WorldWideScience

Sample records for key management infrastructure

  1. Scalable Multi-group Key Management for Advanced Metering Infrastructure

    Benmalek , Mourad; Challal , Yacine; Bouabdallah , Abdelmadjid

    2015-01-01

    International audience; Advanced Metering Infrastructure (AMI) is composed of systems and networks to incorporate changes for modernizing the electricity grid, reduce peak loads, and meet energy efficiency targets. AMI is a privileged target for security attacks with potentially great damage against infrastructures and privacy. For this reason, Key Management has been identified as one of the most challenging topics in AMI development. In this paper, we propose a new Scalable multi-group key ...

  2. Key Management Infrastructure Increment 2 (KMI Inc 2)

    2016-03-01

    Infrastructure (KMI) is a unified, scalable, interoperable, and trusted infrastructure that provides net-centric key management services to systems that rely ...products to human users and devices (hereinafter referred to as "supported" or "security-enabled") to enable secure communications. The objectives for...Threshold met during Spiral 1 IOT &E and FOT&E. Connected Networks: Network Identification KMI products and services shall be provided to KMI clients via

  3. Public Key Infrastructure Study

    Berkovits, Shimshon

    1994-01-01

    The National Institute of Standards and Technology (NIST) has tasked The MITRE Corporation to study the alternatives for automated management of public keys and of the associated public key certificates for the Federal Government...

  4. Securing Metering Infrastructure of Smart Grid: A Machine Learning and Localization Based Key Management Approach

    Imtiaz Parvez

    2016-08-01

    Full Text Available In smart cities, advanced metering infrastructure (AMI of the smart grid facilitates automated metering, control and monitoring of power distribution by employing a wireless network. Due to this wireless nature of communication, there exist potential threats to the data privacy in AMI. Decoding the energy consumption reading, injecting false data/command signals and jamming the networks are some hazardous measures against this technology. Since a smart meter possesses limited memory and computational capability, AMI demands a light, but robust security scheme. In this paper, we propose a localization-based key management system for meter data encryption. Data are encrypted by the key associated with the coordinate of the meter and a random key index. The encryption keys are managed and distributed by a trusted third party (TTP. Localization of the meter is proposed by a method based on received signal strength (RSS using the maximum likelihood estimator (MLE. The received packets are decrypted at the control center with the key mapped with the key index and the meter’s coordinates. Additionally, we propose the k-nearest neighbors (kNN algorithm for node/meter authentication, capitalizing further on data transmission security. Finally, we evaluate the security strength of a data packet numerically for our method.

  5. EMSODEV and EPOS-IP: key findings for effective management of EU research infrastructure projects

    Materia, Paola; Bozzoli, Sabrina; Beranzoli, Laura; Cocco, Massimo; Favali, Paolo; Freda, Carmela; Sangianantoni, Agata

    2017-04-01

    -2019) is a project of 47 partners, 6 associate partners and several international organizations for a total of 25 countries involved. EPOS IP is a key step in EPOS' mission of a pan-European Earth science integrated platform. It will deliver not only a suite of domain-specific and multidisciplinary data and services in one platform, but also the legal, governance and financial frameworks to ensure the infrastructure future operation and sustainability (EPOS ERIC). INGV experience over the years indicates that effective management of EU RIs projects should contain 5 basic elements: 1.Defined life cycle and milestones: Map of phases, deliverables, key milestones and sufficiency criteria for each group involved in the project using project management tools and software. 2.Shared organization, systems, roles: Defined roles for team members and responsibilities for functional managers are crucial. Similarly, a system of communication and team involvement is essential to success. Leadership and interpersonal/organizational skills are also important. 3.Quality assurance: Quality dimension should be aligned to the project objectives and specific criteria should be identified for each phase of the project. 4.Tracking and variance analysis: Regular reports and periodic meetings of the teams are crucial to identify when things are off target. Schedule slips, cost overruns, open issues, new risks and problems must be dealt with as early as possible. 5.Impact assessment by monitoring the achievement of results and socio-economic impact.

  6. Common Criteria for Information Technology Security Evaluation: Department of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile (Medium Robustness)

    2002-03-22

    may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure

  7. Trust Management for Public Key Infrastructures: Implementing the X.509 Trust Broker

    Ahmad Samer Wazan

    2017-01-01

    Full Text Available A Public Key Infrastructure (PKI is considered one of the most important techniques used to propagate trust in authentication over the Internet. This technology is based on a trust model defined by the original X.509 (1988 standard and is composed of three entities: the certification authority (CA, the certificate holder (or subject, and the Relying Party (RP. The CA plays the role of a trusted third party between the certificate holder and the RP. In many use cases, this trust model has worked successfully. However, we argue that the application of this model on the Internet implies that web users need to depend on almost anyone in the world in order to use PKI technology. Thus, we believe that the current TLS system is not fit for purpose and must be revisited as a whole. In response, the latest draft edition of X.509 has proposed a new trust model by adding new entity called the Trust Broker (TB. In this paper, we present an implementation approach that a Trust Broker could follow in order to give RPs trust information about a CA by assessing the quality of its issued certificates. This is related to the quality of the CA’s policies and procedures and its commitment to them. Finally, we present our Trust Broker implementation that demonstrates how RPs can make informed decisions about certificate holders in the context of the global web, without requiring large processing resources themselves.

  8. Group key management

    Dunigan, T.; Cao, C.

    1997-08-01

    This report describes an architecture and implementation for doing group key management over a data communications network. The architecture describes a protocol for establishing a shared encryption key among an authenticated and authorized collection of network entities. Group access requires one or more authorization certificates. The implementation includes a simple public key and certificate infrastructure. Multicast is used for some of the key management messages. An application programming interface multiplexes key management and user application messages. An implementation using the new IP security protocols is postulated. The architecture is compared with other group key management proposals, and the performance and the limitations of the implementation are described.

  9. Quantum key management

    Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth

    2016-11-29

    Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

  10. Public key infrastructure for DOE security research

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  11. Infrastructure needs for waste management

    Takahashi, M.

    2001-01-01

    National infrastructures are needed to safely and economically manage radioactive wastes. Considerable experience has been accumulated in industrialized countries for predisposal management of radioactive wastes, and legal, regulatory and technical infrastructures are in place. Drawing on this experience, international organizations can assist in transferring this knowledge to developing countries to build their waste management infrastructures. Infrastructure needs for disposal of long lived radioactive waste are more complex, due to the long time scale that must be considered. Challenges and infrastructure needs, particularly for countries developing geologic repositories for disposal of high level wastes, are discussed in this paper. (author)

  12. Public key infrastructure building trusted applications and web services

    Vacca, John R

    2004-01-01

    OVERVIEW OF PKI TECHNOLOGYPublic Key Infrastructures (PKIs): What Are They?Type of Certificate Authorities (CAS) ServicesPKI StandardsTypes of Vendor and Third-Party CA SystemsProtecting Private KeysCA System AttacksStolen Private Keys: What Can Be Done?Certificate Practice StatementsPKI ReadinessANALYZING AND DESIGNING PUBLIC KEY INFRASTRUCTURESPKI Design IssuesCost Justification and ConsiderationPKI Standards Design IssuesPKI Architectural Design ConsiderationsIMPLEMENTING PKIRequirementsImplementation ScheduleImplementation CostsPKI PerformanceMANAGING PKIRequesting a CertificateObtaining a

  13. Cryptographic Key Management System

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  14. Infrastructure of Electronic Information Management

    Twitchell, Gregory D; Frame, Michael T

    2004-01-01

    The information technology infrastructure of an organization, whether it is a private, non-profit, federal, or academic institution, is key to delivering timely and high-quality products and services...

  15. Key performance indicators of charging infrastructure

    Helmus, J.; van den Hoed, R.

    2016-01-01

    The Netherlands are one of the frontrunners in stimulating electric mobility in Europe when it comes to the charging infrastructure density and electric vehicle adoption. Municipalities play an instrumental role in the rollout of public charging infrastructure while they have little insight in the

  16. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Woong Go

    2014-01-01

    Full Text Available A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted information is electricity consumption data for charging. Thus, in order to establish a secure connection to transmit electricity consumption data, encryption is necessary, for which key distribution is required. Further, a group key is more efficient than a pairwise key in the hierarchical structure of the AMI. Therefore, we propose a group key distribution scheme using a two-dimensional key table through the analysis result of the sensor network group key distribution scheme. The proposed scheme has three phases: group key predistribution, selection of group key generation element, and generation of group key.

  17. Model for Railway Infrastructure Management Organization

    Gordan Stojić

    2012-03-01

    Full Text Available The provision of appropriate quality rail services has an important role in terms of railway infrastructure: quality of infrastructure maintenance, regulation of railway traffic, line capacity, speed, safety, train station organization, the allowable lines load and other infrastructure parameters.The analysis of experiences in transforming the railway systems points to the conclusion that there is no unique solution in terms of choice for institutional rail infrastructure management modes, although more than nineteen years have passed from the beginning of the implementation of the Directive 91/440/EEC. Depending on the approach to the process of restructuring the national railway company, adopted regulations and caution in its implementation, the existence or absence of a clearly defined transport strategy, the willingness to liberalize the transport market, there are several different ways for institutional management of railway infrastructure.A hybrid model for selection of modes of institutional rail infrastructure management was developed based on the theory of artificial intelligence, theory of fuzzy sets and theory of multicriteria optimization.KEY WORDSmanagement, railway infrastructure, organizational structure, hybrid model

  18. Defending Critical Infrastructure as Cyber Key Terrain

    2016-08-01

    to Secure Cyberspace (NSSC) is as it lists three strategic objectives:4 1) Prevent cyber attacks against America’s critical infrastructures; 2...House, “National Strategy to Secure Cyberspace,” (Washington, DC: The White House, 2003) Trey Herr, "PrEP: A framework for malware & cyber weapons...David Kuipers and Mark Fabro. “Control Systems Cyber Security : Defense in Depth Strategies,” [United States: Department of Energy, 2006]: 4

  19. Key Management Laboratory

    Federal Laboratory Consortium — FUNCTION: Provides a secure environment to research and develop advanced electronic key management and networked key distribution technologies for the Navy and DoD....

  20. Architectural Building A Public Key Infrastructure Integrated Information Space

    Vadim Ivanovich Korolev

    2015-10-01

    Full Text Available The article keeps under consideration the mattersto apply the cryptographic system having a public key to provide information security and to implya digital signature. It performs the analysis of trust models at the formation of certificates and their use. The article describes the relationships between the trust model and the architecture public key infrastructure. It contains conclusions in respect of the options for building the public key infrastructure for integrated informationspace.

  1. 76 FR 48807 - Public Key Infrastructure (PKI) Certificate Action Form

    2011-08-09

    ... Infrastructure (PKI) technology to support electronic commerce between the USPTO and its customers. PKI is a set... security for its electronic commerce systems, the USPTO uses PKI technology to protect the integrity and... DEPARTMENT OF COMMERCE United States Patent and Trademark Office Public Key Infrastructure (PKI...

  2. Education and training: Key to sustainable infrastructures

    2006-01-01

    Full text: Standards, legislation, regulations, policies and procedures may comprise the infrastructure of a radiation protection programme. But even the most carefully designed building remains a hollow shell until people take up residence and begin to marry form and function. Similarly, it takes people to put words into action. The availability of qualified personnel is vital to developing and sustaining a radiation protection infrastructure. For this reason, the IAEA makes it a top priority to develop the skills, knowledge and expertise of individuals across many disciplines: scientists, legislators and regulators, politicians and administrators, employees in facilities that use radioactive sources and materials, emergency response personnel, etc. Over the course of the Model Project, the IAEA applied various approaches to help strengthen personal capabilities - and thereby enable national capacities. Building on a long-standing programme developed in Argentina (and delivered in Spanish), the IAEA now offers post-graduate education courses (PGEC) on Radiation Protection and the Safety of Radiation Sources on a regular basis. This PGEC is available in Arabic (Syrian Arab Republic), English (South Africa and Greece), French (Morocco) and Russian (Belarus). Between 1999 and 2004, more than 370 individuals participated in post-graduate courses. In addition, some 7000 national specialists received radiation protection training through regional and interregional specialized training courses, fellowships, on-the-job training, and scientific visits. By adopting a 'train-the-trainer' approach, the IAEA helps to ensure that Member States become self-sufficient in this area as well. Many individuals who participate in training opportunities provided by the technical cooperation programme subsequently pass their new knowledge and expertise on to co-workers and other peers at the national level. One of the most practical ways the IAEA supports training and education is

  3. Simple Public Key Infrastructure Protocol Analysis and Design

    Vidergar, Alexander G

    2005-01-01

    ...). This thesis aims at proving the applicability of the Simple Public Key Infrastructure (SPKI) as a means of PKC. The strand space approach of Guttman and Thayer is used to provide an appropriate model for analysis...

  4. Managing assets in the infrastructure sector

    van Houten, T.P.; Zhang, L.

    2010-01-01

    In view of the importance of managing assets and the lack of research in managing assets in the infrastructure sector, we develop an asset management model in this study. This model is developed in line with the unique characteristics of the infrastructure assets and asset management principles and

  5. Government Services Information Infrastructure Management

    Cavallini, J.S.; Aiken, R.J.

    1995-04-01

    The Government Services Information Infrastructure (GSII) is that portion of the NII used to link Government and its services, enables virtual agency concepts, protects privacy, and supports emergency preparedness needs. The GSII is comprised of the supporting telecommunications technologies, network and information services infrastructure and the applications that use these. The GSII is an enlightened attempt by the Clinton/Gore Administration to form a virtual government crossing agency boundaries to interoperate more closely with industry and with the public to greatly improve the delivery of government services. The GSII and other private sector efforts, will have a significant impact on the design, development, and deployment of the NII, even if only through the procurement of such services. The Federal Government must adopt new mechanisms and new paradigms for the management of the GSII, including improved acquisition and operation of GSII components in order to maximize benefits. Government requirements and applications will continue to evolv. The requirements from government services and users of form affinity groups that more accurately and effectively define these common requirements, that drive the adoption and use of industry standards, and that provide a significant technology marketplace.

  6. Two-Dimensional Key Table-Based Group Key Distribution in Advanced Metering Infrastructure

    Woong Go; Jin Kawk

    2014-01-01

    A smart grid provides two-way communication by using the information and communication technology. In order to establish two-way communication, the advanced metering infrastructure (AMI) is used in the smart grid as the core infrastructure. This infrastructure consists of smart meters, data collection units, maintenance data management systems, and so on. However, potential security problems of the AMI increase owing to the application of the public network. This is because the transmitted in...

  7. Blockchain-based Public Key Infrastructure for Inter-Domain Secure Routing

    de la Rocha Gómez-Arevalillo , Alfonso; Papadimitratos , Panos

    2017-01-01

    International audience; A gamut of secure inter-domain routing protocols has been proposed in the literature. They use traditional PGP-like and centralized Public Key Infrastructures for trust management. In this paper, we propose our alternative approach for managing security associations, Secure Blockchain Trust Management (SBTM), a trust management system that instantiates a blockchain-based PKI for the operation of securerouting protocols. A main motivation for SBTM is to facilitate gradu...

  8. Sustainability as the key to prioritize investments in public infrastructures

    Pardo-Bosch, Francesc; Aguado, Antonio

    2016-01-01

    Infrastructure construction, one of the biggest driving forces of the economy nowadays, requires a huge analysis and clear transparency to decide what projects have to be executed with the few resources available. With the aim to provide the public administrations a tool with which they can make their decisions easier, the Sustainability Index of Infrastructure Projects (SIIP) has been defined, with a multi-criteria decision system called MIVES, in order to classify non-uniform investments. This index evaluates, in two inseparable stages, the contribution to the sustainable development of each infrastructure project, analyzing its social, environmental and economic impact. The result of the SIIP allows to decide the order with which projects will be prioritized. The case of study developed proves the adaptability and utility of this tool for the ordinary budget management.

  9. Sustainability as the key to prioritize investments in public infrastructures

    Pardo-Bosch, Francesc, E-mail: francesc.pardo@upc.edu [Departament d' Enginyeria Civil i Ambiental, Universitat Politècnica de Catalunya - Barcelona Tech. (Spain); Political Science Department, University of California - Berkeley (United States); Aguado, Antonio, E-mail: antonio.aguado@upc.edu [Departament d' Enginyeria Civil i Ambiental, Universitat Politècnica de Catalunya - Barcelona Tech. (Spain)

    2016-09-15

    Infrastructure construction, one of the biggest driving forces of the economy nowadays, requires a huge analysis and clear transparency to decide what projects have to be executed with the few resources available. With the aim to provide the public administrations a tool with which they can make their decisions easier, the Sustainability Index of Infrastructure Projects (SIIP) has been defined, with a multi-criteria decision system called MIVES, in order to classify non-uniform investments. This index evaluates, in two inseparable stages, the contribution to the sustainable development of each infrastructure project, analyzing its social, environmental and economic impact. The result of the SIIP allows to decide the order with which projects will be prioritized. The case of study developed proves the adaptability and utility of this tool for the ordinary budget management.

  10. Practical Implementation of Various Public Key Infrastructure Models

    Dmitriy Anatolievich Melnikov

    2016-03-01

    Full Text Available The paper proposes a short comparative analysis of the contemporary models of public key infrastructure (PKI and the issues of the PKI models real implementation. The Russian model of PKI is presented. Differences between the North American and West Europe models of PKI and Russian model of PKI are described. The problems of creation and main directions of further development and improvement of the Russian PKI and its integration into the global trust environment are defined.

  11. Managing Transportation Infrastructure for Sustainable Development

    Akinyemi, Edward O.; Zuidgeest, M.H.P.

    Major requirements for operationalization of the concept of sustainable development in urban transportation infrastructure operations management are presented. In addition, it is shown that the current approach to management is incompatible with the requirements for sustainable urban development.

  12. Managing Assets in The Infrastructure Sector

    T.P. van Houten

    2010-09-01

    Full Text Available In view of the importance of managing assets and the lack of research in managing assets in the infrastructure sector, we develop an asset management model in this study. This model is developed in line with the unique characteristics of the infrastructure assets and asset management principles and criteria. In the proposed model, we consider activities at three levels, namely the strategical, tactical and operational levels. The interviews with experts in asset management and officials in several Dutch organizations have proven the potential of our asset management model.

  13. Governing Asset Management Data Infrastructures

    Brous, P.A.; Herder, P.M.; Janssen, M.F.W.H.A.

    2016-01-01

    Organizations are increasingly looking to trusted data to drive their decision making process. Trusted data has a clear, defined and consistent quality which meets the expectations of the user. Data infrastructures which produce trusted data and provide organizations with the capability to make the

  14. Managing infrastructure and underpinning the planned environment

    Wall, K

    2008-04-01

    Full Text Available Planning the built environment is, or should be, also about providing and managing (i.e. operating and maintaining) this environment, viz. the engineering infrastructure (much of which is underground), structures and public amenities. However, never...

  15. Infrastructure Management Information System User Manual

    1998-10-01

    This publication describes and explains the user interface for the Infrastructure Management Information System (IMIS). The IMIS is designed to answer questions regarding public water supply, wastewater treatment, and census information. This publica...

  16. Creativity Management Key Elements

    Rosa María Fuchs Ángeles

    2015-09-01

    Full Text Available Organizations are constantly looking towards innovation. In order to reach it they must foment creativity. This paper analyzes a series of elements considered in the organizational creativity management and proposes a model with the indispensable factors that organizations should consider to reach it. These elements are: culture and organizational environment, strategy, structure, communication, relation with customers, human resources (recruiting, training, job design, compensation, promotion, and performance evaluation, long term orientation and the organizational life cycle. Having the analysis of those elements as a basis, the indispensable pillars on management creativity are identified. The proposed model is based on 5 pillars: the alignment between strategic, culture and organizational structure, called by the authors 'Holy Trinity'; intern publicity; customer’s voice; recognition and a look towards future. Finally, the case of an innovative Peruvian enterprise is presented from the model’s perspective and the study conclusions.

  17. Infrastructure of Electronic Information Management

    Twitchell, Gregory D; Frame, Michael T

    2004-01-01

    .... This presents tremendous challenges to the information technology managers, users, and CEOs of large world-wide corporations who wish to exchange information or get access to resources in today's global marketplace...

  18. National waste management infrastructure in Ghana

    Darko, E.O.; Fletcher, J.J.

    1998-01-01

    Radioactive materials have been used in Ghana for more than four decades. Radioactive waste generated from their applications in various fields has been managed without adequate infrastructure and any legal framework to control and regulate them. The expanded use of nuclear facilities and radiation sources in Ghana with the concomitant exposure to human population necessitates effective infrastructure to deal with the increasing problems of waste. The Ghana Atomic Energy Act 204 (1963) and the Radiation Protection Instrument LI 1559 (1993) made inadequate provision for the management of waste. With the amendment of the Atomic Energy Act, PNDCL 308, a radioactive waste management centre has been established to take care of all waste in the country. To achieve the set objectives for an effective waste management regime, a waste management regulation has been drafted and relevant codes of practice are being developed to guide generators of waste, operators of waste management facilities and the regulatory authority. (author)

  19. Smoke management for modern infrastructure

    Hilditch, Ryan Robert

    2017-01-01

    Concerning management of smoke following an accidental fire within a building it is desirable to be able to estimate, within some understood, acceptable magnitude of error, the volume of smoke resulting from the combustion process of a predefined design fire scenario. Traditionally a range of first principle-based and empirically derived correlations are used to estimate the mass flow of smoke at a height of interest within the fire plume and are based upon the understanding th...

  20. Defense Industrial Base: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    2007-01-01

    This Defense Industrial Base (DIB) Sector-Specific Plan (SSP), developed in collaboration with industry and government security partners, provides sector-level critical infrastructure and key resources (CI/KR...

  1. Road Infrastructure Safety Management in Poland

    Budzynski, Marcin; Jamroz, Kazimierz; Kustra, Wojciech; Michalski, Lech; Gaca, Stanislaw

    2017-10-01

    The objective of road safety infrastructure management is to ensure that when roads are planned, designed, built and used road risks can be identified, assessed and mitigated. Road transport safety is significantly less developed than that of rail, water and air transport. The average individual risk of being a fatality in relation to the distance covered is thirty times higher in road transport that in the other modes. This is mainly because the different modes have a different approach to safety management and to the use of risk management methods and tools. In recent years Poland has had one of the European Union’s highest road death numbers. In 2016 there were 3026 fatalities on Polish roads with 40,766 injuries. Protecting road users from the risk of injury and death should be given top priority. While Poland’s national and regional road safety programmes address this problem and are instrumental in systematically reducing the number of casualties, the effects are far from the expectations. Modern approaches to safety focus on three integrated elements: infrastructure measures, safety management and safety culture. Due to its complexity, the process of road safety management requires modern tools to help with identifying road user risks, assess and evaluate the safety of road infrastructure and select effective measures to improve road safety. One possible tool for tackling this problem is the risk-based method for road infrastructure safety management. European Union Directive 2008/96/EC regulates and proposes a list of tools for managing road infrastructure safety. Road safety tools look at two criteria: the life cycle of a road structure and the process of risk management. Risk can be minimized through the application of the proposed interventions during design process as reasonable. The proposed methods of risk management bring together two stages: risk assessment and risk response occurring within the analyzed road structure (road network, road

  2. Manet key management via Mobile Ficlke Key protocol (MFK ...

    Manet key management via Mobile Ficlke Key protocol (MFK) ... Journal of Fundamental and Applied Sciences. Journal Home · ABOUT THIS JOURNAL ... No Abstract. Keywords: MANET; key management scheme; simulation environment ...

  3. Security for Key Management Interfaces

    Kremer , Steve; Steel , Graham; Warinschi , Bogdan

    2011-01-01

    International audience; We propose a much-needed formal definition of security for cryptographic key management APIs. The advantages of our definition are that it is general, intuitive, and applicable to security proofs in both symbolic and computational models of cryptography. Our definition relies on an idealized API which allows only the most essential functions for generating, exporting and importing keys, and takes into account dynamic corruption of keys. Based on this we can define the ...

  4. Risk Management and Uncertainty in Infrastructure Projects

    Harty, Chris; Neerup Themsen, Tim; Tryggestad, Kjell

    2014-01-01

    The assumption that large complex projects should be managed in order to reduce uncertainty and increase predictability is not new. What is relatively new, however, is that uncertainty reduction can and should be obtained through formal risk management approaches. We question both assumptions...... by addressing a more fundamental question about the role of knowledge in current risk management practices. Inquiries into the predominant approaches to risk management in large infrastructure and construction projects reveal their assumptions about knowledge and we discuss the ramifications these have...... for project and construction management. Our argument and claim is that predominant risk management approaches tends to reinforce conventional ideas of project control whilst undermining other notions of value and relevance of built assets and project management process. These approaches fail to consider...

  5. Engineering Information Infrastructure for Product Lifecycle Managment

    Kimura, Fumihiko

    For proper management of total product life cycle, it is fundamentally important to systematize design and engineering information about product systems. For example, maintenance operation could be more efficiently performed, if appropriate parts design information is available at the maintenance site. Such information shall be available as an information infrastructure for various kinds of engineering operations, and it should be easily accessible during the whole product life cycle, such as transportation, marketing, usage, repair/upgrade, take-back and recycling/disposal. Different from the traditional engineering database, life cycle support information has several characteristic requirements, such as flexible extensibility, distributed architecture, multiple viewpoints, long-time archiving, and product usage information, etc. Basic approaches for managing engineering information infrastructure are investigated, and various information contents and associated life cycle applications are discussed.

  6. Cloud computing can simplify HIT infrastructure management.

    Glaser, John

    2011-08-01

    Software as a Service (SaaS), built on cloud computing technology, is emerging as the forerunner in IT infrastructure because it helps healthcare providers reduce capital investments. Cloud computing leads to predictable, monthly, fixed operating expenses for hospital IT staff. Outsourced cloud computing facilities are state-of-the-art data centers boasting some of the most sophisticated networking equipment on the market. The SaaS model helps hospitals safeguard against technology obsolescence, minimizes maintenance requirements, and simplifies management.

  7. Management of virtualized infrastructure for physics databases

    Topurov, Anton; Gallerani, Luigi; Chatal, Francois; Piorkowski, Mariusz

    2012-01-01

    Demands for information storage of physics metadata are rapidly increasing together with the requirements for its high availability. Most of the HEP laboratories are struggling to squeeze more from their computer centers, thus focus on virtualizing available resources. CERN started investigating database virtualization in early 2006, first by testing database performance and stability on native Xen. Since then we have been closely evaluating the constantly evolving functionality of virtualisation solutions for database and middle tier together with the associated management applications – Oracle's Enterprise Manager and VM Manager. This session will detail our long experience in dealing with virtualized environments, focusing on newest Oracle OVM 3.0 for x86 and Oracle Enterprise Manager functionality for efficiently managing your virtualized database infrastructure.

  8. Cryptographic Key Management and Critical Risk Assessment

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  9. Managing water resources infrastructure in the face of different values

    Mostert, Erik

    Water resources infrastructure (WRI) plays a key role in water management. It can serve or negatively affect some seven to ten different and sometimes conflicting values. WRI management is therefore not a purely technical issue. Economic analyses can help to some extent, but only for values related to current human use. Multi-criteria analysis can cover all values, but in the end WRI management is not an analytical issue, but a governance issue. Different governance paradigms exist: markets, hierarchies and “third alternatives”, such as common pool resources management and network management. This article presents social learning as the most promising paradigm. Positive experiences with social learning have been described and guidance on putting social learning into practice exists. Nonetheless, there are no magic solutions for managing WRI in the face of different values.

  10. A data management infrastructure for bridge monitoring

    Jeong, Seongwoon; Byun, Jaewook; Kim, Daeyoung; Sohn, Hoon; Bae, In Hwan; Law, Kincho H.

    2015-04-01

    This paper discusses a data management infrastructure framework for bridge monitoring applications. As sensor technologies mature and become economically affordable, their deployment for bridge monitoring will continue to grow. Data management becomes a critical issue not only for storing the sensor data but also for integrating with the bridge model to support other functions, such as management, maintenance and inspection. The focus of this study is on the effective data management of bridge information and sensor data, which is crucial to structural health monitoring and life cycle management of bridge structures. We review the state-of-the-art of bridge information modeling and sensor data management, and propose a data management framework for bridge monitoring based on NoSQL database technologies that have been shown useful in handling high volume, time-series data and to flexibly deal with unstructured data schema. Specifically, Apache Cassandra and Mongo DB are deployed for the prototype implementation of the framework. This paper describes the database design for an XML-based Bridge Information Modeling (BrIM) schema, and the representation of sensor data using Sensor Model Language (SensorML). The proposed prototype data management framework is validated using data collected from the Yeongjong Bridge in Incheon, Korea.

  11. Transferring lean management infrastructure for increasing productivity

    Ph.D.Daniel Georgescu

    2010-12-01

    Full Text Available These years, manufacturing function have been transferred rapidly and globally from matured countries to emerging countries. In this paper is about the critical elements for successful transfer of lean management among sites and countries. Based on this general descriptive analysis, current global transfer activity of Lean as well as its future direction is also described. According to the gradual progress of lean management transfer, necessity of its refinement/reinforcement is recognized and some research subjects are proposed for contributing further encouragement of its global activities. In this paper, based on this understanding, requisites for transfer of lean management are discussed through investigating global activity of Lean and specification of infrastructure enabling its smooth transfer is examined

  12. Public Key Infrastructure (PKI) Interoperability: A Security Services Approach to Support Transfer of Trust

    Hansen, Anthony

    1999-01-01

    Public key infrastructure (PKI) technology is at a primitive stage characterized by deployment of PKIs that are engineered to support the provision of security services within individual enterprises, and are not able to support...

  13. Appraisal of key performance indicators on road infrastructure ...

    As Public-Private Partnerships (PPPs) are being practiced in most parts of the world, the need to adopt a system mechanism to evaluate the performance is imperative. The paper evaluates sustainable key performance indicators (KPIs) with a view to appreciating times of improved performance or otherwise. Eleven ...

  14. Managing Sustainable Data Infrastructures: The Gestalt of EOSDIS

    Behnke, Jeanne; Lowe, Dawn; Lindsay, Francis; Lynnes, Chris; Mitchell, Andrew

    2016-01-01

    EOSDIS epitomizes a System of Systems, whose many varied and distributed parts are integrated into a single, highly functional organized science data system. A distributed architecture was adopted to ensure discipline-specific support for the science data, while also leveraging standards and establishing policies and tools to enable interdisciplinary research, and analysis across multiple scientific instruments. The EOSDIS is composed of system elements such as geographically distributed archive centers used to manage the stewardship of data. The infrastructure consists of underlying capabilities connections that enable the primary system elements to function together. For example, one key infrastructure component is the common metadata repository, which enables discovery of all data within the EOSDIS system. EOSDIS employs processes and standards to ensure partners can work together effectively, and provide coherent services to users.

  15. The construction of a public key infrastructure for healthcare information networks in Japan.

    Sakamoto, N

    2001-01-01

    The digital signature is a key technology in the forthcoming Internet society for electronic healthcare as well as for electronic commerce. Efficient exchanges of authorized information with a digital signature in healthcare information networks require a construction of a public key infrastructure (PKI). In order to introduce a PKI to healthcare information networks in Japan, we proposed a development of a user authentication system based on a PKI for user management, user authentication and privilege management of healthcare information systems. In this paper, we describe the design of the user authentication system and its implementation. The user authentication system provides a certification authority service and a privilege management service while it is comprised of a user authentication client and user authentication serves. It is designed on a basis of an X.509 PKI and is implemented with using OpenSSL and OpenLDAP. It was incorporated into the financial information management system for the national university hospitals and has been successfully working for about one year. The hospitals plan to use it as a user authentication method for their whole healthcare information systems. One implementation of the system is free to the national university hospitals with permission of the Japanese Ministry of Education, Culture, Sports, Science and Technology. Another implementation is open to the other healthcare institutes by support of the Medical Information System Development Center (MEDIS-DC). We are moving forward to a nation-wide construction of a PKI for healthcare information networks based on it.

  16. appraisal of key performance indicators on road infrastructure

    HOD

    , service ... the performance management system that construction ... milestones or components of performance measures ... relation to transportation values in using performance ... success of delivery of services and other endeavours in.

  17. Sustainable management of infrastructures using risks

    Gerard, B.

    2005-01-01

    Today, maintenance costs of industrial infrastructures are growing up continuously. It is thus necessary to have a general and systematic method allowing to hierarchize the investment priorities in order to optimize the benefits. Taking into account the diversity of infrastructures, components and stakes, such a task is far to be easy. However, methods are implementing in the civil engineering world in order to give help to engineers and decision-makers to jointly develop strategies answering their technical, financial or environmental problems. Oxand, a counsel company of the Electricite de France (EdF) group, has developed and implemented a decisive decision-help tool. By combining the notion of risk with social, financial or environmental impacts, it becomes possible to estimate and compare different activities submitted to exploitation, safety and budget constraints. Moreover, it is possible to introduce the time dimension in the analysis by the integration of the most recent knowledge on materials aging, still with the aim of an optimized technical and financial management. This article presents the concepts of this methodology and its applications in particular in the domain of nuclear industry. (J.S.)

  18. Disaster management and mitigation: the telecommunications infrastructure.

    Patricelli, Frédéric; Beakley, James E; Carnevale, Angelo; Tarabochia, Marcello; von Lubitz, Dag K J E

    2009-03-01

    Among the most typical consequences of disasters is the near or complete collapse of terrestrial telecommunications infrastructures (especially the distribution network--the 'last mile') and their concomitant unavailability to the rescuers and the higher echelons of mitigation teams. Even when such damage does not take place, the communications overload/congestion resulting from significantly elevated traffic generated by affected residents can be highly disturbing. The paper proposes innovative remedies to the telecommunications difficulties in disaster struck regions. The offered solutions are network-centric operations-cap able, and can be employed in management of disasters of any magnitude (local to national or international). Their implementation provide ground rescue teams (such as law enforcement, firemen, healthcare personnel, civilian authorities) with tactical connectivity among themselves, and, through the Next Generation Network backbone, ensure the essential bidirectional free flow of information and distribution of Actionable Knowledge among ground units, command/control centres, and civilian and military agencies participating in the rescue effort.

  19. Statistical exploration of dataset examining key indicators influencing housing and urban infrastructure investments in megacities

    Adedeji O. Afolabi

    2018-06-01

    Full Text Available Lagos, by the UN standards, has attained the megacity status, with the attendant challenges of living up to that titanic position; regrettably it struggles with its present stock of housing and infrastructural facilities to match its new status. Based on a survey of construction professionals’ perception residing within the state, a questionnaire instrument was used to gather the dataset. The statistical exploration contains dataset on the state of housing and urban infrastructural deficit, key indicators spurring the investment by government to upturn the deficit and improvement mechanisms to tackle the infrastructural dearth. Descriptive statistics and inferential statistics were used to present the dataset. The dataset when analyzed can be useful for policy makers, local and international governments, world funding bodies, researchers and infrastructural investors. Keywords: Construction, Housing, Megacities, Population, Urban infrastructures

  20. Financing and Managing Infrastructure in Africa

    Mthuli Ncube

    2010-01-01

    This paper discusses various ways of financing infrastructure under public private partnership (PPP) arrangements in Africa. The paper presents the standard literature on the relationship between infrastructure investment and economic growth, highlighting the contradictory findings in the literature. Stylised facts about the state of infrastructure in Africa, compared with other regions such as Asia and Latin America, are also presented. Examples of how PPPs structures work are discussed incl...

  1. Infrastructure Management : Dynamic control of assets

    Verlaan, J.G.; Schoenmaker, R.

    2013-01-01

    The infrastructure in the Netherlands is crucial for economic development on a national scale. Dramatic increases of transport and mobility accelerate ageing of infrastructure. The GNP of the Netherlands is strongly related to transport and to the two main ports (Port of Rotterdam and Amsterdam

  2. SUPPLY CHAIN MANAGEMENTKEY FACTORS

    Magdalena Daniela DINU

    2014-01-01

    This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of bot...

  3. Intelligent Structural Health Management of Civil Infrastructure

    2012-10-19

    The collapse of the I-35W Mississippi River Bridge in Minneapolis has spawned a growing interest in the : development of reliable techniques for evaluating the structural integrity of civil infrastructure. Current inspection : techniques tailored to ...

  4. The use of GIS tools for road infrastructure safety management

    Budzyński, Marcin; Kustra, Wojciech; Okraszewska, Romanika; Jamroz, Kazimierz; Pyrchla, Jerzy

    2018-01-01

    There are many factors that influence accidents and their severity. They can be grouped within the system of man, vehicle and environment. The article focuses on how GIS tools can be used to manage road infrastructure safety. To ensure a better understanding and identification of road factors, GIS tools help with the acquisition of road parameter data. Their other role is helping with a clear and effective presentation of risk ranking. GIS is key to identifying high-risk sections and supports the effective communication of safety levels. This makes it a vital element of safety management. The article describes the use of GIS for the collection and visualisation of road parameter data which are not available in any of the existing databases, i.e. horizontal curve parameters. As we know from research and statistics, they are important factors that determine the safety of road infrastructure. Finally, new research is proposed as well as the possibilities for applying GIS tools for the purposes of road safety inspection.

  5. CSIR’s advocacy and support of infrastructure asset management

    Wall, K

    2008-11-01

    Full Text Available That increasing attention is being paid to infrastructure asset management (IAM) is timely, and owes something to the work of the CSIR in discovering and documenting the state of infrastructure, and in leading specific aspects of the process...

  6. Toekomstvaste fysieke toegangsystemen : Public Key Infrastructure als oplossing voor fysiek toegangbeheer

    Kleinhuis, G.; Olk, J.G.E.

    2011-01-01

    Voor fysieke toegangssystemen wordt veelal gebruik gemaakt van toegangspassen met een contactlose chip. Soms zijn deze passen ook nog voorzien van een PKI (Public Key Infrastructure) contactchip voor toegang tot ICT en/of het plaatsen van een digitale handtekening. Ook voor fysieke toegang bied PKI

  7. Information Systems Management: an Australian view of the key issues

    Graham Pervan

    1994-05-01

    Full Text Available Studies investigating the key issues in IS management serve to better understand the concerns of IS managers and help to guide IS researchers in choosing IS management problems worthy of investigation. This paper presents results from a study of the key issues facing the IS managers of Australia's largest 300 organisations which is part of a three-yearly longitudinal study. In order to gain consensus on the relative importance of the key issues, a three-round Delphi method was applied. The results reveal that IS strategic planning continues to be the paramount issue in our industry, as are many issues associated with IS strategic planning, including responsiveness of the IT infrastructure, effective use of the data resource, IS for competitive advantage, and a comprehensive information architecture. A greater emphasis on quality is also revealed in highly rated issues such as effective use of the data resource, data integrity and quality assurance, and the quality of software development

  8. The Public-Key-Infrastructure of the Radiological Society of Germany

    Schuetze, B.; Kaemmerer, M.; Klos, G.; Mildenberger, P.

    2006-01-01

    Pretty Good Privacy (PGP) encoding is based on the Public-Key-Procedure and permits the safe transmission of medical data. Furthermore it allows the use of an electronic signature provided that keys used belong to the key owner and that the key owner's identity is guaranteed by a trusted third party. Under the auspices of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) its IT-Working Group (Arbeitsgemeinschaft fuer Informationstechnik, GIT) built up an appropriate Certification Authority including the required Public-Key-Infrastructure. These GIT certified PGP keys allow the legal use of telemedicine in Germany. Digital signatures based to those certified keys correspond to the advanced signature according to the German Signature Law

  9. The Public-Key-Infrastructure of the Radiological Society of Germany

    Schuetze, B. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany)]. E-mail: schuetze@medizin-informatik.org; Kaemmerer, M. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany); Klos, G. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany); Mildenberger, P. [Johannes Gutenberg-University of Mainz, Department of Radiology, Langenbeckstr. 1, 55131 Mainz (Germany)

    2006-03-15

    Pretty Good Privacy (PGP) encoding is based on the Public-Key-Procedure and permits the safe transmission of medical data. Furthermore it allows the use of an electronic signature provided that keys used belong to the key owner and that the key owner's identity is guaranteed by a trusted third party. Under the auspices of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) its IT-Working Group (Arbeitsgemeinschaft fuer Informationstechnik, GIT) built up an appropriate Certification Authority including the required Public-Key-Infrastructure. These GIT certified PGP keys allow the legal use of telemedicine in Germany. Digital signatures based to those certified keys correspond to the advanced signature according to the German Signature Law.

  10. Configuration management in large scale infrastructure development

    Rijn, T.P.J. van; Belt, H. van de; Los, R.H.

    2000-01-01

    Large Scale Infrastructure (LSI) development projects such as the construction of roads, rail-ways and other civil engineering (water)works is tendered differently today than a decade ago. Traditional workflow requested quotes from construction companies for construction works where the works to be

  11. SUPPLY CHAIN MANAGEMENTKEY FACTORS

    Magdalena Daniela DINU

    2014-06-01

    Full Text Available This paper exposes Supply Chain Management by its key factors. Briefly, where the Supply Chain Management is treated as strategic part of a company then maintaining both control and influence throughout the entire supply chain are key factors and critical to success. On the other hand, finding the right partner to manage the non-strategic Supply Chains would be another key factor too. To define the most important key factors within Supply Chain Management means a deeply understanding of both Supply Chain’ s components, procedures, workflow, processes and the importance of Supply Chain Management into maximizing company's value. SCORE model able to provide solid information about measuring performance and identifying priorities within Supply Chain Management will help us to understand the key factors by analyzing its elements: Plan, Source, Make, Deliver,Return, Enable. These elements covers all the challenging areas from first to third tier of Supply Chain Management.

  12. Situational Management Of Critical Infrastructure Resources Under Threat

    Krupa Tadeusz

    2015-06-01

    Full Text Available This article presents a synthesis of knowledge about safety management procedures for critical infrastructure in the context of risk management theory and the provisions of the Polish law on emergency management launched on of April 26, 2007. In this paper, the inadequacy of the accepted procedures at present is highlighted, as well as their continuous improvement and adaptation to prevailing political, legal, social, and economic conditions. This paper proposes using the concept of situational management and knowledge management to develop a new method of predicting, preventing, and responding to emerging crises within critical infrastructure. The considerations presented in this paper lead to a proposed concept system supporting critical infrastructure safety management through the implementation of knowledge management methods.

  13. A Cyber Infrastructure for the SKA Telescope Manager

    Barbosa, Domingos; Barracaa, Joao Paulo; Carvalho, Bruno; Maia, Dalmiro; Gupta, Yashwant; Natarajan, Swaminathan; Roux, Gerhard Le; Swart, Paul

    2016-01-01

    The Square Kilometre Array Telescope Manager (SKA TM) will be responsible for assisting the SKA Operations and Observation Management, carrying out System diagnosis and collecting Monitoring & Control data from the SKA sub-systems and components. To provide adequate compute resources, scalability, operation continuity and high availability, as well as strict Quality of Service, the TM cyber-infrastructure (embodied in the Local Infrastructure - LINFRA) consists of COTS hardware and infrastruc...

  14. Information security system based on virtual-optics imaging methodology and public key infrastructure

    Peng, Xiang; Zhang, Peng; Cai, Lilong

    In this paper, we present a virtual-optical based information security system model with the aid of public-key-infrastructure (PKI) techniques. The proposed model employs a hybrid architecture in which our previously published encryption algorithm based on virtual-optics imaging methodology (VOIM) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). For an asymmetric system, given an encryption key, it is computationally infeasible to determine the decryption key and vice versa. The whole information security model is run under the framework of PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOIM security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network.

  15. 6 Keys to Identity Management

    Shoham, Idan

    2011-01-01

    An Identity and Access Management (IAM) project on campus can feel like a Sisyphean task: Just when access rights have finally been sorted out, the semester ends--and users change roles, leave campus, or require new processes. IT departments face a constantly changing technical landscape: (1) integrating new applications and retiring old ones; (2)…

  16. Key management issue in SCADA networks: A review

    Abdalhossein Rezai

    2017-02-01

    Full Text Available Supervisory Control And Data Acquisition (SCADA networks have a vital role in Critical Infrastructures (CIs such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these networks. The utilized Remote Terminal Units (RTUs and Intelligence Electronic Devices (IEDs in these networks have resource limitations, which make security applications a challenging issue. Efficient key management schemes are required besides lightweight ciphers for securing the SCADA communications. Many key management schemes have been developed to address the tradeoff between SCADA constrain and security, but which scheme is the most effective is still debatable. This paper presents a review of the existing key management schemes in SCADA networks, which provides directions for further researches in this field.

  17. Key characteristics of different management styles

    AGADZHANYAN A.S.

    2015-01-01

    The article reveals main management styles practiсed by managers all over the world. The author considers key characteristics of management styles, conditions of their using. The paper analyzes cultural differences in management styles in the West and in the East.

  18. A cyber infrastructure for the SKA Telescope Manager

    Barbosa, Domingos; Barraca, João. P.; Carvalho, Bruno; Maia, Dalmiro; Gupta, Yashwant; Natarajan, Swaminathan; Le Roux, Gerhard; Swart, Paul

    2016-07-01

    The Square Kilometre Array Telescope Manager (SKA TM) will be responsible for assisting the SKA Operations and Observation Management, carrying out System diagnosis and collecting Monitoring and Control data from the SKA subsystems and components. To provide adequate compute resources, scalability, operation continuity and high availability, as well as strict Quality of Service, the TM cyber-infrastructure (embodied in the Local Infrastructure - LINFRA) consists of COTS hardware and infrastructural software (for example: server monitoring software, host operating system, virtualization software, device firmware), providing a specially tailored Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) solution. The TM infrastructure provides services in the form of computational power, software defined networking, power, storage abstractions, and high level, state of the art IaaS and PaaS management interfaces. This cyber platform will be tailored to each of the two SKA Phase 1 telescopes (SKA_MID in South Africa and SKA_LOW in Australia) instances, each presenting different computational and storage infrastructures and conditioned by location. This cyber platform will provide a compute model enabling TM to manage the deployment and execution of its multiple components (observation scheduler, proposal submission tools, MandC components, Forensic tools and several Databases, etc). In this sense, the TM LINFRA is primarily focused towards the provision of isolated instances, mostly resorting to virtualization technologies, while defaulting to bare hardware if specifically required due to performance, security, availability, or other requirement.

  19. Managing the information infrastructure for business value

    Renkema, T.J.W.; Farbey, B.; Serafeimidids, V.

    1995-01-01

    Evaluation and management of IT investments have come to play an essential role in the corporate success of contemporary organisations. Senior management's prime concern has shifted from controlling IT costs to managing and delivering IT benefits. An emerging notion in the successful exploitation of

  20. Development and problems of radioactive waste management infrastructure in Estonia

    Putnik, H.; Realo, E.

    2001-01-01

    Estonia is one of a few countries where the establishment of radiation protection and radioactive waste management infrastructure started only recently, soon after regaining independence in the beginning of 1990's. Both legislative and regulatory infrastructure had to be built from scratch, in parallel with the beginning of urgent activities and practices to manage waste streams inherited from the past. Despite significant deficiency of local expertise and specialists in the field, the main objectives of the establishment were set up: to enforce national legislation basing on contemporary international principles, criteria, requirements and to implement structures and procedures for an efficient regulation of radiation safety issues, including practices involving radioactive waste management and decommissioning

  1. Effectiveness of infrastructure asset management: challenges for public agencies

    Schraven, Daan; Hartmann, Andreas; Dewulf, Geert P.M.R.

    2011-01-01

    Purpose: The aim of this research is to better understand the decisions in infrastructure asset management at public agencies and the challenges of these agencies to improve the effectiveness of their decision making. Design/methodology/approach: Based on a literature review on asset management at

  2. The Key to Risk Management: Management

    Adrian E. Tschoegl

    2000-01-01

    The Barings, Daiwa Bank and Sumitomo Corp. financial debacles in the mid-1990s suggest that management failures rather than misfortune, errors, or complexity are a major source of the risk of financial debacles. These errors are systematic and are a concommittant of the structure of trading and of human nature. Risk management systems must take these facts into account.

  3. Virtual-optical information security system based on public key infrastructure

    Peng, Xiang; Zhang, Peng; Cai, Lilong; Niu, Hanben

    2005-01-01

    A virtual-optical based encryption model with the aid of public key infrastructure (PKI) is presented in this paper. The proposed model employs a hybrid architecture in which our previously published encryption method based on virtual-optics scheme (VOS) can be used to encipher and decipher data while an asymmetric algorithm, for example RSA, is applied for enciphering and deciphering the session key(s). The whole information security model is run under the framework of international standard ITU-T X.509 PKI, which is on basis of public-key cryptography and digital signatures. This PKI-based VOS security approach has additional features like confidentiality, authentication, and integrity for the purpose of data encryption under the environment of network. Numerical experiments prove the effectiveness of the method. The security of proposed model is briefly analyzed by examining some possible attacks from the viewpoint of a cryptanalysis.

  4. Management and Development of the RT Research Facilities and Infrastructures

    Kim, Won Ho; Nho, Young Chang; Kim, Jae Sung

    2009-01-01

    The purpose of this project are to operate the core facilities of the research for the Radiation Technology in stable and to assist the research activities efficiently in the industry, academic, and research laboratory. By developing the infrastructure of the national radio technology industry, we can activate the researching area of the RT and the related industry, and obtain the primary and original technology. The key point in the study of the RT and the assistance of the industry, academic, and research laboratory for the RT area smoothly, is managing the various of unique radiation facilities in our country. The gamma Phytotron and Gene Bank are essential in the agribiology because these facilities are used to preserve and utilize the genes and to provide an experimental field for the environment and biotechnology. The Radiation Fusion Technology research supporting facilities are the core support facilities, and are used to develop the high-tech fusion areas. In addition, the most advanced analytical instruments, whose costs are very high, should be managed in stable and be utilized in supporting works, and the experimental animal supporting laboratory and Gamma Cell have to be maintained in high level and managed in stable also. The ARTI have been developed the 30MeV cyclotron during 2005∼2006, aimed to produce radioisotopes and to research the beam applications as a result of the project, 'Establishment of the Infrastructure for the Atomic Energy Research Expansion', collaborated with the Korea Institute of Radiological and Medical Sciences. In addition, the ARTI is in the progress of establishing cyclotron integrated complex as a core research facility, using a proton beam to produce radioisotopes and to support a various research areas. The measurement and evaluation of the irradiation dose, and irradiation supporting technology of the Good Irradiation Practice(GIP) are essential in various researching areas. One thing to remember is that the publicity

  5. Information Systems Management: an Australasian view of key issues - 1996

    Graham Pervan

    1997-11-01

    Full Text Available As part of a longitudinal study of key information systems management issues, a survey of Australasia's largest 500 organisations was conducted to identify which issues were perceived by the IS executives as being important, problematic and critical over the next three to five years. The most critical issues were revealed to be a mix of technology management issues (IT infrastructure, communications, disaster recovery, strategic management issues (competitive advantage, IS planning, aligning the IS organisation, people management issues (organisational learning, educating senior management in IT, systems development and data management issues (effective use of the data resource, and end-user computing. This reflects the need for a balance of business, technical, and people skills in an IS executive. Non-critical issues were mostly related to systems development and the individual technologies which must be integrated and managed to ensure a responsive IT infrastructure. The study also reveals that some issues are much more important than problematic (disaster recovery, competitive advantage, information architecture, and IS alignment while others are much more problematic than important (end-user computing, IS role and contribution, and BPR. The former reflects a growing level of knowledge in handling these issues, while the latter reflects a continuing problem with them. The differences between this study and similar studies conducted in 1988 and 1992 show that there is a growing confidence in the IS executive's ability to manage the strategic issues, a continuing concern about providing a responsive IT infrastructure (especially communications, and a continuing concern with educating all 'customers' in the organisation in the effective use of IT, including senior management.

  6. Research Data Management - Building Service Infrastructure and Capacity

    Baessa, Mohamed A.

    2018-03-07

    Research libraries support the missions of their institutions by facilitating the flow of scholarly information to and from the institutions’ researchers. As research in many disciplines becomes more data and software intensive, libraries are finding that services and infrastructure developed to preserve and provide access to textual documents are insufficient to meet their institutions’ needs. In response, libraries around the world have begun assessing the data management needs of their researchers, and expanding their capacity to meet the needs that they find. This discussion panel will discuss approaches to building research data management services and infrastructure in academic libraries. Panelists will discuss international efforts to support research data management, while highlighting the different models that universities have adopted to provide a mix of services and infrastructure tailored to their local needs.

  7. Federated data storage and management infrastructure

    Zarochentsev, A; Kiryanov, A; Klimentov, A; Krasnopevtsev, D; Hristov, P

    2016-01-01

    The Large Hadron Collider (LHC)’ operating at the international CERN Laboratory in Geneva, Switzerland, is leading Big Data driven scientific explorations. Experiments at the LHC explore the fundamental nature of matter and the basic forces that shape our universe. Computing models for the High Luminosity LHC era anticipate a growth of storage needs of at least orders of magnitude; it will require new approaches in data storage organization and data handling. In our project we address the fundamental problem of designing of architecture to integrate a distributed heterogeneous disk resources for LHC experiments and other data- intensive science applications and to provide access to data from heterogeneous computing facilities. We have prototyped a federated storage for Russian T1 and T2 centers located in Moscow, St.-Petersburg and Gatchina, as well as Russian / CERN federation. We have conducted extensive tests of underlying network infrastructure and storage endpoints with synthetic performance measurement tools as well as with HENP-specific workloads, including the ones running on supercomputing platform, cloud computing and Grid for ALICE and ATLAS experiments. We will present our current accomplishments with running LHC data analysis remotely and locally to demonstrate our ability to efficiently use federated data storage experiment wide within National Academic facilities for High Energy and Nuclear Physics as well as for other data-intensive science applications, such as bio-informatics. (paper)

  8. Infrastructure Task Force Tribal Solid Waste Management

    These documents describe 1) issues to consider when planning and designing community engagement approaches for tribal integrated waste management programs and 2) a proposed approach to improve tribal open dumps data and solid waste projects, and 3) an MOU.

  9. Eight Key Facets of Small Business Management.

    Scott, James Calvert

    1980-01-01

    Identifies eight key facets of small business management and suggests activities that may be used to assist in their development. The key facets are (1) product or service, (2) competition, (3) marketing strategies, (4) personnel needs, (5) equipment and facility needs, (6) finances, (7) planning, and (8) entrepreneurship. (JOW)

  10. Optimal grazing management strategies: evaluating key concepts ...

    Finally, overstocking will override key management initiatives, such as effective recovery periods, leading to rangeland degradation. Thus, in variable climates, stocking rate should be set conservatively to allow easier adaptation of animal numbers to rainfall variability from year to year. We suggest several key concepts that ...

  11. Ecological stability of landscape - ecological infrastructure - ecological management

    1992-01-01

    The Field Workshop 'Ecological Stability of Landscape - Ecological Infrastructure - Ecological Management' was held within a State Environmental Programme financed by the Federal Committee for the Environment. The objectives of the workshop were to present Czech and Slovak approaches to the ecological stability of the landscape by means of examples of some case studies in the field, and to exchange ideas, theoretical knowledge and practical experience on implementing the concept of ecological infrastructure in landscape management. Out of 19 papers contained in the proceedings, 3 items were inputted to the INIS system. (Z.S.)

  12. Health infrastructural challenges to health management information ...

    Aim: This study aims to assess health management information systems at the ... workers' ability to practice and use the health data generated at their Primary Health ... Only 2 (5.7%) of the health centres surveyed were capable of operating the ... The government at all levels should ensure collective effort and political will to ...

  13. An Institutional Approach to Developing Research Data Management Infrastructure

    James A. J. Wilson

    2011-10-01

    Full Text Available This article outlines the work that the University of Oxford is undertaking to implement a coordinated data management infrastructure. The rationale for the approach being taken by Oxford is presented, with particular attention paid to the role of each service division. This is followed by a consideration of the relative advantages and disadvantages of institutional data repositories, as opposed to national or international data centres. The article then focuses on two ongoing JISC-funded projects, ‘Embedding Institutional Data Curation Services in Research’ (Eidcsr and ‘Supporting Data Management Infrastructure for the Humanities’ (Sudamih. Both projects are intra-institutional collaborations and involve working with researchers to develop particular aspects of infrastructure, including: University policy, systems for the preservation and documentation of research data, training and support, software tools for the visualisation of large images, and creating and sharing databases via the Web (Database as a Service.

  14. A game theory analysis of green infrastructure stormwater management policies

    William, Reshmina; Garg, Jugal; Stillwell, Ashlynn S.

    2017-09-01

    Green stormwater infrastructure has been demonstrated as an innovative water resources management approach that addresses multiple challenges facing urban environments. However, there is little consensus on what policy strategies can be used to best incentivize green infrastructure adoption by private landowners. Game theory, an analysis framework that has historically been under-utilized within the context of stormwater management, is uniquely suited to address this policy question. We used a cooperative game theory framework to investigate the potential impacts of different policy strategies used to incentivize green infrastructure installation. The results indicate that municipal regulation leads to the greatest reduction in pollutant loading. However, the choice of the "best" regulatory approach will depend on a variety of different factors including politics and financial considerations. Large, downstream agents have a disproportionate share of bargaining power. Results also reveal that policy impacts are highly dependent on agents' spatial position within the stormwater network, leading to important questions of social equity and environmental justice.

  15. Critical infrastructure cyber-security risk management

    Spyridopoulos, T.; Maraslis, K.; Tryfonas, T.; Oikonomou, G.

    2017-01-01

    Traditional IT cyber-security risk management methods are based on the evaluation of risks calculated as the likelihood of cyber-security incidents occurring. However, these probabilities are usually estimations or guesses based on past experience and incomplete data. Incorrect estimations can lead to errors in the evaluation of risks that can ultimately affect the protection of the system. This issue is also transferred to methods used in Industrial Control Systems (ICSs), as they are mainly...

  16. Security Services Lifecycle Management in on-demand infrastructure services

    Demchenko, Y.; de Laat, C.; Lopez, D.R.; García-Espín, J.A.; Qiu, J.; Zhao, G.; Rong, C.

    2010-01-01

    Modern e-Science and high technology industry require high-performance and complicated network and computer infrastructure to support distributed collaborating groups of researchers and applications that should be provisioned on-demand. The effective use and management of the dynamically provisioned

  17. From BIM to life cycle information management in infrastructure

    Nederveen, G.A. van; Wolfert, R.; Ruitenbeek, M. van de

    2014-01-01

    In principle, Building Information Modelling (BIM) should provide a basis for infrastructure information management during the whole life-cycle. In practice however, the use of BIM is normally limited to the design and construction phases. It seems that the use of BIM information in other life-cycle

  18. Investigation into How Managers Justify Investments in IT Infrastructure

    Ibe, Richmond Ikechukwu

    2012-01-01

    Organization leaders are dependent on information technology for corporate productivity; however, senior managers have expressed concerns about insufficient benefits from information technology investments. The problem researched was to understand how midsized businesses justify investments in information technology infrastructure. The purpose of…

  19. A Data Scheduling and Management Infrastructure for the TEAM Network

    Andelman, S.; Baru, C.; Chandra, S.; Fegraus, E.; Lin, K.; Unwin, R.

    2009-04-01

    currently partnering with the San Diego Super Computer Center to build the data management infrastructure. Data collected from the three core protocols as well as others are currently made available through the TEAM Network portal, which provides the content management framework, the data scheduling and management framework, an administrative framework to implement and manage TEAM sites, collaborative tools and a number of tools and applications utilizing Google Map and Google Earth products. A critical element of the TEAM Network data management infrastructure is to make the data publicly available in as close to real-time as possible (the TEAM Network Data Use Policy: http://www.teamnetwork.org/en/data/policy). This requires two essential tasks to be accomplished, 1) A data collection schedule has to be planned, proposed and approved for a given TEAM site. This is a challenging process since TEAM sites are geographically distributed across the tropics and hence have different seasons where they schedule field sampling for the different TEAM protocols. Capturing this information and ensuring that TEAM sites follow the outlined legal contract is key to the data collection process and 2) A stream-lined and efficient information management system to ensure data collected from the field meet the minimum data standards (i.e. are of the highest scientific quality) and are securely transferred, archived, processed and be rapidly made publicaly available, as a finished consumable product via the TEAM Network portal. The TEAM Network is achieving these goals by implementing an end-to-end framework consisting of the Sampling Scheduler application and the Data Management Framework. Sampling Scheduler The Sampling Scheduler is a project management, calendar based portal application that will allow scientists at a TEAM site to schedule field sampling for each of the TEAM protocols implemented at that site. The sampling scheduler addresses the specific requirements established in the

  20. VerSAMI: Versatile and Scalable key management for Smart Grid AMI systems

    Benmalek , Mourad; Challal , Yacine; Derhab , Abdelouahid; Bouabdallah , Abdelmadjid

    2018-01-01

    International audience; In this paper, we propose four new key management schemes for Advanced Metering Infrastructure (AMI) to secure data communications in the Smart Grid (SG). The schemes are based on individual and batch rekeying operations using a novel multi-group key graph structure, are also versatile in the sense that they can support broadcast, unicast, as well as multicast communications. Security analysis shows that our schemes satisfy key management security properties. Furthermo...

  1. Setting objectives for managing Key deer

    Diefenbach, Duane R.; Wagner, Tyler; Stauffer, Glenn E.

    2014-01-01

    The U.S. Fish and Wildlife Service (FWS) is responsible for the protection and management of Key deer (Odocoileus virginianus clavium) because the species is listed as Endangered under the Endangered Species Act (ESA). The purpose of the ESA is to protect and recover imperiled species and the ecosystems upon which they depend. There are a host of actions that could possibly be undertaken to recover the Key deer population, but without a clearly defined problem and stated objectives it can be difficult to compare and evaluate alternative actions. In addition, management goals and the acceptability of alternative management actions are inherently linked to stakeholders, who should be engaged throughout the process of developing a decision framework. The purpose of this project was to engage a representative group of stakeholders to develop a problem statement that captured the management problem the FWS must address with Key deer and identify objectives that, if met, would help solve the problem. In addition, the objectives were organized in a hierarchical manner (i.e., an objectives network) to show how they are linked, and measurable attributes were identified for each objective. We organized a group of people who represented stakeholders interested in and potentially affected by the management of Key deer. These stakeholders included individuals who represented local, state, and federal governments, non-governmental organizations, the general public, and local businesses. This stakeholder group met five full days over the course of an eight-week period to identify objectives that would address the following problem:“As recovery and removal from the Endangered Species list is the purpose of the Endangered Species Act, the U.S. Fish and Wildlife Service needs a management approach that will ensure a sustainable, viable, and healthy Key deer population. Urbanization has affected the behavior and population dynamics of the Key deer and the amount and characteristics

  2. Electronic signature for medical documents--integration and evaluation of a public key infrastructure in hospitals.

    Brandner, R; van der Haak, M; Hartmann, M; Haux, R; Schmücker, P

    2002-01-01

    Our objectives were to determine the user-oriented and legal requirements for a Public Key Infrastructure (PKI) for electronic signatures for medical documents, and to translate these requirements into a general model for a signature system. A prototype of this model was then implemented and evaluated in clinical routine use. Analyses of documents, processes, interviews, observations, and of the available literature supplied the foundations for the development of the signature system model. Eight participants of the Department of Dermatology of the Heidelberg University Medical Center evaluated the implemented prototype from December 2000 to January 2001, during the course of an intervention study. By means of questionnaires, interviews, observations and database analyses, the usefulness and user acceptance of the electronic signature and its integration into electronic discharge letters were established. Since the major part of medical documents generated in a hospital are signature-relevant, they will require electronic signatures in the future. A PKI must meet the multitude of responsibilities and security needs required in a hospital. Also, the signature functionality must be integrated directly into the workflow surrounding document creation. A developed signature model, fulfilling user-oriented and legal requirements, was implemented using hard and software components that conform to the German Signature Law. It was integrated into the existing hospital information system of the Heidelberg University Medical Center. At the end of the intervention study, the average acceptance scores achieved were mean = 3.90; SD = 0.42 on a scale of 1 (very negative attitude) to 5 (very positive attitude) for the electronic signature procedure. Acceptance of the integration into computer-supported discharge letter writing reached mean = 3.91; SD = 0.47. On average, the discharge letters were completed 7.18 days earlier. The electronic signature is indispensable for the

  3. Safety issues in cultural heritage management and critical infrastructures management

    Soldovieri, Francesco; Masini, Nicola; Alvarez de Buergo, Monica; Dumoulin, Jean

    2013-12-01

    This special issue is the fourth of its kind in Journal of Geophysics and Engineering , containing studies and applications of geophysical methodologies and sensing technologies for the knowledge, conservation and security of products of human activity ranging from civil infrastructures to built and cultural heritage. The first discussed the application of novel instrumentation, surface and airborne remote sensing techniques, as well as data processing oriented to both detection and characterization of archaeological buried remains and conservation of cultural heritage (Eppelbaum et al 2010). The second stressed the importance of an integrated and multiscale approach for the study and conservation of architectural, archaeological and artistic heritage, from SAR to GPR to imaging based diagnostic techniques (Masini and Soldovieri 2011). The third enlarged the field of analysis to civil engineering structures and infrastructures, providing an overview of the effectiveness and the limitations of single diagnostic techniques, which can be overcome through the integration of different methods and technologies and/or the use of robust and novel data processing techniques (Masini et al 2012). As a whole, the special issue put in evidence the factors that affect the choice of diagnostic strategy, such as the material, the spatial characteristics of the objects or sites, the value of the objects to be investigated (cultural or not), the aim of the investigation (knowledge, conservation, restoration) and the issues to be addressed (monitoring, decay assessment). In order to complete the overview of the application fields of sensing technologies this issue has been dedicated to monitoring of cultural heritage and critical infrastructures to address safety and security issues. Particular attention has been paid to the data processing methods of different sensing techniques, from infrared thermography through GPR to SAR. Cascini et al (2013) present the effectiveness of a

  4. INFRASTRUCTURE

    A.Gaddi

    2011-01-01

    Between the end of March to June 2011, there has been no detector downtime during proton fills due to CMS Infrastructures failures. This exceptional performance is a clear sign of the high quality work done by the CMS Infrastructures unit and its supporting teams. Powering infrastructure At the end of March, the EN/EL group observed a problem with the CMS 48 V system. The problem was a lack of isolation between the negative (return) terminal and earth. Although at that moment we were not seeing any loss of functionality, in the long term it would have led to severe disruption to the CMS power system. The 48 V system is critical to the operation of CMS: in addition to feeding the anti-panic lights, essential for the safety of the underground areas, it powers all the PLCs (Twidos) that control AC power to the racks and front-end electronics of CMS. A failure of the 48 V system would bring down the whole detector and lead to evacuation of the cavern. EN/EL technicians have made an accurate search of the fault, ...

  5. INFRASTRUCTURE

    A. Gaddi and P. Tropea

    2011-01-01

    Most of the work relating to Infrastructure has been concentrated in the new CSC and RPC manufactory at building 904, on the Prevessin site. Brand new gas distribution, powering and HVAC infrastructures are being deployed and the production of the first CSC chambers has started. Other activities at the CMS site concern the installation of a new small crane bridge in the Cooling technical room in USC55, in order to facilitate the intervention of the maintenance team in case of major failures of the chilled water pumping units. The laser barrack in USC55 has been also the object of a study, requested by the ECAL community, for the new laser system that shall be delivered in few months. In addition, ordinary maintenance works have been performed during the short machine stops on all the main infrastructures at Point 5 and in preparation to the Year-End Technical Stop (YETS), when most of the systems will be carefully inspected in order to ensure a smooth running through the crucial year 2012. After the incide...

  6. INFRASTRUCTURE

    A. Gaddi and P. Tropea

    2012-01-01

    The CMS Infrastructures teams are preparing for the LS1 activities. A long list of maintenance, consolidation and upgrade projects for CMS Infrastructures is on the table and is being discussed among Technical Coordination and sub-detector representatives. Apart from the activities concerning the cooling infrastructures (see below), two main projects have started: the refurbishment of the SX5 building, from storage area to RP storage and Muon stations laboratory; and the procurement of a new dry-gas (nitrogen and dry air) plant for inner detector flushing. We briefly present here the work done on the first item, leaving the second one for the next CMS Bulletin issue. The SX5 building is entering its third era, from main assembly building for CMS from 2000 to 2007, to storage building from 2008 to 2012, to RP storage and Muon laboratory during LS1 and beyond. A wall of concrete blocks has been erected to limit the RP zone, while the rest of the surface has been split between the ME1/1 and the CSC/DT laborat...

  7. Autonomic Management of Application Workflows on Hybrid Computing Infrastructure

    Hyunjoo Kim

    2011-01-01

    Full Text Available In this paper, we present a programming and runtime framework that enables the autonomic management of complex application workflows on hybrid computing infrastructures. The framework is designed to address system and application heterogeneity and dynamics to ensure that application objectives and constraints are satisfied. The need for such autonomic system and application management is becoming critical as computing infrastructures become increasingly heterogeneous, integrating different classes of resources from high-end HPC systems to commodity clusters and clouds. For example, the framework presented in this paper can be used to provision the appropriate mix of resources based on application requirements and constraints. The framework also monitors the system/application state and adapts the application and/or resources to respond to changing requirements or environment. To demonstrate the operation of the framework and to evaluate its ability, we employ a workflow used to characterize an oil reservoir executing on a hybrid infrastructure composed of TeraGrid nodes and Amazon EC2 instances of various types. Specifically, we show how different applications objectives such as acceleration, conservation and resilience can be effectively achieved while satisfying deadline and budget constraints, using an appropriate mix of dynamically provisioned resources. Our evaluations also demonstrate that public clouds can be used to complement and reinforce the scheduling and usage of traditional high performance computing infrastructure.

  8. A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems

    Mohammed Ramadan

    2016-08-01

    Full Text Available Mobile communication security techniques are employed to guard the communication between the network entities. Mobile communication cellular systems have become one of the most important communication systems in recent times and are used by millions of people around the world. Since the 1990s, considerable efforts have been taken to improve both the communication and security features of the mobile communications systems. However, these improvements divide the mobile communications field into different generations according to the communication and security techniques such as A3, A5 and A8 algorithms for 2G-GSM cellular system, 3G-authentication and key agreement (AKA, evolved packet system-authentication and key agreement (EPS-AKA, and long term evolution-authentication and key agreement (LTE-AKA algorithms for 3rd generation partnership project (3GPP systems. Furthermore, these generations have many vulnerabilities, and huge security work is involved to solve such problems. Some of them are in the field of the public key cryptography (PKC which requires a high computational cost and more network flexibility to be achieved. As such, the public key infrastructure (PKI is more compatible with the modern generations due to the superior communications features. This paper surveys the latest proposed works on the security of GSM, CDMA, and LTE cellular systems using PKI. Firstly, we present the security issues for each generation of mobile communication systems, then we study and analyze the latest proposed schemes and give some comparisons. Finally, we introduce some new directions for the future scope. This paper classifies the mobile communication security schemes according to the techniques used for each cellular system and covers some of the PKI-based security techniques such as authentication, key agreement, and privacy preserving.

  9. Talent Management: Working lines and key processes

    Alvaro Alonso

    2014-12-01

    Full Text Available Purpose: Talent management represents today a challenge for companies, since the contribution of value comes increasingly from the area of intangible capital. The current paradigm of expanding technology and competitive dynamics, makes talent management that companies realize a critical success factor in today's markets. However, there is no generally accepted theoretical framework and empirical studies sufficient to demonstrate the role of talent management in creating competitive advantage. Therefore, the first objective of this paper is to analyze the evolution of talent management, to understand more deeply their fundamental dimensions: people and key positions in the organization. From these dimensions, as a second objective of the research is proposed to classify and characterize the literature about four alternative ways of study, according to the treatment they receive such dimensions and thus improve understanding of the role of talent management in business strategyDesign/methodology: To develop this paper we have selected the major contributions to the field of talent management, with particular emphasis on certain meta-analysis very quoted by the scientific community (Lewis and Heckman, 2006; Mellahi and Collings, 2009; Tarique and Schuler, 2010. In addition we have select additional papers published in high impact journals seen in ABI/Inform, Science Direct, SCOPUS, and EBSCO (Business Source Complete, through the keywords "Gestion del talento", "Plan de Gestion del Talento" and "Modelo de Gestion de Talento" and its English equivalent "Talent Management ", "Talent Management Plans/Systems" and "Talent Management Framework/Model ".Findings: From this review, we extracted the existence of different ways of understanding and talent management apply in organizations and even different understandings of what is talent itself. For this, we describe the basic dimensions of talent management (people and key positions and four alternative

  10. Network-Embedded Management and Applications Understanding Programmable Networking Infrastructure

    Wolter, Ralf

    2013-01-01

    Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged. At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers. Now, however, the traditional framework is being increasingly challenged by new methods that are jostling for a position in the next-generation Internet. The concept of a network that is becoming more programmable is one of the aspects that are taking center stage. This opens new possibilities to embed software applications inside the network itself and to manage networks and communications services with unprecedented ease and efficiency. In this edited volume, distinguished experts take the reader on a tour of different facets of programmable network infrastructure and application exploit it. Presenting the state of the art in network embedded management and applications and programmable network infrastructure, the book c...

  11. Healthcare public key infrastructure (HPKI) and non-profit organization (NPO): essentials for healthcare data exchange.

    Takeda, Hiroshi; Matsumura, Yasushi; Nakagawa, Katsuhiko; Teratani, Tadamasa; Qiyan, Zhang; Kusuoka, Hideo; Matsuoka, Masami

    2004-01-01

    To share healthcare information and to promote cooperation among healthcare providers and customers (patients) under computerized network environment, a non-profit organization (NPO), named as OCHIS, was established at Osaka, Japan in 2003. Since security and confidentiality issues on the Internet have been major concerns in the OCHIS, the system has been based on healthcare public key infrastructure (HPKI), and found that there remained problems to be solved technically and operationally. An experimental study was conducted to elucidate the central and the local function in terms of a registration authority and a time stamp authority by contracting with the Ministry of Economics and Trading Industries in 2003. This paper describes the experimental design with NPO and the results of the study concerning message security and HPKI. The developed system has been operated practically in Osaka urban area.

  12. The financial and structural capabilities of key infrastructure sectors in Serbia

    Malinić Dejan

    2012-01-01

    Full Text Available Experts and economic policy creators debate various economic growth rates without a direct insight into the capabilities of the different economic sectors motivated us to devote this paper to the research of key infrastructure sector capabilities, both in terms of the economic prosperity of the Serbian national economy and as a support for the development of other sectors. This paper examines the energy, transportation, and telecommunications sectors’ exposure to short-term and long-term risks, and assesses their financial strength, investment possibilities, and long-term profitability. We believe that the following results will be a valuable information input for making better strategic decisions and more expedient planning of economic sustainable growth.

  13. Infrastructure support for the Waste Management Institute. Progress report

    1995-01-01

    North Carolina A ampersand T State University is in the process of developing an infrastructure for an interdisciplinary Waste Management Institute (WMI). The Interdisciplinary Waste Management Institute (WMI) was approved in June 1994 by the General Administration of the University of North Carolina as an academic support unit with research and public service functions. The mission of the WMI is to enhance awareness and understanding of waste management issues and to provide instructional support including research and outreach. The goals of WMI are as follows: increase the number of minority professionals who will work in waste management fields; develop cooperative and exchange programs involving faculty, students, government, and industry; serve as institutional sponsor of public awareness workshops and lecture series; and support interdisciplinary research programs. Accomplishments for this reporting period are presented for WMI enrollment; waste management and certificate program; waste management instructional projects; undergraduate scholarship/stipend and faculty student development projects; research; and community relations

  14. INFRASTRUCTURE

    A. Gaddi

    2012-01-01

    The CMS Infrastructures teams are constantly ensuring the smooth operation of the different services during this critical period when the detector is taking data at full speed. A single failure would spoil hours of high luminosity beam and everything is put in place to avoid such an eventuality. In the meantime however, the fast approaching LS1 requires that we take a look at the various activities to take place from the end of the year onwards. The list of infrastructures consolidation and upgrade tasks is already long and will touch all the services (cooling, gas, inertion, powering, etc.). The definitive list will be available just before the LS1 start. One activity performed by the CMS cooling team that is worth mentioning is the maintenance of the cooling circuits at the CMS Electronics Integration Centre (EIC) at building 904. The old chiller has been replaced by a three-units cooling plant that also serves the HVAC system for the new CSC and RPC factories. The commissioning of this new plant has tak...

  15. INFRASTRUCTURE

    Andrea Gaddi

    2010-01-01

    In addition to the intense campaign of replacement of the leaky bushing on the Endcap circuits, other important activities have also been completed, with the aim of enhancing the overall reliability of the cooling infrastructures at CMS. Remaining with the Endcap circuit, the regulating valve that supplies cold water to the primary side of the circuit heat-exchanger, is not well adapted in flow capability and a new part has been ordered, to be installed during a stop of LHC. The instrumentation monitoring of the refilling rate of the circuits has been enhanced and we can now detect leaks as small as 0.5 cc/sec, on circuits that have nominal flow rates of some 20 litres/sec. Another activity starting now that the technical stop is over is the collection of spare parts that are difficult to find on the market. These will be stored at P5 with the aim of reducing down-time in case of component failure. Concerning the ventilation infrastructures, it has been noticed that in winter time the relative humidity leve...

  16. Key personality traits of sales managers.

    Lounsbury, John W; Foster, Nancy A; Levy, Jacob J; Gibson, Lucy W

    2014-01-01

    Sales managers are crucial for producing positive sales outcomes for companies. However, there has been a relative dearth of scholarly investigations into the personal attributes of sales managers. Such information could prove important in the recruitment, selection, training needs identification, career planning, counseling, and development of sales managers. Drawing on Holland's vocational theory, we sought to identify key personality traits that distinguish sales managers from other occupations and are related to their career satisfaction. The main sample was comprised of a total of 978 sales managers employed in a large number of companies across the United States (along with a comparison sample drawn from 79,512 individuals from other professional occupations). Participants completed an online version of Resource Associates' Personal Style Inventory as well a measure of career satisfaction. Our sample of 978 sales managers had higher levels of Assertiveness, Customer Service Orientation, Extraversion, Image Management, Optimism, and Visionary Style; and lower levels of Conscientiousness, Agreeableness, Intrinsic Motivation, Openness, and Tough-Mindedness than a sample of 79,512 individuals in a variety of other occupations. Nine of these traits were significantly correlated with sales managers' career satisfaction. Based on the results, a psychological profile of sales managers was presented as were implications for their recruitment, selection, training, development, and mentoring.

  17. Infrastructure and clinical practice for the detection and management of trauma-associated haemorrhage and coagulopathy

    Driessen, A.; Schäfer, N.; Albrecht, V.; Schenk, M.; Fröhlich, M.; Stürmer, E. K.; Maegele, M.; Johansson, Pär; Ostrowski, Sisse Rye; Tuovinen, Hannele; Stensballe, Jakob; Goslings, Johann Carel; Juffermans, Nicole; Balvers, Kirsten; Gaarder, Christine; Brohi, Karim; Eaglestone, Simon; Rourke, Claire; Campbell, Helen; Curry, Nicola; Stanworth, Simon; Maegele, Marc; Stürmer, Ewa K.; Schäfer, Nadine; Driessen, Arne; Orr, Adrian; Schubert, Axel

    2015-01-01

    Early detection and management of post-traumatic haemorrhage and coagulopathy have been associated with improved outcomes, but local infrastructures, logistics and clinical strategies may differ. To assess local differences in infrastructure, logistics and clinical management of trauma-associated

  18. Data management and global change research: Technology and infrastructure

    Morrissey, W.A.

    1993-01-01

    There is a consensus among many scientists who would perform global change research that global-scale scientific data management programs and enabling policies need to be developed and implemented concomitantly with, if not in advance of, global change research programs. They are hopeful that US Federal government policies for scientific and technical data and information management will provide timely archival, analysis, and dissemination of global change research data and will enable them to share that data with colleagues, internationally. Federal data managers believe that data management technology and infrastructure requirements for global change research programs can be met through existing or planned enhancements to systems in operation used for scientific data gathering, processing, and dissemination. Scientists are concerned, however, that because of the scope and diversity of global change research programs entirely new systems and approaches to data management may need to be devised

  19. E-Infrastructure and Data Management for Global Change Research

    Allison, M. L.; Gurney, R. J.; Cesar, R.; Cossu, R.; Gemeinholzer, B.; Koike, T.; Mokrane, M.; Peters, D.; Nativi, S.; Samors, R.; Treloar, A.; Vilotte, J. P.; Visbeck, M.; Waldmann, H. C.

    2014-12-01

    The Belmont Forum, a coalition of science funding agencies from 15 countries, is supporting an 18-month effort to assess the state of international of e-infrastructures and data management so that global change data and information can be more easily and efficiently exchanged internationally and across domains. Ultimately, this project aims to address the Belmont "Challenge" to deliver knowledge needed for action to avoid and adapt to detrimental environmental change, including extreme hazardous events. This effort emerged from conclusions by the Belmont Forum that transformative approaches and innovative technologies are needed for heterogeneous data/information to be integrated and made interoperable for researchers in disparate fields, and for myriad uses across international, institutional, disciplinary, spatial and temporal boundaries. The project will deliver a Community Strategy and Implementation Plan to prioritize international funding opportunities and long-term policy recommendations on how the Belmont Forum can implement a more coordinated, holistic, and sustainable approach to funding and supporting global change research. The Plan is expected to serve as the foundation of future Belmont Forum funding calls for proposals in support of research science goals as well as to establish long term e-infrastructure. More than 120 scientists, technologists, legal experts, social scientists, and other experts are participating in six Work Packages to develop the Plan by spring, 2015, under the broad rubrics of Architecture/Interoperability and Governance: Data Integration for Multidisciplinary Research; Improved Interface between Computation & Data Infrastructures; Harmonization of Global Data Infrastructure; Data Sharing; Open Data; and Capacity Building. Recommendations could lead to a more coordinated approach to policies, procedures and funding mechanisms to support e-infrastructures in a more sustainable way.

  20. SARS: Key factors in crisis management.

    Tseng, Hsin-Chao; Chen, Thai-Form; Chou, Shieu-Ming

    2005-03-01

    This study was conducted at a single hospital selected in Taipei during the SARS (Severe Acute Respiratory Syndrome) outbreak from March to July, 2003 in Taiwan. During this period of time, 104 SARS patients were admitted to the hospital. There were no negative reports related to the selected hospital despite its being located right in the center of an area struck by the epidemic. The purpose of this study was to identify the key factors enabling the hospital to survive SARS unscathed. Data were collected from in-depth interviews with the nursing directors and nursing managers of the SARS units, along with a review of relevant hospital documents. The five key elements identified as survival factors during this SARS crisis are as follows: 1. good control of timing for crisis management, 2. careful decision-making, 3. thorough implementation, 4. effective communication, and 5. trust between management and employees. The results of this study reconfirmed the selected hospital as a model for good crisis management during the SARS epidemic.

  1. Key policy choices in groundwater quality management

    Batie, S.S.; Diebel, P.L.

    1990-01-01

    The fundamental policy choice of who has the right to do what to whom is a pivotal issue of governance. Over the last few decades, the answer to that question has become more restrictive to those who own and use natural resources as inputs into production processes. Increasingly, the beneficiaries of new policy initiatives are those who desire higher protection of groundwater quality. With respect to groundwater management, policy design increasingly reflects such diverse interests as agriculturists, industrialists, homeowners, local government officials and state officials. Policy design is becoming complex, in part because of this diversity and in part because scientific uncertainty hampers informed policy design. No umbrella federal legislation exists for managing groundwater resources. EPA's role has been mainly an advisory one on groundwater issues. The difficulties and responsibilities of protecting groundwater thus remain with the states. For the near future, it is the states that will address key policy choices with respect to groundwater quality management issues

  2. INFRASTRUCTURE

    Andrea Gaddi

    With all the technical services running, the attention has moved toward the next shutdown that will be spent to perform those modifications needed to enhance the reliability of CMS Infrastructures. Just to give an example for the cooling circuit, a set of re-circulating bypasses will be installed into the TS/CV area to limit the pressure surge when a circuit is partially shut-off. This problem has affected especially the Endcap Muon cooling circuit in the past. Also the ventilation of the UXC55 has to be revisited, allowing the automatic switching to full extraction in case of magnet quench. (Normally 90% of the cavern air is re-circulated by the ventilation system.) Minor modifications will concern the gas distribution, while the DSS action-matrix has to be refined according to the experience gained with operating the detector for a while. On the powering side, some LV power lines have been doubled and the final schematics of the UPS coverage for the counting rooms have been released. The most relevant inte...

  3. INFRASTRUCTURE

    A. Gaddi and P. Tropea

    2013-01-01

      Most of the CMS infrastructures at P5 will go through a heavy consolidation-work period during LS1. All systems, from the cryogenic plant of the superconducting magnet to the rack powering in the USC55 counting rooms, from the cooling circuits to the gas distribution, will undergo consolidation work. As announced in the last issue of the CMS Bulletin, we present here one of the consolidation projects of LS1: the installation of a new dry-gas plant for inner detectors inertion. So far the oxygen and humidity suppression inside the CMS Tracker and Pixel volumes were assured by flushing dry nitrogen gas evaporated from a large liquid nitrogen tank. For technical reasons, the maximum flow is limited to less than 100 m3/h and the cost of refilling the tank every two weeks with liquid nitrogen is quite substantial. The new dry-gas plant will supply up to 400 m3/h of dry nitrogen (or the same flow of dry air, during shut-downs) with a comparatively minimal operation cost. It has been evaluated that the...

  4. INFRASTRUCTURE

    Andrea Gaddi

    2010-01-01

    During the last six months, the main activity on the cooling circuit has essentially been preventive maintenance. At each short machine technical stop, a water sample is extracted out of every cooling circuit to measure the induced radioactivity. Soon after, a visual check of the whole detector cooling network is done, looking for water leaks in sensitive locations. Depending on sub-system availability, the main water filters are replaced; the old ones are inspected and sent to the CERN metallurgical lab in case of suspicious sediments. For the coming winter technical stop, a number of corrective maintenance activities and infrastructure consolidation work-packages are foreseen. A few faulty valves, found on the muon system cooling circuit, will be replaced; the cooling gauges for TOTEM and CASTOR, in the CMS Forward region, will be either changed or shielded against the magnetic stray field. The demineralizer cartridges will be replaced as well. New instrumentation will also be installed in the SCX5 PC farm ...

  5. INFRASTRUCTURE

    Andrea Gaddi.

    The various water-cooling circuits ran smoothly over the summer. The overall performance of the cooling system is satisfactory, even if some improvements are possible, concerning the endcap water-cooling and the C6F14 circuits. In particular for the endcap cooling circuit, we aim to lower the water temperature, to provide more margin for RPC detectors. An expert-on-call piquet has been established during the summer global run, assuring the continuous supervision of the installations. An effort has been made to collect and harmonize the existing documentation on the cooling infrastructures at P5. The last six months have seen minor modifications to the electrical power network at P5. Among these, the racks in USC55 for the Tracker and Sniffer systems, which are backed up by the diesel generator in case of power outage, have been equipped with new control boxes to allow a remote restart. Other interventions have concerned the supply of assured power to those installations that are essential for CMS to run eff...

  6. INFRASTRUCTURE

    A. Gaddi

    The long winter shut-down allows for modifications that will improve the reliability of the detector infrastructures at P5. The annual maintenance of detector services is taking place as well. This means a full stop of water-cooling circuits from November 24th with a gradual restart from mid January 09. The annual maintenance service includes the cleaning of the two SF5 cooling towers, service of the chiller plants on the surface, and the cryogenic plant serving the CMS Magnet. In addition, the overall site power is reduced from 8MW to 2MW, compatible with the switchover to the Swiss power network in winter. Full power will be available again from end of January. Among the modification works planned, the Low Voltage cabinets are being refurbished; doubling the cable sections and replacing the 40A circuit breakers with 60A types. This will reduce the overheating that has been experienced. Moreover, two new LV transformers will be bought and pre-cabled in order to assure a quick swap in case of failure of any...

  7. INFRASTRUCTURE

    A. Gaddi

    2011-01-01

    During the last winter technical stop, a number of corrective maintenance activities and infrastructure consolidation work-packages were completed. On the surface, the site cooling facility has passed the annual maintenance process that includes the cleaning of the two evaporative cooling towers, the maintenance of the chiller units and the safety checks on the software controls. In parallel, CMS teams, reinforced by PH-DT group personnel, have worked to shield the cooling gauges for TOTEM and CASTOR against the magnetic stray field in the CMS Forward region, to add labels to almost all the valves underground and to clean all the filters in UXC55, USC55 and SCX5. Following the insertion of TOTEM T1 detector, the cooling circuit has been branched off and commissioned. The demineraliser cartridges have been replaced as well, as they were shown to be almost saturated. New instrumentation has been installed in the SCX5 PC farm cooling and ventilation network, in order to monitor the performance of the HVAC system...

  8. Ancestors protocol for scalable key management

    Dieter Gollmann

    2010-06-01

    Full Text Available Group key management is an important functional building block for secure multicast architecture. Thereby, it has been extensively studied in the literature. The main proposed protocol is Adaptive Clustering for Scalable Group Key Management (ASGK. According to ASGK protocol, the multicast group is divided into clusters, where each cluster consists of areas of members. Each cluster uses its own Traffic Encryption Key (TEK. These clusters are updated periodically depending on the dynamism of the members during the secure session. The modified protocol has been proposed based on ASGK with some modifications to balance the number of affected members and the encryption/decryption overhead with any number of the areas when a member joins or leaves the group. This modified protocol is called Ancestors protocol. According to Ancestors protocol, every area receives the dynamism of the members from its parents. The main objective of the modified protocol is to reduce the number of affected members during the leaving and joining members, then 1 affects n overhead would be reduced. A comparative study has been done between ASGK protocol and the modified protocol. According to the comparative results, it found that the modified protocol is always outperforming the ASGK protocol.

  9. Key Management in Wireless Sensor Networks

    Ismail Mansour

    2015-09-01

    Full Text Available Wireless sensor networks are a challenging field of research when it comes to security issues. Using low cost sensor nodes with limited resources makes it difficult for cryptographic algorithms to function without impacting energy consumption and latency. In this paper, we focus on key management issues in multi-hop wireless sensor networks. These networks are easy to attack due to the open nature of the wireless medium. Intruders could try to penetrate the network, capture nodes or take control over particular nodes. In this context, it is important to revoke and renew keys that might be learned by malicious nodes. We propose several secure protocols for key revocation and key renewal based on symmetric encryption and elliptic curve cryptography. All protocols are secure, but have different security levels. Each proposed protocol is formally proven and analyzed using Scyther, an automatic verification tool for cryptographic protocols. For efficiency comparison sake, we implemented all protocols on real testbeds using TelosB motes and discussed their performances.

  10. A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture

    Oliver Hanka

    2011-02-01

    Full Text Available In this article, a security extension for the HiiMap Next Generation Internet Architecture is presented. We regard a public key infrastructure which is integrated into the mapping infrastructure of the locator/identifier-split addressing scheme. The security approach is based on Threshold Cryptography which enables a sharing of keys among the mapping servers. Hence, a more trustworthy and fair approach for a Next Generation Internet Architecture as compared to the state of the art approach is fostered. Additionally, we give an evaluation based on IETF AAA recommendations for security-related systems.

  11. Knowledge Management in Accomodation: Infrastructure, Applications and Obstacles Encountered

    Emel Bahar

    2011-06-01

    Full Text Available Contemporary administrations have to manage their knowledge in an effective and systematic way so that they can maintain both their existence and their competition advantages with long term differentiated superiority. As a result of globalization, the effects of the development in information technology on all sectors can also be observed in tourism sector. In this study, the applications of accommodation establishments, their knowledge management background, and the obstacles met in practice are determined. The benefits of information technologies in enterprises involved in this study have been seen in a concrete way and the necessary infrastructure have been identified. But human capital, organizational structure and organizational culture were inadequacies about knowledge management.

  12. Tools for road infrastructure safety management in poland

    Kustra Wojciech

    2017-01-01

    Full Text Available Road safety can be improved by implementing principles of road safety infrastructure management (RIS on the network of European roads as adopted in the Directive. The document recommends that member states should use tried and tested tools for road safety management such as: road safety impact assessment (RIA, road safety audit (RSA, safety management on existing road networks including road safety ranking (RSM and road safety inspection (RSI. The objective of the methods is to help road authorities to take rational decisions in the area of road safety and road infrastructure safety and understand the consequences occurring in the particular phases of road life cycle. To help with assessing the impact of a road project on the safety of related roads, a method was developed for long-term forecasts of accidents and accident cost estimation as well as a risk classification to identify risks that are not acceptable risks. With regard to road safety audits and road safety inspection, a set of principles was developed to identify risks and the basic classification of mistakes and omissions.

  13. The Role of Green Infrastructure Solutions in Urban Flood Risk Management

    Soz, Salman Anees; Kryspin-Watson, Jolanta; Stanton-Geddes, Zuzana

    2016-01-01

    This Knowledge Note explores the role of green infrastructure solutions in urban flood risk management. Green infrastructure solutions represent an approach that focuses on using natural processes for managing wet weather impacts while delivering environmental, social, and economic benefits. Green infrastructure solutions, such as wetlands, bioshields, buffer zones, green roofing, street s...

  14. Information Technology: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    2007-05-01

    International Organization for Standardization/International Electrotechnical Commission ( ISO /IEC) 27000 Series, Information technology—Security...the International Organization for Standardization ( ISO )), the IT SSP bases the terms and definitions on those in the NIPP because the SSP is an annex...techniques—Information security management systems • ISO /IEC 13335, Information technology—Security tech- niques—Management of information and

  15. Risk management of infrastructure development in border area Indonesia - Malaysia

    Fitri, Suryani; Trikariastoto, Reinita, Ita

    2017-11-01

    Border area is geographically adjacent to neighboring countries with the primary function of maintaining state sovereignty and public welfare. Area in question is part of the provinces, districts or cities that directly intersect with national boundaries (or territory) and / or that have a functional relationship (linkage) and has a strategic value for the state. The border area is considered strategic because it involves the national lives of many people in terms of the interests of political, economic, social and cultural as well as defense and security (poleksosbudhankam) both located on land, sea or air. The border area is geographically adjacent to neighboring countries with the primary function of maintaining state sovereignty and public welfare. Area in question is part of the provinces, districts or cities that directly intersect with national boundaries (or territory) and / or that have a functional relationship (linkage) and has a strategic value for the state. To realize the necessary research on the development of the area, based on good practices from other countries some of the city that can meet all these challenges and at least can be applied with minor changes / adjustments. Furthermore, the application must be supported by the availability of funds. This study to discuss about any problems either obstacles or things that drive to develop function becomes an ideal border area with major support infrastructure for housing, transportation, energy availability, and distribution of clean water which will strengthen in its function which consists of five pillars, namely: central community service; trade and distribution center; financial center; tourism center; related to the field of community development. Articulation between key stakeholders such as government, private, and community is a major concern in this study, including in determining the appropriate financing schemes. The results of this study will be recommended to the government to improve

  16. Trust and Reputation Management for Critical Infrastructure Protection

    Caldeira, Filipe; Monteiro, Edmundo; Simões, Paulo

    Today's Critical Infrastructures (CI) depend of Information and Communication Technologies (ICT) to deliver their services with the required level of quality and availability. ICT security plays a major role in CI protection and risk prevention for single and also for interconnected CIs were cascading effects might occur because of the interdependencies that exist among different CIs. This paper addresses the problem of ICT security in interconnected CIs. Trust and reputation management using the Policy Based Management paradigm is the proposed solution to be applied at the CI interconnection points for information exchange. The proposed solution is being applied to the Security Mediation Gateway being developed in the European FP7 MICIE project, to allow for information exchange among interconnected CIs.

  17. Suggestion for a Framework for a Sustainable Infrastructure Asset Management Manual in Korea

    Lee, Sang-Ho; Park, Sanghoon; Kim, Jong

    2015-01-01

    This study proposes a framework for an infrastructure asset management manual containing infrastructure asset management processes and operation techniques, which can be adjusted by different ordering authorities to develop their own manuals. The following conclusions were drawn in this study. First, the justification for implementation of asset management was examined through analysis of changes and status of asset management in domestic infrastructure, and the current status and insufficien...

  18. Knowledge management - A key issue for EnBW

    Zimmer, H.J.

    2007-01-01

    power facilities. Competent and motivated employees, a good safety culture, excellent knowledge management and good organised processes create a solid foundation. This is why knowledge management has been consistently and systematically integrated in the EnBW strategy for a number of years now. Examples for the implementation of knowledge management objectives in the nuclear energy operations of EnBW: 1) Cascading of corporate goals down to the individual company and clear-cut definition and broadly-based communication of the goals on the level of the nuclear generating company to ensure that employees understand the overall context and the key challenges. 2) Far-sighted personnel planning providing for overlaps between outgoing and new incoming employees, measures to promote the willingness to learn etc. 3) Human resource management/Maintenance of personnel levels exceeding official requirements. 4) Cooperation with other German energy supply companies in the creation of a 'nuclear energy expert network' to systematically support and promote the preservation of the nuclear technology infrastructure in the research landscape 5) Implementation of a special knowledge management project in connection with the dismantling of the Obrigheim facility. 6) Implementation of an indicator-based safety management system at all nuclear power plant locations of EnBW. 7) All processes that are key to operation are standardised in the form of a workflow model and documented in an electronic database system; appointment of responsible process officer. 8) Strategic and broadly based ageing management programme. 9) EnBW's nuclear power plants regularly undergo international reviews. (author)

  19. Designing and operating infrastructure for nonstationary flood risk management

    Doss-Gollin, J.; Farnham, D. J.; Lall, U.

    2017-12-01

    Climate exhibits organized low-frequency and regime-like variability at multiple time scales, causing the risk associated with climate extremes such as floods and droughts to vary in time. Despite broad recognition of this nonstationarity, there has been little theoretical development of ideas for the design and operation of infrastructure considering the regime structure of such changes and their potential predictability. We use paleo streamflow reconstructions to illustrate an approach to the design and operation of infrastructure to address nonstationary flood and drought risk. Specifically, we consider the tradeoff between flood control and conservation storage, and develop design and operation principles for allocating these storage volumes considering both a m-year project planning period and a n-year historical sampling record. As n increases, the potential uncertainty in probabilistic estimates of the return periods associated with the T-year extreme event decreases. As the duration m of the future operation period decreases, the uncertainty associated with the occurrence of the T-year event also increases. Finally, given the quasi-periodic nature of the system it may be possible to offer probabilistic predictions of the conditions in the m-year future period, especially if m is small. In the context of such predictions, one can consider that a m-year prediction may have lower bias, but higher variance, than would be associated with using a stationary estimate from the preceding n years. This bias-variance trade-off, and the potential for considering risk management for multiple values of m, provides an interesting system design challenge. We use wavelet-based simulation models in a Bayesian framework to estimate these biases and uncertainty distributions and devise a risk-optimized decision rule for the allocation of flood and conservation storage. The associated theoretical development also provides a methodology for the sizing of storage for new

  20. Water: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    2007-05-01

    National Association of Clean Water Agencies Shelly Foston Meridian Institute Michael Gritzuk Pima County (AZ) Wastewater Management Department Genevieve...agencies to assist small and medium systems, and it has helped fund and develop a variety of Web casts and security trainings. Although drinking water...warning systems and consequence man - agement planning. • Water Laboratory Alliance (WLA). EPA will fulfill its requirement under HSPD-9 to enhance the

  1. Uniformity: The key to better inventory management

    Boshears, G.

    1993-01-01

    The objective of this paper is to show how uniformity in describing parts and materials can be the key ingredient to more effective inventory management. Although most nuclear utilities have some type of computer system for maintenance management as well as materials tracking, few have a system to provide the various users with complete information about parts and material in stock. One of the industry's most perplexing problems is How do you know, and find, the item you need to repair a particular piece of equipment or component? In many instances it is easier to order a new one from the manufacturer rather than try to find it on-site, which can result in inaccurate usage records, over-stocking, frustration, and strain on cash flow. What is needed is a higher degree of uniformity within a station, and a utility, of catalog descriptions for parts and material that will satisfy all users-planners, craftsmen, warehouse personnel, and buyers. The results of attaining this uniformity are improved performance through searchability, duplicate stock avoidance, interchangeability, substitutability, and more accurate bills of material; economic benefits will also be noted

  2. Requirements for a systems-based research and development management process in transport infrastructure engineering

    Rust, Frederik Christoffel

    2015-05-01

    Full Text Available The management of research and development (R&D in the transport infrastructure field is complex due to the multidisciplinary nature of the work. The literature shows that linear R&D models that progress from idea through to consumer product are not suitable for the management of such multi-disciplinary projects. This study focuses on determining the key characteristics required for a systems-based approach to the management of R&D projects. The information and data was compiled from literature reviews, interviews, and an e-mail survey with responses from 42 significant international R&D programmes. The findings confirmed the need for a systems-based approach to R&D management. The study formulated twelve principles or tenets for a new, systems-based approach.

  3. Managing IT infrastructure standardisation in the networked manufacturing firm

    Akkermans, H.A.; Horst, van der H.

    2002-01-01

    This paper discusses managerial aspects of information technology (IT) infrastructure standardisation in networked manufacturing firms. It shows that in these firms, where local initiative is very important and strict central hierarchical control is lacking, standardisation of IT infrastructure is

  4. Public private partnerships - risk management in engineering infrastructure projects

    2012-01-01

    M.Phil. Economic growth and the provision of adequate infrastructure are highly interrelated. Infrastructure- plays a critical role in promoting economic growth through enhancing productivity, improving competitiveness, reducing poverty, linking people and organisations together through telecommunications and contributing to environmental sustainability. Population growth and rapid urbanisation have placed enormous pressure on existing infrastructure, thus presenting a daunting challenge t...

  5. Cluman: Advanced cluster management for the large-scale infrastructures

    Babik, Marian; Fedorko, Ivan; Rodrigues, David

    2011-01-01

    The recent uptake of multi-core computing has produced a rapid growth of virtualisation and cloud computing services. With the increased use of the many-core processors this trend will likely accelerate and computing centres will be faced with the management of the tens of thousands of the virtual machines. Furthermore, these machines will likely be geographically distributed and need to be allocated on demand. In order to cope with such complexity we have designed and developed an advanced cluster management system that can execute administrative tasks targeting thousands of machines as well as provide an interactive high-density visualisation of the fabrics. The job management subsystem can perform complex tasks while following their progress and output and report aggregated information back to the system administrators. The visualisation subsystem can display tree maps of the infrastructure elements with data and monitoring information, thus providing a very detailed overview of the large clusters at a glance. The initial experience with development and testing of the system will be presented as well as an evaluation of its performance.

  6. Outreach: Key to Sustainable Nuclear Knowledge Management

    Segovia, V.

    2016-01-01

    Full text: With the numerous nuclear power plants being built globally and the prospects for many more, the challenge of the timely availability of a well-prepared, qualified, knowledgeable workforce is a key element in the “critical path” to commissioning these plants. All of these individuals will need quality education and training that is rooted in safety and established in experience. In addition, because many of these new plants are typically being built in developing countries, education, training, recruiting and retaining operations staff can be a significant challenge. Attracting sources of qualified employees for these nuclear power plants in local communities is paramount which implies a strong focus on the science and math education outreach programmes at all levels. This paper will highlight the Nuclear Power Institute’s integration of human resource development outreach strategies, education and training systems, and international cooperation to demonstrate how working in particular with the education sector can not only create interest in future careers in nuclear technology and capture valuable knowledge, but can also build community based support for nuclear power programmes with an emphasis of developing competent workers through education and training, mentoring and apprenticeships. Outreach has also become an important element of all nuclear knowledge management endeavours. (author

  7. 77 FR 37060 - Critical Infrastructure and Key Resources (CIKR) Asset Protection Technical Assistance Program...

    2012-06-20

    .../IP/IICD, 245 Murray Lane SW., Mailstop 0602, Arlington, VA 20598-0602. Email requests should go to...), National Protection and Programs Directorate (NPPD), Office of Infrastructure Protection (IP... the following methods: Federal eRulemaking Portal: http://www.regulations.gov . Email: Include the...

  8. An SSH key management system: easing the pain of managing key/user/account associations

    Arkhipkin, D.; Betts, W.; Lauret, J.; Shiryaev, A.

    2008-07-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins.

  9. An SSH key management system: easing the pain of managing key/user/account associations

    Arkhipkin, D; Shiryaev, A; Betts, W; Lauret, J

    2008-01-01

    Cyber security requirements for secure access to computing facilities often call for access controls via gatekeepers and the use of two-factor authentication. Using SSH keys to satisfy the two factor authentication requirement has introduced a potentially challenging task of managing the keys and their associations with individual users and user accounts. Approaches for a facility with the simple model of one remote user corresponding to one local user would not work at facilities that require a many-to-many mapping between users and accounts on multiple systems. We will present an SSH key management system we developed, tested and deployed to address the many-to-many dilemma in the environment of the STAR experiment. We will explain its use in an online computing context and explain how it makes possible the management and tracing of group account access spread over many sub-system components (data acquisition, slow controls, trigger, detector instrumentation, etc.) without the use of shared passwords for remote logins

  10. Perceptions of food risk management among key stakeholders

    van Kleef, Ellen; Frewer, Lynn J.; Chryssochoidis, George M.

    2006-01-01

    In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management.......In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management....

  11. Water management as a key component of integrated weed management

    Antonio Berti

    2010-09-01

    Full Text Available Water management within the cropping system is a key factor for an integrated weed management. Soil moisture affects seed persistence and seed dormancy, thus influencing their germination, the establishment of seedlings as well as the competition at adult stage and the number, vitality and dormancy of the new seeds produced by the weeds. The interactions among water availability and competition are very complex and still not fully understood. A research effort in this sector should the be very relevant for the development of new approaches of weed management, such as “Ecological weed management”, aiming to reduce weed density and competitiveness and, in the medium term, to prevent undesired modifications of the weed flora.

  12. Efficient Management of Certificate Revocation Lists in Smart Grid Advanced Metering Infrastructure

    Cebe, Mumin [Florida Intl Univ., Miami, FL (United States); Akkaya, Kemal [Florida Intl Univ., Miami, FL (United States)

    2017-07-19

    Advanced Metering Infrastructure (AMI) forms a communication network for the collection of power data from smart meters in Smart Grid. As the communication within an AMI needs to be secure, key management becomes an issue due to overhead and limited resources. While using public-keys eliminate some of the overhead of key management, there is still challenges regarding certificates that store and certify the publickeys. In particular, distribution and storage of certificate revocation list (CRL) is major a challenge due to cost of distribution and storage in AMI networks which typically consist of wireless multi-hop networks. Motivated by the need of keeping the CRL distribution and storage cost effective and scalable, in this paper, we present a distributed CRL management model utilizing the idea of distributed hash trees (DHTs) from peer-to-peer (P2P) networks. The basic idea is to share the burden of storage of CRLs among all the smart meters by exploiting the meshing capability of the smart meters among each other. Thus, using DHTs not only reduces the space requirements for CRLs but also makes the CRL updates more convenient. We implemented this structure on ns-3 using IEEE 802.11s mesh standard as a model for AMI and demonstrated its superior performance with respect to traditional methods of CRL management through extensive simulations.

  13. The Role of Social Media in the Civic Co-Management of Urban Infrastructure Resilience

    Turpin, E.; Holderness, T.; Wickramasuriya, R.

    2014-12-01

    As cities evolve to become increasingly complex systems of people and interconnected infrastructure the impacts of extreme events and long term climatological change are significantly heightened (Walsh et al. 2011). Understanding the resilience of urban systems and the impacts of infrastructure failure is therefore key to understanding the adaptability of cities to climate change (Rosenzweig 2011). Such information is particularly critical in developing nations which are predicted to bear the brunt of climate change (Douglas et al., 2008), but often lack the resources and data required to make informed decisions regarding infrastructure and societal resilience (e.g. Paar & Rekittke 2011). We propose that mobile social media in a people-as-sensors paradigm provides a means of monitoring the response of a city to cascading infrastructure failures induced by extreme weather events. Such an approach is welcomed in developing nations where crowd-sourced data are increasingly being used as an alternative to missing or incomplete formal data sources to help solve infrastructure challenges (Holderness 2014). In this paper we present PetaJakarta.org as a case study that harnesses the power of social media to gather, sort and display information about flooding for residents of Jakarta, Indonesia in real time, recuperating the failures of infrastructure and monitoring systems through a web of social media connections. Our GeoSocial Intelligence Framework enables the capture and comprehension of significant time-critical information to support decision-making, and as a means of transparent communication, while maintaining user privacy, to enable civic co-management processes to aid city-scale climate adaptation and resilience. PetaJakarta empowers community residents to collect and disseminate situational information about flooding, via the social media network Twitter, to provide city-scale decision support for Jakarta's Emergency Management Team, and a neighbourhood

  14. Managing the risks of a large-scale infrastructure project : The case of Spoorzone Delft

    Priemus, H.

    2012-01-01

    Risk management in large-scale infrastructure projects is attracting the attention of academics and practitioners alike. After a brief summary of the theoretical background, this paper describes how the risk analysis and risk management shaped up in a current large-scale infrastructure project in

  15. Playing with Complexity. Management and organisation of large infrastructure projects

    M.J.C.M. Hertogh (Marcel); E. Westerveld (Edward)

    2010-01-01

    textabstractInternationally there is a huge desire to increase mobility by constructing new infrastructure. The European Union has an investment program of approximately € 600 billion up to 2020. At the same time we notice that while ambitions are high, the requirements put on new infrastructure

  16. Research of user key management mechanisms in the cloud

    Іван Федорович Аулов

    2016-06-01

    Full Text Available The results of comparison and recommendations on the use of existing user key management mechanisms in the cloud environment are given. New generation and installing mechanism of a private key pair between the N-means of key management in the cloud by using a modified Diffie-Hellman protocol is proposed

  17. Perspectives on the use of green infrastructure for stormwater management in Cleveland and Milwaukee.

    Keeley, Melissa; Koburger, Althea; Dolowitz, David P; Medearis, Dale; Nickel, Darla; Shuster, William

    2013-06-01

    Green infrastructure is a general term referring to the management of landscapes in ways that generate human and ecosystem benefits. Many municipalities have begun to utilize green infrastructure in efforts to meet stormwater management goals. This study examines challenges to integrating gray and green infrastructure for stormwater management, informed by interviews with practitioners in Cleveland, OH and Milwaukee WI. Green infrastructure in these cities is utilized under conditions of extreme fiscal austerity and its use presents opportunities to connect stormwater management with urban revitalization and economic recovery while planning for the effects of negative- or zero-population growth. In this context, specific challenges in capturing the multiple benefits of green infrastructure exist because the projects required to meet federally mandated stormwater management targets and the needs of urban redevelopment frequently differ in scale and location.

  18. A Key Management Method for Cryptographically Enforced Access Control

    Zych, Anna; Petkovic, Milan; Jonker, Willem; Fernández-Medina, Eduardo; Yagüe, Mariemma I.

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  19. Efficient key management for cryptographically enforced access control

    Zych, Anna; Petkovic, Milan; Jonker, Willem

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  20. Blockchain-Based Dynamic Key Management for Heterogeneous Intelligent Transportation Systems

    Lei, Ao; Cruickshank, Haitham; Cao, Y; Asuquo, Philip; Anyigor Ogah, Chibueze Pascal; Sun, Zhili

    2017-01-01

    As modern vehicle and communication technologies advanced apace, people begin to believe that Intelligent Transportation System (ITS) would be achievable in one decade.\\ud ITS introduces information technology to the transportation infrastructures and aims to improve road safety and traffic efficiency. However, security is still a main concern in Vehicular Communication Systems (VCS). This can be addressed through secured group broadcast. Therefore, secure key management schemes are considere...

  1. Determinants of Key Account Management Effectiveness: The Case ...

    Dires Abebe Fenta

    maintaining enhanced relationships with strategic business customers named as. 'key accounts'. ... Key account management is one mechanism of treating strategic ..... Considering this report, correlation statistics was undergone to check the.

  2. Nonverbal Cues: The Key to Classroom Management.

    Petrie, Garth; Lindauer, Patricia; Bennett, Brenda; Gibson, Sherri

    1998-01-01

    Principals should familiarize teachers with the benefits of nonverbal procedures for classroom management and discipline enforcement. A behavior-management checklist of nonverbal techniques (eye contact, touching, smiling, and frowning) can be used in a series of short visits. At least 75% of control techniques should be nonverbal. Relying on…

  3. Key Intersections between HRD and Management

    Egan, Toby M.

    2011-01-01

    This article is in part inspired by an HRD director's insight that his HRD staff should view themselves as HRD Family Doctors, suggesting that a doctor-patient relationship was similar in many respects to the HRD-manager consulting relationship. Although that is possible in some organizations, the author's interviews with corporate managers and…

  4. Real-time flood inundation forecasting and mapping for key railway infrastructure: a UK case study

    Murphy Alexandra T.

    2016-01-01

    Full Text Available Flooding events that impede railway infrastructure can cause severe travel delays for the general public and large fines in delayed minutes for the rail industry. Early warnings of flood inundation can give more time to implement mitigation measures which help reduce cancellations, delays and fines. Initial work is reported on the development of a real-time flood inundation forecasting and mapping system for the Cowley Bridge track area near Exeter, UK. This location is on one of the main access routes to South West England and has suffered major floods in the past resulting in significant transport impacts. Flood forecasting systems in the UK mainly forecast river level/flow rather than extent and depth of flood inundation. Here, the development of a chain of coupled models is discussed that link rainfall to river flow, river level and flood extent for the rail track area relating to Cowley Bridge. Historical events are identified to test model performance in predicting inundation of railway infrastructure. The modelling system will operate alongside a series of in-situ sensors chosen to enhance the flood mapping forecasting system. Sensor data will support offline model calibration/verification and real-time data assimilation as well as monitoring flood conditions to inform track closure decisions.

  5. Risk-based asset management methodology for highway infrastructure systems.

    2004-01-01

    Maintaining the infrastructure of roads, highways, and bridges is paramount to ensuring that these assets will remain safe and reliable in the future. If maintenance costs remain the same or continue to escalate, and additional funding is not made av...

  6. Effecting IT infrastructure culture change: management by processes and metrics

    Miller, R. L.

    2001-01-01

    This talk describes the processes and metrics used by Jet Propulsion Laboratory to bring about the required IT infrastructure culture change to update and certify, as Y2K compliant, thousands of computers and millions of lines of code.

  7. Risk and Reliability of Infrastructure Asset Management Workshop

    2006-01-01

    A workshop was held August 15-18 in Alexandria, Virginia to begin the dialog on the methodologies available and the status of how the US Army Corps of Engineers assesses its Civil Works infrastructure...

  8. Center for Reinventing Aging Infrastructure for Nutrient Management

    Federal Laboratory Consortium — The mission of RAINmgt is to achieve sustainable and cost-effective health and environmental outcomes by re-imagining aging coastal urban infrastructure communities....

  9. Socialization as key process in knowledge management

    Francisco José GARCÍA-PEÑALVO

    2016-07-01

    Full Text Available The editorial of this second issue of volume 17,corresponding to 2016, is devoted to socialization process in the knowledge management in order to complement the special section about Social Networks and Education.

  10. Laboratory infrastructure driven key performance indicator development using the smart grid architecture model

    Syed, Mazheruddin H.; Guillo-Sansano, Efren; Blair, Steven M.

    2017-01-01

    This study presents a methodology for collaboratively designing laboratory experiments and developing key performance indicators for the testing and validation of novel power system control architectures in multiple laboratory environments. The contribution makes use of the smart grid architecture...

  11. MASY: Management of secret keys in federated wireless sensor networks

    Maerien, Jef; Michiels, Sam; Huygens, Christophe; Joosen, Wouter

    2010-01-01

    Wireless Sensor Networks are becoming federated and mobile environments. These new capabilities pose a lot of new possibilities and challenges. One of these challenges is to create a secure environment to allow multiple trusted companies to share and merge their sensor network infrastructure. The most basic need for a secure environment is the deployment of key material. However, most current day research assumes pre-shared secrets between the sensor nodes of most, if not all, companies in a ...

  12. Environmental conflicts: Key issues and management implications ...

    Environmental crises and problems throughout the world are widespread and increasing rapidly. In relation to these concerns, the article discusses the following aspects: people and the environment, environmental conflicts, climate change and environmental conflicts, and management implications. The section on people ...

  13. Key Management Strategies for Safeguards Authentication and Encryption

    Coram, M.; Hymel, R.; McDaniel, M.; Brotz, J.

    2015-01-01

    Management of cryptographic keys for the authentication and encryption of safeguards data can be the critical weak link in the practical implementation of information security. Within the safeguards community, there is the need to validate that data has not been modified at any point since generation and that it was generated by the monitoring node and not an imposter. In addition, there is the need for that data to be transmitted securely between the monitoring node and the monitoring party such that it cannot be intercepted and read while in transit. Encryption and digital signatures support the required confidentiality and authenticity but challenges exist in managing the cryptographic keys they require. Technologies developed at Sandia National Laboratories have evolved in their use of an associated key management strategy. The first generation system utilized a shared secret key for digital signatures. While fast and efficient, it required that a list of keys be maintained and protected. If control of the key was lost, fraudulent data could be made to look authentic. The second generation changed to support public key / private key cryptography. The key pair is generated by the system, the public key shared, and the private key held internally. This approach eliminated the need to maintain the list of keys. It also allows the public key to be provided to anyone needing to authenticate the data without allowing them to spoof data. A third generation system, currently under development, improves upon the public key / private key approach to address a potential man-in-the-middle attack related to the sharing of the public key. In a planned fourth generation system, secure key exchange protocols will distribute session keys for encryption, eliminating another fixed set of keys utilized by the technology and allowing for periodic renegotiation of keys for enhanced security. (author)

  14. The Influence of Infrastructure Management on Sports Development at State Polytechnics in Bandung

    Dede Sujana

    2018-03-01

    Full Text Available Polytechnic as a higher educational institution trains students to be capable of becoming independent human. It is also responsible for equipping students with competence to compete in the workplace. Sport serves as a means of character and life skills development in students. It is well supported by the infrastructure management in Polytechnic.  Based on the formulation of the problem mentioned above, the general purpose of this study is to determine the effect of infrastructure management on sports development in the State Polytechnic of Bandung. This study employed quantitative approach with survey method to obtain data from questionnaires and physical fitness test. The participants of the study are 77 students from two state polytechnics in Bandung. The result from data processing and analysis showed that 95.7% of sports participation rate is influenced by infrastructure management and the rest of 4.35 is influenced by other unexplainable variables, which means that facility and infrastructure management give positive influence on sports participation.   In addition, other results showed that 93.0% of physical fitness figures are influenced by infrastructure management and 7.0% is influenced by other unexplainable variable, which means that infrastructure gives significant influence on physical fitness. It shows that if sports infrastructure is managed well, then it will greatly influence sports development.

  15. Careful assessment key in managing prostatitis.

    Gujadhur, Rahul; Aning, Jonathan

    2015-04-01

    Prostatitis is a common condition estimated to affect up to 30% of men in their lifetime, it is most prevalent in men aged between 35 and 50. Prostatitis is subclassified into: acute bacterial prostatitis, chronic bacterial prostatitis, chronic pelvic pain and asymptomatic inflammatory prostatitis. Acute bacterial prostatitis presents with acute onset pelvic pain which may or may not be related to voiding, lower urinary tract symptoms, sometimes haematuria or haematospermia and systemic symptoms such as fever and rigors. A documented history of recurrent urinary tract infections is the key feature of chronic bacterial prostatitis. Duration of symptoms > 3 months defines chronicity. The key symptom of chronic pelvic pain syndrome is pain. Patients may describe pain during or after ejaculation as their predominant symptom. Clinical assessment includes a thorough history and examination. A digital rectal examination should be performed after a midstream urine (MSU) sample has been collected for urine dipstick, microscopy and culture. The prostate should be checked for nodules. In acute bacterial prostatitis the MSU is the only laboratory investigation required. Chronic pelvic pain syndrome may be multifactorial and part of a more generalised pain disorder. Pelvic floor muscle abnormalities, altered neuroendocrine pathways, chemically induced inflammation, bacterial infection, autoimmune processes, dysfunctional voiding as well intraprostatic ductal reflux mechanisms have all been identified in men with chronic pelvic pain syndrome.

  16. The Kiel data management infrastructure - arising from a generic data model

    Fleischer, D.; Mehrtens, H.; Schirnick, C.; Springer, P.

    2010-12-01

    The Kiel Data Management Infrastructure (KDMI) started from a cooperation of three large-scale projects (SFB574, SFB754 and Cluster of Excellence The Future Ocean) and the Leibniz Institute of Marine Sciences (IFM-GEOMAR). The common strategy for project data management is a single person collecting and transforming data according to the requirements of the targeted data center(s). The intention of the KDMI cooperation is to avoid redundant and potentially incompatible data management efforts for scientists and data managers and to create a single sustainable infrastructure. An increased level of complexity in the conceptual planing arose from the diversity of marine disciplines and approximately 1000 scientists involved. KDMI key features focus on the data provenance which we consider to comprise the entire workflow from field sampling thru labwork to data calculation and evaluation. Managing the data of each individual project participant in this way yields the data management for the entire project and warrants the reusability of (meta)data. Accordingly scientists provide a workflow definition of their data creation procedures resulting in their target variables. The central idea in the development of the KDMI presented here is based on the object oriented programming concept which allows to have one object definition (workflow) and infinite numbers of object instances (data). Each definition is created by a graphical user interface and produces XML output stored in a database using a generic data model. On creation of a data instance the KDMI translates the definition into web forms for the scientist, the generic data model then accepts all information input following the given data provenance definition. An important aspect of the implementation phase is the possibility of a successive transition from daily measurement routines resulting in single spreadsheet files with well known points of failure and limited reuseability to a central infrastructure as a

  17. Secure Key Management in the Cloud

    Damgård, Ivan Bjerre; Jakobsen, Thomas Pelle; Nielsen, Jesper Buus

    2013-01-01

    information such as cryptographic keys. Applications like this include many cases where secure multiparty computation is outsourced to the cloud, and in particular a number of online auctions and benchmark computations with confidential inputs. We consider fully autonomous servers that switch between online......We consider applications involving a number of servers in the cloud that go through a sequence of online periods where the servers communicate, separated by offline periods where the servers are idle. During the offline periods, we assume that the servers need to securely store sensitive...... and offline periods without communicating with anyone from outside the cloud, and semi-autonomous servers that need a limited kind of assistance from outside the cloud when doing the transition. We study the levels of security one can – and cannot – obtain in this model, propose light-weight protocols...

  18. Risk management of key issues of FPSO

    Sun, Liping; Sun, Hai

    2012-12-01

    Risk analysis of key systems have become a growing topic late of because of the development of offshore structures. Equipment failures of offloading system and fire accidents were analyzed based on the floating production, storage and offloading (FPSO) features. Fault tree analysis (FTA), and failure modes and effects analysis (FMEA) methods were examined based on information already researched on modules of relex reliability studio (RRS). Equipment failures were also analyzed qualitatively by establishing a fault tree and Boolean structure function based on the shortage of failure cases, statistical data, and risk control measures examined. Failure modes of fire accident were classified according to the different areas of fire occurrences during the FMEA process, using risk priority number (RPN) methods to evaluate their severity rank. The qualitative analysis of FTA gave the basic insight of forming the failure modes of FPSO offloading, and the fire FMEA gave the priorities and suggested processes. The research has practical importance for the security analysis problems of FPSO.

  19. Managing clinical education through understanding key principles.

    Cunningham, Joanne; Wright, Caroline; Baird, Marilyn

    2015-01-01

    Traditionally, a practicum facilitated the integration of on-campus learning and practical workplace training. Over the past 3 decades, an educative practicum has evolved that promotes clinical reasoning, including analytical and evaluative abilities, through reflective practice. Anecdotal evidence indicates that the delivery of clinical education within medical radiation science entry-level programs continues to vacillate between traditional practicums and the new reflective practicums. To review the literature about clinical education within the medical radiation sciences and identify key principles for practitioners seeking to reflect upon and improve their approach to teaching and supporting students in the clinical environment. A search of 3 major journal databases, Internet searches, and hand searches of reference lists were conducted to identify literature about clinical education in the medical radiation sciences from January 1, 2000, to December 31, 2012. Twenty-two studies were included in this review. The 5 key elements associated with clinical education include the clinical support model and quality, overcoming the theory-practice gap, learning outcomes and reliable and valid assessment, preparing and supporting students, and accommodating differing teaching and learning needs. Many factors influence the quality of clinical education, including the culture of the clinical environment and clinical leadership roles. Several approaches can help students bridge the theory-practice gap, including simulators, role-playing activities, and reflective journals. In addition, clinical educators should use assessment strategies that objectively measure student progress, and they should be positive role models for their students. The successful clinical education of students in the medical radiation sciences depends upon the systems, structures, and people in the clinical environment. Clinical education is accomplished through the collaborative efforts of the

  20. Managing cumulative impacts: A key to sustainability?

    Hunsaker, C.T.

    1994-12-31

    This paper addresses how science can be more effectively used in creating policy to manage cumulative effects on ecosystems. The paper focuses on the scientific techniques that we have to identify and to assess cumulative impacts on ecosystems. The term ``sustainable development`` was brought into common use by the World Commission on Environment and Development (The Brundtland Commission) in 1987. The Brundtland Commission report highlighted the need to simultaneously address developmental and environmental imperatives simultaneously by calling for development that ``meets the needs of the present generation without compromising the needs of future generations.`` We cannot claim to be working toward sustainable development until we can quantitatively assess cumulative impacts on the environment: The two concepts are inextricibally linked in that the elusiveness of cumulative effects likely has the greatest potential of keeping us from achieving sustainability. In this paper, assessment and management frameworks relevant to cumulative impacts are discussed along with recent literature on how to improve such assessments. When possible, examples are given for marine ecosystems.

  1. Key factors of efficient organization management

    Firsankov, I. E.; Фирсанков, И. Е.

    2014-01-01

    Issues of efficiency of organization management are examined in the article. Aggressive competition between companies; what’s the difference between manager and leader; who is a leader; personal qualities of strong charismatic leaders etc. Particular attention is paid to the question of possibility to become a leader or to be born a leader. В статье рассмотрены основные черты настоящего лидера, затронута тема различия между лидером и менеджером, а также освещён вопрос о том, можно ли стать...

  2. Integration of resilience capabilities for Critical Infrastructures into the Emergency Management set-up

    Kozine, Igor; Andersen, Henning Boje

    2015-01-01

    We suggest an approach for maintaining and enhancing resilience that integrates the resilience capabilities of Critical Infrastructures (CIs) into the emergency management cycle (prevention, preparedness, response, and recovery). This allows emergency services to explicitly address resilience...

  3. Technical infrastructures workshop (Chair). Knowledge Exchange Workshop : Research data management activities and challenges

    Grim, R.

    2011-01-01

    Scientific data Infrastructures can be defined as managed digital scientific data-networked environments consisting of services and tools that support: (i) the full life cycle of scientific data (capture, collection, curation, documentation, analysis, visualization, preservation, and publication),

  4. Compendium of best practice and innovation in asset management of water services infrastructure

    Bhagwan, J

    2008-05-01

    Full Text Available As part of a water services infrastructure asset management best practice and innovation initiative of the Global Water Research Coalition (GWRC), the Water Research Commission (WRC) agreed to contribute a selection of ten South African best...

  5. Soils Investigation for Infiltration-based Green Infrastructure for Sewershed Management (Omaha NE)

    EPA Report Abstract: Infiltration-based green infrastructure and related retrofits for sewershed-level rainfall and stormwater volume capture (e.g., rain gardens, cisterns, etc.) are increasingly being recognized as management options to reduce stormwater volume contribution into...

  6. Supporting effective delivery: CSIR research on and advocacy of infrastructure management

    Wall, K

    2006-02-01

    Full Text Available sets out issues of concern that arise when infrastructure management policies and practices do not meet acceptable standards, and it describes the research results. Finally, it summarises the plan and programme necessary to support effective delivery...

  7. A simulation framework for asset management in climate-change adaptation of transportation infrastructure

    Bhamidipati, S.K.

    2014-01-01

    An asset management framework, in an agent-based model with multiple assets, is presented as a tool that can assist in developing long-term climate change adaptation strategies for transportation infrastructure.

  8. Funding research data management and related infrastructures : Knowledge Exchange and Science Europe briefing paper

    Bijsterbosch, Magchiel; Duca, Daniela; Katerbow, Matthias; Kupiainen, Irina; Dillo, Ingrid; Doorn, P.K.; Enke, Harry; de Lucas, Jesus Eugenio Marco

    2016-01-01

    Research Funding Organisations (RFO) and Research Performing Organisations (RPO) throughout Europe are well aware that science and scholarship increasingly depend on infrastructures supporting sustainable Research Data Management (RDM). In two complementary surveys, the Science Europe Working Group

  9. Modelling a critical infrastructure-driven spatial database for proactive disaster management: A developing country context

    David O. Baloye

    2016-04-01

    Full Text Available The understanding and institutionalisation of the seamless link between urban critical infrastructure and disaster management has greatly helped the developed world to establish effective disaster management processes. However, this link is conspicuously missing in developing countries, where disaster management has been more reactive than proactive. The consequence of this is typified in poor response time and uncoordinated ways in which disasters and emergency situations are handled. As is the case with many Nigerian cities, the challenges of urban development in the city of Abeokuta have limited the effectiveness of disaster and emergency first responders and managers. Using geospatial techniques, the study attempted to design and deploy a spatial database running a web-based information system to track the characteristics and distribution of critical infrastructure for effective use during disaster and emergencies, with the purpose of proactively improving disaster and emergency management processes in Abeokuta. Keywords: Disaster Management; Emergency; Critical Infrastructure; Geospatial Database; Developing Countries; Nigeria

  10. Large-Scale Data Collection Metadata Management at the National Computation Infrastructure

    Wang, J.; Evans, B. J. K.; Bastrakova, I.; Ryder, G.; Martin, J.; Duursma, D.; Gohar, K.; Mackey, T.; Paget, M.; Siddeswara, G.

    2014-12-01

    Data Collection management has become an essential activity at the National Computation Infrastructure (NCI) in Australia. NCI's partners (CSIRO, Bureau of Meteorology, Australian National University, and Geoscience Australia), supported by the Australian Government and Research Data Storage Infrastructure (RDSI), have established a national data resource that is co-located with high-performance computing. This paper addresses the metadata management of these data assets over their lifetime. NCI manages 36 data collections (10+ PB) categorised as earth system sciences, climate and weather model data assets and products, earth and marine observations and products, geosciences, terrestrial ecosystem, water management and hydrology, astronomy, social science and biosciences. The data is largely sourced from NCI partners, the custodians of many of the national scientific records, and major research community organisations. The data is made available in a HPC and data-intensive environment - a ~56000 core supercomputer, virtual labs on a 3000 core cloud system, and data services. By assembling these large national assets, new opportunities have arisen to harmonise the data collections, making a powerful cross-disciplinary resource.To support the overall management, a Data Management Plan (DMP) has been developed to record the workflows, procedures, the key contacts and responsibilities. The DMP has fields that can be exported to the ISO19115 schema and to the collection level catalogue of GeoNetwork. The subset or file level metadata catalogues are linked with the collection level through parent-child relationship definition using UUID. A number of tools have been developed that support interactive metadata management, bulk loading of data, and support for computational workflows or data pipelines. NCI creates persistent identifiers for each of the assets. The data collection is tracked over its lifetime, and the recognition of the data providers, data owners, data

  11. Cryptographic Key Management in Delay Tolerant Networks: A Survey

    Sofia Anna Menesidou

    2017-06-01

    Full Text Available Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management approaches in such a restricted and harsh environment. Towards this goal, we have grouped the surveyed key management methods into three major categories depending on whether the particular method copes with (a security initialization, (b key establishment, and (c key revocation. We have attempted to provide a concise but fairly complete evaluation of the proposed up-to-date methods in a generalized way with the aim of offering a central reference point for future research.

  12. Key Issues in the Application of Knowledge Management in Education

    Mendoza, George A

    2005-01-01

    .... This shift in paradigms has made knowledge the key resource as organizations shift their focus from natural resources to intellectual assets, heralding the use of a concept called Knowledge Management (KM...

  13. Case studies of scenario analysis for adaptive management of natural resource and infrastructure systems

    Hamilton, M.C.; Thekdi, S.A.; Jenicek, E.M.

    2013-01-01

    Management of natural resources and infrastructure systems for sustainability is complicated by uncertainties in the human and natural environment. Moreover, decisions are further complicated by contradictory views, values, and concerns that are rarely made explicit. Scenario analysis can play...... of emergent conditions and help to avoid regret and belated action. The purpose of this paper is to present several case studies in natural resources and infrastructure systems management where scenario analysis has been used to aide decision making under uncertainty. The case studies include several resource...... and infrastructure systems: (1) water resources (2) land-use corridors (3) energy infrastructure, and (4) coastal climate change adaptation. The case studies emphasize a participatory approach, where scenario analysis becomes a means of incorporating diverse stakeholder concerns and experience. This approach...

  14. Managing Risks in Electrical Infrastructure Assets from a Strategic Perspective

    Zhuang, Q.

    2015-01-01

    Should risks always be quantified before being managed? The answer is “yes” in the opinion of most asset managers in today’s electricity transmission and distribution companies, but “no” in modern theories of risk management. When the risks refer to reliability hazards of high-voltage assets, the

  15. Sustainable Drainage, Green Infrastructure or Natural Flood Management - which should you choose?

    Wingfield, Thea; Potter, Karen; Jones, Gareth; Spees, Jack; Macdonald, Neil

    2016-04-01

    River catchments as management units are more effective than administrative boundaries to integrate and coordinate efforts of organisations that utilise and manage water, soil and habitat quality. The UK government announced a pilot integrated water management initiative called, 'The Catchment Based Approach', on World Water Day 2011. After successful trials the scheme was extended to all river catchments in England during the summer of 2013. This policy has been designed to improve the collaboration, partnership and coordination of organisations involved in water and land management through locally led partnership groups. The lead organisations are all charitable bodies with significantly varying levels of experience of stormwater management; a key component of integrated water management and of great concern to communities at risk. These partnerships have implemented a number of Nature Based Solutions, but these have been presented in different ways by the different groups. In the UK there are three terms commonly used to describe Nature Based Solutions for managing the drainage of stormwater: Sustainable Drainage (SuDS), Green Infrastructure (GI) and Natural Flood Management (NFM). The definitions of each refers to the replication of natural hydrological processes in order to slow the flow of water through the landscape. But, there has been some concerns as to which of these nature based terms should be applied and why they appear to be used interchangeably. This study demonstrates that, despite the definitions of these three terms being almost identical, in practice they are not the same and should not be used interchangeably. The terms were developed by different professional groups in response to their own objectives and histories. The hydrological processes used to manage storm-water may be the same and the suggested interventions may show a degree of convergence. Yet, they operate at different scales, both geographically and organisationally. The different

  16. A Forward Authentication Key Management Scheme for Heterogeneous Sensor Networks

    Huang Jen-Yan

    2011-01-01

    Full Text Available Key encryption technology is a basic technique for protecting the secrecy of transmitted data among sensor nodes in wireless sensor networks. However, sensor nodes are inherently limited by insufficient hardware resources such as memory capacity and battery lifetime. As a result, few current key management schemes are appropriate for wireless sensor networks. This paper proposes a new key management method that uses dynamic key management schemes for heterogeneous sensor networks. The proposed scheme loads a hash function into the base station, cluster heads, and sensor nodes. The cluster heads and sensor nodes then generate their own keychains to provide forward authentication in case of key changes, security breaches, key changes due to security breaches. The cluster heads and sensor nodes establish pairwise keys to ensure transmission secrecy. The proposed scheme decreases the number of keys required for sensor nodes and cluster heads and is robust to the following attacks: guessing attacks, replay attacks, man-in-the-middle attacks, node capture attacks, and denial-of-service attacks.

  17. Optimisation of key performance measures in air cargo demand management

    Alexander May; Adrian Anslow; Udechukwu Ojiako; Yue Wu; Alasdair Marshall; Maxwell Chipulu

    2014-01-01

    This article sought to facilitate the optimisation of key performance measures utilised for demand management in air cargo operations. The focus was on the Revenue Management team at Virgin Atlantic Cargo and a fuzzy group decision-making method was used. Utilising intelligent fuzzy multi-criteria methods, the authors generated a ranking order of ten key outcome-based performance indicators for Virgin Atlantic air cargo Revenue Management. The result of this industry-driven study showed that ...

  18. Tank waste remediation system privatization infrastructure program configuration management implementation plan

    Schaus, P.S.

    1998-01-01

    This Configuration Management Implementation Plan (CMIP) was developed to assist in managing systems, structures, and components (SSCS), to facilitate the effective control and statusing of changes to SSCS, and to ensure technical consistency between design, performance, and operational requirements. Its purpose is to describe the approach Privatization Infrastructure will take in implementing a configuration management program, to identify the Program's products that need configuration management control, to determine the rigor of control, and to identify the mechanisms for that control

  19. Key aspects to perform a project on energy management

    Bachini, R.

    1993-01-01

    A general overview on elements and organisms playing a key role to launch a new industrial project is given, taking as base case an energy management project. Likewise the problematic of training personnel involved in the project is analyzed. Energy management becomes crucial in industries where energy costs represent a big portion of the whole production cost. Main aspects to be analyzed are: - Adequate production procedures to be competitive - Environment protection regarding waste management - Maximization of safety at production installations. (Author)

  20. Maintenance management of railway infrastructures based on reliability analysis

    Macchi, Marco; Garetti, Marco; Centrone, Domenico; Fumagalli, Luca; Piero Pavirani, Gian

    2012-01-01

    Railway infrastructure maintenance plays a crucial role for rail transport. It aims at guaranteeing safety of operations and availability of railway tracks and related equipment for traffic regulation. Moreover, it is one major cost for rail transport operations. Thus, the increased competition in traffic market is asking for maintenance improvement, aiming at the reduction of maintenance expenditures while keeping the safety of operations. This issue is addressed by the methodology presented in the paper. The first step of the methodology consists of a family-based approach for the equipment reliability analysis; its purpose is the identification of families of railway items which can be given the same reliability targets. The second step builds the reliability model of the railway system for identifying the most critical items, given a required service level for the transportation system. The two methods have been implemented and tested in practical case studies, in the context of Rete Ferroviaria Italiana, the Italian public limited company for railway transportation.

  1. Incorporating green infrastructure into water resources management plans to address water quality impairments

    Managers of urban watersheds with excessive nutrient loads are more frequently turning to green infrastructure (GI) to manage their water quality impairments. The effectiveness of GI is dependent on a number of factors, including (1) the type and placement of GI within the waters...

  2. Urban water infrastructure asset management - a structured approach in four water utilities.

    Cardoso, M A; Silva, M Santos; Coelho, S T; Almeida, M C; Covas, D I C

    2012-01-01

    Water services are a strategic sector of large social and economic relevance. It is therefore essential that they are managed rationally and efficiently. Advanced water supply and wastewater infrastructure asset management (IAM) is key in achieving adequate levels of service in the future, particularly with regard to reliable and high quality drinking water supply, prevention of urban flooding, efficient use of natural resources and prevention of pollution. This paper presents a methodology for supporting the development of urban water IAM, developed during the AWARE-P project as well as an appraisal of its implementation in four water utilities. Both water supply and wastewater systems were considered. Due to the different contexts and features of the utilities, the main concerns vary from case to case; some problems essentially are related to performance, others to risk. Cost is a common deciding factor. The paper describes the procedure applied, focusing on the diversity of drivers, constraints, benefits and outcomes. It also points out the main challenges and the results obtained through the implementation of a structured procedure for supporting urban water IAM.

  3. PUBLIC KEY INFRASTRUCTURE (PKI)

    Federal Laboratory Consortium — Common Access Card (CAC)Enterprise Testing Overview:Established in 2003Performs test and evaluations of the DOD PKI CAC issuance systems from an enterprise level all...

  4. Asset management maturity in public infrastructure: the case of Rijkswaterstaat

    Volker, L.; Ligtvoet, A.; van den Boomen, M.; Wessels, Peter; van der Lei, T.E.; Herder, P.M.

    2013-01-01

    In times of restructuring governmental policies and resources, the
    need for strategic asset management is growing. Maturity models offer
    organisations a structure to assist them in improving their asset management
    performance. We present the results of a repeated maturity measurement

  5. A CEO View of Key Issues in Australian Information Systems Management - 1997

    Graham Pervan

    1998-05-01

    Full Text Available As part of a research programme on key information systems management issues, a survey of Australasia's largest 500 organisations was conducted to identify which issues were perceived by their chief executive officers (CEOs as being important, problematic and critical over the next three to five years. The results reported are based on a relatively low response rate (though perhaps reasonable for the target group so should be regarded as only exploratory. The most critical issues were revealed to be a mix of technology management issues (IT infrastructure, disaster recovery, strategic management issues (BPR, competitive advantage, information architecture, people management issues (organisational learning, systems development and data management issues (effective use of the data resource, effectiveness/productivity of IS, effectiveness of software development, and their own support systems (EIS/DSS. This reflects their interest in a wide range of issues, but all with an organisation-wide focus. Non-critical issues were mostly related to the individual technologies and the place and role of IS in the organisation. While the CEOs showed some agreement with their chief information officers (CIOs on issues such as the IT infrastructure, competitive advantage, and organisational learning some distinct differences exist, particularly in relation to the quality and effectiveness of systems and processes and also how CEOs and CIOs perceive each other.

  6. Sustainable Water Infrastructure Asset Management: A Gap Analysis of Customer and Service Provider Perspectives

    Sangjong Han

    2015-09-01

    Full Text Available The ultimate goal of urban water infrastructure asset management may be sustainable water supply with satisfaction for customers. In this work, we attempted to evaluate the gaps between the perspectives of customers and service providers in Korea’s water infrastructure asset management. To evaluate the customers’ perspective, a hierarchical questionnaire survey was conducted to estimate the weights of influence for six customer values and their attributes on Korean water utility management. To evaluate the service providers’ perspective, an AHP (Analytic Hierarchy Process analysis was performed to estimate the weights of influence for the customer values and their PIs (performance indicators. The gap analysis results show that customers place higher value on customer service satisfaction (emotion and information than do the service providers (managers, whereas the managers place more value on affordability than do the customers. The findings from this work imply that improving customer service is effective in satisfying the desirable water LOS (level of service for customers. Recommendations have also been provided for administrators and engineers to develop integrated decision-making systems that can reflect customer needs regarding the improvement of their water infrastructure asset management. The findings from this work may be helpful for the Korean government and water supply utilities in improving the sustainability of their water infrastructure asset management.

  7. Linking the Scales of Scientific inquiry and Watershed Management: A Focus on Green Infrastructure

    Golden, H. E.; Hoghooghi, N.

    2017-12-01

    Urbanization modifies the hydrologic cycle, resulting in potentially deleterious downstream water quality and quantity effects. However, the cumulative interacting effects of water storage, transport, and biogeochemical processes occurring within other land cover and use types of the same watershed can render management explicitly targeted to limit the negative outcomes from urbanization ineffective. For example, evidence indicates that green infrastructure, or low impact development (LID), practices can attenuate the adverse water quality and quantity effects of urbanizing systems. However, the research providing this evidence has been conducted at local scales (e.g., plots, small homogeneous urban catchments) that isolate the measurable effects of such approaches. Hence, a distinct disconnect exists between the scale of scientific inquiry and the scale of management and decision-making practices. Here we explore the oft-discussed yet rarely directly addressed scientific and management conundrum: How do we scale our well-documented scientific knowledge of the water quantity and quality responses to LID practices measured and modeled at local scales to that of "actual" management scales? We begin by focusing on LID practices in mixed land cover watersheds. We present key concepts that have emerged from LID research at the local scale, considerations for scaling this research to watersheds, recent advances and findings in scaling the effects of LID practices on water quality and quantity at watershed scales, and the use of combined novel measurements and models for these scaling efforts. We underscore these concepts with a case study that evaluates the effects of three LID practices using simulation modeling across a mixed land cover watershed. This synthesis and case study highlight that scientists are making progress toward successfully tailoring fundamental research questions with decision-making goals in mind, yet we still have a long road ahead.

  8. Biobjective VoIP Service Management in Cloud Infrastructure

    Jorge M. Cortés-Mendoza

    2016-01-01

    Full Text Available Voice over Internet Protocol (VoIP allows communication of voice and/or data over the internet in less expensive and reliable manner than traditional ISDN systems. This solution typically allows flexible interconnection between organization and companies on any domains. Cloud VoIP solutions can offer even cheaper and scalable service when virtualized telephone infrastructure is used in the most efficient way. Scheduling and load balancing algorithms are fundamental parts of this approach. Unfortunately, VoIP scheduling techniques do not take into account uncertainty in dynamic and unpredictable cloud environments. In this paper, we formulate the problem of scheduling of VoIP services in distributed cloud environments and propose a new model for biobjective optimization. We consider the special case of the on-line nonclairvoyant dynamic bin-packing problem and discuss solutions for provider cost and quality of service optimization. We propose twenty call allocation strategies and evaluate their performance by comprehensive simulation analysis on real workload considering six months of the MIXvoip company service.

  9. Key determinants of managing the marketing asset of global companies

    Tatyana Tsygankova; Roman Ponomarenko

    2016-01-01

    As a result of organization and summarization of key concepts of evolution of the marketing tools of global companies, the authors determined the role of the marketing assets in the system of modern marketing management (as a dialectically higher stage of development of the analyzed tools, which will allow overcoming the antagonistic contradiction of “P- and C-vectors” of their development). The article identified the optimal set of key elements of the system of marketing assets, which are th...

  10. Risk and Reliability of Infrastructure Asset Management Workshop

    2006-01-01

    ...) in collaboration with Headquarters, USACE and in support of the initiatives on asset management. Over 75 people attended representing 6 of 8 Corps divisions, many districts, HQ, ERDC, Institute for Water Resources and academia...

  11. INFRASTRUCTURE FACILITIES FOR MONITORING AND INTELLECTUAL ROAD TRAFFIC MANAGEMENT

    G. Belov

    2014-10-01

    Full Text Available Review of automatic management of road traffic technologies in major cities of Ukraine is carried out in the given article. Priority directions of studies are determined for producing modern and perspective technologies in the given area. The facilities for monitoring and intelligence management of the road traffic on the basis of the programmed logical controller, using the device of fuzzy logic are considered.

  12. Optimisation of key performance measures in air cargo demand management

    Alexander May

    2014-04-01

    Full Text Available This article sought to facilitate the optimisation of key performance measures utilised for demand management in air cargo operations. The focus was on the Revenue Management team at Virgin Atlantic Cargo and a fuzzy group decision-making method was used. Utilising intelligent fuzzy multi-criteria methods, the authors generated a ranking order of ten key outcome-based performance indicators for Virgin Atlantic air cargo Revenue Management. The result of this industry-driven study showed that for Air Cargo Revenue Management, ‘Network Optimisation’ represents a critical outcome-based performance indicator. This collaborative study contributes to existing logistics management literature, especially in the area of Revenue Management, and it seeks to enhance Revenue Management practice. It also provides a platform for Air Cargo operators seeking to improve reliability values for their key performance indicators as a means of enhancing operational monitoring power.

  13. DNA based random key generation and management for OTP encryption.

    Zhang, Yunpeng; Liu, Xin; Sun, Manhui

    2017-09-01

    One-time pad (OTP) is a principle of key generation applied to the stream ciphering method which offers total privacy. The OTP encryption scheme has proved to be unbreakable in theory, but difficult to realize in practical applications. Because OTP encryption specially requires the absolute randomness of the key, its development has suffered from dense constraints. DNA cryptography is a new and promising technology in the field of information security. DNA chromosomes storing capabilities can be used as one-time pad structures with pseudo-random number generation and indexing in order to encrypt the plaintext messages. In this paper, we present a feasible solution to the OTP symmetric key generation and transmission problem with DNA at the molecular level. Through recombinant DNA technology, by using only sender-receiver known restriction enzymes to combine the secure key represented by DNA sequence and the T vector, we generate the DNA bio-hiding secure key and then place the recombinant plasmid in implanted bacteria for secure key transmission. The designed bio experiments and simulation results show that the security of the transmission of the key is further improved and the environmental requirements of key transmission are reduced. Analysis has demonstrated that the proposed DNA-based random key generation and management solutions are marked by high security and usability. Published by Elsevier B.V.

  14. The impact of Knowledge Management Infrastructure on Performance Effectiveness in Jordanian Organizations

    Nasser Mohammad Soud Jaradat, Dr.

    2014-06-01

    Full Text Available This study aims to determine the impact of knowledge management infrastructure on the performance effectiveness of the Jordanian organizations that need knowledge to perform their work and tasks. The study sample includes some public and private organizations working in Jordan and dealing with the knowledge subjects. The findings indicated that there was a strong effect for knowledge management infrastructure on the performance effectiveness. Organizations should establish knowledge directorates to discover and transmit knowledge to workers with a view to improve the creativeness and distinctiveness of organizations.

  15. A Schedulability Analysis Framework for Real-time Infrastructure Systems Managing Heterogeneous Resources

    Kim, Jinhyun; Kang, Sungwon

    2012-01-01

    REACTION 2012. 1st International workshop on Real-time and distributed computing in emerging applications. December 4th, 2012, San Juan, Puerto Rico. Electricity generating systems, such as smart grid systems, and water management systems are infrastructure systems that manage resources critical to human life. In the systems, resources are produced and managed to supply them to various consumers, such as building, car, factory, and household, according to their needs and pri...

  16. Enhanced Key Management Protocols for Wireless Sensor Networks

    Baojiang Cui

    2015-01-01

    Full Text Available With rapid development and extensive use of wireless sensor networks (WSNs, it is urgent to enhance the security for WSNs, in which key management is an effective way to protect WSNs from various attacks. However, different types of messages exchanged in WSNs typically have different security requirements which cannot be satisfied by a single keying mechanism. In this study, a basic key management protocol is described for WSNs based on four kinds of keys, which can be derived from an initial master key, and an enhanced protocol is proposed based on Diffie-Hellman algorithm. The proposed scheme restricts the adverse security impact of a captured node to the rest of WSNs and meets the requirement of energy efficiency by supporting in-network processing. The master key protection, key revocation mechanism, and the authentication mechanism based on one-way hash function are, respectively, discussed. Finally, the performance of the proposed scheme is analyzed from the aspects of computational efficiency, storage requirement and communication cost, and its antiattack capability in protecting WSNs is discussed under various attack models. In this paper, promising research directions are also discussed.

  17. Knowledge Management – the Key Resource in the Knowledge Economy

    Domingo NEVADO PEÑA

    2010-06-01

    Full Text Available The influence of global information and communication technology changes and globalization have transformed our society by favoring the economy and innovation as key driver of global competition. Creation and exploitation of knowledge has become key resource in the new economy. All advanced economies are technologically knowledgebased economy. Many of today's managers and their employees, still guided by the definition given by Francis Bacon (1597 “Knowledge is power” instead of “sharing and managing knowledge is power”. Knowing taken alone may not bring value if not shared before and then managed in an efficient manner. This article seeks to demonstrate what knowledge, what the knowledge management is and what are its main implications in the new economy, a knowledge-based economy.

  18. The BRAzilian Seismographic Integrated Systems (BRASIS: infrastructure and data management

    João Carlos Dourado

    2011-04-01

    Full Text Available In geophysics and seismology, raw data need to be processed to generate useful information that can be turned into knowledge by researchers. The number of sensors that are acquiring raw data is increasing rapidly. Without good data management systems, more time can be spent in querying and preparing datasets for analyses than in acquiring raw data. Also, a lot of good quality data acquired at great effort can be lost forever if they are not correctly stored. Local and international cooperation will probably be reduced, and a lot of data will never become scientific knowledge. For this reason, the Seismological Laboratory of the Institute of Astronomy, Geophysics and Atmospheric Sciences at the University of São Paulo (IAG-USP has concentrated fully on its data management system. This report describes the efforts of the IAG-USP to set up a seismology data management system to facilitate local and international cooperation.

  19. The role of public communication in decision making for waste management infrastructure.

    Kirkman, Richard; Voulvoulis, Nikolaos

    2017-12-01

    Modern waste management provision seeks to meet challenging objectives and strategies while reflecting community aspirations and ensuring cost-effective compliance with statutory obligations. Its social acceptability, which affects both what systems (infrastructure) can be put in place and to what extent their implementation will be successful, is a multi-dimensional phenomenon, often not well understood. In light of the growing evidence that decisions to build new infrastructure are often contested by the public, there is a clear need to understand the role of scientific evidence in public perception, particularly as environmental infrastructure delivery is often objected to by the public on environmental grounds. In this paper the need for waste management infrastructure is reviewed, and the way its delivery in the UK has evolved is used as an example of the role of public perception in the planning and delivery of waste facilities. Findings demonstrate the vital role of public communication in waste management infrastructure delivery. Public perception must be taken into account early in the decision making process, with the public informed and engaged from the start. There is a pressing need for people not simply to accept but to understand and appreciate the need for infrastructure, the nature of infrastructure investments and development, the costs and the benefits involved, and the technological aspects. Scientific evidence and literacy have a critical role to play, facilitating public engagement in a process that empowers people, allowing them to define and handle challenges and influence decisions that will impact their lives. Problem ownership, and an increased probability of any solutions proposed being selected and implemented successfully are potential benefits of such approach. Copyright © 2016 Elsevier Ltd. All rights reserved.

  20. Key Technologies in the Context of Future Networks: Operational and Management Requirements

    Lorena Isabel Barona López

    2016-12-01

    Full Text Available The concept of Future Networks is based on the premise that current infrastructures require enhanced control, service customization, self-organization and self-management capabilities to meet the new needs in a connected society, especially of mobile users. In order to provide a high-performance mobile system, three main fields must be improved: radio, network, and operation and management. In particular, operation and management capabilities are intended to enable business agility and operational sustainability, where the addition of new services does not imply an excessive increase in capital or operational expenditures. In this context, a set of key-enabled technologies have emerged in order to aid in this field. Concepts such as Software Defined Network (SDN, Network Function Virtualization (NFV and Self-Organized Networks (SON are pushing traditional systems towards the next 5G network generation.This paper presents an overview of the current status of these promising technologies and ongoing works to fulfill the operational and management requirements of mobile infrastructures. This work also details the use cases and the challenges, taking into account not only SDN, NFV, cloud computing and SON but also other paradigms.

  1. Communication infrastructure and data management for operating smart distribution systems

    Brunner, C.; Buchholz, B.M.; Gelfand, A.; Kamphuis, I.G.; Naumann, A.

    2012-01-01

    The enhancement of distribution networks into smart grids is based on three pillars: • Energy management on distribution level, • Distribution system automation, • Involvement of the consumers into the market for electricity by smart metering All these functions require an intensive exchange of

  2. German experience in managing stormwater with green infrastructure

    This paper identifies and describes experience with ‘green’ stormwater management practices in Germany. It provides the context in which developments took place and extracts lessons learned to inform efforts of other countries in confronting urban stormwater challenges. Our findi...

  3. Infrastructure asset management : The valuation of complex objects

    Verlaan, J.G.; De Ridder, H.A.J.

    2010-01-01

    For two years now, Rijkswaterstaat, an agency of the Dutch Ministry of Transport, Public Works and Water Management, is required to have a financial administration, which is based on accrual accounting principles. This involves the use of a balance sheet and the equivalent of a profit and loss

  4. Managing a tier-2 computer centre with a private cloud infrastructure

    Bagnasco, Stefano; Berzano, Dario; Brunetti, Riccardo; Lusso, Stefano; Vallero, Sara

    2014-01-01

    In a typical scientific computing centre, several applications coexist and share a single physical infrastructure. An underlying Private Cloud infrastructure eases the management and maintenance of such heterogeneous applications (such as multipurpose or application-specific batch farms, Grid sites, interactive data analysis facilities and others), allowing dynamic allocation resources to any application. Furthermore, the maintenance of large deployments of complex and rapidly evolving middleware and application software is eased by the use of virtual images and contextualization techniques. Such infrastructures are being deployed in some large centres (see e.g. the CERN Agile Infrastructure project), but with several open-source tools reaching maturity this is becoming viable also for smaller sites. In this contribution we describe the Private Cloud infrastructure at the INFN-Torino Computer Centre, that hosts a full-fledged WLCG Tier-2 centre, an Interactive Analysis Facility for the ALICE experiment at the CERN LHC and several smaller scientific computing applications. The private cloud building blocks include the OpenNebula software stack, the GlusterFS filesystem and the OpenWRT Linux distribution (used for network virtualization); a future integration into a federated higher-level infrastructure is made possible by exposing commonly used APIs like EC2 and OCCI

  5. Methodology for Analyzing and Developing Information Management Infrastructure to Support Telerehabilitation

    Andi Saptono

    2009-09-01

    Full Text Available The proliferation of advanced technologies led researchers within the Rehabilitation Engineering Research Center on Telerehabilitation (RERC-TR to devise an integrated infrastructure for clinical services using the University of Pittsburgh (PITT model. This model describes five required characteristics for a telerehabilitation (TR infrastructure: openness, extensibility, scalability, cost-effectiveness, and security. The infrastructure is to deliver clinical services over distance to improve access to health services for people living in underserved or remote areas. The methodological approach to design, develop, and employ this infrastructure is explained and detailed for the remote wheelchair prescription project, a research task within the RERC-TR. The availability of this specific clinical service and personnel outside of metropolitan areas is limited due to the lack of specialty expertise and access to resources. The infrastructure is used to deliver expertise in wheeled mobility and seating through teleconsultation to remote clinics, and has been successfully deployed to five rural clinics in Western Pennsylvania. Keywords: Telerehabilitation, Information Management, Infrastructure Development Methodology, Videoconferencing, Online Portal, Database

  6. Network Information Management: The Key To Providing High WAN Availability.

    Tysdal, Craig

    1996-01-01

    Discusses problems associated with increasing corporate network complexity as a result of the proliferation of client/server applications at remote locations, and suggests the key to providing high WAN (wide area network) availability is relational databases used in an integrated management approach. (LRW)

  7. Institutional Data Management in Higher Education. ECAR Key Findings

    Yanosky, Ronald

    2009-01-01

    This document presents the key findings from the 2009 ECAR (EDUCAUSE Center for Applied Research) study of institutional data management, which examines the policies and practices by which higher education institutions effectively collect, protect, and use digital information assets to meet academic and business needs. Importantly, it also…

  8. Urban Stormwater Management Model and Tools for Designing Stormwater Management of Green Infrastructure Practices

    Haris, H.; Chow, M. F.; Usman, F.; Sidek, L. M.; Roseli, Z. A.; Norlida, M. D.

    2016-03-01

    Urbanization is growing rapidly in Malaysia. Rapid urbanization has known to have several negative impacts towards hydrological cycle due to decreasing of pervious area and deterioration of water quality in stormwater runoff. One of the negative impacts of urbanization is the congestion of the stormwater drainage system and this situation leading to flash flood problem and water quality degradation. There are many urban stormwater management softwares available in the market such as Storm Water Drainage System design and analysis program (DRAINS), Urban Drainage and Sewer Model (MOUSE), InfoWorks River Simulation (InfoWork RS), Hydrological Simulation Program-Fortran (HSPF), Distributed Routing Rainfall-Runoff Model (DR3M), Storm Water Management Model (SWMM), XP Storm Water Management Model (XPSWMM), MIKE-SWMM, Quality-Quantity Simulators (QQS), Storage, Treatment, Overflow, Runoff Model (STORM), and Hydrologic Engineering Centre-Hydrologic Modelling System (HEC-HMS). In this paper, we are going to discuss briefly about several softwares and their functionality, accessibility, characteristics and components in the quantity analysis of the hydrological design software and compare it with MSMA Design Aid and Database. Green Infrastructure (GI) is one of the main topics that has widely been discussed all over the world. Every development in the urban area is related to GI. GI can be defined as green area build in the develop area such as forest, park, wetland or floodway. The role of GI is to improve life standard such as water filtration or flood control. Among the twenty models that have been compared to MSMA SME, ten models were selected to conduct a comprehensive review for this study. These are known to be widely accepted by water resource researchers. These ten tools are further classified into three major categories as models that address the stormwater management ability of GI in terms of quantity and quality, models that have the capability of conducting the

  9. Key determinants of managing the marketing asset of global companies

    Tatyana Tsygankova

    2016-12-01

    Full Text Available As a result of organization and summarization of key concepts of evolution of the marketing tools of global companies, the authors determined the role of the marketing assets in the system of modern marketing management (as a dialectically higher stage of development of the analyzed tools, which will allow overcoming the antagonistic contradiction of “P- and C-vectors” of their development. The article identified the optimal set of key elements of the system of marketing assets, which are the brand, customer loyalty, reputation, network cooperation, marketing strategy, internal marketing, marketing information system and marketing innovation. Due to correlation and regression analysis of the impact of each system elements on performance of global companies, the model of the "marketing asset octagon" was built as an integrative management tool. Also, as a result of construction of the said model, the authors identified the most profitable marketing assets, return on investment and development of competencies in the field of efficient management will bring the highest profit to the company. On the basis of summarizing the regional and branch features of managing the disparate elements of the marketing assets of global companies, the key regional and sectoral priorities of formation, development and improvement of existing concepts of the international marketing management were identified, particularly in terms of building an author’s integrative octagon model.

  10. Development of Best Practices for Large-scale Data Management Infrastructure

    S. Stadtmüller; H.F. Mühleisen (Hannes); C. Bizer; M.L. Kersten (Martin); J.A. de Rijke (Arjen); F.E. Groffen (Fabian); Y. Zhang (Ying); G. Ladwig; A. Harth; M Trampus

    2012-01-01

    htmlabstractThe amount of available data for processing is constantly increasing and becomes more diverse. We collect our experiences on deploying large-scale data management tools on local-area clusters or cloud infrastructures and provide guidance to use these computing and storage

  11. Evaluating the Effect of Green Infrastructure Stormwater Best Management Practices on New England Stream Habitat

    The U.S. EPA is evaluating the effectiveness of green infrastructure (GI) stormwater best management practices (BMPs) on stream habitat at the small watershed (< HUC12) scale in New England. Predictive models for thermal regime and substrate characteristics (substrate size, % em...

  12. National infrastructure asset management strategy: a recipe for acceleration towards efficiency

    Manus, N

    2009-05-01

    Full Text Available The Department of Water Affairs and Forestry (DWAF) has for a number of years been in the process of formulating the numerous layers of a national water services infrastructure asset management (IAM) strategy. Earlier work included: a "scan...

  13. Assessment Systems and Data Management in Colleges of Education: An Examination of Systems and Infrastructure

    Haughton, Noela A.; Keil, Virginia L.

    2009-01-01

    The College of Education Assessment Infrastructure Survey was developed and administered to 1011 institutions over a twelve-month period ending April 2007. The survey examined the capacity of university-based teacher preparation programs to respond to the growing and increasingly complex data management requirements that accompanies assessment and…

  14. Asset management for infrastructure systems energy and water

    Balzer, Gerd

    2015-01-01

    The book offers a broad overview of asset management processes for different utilities, with a special emphasis on energy and water. It provides readers with important practical considerations concerning the development of new competitive structures and procedures for guaranteeing a sufficient supply of energy and water in a regulated environment, using clearly defined technical and economic cornerstones. On the one hand asset owners expect suitable interests from their investment and business growth; on the other hand regulators focus more on a reliable and cost-effective customer supply. Thi

  15. Nanoinformatics knowledge infrastructures: bringing efficient information management to nanomedical research

    De la Iglesia, D; García-Remesal, M; Maojo, V; Cachau, R E

    2013-01-01

    Nanotechnology represents an area of particular promise and significant opportunity across multiple scientific disciplines. Ongoing nanotechnology research ranges from the characterization of nanoparticles and nanomaterials to the analysis and processing of experimental data seeking correlations between nanoparticles and their functionalities and side effects. Due to their special properties, nanoparticles are suitable for cellular-level diagnostics and therapy, offering numerous applications in medicine, e.g. development of biomedical devices, tissue repair, drug delivery systems and biosensors. In nanomedicine, recent studies are producing large amounts of structural and property data, highlighting the role for computational approaches in information management. While in vitro and in vivo assays are expensive, the cost of computing is falling. Furthermore, improvements in the accuracy of computational methods (e.g. data mining, knowledge discovery, modeling and simulation) have enabled effective tools to automate the extraction, management and storage of these vast data volumes. Since this information is widely distributed, one major issue is how to locate and access data where it resides (which also poses data-sharing limitations). The novel discipline of nanoinformatics addresses the information challenges related to nanotechnology research. In this paper, we summarize the needs and challenges in the field and present an overview of extant initiatives and efforts. (paper)

  16. Nanoinformatics knowledge infrastructures: bringing efficient information management to nanomedical research

    de la Iglesia, D; Cachau, R E; García-Remesal, M; Maojo, V

    2014-01-01

    Nanotechnology represents an area of particular promise and significant opportunity across multiple scientific disciplines. Ongoing nanotechnology research ranges from the characterization of nanoparticles and nanomaterials to the analysis and processing of experimental data seeking correlations between nanoparticles and their functionalities and side effects. Due to their special properties, nanoparticles are suitable for cellular-level diagnostics and therapy, offering numerous applications in medicine, e.g. development of biomedical devices, tissue repair, drug delivery systems and biosensors. In nanomedicine, recent studies are producing large amounts of structural and property data, highlighting the role for computational approaches in information management. While in vitro and in vivo assays are expensive, the cost of computing is falling. Furthermore, improvements in the accuracy of computational methods (e.g. data mining, knowledge discovery, modeling and simulation) have enabled effective tools to automate the extraction, management and storage of these vast data volumes. Since this information is widely distributed, one major issue is how to locate and access data where it resides (which also poses data-sharing limitations). The novel discipline of nanoinformatics addresses the information challenges related to nanotechnology research. In this paper, we summarize the needs and challenges in the field and present an overview of extant initiatives and efforts. PMID:24932210

  17. Optimal energy management of urban rail systems: Key performance indicators

    González-Gil, A.; Palacin, R.; Batty, P.

    2015-01-01

    Highlights: • An overall picture of urban rail energy use is provided. • Performance indicators are developed for urban rail system energy optimisation. • A multi-level methodology for assessing energy efficiency measures is presented. - Abstract: Urban rail systems are facing increasing pressure to minimise their energy consumption and thusly reduce their operational costs and environmental impact. However, given the complexity of such systems, this can only be effectively achieved through a holistic approach which considers the numerous interdependences between subsystems (i.e. vehicles, operations and infrastructure). Such an approach requires a comprehensive set of energy consumption-related Key Performance Indicators (KEPIs) that enable: a multilevel analysis of the actual energy performance of the system; an assessment of potential energy saving strategies; and the monitoring of the results of implemented measures. This paper proposes an original, complete list of KEPIs developed through a scientific approach validated by different stakeholders. It consists of a hierarchical list of 22 indicators divided into two levels: 10 key performance indicators, to ascertain the performance of the whole system and complete subsystems; and 12 performance indicators, to evaluate the performance of single units within subsystems, for example, a single rail vehicle or station. Additionally, the paper gives a brief insight into urban rail energy usage by providing an adequate context in which to understand the proposed KEPIs, together with a methodology describing their application when optimising the energy consumption of urban rail systems

  18. Enhancing Critical Infrastructure and Key Resources (CIKR) Level-0 Physical Process Security Using Field Device Distinct Native Attribute Features

    Lopez, Juan [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Liefer, Nathan C. [Wright-Patterson AFB, Dayton, OH (United States); Busho, Colin R. [Wright-Patterson AFB, Dayton, OH (United States); Temple, Michael A. [Wright-Patterson AFB, Dayton, OH (United States)

    2017-12-04

    Here, the need for improved Critical Infrastructure and Key Resource (CIKR) security is unquestioned and there has been minimal emphasis on Level-0 (PHY Process) improvements. Wired Signal Distinct Native Attribute (WS-DNA) Fingerprinting is investigated here as a non-intrusive PHY-based security augmentation to support an envisioned layered security strategy. Results are based on experimental response collections from Highway Addressable Remote Transducer (HART) Differential Pressure Transmitter (DPT) devices from three manufacturers (Yokogawa, Honeywell, Endress+Hauer) installed in an automated process control system. Device discrimination is assessed using Time Domain (TD) and Slope-Based FSK (SB-FSK) fingerprints input to Multiple Discriminant Analysis, Maximum Likelihood (MDA/ML) and Random Forest (RndF) classifiers. For 12 different classes (two devices per manufacturer at two distinct set points), both classifiers performed reliably and achieved an arbitrary performance benchmark of average cross-class percent correct of %C > 90%. The least challenging cross-manufacturer results included near-perfect %C ≈ 100%, while the more challenging like-model (serial number) discrimination results included 90%< %C < 100%, with TD Fingerprinting marginally outperforming SB-FSK Fingerprinting; SB-FSK benefits from having less stringent response alignment and registration requirements. The RndF classifier was most beneficial and enabled reliable selection of dimensionally reduced fingerprint subsets that minimize data storage and computational requirements. The RndF selected feature sets contained 15% of the full-dimensional feature sets and only suffered a worst case %CΔ = 3% to 4% performance degradation.

  19. Distributed Data Management on the Petascale using Heterogeneous Grid Infrastructures with DQ2

    Branco, M; Salgado, P; Lassnig, M

    2008-01-01

    We describe Don Quijote 2 (DQ2), a new approach to the management of large scientific datasets by a dedicated middleware. This middleware is designed to handle the data organisation and data movement on the petascale for the High-Energy Physics Experiment ATLAS at CERN. DQ2 is able to maintain a well-defined quality of service in a scalable way, guarantees data consistency for the collaboration and bridges the gap between EGEE, OSG and NorduGrid infrastructures to enable true interoperability. DQ2 is specifically designed to support the access and management of large scientific datasets produced by the ATLAS experiment using heterogeneous Grid infrastructures. The DQ2 middleware manages those datasets with global services, local site services and enduser interfaces. The global services, or central catalogues, are responsible for the mapping of individual files onto DQ2 datasets. The local site services are responsible for tracking files available on-site, managing data movement and guaranteeing consistency of...

  20. Tank waste remediation system privatization infrastructure program requirements and document management process guide

    ROOT, R.W.

    1999-01-01

    This guide provides the Tank Waste Remediation System Privatization Infrastructure Program management with processes and requirements to appropriately control information and documents in accordance with the Tank Waste Remediation System Configuration Management Plan (Vann 1998b). This includes documents and information created by the program, as well as non-program generated materials submitted to the project. It provides appropriate approval/control, distribution and filing systems

  1. Needs analysis of a flexible computerized management infrastructure

    Usman, S.; Hajek, B. K.; Ali, S. F.

    2006-01-01

    The United States' Energy Policy Act of 2005 is expected to facilitate construction of new commercial nuclear power plants. In the meanwhile, current plants are in the process of obtaining licenses for extended operation beyond their predetermined design life. In this beneficial yet challenging situation, it seems desirable to develop a strategic plan for smooth and seamless transition from paper based procedure systems to computer based procedure systems for improved performance and safety of the existing nuclear power plants. Many utilities already maintain procedures using word processing software, but it is common to print paper copies for daily use. At this time it is highly desirable to better understand the collective as well as individual document management needs of a commercial nuclear power plant as they migrate to a computer based system. As a contributory role in initiating a strategic plan, this paper offers a comprehensive questionnaire that is suitable for conducting a survey to determine the related needs of the utilities. The questionnaire covers three major areas: Formatting and User Friendly Features; Technical and Environmental Considerations; and Safety, System Integrity and Regulatory Considerations. A plan to conduct the proposed survey is also outlined in the future work section of this paper. (authors)

  2. Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data

    Fröschle, Sibylle; Steel, Graham

    We extend Delaune, Kremer and Steel’s framework for analysis of PKCS#11-based APIs from bounded to unbounded fresh data. We achieve this by: formally defining the notion of an attribute policy; showing that a well-designed API should have a certain class of policy we call complete; showing that APIs with complete policies may be safely abstracted to APIs where the attributes are fixed; and proving that these static APIs can be analysed in a small bounded model such that security properties will hold for the unbounded case. We automate analysis in our framework using the SAT-based security protocol model checker SATMC. We show that a symmetric key management subset of the Eracom PKCS#11 API, used in their ProtectServer product, preserves the secrecy of sensitive keys for unbounded numbers of fresh keys and handles, i.e. pointers to keys. We also show that this API is not robust: if an encryption key is lost to the intruder, SATMC finds an attack whereby all the keys may be compromised.

  3. The Assistant Manager - a Key Factor of the Managerial Team

    Lecturer Ph. D. Niculina Vargolici

    2009-05-01

    Full Text Available The new economic context, marked by the crisis and by radical transformations of the labor market, generates the need for more and more sophisticated skills for the assistant manager. That is because the efficiency of the secretarial activity implies both strategic skills and complex abilities, starting from knowledge about the specific activity of the company/institution where the person works as assistant manager, to connected areas such as: management, marketing, human resources, brand communication, company’s culture etc. Whether the manager changes his job together with the “boss”, or the boss is changed and he is bond to adapt to new conditions, a strong team spirit between the manager and his assistant is one of the most important elements that contribute to the productivity and efficiency of the both. The loyalty to the boss and to the company where he works, his adaptation capacity, his competence and his professionalism make the today’s assistant manager a key factor of the managerial team. The essence of the assistant manager job consists in making more efficient the managerial activities, namely, to make it respond to the expectations expressed or not of the manager, or even to anticipate them.

  4. The Collaborative Management Model on Developing the Infrastructure of the Pomalaa’s Airport, Indonesia

    Dr.Sc. Abdul Sabaruddin

    2017-06-01

    Full Text Available Collaborative management of public sector is being introduced as a new approach to solve the problems which is mainly on the restrictiveness of bureaucracy in answering such public demand. Therefore, collaboration approach presents new actors out of the government in processing the public sectors. The relationship among actors in its collaboration is well developed through consensus to gain valuable decision to all. Based on the problems mentioned, this study focuses on the model of collaborative management on developing the infrastructure of an airport. To answer the objective of the study, therefore, this research applied qualitative approach in which the respondents are those who were being involved in construction process of the airport. The data gained from interview will be analysed through interactive model consisting of some procedures; data reduction, data presentation, verification of the data/ drawing conclusion. The result showed that collaborative management model in infrastructure development of the airport was a management model, in this case collective action based on the principle of synergetic participation. In this context, there was no single actor on the development of infrastructure of the airport. Through collective action, the related aspects, in this case the development of infrastructure, was transparently communicated to avoid miscommunication among the members. Therefore, the actors which were being involved on the collaboration bore the needs reasonably and also there was no such member who were being burden. Thus, the implication of collaboration based on the consensus, the collaboration on the development of infrastructure of the airport is on the basis of participative, which pointed out the appointment and the continuation of the development.

  5. Technical Meeting/Workshop on Topical Issues on Infrastructure Development: Managing the Development of a National Infrastructure for Nuclear Power Plants. Presentations

    2012-01-01

    The main purpose of the TM/Workshop is to provide an opportunity for exchange of specific information on the management of the development of a sustainable national infrastructure for Nuclear Power Plants as it is recommended in the Agency's Milestones approach. Taking into account the actual status of new nuclear power programmes in Member States, this Agency event shall focus on the moving beyond the consideration of the nuclear power and advancing to the next phase, when future partners (Consultants, NPP Vendors, EPC Contractors, etc.) shall be selected and contracted for the first Nuclear Power Plant. The objectives of the Technical Meeting/Workshop are the following: 1. To exchange specific information and to facilitate the management and coordination of the development and implementation of a national infrastructure for nuclear power; 2. To present and discuss case studies, good practices and lessons learned about recent experiences in implementing an appropriate infrastructure for nuclear power, including management methods and self-evaluation processes; 3. To allow participants to improve their knowledge of various aspects of nuclear infrastructure development; and 4. To provide a forum in which participants can discuss common challenges, opportunities for cooperation, concerns and issues their countries face in the infrastructure implementation process.

  6. Eutrophication and contaminant data management for EU marine policies: the EMODnet Chemistry infrastructure.

    Vinci, Matteo; Lipizer, Marina; Giorgetti, Alessandra

    2016-04-01

    The European Marine Observation and Data Network (EMODnet) initiative has the following purposes: to assemble marine metadata, data and products, to make these fragmented resources more easily available to public and private users and to provide quality-assured, standardised and harmonised marine data. EMODnet Chemistry was launched by DG MARE in 2009 to support the Marine Strategy Framework Directive (MSFD) requirements for the assessment of eutrophication and contaminants, following INSPIRE Directive rules. The aim is twofold: the first task is to make available and reusable the big amount of fragmented and inaccessible data, hosted in the European research institutes and environmental agencies. The second objective is to develop visualization services useful for the tasks of the MSFD. The technical set-up is based on the principle of adopting and adapting the SeaDataNet infrastructure for ocean and marine data which are managed by National Oceanographic Data Centers and relies on a distributed network of data centers. Data centers contribute to data harvesting and enrichment with the relevant metadata. Data are processed into interoperable formats (using agreed standards ISO XML, ODV) with the use of common vocabularies and standardized quality control procedures .Data quality control is a key issue when merging heterogeneous data coming from different sources and a data validation loop has been agreed within EMODnet Chemistry community and is routinely performed. After data quality control done by the regional coordinators of the EU marine basins (Atlantic, Baltic, North, Mediterranean and Black Sea), validated regional datasets are used to develop data products useful for the requirements of the MSFD. EMODnet Chemistry provides interpolated seasonal maps of nutrients and services for the visualization of time series and profiles of several chemical parameters. All visualization services are developed following OGC standards as WMS and WPS. In order to test new

  7. SeaDataNet: Pan-European infrastructure for ocean and marine data management

    Fichaut, M.; Schaap, D.; Maudire, G.; Manzella, G. M. R.

    2012-04-01

    The overall objective of the SeaDataNet project is the upgrade the present SeaDataNet infrastructure into an operationally robust and state-of-the-art Pan-European infrastructure for providing up-to-date and high quality access to ocean and marine metadata, data and data products originating from data acquisition activities by all engaged coastal states, by setting, adopting and promoting common data management standards and by realising technical and semantic interoperability with other relevant data management systems and initiatives on behalf of science, environmental management, policy making, and economy. SeaDataNet is undertaken by the National Oceanographic Data Centres (NODCs), and marine information services of major research institutes, from 31 coastal states bordering the European seas, and also includes Satellite Data Centres, expert modelling centres and the international organisations IOC, ICES and EU-JRC in its network. Its 40 data centres are highly skilled and have been actively engaged in data management for many years and have the essential capabilities and facilities for data quality control, long term stewardship, retrieval and distribution. SeaDataNet undertakes activities to achieve data access and data products services that meet requirements of end-users and intermediate user communities, such as GMES Marine Core Services (e.g. MyOcean), establishing SeaDataNet as the core data management component of the EMODNet infrastructure and contributing on behalf of Europe to global portal initiatives, such as the IOC/IODE - Ocean Data Portal (ODP), and GEOSS. Moreover it aims to achieve INSPIRE compliance and to contribute to the INSPIRE process for developing implementing rules for oceanography. • As part of the SeaDataNet upgrading and capacity building, training courses will be organised aiming at data managers and technicians at the data centres. For the data managers it is important, that they learn to work with the upgraded common Sea

  8. Managing key capabilities: A challenge for nuclear plant building companies

    Pascal Corbel

    2003-01-01

    The nuclear plant building industry faces a paradoxical situation. The use of nuclear reactors to produce energy for civil purposes is both a promising technology, with potentially huge outlets, and a technology facing declining demand. One of the key problems is then: how to maintain the capabilities necessary to benefit from the potential recovery? The resource-based view of strategic management has shown the importance of different types of resources and capabilities in gaining a sustainable competitive advantage. Successful incumbents in the market of nuclear station building have built those kinds of distinctive capabilities that give them a competitive advantage over potential new entrants. But we show that, without a permanent activity in plant building, preserving those capabilities necessitates specific strategic action. We firstly develop the argument that the nuclear plant building industry is in a paradoxical situation in terms of demand and technical performance trends. Secondly, we try to identify the key capabilities of the incumbents. We show that companies in that field use mainly three types of distinctive capabilities: pure technical and scientific knowledge in direct relation to the use of nuclear as an energy generator, competences in risk management and competences in large project management, including financing. Thirdly, we show that although some of those capabilities are used through other nuclear-related activities such as plant maintenance or fuel supply, some of them necessitate taking strategic actions in order to be preserved. We argue that this should be a priority of nuclear equipment company managers in the next few years. (author)

  9. Managing Key Risks in Post-Merger IS Integration

    Alaranta, Mar; Mathiassen, L

    2014-01-01

    Mergers and acquisitions (M&A) require organizations to blend together different information system (IS) configurations. Unfortunately, less than 50 percent of M&A's achieve their goals, with IS integration being a major problem. Here, the authors offer a framework to help managers prepare for......, analyze, and mitigate risks during post-merger IS integration. They identify key risks relating to IS integration content, process, and context, and present five strategies for mitigating those risks. Their framework aims to help managers proactively reduce the impact of adverse events. Adopting...... the framework supported by their templates is straightforward and the time and resources required are minimal. When properly executed, adoption increases the likelihood of successful merger outcomes; the framework is thus a valuable addition to the management tool box and can be applied in collaboration...

  10. The future of infrastructure security :

    Garcia, Pablo; Turnley, Jessica Glicken; Parrott, Lori K.

    2013-05-01

    Sandia National Laboratories hosted a workshop on the future of infrastructure security on February 27-28, 2013, in Albuquerque, NM. The 17 participants came from backgrounds as diverse as federal policy, the insurance industry, infrastructure management, and technology development. The purpose of the workshop was to surface key issues, identify directions forward, and lay groundwork for cross-sectoral and cross-disciplinary collaborations. The workshop addressed issues such as the problem space (what is included in infrastructure problems?), the general types of threats to infrastructure (such as acute or chronic, system-inherent or exogenously imposed) and definitions of secure and resilient infrastructures. The workshop concluded with a consideration of stakeholders and players in the infrastructure world, and identification of specific activities that could be undertaken by the Department of Homeland Security (DHS) and other players.

  11. Active listening: The key of successful communication in hospital managers.

    Jahromi, Vahid Kohpeima; Tabatabaee, Seyed Saeed; Abdar, Zahra Esmaeili; Rajabi, Mahboobeh

    2016-03-01

    One of the important causes of medical errors and unintentional harm to patients is ineffective communication. The important part of this skill, in case it has been forgotten, is listening. The objective of this study was to determine whether managers in hospitals listen actively. This study was conducted between May and June 2014 among three levels of managers at teaching hospitals in Kerman, Iran. Active Listening skill among hospital managers was measured by self-made Active Listening Skill Scale (ALSS), which consists of the key elements of active listening and has five subscales, i.e., Avoiding Interruption, Maintaining Interest, Postponing Evaluation, Organizing Information, and Showing Interest. The data were analyzed by IBM-SPSS software, version 20, and the Pearson product-moment correlation coefficient, the chi-squared test, and multiple linear regressions. The mean score of active listening in hospital managers was 2.32 out of 3.The highest score (2.27) was obtained by the first-level managers, and the top managers got the lowest score (2.16). Hospital mangers were best in showing interest and worst in avoiding interruptions. The area of employment was a significant predictor of avoiding interruption and the managers' gender was a strong predictor of skill in maintaining interest (p < 0.05). The type of management and education can predict postponing evaluation, and the length of employment can predict showing interest (p < 0.05). There is a necessity for the development of strategies to create more awareness among the hospital managers concerning their active listening skills.

  12. A Polynomial Subset-Based Efficient Multi-Party Key Management System for Lightweight Device Networks.

    Mahmood, Zahid; Ning, Huansheng; Ghafoor, AtaUllah

    2017-03-24

    Wireless Sensor Networks (WSNs) consist of lightweight devices to measure sensitive data that are highly vulnerable to security attacks due to their constrained resources. In a similar manner, the internet-based lightweight devices used in the Internet of Things (IoT) are facing severe security and privacy issues because of the direct accessibility of devices due to their connection to the internet. Complex and resource-intensive security schemes are infeasible and reduce the network lifetime. In this regard, we have explored the polynomial distribution-based key establishment schemes and identified an issue that the resultant polynomial value is either storage intensive or infeasible when large values are multiplied. It becomes more costly when these polynomials are regenerated dynamically after each node join or leave operation and whenever key is refreshed. To reduce the computation, we have proposed an Efficient Key Management (EKM) scheme for multiparty communication-based scenarios. The proposed session key management protocol is established by applying a symmetric polynomial for group members, and the group head acts as a responsible node. The polynomial generation method uses security credentials and secure hash function. Symmetric cryptographic parameters are efficient in computation, communication, and the storage required. The security justification of the proposed scheme has been completed by using Rubin logic, which guarantees that the protocol attains mutual validation and session key agreement property strongly among the participating entities. Simulation scenarios are performed using NS 2.35 to validate the results for storage, communication, latency, energy, and polynomial calculation costs during authentication, session key generation, node migration, secure joining, and leaving phases. EKM is efficient regarding storage, computation, and communication overhead and can protect WSN-based IoT infrastructure.

  13. Development and implementation of web based infrastructure for problem management at UNPRI

    WijayaDewantoro, Rico; Wardani, Sumita; Rudy; Surya Perdana Girsang, Batara; Dharma, Abdi

    2018-04-01

    Information technology drastically affects human way of thinking. It has entered every part of human life and also became one of the most significant contributors to make human life more manageable. Reporting a problem of facilities and infrastructure in Universitas Prima Indonesia was done manually where the complainant have to meet the responsible person directly and describe how the problem looks like. Then, the responsible person only solve the problem but have no good documentation on it like Five Ws and How. Moreover, the other issue is to avoid a person who is mischievous for giving false reports. In this paper, we applied a set of procedures called Universitas Prima Indonesia Problem Management System (UNPRI-PMS) which also integrated with academic information system. Implemetation of UNPRI-PMS affects all of the problems about facilities and infrastructure at Universitas Prima Indonesia can be solved more efficient, structured, and accurate.

  14. INFRASTRUCTURAL MECHANISMS LEADING TOWARD PRO-ACCOUNTABLE CARE ORGANISATION ORIENTATION: A SURVEY OF HOSPITAL MANAGERS

    Wan, Thomas T.H.; Masri, Maysoun Dimachkie; Ortiz, Judith

    2013-01-01

    Organisations across the country are transforming the way they deliver care, in ways similar to the accountable care organisation (ACO) model supported by Medicare. ACOs modalities are varying in size, type, and financing structure. Little is known about how specific infrastructural mechanisms influence hospital managers’ pro-ACO orientation. Using an electronic-survey of hospital managers, this study explores how pro-ACO orientation, as a latent construct, is captured from the perceptions of hospital managers; and identify infrastructural mechanisms leading to the formation of pro-ACO orientation. Of the total hospital respondents, 58% are moving toward the establishment of ACOs; 56% are planning to join in the next two years; 48% are considering joining ACOs; while 25% had already participated in ACOs during 2012. Urban hospitals are more likely than rural hospitals to be engaged in ACO development. The health provider network size is one of the strongest indicators in predicting pro-ACO orientation. PMID:25374609

  15. Key Management for Secure Multicast over IPv6 Wireless Networks

    Siddiqi Mohammad Umar

    2006-01-01

    Full Text Available Multicasting is an efficient method for transmission and routing of packets to multiple destinations using fewer network resources. Along with widespread deployment of wireless networks, secure multicast over wireless networks is an important and challenging goal. In this paper, we extend the scope of a recent new key distribution scheme to a security framework that offers a novel solution for secure multicast over IPv6 wireless networks. Our key management framework includes two scenarios for securely distributing the group key and rekey messages for joining and leaving a mobile host in secure multicast group. In addition, we perform the security analysis and provide performance comparisons between our approach and two recently published scenarios. The benefits of our proposed techniques are that they minimize the number of transmissions required to rekey the multicast group and impose minimal storage requirements on the multicast group. In addition, our proposed schemes are also very desirable from the viewpoint of transmission bandwidth savings since an efficient rekeying mechanism is provided for membership changes and they significantly reduce the required bandwidth due to key updating in mobile networks. Moreover, they achieve the security and scalability requirements in wireless networks.

  16. Emergent collaboration infrastructures technology design for inter-organizational crisis management

    Reuter, Christian

    2015-01-01

    ​Using the domain of crisis management, Christian Reuter explores challenges and opportunities for technology design in emergent environments. He therefore empirically analyzes collaborative work in inter-organizational crisis - such as the police, fire departments, energy network operators and citizens - in order to identify collaboration practices that reveal work infrastructure limitations. He also designs, implements and evaluates novel concepts and ICT artifacts towards the support of emergent collaboration. Besides the discovery of potential organizational effects on the ability to deal

  17. INTEGRATION OF MULTICRITERIA ANALYSIS INTO DECISION SUPPORT CONCEPT FOR URBAN ROAD INFRASTRUCTURE MANAGEMENT

    Niksa Jajac

    2010-12-01

    Full Text Available Urban road infrastructure management deals with complex decision making process. There are several reasons for a complexity such as: multi-disciplinarity, lots of participants, huge quantity of information, limited budget, conflict goals and criteria. These facts indicate that decision making processes in urban road infrastructure management belong to ill-defined problems. In order to cope with such complexity and to help managers during decision making processes this research proposes an application of multicriteria methods. Therefore, a generic concept of decision support for urban road infrastructure management based on multicriteria analysis is proposed. Three multicriteria methods: AHP, SAW and PROMETHHE, in a combination with 0-1 programming are used. The main advantage of an application of multicriteria analysis is that all stakeholders could be objectively included into decision process. Therefore, setting up of criteria weights involves opinions from all stakeholders’ groups (stakeholders are divided into three characteristic groups. Evaluation of criteria importance (weights is based on three sets of opinions processed by Analytic Hierarchic Processing (AHP method. Three sets of criteria are then processed by Simple Additive Weighting (SAW method resulting in a final set of criteria weights. By using SAW method, relative importance of opinions of all three stakeholders’ groups is introduced. Collected data are then processed by PROMETHEE multicriteria methods. Proposed decision support concept is validated on the problem of improvement of one part of an urban road infrastructure system for a large urban area of town of Split. The concept is efficiently applied on several problems regarding parking garages: location selection, sub-project ranking, definition of an investment strategy.

  18. METHODS OF MANAGING TRAFFIC DISTRIBUTION IN INFORMATION AND COMMUNICATION NETWORKS OF CRITICAL INFRASTRUCTURE SYSTEMS

    Kosenko, Viktor; Persiyanova, Elena; Belotskyy, Oleksiy; Malyeyeva, Olga

    2017-01-01

    The subject matter of the article is information and communication networks (ICN) of critical infrastructure systems (CIS). The goal of the work is to create methods for managing the data flows and resources of the ICN of CIS to improve the efficiency of information processing. The following tasks were solved in the article: the data flow model of multi-level ICN structure was developed, the method of adaptive distribution of data flows was developed, the method of network resource assignment...

  19. Safe management of nuclear energy. A key towards sustainable development

    Dreimanis, Andrejs

    2011-01-01

    Management of nuclear risks - crucial factor for acceptance of novel nuclear projects. We propose an interdisciplinary approach to societal optimization of nuclear energy management. As the keystones we choose: self-organization concept, 2) the principle of the requisite variety. A primary source of growth of internal variety - information and knowledge. Comprehensive knowledge management and informational support firstly is needed in: Technical issues: a) nuclear energy indicators of safety and reliability, b) extensive research and development of advanced technologies, c) multilateral cooperation in common projects; Societal issues: a) general nuclear awareness, b) risk management, engagement in decision-making, personnel education and training, staff renascence, c) public education, stakeholder involvement. There is shown: public education and social learning - efficient self-organization mechanisms, thereby forming a learning and knowledge-creating community. Such an acquired and created knowledge could facilitate solution of key socio-technical issues of nuclear safety as a) public acceptance, in particular, of siting of novel nuclear power plant and radioactive waste disposal objects, b) promotion of adequate perception of risk, equity and trust factors, and c) elevation of safety level of nuclear facilities and adequate management of nuclear risks. The importance of multi-level confidence building at global, regional and national levels is emphasized. (author)

  20. LifeWatch - a Large-scale eScience Infrastructure to Assist in Understanding and Managing our Planet's Biodiversity

    Hernández Ernst, Vera; Poigné, Axel; Los, Walter

    2010-05-01

    -Laboratories or by composing e-Services which can be shared and jointly developed. For it a long-term vision for the LifeWatch Biodiversity Workbench Portal has been developed as a one-stop application for the LifeWatch infrastructure based on existing and emerging technologies. There the user can find all available resources such as data, workflows, tools, etc. and access LifeWatch applications that integrate different resource and provides key capabilities like resource discovery and visualisation, creation of workflows, creation and management of provenance, and the support of collaborative activities. While LifeWatch developers will construct components for solving generic LifeWatch tasks, users may add their own facilities to fulfil individual needs. Examples for application of the LifeWatch Reference Model and the LifeWatch Biodiversity Workbench Portal will be given.

  1. Current issues and regulatory infrastructure aspects on radioactive waste management in Romania

    Vieru, G.

    2002-01-01

    The nuclear facilities that exist throughout Romania perform a broad range of missions from research to nuclear materials production to radioactive waste management, and to deactivation and decommissioning. As a consequence, there is a broad array of external regulations and internal requirements that potentially applies to a facility or activity. Therefore, the management of radioactive waste occurs within a larger context of managing hazards, both radiological and industrial, at these facilities. At the same time, concern for upgrading existing facilities used for radioactive waste management, as called for in Article 12, fits into a larger framework of safety management. The primary objective of the Romanian Nuclear Regulatory Body-CNCAN on legislation and regulatory infrastructure for the safety of radioactive waste management is to protect human health and the environment now and in the future. It is unanimously recognized that a well developed regulated system for the management and disposal of radioactive waste is a prerequisite for both public and market acceptance of nuclear energy. It is to underline that the continuing internationalization of the nuclear industry following terrorist attacks of 11 September 2001 stresses the need for national legislation and regulatory infrastructure to be based on internationally endorsed principles and safety standards. The paper presents some aspects of the Romanian experience on the national legislative and regulatory system related to the followings aspects of the safety aspects of radioactive waste management: definition of responsibilities; nuclear and radiation safety requirements; siting and licensing procedures; regulatory functions; international co-operation and coherence on strategies and criteria in the area of safety of radioactive waste management. Finally, prescriptive and goal oriented national as well international regimes in the field of the safety of radioactive waste management are briefly commented

  2. Using virtual machine monitors to overcome the challenges of monitoring and managing virtualized cloud infrastructures

    Bamiah, Mervat Adib; Brohi, Sarfraz Nawaz; Chuprat, Suriayati

    2012-01-01

    Virtualization is one of the hottest research topics nowadays. Several academic researchers and developers from IT industry are designing approaches for solving security and manageability issues of Virtual Machines (VMs) residing on virtualized cloud infrastructures. Moving the application from a physical to a virtual platform increases the efficiency, flexibility and reduces management cost as well as effort. Cloud computing is adopting the paradigm of virtualization, using this technique, memory, CPU and computational power is provided to clients' VMs by utilizing the underlying physical hardware. Beside these advantages there are few challenges faced by adopting virtualization such as management of VMs and network traffic, unexpected additional cost and resource allocation. Virtual Machine Monitor (VMM) or hypervisor is the tool used by cloud providers to manage the VMs on cloud. There are several heterogeneous hypervisors provided by various vendors that include VMware, Hyper-V, Xen and Kernel Virtual Machine (KVM). Considering the challenge of VM management, this paper describes several techniques to monitor and manage virtualized cloud infrastructures.

  3. Determination of Infrastructure Development in the Integrated Management Planning of Firtina Basin throug Participatary Approach

    Cenap SANCAR

    2015-12-01

    Full Text Available Fırtına Basin (FB having natural temperate zone forests, rich biodiversity and high endemic variety is located in Caucasus Ecoregion which is among the most important 25 ecoregions on earth. Additionally, forest zones in FB are listed among “100 Forest Hotspots” in Europe by The World Conservation Monitoring Centre (UNEP WCMC. This study identified how and to what level existing land use pattern and related infrastructure, which compose basic inputs of sustainable basin management, influence ecology and biodiversity. Findings also revealed certain socio-economic and environmental effects of recent applications / projects which were not based on a holistic management plan. This study seeks to establish adequate technical infrastructure for the rational use and sustainable management of natural resources (water, soil, forest, etc. in Fırtına Basin and to provide coordination among the institutions. The Integrated Basin Management project also aims at designing a sustainable natural resource management and biodiversity conservation model for the piloting area, Fırtına Basin as well as for other basins. Moreover, IBM (Integrated Basin Management experiences will be opened to debate among scholars in academic and institutional circles who are also concerned with the basins in the same ecological corridor (Eastern Black Sea Mountains or other basins in the wider Caucasus Ecoregion.

  4. Collaborative Development of e-Infrastructures and Data Management Practices for Global Change Research

    Samors, R. J.; Allison, M. L.

    2016-12-01

    An e-infrastructure that supports data-intensive, multidisciplinary research is being organized under the auspices of the Belmont Forum consortium of national science funding agencies to accelerate the pace of science to address 21st century global change research challenges. The pace and breadth of change in information management across the data lifecycle means that no one country or institution can unilaterally provide the leadership and resources required to use data and information effectively, or needed to support a coordinated, global e-infrastructure. The five action themes adopted by the Belmont Forum: 1. Adopt and make enforceable Data Principles that establish a global, interoperable e-infrastructure. 2. Foster communication, collaboration and coordination between the wider research community and Belmont Forum and its projects through an e-Infrastructure Coordination, Communication, & Collaboration Office. 3. Promote effective data planning and stewardship in all Belmont Forum agency-funded research with a goal to make it enforceable. 4. Determine international and community best practice to inform Belmont Forum research e-infrastructure policy through identification and analysis of cross-disciplinary research case studies. 5. Support the development of a cross-disciplinary training curriculum to expand human capacity in technology and data-intensive analysis methods. The Belmont Forum is ideally poised to play a vital and transformative leadership role in establishing a sustained human and technical international data e-infrastructure to support global change research. In 2016, members of the 23-nation Belmont Forum began a collaborative implementation phase. Four multi-national teams are undertaking Action Themes based on the recommendations above. Tasks include mapping the landscape, identifying and documenting existing data management plans, and scheduling a series of workshops that analyse trans-disciplinary applications of existing Belmont Forum

  5. Dynamic simulation applied to the socio-environmental management in projects of concentrated infrastructure

    Diaz E, Mauricio; Pena Z, Gloria Elena

    2004-01-01

    This work presents a theoretical and methodological approach to system dynamics utilization to contribute in the comprehension and handle of complexly of management challenges what appears in design, construction and operation phases in concentrate infrastructure projects like as ports, big dams and industrial parks. The localization of this kind of projects generates socio environmental impacts in their influence zones, what requires a strategically management from enterprise owners, not only for to comply with current environmental laws but also ensure social viability of their projects

  6. Key management of the double random-phase-encoding method using public-key encryption

    Saini, Nirmala; Sinha, Aloka

    2010-03-01

    Public-key encryption has been used to encode the key of the encryption process. In the proposed technique, an input image has been encrypted by using the double random-phase-encoding method using extended fractional Fourier transform. The key of the encryption process have been encoded by using the Rivest-Shamir-Adelman (RSA) public-key encryption algorithm. The encoded key has then been transmitted to the receiver side along with the encrypted image. In the decryption process, first the encoded key has been decrypted using the secret key and then the encrypted image has been decrypted by using the retrieved key parameters. The proposed technique has advantage over double random-phase-encoding method because the problem associated with the transmission of the key has been eliminated by using public-key encryption. Computer simulation has been carried out to validate the proposed technique.

  7. Managing uncertainty: Lessons from volcanic lava disruption of transportation infrastructure in Puna, Hawaii.

    Kim, Karl; Pant, Pradip; Yamashita, Eric

    A recent lava flow in Puna, Hawaii, threatened to close one of the major highways serving the region. This article provides background information on the volcanic hazards and describes events, responses, and challenges associated with managing a complex, long-duration disaster. In addition to the need to better understand geologic hazards and threats, there is a need for timely information and effective response and recovery of transportation infrastructure. This requires coordination and sharing of information between scientists, emergency managers, transportation planners, government agencies, and community organizations. Transportation assets play a critical role in terms of problem definition, response, and recovery. The challenges with managing a long-duration event include: (1) determining when a sufficient threat level exists to close roads; (2) identifying transportation alternatives; (3) assessing impacts on communities including the direct threats to homes, businesses, structures, and infrastructure; (4) engaging communities in planning and deliberation of choices and alternatives; and (5) managing uncertainties and different reactions to hazards, threats, and risks. The transportation planning process provides a pathway for addressing initial community concerns. Focusing not just on roadways but also on travel behavior before, during, and after disasters is a vital aspect of building resilience. The experience in Puna with the volcano crisis is relevant to other communities seeking to adapt and manage long-term threats such as climate change, sea level risk, and other long-duration events.

  8. Infrastructure requirement of knowledge management system model of statistical learning tool (SLT) for education community

    Abdullah, Rusli; Samah, Bahaman Abu; Bolong, Jusang; D'Silva, Jeffrey Lawrence; Shaffril, Hayrol Azril Mohamed

    2014-09-01

    Today, teaching and learning (T&L) using technology as tool is becoming more important especially in the field of statistics as a part of the subject matter in higher education system environment. Eventhough, there are many types of technology of statistical learnig tool (SLT) which can be used to support and enhance T&L environment, however, there is lack of a common standard knowledge management as a knowledge portal for guidance especially in relation to infrastructure requirement of SLT in servicing the community of user (CoU) such as educators, students and other parties who are interested in performing this technology as a tool for their T&L. Therefore, there is a need of a common standard infrastructure requirement of knowledge portal in helping CoU for managing of statistical knowledge in acquiring, storing, desseminating and applying of the statistical knowedge for their specific purposes. Futhermore, by having this infrastructure requirement of knowledge portal model of SLT as a guidance in promoting knowledge of best practise among the CoU, it can also enhance the quality and productivity of their work towards excellence of statistical knowledge application in education system environment.

  9. Probabilistic Design and Management of Sustainable Concrete Infrastructure Using Multi-Physics Service Life Models

    Lepech, Michael; Geiker, Mette; Michel, Alexander

    This paper looks to address the grand challenge of integrating construction materials engineering research within a multi-scale, inter-disciplinary research and management framework for sustainable concrete infrastructure. The ultimate goal is to drive sustainability-focused innovation and adoption...... cycles in the broader architecture, engineering, construction (AEC) industry. Specifically, a probabilistic design framework for sustainable concrete infrastructure and a multi-physics service life model for reinforced concrete are presented as important points of integration for innovation between...... design, consists of concrete service life models and life cycle assessment (LCA) models. Both types of models (service life and LCA) are formulated stochastically so that the service life and time(s) to repair, as well as total sustainability impact, are described by a probability distribution. A central...

  10. Optimising waste management performance - The key to successful decommissioning

    Keep, Matthew

    2007-01-01

    Available in abstract form only. Full text of publication follows: On the 1. of April 2005 the United Kingdom's Nuclear Decommissioning Authority became responsible for the enormous task of decommissioning the UK's civilian nuclear liabilities. The success of the NDA in delivering its key objectives of safer, cheaper and faster decommissioning depends on a wide range factors. It is self-evident, however, that the development of robust waste management practices by those charged with decommissioning liability will be at the heart of the NDA's business. In addition, the implementation of rigorous waste minimisation techniques throughout decommissioning will deliver tangible environmental benefits as well as better value for money and release funds to accelerate the decommissioning program. There are mixed views as to whether waste minimisation can be achieved during decommissioning. There are those that argue that the radioactive inventory already exists, that the amount of radioactivity cannot be minimised and that the focus of activities should be focused on waste management rather than waste minimisation. Others argue that the management and decommissioning of the UK's civilian nuclear liability will generate significant volumes of additional radioactive waste and it is in this area where the opportunities for waste minimisation can be realised. (author)

  11. Infrastructure support for a waste management institute. Final project report, September 12, 1994--September 11, 1997

    NONE

    1997-11-01

    North Carolina A and T State University has completed the development of an infrastructure for the interdisciplinary Waste Management Institute (WMI). The Interdisciplinary Waste Management Institute (WMI) was approved in June, 1994 by the General Administration of the University of North Carolina as an academic support unit with research and public service functions. The mission of the WMI is to enhance awareness and understanding of waste management issues and to provide instructional support including research and outreach. The goals of WMI are as follows: increase the number of minority professionals who will work in waste management fields; develop cooperative and exchange programs involving faculty, students, government, and industry; serve as institutional sponsor of public awareness workshops and lecture series; and support interdisciplinary research programs. The vision of the WMI is to provide continued state-of-the art environmental educational programs, research, and outreach.

  12. Legislation and regulatory infrastructure for the safety of radioactive waste management

    Hoegberg, L.

    2000-01-01

    The essential generic characteristics of a national legislative and regulatory system for the safety of radioactive waste management are defined and discussed. The Joint Convention on the Safety of Spent Fuel Management and on the Safety of Radioactive Waste Management as well as other relevant international legal instruments and guidelines are discussed. Special emphasis is given to the following characteristics of a national legislative and regulatory system: (i) definition of responsibilities, (ii) financing of future costs, (iii) nuclear and radiation safety requirements, (iv) siting and licensing procedures, (v) regulatory functions, and (vi) international co-operation. It is concluded that there exists an internationally endorsed basis for establishing effective national legislation and regulatory infrastructures for the safety of radioactive waste management. It is underlined that the continuing internationalization of the nuclear industry stresses the need for national legislation and regulatory infrastructure to be based on such internationally endorsed principles and standards. It is pointed out that regulators are accountable to the public and have to gain public trust by being active in the public arena, demonstrating their competence and integrity. Finally, prescriptive and goal-oriented international safety regimes are briefly discussed in the light of experience so far gained with the Convention on Nuclear Safety. (author)

  13. Information gathering, management and transferring for geospatial intelligence - A conceptual approach to create a spatial data infrastructure

    Nunes, Paulo; Correia, Anacleto; Teodoro, M. Filomena

    2017-06-01

    Since long ago, information is a key factor for military organizations. In military context the success of joint and combined operations depends on the accurate information and knowledge flow concerning the operational theatre: provision of resources, environment evolution, targets' location, where and when an event will occur. Modern military operations cannot be conceive without maps and geospatial information. Staffs and forces on the field request large volume of information during the planning and execution process, horizontal and vertical geospatial information integration is critical for decision cycle. Information and knowledge management are fundamental to clarify an environment full of uncertainty. Geospatial information (GI) management rises as a branch of information and knowledge management, responsible for the conversion process from raw data collect by human or electronic sensors to knowledge. Geospatial information and intelligence systems allow us to integrate all other forms of intelligence and act as a main platform to process and display geospatial-time referenced events. Combining explicit knowledge with person know-how to generate a continuous learning cycle that supports real time decisions, mitigates the influences of fog of war and provides the knowledge supremacy. This paper presents the analysis done after applying a questionnaire and interviews about the GI and intelligence management in a military organization. The study intended to identify the stakeholder's requirements for a military spatial data infrastructure as well as the requirements for a future software system development.

  14. Optimization Modeling and Decision Support for Wireless Infrastructure Deployment in Disaster Planning and Management

    Bartolacci, Michael R.; Mihovska, Albena D.; Ozceylan, Dilek

    2013-01-01

    Natural disasters and emergencies create the need for communication between and among the affected populace and emergency responders as well as other parties such as governmental agencies and aid organizations. Such communications include the dissemination of key information such as evacuation...... orders and locations of emergency shelters. In particular, the coordination of efforts between responding organizations require additional communication solutions that typically rely heavily on wireless communications to complement fixed line infrastructure due to the ease of use and portability. While...... the deployment of temporary mobile networks and other wireless equipment following disasters has been successfully accomplished by governmental agencies and network providers following previous disasters, there appears to be little optimization effort involved with respect to maximizing key performance measures...

  15. Rapid assessment of infrastructure of primary health care facilities - a relevant instrument for health care systems management.

    Scholz, Stefan; Ngoli, Baltazar; Flessa, Steffen

    2015-05-01

    Health care infrastructure constitutes a major component of the structural quality of a health system. Infrastructural deficiencies of health services are reported in literature and research. A number of instruments exist for the assessment of infrastructure. However, no easy-to-use instruments to assess health facility infrastructure in developing countries are available. Present tools are not applicable for a rapid assessment by health facility staff. Therefore, health information systems lack data on facility infrastructure. A rapid assessment tool for the infrastructure of primary health care facilities was developed by the authors and pilot-tested in Tanzania. The tool measures the quality of all infrastructural components comprehensively and with high standardization. Ratings use a 2-1-0 scheme which is frequently used in Tanzanian health care services. Infrastructural indicators and indices are obtained from the assessment and serve for reporting and tracing of interventions. The tool was pilot-tested in Tanga Region (Tanzania). The pilot test covered seven primary care facilities in the range between dispensary and district hospital. The assessment encompassed the facilities as entities as well as 42 facility buildings and 80 pieces of technical medical equipment. A full assessment of facility infrastructure was undertaken by health care professionals while the rapid assessment was performed by facility staff. Serious infrastructural deficiencies were revealed. The rapid assessment tool proved a reliable instrument of routine data collection by health facility staff. The authors recommend integrating the rapid assessment tool in the health information systems of developing countries. Health authorities in a decentralized health system are thus enabled to detect infrastructural deficiencies and trace the effects of interventions. The tool can lay the data foundation for district facility infrastructure management.

  16. Requirements for a systems-based research and development management process in transport infrastructure engineering

    Rust, FC

    2015-05-01

    Full Text Available are not suitable for the management of such multi-disciplinary projects. This study focuses on determining the key characteristics required for a systems-based approach to the management of R&D projects. The information and data was compiled from literature reviews...

  17. Infrastructure and clinical practice for the detection and management of trauma-associated haemorrhage and coagulopathy.

    Driessen, A; Schäfer, N; Albrecht, V; Schenk, M; Fröhlich, M; Stürmer, E K; Maegele, M

    2015-08-01

    Early detection and management of post-traumatic haemorrhage and coagulopathy have been associated with improved outcomes, but local infrastructures, logistics and clinical strategies may differ. To assess local differences in infrastructure, logistics and clinical management of trauma-associated haemorrhage and coagulopathy, we have conducted a web-based survey amongst the delegates to the 15th European Congress of Trauma and Emergency Surgery (ECTES) and the 2nd World Trauma (WT) Congress held in Frankfurt, Germany, 25-27 May 2014. 446/1,540 delegates completed the questionnaire yielding a response rate of 29%. The majority specified to work as consultants/senior physicians (47.3%) in general (36.1%) or trauma/orthopaedic surgery (44.5%) of level I (70%) or level II (19%) trauma centres. Clinical assessment (>80%) and standard coagulation assays (74.6%) are the most frequently used strategies for early detection and monitoring of bleeding trauma patients with coagulopathy. Only 30% of the respondents declared to use extended coagulation assays to better characterise the bleeding and coagulopathy prompted by more individualised treatment concepts. Most trauma centres (69%) have implemented local protocols based on international and national guidelines using conventional blood products, e.g. packed red blood cell concentrates (93.3%), fresh frozen plasma concentrates (93.3%) and platelet concentrates (83%), and antifibrinolytics (100%). 89% considered the continuous intake of anticoagulants including "new oral anticoagulants" and platelet inhibitors as an increasing threat to bleeding trauma patients. This study confirms differences in infrastructure, logistics and clinical practice for the detection and management of trauma-haemorrhage and trauma-associated coagulopathy amongst international centres. Ongoing work will focus on geographical differences.

  18. ARCUS Project Managers and the Intangible Infrastructure of Large Interdisciplinary Arctic Research Networks

    Myers, B.; Wiggins, H. V.; Turner-Bogren, E. J.; Warburton, J.

    2017-12-01

    Project Managers at the Arctic Research Consortium of the U.S. (ARCUS) lead initiatives to convene, communicate with, and connect the Arctic research community across challenging disciplinary, geographic, temporal, and cultural boundaries. They regularly serve as the organizing hubs, archivists and memory-keepers for collaborative projects comprised of many loosely affiliated partners. As leading organizers of large open science meetings and other outreach events, they also monitor the interdisciplinary landscape of community needs, concerns, opportunities, and emerging research directions. However, leveraging the ARCUS Project Manager role to strategically build out the intangible infrastructure necessary to advance Arctic research requires a unique set of knowledge, skills, and experience. Drawing on a range of lessons learned from past and ongoing experiences with collaborative science, education and outreach programming, this presentation will highlight a model of ARCUS project management that we believe works best to support and sustain our community in its long-term effort to conquer the complexities of Arctic research.

  19. Exploring Bim for Operational Integrated Asset Management - a Preliminary Study Utilising Real-World Infrastructure Data

    Boyes, G. A.; Ellul, C.; Irwin, D.

    2017-10-01

    The use of 3D information models within collaborative working environments and the practice of Building Information Modelling (BIM) are becoming more commonplace within infrastructure projects. Currently used predominantly during the design and construction phase, the use of BIM is capable in theory of providing the information at handover that will satisfy the Asset Information Requirements (AIRs) of the future Infrastructure Manager (IM). One particular challenge is establishing a link between existing construction-centric information and the asset-centric information needed for future operations. Crossrail, a project to build a new high-frequency railway underneath London, is handling many such challenges as they prepare to handover their digital information to the future operator, in particular the need to provide a two-way link between a federated 3D CAD model and an object-relational Asset Information Management System (AIMS). This paper focusses on the potential for improved Asset Management (AM) by integrating BIM and GIS systems and practices, and makes a preliminary report on how 3D spatial queries can be used to establish a two-way relational link between two information systems (3D geometry and asset lists), as well as the challenges being overcome to transform the data to be suitable for AM.

  20. Department of Energy Environmental Management cost infrastructure development program: Cost analysis requirements

    Custer, W.R. Jr.; Messick, C.D.

    1996-01-01

    This report was prepared to support development of the Department of Energy Environmental Management cost infrastructure -- a new capability to independently estimate and analyze costs. Currently, the cost data are reported according to a structure that blends level of effort tasks with product and process oriented tasks. Also. the budgetary inputs are developed from prior year funding authorizations and from contractor-developed parametric estimates that have been adjusted to planned funding levels or appropriations. Consequently, it is difficult for headquarters and field-level activities to use actual cost data and technical requirements to independently assess the costs generated and identify trends, potential cost savings from process improvements, and cost reduction strategies

  1. Towards a Unified University Infrastructure: The Data Management Roll-Out at the University of Oxford

    James A. J. Wilson

    2013-11-01

    Full Text Available Since presenting a paper at the International Digital Curation Conference 2010 conference entitled ‘An Institutional Approach to Developing Research Data Management Infrastructure’, the University of Oxford has come a long way in developing research data management (RDM policy, tools and training to address the various phases of the research data lifecycle. Work has now begun on integrating these various elements into a unified infrastructure for the whole university, under the aegis of the Data Management Roll-out at Oxford (Damaro Project.This paper will explain the process and motivation behind the project, and describes our vision for the future. It will also introduce the new tools and processes created by the university to tie the individual RDM components together. Chief among these is the ‘DataFinder’ – a hierarchically-structured metadata cataloguing system which will enable researchers to search for and locate research datasets hosted in a variety of different datastores from institutional repositories, through Web 2 services, to filing cabinets standing in department offices. DataFinder will be able to pull and associate research metadata from research information databases and data management plans, and is intended to be CERIF compatible. DataFinder is being designed so that it can be deployed at different levels within different contexts, with higher-level instances harvesting information from lower-level instances enabling, for example, an academic department to deploy one instance of DataFinder, which can then be harvested by another at an institutional level, which can then in turn be harvested by another at a national level.The paper will also consider the requirements of embedding tools and training within an institution and address the difficulties of ensuring the sustainability of an RDM infrastructure at a time when funding for such endeavours is limited. Our research shows that researchers (and indeed departments

  2. Oceans 2.0: a Data Management Infrastructure as a Platform

    Pirenne, B.; Guillemot, E.

    2012-04-01

    Oceans 2.0: a Data Management Infrastructure as a Platform Benoît Pirenne, Associate Director, IT, NEPTUNE Canada Eric Guillemot, Manager, Software Development, NEPTUNE Canada The Data Management and Archiving System (DMAS) serving the needs of a number of undersea observing networks such as VENUS and NEPTUNE Canada was conceived from the beginning as a Service-Oriented Infrastructure. Its core functional elements (data acquisition, transport, archiving, retrieval and processing) can interact with the outside world using Web Services. Those Web Services can be exploited by a variety of higher level applications. Over the years, DMAS has developed Oceans 2.0: an environment where these techniques are implemented. The environment thereby becomes a platform in that it allows for easy addition of new and advanced features that build upon the tools at the core of the system. The applications that have been developed include: data search and retrieval, including options such as data product generation, data decimation or averaging, etc. dynamic infrastructure description (search all observatory metadata) and visualization data visualization, including dynamic scalar data plots, integrated fast video segment search and viewing Building upon these basic applications are new concepts, coming from the Web 2.0 world that DMAS has added: They allow people equipped only with a web browser to collaborate and contribute their findings or work results to the wider community. Examples include: addition of metadata tags to any part of the infrastructure or to any data item (annotations) ability to edit and execute, share and distribute Matlab code on-line, from a simple web browser, with specific calls within the code to access data ability to interactively and graphically build pipeline processing jobs that can be executed on the cloud web-based, interactive instrument control tools that allow users to truly share the use of the instruments and communicate with each other and last

  3. Key management schemes using routing information frames in secure wireless sensor networks

    Kamaev, V. A.; Finogeev, A. G.; Finogeev, A. A.; Parygin, D. S.

    2017-01-01

    The article considers the problems and objectives of key management for data encryption in wireless sensor networks (WSN) of SCADA systems. The structure of the key information in the ZigBee network and methods of keys obtaining are discussed. The use of a hybrid key management schemes is most suitable for WSN. The session symmetric key is used to encrypt the sensor data, asymmetric keys are used to encrypt the session key transmitted from the routing information. Three algorithms of hybrid key management using routing information frames determined by routing methods and the WSN topology are presented.

  4. System Architecture Development for Energy and Water Infrastructure Data Management and Geovisual Analytics

    Berres, A.; Karthik, R.; Nugent, P.; Sorokine, A.; Myers, A.; Pang, H.

    2017-12-01

    Building an integrated data infrastructure that can meet the needs of a sustainable energy-water resource management requires a robust data management and geovisual analytics platform, capable of cross-domain scientific discovery and knowledge generation. Such a platform can facilitate the investigation of diverse complex research and policy questions for emerging priorities in Energy-Water Nexus (EWN) science areas. Using advanced data analytics, machine learning techniques, multi-dimensional statistical tools, and interactive geovisualization components, such a multi-layered federated platform is being developed, the Energy-Water Nexus Knowledge Discovery Framework (EWN-KDF). This platform utilizes several enterprise-grade software design concepts and standards such as extensible service-oriented architecture, open standard protocols, event-driven programming model, enterprise service bus, and adaptive user interfaces to provide a strategic value to the integrative computational and data infrastructure. EWN-KDF is built on the Compute and Data Environment for Science (CADES) environment in Oak Ridge National Laboratory (ORNL).

  5. Two Approaches for the Management of Virtual Machines on Grid Infrastructures

    Tapiador, D.; Rubio-Montero, A. J.; Juedo, E.; Montero, R. S.; Llorente, I. M.

    2007-01-01

    Virtual machines are a promising technology to overcome some of the problems found in current Grid infrastructures, like heterogeneity, performance partitioning or application isolation. This work shows a comparison between two strategies to manage virtual machines in Globus Grids. The first alternative is a straightforward deployment that does not require additional middle ware to be installed. It is only based on standard Grid services and is not bound to a given virtualization technology. Although this option is fully functional, it is only suitable for single process batch jobs. The second solution makes use of the Virtual Workspace Service which allows a remote client to securely negotiate and manage a virtual resource. This approach better exploits the potential benefits offered by the virtualization technology and provides a wider application range. (Author)

  6. Data Storage and Management for Global Research Data Infrastructures - Status and Perspectives

    Erwin Laure

    2013-07-01

    Full Text Available In the vision of Global Research Data Infrastructures (GRDIs, data storage and management plays a crucial role. A successful GRDI will require a common globally interoperable distributed data system, formed out of data centres, that incorporates emerging technologies and new scientific data activities. The main challenge is to define common certification and auditing frameworks that will allow storage providers and data communities to build a viable partnership based on trust. To achieve this, it is necessary to find a long-term commitment model that will give financial, legal, and organisational guarantees of digital information preservation. In this article we discuss the state of the art in data storage and management for GRDIs and point out future research directions that need to be tackled to implement GRDIs.

  7. Report by the study committee related to data held by energy network and infrastructure managers

    2017-01-01

    This study aimed at providing a view of the status of data related to energy and held by network and infrastructure managers and operators. It is notably based on about fifty hearings of regulated energy operators, providers, representatives of electricity producers, local authorities, representatives of public bodies awarding concession and exploitation, and consumer associations. The authors also met heat and water network operators, IT service companies, start-ups of the energy sector, and telecommunications operators, and representatives of French and European institutional bodies. Fifteen propositions have been formulated which address the imperative of data consistence, quality and inter-operability, the clarification of the game of actors for an efficient governance of networks, the necessity of a consolidated confidence of consumers regarding the management of their data, and the activities of regulation (readability of analysis criteria, predictability of the resulting action)

  8. Robust and predictive fuzzy key performance indicators for condition-based treatment of squats in railway infrastructures

    Jamshidi, A.; Nunez Vicencio, Alfredo; Dollevoet, R.P.B.J.; Li, Z.

    2017-01-01

    This paper presents a condition-based treatment methodology for a type of rail surface defect called squat. The proposed methodology is based on a set of robust and predictive fuzzy key performance indicators. A fuzzy Takagi-Sugeno interval model is used to predict squat evolution for different

  9. SeaDataNet II - EMODNet - building a pan-European infrastructure for marine and ocean data management

    Schaap, Dick M. A.; Fichaut, Michele

    2014-05-01

    The second phase of the project SeaDataNet is well underway since October 2011 and is making good progress. The main objective is to improve operations and to progress towards an efficient data management infrastructure able to handle the diversity and large volume of data collected via research cruises and monitoring activities in European marine waters and global oceans. The SeaDataNet infrastructure comprises a network of interconnected data centres and a central SeaDataNet portal. The portal provides users a unified and transparent overview of the metadata and controlled access to the large collections of data sets, managed by the interconnected data centres, and the various SeaDataNet standards and tools,. Recently the 1st Innovation Cycle has been completed, including upgrading of the CDI Data Discovery and Access service to ISO 19139 and making it fully INSPIRE compliant. The extensive SeaDataNet Vocabularies have been upgraded too and implemented for all SeaDataNet European metadata directories. SeaDataNet is setting and governing marine data standards, and exploring and establishing interoperability solutions to connect to other e-infrastructures on the basis of standards of ISO (19115, 19139), OGC (WMS, WFS, CS-W and SWE), and OpenSearch. The population of directories has also increased considerably in cooperation and involvement in associated EU projects and initiatives. SeaDataNet now gives overview and access to more than 1.4 million data sets for physical oceanography, chemistry, geology, geophysics, bathymetry and biology from more than 90 connected data centres from 30 countries riparian to European seas. Access to marine data is also a key issue for the implementation of the EU Marine Strategy Framework Directive (MSFD). The EU communication 'Marine Knowledge 2020' underpins the importance of data availability and harmonising access to marine data from different sources. SeaDataNet qualified itself for leading the data management component of the

  10. Designing and implementing a key account management strategy

    M. A. Sisti

    2011-01-01

    Sales Management offers a global perspective on the opportunities and issues facing today's sales managers. Current textbooks have failed to move beyond the US context; Sales Management provides unique access to European and international experts, with globally relevant case studies.

  11. Development of the radioactive waste management infrastructure in Bulgaria - preconditions and challenges

    Ivanov, A.; Necheva, C.

    2004-01-01

    In Bulgaria there are preconditions for development of an effective system, considering the interdependence between all stages of radioactive waste /RAW/ generation and management. The national infrastructure of RAW management is built up in accordance of the classical triangle principle, i.e. the main responsibilities are of the Regulatory body, waste producers and newly created State Enterprise RAW. The organization of the infrastructure is legislatively established and aims at application of the basic internationally adopted principles of radioactive waste management. The national policy is directed towards spent fuel and radioactive waste management in a safe, economic, comprehensive and integrated approach, where the historical aspect and contemporary trends, the country's scientific, technical and financial resources are considered, and the responsibilities of the state and of the nuclear facilities operators are clearly defined. The strategic purposes of the policy and the measures for their achievement are formulated in the National Strategy on Safe Management of Spent Fuel and Radioactive Waste. The tendency is a joint national system for management of spent fuel and radioactive waste from nuclear power production and nuclear applications to be established. Decisions for storage of high level waste from spent fuel reprocessing, as well as of spent fuel, are considered in long-term perspective and possibilities at regional level are analyzed as well. The safe and effective RAW management is a precondition for the sustainable development of the Bulgarian nuclear program, including decommissioning of units 1 and 2 of Kozloduy NPP, completion of the Belene NPP construction, and use of the benefits offered by the radiation technologies. The main challenges are connected with: Establishment of a new RAW classification and of clearance levels; Encouraging the re-use and/or recycling of radioactive materials, equipment and buildings, within the framework of the

  12. Incorporating Green Infrastructure into Water Resources Management Plans to Address Water Quality Impairments

    Piscopo, A. N.; Detenbeck, N. E.

    2017-12-01

    Managers of urban watersheds with excessive nutrient loads are more frequently turning to green infrastructure (GI) to manage their water quality impairments. The effectiveness of GI is dependent on a number of factors, including (1) the type and placement of GI within the watershed, (2) the specific nutrients to be treated, and (3) the uncertainty in future climates. Although many studies have investigated the effectiveness of individual GI units for different types of nutrients, relatively few have considered the effectiveness of GI on a watershed scale, the scale most relevant to management plans. At the watershed scale, endless combinations of GI type and location are possible, each with different effectiveness in reducing nutrient loads, minimizing costs, and maximizing co-benefits such as reducing runoff. To efficiently generate management plan options that balance the tradeoffs between these objectives, we simulate candidate options using EPA's Stormwater Management Model for multiple future climates and determine the Pareto optimal set of solution options using a multi-objective evolutionary algorithm. Our approach is demonstrated for an urban watershed in Rockville, Maryland.

  13. Buyer's participation and well developed domestic infrastructure. Keys to successful introduction of nuclear power in a small country

    Numminen, K.; Laine, P.

    1983-01-01

    Nuclear power is advantageous for a small country such as Finland which does not possess indigenous fossil fuel. For instance, the cost of imports required by nuclear fuel is essentially smaller than the cost of production of electric energy based on coal or fuel oil. In Finland the advantageousness of nuclear power was already proved in the 1950s but before starting the first power plant project it took 15 years to develop step by step the required infrastructure: building the research institutes and training their staff, creating connections to the international organizations and elsewhere abroad, training Finnish design staff, developing the domestic industry to the high quality required by nuclear power, and establishing the necessary authorities and public administration. Thanks to thorough preparation the implementation of the plant projects progressed at a good pace in the 1970s. The lesson learned from operation of the plants is that in a small country - located far from its main supplier - the staff at the plant and the supporting staff in the power company have to be able to analyse the problems occurring, usually in the conventional equipment, and carry out quick repairs without aid from the main supplier. This requires a high level of educational attainment from the staff and the best way to achieve this is for the staff to participate in the design and construction as much as possible already in the implementation phase. In order to maintain high availability, the capability of the domestic industry must also be good - especially in the fields of mechanical industry and electronics. In Finland over 30% of electric energy was produced in 1981 by four nuclear units. Two of these were built as manifold east-west adjustment work with the Soviet supplier and the other two are of Swedish origin

  14. Equipment Management for Sensor Networks: Linking Physical Infrastructure and Actions to Observational Data

    Jones, A. S.; Horsburgh, J. S.; Matos, M.; Caraballo, J.

    2015-12-01

    Networks conducting long term monitoring using in situ sensors need the functionality to track physical equipment as well as deployments, calibrations, and other actions related to site and equipment maintenance. The observational data being generated by sensors are enhanced if direct linkages to equipment details and actions can be made. This type of information is typically recorded in field notebooks or in static files, which are rarely linked to observations in a way that could be used to interpret results. However, the record of field activities is often relevant to analysis or post-processing of the observational data. We have developed an underlying database schema and deployed a web interface for recording and retrieving information on physical infrastructure and related actions for observational networks. The database schema for equipment was designed as an extension to the Observations Data Model 2 (ODM2), a community-developed information model for spatially discrete, feature based earth observations. The core entities of ODM2 describe location, observed variable, and timing of observations, and the equipment extension contains entities to provide additional metadata specific to the inventory of physical infrastructure and associated actions. The schema is implemented in a relational database system for storage and management with an associated web interface. We designed the web-based tools for technicians to enter and query information on the physical equipment and actions such as site visits, equipment deployments, maintenance, and calibrations. These tools were implemented for the iUTAH (innovative Urban Transitions and Aridregion Hydrosustainability) ecohydrologic observatory, and we anticipate that they will be useful for similar large-scale monitoring networks desiring to link observing infrastructure to observational data to increase the quality of sensor-based data products.

  15. Risk-informed Management of Water Infrastructure in the United States: History, Development, and Best Practices

    Wolfhope, J.

    2017-12-01

    This presentation will focus on the history, development, and best practices for evaluating the risks associated with the portfolio of water infrastructure in the United States. These practices have evolved from the early development of the Federal Guidelines for Dam Safety and the establishment of the National Dam Safety Program, to the most recent update of the Best Practices for Dam and Levee Risk Analysis jointly published by the U.S. Department of Interior Bureau of Reclamation and the U.S. Army Corps of Engineers. Since President Obama signed the Water Infrastructure Improvements for the Nation Act (WIIN) Act, on December 16, 2016, adding a new grant program under FEMA's National Dam Safety Program, the focus has been on establishing a risk-based priority system for use in identifying eligible high hazard potential dams for which grants may be made. Finally, the presentation provides thoughts on the future direction and priorities for managing the risk of dams and levees in the United States.

  16. Managing urban stormwater for urban sustainability: Barriers and policy solutions for green infrastructure application.

    Dhakal, Krishna P; Chevalier, Lizette R

    2017-12-01

    Green infrastructure (GI) revitalizes vegetation and soil, restores hydro-ecological processes destroyed by traditional urbanization, and naturally manages stormwater on-site, offering numerous sustainability benefits. However, despite being sustainable and despite being the object of unrelenting expert advocacy for more than two decades, GI implementation remains slow. On the other hand, the practice of traditional gray infrastructure, which is known to have significant adverse impacts on the environment, is still ubiquitous in urban areas throughout the world. This relationship between knowledge and practice seems unaccountable, which has not yet received adequate attention from academia, policy makers, or research communities. We deal with this problem in this paper. The specific objective of the paper is to explore the barriers to GI, and suggest policies that can both overcome these barriers and expedite implementation. By surveying the status of implementation in 10 US cities and assessing the relevant city, state and federal policies, we identified 29 barriers and grouped them into 5 categories. The findings show that most of the barriers stem from cognitive limitations and socio-institutional arrangements. Accordingly, we suggest 33 policies, also grouped into 5 categories, which span from conducting public education and awareness programs to changing policies and governance structures. Copyright © 2017 Elsevier Ltd. All rights reserved.

  17. Trust Management Considerations For the Cooperative Infrastructure Defense Framework: Trust Relationships, Evidence, and Decisions

    Maiden, Wendy M.

    2009-12-01

    Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensors’ findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficient authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.

  18. The costs of uncoordinated infrastructure management in multi-reservoir river basins

    Jeuland, Marc; Baker, Justin; Bartlett, Ryan; Lacombe, Guillaume

    2014-01-01

    Though there are surprisingly few estimates of the economic benefits of coordinated infrastructure development and operations in international river basins, there is a widespread belief that improved cooperation is beneficial for managing water scarcity and variability. Hydro-economic optimization models are commonly-used for identifying efficient allocation of water across time and space, but such models typically assume full coordination. In the real world, investment and operational decisions for specific projects are often made without full consideration of potential downstream impacts. This paper describes a tractable methodology for evaluating the economic benefits of infrastructure coordination. We demonstrate its application over a range of water availability scenarios in a catchment of the Mekong located in Lao PDR, the Nam Ngum River Basin. Results from this basin suggest that coordination improves system net benefits from irrigation and hydropower by approximately 3–12% (or US$12-53 million/yr) assuming moderate levels of flood control, and that the magnitude of coordination benefits generally increases with the level of water availability and with inflow variability. Similar analyses would be useful for developing a systematic understanding of the factors that increase the costs of non-cooperation in river basin systems worldwide, and would likely help to improve targeting of efforts to stimulate complicated negotiations over water resources. (paper)

  19. Geo-Seas - building a unified e-infrastructure for marine geoscientific data management in Europe

    Glaves, H.; Schaap, D.

    2012-04-01

    A significant barrier to marine geoscientific research in Europe is the lack of standardised marine geological and geophysical data and data products which could potentially facilitate multidisciplinary marine research extending across national and international boundaries. Although there are large volumes of geological and geophysical data available for the marine environment it is currently very difficult to use these datasets in an integrated way due to different nomenclatures, formats, scales and coordinate systems being used within different organisations as well as between countries. This makes the direct use of primary data very difficult and also hampers use of the data to produce integrated multidisciplinary data products and services. The Geo-Seas project, an EU Framework 7 funded initiative, is developing a unified e-infrastructure to facilitate the sharing of marine geoscientific data within Europe. This e-infrastructure is providing on-line access to both discovery metadata and the associated federated data sets from 26 European data centres via a dedicated portal. The implementation of the Geo-Seas portal is allowing a range of end users to locate, assess and access standardised geoscientific data from multiple sources which is interoperable with other marine data types. Geo-Seas is building on the work already done by the existing SeaDataNet project which currently provides a data management e-infrastructure for oceanographic data which allows users to locate and access federated oceanographic data sets. By adopting and adapting the SeaDataNet methodologies and technologies the Geo-Seas project has not only avoid unnecessary duplication of effort by reusing existing and proven technologies but also contributed to the development of a multidisciplinary approach to ocean science across Europe through the creation of a joint infrastructure for both marine geoscientific and oceanographic data. This approach is also leading to the development of

  20. A Cache Considering Role-Based Access Control and Trust in Privilege Management Infrastructure

    ZHANG Shaomin; WANG Baoyi; ZHOU Lihua

    2006-01-01

    PMI(privilege management infrastructure) is used to perform access control to resource in an E-commerce or E-government system. With the ever-increasing need for secure transaction, the need for systems that offer a wide variety of QoS (quality-of-service) features is also growing. In order to improve the QoS of PMI system, a cache based on RBAC(Role-based Access Control) and trust is proposed. Our system is realized based on Web service. How to design the cache based on RBAC and trust in the access control model is described in detail. The algorithm to query role permission in cache and to add records in cache is dealt with. The policy to update cache is introduced also.

  1. RANCANGAN INFORMATION TECHNOLOGY SERVICE MANAGEMENT MENGGUNAKAN INFORMATION TECHNOLOGY INFRASTRUCTURE LIBRARY (Studi Kasus: STMIK AMIKOM Purwokerto

    Nurfaizah Nurfaizah

    2015-08-01

    Full Text Available STMIK AMIKOM Purwokerto merupakan salah satu perguruan tinggi swasta yang dalam proses pengelolaan dan  penyampaian informasi telah menerapan teknologi informasi. Proses pelayanan suatu perguruan tinggi dipandang sebagai suatu solusi yang nantinya dapat meningkatkan kemampuan perusahaan di dalam pelayanan. Hal ini menyebabkan pentingnya peningkatan peran teknologi informasi agar selaras dengan  investasi baik hardware dan software yang dikeluarkan, sehingga dibutuhkan perencanaan yang optimal.IT Service Management (ITSM digunakan sebagai upaya untuk meningkatkan efisiensi pelayanan teknologi informasi kepada pengguna yang terdapat dalam framework Information Technology Infrastructure Library.Diharapkan dengan penerapan ITSM pengelolaan layanan TI menjadi lebih baik serta mampu menyelesaikan beberapa permasalahan yang ada pada organisasiyang sedang berjalan dengan menggunakan COBIT 4.1. ITSM menghasilkan perancangan pada masing-masing prosesnya dari 2 domain pembangun ITSM yaitu domain service support dan service delivery. Kata Kunci: ITSM, ITIL V3, COBIT 4.1

  2. First Joint Workshop on Energy Management for Large-Scale Research Infrastructures

    2011-01-01

      CERN, ERF (European Association of National Research Facilities) and ESS (European Spallation Source) announce the first Joint Workshop on Energy Management for Large-Scale Research Infrastructures. The event will take place on 13-14 October 2011 at the ESS office in Sparta - Lund, Sweden.   The workshop will bring together international experts on energy and representatives from laboratories and future projects all over the world in order to identify the challenges and best practice in respect of energy efficiency and optimization, solutions and implementation as well as to review the challenges represented by potential future technical solutions and the tools for effective collaboration. Further information at: http://ess-scandinavia.eu/general-information

  3. Infrastructure and clinical practice for the detection and management of trauma-associated haemorrhage and coagulopathy

    Driessen, Annemariek; Schäfer, N; Albrecht, V

    2015-01-01

    of trauma-associated haemorrhage and coagulopathy, we have conducted a web-based survey amongst the delegates to the 15th European Congress of Trauma and Emergency Surgery (ECTES) and the 2nd World Trauma (WT) Congress held in Frankfurt, Germany, 25-27 May 2014. RESULTS: 446/1,540 delegates completed...... frequently used strategies for early detection and monitoring of bleeding trauma patients with coagulopathy. Only 30% of the respondents declared to use extended coagulation assays to better characterise the bleeding and coagulopathy prompted by more individualised treatment concepts. Most trauma centres (69...... intake of anticoagulants including "new oral anticoagulants" and platelet inhibitors as an increasing threat to bleeding trauma patients. CONCLUSIONS: This study confirms differences in infrastructure, logistics and clinical practice for the detection and management of trauma-haemorrhage and trauma...

  4. A knowledge continuity management program for the energy, infrastructure and knowledge systems center, Sandia National Laboratories.

    Menicucci, David F.

    2006-07-01

    A growing recognition exists in companies worldwide that, when employees leave, they take with them valuable knowledge that is difficult and expensive to recreate. The concern is now particularly acute as the large ''baby boomer'' generation is reaching retirement age. A new field of science, Knowledge Continuity Management (KCM), is designed to capture and catalog the acquired knowledge and wisdom from experience of these employees before they leave. The KCM concept is in the final stages of being adopted by the Energy, Infrastructure, and Knowledge Systems Center and a program is being applied that should produce significant annual cost savings. This report discusses how the Center can use KCM to mitigate knowledge loss from employee departures, including a concise description of a proposed plan tailored to the Center's specific needs and resources.

  5. Organizational agility key factors for dynamic business process management

    Triaa , Wafa; Gzara , Lilia; Verjus , Hervé

    2016-01-01

    International audience; For several years, Business Process Management (BPM) is recognized as a holistic management approach that promotes business effectiveness and efficiency. Increasingly, corporates find themselves, operating in business environments filled with unpredictable, complex and continuous change. Driven by these dynamic competitive conditions, they look for a dynamic management of their business processes to maintain their processes performance. To be competitive, companies hav...

  6. Drainage area characterization for evaluating green infrastructure using the Storm Water Management Model

    Lee, Joong Gwang; Nietch, Christopher T.; Panguluri, Srinivas

    2018-05-01

    Urban stormwater runoff quantity and quality are strongly dependent upon catchment properties. Models are used to simulate the runoff characteristics, but the output from a stormwater management model is dependent on how the catchment area is subdivided and represented as spatial elements. For green infrastructure modeling, we suggest a discretization method that distinguishes directly connected impervious area (DCIA) from the total impervious area (TIA). Pervious buffers, which receive runoff from upgradient impervious areas should also be identified as a separate subset of the entire pervious area (PA). This separation provides an improved model representation of the runoff process. With these criteria in mind, an approach to spatial discretization for projects using the US Environmental Protection Agency's Storm Water Management Model (SWMM) is demonstrated for the Shayler Crossing watershed (SHC), a well-monitored, residential suburban area occupying 100 ha, east of Cincinnati, Ohio. The model relies on a highly resolved spatial database of urban land cover, stormwater drainage features, and topography. To verify the spatial discretization approach, a hypothetical analysis was conducted. Six different representations of a common urbanscape that discharges runoff to a single storm inlet were evaluated with eight 24 h synthetic storms. This analysis allowed us to select a discretization scheme that balances complexity in model setup with presumed accuracy of the output with respect to the most complex discretization option considered. The balanced approach delineates directly and indirectly connected impervious areas (ICIA), buffering pervious area (BPA) receiving impervious runoff, and the other pervious area within a SWMM subcatchment. It performed well at the watershed scale with minimal calibration effort (Nash-Sutcliffe coefficient = 0.852; R2 = 0.871). The approach accommodates the distribution of runoff contributions from different spatial components and

  7. Lessons learned: Infrastructure development and financial management for large, publicly funded, international trials.

    Larson, Gregg S; Carey, Cate; Grarup, Jesper; Hudson, Fleur; Sachi, Karen; Vjecha, Michael J; Gordin, Fred

    2016-04-01

    Randomized clinical trials are widely recognized as essential to address worldwide clinical and public health research questions. However, their size and duration can overwhelm available public and private resources. To remain competitive in international research settings, advocates and practitioners of clinical trials must implement practices that reduce their cost. We identify approaches and practices for large, publicly funded, international trials that reduce cost without compromising data integrity and recommend an approach to cost reporting that permits comparison of clinical trials. We describe the organizational and financial characteristics of The International Network for Strategic Initiatives in Global HIV Trials, an infectious disease research network that conducts multiple, large, long-term, international trials, and examine challenges associated with simple and streamlined governance and an infrastructure and financial management model that is based on performance, transparency, and accountability. It is possible to reduce costs of participants' follow-up and not compromise clinical trial quality or integrity. The International Network for Strategic Initiatives in Global HIV Trials network has successfully completed three large HIV trials using cost-efficient practices that have not adversely affected investigator enthusiasm, accrual rates, loss-to-follow-up, adherence to the protocol, and completion of data collection. This experience is relevant to the conduct of large, publicly funded trials in other disease areas, particularly trials dependent on international collaborations. New approaches, or creative adaption of traditional clinical trial infrastructure and financial management tools, can render large, international clinical trials more cost-efficient by emphasizing structural simplicity, minimal up-front costs, payments for performance, and uniform algorithms and fees-for-service, irrespective of location. However, challenges remain. They

  8. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    Abercrombie, R. K. [ORNL; Peters, Scott [Sypris Electronics, LLC

    2014-05-28

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  9. Regulation of the energy infrastructure. Load management. Part 1. Fiscal aspects of energy networks

    Smits, L.

    2008-01-01

    The Dutch energy system depends on the presence of a good infrastructure. For many decades little attention was paid to infrastructure, but due to the liberalization infrastructure is receiving renewed attention. The grids are now considered the backbone of the energy system and essential for security of supply. Moreover, future electricity plants may have to adhere to the 'zero emission' demands in the future and (nearly) empty oil and gas fields will be used for underground storage of substances such as CO2. This new series addresses the existing and new regulation for the energy infrastructure. This edition addresses a number of fiscal aspects of the energy infrastructure. [mk] [nl

  10. SHAMROCK: A Synthesizable High Assurance Cryptography and Key Management Coprocessor

    2016-11-01

    cryptographic functions such as Advanced Encryption Standard ( AES ) [5] to produce keywraps to orchestrate key exchanges between groups of devices. These...Storage (MPMS). This is done for two reasons: first, the mission package is encrypted using AES keywrap mode with the CEK [7], which is a special version...Zone 1) denoting ephemeral secrets such as dynamic keys. AES encryption is employed as a one-way function leading from the ephemeral Zone 1 to the

  11. Regional Social Infrastructure Management as the Instrument for Improving the Quality of Life in the Ural Federal District

    Valentina Sergeyevna Antonyuk

    2015-09-01

    Full Text Available The article analyzes the processes of the social sphere and the effective operation of social infrastructure in order to improve the quality of life of the population in the Russian regions. Particular attention is paid to the role of the organizational and managerial component affecting usage performance of infrastructure objects and including regulation of the institutions of social infrastructure, planning and software. The purpose of the study is to evaluate the effectiveness of management of social infrastructure through the conjugation of immediate results (the dynamics of indicators of social services and outcomes (parameters of the quality of life of the population. The hypothesis of the study was the violation of the principle of infra-systematicity in the infrastructural support of the improvement of the quality of life in the Russian regions, due to the lack of effectiveness of public administration. In the study, the following methodological approaches are used: structural, factoral, systematic and evolutionary approaches to justify the conception, develop methodology and determine the impact of changes in the parameters of social infrastructure availability for the provided services, shifts in indexes of quality of life. The paper proposes the quantitative evaluation of the effectiveness of organizational management based on the diagnosis of the adequacy of the implementation of the principle of infra-systematicity in the functioning of social infrastructure on the basis of the elasticity coefficient. The proposed approach and the received analytical data on health, education, commerce, housing, culture and sport fields have allowed to range the regions of the Ural Federal District and highlight the areas of insufficient effectiveness of the organizational and management tool for improvement of life quality. The findings of the research may serve as a core for practical recommendations for executive bodies of administrative units of

  12. A Formally Verified Decentralized Key Management Architecture for Wireless Sensor Networks

    Law, Y.W.; Corin, R.J.; Etalle, Sandro; Hartel, Pieter H.

    We present a decentralized key management architecture for wireless sensor networks, covering the aspects of key deployment, key refreshment and key establishment. Our architecture is based on a clear set of assumptions and guidelines. Balance between security and energy consumption is achieved by

  13. Leadership – The Key Element in Improving Quality Management

    Iveta Paulová

    2011-10-01

    Full Text Available The present contribution is processed partial results of the survey application of leadership as one of the fundamental principles of quality management in organizations in the Slovak Republic. This survey was conducted in the research project VEGA No. 1/0229/08 Perspectives of quality management development in coherence with requirements of Slovak republic market. Results from the survey were the basis for proposals to improve the quality management in Slovak industrial organizations

  14. Financial Management: Opportunities to Improve Experience and Training of Key Navy Comptrollers

    1997-01-01

    .... Furthermore, accurate financial data are needed for measuring performance under GPRA. One key factor in agencies being able to achieve these objectives will be having trained and experienced financial management staff in key positions...

  15. Successful customer value management : Key lessons and emerging trends

    Verhoef, P.C.; Lemon, Katherine

    In the past decade, firms have paid increasing attention to customer value management (CVM). Through customer-centric management systems, firms aim to maximize customer value. In this article, we put forth six important lessons that firms can employ for successful CVM, integrating available research

  16. Quality Management and Key Performance Indicators in Oncologic Esophageal Surgery.

    Gockel, Ines; Ahlbrand, Constantin Johannes; Arras, Michael; Schreiber, Elke Maria; Lang, Hauke

    2015-12-01

    Ranking systems and comparisons of quality and performance indicators will be of increasing relevance for complex "high-risk" procedures such as esophageal cancer surgery. The identification of evidence-based standards relevant for key performance indicators in esophageal surgery is essential for establishing monitoring systems and furthermore a requirement to enhance treatment quality. In the course of this review, we analyze the key performance indicators case volume, radicality of resection, and postoperative morbidity and mortality, leading to continuous quality improvement. Ranking systems established on this basis will gain increased relevance in highly complex procedures within the national and international comparison and furthermore improve the treatment of patients with esophageal carcinoma.

  17. Geo-Seas - a pan-European infrastructure for the management of marine geological and geophysical data.

    Glaves, Helen; Graham, Colin

    2010-05-01

    Geo-Seas - a pan-European infrastructure for the management of marine geological and geophysical data. Helen Glaves1 and Colin Graham2 on behalf of the Geo-Seas consortium The Geo-Seas project will create a network of twenty six European marine geoscience data centres from seventeen coastal countries including six from the Baltic Sea area. This will be achieved through the development of a pan-European infrastructure for the exchange of marine geoscientific data. Researchers will be able to locate and access harmonised and federated marine geological and geophysical datasets and data products held by the data centres through the Geo-Seas data portal, using a common data catalogue. The new infrastructure, an expansion of the exisiting SeaDataNet, will create an infrastructure covering oceanographic and marine geoscientific data. New data products and services will be developed following consultations with users on their current and future research requirements. Common data standards will be implemented across all of the data centres and other geological and geophysical organisations will be encouraged to adopt the protocols, standards and tools which are developed as part of the Geo-Seas project. Oceanographic and marine data include a wide range of variables, an important category of which are the geological and geophysical data sets. This data includes raw observational and analytical data as well as derived data products from seabed sediment samples, boreholes, geophysical surveys (seismic, gravity etc) and sidescan sonar surveys. All of which are essential in order to produce a complete interpretation of seabed geology. Despite there being a large volume of geological and geophysical data available for the marine environment it is currently very difficult to use these datasets in an integrated way between organisations due to different nomenclatures, formats, scales and coordinate systems being used within different organisations and also within different

  18. The role of primary care in adult weight management: qualitative interviews with key stakeholders in weight management services

    Blane, David N.; Macdonald, Sara; Morrison, David; O’Donnell, Catherine A.

    2017-01-01

    Background Primary care has a key role to play in the prevention and management of obesity, but there remain barriers to engagement in weight management by primary care practitioners. The aim of this study was to explore the views of key stakeholders in adult weight management services on the role of primary care in adult weight management. Methods Qualitative study involving semi-structured interviews with nine senior dietitians involved in NHS weight management from seven Scottish health bo...

  19. Lbs Augmented Reality Assistive System for Utilities Infrastructure Management Through Galileo and Egnos

    Stylianidis, E.; Valaria, E.; Smagas, K.; Pagani, A.; Henriques, J.; Garca, A.; Jimeno, E.; Carrillo, I.; Patias, P.; Georgiadis, C.; Kounoudes, A.; Michail, K.

    2016-06-01

    There is a continuous and increasing demand for solutions, both software and hardware-based, that are able to productively handle underground utilities geospatial data. Innovative approaches that are based on the use of the European GNSS, Galileo and EGNOS, sensor technologies and LBS, are able to monitor, document and manage utility infrastructures' data with an intuitive 3D augmented visualisation and navigation/positioning technology. A software and hardware-based system called LARA, currently under develop- ment through a H2020 co-funded project, aims at meeting that demand. The concept of LARA is to integrate the different innovative components of existing technologies in order to design and develop an integrated navigation/positioning and information system which coordinates GNSS, AR, 3D GIS and geodatabases on a mobile platform for monitoring, documenting and managing utility infrastruc- tures on-site. The LARA system will guide utility field workers to locate the working area by helping them see beneath the ground, rendering the complexity of the 3D models of the underground grid such as water, gas and electricity. The capacity and benefits of LARA are scheduled to be tested in two case studies located in Greece and the United Kingdom with various underground utilities. The paper aspires to present the first results from this initiative. The project leading to this application has received funding from the European GNSS Agency under the European Union's Horizon 2020 research and innovation programme under grant agreement No 641460.

  20. The Resource Hazards Model for the Critical Infrastructure of the State Emergency Management Process

    Ostrowska Teresa

    2014-08-01

    Full Text Available This paper presents an investigation of the relevant factors related to the construction of a resource model which is designed to be useful in the management processes of the operation of critical infrastructure (CI for state emergencies. The genesis of the research lay in the perceived need for effective protection of multidimensional CI methodologies, and it was influenced by the nature of the physical characteristics of the available resources. It was necessary to establish a clear structure and well defined objectives and to assess the functional and structural resources required, as well as the potential relational susceptibilities deriving from a number of possible threats and the possible seriousness of a specific range of incidents and their possible consequences. The interdependence of CI stocks is shown by the use of tables of resource classes. The dynamics of the interaction of CI resources are modeled by examining how using clusters of potential risks can at any given time create a class of compounds related to susceptibilities and threats to the resources. As a result, the model can be used to conduct multi-dimensional risk calculations for crisis management CI resource configurations.

  1. Closing the water cycle - the key role of water and wastewater management in a circular economy

    Uhlenbrook, Stefan; Connor, Rick; Koncagul, Engin; Ortigara, Angela

    2017-04-01

    Planetary water boundaries are exceeded locally and regionally as water demand and use are escalating and per capita water availability is decreasing. However, wastewater represents an alternative yet reliable source containing for instance, nutrients (for use as fertilizer) and metals that can be extracted, and can be a source of energy. These characteristics mean that water and wastewater are set to play a key role in the circular economy. Furthermore, wastewater use can generate business opportunities and enhance water, food and energy security, therefore helping to alleviate poverty. However, to increase the collection, treatment and use of wastewater, investments in infrastructure and appropriate (low cost) technologies are needed. Ensuring the development of human and institutional capacity is also essential for proper wastewater management. The UN World Water Assessment Programme (WWAP) produces together with several UN-Water Members and Partners the annual World Water Development Report (WWDR). Its 2017 edition "Wastewater: The Untapped Resource" focuses on the critical role of wastewater management for vibrant economies, resilient societies and the maintenance of a healthy environment. Wastewater issues play also a central role in the 2030 Agenda for Sustainable Development, most notably through Sustainable Development Goal (SDG) target 6.3 that aims to improve water quality by reducing the proportion of untreated wastewater released to the environment and increasing its recycling and safe reuse globally. This target is interlinked with several other targets of SDG 6 ('the water goal') as well as to several other SDGs that relate to, poverty reduction, health, energy and food security, among others. The main policy-relevant messages of the WWDR 2017 will be introduced and linked to socio-hydrological approaches. These messages are an important input to the implementation of the water research agenda of the Panta Rhei initiative of IAHS.

  2. Determinants of Key Account Management Effectiveness: The Case ...

    Ethiopian Journal of Business and Economics (The) ... the postulated seven determinants of KAM effectiveness (strategy, solution, people, management, ... The findings provide the empirical application of the KAM model theorized by Zupancic ...

  3. Key challenges facing water resource management in South Africa

    Ashton, P

    2008-11-01

    Full Text Available Resource Managers The Dichotomy of Water Source of destruction, dispute and poverty • Drought and desertification • Flooding and erosion • Salinization • Malnutrition and starvation • Contamination • Epidemics and diseases • Dispute...

  4. Infrastructure Commons in Economic Perspective

    Frischmann, Brett M.

    This chapter briefly summarizes a theory (developed in substantial detail elsewhere)1 that explains why there are strong economic arguments for managing and sustaining infrastructure resources in an openly accessible manner. This theory facilitates a better understanding of two related issues: how society benefits from infrastructure resources and how decisions about how to manage or govern infrastructure resources affect a wide variety of public and private interests. The key insights from this analysis are that infrastructure resources generate value as inputs into a wide range of productive processes and that the outputs from these processes are often public goods and nonmarket goods that generate positive externalities that benefit society as a whole. Managing such resources in an openly accessible manner may be socially desirable from an economic perspective because doing so facilitates these downstream productive activities. For example, managing the Internet infrastructure in an openly accessible manner facilitates active citizen involvement in the production and sharing of many different public and nonmarket goods. Over the last decade, this has led to increased opportunities for a wide range of citizens to engage in entrepreneurship, political discourse, social network formation, and community building, among many other activities. The chapter applies these insights to the network neutrality debate and suggests how the debate might be reframed to better account for the wide range of private and public interests at stake.

  5. Key Practice for Green Building Management In Malaysia

    Aghili Nasim; Bin Mohammed Abdul Hakim; Sheau-Ting Low

    2016-01-01

    This paper identifies the management practices for green building management in Malaysia. A set of practices was ascertained from the reviewed of various established Green Building Standard in the world. Green building practices are significant role in attaining sustainability particularly in the construction industry. Green building is constructed for minimizing impacts to environment as well as decreasing building effects on occupants. To achieve the goals of green buildings, set of managem...

  6. Managing the pursuit of health and wealth: the key challenges.

    Fidler, David P; Drager, Nick; Lee, Kelley

    2009-01-24

    This article forms part of a six-part Series on trade and health, and sets the stage for this Series by analysing key aspects of the relationship between trade and health. The Series takes stock of this relation and provides timely analysis of the key challenges facing efforts to achieve an appropriate balance between trade and health across a diverse range of issues. This introductory article reviews how trade and health have risen and expanded on global policy agendas in the past decade in unprecedented ways, describes how trade and health issues are respectively governed in international relations, examines the ongoing search for policy coherence between the two policy spheres, and highlights the topics of the remaining articles in the Series.

  7. Managing Water in the Rural-Urban Interface : the Key to Climate ...

    Managing Water in the Rural-Urban Interface : the Key to Climate Change Resilient Cities ... cities - one in East and the other in West Africa - through better management ... Sustaining water use : stakeholders' strategies under different climate ...

  8. Customer service: the key to remaining competitive in managed care.

    Howard, J E

    2000-01-01

    The health care industry is undergoing a rapid transformation to meet the ever-increasing needs and demands of its patient population. Employers and managed care organizations are demanding better service and higher quality care, while providers are trying to tackle reimbursement cutbacks, streamlining of services, and serving a diverse population. Providers have begun to realize that to overcome these obstacles and meet the needs of their health plans and consumers, they must focus on the demands of their customers. Health care organizations have found they can meet the demands of both the consumer and the managed care industry through initiating and maintaining a customer service program. This essay explains the importance of customer service and its link to success in the managed care environment.

  9. Program management: The keys to a successful ERWM contract

    Lenyk, R.G.; Cusack, J.G.

    1995-01-01

    Program management for a large Environmental Restoration and Waste Management (ERWM) task order contract is both a skill and an art. Unlike project management, program management deals with global and political issues, with both client and home organizations, as well as with day-to-day operations. Program management requires up-front planning and nurturing, for no contract matures successfully by itself. This paper identifies the many opportunities presented in the planning and initial implementation of the contract. Potential traps are identified so that they can be recognized and avoided or mitigated. Teaming and subcontracting are also addressed. The authors rely on years of program management experience to explore such questions as the following: Can you have an integrated team? What needs to be done before you sign Your contract? Do you know who your client(s) is(are)? Have you incorporated the relevant, especially any new, procurement strategies? The US Department of Energy-Oak Ridge Operations (DOE-ORO) ERWM Remedial Design Contract with Foster Wheeler Environmental Corporation is used as a model for exploring these topics. This ERWM Program-which focuses on the Oak Ridge National Laboratory, the Y-12 Weapons Plant, and the K-25 Site in Oak Ridge, Tennessee; the Paducah Gaseous Diffusion Plant in Paducah, Kentucky; and the Portsmouth Gaseous Diffusion Plant in Portsmouth, Ohio-is in its fifth year with over 225 task orders. The program has been highly successful and has obtained from DOE outstanding marks for achieving quality, responsiveness, timeliness, and subcontracting goals

  10. Networking: A Key to Career Communication and Management Consulting Success

    Clark, Thomas

    2009-01-01

    Now that job security with one organization is a relic of the past and companies are outsourcing training and other "nonessential" functions, the author suggests in his career communication classes that students develop the same inventive strategies to plan their employment futures that management consultants use to market themselves in the 21st…

  11. Key characteristics relevant for selecting knowledge management software tools

    Smuts, H

    2011-07-01

    Full Text Available The shift to knowledge as the primary source of value results in the new economy being led by those who manage knowledge effectively. Today’s organisations are creating and leveraging knowledge, data and information at an unprecedented pace – a...

  12. Key Institutions in Business and Management Education Research

    Fornaciari, Charles J.; Arbaugh, J. B.; Asarta, Carlos J.; Bento, Regina F.; Hwang, Alvin; Lund Dean, Kathy

    2017-01-01

    The authors investigate institutional productivity in business and management education (BME) research based on the analysis of 4,464 articles published by 7,210 authors across 17 BME journals over a 10-year period, involving approximately 1,900 schools worldwide. Departing from traditional disciplinary silos, they examine the BME research field…

  13. Waste to energy – key element for sustainable waste management

    Brunner, Paul H.; Rechberger, Helmut

    2015-01-01

    Highlights: • First paper on the importance of incineration from a urban metabolism point of view. • Proves that incineration is necessary for sustainable waste management. • Historical and technical overview of 100 years development of MSW incineration. - Abstract: Human activities inevitably result in wastes. The higher the material turnover, and the more complex and divers the materials produced, the more challenging it is for waste management to reach the goals of “protection of men and environment” and “resource conservation”. Waste incineration, introduced originally for volume reduction and hygienic reasons, went through a long and intense development. Together with prevention and recycling measures, waste to energy (WTE) facilities contribute significantly to reaching the goals of waste management. Sophisticated air pollution control (APC) devices ensure that emissions are environmentally safe. Incinerators are crucial and unique for the complete destruction of hazardous organic materials, to reduce risks due to pathogenic microorganisms and viruses, and for concentrating valuable as well as toxic metals in certain fractions. Bottom ash and APC residues have become new sources of secondary metals, hence incineration has become a materials recycling facility, too. WTE plants are supporting decisions about waste and environmental management: They can routinely and cost effectively supply information about chemical waste composition as well as about the ratio of biogenic to fossil carbon in MSW and off-gas

  14. Cultural Intelligence as a Key Construct for Global Talent Management

    Bücker, J.J.L.E.; Al Ariss, A.

    2014-01-01

    This chapter focuses on the competencies needed to undertake global talent management (GTM), according to the concept of cultural intelligence (CQ) and its four main dimensions. Using real-world examples and excerpts from interviews with relevant actors in this field, this chapter outlines the CQ

  15. Key Elements of the Tutorial Support Management Model

    Lynch, Grace; Paasuke, Philip

    2011-01-01

    In response to an exponential growth in enrolments the "Tutorial Support Management" (TSM) model has been adopted by Open Universities Australia (OUA) after a two-year project on the provision of online tutor support in first year, online undergraduate units. The essential focus of the TSM model was the development of a systemic approach…

  16. Resource management as a key factor for sustainable urban planning

    Agudelo Vera, C.M.; Mels, A.R.; Keesman, K.J.; Rijnaarts, H.H.M.

    2011-01-01

    Due to fast urbanization and increasing living standards, the environmental sustainability of our global society becomes more and more questionable. In this historical review we investigate the role of resources management (RM) and urban planning (UP) and propose ways for integration in sustainable

  17. Media Management Education: Key Themes, Pedagogies, and Challenges

    Förster, Kati; Rohn, Ulrike

    2015-01-01

    The media sphere has changed significantly as a result of globalization, technology, and new habits of media use. Scholars in journalism and mass communication thus call on a transformation and reinvention of higher education in the field. The purpose of this article is to investigate how media management is taught across different institutions,…

  18. Waste to energy – key element for sustainable waste management

    Brunner, Paul H., E-mail: paul.h.brunner@tuwien.ac.at; Rechberger, Helmut

    2015-03-15

    Highlights: • First paper on the importance of incineration from a urban metabolism point of view. • Proves that incineration is necessary for sustainable waste management. • Historical and technical overview of 100 years development of MSW incineration. - Abstract: Human activities inevitably result in wastes. The higher the material turnover, and the more complex and divers the materials produced, the more challenging it is for waste management to reach the goals of “protection of men and environment” and “resource conservation”. Waste incineration, introduced originally for volume reduction and hygienic reasons, went through a long and intense development. Together with prevention and recycling measures, waste to energy (WTE) facilities contribute significantly to reaching the goals of waste management. Sophisticated air pollution control (APC) devices ensure that emissions are environmentally safe. Incinerators are crucial and unique for the complete destruction of hazardous organic materials, to reduce risks due to pathogenic microorganisms and viruses, and for concentrating valuable as well as toxic metals in certain fractions. Bottom ash and APC residues have become new sources of secondary metals, hence incineration has become a materials recycling facility, too. WTE plants are supporting decisions about waste and environmental management: They can routinely and cost effectively supply information about chemical waste composition as well as about the ratio of biogenic to fossil carbon in MSW and off-gas.

  19. [Access to prenatal care and quality of care in the Family Health Strategy: infrastructure, care, and management].

    Guimarães, Wilderi Sidney Gonçalves; Parente, Rosana Cristina Pereira; Guimarães, Thayanne Louzada Ferreira; Garnelo, Luiza

    2018-05-10

    This study focuses on access to prenatal care and quality of care in the Family Health Strategy in Brazil as a whole and in the North region, through evaluation of infrastructure characteristics in the health units, management, and supply of care provided by the teams, from the perspective of regional and state inequalities. A cross-sectional evaluative and normative study was performed, drawing on the external evaluation component of the second round of the Program for Improvement of Access and Quality of Primary Care, in 2013-2014. The results revealed the inadequacy of the primary healthcare network's infrastructure for prenatal care, low adequacy of clinical actions for quality of care, and the teams' low management capacity to guarantee access and quality of care. In the distribution according to geopolitical regions, the findings pertaining to the units' infrastructure indicate a direct relationship between the infrastructure's adequacy and social contexts with higher municipal human development indices and income. For the clinical actions in patient care, the teams in all the regions scored low on adequacy, with slightly better results in the North and South regions of the country. There were important differences between the states of the North, and the states with higher mean income and human development scored higher on adequacy. The results indicate important organizational difficulties in both access and quality of care provided by the health teams, in addition to visible insufficiency in management activities aimed to improve access and quality of prenatal care.

  20. Key Determinants of Human Resource Management in Hospitals: Stakeholder Perspective

    Buchelt Beata Irma

    2017-06-01

    Full Text Available Over the past decade, theoretical and empirical research on the various aspects of human resources (HR within the healthcare (HC sector has grown extensively due to its′ strategic importance in the sector. There is a visible tendency among researchers to pursue an effective human resource management (HRM strategies, methods, and tools. Countries implement policies which should increase the amount and competences of employees within healthcare. Providers of HC services (i.e. hospitals tend to enforce modern HRM solutions adapted from business organisations to attract, retain and develop HR. However, these seem not be as effective as they could (Hyde et al., 2013. Because of this, authors approached a researched reality from the point of view of a contextual paradigm, assuming that HRM solutions to be effective should match the reality of HC providers (Pocztowski, 2008. The aim of the research was to detect determinants which might influence the management of medical personnel in hospitals and identify the possible strength of these determinants so a more adjusted organisational and human resource management strategy could be elaborated. The list of possible determinants of hospital operations as the result of meta-analysis was elaborated. The list created the basis for interviews conducted among stakeholders and experts. Respondents were asked to appraise the factors with the usage of numerical scale considering their influence on medical personnel management in hospitals (physicians, nurses and others. In total, there were 28 interviews completed. The general conclusion which can be drawn from the analysis of these data is that hospitals should reorient their HRM practices in such the way that not only the quantitative but also the qualitative aspect of performance would be properly handled. This paper draws from HRM theory (contextual approach, stakeholder theory, and healthcare management theory, adding new insight to each in the context of

  1. US cities can manage national hydrology and biodiversity using local infrastructure policy.

    McManamay, Ryan A; Surendran Nair, Sujithkumar; DeRolph, Christopher R; Ruddell, Benjamin L; Morton, April M; Stewart, Robert N; Troia, Matthew J; Tran, Liem; Kim, Hyun; Bhaduri, Budhendra L

    2017-09-05

    Cities are concentrations of sociopolitical power and prime architects of land transformation, while also serving as consumption hubs of "hard" water and energy infrastructures. These infrastructures extend well outside metropolitan boundaries and impact distal river ecosystems. We used a comprehensive model to quantify the roles of anthropogenic stressors on hydrologic alteration and biodiversity in US streams and isolate the impacts stemming from hard infrastructure developments in cities. Across the contiguous United States, cities' hard infrastructures have significantly altered at least 7% of streams, which influence habitats for over 60% of North America's fish, mussel, and crayfish species. Additionally, city infrastructures have contributed to local extinctions in 260 species and currently influence 970 indigenous species, 27% of which are in jeopardy. We find that ecosystem impacts do not scale with city size but are instead proportionate to infrastructure decisions. For example, Atlanta's impacts by hard infrastructures extend across four major river basins, 12,500 stream km, and contribute to 100 local extinctions of aquatic species. In contrast, Las Vegas, a similar size city, impacts cities have local policy choices that can reduce future impacts to regional aquatic ecosystems as they grow. By coordinating policy and communication between hard infrastructure sectors, local city governments and utilities can directly improve environmental quality in a significant fraction of the nation's streams reaching far beyond their city boundaries.

  2. The virtual machine (VM) scaler: an infrastructure manager supporting environmental modeling on IaaS clouds

    Infrastructure-as-a-service (IaaS) clouds provide a new medium for deployment of environmental modeling applications. Harnessing advancements in virtualization, IaaS clouds can provide dynamic scalable infrastructure to better support scientific modeling computational demands. Providing scientific m...

  3. US cities can manage national hydrology and biodiversity using local infrastructure policy

    Surendran Nair, Sujithkumar; DeRolph, Christopher R.; Ruddell, Benjamin L.; Morton, April M.; Stewart, Robert N.; Troia, Matthew J.; Tran, Liem; Kim, Hyun; Bhaduri, Budhendra L.

    2017-01-01

    Cities are concentrations of sociopolitical power and prime architects of land transformation, while also serving as consumption hubs of “hard” water and energy infrastructures. These infrastructures extend well outside metropolitan boundaries and impact distal river ecosystems. We used a comprehensive model to quantify the roles of anthropogenic stressors on hydrologic alteration and biodiversity in US streams and isolate the impacts stemming from hard infrastructure developments in cities. Across the contiguous United States, cities’ hard infrastructures have significantly altered at least 7% of streams, which influence habitats for over 60% of North America’s fish, mussel, and crayfish species. Additionally, city infrastructures have contributed to local extinctions in 260 species and currently influence 970 indigenous species, 27% of which are in jeopardy. We find that ecosystem impacts do not scale with city size but are instead proportionate to infrastructure decisions. For example, Atlanta’s impacts by hard infrastructures extend across four major river basins, 12,500 stream km, and contribute to 100 local extinctions of aquatic species. In contrast, Las Vegas, a similar size city, impacts impacts to regional aquatic ecosystems as they grow. By coordinating policy and communication between hard infrastructure sectors, local city governments and utilities can directly improve environmental quality in a significant fraction of the nation’s streams reaching far beyond their city boundaries. PMID:28827332

  4. Development of Social Infrastructure in the Management Practices of Local Authorities: Trends and Factors

    Frolova, Elena V.; Vinichenko, Mikhail V.; Kirillov, Andrey V.; Rogach, Olga V.; Kabanova, Elena E.

    2016-01-01

    The relevance of the article is conditioned by the exceptional importance of the social infrastructure for the development of the state, society and each individual. Social infrastructure ensures the development of the municipal unit, satisfaction of the basic needs and interests of the population, creation of the conditions for its subsistence…

  5. Information management in civil engineering infrastructural development : With focus on geological and geotechnical information

    Tegtmeier, W.; Zlatanova, S.; Van Oosterom, P.J.M.; Hack, H.R.G.K.

    2009-01-01

    In civil engineering infrastructural projects, information exchange and (re-) use in and between involved parties is difficult. This is mainly caused by a lack of information harmonization. Various specialists are working together on the development of an infrastructural project and are all using

  6. Six key elements' analysis of FAC effective management in nuclear power plant

    Zhong Zhaojiang; Chen Hanming

    2010-01-01

    Corporate Commitment, Analysis, Operating Experience, Inspection, Training and Engineering Judgment, Long-Term Strategy are the six key elements of FAC effective management in nuclear power plant. Corporate commitment is the economy base of FAC management and ensure of management system, Analysis is the method of FAC's optimization and consummation, Operating experience is the reference and complementarity of FAC, Inspection is the base of accumulating FAC data, Training and engineering judgment is the technical complementarity and deepening, Long-term strategy is successful key of FAC management. Six key elements supplement each other, and make up of a full system of FAC effective management. For present FAC management in our national nuclear power plant, six key elements are the core and bring out the best in each other to found the FAC effective management system and prevent great FAC occurrence. (authors)

  7. The Open-Multinet Upper Ontology Towards the Semantic-based Management of Federated Infrastructures

    Alexander Willner

    2015-12-01

    Full Text Available The Internet remains an unfinished work. There are several approaches to enhancing it that have been experimentally validated within federated testbed environments. To best gain scientific knowledge from these studies, reproducibility and automation are needed in all areas of the experiment life cycle. Within the GENI and FIRE context, several architectures and protocols have been developed for this purpose. However, a major open research issue remains, namely the description and discovery of the heterogeneous resources involved. To remedy this, we propose a semantic information model that can be used to allow declarative interoperability, build dependency graphs, validate requests, infer knowledge and conduct complex queries. The requirements for such an information model have been extracted from current international Future Internet research projects and the practicality of the model is being evaluated through initial implementations. The main outcome of this work is the definition of the Open-Multinet Upper Ontology and related sub-ontologies, which can be used to describe and manage federated infrastructures and their resources.

  8. Audit as Key Element of System Management Improvement in Company

    L. Wojtynek

    2007-07-01

    Full Text Available This article presents what is an audit for a company, tries to regularize the quality audits, presents main differences between separate types of audits and between audit and control. There are also some exemplary types of nonconformance in a company. Each system has a risk of deficiencies. They can result from material defects or human imperfection. A good quality system should allow the company to detect them in an organized and systematical manner. It guarantees that the irregularities will be removed before they cause a defective production. Quality management consists of planning the quality via quality plans, control and research plans, and supervision and verification by audits and controls. The objective of this paper is to present a special message of audit for organizations which is the improvement of management system in company. Quality audit is used with reference to quality system and its elements, to process, products and services. It compares the real values with expected ones with reference to the activities connected with quality and their results, and planned data. Thanks to quality audits, it is possible to state if the quality management instruments achieve the desired effect. Quality audit can be conducted for the internal and external purposes. One of the quality audit purposes is to estimate if the improvement is necessary or to take corrective actions. The universality of audit, which is completed by periodic system review preformed by head management, allows the use of its application effects both on the strategic and operational effects. Audit is often misled with quality monitoring or control, i.e. activities which aim to control the process or accept the product. Therefore this paper shows the differences between the notions. The information used to conduct an audit is only based on facts (evidence objective, which really exist, independent on emotions or prejudice. They can be documented, declared, based on observed

  9. BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks

    Syed Muhammad Khaliq-ur-Rahman Raazi

    2010-04-01

    Full Text Available Wireless body area networks (WBAN consist of resource constrained sensing devices just like other wireless sensor networks (WSN. However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  10. BARI+: a biometric based distributed key management approach for wireless body area networks.

    Muhammad, Khaliq-ur-Rahman Raazi Syed; Lee, Heejo; Lee, Sungyoung; Lee, Young-Koo

    2010-01-01

    Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.

  11. SeaDataNet II - Second phase of developments for the pan-European infrastructure for marine and ocean data management

    Schaap, Dick M. A.; Fichaut, Michele

    2013-04-01

    the major players in informatics in oceanography and collaborative relationships have been created with other EU and non EU projects. In particular SeaDataNet has recognised roles in the continuous serving of common vocabularies, the provision of tools for data management, as well as giving access to metadata, data sets and data products of importance for society. The SeaDataNet infrastructure comprises a network of interconnected data centres and a central SeaDataNet portal. The portal provides users not only background information about SeaDataNet and the various SeaDataNet standards and tools, but also a unified and transparent overview of the metadata and controlled access to the large collections of data sets, managed by the interconnected data centres. The presentation will give information on present services of the SeaDataNet infrastructure and services, and highlight a number of key achievements in SeaDataNet II so far.

  12. Management of key pension plan risks from the user aspects

    Rakonjac-Antić Tatjana

    2013-01-01

    Full Text Available The pension system is an important form of protection of individuals, i.e. of their ensuring for a period of living after retirement, when they are no longer able for working engagement. On the other hand, as a form of long-term insurance, this system presents a strong investment incentive for each economy. Pension plans are an important element of the pension system. There are defined benefit plans, defined contribution plans and hybrid plans, which represent a combination of the two previously mentioned plans. The aim of the work is to define the key risks for each of these types of pension plans in order to determine their advantages and disadvantages, from the aspect of their potential users, on the basis of their comparative analysis.

  13. National health information infrastructure model: a milestone for health information management education realignment.

    Meidani, Zahra; Sadoughi, Farhnaz; Ahmadi, Maryam; Maleki, Mohammad Reza; Zohoor, Alireza; Saddik, Basema

    2012-01-01

    Challenges and drawbacks of the health information management (HIM) curriculum at the Master's degree were examined, including lack of well-established computing sciences and inadequacy to give rise to specific competencies. Information management was condensed to the hospital setting to intensify the indispensability of a well-organized educational campaign. The healthcare information dimensions of a national health information infrastructure (NHII) model present novel requirements for HIM education. Articles related to challenges and barriers to adoption of the personal health record (PHR), the core component of personal health dimension of an NHII, were searched through sources including Science Direct, ProQuest, and PubMed. Through a literature review, concerns about the PHR that are associated with HIM functions and responsibilities were extracted. In the community/public health dimension of the NHII the main components have been specified, and the targeted information was gathered through literature review, e-mail, and navigation of international and national organizations. Again, topics related to HIM were evoked. Using an information system (decision support system, artificial neural network, etc.) to support PHR media and content, patient education, patient-HIM communication skills, consumer health information, conducting a surveillance system in other areas of healthcare such as a risk factor surveillance system, occupational health, using an information system to analyze aggregated data including a geographic information system, data mining, online analytical processing, public health vocabulary and classification system, and emerging automated coding systems pose major knowledge gaps in HIM education. Combining all required skills and expertise to handle personal and public dimensions of healthcare information in a single curriculum is simply impractical. Role expansion and role extension for HIM professionals should be defined based on the essence of

  14. Building Critical Infrastructure resilience capacities into the Emergency Management set-up: a reference framework

    Trucco, P.; Petrenj, B.; Kozine, Igor

    proposes a comprehensive framework to identify, build and enhance specific capabilities, both intra- and inter-organisational, needed to manage (prepare, cope and recover from) CI disruptions. This allows emergency services to assess and explicitly address resilience improvement measures while planning......, resources and processes specifically arranged to accomplish a critical task and assure a key objective. Each capability contributes to one or more resilience capacities (preventive, absorptive, adaptive and restorative). An overall resilience capability building cycle completes the framework, enabling...... a systematic implementation of relevant capabilities and making gap analysis with regard to resilience deficits. The planning of training exercises to enhance CI resilience can also benefit from the approach....

  15. Knowledge communication: a key to successful crisis management.

    Johansson, Anders; Härenstam, Malin

    2013-09-01

    A winning concept of crisis management can be summarized in 2 words: knowledge communication. If decision makers, communicators, experts, and the public understand what the crisis is about and share their knowledge, the process of handling it will be optimized. Effective crisis communication implies the necessity of an unhindered but purposeful exchange of information within and between authorities, organizations, media, involved individuals, and groups before, during, and after a crisis. This article focuses on the importance of the before, or prevention, part of a crisis since it holds a rich possibility to enhance the chances for successful crisis management of a bioterrorism incident. An extended perspective on crisis communication efficiently links to a more thorough understanding of risk perception with various stakeholders and the public, which also will be helpful for situational awareness. Furthermore, the grounded baseline for the dialogue type of crisis communication suitable in modern society and to modern social media is achieved by linking to those risk communication efforts that are made. The link between risk and crisis should be afforded more attention since, especially in biosecurity, there would be no crisis without risk negligence and poor or malfunctioning preventive efforts.

  16. Geriatric hip fracture management: keys to providing a successful program.

    Basu, N; Natour, M; Mounasamy, V; Kates, S L

    2016-10-01

    Hip fractures are a common event in older adults and are associated with significant morbidity, mortality and costs. This review examines the necessary elements required to implement a successful geriatric fracture program and identifies some of the barriers faced when implementing a successful program. The Geriatric Fracture Center (GFC) is a treatment model that standardizes the approach to the geriatric fracture patient. It is based on five principles: surgical fracture management; early operative intervention; medical co-management with geriatricians; patient-centered, standard order sets to employ best practices; and early discharge planning with a focus on early functional rehabilitation. Implementing a geriatric fracture program begins with an assessment of the hospital's data on hip fractures and standard care metrics such as length of stay, complications, time to surgery, readmission rates and costs. Business planning is essential along with the medical planning process. To successfully develop and implement such a program, strong physician leadership is necessary to articulate both a short- and long-term plan for implementation. Good communication is essential-those organizing a geriatric fracture program must be able to implement standardized plans of care working with all members of the healthcare team and must also be able to foster relationships both within the hospital and with other institutions in the community. Finally, a program of continual quality improvement must be undertaken to ensure that performance outcomes are improving patient care.

  17. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks

    Ying Zhang

    2016-01-01

    Full Text Available In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  18. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-29

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  19. Green(ing) infrastructure

    Van Wyk, Llewellyn V

    2014-03-01

    Full Text Available the generation of electricity from renewable sources such as wind, water and solar. Grey infrastructure – In the context of storm water management, grey infrastructure can be thought of as the hard, engineered systems to capture and convey runoff..., pumps, and treatment plants.  Green infrastructure reduces energy demand by reducing the need to collect and transport storm water to a suitable discharge location. In addition, green infrastructure such as green roofs, street trees and increased...

  20. Adapting the social-ecological system framework for urban stormwater management: the case of green infrastructure adoption

    Carli D. Flynn

    2016-12-01

    Full Text Available Stormwater management has long been a critical societal and environmental challenge for communities. An increasing number of municipalities are turning to novel approaches such as green infrastructure to develop more sustainable stormwater management systems. However, there is a need to better understand the technological decision-making processes that lead to specific outcomes within urban stormwater governance systems. We used the social-ecological system (SES framework to build a classification system for identifying significant variables that influence urban stormwater governance decisions related to green infrastructure adoption. To adapt the framework, we relied on findings from observations at national stormwater meetings in combination with a systematic literature review on influential factors related to green infrastructure adoption. We discuss our revisions to the framework that helped us understand the decision by municipal governments to adopt green infrastructure. Remaining research needs and challenges are discussed regarding the development of an urban stormwater SES framework as a classification tool for knowledge accumulation and synthesis.

  1. Infrastructures of Urban Religious Management: Who Should Pay for the Utilities of Cemevis in Turkey?

    Nazlı Özkan

    2018-06-01

    Full Text Available In Turkey, electricity and water expenses for houses of prayer, such as mosques and churches, are covered by the state. Cemevis, places of worship for Turkey’s marginalized religious minority of Alevis, however, cannot benefit from from this regulation. By analyzing the political negotiations between the Turkish state and Alevis about cemevis’ utility bills, this paper argues that unequal distribution of infrastructural funds becomes a means for governing religion in urban contexts. In so doing, I focus on a less studied dimension of infrastructures by examining how infrastructural governance is an arena both to reproduce and to contest hegemonic state religiosity.

  2. Adaptability and flexibility : keys towards successful SCAT data management

    Lamarche, A.

    2008-01-01

    The Shoreline Cleanup Assessment Technique (SCAT) is the standard method used in North America to document oiling conditions in the aftermath of an oil spill. The data generated by SCAT can support all aspects of shoreline spill response, including treatment strategies, selecting treatment methods, providing detailed instructions to response personnel and evaluating the response effort. However, some adaptations were needed, such as adding shoreline types specific to the impacted area, accommodating multiple teams surveying the same shoreline segment, and adding descriptors to characterize unique practical aspects of oil conditions. This paper presented a review, description and examples of the various adaptations that were needed to provide SCAT data management support during a number of spill response incidents. 10 refs., 3 tabs., 12 figs

  3. Resource management as a key factor for sustainable urban planning.

    Agudelo-Vera, Claudia M; Mels, Adriaan R; Keesman, Karel J; Rijnaarts, Huub H M

    2011-10-01

    Due to fast urbanization and increasing living standards, the environmental sustainability of our global society becomes more and more questionable. In this historical review we investigate the role of resources management (RM) and urban planning (UP) and propose ways for integration in sustainable development (SD). RM follows the principle of circular causation, and we reflect on to what extent RM has been an element for urban planning. Since the existence of the first settlements, a close relationship between RM, urbanization and technological development has been present. RM followed the demand for urban resources like water, energy, and food. In history, RM has been fostered by innovation and technology developments and has driven population growth and urbanization. Recent massive resource demand, especially in relation to energy and material flows, has altered natural ecosystems and has resulted in environmental degradation. UP has developed separately in response to different questions. UP followed the demand for improved living conditions, often associated to safety, good manufacturing and trading conditions and appropriate sanitation and waste management. In history UP has been a developing research area, especially since the industrial era and the related strong urbanization at the end of the 18th century. UP responded to new emerging problems in urban areas and became increasingly complex. Nowadays, UP has to address many objectives that are often conflicting, including, the urban sustainability. Our current urban un-sustainability is rooted in massive resource consumption and waste production beyond natural limits, and the absence of flows from waste to resources. Therefore, sustainable urban development requires integration of RM into UP. We propose new ways to this integration. Copyright © 2011 Elsevier Ltd. All rights reserved.

  4. Symmetric Link Key Management for Secure Neighbor Discovery in a Decentralized Wireless Sensor Network

    2017-09-01

    KEY MANAGEMENT FOR SECURE NEIGHBOR DISCOVERY IN A DECENTRALIZED WIRELESS SENSOR NETWORK by Kelvin T. Chew September 2017 Thesis Advisor...and to the Office of Management and Budget, Paperwork Reduction Project (0704-0188) Washington, DC 20503. 1. AGENCY USE ONLY (Leave blank) 2. REPORT...DATE September 2017 3. REPORT TYPE AND DATES COVERED Master’s thesis 4. TITLE AND SUBTITLE SYMMETRIC LINK KEY MANAGEMENT FOR SECURE NEIGHBOR

  5. Key Account Management and Quality in Business-to-Business Relationships

    Ojasalo, Jukka

    2000-01-01

    What are the main elements of successful Key Account Management (KAM)? What is the nature of quality for the company and for the individual in business-to-business relationships? What kind of managerial practices are required at the company and individual level in Key Account Management? This paper focuses on these central aspects of KAM. It describes the main elements of KAM, which is a systematic marketing management approach in the business-to-business context with the objective to build p...

  6. Water Infrastructure Asset Management Primer (WERF Report INFR9SG09b)

    Abstract: Water infrastructure systems are essential for sustaining societal quality of life. However, they face a variety of challenges and potential threats to sustained performance, including aging, deterioration, underfunding, disruptive events, and population growth, among ...

  7. Dynamic contracting : An asset management tool in controlling infrastructure maintenance activities

    Demirel, H.C.; de Ridder, H.A.J.; Hertogh, M.J.C.M.

    2013-01-01

    Infrastructure road network is a complex system in a fast changing complicated environment and therefore subject to change. The changes refer to demands, requirements, regulations and financial possibilities as well as advanced technologies. Therefore outsourcing maintenance activities are rather

  8. Spatial Data Infrastructures (SDIs): Improving the Scientific Environmental Data Management and Visualization with ArcGIS Platform

    Shrestha, S. R.; Hogeweg, M.; Rose, B.; Turner, A.

    2017-12-01

    The requirement for quality, authoritatively sourced data can often be challenging when working with scientific data. In addition, the lack of standard mechanism to discover, access, and use such data can be cumbersome. This results in slow research, poor dissemination and missed opportunities for research to positively impact policy and knowledge. There is widespread recognition that authoritative datasets are maintained by multiple organizations following various standards, and addressing these challenges will involve multiple stakeholders as well. The bottom line is that organizations need a mechanism to efficiently create, share, catalog, and discover data, and the ability to apply these to create an authoritative information products and applications is powerful and provides value. In real-world applications, individual organizations develop, modify, finalize, and support foundational data for distributed users across the system and thus require an efficient method of data management. For this, the SDI (Spatial Data Infrastructure) framework can be applied for GIS users to facilitate efficient and powerful decision making based on strong visualization and analytics. Working with research institutions, governments, and organizations across the world, we have developed a Hub framework for data and analysis sharing that is driven by outcome-centric goals which apply common methodologies and standards. SDI are an operational capability that should be equitably accessible to policy-makers, analysts, departments and public communities. These SDI need to align with operational workflows and support social communications and collaboration. The Hub framework integrates data across agencies, projects and organizations to support interoperability and drive coordination. We will present and share how Esri has been supporting the development of local, state, and national SDIs for many years and show some use cases for applications of planetary SDI. We will also share what

  9. Managing Sustainable Demand-side Infrastructure for Power System Ancillary Services

    Parkinson, Simon Christopher

    Widespread access to renewable electricity is seen as a viable method to mitigate carbon emissions, although problematic are the issues associated with the integration of the generation systems within current power system configurations. Wind power plants are the primary large-scale renewable generation technology applied globally, but display considerable short-term supply variability that is difficult to predict. Power systems are currently not designed to operate under these conditions, and results in the need to increase operating reserve in order to guarantee stability. Often, operating conventional generation as reserve is both technically and economically inefficient, which can overshadow positive benefits associated with renewable energy exploitation. The purpose of this thesis is to introduce and assess an alternative method of enhancing power system operations through the control of electric loads. In particular, this thesis focuses on managing highly-distributed sustainable demand-side infrastructure, in the form of heat pumps, electric vehicles, and electrolyzers, as dispatchable short-term energy balancing resources. The main contribution of the thesis is an optimal control strategy capable of simultaneously balancing grid- and demand-side objectives. The viability of the load control strategy is assessed through model-based simulations that explicitly track end-use functionality of responsive devices within a power systems analysis typically implemented to observe the effects of integrated wind energy systems. Results indicate that there is great potential for the proposed method to displace the need for increased reserve capacity in systems considering a high penetration of wind energy, thereby allowing conventional generation to operate more efficiently and avoid the need for possible capacity expansions.

  10. The critical success factor approach to strategic alignment: seeking a trail from a health organization's goals to its management information infrastructure.

    Tan, J K

    1999-11-01

    The critical success factor (CSF) approach is a technique that will aid health administrators, planners and managers to identify, specify and sort among the most relevant and critical factors determining an organization's survival and success. Following a top-down management perspective, this paper discusses the CSF methodology as a strategic information management process comprising several important phases: (i) understanding the external factors such as the organization's industry, market and environment; (ii) achieving strong support and championship from top management; (iii) encouraging the proactive involvement of management and staff in generic CSF identification; (iv) educating and directing the participation of staff members in CSF verification and further refinement of generic CSFs into specific CSFs; and (v) aggregating, prioritizing and translating activity-related CSFs into organizational information requirements for the design of the organization's management information infrastructure. The implementation of this CSF approach is illustrated in the context of a British Columbia community hospital, with insights provided into key issues for future health researchers and practitioners.

  11. Management of Information and Infrastructure of Indigenous Community at Royal Belum State Park Using Geographical Information System: A Conceptual Design

    Othman Zainon

    2015-06-01

    Full Text Available Abstract. Nowadays, an integrated location, descriptive inventory data and geographical information are required for a better decision making in Indigenous community management activities. The management system can improve productivity and to save time, money and man power. Conventional maps and Indigenous inventories on papers or spread sheet are lack of meeting these requirements which are not static and subjected to change rapidly. The Geographic Information Systems (GIS and Database Management (DBM System are capabilities and confined in manipulation of location and descriptive data, respectively. A GIS system is chosen in Management Information and Infrastructure of Indigenous Communities because its meets all the requirements that can help the authorities to managed the community. GIS able to manipulate location and descriptive data as well as the relationships between them are dynamic. This paper will discussed briefly the conceptual design of GIS activities and Indigenous community in Royal Belum State Park, Malaysia, then terminology and theoretical concepts of GIS, Indigenous community management and the link between them are reviewed. Keywords: Management, information, infrastructure, conceptual design, Indigenous community

  12. Management of Information and Infrastructure of Indigenous Community at Royal Belum State Park Using Geographical Information System: A Conceptual Design

    Othman Zainon

    2015-07-01

    Full Text Available Abstract. Nowadays, an integrated location, descriptive inventory data and geographical information are required for a better decision making in Indigenous community management activities. The management system can improve productivity and to save time, money and man power. Conventional maps and Indigenous inventories on papers or spread sheet are lack of meeting these requirements which are not static and subjected to change rapidly. The Geographic Information Systems (GIS and Database Management (DBM System are capabilities and confined in manipulation of location and descriptive data, respectively. A GIS system is chosen in Management Information and Infrastructure of Indigenous Communities because its meets all the requirements that can help the authorities to managed the community. GIS able to manipulate location and descriptive data as well as the relationships between them are dynamic. This paper will discussed briefly the conceptual design of GIS activities and Indigenous community in Royal Belum State Park, Malaysia, then terminology and theoretical concepts of GIS, Indigenous community management and the link between them are reviewed.Keywords:  Management, information, infrastructure, conceptual design, Indigenous community 

  13. A Survey of Managers' Access to Key Performance Indicators via HIS: The Case of Iranian Teaching Hospitals.

    Ahmadi, Maryam; Khorrami, Farid; Dehnad, Afsaneh; Golchin, Mohammad H; Azad, Mohsen; Rahimi, Shafei

    2018-01-01

    The challenges of using health information systems in developing countries are different from developed countries for various reasons such as infrastructure and data culture of organizations. The aim of this study is to assess managers' access to key performance indicators (KPI) via Hospital Information System (HIS) in teaching hospitals of Iran. All managers (Census method) of the four teaching hospitals affiliated to Hormozgan University of Medical Sciences (HUMS) were included in this study. KPIs which are linked to the strategic objectives of organizations were adopted from the strategic plan of HUMS. The questionnaire used in this study included three categories: Financial, Human Resources and clinical. One-sample t-test was used and the significant difference score was calculated for the acceptable level. We found that HIS cannot facilitate access to KPIs for managers in the main categories, but it was effective in two subcategories of income (p = 0.314) and salary (P = 0.289)). A study of barriers to the use of managers of HIS in hospitals is suggested.

  14. Key Account Management - nøglen til vækst?

    Skogberg, Simon

    2011-01-01

    Artiklen tager afsæt i en beskrivelse af begrebet Key Account Management samt den udvikling begrebet har gennemgået de senere år. Artiklen diskuterer problemstillingen om hvorvidt virksomheder skal implementere Key Account Management som et styringsredskab, men sætter samtidig spørgsmålstegn ved om...... Key Account Management nu også er den frelser som faglitteraturen ofte betegner det som. Artiklen inddrager eksempler fra en nordjysk energivirksomhed, hvis aktuelle situation illustrerer de udfordringer mange virksomheder i praksis står overfor....

  15. Configuration Management and Infrastructure Monitoring Using CFEngine and Icinga for Real-time Heterogeneous Data Taking Environment

    Poat, M. D.; Lauret, J.; Betts, W.

    2015-12-01

    The STAR online computing environment is an intensive ever-growing system used for real-time data collection and analysis. Composed of heterogeneous and sometimes groups of custom-tuned machines, the computing infrastructure was previously managed by manual configurations and inconsistently monitored by a combination of tools. This situation led to configuration inconsistency and an overload of repetitive tasks along with lackluster communication between personnel and machines. Globally securing this heterogeneous cyberinfrastructure was tedious at best and an agile, policy-driven system ensuring consistency, was pursued. Three configuration management tools, Chef, Puppet, and CFEngine have been compared in reliability, versatility and performance along with a comparison of infrastructure monitoring tools Nagios and Icinga. STAR has selected the CFEngine configuration management tool and the Icinga infrastructure monitoring system leading to a versatile and sustainable solution. By leveraging these two tools STAR can now swiftly upgrade and modify the environment to its needs with ease as well as promptly react to cyber-security requests. By creating a sustainable long term monitoring solution, the detection of failures was reduced from days to minutes, allowing rapid actions before the issues become dire problems, potentially causing loss of precious experimental data or uptime.

  16. Nuclear knowledge management: a very fundament of a national radiation protection infrastructure

    Jovanovic, Slobodan

    2008-01-01

    Full text: Knowledge is fundament of any progress, and so is the case with nuclear knowledge (NK) for radiation protection. However, this axiomatic and notorious fact is sometimes interpreted/understood in a sense that knowledge is there for granted. If persistent, this dangerously wrong attitude may silently lead to prevailing of ignorance vs. knowledge/ competence and to RP degradation in much respect, with far reaching consequences. Having behind many decades of experience with research, development and utilization of radiation sources for various purposes (including both electric power generation and non-power applications) and with renewed expectations from nuclear sector in solving global energy crisis in front, nuclear knowledge management (NKM) is getting a growing attention lately. This comes due to accentuation, in many counties, of issues with NK creation, dissemination, transfer, preservation and maintenance, or its proper verification/ employing, positioning versus other knowledge, even valorization and public acceptance. Therein, RP is among the areas much sensitive and depending on the effects mentioned. RP infrastructure in a country comprising regulatory elements (institutional and legal framework), technical support organizations (service providers), educational institutions (universities, training centers), RP associations, source manufacturers, traders and users themselves is, as a matter of fact, a complex system of multidisciplinary nature. Physicists, chemists, biologists, environmentalists, medical physicists and practitioners, engineers, managers, lawyers, technicians have their place within the system. It is a common denominator for them all to need a particular NK pertinent to their duties. This very knowledge cannot be missed. Also, it cannot be improvised or substituted by some other knowledge from their respective specialties, neither by that of other people with different backgrounds, who might come in replacement. Unfortunately, it

  17. Managing Uncertainty in Water Infrastructure Design Using Info-gap Robustness

    Irias, X.; Cicala, D.

    2013-12-01

    Info-gap theory, a tool for managing deep uncertainty, can be of tremendous value for design of water systems in areas of high seismic risk. Maintaining reliable water service in those areas is subject to significant uncertainties including uncertainty of seismic loading, unknown seismic performance of infrastructure, uncertain costs of innovative seismic-resistant construction, unknown costs to repair seismic damage, unknown societal impacts from downtime, and more. Practically every major earthquake that strikes a population center reveals additional knowledge gaps. In situations of such deep uncertainty, info-gap can offer advantages over traditional approaches, whether deterministic approaches that use empirical safety factors to address the uncertainties involved, or probabilistic methods that attempt to characterize various stochastic properties and target a compromise between cost and reliability. The reason is that in situations of deep uncertainty, it may not be clear what safety factor would be reasonable, or even if any safety factor is sufficient to address the uncertainties, and we may lack data to characterize the situation probabilistically. Info-gap is a tool that recognizes up front that our best projection of the future may be wrong. Thus, rather than seeking a solution that is optimal for that projection, info-gap seeks a solution that works reasonably well for all plausible conditions. In other words, info-gap seeks solutions that are robust in the face of uncertainty. Info-gap has been used successfully across a wide range of disciplines including climate change science, project management, and structural design. EBMUD is currently using info-gap to help it gain insight into possible solutions for providing reliable water service to an island community within its service area. The island, containing about 75,000 customers, is particularly vulnerable to water supply disruption from earthquakes, since it has negligible water storage and is

  18. Convergence of Vehicle and Infrastructure Data for Traffic and Demand Management

    Young, Stanley E.

    2015-11-16

    direct measurement of the quality of progression along a corridor. Though still requiring an investment in equipment and communications, these data sources are transforming traffic signal management to a data driven, performance management basis. Ever increasing availability of granular GPS trace data from automobiles may allow for assessment of traffic signal performance, allowing for signal optimization while minimizing the investment in additional sensors and communication infrastructure.

  19. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    Bui, Francis Minhthang; Hatzinakos, Dimitrios

    2007-12-01

    As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN), which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1) a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2) a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG) signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  20. Biometric Methods for Secure Communications in Body Sensor Networks: Resource-Efficient Key Management and Signal-Level Data Scrambling

    Dimitrios Hatzinakos

    2008-03-01

    Full Text Available As electronic communications become more prevalent, mobile and universal, the threats of data compromises also accordingly loom larger. In the context of a body sensor network (BSN, which permits pervasive monitoring of potentially sensitive medical data, security and privacy concerns are particularly important. It is a challenge to implement traditional security infrastructures in these types of lightweight networks since they are by design limited in both computational and communication resources. A key enabling technology for secure communications in BSN's has emerged to be biometrics. In this work, we present two complementary approaches which exploit physiological signals to address security issues: (1 a resource-efficient key management system for generating and distributing cryptographic keys to constituent sensors in a BSN; (2 a novel data scrambling method, based on interpolation and random sampling, that is envisioned as a potential alternative to conventional symmetric encryption algorithms for certain types of data. The former targets the resource constraints in BSN's, while the latter addresses the fuzzy variability of biometric signals, which has largely precluded the direct application of conventional encryption. Using electrocardiogram (ECG signals as biometrics, the resulting computer simulations demonstrate the feasibility and efficacy of these methods for delivering secure communications in BSN's.

  1. Management of School Infrastructure in the Context of a No-Fee Schools Policy in Rural South African Schools: Lessons from the Field

    Marishane, Ramodikoe Nylon

    2013-01-01

    This study examines the management of school infrastructure in the context of the "no-fee schools" policy introduced in the South African education delivery system. Focusing on four rural schools, the study applied a qualitative method, which involved observation of infrastructure conditions prevailing at four selected schools and…

  2. Simulated Benefits of Green Infrastructure for Urban Stormwater Management under Climate Change in Different Hydroclimatic and Archetypal Urban Settings

    Johnson, T. E.; Butcher, J.; Sarkar, S.; Clark, C.

    2015-12-01

    Climate change could significantly alter the occurrence and management of urban stormwater runoff quantity and quality. Responding to this challenge requires an improved understanding of potential changes together with the effectiveness of management responses for reducing impacts under range of potential future climatic conditions. Traditional gray stormwater infrastructure generally uses single-purpose, hard structures including detention basins and storm sewers to dispose of rainwater. Green infrastructure (GI) uses vegetation and soil to manage rainwater where it falls. GI has been gaining in popularity, and has been shown to provide a number of benefits for adapting to climate change including effects on stormwater quantity, quality and carbon and nutrient biogeochemical cycling. Uncertainty remains, however, due to limited understanding of GI performance in different hydroclimatic and urban settings, and in response to changes in climate. In this study we use simulation modeling to assess the impacts of climate change on both gray (wet ponds) and green infrastructure practices (green roofs, swales, bioretention) in different hydroclimatic and urban settings. Simulations were conducted using RHESSYs, a mechanistic, hydrologic and biogeochemical model, for 36 characteristic urban "archetypes" (AUSs) representing different development patterns and GI practices found in typical U.S. cities. Climate change scenarios are based on dynamically and temporally downscaled, mid-21st century climate model output from the North American Regional Climate Change Assessment Program (NARCCAP). Results suggest altered mass and energy inputs will cause changes in performance of these practices for water quantity, water quality, and carbon sequestration that vary across the country. Infrastructure design should take these potential changes into consideration.

  3. Key Element Performance In Occupational Safety And Health Management System In Organization (A Literature

    Agus Salim Nuzaihan Aras

    2016-01-01

    Full Text Available Setting an effective safety and health management system is crucial in order to reduce problem relating to accident and ill in management organizational. It is involve with multiple level of management and stakeholders who empower the organization to the management in handling the safety and health cases and issues in organizational. It is necessary to prepare a well knowledge about safety and health management systems and preparing the framework for setting a certain scale in measuring its performance in this area. The successful or failure of management does showing the capability of the organization in delivering the responsible to management levels [1]. The problem in safe work issues and practices cause by the management commitment and involvement that create improper safety program and procedures, and this crisis keep continuing till present [2]. This paper describes about key element of safety and health management system and measuring the performance in order to get an effective management system in organization that describes the process in achieving effectiveness in management. The literature review will be conducted through the data collection from research findings and defined the strong character of key element in which focusing on measuring performance. A guide on key element performance in occupational safety and health management system is specifically drawn to prepare for a future research.

  4. Trust Threshold Based Public Key Management in Mobile Ad Hoc Networks

    2016-03-05

    detection 49 [6,7] , authentication, access control, key management, iso- 50 lating misbehaving nodes for effective routing [6,8,9] , and 51 many other...83 84 85 aims to achieve: (a) resiliency against misbehaving nodes 86 in the network to maintain minimum security vulnerabil- 87 ity; (b...neighbor will decreas the misbehaving node’s direct competence trust. Fur thermore, this neighbor when acting as a recommended public key management in

  5. Infrastructure Analysis of Sazeh Gostar Saipa Outsourcing Company to Select Knowledge Management Strategy: Qualitative Approach

    hossein Khanifar

    2017-09-01

    Full Text Available In today's turbulent business environment, organizations have to make changes in their structure such as outsourcing. This change that is a requirement to provide for the needs of that organization and for competitive advantage can be considered as a new trouble for that organization as well. Because of such changes, an organization may lose the workers' (employee knowledge that is the most important element of the competitive advantage. Thus, the organizations are required to use the most effective knowledge management strategy that is proposed according to the analysis of the key aspects of those organizations. This study examines Sazeh Gostar, the most important suppliers of spare parts for Saipa Automobile Company. At first, the two coding and personalization strategies were applied provided that they were reviewed in the literature. The influential factors were then classified according to McKenzie 7S model. Then, the data were obtained using snowball and targeted sampling from interviews with 9 experts, and through reviewing the company documents. Current status of the company was identified using Theme Analysis. Finally, comparing the influential factors on the company's knowledge management strategy, the appropriate coding strategy was selected.

  6. Managing and developing key supplier relationships : An introduction to the special issue, discussion and implications

    Ivens, B.; van de Vijver, M.A.R.; Vos, G.C.J.M.

    2013-01-01

    This article provides an introduction to this special issue on managing and developing key supplier relationships. Key suppliers are increasingly seen as strategic assets of buying companies which need careful nurturing to fully utilize their potential for value creation. The six articles of this

  7. ERP as an organization innovation : Key users and cross-boundary knowledge management

    Maas, J.-B.; van Fenema, P.C.; Soeters, J.M.M.L.

    2016-01-01

    Purpose The purpose of this study is to provide more insight in the ways key users act as knowledge managers and boundary spanners during the enterprise resource planning (ERP) system usage phase. Despite the recognized importance of key users during the implementation phase of an ERP system, little

  8. SeaDataCloud - further developing the pan-European SeaDataNet infrastructure for marine and ocean data management

    Schaap, Dick M. A.; Fichaut, Michele

    2017-04-01

    SeaDataCloud marks the third phase of developing the pan-European SeaDataNet infrastructure for marine and ocean data management. The SeaDataCloud project is funded by EU and runs for 4 years from 1st November 2016. It succeeds the successful SeaDataNet II (2011 - 2015) and SeaDataNet (2006 - 2011) projects. SeaDataNet has set up and operates a pan-European infrastructure for managing marine and ocean data and is undertaken by National Oceanographic Data Centres (NODC's) and oceanographic data focal points from 34 coastal states in Europe. The infrastructure comprises a network of interconnected data centres and central SeaDataNet portal. The portal provides users a harmonised set of metadata directories and controlled access to the large collections of datasets, managed by the interconnected data centres. The population of directories has increased considerably in cooperation with and involvement in many associated EU projects and initiatives such as EMODnet. SeaDataNet at present gives overview and access to more than 1.9 million data sets for physical oceanography, chemistry, geology, geophysics, bathymetry and biology from more than 100 connected data centres from 34 countries riparian to European seas. SeaDataNet is also active in setting and governing marine data standards, and exploring and establishing interoperability solutions to connect to other e-infrastructures on the basis of standards of ISO (19115, 19139), and OGC (WMS, WFS, CS-W and SWE). Standards and associated SeaDataNet tools are made available at the SeaDataNet portal for wide uptake by data handling and managing organisations. SeaDataCloud aims at further developing standards, innovating services & products, adopting new technologies, and giving more attention to users. Moreover, it is about implementing a cooperation between the SeaDataNet consortium of marine data centres and the EUDAT consortium of e-infrastructure service providers. SeaDataCloud aims at considerably advancing services and

  9. LEGAL ASPECTS OF A MANAGEMENT OF INFRASTRUCTURE PUBLIC INVESTMENTS IN REGIONS. DILEMMAS OF THE SOCIO-ECONOMIC DEVELOPMENT

    Eryk Kosiński

    2014-09-01

    Full Text Available This article provides for an analysis of legal aspects of certain particular investment processes within technical infrastructure in the Polish regions (voivodeships, but in the counties and communes as well. Those mentioned investments are undertaken in the areas of roads, railroads, airports and telecommunication. The impact of the investments is crucial in terms of the socio-economic development of the modern state and society. All dilemmas in terms of the mentioned investments’ management are related to legal regulations imposed by the state. It is noteworthy that those special regulations are aimed at organising the investment process in an efficient and adequately speedy way. Those regulations provide for a broad legal environment of business within the infrastructure investments. All of those regulations are necessary in order to push the continuous progress of the Polish regions targeting at reacting the level of socio-economic development of the so-called western countries (old, early members of the EU.

  10. A Data-Driven Approach to Manage Charging Infrastructure for Electric Vehicles in Parking Lots

    J. Babic (Jurica); A. Carvalho (Arthur); W. Ketter (Wolfgang); V. Podobnik (Vedran)

    2017-01-01

    textabstractThe ever-increasing number of electric vehicles (EV) on the road is in line with many governments' efforts to tackle urgent environmental challenges. This inherently means that there is a growing need for charging infrastructure as well. A potential solution to address the need for

  11. Policy and context management in dynamically provisioned access control service for virtualized Cloud infrastructures

    Ngo, C.; Membrey, P.; Demchenko, Y.; de Laat, C.

    2012-01-01

    Cloud computing is developing as a new wave of ICT technologies, offering a common approach to on-demand provisioning of computation, storage and network resources which are generally referred to as infrastructure services. Most of currently available commercial Cloud services are built and

  12. Role of EPA in Asset Management Research – The Aging Water Infrastructure Research Program

    This slide presentation provides an overview of the EPA Office of Research and Development’s Aging Water infrastructure Research Program (AWIRP). The research program origins, goals, products, and plans are described. The research program focuses on four areas: condition asses...

  13. Infrastructure assessment for disaster management using multi-sensor and multi-temporal remote sensing imagery

    Butenuth, Matthias; Frey, Daniel; Nielsen, Allan Aasbjerg

    2011-01-01

    In this paper, a new assessment system is presented to evaluate infrastructure objects such as roads after natural disasters in near-realtime. A particular aim is the exploitation of multi-sensorial and multi-temporal imagery together with further {GIS-}data in a comprehensive assessment framewor...

  14. Development of a Pilot Data Management Infrastructure for Biomedical Researchers at University of Manchester – Approach, Findings, Challenges and Outlook of the MaDAM Project

    Meik Poschen

    2012-12-01

    Full Text Available Management and curation of digital data has been becoming ever more important in a higher education and research environment characterised by large and complex data, demand for more interdisciplinary and collaborative work, extended funder requirements and use of e-infrastructures to facilitate new research methods and paradigms. This paper presents the approach, technical infrastructure, findings, challenges and outlook (including future development within the successor project, MiSS of the ‘MaDAM: Pilot data management infrastructure for biomedical researchers at University of Manchester’ project funded under the infrastructure strand of the JISC Managing Research Data (JISCMRD programme. MaDAM developed a pilot research data management solution at the University of Manchester based on biomedical researchers’ requirements, which includes technical and governance components with the flexibility to meet future needs across multiple research groups and disciplines.

  15. Agri-Environmental Resource Management by Large-Scale Collective Action: Determining KEY Success Factors

    Uetake, Tetsuya

    2015-01-01

    Purpose: Large-scale collective action is necessary when managing agricultural natural resources such as biodiversity and water quality. This paper determines the key factors to the success of such action. Design/Methodology/Approach: This paper analyses four large-scale collective actions used to manage agri-environmental resources in Canada and…

  16. Perceptions of food risk management among key stakeholders: Results from a cross-European study

    Kleef, van E.; Frewer, L.J.; Chryssochoidis, G.M.; Houghton, J.R.; Korzen-Bohr, S.; Krystallis, T.; Lassen, J.; Pfenning, U.; Rowe, G.

    2006-01-01

    In designing and implementing appropriate food risk management strategies, it is important to examine how key stakeholders perceive both the practice and effectiveness of food risk management. The objective of this study is to identify similarities and differences in perceptions of, and attitudes

  17. SeaDataNet - Pan-European infrastructure for marine and ocean data management: Unified access to distributed data sets

    Schaap, D. M. A.; Maudire, G.

    2009-04-01

    SeaDataNet is an Integrated research Infrastructure Initiative (I3) in EU FP6 (2006 - 2011) to provide the data management system adapted both to the fragmented observation system and the users need for an integrated access to data, meta-data, products and services. Therefore SeaDataNet insures the long term archiving of the large number of multidisciplinary data (i.e. temperature, salinity current, sea level, chemical, physical and biological properties) collected by many different sensors installed on board of research vessels, satellite and the various platforms of the marine observing system. The SeaDataNet project started in 2006, but builds upon earlier data management infrastructure projects, undertaken over a period of 20 years by an expanding network of oceanographic data centres from the countries around all European seas. Its predecessor project Sea-Search had a strict focus on metadata. SeaDataNet maintains significant interest in the further development of the metadata infrastructure, but its primary objective is the provision of easy data access and generic data products. SeaDataNet is a distributed infrastructure that provides transnational access to marine data, meta-data, products and services through 40 interconnected Trans National Data Access Platforms (TAP) from 35 countries around the Black Sea, Mediterranean, North East Atlantic, North Sea, Baltic and Arctic regions. These include: National Oceanographic Data Centres (NODC's) Satellite Data Centres. Furthermore the SeaDataNet consortium comprises a number of expert modelling centres, SME's experts in IT, and 3 international bodies (ICES, IOC and JRC). Planning: The SeaDataNet project is delivering and operating the infrastructure in 3 versions: Version 0: maintenance and further development of the metadata systems developed by the Sea-Search project plus the development of a new metadata system for indexing and accessing to individual data objects managed by the SeaDataNet data centres. This

  18. The most important key-performance indicators at BC Timişoara management

    Silvia GRĂDINARU

    2017-02-01

    Full Text Available This article explores the management of objectives at BC Timisoara, motivation and performance analysis. The aim of this paper is to analyze the most important key factors involved in a basketball team performance. The basketball team analyzed is BC Timisoara, a well established club in this city of Western Romania. The article combines information gathered from BC Timisoara’s manager and management theories relevant to the topic. Goal setting is affected by financial and human resource factors as well control and regulation functions. Finally motivation plays a key role in players performance.

  19. Managing malocclusion in the mixed dentition: six keys to success. Part 1.

    Fleming, Padhraig S; Johal, Ama; DiBiase, Andrew T

    2008-11-01

    Indications of developing malocclusion are often present in the mixed dentition.With judicious supervision and timely intervention their effects can be minimized. The general dental practitioner is ideally placed to recognize, manage and correct many such incipient problems. This first of two papers considers three keys to success involving, normal dental development, deviations from normal eruption patterns, crossbite correction and habit cessation. The appropriate management of developing malocclusion may simplify later orthodontic management or indeed make such intervention unnecessary.

  20. Pennsylvania Reaches Infrastructure Milestone

    With a series of “aye” votes, the Pennsylvania agency that turns EPA funding and state financing into water infrastructure projects crossed a key threshold recently – $8 billion in investment over nearly three decades

  1. Managing the complexity of critical infrastructures a modelling and simulation approach

    Rosato, Vittorio; Kyriakides, Elias; Rome, Erich

    2016-01-01

    This book is open access under a CC BY 4.0 license. This book summarizes work being pursued in the context of the CIPRNet (Critical Infrastructure Preparedness and Resilience Research Network) research project, co-funded by the European Union under the Seventh Framework Programme (FP7). The project is intended to provide concrete and on-going support to the Critical Infrastructure Protection (CIP) research communities, enhancing their preparedness for CI-related emergencies, while also providing expertise and technologies for other stakeholders to promote their understanding and mitigation of the consequences of CI disruptions, leading to enhanced resilience. The book collects the tutorial material developed by the authors for several courses on the modelling, simulation and analysis of CIs, representing extensive and integrated CIP expertise. It will help CI stakeholders, CI operators and civil protection authorities understand the complex system of CIs, and help them adapt to these changes and threats in or...

  2. Open geospatial infrastructure for data management and analytics in interdisciplinary research

    Jeppesen, Jacob Høxbroe; Ebeid, Emad Samuel Malki; Jacobsen, Rune Hylsberg

    2018-01-01

    , and information and communications technology needed to promote the implementation of precision agriculture is limited by proprietary integrations and non-standardized data formats and connections. In this paper, an open geospatial data infrastructure is presented, based on standards defined by the Open...... software, and was complemented by open data from governmental offices along with ESA satellite imagery. Four use cases are presented, covering analysis of nearly 50 000 crop fields and providing seamless interaction with an emulated machine terminal. They act to showcase both for how the infrastructure......The terms Internet of Things and Big Data are currently subject to much attention, though the specific impact of these terms in our practical lives are difficult to apprehend. Data-driven approaches do lead to new possibilities, and significant improvements within a broad range of domains can...

  3. Research-informed design, management and maintenance of infrastructure slopes: development of a multi-scalar approach

    Glendinning, S.; Helm, P. R.; Rouainia, M.; Stirling, R. A.; Asquith, J. D.; Hughes, P. N.; Toll, D. G.; Clarke, D.; Powrie, W.; Smethurst, J.; Hughes, D.; Harley, R.; Karim, R.; Dixon, N.; Crosby, C.; Chambers, J.; Dijkstra, T.; Gunn, D.; Briggs, K.; Muddle, D.

    2015-09-01

    The UK's transport infrastructure is one of the most heavily used in the world. The performance of these networks is critically dependent on the performance of cutting and embankment slopes which make up £20B of the £60B asset value of major highway infrastructure alone. The rail network in particular is also one of the oldest in the world: many of these slopes are suffering high incidents of instability (increasing with time). This paper describes the development of a fundamental understanding of earthwork material and system behaviour, through the systematic integration of research across a range of spatial and temporal scales. Spatially these range from microscopic studies of soil fabric, through elemental materials behaviour to whole slope modelling and monitoring and scaling up to transport networks. Temporally, historical and current weather event sequences are being used to understand and model soil deterioration processes, and climate change scenarios to examine their potential effects on slope performance in futures up to and including the 2080s. The outputs of this research are being mapped onto the different spatial and temporal scales of infrastructure slope asset management to inform the design of new slopes through to changing the way in which investment is made into aging assets. The aim ultimately is to help create a more reliable, cost effective, safer and more resilient transport system.

  4. Research on the municipal responsibility to sustainably manage services infrastructure assets

    Wall, K

    2005-07-01

    Full Text Available . Furthermore, a significant proportion of the South African population does not enjoy basic services (for example safe water and/or acceptable sanitation), and it is the stated intention of national government to fund the rolling out of the engineering... designed life. Depending on the infrastructure concerned, it could be that the riding quality of roads deteriorates and wear and tear on vehicles increases, water pressures drop, water supplies are interrupted, treated water that has been purchased...

  5. Towards an IT infrastructure for compliance management by data interoperability : The changing role of authorities

    Hofman, W.J.; Bastiaansen, H.J.M.

    2013-01-01

    Since 9/11, the Customs Trade Partnership Against Terrorism (C-TPAT) was an initiative to increase container security. Through the Entry Summary Declaration (ENS), authorities require shipping lines to timely submit data to the first port of call in the EC.. However, an ENS contains insufficient data for proper risk analysis. This paper presents an IT infrastructure to capture so-called upstream data that allows customs to match delivery - with container data. It proposes Semantic Web technol...

  6. Key Supplier Relationship Management: The Case of Croatian Medium-Sized and Large Manufacturing Companies

    Dario Miočević

    2011-06-01

    Full Text Available The key supplier relationship management represents a vital organizational process. Companies should pay attention not only to managing customer relationships but also to managing relationships with suppliers in order to perform well. They should identify the extent to which a certain supplier adds value through the procurement process. In this line of reasoning, both theory and practice make a distinction between strategic (key and non-strategic (transactional suppliers. By employing the segmentation of the supply market, companies balance their supplier portfolio and are capable of identifying the key suppliers. They can also develop specific programs and initiatives that are aimed at preserving these relationships. In the empirical part of the paper, a survey was conducted on a sample of 123 medium-sized and large Croatian manufacturing companies. The structural model involving the relationship between the key supplier relationship management and value-oriented purchasing was tested. The results indicate that there is a statistically direct, positive and significant relationship between these two constructs. Likewise, the results stress that a theoretical conceptualization and operationalization of the key supplier relationship management construct is both valid and justified. Finally, the theoretical and practical implications and limitations of this study are offered.

  7. EXPLORING BIM FOR OPERATIONAL INTEGRATED ASSET MANAGEMENT – A PRELIMINARY STUDY UTILISING REAL-WORLD INFRASTRUCTURE DATA

    G. A. Boyes

    2017-10-01

    Full Text Available The use of 3D information models within collaborative working environments and the practice of Building Information Modelling (BIM are becoming more commonplace within infrastructure projects. Currently used predominantly during the design and construction phase, the use of BIM is capable in theory of providing the information at handover that will satisfy the Asset Information Requirements (AIRs of the future Infrastructure Manager (IM. One particular challenge is establishing a link between existing construction-centric information and the asset-centric information needed for future operations. Crossrail, a project to build a new high-frequency railway underneath London, is handling many such challenges as they prepare to handover their digital information to the future operator, in particular the need to provide a two-way link between a federated 3D CAD model and an object-relational Asset Information Management System (AIMS. This paper focusses on the potential for improved Asset Management (AM by integrating BIM and GIS systems and practices, and makes a preliminary report on how 3D spatial queries can be used to establish a two-way relational link between two information systems (3D geometry and asset lists, as well as the challenges being overcome to transform the data to be suitable for AM.

  8. Optimized distribution network work management by grid services of a rapid loading infrastructure; Optimierte Verteilnetzbetriebsfuehrung durch Netzdienstleistungen einer Schnellladeinfrastruktur

    Krasselt, P.; Uhrig, M.; Leibfried, T. [Karlsruher Institut fuer Technologie (KIT), Karlsruhe (Germany). Inst. fuer Elektroenergiesysteme und Hochspannungstechnik (IEH)

    2012-07-01

    The German Federal Government aims to reach one million electric vehicles in 2020 and up to five million by 2030 under its National Electromobility Development Plan. The integration of the necessary charging infrastructure in the distribution grid is considered in many research approaches by regarding charging time slots controlled by information and communications technology (ICT). In this approach, strategies for reactive power management and gridsupporting functions in medium voltage networks through the integration of large charging stations such as those in parking garages and public parking lots are considered. An urban distribution network in 2030 is modelled to evaluate different centralized and decentralized reactive power control schemes. (orig.)

  9. A communication and information technology infrastructure for real time monitoring and management of type 1 diabetes patients.

    Skevofilakas, Marios; Mougiakakou, Stavroula G; Zarkogianni, Konstantia; Aslanoglou, Erika; Pavlopoulos, Sotiris A; Vazeou, Andriani; Bartsocas, Christos S; Nikita, Konstantina S

    2007-01-01

    This paper is focused on the integration of state-of-the-art technologies in the fields of telecommunications, simulation algorithms, and data mining in order to develop a Type 1 diabetes patient's semi to fully-automated monitoring and management system. The main components of the system are a glucose measurement device, an insulin delivery system (insulin injection or insulin pumps), a mobile phone for the GPRS network, and a PDA or laptop for the Internet. In the medical environment, appropriate infrastructure for storage, analysis and visualizing of patients' data has been implemented to facilitate treatment design by health care experts.

  10. Key elements on implementing an occupational health and safety management system using ISO 45001 standard

    Darabont Doru Costin

    2017-01-01

    Full Text Available Occupational health and safety (OHS management system is one of the main elements of the company’s general management system. During last decade, Romanian companies gained a valuable experience on implementing this type of management systems, using OHSAS 18001 referential and standard. However, the projected release of the ISO 45001 represents a new approach which requires the companies to take in consideration new key elements for a successful implementation of the OHS management system. The aim of the paper is to identify and analyse these key elements, by integration of the following issues: standard requirements, Romanian OHS legislation and good practice examples, including the general control measures for new and emerging risks such as psycho-social risks, workforce ageing and new technologies. The study results represent an important work instrument for each company interested to implement or upgrade its OHS management system using ISO 45001 standard and could be used regardless the company size or activity domain.

  11. A Study on the Key Management Strategy for Wireless Sensor Networks

    Hoon KO

    2015-05-01

    Full Text Available Many users who are in a cyber-space usually want to join the social group to have or to share their information. Now, there are two ways to join the group, the group manager invites them, and the users who want to join ask the owner. These days the group polices usually follow this way. But, it can be faced a security problem when the manager send group messages in near future because they don’t have any securities. Therefore, the security modules to join groups will be needed when they join the group or when they read the group messages. To set the security, we have to think how to keep the key such as a generation /an update/an arrangement, because all users need the key to join the groups or to read the group messages by decrypting. The key are going to be used to joining the group when it dynamically changes such as frequent group joining and leaving. If it applies or uses the existing methods in the smart cities which consider the users who will move globally, it could easily assume that the overhead/the cost of CPU will be increased and it follows capacity down because of lots of the key updates. So, to let them down, we suggest three key strategies, a group key, a subgroup key and a session key in this paper.

  12. Signcryption-Based Key Management for MANETs Applications in Mobile Commerce

    LI Jingfeng; ZHU Yuefei; ZHANG Yajuan; PAN Heng

    2006-01-01

    Mobile commerce uses wireless device and wireless link to result in the transfer of values in exchange of information, services or goods. Wireless mobile ad hoc networks (MANETs) will bring a revolution to the business model of mobile commerce if such networks are used as the underlying network technology for mobile commerce. Mobile commerce will remain in a niche market until the security issue is properly addressed. Hence, security is also very important for MANET applications in mobile commerce. Robust key management is one of the most crucial technologies for security of MANETs. In this paper, a new solution for key management is proposed using identity-based (ID-based) signcryption and threshold secret sharing. It enables flexible and efficient key management while respecting the constraints of MANETs. In our solution, each mobile host uses its globally unique identity as its public key. It greatly decreases the computation and storage costs of mobile hosts, as well as communication cost for system key management.

  13. Multi-scalar interactions between infrastructure, smallholder water management, and coastal dynamics in the Bengal Delta, Bangladesh

    Rogers, K. G.; Brondizio, E.; Roy, K.; Syvitski, J. P.

    2016-12-01

    Because of their low-lying elevations and large number of inhabitants and infrastructure, river deltas are ground zero for climate change impacts, particularly from sea-level rise and storm surges. The increased vulnerability of downstream delta communities to coastal flooding as a result of upstream engineering has been acknowledged for decades. What has received less attention is the sensitivity of deltas to the interactions of these processes and increasing intensity of cultivation and irrigation in their coastal regions. Beyond basin-scale damming, regional infrastructure affects the movement of sediment and water on deltas, and combined with upstream modifications may exacerbate the risk of expanded tidal flooding, erosion of arable land, and salinization of soils and groundwater associated with sea level rise. To examine the social-biophysical feedbacks associated with regional-scale infrastructure, smallholder water management practices and coastal dynamics, a nested framework was applied to two districts of the coastal southwest region of Bangladesh. The two districts vary in tidal range, salinity, freshwater availability and socioeconomic structures, and are spatially varied in farmer's adaptations. Both districts contain numerous large embankment systems initially designed to protect cropland from tidal flooding, but that have been poorly maintained since their construction in the 1960's. The framework was co-produced using local-level stakeholder input collected during group interviews with rural farmers in 8 villages within the two districts, and explicitly accounts for engineered and natural biophysical variables as well as governance and institutional structures at 3 levels of analysis. Household survey results indicate that the presence or absence of embankments as a result of poor management and dynamic coastal processes is the primary control on freshwater availability and thus influences farming strategies, socioeconomic conditions and social

  14. Using key performance indicators as knowledge-management tools at a regional health-care authority level.

    Berler, Alexander; Pavlopoulos, Sotiris; Koutsouris, Dimitris

    2005-06-01

    The advantages of the introduction of information and communication technologies in the complex health-care sector are already well-known and well-stated in the past. It is, nevertheless, paradoxical that although the medical community has embraced with satisfaction most of the technological discoveries allowing the improvement in patient care, this has not happened when talking about health-care informatics. Taking the above issue of concern, our work proposes an information model for knowledge management (KM) based upon the use of key performance indicators (KPIs) in health-care systems. Based upon the use of the balanced scorecard (BSC) framework (Kaplan/Norton) and quality assurance techniques in health care (Donabedian), this paper is proposing a patient journey centered approach that drives information flow at all levels of the day-to-day process of delivering effective and managed care, toward information assessment and knowledge discovery. In order to persuade health-care decision-makers to assess the added value of KM tools, those should be used to propose new performance measurement and performance management techniques at all levels of a health-care system. The proposed KPIs are forming a complete set of metrics that enable the performance management of a regional health-care system. In addition, the performance framework established is technically applied by the use of state-of-the-art KM tools such as data warehouses and business intelligence information systems. In that sense, the proposed infrastructure is, technologically speaking, an important KM tool that enables knowledge sharing amongst various health-care stakeholders and between different health-care groups. The use of BSC is an enabling framework toward a KM strategy in health care.

  15. Telecom infrastructure leasing

    Henley, R.

    1995-01-01

    Slides to accompany a discussion about leasing telecommunications infrastructure, including radio/microwave tower space, radio control buildings, paging systems and communications circuits, were presented. The structure of Alberta Power Limited was described within the ATCO group of companies. Corporate goals and management practices and priorities were summarized. Lessons and experiences in the infrastructure leasing business were reviewed

  16. Effects of a group-based reproductive management extension programme on key management outcomes affecting reproductive performance.

    Brownlie, Tom S; Morton, John M; Heuer, Cord; McDougall, Scott

    2015-02-01

    A group-based reproductive management extension programme has been designed to help managers of dairy herds improve herd reproductive performance. The aims of this study were, firstly, to assess effects of participation by key decision makers (KDMs) in a farmer action group programme in 2009 and 2010 on six key management outcomes (KMOs) that affect reproductive performance over 2 years (2009-2010 and 2010-2011), and secondly, to describe KDM intentions to change management behaviour(s) affecting each management outcome after participation in the programme. Seasonal calving dairy herds from four regions of New Zealand were enrolled in the study. Intentions to modify management behaviour were recorded using the formal written action plans developed during the extension programme. KMOs assessed were calving pattern of the herd, pre-calving heifer liveweight, pre-calving and premating body condition score (BCS), oestrus detection, anoestrus cow management and bull management. Participation was associated with improvements in heifer liveweight, more heifers calving in the first 6 weeks of the seasonal calving period, premating BCS and oestrus detection. No significant effects were observed on anoestrus cow management or bull management. KDMs with greater numbers of proposed actions had lower 6 week in-calf rates in the second study year than KDMs who proposed fewer actions. A more effective strategy to ensure more appropriate objectives is proposed. Strategies to help KDMs to implement proposed actions more successfully should be investigated to improve the programme further. Copyright © 2014 Elsevier Ltd. All rights reserved.

  17. Field data collection, analysis, and adaptive management of green infrastructure in the urban water cycle in Cleveland and Columbus, OH

    Darner, R.; Shuster, W.

    2016-12-01

    Expansion of the urban environment can alter the landscape and creates challenges for how cities deal with energy and water. Large volumes of stormwater in areas that have combined septic and stormwater systems present on challenge. Managing the water as near to the source as possible by creates an environment that allows more infiltration and evapotranspiration. Stormwater control measures (SCM) associated with this type of development, often called green infrastructure, include rain gardens, pervious or porous pavements, bioswales, green or blue roofs, and others. In this presentation, we examine the hydrology of green infrastructure in urban sewersheds in Cleveland and Columbus, OH. We present the need for data throughout the water cycle and challenges to collecting field data at a small scale (single rain garden instrumented to measure inflows, outflow, weather, soil moisture, and groundwater levels) and at a macro scale (a project including low-cost rain gardens, highly engineered rain gardens, groundwater wells, weather stations, soil moisture, and combined sewer flow monitoring). Results will include quantifying the effectiveness of SCMs in intercepting stormwater for different precipitation event sizes. Small scale deployment analysis will demonstrate the role of active adaptive management in the ongoing optimization over multiple years of data collection.

  18. Applicability of DUKPT Key Management Scheme to Cloud Wallet and other Mobile Payments

    Saha, Amal; Sanyal, Sugata

    2014-01-01

    After discussing the concept of DUKPT based symmetric encryption key management (e.g., for 3DES) and definition of cloud or remote wallet, the paper analyses applicability of DUKPT to different use cases like mobile banking, NFC payment using EMV contactless card and mobile based EMV card emulation, web browser based transaction and cloud or remote wallet. Cloud wallet is an emerging payment method and is gaining momentum very fast. Anticipating that the wallet product managers and security s...

  19. Greening infrastructure

    Van Wyk, Llewellyn V

    2014-10-01

    Full Text Available The development and maintenance of infrastructure is crucial to improving economic growth and quality of life (WEF 2013). Urban infrastructure typically includes bulk services such as water, sanitation and energy (typically electricity and gas...

  20. Network Management System for (FUTON-like) Radio-over-Fiber Infrastructure

    Santiago, Carlos; Gangopadhyay, Bodhisattwa; Ramkumar, Venkata

    2010-01-01

    by the FUTON Middleware. Although a significant amount of prior research work can be found in the literature related to RoF, there is still significant lack of technologies concerning RoF networks management. RoF Manager and its sub-systems target to fill such gap, proposing a novel concept in the form...... operational costs. The RoF Network Manager manages the network equipment on the optical front haul between the Central Unit (CU) and all Remote Antenna Units (RAU)s connected by it, as well as the communication links, while enabling end-to-end service problem resolution and service quality management...

  1. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Alexandra Rivero-García

    2017-03-01

    Full Text Available A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  2. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  3. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  4. Engineering Asset Management and Infrastructure Sustainability : Proceedings of the 5th World Congress on Engineering Asset Management

    Ma, Lin; Tan, Andy; Weijnen, Margot; Lee, Jay

    2012-01-01

    Engineering Asset Management 2010 represents state-of-the art trends and developments in the emerging field of engineering asset management as presented at the Fifth World Congress on Engineering Asset Management (WCEAM). The proceedings of the WCEAM 2010 is an excellent reference for practitioners, researchers and students in the multidisciplinary field of asset management, covering topics such as: Asset condition monitoring and intelligent maintenance Asset data warehousing, data mining and fusion Asset performance and level-of-service models Design and life-cycle integrity of physical assets Education and training in asset management Engineering standards in asset management Fault diagnosis and prognostics Financial analysis methods for physical assets Human dimensions in integrated asset management Information quality management Information systems and knowledge management Intelligent sensors and devices Maintenance strategies in asset management Optimisation decisions in asset management Risk management ...

  5. KALwEN+: Practical Key Management Schemes for Gossip-Based Wireless Medical Sensor Networks

    Gong, Zheng; Tang, Qiang; Law, Y.W.; Chen, Hongyang; Lai, X.; Yung, M.

    2010-01-01

    The constrained resources of sensors restrict the design of a key management scheme for wireless sensor networks (WSNs). In this work, we first formalize the security model of ALwEN, which is a gossip-based wireless medical sensor network (WMSN) for ambient assisted living. Our security model

  6. Bike Infrastructures

    Silva, Victor; Harder, Henrik; Jensen, Ole B.

    Bike Infrastructures aims to identify bicycle infrastructure typologies and design elements that can help promote cycling significantly. It is structured as a case study based research where three cycling infrastructures with distinct typologies were analyzed and compared. The three cases......, the findings of this research project can also support bike friendly design and planning, and cyclist advocacy....

  7. An argumentation-based method for managing complex issues in design of infrastructural systems

    Marashi, Emad; Davis, John P.

    2006-01-01

    The many interacting and conflicting requirements of a wide range of stakeholders are the main sources of complexity in the infrastructure and utility systems. We propose a systemic methodology based on negotiation and argumentation to help in the resolution of complex issues and to facilitate options appraisal during design of such systems. A process-based approach is used to assemble and propagate the evidence on performance and reliability of the system and its components, providing a success measure for different scenarios or design alternatives. The reliability of information sources and experts opinions are dealt with through an extension of the mathematical theory of evidence. This framework helps not only in capturing the reasoning behind design decisions, but also enables the decision-makers to assess and compare the evidential support for each design option

  8. MANAGEMENT AND CHALLENGES OF BRAZILIAN AIRPORT INFRASTRUCTURE: OPERATIONAL DIFFICULTIES FOR LARGE EVENTS

    Jorge Luiz Knupp Rodrigues

    2014-09-01

    Full Text Available This work aims to present, discuss and reflect on the solutions and consequences for the achievement of major events in Brazil in relation to the main operational difficulties in its current airport infrastructure. Operational difficulties refers to various factors that hinder or prevent the development of airport activities, such as aircraft delays, flight cancellations and customer discomfort. Therefore, this article seeks to think over the structure of the facilities, the lack of investment, the deadlines for solutions and other problems that need definite solution so that they will not occur again. In order to reach our objectives, we use data from literature and documentary analysis of statistical data. We present the main difficulties of operational modal Brazilian air transportation, the options for solution and the importance of actions for social, technical and financial development in Brazil.

  9. Comprehending the multiple 'values' of green infrastructure - Valuing nature-based solutions for urban water management from multiple perspectives.

    Wild, T C; Henneberry, J; Gill, L

    2017-10-01

    The valuation of urban water management practices and associated nature-based solutions (NBS) is highly contested, and is becoming increasingly important to cities seeking to increase their resilience to climate change whilst at the same time facing budgetary pressures. Different conceptions of 'values' exist, each being accompanied by a set of potential measures ranging from calculative practices (closely linked to established market valuation techniques) - through to holistic assessments that seek to address wider concerns of sustainability. Each has the potential to offer important insights that often go well beyond questions of balancing the costs and benefits of the schemes concerned. However, the need to address - and go beyond - economic considerations presents policy-makers, practitioners and researchers with difficult methodological, ethical and practical challenges, especially when considered without the benefit of a broader theoretical framework or in the absence of well-established tools (as might apply within more traditional infrastructural planning contexts, such as the analysis of transport interventions). Drawing on empirical studies undertaken in Sheffield over a period of 10 years, and delivered in partnership with several other European cities and regions, we compare and examine different attempts to evaluate the benefits of urban greening options and future development scenarios. Comparing these different approaches to the valuation of nature-based solutions alongside other, more conventional forms of infrastructure - and indeed integrating both 'green and grey' interventions within a broader framework of infrastructures - throws up some surprising results and conclusions, as well as providing important sign-posts for future research in this rapidly emerging field. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. Key Performance Indicators for Maintenance Management Effectiveness of Public Hospital Building

    Farhana Omar Mardhiah

    2017-01-01

    Full Text Available Effectiveness of management in maintenance aspect holds the key element in influencing the performance of overall maintenance management. Similarly, public hospital building needs an effective maintenance management as this type of building in nature is one of the most complex issues in the field of maintenance. Improper building maintenance management adopted by the organization significantly will interrupt the overall operation of the building. Therefore, this paper is aim to identifying the key performance indicator (KPI of effectiveness of maintenance management for the public hospital building. A total of 32 set of questionnaires were distributed to the maintenance manager for each hospital in the northern region of peninsular Malaysia by using self-administration strategy. The survey answer was analyzed by performing descriptive analysis in SPSS. Overall, the result of descriptive analysis shows that all the ten factors of effectiveness of maintenance management are accepted as KPI since the mean value is at least 3.93 which classified as important and significant. The most significant factor of effectiveness of maintenance management is task planning and scheduling with the mean score of 4.35. While less significant factor is identify as maintenance approach with the value of mean score is 3.93. The both results indicates that the management need to have well-structured planning for the maintenance works and also need to embrace the exact strategy of maintenance approach in order to achieved better overall performance of maintenance management. This study may draw a standard practice for the government in assessing the performance of public facilities in terms of maintenance management.

  11. A Lightweight Authentication and Key Management Scheme for Wireless Sensor Networks

    Danyang Qin

    2016-01-01

    Full Text Available Security problem is one of the most popular research fields in wireless sensor networks for both the application requirement and the resource-constrained essence. An effective and lightweight Authentication and Key Management Scheme (AKMS is proposed in this paper to solve the problem of malicious nodes occurring in the process of networking and to offer a high level of security with low cost. For the condition that the mobile sensor nodes need to be authenticated, the keys in AKMS will be dynamically generated and adopted for security protection. Even when the keys are being compromised or captured, the attackers can neither use the previous keys nor misuse the authenticated nodes to cheat. Simulation results show that the proposed scheme provides more efficient security with less energy consumption for wireless sensor networks especially with mobile sensors.

  12. The Platform Architecture and Key Technology of Cloud Service that Support Wisdom City Management

    Liang Xiao

    2013-05-01

    Full Text Available According to the new requirement of constructing “resource sharing and service on demand” wisdom city system, this paper put forward the platform architecture of cloud service for wisdom city management which support IaaS, PaaS and SaaS three types of service model on the basis of researching the operation mode of the wisdom city which under cloud computing environment and through the research of mass storing technology of cloud data, building technology of cloud resource pool, scheduling management methods and monitoring technology of cloud resource, security management and control technology of cloud platform and other key technologies. The platform supports wisdom city system to achieve business or resource scheduling management optimization and the unified and efficient management of large-scale hardware and software, which has the characteristics of cross-domain resource scheduling, cross-domain data sharing, cross-domain facilities integration and cross-domain service integration.

  13. @neurIST: infrastructure for advanced disease management through integration of heterogeneous data, computing, and complex processing services.

    Benkner, Siegfried; Arbona, Antonio; Berti, Guntram; Chiarini, Alessandro; Dunlop, Robert; Engelbrecht, Gerhard; Frangi, Alejandro F; Friedrich, Christoph M; Hanser, Susanne; Hasselmeyer, Peer; Hose, Rod D; Iavindrasana, Jimison; Köhler, Martin; Iacono, Luigi Lo; Lonsdale, Guy; Meyer, Rodolphe; Moore, Bob; Rajasekaran, Hariharan; Summers, Paul E; Wöhrer, Alexander; Wood, Steven

    2010-11-01

    The increasing volume of data describing human disease processes and the growing complexity of understanding, managing, and sharing such data presents a huge challenge for clinicians and medical researchers. This paper presents the @neurIST system, which provides an infrastructure for biomedical research while aiding clinical care, by bringing together heterogeneous data and complex processing and computing services. Although @neurIST targets the investigation and treatment of cerebral aneurysms, the system's architecture is generic enough that it could be adapted to the treatment of other diseases. Innovations in @neurIST include confining the patient data pertaining to aneurysms inside a single environment that offers clinicians the tools to analyze and interpret patient data and make use of knowledge-based guidance in planning their treatment. Medical researchers gain access to a critical mass of aneurysm related data due to the system's ability to federate distributed information sources. A semantically mediated grid infrastructure ensures that both clinicians and researchers are able to seamlessly access and work on data that is distributed across multiple sites in a secure way in addition to providing computing resources on demand for performing computationally intensive simulations for treatment planning and research.

  14. Integrating knowledge for managing risk in infrastructure projects : the case of tunnel works

    Chivatá Cárdenas, Ibsen

    2012-01-01

    The objective of traditional approaches to project risk management is to identify risks that can lead to project failure and to implement effective strategies to manage them. Information on the relevant causes and conditions in which failures arise is usually required as necessary input for

  15. X-Band wave radar system for monitoring and risk management of the coastal infrastructures

    Ludeno, Giovanni; Soldovieri, Francesco; Serafino, Francesco

    2017-04-01

    The presence of the infrastructures in coastal region entails an increase of the sea level and the shift of the sediment on the bottom with a continuous change of the coastline. In order to preserve the coastline, it has been necessary to resort the use of applications coastal engineering, as the construction of the breakwaters for preventing the coastal erosion. In this frame, the knowledge of the sea state parameters, as wavelength, period and significant wave height and of surface current and bathymetry can be used for the harbor operations and to prevent environmental disasters. In the last years, the study of the coastal phenomena and monitoring of the sea waves impact on the coastal infrastructures through the analysis of images acquired by marine X-band radars is of great interest [1-3]. The possibility to observe the sea surface from radar images is due to the fact that the X-band electromagnetic waves interact with the sea capillary waves (Bragg resonance), which ride on the gravity waves. However, the image acquired by a X-band radar is not the direct representation of the sea state, but it represents the sea surface as seen by the radar. Accordingly, to estimate the sea state parameters as, direction, wavelength, period of dominant waves, the significant wave height as well as the bathymetry and surface current, through a time stack of radar data are required advanced data processing procedures. In particular, in the coastal areas due to the non-uniformity of sea surface current and bathymetry fields is necessary a local analysis of the sea state parameters. In order to analyze the data acquired in coastal area an inversion procedure defined "Local Method" is adopted, which is based on the spatial partitioning of the investigated area in partially overlapping sub-areas. In addition, the analysis of the sea spectrum of each sub-area allows us to retrieve the local sea state parameters. In particular, this local analysis allows us to detect the reflected

  16. The right place. Solid waste management in the Republic of Maldives: between infrastructural measures and local practices

    Malatesta Stefano

    2015-06-01

    Full Text Available The 2010 UNPD’s Assessment of Development Results defined the Maldives “a vulnerable Small Island Developing State” by pointing out the influence of both external and local human factors on their fragile ecosystems. This impact is deeply related to a main geographical feature: the high dispersion of land mass and population, both of them spread over a distance of 860 km. Above all, this dispersion has an effect on two environmental issues: energy distribution and solid waste management. The latter is particularly interesting for the geographical analysis of Small Island Countries. Due to centre-periphery distance and cost benefits analysis, in the Maldives public and private actors have developed different solid waste management models: central and regional waste management dumpsites, hybrid systems implemented by resorts and “informal” practices still followed by local communities. In this paper, we discuss these systems stressing on the relevance of combining infrastructural measures with “informal” practices at local level. Furthermore, we report the outcomes of The Right Place, a participatory waste management action carried out by MaRHE Center (a Milano- Bicocca Research Center in Faafu Magoodhoo Island.

  17. Optimization of Key Parameters of Energy Management Strategy for Hybrid Electric Vehicle Using DIRECT Algorithm

    Jingxian Hao

    2016-11-01

    Full Text Available The rule-based logic threshold control strategy has been frequently used in energy management strategies for hybrid electric vehicles (HEVs owing to its convenience in adjusting parameters, real-time performance, stability, and robustness. However, the logic threshold control parameters cannot usually ensure the best vehicle performance at different driving cycles and conditions. For this reason, the optimization of key parameters is important to improve the fuel economy, dynamic performance, and drivability. In principle, this is a multiparameter nonlinear optimization problem. The logic threshold energy management strategy for an all-wheel-drive HEV is comprehensively analyzed and developed in this study. Seven key parameters to be optimized are extracted. The optimization model of key parameters is proposed from the perspective of fuel economy. The global optimization method, DIRECT algorithm, which has good real-time performance, low computational burden, rapid convergence, is selected to optimize the extracted key parameters globally. The results show that with the optimized parameters, the engine operates more at the high efficiency range resulting into a fuel savings of 7% compared with non-optimized parameters. The proposed method can provide guidance for calibrating the parameters of the vehicle energy management strategy from the perspective of fuel economy.

  18. Mobility Based Key Management Technique for Multicast Security in Mobile Ad Hoc Networks

    B. Madhusudhanan

    2015-01-01

    Full Text Available In MANET multicasting, forward and backward secrecy result in increased packet drop rate owing to mobility. Frequent rekeying causes large message overhead which increases energy consumption and end-to-end delay. Particularly, the prevailing group key management techniques cause frequent mobility and disconnections. So there is a need to design a multicast key management technique to overcome these problems. In this paper, we propose the mobility based key management technique for multicast security in MANET. Initially, the nodes are categorized according to their stability index which is estimated based on the link availability and mobility. A multicast tree is constructed such that for every weak node, there is a strong parent node. A session key-based encryption technique is utilized to transmit a multicast data. The rekeying process is performed periodically by the initiator node. The rekeying interval is fixed depending on the node category so that this technique greatly minimizes the rekeying overhead. By simulation results, we show that our proposed approach reduces the packet drop rate and improves the data confidentiality.

  19. Efficient Key Management System for Large-scale Smart RFID Applications

    Mohammad Fal Sadikin

    2015-08-01

    Full Text Available Due to low-cost and its practical solution, the integration of RFID tag to the sensor node called smart RFID has become prominent solution in various fields including industrial applications. Nevertheless, the constrained nature of smart RFID system introduces tremendous security and privacy problem. One of them is the problem in key management system. Indeed, it is not feasible to recall all RFID tags in order to update their security properties (e.g. update their private keys. On the other hand, using common key management solution like standard TLS/SSL is too heavy-weight that can drain and overload the limited resources. Furthermore, most of existing solutions are highly susceptible to various threats reaching from privacy threats, physical attacks to various technics of Man-in-the-Middle attacks. This paper introduces novel key management system, tailored to the limited resources of smart RFID system. It proposes light-weight mutual authentication and identity protection to mitigate the existing threats.

  20. Sustainable Materials Management (SMM) - Materials and Waste Management in the United States Key Facts and Figures

    U.S. Environmental Protection Agency — Each year EPA produces a report called Advancing Sustainable Materials Management: Facts and Figures. It includes information on municipal solid waste (MSW)...

  1. National disease management plans for key chronic non-communicable diseases in Singapore.

    Tan, C C

    2002-07-01

    In Singapore, chronic, non-communicable diseases, namely coronary heart disease, stroke and cancer, account for more than 60% of all deaths and a high burden of disability and healthcare expenditure. The burden of these diseases is likely to rise with our rapidly ageing population and changing lifestyles, and will present profound challenges to our healthcare delivery and financing systems over the next 20 to 30 years. The containment and optimal management of these conditions require a strong emphasis on patient education and the development of integrated models of healthcare delivery in place of the present uncoordinated, compartmentalised way of delivering healthcare. To meet these challenges, the Ministry of Health's major thrusts are disease control measures which focus mainly on primary prevention; and disease management, which coordinates the national effort to reduce the incidence of these key diseases and their predisposing factors and to ameliorate their long-term impact by optimising control to reduce mortality, morbidity and complications, and improving functional status through rehabilitation. The key initiatives include restructuring of the public sector healthcare institutions into two clusters, each comprising a network of primary health care polyclinics, regional hospitals and tertiary institutions. The functional integration of these healthcare elements within each cluster under a common senior administrative and professional management, and the development of common clinical IT systems will greatly facilitate the implementation of disease management programmes. Secondly, the Ministry is establishing National Disease Registries in coronary heart disease, cancer, stroke, myopia and kidney failure, which will be valuable sources of clinical and outcomes data. Thirdly, in partnership with expert groups, national committees and professional agencies, the Ministry will produce clinical practice guidelines which will assist doctors and healthcare

  2. Final report for the Integrated and Robust Security Infrastructure (IRSI) laboratory directed research and development project

    Hutchinson, R.L.; Hamilton, V.A.; Istrail, G.G.; Espinoza, J.; Murphy, M.D.

    1997-11-01

    This report describes the results of a Sandia-funded laboratory-directed research and development project titled {open_quotes}Integrated and Robust Security Infrastructure{close_quotes} (IRSI). IRSI was to provide a broad range of commercial-grade security services to any software application. IRSI has two primary goals: application transparency and manageable public key infrastructure. IRSI must provide its security services to any application without the need to modify the application to invoke the security services. Public key mechanisms are well suited for a network with many end users and systems. There are many issues that make it difficult to deploy and manage a public key infrastructure. IRSI addressed some of these issues to create a more manageable public key infrastructure.

  3. Strategical Approaches and Regulatory Infrastructure for Radioactive Waste Management in the Republic of Belarus

    Rozdyalouskaya, L.

    2016-01-01

    Three major types of RW, each requiring special consideration: • Institutional RW buried and disposed for long-term storage at the national centralized RW management facility Ekores; • Waste generated in the process of clean-up activity in the Chernobyl contaminated areas; and • RW to be generated during operation of the first Belorussian NPP after its commissioning in 2018. The paper presents strategic approaches exercised for managing the RW in past and expected developments and options for RW management in Belarus in future

  4. A Systems Approach to Information Technology (IT) Infrastructure Design for Utility Management Automation Systems

    A. Fereidunian; H. Lesani; C. Lucas; M. Lehtonen; M. M. Nordman

    2006-01-01

    Almost all of electric utility companies are planning to improve their management automation system, in order to meet the changing requirements of new liberalized energy market and to benefit from the innovations in information and communication technology (ICT or IT). Architectural design of the utility management automation (UMA) systems for their IT-enabling requires proper selection of IT choices for UMA system, which leads to multi-criteria decision-makings (MCDM). In resp...

  5. NMCI to NGEN: Managing the Transition of Navy Information Technology Infrastructure

    2013-03-01

    the Office of Management and Budget (OMB) Circular Number A-76. Circular A-76 outlined a mandatory process of cost benefit analysis of new...Weaknesses, Opportunities and Threats ( SWOT ) analysis template. The basic SWOT described by the originator Albert Humphrey, was a derivative of...research conducted to by the Stanford Research institute to evaluate change management in organizations (SRI, 2005). Current use SWOT analysis is

  6. RE: Forests and forest management plays a key role in mitigating climate change

    Bentsen, Niclas Scott; Nord-Larsen, Thomas; Larsen, Søren

    2016-01-01

    as also reported by Naudts et al. By ignoring the link between forestry and fossil carbon pools and not considering development in the absence of forest management, there is no accounting for the effect on GHG emissions, and no basis for estimating the contribution of forest management to cl......The report by Naudts et al. concludes that forest management in Europe during the last 260 years has failed to result in net CO2 removal from the atmosphere. The authors have reached this conclusion through their failure to consider a key factor in their otherwise comprehensive analysis....... The authors present an analysis of net carbon emissions from forest, but omit substitution effects related to the link between forest management and the fossil carbon pool. The link between fossil and terrestrial carbon pools is however critical for modelling climate impacts. To conclude as they do...

  7. SeaDataNet II - EMODNet Bathymetry - building a pan-European infrastructure for marine and ocean data management and a digital high resolution bathymetry for European seas

    Schaap, Dick M. A.; Fichaut, Michele

    2015-04-01

    The second phase of the project SeaDataNet is well underway since October 2011. The main objective is to improve operations and to progress towards an efficient data management infrastructure able to handle the diversity and large volume of data collected via research cruises and monitoring activities in European marine waters and global oceans. The SeaDataNet infrastructure comprises a network of interconnected data centres and a central SeaDataNet portal. The portal provides users a unified and transparent overview of the metadata and controlled access to the large collections of data sets, managed by the interconnected data centres, and the various SeaDataNet standards and tools,. SeaDataNet is also setting and governing marine data standards, and exploring and establishing interoperability solutions to connect to other e-infrastructures on the basis of standards of ISO (19115, 19139), OGC (WMS, WFS, CS-W and SWE), and OpenSearch. The population of directories has increased considerably in cooperation and involvement in associated EU projects and initiatives. SeaDataNet now gives overview and access to more than 1.6 million data sets for physical oceanography, chemistry, geology, geophysics, bathymetry and biology from more than 100 connected data centres from 34 countries riparian to European seas. Access to marine data is also a key issue for the implementation of the EU Marine Strategy Framework Directive (MSFD). The EU communication 'Marine Knowledge 2020' underpins the importance of data availability and harmonising access to marine data from different sources. SeaDataNet qualified itself for an active role in the data management component of the EMODnet (European Marine Observation and Data network) that is promoted in the EU Communication. Starting 2009 EMODnet pilot portals have been initiated for marine data themes: digital bathymetry, chemistry, physical oceanography, geology, biology, and seabed habitat mapping. These portals are being expanded to all

  8. Complex of Key Instruments of Management of Operation Activity of a Small Business Trade Enterprise

    Serdyuk Vira M.

    2013-11-01

    Full Text Available The article offers a complex of key instruments of management of operation activity of a small business trade enterprise, including: 1 budgeting of operation activity; 2 its accounting by norms and deviations from them; 3 monitoring of operational activity of an enterprise, which envisages analysis of revealed deviations. The article shows the most efficient way of realisation and practical use of the presented concept – application of the “standard-cost” scheme within the framework of which the following tasks are solved: 1 budgeting of income from operational activity; 2 establishment of standards of costs; 3 accumulation of data on factual income and expenditures; 4 analysis of deviations and reporting; and 5 introduction of necessary amendments. The article also offers an imitation model of analysis of dynamics of trade processes, which allows detection of key spheres of management of operation activity of a small trade enterprise and principles of carrying out an efficient and well thought over financial policy.

  9. A brief review on key technologies in the battery management system of electric vehicles

    Liu, Kailong; Li, Kang; Peng, Qiao; Zhang, Cheng

    2018-04-01

    Batteries have been widely applied in many high-power applications, such as electric vehicles (EVs) and hybrid electric vehicles, where a suitable battery management system (BMS) is vital in ensuring safe and reliable operation of batteries. This paper aims to give a brief review on several key technologies of BMS, including battery modelling, state estimation and battery charging. First, popular battery types used in EVs are surveyed, followed by the introduction of key technologies used in BMS. Various battery models, including the electric model, thermal model and coupled electro-thermal model are reviewed. Then, battery state estimations for the state of charge, state of health and internal temperature are comprehensively surveyed. Finally, several key and traditional battery charging approaches with associated optimization methods are discussed.

  10. Cooperating Mobile GIS and Wireless Sensor Networks for Managing Transportation Infrastructures in Urban areas

    R. Shad

    2013-10-01

    Full Text Available Time management is a major subject which, in order to optimize trip conditions, emphasizes on interpreting processes and classifying individual's information. In this paper, with the aim of providing an optimal system for urban commuting in proper time in Mashhad, each user using SMS and introducing some of his/her mental priorities to the system, will be able to select the best option depending on the timing of movement of the available public transport system. The present study adopts a newly developed method of time management which is evaluated for urban transportation considering dynamic conditions of a spatial database. For this purpose, regarding time management, processed data such as bus lines, taxi networks, and the subway system are combined in a spatial framework of a designed Mobile GIS based on a wireless network. So, multiple potential paths which end to a desirable destination.

  11. Policy legitimacy - The key to long term Management of Radioactive Waste

    Atherton, E.; Dalton, J.; Wild, D.

    2003-01-01

    Experience in the UK has shown that the central theme of delivering a solution is contingent on building a broad base of support for the long term management project. This is multi-layered, both in terms of local, regional and national political actors, but also across societal groups. Legitimacy is the key to success and needs to be understood in three main domains - equity, competence and economics. Finding the appropriate balance is essential for progress in the long term. (authors)

  12. Efficient User Authentication and Key Management for Peer-to-Peer Live Streaming Systems

    LIU Xuening; YIN Hao; LIN Chuang; DU Changlai

    2009-01-01

    Recent development of the peer-to-peer (P2P) live streaming technique has brought unprece-dented new momentum to the Internet with the characters of effective, scalable, and low cost. However, be-fore these applications can be successfully deployed as commercial applications, efficient access control mechanisms are needed. This work based on earlier research of the secure streaming architecture in Trust-Stream, analyzes how to ensure that only authorized users can access the original media in the P2P live streaming system by adopting a user authentication and key management scheme. The major features of this system include (1) the management server issues each authorized user a unique public key certificate,(2) the one-way hash chain extends the certificate's lifetime, (3) the original media is encrypted by the ses-sion key and delivered to the communication group, and (4) the session key is periodically updated and dis-tributed with the media. Finally, analyses and test results show that scheme provides a secure, scalable, re-liable, and efficient access control solution for P2P live streaming systems.

  13. Impact of a community-based diabetes self-management program on key metabolic parameters

    Johnson C

    2014-12-01

    Full Text Available Objective: Characterize the impact of a pharmacist-led diabetes self-management program on three key metabolic parameters: glycosylated hemoglobin (HbA1c, low-density lipoprotein cholesterol (LDL-C, and mean arterial blood pressure (MAP among employee health program participants. Methods: A self-insured company in the Kansas City metropolitan area began offering a pharmacist-led diabetes self-management program to eligible company employees and their dependents in 2008. A retrospective pre-post analysis was conducted to determine if the program affected key metabolic parameters in participants by determining mean change after one year of participation. Results: Among 183 program participants, 65 participants met inclusion criteria. All three key metabolic parameters were significantly reduced from baseline to one year of program participation: HbA1c decreased from 8.1% to 7.3% (p=0.007; LDL-C decreased from 108.3 mg/dL to 96.4 mg/dL (p=0.009; and MAP decreased from 96.1 to 92.3 mm Hg (p=0.005. Conclusions: The pharmacist-led diabetes self-management program demonstrated significant reductions in HbA1c, LDL-C, and MAP from baseline to one year of program participation. Improvements were statistically significant and clinically relevant for each parameter. Previous studies indicate these reductions may cause reduced overall healthcare costs.

  14. Integrated water resources management and infrastructure planning for water security in Southern Africa

    Mapani, Benjamin; Magole, Lapologang; Makurira, Hodson; Meck, Maideyi; Mkandawire, Theresa; Mul, Marloes; Ngongondo, Cosmo

    2017-08-01

    This volume has brought together papers that are peer reviewed emanating from the WaterNet/WARFSA/GWP-SA 16th Symposium. The papers cover the following themes: Hydrology, Water and Environment, Water and Land, Water and Society, Water Supply and Sanitation and Water Resources Management.

  15. Audit Culture and the Infrastructures of Excellence: On the Effects of Campus Management Technologies

    Vonderau, Asta

    2015-01-01

    Drawing upon ethnographic data, this article investigates the effects of a new online campus management system in one of the largest universities in Germany. It shows the various ways in which this technological innovation influenced students', teachers' and administrative personnel's relations and everyday working practices and how it is…

  16. A systems approach to managing R&D in the road infrastructure in South Africa

    Rust, FC

    2009-01-01

    Full Text Available sector and research organisations. The emphasis was on managing the synergy between the programmes in a holistic approach, thus enhancing the outcome and impact of the programmes. It is shown that the implementation of the models and tools had a...

  17. RAILWAY INFRASTRUCTURE CAPACITY MANAGEMENT FOR AD-HOC TRAINS ON THE SŽDC NETWORK

    Petr Nachtigall

    2016-09-01

    Full Text Available The paper describes basic principles of ad-hoc routes assignment. Each carrier has its own interface called information system KADR with SŽDC for capacity requests management. The paper describes all steps which must be done before train departure.

  18. Location-Aware Dynamic Session-Key Management for Grid-Based Wireless Sensor Networks

    I-Hsien Lin

    2010-08-01

    Full Text Available Security is a critical issue for sensor networks used in hostile environments. When wireless sensor nodes in a wireless sensor network are distributed in an insecure hostile environment, the sensor nodes must be protected: a secret key must be used to protect the nodes transmitting messages. If the nodes are not protected and become compromised, many types of attacks against the network may result. Such is the case with existing schemes, which are vulnerable to attacks because they mostly provide a hop-by-hop paradigm, which is insufficient to defend against known attacks. We propose a location-aware dynamic session-key management protocol for grid-based wireless sensor networks. The proposed protocol improves the security of a secret key. The proposed scheme also includes a key that is dynamically updated. This dynamic update can lower the probability of the key being guessed correctly. Thus currently known attacks can be defended. By utilizing the local information, the proposed scheme can also limit the flooding region in order to reduce the energy that is consumed in discovering routing paths.

  19. Clinical risk management in hospitals: strategy, central coordination and dialogue as key enablers.

    Briner, Matthias; Manser, Tanja; Kessler, Oliver

    2013-04-01

    The study aims to identify key enablers fostering clinical risk management (CRM) in hospitals to guide health care in this vital area of patient safety. A cross-sectional survey was conducted at the national level in 324 Swiss hospitals in 2007-2008 to assess the relationship between key elements and systematic CRM. Therefore, a comprehensive monitoring instrument for CRM was used for the first time. Organizational factors (e.g. strategy, coordination, resources) and structural conditions (e.g. hospital size) were tested as key elements. CRM was assessed by evaluating its maturity (i.e. the level of CRM development) by 12 theoretically derived indices joining together essential aspects of CRM at the hospital level and the service level. Chi-square measures were used to analyse the relationships between organizational factors or structural conditions and maturity of CRM. Participation in this voluntary survey was good, with CRM experts of 138 out of 324 hospitals responding (response rate 43%). Three key enablers for CRM were identified: implementing a function for central CRM coordination, assuring dialogue with and between the different hospital services, and developing strategic CRM objectives. This study offers, for the first time, an assessment of the maturity of hospitals' CRM and identifies key enablers related to CRM. This is a feasible first step in guiding hospitals to shape their CRM and presents a basis for future studies, for example, linking CRM to outcome data. © 2012 Blackwell Publishing Ltd.

  20. Study on the Decision-Making Process in Selecting Rail Infrastructure Managers

    Dăneci-Pătrau Daniel

    2017-01-01

    Full Text Available The current economic context led to a significant decline in job vacancies in parallel with the downsizing numerous organizations were forced to make. Some of them ceased the hiring process as in the case of the national company CFR SA, while those with available positions focus on multiple skills and abilities and expertise exhibited in certain fields. In the context of the research concluded by the author, the identified issue circled around the decision to select the most suitable manager possessing the necessary qualities to participate in a scientific activity within the railway sector. To deliver a scientifically based solution also objectively determined, we built a specific multicriterial tree pattern with utility functions for the professional performances assessment and used the DEXi expert system in view of reaching the optimum version and making the selection decision. This method is our own contribution for the assessment of managers' professional.

  1. The Proposal of Key Performance Indicators in Facility Management and Determination the Weights of Significance

    Rimbalová, Jarmila; Vilčeková, Silvia

    2013-11-01

    The practice of facilities management is rapidly evolving with the increasing interest in the discourse of sustainable development. The industry and its market are forecasted to develop to include non-core functions, activities traditionally not associated with this profession, but which are increasingly being addressed by facilities managers. The scale of growth in the built environment and the consequential growth of the facility management sector is anticipated to be enormous. Key Performance Indicators (KPI) are measure that provides essential information about performance of facility services delivery. In selecting KPI, it is critical to limit them to those factors that are essential to the organization reaching its goals. It is also important to keep the number of KPI small just to keep everyone's attention focused on achieving the same KPIs. This paper deals with the determination of weights of KPI of FM in terms of the design and use of sustainable buildings.

  2. Chef infrastructure automation cookbook

    Marschall, Matthias

    2013-01-01

    Chef Infrastructure Automation Cookbook contains practical recipes on everything you will need to automate your infrastructure using Chef. The book is packed with illustrated code examples to automate your server and cloud infrastructure.The book first shows you the simplest way to achieve a certain task. Then it explains every step in detail, so that you can build your knowledge about how things work. Eventually, the book shows you additional things to consider for each approach. That way, you can learn step-by-step and build profound knowledge on how to go about your configuration management

  3. Engineering youth service system infrastructure: Hawaii's continued efforts at large-scale implementation through knowledge management strategies.

    Nakamura, Brad J; Mueller, Charles W; Higa-McMillan, Charmaine; Okamura, Kelsie H; Chang, Jaime P; Slavin, Lesley; Shimabukuro, Scott

    2014-01-01

    Hawaii's Child and Adolescent Mental Health Division provides a unique illustration of a youth public mental health system with a long and successful history of large-scale quality improvement initiatives. Many advances are linked to flexibly organizing and applying knowledge gained from the scientific literature and move beyond installing a limited number of brand-named treatment approaches that might be directly relevant only to a small handful of system youth. This article takes a knowledge-to-action perspective and outlines five knowledge management strategies currently under way in Hawaii. Each strategy represents one component of a larger coordinated effort at engineering a service system focused on delivering both brand-named treatment approaches and complimentary strategies informed by the evidence base. The five knowledge management examples are (a) a set of modular-based professional training activities for currently practicing therapists, (b) an outreach initiative for supporting youth evidence-based practices training at Hawaii's mental health-related professional programs, (c) an effort to increase consumer knowledge of and demand for youth evidence-based practices, (d) a practice and progress agency performance feedback system, and (e) a sampling of system-level research studies focused on understanding treatment as usual. We end by outlining a small set of lessons learned and a longer term vision for embedding these efforts into the system's infrastructure.

  4. Key factors of case management interventions for frequent users of healthcare services: a thematic analysis review.

    Hudon, Catherine; Chouinard, Maud-Christine; Lambert, Mireille; Diadiou, Fatoumata; Bouliane, Danielle; Beaudin, Jérémie

    2017-10-22

    The aim of this paper was to identify the key factors of case management (CM) interventions among frequent users of healthcare services found in empirical studies of effectiveness. Thematic analysis review of CM studies. We built on a previously published review that aimed to report the effectiveness of CM interventions for frequent users of healthcare services, using the Medline, Scopus and CINAHL databases covering the January 2004-December 2015 period, then updated to July 2017, with the keywords 'CM' and 'frequent use'. We extracted factors of successful (n=7) and unsuccessful (n=6) CM interventions and conducted a mixed thematic analysis to synthesise findings. Chaudoir's implementation of health innovations framework was used to organise results into four broad levels of factors: (1) ,environmental/organisational level, (2) practitioner level, (3) patient level and (4) programme level. Access to, and close partnerships with, healthcare providers and community services resources were key factors of successful CM interventions that should target patients with the greatest needs and promote frequent contacts with the healthcare team. The selection and training of the case manager was also an important factor to foster patient engagement in CM. Coordination of care, self-management support and assistance with care navigation were key CM activities. The main issues reported by unsuccessful CM interventions were problems with case finding or lack of care integration. CM interventions for frequent users of healthcare services should ensure adequate case finding processes, rigorous selection and training of the case manager, sufficient intensity of the intervention, as well as good care integration among all partners. Other studies could further evaluate the influence of contextual factors on intervention impacts. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted

  5. Evaluating Effectiveness of Green Infrastructure Application of Stormwater Best Management Practices in Protecting Stream Habitat and Biotic Condition in New England

    The US EPA is developing assessment tools to evaluate the effectiveness of green infrastructure (GI) applied in stormwater best management practices (BMPs) at the small watershed (HUC12 or finer) scale. Based on analysis of historical monitoring data using boosted regression tre...

  6. Accident prediction models for rural junctions on four European countries. Road Infrastructure Safety Management Evaluation Tools (RISMET), Deliverable No. 6.1.

    Azeredo Lopes, S. de & Lourenço Cardoso, J.

    2014-01-01

    The "Road Infrastructure Safety Management Evaluation Tools (RISMET)" project targets objective A (Development of evaluation tools) of the Joint Call for Proposals for Safety at the Heart of Road Design ("The Call"). This project aims at developing suitable road safety engineering evaluation tools

  7. Associate Directorate Environmental Management Infrastructure Plan for Area G and Area L Domes

    Stevens, Patrice Ann; Baumer, Andrew Ronald

    2016-01-01

    Technical Area 54, at Los Alamos National Laboratory (LANL) is situated in the east-central portion of the Laboratory on the Mesita del Buey between Pajarito Canyon to the south and Canada del Buey to the north. TA-54 includes four MDAs designated as G, H, J, and L; a waste characterization, container storage, and transfer facility; active TRU waste and MLLW waste storage and low-level waste (LLW) disposal operations at Area G; active hazardous and mixed low-level (MLLW) waste storage operations at Area L; and administrative and support areas. MDA J has previously under-gone closure. Area G is a waste management and disposal area, used for the disposal and storage of radioactive wastes since 1957. Since August 2015, Area G has been in warm standby and provides minimal operations to support safety, compliance, and nitrate salt remediation. Located within Area G, MDA G covers 63-acres. MDA G contains 334 active and inactive waste management units, which include 36 pits, 294 shafts, and 4 trenches. In 1971, Area G began use for the retrievable storage of TRU waste. There are two pits, four trenches and 60 shafts that contain retrievable TRU waste. Thirty-three of the shafts contain TRU waste that may present unique problems for retrieval. In 1986, segregation of MLLW was initiated at Area G for treatment and temporary storage or for off-site disposal. Area G is the only active LLW disposal facility at the Laboratory. Current operations at Area G include storage and characterization of TRU and mixed TRU waste destined for off-site disposal at the Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico and the storage of MLLW destined for off-site treatment and/or disposal. Several above-ground container storage units (CSUs) are currently used for storage of containerized MLLW and/or mixed TRU wastes. These consist of asphalt pads and associated fabric domes or other structures. As defined by the Consent Order, MDA G contains 229 of the 334 subsurface waste

  8. Associate Directorate Environmental Management Infrastructure Plan for Area G and Area L Domes

    Stevens, Patrice Ann [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Baumer, Andrew Ronald [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2016-09-26

    Technical Area 54, at Los Alamos National Laboratory (LANL) is situated in the east-central portion of the Laboratory on the Mesita del Buey between Pajarito Canyon to the south and Cañada del Buey to the north. TA-54 includes four MDAs designated as G, H, J, and L; a waste characterization, container storage, and transfer facility; active TRU waste and MLLW waste storage and low-level waste (LLW) disposal operations at Area G; active hazardous and mixed low-level (MLLW) waste storage operations at Area L; and administrative and support areas. MDA J has previously under-gone closure. Area G is a waste management and disposal area, used for the disposal and storage of radioactive wastes since 1957. Since August 2015, Area G has been in warm standby and provides minimal operations to support safety, compliance, and nitrate salt remediation. Located within Area G, MDA G covers 63-acres. MDA G contains 334 active and inactive waste management units, which include 36 pits, 294 shafts, and 4 trenches. In 1971, Area G began use for the retrievable storage of TRU waste. There are two pits, four trenches and 60 shafts that contain retrievable TRU waste. Thirty-three of the shafts contain TRU waste that may present unique problems for retrieval. In 1986, segregation of MLLW was initiated at Area G for treatment and temporary storage or for off-site disposal. Area G is the only active LLW disposal facility at the Laboratory. Current operations at Area G include storage and characterization of TRU and mixed TRU waste destined for off-site disposal at the Waste Isolation Pilot Plant (WIPP) in southeastern New Mexico and the storage of MLLW destined for off-site treatment and/or disposal. Several above-ground container storage units (CSUs) are currently used for storage of containerized MLLW and/or mixed TRU wastes. These consist of asphalt pads and associated fabric domes or other structures. As defined by the Consent Order, MDA G contains 229 of the 334 subsurface waste

  9. Green infrastructure for flood risk management in Dar es Salaam and Copenhagen

    Mguni, Patience; Herslund, Lise Byskov; Jensen, Marina Bergen

    2015-01-01

    , a comparison of the opportunities and barriers to the implementation of SUDS in Dar es Salaam and Copenhagen is presented. The results indicate that a bottom-up approach in Dar es Salaam is important, with the community level taking the lead, while in Copenhagen the top-down approach currently employed......The risk of flooding in urban areas could be better approached by complementing conventional sewer systems with sustainable urban drainage systems (SUDS) for storm-water management. This may be the case for developing world cities like Dar es Salaam with incomplete sewer services, as well as cities...

  10. Planning multifunctional green infrastructure for compact cities

    Hansen, Rieke; Olafsson, Anton Stahl; van der Jagt, Alexander P.N.

    2018-01-01

    green space functions or the purposive design and management of multifunctional parks. Based on the findings, we arrive at five recommendations for promoting multifunctional urban green infrastructure in densifying urban areas: 1) undertake systematic spatial assessments of all urban green (and blue....... Further, spatial assessment, strategic planning and site design need to 4) consider synergies, trade-offs and the capacity of urban green spaces to provide functions as part of the wider green infrastructure network; and 5) largely benefit from cooperation between different sectors and public departments......Urban green infrastructure planning aims to develop green space networks on limited space in compact cities. Multifunctionality is considered key to achieving this goal as it supports planning practice that considers the ability of green spaces to provide multiple benefits concurrently. However...

  11. LBS AUGMENTED REALITY ASSISTIVE SYSTEM FOR UTILITIES INFRASTRUCTURE MANAGEMENT THROUGH GALILEO AND EGNOS

    E. Stylianidis

    2016-06-01

    Full Text Available There is a continuous and increasing demand for solutions, both software and hardware-based, that are able to productively handle underground utilities geospatial data. Innovative approaches that are based on the use of the European GNSS, Galileo and EGNOS, sensor technologies and LBS, are able to monitor, document and manage utility infrastructures’ data with an intuitive 3D augmented visualisation and navigation/positioning technology. A software and hardware-based system called LARA, currently under develop- ment through a H2020 co-funded project, aims at meeting that demand. The concept of LARA is to integrate the different innovative components of existing technologies in order to design and develop an integrated navigation/positioning and information system which coordinates GNSS, AR, 3D GIS and geodatabases on a mobile platform for monitoring, documenting and managing utility infrastruc- tures on-site. The LARA system will guide utility field workers to locate the working area by helping them see beneath the ground, rendering the complexity of the 3D models of the underground grid such as water, gas and electricity. The capacity and benefits of LARA are scheduled to be tested in two case studies located in Greece and the United Kingdom with various underground utilities. The paper aspires to present the first results from this initiative. The project leading to this application has received funding from the European GNSS Agency under the European Union’s Horizon 2020 research and innovation programme under grant agreement No 641460.

  12. Decision Support System (DSS) for MSMA Integrated Stormwater Management Ecohydrology for Sustainable Green Infrastructure

    Sidek, L. M.; Mohiyaden, H. A.; Haris, H.; Basri, H.; Muda, Z. C.; Roseli, Z. A.; Norlida, M. D.

    2016-03-01

    Rapid urbanization has known to have several adverse impacts towards hydrological cycle due to increasing impervious surface and degradation of water quality in stormwater runoff. In the past, urban waterways have been confined to narrow river corridors with the channels canalised and concrete and other synthetic materials forming the bed and banks of the river. Apart from that, stormwater pollutants such as litter, debris and sediments in drainage system are common problems that can lead to flooding and the degradation of water quality. To solve this problem, implementing stormwater Best Management Practices (BMPs) proves very promising due to its near natural characteristics and multiple effects on the drainage of stormwater runoff in urban areas. This judgment of using BMPs depends on not only relevant theoretical considerations, but also a large amount of practical experience and the availability of relevant data, as well. To fulfil this task, the so-called Decision Support System (DSS) in MSMA Design Aid and Database system are able to assist engineers and developers in management and improvement of water quantity and quality entering urban rivers from urban regions. This system is also helpful when an expert level judgment procure some repetitive and large amount of cases, like in the planning of stormwater BMPs systems for an entire city catchment. One of the advantages of an expert system is that it provides automation of expert-level judgement using availability of checking tools system.

  13. Cyber Risk Management for Critical Infrastructure: A Risk Analysis Model and Three Case Studies.

    Paté-Cornell, M-Elisabeth; Kuypers, Marshall; Smith, Matthew; Keller, Philip

    2018-02-01

    Managing cyber security in an organization involves allocating the protection budget across a spectrum of possible options. This requires assessing the benefits and the costs of these options. The risk analyses presented here are statistical when relevant data are available, and system-based for high-consequence events that have not happened yet. This article presents, first, a general probabilistic risk analysis framework for cyber security in an organization to be specified. It then describes three examples of forward-looking analyses motivated by recent cyber attacks. The first one is the statistical analysis of an actual database, extended at the upper end of the loss distribution by a Bayesian analysis of possible, high-consequence attack scenarios that may happen in the future. The second is a systems analysis of cyber risks for a smart, connected electric grid, showing that there is an optimal level of connectivity. The third is an analysis of sequential decisions to upgrade the software of an existing cyber security system or to adopt a new one to stay ahead of adversaries trying to find their way in. The results are distributions of losses to cyber attacks, with and without some considered countermeasures in support of risk management decisions based both on past data and anticipated incidents. © 2017 Society for Risk Analysis.

  14. Conceptual framework for holistic dialysis management based on key performance indicators.

    Liu, Hu-Chen; Itoh, Kenji

    2013-10-01

    This paper develops a theoretical framework of holistic hospital management based on performance indicators that can be applied to dialysis hospitals, clinics or departments in Japan. Selection of a key indicator set and its validity tests were performed primarily by a questionnaire survey to dialysis experts as well as their statements obtained through interviews. The expert questionnaire asked respondents to rate the degree of "usefulness" for each of 66 indicators on a three-point scale (19 responses collected). Applying the theoretical framework, we selected a minimum set of key performance indicators for dialysis management that can be used in the Japanese context. The indicator set comprised 27 indicators and items that will be collected through three surveys: patient satisfaction, employee satisfaction, and safety culture. The indicators were confirmed by expert judgment from viewpoints of face, content and construct validity as well as their usefulness. This paper established a theoretical framework of performance measurement for holistic dialysis management from primary healthcare stakeholders' perspectives. In this framework, performance indicators were largely divided into healthcare outcomes and performance shaping factors. Indicators of the former type may be applied for the detection of operational problems or weaknesses in a dialysis hospital, clinic or department, while latent causes of each problem can be more effectively addressed by the latter type of indicators in terms of process, structure and culture/climate within the organization. © 2013 The Authors. Therapeutic Apheresis and Dialysis © 2013 International Society for Apheresis.

  15. Mobile Device Based Dynamic Key Management Protocols for Wireless Sensor Networks

    Chin-Ling Chen

    2015-01-01

    Full Text Available In recent years, wireless sensor network (WSN applications have tended to transmit data hop by hop, from sensor nodes through cluster nodes to the base station. As a result, users must collect data from the base station. This study considers two different applications: hop by hop transmission of data from cluster nodes to the base station and the direct access to cluster nodes data by mobile users via mobile devices. Due to the hardware limitations of WSNs, some low-cost operations such as symmetric cryptographic algorithms and hash functions are used to implement a dynamic key management. The session key can be updated to prevent threats of attack from each communication. With these methods, the data gathered in wireless sensor networks can be more securely communicated. Moreover, the proposed scheme is analyzed and compared with related schemes. In addition, an NS2 simulation is developed in which the experimental results show that the designed communication protocol is workable.

  16. COST ACCOUNTING AS THE KEY INFORMATION CORE OF THE COMPANY MANAGEMENT

    Radmila Jablan STEFANOVIĆ

    2010-12-01

    Full Text Available The management is expected to lead the company towards the achievement of set objectives which, in the contemporary settings of marked external and internal complexity, inevitably requires sophisticated expert knowledge and skills, as well as quality information support. Cost accounting generates cost and performance information with the goal of qualitatively meeting information needs of, above all, internal users. It represents the essential part of the company’s accounting information system as a whole and it is often stressed as the key information core and a reliable information support for the company’s management in performing their managerial activities. The contemporary business environment inevitably requires the restructuring of cost accounting and new approaches to costing and cost management, in the attempt to improve the quality of cost information that has always been the object of particular interest. Moreover, only a flexibly designed cost accounting information system can qualitatively respond to the increasingly numerous and various information requirements. In this paper we discuss the role cost accounting has in offering adequate information support to managers at all managerial levels. We emphasize some of the new tools, techniques, concepts and approaches to costing and cost management

  17. Deploying and managing a cloud infrastructure real-world skills for the Comptia cloud+ certification and beyond exam CV0-001

    Salam, Abdul; Ul Haq, Salman

    2015-01-01

    Learn in-demand cloud computing skills from industry experts Deploying and Managing a Cloud Infrastructure is an excellent resource for IT professionals seeking to tap into the demand for cloud administrators. This book helps prepare candidates for the CompTIA Cloud+ Certification (CV0-001) cloud computing certification exam. Designed for IT professionals with 2-3 years of networking experience, this certification provides validation of your cloud infrastructure knowledge. With over 30 years of combined experience in cloud computing, the author team provides the latest expert perspectives on

  18. Research on and design of key circuits in RFID tag chip for container management

    Wang Wenjie

    2016-01-01

    Full Text Available This paper introduces the design of semi-passive RFID tag chip capable of monitoring container safety. A system framework complying with requirements by ISO/IEC 18000-6C is firstly presented, and then differences from the key units of common passive chip, such as switch-state monitoring circuit, power management unit and anti-shake design in baseband processor, are elaborated. The main function of such a chip is to record the container opening frequency during transportation. Finally, the realizations of each unit’s function are simulated.

  19. The Existing Barriers and Infrastructures to Implement Accreditation from the Perspective of Hospitals’ Managers in East Azerbaijan Hospitals: A Mixed Method Study

    Saber Azami-Aghdash

    2015-08-01

    Full Text Available ​Background and Objectives : The aim of this study was to assess the infrastructures and barriers of effective accreditation in East Azerbaijan hospitals. Material and Methods : In this triangulation (qualitative-quantitative study, all the managers of 43 hospitals in East Azerbaijan were selected. The authors developed an 8-item questionnaire for   quantitative section of the study which its validity was improved by experts’ comments and its reliability was assessed by half-structure methods (9. =α. In addition, two open-ended questions were used in qualitative section of the study. Quantitative data were analyzed using descriptive statistics, t-test, and ANOVA test using SPSS version 20 statistical software packages. Qualitative content analysis was used to analyze the responses to the two open-ended questions. Results : Seventy-six percent of the managers agreed to implementation of accreditation in hospitals and believed that accreditation could improve the health services and increase the patient and staff satisfaction. Fifty percent of the participants had lack of required knowledge about the accreditation and they declared that the hospitals managed by them were not prepared to implement accreditation with respect to resources, manager’s commitment, staff skills and knowledge. In Tabriz hospitals, resources and infrastructures were mentioned to exist in a significantly higher proportion than other cities (P Conclusion : Considering the barriers and lack of infrastructures in the hospitals of East Azerbaijan to achieve an effective accreditation, it is essential to eliminate the existing barriers and provide appropriate infrastructures.

  20. Processing Risk In Asset Management : Exploring The Boundaries Of Risk Based Optimization Under Uncertainty For An Energy Infrastructure Asset Manager

    Wijnia, Y.C.

    2016-01-01

    In the liberalized energy market Distribution Network Operators (DNOs) are confronted with income reductions by the regulator. The common response to this challenge is the implementation of asset management, which can be regarded as systematically applying Cost Benefit Analysis (CBA) to the risks in

  1. Water institutions and governance models for the funding, financing and management of water infrastructure in South Africa

    Ruiters, Cornelius

    2015-10-01

    Full Text Available for the funding, financing and development of water infrastructure projects in South Africa, i.e. Model 1: direct fiscal (NRF) funding, Model 2: ring-fenced special purpose vehicle (SPV), Model 3: SPV housing dedicated water infrastructure cash-flows, Model 4...

  2. Coordinated Border Management Through Digital Trade Infrastructures and Trans-National Government Cooperation : The FloraHolland Case

    Rukanova, B.D.; Huiden, Roel; Tan, Y.

    2017-01-01

    Digital infrastructures (DI) that support information exchange related to international trade processes (here referred to as Digital Trade Infrastructures (DTI)) have been seen as an instrument to help address the trade facilitation and security challenges. Data pipelines can be seen as an example

  3. Lifetime assessment and lifetime management for key components of nuclear power plants

    Dou Yikang; Sun Hanhong; Qu Jiadi

    2000-01-01

    On the bases of investigation on recent development of plant lifetime management in the world, the author gives some points of view on how to establish plant lifetime assessment (PLA) and management (PLM) systems for Chinese nuclear power plants. The main points lie in: 1) safety regulatory organizations, utilities and R and D institutes work cooperatively for PLA and PLM; 2) PLA and PLM make a interdependent cycle, which means that a good PLM system ensures authentic input for PLA, while veritable PLA provides valuable feedback for PLM improvement; 3) PLA and PLM should be initiated for some key components. The author also analyzes some important problems to be tackled in PLA and PLM from the view angle of a R and D institute

  4. School infrastructure performance indicator system (SIPIS)

    Gibberd, Jeremy T

    2007-05-01

    Full Text Available This paper describes the School Infrastructure Performance Indicator System (SIPIS) project which explores how an indicator system could be developed for school infrastructure in South Africa. It outlines the key challenges faced by the system...

  5. Emergency management in health: key issues and challenges in the UK.

    Lee, Andrew C K; Phillips, Wendy; Challen, Kirsty; Goodacre, Steve

    2012-10-19

    Emergency planning in the UK has grown considerably in recent years, galvanised by the threat of terrorism. However, deficiencies in NHS emergency planning were identified and the evidence-base that underpins it is questionable. Inconsistencies in terminologies and concepts also exist. Different models of emergency management exist internationally but the optimal system is unknown. This study examines the evidence-base and evidence requirements for emergency planning in the UK health context. The study involved semi-structured interviews with key stakeholders and opinion leaders. Purposive sampling was used to obtain a breadth of views from various agencies involved in emergency planning and response. Interviews were then analysed using a grounded approach using standard framework analysis techniques. We conducted 17 key informant interviews. Interviewees identified greater gaps in operational than technical aspects of emergency planning. Social and behavioural knowledge gaps were highlighted with regards to how individuals and organisations deal with risk and behave in emergencies. Evidence-based approaches to public engagement and for developing community resilience to disasters are lacking. Other gaps included how knowledge was developed and used. Conflicting views with regards to the optimal configuration and operation of the emergency management system were voiced. Four thematic categories for future research emerged:(i) Knowledge-base for emergency management: Further exploration is needed of how knowledge is acquired, valued, disseminated, adopted and retained.(ii) Social and behavioural issues: Greater understanding of how individuals approach risk and behave in emergencies is required.(iii) Organisational issues in emergencies: Several conflicting organisational issues were identified; value of planning versus plans, flexible versus standardized procedures, top-down versus bottom-up engagement, generic versus specific planning, and reactive versus

  6. Secure metropolitan network and the management of branches in the technological infrastructure:Case study GADM Babahoyo City

    Joffre Vicente León Acurio

    2016-12-01

    Full Text Available This study aims to identify the nonexistent network to the general system of data communication that currently has the GADM (Autonomous Government Decentralized Municipal of Babahoyo located in the province of Los Rios in order to develop a logical design of a metropolitan network that can support new technologies and protocols ensuring the information conveyed between branches of GADM of Babahoyo, besides providing the institution of a compatible platform with the requirements of the e-Government (eGovernment. This research allowed to collect information through instruments such as interviews, meetings and literature review also visits took place at the premises of GADM Babahoyo, reviewing aspects of securities in telecommunications under the ISO / IEC 27002: 2013 citing reference the control objective Management network security. Identification, analysis and design of a proposed network infrastructure is made, allowing communication of the various units that are in distant places. It is concluded that the implementation of a system of networks throughout the municipal entity is considered a solution to the problem and generate many benefits.

  7. Recovery of essential nutrients from municipal solid waste – Impact of waste management infrastructure and governance aspects

    Zabaleta, Imanol, E-mail: imanol.zabaleta@eawag.ch [Eawag: Swiss Federal Institute of Aquatic Science and Technology, Department of Water and Sanitation in Developing Countries (Sandec), P.O. Box 611, 8600 Dübendorf (Switzerland); Rodic, Ljiljana, E-mail: ljiljana.rodic@gmail.com [Wageningen University, Education and Competence Studies, Wageningen (Netherlands)

    2015-10-15

    Every year 120–140 million tonnes of bio-waste are generated in Europe, most of which is landfilled, incinerated or stabilized and used as covering material in landfill operation. None of these practices enables the recovery of essential nutrients such as phosphorus (P) and nitrogen (N), which are in great demand for agricultural production. Recovery of these nutrients is a matter of international concern considering the non-renewable nature of P sources and the energy intensive production process required for the synthesis of N fertilizers. The objective of this research is to understand the relation between the municipal solid waste management (MSWM) system, both its the physical components and governance aspects, and the recovery of nutrients in Vitoria-Gasteiz (Basque Country) as a benchmark for European medium-size cities. The analysis shows that the existing physical infrastructure and facilities for bio-waste have high potential for nutrient recovery, 49% for N and 83% for P contained in bio-waste. However, governance aspects of the MSWM system such as legislation and user inclusivity play an important role and decrease the actual nutrient recovery to 3.4% and 7.4% for N and P respectively.

  8. Recovery of essential nutrients from municipal solid waste--Impact of waste management infrastructure and governance aspects.

    Zabaleta, Imanol; Rodic, Ljiljana

    2015-10-01

    Every year 120-140 million tonnes of bio-waste are generated in Europe, most of which is landfilled, incinerated or stabilized and used as covering material in landfill operation. None of these practices enables the recovery of essential nutrients such as phosphorus (P) and nitrogen (N), which are in great demand for agricultural production. Recovery of these nutrients is a matter of international concern considering the non-renewable nature of P sources and the energy intensive production process required for the synthesis of N fertilizers. The objective of this research is to understand the relation between the municipal solid waste management (MSWM) system, both its the physical components and governance aspects, and the recovery of nutrients in Vitoria-Gasteiz (Basque Country) as a benchmark for European medium-size cities. The analysis shows that the existing physical infrastructure and facilities for bio-waste have high potential for nutrient recovery, 49% for N and 83% for P contained in bio-waste. However, governance aspects of the MSWM system such as legislation and user inclusivity play an important role and decrease the actual nutrient recovery to 3.4% and 7.4% for N and P respectively. Copyright © 2015 Elsevier Ltd. All rights reserved.

  9. Identifying strategic sites for Green-Infrastructures (GI) to manage stormwater in a miscellaneous use urban African watershed

    Selker, J. S.; Kahsai, S. K.

    2017-12-01

    Green Infrastructure (GI) or Low impact development (LID), is a land use planning and design approach with the objective of mitigating land development impacts to the environment, and is ever more looked to as a way to lessen runoff and pollutant loading to receiving water bodies. Broad-scale approaches for siting GI/LID have been developed for agricultural watersheds, but are rare for urban watersheds, largely due to greater land use complexity. And it is even more challenging when it comes to Urban Africa due to the combination of poor data quality, rapid and unplanned development, and civic institutions unable to reliably carry out regular maintenance. We present a spacio-temporal simulation-based approach to identify an optimal prioritization of sites for GI/LID based on DEM, land use and land cover. Optimization used is a multi-objective optimization tool along with an urban storm water management model (SWMM) to identify the most cost-effective combination of LID/GI. This was applied to an urban watershed in NW Kampala, Lubigi Catchment (notorious for being heavily flooded every year), with a miscellaneous use watershed in Uganda, as a case-study to demonstrate the approach.

  10. How Can Clients Improve the Quality of Transport Infrastructure Projects? The Role of Knowledge Management and Incentives

    Abukar Warsame

    2013-01-01

    Full Text Available The aim of this paper is to argue for a number of statements about what is important for a client to do in order to improve quality in new infrastructure projects, with a focus on procurement and organizational issues. The paper synthesizes theoretical and empirical results concerning organizational performance, especially the role of the client for the quality of a project. The theoretical framework used is contract theory and transaction cost theory, where assumptions about rationality and self-interest are made and where incentive problems, asymmetric information, and moral hazard are central concepts. It is argued that choice of procurement type will not be a crucial factor. There is no procurement method that guarantees a better quality than another. We argue that given the right conditions all procurement methods can give good results, and given the wrong conditions, all of them can lead to low quality. What is crucial is how the client organization manages knowledge and the incentives for the members of the organization. This can be summarized as “organizational culture.” One way to improve knowledge and create incentives is to use independent second opinions in a systematic way.

  11. Marine data management: from early explorers to e-infrastructures (Ian McHarg Medal Lecture)

    Glaves, Helen

    2016-04-01

    sometimes unfamiliar data, the data manager responsible for its stewardship, and the thousands of organisations and institutions around the world tasked with providing access to the vast volumes of data needed to support this increasingly global approach to marine research.

  12. Modelling management process of key drivers for economic sustainability in the modern conditions of economic development

    Pishchulina E.S.

    2017-01-01

    Full Text Available The text is about issues concerning the management of driver for manufacturing enterprise economic sustainability and manufacturing enterprise sustainability assessment as the key aspect of the management of enterprise economic sustainability. The given issues become topical as new requirements for the methods of manufacturing enterprise management in the modern conditions of market economy occur. An economic sustainability model that is considered in the article is an integration of enterprise economic growth, economic balance of external and internal environment and economic sustainability. The method of assessment of economic sustainability of a manufacturing enterprise proposed in the study allows to reveal some weaknesses in the enterprise performance, and untapped reserves, which can be further used to improve the economic sustainability and efficiency of the enterprise. The management of manufacturing enterprise economic sustainability is one of the most important factors of business functioning and development in modern market economy. The relevance of this trend is increasing in accordance with the objective requirements of the growing volumes of production and sale, the increasing complexity of economic relations, changing external environment of an enterprise.

  13. FIDIC contracts: analysis of the impact of general and particular conditions on the financial risk management in Romanian infrastructure projects

    Constanţa-Nicoleta Bodea

    2016-12-01

    Full Text Available Construction projects are characterized by risks and uncertainties mainly due to technical and economic complexity. Risk management is an important tool in making decisions involving the identification and reduction, avoidance or transfer risk and uncertainties consequences of events that occurs during project implementation. For this reason, the objective of the contract between the beneficiary and the contractor is the allocation of risk. The distribution of risk in contracts for the execution of construction works was and is an ongoing challenge faced by parties having a significant impact on the type of contract is used. On the one hand, the beneficiaries tend to transfer to the contractors as many of the project risks and uncertainties, on the other hand, the contractors look to exploit any weakness contract, so as to reduce their impact on the expected profit. One of the most important risks assumed by the contractor by signing the contract which is also increasingly common in the current economic situation is the reduced financial capacity to support the project. A purely legal or purely technical interpretation is not meant to describe the complexity of issues related to implementation of construction projects. For this reason the authors have adopted a multi-disciplinary approach, which includes the legal issues related to the nature of the contract, but also the financial and technical aspects of construction projects. The paper aims to analyze how special contract clauses can influence the implementation of construction projects and in particular the financial management of contractors. The authors propose a model for analyzing the impact of FIDIC contract conditions applied on a case study of five transport infrastructure projects.

  14. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach.

    Sanchez-Iborra, Ramon; Sánchez-Gómez, Jesús; Pérez, Salvador; Fernández, Pedro J; Santa, José; Hernández-Ramos, José L; Skarmeta, Antonio F

    2018-06-05

    Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT) field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN) already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN), which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa) and its layer-two supporter LoRa Wide Area Network (LoRaWAN), which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie⁻Hellman Over COSE (EDHOC) is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.

  15. Enhancing LoRaWAN Security through a Lightweight and Authenticated Key Management Approach

    Ramon Sanchez-Iborra

    2018-06-01

    Full Text Available Luckily, new communication technologies and protocols are nowadays designed considering security issues. A clear example of this can be found in the Internet of Things (IoT field, a quite recent area where communication technologies such as ZigBee or IPv6 over Low power Wireless Personal Area Networks (6LoWPAN already include security features to guarantee authentication, confidentiality and integrity. More recent technologies are Low-Power Wide-Area Networks (LP-WAN, which also consider security, but present initial approaches that can be further improved. An example of this can be found in Long Range (LoRa and its layer-two supporter LoRa Wide Area Network (LoRaWAN, which include a security scheme based on pre-shared cryptographic material lacking flexibility when a key update is necessary. Because of this, in this work, we evaluate the security vulnerabilities of LoRaWAN in the area of key management and propose different alternative schemes. Concretely, the application of an approach based on the recently specified Ephemeral Diffie–Hellman Over COSE (EDHOC is found as a convenient solution, given its flexibility in the update of session keys, its low computational cost and the limited message exchanges needed. A comparative conceptual analysis considering the overhead of different security schemes for LoRaWAN is carried out in order to evaluate their benefits in the challenging area of LP-WAN.

  16. Deviation Management: Key Management Subsystem Driver of Knowledge-Based Continuous Improvement in the Henry Ford Production System.

    Zarbo, Richard J; Copeland, Jacqueline R; Varney, Ruan C

    2017-10-01

    To develop a business subsystem fulfilling International Organization for Standardization 15189 nonconformance management regulatory standard, facilitating employee engagement in problem identification and resolution to effect quality improvement and risk mitigation. From 2012 to 2016, the integrated laboratories of the Henry Ford Health System used a quality technical team to develop and improve a management subsystem designed to identify, track, trend, and summarize nonconformances based on frequency, risk, and root cause for elimination at the level of the work. Programmatic improvements and training resulted in markedly increased documentation culminating in 71,641 deviations in 2016 classified by a taxonomy of 281 defect types into preanalytic (74.8%), analytic (23.6%), and postanalytic (1.6%) testing phases. The top 10 deviations accounted for 55,843 (78%) of the total. Deviation management is a key subsystem of managers' standard work whereby knowledge of nonconformities assists in directing corrective actions and continuous improvements that promote consistent execution and higher levels of performance. © American Society for Clinical Pathology, 2017. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  17. Group assessment of key indicators of sustainable waste management in developing countries.

    Tot, Bojana; Vujić, Goran; Srđević, Zorica; Ubavin, Dejan; Russo, Mário Augusto Tavares

    2017-09-01

    Decision makers in developing countries are struggling to solve the present problems of solid waste management. Prioritisation and ranking of the most important indicators that influence the waste management system is very useful for any decision maker for the future planning and implementation of a sustainable waste management system. The aim of this study is to evaluate key indicators and their related sub-indicators in a group decision-making environment. In order to gain insight into the subject it was necessary to obtain the qualified opinions of decision makers from different countries who understand the situation in the sector of waste management in developing countries. An assessment is performed by 43 decision makers from both developed and developing countries, and the applied methodology is based on a combined use of the analytic hierarchy process, from the multi-criteria decision-making set of tools, and the preferential voting method known as Borda Count, which belongs to social choice theory. Pairwise comparison of indicators is performed with the analytic hierarchy process, and the ranking of indicators once obtained is assessed with Borda Count. Detailed analysis of the final results showed that the Institutional-Administrative indicator was the most important one, with the maximum weight as derived by both groups of decision makers. The results also showed that the combined use of the analytic hierarchy process and Borda Count contributes to the credibility and objectivity of the decision-making process, allowing its use in more complex waste management group decision-making problems to be recommended.

  18. Key performance indicators in plant asset management: hype, burden or real help?

    Jovanovic, A. (Steinbeis Advanced Risk Technologies, Stuttgart (Germany)); Bareiss, J.M. (EnBW, Stuttgart (Germany))

    2010-05-15

    The paper tackles the increasing role and use of indicators (e.g. the key performance indicators, KPIs) in asset management in power and process plants, in particular for risk and safety management (safety performance indicators, SPIs), inspection, maintenance, emerging risks analysis and aging management. The two main aspects of the use of indicators are monitoring of performance (e.g. of a single unit) and benchmarking (e.g. among different units). The basis for the considerations presented in the paper are several international projects in the field, showing that the main issue in the field is not and cannot be just the introduction of new indicators as such. They deal with the principles of establishing indicators, establishing generally accepted indicators (goal 'globally accepted' indicators), creating of 'repositories' of indicators in industry and respective tools. The repository/tool developed in the EU project iNTeg-Risk is presented in more detail. The main proposed criteria for successful introduction are the acceptance, transparency and clear added value, e.g. when the indicators help in finding solutions for the issues where the conventional analysis, e.g. the one based on engineering models and analysis is too expensive, complex or simply unavailable. Three practical cases are briefly shown in the paper: one for the improved asset management in a refinery, one for the identification of indicators helping to deal with emerging risks (how to identify them and how to assess risks of a new technology) and one for the implementation of a complex aging management program for industrial plants. (orig.)

  19. Key performance indicators in plant asset management: hype, burden or real help?

    Jovanovic, A.; Bareiss, J.M.

    2010-01-01

    The paper tackles the increasing role and use of indicators (e.g. the key performance indicators, KPIs) in asset management in power and process plants, in particular for risk and safety management (safety performance indicators, SPIs), inspection, maintenance, emerging risks analysis and aging management. The two main aspects of the use of indicators are monitoring of performance (e.g. of a single unit) and benchmarking (e.g. among different units). The basis for the considerations presented in the paper are several international projects in the field, showing that the main issue in the field is not and cannot be just the introduction of new indicators as such. They deal with the principles of establishing indicators, establishing generally accepted indicators (goal 'globally accepted' indicators), creating of 'repositories' of indicators in industry and respective tools. The repository/tool developed in the EU project iNTeg-Risk is presented in more detail. The main proposed criteria for successful introduction are the acceptance, transparency and clear added value, e.g. when the indicators help in finding solutions for the issues where the conventional analysis, e.g. the one based on engineering models and analysis is too expensive, complex or simply unavailable. Three practical cases are briefly shown in the paper: one for the improved asset management in a refinery, one for the identification of indicators helping to deal with emerging risks (how to identify them and how to assess risks of a new technology) and one for the implementation of a complex aging management program for industrial plants. (orig.)

  20. Stakeholder Confidence and Radioactive Waste management - An annotated glossary of key terms

    Martell, Meritxell; Pescatore, Claudio; Mays, Claire

    2013-01-01

    The OECD Nuclear Energy Agency (NEA) Forum on Stakeholder Confidence (FSC) Annotated Glossary is a review of concepts central to societal decision making about radioactive waste management. It records the evolution in understanding that has taken place in the group as the FSC has worked with these concepts over time. This should be a useful resource not only for new FSC participants but also for others: this annotated glossary forms a good reference handbook for future texts regarding societal aspects of radioactive waste management and its governance. Each glossary entry is structured, to the extent possible, as follows: - The term and its variants, if any, in FSC literature are identified. - The common FSC understanding of the concept and any guidance are captured, based upon a review of all FSC documents to date. - Any evolution of the concept observed over the decade of FSC work is analysed. - The FSC interpretation of the symbolic dimension is explored. - The current status of outlook in the FSC, and intended activities according to the current Programme of Work (2010 and beyond) are assessed. Overall, although different persons and groups may assign different meanings to words, and although terminology will continue to evolve, this glossary is the FSC's 'state-of-the-art' guide to key terms in use. As such, it should prove to be a handy reference for all those interested in the governance of radioactive waste management