised and non-randomised controlled trials, and interrupted time series. Two authors independently selected studies, extracted data, and assessed risk of bias in included studies. Due to heterogeneity in interventions and inadequate reporting of results, we performed a descriptive synthesis of studies. We used GRADE (Grading of Recommendations, Assessment, Development, and Evaluation) to assess the certainty of the evidence. Eight studies were included: two compared different teaching modalities, while the others compared educational interventions to instruction as usual. Studies mostly reported positive short-term effects on critical appraisal-related knowledge and skills in favour of the educational interventions. However, the certainty of the evidence for all comparisons and outcomes was very low. Educational interventions in schools may have beneficial short-term effects on knowledge and skills relevant to the critical appraisal of health claims. The small

  9. Applying failure mode effects and criticality analysis in radiotherapy: Lessons learned and perspectives of enhancement

    International Nuclear Information System (INIS)

    Scorsetti, Marta; Signori, Chiara; Lattuada, Paola; Urso, Gaetano; Bignardi, Mario; Navarria, Pierina; Castiglioni, Simona; Mancosu, Pietro; Trucco, Paolo

    2010-01-01

    Introduction: The radiation oncology process along with its unique therapeutic properties is also potentially dangerous for the patient, and thus it should be delivered under a systematic risk control. To this aim incident reporting and analysis are not sufficient for assuring patient safety and proactive risk assessment should also be implemented. The paper accounts for some methodological solutions, lessons learned and opportunities for improvement, starting from the systematic application of the failure mode effects and criticality analysis (FMECA) technique to the radiotherapy process of an Italian hospital. Materials and methods: The analysis, performed by a working group made of experts of the radiotherapy unit, was organised into the following steps: (1) complete and detailed analysis of the process (integration definition for function modelling); (2) identification of possible failure modes (FM) of the process, representing sources of adverse events for the patient; (3) qualitative risk assessment of FMs, aimed at identifying priorities of intervention; (4) identification and planning of corrective actions. Results: Organisational and procedural corrective measures were implemented; a set of safety indexes for the process was integrated within the traditional quality assurance indicators measured by the unit. A strong commitment of all the professionals involved was observed and the study revealed to be a powerful 'tool' for dissemination of patient safety culture. Conclusion: The feasibility of FMECA in fostering radiotherapy safety was proven; nevertheless, some lessons learned as well as weaknesses of current practices in risk management open to future research for the integration of retrospective methods (e.g. incident reporting or root cause analysis) and risk assessment.

  10. Enhancing the passing moments: An educational criticism of family visits to an early childhood science exhibition

    Science.gov (United States)

    Munroe, Elizabeth Ann

    This educational criticism describes and interprets the nature of family visits to an early childhood science exhibition, Working Wonders, at The Science Centre in Calgary, Alberta. The specific exhibits are described and features that contributed to exhibit popularity are examined. Examples of visitors' interactions with each exhibit are given. The visit experiences of four families are described in detail and analyzed. Typical family visitors' reactions, expectations, and experiences are summarized. Because one of the mutual expectations of the granting agency, The Science Centre, and the adult visitors was that a visit to the exhibition would be educational, the family visits are examined for instances of learning and analyzed to determine the factors that influenced the learning. Constructivism forms the basis for understanding the process of learning during family visits. The analysis is supported by reference to research from the fields of museum studies, education, and environmental design. The analysis of the educational significance and potential of family visits to an early childhood exhibition leads to the conclusion that specific features may facilitate learning in such an environment. Those features are represented in a set of guidelines for the development and evaluation of early childhood exhibitions. The guidelines suggest attention must be given to the ambience of the space, the general layout of the space, the exhibits, the copy and graphics, additional programs and information, the subtle influences of the building and the staff, and the learning processes of young children, adults, and intergenerational groups. The guidelines suggest specific issues to consider to develop a space that is stimulating and memorable, responsive to the needs of the two distinct visitor groups (young children and adults), and conducive to learning.

  11. Critical variables in the performance of a productivity-enhanced solar still

    KAUST Repository

    Ayoub, George M.

    2013-12-01

    A new and sustainable modification has been introduced into the conventional solar still, considerably increasing its productivity. This enhancement in the solar still productivity is achieved without forsaking the basic features of the still such as low cost, ease of handling, sustainability, water quality, material availability, low maintenance and space conservation. The introduced modification is in the form of a slowly rotating hollow drum within the still cavity that allows the formation of thin water films, which evaporate rapidly. Several environmental and operational parameters attribute to the optimization of the new still design. Environmental factors refer primarily to weather conditions such as solar intensity, relative humidity, ambient temperature and wind speed and direction. Operational variables include drum speed, brine depth in the basin, cover cooling and other related parameters such as the materials used and the still configuration. The influence of these parameters is discussed and their impact on productivity is investigated in detailed order to identify existing correlations and optimize design and operation of the new system. An error analysis was conducted for all experimental data obtained from this study. © 2013 Elsevier Ltd.

  12. Structures and infrastructures series

    National Research Council Canada - National Science Library

    2008-01-01

    "Research, developments, and applications...on the most advanced techonologies for analyzing, predicting, and optimizing the performance of structures and infrastructures such as buildings, bridges, dams...

  13. A Critical Look at Different Classifications of Curriculum Principles: The Influence on Enhancing Learners’ Autonomy

    Directory of Open Access Journals (Sweden)

    Parviz Maftoon

    2012-11-01

    Full Text Available In recent decades, following the shift of focus from the previous teacher-centered approaches and the emergence of social constructivist theories, learner autonomy has come to be considered as an important goal in the process of second language teaching and learning. Therefore, in the domain of L2 education, much effort has been made to make learners take on more responsibility for their own learning. In this direction, all attempts have concentrated merely on learners’ variables or teachers’ own practices neglecting the crucial place of instructional materials as an integral component of curriculum. Instructional materials generally serve as the basis for much of the language input learners receive and the language practice that occurs in the classroom. Therefore, realizing the key role of materials, a lot of research began to focus on devising out certain principles aimed at improving language syllabus or curriculum. Two main trends of research are remarkable in this regard. The first line of research deals with designing principles which are mostly confined to the organization and gradation of content for language course materials. The second line of research focuses on designing principles through which the instructional materials can enhance learner autonomy. Consequently, the present article has been developed in an attempt to first take a general look at some of the main classifications of these principles, and second and most importantly to elaborate in detail on those principles of language curriculum and course design which lead to increased autonomy in the learners. Finally, the implications and applications of such an approach will be discussed for all the stakeholders in the field.

  14. Development of a public health nursing data infrastructure.

    Science.gov (United States)

    Monsen, Karen A; Bekemeier, Betty; P Newhouse, Robin; Scutchfield, F Douglas

    2012-01-01

    An invited group of national public health nursing (PHN) scholars, practitioners, policymakers, and other stakeholders met in October 2010 identifying a critical need for a national PHN data infrastructure to support PHN research. This article summarizes the strengths, limitations, and gaps specific to PHN data and proposes a research agenda for development of a PHN data infrastructure. Future implications are suggested, such as issues related to the development of the proposed PHN data infrastructure and future research possibilities enabled by the infrastructure. Such a data infrastructure has potential to improve accountability and measurement, to demonstrate the value of PHN services, and to improve population health. © 2012 Wiley Periodicals, Inc.

  15. A critical analysis of penile enhancement procedures for patients with normal penile size: surgical techniques, success, and complications.

    Science.gov (United States)

    Vardi, Yoram; Har-Shai, Yaron; Harshai, Yaron; Gil, Tamir; Gruenwald, Ilan

    2008-11-01

    Most men who request surgical penile enhancement have a normal-sized and fully functional penis but visualize their penises as small (psychological dysmorphism). The aim of this review is to describe the various reported techniques and to provide the available scientific data on the success and complication rates of penile enhancement procedures. We performed an extensive systematic review based on a search of the MEDLINE database for articles published between 1965 and 2008. The following key words were used: penis, enhancement, enlargement, phalloplasty, reconstruction, girth, lengthening, and augmentation. Only English-language articles that were related to penile surgery and dysmorphobia were sought. We excluded articles in which fewer than five cases were described and articles in which the type of surgical treatment and the outcome were not clear. Of the 176 papers found, 34 were selected and critically analyzed. We found only a small number of well-designed and comprehensive studies, and most of the published articles reported data that were obtained from small cohorts of patients. The more recently published studies presented better methodologies and descriptions of the surgical techniques than did the older publications. In general, penile enhancement surgery can cause a 1-2-cm increase in penile length and a 2.5-cm augmentation of penile girth. Unwanted outcomes and complications, namely penile deformity, paradoxical penile shortening, disagreeable scarring, granuloma formation, migration of injected material, and sexual dysfunction were reported frequently in these studies. Disappointing short- and long-term patient satisfaction rates following these procedures were also reported in most studies. To date, the use of cosmetic surgery to enlarge the penis remains highly controversial. There is a lack of any standardization of all described procedures. Indications and outcome measures are poorly defined, and the reported complications are unacceptably high

  16. Securing energy assets and infrastructure 2007

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2006-06-15

    This report describes in detail the energy industry's challenges and solutions for protecting critical assets including oil and gas infrastructure, transmission grids, power plants, storage, pipelines, and all aspects of strategic industry assets. It includes a special section on cyber-terrorism and protecting control systems. Contents: Section I - Introduction; U.S Energy Trends; Vulnerabilities; Protection Measures. Section II - Sector-wise Vulnerabilities Assessments and Security Measures: Coal, Oil and Petroleum, Natural Gas, Electric Power, Cybersecurity and Control Systems, Key Recommendations; Section III - Critical Infrastructure Protection Efforts: Government Initiatives, Agencies, and Checklists.

  17. Equipoise in the enhanced supression of the platelet IIb/IIIa receptor with integrilin trial (ESPRIT): a critical appraisal.

    Science.gov (United States)

    Mann, Howard; London, Alex John; Mann, Jeffrey

    2005-01-01

    Enhanced Supression of the Platelet IIb/IIIa Receptor with Integrilin Trial (ESPRIT) was a multicenter randomized controlled clinical trial in which participants were randomized between eptifibatide and placebo. A "clinical hold" was initially placed on the trial by the US Food and Drug Administration (FDA), which was concerned about the placebo-only control arm. The hold was lifted after additional information concerning the use of platelet glycoprotein IIb/IIIa inhibitors in clinical practice, derived from a survey of interventional cardiologists, was provided. The trial's principal investigator and colleagues have described how these issues were resolved, and advance a claim of equipoise for the trial. In this critical appraisal we examine the information and arguments proffered in support of the trial design and conclude that they evidence a misunderstanding of equipoise. We believe that a placebo-only control arm was not justified by the information provided by the trialists.

  18. VELMA Ecohydrological Model, Version 2.0 -- Analyzing Green Infrastructure Options for Enhancing Water Quality and Ecosystem Service Co-Benefits

    Science.gov (United States)

    This 2-page factsheet describes an enhanced version (2.0) of the VELMA eco-hydrological model. VELMA – Visualizing Ecosystem Land Management Assessments – has been redesigned to assist communities, land managers, policy makers and other decision makers in evaluataing the effecti...

  19. Building an evaluation infrastructure

    DEFF Research Database (Denmark)

    Brandrup, Morten; Østergaard, Kija Lin

    Infrastructuring does not happen by itself; it must be supported. In this paper, we present a feedback mechanism implemented as a smartphone-based application, inspired by the concept of infrastructure probes, which supports the in situ elicitation of feedback. This is incorporated within an eval...

  20. Physical resources and infrastructure

    NARCIS (Netherlands)

    Foeken, D.W.J.; Hoorweg, J.; Foeken, D.W.J.; Obudho, R.A.

    2000-01-01

    This chapter describes the main physical characteristics as well as the main physical and social infrastructure features of Kenya's coastal region. Physical resources include relief, soils, rainfall, agro-ecological zones and natural resources. Aspects of the physical infrastructure discussed are

  1. Transport Infrastructure Slot Allocation

    NARCIS (Netherlands)

    Koolstra, K.

    2005-01-01

    In this thesis, transport infrastructure slot allocation has been studied, focusing on selection slot allocation, i.e. on longer-term slot allocation decisions determining the traffic patterns served by infrastructure bottlenecks, rather than timetable-related slot allocation problems. The

  2. Telecom infrastructure leasing

    International Nuclear Information System (INIS)

    Henley, R.

    1995-01-01

    Slides to accompany a discussion about leasing telecommunications infrastructure, including radio/microwave tower space, radio control buildings, paging systems and communications circuits, were presented. The structure of Alberta Power Limited was described within the ATCO group of companies. Corporate goals and management practices and priorities were summarized. Lessons and experiences in the infrastructure leasing business were reviewed

  3. Infrastructures for healthcare

    DEFF Research Database (Denmark)

    Langhoff, Tue Odd; Amstrup, Mikkel Hvid; Mørck, Peter

    2018-01-01

    The Danish General Practitioners Database has over more than a decade developed into a large-scale successful information infrastructure supporting medical research in Denmark. Danish general practitioners produce the data, by coding all patient consultations according to a certain set of classif...... synergy into account, if not to risk breaking down the fragile nature of otherwise successful information infrastructures supporting research on healthcare....

  4. Critical current enhancement driven by suppression of superconducting fluctuation in ion-gated ultrathin FeSe

    Science.gov (United States)

    Harada, T.; Shiogai, J.; Miyakawa, T.; Nojima, T.; Tsukazaki, A.

    2018-05-01

    The framework of phase transition, such as superconducting transition, occasionally depends on the dimensionality of materials. Superconductivity is often weakened in the experimental conditions of two-dimensional thin films due to the fragile superconducting state against defects and interfacial effects. In contrast to this general trend, superconductivity in the thin limit of FeSe exhibits an opposite trend, such as an increase in critical temperature (T c) and the superconducting gap exceeding the bulk values; however, the dominant mechanism is still under debate. Here, we measured thickness-dependent electrical transport properties of the ion-gated FeSe thin films to evaluate the superconducting critical current (I c) in the ultrathin FeSe. Upon systematically decreasing the FeSe thickness by the electrochemical etching technique in the Hall bar-shaped electric double-layer transistors, we observed a dramatic enhancement of I c reaching about 10 mA and corresponding to about 107 A cm‑2 in the thinnest condition. By analyzing the transition behavior, we clarify that the suppressed superconducting fluctuation is one of the origins of the large I c in the ion-gated ultrathin FeSe films. These results indicate the existence of a robust superconducting state possibly with dense Cooper pairs at the thin limit of FeSe.

  5. Infrastructure monitoring with spaceborne SAR sensors

    CERN Document Server

    ANGHEL, ANDREI; CACOVEANU, REMUS

    2017-01-01

    This book presents a novel non-intrusive infrastructure monitoring technique based on the detection and tracking of scattering centers in spaceborne SAR images. The methodology essentially consists of refocusing each available SAR image on an imposed 3D point cloud associated to the envisaged infrastructure element and identifying the reliable scatterers to be monitored by means of four dimensional (4D) tomography. The methodology described in this book provides a new perspective on infrastructure monitoring with spaceborne SAR images, is based on a standalone processing chain, and brings innovative technical aspects relative to conventional approaches. The book is intended primarily for professionals and researchers working in the area of critical infrastructure monitoring by radar remote sensing.

  6. Security infrastructure for dynamically provisioned cloud infrastructure services

    NARCIS (Netherlands)

    Demchenko, Y.; Ngo, C.; de Laat, C.; Lopez, D.R.; Morales, A.; García-Espín, J.A.; Pearson, S.; Yee, G.

    2013-01-01

    This chapter discusses conceptual issues, basic requirements and practical suggestions for designing dynamically configured security infrastructure provisioned on demand as part of the cloud-based infrastructure. This chapter describes general use cases for provisioning cloud infrastructure services

  7. Nuclear safety infrastructure

    International Nuclear Information System (INIS)

    Moffitt, R.L.

    2010-01-01

    The introduction of nuclear power in any country requires the early establishment of a long term nuclear safety infrastructure. This is necessary to ensure that the siting, design, construction, commissioning, operation and dismantling of the nuclear power plant and any other related installations, as well as the long term management of radioactive waste and spent fuel, are conducted in a safe and secure manner. The decision to undertake a nuclear power program is a major commitment requiring strict attention to nuclear safety. This commitment is a responsibility to not only the citizens of the country developing such a program, but also a responsibility to the international community. Nobody can take on this responsibility or make the critical decisions except the host country. It is important to make sure that the decision making process and the development activities are done in as open a manner as possible allowing interested stakeholders the opportunity to review and comment on the actions and plans. It cannot be overemphasized that everyone involved in a program to develop nuclear power carries a responsibility for ensuring safety. While it is clear that the key decisions and activities are the responsibility of the host country, it is also very important to recognize that help is available. The IAEA, OECD-NEA, WANO and other international organizations along with countries with established nuclear power programs are available to provide information and assistance. In particular, the IAEA and OECD-NEA have published several documents regarding the development of a nuclear power program and they have been and continue to support many meetings and seminars regarding the development of nuclear power programs

  8. LANL: Weapons Infrastructure Briefing to Naval Reactors, July 18, 2017

    Energy Technology Data Exchange (ETDEWEB)

    Chadwick, Frances [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2018-07-18

    Presentation slides address: The Laboratory infrastructure supports hundreds of high hazard, complex operations daily; LANL’s unique science and engineering infrastructure is critical to delivering on our mission; LANL FY17 Budget & Workforce; Direct-Funded Infrastructure Accounts; LANL Org Chart; Weapons Infrastructure Program Office; The Laboratory’s infrastructure relies on both Direct and Indirect funding; NA-50’s Operating, Maintenance & Recapitalization funding is critical to the execution of the mission; Los Alamos is currently executing several concurrent Line Item projects; Maintenance @ LANL; NA-50 is helping us to address D&D needs; We are executing a CHAMP Pilot Project at LANL; G2 = Main Tool for Program Management; MDI: Future Investments are centered on facilities with a high Mission Dependency Index; Los Alamos hosted first “Deep Dive” in November 2016; Safety, Infrastructure & Operations is one of the most important programs at LANL, and is foundational for our mission success.

  9. Information infrastructure(s) boundaries, ecologies, multiplicity

    CERN Document Server

    Mongili, Alessandro

    2014-01-01

    This book marks an important contribution to the fascinating debate on the role that information infrastructures and boundary objects play in contemporary life, bringing to the fore the concern of how cooperation across different groups is enabled, but also constrained, by the material and immaterial objects connecting them. As such, the book itself is situated at the crossroads of various paths and genealogies, all focusing on the problem of the intersection between different levels of scale...

  10. Chef infrastructure automation cookbook

    CERN Document Server

    Marschall, Matthias

    2013-01-01

    Chef Infrastructure Automation Cookbook contains practical recipes on everything you will need to automate your infrastructure using Chef. The book is packed with illustrated code examples to automate your server and cloud infrastructure.The book first shows you the simplest way to achieve a certain task. Then it explains every step in detail, so that you can build your knowledge about how things work. Eventually, the book shows you additional things to consider for each approach. That way, you can learn step-by-step and build profound knowledge on how to go about your configuration management

  11. Eco-logical : an ecosystem approach to developing transportation infrastructure projects in a changing environment

    Science.gov (United States)

    2009-09-13

    The development of infrastructure facilities can negatively impact critical habitat and essential ecosystems. There are a variety of techniques available to avoid, minimize, and mitigate negative impacts of existing infrastructure as well as future i...

  12. Individual and collective processes in the construction of the self: self-enhancement in the United States and self-criticism in Japan.

    Science.gov (United States)

    Kitayama, S; Markus, H R; Matsumoto, H; Norasakkunkit, V

    1997-06-01

    A collective constructionist theory of the self proposes that many psychological processes, including enhancement of the self (pervasive in the United States) and criticism and subsequent improvement of the self (widespread in Japan), result from and support the very ways in which social acts and situations are collectively defined and subjectively experienced in the respective cultural contexts. In support of the theory, 2 studies showed, first, that American situations are relatively conducive to self-enhancement and American people are relatively likely to engage in self-enhancement and, second, that Japanese situations are relatively conducive to self-criticism and Japanese people are relatively likely to engage in self-criticism. Implications are discussed for the collective construction of psychological processes implicated in the self and, more generally, for the mutual constitution of culture and the self.

  13. Chapter 2. Surge capacity and infrastructure considerations for mass critical care. Recommendations and standard operating procedures for intensive care unit and hospital preparations for an influenza epidemic or mass disaster

    NARCIS (Netherlands)

    Hick, John L.; Christian, Michael D.; Sprung, Charles L.; Camargo, Ruben; Ceraso, Daniel; Azoulay, Elie; Duguet, Alexandre; Guery, Benoit; Reinhart, Konrad; Adini, Bruria; Barlavie, Yaron; Benin-Goren, Odeda; Cohen, Robert; Klein, Motti; Leoniv, Yuval; Margalit, Gila; Rubinovitch, Bina; Sonnenblick, Moshe; Steinberg, Avraham; Weissman, Charles; Wolff, Donna; Kesecioglu, Jozef; de Jong, Menno; Moreno, Rui; An, Youzhong; Du, Bin; Joynt, Gavin M.; Colvin, John; Loo, Shi; Richards, Guy; Artigas, Antonio; Pugin, Jerome; Amundson, Dennis; Devereaux, Asha; Beigel, John; Danis, Marion; Farmer, Chris; Maki, Dennis; Masur, Henry; Rubinson, Lewis; Sandrock, Christian; Talmor, Daniel; Truog, Robert; Zimmerman, Janice; Brett, Steve; Montgomery, Hugh; Rhodes, Andrew; Sanderson, Frances; Taylor, Bruce; Monrgomery, Hugh

    2010-01-01

    To provide recommendations and standard operating procedures for intensive care unit (ICU) and hospital preparations for a mass disaster or influenza epidemic with a specific focus on surge capacity and infrastructure considerations. Based on a literature review and expert opinion, a Delphi process

  14. Infrastructure protection in the Dutch financial sector

    NARCIS (Netherlands)

    van Oers, M.H.M.; Strous, L.; Berndsen, R.J.; Butts, J.; Shenoi, S.

    2012-01-01

    This paper presents a case study of critical infrastructure protection in the Dutch financial sector. The organizational structures are examined to discern the roles and functions that facilitate public-private cooperation. An assessment of the organizational structures is provided along with a

  15. MOEMS industrial infrastructure

    Science.gov (United States)

    van Heeren, Henne; Paschalidou, Lia

    2004-08-01

    numbers they want (several millions per year). The crossover point where building a dedicated facility becomes a realistic option, can differ very much depending on technology complexity, numbers and market value. Also history plays a role, companies with past experience in the production of a product and the necessary facilities and equipment will tend to achieve captive production. Companies not having a microtechnology history will tend to outsource, offering business opportunities for foundries. The number of foundries shows a steady growth over the years. The total availability of foundries, however, and their flexibility will, undoubtedly, rely on market potential and its size. Unlike design houses, foundries need to realise a substantial return on the "large" investments they make in terms of capital and infrastructure. These returns will be maximised through mass-produced products aimed at "killer" applications (accelerometers are only one example). The existence of professional suppliers of MOEMS packaging and assembly is an essential element in the supply chain and critical for the manufacturing and commercialisation of MOEMS products. In addition, the incorporation of packaging and assembly techniques at the front-end of the engineering cycle will pay back in terms of financial savings and shorter timescales to market. Packaging and assembly for MOEMS are, in general, more costly than their equivalents for standard integrated circuits. This is, primarily, due to the diversity of the interconnections (which are multi-functional and may incorporate: electrical, optical, fluidic etc). In addition, the high levels of accuracy and the potential sensitivity of the devices to mechanical and external influences play a major role in the cost aspects of the final MNT product. This article will give an overview of the package/assembly providers and foundry business models and analyse their contribution to the MOEMS supply chain illustrated with some typical examples. As

  16. Infrastructure Area Simplification Plan

    CERN Document Server

    Field, L.

    2011-01-01

    The infrastructure area simplification plan was presented at the 3rd EMI All Hands Meeting in Padova. This plan only affects the information and accounting systems as the other areas are new in EMI and hence do not require simplification.

  17. IPHE Infrastructure Workshop Proceedings

    Energy Technology Data Exchange (ETDEWEB)

    None

    2010-02-01

    This proceedings contains information from the IPHE Infrastructure Workshop, a two-day interactive workshop held on February 25-26, 2010, to explore the market implementation needs for hydrogen fueling station development.

  18. EV Charging Infrastructure Roadmap

    Energy Technology Data Exchange (ETDEWEB)

    Karner, Donald [Electric Transportation Inc., Rogers, AR (United States); Garetson, Thomas [Electric Transportation Inc., Rogers, AR (United States); Francfort, Jim [Idaho National Lab. (INL), Idaho Falls, ID (United States)

    2016-08-01

    As highlighted in the U.S. Department of Energy’s EV Everywhere Grand Challenge, vehicle technology is advancing toward an objective to “… produce plug-in electric vehicles that are as affordable and convenient for the average American family as today’s gasoline-powered vehicles …” [1] by developing more efficient drivetrains, greater battery energy storage per dollar, and lighter-weight vehicle components and construction. With this technology advancement and improved vehicle performance, the objective for charging infrastructure is to promote vehicle adoption and maximize the number of electric miles driven. The EV Everywhere Charging Infrastructure Roadmap (hereafter referred to as Roadmap) looks forward and assumes that the technical challenges and vehicle performance improvements set forth in the EV Everywhere Grand Challenge will be met. The Roadmap identifies and prioritizes deployment of charging infrastructure in support of this charging infrastructure objective for the EV Everywhere Grand Challenge

  19. Pennsylvania Reaches Infrastructure Milestone

    Science.gov (United States)

    With a series of “aye” votes, the Pennsylvania agency that turns EPA funding and state financing into water infrastructure projects crossed a key threshold recently – $8 billion in investment over nearly three decades

  20. EV Charging Infrastructure Roadmap

    International Nuclear Information System (INIS)

    Karner, Donald; Garetson, Thomas; Francfort, Jim

    2016-01-01

    As highlighted in the U.S. Department of Energy's EV Everywhere Grand Challenge, vehicle technology is advancing toward an objective to ''... produce plug-in electric vehicles that are as affordable and convenient for the average American family as today's gasoline-powered vehicles ...'' [1] by developing more efficient drivetrains, greater battery energy storage per dollar, and lighter-weight vehicle components and construction. With this technology advancement and improved vehicle performance, the objective for charging infrastructure is to promote vehicle adoption and maximize the number of electric miles driven. The EV Everywhere Charging Infrastructure Roadmap (hereafter referred to as Roadmap) looks forward and assumes that the technical challenges and vehicle performance improvements set forth in the EV Everywhere Grand Challenge will be met. The Roadmap identifies and prioritizes deployment of charging infrastructure in support of this charging infrastructure objective for the EV Everywhere Grand Challenge