WorldWideScience

Sample records for protecting infrastructure networks

  1. Protecting infrastructure networks from cost-based attacks

    International Nuclear Information System (INIS)

    Wang Xingang; Guan Shuguang; Lai, Choy Heng

    2009-01-01

    It is well known that heterogeneous networks are vulnerable to the intentional removal of a small fraction of highly connected or loaded nodes, implying that to protect the network effectively, the important nodes should be allocated more defense resource than the others. However, if too much resource is allocated to the few important nodes, the numerous less-important nodes will be less protected, which if attacked together can still lead to devastating damage. A natural question is therefore how to efficiently distribute the limited defense resource among the network nodes such that the network damage is minimized against any attack strategy. In this paper, taking into account the factor of attack cost, the problem of network security is reconsidered in terms of efficient network defense against cost-based attacks. The results show that, for a general complex network, there exists an optimal distribution of the defense resource with which the network is best protected from cost-based attacks. Furthermore, it is found that the configuration of the optimal defense is dependent on the network parameters. Specifically, networks of larger size, sparser connection and more heterogeneous structure will more likely benefit from the defense optimization.

  2. Strengthening Radiation Protection Infrastructures in Africa: Towards Establishing Effective and Sustainable Co-operations and Networks

    International Nuclear Information System (INIS)

    2010-09-01

    The third African IRPA 2010 conference on Strengthening Radiation Protection Infrastructures in Africa: Towards Establishing Effective and Sustainable Co-operations and Networks. IAEA's role in radiation protection with focus in Africa. The controlling of exposure to indoor Radon. And Measure of activities and calculation of effective dose of indoor 222 Rn in some dwelling and enclosed areas in Africa - capacity building for radiation protection. It had also address Patient Radiation Protection in Radiotherapy, challenges for advancing medical physic globally, Heath effects and medical applications of non-ionizing radiation, nuclear safety and radiation protection consideration in the design of research and development. The International radiation protection association (IRPA) 2010-2011 strategic plan that address among other issues educations and training activities (2000-2020) and the current UNSCLEAR activities

  3. Critical infrastructure protection

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, F. [Canadian Electricity Association, Toronto, ON (Canada)

    2003-04-01

    The need to protect critical electrical infrastructure from terrorist attacks, or other physical damage, including weather related events, or the potential impact of computer viruses and other attacks on IT resources are discussed. Activities of the North American Electric Reliability Council (NERC) are highlighted which seek to safeguard the North American bulk electric power system principally through the Information Sharing and Analysis Sector (ES-ISAC). ES-ISAC serves the electricity sector by facilitating communication between electric sector participants, federal government and other critical infrastructure industries by disseminating threat indications, analyses and warnings, together with interpretations, to assist the industry in taking infrastructure protection actions. Attention is drawn to the numerous cyber incidents in recent years, which although resulted in no loss of service to electricity customers so far, in at least one instance (the January 25th SOL-Slammer worm incident) resulted in degradation of service in a number of sectors, including financial, transportation and telecommunication services. The increasing frequency of cyber-based attacks, coupled with the industry's growing dependence on e-commerce and electronic controls, are good reasons to believe that critical infrastructure protection (CIP) poses a serious challenge to the industry's risk management practices. The Canadian Electricity Association (CEA) is an active participant in ES-ISAC and works cooperatively with a range of partners, such as the Edison Electric Institute and the American Public Power Association to ensure coordination and effective protection program delivery for the electric power sector. The Early Warning System (EWS) developed by the CIP Working Group is one of the results of this cooperation. EWS uses the Internet, e-mail, web-enabled cell phones and Blackberry hand-held devices to deliver real-time threat information to members on a 24/7 basis. EWS

  4. Cyber Infrastructure Protection

    Science.gov (United States)

    2011-05-01

    274 TOWARD A SOLUTION THAT WORKS Building on our long history of involvement in assuring all types of communications networks, Tel- cordia has...wireless, and security areas. He currently has responsibility for a new Tel- cordia software product in IP network management, and has led all product

  5. Radiation Protection Infrastructure In Madagascar

    International Nuclear Information System (INIS)

    Andriambololona, R.; Ratovonjanahary, J.F.; Zafimanjato, J.L.R.; Randriantseheno, H.F.; Ramanandraibe, M.J.; Randriantsizafy, D.R.

    2008-01-01

    Radiation sources are widely used in medicine, industry, research and education in Madagascar. Safety and security of these sources are the main statutory functions of the Regulatory Authority as defined by the regulations in Radiation Protection in Madagascar. These functions are carried out through the system of notification, authorization and inspection, inventory of radiation source and emergency preparedness. The law no 97-041 on radiation protection and radioactive waste management in Madagascar was promulgated on 2nd January 1998. It governs all activities related to the peaceful use of nuclear energy in Madagascar in order to protect the public, the environment and for the safety of radiation sources. This law complies with the International Basic Safety Standards for protection against ionising Radiation and for the Safety of Radiation Sources (BSS, IAEA Safety Series no 115). Following the promulgation of the law, four decrees have been enacted by the Malagasy Government. With an effective implementation of these decrees, the ANPSR will be the Highest Administrative Authority in the Field of Radiation Protection and Waste Management in Madagascar. This Regulatory Authority is supported by an Executive Secretariat, assisted by the OTR for Radiation Protection and the OCGDR for Managing Radioactive Waste.The paper includes an overview of the regulatory infrastructure and the organizations of radiation protection in Madagascar

  6. Medical Sensor Network Infrastructures

    DEFF Research Database (Denmark)

    Andersen, Jacob

    researchers have been developing power-efficient security mechanisms for sensor networks. However, most of this work ignores the special usability demands from the clinical use-scenarios: set-up must be fast, and key pre-distribution is problematic if disposable sensors are discarded after being used for only...

  7. After the year 2000: Critical infrastructure protection

    International Nuclear Information System (INIS)

    Dreicer, M.

    1999-01-01

    Presentation defines the critical infrastructure which includes: telecommunication, banking, transportation, electric energy, oil and gas supply, water supply, emergency services and government operations. The problem of protecting the critical infrastructure is is exposed in detail concerning physical protection and protection of information systems against cyberthreats

  8. Welcome to NNIN | National Nanotechnology Infrastructure Network

    Science.gov (United States)

    Skip to main content National Nanotechnology Infrastructure Network National Nanotechnology Infrastructure Network Serving Nanoscale Science, Engineering & Technology Search form Search Search Home facilities feature over 1100 modern nanotechnology instruments such as these Reactive Ion Etch systems at the

  9. The radiation protection infrastructure in Madagascar

    International Nuclear Information System (INIS)

    Andriambololona, R.; Ratovonjanahary, J.F.; Randriantseheno, H.F.; Ramanandraibe, M.J.

    2001-01-01

    Madagascar is participating in the Model Project RAF/9/024 on 'Upgrading Radiation Protection Infrastructure'. Its radiation protection legislation is based on the BSS. The efforts being made to upgrade the country's regulatory infrastructure and the problems encountered are described below, as is the national information and training programme for the authorities, the public, workers and students. (author)

  10. Network science, nonlinear science and infrastructure systems

    CERN Document Server

    2007-01-01

    Network Science, Nonlinear Science and Infrastructure Systems has been written by leading scholars in these areas. Its express purpose is to develop common theoretical underpinnings to better solve modern infrastructural problems. It is felt by many who work in these fields that many modern communication problems, ranging from transportation networks to telecommunications, Internet, supply chains, etc., are fundamentally infrastructure problems. Moreover, these infrastructure problems would benefit greatly from a confluence of theoretical and methodological work done with the areas of Network Science, Dynamical Systems and Nonlinear Science. This book is dedicated to the formulation of infrastructural tools that will better solve these types of infrastructural problems. .

  11. A Comprehensive Assessment Model for Critical Infrastructure Protection

    Directory of Open Access Journals (Sweden)

    Häyhtiö Markus

    2017-12-01

    Full Text Available International business demands seamless service and IT-infrastructure throughout the entire supply chain. However, dependencies between different parts of this vulnerable ecosystem form a fragile web. Assessment of the financial effects of any abnormalities in any part of the network is demanded in order to protect this network in a financially viable way. Contractual environment between the actors in a supply chain, different business domains and functions requires a management model, which enables a network wide protection for critical infrastructure. In this paper authors introduce such a model. It can be used to assess financial differences between centralized and decentralized protection of critical infrastructure. As an end result of this assessment business resilience to unknown threats can be improved across the entire supply chain.

  12. Critical Infrastructure Protection- Los Alamos National Laboratory

    Energy Technology Data Exchange (ETDEWEB)

    Bofman, Ryan K. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2017-02-24

    Los Alamos National Laboratory (LANL) has been a key facet of Critical National Infrastructure since the nuclear bombing of Hiroshima exposed the nature of the Laboratory’s work in 1945. Common knowledge of the nature of sensitive information contained here presents a necessity to protect this critical infrastructure as a matter of national security. This protection occurs in multiple forms beginning with physical security, followed by cybersecurity, safeguarding of classified information, and concluded by the missions of the National Nuclear Security Administration.

  13. The national radiation protection infrastructure

    International Nuclear Information System (INIS)

    Mastauskas, A.

    1999-01-01

    The state system of radiation protection is still being created after Lithuania regained its independancy and in connection with recommendations laid in the ICRP-60 publication and requirements of legislation of European Community. A new regulation institutions was established and a number of laws and regulations related to radiation protection was prepared. The Radiation Protection Centre of Ministry of Health is the regulatory authority responsible for radiation protection of public and of workers using sources of ionizing radiation in Lithuania. A new Radiation Protection Law, Nuclear Energy Law, Radioactive Waste Management Law and different regulations was approved. Preparation of legislation, creation of state system of radiation protection and its upgrading allow to presume that the necessary level of radiation protection is to be achieved. (au)

  14. Critical Infrastructure Protection: Maintenance is National Security

    Directory of Open Access Journals (Sweden)

    Kris Hemme

    2015-10-01

    Full Text Available U.S. critical infrastructure protection (CIP necessitates both the provision of security from internal and external threats and the repair of physically damaged critical infrastructure which may disrupt services. For years, the U.S. infrastructure has been deteriorating, triggering enough damage and loss of life to give cause for major concern. CIP is typically only addressed after a major disaster or catastrophe due to the extreme scrutiny that follows these events. In fact, CIP has been addressed repeatedly since Presidential Decision Directive Sixty-Three (PDD Sixty-Three signed by President Bill Clinton on May Twenty-Second, 1998.[1] This directive highlighted critical infrastructure as “a growing potential vulnerability” and recognized that the United States has to view the U.S. national infrastructure from a security perspective due to its importance to national and economic security. CIP must be addressed in a preventive, rather than reactive, manner.[2] As such, there are sixteen critical infrastructure sectors, each with its own protection plan and unique natural and man-made threats, deteriorations, and risks. A disaster or attack on any one of these critical infrastructures could cause serious damage to national security and possibly lead to the collapse of the entire infrastructure. [1] The White House, Presidential Decision Directive/NSC–63 (Washington D.C.: The White House, May 22, 1998: 1–18, available at: http://www.epa.gov/watersecurity/tools/trainingcd/Guidance/pdd-63.pdf. [2] Ibid, 1.

  15. The TENCompetence Infrastructure: A Learning Network Implementation

    Science.gov (United States)

    Vogten, Hubert; Martens, Harrie; Lemmers, Ruud

    The TENCompetence project developed a first release of a Learning Network infrastructure to support individuals, groups and organisations in professional competence development. This infrastructure Learning Network infrastructure was released as open source to the community thereby allowing users and organisations to use and contribute to this development as they see fit. The infrastructure consists of client applications providing the user experience and server components that provide the services to these clients. These services implement the domain model (Koper 2006) by provisioning the entities of the domain model (see also Sect. 18.4) and henceforth will be referenced as domain entity services.

  16. New infrastructures for training in radiation protection

    International Nuclear Information System (INIS)

    Marco, M.; Rodriguez, M.; Van der Steen, J.

    2007-01-01

    In this work, an analysis of the new infrastructure used in the radiation protection training and professional education, which is developed nowadays, is carried out. CIEMAT has been making many efforts in the education and training of professionals at all levels, for years. At present CIEMAT is developing educational activities in radiation protection general courses and professionals updating courses. The newest strategies for the radiation protection learning are developing in collaboration with professional societies. These try to encourage the technology transference, the collaboration between the actors involved with the radiation protection and the new information technology implementation. (Author) 11 refs

  17. Infrastructure protection in the Dutch financial sector

    NARCIS (Netherlands)

    van Oers, M.H.M.; Strous, L.; Berndsen, R.J.; Butts, J.; Shenoi, S.

    2012-01-01

    This paper presents a case study of critical infrastructure protection in the Dutch financial sector. The organizational structures are examined to discern the roles and functions that facilitate public-private cooperation. An assessment of the organizational structures is provided along with a

  18. CHDS Sponsors Critical Infrastructure Protection Workshop

    OpenAIRE

    Center for Homeland Defense and Security

    2008-01-01

    Center for Homeland Defense and Security, PRESS RELEASES The NPS Center for Homeland Defense and Security in partnership with the U.S. Department of Homeland Security recently hosted its first Critical Infrastructure Protection Workshop. The workshop brought together practitioners and...

  19. Radiation protection and safety infrastructures in Albania

    International Nuclear Information System (INIS)

    Paci, Rustem; Ylli, Fatos

    2008-01-01

    The paper intends to present the evolution and actual situation of radiation protection and safety infrastructure in Albania, focusing in its establishing and functioning in accordance with BBS and other important documents of specialized international organizations. There are described the legal framework of radiation safety, the regulatory authority, the services as well the practice of their functioning. The issue of the establishing and functioning of the radiation safety infrastructure in Albania was considered as a prerequisite for a good practices development in the peaceful uses of radiation sources . The existence of the adequate legislation and the regulatory authority, functioning based in the Basic Safety Standards (BSS), are the necessary condition providing the fulfilment of the most important issues in the mentioned field. The first document on radiation protection in Albania stated that 'for the safe use of radiation sources it is mandatory that the legal person should have a valid permission issued by Radiation Protection Commission'. A special organ was established in the Ministry of Health to supervise providing of the radiation protection measures. This organization of radiation protection showed many lacks as result of the low efficiency . The personnel monitoring, import, transport, waste management and training of workers were in charge of Institute of Nuclear Physics (INP). In 1992 an IAEA RAPAT mission visited Albania and proposed some recommendations for radiation protection improvements. The mission concluded that 'the legislation of the radiation protection should be developed'. In 1995 Albania was involved in the IAEA Model Project 'Upgrading of Radiation Protection Infrastructure'. This project, which is still in course, intended to establish the modern radiation safety infrastructures in the countries with low efficiency ones and to update and upgrade all aspects related with radiation safety: legislation and regulations, regulatory

  20. CRITICAL INFRASTRUCTURE PROTECTION WITHIN THE EUROPEAN UNION

    Directory of Open Access Journals (Sweden)

    Vasile N. POPA

    2013-01-01

    Full Text Available The new dynamics and intensity of the risks and threats posed to societal functioning and citizens’ security have acquired new meanings. Consequently, an integrated approach to the concept of ”critical infrastructure” is necessary. The critical nature of some of the basic characteristics of the critical infrastructures has made them acquire new meanings within the national/transnational strategic planning. Moreover, the complexity and importance of critical infrastructure protection for social stability have generated the correlaton of the strategies developed by states and organizations.

  1. Scenario Based Network Infrastructure Planning

    DEFF Research Database (Denmark)

    Knudsen, Thomas Phillip; Pedersen, Jens Myrup; Madsen, Ole Brun

    2005-01-01

    The paper presents a method for IT infrastructure planning that take into account very long term developments in usages. The method creates a scenario for a final, time independent stage in the planning process. The method abstracts relevant modelling factors from available information...

  2. 75 FR 67989 - Agency Information Collection Activities: Office of Infrastructure Protection; Infrastructure...

    Science.gov (United States)

    2010-11-04

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2010-0084] Agency Information Collection Activities: Office of Infrastructure Protection; Infrastructure Protection Stakeholder Input Project--Generic... comments; New Information Collection Request: 1670-NEW. SUMMARY: The Department of Homeland Security...

  3. Critical Energy Infrastructure Protection in Canada

    Science.gov (United States)

    2010-12-01

    department for the Energy sector, has been pro- active and innovative in enhancing protection for national critical energy infrastructure (NCI). While...prospérité (PSP), mais des relations transfrontalières plus informelles entre les propriétaires/opérateurs et leurs associations industrielles ...create innovative solutions for CIP. 9. International Cooperation: participate in international CIP initiatives and to strengthen information-sharing

  4. Bandwidth Analysis of Smart Meter Network Infrastructure

    DEFF Research Database (Denmark)

    Balachandran, Kardi; Olsen, Rasmus Løvenstein; Pedersen, Jens Myrup

    2014-01-01

    Advanced Metering Infrastructure (AMI) is a net-work infrastructure in Smart Grid, which links the electricity customers to the utility company. This network enables smart services by making it possible for the utility company to get an overview of their customers power consumption and also control...... devices in their costumers household e.g. heat pumps. With these smart services, utility companies can do load balancing on the grid by shifting load using resources the customers have. The problem investigated in this paper is what bandwidth require-ments can be expected when implementing such network...... to utilize smart meters and which existing broadband network technologies can facilitate this smart meter service. Initially, scenarios for smart meter infrastructure are identified. The paper defines abstraction models which cover the AMI scenarios. When the scenario has been identified a general overview...

  5. Critical energy infrastructure protection in Canada

    Energy Technology Data Exchange (ETDEWEB)

    Gendron, Angela [Canadian Centre for Intelligence and Security Studies, Carleton University (Canada)

    2010-12-15

    In Canada government acknowledged the need to protect energy assets against attacks. However, so far no strategy has been developed. The aim of this report is to present the characteristics of the energy sector in Canada, the threats, and how the government is responding to those threats. The energy sector in Canada is concentrated and diverse and is under not only terrorism or cyber attacks threats but also environmental threats. This report shows that the Government of Canada is focusing on the protection and assurance of important energy infrastructures but that they are facing several challenges resulting in long delays in the adoption of a formal strategy.

  6. Protecting and securing the energy infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Gillham, B. [Conoco Canada Ltd., Calgary, AB (Canada)

    2002-07-01

    Critical Infrastructure Protection (CIP) includes protection against physical and cyber attacks as well as potential interruptions and vulnerabilities such as natural disasters and human error. CIP makes it possible to deal with the consequences of infrastructure failures that can have regional, national and international impacts. The energy sector is challenged because there has been an irreversible move to automated control systems and electronic transactions. In addition, due to mergers and joint ventures, the line between traditional oil, natural gas companies and power companies is not perfectly clear. Energy industries can no longer be seen in isolation of each other because they depend on other critical infrastructures. Industry should lead CIP programs through risk management assessments, develop and implement global information technology standards, and enhance response and recovery planning. The National Petroleum Council (NPC) will continue to develop the capabilities of the newly formed Information Sharing and Assessment Centre (ISAC). The sector will also continue to develop common vulnerability assessment goals. It was noted that response and recovery plans must include the cyber dimension, because there has been an increasing number of scans and probes from the Internet since the events of September 11, 2001. It was noted that physical incidents can often turn into cyber incidents and vice versa.

  7. Wireless intelligent network: infrastructure before services?

    Science.gov (United States)

    Chu, Narisa N.

    1996-01-01

    The Wireless Intelligent Network (WIN) intends to take advantage of the Advanced Intelligent Network (AIN) concepts and products developed from wireline communications. However, progress of the AIN deployment has been slow due to the many barriers that exist in the traditional wireline carriers' deployment procedures and infrastructure. The success of AIN has not been truly demonstrated. The AIN objectives and directions are applicable to the wireless industry although the plans and implementations could be significantly different. This paper points out WIN characteristics in architecture, flexibility, deployment, and value to customers. In order to succeed, the technology driven AIN concept has to be reinforced by the market driven WIN services. An infrastructure suitable for the WIN will contain elements that are foreign to the wireline network. The deployment process is expected to seed with the revenue generated services. Standardization will be achieved by simplifying and incorporating the IS-41C, AIN, and Intelligent Network CS-1 recommendations. Integration of the existing and future systems impose the biggest challenge of all. Service creation has to be complemented with service deployment process which heavily impact the carriers' infrastructure. WIN deployment will likely start from an Intelligent Peripheral, a Service Control Point and migrate to a Service Node when sufficient triggers are implemented in the mobile switch for distributed call control. The struggle to move forward will not be based on technology, but rather on the impact to existing infrastructure.

  8. 75 FR 75611 - Critical Infrastructure Protection Month, 2010

    Science.gov (United States)

    2010-12-03

    ...; and the public--to identify and protect our infrastructure from hazards or attack. These critical... cyber infrastructure more resilient. Working together, we can raise awareness of the important role our...

  9. 76 FR 50487 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Science.gov (United States)

    2011-08-15

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0018] Protected Critical Infrastructure Information (PCII) Stakeholder Survey AGENCY: National Protection and Programs Directorate, DHS. ACTION: 30... Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office of...

  10. 76 FR 17935 - Protected Critical Infrastructure Information (PCII) Stakeholder Survey

    Science.gov (United States)

    2011-03-31

    ... DEPARTMENT OF HOMELAND SECURITY [Docket No. DHS-2011-0018] Protected Critical Infrastructure Information (PCII) Stakeholder Survey AGENCY: National Protection and Programs Directorate, DHS. ACTION: 60... Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office of...

  11. Network-Embedded Management and Applications Understanding Programmable Networking Infrastructure

    CERN Document Server

    Wolter, Ralf

    2013-01-01

    Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged. At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers. Now, however, the traditional framework is being increasingly challenged by new methods that are jostling for a position in the next-generation Internet. The concept of a network that is becoming more programmable is one of the aspects that are taking center stage. This opens new possibilities to embed software applications inside the network itself and to manage networks and communications services with unprecedented ease and efficiency. In this edited volume, distinguished experts take the reader on a tour of different facets of programmable network infrastructure and application exploit it. Presenting the state of the art in network embedded management and applications and programmable network infrastructure, the book c...

  12. Critical infrastructure protection research results of the first critical infrastructure protection research project in Hungary

    CERN Document Server

    Padányi, József

    2016-01-01

    This book presents recent research in the recognition of vulnerabilities of national systems and assets which gained special attention for the Critical Infrastructures in the last two decades. The book concentrates on R&D activities in the relation of Critical Infrastructures focusing on enhancing the performance of services as well as the level of security. The objectives of the book are based on a project entitled "Critical Infrastructure Protection Researches" (TÁMOP-4.2.1.B-11/2/KMR-2011-0001) which concentrated on innovative UAV solutions, robotics, cybersecurity, surface engineering, and mechatrinics and technologies providing safe operations of essential assets. This report is summarizing the methodologies and efforts taken to fulfill the goals defined. The project has been performed by the consortium of the Óbuda University and the National University of Public Service.

  13. Effectively protecting cyber infrastructure and assessing security needs

    Energy Technology Data Exchange (ETDEWEB)

    Robbins, J.; Starman, R. [EWA Canada Ltd., Edmonton, AB (Canada)

    2002-07-01

    This presentation addressed some of the requirements for effectively protecting cyber infrastructure and assessing security needs. The paper discussed the hype regarding cyber attacks, and presented the Canadian reality (as viewed by CanCERT). An assessment of security concerns was also presented. Recent cyber attacks on computer networks have raised fears of unsafe energy networks. Some experts claim the attacks are linked to terrorism, others blame industrial spying and mischief. Others dismiss the notion that somebody could bring down a power grid with a laptop as being far-fetched. It was noted that the cyber security threat is real, and that attacks are becoming more sophisticated as we live in a target rich environment. The issue of assessing vulnerabilities was discussed along with the selection of safeguards such as improving SCADA systems and the latest encryption methods to prevent hackers from bringing down computer networks. 3 tabs., 23 figs.

  14. Methodologies and applications for critical infrastructure protection: State-of-the-art

    International Nuclear Information System (INIS)

    Yusta, Jose M.; Correa, Gabriel J.; Lacal-Arantegui, Roberto

    2011-01-01

    This work provides an update of the state-of-the-art on energy security relating to critical infrastructure protection. For this purpose, this survey is based upon the conceptual view of OECD countries, and specifically in accordance with EU Directive 114/08/EC on the identification and designation of European critical infrastructures, and on the 2009 US National Infrastructure Protection Plan. The review discusses the different definitions of energy security, critical infrastructure and key resources, and shows some of the experie'nces in countries considered as international reference on the subject, including some information-sharing issues. In addition, the paper carries out a complete review of current methodologies, software applications and modelling techniques around critical infrastructure protection in accordance with their functionality in a risk management framework. The study of threats and vulnerabilities in critical infrastructure systems shows two important trends in methodologies and modelling. A first trend relates to the identification of methods, techniques, tools and diagrams to describe the current state of infrastructure. The other trend accomplishes a dynamic behaviour of the infrastructure systems by means of simulation techniques including systems dynamics, Monte Carlo simulation, multi-agent systems, etc. - Highlights: → We examine critical infrastructure protection experiences, systems and applications. → Some international experiences are reviewed, including EU EPCIP Plan and the US NIPP programme. → We discuss current methodologies and applications on critical infrastructure protection, with emphasis in electric networks.

  15. Enabling software defined networking experiments in networked critical infrastructures

    Directory of Open Access Journals (Sweden)

    Béla Genge

    2014-05-01

    Full Text Available Nowadays, the fact that Networked Critical Infrastructures (NCI, e.g., power plants, water plants, oil and gas distribution infrastructures, and electricity grids, are targeted by significant cyber threats is well known. Nevertheless, recent research has shown that specific characteristics of NCI can be exploited in the enabling of more efficient mitigation techniques, while novel techniques from the field of IP networks can bring significant advantages. In this paper we explore the interconnection of NCI communication infrastructures with Software Defined Networking (SDN-enabled network topologies. SDN provides the means to create virtual networking services and to implement global networking decisions. It relies on OpenFlow to enable communication with remote devices and has been recently categorized as the “Next Big Technology”, which will revolutionize the way decisions are implemented in switches and routers. Therefore, the paper documents the first steps towards enabling an SDN-NCI and presents the impact of a Denial of Service experiment over traffic resulting from an XBee sensor network which is routed across an emulated SDN network.

  16. 77 FR 35700 - Protected Critical Infrastructure Information (PCII) Program Survey

    Science.gov (United States)

    2012-06-14

    ... (NPPD), Office of Infrastructure Protection (IP), Infrastructure Information Collection Division (IICD... Information Collection Request should be forwarded to DHS/NPPD/IP/IICD, 245 Murray Lane, SW., Mailstop 0602, Arlington, VA 20598-0602. Email requests should go to Vickie Bovell, [email protected] . Written...

  17. 78 FR 76986 - Version 5 Critical Infrastructure Protection Reliability Standards

    Science.gov (United States)

    2013-12-20

    ...; Order No. 791] Version 5 Critical Infrastructure Protection Reliability Standards AGENCY: Federal Energy... 72755). The regulations approved certain reliability standards proposed by the North American Electric... Infrastructure Protection Reliability Standards, 145 FERC ] 61,160 (2013). This errata notice serves to correct P...

  18. 78 FR 27113 - Version 5 Critical Infrastructure Protection Reliability Standards

    Science.gov (United States)

    2013-05-09

    ... approve certain reliability standards proposed by the North American Electric Reliability Corporation... Infrastructure Protection Reliability Standards, 143 FERC ] 61,055 (2013). This errata notice serves to correct P... Commission 18 CFR Part 40 [Docket No. RM13-5-000] Version 5 Critical Infrastructure Protection Reliability...

  19. Infrastructure of Taiwan photon source control network

    International Nuclear Information System (INIS)

    Chang, Y.T.; Kuo, C.H.; Cheng, Y.S.; Jenny Chen; Hsu, S.Y.; Wu, C.Y.; Hu, K.H.; Hsu, K.T.

    2012-01-01

    A reliable, flexible and secure network is essential for the Taiwan Photon Source (TPS) control system which is based upon the EPICS tool-kit framework. Subsystem sub-nets will connect to control system via EPICS based CA gateways for forwarding data and reducing network traffic. Combining cyber security technologies such as fire-wall, NAT and VLAN, control network is isolated to protect IOCs and accelerator components. Network management tools are used to improve network performance. Remote access mechanism will be constructed for maintenance and troubleshooting. The Ethernet is also used as field-bus for instruments such as power supplies. This paper will describe the system architecture for the TPS control network. Cabling topology, redundancy and maintainability are also discussed. (authors)

  20. Managing IT infrastructure standardisation in the networked manufacturing firm

    NARCIS (Netherlands)

    Akkermans, H.A.; Horst, van der H.

    2002-01-01

    This paper discusses managerial aspects of information technology (IT) infrastructure standardisation in networked manufacturing firms. It shows that in these firms, where local initiative is very important and strict central hierarchical control is lacking, standardisation of IT infrastructure is

  1. SITRUS: Semantic Infrastructure for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kalil A. Bispo

    2015-10-01

    Full Text Available Wireless sensor networks (WSNs are made up of nodes with limited resources, such as processing, bandwidth, memory and, most importantly, energy. For this reason, it is essential that WSNs always work to reduce the power consumption as much as possible in order to maximize its lifetime. In this context, this paper presents SITRUS (semantic infrastructure for wireless sensor networks, which aims to reduce the power consumption of WSN nodes using ontologies. SITRUS consists of two major parts: a message-oriented middleware responsible for both an oriented message communication service and a reconfiguration service; and a semantic information processing module whose purpose is to generate a semantic database that provides the basis to decide whether a WSN node needs to be reconfigurated or not. In order to evaluate the proposed solution, we carried out an experimental evaluation to assess the power consumption and memory usage of WSN applications built atop SITRUS.

  2. Secure Infrastructure-Less Network (SINET)

    Science.gov (United States)

    2017-06-01

    WIRELESS TECHNOLOGY IN MOBILE DEVICES ..................................................................................................18 1. 4G LTE ...System LOS Line of Sight LTE Long-Term Evolution MANET Mobile Ad-hoc Network MCP Mobility Capabilities Package MPR Multipoint Relays NFC...National Security Agency, 2003). CCI, while unclassified, still requires strict physical control measures to protect against loss or compromise

  3. ORGANIZATION OF CLOUD COMPUTING INFRASTRUCTURE BASED ON SDN NETWORK

    Directory of Open Access Journals (Sweden)

    Alexey A. Efimenko

    2013-01-01

    Full Text Available The article presents the main approaches to cloud computing infrastructure based on the SDN network in present data processing centers (DPC. The main indexes of management effectiveness of network infrastructure of DPC are determined. The examples of solutions for the creation of virtual network devices are provided.

  4. N2R vs. DR Network Infrastructure Evaluation

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Roost, Lars Jessen; Toft, Per Nesager

    2007-01-01

    Recent development of Internet-based services has set higher requirements to network infrastructures in terms of more bandwidth, lower delays and more reliability. Theoretical research within the area of Structural Quality of Service (SQoS) has introduced a new type of infrastructure which meet...... these requirements: N2R infrastructures. This paper contributes to the ongoing research with a case study from North Jutland. An evaluation of three N2R infrastructures compared to a Double Ring (DR) infrastructure will provide valuable information of the practical applicability of N2R infrastructures. In order...... to study if N2R infrastructures perform better than the DR infrastructure, a distribution network was established based on geographical information system (GIS) data. Nodes were placed with respect to demographic and geographical factors. The established distribution network was investigated with respect...

  5. Critical Infrastructure Protection and Information Assurance (CIPIA) Fellow Program

    National Research Council Canada - National Science Library

    Chen, Peter

    2003-01-01

    LSU was one of the universities chosen to participate in the project of training new researchers to work on the Critical Infrastructure Protection and Information Assurance (CIPIA) areas. Three Ph.D...

  6. Risk Assessment Methodology for Protecting Our Critical Physical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    BIRINGER,BETTY E.; DANNEELS,JEFFREY J.

    2000-12-13

    Critical infrastructures are central to our national defense and our economic well-being, but many are taken for granted. Presidential Decision Directive (PDD) 63 highlights the importance of eight of our critical infrastructures and outlines a plan for action. Greatly enhanced physical security systems will be required to protect these national assets from new and emerging threats. Sandia National Laboratories has been the lead laboratory for the Department of Energy (DOE) in developing and deploying physical security systems for the past twenty-five years. Many of the tools, processes, and systems employed in the protection of high consequence facilities can be adapted to the civilian infrastructure.

  7. Critical infrastructure – content, structure and problems of its protection

    Directory of Open Access Journals (Sweden)

    Ladislav Hofreiter

    2014-06-01

    Full Text Available Security, economic and social stability of the country, its functionality but also protecting the lives and property of citizens are dependent on the proper functioning of many infrastructure systems of state. Disruptions, lack or destruction of such systems, institutions, facilities and other services could cause disruption of social stability and national security, provoke a crisis situation or seriously affect the operation of state and local governments in crisis situations. This is known as critical infrastructure. It is in the interest of the State to the critical infrastructure effectively protected.

  8. Network and computing infrastructure for scientific applications in Georgia

    Science.gov (United States)

    Kvatadze, R.; Modebadze, Z.

    2016-09-01

    Status of network and computing infrastructure and available services for research and education community of Georgia are presented. Research and Educational Networking Association - GRENA provides the following network services: Internet connectivity, network services, cyber security, technical support, etc. Computing resources used by the research teams are located at GRENA and at major state universities. GE-01-GRENA site is included in European Grid infrastructure. Paper also contains information about programs of Learning Center and research and development projects in which GRENA is participating.

  9. Protecting America: Reorganizing the Nation's Security Forces to Ensure the Protection of Our Critical Infrastructure

    National Research Council Canada - National Science Library

    Williams

    2004-01-01

    .... This national strategy amplified the significant responsibilities of states, localities, the private sector, and private citizens to protect and defend our communities and our critical infrastructure...

  10. Radiation Protection and Safety infrastructure in Albania

    International Nuclear Information System (INIS)

    Ylli, F.; Dollani, K.; Paci, R.

    2005-01-01

    On 1995 Albania Parliament approved the Radiation Protection Act, which established the Radiation Protection Commission as Regulatory Body and Radiation Protection Office as an executive office. The licensing of private and public companies is a duty of RPC and the inspections, enforcement, import - export control, safety and security of radioactive materials, are tasks of RPO. Regulations on licence and inspection, safe handling of radioactive sources, radioactive waste management and transport of radioactive materials have been approved. The Codes of practice in diagnostic radiology, radiotherapy and nuclear medicine have been prepared. Institute of Nuclear Physics carry out monitoring of personal dosimetry, response to the radiological emergencies, calibration of dosimetric equipment's, management of radioactive waste, etc. Based in the IAEA documents, a new Radiation Protection Act is under preparation

  11. Government of Canada position paper on a national strategy for critical infrastructure protection

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2004-11-01

    The Government of Canada's position on the development of a comprehensive national approach to critical infrastructure protection (CIP) was presented along with a policy framework for developing a national cyber security strategy and a review of the Emergency Preparedness Act. Canada's national critical infrastructure (NCI) is defined as physical and information technology facilities, networks, services and assets, which if destroyed, would have a serious impact on health, safety, security and economics. The CIP strategy includes an NCI assurance program for various sectors of the economy, including the energy, transportation, finance, health care, food, communications, water, safety and manufacturing sectors. It also includes CIP for the government sector. This report described the key elements of an NCI protection strategy. These include guiding principles, risk management, information sharing, inventory of critical infrastructure assets, threats and warnings, critical infrastructure interdependencies, governance mechanisms, research and development, and international cooperation. refs., tabs., figs.

  12. Protecting National Critical Infrastructure against Radiological Threat

    International Nuclear Information System (INIS)

    Yaar, I.; Halevy, I.; Berenstein, Z.; Sharon, A.

    2014-01-01

    National Critical Infrastructure (NCI) such as transportation, water, energy etc., are essential elements in a developed country's economy. As learned after the 9/11 attackxx, a terror attack on these complex system may cause thousands of casualties and significant economic damage. The attack can be a conventional one; like the train bombing in Spainxxi or the bus bombing in Londonxxii, or a non-conventional one; like the Sarin attack on the underground train in Tokyo, Japanxxiii. A radiological attack on a NCI is also feasiblexxiv. This type of attack must be taken into consideration due to the vulnerability of ani infrastructure to such an attack, and the severe economic outcome of itxxv. The radioactive materials that might be used by terrorists were recently identified and categorized in one of the IAEA Nuclear Security Series publicationxxvi,xxvii. The most common and therefore reachable radio nuclides are the gamma emitters 60Co, 137Cs and 192Ir, the beta emitter 90Sr and the alpha emitters 241Pu, 238Pu and 241Am. A radiological event can be any of two principle scenarios. In the first scenario, a radiological dispersion device (RDD) or ôdirtyö bomb is used. This device consists of a radiation source which is detonated using conventional or improvised explosivesxxviii. Most of the casualties in this event will be from the explosion blast wave. However, some people might become contaminated with different levels of radiationxxix, some might need to go through some type of medical screening process and the costs of the total actions might be significantxxx. The second scenario involves a silent dispersion of radioactive material in a public site. In this event, there are no immediate known casualties, and the fact that people were exposed to radioactive material will be discovered only in the uncommon event when symptoms of radiation sickness will be identified due to exposure to high radiation dosexxxi, or if the radioactive material is discovered by a first

  13. 6 CFR 29.8 - Disclosure of Protected Critical Infrastructure Information.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Disclosure of Protected Critical Infrastructure... PROTECTED CRITICAL INFRASTRUCTURE INFORMATION § 29.8 Disclosure of Protected Critical Infrastructure... Infrastructure Protection, or either's designee may choose to provide or authorize access to PCII under one or...

  14. Modern International Research Groups: Networks and Infrastructure

    Science.gov (United States)

    Katehi, Linda

    2009-05-01

    In a globalized economy, education and research are becoming increasing international in content and context. Academic and research institutions worldwide try to internationalize their programs by setting formal or informal collaborations. An education that is enhanced by international experiences leads to mobility of the science and technology workforce. Existing academic cultures and research structures are at odds with efforts to internationalize education. For the past 20-30 years, the US has recognized the need to improve the abroad experience of our scientists and technologists: however progress has been slow. Despite a number of both federally and privately supported programs, efforts to scale up the numbers of participants have not been satisfactory. The exchange is imbalanced as more foreign scientists and researchers move to the US than the other way around. There are a number of issues that contribute to this imbalance but we could consider the US academic career system, as defined by its policies and practices, as a barrier to internationalizing the early career faculty experience. Strict curricula, pre-tenure policies and financial commitments discourage students, post doctoral fellows and pre-tenure faculty from taking international leaves to participate in research abroad experiences. Specifically, achieving an international experience requires funding that is not provided by the universities. Furthermore, intellectual property requirements and constraints in pre-tenure probationary periods may discourage students and faculty from collaborations with peers across the Atlantic or Pacific or across the American continent. Environments that support early career networking are not available. This presentation will discuss the increasing need for international collaborations and will explore the need for additional programs, more integration, better conditions and improved infrastructures that can encourage and support mobility of scientists. In addition

  15. The Framework for Simulation of Bioinspired Security Mechanisms against Network Infrastructure Attacks

    Directory of Open Access Journals (Sweden)

    Andrey Shorov

    2014-01-01

    Full Text Available The paper outlines a bioinspired approach named “network nervous system" and methods of simulation of infrastructure attacks and protection mechanisms based on this approach. The protection mechanisms based on this approach consist of distributed prosedures of information collection and processing, which coordinate the activities of the main devices of a computer network, identify attacks, and determine nessesary countermeasures. Attacks and protection mechanisms are specified as structural models using a set-theoretic approach. An environment for simulation of protection mechanisms based on the biological metaphor is considered; the experiments demonstrating the effectiveness of the protection mechanisms are described.

  16. The framework for simulation of bioinspired security mechanisms against network infrastructure attacks.

    Science.gov (United States)

    Shorov, Andrey; Kotenko, Igor

    2014-01-01

    The paper outlines a bioinspired approach named "network nervous system" and methods of simulation of infrastructure attacks and protection mechanisms based on this approach. The protection mechanisms based on this approach consist of distributed procedures of information collection and processing, which coordinate the activities of the main devices of a computer network, identify attacks, and determine necessary countermeasures. Attacks and protection mechanisms are specified as structural models using a set-theoretic approach. An environment for simulation of protection mechanisms based on the biological metaphor is considered; the experiments demonstrating the effectiveness of the protection mechanisms are described.

  17. Protecting Critical Infrastructure by Identifying Pathways of Exposure to Risk

    Directory of Open Access Journals (Sweden)

    Philip O’Neill

    2013-08-01

    Full Text Available Increasingly, our critical infrastructure is managed and controlled by computers and the information networks that connect them. Cyber-terrorists and other malicious actors understand the economic and social impact that a successful attack on these systems could have. While it is imperative that we defend against such attacks, it is equally imperative that we realize how best to react to them. This article presents the strongest-path method of analyzing all potential pathways of exposure to risk – no matter how indirect or circuitous they may be – in a network model of infrastructure and operations. The method makes direct use of expert knowledge about entities and dependency relationships without the need for any simulation or any other models. By using path analysis in a directed graph model of critical infrastructure, planners can model and assess the effects of a potential attack and develop resilient responses.

  18. The legal imperative to protect critical energy infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Shore, J.J.M.

    2008-03-15

    Canada's critical infrastructure is comprised of energy facilities, communications centres, finance, health care, food, government and transportation sectors. All sectors face a range of physical or cyber threats from terrorism and natural phenomenon. Failures or disruptions in the sectors can cascade through other systems and disrupt essential services. The power outage in 2003 demonstrated gaps in North America's emergency preparedness. In 2006, al-Qaida called for terrorist attacks on North American oil fields and pipelines, specifically targeting Canada. Studies have confirmed that Canada is vulnerable to attacks on energy infrastructure. Government agencies and the private sector must work ensure the safety of Canada's energy infrastructure, as the primary responsibility of government is the protection of its citizenry. The fulfilment of the government's commitment to national security cannot be achieved without protecting Canada's critical energy infrastructure. However, Canada has not yet provided a framework linking federal government with critical infrastructures, despite the fact that a draft strategy has been under development for several years. It was concluded that governments and the private sector should work together to reduce risks, protect the public, and secure the economy. National security litigation against the government and legal imperatives for energy facility owners and operators were also reviewed. 98 refs., 20 figs.

  19. Network Randomization and Dynamic Defense for Critical Infrastructure Systems

    Energy Technology Data Exchange (ETDEWEB)

    Chavez, Adrian R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Martin, Mitchell Tyler [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hamlet, Jason [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Stout, William M.S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Lee, Erik [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-04-01

    Critical Infrastructure control systems continue to foster predictable communication paths, static configurations, and unpatched systems that allow easy access to our nation's most critical assets. This makes them attractive targets for cyber intrusion. We seek to address these attack vectors by automatically randomizing network settings, randomizing applications on the end devices themselves, and dynamically defending these systems against active attacks. Applying these protective measures will convert control systems into moving targets that proactively defend themselves against attack. Sandia National Laboratories has led this effort by gathering operational and technical requirements from Tennessee Valley Authority (TVA) and performing research and development to create a proof-of-concept solution. Our proof-of-concept has been tested in a laboratory environment with over 300 nodes. The vision of this project is to enhance control system security by converting existing control systems into moving targets and building these security measures into future systems while meeting the unique constraints that control systems face.

  20. Critical Foundations: Protecting America's Infrastructures. The Report of the President's Commission on Critical Infrastructure Protection

    National Research Council Canada - National Science Library

    1997-01-01

    There is no doubt that our critical infrastructures are the best in the world-largely the result of the tremendous efficiency and global reach made possible by incorporation of our rapidly advancing...

  1. Protection of electricity distribution networks

    CERN Document Server

    Gers, Juan M

    2004-01-01

    Written by two practicing electrical engineers, this second edition of the bestselling Protection of Electricity Distribution Networks offers both practical and theoretical coverage of the technologies, from the classical electromechanical relays to the new numerical types, which protect equipment on networks and in electrical plants. A properly coordinated protection system is vital to ensure that an electricity distribution network can operate within preset requirements for safety for individual items of equipment, staff and public, and the network overall. Suitable and reliable equipment sh

  2. Structural and Infrastructural Underpinnings of International R&D Networks

    DEFF Research Database (Denmark)

    Niang, Mohamed; Sørensen, Brian Vejrum

    2009-01-01

    This paper explores the process of globally distributing R&D activities with an emphasis on the effects of network maturity. It discusses emerging configurations by asking how the structure and infrastructure of international R&D networks evolve along with the move from a strong R&D center...... to dispersed development. Drawing from case studies of two international R&D networks, it presents a capability maturity model and argues that understanding the interaction between new structures and infrastructures of the dispersed networks has become a key requirement for developing organizational...

  3. What's My Lane? Identifying the State Government Role in Critical Infrastructure Protection

    OpenAIRE

    Donnelly, Timothy S.

    2012-01-01

    Approved for public release; distribution is unlimited What constitutes an effective Critical Infrastructure and Key Resources (CIKR) protection program for Massachusetts This study evaluates existing literature regarding CIKR to extrapolate an infrastructure protection role for Massachusetts. By reviewing historical events and government strategies regarding infrastructure protection, Chapters I and II will provide scope and context for issues surrounding critical infrastructure. Chapter ...

  4. 78 FR 6807 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Science.gov (United States)

    2013-01-31

    ... coordinating and sponsoring an executive-led Critical Infrastructure Protection and Cyber Security mission to... on the cyber security, critical infrastructure protection, and emergency management, ports of entry... security, including border protection, civil defense capabilities, and coast guard and maritime...

  5. Cybersecurity protecting critical infrastructures from cyber attack and cyber warfare

    CERN Document Server

    Johnson, Thomas A

    2015-01-01

    The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporatio

  6. CRITICAL INFORMATION INFRASTRUCTURE SECURITY - NETWORK INTRUSION DETECTION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Cristea DUMITRU

    2011-12-01

    Full Text Available Critical Information Infrastructure security will always be difficult to ensure, just because of the features that make it irreplaceable tor other critical infrastructures normal operation. It is decentralized, interconnected interdependent, controlled by multiple actors (mainly private and incorporating diverse types of technologies. It is almost axiomatic that the disruption of the Critical Information Infrastructure affects systems located much farther away, and the cyber problems have direct consequences on the real world. Indeed the Internet can be used as a multiplier in order to amplify the effects of an attack on some critical infrastructures. Security challenges increase with the technological progress. One of the last lines of defense which comes to complete the overall security scheme of the Critical Information Infrastructure is represented by the Network Intrusion Detection Systems.

  7. Radiation protection education and training infrastructure. Open and distance learning tools for training in radiation protection

    Energy Technology Data Exchange (ETDEWEB)

    Marco, M.; Rodriguez, M.; Gonzalez Giralda, C.G.; Bailador Ferreras, A.B. [CIEMAT, Madrid (Spain); Coeck, M.C. [Studiecentrum voor Kernenergie - Centre d' Etude de l' Energie Nucleaire, Mol (Belgium); Etard, C.E. [CEA Saclay, 91 - Gif sur Yvette (France). INSTN, Institut National des Sciences et Techniques Nucleaires; Moebius, S.M. [FZK -FTU, Munich (Germany); Schmitt-Hanning, A.S. [BfS, Karlsruhe (Germany); Luciani, A.I. [ENEA, Bologna (Italy); Van Der Steen, J.V. [NRG, Petten (Netherlands)

    2006-07-01

    Full text: A sustainable Education and Training (E.T.) infrastructure for Radiation Protection is an essential component to combat the decline in expertise and to ensure the continuation of the high level of radiation protection knowledge in the future. Such infrastructure has to be built in such a way that both the initial training (Education) and the unceasing maintenance of the level of competencies (referred to as 'Training') are available. The E.N.E.T.R.A.P. project intends to develop the E.T. infrastructure mentioned. To achieve the aims of the different tasks and activities, the work programme for the E.N.E.T.R.A.P. Network is divided in eight work packages developed by 11 partners: Each partner will assume responsibility for the W.P.s. C.I.E.M.A.T. is involved in the W.P.-5 'New concepts and new tools for an E.R.P.C.'. The tasks of the W.P.-5 are focussed in the investigation of the electronic tools used in R.P. training and education. This paper presents the first results of this working group. The first task is an approach to the development and usage of learning resources. A review on the e-learning methodologies, the present state of art and its evolution, are being carried out. Results will be used to select the best way to host learning activities in the framework of the E.N.E.T.R.A.P. project. Another important task is to identify, analyse and evaluate the Open and Distance learning tools and material existing for train ing in Radiation Protection. A review on the evolutions, approaches and methodologies aiming to provide education and training in radiation protection, will be carried out. The results of this task will be a summary of links referred to the most interesting R.P. e-learning. Finally, taking in account the previous results a pilot R.P. module of E.R.P.C. should be prepared. (authors)

  8. Radiation protection education and training infrastructure. Open and distance learning tools for training in radiation protection

    International Nuclear Information System (INIS)

    Marco, M.; Rodriguez, M.; Gonzalez Giralda, C.G.; Bailador Ferreras, A.B.; Coeck, M.C.; Etard, C.E.; Schmitt-Hanning, A.S.; Luciani, A.I.; Van Der Steen, J.V.

    2006-01-01

    Full text: A sustainable Education and Training (E.T.) infrastructure for Radiation Protection is an essential component to combat the decline in expertise and to ensure the continuation of the high level of radiation protection knowledge in the future. Such infrastructure has to be built in such a way that both the initial training (Education) and the unceasing maintenance of the level of competencies (referred to as 'Training') are available. The E.N.E.T.R.A.P. project intends to develop the E.T. infrastructure mentioned. To achieve the aims of the different tasks and activities, the work programme for the E.N.E.T.R.A.P. Network is divided in eight work packages developed by 11 partners: Each partner will assume responsibility for the W.P.s. C.I.E.M.A.T. is involved in the W.P.-5 'New concepts and new tools for an E.R.P.C.'. The tasks of the W.P.-5 are focussed in the investigation of the electronic tools used in R.P. training and education. This paper presents the first results of this working group. The first task is an approach to the development and usage of learning resources. A review on the e-learning methodologies, the present state of art and its evolution, are being carried out. Results will be used to select the best way to host learning activities in the framework of the E.N.E.T.R.A.P. project. Another important task is to identify, analyse and evaluate the Open and Distance learning tools and material existing for train ing in Radiation Protection. A review on the evolutions, approaches and methodologies aiming to provide education and training in radiation protection, will be carried out. The results of this task will be a summary of links referred to the most interesting R.P. e-learning. Finally, taking in account the previous results a pilot R.P. module of E.R.P.C. should be prepared. (authors)

  9. Explorations Around "Graceful Failure" in Transportation Infrastructure: Lessons Learned By the Infrastructure and Climate Network (ICNet)

    Science.gov (United States)

    Jacobs, J. M.; Thomas, N.; Mo, W.; Kirshen, P. H.; Douglas, E. M.; Daniel, J.; Bell, E.; Friess, L.; Mallick, R.; Kartez, J.; Hayhoe, K.; Croope, S.

    2014-12-01

    Recent events have demonstrated that the United States' transportation infrastructure is highly vulnerable to extreme weather events which will likely increase in the future. In light of the 60% shortfall of the $900 billion investment needed over the next five years to maintain this aging infrastructure, hardening of all infrastructures is unlikely. Alternative strategies are needed to ensure that critical aspects of the transportation network are maintained during climate extremes. Preliminary concepts around multi-tier service expectations of bridges and roads with reference to network capacity will be presented. Drawing from recent flooding events across the U.S., specific examples for roads/pavement will be used to illustrate impacts, disruptions, and trade-offs between performance during events and subsequent damage. This talk will also address policy and cultural norms within the civil engineering practice that will likely challenge the application of graceful failure pathways during extreme events.

  10. Existing PON Infrastructure Supported Hybrid Fiber-Wireless Sensor Networks

    DEFF Research Database (Denmark)

    Yu, Xianbin; Zhao, Ying; Deng, Lei

    2012-01-01

    We propose a hybrid fiber wireless sensor network based on the existing PON infrastructure. The feasibility of remote sensing and PON convergence is experimentally proven by transmitting direct-sequence spread-spectrum wireless sensing and 2.5Gbps GPON signals.......We propose a hybrid fiber wireless sensor network based on the existing PON infrastructure. The feasibility of remote sensing and PON convergence is experimentally proven by transmitting direct-sequence spread-spectrum wireless sensing and 2.5Gbps GPON signals....

  11. LA PROTECTION DES INFRASTRUCTURES CRITIQUES – DEFIS ACTUELS

    Directory of Open Access Journals (Sweden)

    Dan Fifoiu

    2010-12-01

    Full Text Available Considering that in the European Union's plan, it has not been identified a solution for surpassing the legal differences between states (derived from priorities and different interests, Romania continues the program of alignment towards increasing its own standards and interconnecting internal critical infrastructures with the European and regional ones. This process is a lasting one, fact revealed also by the distance, in terms of time, between the first approaches, at a European level, of the problems of critical infrastructures, at the implementation of Directive 114/2008 provisions. The steps taken by the authorities in Bucharest are intended to drive Romania towards a level of development compatible both with the integration in a single European space of critical infrastructures and the fulfillment of an important role in stating the future strategies of the European Union. Currently, Romania’s alignment to the European Union and international standards creates the optimum framework for developing and implementing some specific provisions which, at this time, are materialized as the steps of a single national plan for protecting critical infrastructures, on the way of being configured.

  12. Low-Power Wireless Sensor Network Infrastructures

    DEFF Research Database (Denmark)

    Hansen, Morten Tranberg

    Advancements in wireless communication and electronics improving form factor and hardware capabilities has expanded the applicability of wireless sensor networks. Despite these advancements, devices are still limited in terms of energy which creates the need for duty-cycling and low-power protocols...... peripherals need to by duty-cycled and the low-power wireless radios are severely influenced by the environmental effects causing bursty and unreliable wireless channels. This dissertation presents a communication stack providing services for low-power communication, secure communication, data collection......, and network management which enables construction of low-power wireless sensor network applications. More specifically, these services are designed with the extreme low-power scenarios of the SensoByg project in mind and are implemented as follows. First, low-power communication is implemented with Auto...

  13. Practical example of the infrastructure protection against rock fall

    Science.gov (United States)

    Jirásko, Daniel; Vaníček, Ivan

    2017-09-01

    The protection of transport infrastructures against rock falls represents for the Czech Republic one of the sensitive questions. Rock falls, similarly as other typical geo-hazards for the Czech Republic, as landslides and floods, can have negative impact on safety and security of these infrastructures. One practical example how to reduce risk of rock fall is described in the paper. Great care is devoted to the visual inspection enabling to indicate places with high potential to failure. With the help of numerical modelling the range of rock fall negative impact is estimated. Protection measures are dealing with two basic ways. The first one utilize the results of numerical modelling for the optimal design of protection measures and the second one is focused on the monitoring of the rock blocks with high potential of instability together with wire-less transfer of measured results. After quick evaluation, e.g. comparison with warning values, some protection measures, mostly connected with closure of the potential sector, can be recommended.

  14. Scalable infrastructure for distributed sensor networks

    National Research Council Canada - National Science Library

    Chakrabarty, Krishnendu; Iyengar, S. S

    2005-01-01

    ... network application is inventory tracking in factory warehouses. A single sensor node can be attached to each item in the warehouse. These sensor nodes can then be used for tracking the location of the items as they are moved within the warehouse. They can also provide information on the location of nearby items as well as the history of movement...

  15. CONSEQUENCES OF FAILURE OF GAS NETWORK INFRASTRUCTURE

    Directory of Open Access Journals (Sweden)

    Marek URBANIK

    2016-06-01

    Full Text Available Ecology today is becoming increasingly important. Increasing air pollution and greenhouse gas emissions make the search for such fuels which will not have such a negative effect on the environment as the fuel use currently - mainly coal. At present it seems that the substitute fuel can be gaseous fuels (propane-butane, methane. Their combustion is less harmful to the environment and their transport is relatively not very complicated. As it turns out, the use of gas is increasing in industry, automotive, heating systems (power plants that operate in the so-called cogeneration. The increase in demand carries continuous development of gas infrastructure, which in turn may increase probability of failure. As a conclusion of this article, taking into account all the construction disasters induced by the gas, the number of such failures is relatively small. It should be remembered, that the disaster caused by gas explosion may cause very large material and human losses. Not without significance is the impact of gas leakage, eg. of the pipeline on the environment. An example is the methane which is a greenhouse gas, less persistent in the air, but much more active than CO2. The article presents selected disasters associated with natural gas or propane-butane and the impact of these gases on the environment because these fuels are most commonly used in most sectors of the economy.

  16. IPV6 Network Infrastructure and Stability Inference

    Science.gov (United States)

    2014-09-01

    the Too Big Trick ( TBT ) to induce the remote targets to return fragmented responses. By evaluating the responses, the uptime for approximately 35% of...Internet. Approximately 50,000 IPv6 addresses were probed continuously from March to June 2014, using the Too Big Trick ( TBT ) to induce the remote targets...SNMP Simple Network Management Protocol TSval Timestamp Value TCP Transmission Control Protocol TBT Too Big Trick USG U.S. government xiv

  17. Converged Optical Network and Data Center Virtual Infrastructure Planning

    DEFF Research Database (Denmark)

    Georgakilas, Konstantinos; Tzanakaki, Anna; Anastasopoulos, Markos

    2012-01-01

    This paper presents a detailed study of planning virtual infrastructures (VIs) over a physical infrastructure comprising integrated optical network and data center resources with the aim of enabling sharing of physical resources among several virtual operators and services. Through the planning...... process, the VI topology and virtual resources are identified and mapped to the physical resources. Our study assumes a practical VI demand model without any in advance global knowledge of the VI requests that are handled sequentially. Through detailed integer linear program modeling, two objective...... functions—one that minimizes the overall power consumption of the infrastructure and one that minimizes the wavelength utilization—are compared. Both are evaluated for the virtual wavelength path and wavelength path optical network architectures. The first objective results in power consumption savings...

  18. A Method for Automated Planning of FTTH Access Network Infrastructures

    DEFF Research Database (Denmark)

    Riaz, Muhammad Tahir; Pedersen, Jens Myrup; Madsen, Ole Brun

    2005-01-01

    In this paper a method for automated planning of Fiber to the Home (FTTH) access networks is proposed. We introduced a systematic approach for planning access network infrastructure. The GIS data and a set of algorithms were employed to make the planning process more automatic. The method explains...... method. The method, however, does not fully automate the planning but make the planning process significantly fast. The results and discussion are presented and conclusion is given in the end....

  19. Cyber security deterrence and it protection for critical infrastructures

    CERN Document Server

    Martellini, Maurizio

    2013-01-01

    The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber attacks and argues that nations are entering a new cyber arms race. The brief also provides a technical analysis of possible cyber attacks towards critical infrastructures in the chemical industry and chemical safety industry. The authors also propose modern analyses and a holistic approach to resil

  20. Robustness and Recovery of Lifeline Infrastructure and Ecosystem Networks

    Science.gov (United States)

    Bhatia, U.; Ganguly, A. R.

    2015-12-01

    Disruptive events, both natural and man-made, can have widespread impacts on both natural systems and lifeline infrastructure networks leading to the loss of biodiversity and essential functionality, respectively. Projected sea-level rise and climate change can further increase the frequency and severity of large-scale floods on urban-coastal megacities. Nevertheless, Failure in infrastructure systems can trigger cascading impacts on dependent ecosystems, and vice-versa. An important consideration in the behavior of the isolated networks and inter-connected networks following disruptive events is their resilience, or the ability of the network to "bounce back" to a pre-disaster state. Conventional risk analysis and subsequent risk management frameworks have focused on identifying the components' vulnerability and strengthening of the isolated components to withstand these disruptions. But high interconnectedness of these systems, and evolving nature of hazards, particularly in the context of climate extremes, make the component level analysis unrealistic. In this study, we discuss the complex network-based resilience framework to understand fragility and recovery strategies for infrastructure systems impacted by climate-related hazards. We extend the proposed framework to assess the response of ecological networks to multiple species loss and design the restoration management framework to identify the most efficient restoration sequence of species, which can potentially lead to disproportionate gains in biodiversity.

  1. Integrating Subjective Trust into Networked Infrastructures

    Science.gov (United States)

    2009-04-22

    architectural framework for hexperimenting wit trust. • Use of semantic technologies incorporated into h b id b d t t t ta y r - ase rus managemen ...Language for Operation PI Persistent Identifier PILOW P i t t Id tifi T blers s en en er a es PINL Persistent Identifier Networking Layer SBIR Small...Investigate and propose an architecture to determine/measure and convey th t t l l f th i l t ie rus eve o e var ous e emen s n a distributed or

  2. Protective design of critical infrastructure with high performance concretes

    International Nuclear Information System (INIS)

    Riedel, W.; Nöldgen, M.; Stolz, A.; Roller, C.

    2012-01-01

    Conclusions: High performance concrete constructions will allow innovative design solutions for critical infrastructures. Validation of engineering methods can reside on large and model scale experiments conducted on conventional concrete structures. New consistent impact experiments show extreme protection potential for UHPC. Modern FEM with concrete models and explicit rebar can model HPC and UHPC penetration resistance. SDOF and TDOF approaches are valuable design tools on local and global level. Combination of at least 2 out of 3 design methods FEM – XDOF- EXP allow reliable prediction and efficient innovative designs

  3. Architecture for Cognitive Networking within NASAs Future Space Communications Infrastructure

    Science.gov (United States)

    Clark, Gilbert J., III; Eddy, Wesley M.; Johnson, Sandra K.; Barnes, James; Brooks, David

    2016-01-01

    Future space mission concepts and designs pose many networking challenges for command, telemetry, and science data applications with diverse end-to-end data delivery needs. For future end-to-end architecture designs, a key challenge is meeting expected application quality of service requirements for multiple simultaneous mission data flows with options to use diverse onboard local data buses, commercial ground networks, and multiple satellite relay constellations in LEO, MEO, GEO, or even deep space relay links. Effectively utilizing a complex network topology requires orchestration and direction that spans the many discrete, individually addressable computer systems, which cause them to act in concert to achieve the overall network goals. The system must be intelligent enough to not only function under nominal conditions, but also adapt to unexpected situations, and reorganize or adapt to perform roles not originally intended for the system or explicitly programmed. This paper describes architecture features of cognitive networking within the future NASA space communications infrastructure, and interacting with the legacy systems and infrastructure in the meantime. The paper begins by discussing the need for increased automation, including inter-system collaboration. This discussion motivates the features of an architecture including cognitive networking for future missions and relays, interoperating with both existing endpoint-based networking models and emerging information-centric models. From this basis, we discuss progress on a proof-of-concept implementation of this architecture as a cognitive networking on-orbit application on the SCaN Testbed attached to the International Space Station.

  4. Neural Network Based Intrusion Detection System for Critical Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Todd Vollmer; Ondrej Linda; Milos Manic

    2009-07-01

    Resiliency and security in control systems such as SCADA and Nuclear plant’s in today’s world of hackers and malware are a relevant concern. Computer systems used within critical infrastructures to control physical functions are not immune to the threat of cyber attacks and may be potentially vulnerable. Tailoring an intrusion detection system to the specifics of critical infrastructures can significantly improve the security of such systems. The IDS-NNM – Intrusion Detection System using Neural Network based Modeling, is presented in this paper. The main contributions of this work are: 1) the use and analyses of real network data (data recorded from an existing critical infrastructure); 2) the development of a specific window based feature extraction technique; 3) the construction of training dataset using randomly generated intrusion vectors; 4) the use of a combination of two neural network learning algorithms – the Error-Back Propagation and Levenberg-Marquardt, for normal behavior modeling. The presented algorithm was evaluated on previously unseen network data. The IDS-NNM algorithm proved to be capable of capturing all intrusion attempts presented in the network communication while not generating any false alerts.

  5. Building up the radiation protection infrastructure in Estonia

    International Nuclear Information System (INIS)

    Lust, Merle; Muru, Karin

    2008-01-01

    This paper will provide a timeline overview of the of radiation protection infrastructure following the 1999 declaration of independence. In Estonia, an independent competent authority was inaugurated in 1996 and the first Radiation Act was approved by Parliament the following year, in 1997. This paper will address several important factors and the means which promoted development. International cooperation was and remains an essential factor worthy of discussion. For example participation in International Atomic Energy Agency technical co-operation programme and co-operation with neighbouring countries greatly facilitated greatly the development. Political choices and the long term goal of accession to the European Union had great importance to the process also. Today, the Republic of Estonia is member of European Union and has built up a well functioning radiation protection system according the international standards and requirements. This paper is intended to share the experience and to facilitate the learning process. (author)

  6. Network computing infrastructure to share tools and data in global nuclear energy partnership

    International Nuclear Information System (INIS)

    Kim, Guehee; Suzuki, Yoshio; Teshima, Naoya

    2010-01-01

    CCSE/JAEA (Center for Computational Science and e-Systems/Japan Atomic Energy Agency) integrated a prototype system of a network computing infrastructure for sharing tools and data to support the U.S. and Japan collaboration in GNEP (Global Nuclear Energy Partnership). We focused on three technical issues to apply our information process infrastructure, which are accessibility, security, and usability. In designing the prototype system, we integrated and improved both network and Web technologies. For the accessibility issue, we adopted SSL-VPN (Security Socket Layer - Virtual Private Network) technology for the access beyond firewalls. For the security issue, we developed an authentication gateway based on the PKI (Public Key Infrastructure) authentication mechanism to strengthen the security. Also, we set fine access control policy to shared tools and data and used shared key based encryption method to protect tools and data against leakage to third parties. For the usability issue, we chose Web browsers as user interface and developed Web application to provide functions to support sharing tools and data. By using WebDAV (Web-based Distributed Authoring and Versioning) function, users can manipulate shared tools and data through the Windows-like folder environment. We implemented the prototype system in Grid infrastructure for atomic energy research: AEGIS (Atomic Energy Grid Infrastructure) developed by CCSE/JAEA. The prototype system was applied for the trial use in the first period of GNEP. (author)

  7. The Evolving Wide Area Network Infrastructure in the LHC era

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The global network is more than ever taking its role as the great "enabler" for many branches of science and research. Foremost amongst such science drivers is of course the LHC/LCG programme, although there are several other sectors with growing demands of the network. Common to all of these is the realisation that a straightforward over provisioned best efforts wide area IP service is probably not enough for the future. This talk will summarise the needs of several science sectors, and the advances being made to exploit the current best efforts infrastructure. It will then describe current projects aimed as provisioning "better than best efforts" services (such bandwidth on demand), the global optical R&D testbeds and the strategy of the research network providers to move towards hybrid multi-service networks for the next generation of the global wide area production network.

  8. A Survey on Infrastructure-Based Vehicular Networks

    Directory of Open Access Journals (Sweden)

    Cristiano M. Silva

    2017-01-01

    Full Text Available The infrastructure of vehicular networks plays a major role in realizing the full potential of vehicular communications. More and more vehicles are connected to the Internet and to each other, driving new technological transformations in a multidisciplinary way. Researchers in automotive/telecom industries and academia are joining their effort to provide their visions and solutions to increasingly complex transportation systems, also envisioning a myriad of applications to improve the driving experience and the mobility. These trends pose significant challenges to the communication systems: low latency, higher throughput, and increased reliability have to be granted by the wireless access technologies and by a suitable (possibly dedicated infrastructure. This paper presents an in-depth survey of more than ten years of research on infrastructures, wireless access technologies and techniques, and deployment that make vehicular connectivity available. In addition, we identify the limitations of present technologies and infrastructures and the challenges associated with such infrastructure-based vehicular communications, also highlighting potential solutions.

  9. 75 FR 68370 - Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...

    Science.gov (United States)

    2010-11-05

    ... DEPARTMENT OF HOMELAND SECURITY National Protection and Programs Directorate [Docket No. DHS-2010-0071] Agency Information Collection Activities: Office of Infrastructure Protection; Chemical Security...: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD), Office...

  10. Protection of Urban Water body Infrastructure - Policy Requirements

    Science.gov (United States)

    Neelakantan, T. R.; Ramakrishnan, K.

    2017-07-01

    Water body is an important infrastructure of urban landscape. Water bodies like tanks and ponds are constructed to harvest rainwater for local use. Such water bodies serve many environmental functions including flood and soil erosion control and are useful for irrigation, drinking water supply and groundwater recharge. A large number of water bodies recently have been lost due to anthropogenic activities and the remaining water bodies are under stress due to risk of degradation. There are many phases to solve or control the problem; starting from stopping the abuse, to restoration to monitoring and maintenance. In this situation, the existing urban and peri-urban water bodies are to be preserved and rehabilitated. In this study, policy requirements for the protection (preservation and rehabilitation) of water bodies are analyzed with special reference to Thanjavur city. Thanjavur city has many water bodies and moat around the Big-Temple and the palace, and stands as an evidence for water management in ancient days. These water bodies are to be protected and used properly for sustainable growth of the city. This paper envisages the following three: (a) need for evaluation of hydraulic and hydrologic properties of the water bodies for conserving rainwater and controlling flood water in the existing urban water bodies; (b) need for evaluation of potential of socio-environmental services by the water bodies, and (c) need for developing a relative importance index for protection of water bodies to prioritize the remedial actions.

  11. Trust and Reputation Management for Critical Infrastructure Protection

    Science.gov (United States)

    Caldeira, Filipe; Monteiro, Edmundo; Simões, Paulo

    Today's Critical Infrastructures (CI) depend of Information and Communication Technologies (ICT) to deliver their services with the required level of quality and availability. ICT security plays a major role in CI protection and risk prevention for single and also for interconnected CIs were cascading effects might occur because of the interdependencies that exist among different CIs. This paper addresses the problem of ICT security in interconnected CIs. Trust and reputation management using the Policy Based Management paradigm is the proposed solution to be applied at the CI interconnection points for information exchange. The proposed solution is being applied to the Security Mediation Gateway being developed in the European FP7 MICIE project, to allow for information exchange among interconnected CIs.

  12. Architecture for Cognitive Networking within NASA's Future Space Communications Infrastructure

    Science.gov (United States)

    Clark, Gilbert; Eddy, Wesley M.; Johnson, Sandra K.; Barnes, James; Brooks, David

    2016-01-01

    Future space mission concepts and designs pose many networking challenges for command, telemetry, and science data applications with diverse end-to-end data delivery needs. For future end-to-end architecture designs, a key challenge is meeting expected application quality of service requirements for multiple simultaneous mission data flows with options to use diverse onboard local data buses, commercial ground networks, and multiple satellite relay constellations in LEO, GEO, MEO, or even deep space relay links. Effectively utilizing a complex network topology requires orchestration and direction that spans the many discrete, individually addressable computer systems, which cause them to act in concert to achieve the overall network goals. The system must be intelligent enough to not only function under nominal conditions, but also adapt to unexpected situations, and reorganize or adapt to perform roles not originally intended for the system or explicitly programmed. This paper describes an architecture enabling the development and deployment of cognitive networking capabilities into the envisioned future NASA space communications infrastructure. We begin by discussing the need for increased automation, including inter-system discovery and collaboration. This discussion frames the requirements for an architecture supporting cognitive networking for future missions and relays, including both existing endpoint-based networking models and emerging information-centric models. From this basis, we discuss progress on a proof-of-concept implementation of this architecture, and results of implementation and initial testing of a cognitive networking on-orbit application on the SCaN Testbed attached to the International Space Station.

  13. Water infrastructure protection against intentional attacks:An experience in Italy

    Institute of Scientific and Technical Information of China (English)

    Cristiana Di Cristo; Angelo Leopardi; Giovanni de Marinis

    2011-01-01

    In the last years many interesting studies were devoted to the development of technologies and methodologies for the protection of water supply systems against intentional attacks.However the application to real systems is still limited for different economical and technical reasons.The Water Engineering Laboratory (L.I.A.) of University of Cassino (Italy) was involved in two research projects financed by the European Commission in the framework of the European Programme for Critical Infrastructure Protection (E.P.C.I.P.).Both projects,developed in partnership with a large Italian Water Company,have the common objective of providing guidelines for enhancing security in water supply systems respect to the intentional contamination risk.The fmal product is represented by the arrangement of a general procedure for protection systems design of water networks.In the paper the procedure is described through the application to two real water systems,characterized by different size and behavior.

  14. 75 FR 14454 - National Protection and Programs Directorate; National Infrastructure Advisory Council

    Science.gov (United States)

    2010-03-25

    ..., National Infrastructure Advisory Council. [FR Doc. 2010-6633 Filed 3-24-10; 8:45 am] BILLING CODE 9110-9P-P ... Directorate; National Infrastructure Advisory Council AGENCY: National Protection and Programs Directorate... Infrastructure Advisory Council (NIAC) will meet on Tuesday, April 13, 2010, at the National Press Club's...

  15. 75 FR 39266 - National Protection and Programs Directorate; National Infrastructure Advisory Council

    Science.gov (United States)

    2010-07-08

    ... Infrastructure Disruptions VII. New Business VIII. Closing Remarks IX. Adjournment Procedural While this meeting... Directorate; National Infrastructure Advisory Council AGENCY: National Protection and Programs Directorate... Infrastructure Advisory Council (NIAC) will meet on Tuesday, July 13, 2010, at the National Press Club's Ballroom...

  16. Establishment of a national radiation protection infrastructure. The Philippine experience

    Energy Technology Data Exchange (ETDEWEB)

    Valdezco, E.M. [Philippine Nuclear Research Institute, Department of Science and Technology (Philippines)

    2000-05-01

    Radiation and radioactive materials have been used widely in the Philippines for the last four decades and have made substantial contributions to the improvement of the life and welfare of the Filipino people. In spite of the unsuccessful attempt to operate a nuclear power, plant, the country, through the Philippine Nuclear Research Institute has consistently pursued an active small nuclear applications program to promote the peaceful applications of nuclear energy while also mandated to ensure radiation safety through nuclear regulations and radioactive materials licensing. Another government agency, the Radiation Health Services (RHS) of the Department of Health was created much later to address the growing concern on radiation hazards from electrically generated radiation devices and machines. The RHS has been strengthened later to include non-ionizing radiation health hazards and has expanded to include a biomedical engineering and non-radiation related medical equipment. The paper will describe the historical perspective highlighting the basis of the national regulatory framework to ensure that only qualified individuals are authorized to use radioactive materials and radiation emitting machines/devices. The development of national training programs in radiation protection and experiences in implementing these programs will be presented. National efforts to strengthen the radiation protection infrastructure through the establishment, improvement and upgrading of a number of facilities and capabilities in radiation protection related work activities will be discussed including participation in national, regional and international intercomparison programs to ensure accuracy, reliability, reproducibility and comparability of dose measurements. Lastly, data on the status of small nuclear applications and related activities in the country will be presented including a number of current issues related to the adoption of the new international basic safety standards

  17. Establishment of a national radiation protection infrastructure. The Philippine experience

    International Nuclear Information System (INIS)

    Valdezco, E.M.

    2000-01-01

    Radiation and radioactive materials have been used widely in the Philippines for the last four decades and have made substantial contributions to the improvement of the life and welfare of the Filipino people. In spite of the unsuccessful attempt to operate a nuclear power, plant, the country, through the Philippine Nuclear Research Institute has consistently pursued an active small nuclear applications program to promote the peaceful applications of nuclear energy while also mandated to ensure radiation safety through nuclear regulations and radioactive materials licensing. Another government agency, the Radiation Health Services (RHS) of the Department of Health was created much later to address the growing concern on radiation hazards from electrically generated radiation devices and machines. The RHS has been strengthened later to include non-ionizing radiation health hazards and has expanded to include a biomedical engineering and non-radiation related medical equipment. The paper will describe the historical perspective highlighting the basis of the national regulatory framework to ensure that only qualified individuals are authorized to use radioactive materials and radiation emitting machines/devices. The development of national training programs in radiation protection and experiences in implementing these programs will be presented. National efforts to strengthen the radiation protection infrastructure through the establishment, improvement and upgrading of a number of facilities and capabilities in radiation protection related work activities will be discussed including participation in national, regional and international intercomparison programs to ensure accuracy, reliability, reproducibility and comparability of dose measurements. Lastly, data on the status of small nuclear applications and related activities in the country will be presented including a number of current issues related to the adoption of the new international basic safety standards

  18. European network infrastructures of observatories for terrestrial Global Change research

    Science.gov (United States)

    Vereecken, H.; Bogena, H.; Lehning, M.

    2009-04-01

    The earth's climate is significantly changing (e.g. IPCC, 2007) and thus directly affecting the terrestrial systems. The number and intensity hydrological extremes, such as floods and droughts, are continually increasing, resulting in major economical and social impacts. Furthermore, the land cover in Europe has been modified fundamentally by conversions for agriculture, forest and for other purposes such as industrialisation and urbanisation. Additionally, water resources are more than ever used for human development, especially as a key resource for agricultural and industrial activities. As a special case, the mountains of the world are of significant importance in terms of water resources supply, biodiversity, economy, agriculture, traffic and recreation but particularly vulnerable to environmental change. The Alps are unique because of the pronounced small scale variability they contain, the high population density they support and their central position in Europe. The Alps build a single coherent physical and natural environment, artificially cut by national borders. The scientific community and governmental bodies have responded to these environmental changes by performing dedicated experiments and by establishing environmental research networks to monitor, analyse and predict the impact of Global Change on different terrestrial systems of the Earths' environment. Several European network infrastructures for terrestrial Global Change research are presently immerging or upgrading, such as ICOS, ANAEE, LifeWatch or LTER-Europe. However, the strongest existing networks are still operating on a regional or national level and the historical growth of such networks resulted in a very heterogeneous landscape of observation networks. We propose therefore the establishment of two complementary networks: The NetwOrk of Hydrological observAtories, NOHA. NOHA aims to promote the sustainable management of water resources in Europe, to support the prediction of

  19. INFRASTRUCTURE

    CERN Document Server

    Andrea Gaddi

    2010-01-01

    During the last six months, the main activity on the cooling circuit has essentially been preventive maintenance. At each short machine technical stop, a water sample is extracted out of every cooling circuit to measure the induced radioactivity. Soon after, a visual check of the whole detector cooling network is done, looking for water leaks in sensitive locations. Depending on sub-system availability, the main water filters are replaced; the old ones are inspected and sent to the CERN metallurgical lab in case of suspicious sediments. For the coming winter technical stop, a number of corrective maintenance activities and infrastructure consolidation work-packages are foreseen. A few faulty valves, found on the muon system cooling circuit, will be replaced; the cooling gauges for TOTEM and CASTOR, in the CMS Forward region, will be either changed or shielded against the magnetic stray field. The demineralizer cartridges will be replaced as well. New instrumentation will also be installed in the SCX5 PC farm ...

  20. INFRASTRUCTURE

    CERN Multimedia

    Andrea Gaddi.

    The various water-cooling circuits ran smoothly over the summer. The overall performance of the cooling system is satisfactory, even if some improvements are possible, concerning the endcap water-cooling and the C6F14 circuits. In particular for the endcap cooling circuit, we aim to lower the water temperature, to provide more margin for RPC detectors. An expert-on-call piquet has been established during the summer global run, assuring the continuous supervision of the installations. An effort has been made to collect and harmonize the existing documentation on the cooling infrastructures at P5. The last six months have seen minor modifications to the electrical power network at P5. Among these, the racks in USC55 for the Tracker and Sniffer systems, which are backed up by the diesel generator in case of power outage, have been equipped with new control boxes to allow a remote restart. Other interventions have concerned the supply of assured power to those installations that are essential for CMS to run eff...

  1. INFRASTRUCTURE

    CERN Multimedia

    A. Gaddi

    The long winter shut-down allows for modifications that will improve the reliability of the detector infrastructures at P5. The annual maintenance of detector services is taking place as well. This means a full stop of water-cooling circuits from November 24th with a gradual restart from mid January 09. The annual maintenance service includes the cleaning of the two SF5 cooling towers, service of the chiller plants on the surface, and the cryogenic plant serving the CMS Magnet. In addition, the overall site power is reduced from 8MW to 2MW, compatible with the switchover to the Swiss power network in winter. Full power will be available again from end of January. Among the modification works planned, the Low Voltage cabinets are being refurbished; doubling the cable sections and replacing the 40A circuit breakers with 60A types. This will reduce the overheating that has been experienced. Moreover, two new LV transformers will be bought and pre-cabled in order to assure a quick swap in case of failure of any...

  2. INFRASTRUCTURE

    CERN Document Server

    A. Gaddi

    2011-01-01

    During the last winter technical stop, a number of corrective maintenance activities and infrastructure consolidation work-packages were completed. On the surface, the site cooling facility has passed the annual maintenance process that includes the cleaning of the two evaporative cooling towers, the maintenance of the chiller units and the safety checks on the software controls. In parallel, CMS teams, reinforced by PH-DT group personnel, have worked to shield the cooling gauges for TOTEM and CASTOR against the magnetic stray field in the CMS Forward region, to add labels to almost all the valves underground and to clean all the filters in UXC55, USC55 and SCX5. Following the insertion of TOTEM T1 detector, the cooling circuit has been branched off and commissioned. The demineraliser cartridges have been replaced as well, as they were shown to be almost saturated. New instrumentation has been installed in the SCX5 PC farm cooling and ventilation network, in order to monitor the performance of the HVAC system...

  3. Assessing urban strategies for reducing the impacts of extreme weather on infrastructure networks.

    Science.gov (United States)

    Pregnolato, Maria; Ford, Alistair; Robson, Craig; Glenis, Vassilis; Barr, Stuart; Dawson, Richard

    2016-05-01

    Critical infrastructure networks, including transport, are crucial to the social and economic function of urban areas but are at increasing risk from natural hazards. Minimizing disruption to these networks should form part of a strategy to increase urban resilience. A framework for assessing the disruption from flood events to transport systems is presented that couples a high-resolution urban flood model with transport modelling and network analytics to assess the impacts of extreme rainfall events, and to quantify the resilience value of different adaptation options. A case study in Newcastle upon Tyne in the UK shows that both green roof infrastructure and traditional engineering interventions such as culverts or flood walls can reduce transport disruption from flooding. The magnitude of these benefits depends on the flood event and adaptation strategy, but for the scenarios considered here 3-22% improvements in city-wide travel times are achieved. The network metric of betweenness centrality, weighted by travel time, is shown to provide a rapid approach to identify and prioritize the most critical locations for flood risk management intervention. Protecting just the top ranked critical location from flooding provides an 11% reduction in person delays. A city-wide deployment of green roofs achieves a 26% reduction, and although key routes still flood, the benefits of this strategy are more evenly distributed across the transport network as flood depths are reduced across the model domain. Both options should form part of an urban flood risk management strategy, but this method can be used to optimize investment and target limited resources at critical locations, enabling green infrastructure strategies to be gradually implemented over the longer term to provide city-wide benefits. This framework provides a means of prioritizing limited financial resources to improve resilience. This is particularly important as flood management investments must typically exceed

  4. Guarding America: Security Guards and U.S. Critical Infrastructure Protection

    National Research Council Canada - National Science Library

    Parfomak, Paul W

    2004-01-01

    The Bush Administration's 2003 National Strategy for the Physical Protection of Critical Infrastructures and Key Assets indicates that security guards are an important source of protection for critical facilities...

  5. Reduce operational cost and extend the life of pipeline infrastructure by automating remote cathodic protection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rosado, Elroy [Freewave Technologies, Inc., Boulder, CO (United States). Latin America

    2009-07-01

    Energy and Pipeline Companies wrestle to control operating costs largely affected by new government regulations, ageing buried metal assets, rising steel prices, expanding pipeline operations, new interference points, HCA encroachment, restrictive land use policies, heightened network security, and an ageing soon-to-retire work force. With operating costs on the rise, seemingly out of control, many CP and Operations Professionals look to past best practices in cost containment through automation. Many companies achieve solid business results through deployment of telemetry and SCADA automation of remote assets and now hope to expand this success to further optimize operations by automating remote cathodic protection systems. This presentation will provide examples of how new remote cathodic protection systems are helping energy and pipeline companies address the growing issue of the aging pipeline infrastructure and reduce their costs while optimizing their operations. (author)

  6. Electricity Networks: Infrastructure and Operations. Too complex for a resource?

    Energy Technology Data Exchange (ETDEWEB)

    Volk, Dennis

    2013-07-01

    Electricity security remains a priority of energy policy and continuous electrification will further enhance the importance in the years to come. Market liberalisation has brought substantial benefits to societies, including competition, innovation, more client-oriented services and the reduced needs for public expenditure. Further, the path of decarbonisation is a must but experiences with many new technologies and policies show their many implications on power systems. Electricity networks form the backbone of reliable and affordable power systems and also significantly support the inception of renewable generation. The importance of distribution and transmission networks has to be well understood by policy makers and regulators to maintain the sensitive balance within the policy triangle of reliability, affordability and sustainability as power systems rapidly change. Failures in choosing the right institutions and regulatory frameworks to operate and build networks will put the sensitive balance within the policy triangle at risk. ''Too complex for a resource?'' identifies the key challenges the electricity distribution and transmission networks face today and in the future. It further provides for best practice examples on institutional design choices and regulatory frameworks for sound network service provision but also highlights the importance of additional responses required. More market-based and dynamic frameworks for various system services, the growing need for active service participation of renewable generators and highly independent and transparent central operators seem to be at the heart of these responses. ''Too complex for a resource?'' finds that the answer to the challenges ahead is not always more infrastructure and that networks and the services they provide have to be regarded as equal part of the total power system. Thus, accurate and dynamic cost allocation can significantly support to transform

  7. INFRASTRUCTURE

    CERN Multimedia

    A. Gaddi

    The annual maintenance of detector services took place from mid November to mid January as planned. This involved a full stoppage of water-cooling circuits on November 24th with a gradual restarting from mid-January 09. The annual maintenance service included the cleaning of the two SF5 cooling towers and the service of the chiller plants on surface. The cryogenic plant serving the CMS Magnet was shut-down as well to perform the annual maintenance. In addition to that, the overall site power has been reduced from 8 to 2 MW, in order to cope with the switching to the Swiss power network in winter. Full power was reinstated at the end of January. The cooling network has seen the installation of a bypass for the endcap circuit, in order to limit pressure surges when one endcap is shut-off. In addition, filters have been added on most of the cooling loops in UXC55 to better protect the muon chambers. At the same time a global cleaning campaign of all the filters (more than 500 pieces) has been completed. As expe...

  8. A Data Scheduling and Management Infrastructure for the TEAM Network

    Science.gov (United States)

    Andelman, S.; Baru, C.; Chandra, S.; Fegraus, E.; Lin, K.; Unwin, R.

    2009-04-01

    currently partnering with the San Diego Super Computer Center to build the data management infrastructure. Data collected from the three core protocols as well as others are currently made available through the TEAM Network portal, which provides the content management framework, the data scheduling and management framework, an administrative framework to implement and manage TEAM sites, collaborative tools and a number of tools and applications utilizing Google Map and Google Earth products. A critical element of the TEAM Network data management infrastructure is to make the data publicly available in as close to real-time as possible (the TEAM Network Data Use Policy: http://www.teamnetwork.org/en/data/policy). This requires two essential tasks to be accomplished, 1) A data collection schedule has to be planned, proposed and approved for a given TEAM site. This is a challenging process since TEAM sites are geographically distributed across the tropics and hence have different seasons where they schedule field sampling for the different TEAM protocols. Capturing this information and ensuring that TEAM sites follow the outlined legal contract is key to the data collection process and 2) A stream-lined and efficient information management system to ensure data collected from the field meet the minimum data standards (i.e. are of the highest scientific quality) and are securely transferred, archived, processed and be rapidly made publicaly available, as a finished consumable product via the TEAM Network portal. The TEAM Network is achieving these goals by implementing an end-to-end framework consisting of the Sampling Scheduler application and the Data Management Framework. Sampling Scheduler The Sampling Scheduler is a project management, calendar based portal application that will allow scientists at a TEAM site to schedule field sampling for each of the TEAM protocols implemented at that site. The sampling scheduler addresses the specific requirements established in the

  9. Testing Situation Awareness Network for the Electrical Power Infrastructure

    Directory of Open Access Journals (Sweden)

    Rafał Leszczyna

    2016-09-01

    Full Text Available The contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and communication Technologies (ICT in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent Threats (APT or Distributed-Denial-ofService (DDoS attacks. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. To counter evolved and highly sophisticated threats such as the APT or DDoS, state-of-the-art technologies including Security Incident and Event Management (SIEM systems, extended Intrusion Detection/Prevention Systems (IDS/IPS and Trusted Platform Modules (TPM are required. Developing and deploying extensive ICT infrastructure that supports wide situational awareness and allows precise command and control is also necessary. In this paper the results of testing the Situational Awareness Network (SAN designed for the energy sector are presented. The purpose of the tests was to validate the selection of SAN components and check their operational capability in a complex test environment. During the tests’ execution appropriate interaction between the components was verified.

  10. Constructing vulnerabilty and protective measures indices for the enhanced critical infrastructure protection program.

    Energy Technology Data Exchange (ETDEWEB)

    Fisher, R. E.; Buehring, W. A.; Whitfield, R. G.; Bassett, G. W.; Dickinson, D. C.; Haffenden, R. A.; Klett, M. S.; Lawlor, M. A.; Decision and Information Sciences; LANL

    2009-10-14

    The US Department of Homeland Security (DHS) has directed its Protective Security Advisors (PSAs) to form partnerships with the owners and operators of assets most essential to the Nation's well being - a subclass of critical infrastructure and key resources (CIKR) - and to conduct site visits for these and other high-risk assets as part of the Enhanced Critical Infrastructure Protection (ECIP) Program. During each such visit, the PSA documents information about the facility's current CIKR protection posture and overall security awareness. The primary goals for ECIP site visits (DHS 2009) are to: (1) inform facility owners and operators of the importance of their facilities as an identified high-priority CIKR and the need to be vigilant in light of the ever-present threat of terrorism; (2) identify protective measures currently in place at these facilities, provide comparisons of CIKR protection postures across like assets, and track the implementation of new protective measures; and (3) enhance existing relationships among facility owners and operators; DHS; and various Federal, State, local tribal, and territorial partners. PSAs conduct ECIP visits to assess overall site security; educate facility owners and operators about security; help owners and operators identify gaps and potential improvements; and promote communication and information sharing among facility owners and operators, DHS, State governments, and other security partners. Information collected during ECIP visits is used to develop metrics; conduct sector-by-sector and cross-sector vulnerability comparisons; identify security gaps and trends across CIKR sectors and subsectors; establish sector baseline security survey results; and track progress toward improving CIKR security through activities, programs, outreach, and training (Snyder 2009). The data being collected are used in a framework consistent with the National Infrastructure Protection Plan (NIPP) risk criteria (DHS 2009). The

  11. Cyber Security Insider Threats :: Government’s Role in Protecting India’s Critical Infrastructure Sectors

    OpenAIRE

    Vohra, Pulkit

    2014-01-01

    This research identifies the problem of insider threats in the critical infrastructure sectors of India. It is structured to answer the research question: "Why insider threats should be the primary concern for Indian government to protect its critical infrastructure sectors.” It defines the critical infrastructure sectors and portrays the cyber security scenario of India. Also, through the research study, it identifies the lack of awareness and non-seriousness of employees in the critical sec...

  12. TEST BEAM COORDINATION: Major upgrade of the ATLAS Test Beam network infrastructure

    CERN Multimedia

    Di Girolamo, B; Pasqualucci, E

    Based on the positive experience gained last year by the Muon group with the adoption of a completely isolated private network for the data acquisition, already last year for the 2002 Combined Pixel-Tilecal-Muon Test Beam, we adopted the private network solution. The main advantage of the isolation from the common CERN network infrastructure is the complete independence from possible problems that could affect the network in the area, intended to serve many other users, and the possibility to have a completely independent management of the IP addresses assignment. Moreover the presence of a firewall in the private network allows a better protection against possible external hackers, allowing users to transparently access the external word. A Fast Ethernet network has been set up as a control network. It relies on a backbone 24-port Fast Ethernet switch on which, in a tree structure, are connected several smaller switches dedicated to each sub-detector. In this way each sub-detector produces its own traffic...

  13. The child and adolescent psychiatry trials network (CAPTN: infrastructure development and lessons learned

    Directory of Open Access Journals (Sweden)

    Breland-Noble Alfiee

    2009-03-01

    Full Text Available Abstract Background In 2003, the National Institute of Mental Health funded the Child and Adolescent Psychiatry Trials Network (CAPTN under the Advanced Center for Services and Intervention Research (ACSIR mechanism. At the time, CAPTN was believed to be both a highly innovative undertaking and a highly speculative one. One reviewer even suggested that CAPTN was "unlikely to succeed, but would be a valuable learning experience for the field." Objective To describe valuable lessons learned in building a clinical research network in pediatric psychiatry, including innovations intended to decrease barriers to research participation. Methods The CAPTN Team has completed construction of the CAPTN network infrastructure, conducted a large, multi-center psychometric study of a novel adverse event reporting tool, and initiated a large antidepressant safety registry and linked pharmacogenomic study focused on severe adverse events. Specific challenges overcome included establishing structures for network organization and governance; recruiting over 150 active CAPTN participants and 15 child psychiatry training programs; developing and implementing procedures for site contracts, regulatory compliance, indemnification and malpractice coverage, human subjects protection training and IRB approval; and constructing an innovative electronic casa report form (eCRF running on a web-based electronic data capture system; and, finally, establishing procedures for audit trail oversight requirements put forward by, among others, the Food and Drug Administration (FDA. Conclusion Given stable funding for network construction and maintenance, our experience demonstrates that judicious use of web-based technologies for profiling investigators, investigator training, and capturing clinical trials data, when coupled to innovative approaches to network governance, data management and site management, can reduce the costs and burden and improve the feasibility of

  14. MmWave Vehicle-to-Infrastructure Communication :Analysis of Urban Microcellular Networks

    Science.gov (United States)

    2017-05-01

    Vehicle-to-infrastructure (V2I) communication may provide high data rates to vehicles via millimeterwave (mmWave) microcellular networks. This report uses stochastic geometry to analyze the coverage of urban mmWave microcellular networks. Prior work ...

  15. Optimizing the Long-Term Capacity Expansion and Protection of Iraqi Oil Infrastructure

    National Research Council Canada - National Science Library

    Brown, Patrick S

    2005-01-01

    This thesis introduces a tri-level defender-attacker-defender optimization model that prescribes how Iraq's oil infrastructure can, over time, be expanded, protected, and operated, even in the face of insurgent attacks...

  16. 78 FR 39712 - Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait...

    Science.gov (United States)

    2013-07-02

    ... DEPARTMENT OF COMMERCE International Trade Administration Critical Infrastructure Protection and Cyber Security Trade Mission to Saudi Arabia and Kuwait Clarification and Amendment AGENCY... cyber-security firms and trade organizations which have not already submitted an application are...

  17. Infrastructure data in the Internet: network statements and infrastructure register; Infrastrukturdaten im INTERNET: Schienennetz-Benutzungsbedingungen und Infrastrukturregister

    Energy Technology Data Exchange (ETDEWEB)

    Schmitt, A.; Kuntze, P [DB Netz AG, Frankfurt am Main (Germany); Hoefler, A. [Fichtner Consulting und IT AG, Stuttgart (Germany)

    2007-09-15

    Faced with European Community directives on the liberalization of railway traffic and their transposition into national legal requirements, DB Netz AG, the German infrastructure manager, considers that it has no alternative to using the Internet to publish numerous items of information as regards its railway network and infrastructure facilities. The company took the decision to seek synergies in combining these requirements with achieving internal benefits and so it chose a modern technical architecture that is going to be able to keep pace with the growing demands as regards data complexity, range of functions and number of users. The architecture that first came into being for publishing network statements now also forms the basis for DB Netz' infrastructure register and, in parallel with that, for around twenty intranet solutions, used by more than 5000 users. (orig.)

  18. INFRASTRUCTURE

    CERN Document Server

    A.Gaddi

    2011-01-01

    Between the end of March to June 2011, there has been no detector downtime during proton fills due to CMS Infrastructures failures. This exceptional performance is a clear sign of the high quality work done by the CMS Infrastructures unit and its supporting teams. Powering infrastructure At the end of March, the EN/EL group observed a problem with the CMS 48 V system. The problem was a lack of isolation between the negative (return) terminal and earth. Although at that moment we were not seeing any loss of functionality, in the long term it would have led to severe disruption to the CMS power system. The 48 V system is critical to the operation of CMS: in addition to feeding the anti-panic lights, essential for the safety of the underground areas, it powers all the PLCs (Twidos) that control AC power to the racks and front-end electronics of CMS. A failure of the 48 V system would bring down the whole detector and lead to evacuation of the cavern. EN/EL technicians have made an accurate search of the fault, ...

  19. INFRASTRUCTURE

    CERN Multimedia

    A. Gaddi and P. Tropea

    2011-01-01

    Most of the work relating to Infrastructure has been concentrated in the new CSC and RPC manufactory at building 904, on the Prevessin site. Brand new gas distribution, powering and HVAC infrastructures are being deployed and the production of the first CSC chambers has started. Other activities at the CMS site concern the installation of a new small crane bridge in the Cooling technical room in USC55, in order to facilitate the intervention of the maintenance team in case of major failures of the chilled water pumping units. The laser barrack in USC55 has been also the object of a study, requested by the ECAL community, for the new laser system that shall be delivered in few months. In addition, ordinary maintenance works have been performed during the short machine stops on all the main infrastructures at Point 5 and in preparation to the Year-End Technical Stop (YETS), when most of the systems will be carefully inspected in order to ensure a smooth running through the crucial year 2012. After the incide...

  20. INFRASTRUCTURE

    CERN Multimedia

    A. Gaddi and P. Tropea

    2012-01-01

    The CMS Infrastructures teams are preparing for the LS1 activities. A long list of maintenance, consolidation and upgrade projects for CMS Infrastructures is on the table and is being discussed among Technical Coordination and sub-detector representatives. Apart from the activities concerning the cooling infrastructures (see below), two main projects have started: the refurbishment of the SX5 building, from storage area to RP storage and Muon stations laboratory; and the procurement of a new dry-gas (nitrogen and dry air) plant for inner detector flushing. We briefly present here the work done on the first item, leaving the second one for the next CMS Bulletin issue. The SX5 building is entering its third era, from main assembly building for CMS from 2000 to 2007, to storage building from 2008 to 2012, to RP storage and Muon laboratory during LS1 and beyond. A wall of concrete blocks has been erected to limit the RP zone, while the rest of the surface has been split between the ME1/1 and the CSC/DT laborat...

  1. Fragility: The Next Wave in Critical Infrastructure Protection

    OpenAIRE

    Allan McDougall

    2009-01-01

    In North America today, we are about to embark on a significant effort to repair, or even upgrade, many aspects of our infrastructure. Many of these efforts are linked to economic recovery packages. Others are based on sheer need. The challenge for decision makers and planners involves ensuring that scarce economic resources are put to their best use. Understanding the concept of fragility plays a pivotal part in reaching that understanding.Fragility, like many other systems—particularly Info...

  2. Protection of Low Voltage CIGRE distribution Network

    DEFF Research Database (Denmark)

    Mustafa, Ghullam; Bak-Jensen, Birgitte; Bak, Claus Leth

    2013-01-01

    High quality electricity services are the prime objectives in the modern power systems around the world. One of the main players to achieve this is protection of the system which needs to be fast, reliable and cost effective. The study about the protection of the Low Voltage (LV) CIGRE distribution...... grid and networks like this has been proposed in this paper. The main objective of this paper is to develop protection against short circuit faults which might appear any-where in the network. The protection of the power networks that comprises of renewable energy generation units is complicated...... because of the bidirectional flow of the current and is a challenge for the protection engineers. The selection of the protection devices in this paper is made to protect the network against faults in grid connected and island mode of operation. Ultra-fast fuses are proposed in order to protect...

  3. Risk analysis tools for force protection and infrastructure/asset protection

    International Nuclear Information System (INIS)

    Jaeger, C.D.; Duggan, R.A.; Paulus, W.K.

    1998-01-01

    The Security Systems and Technology Center at Sandia National Laboratories has for many years been involved in the development and use of vulnerability assessment and risk analysis tools. In particular, two of these tools, ASSESS and JTS, have been used extensively for Department of Energy facilities. Increasingly, Sandia has been called upon to evaluate critical assets and infrastructures, support DoD force protection activities and assist in the protection of facilities from terrorist attacks using weapons of mass destruction. Sandia is involved in many different activities related to security and force protection and is expanding its capabilities by developing new risk analysis tools to support a variety of users. One tool, in the very early stages of development, is EnSURE, Engineered Surety Using the Risk Equation. EnSURE addresses all of the risk equation and integrates the many components into a single, tool-supported process to help determine the most cost-effective ways to reduce risk. This paper will briefly discuss some of these risk analysis tools within the EnSURE framework

  4. Sensor network infrastructure for a home care monitoring system.

    Science.gov (United States)

    Palumbo, Filippo; Ullberg, Jonas; Stimec, Ales; Furfari, Francesco; Karlsson, Lars; Coradeschi, Silvia

    2014-02-25

    This paper presents the sensor network infrastructure for a home care system that allows long-term monitoring of physiological data and everyday activities. The aim of the proposed system is to allow the elderly to live longer in their home without compromising safety and ensuring the detection of health problems. The system offers the possibility of a virtual visit via a teleoperated robot. During the visit, physiological data and activities occurring during a period of time can be discussed. These data are collected from physiological sensors (e.g., temperature, blood pressure, glucose) and environmental sensors (e.g., motion, bed/chair occupancy, electrical usage). The system can also give alarms if sudden problems occur, like a fall, and warnings based on more long-term trends, such as the deterioration of health being detected. It has been implemented and tested in a test environment and has been deployed in six real homes for a year-long evaluation. The key contribution of the paper is the presentation of an implemented system for ambient assisted living (AAL) tested in a real environment, combining the acquisition of sensor data, a flexible and adaptable middleware compliant with the OSGistandard and a context recognition application. The system has been developed in a European project called GiraffPlus.

  5. INFRASTRUCTURE

    CERN Multimedia

    A. Gaddi

    2012-01-01

    The CMS Infrastructures teams are constantly ensuring the smooth operation of the different services during this critical period when the detector is taking data at full speed. A single failure would spoil hours of high luminosity beam and everything is put in place to avoid such an eventuality. In the meantime however, the fast approaching LS1 requires that we take a look at the various activities to take place from the end of the year onwards. The list of infrastructures consolidation and upgrade tasks is already long and will touch all the services (cooling, gas, inertion, powering, etc.). The definitive list will be available just before the LS1 start. One activity performed by the CMS cooling team that is worth mentioning is the maintenance of the cooling circuits at the CMS Electronics Integration Centre (EIC) at building 904. The old chiller has been replaced by a three-units cooling plant that also serves the HVAC system for the new CSC and RPC factories. The commissioning of this new plant has tak...

  6. INFRASTRUCTURE

    CERN Multimedia

    Andrea Gaddi

    2010-01-01

    In addition to the intense campaign of replacement of the leaky bushing on the Endcap circuits, other important activities have also been completed, with the aim of enhancing the overall reliability of the cooling infrastructures at CMS. Remaining with the Endcap circuit, the regulating valve that supplies cold water to the primary side of the circuit heat-exchanger, is not well adapted in flow capability and a new part has been ordered, to be installed during a stop of LHC. The instrumentation monitoring of the refilling rate of the circuits has been enhanced and we can now detect leaks as small as 0.5 cc/sec, on circuits that have nominal flow rates of some 20 litres/sec. Another activity starting now that the technical stop is over is the collection of spare parts that are difficult to find on the market. These will be stored at P5 with the aim of reducing down-time in case of component failure. Concerning the ventilation infrastructures, it has been noticed that in winter time the relative humidity leve...

  7. A systems approach to risk reduction of transportation infrastructure networks subject to multiple hazards : final report, December 31, 2008.

    Science.gov (United States)

    2008-12-31

    Integrity, robustness, reliability, and resiliency of infrastructure networks are vital to the economy, : security and well-being of any country. Faced with threats caused by natural and man-made hazards, : transportation infrastructure network manag...

  8. Advanced e-Infrastructures for Civil Protection applications: the CYCLOPS Project

    Science.gov (United States)

    Mazzetti, P.; Nativi, S.; Verlato, M.; Ayral, P. A.; Fiorucci, P.; Pina, A.; Oliveira, J.; Sorani, R.

    2009-04-01

    During the full cycle of the emergency management, Civil Protection operative procedures involve many actors belonging to several institutions (civil protection agencies, public administrations, research centers, etc.) playing different roles (decision-makers, data and service providers, emergency squads, etc.). In this context the sharing of information is a vital requirement to make correct and effective decisions. Therefore a European-wide technological infrastructure providing a distributed and coordinated access to different kinds of resources (data, information, services, expertise, etc.) could enhance existing Civil Protection applications and even enable new ones. Such European Civil Protection e-Infrastructure should be designed taking into account the specific requirements of Civil Protection applications and the state-of-the-art in the scientific and technological disciplines which could make the emergency management more effective. In the recent years Grid technologies have reached a mature state providing a platform for secure and coordinated resource sharing between the participants collected in the so-called Virtual Organizations. Moreover the Earth and Space Sciences Informatics provide the conceptual tools for modeling the geospatial information shared in Civil Protection applications during its entire lifecycle. Therefore a European Civil Protection e-infrastructure might be based on a Grid platform enhanced with Earth Sciences services. In the context of the 6th Framework Programme the EU co-funded Project CYCLOPS (CYber-infrastructure for CiviL protection Operative ProcedureS), ended in December 2008, has addressed the problem of defining the requirements and identifying the research strategies and innovation guidelines towards an advanced e-Infrastructure for Civil Protection. Starting from the requirement analysis CYCLOPS has proposed an architectural framework for a European Civil Protection e-Infrastructure. This architectural framework has

  9. 77 FR 37060 - Critical Infrastructure and Key Resources (CIKR) Asset Protection Technical Assistance Program...

    Science.gov (United States)

    2012-06-20

    .../IP/IICD, 245 Murray Lane SW., Mailstop 0602, Arlington, VA 20598-0602. Email requests should go to...), National Protection and Programs Directorate (NPPD), Office of Infrastructure Protection (IP... the following methods: Federal eRulemaking Portal: http://www.regulations.gov . Email: Include the...

  10. Value creation of road infrastructure networks: a structural equation approach

    NARCIS (Netherlands)

    Hartmann, Andreas; Ling, F.Y.Y.

    2016-01-01

    Although road agencies need to provide road infrastructure that is beneficial for road users, little is known about how the activities of the agencies influence the value creation of road infrastructure. From a service-dominant logic perspective, the importance of road maintenance and traffic

  11. Making Infrastructure Visible: A Case Study of Home Networking

    Science.gov (United States)

    Chetty, Marshini

    2011-01-01

    Technological infrastructure is often taken for granted in our day to day lives until it breaks down, usually because it invisibly supports tasks otherwise. Previous work in HCI has focused on how people react and deal with breaks in infrastructure as well as how to help people to fix or exploit these breaks. However, few have sought to understand…

  12. Fragility: The Next Wave in Critical Infrastructure Protection

    Directory of Open Access Journals (Sweden)

    Allan McDougall

    2009-01-01

    Full Text Available In North America today, we are about to embark on a significant effort to repair, or even upgrade, many aspects of our infrastructure. Many of these efforts are linked to economic recovery packages. Others are based on sheer need. The challenge for decision makers and planners involves ensuring that scarce economic resources are put to their best use. Understanding the concept of fragility plays a pivotal part in reaching that understanding.Fragility, like many other systems—particularly Information Technology (IT systems—works on the concept of subjects and objects. Subjects are those entities that seek to exploit the services (or capacity offered by the object. Objects, on the other hand, are those entities that deliver some good or service to the overall system. Of course, something may act as the object in one pairing and the subject in another pairing—they are not exclusive in nature.

  13. the GFCE-Meridian Good Practice Guide on Critical Information Infrastructure Protection for governmental policy-makers

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Schie, T.C.C. van; Ruijven, T.W.J. van; Huistra, A.W.W.

    2016-01-01

    Critical Information Infrastructure Protection (CIIP) is a complex but important topic for nations. Nations at large critically depend on Critical Infrastructure (CI) services such as energy supply, telecommunications, financial systems, drinking water, and governmental services. Critical

  14. INFRASTRUCTURES

    CERN Document Server

    Andrea Gaddi

    2013-01-01

    One of the most important tasks for LS1 was achieved this autumn when all the electronics racks in the USC55 counting rooms were switched from the standard powering network to the CMS low-voltage UPS. This long-sought move will prevent fastidious power cuts of the CMS electronics in case of short power glitches on the main powering network, as already assured to the detector front-end electronics in UXC55. In the same time, a study to update the dedicated UPS units for some crucial detector sub-systems, as the Magnet Control System (MCS), the Detector Safety System (DSS) and the IT Network Star-points, has been lunched. A new architecture, with fully redundant UPS units, able to assure power supply in case of long network outage (up to a maximum of five hours, in the case of the Magnet) has been recently presented by the EN-EL group and is currently under evaluation. The dry-gas plant recently commissioned in SH5 has passed a first test in order to understand the time needed to switch from dry-air to dry-n...

  15. PRIVACY PROTECTION PROBLEMS IN SOCIAL NETWORKS

    OpenAIRE

    OKUR, M. Cudi

    2011-01-01

    Protecting privacy has become a major concern for most social network users because of increased difficulties of controlling the online data. This article presents an assessment of the common privacy related risks of social networking sites. Open and hidden privacy risks of active and passive online profiles are examined and increasing share of social networking in these phenomena is discussed. Inadequacy of available legal and institutional protection is demonstrated and the effectiveness of...

  16. 76 FR 76021 - Critical Infrastructure Protection Month, 2011

    Science.gov (United States)

    2011-12-06

    ..., we must also address the growing threat cyber attacks present to our transportation networks... action against cyber threats. To ensure the safety of our most vital operations, we are working to give.... These efforts will bolster our ability to withstand any attack, whether virtual or physical. During...

  17. INFRASTRUCTURE

    CERN Multimedia

    Andrea Gaddi

    With all the technical services running, the attention has moved toward the next shutdown that will be spent to perform those modifications needed to enhance the reliability of CMS Infrastructures. Just to give an example for the cooling circuit, a set of re-circulating bypasses will be installed into the TS/CV area to limit the pressure surge when a circuit is partially shut-off. This problem has affected especially the Endcap Muon cooling circuit in the past. Also the ventilation of the UXC55 has to be revisited, allowing the automatic switching to full extraction in case of magnet quench. (Normally 90% of the cavern air is re-circulated by the ventilation system.) Minor modifications will concern the gas distribution, while the DSS action-matrix has to be refined according to the experience gained with operating the detector for a while. On the powering side, some LV power lines have been doubled and the final schematics of the UPS coverage for the counting rooms have been released. The most relevant inte...

  18. INFRASTRUCTURE

    CERN Multimedia

    A. Gaddi and P. Tropea

    2013-01-01

      Most of the CMS infrastructures at P5 will go through a heavy consolidation-work period during LS1. All systems, from the cryogenic plant of the superconducting magnet to the rack powering in the USC55 counting rooms, from the cooling circuits to the gas distribution, will undergo consolidation work. As announced in the last issue of the CMS Bulletin, we present here one of the consolidation projects of LS1: the installation of a new dry-gas plant for inner detectors inertion. So far the oxygen and humidity suppression inside the CMS Tracker and Pixel volumes were assured by flushing dry nitrogen gas evaporated from a large liquid nitrogen tank. For technical reasons, the maximum flow is limited to less than 100 m3/h and the cost of refilling the tank every two weeks with liquid nitrogen is quite substantial. The new dry-gas plant will supply up to 400 m3/h of dry nitrogen (or the same flow of dry air, during shut-downs) with a comparatively minimal operation cost. It has been evaluated that the...

  19. 78 FR 24107 - Version 5 Critical Infrastructure Protection Reliability Standards

    Science.gov (United States)

    2013-04-24

    ...-Power System.\\6\\ In Order No. 706, the Commission approved eight CIP Reliability Standards (CIP-002-1... documentation requirements to allow entities to focus on the reliability and security of the Bulk Power System... reliability of the bulk electric system. Requirement R1 includes controls to protect data that would be useful...

  20. 76 FR 58730 - Version 4 Critical Infrastructure Protection Reliability Standards

    Science.gov (United States)

    2011-09-22

    ... Critical Cyber Assets; (3) internal, management, approval of the risk-based assessment; (4) external review... consider applicable features of the NIST Risk Management Framework to ensure protection of all cyber... activities in the Risk Management Framework has an associated NIST security standard and/or guidance document...

  1. 77 FR 72673 - Critical Infrastructure Protection and Resilience Month, 2012

    Science.gov (United States)

    2012-12-05

    ... why my Administration continues to make cybersecurity a national security priority. As we continue to... secure. This month, we rededicate ourselves to raising awareness of the importance of critical... of the United States to recognize the importance of protecting our Nation's resources and to observe...

  2. SPECIAL AND MILITARY COMMUNICATIONS AND INFORMATION SYSTEMS AS VITAL PART OF THE CRITICAL INFRASTRUCTURES IN ROMANIA. SECURING THEIR PHYSICAL AND INFORMATIONAL PROTECTION

    Directory of Open Access Journals (Sweden)

    Constantin MINCU

    2012-11-01

    Full Text Available The article presents several arguments on the need to study the critical infrastructure in Romania including various systems (networks and special military communications. It emphasizes the role and place of such systems and networks to provide national defense and security and the risks and vulnerabilities faced by these infrastructures, and some necessary measures to be taken for the physical and informational protection in the case of hostile military actions, natural disasters or other negative phenomena. Finally some conclusions and proposals are formulated.

  3. Radiation protection infrastructure in the Republic of Croatia

    International Nuclear Information System (INIS)

    Grgic, S.

    2001-01-01

    According to present legislation the organization structure of radiation protection in the Republic of Croatia is similar to the organizational structure in many countries of the world. Regulatory (competent) authority for the safe, traffic, purchase, import and transport of the radioactive sources is the Ministry of Health of the Republic of Croatia. The Ministry of Health of the Republic of Croatia is also responsible for the health of workers who work with the radioactive sources in medicine and in industry, as well for the health of patients and members of public. Furthermore, The Ministry of Health is also responsible for the follow-up of radioactivity in the human environment (air, soil, water - sea, lakes, rivers) and radioactive waste management. To be able to accomplish those tasks, The Ministry of Health developed two institutes, Croatian Institute for Radiation Protection and Croatian Institute for Occupational Medicine. For technical assistance and support The Ministry of Health authorized three expert institutions. (author)

  4. Research infrastructure, networks of science and regional development - the case of Oskarshamn

    Directory of Open Access Journals (Sweden)

    Folke Valfrid Snickars

    2017-10-01

    Our results indicate that research infrastructures as the ones in Oskarshamn are powerful creators of international research networks. It is possible although somewhat difficult in view of scattered systems for data provision to assess their academic and societal impacts. Engineering research has its own networks of university-industry and industry-university interaction where value is cogenerated dynamically. In the study we have come some way towards empirically analyzing the networks of research cooperation between industry and university using methods of infrastructure theory and network analysis.

  5. Critical Foundations: Protecting America’s Infrastructures. The Report of the President’s Commission on Critical Infrastructure Protection.

    Science.gov (United States)

    1997-10-13

    in Tokyo and bombings of the subway system in Paris, mass transit remains open and vulnerable to terrorist acts. Millions of miles of pipelines carry...Outside of "" C Risk Management Plan . Creates a Competitive Advantage , Not Considered Industry’s "• Protects Brand/ Franchise Responsibility- I ssue of...the out- set, the Commission considered expanding the scope of this sector to include food , health care and the nation’s work force as additional

  6. INFRASTRUCTURE

    CERN Document Server

    P. Tropea and A. Gaddi

    2013-01-01

    One of the first activities of LS1 has been the refurbishment of the rack ventilation units in the USC55 counting rooms. These rack-mounted turbines have been in service since 2007 and they have largely passed the expected lifetime. Some 450 motor-fans units have been procured in Germany, via the CERN store, and shipped to CMS where a team of technicians has dismounted the old turbines, keeping only the bare chassis, and inserted the new fans. A metallic mesh has also been added to better protect personnel from possible injuries by spinning blades. A full test of several hours has validated the new units, prior to their installation inside the racks. The work, started soon after the beginning of LS1, has been successfully concluded last week. Figure 1: Drawing of the fan units recently refurbished in the USC55 counting room racks Image 1: New filter on the main rack water-cooling distribution line The cooling systems of CMS are gently coming out of their maintenance programme. All water circuits have...

  7. Quantifying causal mechanisms to determine how protected areas affect poverty through changes in ecosystem services and infrastructure

    Science.gov (United States)

    Ferraro, Paul J.; Hanauer, Merlin M.

    2014-01-01

    To develop effective environmental policies, we must understand the mechanisms through which the policies affect social and environmental outcomes. Unfortunately, empirical evidence about these mechanisms is limited, and little guidance for quantifying them exists. We develop an approach to quantifying the mechanisms through which protected areas affect poverty. We focus on three mechanisms: changes in tourism and recreational services; changes in infrastructure in the form of road networks, health clinics, and schools; and changes in regulating and provisioning ecosystem services and foregone production activities that arise from land-use restrictions. The contributions of ecotourism and other ecosystem services to poverty alleviation in the context of a real environmental program have not yet been empirically estimated. Nearly two-thirds of the poverty reduction associated with the establishment of Costa Rican protected areas is causally attributable to opportunities afforded by tourism. Although protected areas reduced deforestation and increased regrowth, these land cover changes neither reduced nor exacerbated poverty, on average. Protected areas did not, on average, affect our measures of infrastructure and thus did not contribute to poverty reduction through this mechanism. We attribute the remaining poverty reduction to unobserved dimensions of our mechanisms or to other mechanisms. Our study empirically estimates previously unidentified contributions of ecotourism and other ecosystem services to poverty alleviation in the context of a real environmental program. We demonstrate that, with existing data and appropriate empirical methods, conservation scientists and policymakers can begin to elucidate the mechanisms through which ecosystem conservation programs affect human welfare. PMID:24567397

  8. Protecting water and wastewater infrastructure from cyber attacks

    Institute of Scientific and Technical Information of China (English)

    Srinivas Panguluri; William Phillips; John Cusimano

    2011-01-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion:cyber attacks are real and can cause significant damages.This paper presents some recent statistics on cyber attacks and resulting damages.Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks.Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are:1) the increasing interconnection of their business and control system networks,2) large variation of proprietary industrial control equipment utilized,3) multitude of cross-sector cyber-security standards,and 4) the differences in the equipment vendor's approaches to meet these security standards.The utilities can meet these challenges by voluntarily selecting and adopting security standards,conducting a gap analysis,performing vulnerability/risk analysis,and undertaking countermeasures that best meets their security and organizational requirements.Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years.Implementing cyber security does not necessarily have to be expensive,substantial improvements can be accomplished through policy,procedure,training and awareness.Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  9. Protecting water and wastewater infrastructure from cyber attacks

    Science.gov (United States)

    Panguluri, Srinivas; Phillips, William; Cusimano, John

    2011-12-01

    Multiple organizations over the years have collected and analyzed data on cyber attacks and they all agree on one conclusion: cyber attacks are real and can cause significant damages. This paper presents some recent statistics on cyber attacks and resulting damages. Water and wastewater utilities must adopt countermeasures to prevent or minimize the damage in case of such attacks. Many unique challenges are faced by the water and wastewater industry while selecting and implementing security countermeasures; the key challenges are: 1) the increasing interconnection of their business and control system networks, 2) large variation of proprietary industrial control equipment utilized, 3) multitude of cross-sector cyber-security standards, and 4) the differences in the equipment vendor's approaches to meet these security standards. The utilities can meet these challenges by voluntarily selecting and adopting security standards, conducting a gap analysis, performing vulnerability/risk analysis, and undertaking countermeasures that best meets their security and organizational requirements. Utilities should optimally utilize their limited resources to prepare and implement necessary programs that are designed to increase cyber-security over the years. Implementing cyber security does not necessarily have to be expensive, substantial improvements can be accomplished through policy, procedure, training and awareness. Utilities can also get creative and allocate more funding through annual budgets and reduce dependence upon capital improvement programs to achieve improvements in cyber-security.

  10. IPv6 (Internet Protocol version 6) heterogeneous networking infrastructure for energy efficient building

    International Nuclear Information System (INIS)

    Ben Saad, Leila; Chauvenet, Cedric; Tourancheau, Bernard

    2012-01-01

    In the context of increasing developments of home, building and city automation, Power Line Communication (PLC) networking is called for unprecedented usage, especially for energy efficiency improvement. Our view of the future building networking infrastructure places PLC as the central point. We point that while Wireless Sensor Network (WSN) is necessary in the sensor and actuator networking infrastructure, PLC is mandatory for the smart-grid metering and command infrastructure. PLC will also serve the sensor/actuator infrastructure when the energy requirement of the probing system itself cannot be fulfilled by autonomous battery and harvesting based nodes. PLC may also provide the numerous bridges necessary to sustain a long lifetime (years) with the battery based WSN part of the infrastructure. This new role of PLC networking will be possible only if the interoperability between all media and technology is made possible. Thanks to the converging design of Internet Protocol version 6 (IPv6) networking layers, we show that such a full inter-interoperability is already possible even in very tiny constrained networking devices. Moreover, the low power PLC technology used in our experiments will be able to provide this smart grid monitoring without impacting noticeably the overall energy balance of the monitored system.

  11. Protecting information on local area networks

    CERN Document Server

    Schweitzer, James A

    1988-01-01

    Protecting Information on Local Area Networks presents the various types of networks and explains why they are being expanded at such a rapid pace. This book considers how management can gain control of the valuable network-services information resources generally available.Organized into three parts encompassing seven chapters, this book begins with an overview of the various networks and their operations. This text then discusses the appropriate management actions to ensure some control over the use of networks and the business information resource. Other chapters consider the management rat

  12. Dynamic Protection of Optical Networks

    DEFF Research Database (Denmark)

    Ruepp, Sarah Renée

    2008-01-01

    This thesis deals with making optical networks resilient to failures. The recovery performance of path, segment and span restoration is evaluated in a network with limited wavelength conversion capability using both standard and enhanced wavelength assignment schemes. The enhanced wavelength...... stubs at the failure adjacent nodes. Both modifcations have a positive influence on the recovery percentage. The recovery enhancements are applicable in both single and multi-domain network environments. Stub release, where the still working parts of a failure affected connection are released prior...... of the modularity of capacity units is investigated for resilient network design. Different span upgrading strategies and algorithms for finding restoration paths are evaluated. Furthermore, the capacity effciency of constraining restoration requests for the same destination node to the same restoration path...

  13. A systemic method for evaluating the potential impacts of floods on network infrastructures

    Directory of Open Access Journals (Sweden)

    J. Eleutério

    2013-04-01

    Full Text Available Understanding network infrastructures and their operation under exceptional circumstances is fundamental for dealing with flood risks and improving the resilience of a territory. This work presents a method for evaluating potential network infrastructure dysfunctions and damage in cases of flooding. In contrast to existing approaches, this method analyses network infrastructures on an elementary scale, by considering networks as a group of elements with specific functions and individual vulnerabilities. Our analysis places assets at the centre of the evaluation process, resulting in the construction of damage-dysfunction matrices based on expert interviews. These matrices permit summarising the different vulnerabilities of network infrastructures, describing how the different components are linked to each other and how they can disrupt the operation of the network. They also identify the actions and resources needed to restore the system to operational status following damage and dysfunctions, an essential point when dealing with the question of resilience. The method promotes multi-network analyses and is illustrated by a French case study. Sixty network experts were interviewed during the analysis of the following networks: drinking water supply, waste water, public lighting, gas distribution and electricity supply.

  14. dSDiVN: a distributed Software-Defined Networking architecture for Infrastructure-less Vehicular Networks

    OpenAIRE

    Alioua, Ahmed; Senouci, Sidi-Mohammed; Moussaoui, Samira

    2017-01-01

    In the last few years, the emerging network architecture paradigm of Software-Defined Networking (SDN), has become one of the most important technology to manage large scale networks such as Vehicular Ad-hoc Networks (VANETs). Recently, several works have shown interest in the use of SDN paradigm in VANETs. SDN brings flexibility, scalability and management facility to current VANETs. However, almost all of proposed Software-Defined VANET (SDVN) architectures are infrastructure-based. This pa...

  15. Using VELMA to Quantify and Visualize the Effectiveness of Green Infrastructure Options for Protecting Water Quality

    Science.gov (United States)

    This webinar describes the use of VELMA, a spatially-distributed ecohydrological model, to identify green infrastructure (GI) best management practices for protecting water quality in intensively managed watersheds. The seminar will include a brief description of VELMA and an ex...

  16. A Good Practice Guide on Critical Infor-mation Infrastructure Protection

    NARCIS (Netherlands)

    Luiijf, H.A.M.; Schie, T.C.C. van

    2017-01-01

    Early 2016, the Meridian Process and the GFCE tasked the Netherlands Organisation for Applied Scientific Research TNO to develop a Good Practice Guide on Critical Information Infrastructure Protection (CIIP) for governmental policy-makers [1]. The guide primarily aims at governmental policy-makers,

  17. DIESIS : An Interoperable European Federated Simulation Network for Critical Infrastructures

    NARCIS (Netherlands)

    Rome, E.; Bologna, S.; Gelenbe, E.; Luiijf, H.A.M.; Masucci, V.

    2009-01-01

    Critical Infrastructures (CI) that are vital for a society and an economy, such as telecommunication systems, energy supply systems, transport systems and others, are getting more and more complex. Dependencies emerge in various ways, due to the use of information and communication technologies,

  18. Protecting Personal Information on Social Networking Sites

    Science.gov (United States)

    Gallant, David T.

    2011-01-01

    Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.

  19. An Analysis of IT Governance Practices in the Federal Government: Protecting U.S. Critical Infrastructure from Cyber Terrorist Attacks

    Science.gov (United States)

    Johnson, R. LeWayne

    2012-01-01

    Much of the governing process in the United States (U.S.) today depends on a reliable and well protected public information technology (IT) infrastructure. The Department of Homeland Security (DHS) is tasked with the responsibility of protecting the country's IT infrastructure. Critics contend that the DHS has failed to address planning and…

  20. Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures.

    Science.gov (United States)

    Johnson, Chris W

    2014-01-01

    We identify four roles that social networking plays in the 'attribution problem', which obscures whether or not cyber-attacks were state-sponsored. First, social networks motivate individuals to participate in Distributed Denial of Service attacks by providing malware and identifying potential targets. Second, attackers use an individual's social network to focus attacks, through spear phishing. Recipients are more likely to open infected attachments when they come from a trusted source. Third, social networking infrastructures create disposable architectures to coordinate attacks through command and control servers. The ubiquitous nature of these architectures makes it difficult to determine who owns and operates the servers. Finally, governments recruit anti-social criminal networks to launch attacks on third-party infrastructures using botnets. The closing sections identify a roadmap to increase resilience against the 'dark side' of social networking.

  1. Optimal Dimensioning of FiWi Networks over Advanced Metering Infrastructure for the Smart Grid

    DEFF Research Database (Denmark)

    Inga, Esteban; Peralta-Sevilla, Arturo; Hincapié, Roberto

    2015-01-01

    —In this paper, we propose a hybrid wireless mesh network infrastructure which connects the smart meters of each consumer with the data aggregation points (DAP). We suppose a set of smart meters that need to send information, and receive information from a central office on electrical enterprises...... through of the meter data management system (MDMS), and so forming the advanced metering infrastructure (AMI) stage of smart grids. We consider a multi-hop system, where information is routed through several nodes which act as DAP. Wireless mesh networks are known to extend coverage and increase...... deployment efficiency, so they could be an alternative for the connection between Home Area Network (HAN) and the Neighborhood Area Network (NAN). However, the NAN data must be send through wider area cabled networks to Metropolitan Area Network (MAN), and based on the WDM-PON architecture. We consider...

  2. A centralized informatics infrastructure for the National Institute on Drug Abuse Clinical Trials Network

    Science.gov (United States)

    Pan, Jeng-Jong; Nahm, Meredith; Wakim, Paul; Cushing, Carol; Poole, Lori; Tai, Betty; Pieper, Carl F.

    2009-01-01

    Background Clinical trial networks were created to provide a sustaining infrastructure for the conduct of multisite clinical trials. As such, they must withstand changes in membership. Centralization of infrastructure including knowledge management, portfolio management, information management, process automation, work policies, and procedures in clinical research networks facilitates consistency and ultimately research. Purpose In 2005, the National Institute on Drug Abuse (NIDA) Clinical Trials Network (CTN) transitioned from a distributed data management model to a centralized informatics infrastructure to support the network’s trial activities and administration. We describe the centralized informatics infrastructure and discuss our challenges to inform others considering such an endeavor. Methods During the migration of a clinical trial network from a decentralized to a centralized data center model, descriptive data were captured and are presented here to assess the impact of centralization. Results We present the framework for the informatics infrastructure and evaluative metrics. The network has decreased the time from last patient-last visit to database lock from an average of 7.6 months to 2.8 months. The average database error rate decreased from 0.8% to 0.2%, with a corresponding decrease in the interquartile range from 0.04%–1.0% before centralization to 0.01%–0.27% after centralization. Centralization has provided the CTN with integrated trial status reporting and the first standards-based public data share. A preliminary cost-benefit analysis showed a 50% reduction in data management cost per study participant over the life of a trial. Limitations A single clinical trial network comprising addiction researchers and community treatment programs was assessed. The findings may not be applicable to other research settings. Conclusions The identified informatics components provide the information and infrastructure needed for our clinical trial

  3. Assessing Socioeconomic Impacts of Cascading Infrastructure Disruptions in a Dynamic Human-Infrastructure Network

    Science.gov (United States)

    2016-07-01

    community behavior as part of a game-theoretical model , and (c) evaluates the cascading propagation of disruptions (due to interdependencies) and... businesses . The conceptual model represents this by placing a generator at each of 137 commercial locations identified by the UTP across the city, each...layered network model , addressing mechanisms of community behavior, mechanisms of disruption propagation, representations of system equilib- rium, and

  4. Probabilistic modelling of security of supply in gas networks and evaluation of new infrastructure

    International Nuclear Information System (INIS)

    Praks, Pavel; Kopustinskas, Vytis; Masera, Marcelo

    2015-01-01

    The paper presents a probabilistic model to study security of supply in a gas network. The model is based on Monte-Carlo simulations with graph theory, and is implemented in the software tool ProGasNet. The software allows studying gas networks in various aspects including identification of weakest links and nodes, vulnerability analysis, bottleneck analysis, evaluation of new infrastructure etc. In this paper ProGasNet is applied to a benchmark network based on a real EU gas transmission network of several countries with the purpose of evaluating the security of supply effects of new infrastructure, either under construction, recently completed or under planning. The probabilistic model enables quantitative evaluations by comparing the reliability of gas supply in each consuming node of the network. - Highlights: • A Monte-Carlo algorithm for stochastic flow networks is presented. • Network elements can fail according to a given probabilistic model. • Priority supply pattern of gas transmission networks is assumed. • A real-world EU gas transmission network is presented and analyzed. • A risk ratio is used for security of supply quantification of a new infrastructure.

  5. Deployment IPv6 over IPv4 network infrastructure

    OpenAIRE

    Hoang, Tien Dung

    2015-01-01

    The purpose of this thesis is doing the research about IPv6, concentrate in how to deploy an IPv6 network based on IPv4 network without making any interruption to IPv4 network. This thesis is made for Financing and Promoting Technology Corporation (FPT) in Vietnam. This thesis is completed in two main parts. The theoretical part is making research about IPv4 and IPv6 to have the point of view about IPv4 and IPv6 basically, and from those one, seeing the advantages of IPv6 comparing wit...

  6. Network Protection Against DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Petr Dzurenda

    2015-03-01

    Full Text Available The paper deals with possibilities of the network protection against Distributed Denial of Service attacks (DDoS. The basic types of DDoS attacks and their impact on the protected network are presented here. Furthermore, we present basic detection and defense techniques thanks to which it is possible to increase resistance of the protected network or device against DDoS attacks. Moreover, we tested the ability of current commercial Intrusion Prevention Systems (IPS, especially Radware DefensePro 6.10.00 product against the most common types of DDoS attacks. We create five scenarios that are varied in type and strength of the DDoS attacks. The attacks intensity was much greater than the normal intensity of the current DDoS attacks.

  7. Protection of critical infrastructure using fiber optic sensors embedded in technical textiles

    Science.gov (United States)

    Krebber, Katerina; Lenke, Philipp; Liehr, Sascha; Noether, Nils; Wendt, Mario; Wosniok, Aleksander

    2010-04-01

    Terrorists and criminals more and more attack and destroy important infrastructures like routes, railways, bridges, tunnels, dikes and dams, important buildings. Therefore, reliable on-line and long-term monitoring systems are required to protect such critical infrastructures. Fiber optic sensors are well-suited for that. They can be installed over many kilometers and are able to measure continuously distributed strain, pressure, temperature and further mechanical and physical quantities. The very tiny optical fibers can be integrated into structures and materials and can provide information about any significant changes or damages of the structures. These so-called smart materials and smart structures are able to monitor itself or its environment. Particularly smart technical textiles with embedded fiber optic sensors have become very attractive because of their high importance for the structural health monitoring of geotechnical and masonry infrastructures. Such textiles are usually used for reinforcement of the structures; the embedded fiber optic sensors provide information about the condition of the structures and detect the presence of any damages and destructions in real time. Thus, critical infrastructures can be preventively protected. The paper will introduce this innovative field and will present the results achieved within several German and European projects.

  8. Measuring sustainable accessibility potential using the mobility infrastructure's network configuration

    NARCIS (Netherlands)

    Gil, J.; Read, S.

    2012-01-01

    This paper is an exploration into the analysis of public transport networks using space syntax approaches combined with concepts of sustainable accessibility. Present urban development policy aims to achieve sustainable mobility patterns, shifting mobility to soft transportation modes such as

  9. 2008 Defense Industrial Base Critical Infrastructure Protection Conference (DIB-CBIP)

    Science.gov (United States)

    2008-04-09

    a cloak -and- dagger thing. It’s about computer architecture and the soundness of electronic systems." Joel Brenner, ODNI Counterintelligence Office...to support advanced network exploitation and launch attacks on the informational and physical elements of our cyber infrastructure. In order to...entities and is vulnerable to attacks and manipulation. Operations in the cyber domain have the ability to impact operations in other war-fighting

  10. The summarize of the technique about proactive network security protection

    International Nuclear Information System (INIS)

    Liu Baoxu; Li Xueying; Cao Aijuan; Yu Chuansong; Xu Rongsheng

    2003-01-01

    The proactive protection measures and the traditional passive security protection tools are complementarities each other. It also can supply the conventional network security protection system and enhance its capability of the security protection. Based upon sorts of existing network security technologies, this article analyses and summarizes the technologies, functions and the development directions of some key proactive network security protection tools. (authors)

  11. Local food protection and safety infrastructure and capacity: a Maryland case study.

    Science.gov (United States)

    Kufel, Joanna Zablotsky; Resnick, Beth A; Fox, Mary; Frattaroli, Shannon; Gielen, Andrea; Burke, Thomas A

    2011-01-01

    In Maryland, county Food Protection Programs (FPP), housed within Environmental Public Health (EPH) Divisions, maintain responsibility for regular inspection of all food service facilities (FSF). With growing concerns about how our food supply is protected, it is important to determine the state and effectiveness of our food safety systems. This research elucidates the roles, responsibilities, strengths, and weaknesses of Food Safety and Protection Programs in Maryland. A 16-question survey tool, which addressed facets of the local food protection infrastructure, including FSF inspections, staffing, budget, and foodborne illness surveillance, was distributed to all 24 county FPP. The number of FSF in Maryland increased 97% from 2001 to 2006 and counties had an average inspection completion rate of 73%, with a 4% increase over the time period. Statewide, there were 4.1 EPH full-time employees (FTE) per 10 000 population and 1.6 FPP FTE per 10 000 population. EPH Division budgets increased 63% statewide, from $19.5 million in 2000 to $31.9 million in 2007. FPP budgets also increased 59% over the period, from $6.2 million in 2000 to $9.8 million in 2007. This study offers new quantitative measures of the demands, capacities, and performance of Food Protection and Safety Programs in Maryland. This assessment of local EPH and FPP capacity also offers insight into the strengths and weaknesses of the local food protection and safety infrastructure. Importantly, it reveals an infrastructure and dedicated food protection workforce that inspects the food supply and responds to foodborne illness outbreaks. Yet, resources vary substantially from county to county, impacting which services can be provided and how well they can be performed. This can, in turn, impact the potential risk of foodborne illness and the public's overall health.

  12. A policy study in strengthening the national infrastructure for radiation protection

    Energy Technology Data Exchange (ETDEWEB)

    Park, Chan Il [Korean Association for Radiation Protection, Seoul (Korea, Republic of); Lee, Jai Ki; Chang, Jaik Won; Lee, Choon Sik [Hanyang Univ., Seoul (Korea, Republic of); Whang, Joo Ho; Kim, Ki Ho [Kyunghee Univ., Seoul (Korea, Republic of)

    1999-03-15

    Public attitude declined further toward against the nuclear technology and eventually caused undue societal costs. Since the general public are aware of, or even afraid of, effects of radiation, it is hard to expect successful nuclear program without making them ease about radiation. In order to make the public feel easy and think that they get adequate protection, the infrastructure for radiation protection should be strengthened to the level corresponding to the utilization of nuclear/radiation technologies in the country. Public confidence in the role of the regulatory body is utmost important. The objectives of this study are to figure out a good model of regulatory body for radiation protection in Korea and to promulgate a draft legislations including provisions on the competent authority, the national policy and programs for upgraded infrastructure for radiation protection. As an appropriate form for the regulatory body in Korea, 'board of nuclear and radiation regulation', an independent and specialized organization under the direction of the prime minister, was proposed. It is expected that disadvantages dominate if the organization for radiation protection is separated from one for nuclear regulation. The proposed draft radiation protection acts consist of 8 chapters and 55 articles and some supplementary provisions. Copious footnotes provide explanations of the articles including the basis, considerations. justification.

  13. European dimension of the implementation of the IAEA TC model project 'Upgrading radiation protection infrastructure'

    International Nuclear Information System (INIS)

    Sabol, J.

    2001-01-01

    A comprehensive evaluation carried out by the IAEA during the period 1984-1995 showed that eleven countries in Europe -- Albania, Armenia, Belarus, Bosnia and Herzegovina, Cyprus, Estonia, Georgia, Latvia, Lithuania, the Republic of Moldova, The Former Yugoslav Republic (TFYR) of Macedonia -- did not have a satisfactory system for radiation protection and the safety of radiation sources in accordance with the recommended international requirements. During the past four years, these countries have been participating in a Model Project aimed at upgrading radiation protection infrastructure in the Europe region with special emphasis on the establishment of an effective legal framework for adequate regulatory control of radiation sources and facilities. This paper analyses the results accomplished in the implementation of this project. It presents the main objectives, based on the present achievements for a follow-up programme to be carried out in participating and also in some other Member States with insufficient national infrastructures for assuring adequate safety in nuclear and radiation technologies. (author)

  14. Design of RFID Mesh Network for Electric Vehicle Smart Charging Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Chung, Ching-Yen; Shepelev, Aleksey; Qiu, Charlie; Chu, Chi-Cheng; Gadh, Rajit

    2013-09-04

    With an increased number of Electric Vehicles (EVs) on the roads, charging infrastructure is gaining an ever-more important role in simultaneously meeting the needs of the local distribution grid and of EV users. This paper proposes a mesh network RFID system for user identification and charging authorization as part of a smart charging infrastructure providing charge monitoring and control. The Zigbee-based mesh network RFID provides a cost-efficient solution to identify and authorize vehicles for charging and would allow EV charging to be conducted effectively while observing grid constraints and meeting the needs of EV drivers

  15. Location privacy protection in mobile networks

    CERN Document Server

    Liu, Xinxin

    2013-01-01

    This SpringerBrief analyzes the potential privacy threats in wireless and mobile network environments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed approach considers a three-party system architecture where there is a trusted central authority that can be used to protect users? privacy. The second approach considers a totally distributed environment where users per

  16. Interdependency control : compensation strategies for the inherent vulnerability of critical infrastructure networks

    International Nuclear Information System (INIS)

    Mao, D.; Sotoodeh, M.; Monu, K.; Marti, J.R.; Srivastava, K.D.

    2009-01-01

    Today's increasingly interacting national critical infrastructures (NCIs) can tolerate most stochastic local disturbances. However, they are extremely fragile under global disturbances, as the latter may either push the whole system into a critical state or reveal many unexpected hidden interdependencies, inducing or triggering cascading failures among all possible layers. This robust yet fragile duality is an inherent vulnerability of modern infrastructures. It is therefore expected that weather-related disasters will be more frequent under a changing climate. This paper proposed an interdependency control strategy (ICS) that would maintain the survival of the most critical services, and compensate for this inherent vulnerability during emergency states. The paper also proposed a generalized adjacency matrix (GAM) to represent the physical interdependencies intra/inter of various infrastructure networks. The vulnerable section in the network can be identified, based on computed results of GAM, number of islands in the network, and influence domain(s) of each component. These features render ICS more effective and convincing. Last, the paper proposed a survivability index for isolated sub-networks and described relevant measures for improving this index during the four phases of emergency management. It was concluded that the proposed strategy is an effective means to reduce the inherent vulnerability and increase the resiliency of these critical infrastructures networks. 20 refs., 5 figs

  17. Development of an anti-flood board to protect the interiors and exteriors of the infrastructure

    Science.gov (United States)

    Petru, Michal; Srb, Pavel; Sevcik, Ladislav; Martinec, Tomas; Kulhavy, Petr

    2018-06-01

    This article deals with the development of an anti-flood board to protect the interior and exterior of various infrastructures, such a houses, cottages or industrial buildings. It was designed prototypes and assembled numerical simulations. In Central Europe and in particular in the Czech Republic, floods are an integral part of the natural water cycle and cause great loss of life and great property damage. The development of new types of mobile anti-flood boards is very important as the design solution is developed for flood protection with regard to minimizing weight, cost of production, easy manipulation, simplicity and speed of installation.

  18. Optimizing Virtual Network Functions Placement in Virtual Data Center Infrastructure Using Machine Learning

    Science.gov (United States)

    Bolodurina, I. P.; Parfenov, D. I.

    2018-01-01

    We have elaborated a neural network model of virtual network flow identification based on the statistical properties of flows circulating in the network of the data center and characteristics that describe the content of packets transmitted through network objects. This enabled us to establish the optimal set of attributes to identify virtual network functions. We have established an algorithm for optimizing the placement of virtual data functions using the data obtained in our research. Our approach uses a hybrid method of visualization using virtual machines and containers, which enables to reduce the infrastructure load and the response time in the network of the virtual data center. The algorithmic solution is based on neural networks, which enables to scale it at any number of the network function copies.

  19. Improved transformer protection using probabilistic neural network ...

    African Journals Online (AJOL)

    user

    secure and dependable protection for power transformers. Owing to its superior learning and generalization capabilities Artificial. Neural Network (ANN) can considerably enhance the scope of WI method. ANN approach is faster, robust and easier to implement than the conventional waveform approach. The use of neural ...

  20. Improved transformer protection using probabilistic neural network ...

    African Journals Online (AJOL)

    This article presents a novel technique to distinguish between magnetizing inrush current and internal fault current of power transformer. An algorithm has been developed around the theme of the conventional differential protection method in which parallel combination of Probabilistic Neural Network (PNN) and Power ...

  1. Spotted hyaena space use in relation to human infrastructure inside a protected area.

    Science.gov (United States)

    Belton, Lydia E; Cameron, Elissa Z; Dalerum, Fredrik

    2016-01-01

    Increasing human population growth has led to elevated levels of human-carnivore conflict. However, some carnivore populations have adapted to urban environments and the resources they supply. Such associations may influence carnivore ecology, behaviour and life-history. Pockets of urbanisation sometimes occur within protected areas, so that anthropogenic influences on carnivore biology are not necessarily confined to unprotected areas. In this study we evaluated associations between human infrastructure and related activity and space use of spotted hyaenas within one of the largest protected areas in South Africa, the Kruger National Park. Home range size was smaller for the dominant female of a clan living in close proximity to humans than that of the dominant female of a clan without direct access to human infrastructure. The home range including human infrastructure was also used less evenly during the night, presumably when the animals were active. Within this home range, a village area was preferred during the night, when the least modified areas within the village were preferred and administration and highly modified areas were avoided. During the day, however, there were no preference or avoidance of the village area, but all habitats except unmodified habitats within the village area were avoided. We suggest that human infrastructure and associated activity influenced hyaena space use, primarily through alterations in the spatial distribution of food. However, these effects may have been indirectly caused by habitat modification that generated favourable hunting habitat rather than a direct effect caused by access to human food such as garbage. Because of the often pivotal effects of apex predators in terrestrial ecosystems, we encourage further work aimed to quantify how human presence influences large carnivores and associated ecosystem processes within protected areas.

  2. Monitoring the US ATLAS Network Infrastructure with perfSONAR-PS

    CERN Document Server

    McKee, S; The ATLAS collaboration; Laurens, P; Severini, H; Wlodek, T; Wolff, S; Zurawski, J

    2012-01-01

    We will present our motivations for deploying and using the perfSONAR-PS Performance Toolkit at ATLAS sites in the United States and describe our experience in using it. This software creates a dedicated monitoring server, capable of collecting and performing a wide range of passive and active network measurements. Each independent instance is managed locally, but able to federate on a global scale; enabling a full view of the network infrastructure that spans domain boundaries. This information, available through web service interfaces, can easily be retrieved to create customized applications. USATLAS has developed a centralized “dashboard” offering network administrators, users, and decision makers the ability to see the performance of the network at a glance. The dashboard framework includes the ability to notify users (alarm) when problems are found, thus allowing rapid response to potential problems and making perfSONAR-PS crucial to the operation of our distributed computing infrastructure.

  3. Novel method for fog monitoring using cellular networks infrastructures

    Science.gov (United States)

    David, N.; Alpert, P.; Messer, H.

    2012-08-01

    A major detrimental effect of fog is visibility limitation which can result in serious transportation accidents, traffic delays and therefore economic damage. Existing monitoring techniques including satellites, transmissometers and human observers - suffer from low spatial resolution, high cost or lack of precision when measuring near ground level. Here we show a novel technique for fog monitoring using wireless communication systems. Communication networks widely deploy commercial microwave links across the terrain at ground level. Operating at frequencies of tens of GHz they are affected by fog and are, effectively, an existing, spatially world-wide distributed sensor network that can provide crucial information about fog concentration and visibility. Fog monitoring potential is demonstrated for a heavy fog event that took place in Israel. The correlation between transmissomters and human eye observations to the visibility estimates from the nearby microwave links was found to be 0.53 and 0.61, respectively. These values indicate the high potential of the proposed method.

  4. METHODS OF MANAGING TRAFFIC DISTRIBUTION IN INFORMATION AND COMMUNICATION NETWORKS OF CRITICAL INFRASTRUCTURE SYSTEMS

    OpenAIRE

    Kosenko, Viktor; Persiyanova, Elena; Belotskyy, Oleksiy; Malyeyeva, Olga

    2017-01-01

    The subject matter of the article is information and communication networks (ICN) of critical infrastructure systems (CIS). The goal of the work is to create methods for managing the data flows and resources of the ICN of CIS to improve the efficiency of information processing. The following tasks were solved in the article: the data flow model of multi-level ICN structure was developed, the method of adaptive distribution of data flows was developed, the method of network resource assignment...

  5. Time-Varying, Multi-Scale Adaptive System Reliability Analysis of Lifeline Infrastructure Networks

    Energy Technology Data Exchange (ETDEWEB)

    Gearhart, Jared Lee [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Kurtz, Nolan Scot [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2014-09-01

    The majority of current societal and economic needs world-wide are met by the existing networked, civil infrastructure. Because the cost of managing such infrastructure is high and increases with time, risk-informed decision making is essential for those with management responsibilities for these systems. To address such concerns, a methodology that accounts for new information, deterioration, component models, component importance, group importance, network reliability, hierarchical structure organization, and efficiency concerns has been developed. This methodology analyzes the use of new information through the lens of adaptive Importance Sampling for structural reliability problems. Deterioration, multi-scale bridge models, and time-variant component importance are investigated for a specific network. Furthermore, both bridge and pipeline networks are studied for group and component importance, as well as for hierarchical structures in the context of specific networks. Efficiency is the primary driver throughout this study. With this risk-informed approach, those responsible for management can address deteriorating infrastructure networks in an organized manner.

  6. Path dependence and the geography of infrastructure networks: the case of the European fibre-optic network

    NARCIS (Netherlands)

    Vinciguerra, S.; Frenken, K.

    2015-01-01

    We analyse the path dependent dynamics in the formation of new infrastructure using an augmented gravity model. We observe that the formation of the pan-European telecommunication backbone has been dependent on pre-existent European transportation networks, particularly, the maritime and railway

  7. On the Impact of using Public Network Communication Infrastructure for Voltage Control Coordination in Smart Grid Scenario

    DEFF Research Database (Denmark)

    Shahid, Kamal; Petersen, Lennart; Iov, Florin

    2017-01-01

    voltage controlled distribution system. A cost effective way to connect the ReGen plants to the control center is to consider the existing public network infrastructure. This paper, therefore, illustrates the impact of using the existing public network communication infrastructure for online voltage...

  8. The German radiation protection infrastructure with emphasis on the safety of radiation sources and radioactive material

    International Nuclear Information System (INIS)

    Czarwinski, R.; Weimer, G.

    2001-01-01

    Through federalism, Germany has a complicated but well functioning regulatory infrastructure for the safety and security of radiation sources based on a clear legal system. The main features of this infrastructure include the legal framework, the authorization and control systems and the responsibilities of different regulatory authorities, which this paper will describe. In connection with the legal framework, the provisions to control the import/export of radiation sources are briefly discussed and some information is given about the registries of sources. Protection and response measures related to unusual events concerning radiation sources, including orphan sources, will be cited. Also, the education and training of different target groups and punitive actions are touched upon in the paper. Conclusions will be drawn for future national and international actions. (author)

  9. Application of dynamic Bayesian network to risk analysis of domino effects in chemical infrastructures

    International Nuclear Information System (INIS)

    Khakzad, Nima

    2015-01-01

    A domino effect is a low frequency high consequence chain of accidents where a primary accident (usually fire and explosion) in a unit triggers secondary accidents in adjacent units. High complexity and growing interdependencies of chemical infrastructures make them increasingly vulnerable to domino effects. Domino effects can be considered as time dependent processes. Thus, not only the identification of involved units but also their temporal entailment in the chain of accidents matter. More importantly, in the case of domino-induced fires which can generally last much longer compared to explosions, foreseeing the temporal evolution of domino effects and, in particular, predicting the most probable sequence of accidents (or involved units) in a domino effect can be of significance in the allocation of preventive and protective safety measures. Although many attempts have been made to identify the spatial evolution of domino effects, the temporal evolution of such accidents has been overlooked. We have proposed a methodology based on dynamic Bayesian network to model both the spatial and temporal evolutions of domino effects and also to quantify the most probable sequence of accidents in a potential domino effect. The application of the developed methodology has been demonstrated via a hypothetical fuel storage plant. - Highlights: • A Dynamic Bayesian Network methodology has been developed to model domino effects. • Considering time-dependencies, both spatial and temporal evolutions of domino effects have been modeled. • The concept of most probable sequence of accidents has been proposed instead of the most probable combination of accidents. • Using backward analysis, the most vulnerable units have been identified during a potential domino effect. • The proposed methodology does not need to identify a unique primary unit (accident) for domino effect modeling

  10. Defense Industrial Base: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    National Research Council Canada - National Science Library

    2007-01-01

    This Defense Industrial Base (DIB) Sector-Specific Plan (SSP), developed in collaboration with industry and government security partners, provides sector-level critical infrastructure and key resources (CI/KR...

  11. Latest generation interconnect technologies in APEnet+ networking infrastructure

    Science.gov (United States)

    Ammendola, Roberto; Biagioni, Andrea; Cretaro, Paolo; Frezza, Ottorino; Lo Cicero, Francesca; Lonardo, Alessandro; Martinelli, Michele; Stanislao Paolucci, Pier; Pastorelli, Elena; Rossetti, Davide; Simula, Francesco; Vicini, Piero

    2017-10-01

    In this paper we present the status of the 3rd generation design of the APEnet board (V5) built upon the 28nm Altera Stratix V FPGA; it features a PCIe Gen3 x8 interface and enhanced embedded transceivers with a maximum capability of 12.5Gbps each. The network architecture is designed in accordance to the Remote DMA paradigm. The APEnet+ V5 prototype is built upon the Stratix V DevKit with the addition of a proprietary, third party IP core implementing multi-DMA engines. Support for zero-copy communication is assured by the possibility of DMA-accessing either host and GPU memory, offloading the CPU from the chore of data copying. The current implementation plateaus to a bandwidth for memory read of 4.8GB/s. Here we describe the hardware optimization to the memory write process which relies on the use of two independent DMA engines and an improved TLB.

  12. Sensing Models and Sensor Network Architectures for Transport Infrastructure Monitoring in Smart Cities

    Science.gov (United States)

    Simonis, Ingo

    2015-04-01

    Transport infrastructure monitoring and analysis is one of the focus areas in the context of smart cities. With the growing number of people moving into densely populated urban metro areas, precise tracking of moving people and goods is the basis for profound decision-making and future planning. With the goal of defining optimal extensions and modifications to existing transport infrastructures, multi-modal transport has to be monitored and analysed. This process is performed on the basis of sensor networks that combine a variety of sensor models, types, and deployments within the area of interest. Multi-generation networks, consisting of a number of sensor types and versions, are causing further challenges for the integration and processing of sensor observations. These challenges are not getting any smaller with the development of the Internet of Things, which brings promising opportunities, but is currently stuck in a type of protocol war between big industry players from both the hardware and network infrastructure domain. In this paper, we will highlight how the OGC suite of standards, with the Sensor Web standards developed by the Sensor Web Enablement Initiative together with the latest developments by the Sensor Web for Internet of Things community can be applied to the monitoring and improvement of transport infrastructures. Sensor Web standards have been applied in the past to pure technical domains, but need to be broadened now in order to meet new challenges. Only cross domain approaches will allow to develop satisfying transport infrastructure approaches that take into account requirements coming form a variety of sectors such as tourism, administration, transport industry, emergency services, or private people. The goal is the development of interoperable components that can be easily integrated within data infrastructures and follow well defined information models to allow robust processing.

  13. ANALYSIS OF STATISTICAL DATA FROM NETWORK INFRASTRUCTURE MONITORING TO DETECT ABNORMAL BEHAVIOR OF SYSTEM LOCAL SEGMENTS

    Directory of Open Access Journals (Sweden)

    N. A. Bazhayev

    2017-01-01

    Full Text Available We propose a method of information security monitoring for a wireless network segments of low-power devices, "smart house", "Internet of Things". We have carried out the analysis of characteristics of systems based on wireless technologies, resulting from passive surveillance and active polling of devices that make up the network infrastructure. We have considered a number of external signs of unauthorized access to a wireless network by the potential information security malefactor. The model for analysis of information security conditions is based on the identity, quantity, frequency, and time characteristics. Due to the main features of devices providing network infrastructure, estimation of information security state is directed to the analysis of the system normal operation, rather than the search for signatures and anomalies during performance of various kinds of information attacks. An experiment is disclosed that provides obtaining statistical information on the remote wireless devices, where the accumulation of data for decision-making is done by comparing the statistical information service messages from end nodes in passive and active modes. We present experiment results of the information influence on a typical system. The proposed approach to the analysis of network infrastructure statistical data based on naive Bayesian classifier can be used to determine the state of information security.

  14. Building research infrastructure in community health centers: a Community Health Applied Research Network (CHARN) report.

    Science.gov (United States)

    Likumahuwa, Sonja; Song, Hui; Singal, Robbie; Weir, Rosy Chang; Crane, Heidi; Muench, John; Sim, Shao-Chee; DeVoe, Jennifer E

    2013-01-01

    This article introduces the Community Health Applied Research Network (CHARN), a practice-based research network of community health centers (CHCs). Established by the Health Resources and Services Administration in 2010, CHARN is a network of 4 community research nodes, each with multiple affiliated CHCs and an academic center. The four nodes (18 individual CHCs and 4 academic partners in 9 states) are supported by a data coordinating center. Here we provide case studies detailing how CHARN is building research infrastructure and capacity in CHCs, with a particular focus on how community practice-academic partnerships were facilitated by the CHARN structure. The examples provided by the CHARN nodes include many of the building blocks of research capacity: communication capacity and "matchmaking" between providers and researchers; technology transfer; research methods tailored to community practice settings; and community institutional review board infrastructure to enable community oversight. We draw lessons learned from these case studies that we hope will serve as examples for other networks, with special relevance for community-based networks seeking to build research infrastructure in primary care settings.

  15. The provision of Technical Co-operation: The model project for upgrading radiation protection infrastructure

    International Nuclear Information System (INIS)

    Barretto, P.M.C.

    2001-01-01

    The paper describes the IAEA's systematic effort to address the inadequate situation in many of its Member States with regard to radiation protection and safety. For this effort a special project was created and implemented in the past five years to create or strengthen existing radiation protection infrastructure in 52 countries where such infrastructure was non-existent or not appropriate for the type of practice involved. The implementation of this project focused on the development of qualified human resources, assistance for introduction of appropriate legislation and equipment for inspection and analysis. Workplans were tailored to the individual needs of each participating country and the elements of these workplans were grouped into five milestones -- regulatory framework, occupational exposure control, medical exposure control, public exposure control, and emergency preparedness and response capabilities. By the end of 2000 more than 70% of the participating countries had radiation protection laws promulgated and a regulatory authority established; 46% had regulations adopted and 42% had a system of notification, authorization and control of radiation sources operational. During the five years of implementation, 555 fellows received individual training, another 2278 participated in training courses, over 1000 expert missions were fielded and equipment worth about US $6 million was provided. The total cost was over US $17 million. (author)

  16. Towards the application of stress-in-motion (SIM) results in pavement design and infrastructure protection

    CSIR Research Space (South Africa)

    De Beer, Morris

    2004-03-01

    Full Text Available stream_source_info De Beer_2005_3.pdf.txt stream_content_type text/plain stream_size 53150 Content-Encoding UTF-8 stream_name De Beer_2005_3.pdf.txt Content-Type text/plain; charset=UTF-8 Proceedings 8th International...: Conference Planners TOWARDS THE APPLICATION OF STRESS-IN-MOTION (SIM) RESULTS IN PAVEMENT DESIGN AND INFRASTRUCTURE PROTECTION Morris De Beer1, Colin Fisher1 and Louw Kannemeyer2 1CSIR Transportek Pretoria, 0001. Tel: +27-(0)-(012) 841-2953. Fax: +27...

  17. Partnership effectiveness in primary community care networks: A national empirical analysis of partners' coordination infrastructure designs.

    Science.gov (United States)

    Lin, Blossom Yen-Ju; Lin, Yung-Kai; Lin, Cheng-Chieh

    2010-01-01

    Previous empirical and managerial studies have ignored the effectiveness of integrated health networks. It has been argued that the varying definitions and strategic imperatives of integrated organizations may have complicated the assessment of the outcomes/performance of varying models, particularly when their market structures and contexts differed. This study aimed to empirically verify a theoretical perspective on the coordination infrastructure designs and the effectiveness of the primary community care networks (PCCNs) formed and funded by the Bureau of National Health Insurance since March 2003. The PCCNs present a model to replace the traditional fragmented providers in Taiwan's health care. The study used a cross-sectional mailed survey designed to ascertain partnership coordination infrastructure and integration of governance, clinical care, bonding, finances, and information. The outcome indicators were PCCNs' perceived performance and willingness to remain within the network. Structural equation modeling examined the causal relationships, controlling for organizational and environmental factors. Primary data collection occurred from February through December 2005, via structured questionnaires sent to 172 PCCNs. Using the individual PCCN as the unit of analysis, the results found that a network's efforts regarding coordination infrastructures were positively related to the PCCN's perceived performance and willingness to remain within the network. In addition, PCCNs practicing in rural areas and in areas with higher density of medical resources had better perceived effectiveness and willingness to cooperate in the network.Practical Implication: The lack of both an operational definition and an information about system-wide integration may have obstructed understanding of integrated health networks' organizational dynamics. This study empirically examined individual PCCNs and offers new insights on how to improve networks' organizational design and

  18. User and Machine Authentication and Authorization Infrastructure for Distributed Wireless Sensor Network Testbeds

    Directory of Open Access Journals (Sweden)

    Gerald Wagenknecht

    2013-03-01

    Full Text Available The intention of an authentication and authorization infrastructure (AAI is to simplify and unify access to different web resources. With a single login, a user can access web applications at multiple organizations. The Shibboleth authentication and authorization infrastructure is a standards-based, open source software package for web single sign-on (SSO across or within organizational boundaries. It allows service providers to make fine-grained authorization decisions for individual access of protected online resources. The Shibboleth system is a widely used AAI, but only supports protection of browser-based web resources. We have implemented a Shibboleth AAI extension to protect web services using Simple Object Access Protocol (SOAP. Besides user authentication for browser-based web resources, this extension also provides user and machine authentication for web service-based resources. Although implemented for a Shibboleth AAI, the architecture can be easily adapted to other AAIs.

  19. Constructing a resilience index for the Enhanced Critical Infrastructure Protection Program

    Energy Technology Data Exchange (ETDEWEB)

    Fisher, R. E.; Bassett, G. W.; Buehring, W. A.; Collins, M. J.; Dickinson, D. C.; Eaton, L. K.; Haffenden, R. A.; Hussar, N. E.; Klett, M. S.; Lawlor, M. A.; Millier, D. J.; Petit, F. D.; Peyton, S. M.; Wallace, K. E.; Whitfield, R. G.; Peerenboom, J P

    2010-10-14

    Following recommendations made in Homeland Security Presidential Directive 7, which established a national policy for the identification and increased protection of critical infrastructure and key resources (CIKR) by Federal departments and agencies, the U.S. Department of Homeland Security (DHS) in 2006 developed the Enhanced Critical Infrastructure Protection (ECIP) program. The ECIP program aimed to provide a closer partnership with state, regional, territorial, local, and tribal authorities in fulfilling the national objective to improve CIKR protection. The program was specifically designed to identify protective measures currently in place in CIKR and to inform facility owners/operators of the benefits of new protective measures. The ECIP program also sought to enhance existing relationships between DHS and owners/operators of CIKR and to build relationships where none existed (DHS 2008; DHS 2009). In 2009, DHS and its protective security advisors (PSAs) began assessing CIKR assets using the ECIP program and ultimately produced individual protective measure and vulnerability values through the protective measure and vulnerability indices (PMI/VI). The PMI/VI assess the protective measures posture of individual facilities at their 'weakest link,' allowing for a detailed analysis of the most vulnerable aspects of the facilities (Schneier 2003), while maintaining the ability to produce an overall protective measures picture. The PMI has six main components (physical security, security management, security force, information sharing, protective measures assessments, and dependencies) and focuses on actions taken by a facility to prevent or deter the occurrence of an incident (Argonne National Laboratory 2009). As CIKR continue to be assessed using the PMI/VI and owners/operators better understand how they can prevent or deter incidents, academic research, practitioner emphasis, and public policy formation have increasingly focused on resilience as a

  20. A reference model for model-based design of critical infrastructure protection systems

    Science.gov (United States)

    Shin, Young Don; Park, Cheol Young; Lee, Jae-Chon

    2015-05-01

    Today's war field environment is getting versatile as the activities of unconventional wars such as terrorist attacks and cyber-attacks have noticeably increased lately. The damage caused by such unconventional wars has also turned out to be serious particularly if targets are critical infrastructures that are constructed in support of banking and finance, transportation, power, information and communication, government, and so on. The critical infrastructures are usually interconnected to each other and thus are very vulnerable to attack. As such, to ensure the security of critical infrastructures is very important and thus the concept of critical infrastructure protection (CIP) has come. The program to realize the CIP at national level becomes the form of statute in each country. On the other hand, it is also needed to protect each individual critical infrastructure. The objective of this paper is to study on an effort to do so, which can be called the CIP system (CIPS). There could be a variety of ways to design CIPS's. Instead of considering the design of each individual CIPS, a reference model-based approach is taken in this paper. The reference model represents the design of all the CIPS's that have many design elements in common. In addition, the development of the reference model is also carried out using a variety of model diagrams. The modeling language used therein is the systems modeling language (SysML), which was developed and is managed by Object Management Group (OMG) and a de facto standard. Using SysML, the structure and operational concept of the reference model are designed to fulfil the goal of CIPS's, resulting in the block definition and activity diagrams. As a case study, the operational scenario of the nuclear power plant while being attacked by terrorists is studied using the reference model. The effectiveness of the results is also analyzed using multiple analysis models. It is thus expected that the approach taken here has some merits

  1. Networking for large-scale science: infrastructure, provisioning, transport and application mapping

    International Nuclear Information System (INIS)

    Rao, Nageswara S; Carter, Steven M; Wu Qishi; Wing, William R; Zhu Mengxia; Mezzacappa, Anthony; Veeraraghavan, Malathi; Blondin, John M

    2005-01-01

    Large-scale science computations and experiments require unprecedented network capabilities in the form of large bandwidth and dynamically stable connections to support data transfers, interactive visualizations, and monitoring and steering operations. A number of component technologies dealing with the infrastructure, provisioning, transport and application mappings must be developed and/or optimized to achieve these capabilities. We present a brief account of the following technologies that contribute toward achieving these network capabilities: (a) DOE UltraScienceNet and NSF CHEETAH network testbeds that provide on-demand and scheduled dedicated network connections; (b) experimental results on transport protocols that achieve close to 100% utilization on dedicated 1Gbps wide-area channels; (c) a scheme for optimally mapping a visualization pipeline onto a network to minimize the end-to-end delays; and (d) interconnect configuration and protocols that provides multiple Gbps flows from Cray X1 to external hosts

  2. Networking for large-scale science: infrastructure, provisioning, transport and application mapping

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S [Computer Science and Mathematics Division, Oak Ridge National Laboratory, Oak Ridge, TN 37831 (United States); Carter, Steven M [Computer Science and Mathematics Division, Oak Ridge National Laboratory, Oak Ridge, TN 37831 (United States); Wu Qishi [Computer Science and Mathematics Division, Oak Ridge National Laboratory, Oak Ridge, TN 37831 (United States); Wing, William R [Computer Science and Mathematics Division, Oak Ridge National Laboratory, Oak Ridge, TN 37831 (United States); Zhu Mengxia [Department of Computer Science, Louisiana State University, Baton Rouge, LA 70803 (United States); Mezzacappa, Anthony [Physics Division, Oak Ridge National Laboratory, Oak Ridge, TN 37831 (United States); Veeraraghavan, Malathi [Department of Computer Science, University of Virginia, Charlottesville, VA 22904 (United States); Blondin, John M [Department of Physics, North Carolina State University, Raleigh, NC 27695 (United States)

    2005-01-01

    Large-scale science computations and experiments require unprecedented network capabilities in the form of large bandwidth and dynamically stable connections to support data transfers, interactive visualizations, and monitoring and steering operations. A number of component technologies dealing with the infrastructure, provisioning, transport and application mappings must be developed and/or optimized to achieve these capabilities. We present a brief account of the following technologies that contribute toward achieving these network capabilities: (a) DOE UltraScienceNet and NSF CHEETAH network testbeds that provide on-demand and scheduled dedicated network connections; (b) experimental results on transport protocols that achieve close to 100% utilization on dedicated 1Gbps wide-area channels; (c) a scheme for optimally mapping a visualization pipeline onto a network to minimize the end-to-end delays; and (d) interconnect configuration and protocols that provides multiple Gbps flows from Cray X1 to external hosts.

  3. Monitoring the US ATLAS Network Infrastructure with perfSONAR-PS

    International Nuclear Information System (INIS)

    McKee, Shawn; Lake, Andrew; Laurens, Philippe; Severini, Horst; Wlodek, Tomasz; Wolff, Stephen; Zurawski, Jason

    2012-01-01

    Global scientific collaborations, such as ATLAS, continue to push the network requirements envelope. Data movement in this collaboration is routinely including the regular exchange of petabytes of datasets between the collection and analysis facilities in the coming years. These requirements place a high emphasis on networks functioning at peak efficiency and availability; the lack thereof could mean critical delays in the overall scientific progress of distributed data-intensive experiments like ATLAS. Network operations staff routinely must deal with problems deep in the infrastructure; this may be as benign as replacing a failing piece of equipment, or as complex as dealing with a multi-domain path that is experiencing data loss. In either case, it is crucial that effective monitoring and performance analysis tools are available to ease the burden of management. We will report on our experiences deploying and using the perfSONAR-PS Performance Toolkit at ATLAS sites in the United States. This software creates a dedicated monitoring server, capable of collecting and performing a wide range of passive and active network measurements. Each independent instance is managed locally, but able to federate on a global scale; enabling a full view of the network infrastructure that spans domain boundaries. This information, available through web service interfaces, can easily be retrieved to create customized applications. The US ATLAS collaboration has developed a centralized “dashboard” offering network administrators, users, and decision makers the ability to see the performance of the network at a glance. The dashboard framework includes the ability to notify users (alarm) when problems are found, thus allowing rapid response to potential problems and making perfSONAR-PS crucial to the operation of our distributed computing infrastructure.

  4. Structures and Infrastructures of International R&D Networks: A Capability Maturity Perspective

    DEFF Research Database (Denmark)

    Niang, Mohamed; Wæhrens, Brian Vejrum

    Purpose: This paper explores the process towards globally distributing R&D activities with an emphasis on organizational maturity. It discusses emerging configurations by asking how the structure and infrastructure of international R&D networks evolve along with the move from a strong R&D center...... to dispersed development. Design/Methodology/Approach: This is a qualitative study of the process of distributing R&D. By comparing selected firms, the researchers identify a pattern of dispersion of R&D activities in three Danish firms. Findings and Discussion: Drawing from the case studies, the researchers...... present a capability maturity model. Furthermore, understanding the interaction between new structures and infrastructures of the dispersed networks is viewed as a key requirement for developing organizational capabilities and formulating adequate strategies that leverage dispersed R&D. Organizational...

  5. Primer to Design Safe School Projects in Case of Terrorist Attacks and School Shootings. Buildings and Infrastructure Protection Series. FEMA-428/BIPS-07/January 2012. Edition 2

    Science.gov (United States)

    Chipley, Michael; Lyon, Wesley; Smilowitz, Robert; Williams, Pax; Arnold, Christopher; Blewett, William; Hazen, Lee; Krimgold, Fred

    2012-01-01

    This publication, part of the new Building and Infrastructure Protection Series (BIPS) published by the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) Infrastructure Protection and Disaster Management Division (IDD), serves to advance high performance and integrated design for buildings and infrastructure. This…

  6. Property relationships of the physical infrastructure and the traffic flow networks

    Science.gov (United States)

    Zhou, Ta; Zou, Sheng-Rong; He, Da-Ren

    2010-03-01

    We studied both empirically and analytically the correlation between the degrees or the clustering coefficients, respectively, of the networks in the physical infrastructure and the traffic flow layers in three Chinese transportation systems. The systems are bus transportation systems in Beijing and Hangzhou, and the railway system in the mainland. It is found that the correlation between the degrees obey a linear function; while the correlation between the clustering coefficients obey a power law. A possible dynamic explanation on the rules is presented.

  7. Effective Utilization of Resources and Infrastructure for a Spaceport Network Architecture

    Science.gov (United States)

    Gill, Tracy; Larson, Wiley; Mueller, Robert; Roberson, Luke

    2012-01-01

    Providing routine, affordable access to a variety of orbital and deep space destinations requires an intricate network of ground, planetary surface, and space-based spaceports like those on Earth (land and sea), in various Earth orbits, and on other extraterrestrial surfaces. Advancements in technology and international collaboration are critical to establish a spaceport network that satisfies the requirements for private and government research, exploration, and commercial objectives. Technologies, interfaces, assembly techniques, and protocols must be adapted to enable mission critical capabilities and interoperability throughout the spaceport network. The conceptual space mission architecture must address the full range of required spaceport services, from managing propellants for a variety of spacecraft to governance structure. In order to accomplish affordability and sustainability goals, the network architecture must consider deriving propellants from in situ planetary resources to the maximum extent possible. Water on the Moon and Mars, Mars' atmospheric CO2, and O2 extracted from lunar regolith are examples of in situ resources that could be used to generate propellants for various spacecraft, orbital stages and trajectories, and the commodities to support habitation and human operations at these destinations. The ability to use in-space fuel depots containing in situ derived propellants would drastically reduce the mass required to launch long-duration or deep space missions from Earth's gravity well. Advances in transformative technologies and common capabilities, interfaces, umbilicals, commodities, protocols, and agreements will facilitate a cost-effective, safe, reliable infrastructure for a versatile network of Earth- and extraterrestrial spaceports. Defining a common infrastructure on Earth, planetary surfaces, and in space, as well as deriving propellants from in situ planetary resources to construct in-space propellant depots to serve the spaceport

  8. [Scale effect of Nanjing urban green infrastructure network pattern and connectivity analysis.

    Science.gov (United States)

    Yu, Ya Ping; Yin, Hai Wei; Kong, Fan Hua; Wang, Jing Jing; Xu, Wen Bin

    2016-07-01

    Based on ArcGIS, Erdas, GuidosToolbox, Conefor and other software platforms, using morphological spatial pattern analysis (MSPA) and landscape connectivity analysis methods, this paper quantitatively analysed the scale effect, edge effect and distance effect of the Nanjing urban green infrastructure network pattern in 2013 by setting different pixel sizes (P) and edge widths in MSPA analysis, and setting different dispersal distance thresholds in landscape connectivity analysis. The results showed that the type of landscape acquired based on the MSPA had a clear scale effect and edge effect, and scale effects only slightly affected landscape types, whereas edge effects were more obvious. Different dispersal distances had a great impact on the landscape connectivity, 2 km or 2.5 km dispersal distance was a critical threshold for Nanjing. When selecting the pixel size 30 m of the input data and the edge wide 30 m used in the morphological model, we could get more detailed landscape information of Nanjing UGI network. Based on MSPA and landscape connectivity, analysis of the scale effect, edge effect, and distance effect on the landscape types of the urban green infrastructure (UGI) network was helpful for selecting the appropriate size, edge width, and dispersal distance when developing these networks, and for better understanding the spatial pattern of UGI networks and the effects of scale and distance on the ecology of a UGI network. This would facilitate a more scientifically valid set of design parameters for UGI network spatiotemporal pattern analysis. The results of this study provided an important reference for Nanjing UGI networks and a basis for the analysis of the spatial and temporal patterns of medium-scale UGI landscape networks in other regions.

  9. Reliability assessment of power pole infrastructure incorporating deterioration and network maintenance

    International Nuclear Information System (INIS)

    Ryan, Paraic C.; Stewart, Mark G.; Spencer, Nathan; Li, Yue

    2014-01-01

    There is considerable investment in timber utility poles worldwide, and there is a need to examine the structural reliability and probability based management optimisation of these power distribution infrastructure elements. The work presented in this paper builds on the existing studies in this area through assessment of both treated and untreated timber power poles, with the effects of deterioration and network maintenance incorporated in the analysis. This more realistic assessment approach, with deterioration and maintenance considered, was achieved using event-based Monte Carlo simulation. The output from the probabilistic model is used to illustrate the importance of considering network maintenance in the time-dependent structural reliability assessment of timber power poles. Under wind load, treated and untreated poles designed and maintained in accordance with existing Australian standards were found to have similar failure rates. However, untreated pole networks required approximately twice as many maintenance based pole replacements to sustain the same level of reliability. The effect of four different network maintenance strategies on infrastructure performance was also investigated herein. This assessment highlighted the fact that slight alterations to network maintenance practices can lead to significant changes in performance of timber power pole networks. - Highlights: • A time-dependent structural reliability model was developed for timber power poles. • Deterioration and network maintenance were incorporated into this event based model. • Network maintenance had a significant impact on power pole wind vulnerability. • Treated and untreated poles designed to Australian standards had similar reliability. • Minor alterations to maintenance strategies had large effects on network performance

  10. Infrastructure for Integration of Legacy Electrical Equipment into a Smart-Grid Using Wireless Sensor Networks.

    Science.gov (United States)

    de Araújo, Paulo Régis C; Filho, Raimir Holanda; Rodrigues, Joel J P C; Oliveira, João P C M; Braga, Stephanie A

    2018-04-24

    At present, the standardisation of electrical equipment communications is on the rise. In particular, manufacturers are releasing equipment for the smart grid endowed with communication protocols such as DNP3, IEC 61850, and MODBUS. However, there are legacy equipment operating in the electricity distribution network that cannot communicate using any of these protocols. Thus, we propose an infrastructure to allow the integration of legacy electrical equipment to smart grids by using wireless sensor networks (WSNs). In this infrastructure, each legacy electrical device is connected to a sensor node, and the sink node runs a middleware that enables the integration of this device into a smart grid based on suitable communication protocols. This middleware performs tasks such as the translation of messages between the power substation control centre (PSCC) and electrical equipment in the smart grid. Moreover, the infrastructure satisfies certain requirements for communication between the electrical equipment and the PSCC, such as enhanced security, short response time, and automatic configuration. The paper’s contributions include a solution that enables electrical companies to integrate their legacy equipment into smart-grid networks relying on any of the above mentioned communication protocols. This integration will reduce the costs related to the modernisation of power substations.

  11. Infrastructure for Integration of Legacy Electrical Equipment into a Smart-Grid Using Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Paulo Régis C. de Araújo

    2018-04-01

    Full Text Available At present, the standardisation of electrical equipment communications is on the rise. In particular, manufacturers are releasing equipment for the smart grid endowed with communication protocols such as DNP3, IEC 61850, and MODBUS. However, there are legacy equipment operating in the electricity distribution network that cannot communicate using any of these protocols. Thus, we propose an infrastructure to allow the integration of legacy electrical equipment to smart grids by using wireless sensor networks (WSNs. In this infrastructure, each legacy electrical device is connected to a sensor node, and the sink node runs a middleware that enables the integration of this device into a smart grid based on suitable communication protocols. This middleware performs tasks such as the translation of messages between the power substation control centre (PSCC and electrical equipment in the smart grid. Moreover, the infrastructure satisfies certain requirements for communication between the electrical equipment and the PSCC, such as enhanced security, short response time, and automatic configuration. The paper’s contributions include a solution that enables electrical companies to integrate their legacy equipment into smart-grid networks relying on any of the above mentioned communication protocols. This integration will reduce the costs related to the modernisation of power substations.

  12. Towards an advanced e-Infrastructure for Civil Protection applications: Research Strategies and Innovation Guidelines

    Science.gov (United States)

    Mazzetti, P.; Nativi, S.; Verlato, M.; Angelini, V.

    2009-04-01

    In the context of the EU co-funded project CYCLOPS (http://www.cyclops-project.eu) the problem of designing an advanced e-Infrastructure for Civil Protection (CP) applications has been addressed. As a preliminary step, some studies about European CP systems and operational applications were performed in order to define their specific system requirements. At a higher level it was verified that CP applications are usually conceived to map CP Business Processes involving different levels of processing including data access, data processing, and output visualization. At their core they usually run one or more Earth Science models for information extraction. The traditional approach based on the development of monolithic applications presents some limitations related to flexibility (e.g. the possibility of running the same models with different input data sources, or different models with the same data sources) and scalability (e.g. launching several runs for different scenarios, or implementing more accurate and computing-demanding models). Flexibility can be addressed adopting a modular design based on a SOA and standard services and models, such as OWS and ISO for geospatial services. Distributed computing and storage solutions could improve scalability. Basing on such considerations an architectural framework has been defined. It is made of a Web Service layer providing advanced services for CP applications (e.g. standard geospatial data sharing and processing services) working on the underlying Grid platform. This framework has been tested through the development of prototypes as proof-of-concept. These theoretical studies and proof-of-concept demonstrated that although Grid and geospatial technologies would be able to provide significant benefits to CP applications in terms of scalability and flexibility, current platforms are designed taking into account requirements different from CP. In particular CP applications have strict requirements in terms of: a) Real

  13. A novel infrastructure modularity index for the segmentation of water distribution networks

    Science.gov (United States)

    Giustolisi, O.; Ridolfi, L.

    2014-10-01

    The search for suitable segmentations is a challenging and urgent issue for the analysis, planning and management of complex water distribution networks (WDNs). In fact, complex and large size hydraulic systems require the division into modules in order to simplify the analysis and the management tasks. In the complex network theory, modularity index has been proposed as a measure of the strength of the network division into modules and its maximization is used in order to identify community of nodes (i.e., modules) which are characterized by strong interconnections. Nevertheless, modularity index needs to be revised considering the specificity of the hydraulic systems as infrastructure systems. To this aim, the classic modularity index has been recently modified and tailored for WDNs. Nevertheless, the WDN-oriented modularity is affected by the resolution limit stemming from classic modularity index. Such a limit hampers the identification/design of small modules and this is a major drawback for technical tasks requiring a detailed resolution of the network segmentation. In order to get over this problem, we propose a novel infrastructure modularity index that is not affected by the resolution limit of the classic one. The rationale and good features of the proposed index are theoretically demonstrated and discussed using two real hydraulic networks.

  14. Tourism infrastructure development prioritization in Sabang Island using analytic network process methods

    Science.gov (United States)

    Rani, Hafnidar A.; Afifuddin, Moch.; Akbar, Herry

    2017-11-01

    Indonesia has been widely known as an archipelago country, with its geographical location is at the equator, which make this country as a tropical country. It has the topography of diverse islands which consist of lakes, mountains, and one of countries which have the longest coastline. This condition cause Indonesia has various beautiful tourism objects and become the attraction to the international tourists to come. Indonesia still has the other islands which are as beautiful as Bali Island offering different beauties. One of them is an island located in the most western island of Indonesia, which becomes the zero point of the country. It is Sabang Island in Aceh Province. Sabang Island is the small volcanic island located in the most western island of Sumatra. Infrastructure becomes the basic device in supporting this tourism aspect, which the buildings and service institutions play the important role in appropriate managing of economic and community needs. The problem in this study is how to determine the priority of tourism infrastructure development in Sabang Island. The objective of this study is to determine the priority rank of tourism infrastructure development and the priority rank of the potential investment in Sabang Island to be developed. The ranking results of the Analytic Network Process (ANP) calculations of tourism locations/zones and tourism supporting infrastructure found that Teupin Layeu and Gapang, and Rubiah Island have the highest priority to be developed in the hotel/accommodation infrastructure which scores are 0.02589 and 0.02120. Then followed by parking infrastructure in Teupin Layeu and access road to Km 0 which became as the main priority determined by Sabang government which scores are 0.01750 and 0.01618.

  15. Connectivity reliability and topological controllability of infrastructure networks: A comparative assessment

    International Nuclear Information System (INIS)

    Li, Jian; Dueñas-Osorio, Leonardo; Chen, Changkun; Shi, Congling

    2016-01-01

    As infrastructure systems evolve, their design, maintenance, and optimal performance require mature tools from system reliability theory, as well as principles to handle emerging system features, such as controllability. This paper conducts a comparative study of the connectivity reliability (CR) and topological controllability (TC) of infrastructure systems in terms of three aspects: topology, robustness, and node importance. Taking eight city-level power transmission networks and thousands of artificial networks as examples, this paper reveals that a dense and homogeneous network topology is better to satisfy CR and TC requirements, than more common sparse and heterogeneous networks when node attributes are generic. It is observed that the average degree's impact on CR is more significant than on TC, while degree heterogeneity is more significant on TC. When node attributes are accounted for, for generators the reliability-based node importance measure may underestimate some important nodes in terms of TC, and vice versa—an issue not observed for substation nodes. The findings in this paper suggest a potential new direction to enhance reliability-based design by integrating it with emerging controllability-based measures relevant in the future as infrastructure networks increase reliance on information systems. - Highlights: • Compares connectivity reliability (CR) and topological controllability (TC) metrics. • Develops a controllability index and a controllability-based node importance metric. • CR is more sensitive to degree while TC is more sensitive to degree heterogeneity. • CR-based importance measures match TC-based measures for substation nodes. • CR- and TC-based measures are complementary to identify important generator nodes.

  16. Multi-Level Data-Security and Data-Protection in a Distributed Search Infrastructure for Digital Medical Samples.

    Science.gov (United States)

    Witt, Michael; Krefting, Dagmar

    2016-01-01

    Human sample data is stored in biobanks with software managing digital derived sample data. When these stand-alone components are connected and a search infrastructure is employed users become able to collect required research data from different data sources. Data protection, patient rights, data heterogeneity and access control are major challenges for such an infrastructure. This dissertation will investigate concepts for a multi-level security architecture to comply with these requirements.

  17. Cyber resilience: a review of critical national infrastructure and cyber security protection measures applied in the UK and USA.

    Science.gov (United States)

    Harrop, Wayne; Matteson, Ashley

    This paper presents cyber resilience as key strand of national security. It establishes the importance of critical national infrastructure protection and the growing vicarious nature of remote, well-planned, and well executed cyber attacks on critical infrastructures. Examples of well-known historical cyber attacks are presented, and the emergence of 'internet of things' as a cyber vulnerability issue yet to be tackled is explored. The paper identifies key steps being undertaken by those responsible for detecting, deterring, and disrupting cyber attacks on critical national infrastructure in the United Kingdom and the USA.

  18. The spatial data infrastructure for the European Seas Observatory Network (ESONET)

    Science.gov (United States)

    Huber, Robert; Diepenbroek, Michael

    2010-05-01

    ESONET is a Multidisciplinary European Network of Excellence (NoE) in which scientists and engineers from 50 partners and 14 countries cooperate in building the infrastructure for a lasting integration of research and development in deep sea observatories in Europe. This NoE aims to develop strong links between regional nodes of a European network of sub sea observatories and to promote multidiciplinarity and transnationality within each node. Essential for these goals is the provision of an effective data and knowledge infrastructure for both, management and archiving of observatory data as well as knowledge and data sharing among network participants. The ESONET data infrastructure roughly consists of four major components: data policies a common agreement on the data management procedures and prerequisites, data acquisition technologies serve to collect data directly from ESONET observatories, data archives care for long term data management of collected ESONET data and data integration and portal tools which ensure harmonisation of collected data and allow access to the data in a common way. Most critical for ESONET was the development of a spatial data infrastructure (SDI) by using standardised protocols to directly access observatory data in its spatial and temporal context. The ESONET SDI provides means to either access data in quasi real time or harvest locally stored data in order to transfer it to a long term data archive. ESONET SDI largely builds upon the OGC Sensor Web Enablement (SWE) suite of standards. Among those, the Sensor Observation Service (SOS), the Observations & Measurements (O&M), Sensor Markup Language (SensorML) are especially important for the integration of observatory data as well as for the contribution of ESONET data to GEOSS.

  19. Systematic analysis of natural hazards along infrastructure networks using a GIS-tool for risk assessment

    Science.gov (United States)

    Baruffini, Mirko

    2010-05-01

    GIS-based system can be for effective and efficient disaster response management. In the coming years our GIS application will be a data base containing all information needed for the evaluation of risk sites along the Gotthard line. Our GIS application can help the technical management to decide about protection measures because of, in addition to the visualisation, tools for spatial data analysis will be available. REFERENCES Bründl M. (Ed.) 2009 : Risikokonzept für Naturgefahren - Leitfaden. Nationale Plattform für Naturgefahren PLANAT, Bern. 416 S. BUWAL 1999: Risikoanalyse bei gravitativen Naturgefahren - Methode, Fallbeispiele und Daten (Risk analyses for gravitational natural hazards). Bundesamt für Umwelt, Wald und Landschaft (BUWAL). Umwelt-Materialen Nr. 107, 1-244. Loat, R. & Zimmermann, M. 2004: La gestion des risques en Suisse (Risk Management in Switzerland). In: Veyret, Y., Garry, G., Meschinet de Richemont, N. & Armand Colin (eds) 2002: Colloque Arche de la Défense 22-24 octobre 2002, dans Risques naturels et aménagement en Europe, 108-120. Maggi R. et al, 2009: Evaluation of the optimal resilience for vulnerable infrastructure networks. An interdisciplinary pilot study on the transalpine transportation corridors, NRP 54 "Sustainable Development of the Built Environment", Projekt Nr. 405 440, Final Scientific Report, Lugano

  20. CDP - Adaptive Supervisory Control and Data Acquisition (SCADA) Technology for Infrastructure Protection

    Energy Technology Data Exchange (ETDEWEB)

    Marco Carvalho; Richard Ford

    2012-05-14

    Supervisory Control and Data Acquisition (SCADA) Systems are a type of Industrial Control System characterized by the centralized (or hierarchical) monitoring and control of geographically dispersed assets. SCADA systems combine acquisition and network components to provide data gathering, transmission, and visualization for centralized monitoring and control. However these integrated capabilities, especially when built over legacy systems and protocols, generally result in vulnerabilities that can be exploited by attackers, with potentially disastrous consequences. Our research project proposal was to investigate new approaches for secure and survivable SCADA systems. In particular, we were interested in the resilience and adaptability of large-scale mission-critical monitoring and control infrastructures. Our research proposal was divided in two main tasks. The first task was centered on the design and investigation of algorithms for survivable SCADA systems and a prototype framework demonstration. The second task was centered on the characterization and demonstration of the proposed approach in illustrative scenarios (simulated or emulated).

  1. Beyond public acceptance of energy infrastructure: How citizens make sense and form reactions by enacting networks of entities in infrastructure development

    International Nuclear Information System (INIS)

    Aaen, Sara Bjørn; Kerndrup, Søren; Lyhne, Ivar

    2016-01-01

    This article adds to the growing insight into public acceptance by presenting a novel approach to how citizens make sense of new energy infrastructure. We claim that to understand public acceptance, we need to go beyond the current thinking of citizens framed as passive respondents to proposed projects, and instead view infrastructure projects as enacted by citizens in their local settings. We propose a combination of sensemaking theory and actor–network theory that allows insight into how citizens enact entities from experiences and surroundings in order to create meaning and form a reaction to new infrastructure projects. Empirically, we analyze how four citizens make sense of an electricity cable project through a conversation process with a representative from the infrastructure developer. Interestingly, the formal participation process and the materiality of the cable play minor roles in citizens' sensemaking process. We conclude that insight into the way citizens are making sense of energy infrastructure processes can improve and help to overcome shortcomings in the current thinking about public acceptance and public participation. - Highlights: •Attention to citizens' sensemaking enables greater insight into the decision-making process. •A combination of sensemaking and actor-network theory (ANT) is relevant for studies of public acceptance. •Sensemaking explains why citizens facing similar situations act differently. •Complexity of citizens' sensemaking challenges the predictability of processes.

  2. ENES the European Network for Earth System modelling and its infrastructure projects IS-ENES

    Science.gov (United States)

    Guglielmo, Francesca; Joussaume, Sylvie; Parinet, Marie

    2016-04-01

    The scientific community working on climate modelling is organized within the European Network for Earth System modelling (ENES). In the past decade, several European university departments, research centres, meteorological services, computer centres, and industrial partners engaged in the creation of ENES with the purpose of working together and cooperating towards the further development of the network, by signing a Memorandum of Understanding. As of 2015, the consortium counts 47 partners. The climate modelling community, and thus ENES, faces challenges which are both science-driven, i.e. analysing of the full complexity of the Earth System to improve our understanding and prediction of climate changes, and have multi-faceted societal implications, as a better representation of climate change on regional scales leads to improved understanding and prediction of impacts and to the development and provision of climate services. ENES, promoting and endorsing projects and initiatives, helps in developing and evaluating of state-of-the-art climate and Earth system models, facilitates model inter-comparison studies, encourages exchanges of software and model results, and fosters the use of high performance computing facilities dedicated to high-resolution multi-model experiments. ENES brings together public and private partners, integrates countries underrepresented in climate modelling studies, and reaches out to different user communities, thus enhancing European expertise and competitiveness. In this need of sophisticated models, world-class, high-performance computers, and state-of-the-art software solutions to make efficient use of models, data and hardware, a key role is played by the constitution and maintenance of a solid infrastructure, developing and providing services to the different user communities. ENES has investigated the infrastructural needs and has received funding from the EU FP7 program for the IS-ENES (InfraStructure for ENES) phase I and II

  3. Algorithms for Bayesian network modeling and reliability assessment of infrastructure systems

    International Nuclear Information System (INIS)

    Tien, Iris; Der Kiureghian, Armen

    2016-01-01

    Novel algorithms are developed to enable the modeling of large, complex infrastructure systems as Bayesian networks (BNs). These include a compression algorithm that significantly reduces the memory storage required to construct the BN model, and an updating algorithm that performs inference on compressed matrices. These algorithms address one of the major obstacles to widespread use of BNs for system reliability assessment, namely the exponentially increasing amount of information that needs to be stored as the number of components in the system increases. The proposed compression and inference algorithms are described and applied to example systems to investigate their performance compared to that of existing algorithms. Orders of magnitude savings in memory storage requirement are demonstrated using the new algorithms, enabling BN modeling and reliability analysis of larger infrastructure systems. - Highlights: • Novel algorithms developed for Bayesian network modeling of infrastructure systems. • Algorithm presented to compress information in conditional probability tables. • Updating algorithm presented to perform inference on compressed matrices. • Algorithms applied to example systems to investigate their performance. • Orders of magnitude savings in memory storage requirement demonstrated.

  4. Data interoperabilty between European Environmental Research Infrastructures and their contribution to global data networks

    Science.gov (United States)

    Kutsch, W. L.; Zhao, Z.; Hardisty, A.; Hellström, M.; Chin, Y.; Magagna, B.; Asmi, A.; Papale, D.; Pfeil, B.; Atkinson, M.

    2017-12-01

    Environmental Research Infrastructures (ENVRIs) are expected to become important pillars not only for supporting their own scientific communities, but also a) for inter-disciplinary research and b) for the European Earth Observation Program Copernicus as a contribution to the Global Earth Observation System of Systems (GEOSS) or global thematic data networks. As such, it is very important that data-related activities of the ENVRIs will be well integrated. This requires common policies, models and e-infrastructure to optimise technological implementation, define workflows, and ensure coordination, harmonisation, integration and interoperability of data, applications and other services. The key is interoperating common metadata systems (utilising a richer metadata model as the `switchboard' for interoperation with formal syntax and declared semantics). The metadata characterises data, services, users and ICT resources (including sensors and detectors). The European Cluster Project ENVRIplus has developed a reference model (ENVRI RM) for common data infrastructure architecture to promote interoperability among ENVRIs. The presentation will provide an overview of recent progress and give examples for the integration of ENVRI data in global integration networks.

  5. A novel critical infrastructure resilience assessment approach using dynamic Bayesian networks

    Science.gov (United States)

    Cai, Baoping; Xie, Min; Liu, Yonghong; Liu, Yiliu; Ji, Renjie; Feng, Qiang

    2017-10-01

    The word resilience originally originates from the Latin word "resiliere", which means to "bounce back". The concept has been used in various fields, such as ecology, economics, psychology, and society, with different definitions. In the field of critical infrastructure, although some resilience metrics are proposed, they are totally different from each other, which are determined by the performances of the objects of evaluation. Here we bridge the gap by developing a universal critical infrastructure resilience metric from the perspective of reliability engineering. A dynamic Bayesian networks-based assessment approach is proposed to calculate the resilience value. A series, parallel and voting system is used to demonstrate the application of the developed resilience metric and assessment approach.

  6. Windows 2012 Server network security securing your Windows network systems and infrastructure

    CERN Document Server

    Rountree, Derrick

    2013-01-01

    Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall

  7. Monitoring the US ATLAS Network Infrastructure with perfSONAR-PS

    CERN Document Server

    McKee, S; The ATLAS collaboration; Laurens, P; Severini, H; Wlodek, T; Wolff, S; Zurawski, J

    2012-01-01

    Global scientific collaborations, such as ATLAS, continue to push the network requirements envelope. Data movement in this collaboration is routinely including the regular exchange of petabytes of datasets between the collection and analysis facilities in the coming years. These requirements place a high emphasis on networks functioning at peak efficiency and availability; the lack thereof could mean critical delays in the overall scientific progress of distributed data-intensive experiments like ATLAS. Network operations staff routinely must deal with problems deep in the infrastructure; this may be as benign as replacing a failing piece of equipment, or as complex as dealing with a multidomain path that is experiencing data loss. In either case, it is crucial that effective monitoring and performance analysis tools are available to ease the burden of management. We will report on our experiences deploying and using the perfSONAR-PS Performance Toolkit[8] at ATLAS sites in the United States. This software cr...

  8. Spatio-temporal model based optimization framework to design future hydrogen infrastructure networks

    International Nuclear Information System (INIS)

    Konda, N.V.S.; Shah, N.; Brandon, N.P.

    2009-01-01

    A mixed integer programming (MIP) spatio-temporal model was used to design hydrogen infrastructure networks for the Netherlands. The detailed economic analysis was conducted using a multi-echelon model of the entire hydrogen supply chain, including feed, production, storage, and transmission-distribution systems. The study considered various near-future and commercially available technologies. A multi-period model was used to design evolutionary hydrogen supply networks in coherence with growing demand. A scenario-based analysis was conducted in order to account for uncertainties in future demand. The study showed that competitive hydrogen networks can be designed for any conceivable scenario. It was concluded that the multi-period model presented significant advantages in relation to decision-making over long time-horizons

  9. Report by the study committee related to data held by energy network and infrastructure managers

    International Nuclear Information System (INIS)

    2017-01-01

    This study aimed at providing a view of the status of data related to energy and held by network and infrastructure managers and operators. It is notably based on about fifty hearings of regulated energy operators, providers, representatives of electricity producers, local authorities, representatives of public bodies awarding concession and exploitation, and consumer associations. The authors also met heat and water network operators, IT service companies, start-ups of the energy sector, and telecommunications operators, and representatives of French and European institutional bodies. Fifteen propositions have been formulated which address the imperative of data consistence, quality and inter-operability, the clarification of the game of actors for an efficient governance of networks, the necessity of a consolidated confidence of consumers regarding the management of their data, and the activities of regulation (readability of analysis criteria, predictability of the resulting action)

  10. Modeling complexity in engineered infrastructure system: Water distribution network as an example

    Science.gov (United States)

    Zeng, Fang; Li, Xiang; Li, Ke

    2017-02-01

    The complex topology and adaptive behavior of infrastructure systems are driven by both self-organization of the demand and rigid engineering solutions. Therefore, engineering complex systems requires a method balancing holism and reductionism. To model the growth of water distribution networks, a complex network model was developed following the combination of local optimization rules and engineering considerations. The demand node generation is dynamic and follows the scaling law of urban growth. The proposed model can generate a water distribution network (WDN) similar to reported real-world WDNs on some structural properties. Comparison with different modeling approaches indicates that a realistic demand node distribution and co-evolvement of demand node and network are important for the simulation of real complex networks. The simulation results indicate that the efficiency of water distribution networks is exponentially affected by the urban growth pattern. On the contrary, the improvement of efficiency by engineering optimization is limited and relatively insignificant. The redundancy and robustness, on another aspect, can be significantly improved through engineering methods.

  11. Equipment Management for Sensor Networks: Linking Physical Infrastructure and Actions to Observational Data

    Science.gov (United States)

    Jones, A. S.; Horsburgh, J. S.; Matos, M.; Caraballo, J.

    2015-12-01

    Networks conducting long term monitoring using in situ sensors need the functionality to track physical equipment as well as deployments, calibrations, and other actions related to site and equipment maintenance. The observational data being generated by sensors are enhanced if direct linkages to equipment details and actions can be made. This type of information is typically recorded in field notebooks or in static files, which are rarely linked to observations in a way that could be used to interpret results. However, the record of field activities is often relevant to analysis or post-processing of the observational data. We have developed an underlying database schema and deployed a web interface for recording and retrieving information on physical infrastructure and related actions for observational networks. The database schema for equipment was designed as an extension to the Observations Data Model 2 (ODM2), a community-developed information model for spatially discrete, feature based earth observations. The core entities of ODM2 describe location, observed variable, and timing of observations, and the equipment extension contains entities to provide additional metadata specific to the inventory of physical infrastructure and associated actions. The schema is implemented in a relational database system for storage and management with an associated web interface. We designed the web-based tools for technicians to enter and query information on the physical equipment and actions such as site visits, equipment deployments, maintenance, and calibrations. These tools were implemented for the iUTAH (innovative Urban Transitions and Aridregion Hydrosustainability) ecohydrologic observatory, and we anticipate that they will be useful for similar large-scale monitoring networks desiring to link observing infrastructure to observational data to increase the quality of sensor-based data products.

  12. Mechanisms of protection of information in computer networks and systems

    Directory of Open Access Journals (Sweden)

    Sergey Petrovich Evseev

    2011-10-01

    Full Text Available Protocols of information protection in computer networks and systems are investigated. The basic types of threats of infringement of the protection arising from the use of computer networks are classified. The basic mechanisms, services and variants of realization of cryptosystems for maintaining authentication, integrity and confidentiality of transmitted information are examined. Their advantages and drawbacks are described. Perspective directions of development of cryptographic transformations for the maintenance of information protection in computer networks and systems are defined and analyzed.

  13. The quest for the oil and gas infrastructure protection in central Asia : time bombs and policy options

    Energy Technology Data Exchange (ETDEWEB)

    Bi, J. [Carleton Univ., Ottawa, ON (Canada). Norman Paterson School of International Affairs

    2006-03-15

    The growing economies of China and India have increased global anxieties over dwindling fossil fuel resources. Regional countries in central Asia have advocated for more extensive strategic partnerships within the oil and gas industry as insurance against the pressures of more powerful nations. However, non-traditional threats such as terrorism raise serious questions about critical oil and gas infrastructure protection in central Asia. This paper assessed the vulnerability and threats inherent in protecting the critical oil and gas infrastructure of Central Asia, with a specific focus on Kazakhstan, Turkmenistan, Uzbekistan, and the region of Xinjiang in China. An-depth analysis of the development strategies, terrorist threats, and water issues confronted by Central Asian powers was conducted to demonstrate their vulnerability. The analysis was then used to consider options available for managing oil and gas infrastructure in the regions. It was observed that different perceptions and technological difficulties have made cooperation on critical oil and gas infrastructure protection less important than national sovereignty and domestic stability. It was concluded that a low-key approach to homeland security and oil and gas infrastructure may be the best strategy for Central Asia and China. 44 refs.

  14. Corrosion Protection of Launch Infrastructure and Hardware Through the Space Shuttle Program

    Science.gov (United States)

    Calle, L. M.

    2011-01-01

    Corrosion, the environmentally induced degradation of materials, has been a challenging and costly problem that has affected NASA's launch operations since the inception of the Space Program. Corrosion studies began at NASA's Kennedy Space Center (KSC) in 1966 during the Gemini/Apollo Programs with the evaluation of long-term protective coatings for the atmospheric protection of carbon steel. NASA's KSC Beachside Corrosion Test Site, which has been documented by the American Society of Materials (ASM) as one of the most corrosive, naturally occurring environments in the world, was established at that time. With the introduction of the Space Shuttle in 1981, the already highly corrosive natural conditions at the launch pad were rendered even more severe by the acidic exhaust from the solid rocket boosters. In the years that followed, numerous efforts at KSC identified materials, coatings, and maintenance procedures for launch hardware and equipment exposed to the highly corrosiye environment at the launch pads. Knowledge on materials degradation, obtained by facing the highly corrosive conditions of the Space Shuttle launch environment, as well as limitations imposed by the environmental impact of corrosion control, have led researchers at NASA's Corrosion Technology Laboratory to establish a new technology development capability in the area of corrosion prevention, detection, and mitigation at KSC that is included as one of the "highest priority" technologies identified by NASA's integrated technology roadmap. A historical perspective highlighting the challenges encountered in protecting launch infrastructure and hardware from corrosion during the life of the Space Shuttle program and the new technological advances that have resulted from facing the unique and highly corrosive conditions of the Space Shuttle launch environment will be presented.

  15. Resilience of Networked Infrastructure with Evolving Component Conditions: Pavement Network Application

    DEFF Research Database (Denmark)

    Levenberg, Eyal; Miller-Hooks, Elise; Asadabadi, Ali

    2017-01-01

    This paper deals with quantifying the resilience of a network of pavements. Calculations were carried out by modeling network performance under a set of possible damage-meteorological scenarios with known probability of occurrence. Resilience evaluation was performed a priori while accounting...

  16. Assessing needs and assets for building a regional network infrastructure to reduce cancer related health disparities.

    Science.gov (United States)

    Wells, Kristen J; Lima, Diana S; Meade, Cathy D; Muñoz-Antonia, Teresita; Scarinci, Isabel; McGuire, Allison; Gwede, Clement K; Pledger, W Jack; Partridge, Edward; Lipscomb, Joseph; Matthews, Roland; Matta, Jaime; Flores, Idhaliz; Weiner, Roy; Turner, Timothy; Miele, Lucio; Wiese, Thomas E; Fouad, Mona; Moreno, Carlos S; Lacey, Michelle; Christie, Debra W; Price-Haywood, Eboni G; Quinn, Gwendolyn P; Coppola, Domenico; Sodeke, Stephen O; Green, B Lee; Lichtveld, Maureen Y

    2014-06-01

    Significant cancer health disparities exist in the United States and Puerto Rico. While numerous initiatives have been implemented to reduce cancer disparities, regional coordination of these efforts between institutions is often limited. To address cancer health disparities nation-wide, a series of regional transdisciplinary networks through the Geographic Management Program (GMaP) and the Minority Biospecimen/Biobanking Geographic Management Program (BMaP) were established in six regions across the country. This paper describes the development of the Region 3 GMaP/BMaP network composed of over 100 investigators from nine institutions in five Southeastern states and Puerto Rico to develop a state-of-the-art network for cancer health disparities research and training. We describe a series of partnership activities that led to the formation of the infrastructure for this network, recount the participatory processes utilized to develop and implement a needs and assets assessment and implementation plan, and describe our approach to data collection. Completion, by all nine institutions, of the needs and assets assessment resulted in several beneficial outcomes for Region 3 GMaP/BMaP. This network entails ongoing commitment from the institutions and institutional leaders, continuous participatory and engagement activities, and effective coordination and communication centered on team science goals. Copyright © 2014 Elsevier Ltd. All rights reserved.

  17. Wireless Infrastructure M2M Network For Distributed Power Grid Monitoring.

    Science.gov (United States)

    Gharavi, Hamid; Hu, Bin

    2017-01-01

    With the massive integration of distributed renewable energy sources (RESs) into the power system, the demand for timely and reliable network quality monitoring, control, and fault analysis is rapidly growing. Following the successful deployment of Phasor Measurement Units (PMUs) in transmission systems for power monitoring, a new opportunity to utilize PMU measurement data for power quality assessment in distribution grid systems is emerging. The main problem however, is that a distribution grid system does not normally have the support of an infrastructure network. Therefore, the main objective in this paper is to develop a Machine-to-Machine (M2M) communication network that can support wide ranging sensory data, including high rate synchrophasor data for real-time communication. In particular, we evaluate the suitability of the emerging IEEE 802.11ah standard by exploiting its important features, such as classifying the power grid sensory data into different categories according to their traffic characteristics. For performance evaluation we use our hardware in the loop grid communication network testbed to access the performance of the network.

  18. Assessing Needs and Assets for Building a Regional Network Infrastructure to Reduce Cancer Related Health Disparities

    Science.gov (United States)

    Wells, Kristen J.; Lima, Diana S.; Meade, Cathy D.; Muñoz-Antonia, Teresita; Scarinci, Isabel; McGuire, Allison; Gwede, Clement K.; Pledger, W. Jack; Partridge, Edward; Lipscomb, Joseph; Matthews, Roland; Matta, Jaime; Flores, Idhaliz; Weiner, Roy; Turner, Timothy; Miele, Lucio; Wiese, Thomas E.; Fouad, Mona; Moreno, Carlos S.; Lacey, Michelle; Christie, Debra W.; Price-Haywood, Eboni G.; Quinn, Gwendolyn P.; Coppola, Domenico; Sodeke, Stephen O.; Green, B. Lee; Lichtveld, Maureen Y.

    2015-01-01

    Significant cancer health disparities exist in the United States and Puerto Rico. While numerous initiatives have been implemented to reduce cancer disparities, regional coordination of these efforts between institutions is often limited. To address cancer health disparities nationwide, a series of regional transdisciplinary networks through the Geographic Management Program (GMaP) and the Minority Biospecimen/Biobanking Geographic Management Program (BMaP) were established in six regions across the country. This paper describes the development of the Region 3 GMaP/BMaP network composed of over 100 investigators from nine institutions in five Southeastern states and Puerto Rico to develop a state-of-the-art network for cancer health disparities research and training. We describe a series of partnership activities that led to the formation of the infrastructure for this network, recount the participatory processes utilized to develop and implement a needs and assets assessment and implementation plan, and describe our approach to data collection. Completion, by all nine institutions, of the needs and assets assessment resulted in several beneficial outcomes for Region 3 GMaP/BMaP. This network entails ongoing commitment from the institutions and institutional leaders, continuous participatory and engagement activities, and effective coordination and communication centered on team science goals. PMID:24486917

  19. Transportation Systems: Critical Infrastructure and Key Resources Sector-Specific Plan as Input to the National Infrastructure Protection Plan

    Science.gov (United States)

    2007-05-01

    partners will be encouraged to use the assessment methodologies referenced above, or ISO 27001 and ISO 17799, which are intended to be used together...the Information Systems Audit and Control Association (ISACA), the International Organization for Standardization ( ISO ), and a number of other...programs are aligned with NCSD’s goals for the IT sector and follow best practices developed by NIST and the ISO . The cyber protective programs

  20. Metadata and network API aspects of a framework for storing and retrieving civil infrastructure monitoring data

    Science.gov (United States)

    Wong, John-Michael; Stojadinovic, Bozidar

    2005-05-01

    A framework has been defined for storing and retrieving civil infrastructure monitoring data over a network. The framework consists of two primary components: metadata and network communications. The metadata component provides the descriptions and data definitions necessary for cataloging and searching monitoring data. The communications component provides Java classes for remotely accessing the data. Packages of Enterprise JavaBeans and data handling utility classes are written to use the underlying metadata information to build real-time monitoring applications. The utility of the framework was evaluated using wireless accelerometers on a shaking table earthquake simulation test of a reinforced concrete bridge column. The NEESgrid data and metadata repository services were used as a backend storage implementation. A web interface was created to demonstrate the utility of the data model and provides an example health monitoring application.

  1. APPLICATION OF UKRAINIAN GRID INFRASTRUCTURE FOR INVESTIGATION OF NONLINEAR DYNAMICS IN LARGE NEURONAL NETWORKS

    Directory of Open Access Journals (Sweden)

    O. О. Sudakov

    2015-12-01

    Full Text Available In present work the Ukrainian National Grid (UNG infrastructure was applied for investigation of synchronization in large networks of interacting neurons. This application is important for solving of modern neuroscience problems related to mechanisms of nervous system activities (memory, cognition etc. and nervous pathologies (epilepsy, Parkinsonism, etc.. Modern non-linear dynamics theories and applications provides powerful basis for computer simulations of biological neuronal networks and investigation of phenomena which mechanisms hardly could be clarified by other approaches. Cubic millimeter of brain tissue contains about 105 neurons, so realistic (Hodgkin-Huxley model and phenomenological (Kuramoto-Sakaguchi, FitzHugh-Nagumo, etc. models simulations require consideration of large neurons numbers.

  2. An intrusion prevention system as a proactive security mechanism in network infrastructure

    Directory of Open Access Journals (Sweden)

    Dulanović Nenad

    2008-01-01

    Full Text Available A properly configured firewall is a good starting point in securing a computer network. However, complex network environments that involve higher number of participants and endpoints require better security infrastructure. Intrusion Detection Systems (IDS, proposed as a solution to perimeter defense, have many open problems and it is clear that better solutions must be found. Due to many unsolved problems associated with IDS, Intrusion Prevention Systems (IPS are introduced. The main idea in IPS is to be proactive. This paper gives an insight of Cobrador Bouncer IPS implementation. System architecture is given and three different Bouncer IPS deployment modes are presented. The Bouncer IPS as a proactive honeypot is also discussed.

  3. Steps to implement the legal and regulatory infrastructure for physical protection of nuclear material in Peru

    International Nuclear Information System (INIS)

    Ramirez Quijada, R.

    2001-01-01

    Full text: The signature of Peru to become part of the Convention of Physical Protection of Nuclear Material in 1995 has implied an obligation to formalize the legal and regulatory infrastructure for this purpose. As first step, physical protection measures were formalized on the two nuclear facilities: one critical assembly of zero power (RP0) and another research reactor of 10 Mw thermal power (RP10). Both of the installations use low enriched uranium nuclear fuel (Material and Testing Material - MTR type). On the other side, even thorium was put in perspective to control; currently it is being used for non-nuclear purposes and has not been included inside the physical protection measures. Its physical and chemical form and its small quantity do not warrant for applying the Convention. The physical protection measures implemented in the research reactor are well depicted and it is concluded that the physical protection system meets the recommendations of INFCIRC/225/Rev.3. The critical facility (RP0), as having nuclear material categorized III, has implemented a less restrictive system but enough to meet the requirements. In 1999 an evaluation of all physical protection systems was performed for these two nuclear installations. This evaluation took into account the recommendations of INFCIRC/225/Rev.4. The general conclusion was that the performance of physical protection system was suitable to the categories of nuclear material - II and III - and that the installations where nuclear material is used were suitably protected against non-authorized or illegal removal of nuclear material and sabotage. However, some of components of the system were not appropriately working and could make all of the system weak. Another of the identified problems was the lack of a rule on physical protection and also the lack of the Design Basis Threat, although this fact was well known due the social conditions in the country. The second undertaking has been to prepare the rule on

  4. Quantifying the benefits of urban forest systems as a component of the green infrastructure stormwater treatment network

    Science.gov (United States)

    Eric Kuehler; Jon Hathaway; Andrew Tirpak

    2017-01-01

    The use of green infrastructure for reducing stormwater runoff is increasingly common. One under‐studied component of the green infrastructure network is the urban forest system. Trees can play an important role as the “first line of defense” for restoring more natural hydrologic regimes in urban watersheds by intercepting rainfall, delaying runoff, infiltrating, and...

  5. Sequential planning of flood protection infrastructure under limited historic flood record and climate change uncertainty

    Science.gov (United States)

    Dittes, Beatrice; Špačková, Olga; Straub, Daniel

    2017-04-01

    Flood protection is often designed to safeguard people and property following regulations and standards, which specify a target design flood protection level, such as the 100-year flood level prescribed in Germany (DWA, 2011). In practice, the magnitude of such an event is only known within a range of uncertainty, which is caused by limited historic records and uncertain climate change impacts, among other factors (Hall & Solomatine, 2008). As more observations and improved climate projections become available in the future, the design flood estimate changes and the capacity of the flood protection may be deemed insufficient at a future point in time. This problem can be mitigated by the implementation of flexible flood protection systems (that can easily be adjusted in the future) and/or by adding an additional reserve to the flood protection, i.e. by applying a safety factor to the design. But how high should such a safety factor be? And how much should the decision maker be willing to pay to make the system flexible, i.e. what is the Value of Flexibility (Špačková & Straub, 2017)? We propose a decision model that identifies cost-optimal decisions on flood protection capacity in the face of uncertainty (Dittes et al. 2017). It considers sequential adjustments of the protection system during its lifetime, taking into account its flexibility. The proposed framework is based on pre-posterior Bayesian decision analysis, using Decision Trees and Markov Decision Processes, and is fully quantitative. It can include a wide range of uncertainty components such as uncertainty associated with limited historic record or uncertain climate or socio-economic change. It is shown that since flexible systems are less costly to adjust when flood estimates are changing, they justify initially lower safety factors. Investigation on the Value of Flexibility (VoF) demonstrates that VoF depends on the type and degree of uncertainty, on the learning effect (i.e. kind and quality of

  6. Compassionate use of interventions: results of a European Clinical Research Infrastructures Network (ECRIN) survey of ten European countries

    LENUS (Irish Health Repository)

    Whitfield, Kate

    2010-11-12

    Abstract Background \\'Compassionate use\\' programmes allow medicinal products that are not authorised, but are in the development process, to be made available to patients with a severe disease who have no other satisfactory treatment available to them. We sought to understand how such programmes are regulated in ten European Union countries. Methods The European Clinical Research Infrastructures Network (ECRIN) conducted a comprehensive survey on clinical research regulatory requirements, including questions on regulations of \\'compassionate use\\' programmes. Ten European countries, covering approximately 70% of the EU population, were included in the survey (Austria, Denmark, France, Germany, Hungary, Ireland, Italy, Spain, Sweden, and the UK). Results European Regulation 726\\/2004\\/EC is clear on the intentions of \\'compassionate use\\' programmes and aimed to harmonise them in the European Union. The survey reveals that different countries have adopted different requirements and that \\'compassionate use\\' is not interpreted in the same way across Europe. Four of the ten countries surveyed have no formal regulatory system for the programmes. We discuss the need for \\'compassionate use\\' programmes and their regulation where protection of patients is paramount. Conclusions \\'Compassionate use\\' is a misleading term and should be replaced with \\'expanded access\\'. There is a need for expanded access programmes in order to serve the interests of seriously ill patients who have no other treatment options. To protect these patients, European legislation needs to be more explicit and informative with regard to the regulatory requirements, restrictions, and responsibilities in expanded access programmes.

  7. Compassionate use of interventions: results of a European Clinical Research Infrastructures Network (ECRIN) survey of ten European countries

    Science.gov (United States)

    2010-01-01

    Background 'Compassionate use' programmes allow medicinal products that are not authorised, but are in the development process, to be made available to patients with a severe disease who have no other satisfactory treatment available to them. We sought to understand how such programmes are regulated in ten European Union countries. Methods The European Clinical Research Infrastructures Network (ECRIN) conducted a comprehensive survey on clinical research regulatory requirements, including questions on regulations of 'compassionate use' programmes. Ten European countries, covering approximately 70% of the EU population, were included in the survey (Austria, Denmark, France, Germany, Hungary, Ireland, Italy, Spain, Sweden, and the UK). Results European Regulation 726/2004/EC is clear on the intentions of 'compassionate use' programmes and aimed to harmonise them in the European Union. The survey reveals that different countries have adopted different requirements and that 'compassionate use' is not interpreted in the same way across Europe. Four of the ten countries surveyed have no formal regulatory system for the programmes. We discuss the need for 'compassionate use' programmes and their regulation where protection of patients is paramount. Conclusions 'Compassionate use' is a misleading term and should be replaced with 'expanded access'. There is a need for expanded access programmes in order to serve the interests of seriously ill patients who have no other treatment options. To protect these patients, European legislation needs to be more explicit and informative with regard to the regulatory requirements, restrictions, and responsibilities in expanded access programmes. PMID:21073691

  8. On imperfect node protection in complex communication networks

    International Nuclear Information System (INIS)

    Xiao Shi; Xiao Gaoxi

    2011-01-01

    Motivated by recent research on complex networks, we study enhancing complex communication networks against intentional attack which takes down network nodes in a decreasing order of their degrees. Specifically, we evaluate an effect which has been largely ignored in existing studies; many real-life systems, especially communication systems, have protection mechanisms for their important components. Due to the existence of such protection, it is generally quite difficult to totally crash a protected node, though partially paralyzing it may still be feasible. Our analytical and simulation results show that such 'imperfect' protections generally speaking still help significantly enhance network robustness. Such insight may be helpful for the future developments of efficient network attack and protection schemes.

  9. On imperfect node protection in complex communication networks

    Energy Technology Data Exchange (ETDEWEB)

    Xiao Shi [Hubei Province Key Laboratory of Intelligent Robot and School of Computer Science and Engineering, Wuhan Institute of Technology, Wuhan 430073 (China); Xiao Gaoxi, E-mail: xiao_moon2002@yahoo.com.cn, E-mail: egxxiao@ntu.edu.sg [Division of Communication Engineering, School of Electrical and Electronic Engineering, Nanyang Technological University, 639798 (Singapore)

    2011-02-04

    Motivated by recent research on complex networks, we study enhancing complex communication networks against intentional attack which takes down network nodes in a decreasing order of their degrees. Specifically, we evaluate an effect which has been largely ignored in existing studies; many real-life systems, especially communication systems, have protection mechanisms for their important components. Due to the existence of such protection, it is generally quite difficult to totally crash a protected node, though partially paralyzing it may still be feasible. Our analytical and simulation results show that such 'imperfect' protections generally speaking still help significantly enhance network robustness. Such insight may be helpful for the future developments of efficient network attack and protection schemes.

  10. Noise-tolerant inverse analysis models for nondestructive evaluation of transportation infrastructure systems using neural networks

    Science.gov (United States)

    Ceylan, Halil; Gopalakrishnan, Kasthurirangan; Birkan Bayrak, Mustafa; Guclu, Alper

    2013-09-01

    The need to rapidly and cost-effectively evaluate the present condition of pavement infrastructure is a critical issue concerning the deterioration of ageing transportation infrastructure all around the world. Nondestructive testing (NDT) and evaluation methods are well-suited for characterising materials and determining structural integrity of pavement systems. The falling weight deflectometer (FWD) is a NDT equipment used to assess the structural condition of highway and airfield pavement systems and to determine the moduli of pavement layers. This involves static or dynamic inverse analysis (referred to as backcalculation) of FWD deflection profiles in the pavement surface under a simulated truck load. The main objective of this study was to employ biologically inspired computational systems to develop robust pavement layer moduli backcalculation algorithms that can tolerate noise or inaccuracies in the FWD deflection data collected in the field. Artificial neural systems, also known as artificial neural networks (ANNs), are valuable computational intelligence tools that are increasingly being used to solve resource-intensive complex engineering problems. Unlike the linear elastic layered theory commonly used in pavement layer backcalculation, non-linear unbound aggregate base and subgrade soil response models were used in an axisymmetric finite element structural analysis programme to generate synthetic database for training and testing the ANN models. In order to develop more robust networks that can tolerate the noisy or inaccurate pavement deflection patterns in the NDT data, several network architectures were trained with varying levels of noise in them. The trained ANN models were capable of rapidly predicting the pavement layer moduli and critical pavement responses (tensile strains at the bottom of the asphalt concrete layer, compressive strains on top of the subgrade layer and the deviator stresses on top of the subgrade layer), and also pavement

  11. Optimizing End-to-End Big Data Transfers over Terabits Network Infrastructure

    International Nuclear Information System (INIS)

    Kim, Youngjae; Vallee, Geoffroy R.; Lee, Sangkeun; Shipman, Galen M.

    2016-01-01

    While future terabit networks hold the promise of significantly improving big-data motion among geographically distributed data centers, significant challenges must be overcome even on today's 100 gigabit networks to realize end-to-end performance. Multiple bottlenecks exist along the end-to-end path from source to sink, for instance, the data storage infrastructure at both the source and sink and its interplay with the wide-area network are increasingly the bottleneck to achieving high performance. In this study, we identify the issues that lead to congestion on the path of an end-to-end data transfer in the terabit network environment, and we present a new bulk data movement framework for terabit networks, called LADS. LADS exploits the underlying storage layout at each endpoint to maximize throughput without negatively impacting the performance of shared storage resources for other users. LADS also uses the Common Communication Interface (CCI) in lieu of the sockets interface to benefit from hardware-level zero-copy, and operating system bypass capabilities when available. It can further improve data transfer performance under congestion on the end systems using buffering at the source using flash storage. With our evaluations, we show that LADS can avoid congested storage elements within the shared storage resource, improving input/output bandwidth, and data transfer rates across the high speed networks. We also investigate the performance degradation problems of LADS due to I/O contention on the parallel file system (PFS), when multiple LADS tools share the PFS. We design and evaluate a meta-scheduler to coordinate multiple I/O streams while sharing the PFS, to minimize the I/O contention on the PFS. Finally, with our evaluations, we observe that LADS with meta-scheduling can further improve the performance by up to 14 percent relative to LADS without meta-scheduling.

  12. Employing a secure Virtual Private Network (VPN) infrastructure as a global command and control gateway to dynamically connect and disconnect diverse forces on a task-force-by-task-force basis

    OpenAIRE

    Kilcrease, Patrick N.

    2009-01-01

    Approved for public release, distribution unlimited GHOSTNet is a secure and anonymous Virtual Private Network (VPN) service. Coupling Ethernet tunneling and proxy services to provide users safe and anonymous Internet access, GHOSTNet utilizes TLS (SSL) protocol with AES-256 encryption to secure the network along with PKI certificates and HMAC protection from replay attacks and UDP flooding. This thesis will be a system level test and evaluation of the GHOSTNet infrastructure. The primary...

  13. The development of network infrastructure in rural areas and problems in applying IT to the medical field.

    Science.gov (United States)

    Ooe, Yosuke; Anamizu, Hiromitsu; Tatsumi, Haruyuki; Tanaka, Hiroshi

    2008-07-01

    The financial condition of the Japanese health insurance system is said to be compounded with the aging of the population. The government argues that the application of IT and networking is required in order to streamline health care services while avoiding its collapse. The Internet environment has been furnished with broadband connection and multimedia in the span of one year or shorter, and is becoming more and more convenient. It is true that the Internet is now a part of Tokyo's infrastructure along with electricity and water supply, as it is the center of politics. However, in local cities, development of the Internet environment is still insufficient. In order to use the network as a common infrastructure at health care facilities, we need to be aware of this digital divide. This study investigated the development status of network infrastructure in regional cities.

  14. Quantifying the digital divide: a scientific overview of network connectivity and grid infrastructure in South Asian countries

    International Nuclear Information System (INIS)

    Khan, S M; Cottrell, R L; Kalim, U; Ali, A

    2008-01-01

    The future of Computing in High Energy Physics (HEP) applications depends on both the Network and Grid infrastructure. South Asian countries such as India and Pakistan are making significant progress by building clusters as well as improving their network infrastructure However to facilitate the use of these resources, they need to manage the issues of network connectivity to be among the leading participants in Computing for HEP experiments. In this paper we classify the connectivity for academic and research institutions of South Asia. The quantitative measurements are carried out using the PingER methodology; an approach that induces minimal ICMP traffic to gather active end-to-end network statistics. The PingER project has been measuring the Internet performance for the last decade. Currently the measurement infrastructure comprises of over 700 hosts in more than 130 countries which collectively represents approximately 99% of the world's Internet-connected population. Thus, we are well positioned to characterize the world's connectivity. Here we present the current state of the National Research and Educational Networks (NRENs) and Grid Infrastructure in the South Asian countries and identify the areas of concern. We also present comparisons between South Asia and other developing as well as developed regions. We show that there is a strong correlation between the Network performance and several Human Development indices

  15. Quantifying the Digital Divide: A Scientific Overview of Network Connectivity and Grid Infrastructure in South Asian Countries

    International Nuclear Information System (INIS)

    Khan, Shahryar Muhammad; Cottrell, R. Les; Kalim, Umar; Ali, Arshad

    2007-01-01

    The future of Computing in High Energy Physics (HEP) applications depends on both the Network and Grid infrastructure. South Asian countries such as India and Pakistan are making significant progress by building clusters as well as improving their network infrastructure However to facilitate the use of these resources, they need to manage the issues of network connectivity to be among the leading participants in Computing for HEP experiments. In this paper we classify the connectivity for academic and research institutions of South Asia. The quantitative measurements are carried out using the PingER methodology; an approach that induces minimal ICMP traffic to gather active end-to-end network statistics. The PingER project has been measuring the Internet performance for the last decade. Currently the measurement infrastructure comprises of over 700 hosts in more than 130 countries which collectively represents approximately 99% of the world's Internet-connected population. Thus, we are well positioned to characterize the world's connectivity. Here we present the current state of the National Research and Educational Networks (NRENs) and Grid Infrastructure in the South Asian countries and identify the areas of concern. We also present comparisons between South Asia and other developing as well as developed regions. We show that there is a strong correlation between the Network performance and several Human Development indices

  16. Organization and implementation of a national regulatory infrastructure governing protection against ionizing radiation and the safety of radiation sources. Interim report for comment

    International Nuclear Information System (INIS)

    1999-02-01

    A number of IAEA Member States are undertaking to strengthen their radiation protection and safety infrastructures in order to facilitate the adoption of the requirements established in the International Basic Safety Standards for Protection against Ionizing Radiation and for the Safety of Radiation Sources (the Standards). In this connection, the IAEA has developed a technical co-operation programme (Model Project on Upgrading Radiation Protection Infrastructure) to improve radiation protection and safety infrastructures in 51 Member States, taking into account national profiles and needs of the individual participating, countries. The present report deals with the elements of a regulatory infrastructure for radiation protection and safety and intends to facilitate the, implementation of the Basic Safety Standards in practice. It takes into account the proposals in an earlier report, IAEA-TECDOC-663, but it has been expanded to include enabling legislation and modified to be more attuned to infrastructure issues related to implementation of the Standards. The orientation is toward infrastructures concerned with protection and safety for radiation sources used in medicine, agriculture, research, industry and education rather than infrastructures for protection and safety for complex nuclear facilities. It also discusses options for enhancing the effectiveness and efficiency of the infrastructure in accordance with the size and scope of radiation practices and available regulatory resources within a country

  17. Using Wireless Sensor Networks and Trains as Data Mules to Monitor Slab Track Infrastructures.

    Science.gov (United States)

    Cañete, Eduardo; Chen, Jaime; Díaz, Manuel; Llopis, Luis; Reyna, Ana; Rubio, Bartolomé

    2015-06-26

    Recently, slab track systems have arisen as a safer and more sustainable option for high speed railway infrastructures, compared to traditional ballasted tracks. Integrating Wireless Sensor Networks within these infrastructures can provide structural health related data that can be used to evaluate their degradation and to not only detect failures but also to predict them. The design of such systems has to deal with a scenario of large areas with inaccessible zones, where neither Internet coverage nor electricity supply is guaranteed. In this paper we propose a monitoring system for slab track systems that measures vibrations and displacements in the track. Collected data is transmitted to passing trains, which are used as data mules to upload the information to a remote control center. On arrival at the station, the data is stored in a database, which is queried by an application in order to detect and predict failures. In this paper, different communication architectures are designed and tested to select the most suitable system meeting such requirements as efficiency, low cost and data accuracy. In addition, to ensure communication between the sensing devices and the train, the communication system must take into account parameters such as train speed, antenna coverage, band and frequency.

  18. Using Wireless Sensor Networks and Trains as Data Mules to Monitor Slab Track Infrastructures

    Directory of Open Access Journals (Sweden)

    Eduardo Cañete

    2015-06-01

    Full Text Available Recently, slab track systems have arisen as a safer and more sustainable option for high speed railway infrastructures, compared to traditional ballasted tracks. Integrating Wireless Sensor Networks within these infrastructures can provide structural health related data that can be used to evaluate their degradation and to not only detect failures but also to predict them. The design of such systems has to deal with a scenario of large areas with inaccessible zones, where neither Internet coverage nor electricity supply is guaranteed. In this paper we propose a monitoring system for slab track systems that measures vibrations and displacements in the track. Collected data is transmitted to passing trains, which are used as data mules to upload the information to a remote control center. On arrival at the station, the data is stored in a database, which is queried by an application in order to detect and predict failures. In this paper, different communication architectures are designed and tested to select the most suitable system meeting such requirements as efficiency, low cost and data accuracy. In addition, to ensure communication between the sensing devices and the train, the communication system must take into account parameters such as train speed, antenna coverage, band and frequency.

  19. The Navajo Learning Network and the NASA Life Sciences/AFOSR Infrastructure Development Project

    Science.gov (United States)

    1999-01-01

    The NSF-funded Navajo Learning Network project, with help from NASA Life Sciences and AFOSR, enabled Dine College to take a giant leap forward technologically - in a way that could never had been possible had these projects been managed separately. The combination of these and other efforts created a network of over 500 computers located at ten sites across the Navajo reservation. Additionally, the college was able to install a modern telephone system which shares network data, and purchase a new higher education management system. The NASA Life Sciences funds further allowed the college library system to go online and become available to the entire campus community. NSF, NASA and AFOSR are committed to improving minority access to higher education opportunities and promoting faculty development and undergraduate research through infrastructure support and development. This project has begun to address critical inequalities in access to science, mathematics, engineering and technology for Navajo students and educators. As a result, Navajo K-12 education has been bolstered and Dine College will therefore better prepare students to transfer successfully to four-year institutions. Due to the integration of the NSF and NASA/AFOSR components of the project, a unified project report is appropriate.

  20. The construction of a public key infrastructure for healthcare information networks in Japan.

    Science.gov (United States)

    Sakamoto, N

    2001-01-01

    The digital signature is a key technology in the forthcoming Internet society for electronic healthcare as well as for electronic commerce. Efficient exchanges of authorized information with a digital signature in healthcare information networks require a construction of a public key infrastructure (PKI). In order to introduce a PKI to healthcare information networks in Japan, we proposed a development of a user authentication system based on a PKI for user management, user authentication and privilege management of healthcare information systems. In this paper, we describe the design of the user authentication system and its implementation. The user authentication system provides a certification authority service and a privilege management service while it is comprised of a user authentication client and user authentication serves. It is designed on a basis of an X.509 PKI and is implemented with using OpenSSL and OpenLDAP. It was incorporated into the financial information management system for the national university hospitals and has been successfully working for about one year. The hospitals plan to use it as a user authentication method for their whole healthcare information systems. One implementation of the system is free to the national university hospitals with permission of the Japanese Ministry of Education, Culture, Sports, Science and Technology. Another implementation is open to the other healthcare institutes by support of the Medical Information System Development Center (MEDIS-DC). We are moving forward to a nation-wide construction of a PKI for healthcare information networks based on it.

  1. Rehabilitation of a secondary network of forest traffic infrastructure (skid roads - skid trails

    Directory of Open Access Journals (Sweden)

    Bajrić Muhamed

    2015-01-01

    Full Text Available Forest transport infrastructure is the key segment of rational forest resource management. One of its constituent and inseparable segments are skid roads and skid trails whose network density significantly exceeds the primary network, i.e. truck roads. Skid road -skid trail network density in high economic forests of FB&H is most often between 40 and 100 m/ha. Simplified way of construction, non-existence of road construction, objects for surface water drainage as well as significant longitudinal inclination (up to 50% in which they are constructed, makes them subject to erosion processes. The lack of rehabilitation measures on skid roads - skid trails causes significant damages in post-exploitation period, and very often to the extent that the ones in the following exploitation round are unusable for skidding. Utilization of skid roads - skid trails damaged by erosion processes for forest operations often represents a significant expense. This paper considers rehabilitation measures efficient from the point of remedying erosion processes, and at the same time, acceptable from the point of financial expenditure for forest operations.

  2. Insurance and critical infrastructure protection : is there a connection in an environment of terrorism?

    International Nuclear Information System (INIS)

    Rowlands, D.; Devlin, R.A.

    2006-01-01

    This paper investigated the potential role of the insurance industry in enhancing the protection of critical energy infrastructure (CEI). This analysis was conducted in the context of increased concerns about deliberate acts of sabotage related to terrorist activities. A theoretical insurance market analysis was applied to a CEI scenario in order to examine the effects that insurance might have on the vulnerability of the system and subsequent remediation activities. Classical insurance market structures were examined, and problems associated with adverse selection, moral hazards and the role of government were identified. Issues concerning incentive effects induced by insurance were reviewed, as well as issues concerning the interdependence between different operators of the CEI system. An updated literature review was also provided. Results of the study suggested that corporate losses to CEI owners may be far less than the social cost of energy disruption, which in turn provides a reasonable rationale for government as opposed to private intervention. In terms of remediation, the immediate impact of a crippled CEI would overwhelm any private organization, and response would need to be coordinated through public structures. Terrorism insurance, while available, provides relatively large deductibles, as insurance companies are unwilling to accept the risks of moderate damage that may arise. There does not appear to be any evidence that private insurers will be able to provide significant relief from terrorist attacks, and it is unlikely that a private insurance market for terrorism will emerge. An absence of information regarding terrorist activities constrains both insurance purchasers from choosing the best mix of risk management tools, as well as insurance companies seeking to establish the appropriate pricing and conditions for different contracts. It was concluded that governments should support CEI firms in their own efforts to understand the threats; aid in

  3. Anonymous communication networks protecting privacy on the web

    CERN Document Server

    Peng, Kun

    2014-01-01

    In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.Addressing the demand for authoritative information on anonymous Internet usage, Anonymous Communication Networks: Protecting Privacy on the Web examines anonymous communication networks as a solution to Internet privacy concerns. It explains how anonymous communication networks make it possible for participants to communicate with

  4. The transmission tariff - the economic tool for the network infrastructure development

    International Nuclear Information System (INIS)

    Popescu, Vifor Bogdan; Cirlan, Florica; Mihailescu, Florentina

    2004-01-01

    The free access to the transmission network is one of the key elements of the electricity market development both at the national and regional levels. The operation of the electricity market needs the appropriate development of its basic infrastructure, the transmission network. In the frame work of the electricity market, the network ensures the electricity transmission under reliable conditions, from the generators to the suppliers and eligible consumers and creates market opportunities for its users. One of the main market tools, which may influence the optimal development of the network structure, by an efficient location signal of the large consumers and generators, is the pricing system. The overall costs of the Transmission System Operator (TSO) for providing the transmission service may be distinctly focused by categories as follows: - Costs of the existing transmission network (fixed costs), maintenance and operation costs, capital costs; - Costs of electricity losses (variable costs); - Development costs needed to eliminate the network congestion (variable costs). The recovery of all costs involved by the transmission service is based on regulated tariff system approved by ANRE. By the tariff system, the transmission and system operator aims both to cover the transmission service cost and provide locational signals for all market players which should lead to the efficient grid operation as well as to the optimal development of its structure. The tariff values reflect the polarization existing in the Romanian Power System (PS), namely: surplus power in the South area of the PS (4G zone) and a power deficit in the North areas of the PS (2G and 5G zones). Electricity demand is more evenly distributed in the territory than the electricity generated. This assertion is based on the following statement: - the tariffs value range of electricity delivered in the transmission network is wider, between 1.13 and 2.39 USD/MWh (51%) than the one related to the zones of

  5. Synthesis, Interdiction, and Protection of Layered Networks

    Science.gov (United States)

    2009-09-01

    Infrastructure: A Quantitative Geographic Perspective, 2006. 113. Lawrence V. Snyder, Maria P. Scaparra, Mark S. Daskin , and Richard L. Church. Planning for...09-01 Abstract This research developed the foundation, theory, and framework for a set of analysis techniques to assist decision makers in analyzing...demonstrated on notional examples and were tested on a range of sample problem sets. iv Acknowledgements There are many people that I owe a great deal of

  6. Hogthrob: Towards a Sensor Network Infrastructure for Sow Monitoring (wireless sensor network special day)

    DEFF Research Database (Denmark)

    Bonnet, Philippe; Leopold, Martin; Madsen, K

    2006-01-01

    We aim at developing a next-generation system for sow monitoring. Today, farmers use RFID based solutions with an ear tag on the sows and a reader located inside the feeding station. This does not allow the farmers to locate a sow in a large pen, or to monitor the life cycle of the sow (detect he...... period, detect injury...). Our goal is to explore the design of a sensor network that supports such functionalities and meets the constraints of this industry in terms of price, energy consumption and availability....

  7. Update on the CERN Computing and Network Infrastructure for Controls (CNIC)

    CERN Multimedia

    Lueders, S

    2007-01-01

    Over the last few years modern accelerator and experiment control systems have increasingly been based on commercial-off-the-shelf products (VME crates, PLCs, SCADA systems, etc.), on Windows or Linux PCs, and on communication infrastructures using Ethernet and TCP/IP. Despite the benefits coming with this (r)evolution, new vulnerabilities are inherited too: Worms and viruses spread within seconds via the Ethernet cable, and attackers are becoming interested in control systems. Unfortunately, control PCs cannot be patched as fast as office PCs. Even worse, vulnerability scans at CERN using standard IT tools have shown that commercial automation systems lack fundamental security precautions: Some systems crashed during the scan, others could easily be stopped or their process data be altered. During the two years following the presentation of the CNIC Security Policy at ICALEPCS2005, a "Defense-in-Depth" approach has been applied to protect CERN's control systems. This presentation will give a review of its th...

  8. Network protection and insulation monitoring. Schutztechnik mit Isolationsueberwachung

    Energy Technology Data Exchange (ETDEWEB)

    Hofheinz, W

    1983-01-01

    With the increasing use of unearthed power supply networks, the selection of suitable monitoring systems has become increasingly important. By combining the unearthed power supply networks with insulation monitoring, one arrives at a protective technique with high reliability, fireproofness and accident protection. The book describes this type of network and its applications, e.g. for medical purposes. Technologies in West Germany and the USA are compared, and a historical outline is given of protective wire systems and their applications. Methods of measurement employed in insulation monitoring systems are described, and the relevant VDE regulations are cited.

  9. 75 FR 61160 - National Protection and Programs Directorate; National Infrastructure Advisory Council

    Science.gov (United States)

    2010-10-04

    ... Infrastructure Advisory Council (NIAC) will meet on Tuesday, October 19, 2010, at the Hilton Washington Embassy... . ADDRESSES: The meeting will be held at the Hilton Washington Embassy Row, 2015 Massachusetts Ave., NW...

  10. Critical Infrastructure Protection: EMP Impacts on the U.S. Electric Grid

    Science.gov (United States)

    Boston, Edwin J., Jr.

    The purpose of this research is to identify the United States electric grid infrastructure systems vulnerabilities to electromagnetic pulse attacks and the cyber-based impacts of those vulnerabilities to the electric grid. Additionally, the research identifies multiple defensive strategies designed to harden the electric grid against electromagnetic pulse attack that include prevention, mitigation and recovery postures. Research results confirm the importance of the electric grid to the United States critical infrastructures system and that an electromagnetic pulse attack against the electric grid could result in electric grid degradation, critical infrastructure(s) damage and the potential for societal collapse. The conclusions of this research indicate that while an electromagnetic pulse attack against the United States electric grid could have catastrophic impacts on American society, there are currently many defensive strategies under consideration designed to prevent, mitigate and or recover from an electromagnetic pulse attack. However, additional research is essential to further identify future target hardening opportunities, efficient implementation strategies and funding resources.

  11. Connecting to the Internet Securely; Protecting Home Networks CIAC-2324

    Energy Technology Data Exchange (ETDEWEB)

    Orvis, W J; Krystosek, P; Smith, J

    2002-11-27

    With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does not consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these

  12. Virtualization in network and servers infrastructure to support dynamic system reconfiguration in ALMA

    Science.gov (United States)

    Shen, Tzu-Chiang; Ovando, Nicolás.; Bartsch, Marcelo; Simmond, Max; Vélez, Gastón; Robles, Manuel; Soto, Rubén.; Ibsen, Jorge; Saldias, Christian

    2012-09-01

    ALMA is the first astronomical project being constructed and operated under industrial approach due to the huge amount of elements involved. In order to achieve the maximum through put during the engineering and scientific commissioning phase, several production lines have been established to work in parallel. This decision required modification in the original system architecture in which all the elements are controlled and operated within a unique Standard Test Environment (STE). The advance in the network industry and together with the maturity of virtualization paradigm allows us to provide a solution which can replicate the STE infrastructure without changing their network address definition. This is only possible with Virtual Routing and Forwarding (VRF) and Virtual LAN (VLAN) concepts. The solution allows dynamic reconfiguration of antennas and other hardware across the production lines with minimum time and zero human intervention in the cabling. We also push the virtualization even further, classical rack mount servers are being replaced and consolidated by blade servers. On top of them virtualized server are centrally administrated with VMWare ESX. Hardware costs and system administration effort will be reduced considerably. This mechanism has been established and operated successfully during the last two years. This experience gave us confident to propose a solution to divide the main operation array into subarrays using the same concept which will introduce huge flexibility and efficiency for ALMA operation and eventually may simplify the complexity of ALMA core observing software since there will be no need to deal with subarrays complexity at software level.

  13. Research Networking Systems: The State of Adoption at Institutions Aiming to Augment Translational Research Infrastructure.

    Science.gov (United States)

    Obeid, Jihad S; Johnson, Layne M; Stallings, Sarah; Eichmann, David

    Fostering collaborations across multiple disciplines within and across institutional boundaries is becoming increasingly important with the growing emphasis on translational research. As a result, Research Networking Systems that facilitate discovery of potential collaborators have received significant attention by institutions aiming to augment their research infrastructure. We have conducted a survey to assess the state of adoption of these new tools at the Clinical and Translational Science Award (CTSA) funded institutions. Survey results demonstrate that most CTSA funded institutions have either already adopted or were planning to adopt one of several available research networking systems. Moreover a good number of these institutions have exposed or plan to expose the data on research expertise using linked open data, an established approach to semantic web services. Preliminary exploration of these publically-available data shows promising utility in assessing cross-institutional collaborations. Further adoption of these technologies and analysis of the data are needed, however, before their impact on cross-institutional collaboration in research can be appreciated and measured.

  14. LEA: An Algorithm to Estimate the Level of Location Exposure in Infrastructure-Based Wireless Networks

    Directory of Open Access Journals (Sweden)

    Francisco Garcia

    2017-01-01

    Full Text Available Location privacy in wireless networks is nowadays a major concern. This is due to the fact that the mere fact of transmitting may allow a network to pinpoint a mobile node. We consider that a first step to protect a mobile node in this situation is to provide it with the means to quantify how accurately a network establishes its position. To achieve this end, we introduce the location-exposure algorithm (LEA, which runs on the mobile terminal only and whose operation consists of two steps. In the first step, LEA discovers the positions of nearby network nodes and uses this information to emulate how they estimate the position of the mobile node. In the second step, it quantifies the level of exposure by computing the distance between the position estimated in the first step and its true position. We refer to these steps as a location-exposure problem. We tested our proposal with simulations and testbed experiments. These results show the ability of LEA to reproduce the location of the mobile node, as seen by the network, and to quantify the level of exposure. This knowledge can help the mobile user decide which actions should be performed before transmitting.

  15. Nuclear knowledge management: a very fundament of a national radiation protection infrastructure

    International Nuclear Information System (INIS)

    Jovanovic, Slobodan

    2008-01-01

    Full text: Knowledge is fundament of any progress, and so is the case with nuclear knowledge (NK) for radiation protection. However, this axiomatic and notorious fact is sometimes interpreted/understood in a sense that knowledge is there for granted. If persistent, this dangerously wrong attitude may silently lead to prevailing of ignorance vs. knowledge/ competence and to RP degradation in much respect, with far reaching consequences. Having behind many decades of experience with research, development and utilization of radiation sources for various purposes (including both electric power generation and non-power applications) and with renewed expectations from nuclear sector in solving global energy crisis in front, nuclear knowledge management (NKM) is getting a growing attention lately. This comes due to accentuation, in many counties, of issues with NK creation, dissemination, transfer, preservation and maintenance, or its proper verification/ employing, positioning versus other knowledge, even valorization and public acceptance. Therein, RP is among the areas much sensitive and depending on the effects mentioned. RP infrastructure in a country comprising regulatory elements (institutional and legal framework), technical support organizations (service providers), educational institutions (universities, training centers), RP associations, source manufacturers, traders and users themselves is, as a matter of fact, a complex system of multidisciplinary nature. Physicists, chemists, biologists, environmentalists, medical physicists and practitioners, engineers, managers, lawyers, technicians have their place within the system. It is a common denominator for them all to need a particular NK pertinent to their duties. This very knowledge cannot be missed. Also, it cannot be improvised or substituted by some other knowledge from their respective specialties, neither by that of other people with different backgrounds, who might come in replacement. Unfortunately, it

  16. Network of Research Infrastructures for European Seismology (NERIES)—Web Portal Developments for Interactive Access to Earthquake Data on a European Scale

    OpenAIRE

    A. Spinuso; L. Trani; S. Rives; P. Thomy; F. Euchner; Danijel Schorlemmer; Joachim Saul; Andres Heinloo; R. Bossu; T. van Eck

    2009-01-01

    The Network of Research Infrastructures for European Seismology (NERIES) is European Commission (EC) project whose focus is networking together seismological observatories and research institutes into one integrated European infrastructure that provides access to data and data products for research. Seismological institutes and organizations in European and Mediterranean countries maintain large, geographically distributed data archives, therefore this scenario suggested a design approach bas...

  17. Network Security Hacks Tips & Tools for Protecting Your Privacy

    CERN Document Server

    Lockhart, Andrew

    2009-01-01

    This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending, and incident response.

  18. Characterization of the Network of Protected Areas in Puerto Rico

    Science.gov (United States)

    J. Castro-Prieto; Maya Quinones; William Gould

    2016-01-01

    Our goal was to describe the biodiversity and associated landscape diversity and forest cover characteristics within the network of terrestrial protected areas in Puerto Rico. We conducted spatial analysis to quantify different indicators of diversity at these sites. We found that protected areas in Puerto Rico overlap the most species-rich regions on the island,...

  19. Regulation of the energy infrastructure. Load management. Part 1. Fiscal aspects of energy networks

    International Nuclear Information System (INIS)

    Smits, L.

    2008-01-01

    The Dutch energy system depends on the presence of a good infrastructure. For many decades little attention was paid to infrastructure, but due to the liberalization infrastructure is receiving renewed attention. The grids are now considered the backbone of the energy system and essential for security of supply. Moreover, future electricity plants may have to adhere to the 'zero emission' demands in the future and (nearly) empty oil and gas fields will be used for underground storage of substances such as CO2. This new series addresses the existing and new regulation for the energy infrastructure. This edition addresses a number of fiscal aspects of the energy infrastructure. [mk] [nl

  20. The role of Ethernet in providing state-of-the-art and protected industrial networking

    Energy Technology Data Exchange (ETDEWEB)

    Hammond, J. [GarrettCom Inc., Fremont, CA (United States)

    2006-07-01

    Many networks in power substations are now using Ethernet-based solutions that use specialized protocols and customized controls. This paper discussed the advantages of using Ethernet in power utility network systems. Threats to computer networks supporting process control and supervisory control and data acquisition (SCADA) systems in power utilities also were discussed, and systems and components at risk were reviewed. Higher Ethernet bandwidths now permit more data and control information to be processed by networks. Ethernet bandwidths can be used for physical security functions as well as for the control of processes and systems. Components have now been designed to provide end-to-end Ethernet installations in order to save training costs. New security features include anti-hacking protocols, firewalls, and password protection, and card and badge readers for physical intrusion protection. Traffic restrictions have been implemented between designed ports in order to create secure traffic domains. It was concluded that Ethernet can provide the level of security needed to protect important energy infrastructure.

  1. 78 FR 34112 - Review and Revision of the National Infrastructure Protection Plan

    Science.gov (United States)

    2013-06-06

    ... physical and cyber infrastructure. Some of the known changes that will be addressed in the successor to the... threats from terrorism. Updates to Information-Sharing Tools and Mechanisms PPD-21 sets forth the... better alignment with the Quadrennial Homeland Security Review. This change took effect in July 2011...

  2. 6 CFR 29.7 - Safeguarding of Protected Critical Infrastructure Information.

    Science.gov (United States)

    2010-01-01

    ... Infrastructure Information. 29.7 Section 29.7 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE..., and consistent with the Act, for Automated Information Systems that contain PCII. Such security requirements will be in conformance with the information technology security requirements in the Federal...

  3. U.S. National Cyberstrategy and Critical Infrastructure: The Protection Mandate and Its Execution

    Science.gov (United States)

    2013-09-01

    revising this thesis, and balancing the coordination needed for: (1) Piano; (2) Soccer /Baseball; (3) Cubmaster Cub Scout Pack-135; (4) Hospitality...disease and pest response; and provides nutritional assistance. Provides the financial infrastructure of the nation. This sector consists of commercial

  4. Artificial neural network based approach to transmission lines protection

    International Nuclear Information System (INIS)

    Joorabian, M.

    1999-05-01

    The aim of this paper is to present and accurate fault detection technique for high speed distance protection using artificial neural networks. The feed-forward multi-layer neural network with the use of supervised learning and the common training rule of error back-propagation is chosen for this study. Information available locally at the relay point is passed to a neural network in order for an assessment of the fault location to be made. However in practice there is a large amount of information available, and a feature extraction process is required to reduce the dimensionality of the pattern vectors, whilst retaining important information that distinguishes the fault point. The choice of features is critical to the performance of the neural networks learning and operation. A significant feature in this paper is that an artificial neural network has been designed and tested to enhance the precision of the adaptive capabilities for distance protection

  5. Energy, a networked Europe - Twelve proposals for a common energy infrastructure policy

    International Nuclear Information System (INIS)

    Derdevet, Michel

    2015-01-01

    around three main focus areas: - Revising security of supply and cooperation between the network companies, but also the local authorities involved in the energy transition, - Strengthening coordination of the regulations and the funding levers to optimise the infrastructure costs, while investing in the territories crossed by this strategic infrastructure, - Promoting Europe as an energy innovation leader, giving a new impetus and a new dimension to its R and D, in particular through standardisation, the creation of an energy data platform, the establishment of innovative mobility corridors and the foundation of a European Energy College. (author)

  6. Case studies: Application of SEA in provincial level expressway infrastructure network planning in China - Current existing problems

    International Nuclear Information System (INIS)

    Zhou Kaiyi; Sheate, William R.

    2011-01-01

    Since the Law of the People's Republic of China on Environmental Impact Assessment was enacted in 2003 and Huanfa 2004 No. 98 was released in 2004, Strategic Environmental Assessment (SEA) has been officially being implemented in the expressway infrastructure planning field in China. Through scrutinizing two SEA application cases of China's provincial level expressway infrastructure (PLEI) network plans, it is found that current SEA practice in expressway infrastructure planning field has a number of problems including: SEA practitioners do not fully understand the objective of SEA; its potential contributions to strategic planning and decision-making is extremely limited; the employed application procedure and prediction and assessment techniques are too simple to bring objective, unbiased and scientific results; and no alternative options are considered. All these problems directly lead to poor quality SEA and consequently weaken SEA's effectiveness.

  7. Organisation et mise en oeuvre d'une infrastructure reglementaire nationale chargee de la protection contre les rayonnements ionisants et de la surete des sources de rayonnements. Rapport interimaire pour observations; Organization and implementation of a national regulatory infrastructure governing protection against ionizing radiation and the safety of radiation sources. Interim report for comment

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-11-01

    A number of IAEA Member States are undertaking to strengthen their radiation protection and safety infrastructures in order to facilitate the adoption of the requirements established in the International Basic Safety Standards for Protection against Ionizing Radiation and for the Safety of Radiation Sources (the Standards). In this connection, the IAEA has developed a technical co-operation programme (Model Project on Upgrading Radiation Protection Infrastructure) to improve radiation protection and safety infrastructures in 51 Member States, taking into account national profiles and needs of the individual participating, countries. The present report deals with the elements of a regulatory infrastructure for radiation protection and safety and intends to facilitate the, implementation of the Basic Safety Standards in practice. It takes into account the proposals in an earlier report, IAEA-TECDOC-663, but it has been expanded to include enabling legislation and modified to be more attuned to infrastructure issues related to implementation of the Standards. The orientation is toward infrastructures concerned with protection and safety for radiation sources used in medicine, agriculture, research, industry and education rather than infrastructures for protection and safety for complex nuclear facilities. It also discusses options for enhancing the effectiveness and efficiency of the infrastructure in accordance with the size and scope of radiation practices and available regulatory resources within a country.

  8. The regulatory infrastructure for radiation protection, the safety of radiation sources and security of radioactive materials in Ethiopia

    International Nuclear Information System (INIS)

    Gebeyehu Wolde, G.

    2003-01-01

    The application of Nuclear Techniques in Ethiopia started in the early sixties in the medical field and through time has gradually expanded to other areas. Following this growth the practice of Radiation Protection in Ethiopia dates back over 15 years. Radiation Protection Legislation 79/1993 was promulgated in December 1993, which has established an Autonomous Regulatory Authority to control and supervise the introduction and conduct of any practice involving ionizing radiation. Since 1998 the National Radiation Protection Authority has made a remarkable progress in terms of building a National Radiation Protection Infrastructure and is in a full swing transformation process towards a dynamic credible and competent regulatory Authority. The regulatory activities are designed in line with the main regulatory instruments, Notification, Authorization, Inspection and Enforcement. NRPA has a national inventory system and fully implemented the Regulatory Authority Information System (RAIS), which provides a systemic integration and will be instrumental to enhance the effectiveness of the regulatory system. A substantial progress has been made in the development and provision of support and technical services in the areas of Metrology and Calibration Services, Instrument Maintenance Service, Individual Monitoring of Personnel, Environmental and Food Monitoring and Interim Storage Facility for spent sources. Development of a national system for emergency preparedness and response is the current top agenda of NRPA. Towards ensuring an effective radiation protection and regulatory programme, NRPA is also making a proactive involvement in, expanding its outreach, information dissemination, awareness promotion and development of key human resources. In the last four years Ethiopia has been actively co-operating with IAEA in the framework of the Regional Model Projects RAF/9/024, RAF/9/028 and RAF/9/029. The inputs received through the project framework coupled with the

  9. Making Network Markets in Education: The Development of Data Infrastructure in Australian Schooling

    Science.gov (United States)

    Sellar, Sam

    2017-01-01

    This paper examines the development of data infrastructure in Australian schooling with a specific focus on interoperability standards that help to make new markets for education data. The conceptual framework combines insights from studies of infrastructure, economic markets and digital data. The case of the Australian National Schools…

  10. An integrated GIS-MARKAL toolbox for designing a CO2 infrastructure network in the Netherlands

    NARCIS (Netherlands)

    van den Broek, M.A.; Brederode, E.; Ramirez, C.A.; Kramers, K.; van der Kuip, M.; Wildenborg, T.; Faaij, A.P.C.; Turkenburg, W.C.

    2009-01-01

    Large-scale implementation of carbon capture and storage needs a whole new infrastructure to transport and store CO2. Tools that can support planning and designing of such infrastructure require incorporation of both temporal and spatial aspects. Therefore, a toolbox that integrates ArcGIS, a

  11. Shared protection based virtual network mapping in space division multiplexing optical networks

    Science.gov (United States)

    Zhang, Huibin; Wang, Wei; Zhao, Yongli; Zhang, Jie

    2018-05-01

    Space Division Multiplexing (SDM) has been introduced to improve the capacity of optical networks. In SDM optical networks, there are multiple cores/modes in each fiber link, and spectrum resources are multiplexed in both frequency and core/modes dimensions. Enabled by network virtualization technology, one SDM optical network substrate can be shared by several virtual networks operators. Similar with point-to-point connection services, virtual networks (VN) also need certain survivability to guard against network failures. Based on customers' heterogeneous requirements on the survivability of their virtual networks, this paper studies the shared protection based VN mapping problem and proposes a Minimum Free Frequency Slots (MFFS) mapping algorithm to improve spectrum efficiency. Simulation results show that the proposed algorithm can optimize SDM optical networks significantly in terms of blocking probability and spectrum utilization.

  12. PROTECTING CRITICAL DATABASES – TOWARDS A RISK-BASED ASSESSMENT OF CRITICAL INFORMATION INFRASTRUCTURES (CIIS IN SOUTH AFRICA

    Directory of Open Access Journals (Sweden)

    Mzukisi N Njotini

    2013-04-01

    Full Text Available South Africa has made great strides towards protecting critical information infrastructures (CIIs. For example, South Africa recognises the significance of safeguarding places or areas that are essential to the national security of South Africa or the economic and social well-being of South African citizens. For this reason South Africa has established mechanisms to assist in preserving the integrity and security of CIIs. The measures provide inter alia for the identification of CIIs; the registration of the full names, address and contact details of the CII administrators (the persons who manage CIIs; the identification of the location(s of CIIs or their component parts; and the outlining of the general descriptions of information or data stored in CIIs.It is argued that the measures to protect CIIs in South Africa are inadequate. In particular, the measures rely on a one-size-fits-all approach to identify and classify CIIs. For this reason the South African measures are likely to lead to the adoption of a paradigm that considers every infrastructure, data or database, regardless of its significance or importance, to be key or critical.

  13. An open, component-based information infrastructure for integrated health information networks.

    Science.gov (United States)

    Tsiknakis, Manolis; Katehakis, Dimitrios G; Orphanoudakis, Stelios C

    2002-12-18

    A fundamental requirement for achieving continuity of care is the seamless sharing of multimedia clinical information. Different technological approaches can be adopted for enabling the communication and sharing of health record segments. In the context of the emerging global information society, the creation of and access to the integrated electronic health record (I-EHR) of a citizen has been assigned high priority in many countries. This requirement is complementary to an overall requirement for the creation of a health information infrastructure (HII) to support the provision of a variety of health telematics and e-health services. In developing a regional or national HII, the components or building blocks that make up the overall information system ought to be defined and an appropriate component architecture specified. This paper discusses current international priorities and trends in developing the HII. It presents technological challenges and alternative approaches towards the creation of an I-EHR, being the aggregation of health data created during all interactions of an individual with the healthcare system. It also presents results from an ongoing Research and Development (R&D) effort towards the implementation of the HII in HYGEIAnet, the regional health information network of Crete, Greece, using a component-based software engineering approach. Critical design decisions and related trade-offs, involved in the process of component specification and development, are also discussed and the current state of development of an I-EHR service is presented. Finally, Human Computer Interaction (HCI) and security issues, which are important for the deployment and use of any I-EHR service, are considered.

  14. Feasibility of a Networked Air Traffic Infrastructure Validation Environment for Advanced NextGen Concepts

    Science.gov (United States)

    McCormack, Michael J.; Gibson, Alec K.; Dennis, Noah E.; Underwood, Matthew C.; Miller,Lana B.; Ballin, Mark G.

    2013-01-01

    Abstract-Next Generation Air Transportation System (NextGen) applications reliant upon aircraft data links such as Automatic Dependent Surveillance-Broadcast (ADS-B) offer a sweeping modernization of the National Airspace System (NAS), but the aviation stakeholder community has not yet established a positive business case for equipage and message content standards remain in flux. It is necessary to transition promising Air Traffic Management (ATM) Concepts of Operations (ConOps) from simulation environments to full-scale flight tests in order to validate user benefits and solidify message standards. However, flight tests are prohibitively expensive and message standards for Commercial-off-the-Shelf (COTS) systems cannot support many advanced ConOps. It is therefore proposed to simulate future aircraft surveillance and communications equipage and employ an existing commercial data link to exchange data during dedicated flight tests. This capability, referred to as the Networked Air Traffic Infrastructure Validation Environment (NATIVE), would emulate aircraft data links such as ADS-B using in-flight Internet and easily-installed test equipment. By utilizing low-cost equipment that is easy to install and certify for testing, advanced ATM ConOps can be validated, message content standards can be solidified, and new standards can be established through full-scale flight trials without necessary or expensive equipage or extensive flight test preparation. This paper presents results of a feasibility study of the NATIVE concept. To determine requirements, six NATIVE design configurations were developed for two NASA ConOps that rely on ADS-B. The performance characteristics of three existing in-flight Internet services were investigated to determine whether performance is adequate to support the concept. Next, a study of requisite hardware and software was conducted to examine whether and how the NATIVE concept might be realized. Finally, to determine a business case

  15. A simple grid implementation with Berkeley Open Infrastructure for Network Computing using BLAST as a model

    Directory of Open Access Journals (Sweden)

    Watthanai Pinthong

    2016-07-01

    Full Text Available Development of high-throughput technologies, such as Next-generation sequencing, allows thousands of experiments to be performed simultaneously while reducing resource requirement. Consequently, a massive amount of experiment data is now rapidly generated. Nevertheless, the data are not readily usable or meaningful until they are further analysed and interpreted. Due to the size of the data, a high performance computer (HPC is required for the analysis and interpretation. However, the HPC is expensive and difficult to access. Other means were developed to allow researchers to acquire the power of HPC without a need to purchase and maintain one such as cloud computing services and grid computing system. In this study, we implemented grid computing in a computer training center environment using Berkeley Open Infrastructure for Network Computing (BOINC as a job distributor and data manager combining all desktop computers to virtualize the HPC. Fifty desktop computers were used for setting up a grid system during the off-hours. In order to test the performance of the grid system, we adapted the Basic Local Alignment Search Tools (BLAST to the BOINC system. Sequencing results from Illumina platform were aligned to the human genome database by BLAST on the grid system. The result and processing time were compared to those from a single desktop computer and HPC. The estimated durations of BLAST analysis for 4 million sequence reads on a desktop PC, HPC and the grid system were 568, 24 and 5 days, respectively. Thus, the grid implementation of BLAST by BOINC is an efficient alternative to the HPC for sequence alignment. The grid implementation by BOINC also helped tap unused computing resources during the off-hours and could be easily modified for other available bioinformatics software.

  16. Optimized distribution network work management by grid services of a rapid loading infrastructure; Optimierte Verteilnetzbetriebsfuehrung durch Netzdienstleistungen einer Schnellladeinfrastruktur

    Energy Technology Data Exchange (ETDEWEB)

    Krasselt, P.; Uhrig, M.; Leibfried, T. [Karlsruher Institut fuer Technologie (KIT), Karlsruhe (Germany). Inst. fuer Elektroenergiesysteme und Hochspannungstechnik (IEH)

    2012-07-01

    The German Federal Government aims to reach one million electric vehicles in 2020 and up to five million by 2030 under its National Electromobility Development Plan. The integration of the necessary charging infrastructure in the distribution grid is considered in many research approaches by regarding charging time slots controlled by information and communications technology (ICT). In this approach, strategies for reactive power management and gridsupporting functions in medium voltage networks through the integration of large charging stations such as those in parking garages and public parking lots are considered. An urban distribution network in 2030 is modelled to evaluate different centralized and decentralized reactive power control schemes. (orig.)

  17. A rapid protection switching method in carrier ethernet ring networks

    Science.gov (United States)

    Yuan, Liang; Ji, Meng

    2008-11-01

    Abstract: Ethernet is the most important Local Area Network (LAN) technology since more than 90% data traffic in access layer is carried on Ethernet. From 10M to 10G, the improving Ethernet technology can be not only used in LAN, but also a good choice for MAN even WAN. MAN are always constructed in ring topology because the ring network could provide resilient path protection by using less resource (fibre or cable) than other network topologies. In layer 2 data networks, spanning tree protocol (STP) is always used to protect transmit link and preventing the formation of logic loop in networks. However, STP cannot guarantee the efficiency of service convergence when link fault happened. In fact, convergent time of networks with STP is about several minutes. Though Rapid Spanning Tree Protocol (RSTP) and Multi-Spanning Tree Protocol (MSTP) improve the STP technology, they still need a couple of seconds to achieve convergence, and can not provide sub-50ms protection switching. This paper presents a novel rapid ring protection method (RRPM) for carrier Ethernet. Unlike other link-fault detection method, it adopts distributed algorithm to detect link fault rapidly (sub-50ms). When networks restore from link fault, it can revert to the original working state. RRPM can provide single ring protection and interconnected ring protection without the formation of super loop. In normal operation, the master node blocks the secondary port for all non-RRPM Ethernet frames belonging to the given RRPM Ring, thereby avoiding a loop in the ring. When link fault happens, the node on which the failure happens moves from the "ring normal" state to the "ring fault" state. It also sends "link down" frame immediately to other nodes and blocks broken port and flushes its forwarding database. Those who receive "link down" frame will flush forwarding database and master node should unblock its secondary port. When the failure restores, the whole ring will revert to the normal state. That is

  18. Synchrophasor Sensor Networks for Grid Communication and Protection.

    Science.gov (United States)

    Gharavi, Hamid; Hu, Bin

    2017-07-01

    This paper focuses primarily on leveraging synchronized current/voltage amplitudes and phase angle measurements to foster new categories of applications, such as improving the effectiveness of grid protection and minimizing outage duration for distributed grid systems. The motivation for such an application arises from the fact that with the support of communication, synchronized measurements from multiple sites in a grid network can greatly enhance the accuracy and timeliness of identifying the source of instabilities. The paper first provides an overview of synchrophasor networks and then presents techniques for power quality assessment, including fault detection and protection. To achieve this we present a new synchrophasor data partitioning scheme that is based on the formation of a joint space and time observation vector. Since communication is an integral part of synchrophasor networks, the newly adopted wireless standard for machine-to-machine (M2M) communication, known as IEEE 802.11ah, has been investigated. The paper also presents a novel implementation of a hardware in the loop testbed for real-time performance evaluation. The purpose is to illustrate the use of both hardware and software tools to verify the performance of synchrophasor networks under more realistic environments. The testbed is a combination of grid network modeling, and an Emulab-based communication network. The combined grid and communication network is then used to assess power quality for fault detection and location using the IEEE 39-bus and 390-bus systems.

  19. Combining Wired and Wireless Networks for a QoS-Aware Broadband Infrastructure

    DEFF Research Database (Denmark)

    Pedersen, Jens Myrup; Riaz, Muhammad Tahir; Knudsen, Thomas Phillip

    2004-01-01

    We show how integrated planning of wired and wireless infrastructures can be used to build a QoS-aware broadband infrastructure. The outset is a case study of the municipality of Hals, a rural community in Denmark, where the objective is to establish a broadband infrastructure reaching all househ...... To The Home for primary connections and Fixed Wireless Access for backup. This is implemented over 15 years, during which temporary solutions ensure sufficient QoS and reliability for all users. These temporary solutions form parts of the final solutions....

  20. 78 FR 29375 - Protected Critical Infrastructure Information (PCII) Office Self-Assessment Questionnaire

    Science.gov (United States)

    2013-05-20

    ... Information (PCII) Office Self- Assessment Questionnaire AGENCY: National Protection and Programs Directorate... comments concerning New Information Collection Request, PCII Officer Questionnaire. DHS previously... without alteration at http://www.regulations.gov , including any personal information provided. OMB is...

  1. Review of Rateless-Network-Coding-Based Packet Protection in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    A. S. Abdullah

    2015-01-01

    Full Text Available In recent times, there have been many developments in wireless sensor network (WSN technologies using coding theory. Fast and efficient protection schemes for data transfer over the WSN are some of the issues in coding theory. This paper reviews the issues related to the application of the joint rateless-network coding (RNC within the WSN in the context of packet protection. The RNC is a method in which any node in the network is allowed to encode and decode the transmitted data in order to construct a robust network, improve network throughput, and decrease delays. To the best of our knowledge, there has been no comprehensive discussion about RNC. To begin with, this paper briefly describes the concept of packet protection using network coding and rateless codes. We therefore discuss the applications of RNC for improving the capability of packet protection. Several works related to this issue are discussed. Finally, the paper concludes that the RNC-based packet protection scheme is able to improve the packet reception rate and suggests future studies to enhance the capability of RNC protection.

  2. Scaling up local energy infrastructure; An agent-based model of the emergence of district heating networks

    International Nuclear Information System (INIS)

    Busch, Jonathan; Roelich, Katy; Bale, Catherine S.E.; Knoeri, Christof

    2017-01-01

    The potential contribution of local energy infrastructure – such as heat networks – to the transition to a low carbon economy is increasingly recognised in international, national and municipal policy. Creating the policy environment to foster the scaling up of local energy infrastructure is, however, still challenging; despite national policy action and local authority interest the growth of heat networks in UK cities remains slow. Techno-economic energy system models commonly used to inform policy are not designed to address institutional and governance barriers. We present an agent-based model of heat network development in UK cities in which policy interventions aimed at the institutional and governance barriers faced by diverse actors can be explored. Three types of project instigators are included – municipal, commercial and community – which have distinct decision heuristics and capabilities and follow a multi-stage development process. Scenarios of policy interventions developed in a companion modelling approach indicate that the effect of interventions differs between actors depending on their capabilities. Successful interventions account for the specific motivations and capabilities of different actors, provide a portfolio of support along the development process and recognise the important strategic role of local authorities in supporting low carbon energy infrastructure. - Highlights: • Energy policy should account for diverse actor motivations and capabilities. • Project development is a multi-stage process, not a one-off event. • Participatory agent-based modelling can inform policy that accounts for complexity. • Policy should take a portfolio approach to providing support. • Local authorities have an important strategic role in local infrastructure.

  3. Optimisation of Critical Infrastructure Protection: The SiVe Project on Airport Security

    Science.gov (United States)

    Breiing, Marcus; Cole, Mara; D'Avanzo, John; Geiger, Gebhard; Goldner, Sascha; Kuhlmann, Andreas; Lorenz, Claudia; Papproth, Alf; Petzel, Erhard; Schwetje, Oliver

    This paper outlines the scientific goals, ongoing work and first results of the SiVe research project on critical infrastructure security. The methodology is generic while pilot studies are chosen from airport security. The outline proceeds in three major steps, (1) building a threat scenario, (2) development of simulation models as scenario refinements, and (3) assessment of alternatives. Advanced techniques of systems analysis and simulation are employed to model relevant airport structures and processes as well as offences. Computer experiments are carried out to compare and optimise alternative solutions. The optimality analyses draw on approaches to quantitative risk assessment recently developed in the operational sciences. To exploit the advantages of the various techniques, an integrated simulation workbench is build up in the project.

  4. InSAR remote sensing for performance monitoring of transportation infrastructure at the network level.

    Science.gov (United States)

    2016-01-11

    The goal of the project was the implementation of interferometric synthetic aperture radar : (InSAR) monitoring techniques to allow for early detection of geohazard, potentially : affecting the transportation infrastructure, as well as the monitoring...

  5. Recent advances in operational seasonal forecasting in South Africa: Models, infrastructure and networks

    CSIR Research Space (South Africa)

    Landman, WA

    2011-11-01

    Full Text Available The various institutions involved with seasonal forecast development and production are discussed. New modelling approaches and the establishment of infrastructures to improve forecast dissemination are discussed....

  6. TRANSVAC research infrastructure - Results and lessons learned from the European network of vaccine research and development.

    Science.gov (United States)

    Geels, Mark J; Thøgersen, Regitze L; Guzman, Carlos A; Ho, Mei Mei; Verreck, Frank; Collin, Nicolas; Robertson, James S; McConkey, Samuel J; Kaufmann, Stefan H E; Leroy, Odile

    2015-10-05

    TRANSVAC was a collaborative infrastructure project aimed at enhancing European translational vaccine research and training. The objective of this four year project (2009-2013), funded under the European Commission's (EC) seventh framework programme (FP7), was to support European collaboration in the vaccine field, principally through the provision of transnational access (TNA) to critical vaccine research and development (R&D) infrastructures, as well as by improving and harmonising the services provided by these infrastructures through joint research activities (JRA). The project successfully provided all available services to advance 29 projects and, through engaging all vaccine stakeholders, successfully laid down the blueprint for the implementation of a permanent research infrastructure for early vaccine R&D in Europe. Copyright © 2015. Published by Elsevier Ltd.

  7. Security Management Strategies for Protecting Your Library's Network.

    Science.gov (United States)

    Ives, David J.

    1996-01-01

    Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…

  8. Learning Method, Facilities And Infrastructure, And Learning Resources In Basic Networking For Vocational School

    OpenAIRE

    Pamungkas, Bian Dwi

    2017-01-01

    This study aims to examine the contribution of learning methods on learning output, the contribution of facilities and infrastructure on output learning, the contribution of learning resources on learning output, and the contribution of learning methods, the facilities and infrastructure, and learning resources on learning output. The research design is descriptive causative, using a goal-oriented assessment approach in which the assessment focuses on assessing the achievement of a goal. The ...

  9. Strategy for sustainability of the Joint European Research Infrastructure Network for Coastal Observatories - JERICO

    OpenAIRE

    Puillat, Ingrid; Farcy, Patrick; Durand, Dominique; Petihakis, George; Morin, Pascal; Kriegger, Magali; Petersen, Wilhelm; Tintoré, Joaquin; Sorensen, Kai; Sparnocchia, Stefania; Wehde, Henning

    2015-01-01

    The JERICO European research infrastructure (RI) is integrating several platform types i.e. fixed buoys, piles, moorings, drifters, Ferryboxes, gliders, HF radars, coastal cable observatories and the associated technologies dedicated to the observation and monitoring of the European coastal seas. The infrastructure is to serve both the implementation of European marine policies and the elucidation of key scientific questions through dedicated observation and monitoring plans. It includes obse...

  10. The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures

    International Nuclear Information System (INIS)

    Eusgeld, Irene; Kroeger, Wolfgang; Sansavini, Giovanni; Schlaepfer, Markus; Zio, Enrico

    2009-01-01

    A framework for the analysis of the vulnerability of critical infrastructures has been proposed by some of the authors. The framework basically consists of two successive stages: (i) a screening analysis for identifying the parts of the critical infrastructure most relevant with respect to its vulnerability and (ii) a detailed modeling of the operational dynamics of the identified parts for gaining insights on the causes and mechanisms responsible for the vulnerability. In this paper, a critical presentation is offered of the results of a set of investigations aimed at evaluating the potentials of (i) using network analysis based on measures of topological interconnection and reliability efficiency, for the screening task; (ii) using object-oriented modeling as the simulation framework to capture the detailed dynamics of the operational scenarios involving the most vulnerable parts of the critical infrastructure as identified by the preceding network analysis. A case study based on the Swiss high-voltage transmission system is considered. The results are cross-compared and evaluated; the needs of further research are defined

  11. Estonian experience in establishing the national radiation protection infrastructure in the newly independent State

    International Nuclear Information System (INIS)

    Kalam, J.

    2001-01-01

    The Estonian Radiation Protection Centre (ERPC) was established on 4 January 1996 as the regulatory authority for radiation protection and safety of radiation sources. The report explains the ERPC's structure and its main functions and activities, and provides information on the regulations that have been approved or are planned to be adopted. Reference is made to radiological emergency preparedness and, in particular, to the status of development of the system of regulatory control by authorization and inspection of radiation practices in the country. (author)

  12. 77 FR 68795 - Protected Critical Infrastructure Information (PCII) Office Self-Assessment Questionnaire

    Science.gov (United States)

    2012-11-16

    ... Information (PCII) Office Self- Assessment Questionnaire AGENCY: National Protection and Programs Directorate... received will be posted without alteration at http://www.regulations.gov , including any personal...). This questionnaire is designed to gather information from PCII Officers that will be used by the NPPD...

  13. Call Arrival Rate Prediction and Blocking Probability Estimation for Infrastructure based Mobile Cognitive Radio Personal Area Network

    Directory of Open Access Journals (Sweden)

    Neeta Nathani

    2017-08-01

    Full Text Available The Cognitive Radio usage has been estimated as non-emergency service with low volume traffic. Present work proposes an infrastructure based Cognitive Radio network and probability of success of CR traffic in licensed band. The Cognitive Radio nodes will form cluster. The cluster nodes will communicate on Industrial, Scientific and Medical band using IPv6 over Low-Power Wireless Personal Area Network based protocol from sensor to Gateway Cluster Head. For Cognitive Radio-Media Access Control protocol for Gateway to Cognitive Radio-Base Station communication, it will use vacant channels of licensed band. Standalone secondary users of Cognitive Radio Network shall be considered as a Gateway with one user. The Gateway will handle multi-channel multi radio for communication with Base Station. Cognitive Radio Network operators shall define various traffic data accumulation counters at Base Station for storing signal strength, Carrier-to-Interference and Noise Ratio, etc. parameters and record channel occupied/vacant status. The researches has been done so far using hour as interval is too long for parameters like holding time expressed in minutes and hence channel vacant/occupied status time is only probabilistically calculated. In the present work, an infrastructure based architecture has been proposed which polls channel status each minute in contrary to hourly polling of data. The Gateways of the Cognitive Radio Network shall monitor status of each Primary User periodically inside its working range and shall inform to Cognitive Radio- Base Station for preparation of minutewise database. For simulation, the occupancy data for all primary user channels were pulled in one minute interval from a live mobile network. Hourly traffic data and minutewise holding times has been analyzed to optimize the parameters of Seasonal Auto Regressive Integrated Moving Average prediction model. The blocking probability of an incoming Cognitive Radio call has been

  14. Effects of spatial configuration of imperviousness and green infrastructure networks on hydrologic response in a residential sewershed

    Science.gov (United States)

    Lim, Theodore C.; Welty, Claire

    2017-09-01

    Green infrastructure (GI) is an approach to stormwater management that promotes natural processes of infiltration and evapotranspiration, reducing surface runoff to conventional stormwater drainage infrastructure. As more urban areas incorporate GI into their stormwater management plans, greater understanding is needed on the effects of spatial configuration of GI networks on hydrological performance, especially in the context of potential subsurface and lateral interactions between distributed facilities. In this research, we apply a three-dimensional, coupled surface-subsurface, land-atmosphere model, ParFlow.CLM, to a residential urban sewershed in Washington DC that was retrofitted with a network of GI installations between 2009 and 2015. The model was used to test nine additional GI and imperviousness spatial network configurations for the site and was compared with monitored pipe-flow data. Results from the simulations show that GI located in higher flow-accumulation areas of the site intercepted more surface runoff, even during wetter and multiday events. However, a comparison of the differences between scenarios and levels of variation and noise in monitored data suggests that the differences would only be detectable between the most and least optimal GI/imperviousness configurations.

  15. Urban infrastructure influences dissolved organic matter quality and bacterial metabolism in an urban stream network

    Science.gov (United States)

    Urban streams are degraded by a suite of factors, including burial beneath urban infrastructure (i.e., roads, parking lots) that eliminates light and reduces direct organic matter inputs to streams, with likely consequences for organic matter metabolism by microbes and carbon lim...

  16. Protecting posted genes: social networking and the limits of GINA.

    Science.gov (United States)

    Soo-Jin Lee, Sandra; Borgelt, Emily

    2014-01-01

    The combination of decreased genotyping costs and prolific social media use is fueling a personal genetic testing industry in which consumers purchase and interact with genetic risk information online. Consumers and their genetic risk profiles are protected in some respects by the 2008 federal Genetic Information Nondiscrimination Act (GINA), which forbids the discriminatory use of genetic information by employers and health insurers; however, practical and technical limitations undermine its enforceability, given the everyday practices of online social networking and its impact on the workplace. In the Web 2.0 era, employers in most states can legally search about job candidates and employees online, probing social networking sites for personal information that might bear on hiring and employment decisions. We examine GINA's protections for online sharing of genetic information as well as its limitations, and propose policy recommendations to address current gaps that leave employees' genetic information vulnerable in a Web-based world.

  17. Infrastructure Assisted Data Dissemination for Vehicular Sensor Networks in Metropolitan Areas

    NARCIS (Netherlands)

    Erman-Tüysüz, A.; de Souza Schwartz, Ramon; Dilo, Arta; Scholten, Johan; Havinga, Paul J.M.; Daher, Robil; Vinel, Alexey

    2012-01-01

    Vehicular Sensor Networks (VSNs) are an emerging area of research that combines technologies developed in the domains of Intelligent Transport Systems (ITS) and Wireless Sensor Networks. Data dissemination is an important aspect of these networks. It enables vehicles to share relevant sensor data

  18. On Line Segment Length and Mapping 4-regular Grid Structures in Network Infrastructures

    DEFF Research Database (Denmark)

    Riaz, Muhammad Tahir; Nielsen, Rasmus Hjorth; Pedersen, Jens Myrup

    2006-01-01

    The paper focuses on mapping the road network into 4-regular grid structures. A mapping algorithm is proposed. To model the road network GIS data have been used. The Geographic Information System (GIS) data for the road network are composed with different size of line segment lengths...

  19. Critical infrastructure protection decision support system decision model : overview and quick-start user's guide.

    Energy Technology Data Exchange (ETDEWEB)

    Samsa, M.; Van Kuiken, J.; Jusko, M.; Decision and Information Sciences

    2008-12-01

    The Critical Infrastructure Protection Decision Support System Decision Model (CIPDSS-DM) is a useful tool for comparing the effectiveness of alternative risk-mitigation strategies on the basis of CIPDSS consequence scenarios. The model is designed to assist analysts and policy makers in evaluating and selecting the most effective risk-mitigation strategies, as affected by the importance assigned to various impact measures and the likelihood of an incident. A typical CIPDSS-DM decision map plots the relative preference of alternative risk-mitigation options versus the annual probability of an undesired incident occurring once during the protective life of the investment, assumed to be 20 years. The model also enables other types of comparisons, including a decision map that isolates a selected impact variable and displays the relative preference for the options of interest--parameterized on the basis of the contribution of the isolated variable to total impact, as well as the likelihood of the incident. Satisfaction/regret analysis further assists the analyst or policy maker in evaluating the confidence with which one option can be selected over another.

  20. Fast rerouting schemes for protected mobile IP over MPLS networks

    Science.gov (United States)

    Wen, Chih-Chao; Chang, Sheng-Yi; Chen, Huan; Chen, Kim-Joan

    2005-10-01

    Fast rerouting is a critical traffic engineering operation in the MPLS networks. To implement the Mobile IP service over the MPLS network, one can collaborate with the fast rerouting operation to enhance the availability and survivability. MPLS can protect critical LSP tunnel between Home Agent (HA) and Foreign Agent (FA) using the fast rerouting scheme. In this paper, we propose a simple but efficient algorithm to address the triangle routing problem for the Mobile IP over the MPLS networks. We consider this routing issue as a link weighting and capacity assignment (LW-CA) problem. The derived solution is used to plan the fast restoration mechanism to protect the link or node failure. In this paper, we first model the LW-CA problem as a mixed integer optimization problem. Our goal is to minimize the call blocking probability on the most congested working truck for the mobile IP connections. Many existing network topologies are used to evaluate the performance of our scheme. Results show that our proposed scheme can obtain the best performance in terms of the smallest blocking probability compared to other schemes.

  1. Challenges in network science: Applications to infrastructures, climate, social systems and economics

    Science.gov (United States)

    Havlin, S.; Kenett, D. Y.; Ben-Jacob, E.; Bunde, A.; Cohen, R.; Hermann, H.; Kantelhardt, J. W.; Kertész, J.; Kirkpatrick, S.; Kurths, J.; Portugali, J.; Solomon, S.

    2012-11-01

    Network theory has become one of the most visible theoretical frameworks that can be applied to the description, analysis, understanding, design and repair of multi-level complex systems. Complex networks occur everywhere, in man-made and human social systems, in organic and inorganic matter, from nano to macro scales, and in natural and anthropogenic structures. New applications are developed at an ever-increasing rate and the promise for future growth is high, since increasingly we interact with one another within these vital and complex environments. Despite all the great successes of this field, crucial aspects of multi-level complex systems have been largely ignored. Important challenges of network science are to take into account many of these missing realistic features such as strong coupling between networks (networks are not isolated), the dynamics of networks (networks are not static), interrelationships between structure, dynamics and function of networks, interdependencies in given networks (and other classes of links, including different signs of interactions), and spatial properties (including geographical aspects) of networks. This aim of this paper is to introduce and discuss the challenges that future network science needs to address, and how different disciplines will be accordingly affected.

  2. Secure metropolitan network and the management of branches in the technological infrastructure:Case study GADM Babahoyo City

    Directory of Open Access Journals (Sweden)

    Joffre Vicente León Acurio

    2016-12-01

    Full Text Available This study aims to identify the nonexistent network to the general system of data communication that currently has the GADM (Autonomous Government Decentralized Municipal of Babahoyo located in the province of Los Rios in order to develop a logical design of a metropolitan network that can support new technologies and protocols ensuring the information conveyed between branches of GADM of Babahoyo, besides providing the institution of a compatible platform with the requirements of the e-Government (eGovernment. This research allowed to collect information through instruments such as interviews, meetings and literature review also visits took place at the premises of GADM Babahoyo, reviewing aspects of securities in telecommunications under the ISO / IEC 27002: 2013 citing reference the control objective Management network security. Identification, analysis and design of a proposed network infrastructure is made, allowing communication of the various units that are in distant places. It is concluded that the implementation of a system of networks throughout the municipal entity is considered a solution to the problem and generate many benefits.

  3. Common Criteria for Information Technology Security Evaluation: Department of Defense Public Key Infrastructure and Key Management Infrastructure Token Protection Profile (Medium Robustness)

    Science.gov (United States)

    2002-03-22

    may be derived from detailed inspection of the IC itself or from illicit appropriation of design information. Counterfeit smart cards can be mass...Infrastructure (PKI) as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair...interference devices (SQDIS), electrical testing, and electron beam testing. • Other attacks, such as UV or X-rays or high temperatures, could cause erasure

  4. URBAN-NET: A Network-based Infrastructure Monitoring and Analysis System for Emergency Management and Public Safety

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Sangkeun (Matt) [ORNL; Chen, Liangzhe [ORNL; Duan, Sisi [ORNL; Chinthavali, Supriya [ORNL; Shankar, Mallikarjun (Arjun) [ORNL; Prakash, B. Aditya [Virginia Tech, Blacksburg, VA

    2016-01-01

    Abstract Critical Infrastructures (CIs) such as energy, water, and transportation are complex networks that are crucial for sustaining day-to-day commodity flows vital to national security, economic stability, and public safety. The nature of these CIs is such that failures caused by an extreme weather event or a man-made incident can trigger widespread cascading failures, sending ripple effects at regional or even national scales. To minimize such effects, it is critical for emergency responders to identify existing or potential vulnerabilities within CIs during such stressor events in a systematic and quantifiable manner and take appropriate mitigating actions. We present here a novel critical infrastructure monitoring and analysis system named URBAN-NET. The system includes a software stack and tools for monitoring CIs, pre-processing data, interconnecting multiple CI datasets as a heterogeneous network, identifying vulnerabilities through graph-based topological analysis, and predicting consequences based on what-if simulations along with visualization. As a proof-of-concept, we present several case studies to show the capabilities of our system. We also discuss remaining challenges and future work.

  5. Sensitivity of marine protected area network connectivity to atmospheric variability.

    Science.gov (United States)

    Fox, Alan D; Henry, Lea-Anne; Corne, David W; Roberts, J Murray

    2016-11-01

    International efforts are underway to establish well-connected systems of marine protected areas (MPAs) covering at least 10% of the ocean by 2020. But the nature and dynamics of ocean ecosystem connectivity are poorly understood, with unresolved effects of climate variability. We used 40-year runs of a particle tracking model to examine the sensitivity of an MPA network for habitat-forming cold-water corals in the northeast Atlantic to changes in larval dispersal driven by atmospheric cycles and larval behaviour. Trajectories of Lophelia pertusa larvae were strongly correlated to the North Atlantic Oscillation (NAO), the dominant pattern of interannual atmospheric circulation variability over the northeast Atlantic. Variability in trajectories significantly altered network connectivity and source-sink dynamics, with positive phase NAO conditions producing a well-connected but asymmetrical network connected from west to east. Negative phase NAO produced reduced connectivity, but notably some larvae tracked westward-flowing currents towards coral populations on the mid-Atlantic ridge. Graph theoretical metrics demonstrate critical roles played by seamounts and offshore banks in larval supply and maintaining connectivity across the network. Larval longevity and behaviour mediated dispersal and connectivity, with shorter lived and passive larvae associated with reduced connectivity. We conclude that the existing MPA network is vulnerable to atmospheric-driven changes in ocean circulation.

  6. Testing the Feasibility of a Low-Cost Network Performance Measurement Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Chevalier, Scott [Indiana Univ., Bloomington, IN (United States). International Networks; Schopf, Jennifer M. [Indiana Univ., Bloomington, IN (United States). International Networks; Miller, Kenneth [Pennsylvania State Univ., University Park, PA (United States). Telecommunications and Networking Services; Zurawski, Jason [Lawrence Berkeley National Lab. (LBNL), Berkeley, CA (United States). Energy Sciences Network

    2016-07-01

    Todays science collaborations depend on reliable, high performance networks, but monitoring the end-to-end performance of a network can be costly and difficult. The most accurate approaches involve using measurement equipment in many locations, which can be both expensive and difficult to manage due to immobile or complicated assets. The perfSONAR framework facilitates network measurement making management of the tests more reasonable. Traditional deployments have used over-provisioned servers, which can be expensive to deploy and maintain. As scientific network uses proliferate, there is a desire to instrument more facets of a network to better understand trends. This work explores low cost alternatives to assist with network measurement. Benefits include the ability to deploy more resources quickly, and reduced capital and operating expenditures. Finally, we present candidate platforms and a testing scenario that evaluated the relative merits of four types of small form factor equipment to deliver accurate performance measurements.

  7. Genetic Algorithms for Agent-Based Infrastructure Interdependency Modeling and Analysis

    Energy Technology Data Exchange (ETDEWEB)

    May Permann

    2007-03-01

    Today’s society relies greatly upon an array of complex national and international infrastructure networks such as transportation, electric power, telecommunication, and financial networks. This paper describes initial research combining agent-based infrastructure modeling software and genetic algorithms (GAs) to help optimize infrastructure protection and restoration decisions. This research proposes to apply GAs to the problem of infrastructure modeling and analysis in order to determine the optimum assets to restore or protect from attack or other disaster. This research is just commencing and therefore the focus of this paper is the integration of a GA optimization method with a simulation through the simulation’s agents.

  8. NRS : a system for automated network virtualization in IaaS cloud infrastructures

    NARCIS (Netherlands)

    Theodorou, D.; Mak, R.H.; Keijser, J.J.; Suerink, T.

    2013-01-01

    Applications running in multi-tenant IaaS clouds increasingly require networked compute resources, which may belong to several clouds hosted in multiple data-centers. To accommodate these applications network virtualization is necessary, not only for isolation between tenants, but also for

  9. Financial Stability and Interacting Networks of Financial Institutions and Market Infrastructures

    NARCIS (Netherlands)

    Léon, C.; Berndsen, R.J.; Renneboog, L.D.R.

    2014-01-01

    An interacting network coupling financial institutions’ multiplex (i.e. multi-layer) and financial market infrastructures’ single-layer networks gives an accurate picture of a financial system’s true connective architecture. We examine and compare the main properties of Colombian multiplex and

  10. Vulnerability of network of networks

    Science.gov (United States)

    Havlin, S.; Kenett, D. Y.; Bashan, A.; Gao, J.; Stanley, H. E.

    2014-10-01

    Our dependence on networks - be they infrastructure, economic, social or others - leaves us prone to crises caused by the vulnerabilities of these networks. There is a great need to develop new methods to protect infrastructure networks and prevent cascade of failures (especially in cases of coupled networks). Terrorist attacks on transportation networks have traumatized modern societies. With a single blast, it has become possible to paralyze airline traffic, electric power supply, ground transportation or Internet communication. How, and at which cost can one restructure the network such that it will become more robust against malicious attacks? The gradual increase in attacks on the networks society depends on - Internet, mobile phone, transportation, air travel, banking, etc. - emphasize the need to develop new strategies to protect and defend these crucial networks of communication and infrastructure networks. One example is the threat of liquid explosives a few years ago, which completely shut down air travel for days, and has created extreme changes in regulations. Such threats and dangers warrant the need for new tools and strategies to defend critical infrastructure. In this paper we review recent advances in the theoretical understanding of the vulnerabilities of interdependent networks with and without spatial embedding, attack strategies and their affect on such networks of networks as well as recently developed strategies to optimize and repair failures caused by such attacks.

  11. Design and initial deployment of the wireless local area networking infrastructure at Sandia National Laboratories.

    Energy Technology Data Exchange (ETDEWEB)

    Long, John P.; Hamill, Michael J.; Mitchell, M. G.; Miller, Marc M.; Witzke, Edward L.; Wiener, Dallas J

    2006-11-01

    A major portion of the Wireless Networking Project at Sandia National Laboratories over the last few years has been to examine IEEE 802.11 wireless networking for possible use at Sandia and if practical, introduce this technology. This project team deployed 802.11a, b, and g Wireless Local Area Networking at Sandia. This report examines the basics of wireless networking and captures key results from project tests and experiments. It also records project members thoughts and designs on wireless LAN architecture and security issues. It documents some of the actions and milestones of this project, including pilot and production deployment of wireless networking equipment, and captures the team's rationale behind some of the decisions made. Finally, the report examines lessons learned, future directions, and conclusions.

  12. Adaptive comanagement of a marine protected area network in Fiji.

    Science.gov (United States)

    Weeks, Rebecca; Jupiter, Stacy D

    2013-12-01

    Adaptive management of natural resources is an iterative process of decision making whereby management strategies are progressively changed or adjusted in response to new information. Despite an increasing focus on the need for adaptive conservation strategies, there remain few applied examples. We describe the 9-year process of adaptive comanagement of a marine protected area network in Kubulau District, Fiji. In 2011, a review of protected area boundaries and management rules was motivated by the need to enhance management effectiveness and the desire to improve resilience to climate change. Through a series of consultations, with the Wildlife Conservation Society providing scientific input to community decision making, the network of marine protected areas was reconfigured so as to maximize resilience and compliance. Factors identified as contributing to this outcome include well-defined resource-access rights; community respect for a flexible system of customary governance; long-term commitment and presence of comanagement partners; supportive policy environment for comanagement; synthesis of traditional management approaches with systematic monitoring; and district-wide coordination, which provided a broader spatial context for adaptive-management decision making. Co-Manejo Adaptativo de una Red de Áreas Marinas Protegidas en Fiyi. © 2013 The Authors. Conservation Biology published by Wiley Periodicals, Inc., on behalf of the Society for Conservation Biology.

  13. Architecture, design and protection of power distribution networks; Architecture, conception et protection des reseaux de distribution

    Energy Technology Data Exchange (ETDEWEB)

    Sorrel, J.P. [Schneider Electric SA, 92 - Boulogne-Billancourt (France)

    2000-10-01

    The design of all-electric ships calls for high power levels in the propulsion systems. Merchant ships and especially naval vessels demand rugged, reliable propulsion systems with high availability, low maintenance and ease of operation. These constraints imply the choice of an optimized single winding system. The design of the network topology and protection system, and the choice of operating voltage and HT neutral configuration are the main steps in the design. (author)

  14. Research Devices Maintenance Programs and Safety Network Infrastructures in Nuclear Malaysia

    International Nuclear Information System (INIS)

    Zainudin Jaafar; Muhammad Zahidee Taat; Ishak Mansor

    2015-01-01

    Instrumentation and Automation Center (PIA) is responsible in carrying out maintenance work for building safety infrastructure and area for nuclear scientific and research work. Care cycle and nuclear scientific tools starting from the preparation of specifications until devices disposal- to get the maximum output from devices therefore PIA has introduced Effective and Comprehensive Maintenance Plan under Management/ Trust/ Development/ Science Fund budgets and also user, Asset Management, caring and handling of the devices. This paper also discussed more on case study related to using and handling so that it can be guidance and standard when its involving mishandling, improper maintenance, inadequacy of supervision and others including improvement suggestion programs. (author)

  15. Network Management System for (FUTON-like) Radio-over-Fiber Infrastructure

    DEFF Research Database (Denmark)

    Santiago, Carlos; Gangopadhyay, Bodhisattwa; Ramkumar, Venkata

    2010-01-01

    by the FUTON Middleware. Although a significant amount of prior research work can be found in the literature related to RoF, there is still significant lack of technologies concerning RoF networks management. RoF Manager and its sub-systems target to fill such gap, proposing a novel concept in the form...... operational costs. The RoF Network Manager manages the network equipment on the optical front haul between the Central Unit (CU) and all Remote Antenna Units (RAU)s connected by it, as well as the communication links, while enabling end-to-end service problem resolution and service quality management...

  16. The broadband networks, basic infrastructure of the knowledge society; Las redes de banda ancha, infraestructuras basicas de la sociedad del conocimiento

    Energy Technology Data Exchange (ETDEWEB)

    Diaz Vega, R.

    2010-07-01

    Telecommunication networks will conform the basic infrastructure of the future knowledge society. The growing demand in network usage will require the total renewal of current networks and accordingly large investment resources, presenting big difficulties (in a tough economic environment) and that can only be overcome from a global perspective with full understanding of networks role in the value chain and with contributions of all stake holders. This paper analyzes the relevant challenges to new generation network development and makes some proposals to cope with them. (Author) 4 refs.

  17. IAS telecommunication infrastructure and value added network services provided by IASNET

    Science.gov (United States)

    Smirnov, Oleg L.; Marchenko, Sergei

    The topology of a packet switching network for the Soviet National Centre for Automated Data Exchange with Foreign Computer Networks and Databanks (NCADE) based on a design by the Institute for Automated Systems (IAS) is discussed. NCADE has partners all over the world: it is linked to East European countries via telephone lines while satellites are used for communication with remote partners, such as Cuba, Mongolia, and Vietnam. Moreover, there is a connection to the Austrian, British, Canadian, Finnish, French, U.S. and other western networks through which users can have access to databases on each network. At the same time, NCADE provides western customers with access to more than 70 Soviet databases. Software and hardware of IASNET use data exchange recommendations agreed with the International Standard Organization (ISO) and International Telegraph and Telephone Consultative Committee (CCITT). Technical parameters of IASNET are compatible with the majority of foreign networks such as DATAPAK, TRANSPAC, TELENET, and others. By means of IASNET, the NCADE provides connection of Soviet and foreign users to information and computer centers around the world on the basis of the CCITT X.25 and X.75 recommendations. Any information resources of IASNET and value added network services, such as computer teleconferences, E-mail, information retrieval system, intelligent support of access to databanks and databases, and others are discussed. The topology of the ACADEMNET connected to IASNET over an X.25 gateway is also discussed.

  18. Bandwidth provisioning in infrastructure-based wireless networks employing directional antennas

    Energy Technology Data Exchange (ETDEWEB)

    Hasiviswanthan, Shiva [Los Alamos National Laboratory; Zhao, Bo [PENN STATE UNIV.; Vasudevan, Sudarshan [UNIV OF MASS AMHERST; Yrgaonkar, Bhuvan [PENN STATE UNIV.

    2009-01-01

    Motivated by the widespread proliferation of wireless networks employing directional antennas, we study the problem of provisioning bandwidth in such networks. Given a set of subscribers and one or more access points possessing directional antennas, we formalize the problem of orienting these antennas in two fundamental settings: (1) subscriber-centric, where the objective is to fairly allocate bandwidth among the subscribers and (2) provider-centric, where the objective is to maximize the revenue generated by satisfying the bandwidth requirements of subscribers. For both the problems, we first design algorithms for a network with only one access point working under the assumption that the number of antennas does not exceed the number of noninterfering channels. Using the well-regarded lexicographic max-min fair allocation as the objective for a subscriber-centric network, we present an optimum dynamic programming algorithm. For a provider-centric network, the allocation problem turns out to be NP-hard. We present a greedy heuristic based algorithm that guarantees almost half of the optimum revenue. We later enhance both these algorithms to operate in more general networks with multiple access points and no restrictions on the relative numbers of antennas and channels. A simulation-based evaluation using OPNET demonstrates the efficacy of our approaches and provides us further in insights into these problems.

  19. Summary report on transportation of nuclear fuel materials in Japan : transportation infrastructure, threats identified in open literature, and physical protection regulations.

    Energy Technology Data Exchange (ETDEWEB)

    Cochran, John Russell; Ouchi, Yuichiro (Japan Atomic Energy Agency, Japan); Furaus, James Phillip; Marincel, Michelle K.

    2008-03-01

    This report summarizes the results of three detailed studies of the physical protection systems for the protection of nuclear materials transport in Japan, with an emphasis on the transportation of mixed oxide fuel materials1. The Japanese infrastructure for transporting nuclear fuel materials is addressed in the first section. The second section of this report presents a summary of baseline data from the open literature on the threats of sabotage and theft during the transport of nuclear fuel materials in Japan. The third section summarizes a review of current International Atomic Energy Agency, Japanese and United States guidelines and regulations concerning the physical protection for the transportation of nuclear fuel materials.

  20. The Program for Climate Model Diagnosis and Intercomparison (PCMDI) Software Development: Applications, Infrastructure, and Middleware/Networks

    Energy Technology Data Exchange (ETDEWEB)

    Williams, Dean N. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2011-06-30

    The status of and future plans for the Program for Climate Model Diagnosis and Intercomparison (PCMDI) hinge on software that PCMDI is either currently distributing or plans to distribute to the climate community in the near future. These software products include standard conventions, national and international federated infrastructures, and community analysis and visualization tools. This report also mentions other secondary software not necessarily led by or developed at PCMDI to provide a complete picture of the overarching applications, infrastructures, and middleware/networks. Much of the software described anticipates the use of future technologies envisioned over the span of next year to 10 years. These technologies, together with the software, will be the catalyst required to address extreme-scale data warehousing, scalability issues, and service-level requirements for a diverse set of well-known projects essential for predicting climate change. These tools, unlike the previous static analysis tools of the past, will support the co-existence of many users in a productive, shared virtual environment. This advanced technological world driven by extreme-scale computing and the data it generates will increase scientists’ productivity, exploit national and international relationships, and push research to new levels of understanding.

  1. National Infrastructure Protection Plan

    National Research Council Canada - National Science Library

    2006-01-01

    .... Attacks on CI/KR could significantly disrupt the functioning of government and business alike and produce cascading effects far beyond the targeted sector and physical location of the incident...

  2. Protecting Critical Rail Infrastructure

    Science.gov (United States)

    2006-12-01

    Gulliver.Trb.Org/Publications/Sr/Sr270.Pdf. 38. Allan J. DeBlasio, Terrance J. Regan, Margaret E . Zirker, Katherine S. Fichter, Kristin Lovejoy ...getrpt?GAO-04-598T. 4. Ibid. 5. Thomas H. Kean, Lee H. Hamilton, Richard Ben-Veniste, Fred F. Fielding, Jamie S. Gorelick, Slade Gorton, Bob Kerrey...Committee, Current and Projected National Security Threats to the United States, Vice Admiral Lowell E . Jacoby, United States Navy, Director, Defense

  3. ARCUS Project Managers and the Intangible Infrastructure of Large Interdisciplinary Arctic Research Networks

    Science.gov (United States)

    Myers, B.; Wiggins, H. V.; Turner-Bogren, E. J.; Warburton, J.

    2017-12-01

    Project Managers at the Arctic Research Consortium of the U.S. (ARCUS) lead initiatives to convene, communicate with, and connect the Arctic research community across challenging disciplinary, geographic, temporal, and cultural boundaries. They regularly serve as the organizing hubs, archivists and memory-keepers for collaborative projects comprised of many loosely affiliated partners. As leading organizers of large open science meetings and other outreach events, they also monitor the interdisciplinary landscape of community needs, concerns, opportunities, and emerging research directions. However, leveraging the ARCUS Project Manager role to strategically build out the intangible infrastructure necessary to advance Arctic research requires a unique set of knowledge, skills, and experience. Drawing on a range of lessons learned from past and ongoing experiences with collaborative science, education and outreach programming, this presentation will highlight a model of ARCUS project management that we believe works best to support and sustain our community in its long-term effort to conquer the complexities of Arctic research.

  4. Feasibility study for linking railway network and power transmission infrastructure; Machbarkeitsstudie zur Verknuepfung von Bahn- und Energieleitungsinfrastrukturen

    Energy Technology Data Exchange (ETDEWEB)

    Hofmann, Lutz; Rathke, Christian [Hannover Univ. (Germany). Inst. fuer Energieversorgung und Hochspannungstechnik; Stephan, Arnd; Albrecht, Andreas [Technische Univ. Dresden (Germany). Inst. fuer Bahnfahrzeuge und Bahntechnik; Weyer, Hartmut; Lismann, Christian (comps.) [Technische Univ. Clausthal, Clausthal-Zellerfeld (Germany). Inst. fuer Deutsches und Internationales Berg- und Energierecht

    2013-03-15

    At times of growing emergencies of electricity transport, the extension of transmission becomes a necessary and compulsory component of the energy concept of the Federal Government. The extension of the capacities of the network transportation from North to South and from east to West is inevitable. Under this aspect, the contribution under consideration analyzes whether and to what extent the utilization of the existing railways potentials of the 16.7 Hz traction power supply system of the DB Energie GmbH (Frankfurt (Main), Federal Republic of Germany) is possible for the establishment of new power transmission lines of the general 50 Hz power supply. Furthermore, it is investigated to what extent possibilities of infrastructure connections exist in the shape of combined transmission routes between traction supply and public energy supply.

  5. Organisation et mise en oeuvre d'une infrastructure reglementaire nationale chargee de la protection contre les rayonnements ionisants et de la surete des sources de rayonnements. Rapport interimaire pour observations

    International Nuclear Information System (INIS)

    2001-11-01

    A number of IAEA Member States are undertaking to strengthen their radiation protection and safety infrastructures in order to facilitate the adoption of the requirements established in the International Basic Safety Standards for Protection against Ionizing Radiation and for the Safety of Radiation Sources (the Standards). In this connection, the IAEA has developed a technical co-operation programme (Model Project on Upgrading Radiation Protection Infrastructure) to improve radiation protection and safety infrastructures in 51 Member States, taking into account national profiles and needs of the individual participating, countries. The present report deals with the elements of a regulatory infrastructure for radiation protection and safety and intends to facilitate the, implementation of the Basic Safety Standards in practice. It takes into account the proposals in an earlier report, IAEA-TECDOC-663, but it has been expanded to include enabling legislation and modified to be more attuned to infrastructure issues related to implementation of the Standards. The orientation is toward infrastructures concerned with protection and safety for radiation sources used in medicine, agriculture, research, industry and education rather than infrastructures for protection and safety for complex nuclear facilities. It also discusses options for enhancing the effectiveness and efficiency of the infrastructure in accordance with the size and scope of radiation practices and available regulatory resources within a country

  6. Experience of the international network in radiation protection

    International Nuclear Information System (INIS)

    Medina Gironzini, Eduardo

    2008-01-01

    With the aim of exchanging information on various subjects about radiation protection and designing a site where the members can send and receive information on courses, scientific activities, articles, technical opinions, commentaries and everything that promotes the communication, collaboration and integration, the 15th March 2002 the networking: 'radioproteccion' is created with 11 persons from 11 countries. The number of members had been increased. By the first month it had 117 members and by the end of the year 2002 it had already 179 members, 315 messages were send by then. By December 2007, there were 726 members from 28 countries mainly from Latin America: Argentina, Brazil, Bolivia, Chile, Colombia, Costa Rica, Cuba, Dominican Republic, Ecuador, Guatemala, Honduras, Mexico, Nicaragua, Panama, Paraguay, Peru, Uruguay and Venezuela. There were also members from Austria, Canada, France, Israel, Italy, Portugal, Spain, Sweden, United Kingdom and United States. There have been distributed 2049 messages about Congress, courses and activities on national and international radiation protection and related issues which initially were in Latin American and the Caribbean. This has allowed diverse specialists that work in different themes to interchange experiences and information about subjects of common interest. This objective is the continuation of the spreading of activities that since 1991 and for 10 consecutive years had been made through the Bulletin 'Proteccion Radiologica', from which 65000 samples were published and distributed to specialists from 40 countries thanks to the support of the International Atomic Energy Agency (IAEA) and the Pan-American Health Organization (PAHO). This idea is complemented by the Web: www.radioproteccion.org. Interesting topics have been discussed in the network for example: Pregnancy and medical radiation, emergency response, occupational exposure, radiation protection responsibilities, lessons learned from accidental

  7. Collaborative-Hybrid Multi-Layer Network Control for Emerging Cyber-Infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Lehman, Tom [USC; Ghani, Nasir [UNM; Boyd, Eric [UCAID

    2010-08-31

    At a high level, there were four basic task areas identified for the Hybrid-MLN project. They are: o Multi-Layer, Multi-Domain, Control Plane Architecture and Implementation, including OSCARS layer2 and InterDomain Adaptation, Integration of LambdaStation and Terapaths with Layer2 dynamic provisioning, Control plane software release, Scheduling, AAA, security architecture, Network Virtualization architecture, Multi-Layer Network Architecture Framework Definition; o Heterogeneous DataPlane Testing; o Simulation; o Project Publications, Reports, and Presentations.

  8. Modeling cascading failures in interdependent infrastructures under terrorist attacks

    International Nuclear Information System (INIS)

    Wu, Baichao; Tang, Aiping; Wu, Jie

    2016-01-01

    An attack strength degradation model has been introduced to further capture the interdependencies among infrastructures and model cascading failures across infrastructures when terrorist attacks occur. A medium-sized energy system including oil network and power network is selected for exploring the vulnerabilities from independent networks to interdependent networks, considering the structural vulnerability and the functional vulnerability. Two types of interdependencies among critical infrastructures are involved in this paper: physical interdependencies and geographical interdependencies, shown by tunable parameters based on the probabilities of failures of nodes in the networks. In this paper, a tolerance parameter α is used to evaluation of the overloads of the substations based on power flow redistribution in power transmission systems under the attack. The results of simulation show that the independent networks or interdependent networks will be collapsed when only a small fraction of nodes are attacked under the attack strength degradation model, especially for the interdependent networks. The methodology introduced in this paper with physical interdependencies and geographical interdependencies involved in can be applied to analyze the vulnerability of the interdependent infrastructures further, and provides the insights of vulnerability of interdependent infrastructures to mitigation actions for critical infrastructure protections. - Highlights: • An attack strength degradation model based on the specified locations has been introduced. • Interdependencies considering both physical and geographical have been analyzed. • The structural vulnerability and the functional vulnerability have been considered.

  9. Protecting Clock Synchronization: Adversary Detection through Network Monitoring

    Directory of Open Access Journals (Sweden)

    Elena Lisova

    2016-01-01

    Full Text Available Nowadays, industrial networks are often used for safety-critical applications with real-time requirements. Such applications usually have a time-triggered nature with message scheduling as a core property. Scheduling requires nodes to share the same notion of time, that is, to be synchronized. Therefore, clock synchronization is a fundamental asset in real-time networks. However, since typical standards for clock synchronization, for example, IEEE 1588, do not provide the required level of security, it raises the question of clock synchronization protection. In this paper, we identify a way to break synchronization based on the IEEE 1588 standard, by conducting a man-in-the-middle (MIM attack followed by a delay attack. A MIM attack can be accomplished through, for example, Address Resolution Protocol (ARP poisoning. Using the AVISPA tool, we evaluate the potential to perform a delay attack using ARP poisoning and analyze its consequences showing both that the attack can, indeed, break clock synchronization and that some design choices, such as a relaxed synchronization condition mode, delay bounding, and using knowledge of environmental conditions, can make the network more robust/resilient against these kinds of attacks. Lastly, a Configuration Agent is proposed to monitor and detect anomalies introduced by an adversary performing attacks targeting clock synchronization.

  10. Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292)

    NARCIS (Netherlands)

    Dacer, Marc; Kargl, Frank; König, Hartmut; Valdes, Alfonso

    2014-01-01

    This report documents the program and the outcomes of Dagstuhl Seminar 14292 “Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures”. The main objective of the seminar was to discuss new approaches and ideas for securing industrial control systems. It

  11. Evaluating transceiver power savings produced by connectivity strategies for infrastructure wireless mesh networks

    CSIR Research Space (South Africa)

    Mudali, P

    2011-06-01

    Full Text Available . Santi, ?The k-neighbors Approach to Physical Degree Bounded and Symmetric Topology Control in ad hoc networks, ? Instituto di Informatica e Telematica, Pisa, Technical Report IIT-TR-142003, 2003. [20] P. Hall, ?On continuum percolation,? The Annals...

  12. Towards a Versatile Problem Diagnosis Infrastructure for LargeWireless Sensor Networks

    NARCIS (Netherlands)

    Iwanicki, Konrad; Steen, van Maarten

    2007-01-01

    In this position paper, we address the issue of durable maintenance of a wireless sensor network, which will be crucial if the vision of large, long-lived sensornets is to become reality. Durable maintenance requires tools for diagnosing and fixing occurring problems, which can range from

  13. Sellers on the street : the human infrastructure of the mobile phone network in Kigali, Rwanda

    NARCIS (Netherlands)

    Mann, L.E.; Nzayisenga, E.

    2015-01-01

    This paper looks in detail at the social and economic background of mobile airtime sellers on the streets of Kigali. While informal networks have proved to be an invaluable resource for large multinational telecommunication companies seeking to penetrate African markets, changing technological

  14. Evaluation of Opportunistic Routing Algorithms on Opportunistic Mobile Sensor Networks with Infrastructure Assistance

    NARCIS (Netherlands)

    Le Viet Duc, L Duc; Scholten, Johan; Havinga, Paul J.M.

    2012-01-01

    Recently the increasing number of sensors integrated in smartphones, especially the iPhone and Android phones, has motivated the development of routing algorithms for Opportunistic Mobile Sensor Networks (OppMSNs). Although there are many existing opportunistic routing algorithms, researchers still

  15. Architectural and Mobility Management Designs in Internet-Based Infrastructure Wireless Mesh Networks

    Science.gov (United States)

    Zhao, Weiyi

    2011-01-01

    Wireless mesh networks (WMNs) have recently emerged to be a cost-effective solution to support large-scale wireless Internet access. They have numerous applications, such as broadband Internet access, building automation, and intelligent transportation systems. One research challenge for Internet-based WMNs is to design efficient mobility…

  16. Chain-computerisation for better privacy protection : a new approach to developing non-intrusive information infrastructures that improve privacy protection

    NARCIS (Netherlands)

    Grijpink, J.H.A.M.

    1999-01-01

    This is the second of a series of two articles in which the author presents some key elements from his recently completed thesis about functional, non-intrusive information infrastructures for interorganisational public policy implementation. The development of these information infrastructures

  17. Analysis of DDoS Attack Effect and Protection Scheme in Wireless Mobile Ad-hoc Network

    OpenAIRE

    Ramratan Ahirwal; Leeladhar Mahour

    2012-01-01

    In Wireless mobile Ad Hoc Networks (MANET) every node functions as transmitter, router and data sink is network without infrastructure. Detecting malicious nodes in an open ad-hoc network in whichparticipating nodes have no previous security associations presents a number of challenges not faced by traditional wired networks. Traffic monitoring in wired networks is usually performed at switches,routers and gateways, but an ad-hoc network does not have these types of network elements where the...

  18. Cooperating Mobile GIS and Wireless Sensor Networks for Managing Transportation Infrastructures in Urban areas

    Directory of Open Access Journals (Sweden)

    R. Shad

    2013-10-01

    Full Text Available Time management is a major subject which, in order to optimize trip conditions, emphasizes on interpreting processes and classifying individual's information. In this paper, with the aim of providing an optimal system for urban commuting in proper time in Mashhad, each user using SMS and introducing some of his/her mental priorities to the system, will be able to select the best option depending on the timing of movement of the available public transport system. The present study adopts a newly developed method of time management which is evaluated for urban transportation considering dynamic conditions of a spatial database. For this purpose, regarding time management, processed data such as bus lines, taxi networks, and the subway system are combined in a spatial framework of a designed Mobile GIS based on a wireless network. So, multiple potential paths which end to a desirable destination.

  19. Network Vulnerability Assessment of the U.S. Crude Pipeline Infrastructure

    Science.gov (United States)

    2012-09-01

    pipeline will connect the COTH to receive Canadian oil and continue through Oklahoma to terminals in Nederland , Texas to serve the Port Arthur...route through Steele City, Kansas down to the COTH via the Keystone Cushing Expansion, and again down to Nederland , Texas to serve the Port Arthur...Canada through the COTH and down to Nederland , Texas will improve the resiliency of the network and reduce the risk associated with a Black Swan event

  20. An infrastructure for telecommunications power in a new era in public networking

    Energy Technology Data Exchange (ETDEWEB)

    Osifchin, N. [International Power Strategies (United States)

    2000-07-01

    A new era in networking is on the horizon as we enter the 21{sup st} century. It is based on a seamless circuit and packet public network (PN) with the potential to transport and process voice, video, data and Internet traffic at higher speeds and lower costs than today's PSTN. Worldwide divestitures and subsequent deregulation and the dramatic growth of the Internet have given rise to a growing number of competitive carriers and service providers. This has accelerated the deployment of packet networks and inspired government mandates that let competitors co-locate their equipment in incumbents COs and POPs. Customer's perceived the cost of co-location in incumbent's space to be expensive and restricting. This gave rise to a new industry that rents equipment space in buildings refurbished to replicate CO environments termed carrier hotels or telehousing. These events have impacted network power in two ways. It increased the demand for higher capacity CO power plants to support growth in Internet, DSLs and second lines and energized the debate over AC verses DC as the preferred power for telecommunications. Quality of service, which is a looming issue as the PSTN transitions to the PN, can be translated to mean dependable and reliable non-stop power. The trend to outsourcing equipment space needs presents ILECs a timely opportunity to consolidate their huge inventories of COs and POPs into business units that would lease equipment space to incumbents and competitors and convert a cost center into a profit center. (orig.)

  1. Status of NGS CORS Network and Its Contribution to the GGOS Infrastructure

    Science.gov (United States)

    Choi, K. K.; Haw, D.; Sun, L.

    2017-12-01

    Recent advancement of Satellite Geodesy techniques can now contribute to the global frame realization needed to improve worldwide accuracies. These techniques rely on coordinates computed using continuously observed GPS data and corresponding satellite orbits. The GPS-based reference system continues to depend on the physical stability of a ground-based network of points as the primary foundation for these observations. NOAA's National Geodetic Survey (NGS) has been operating Continuously Operating Reference Stations (CORS) to provide direct access to the National Spatial Reference System (NSRS). By virtue of NGS' scientific reputation and leadership in national and international geospatial issues, NGS has determined to increase its participation in the maintenance of the U.S. component of the global GPS tracking network in order to realize a long-term stable national terrestrial reference frame. NGS can do so by leveraging its national leadership role coupled with NGS' scientific expertise, in designating and upgrading a subset of the current tracking network for this purpose. This subset of stations must have the highest operational standards to serve the dual functions: being the U.S. contribution to the international frame, along with providing the link to the national datum. These stations deserve special attention to ensure that the highest possible levels of quality and stability are maintained. To meet this need, NGS is working with the international scientific groups to add and designate these reference stations based on scientific merit such as: colocation with other geodetic techniques, geographic area, and monumentation stability.

  2. Transportation infrastructure between nuclear power plant gates and nearest line-haul networks: Plan and procedure for data development

    International Nuclear Information System (INIS)

    Saricks, C.L.; Singh, M.K.; Stammer, R.E. Jr.

    1988-06-01

    This study is concerned with the segments of the transportation system that include possible routings over public roads and private (or public) rail links, and waterway access (within 25 miles) from the gates of typical reactor sites to proximate links of what can be termed the national through-route system. These routings are by no means uniform throughout the United States. Local roads and rail links near reactor sites may be subject to a wide variety of jurisdictions for maintenance, repair, and inspection; may or may not (at present) qualify for federal assistance under the Federal-Aid Highway and related funding programs; may or may not meet accepted construction standards for facilities expected to bear heavy loads; and, perhaps most importantly for the spent-fuel transportation program, may be subject to occasional and currently unavoidable disruptions that could seriously impair shipment schedules. The overall objectives of the study are to describe a framework for identifying the characteristics of the near-site transportation networks of all existing nuclear power plants that could give rise to important shipment scheduling and programming constraints. These characteristics cover both transportation infrastructure and existing structural and environmental limitation, and define a scope and schedule for constructing a data base for the transportation networks surrounding all nuclear power plants. 6 refs., 4 figs., 8 tabs

  3. The introduction of dengue follows transportation infrastructure changes in the state of Acre, Brazil: A network-based analysis.

    Science.gov (United States)

    Lana, Raquel Martins; Gomes, Marcelo Ferreira da Costa; Lima, Tiago França Melo de; Honório, Nildimar Alves; Codeço, Cláudia Torres

    2017-11-01

    Human mobility, presence and passive transportation of Aedes aegypti mosquito, and environmental characteristics are a group of factors which contribute to the success of dengue spread and establishment. To understand this process, we assess data from dengue national and municipal basins regarding population and demographics, transportation network, human mobility, and Ae. aegypti monitoring for the Brazilian state of Acre since the first recorded dengue case in the year 2000 to the year 2015. During this period, several changes in Acre's transport infrastructure and urbanization have been started. To reconstruct the process of dengue introduction in Acre, we propose an analytic framework based on concepts used in malaria literature, namely vulnerability and receptivity, to inform risk assessments in dengue-free regions as well as network theory concepts for disease invasion and propagation. We calculate the probability of dengue importation to Acre from other Brazilian states, the evolution of dengue spread between Acrean municipalities and dengue establishment in the state. Our findings suggest that the landscape changes associated with human mobility have created favorable conditions for the establishment of dengue virus transmission in Acre. The revitalization of its major roads, as well as the increased accessibility by air to and within the state, have increased dengue vulnerability. Unplanned urbanization and population growth, as observed in Acre during the period of study, contribute to ideal conditions for Ae. aegypti mosquito establishment, increase the difficulty in mosquito control and consequently its local receptivity.

  4. Safe Cycling Network : developing a system for assessing the safety of cycling infrastructure. Report on behalf of the Royal Dutch Touring Club ANWB.

    NARCIS (Netherlands)

    Wijlhuizen, G.J. Dijkstra, A. & Petegem, J.W.H. van

    2015-01-01

    ANWB has initiated a project to improve the safety of the cycling infrastructure in the Netherlands — and, in the longer term, also in other countries: the Safe Cycling Network project. This project was inspired in part by the international European Road Assessment Programme (EuroRAP/iRAP). The

  5. Usage of Wireless Sensor Networks in a service based spatial data infrastructure for Landslide Monitoring and Early Warning

    Science.gov (United States)

    Arnhardt, C.; Fernandez-Steeger, T. M.; Walter, K.; Kallash, A.; Niemeyer, F.; Azzam, R.; Bill, R.

    2007-12-01

    The joint project Sensor based Landslide Early Warning System (SLEWS) aims at a systematic development of a prototyping alarm- and early warning system for the detection of mass movements by application of an ad hoc wireless sensor network (WSN). Next to the development of suitable sensor setups, sensor fusion and network fusion are applied to enhance data quality and reduce false alarm rates. Of special interest is the data retrieval, processing and visualization in GI-Systems. Therefore a suitable serviced based Spatial Data Infrastructure (SDI) will be developed with respect to existing and upcoming Open Geospatial Consortium (OGC) standards.The application of WSN provides a cheap and easy to set up solution for special monitoring and data gathering in large areas. Measurement data from different low-cost transducers for deformation observation (acceleration, displacement, tilting) is collected by distributed sensor nodes (motes), which interact separately and connect each other in a self-organizing manner. Data are collected and aggregated at the beacon (transmission station) and further operations like data pre-processing and compression can be performed. The WSN concept provides next to energy efficiency, miniaturization, real-time monitoring and remote operation, but also new monitoring strategies like sensor and network fusion. Since not only single sensors can be integrated at single motes either cross-validation or redundant sensor setups are possible to enhance data quality. The planned monitoring and information system will include a mobile infrastructure (information technologies and communication components) as well as methods and models to estimate surface deformation parameters (positioning systems). The measurements result in heterogeneous observation sets that have to be integrated in a common adjustment and filtering approach. Reliable real-time information will be obtained using a range of sensor input and algorithms, from which early warnings

  6. Application of social network analysis in the assessment of organization infrastructure for service delivery: a three district case study from post-conflict northern Uganda.

    Science.gov (United States)

    Ssengooba, Freddie; Kawooya, Vincent; Namakula, Justine; Fustukian, Suzanne

    2017-10-01

    In post-conflict settings, service coverage indices are unlikely to be sustained if health systems are built on weak and unstable inter-organization networks-here referred to as infrastructure. The objective of this study was to assess the inter-organization infrastructure that supports the provision of selected health services in the reconstruction phase after conflict in northern Uganda. Applied social network analysis was used to establish the structure, size and function among organizations supporting the provision of (1) HIV treatment, (2) maternal delivery services and (3) workforce strengthening. Overall, 87 organizations were identified from 48 respondent organizations in the three post-conflict districts in northern Uganda. A two-stage snowball approach was used starting with service provider organizations in each district. Data included a list of organizations and their key attributes related to the provision of each service for the year 2012-13. The findings show that inter-organization networks are mostly focused on HIV treatment and least for workforce strengthening. The networks for HIV treatment and maternal services were about 3-4 times denser relative to the network for workforce strengthening. The network for HIV treatment accounted for 69-81% of the aggregated network in Gulu and Kitgum districts. In contrast, the network for workforce strengthening contributed the least (6% and 10%) in these two districts. Likewise, the networks supporting a young district (Amuru) was under invested with few organizations and sparse connections. Overall, organizations exhibited a broad range of functional roles in supporting HIV treatment compared to other services in the study. Basic information about the inter-organization setup (infrastructure)-can contribute to knowledge for building organization networks in more equitable ways. More connected organizations can be leveraged for faster communication and resource flow to boost the delivery of health services

  7. NUMA-Aware Thread Scheduling for Big Data Transfers over Terabits Network Infrastructure

    Directory of Open Access Journals (Sweden)

    Taeuk Kim

    2018-01-01

    Full Text Available The evergrowing trend of big data has led scientists to share and transfer the simulation and analytical data across the geodistributed research and computing facilities. However, the existing data transfer frameworks used for data sharing lack the capability to adopt the attributes of the underlying parallel file systems (PFS. LADS (Layout-Aware Data Scheduling is an end-to-end data transfer tool optimized for terabit network using a layout-aware data scheduling via PFS. However, it does not consider the NUMA (Nonuniform Memory Access architecture. In this paper, we propose a NUMA-aware thread and resource scheduling for optimized data transfer in terabit network. First, we propose distributed RMA buffers to reduce memory controller contention in CPU sockets and then schedule the threads based on CPU socket and NUMA nodes inside CPU socket to reduce memory access latency. We design and implement the proposed resource and thread scheduling in the existing LADS framework. Experimental results showed from 21.7% to 44% improvement with memory-level optimizations in the LADS framework as compared to the baseline without any optimization.

  8. Envisioning a 21st Century, National, Spacecraft Servicing and Protection Infrastructure and Demand Potential: A Logical Development of the Earth Orbit Economy

    Science.gov (United States)

    Horsham, Gary A.

    2003-01-01

    The modern world is extremely dependent on thin strings of several hundred civil, military, and commercial spacecraft/satellites currently stationed in space. They provide a steady stream of commerce, defense, and knowledge data. This dependency will in all likelihood increase significantly during this century. A major disruption of any kind in these essential systems and networks could be socially, economically, and politically catastrophic, on a global scale. The development of a space-based, robotic services economy could be useful in mitigating this growing risk, from an efficiency and security standpoint. This paper attempts to suggest what makes sense to invest in next for the logical, economic development of Earth orbit i.e., after ISS completion. It expands on the results of an advanced market research and analysis study that sampled the opinions of several satellite industry executives and presents these results within a broad policy context. The concept of a spacecraft carrier that serves as the nucleus of a national, space-based or on-orbit, robotic services infrastructure is introduced as the next logical step for United States leadership in space. This is viewed as a reasonable and appropriate followon to the development of ELVs and satellites in the 1950s and 1960s, the Space Shuttle/PRLV in the 1970s and 1980s, and the International Space Station (ISS) in the 1980s, 1990s and 2000s. Large-scale experience in LEO-to-GEO spacecraft/satellite servicing and protection by robotic means is assumed to be an indispensable prerequisite or stepping-stone toward the development and preservation of the large scientific exploration facilities that are envisioned by NASA for operation beyond GEO. A balanced, return on national investment (RONI) strategy for space, focused on the provision of enhanced national/homeland security for increased protection, national economic/industrial expansion for increased revenue, and national scientific exploration for increased

  9. Enhancing source location protection in wireless sensor networks

    Science.gov (United States)

    Chen, Juan; Lin, Zhengkui; Wu, Di; Wang, Bailing

    2015-12-01

    Wireless sensor networks are widely deployed in the internet of things to monitor valuable objects. Once the object is monitored, the sensor nearest to the object which is known as the source informs the base station about the object's information periodically. It is obvious that attackers can capture the object successfully by localizing the source. Thus, many protocols have been proposed to secure the source location. However, in this paper, we examine that typical source location protection protocols generate not only near but also highly localized phantom locations. As a result, attackers can trace the source easily from these phantom locations. To address these limitations, we propose a protocol to enhance the source location protection (SLE). With phantom locations far away from the source and widely distributed, SLE improves source location anonymity significantly. Theory analysis and simulation results show that our SLE provides strong source location privacy preservation and the average safety period increases by nearly one order of magnitude compared with existing work with low communication cost.

  10. Mesh Network Design for Smart Charging Infrastructure and Electric Vehicle Remote Monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Shepelev, Aleksey; Chung, Ching-Yen; Chu, Chi-Cheng; Gadh, Rajit

    2013-10-14

    Plug-In Electric Vehicle (PEV) charging today happens with little knowledge of the state of the vehicle being charged. In order to implement smart charging algorithms and other capabilities of the future smart grid, provisions for remote PEV monitoring will have to be developed and tested. The UCLA Smart-grid Energy Research Center (SMERC) is working on a smart charging research platform that includes data acquired in real time from PEVs being charged in order to investigate smart charging algorithms and demand response (DR) strategies for PEVs in large parking garage settings. The system outlined in this work allows PEVs to be remotely monitored throughout the charging process by a smart-charging controller communicating through a mesh network of charging stations and in-vehicle monitoring devices. The approach may be used for Vehicle to Grid (V2G) communication as well as PEV monitoring.

  11. Open-Access-Kooperationen in Österreich: Open Access Network Austria und E-Infrastructures Austria – aktuelle Entwicklungen seit 2012

    Directory of Open Access Journals (Sweden)

    Bauer, Bruno

    2014-12-01

    Full Text Available [english] The Berlin Declaration on Open Access to scientific knowledge was published in October 2003. All over the world initiatives and projects were started. However, in Austria Open Access got little attention over many years. This was confirmed by a study among Austrian universities on behalf of the Council of Austrian University Libraries. Finally at the turn of the year 2012/2013 the Open Access Network Austria and the university infrastructure project E-Infrastructure Austria were started to push Open Access in Austria on a national level. So 10 years after the Berlin Declaration Austria set up the preconditions to establish sustainable Open Access.

  12. An infrastructure with a unified control plane to integrate IP into optical metro networks to provide flexible and intelligent bandwidth on demand for cloud computing

    Science.gov (United States)

    Yang, Wei; Hall, Trevor

    2012-12-01

    The Internet is entering an era of cloud computing to provide more cost effective, eco-friendly and reliable services to consumer and business users and the nature of the Internet traffic will undertake a fundamental transformation. Consequently, the current Internet will no longer suffice for serving cloud traffic in metro areas. This work proposes an infrastructure with a unified control plane that integrates simple packet aggregation technology with optical express through the interoperation between IP routers and electrical traffic controllers in optical metro networks. The proposed infrastructure provides flexible, intelligent, and eco-friendly bandwidth on demand for cloud computing in metro areas.

  13. How to Use FASTLANEs to Protect IP Networks

    National Research Council Canada - National Science Library

    Robson, Christopher L

    2006-01-01

    .... By using appropriate configuration and taking full advantage of new IP technologies and successful network encryption FASTLANE devices, interconnecting individual agency networks into a common...

  14. The research of computer network security and protection strategy

    Science.gov (United States)

    He, Jian

    2017-05-01

    With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.

  15. Application of DIgSILENT POWERFACTORY software for modeling of industrial network relay protection system

    Directory of Open Access Journals (Sweden)

    Sučević Nikola

    2016-01-01

    Full Text Available This paper presents modeling of industrial network relay protection system using DIgSILENT PowerFactory software. The basis for the model of protection system is a model of a single substation in an industrial network. The paper presents the procedure for modeling of protective devices of 6 kV asynchronous motors, 6/0,4 kV/kV transformers as well as protection in the bus coupler and busbar protection. Protective relay system response for the simulated disturbances is shown in the paper.

  16. Application of DIgSILENT POWERFACTORY software for modeling of industrial network relay protection system

    OpenAIRE

    Sučević Nikola; Milošević Dejan

    2016-01-01

    This paper presents modeling of industrial network relay protection system using DIgSILENT PowerFactory software. The basis for the model of protection system is a model of a single substation in an industrial network. The paper presents the procedure for modeling of protective devices of 6 kV asynchronous motors, 6/0,4 kV/kV transformers as well as protection in the bus coupler and busbar protection. Protective relay system response for the simulated disturbances is shown in the paper.

  17. Australia’s protected area network fails to adequately protect the world’s most threatened marine fishes

    Directory of Open Access Journals (Sweden)

    Karen R. Devitt

    2015-01-01

    Full Text Available In order to maintain ecosystems and biodiversity, Australia has long invested in the development of marine and terrestrial protected area networks. Within this land- and sea-scape, northern Australia represents a global population stronghold for four species of the world’s most threatened marine fish family, the sawfishes (family Pristidae. The distribution of sawfishes across northern Australia has previously only been coarsely estimated, and the adequacy of their representation in protected areas has not been evaluated. The calculated range of each species was intersected with Australia’s marine and terrestrial protected area datasets, and targets of 10% marine and 17% inland range protection were used to determine adequacy of sawfish range protection. Marine targets have been achieved for all species, but the inland range protection targets have not been met for any species. Results indicate that further protection of inland habitats is required in order to improve sawfish protection and habitat connectivity.

  18. Integration in primary community care networks (PCCNs: examination of governance, clinical, marketing, financial, and information infrastructures in a national demonstration project in Taiwan

    Directory of Open Access Journals (Sweden)

    Lin Blossom Yen-Ju

    2007-06-01

    Full Text Available Abstract Background Taiwan's primary community care network (PCCN demonstration project, funded by the Bureau of National Health Insurance on March 2003, was established to discourage hospital shopping behavior of people and drive the traditional fragmented health care providers into cooperate care models. Between 2003 and 2005, 268 PCCNs were established. This study profiled the individual members in the PCCNs to study the nature and extent to which their network infrastructures have been integrated among the members (clinics and hospitals within individual PCCNs. Methods The thorough questionnaire items, covering the network working infrastructures – governance, clinical, marketing, financial, and information integration in PCCNs, were developed with validity and reliability confirmed. One thousand five hundred and fifty-seven clinics that had belonged to PCCNs for more than one year, based on the 2003–2005 Taiwan Primary Community Care Network List, were surveyed by mail. Nine hundred and twenty-eight clinic members responded to the surveys giving a 59.6 % response rate. Results Overall, the PCCNs' members had higher involvement in the governance infrastructure, which was usually viewed as the most important for establishment of core values in PCCNs' organization design and management at the early integration stage. In addition, it found that there existed a higher extent of integration of clinical, marketing, and information infrastructures among the hospital-clinic member relationship than those among clinic members within individual PCCNs. The financial infrastructure was shown the least integrated relative to other functional infrastructures at the early stage of PCCN formation. Conclusion There was still room for better integrated partnerships, as evidenced by the great variety of relationships and differences in extent of integration in this study. In addition to provide how the network members have done for their initial work at

  19. Non-dominated sorting binary differential evolution for the multi-objective optimization of cascading failures protection in complex networks

    International Nuclear Information System (INIS)

    Li, Y.F.; Sansavini, G.; Zio, E.

    2013-01-01

    A number of research works have been devoted to the optimization of protection strategies (e.g. transmission line switch off) of critical infrastructures (e.g. power grids, telecommunication networks, computer networks, etc) to avoid cascading failures. This work aims at improving a previous optimization approach proposed by some of the authors [1], based on the modified binary differential evolution (MBDE) algorithm. The improvements are three-fold: (1) in the optimization problem formulation, we introduce a third objective function to minimize the impacts of the switching off operations onto the existing network topology; (2) in the optimization problem formulation, we use the final results of cascades, rather than only a short horizon of one step cascading, to evaluate the effects of the switching off strategies; (3) in the optimization algorithm, the fast non-dominated sorting mechanisms are incorporated into the MBDE algorithm: a new algorithm, namely non-dominated sorting binary differential evolution algorithm (NSBDE) is then proposed. The numerical application to the topological structure of the 380 kV Italian power transmission network proves the benefits of the improvements.

  20. Research for the Influence of Distribution Network Line Reclosing Current on Line Protection

    Directory of Open Access Journals (Sweden)

    Yu Kansheng

    2016-01-01

    Full Text Available According to the distribution network line structure and reclosing control strategy, the system simulation model of distribution network lines has established based on the real-time digital simulation RTDS. Based on this, distribution network switching impulse current characteristic has researched with different capacity, different distribution and different load power factor under the different voltage switching angles. The results of the study provide a scientific basis for distribution network line protection setting, in order to further lay the foundation for improvement the validity and reliability of distribution network line protection action.

  1. Impact of distributed generation units with power electronic converters on distribution network protection

    NARCIS (Netherlands)

    Morren, J.; Haan, de S.W.H.

    2008-01-01

    An increasing number of distributed generation units (DG units) are connected to the distribution network. These generators affect the operation and coordination of the distribution network protection. The influence from DG units that are coupled to the network with a power electronic converter

  2. Novel mechanism of network protection against the new generation of cyber attacks

    Science.gov (United States)

    Milovanov, Alexander; Bukshpun, Leonid; Pradhan, Ranjit

    2012-06-01

    A new intelligent mechanism is presented to protect networks against the new generation of cyber attacks. This mechanism integrates TCP/UDP/IP protocol stack protection and attacker/intruder deception to eliminate existing TCP/UDP/IP protocol stack vulnerabilities. It allows to detect currently undetectable, highly distributed, low-frequency attacks such as distributed denial-of-service (DDoS) attacks, coordinated attacks, botnet, and stealth network reconnaissance. The mechanism also allows insulating attacker/intruder from the network and redirecting the attack to a simulated network acting as a decoy. As a result, network security personnel gain sufficient time to defend the network and collect the attack information. The presented approach can be incorporated into wireless or wired networks that require protection against known and the new generation of cyber attacks.

  3. Enabling Real-Time Video Services over Ad-Hoc Networks Opens the Gates for E-learning in Areas Lacking Infrastructure

    Directory of Open Access Journals (Sweden)

    Johannes Karlsson

    2009-10-01

    Full Text Available In this paper we suggest a promising solution to come over the problems of delivering e-learning to areas with lack or deficiencies in infrastructure for Internet and mobile communication. We present a simple, reasonably priced and efficient communication platform for providing e-learning. This platform is based on wireless ad-hoc networks. We also present a preemptive routing protocol suitable for real-time video communication over wireless ad-hoc networks. Our results show that this routing protocol can significantly improve the quality of the received video. This makes our suggested system not only good to overcome the infrastructure barrier but even capable of delivering a high quality e-learning material.

  4. Common definition for categories of clinical research: a prerequisite for a survey on regulatory requirements by the European Clinical Research Infrastructures Network (ECRIN)

    DEFF Research Database (Denmark)

    Kubiak, Christine; de Andres-Trelles, Fernando; Kuchinke, Wolfgang

    2009-01-01

    in relation to the wide spectrum of clinical research, the European Clinical Research Infrastructures Network (ECRIN) developed a multinational survey in ten European countries. However a lack of common classification framework for major categories of clinical research was identified, and therefore reaching...... with cell therapy, etc.); diagnostic studies; clinical research on nutrition; other interventional clinical research (including trials in complementary and alternative medicine, trials with collection of blood or tissue samples, physiology studies, etc.); and epidemiology studies. Our classification...

  5. 10 CFR 73.54 - Protection of digital computer and communication systems and networks.

    Science.gov (United States)

    2010-01-01

    ... 10 Energy 2 2010-01-01 2010-01-01 false Protection of digital computer and communication systems and networks. 73.54 Section 73.54 Energy NUCLEAR REGULATORY COMMISSION (CONTINUED) PHYSICAL PROTECTION... security program as a component of the physical protection program. (c) The cyber security program must be...

  6. Phonion: Practical Protection of Metadata in Telephony Networks

    Directory of Open Access Journals (Sweden)

    Heuser Stephan

    2017-01-01

    Full Text Available The majority of people across the globe rely on telephony networks as their primary means of communication. As such, many of the most sensitive personal, corporate and government related communications pass through these systems every day. Unsurprisingly, such connections are subject to a wide range of attacks. Of increasing concern is the use of metadata contained in Call Detail Records (CDRs, which contain source, destination, start time and duration of a call. This information is potentially dangerous as the very act of two parties communicating can reveal significant details about their relationship and put them in the focus of targeted observation or surveillance, which is highly critical especially for journalists and activists. To address this problem, we develop the Phonion architecture to frustrate such attacks by separating call setup functions from call delivery. Specifically, Phonion allows users to preemptively establish call circuits across multiple providers and technologies before dialing into the circuit and does not require constant Internet connectivity. Since no single carrier can determine the ultimate destination of the call, it provides unlinkability for its users and helps them to avoid passive surveillance. We define and discuss a range of adversary classes and analyze why current obfuscation technologies fail to protect users against such metadata attacks. In our extensive evaluation we further analyze advanced anonymity technologies (e.g., VoIP over Tor, which do not preserve our functional requirements for high voice quality in the absence of constant broadband Internet connectivity and compatibility with landline and feature phones. Phonion is the first practical system to provide guarantees of unlinkable communication against a range of practical adversaries in telephony systems.

  7. Community-Based Soil Quality Assessment As a Tool for Designing an Urban Green Infrastructure Network to Manage Runoff.

    Science.gov (United States)

    Klimas, C.; Montgomery, J.

    2014-12-01

    Green infrastructure (GI) may be the most practical approach for reducing contaminated runoff, providing ecosystem services, mitigating food deserts and creating community open spaces in urban areas. This project was funded by the USEPA's People-Prosperity-Planet (P3) program and was a partnership between a team of DePaul University undergraduates (the P3 team) and high school interns (Green Teens) and staff from the Gary Comer Youth Center (GCYC). GCYC is located in a low-income African-American community on Chicago's south side characterized by high crime, abandoned buildings, lack of green space and a food desert. The overaching project goal was to develop a network of Green Teens qualified to conduct soil quality assessment using USDA-NRCS protocols in order to let them develop GI plans to minimize storm water runoff and contaminant loadings, improve community and environmental health, and provide more equitable access to green space. Working with a USDA-ARS soil scientist from Washington State University, the P3 team conducted soil quality assessment on 116 soil samples collected among four abandoned residential lots owned by GCYC. Analytes included infiltration, bulk density, texture, pH, conductivity, aggregate stability, available nutrients, and total and bioavailable (PBET) lead. Soil pH on all lots is greater than 8.0, are low in organic matter, have little microbial respiration activity, are enriched in available phosphorus, and have average total lead values ranging from 24-2,700 mg/kg. PBET lead was less than 40% on most lots. Regardless, these soils will need to be remediated by adding carbon-rich materials such as biosolids prior to GI installation. Students enrolled in a landscape design course at DePaul developed 3-D models representing potential GI designs for one of the vacant lots that include strategies for immobilizing heavy metals, reducing runoff, and which are tied into an educational module for neighborhood school children.

  8. Measuring the effectiveness of protected area networks in reducing deforestation.

    Science.gov (United States)

    Andam, Kwaw S; Ferraro, Paul J; Pfaff, Alexander; Sanchez-Azofeifa, G Arturo; Robalino, Juan A

    2008-10-21

    Global efforts to reduce tropical deforestation rely heavily on the establishment of protected areas. Measuring the effectiveness of these areas is difficult because the amount of deforestation that would have occurred in the absence of legal protection cannot be directly observed. Conventional methods of evaluating the effectiveness of protected areas can be biased because protection is not randomly assigned and because protection can induce deforestation spillovers (displacement) to neighboring forests. We demonstrate that estimates of effectiveness can be substantially improved by controlling for biases along dimensions that are observable, measuring spatial spillovers, and testing the sensitivity of estimates to potential hidden biases. We apply matching methods to evaluate the impact on deforestation of Costa Rica's renowned protected-area system between 1960 and 1997. We find that protection reduced deforestation: approximately 10% of the protected forests would have been deforested had they not been protected. Conventional approaches to evaluating conservation impact, which fail to control for observable covariates correlated with both protection and deforestation, substantially overestimate avoided deforestation (by over 65%, based on our estimates). We also find that deforestation spillovers from protected to unprotected forests are negligible. Our conclusions are robust to potential hidden bias, as well as to changes in modeling assumptions. Our results show that, with appropriate empirical methods, conservation scientists and policy makers can better understand the relationships between human and natural systems and can use this to guide their attempts to protect critical ecosystem services.

  9. Study on the overcurrent character analysis and its protective system of underground LV distribution networks

    Energy Technology Data Exchange (ETDEWEB)

    Song, J.; Shi, Z.; Yang, Y.; Shi, W.; Wei, H.; Zhai, S.; Xie, H. [Taiyuan University of Technology, Taiyuan (China)

    2001-02-01

    The overcurrent fault characteristics in underground LV cable distribution networks is analysed and the fundamental principle of overcurrent protective system is described in this paper. The emphasis is paid to the determination of the characteristic curves of phase-sensitive symmetrical short-circuit protection, the design of negative-sequence current filter and the definition of the mathematical model of overload. Besides, the hardware block diagram and the software flowchart of the protective system, which is controlled by a single chip microcomputer, is also introduced in the paper. The protective system was tested before being applied to the underground LV distribution networks. The results obtained are in conformity with the design specification. It has been verified that the protective distance is extended and the protective sensitivity is improved with the protective system. The field experience has shown that the protective system is stable and reliable, and will be of great application value in the mining industry. 7 refs., 5 figs., 2 tabs.

  10. Greening infrastructure

    CSIR Research Space (South Africa)

    Van Wyk, Llewellyn V

    2014-10-01

    Full Text Available The development and maintenance of infrastructure is crucial to improving economic growth and quality of life (WEF 2013). Urban infrastructure typically includes bulk services such as water, sanitation and energy (typically electricity and gas...

  11. A Novel Method of Protection to Prevent Reverse Power Flow Based on Neuro-Fuzzy Networks for Smart Grid

    Directory of Open Access Journals (Sweden)

    Ali Hadi Abdulwahid

    2018-04-01

    Full Text Available This paper addresses the energy challenges related to the weak protection of renewable energy from reverse energy flow and expanding access to high-quality energy at the same time. Furthermore, this paper focuses on participation in the global transition to clean and low-carbon energy systems. Moreover, the increased demand for renewable energy seems to likely depend on whether it will be possible to greatly accelerate rates of progress toward increased efficiency, de-carbonization, greater generating diversity and lower pollutant emissions. This paper focuses on the protection of renewable energy technologies because they can be particularly attractive in dispersed areas and therefore, represent an important option for rural areas that lack electrical energy and distribution infrastructure. This paper proposes an improved protection device for a reverse power protection system using a new intelligent decision support system (IDSS. The IDSS is a support system for decision making, which makes extensive use of artificial intelligence (AI techniques. The new method integrates the powerful specification for neural networks and fuzzy inference systems. The main advantage of this method is that it causes a decrease in the steady state oscillation for the reverse power relay. In addition, the proposed method has the ability to monitor extreme environmental conditions. The generator can be converted into a motor when the steam supply to a turbine is interrupted while the generator is still connected to a grid (or operates in parallel with another generator. As a result, the generator will become a synchronous motor and will actually cause significant mechanical damage. The reverse energy protection device should be included in the generator protection scheme. Smart grids use communication networks with sophisticated algorithms to ensure coordination between protection systems. ZigBee is a newly developed technology that can be used in wireless sensor

  12. Development of a remote sensing network for time-sensitive detection of fine scale damage to transportation infrastructure : [final report].

    Science.gov (United States)

    2015-09-23

    This research project aimed to develop a remote sensing system capable of rapidly identifying fine-scale damage to critical transportation infrastructure following hazard events. Such a system must be pre-planned for rapid deployment, automate proces...

  13. Bike Infrastructures

    DEFF Research Database (Denmark)

    Silva, Victor; Harder, Henrik; Jensen, Ole B.

    Bike Infrastructures aims to identify bicycle infrastructure typologies and design elements that can help promote cycling significantly. It is structured as a case study based research where three cycling infrastructures with distinct typologies were analyzed and compared. The three cases......, the findings of this research project can also support bike friendly design and planning, and cyclist advocacy....

  14. A Trusted Autonomic Architecture to Safeguard Cyber-Physical Control Leaf Nodes and Protect Process Integrity

    OpenAIRE

    Chiluvuri, Nayana Teja

    2015-01-01

    Cyber-physical systems are networked through IT infrastructure and susceptible to malware. Threats targeting process control are much more safety-critical than traditional computing systems since they jeopardize the integrity of physical infrastructure. Existing defence mechanisms address security at the network nodes but do not protect the physical infrastructure if network integrity is compromised. An interface guardian architecture is implemented on cyber-physical control leaf nodes to mai...

  15. Network protection against worms and cascading failures using modularity partitioning

    NARCIS (Netherlands)

    Omic, J.; Hernandez, J.M.; Van Mieghem, P.

    2010-01-01

    Communication networks are prone to virus and worms spreading and cascading failures. Recently, a number of social networking worms have spread over public Web sites. Another example is error propagation in routing tables, such as in BGP tables. The immunization and error curing applied to these

  16. Social Networks in the workplace - some data protection issues

    OpenAIRE

    Haynes, D.

    2011-01-01

    There are many benefits to be gained from using social networks in the workplace but there is a downside – a growing concern about privacy and misuse of personal information. Using the results from a survey he conducted to highlight the issues, David Haynes puts forward an approach to managing social networks through the introduction of organisational policy.

  17. Participation in protected areas: A social network case study in Catalonia, Spain

    NARCIS (Netherlands)

    Calvet-Mir, L.; Maestre Andrés, S.; Molina, J.L.; van den Bergh, J.C.J.M.

    2015-01-01

    Local participation of stakeholders in governance of protected areas is considered to be important to natural resource management and biodiversity conservation. Social network analysis (SNA) is a useful tool for analysis because it allows the understanding of stakeholders’ relationships,

  18. Assessing the efficiency of information protection systems in the computer systems and networks

    OpenAIRE

    Nachev, Atanas; Zhelezov, Stanimir

    2015-01-01

    The specific features of the information protection systems in the computer systems and networks require the development of non-trivial methods for their analysis and assessment. Attempts for solutions in this area are given in this paper.

  19. Cyberwarfare on the Electricity Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Murarka, N.; Ramesh, V.C.

    2000-03-20

    The report analyzes the possibility of cyberwarfare on the electricity infrastructure. The ongoing deregulation of the electricity industry makes the power grid all the more vulnerable to cyber attacks. The report models the power system information system components, models potential threats and protective measures. It therefore offers a framework for infrastructure protection.

  20. Main concept of local area network protection on the basis of the SAAM 'TRAFFIC'

    International Nuclear Information System (INIS)

    Vasil'ev, P.M.; Kryukov, Yu.A.; Kuptsov, S.I.; Ivanov, V.V.; Koren'kov, V.V.

    2002-01-01

    In our previous paper we developed a system for acquisition, analysis and management of the network traffic (SAAM 'Traffic') for a segment of the JINR local area computer network (JINR LAN). In our present work we consider well-known scenarios of attacks on local area networks and propose protection methods based on the SAAM 'Traffic'. Although the system for LAN protection is installed on a router computer, it is not analogous to the firewall scheme and, thus, it does not hinder the performance of distributed network applications. This provides a possibility to apply such an approach to GRID-technologies, where network protection on the firewall basis can not be basically used. (author)

  1. Touristic infrastructure of municipalities in the border section of Bug valley's Dołhobyczów-Włodawa in the context of existing protected areas

    Science.gov (United States)

    Kałamucka, Wioletta; Kałamucki, Krzysztof

    2011-01-01

    This article presents results of research concerning tourist infrastructure in some districts located in the Bug river valley, in the context of protected areas. The territory examined includes 9 rural districts and 2 towns in the immediate neighborhood of the river. These administrative units are characterized by great natural value. Their total area is 687,7 km2 that makes 6,7% of the whole Lublin voivodship. On the other hand, the share of protected areas (without Natura 2000) is twice as high - 11,1%. Protected areas makes 37,6% of the territory under study. In some units, share of protected areas is very high: Dubienka - 72%, Horodło - 69,5%. In 2009 in the region examined there were 48 objects of collective accommodation - 16,8% of total number in the voivodship. 83,6% of all objects were situated in Włodawa. Characteristic feature of accommodation is seasonality. There are only 7 objects that functions the whole year and year-round lodging places (280) makes barely 9,3% of the totality. Comparing tourist management with presence of areas of the highest natural values, one can see strong correlation between these two indexes only in rural unit - Włodawa, located within the borders of Biosphere Reserves "Polesie Zachodnie" (West Polesie) In case of other units such a interdependance does not exist. On the contrary, there is opposite relation. In Dołhobyczów, Mircze, Horodło, where apart from areas of Natura 2000, in the Bug river valley landscapes protected areas and landscapes parks were created, tourist infrastructure is insignificant or even does not exist. The existence of large protected areas and natural value make it possible to develop various forms of environmentally friendly tourism - tourism qualified, especially fishing and canoeing, hiking, biking, nature education tourism. Tourist service centers should be located outside the valley. Due to the high natural values, caution is advisable to adapt the area for tourism. Such decisions should

  2. APPLIED OF IMPRESSED CURRENT CATHODIC PROTECTION DESIGN FOR FUEL PIPELINE NETWORK AT NAVAL BASE

    Directory of Open Access Journals (Sweden)

    k. Susilo

    2017-06-01

    Full Text Available Indonesian Navy (TNI AL is the main component for Maritime Security and Defence. Because of that, TNI AL needs Indonesian Warship (KRI to covered Maritime area. The main requirement from KRI is fulfilled by demand. To pock of fuel demand from KRI at Naval Base, it needs a new pipeline of fuel distribution network system. The pipeline network system used for maximum lifetime must be protected from corrosion. Basically, there are five methods of corrosion control such as change to a more suitable material, modification to the environment, use of protective coating, design modification to the system or component, and the application of cathodic or anodic protection. Cathodic protection for pipeline available in two kinds, namely Sacrifice Anode and Impressed Current Cathodic Protection (ICCP. This paper makes analysis from design of Impressed Current Cathodic Protection and total current requirement in the method. This paper showed both experimental from speciment test and theoritical calculation. The result showed that design of Impressed Current Cathodic Protection on fuel distribution pipeline network system requires voltage 33,759 V(DC, protection current 6,6035 A(DC by theoritical calculation and 6,544 A(DC from pipeline specimen test, with 0,25 mpy for corrosion rate. Transformer Rectifier design needs requirements 45 V with 10 A for current. This research result can be made as literature and standardization for Indonesian Navy in designing the Impressed Current Cathodic Protection for fuel distribution pipeline network system.

  3. Relay Protection Coordination for Photovoltaic Power Plant Connected on Distribution Network

    OpenAIRE

    Nikolovski, Srete; Papuga, Vanja; Knežević, Goran

    2014-01-01

    This paper presents a procedure and computation of relay protection coordination for a PV power plant connected to the distribution network. In recent years, the growing concern for environment preservation has caused expansion of photovoltaic PV power plants in distribution networks. Numerical computer simulation is an indispensable tool for studying photovoltaic (PV) systems protection coordination. In this paper, EasyPower computer program is used with the module Power Protector. Time-curr...

  4. Species-free species distribution models describe macroecological properties of protected area networks.

    Science.gov (United States)

    Robinson, Jason L; Fordyce, James A

    2017-01-01

    Among the greatest challenges facing the conservation of plants and animal species in protected areas are threats from a rapidly changing climate. An altered climate creates both challenges and opportunities for improving the management of protected areas in networks. Increasingly, quantitative tools like species distribution modeling are used to assess the performance of protected areas and predict potential responses to changing climates for groups of species, within a predictive framework. At larger geographic domains and scales, protected area network units have spatial geoclimatic properties that can be described in the gap analysis typically used to measure or aggregate the geographic distributions of species (stacked species distribution models, or S-SDM). We extend the use of species distribution modeling techniques in order to model the climate envelope (or "footprint") of individual protected areas within a network of protected areas distributed across the 48 conterminous United States and managed by the US National Park System. In our approach we treat each protected area as the geographic range of a hypothetical endemic species, then use MaxEnt and 5 uncorrelated BioClim variables to model the geographic distribution of the climatic envelope associated with each protected area unit (modeling the geographic area of park units as the range of a species). We describe the individual and aggregated climate envelopes predicted by a large network of 163 protected areas and briefly illustrate how macroecological measures of geodiversity can be derived from our analysis of the landscape ecological context of protected areas. To estimate trajectories of change in the temporal distribution of climatic features within a protected area network, we projected the climate envelopes of protected areas in current conditions onto a dataset of predicted future climatic conditions. Our results suggest that the climate envelopes of some parks may be locally unique or have

  5. Validating User Flows to Protect Software Defined Network Environments

    Directory of Open Access Journals (Sweden)

    Ihsan H. Abdulqadder

    2018-01-01

    Full Text Available Software Defined Network is a promising network paradigm which has led to several security threats in SDN applications that involve user flows, switches, and controllers in the network. Threats as spoofing, tampering, information disclosure, Denial of Service, flow table overloading, and so on have been addressed by many researchers. In this paper, we present novel SDN design to solve three security threats: flow table overloading is solved by constructing a star topology-based architecture, unsupervised hashing method mitigates link spoofing attack, and fuzzy classifier combined with L1-ELM running on a neural network for isolating anomaly packets from normal packets. For effective flow migration Discrete-Time Finite-State Markov Chain model is applied. Extensive simulations using OMNeT++ demonstrate the performance of our proposed approach, which is better at preserving holding time than are other state-of-the-art works from the literature.

  6. A multiscale network analysis of protected-area connectivity for mammals in the United States.

    Science.gov (United States)

    Minor, Emily S; Lookingbill, Todd R

    2010-12-01

    Protected areas must be close, or connected, enough to allow for the preservation of large-scale ecological and evolutionary processes, such as gene flow, migration, and range shifts in response to climate change. Nevertheless, it is unknown whether the network of protected areas in the United States is connected in a way that will preserve biodiversity over large temporal and spatial scales. It is also unclear whether protected-area networks that function for larger species will function for smaller species. We assessed the connectivity of protected areas in the three largest biomes in the United States. With methods from graph theory--a branch of mathematics that deals with connectivity and flow--we identified and measured networks of protected areas for three different groups of mammals. We also examined the value of using umbrella species (typically large-bodied, far-ranging mammals) in designing large-scale networks of protected areas. Although the total amount of protected land varied greatly among biomes in the United States, overall connectivity did not. In general, protected-area networks were well connected for large mammals but not for smaller mammals. Additionally, it was not possible to predict connectivity for small mammals on the basis of connectivity for large mammals, which suggests the umbrella species approach may not be an appropriate design strategy for conservation networks intended to protect many species. Our findings indicate different strategies should be used to increase the likelihood of persistence for different groups of species. Strategic linkages of existing lands should be a conservation priority for smaller mammals, whereas conservation of larger mammals would benefit most from the protection of more land. © 2010 Society for Conservation Biology.

  7. Protection coordination of the Kennedy Space Center electric distribution network

    Science.gov (United States)

    1976-01-01

    A computer technique is described for visualizing the coordination and protection of any existing system of devices and settings by plotting the tripping characteristics of the involved devices on a common basis. The program determines the optimum settings of a given set of protective devices and configuration in the sense of the best expected coordinated operation of these devices. Subroutines are given for simulating time versus current characteristics of the different relays, circuit breakers, and fuses in the system; coordination index computation; protection checks; plotting; and coordination optimation.

  8. Defense strategies for cloud computing multi-site server infrastructures

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S. [ORNL; Ma, Chris Y. T. [Hang Seng Management College, Hon Kong; He, Fei [Texas A& M University, Kingsville, TX, USA

    2018-01-01

    We consider cloud computing server infrastructures for big data applications, which consist of multiple server sites connected over a wide-area network. The sites house a number of servers, network elements and local-area connections, and the wide-area network plays a critical, asymmetric role of providing vital connectivity between them. We model this infrastructure as a system of systems, wherein the sites and wide-area network are represented by their cyber and physical components. These components can be disabled by cyber and physical attacks, and also can be protected against them using component reinforcements. The effects of attacks propagate within the systems, and also beyond them via the wide-area network.We characterize these effects using correlations at two levels using: (a) aggregate failure correlation function that specifies the infrastructure failure probability given the failure of an individual site or network, and (b) first-order differential conditions on system survival probabilities that characterize the component-level correlations within individual systems. We formulate a game between an attacker and a provider using utility functions composed of survival probability and cost terms. At Nash Equilibrium, we derive expressions for the expected capacity of the infrastructure given by the number of operational servers connected to the network for sum-form, product-form and composite utility functions.

  9. A dedicated tool for analysing protection selectivity and back-up in large MV networks

    NARCIS (Netherlands)

    Rombouts, S. P.J.; Morren, J.

    2010-01-01

    Due to integration of distributed generation the operation of medium-voltage distribution networks is becoming more difficult. This paper describes a dedicated simulation tool that can be used to study the protection coordination in the network. One of the main advantages of the program is that it

  10. Use of social networks to improve radiation protection

    International Nuclear Information System (INIS)

    Medina Gironzini, E.

    2013-01-01

    The development of information and communication technologies has improved relations between the specialists in radiation protection worldwide. Takes advantage of these media to exchange experiences on issues of common interest and technical concerns are resolved in very short times. (Author)

  11. Designing a protected area network for conservation planning in Jhum landscapes of Garo Hills, Meghalaya

    Science.gov (United States)

    A. Kumar; Bruce Marcot; G. Talukdar

    2010-01-01

    We studied vegetation and land cover characteristics within the existing array of protected areas (PAs) in South Garo Hills of Meghalaya, northeast India and introduce the concept of protected area network (PAN) and methods to determine linkages of forests among existing PAs. We describe and analyze potential elements of a PAN, including PAs, reserved forests,...

  12. Representation of global and national conservation priorities by Colombia's Protected Area Network.

    Science.gov (United States)

    Forero-Medina, German; Joppa, Lucas

    2010-10-12

    How do national-level actions overlap with global priorities for conservation? Answering this question is especially important in countries with high and unique biological diversity like Colombia. Global biodiversity schemes provide conservation guidance at a large scale, while national governments gazette land for protection based on a combination of criteria at regional or local scales. Information on how a protected area network represents global and national conservation priorities is crucial for finding gaps in coverage and for future expansion of the system. We evaluated the agreement of Colombia's protected area network with global conservation priorities, and the extent to which the network reflects the country's biomes, species richness, and common environmental and physical conditions. We used this information to identify priority biomes for conservation. We find the dominant strategy in Colombia has been a proactive one, allocating the highest proportion of protected land on intact, difficult to access and species rich areas like the Amazon. Threatened and unique areas are disproportionately absent from Colombia's protected lands. We highlight six biomes in Colombia as conservation priorities that should be considered in any future expansion of Colombia's protected area network. Two of these biomes have less than 3% of their area protected and more than 70% of their area transformed for human use. One has less than 3% protected and high numbers of threatened vertebrates. Three biomes fall in both categories. Expansion of Colombia's Protected Area Network should consider the current representativeness of the network. We indicate six priority biomes that can contribute to improving the representation of threatened species and biomes in Colombia.

  13. Protecting against cyber threats in networked information systems

    Science.gov (United States)

    Ertoz, Levent; Lazarevic, Aleksandar; Eilertson, Eric; Tan, Pang-Ning; Dokas, Paul; Kumar, Vipin; Srivastava, Jaideep

    2003-07-01

    This paper provides an overview of our efforts in detecting cyber attacks in networked information systems. Traditional signature based techniques for detecting cyber attacks can only detect previously known intrusions and are useless against novel attacks and emerging threats. Our current research at the University of Minnesota is focused on developing data mining techniques to automatically detect attacks against computer networks and systems. This research is being conducted as a part of MINDS (Minnesota Intrusion Detection System) project at the University of Minnesota. Experimental results on live network traffic at the University of Minnesota show that the new techniques show great promise in detecting novel intrusions. In particular, during the past few months our techniques have been successful in automatically identifying several novel intrusions that could not be detected using state-of-the-art tools such as SNORT.

  14. Architecture, design and protection of electrical distribution networks

    Energy Technology Data Exchange (ETDEWEB)

    Sorrel, J.P. [Schneider electric Industries SA (France)

    2000-07-01

    Architectures related to AII Electric Ship (AES) require high level of propulsion power. Merchant ships and obviously warships require a low vulnerability, a high reliability and availability, a simple maintainability as well as an ordinary ode of operation. These constraints converge to an optimum single line diagram. We will focus on the mode of operation of the network, its constraints, the facilities to use a ring distribution for the ship service distribution system, the earthing of HV network as well as future developments. (author)

  15. Multi-level infrastructure of interconnected testbeds of large-scale wireless sensor networks (MI2T-WSN)

    CSIR Research Space (South Africa)

    Abu-Mahfouz, Adnan M

    2012-06-01

    Full Text Available are still required for further testing before the real implementation. In this paper we propose a multi-level infrastructure of interconnected testbeds of large- scale WSNs. This testbed consists of 1000 sensor motes that will be distributed into four...

  16. Multicast backup reprovisioning problem for Hamiltonian cycle-based protection on WDM networks

    Science.gov (United States)

    Din, Der-Rong; Huang, Jen-Shen

    2014-03-01

    As networks grow in size and complexity, the chance and the impact of failures increase dramatically. The pre-allocated backup resources cannot provide 100% protection guarantee when continuous failures occur in a network. In this paper, the multicast backup re-provisioning problem (MBRP) for Hamiltonian cycle (HC)-based protection on WDM networks for the link-failure case is studied. We focus on how to recover the protecting capabilities of Hamiltonian cycle against the subsequent link-failures on WDM networks for multicast transmissions, after recovering the multicast trees affected by the previous link-failure. Since this problem is a hard problem, an algorithm, which consists of several heuristics and a genetic algorithm (GA), is proposed to solve it. The simulation results of the proposed method are also given. Experimental results indicate that the proposed algorithm can solve this problem efficiently.

  17. Projected impacts of climate change on a continent-wide protected area network

    DEFF Research Database (Denmark)

    Hole, David G; Willis, Stephen G; Pain, Deborah J

    2009-01-01

    Despite widespread concern, the continuing effectiveness of networks of protected areas under projected 21st century climate change is uncertain. Shifts in species' distributions could mean these resources will cease to afford protection to those species for which they were originally established...... species). Persistence of suitable climate space across the network as a whole, however, is notably high, with 88-92% of priority species retaining suitable climate space in >or= 1 IBA(s) in which they are currently found. Only 7-8 priority species lose climatic representation from the network. Hence......, despite the likelihood of significant community disruption, we demonstrate that rigorously defined networks of protected areas can play a key role in mitigating the worst impacts of climate change on biodiversity....

  18. Extra-capacity versus protection for supply networks under attack

    International Nuclear Information System (INIS)

    Bricha, Naji; Nourelfath, Mustapha

    2014-01-01

    This article develops a game-theoretical model to deal with the protection of facilities, in the context of the capacitated fixed-charge location and capacity acquisition problem. A set of investment alternatives is available for direct protection of facilities. Furthermore, extra-capacity of neighbouring functional facilities can be used after attacks to avoid the backlog of demands and backorders. The proposed model considers a non-cooperative two-period game between the players, and an algorithm is presented to determine the equilibrium solution and the optimal defender strategy under capacity constraints. A method is developed to evaluate the utilities of the defender and the attacker. The benefit of the proposed approach is illustrated using a numerical example. The defence strategy of our model is compared to other strategies, and the obtained results clearly indicate the superiority of our model in finding the best trade-off between direct protection investment and extra-capacity deployment

  19. Dynamic segment shared protection for multicast traffic in meshed wavelength-division-multiplexing optical networks

    Science.gov (United States)

    Liao, Luhua; Li, Lemin; Wang, Sheng

    2006-12-01

    We investigate the protection approach for dynamic multicast traffic under shared risk link group (SRLG) constraints in meshed wavelength-division-multiplexing optical networks. We present a shared protection algorithm called dynamic segment shared protection for multicast traffic (DSSPM), which can dynamically adjust the link cost according to the current network state and can establish a primary light-tree as well as corresponding SRLG-disjoint backup segments for a dependable multicast connection. A backup segment can efficiently share the wavelength capacity of its working tree and the common resources of other backup segments based on SRLG-disjoint constraints. The simulation results show that DSSPM not only can protect the multicast sessions against a single-SRLG breakdown, but can make better use of the wavelength resources and also lower the network blocking probability.

  20. Defeating Insider Attacks via Autonomic Self-Protective Networks

    Science.gov (United States)

    Sibai, Faisal M.

    2012-01-01

    There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…

  1. Provable network activity for protecting users against false accusation

    NARCIS (Netherlands)

    Papadopoulos, Panagiotis; Athanasopoulos, Ilias; Kosta, Eleni; Siganos, George; Keromytis, Angelos D.; Markatos, Evangelos P.

    2016-01-01

    With the proliferation of the World Wide Web, data traces that correspond to users’ network activity can be collected by several Internet actors, including (i) web sites, (ii) smartphone apps, and even (iii) Internet Service Providers. Given that the collection and storage of these data are beyond

  2. Women violente network of protection: Advances and challenges

    Directory of Open Access Journals (Sweden)

    Patricia Krieger Grossi

    2008-11-01

    Full Text Available In Brazil, violence in marital relations has been the object of an increase in police charges, as well as in the judiciary system and public institutions of social welfare, education and health. Domestic violence causes large psychosocial, economic and political repercussions in the individual and family sphere as well as in the woman’s social sphere. Given the complexity of the problem, surrounded by the prejudice and different types of discrimination, women who are victims of domestic violence suffer diverse changes, often drastic, in the environment they live and with whom they live as time passes by. This results in a complete process of fragilization in their belonging networks. The present article presents data based on two researches: “The Support Network for Women in Domestic Violence Situations: Limits and Possibilities”, and “From tears to Hope: The Process of Empowerment of Women in Domestic Violence Situation”, carried out in the Research Group on Violence – NEPEVI, Faculty of Social Work, Catholic University of Rio Grande do Sul (PUCRS, Brazil. Our purpose was to provide theoretical and practical bases to contribute with the services and empowerment of women in domestic violence situations. This research consisted in the identification of the limits and possibilities of the network support for women in domestic violence situation in the municipalities of Porto Alegre, São Leopoldo and Novo Hamburgo, State of Rio Grande do Sul. Women who were service users of this network of support and professionals connected to this network, among them, social workers, psychologists, delegates, and others were interviewed. 

  3. CYBERSECURITY: WHAT ARE THE LEGAL REMEDIES AND OPTIONS AVAILABLE FOR COMPANIES TO PROTECT THEIR IT INFRASTRUCTURE AND THEIR CUSTOMERS’ DATA?

    OpenAIRE

    Pineda, Jack

    2014-01-01

    This research will be comprised of five main parts which are directly correlated to achieve some well-based conclusions. The first part will be regarding cybersecurity in general and cybersecurity in the European Union. Here we will give some data that will show the relevance of the topic in our daily life, while at the same time demonstrating why it is so important to have a good cybersecurity strategy to protect the Union’s citizens. In the second part, we will analyse the cybersecurity-rel...

  4. Linear infrastructure impacts on landscape hydrology.

    Science.gov (United States)

    Raiter, Keren G; Prober, Suzanne M; Possingham, Hugh P; Westcott, Fiona; Hobbs, Richard J

    2018-01-15

    The extent of roads and other forms of linear infrastructure is burgeoning worldwide, but their impacts are inadequately understood and thus poorly mitigated. Previous studies have identified many potential impacts, including alterations to the hydrological functions and soil processes upon which ecosystems depend. However, these impacts have seldom been quantified at a regional level, particularly in arid and semi-arid systems where the gap in knowledge is the greatest, and impacts potentially the most severe. To explore the effects of extensive track, road, and rail networks on surface hydrology at a regional level we assessed over 1000 km of linear infrastructure, including approx. 300 locations where ephemeral streams crossed linear infrastructure, in the largely intact landscapes of Australia's Great Western Woodlands. We found a high level of association between linear infrastructure and altered surface hydrology, with erosion and pooling 5 and 6 times as likely to occur on-road than off-road on average (1.06 erosional and 0.69 pooling features km -1 on vehicle tracks, compared with 0.22 and 0.12 km -1 , off-road, respectively). Erosion severity was greater in the presence of tracks, and 98% of crossings of ephemeral streamlines showed some evidence of impact on water movement (flow impedance (62%); diversion of flows (73%); flow concentration (76%); and/or channel initiation (31%)). Infrastructure type, pastoral land use, culvert presence, soil clay content and erodibility, mean annual rainfall, rainfall erosivity, topography and bare soil cover influenced the frequency and severity of these impacts. We conclude that linear infrastructure frequently affects ephemeral stream flows and intercepts natural overland and near-surface flows, artificially changing site-scale moisture regimes, with some parts of the landscape becoming abnormally wet and other parts becoming water-starved. In addition, linear infrastructure frequently triggers or exacerbates erosion

  5. Algorithm for protecting light-trees in survivable mesh wavelength-division-multiplexing networks

    Science.gov (United States)

    Luo, Hongbin; Li, Lemin; Yu, Hongfang

    2006-12-01

    Wavelength-division-multiplexing (WDM) technology is expected to facilitate bandwidth-intensive multicast applications such as high-definition television. A single fiber cut in a WDM mesh network, however, can disrupt the dissemination of information to several destinations on a light-tree based multicast session. Thus it is imperative to protect multicast sessions by reserving redundant resources. We propose a novel and efficient algorithm for protecting light-trees in survivable WDM mesh networks. The algorithm is called segment-based protection with sister node first (SSNF), whose basic idea is to protect a light-tree using a set of backup segments with a higher priority to protect the segments from a branch point to its children (sister nodes). The SSNF algorithm differs from the segment protection scheme proposed in the literature in how the segments are identified and protected. Our objective is to minimize the network resources used for protecting each primary light-tree such that the blocking probability can be minimized. To verify the effectiveness of the SSNF algorithm, we conduct extensive simulation experiments. The simulation results demonstrate that the SSNF algorithm outperforms existing algorithms for the same problem.

  6. Security-Oriented and Load-Balancing Wireless Data Routing Game in the Integration of Advanced Metering Infrastructure Network in Smart Grid

    Energy Technology Data Exchange (ETDEWEB)

    He, Fulin; Cao, Yang; Zhang, Jun Jason; Wei, Jiaolong; Zhang, Yingchen; Muljadi, Eduard; Gao, Wenzhong

    2016-11-21

    Ensuring flexible and reliable data routing is indispensable for the integration of Advanced Metering Infrastructure (AMI) networks, we propose a secure-oriented and load-balancing wireless data routing scheme. A novel utility function is designed based on security routing scheme. Then, we model the interactive security-oriented routing strategy among meter data concentrators or smart grid meters as a mixed-strategy network formation game. Finally, such problem results in a stable probabilistic routing scheme with proposed distributed learning algorithm. One contributions is that we studied that different types of applications affect the routing selection strategy and the strategy tendency. Another contributions is that the chosen strategy of our mixed routing can adaptively to converge to a new mixed strategy Nash equilibrium (MSNE) during the learning process in the smart grid.

  7. An Examination of Organizational Information Protection in the Era of Social Media: A Study of Social Network Security and Privacy Protection

    Science.gov (United States)

    Maar, Michael C.

    2013-01-01

    This study investigates information protection for professional users of online social networks. It addresses management's desire to motivate their employees to adopt protective measures while accessing online social networks and to help their employees improve their proficiency in information security and ability to detect deceptive…

  8. A conservation planning approach to mitigate the impacts of leakage from protected area networks.

    Science.gov (United States)

    Bode, Michael; Tulloch, Ayesha I T; Mills, Morena; Venter, Oscar; Ando, Amy W

    2015-06-01

    Protected area networks are designed to restrict anthropogenic pressures in areas of high biodiversity. Resource users respond by seeking to replace some or all of the lost resources from locations elsewhere in the landscape. Protected area networks thereby perturb the pattern of human pressures by displacing extractive effort from within protected areas into the broader landscape, a process known as leakage. The negative effects of leakage on conservation outcomes have been empirically documented and modeled using homogeneous descriptions of conservation landscapes. Human resource use and biodiversity vary greatly in space, however, and a theory of leakage must describe how this heterogeneity affects the magnitude, pattern, and biodiversity impacts of leakage. We combined models of household utility, adaptive human foraging, and biodiversity conservation to provide a bioeconomic model of leakage that accounts for spatial heterogeneity. Leakage had strong and divergent impacts on the performance of protected area networks, undermining biodiversity benefits but mitigating the negative impacts on local resource users. When leakage was present, our model showed that poorly designed protected area networks resulted in a substantial net loss of biodiversity. However, the effects of leakage can be mitigated if they are incorporated ex-ante into the conservation planning process. If protected areas are coupled with nonreserve policy instruments such as market subsidies, our model shows that the trade-offs between biodiversity and human well-being can be further and more directly reduced. © 2014 Society for Conservation Biology.

  9. Building Resilient Cloud Over Unreliable Commodity Infrastructure

    OpenAIRE

    Kedia, Piyus; Bansal, Sorav; Deshpande, Deepak; Iyer, Sreekanth

    2012-01-01

    Cloud Computing has emerged as a successful computing paradigm for efficiently utilizing managed compute infrastructure such as high speed rack-mounted servers, connected with high speed networking, and reliable storage. Usually such infrastructure is dedicated, physically secured and has reliable power and networking infrastructure. However, much of our idle compute capacity is present in unmanaged infrastructure like idle desktops, lab machines, physically distant server machines, and lapto...

  10. A modeling framework for investment planning in interdependent infrastructures in multi-hazard environments.

    Energy Technology Data Exchange (ETDEWEB)

    Brown, Nathanael J. K.; Gearhart, Jared Lee; Jones, Dean A.; Nozick, Linda Karen; Prince, Michael

    2013-09-01

    Currently, much of protection planning is conducted separately for each infrastructure and hazard. Limited funding requires a balance of expenditures between terrorism and natural hazards based on potential impacts. This report documents the results of a Laboratory Directed Research & Development (LDRD) project that created a modeling framework for investment planning in interdependent infrastructures focused on multiple hazards, including terrorism. To develop this framework, three modeling elements were integrated: natural hazards, terrorism, and interdependent infrastructures. For natural hazards, a methodology was created for specifying events consistent with regional hazards. For terrorism, we modeled the terrorists actions based on assumptions regarding their knowledge, goals, and target identification strategy. For infrastructures, we focused on predicting post-event performance due to specific terrorist attacks and natural hazard events, tempered by appropriate infrastructure investments. We demonstrate the utility of this framework with various examples, including protection of electric power, roadway, and hospital networks.

  11. ENETRAP: European network on education and training in radiological protection

    International Nuclear Information System (INIS)

    Michele Coeck; Cecile Etard; Siegurd Moebius; Annemarie Schmitt-Hannig; Andrea Luciani; Jan van der Steen; Marisa Marco; Joanne Stewart; Jacques Balosso; Rosemary Thompson

    2006-01-01

    Recent studies have shown that there is a wide variety of approaches to education and training of the Qualified Expert across the EU. As they stand, such differences are a barrier to the mutual recognition of the Qualified Expert status and, in part, are contributing to a perceived shortage in expertise in radiation protection and safety. The overall aim of ENETRAP is to determine mechanisms that in the longer term will facilitate better integration of education and training activities (with a view to mutual recognition across the EU) and to ensure the ongoing provision of the necessary competence and expertise at the level of the Qualified Expert. (authors)

  12. Private investments in new infrastructures

    NARCIS (Netherlands)

    Baarsma, B.; Poort, J.P.; Teulings, C.N.; de Nooij, M.

    2004-01-01

    The Lisbon Strategy demands large investments in transport projects, broadband networks and energy infrastructure. Despite the widely-acknowledged need for investments in new infrastructures, European and national public funds are scarce in the current economic climate. Moreover, both policy-makers

  13. Ground-fault protection of insulated high-voltage power networks in mines

    Energy Technology Data Exchange (ETDEWEB)

    Pudelko, H

    1976-09-01

    Safety of power networks is discussed in underground black coal mines in Poland. Safety in mines with a long service life was compared with safety in mines constructed since 1950. Power networks and systems protecting against electric ground-faults in the 2 mine groups are comparatively evaluated. Systems for protection against electric ground-faults in mine high-voltage networks with an insulated star point of the transformer are characterized. Fluctuations of resistance of electrical insulation under conditions of changing load are analyzed. The results of analyses are given in 14 diagrams. Recommendations for design of systems protecting against electric ground-faults in 6 kV mine power systems are made. 7 references.

  14. Efficiency of a protected-area network in a Mediterranean region: a multispecies assessment with raptors.

    Science.gov (United States)

    Abellán, María D; Martínez, José E; Palazón, José A; Esteve, Miguel A; Calvo, José F

    2011-05-01

    Three different systems of designating protected areas in a Mediterranean region in southeastern Spain were studied, referring to their effectiveness and efficiency for protecting both the breeding territories and the suitable habitat of a set of ten raptor species. Taking into consideration the varying degrees of endangerment of these species, a map of multispecies conservation values was also drawn up and superimposed on the three protected-area systems studied. In order to compare the levels of protection afforded by the three systems, we considered two indices that measured their relative effectiveness and efficiency. The effectiveness estimated the proportion of territories or optimal habitat protected by the networks while efficiency implicitly considered the area of each system (percentage of breeding territories or optimal habitat protected per 1% of land protected). Overall, our results showed that the most efficient system was that formed by the set of regional parks and reserves (17 protected breeding territories per 100 km²), although, given its small total area, it was by far the least effective (only protecting the 21% of the breeding territories of all species and 17% of the area of high conservation value). The systems formed by the Special Protection Areas (designated under the EU "Birds Directive") and by the Special Conservation Areas (designated under the EU "Habitats Directive") notably increased the percentages of protected territories of all species (61%) and area of high conservation value (57%), but their efficiency was not as high as expected in most cases. The overall level of protection was high for all species except for the Lesser Kestrel (Falco naumanni), an endangered falcon that inhabits pseudo-steppe and traditional agricultural habitats, which are clearly underrepresented in the protected-area network of the study region.

  15. Efficiency of a Protected-Area Network in a Mediterranean Region: A Multispecies Assessment with Raptors

    Science.gov (United States)

    Abellán, María D.; Martínez, José E.; Palazón, José A.; Esteve, Miguel Á.; Calvo, José F.

    2011-05-01

    Three different systems of designating protected areas in a Mediterranean region in southeastern Spain were studied, referring to their effectiveness and efficiency for protecting both the breeding territories and the suitable habitat of a set of ten raptor species. Taking into consideration the varying degrees of endangerment of these species, a map of multispecies conservation values was also drawn up and superimposed on the three protected-area systems studied. In order to compare the levels of protection afforded by the three systems, we considered two indices that measured their relative effectiveness and efficiency. The effectiveness estimated the proportion of territories or optimal habitat protected by the networks while efficiency implicitly considered the area of each system (percentage of breeding territories or optimal habitat protected per 1% of land protected). Overall, our results showed that the most efficient system was that formed by the set of regional parks and reserves (17 protected breeding territories per 100 km2), although, given its small total area, it was by far the least effective (only protecting the 21% of the breeding territories of all species and 17% of the area of high conservation value). The systems formed by the Special Protection Areas (designated under the EU "Birds Directive") and by the Special Conservation Areas (designated under the EU "Habitats Directive") notably increased the percentages of protected territories of all species (61%) and area of high conservation value (57%), but their efficiency was not as high as expected in most cases. The overall level of protection was high for all species except for the Lesser Kestrel ( Falco naumanni), an endangered falcon that inhabits pseudo-steppe and traditional agricultural habitats, which are clearly underrepresented in the protected-area network of the study region.

  16. The local-regional networks of radiation protection experts: a necessary tool to strengthen

    International Nuclear Information System (INIS)

    Barbey, P.; Boirie, G.; Barret, Ch.; Barrey, N.

    2008-01-01

    After having recalled the evolution of the legal framework concerning radioprotection and the origin, role and training of the radiation protection experts (PCR in French for Personne Competente en Radioprotection), the author describes the difficulties faced by a PCR on a daily basis. Then, he outlines the interest of a development of local-regional networks between these professionals to promote information transmission and exchange, knowledge updating and so on, and even also to break the isolation of the PCR. He indicates the main objectives of these networks and evokes perspectives, notably after the professional meetings which have been and still are organized twice a year. Two additional and short papers briefly describe the life of one of these networks (the APCRAP, Association des personnes competentes en radioprotection de l'Assistance Publique, association of radiation protection experts belonging to public care services) and briefly present the objectives of the south-western network

  17. Regional seminar on approaches and practices in strengthening radiation protection and waste management infrastructure in countries of Eastern Europe and the former USSR. Programme, book of extended synopses, list of participants

    International Nuclear Information System (INIS)

    1998-01-01

    This publication contains 30 extended synopses of presentations given by the participants of the seminar. The scope of the presentations included development of radiation protection laws, radioactive waste management technologies, radiation protection infrastructure and constitution of national regulatory bodies. Recent developments in these areas in a number of Eastern Europe and former USSR countries were presented. The role of international co-operation in development of safe radioactive waste management technologies and in establishing legislative and regulatory frameworks was shown

  18. A SYSTEM APPROACH TO ORGANISING PROTECTION FROM TARGETED INFORMATION IN SOCIAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Marina V. Tumbinskaya

    2017-01-01

    Full Text Available Abstract. Objectives The aim of the study is to formalise a generalised algorithm for the distribution of targeted information in social networks, serving as the basis for a methodology for increasing personal information security. Method The research is based on the methodology of protection from unwanted information distributed across social network systems. Results The article presents the formalisation of an algorithm for the distribution of targeted information across social networks: input and output parameters are defined and the algorithm’s internal conditions are described, consisting of parameters for implementing attack scenarios, which variation would allow them to be detailed. A technique for protection from targeted information distributed across social networks is proposed, allowing the level of protection of personal data and information of social networks users to be enhanced, as well as the reliability of information increased. Conclusion The results of the research will help to prevent threats to information security, counteract attacks by intruders who often use methods of competitive intelligence and social engineering through the use of countermeasures. A model for protection against targeted information and implement special software for its integration into online social network social information systems is developed. The system approach will allow external monitoring of events in social networks to be carried out and vulnerabilities identified in the mechanisms of instant messaging, which provide opportunities for attacks by intruders. The results of the research make it possible to apply a network approach to the study of informal communities, which are actively developing today, at a new level. 

  19. Cross-layer shared protection strategy towards data plane in software defined optical networks

    Science.gov (United States)

    Xiong, Yu; Li, Zhiqiang; Zhou, Bin; Dong, Xiancun

    2018-04-01

    In order to ensure reliable data transmission on the data plane and minimize resource consumption, a novel protection strategy towards data plane is proposed in software defined optical networks (SDON). Firstly, we establish a SDON architecture with hierarchical structure of data plane, which divides the data plane into four layers for getting fine-grained bandwidth resource. Then, we design the cross-layer routing and resource allocation based on this network architecture. Through jointly considering the bandwidth resource on all the layers, the SDN controller could allocate bandwidth resource to working path and backup path in an economical manner. Next, we construct auxiliary graphs and transform the shared protection problem into the graph vertex coloring problem. Therefore, the resource consumption on backup paths can be reduced further. The simulation results demonstrate that the proposed protection strategy can achieve lower protection overhead and higher resource utilization ratio.

  20. Enterprise integration. Upgrading the infrastructure.

    Science.gov (United States)

    Cupito, M C

    1998-02-01

    As organizations increase the number of applications and users, they increase demands on their networks. There is no one one-size-fits-all infrastructure, no minimum requirements...except maybe speed.

  1. Office of Aviation Safety Infrastructure -

    Data.gov (United States)

    Department of Transportation — The Office of Aviation Safety Infrastructure (AVS INF) provides authentication and access control to AVS network resources for users. This is done via a distributed...

  2. MFC Communications Infrastructure Study

    Energy Technology Data Exchange (ETDEWEB)

    Michael Cannon; Terry Barney; Gary Cook; George Danklefsen, Jr.; Paul Fairbourn; Susan Gihring; Lisa Stearns

    2012-01-01

    Unprecedented growth of required telecommunications services and telecommunications applications change the way the INL does business today. High speed connectivity compiled with a high demand for telephony and network services requires a robust communications infrastructure.   The current state of the MFC communication infrastructure limits growth opportunities of current and future communication infrastructure services. This limitation is largely due to equipment capacity issues, aging cabling infrastructure (external/internal fiber and copper cable) and inadequate space for telecommunication equipment. While some communication infrastructure improvements have been implemented over time projects, it has been completed without a clear overall plan and technology standard.   This document identifies critical deficiencies with the current state of the communication infrastructure in operation at the MFC facilities and provides an analysis to identify needs and deficiencies to be addressed in order to achieve target architectural standards as defined in STD-170. The intent of STD-170 is to provide a robust, flexible, long-term solution to make communications capabilities align with the INL mission and fit the various programmatic growth and expansion needs.

  3. Final Project Report: DOE Award FG02-04ER25606 Overlay Transit Networking for Scalable, High Performance Data Communication across Heterogeneous Infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Beck, Micah; Moore, Terry

    2007-08-31

    As the flood of data associated with leading edge computational science continues to escalate, the challenge of supporting the distributed collaborations that are now characteristic of it becomes increasingly daunting. The chief obstacles to progress on this front lie less in the synchronous elements of collaboration, which have been reasonably well addressed by new global high performance networks, than in the asynchronous elements, where appropriate shared storage infrastructure seems to be lacking. The recent report from the Department of Energy on the emerging 'data management challenge' captures the multidimensional nature of this problem succinctly: Data inevitably needs to be buffered, for periods ranging from seconds to weeks, in order to be controlled as it moves through the distributed and collaborative research process. To meet the diverse and changing set of application needs that different research communities have, large amounts of non-archival storage are required for transitory buffering, and it needs to be widely dispersed, easily available, and configured to maximize flexibility of use. In today's grid fabric, however, massive storage is mostly concentrated in data centers, available only to those with user accounts and membership in the appropriate virtual organizations, allocated as if its usage were non-transitory, and encapsulated behind legacy interfaces that inhibit the flexibility of use and scheduling. This situation severely restricts the ability of application communities to access and schedule usable storage where and when they need to in order to make their workflow more productive. (p.69f) One possible strategy to deal with this problem lies in creating a storage infrastructure that can be universally shared because it provides only the most generic of asynchronous services. Different user communities then define higher level services as necessary to meet their needs. One model of such a service is a Storage Network

  4. New infrastructures, new landscapes

    Directory of Open Access Journals (Sweden)

    Chiara Nifosì

    2014-06-01

    Full Text Available New infrastructures, new landscapes AbstractThe paper will discuss one recent Italian project that share a common background: the relevance of the existing maritime landscape as a non negotiable value. The studies will be discussed in details a feasibility study for the new port in Monfalcone. National infrastructural policies emphasize competitiveness and connection as a central issue incultural, economic and political development of communities . Based on networks and system development along passageways that make up the European infrastructural armor; the two are considered at the meantime as cause and effect of "territorialisation”. These two views are obviously mutually dependent. It's hard to think about a strong attractiveness out of the network, and to be part of the latter encourages competitiveness. Nonetheless this has proved to be conflictual when landscape values and the related attractiveness are considered.The presented case study project, is pursuing the ambition to promote a new approach in realizing large infrastructures; its double role is to improve connectivity and to generate lasting and positive impact on the local regions. It deal with issues of inter-modality and the construction of nodes and lines which connects Europe, and its markets.Reverting the usual approach which consider landscape project as as a way to mitigate or to compensate for the infrastructure, the goal is to succeed in realizing large infrastructural works by conceiving them as an occasion to reinterpret a region or, as extraordinary opportunities, to build new landscapes.The strategy proposed consists in achieving structural images based on the reinforcement of the environmental and historical-landscape systems. Starting from the reinterpretation of local maritime context and resources it is possible not just to preserve the attractiveness of a specific landscape but also to conceive infrastructure in a more efficient way. 

  5. A network-based drug repositioning infrastructure for precision cancer medicine through targeting significantly mutated genes in the human cancer genomes.

    Science.gov (United States)

    Cheng, Feixiong; Zhao, Junfei; Fooksa, Michaela; Zhao, Zhongming

    2016-07-01

    Development of computational approaches and tools to effectively integrate multidomain data is urgently needed for the development of newly targeted cancer therapeutics. We proposed an integrative network-based infrastructure to identify new druggable targets and anticancer indications for existing drugs through targeting significantly mutated genes (SMGs) discovered in the human cancer genomes. The underlying assumption is that a drug would have a high potential for anticancer indication if its up-/down-regulated genes from the Connectivity Map tended to be SMGs or their neighbors in the human protein interaction network. We assembled and curated 693 SMGs in 29 cancer types and found 121 proteins currently targeted by known anticancer or noncancer (repurposed) drugs. We found that the approved or experimental cancer drugs could potentially target these SMGs in 33.3% of the mutated cancer samples, and this number increased to 68.0% by drug repositioning through surveying exome-sequencing data in approximately 5000 normal-tumor pairs from The Cancer Genome Atlas. Furthermore, we identified 284 potential new indications connecting 28 cancer types and 48 existing drugs (adjusted P < .05), with a 66.7% success rate validated by literature data. Several existing drugs (e.g., niclosamide, valproic acid, captopril, and resveratrol) were predicted to have potential indications for multiple cancer types. Finally, we used integrative analysis to showcase a potential mechanism-of-action for resveratrol in breast and lung cancer treatment whereby it targets several SMGs (ARNTL, ASPM, CTTN, EIF4G1, FOXP1, and STIP1). In summary, we demonstrated that our integrative network-based infrastructure is a promising strategy to identify potential druggable targets and uncover new indications for existing drugs to speed up molecularly targeted cancer therapeutics. © The Author 2016. Published by Oxford University Press on behalf of the American Medical Informatics Association. All

  6. Power Transformer Differential Protection Based on Neural Network Principal Component Analysis, Harmonic Restraint and Park's Plots

    OpenAIRE

    Tripathy, Manoj

    2012-01-01

    This paper describes a new approach for power transformer differential protection which is based on the wave-shape recognition technique. An algorithm based on neural network principal component analysis (NNPCA) with back-propagation learning is proposed for digital differential protection of power transformer. The principal component analysis is used to preprocess the data from power system in order to eliminate redundant information and enhance hidden pattern of differential current to disc...

  7. Equidistant Linear Network Codes with maximal Error-protection from Veronese Varieties

    DEFF Research Database (Denmark)

    Hansen, Johan P.

    2012-01-01

    Linear network coding transmits information in terms of a basis of a vector space and the information is received as a basis of a possible altered vectorspace. Ralf Koetter and Frank R. Kschischang in Coding for errors and erasures in random network coding (IEEE Transactions on Information Theory...... construct explicit families of vector-spaces of constant dimension where any pair of distinct vector-spaces are equidistant in the above metric. The parameters of the resulting linear network codes which have maximal error-protection are determined....

  8. On Resource Description Capabilities of On-Board Tools for Resource Management in Cloud Networking and NFV Infrastructures

    OpenAIRE

    Tutschku, Kurt; Ahmadi Mehri, Vida; Carlsson, Anders; Chivukula, Krishna Varaynya; Johan, Christenson

    2016-01-01

    The rapid adoption of networks that are based on "cloudification" and Network Function Virtualisation (NFV) comes from the anticipated high cost savings of up to 70% in their build and operation. The high savings are founded in the use of general standard servers, instead of single-purpose hardware, and by efficiency resource sharing through virtualisation concepts. In this paper, we discuss the capabilities of resource description of "on-board" tools, i.e. using standard Linux commands, to e...

  9. Application of InSAR to detection of localized subsidence and its effects on flood protection infrastructure in the New Orleans area

    Science.gov (United States)

    Jones, Cathleen; Blom, Ronald; Latini, Daniele

    2014-05-01

    The vulnerability of the United States Gulf of Mexico coast to inundation has received increasing attention in the years since hurricanes Katrina and Rita. Flood protection is a challenge throughout the area, but the population density and cumulative effect of historic subsidence makes it particularly difficult in the New Orleans area. Analysis of historical and continuing geodetic measurements identifies a surprising degree of complexity in subsidence (Dokka 2011), including regions that are subsiding at rates faster than those considered during planning for hurricane protection and for coastal restoration projects. Improved measurements are possible through combining traditional single point, precise geodetic data with interferometric synthetic aperture radar (InSAR) observations for to obtain geographically dense constraints on surface deformation. The Gulf Coast environment is very challenging for InSAR techniques, especially with systems not designed for interferometry. We are applying pair-wise InSAR to longer wavelength (L-band, 24 cm) synthetic aperture radar data acquired with the airborne UAVSAR instrument (http://uavsar.jpl.nasa.gov/) to detect localized change impacting flood protection infrastructure in the New Orleans area during the period from 2009 - 2013. Because aircraft motion creates large-scale image artifacts across the scene, we focus on localized areas on and near flood protection infrastructure to identify anomalous change relative to the surrounding area indicative of subsidence, structural deformation, and/or seepage (Jones et al., 2011) to identify areas where problems exist. C-band and particularly X-band radar returns decorrelate over short time periods in rural or less urbanized areas and are more sensitive to atmospheric affects, necessitating more elaborate analysis techniques or, at least, a strict limit on the temporal baseline. The new generation of spaceborne X-band SAR acquisitions ensure relatively high frequency of

  10. Application of Phasor Measurement Units for Protection of Distribution Networks with High Penetration of Photovoltaic Sources

    Science.gov (United States)

    Meskin, Matin

    The rate of the integration of distributed generation (DG) units to the distribution level to meet the growth in demand increases as a reasonable replacement for costly network expansion. This integration brings many advantages to the consumers and power grids, as well as giving rise to more challenges in relation to protection and control. Recent research has brought to light the negative effects of DG units on short circuit currents and overcurrent (OC) protection systems in distribution networks. Change in the direction of fault current flow, increment or decrement of fault current magnitude, blindness of protection, feeder sympathy trip, nuisance trip of interrupting devices, and the disruption of coordination between protective devices are some potential impacts of DG unit integration. Among other types of DG units, the integration of renewable energy resources into the electric grid has seen a vast improvement in recent years. In particular, the interconnection of photovoltaic (PV) sources to the medium voltage (MV) distribution networks has experienced a rapid increase in the last decade. In this work, the effect of PV source on conventional OC relays in MV distribution networks is shown. It is indicated that the PV output fluctuation, due to changes in solar radiation, causes the magnitude and direction of the current to change haphazardly. These variations may result in the poor operation of OC relays as the main protective devices in the MV distribution networks. In other words, due to the bi-directional power flow characteristic and the fluctuation of current magnitude occurring in the presence of PV sources, a specific setting of OC relays is difficult to realize. Therefore, OC relays may operate in normal conditions. To improve the OC relay operation, a voltage-dependent-overcurrent protection is proposed. Although, this new method prevents the OC relay from maloperation, its ability to detect earth faults and high impedance faults is poor. Thus, a

  11. Nordic research infrastructures for plant phenotyping

    Directory of Open Access Journals (Sweden)

    Kristiina Himanen

    2018-03-01

    Full Text Available Plant phenomics refers to the systematic study of plant phenotypes. Together with closely monitored, controlled climates, it provides an essential component for the integrated analysis of genotype-phenotype-environment interactions. Currently, several plant growth and phenotyping facilities are under establishment globally, and numerous facilities are already in use. Alongside the development of the research infrastructures, several national and international networks have been established to support shared use of the new methodology. In this review, an overview is given of the Nordic plant phenotyping and climate control facilities. Since many areas of phenomics such as sensor-based phenotyping, image analysis and data standards are still developing, promotion of educational and networking activities is especially important. These facilities and networks will be instrumental in tackling plant breeding and plant protection challenges. They will also provide possibilities to study wild species and their ecological interactions under changing Nordic climate conditions.

  12. Communications infrastructure requirements for telemedicine/telehealth in the context of planning for and responding to natural disasters: Considering the need for shared regional networks

    Science.gov (United States)

    Scott, John Carver

    1991-01-01

    During the course of recent years the frequency and magnitude of major disasters - of natural, technological, or ecological origin - have made the world community dramatically aware of the immense losses of human life and economic resources that are caused regularly by such calamities. Particularly hard hit are developing countries, for whom the magnitude of disasters frequently outstrips the ability of the society to cope with them. In many cases this situation can be prevented, and the recent trend in disaster management has been to emphasize the importance of preparedness and mitigation as a means of prevention. In cases of disaster, a system is needed to respond to relief requirements, particularly the delivery of medical care. There is no generic telecommunications infrastructure appropriate for the variety of applications in medical care and disaster management. The need to integrate telemedicine/telehealth into shared regional disaster management telecommunications networks is discussed. Focus is on the development of infrastructure designed to serve the needs of disaster prone regions of the developing world.

  13. How prepared were the Puerto Rico Seismic Network sites for the arrival of Hurricane Maria? Lessons learned on communications, power and infrastructure.

    Science.gov (United States)

    Vanacore, E. A.; Lopez, A. M.; Huerfano, V.; Lugo, J.; Baez-Sanchez, G.

    2017-12-01

    For exactly 85 years the island of Puerto Rico in the northeastern Caribbean was spared from catastrophic category 4 hurricane winds. Then Hurricane Maria arrived on September 20, 2017 with maximum sustained winds of up to 155 mph. The eye of the hurricane crossed the island from southeast to northwest in eight hours leaving almost a meter of rainfall on its path. Sustained winds, gusts and precipitation were most certainly going to affect the seismic and geodetic equipment the Puerto Rico Seismic Network (PRSN) use for locating earthquakes in the region. PRSN relies on 35 seismic stations (velocity and strong-motion) to characterize the seismic behavior of the island and 15 geodetic (GNSS) stations to determine crustal deformation of the Puerto Rico - Virgin Islands microplate. PRSN stations have been designed to withstand earthquakes. However, the equipment suffered considerable damage due to the strong winds especially station communication towers. This coupled with catastrophic damage to the telecommunication and power grids of the island had severe effects on the network. Additionally, the level of devastation was such that it hampered the ability of PRSN staff to visit the sites for assessment and repair. Here we present the effects of category 4 hurricane had on our seismic and geodetic sites, examine the susceptibility of the PRSN stations' power and communications, and discuss future plans to recuperate and improve station resiliency for future catastrophic events. These lessons learned hopefully will help harden sites of networks, agencies and/or institutions that rely on similar infrastructure.

  14. Is U.S. climatic diversity well represented within the existing federal protection network?

    Science.gov (United States)

    Enric Batllori; Carol Miller; Marc-Andre Parisien; Sean A. Parks; Max A. Moritz

    2014-01-01

    Establishing protection networks to ensure that biodiversity and associated ecosystem services persist under changing environments is a major challenge for conservation planning. The potential consequences of altered climates for the structure and function of ecosystems necessitates new and complementary approaches be incorporated into traditional conservation plans....

  15. Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks

    Science.gov (United States)

    Fu, Minglei; Chai, Zhicheng; Le, Zichun

    2016-03-01

    With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.

  16. Using regional bird density distribution models to evaluate protected area networks and inform conservation planning

    Science.gov (United States)

    John D. Alexander; Jaime L. Stephens; Sam Veloz; Leo Salas; Josée S. Rousseau; C. John Ralph; Daniel A. Sarr

    2017-01-01

    As data about populations of indicator species become available, proactive strategies that improve representation of biological diversity within protected area networks should consider finer-scaled evaluations, especially in regions identified as important through course-scale analyses. We use density distribution models derived from a robust regional bird...

  17. Review of Network Topologies and Protection Principles in Marine and Offshore Applications

    DEFF Research Database (Denmark)

    Ciontea, Catalin-Iosif; Bak, Claus Leth; Blaabjerg, Frede

    2015-01-01

    An electric fault that is not cleared is harmful in land applications, but in marine and offshore sector it can have catastrophic consequences. If the protection system fails to operate properly, the following situation may occur: blackouts, fire, loss of propulsion, delays in transportation......, collision with the cliff, reef or other ships and electrical shocks to humans. In order to cope with the unwanted effects of a fault, several protection strategies are applied, but complexity of the marine and offshore applications is continuously increasing, so protection needs to overcome more and more...... challenges. As result, development of new protection techniques that can offer improved functionalities compared to the actual solutions for marine and offshore applications is needed. This paper reviews the network topologies in such applications and presents the requirements of a system able to protect...

  18. Technological aspects of using protective fuses in low-voltage mine networks

    Energy Technology Data Exchange (ETDEWEB)

    Kowalski, Z; Pudelko, H

    1986-04-01

    Protection systems are evaluated for mining equipment used in underground coal mining in Poland. Operation of contactor switches is analyzed. Systems for protection of vacuum contactor switches from overload are comparatively evaluated. Types of current reducers are reviewed. Design of the aM protection fuse which is activated only when overload current exceeds the limiting level is analyzed. Protection fuses with the aM characteristic meeting IEC and VDE requirements for fuses used in SV5, SV7 and SV8 vacuum contactors for power networks of up to 1000 V are evaluated. Characteristics of the vacuum contactors manufactured in Poland are given in 6 diagrams and 2 tables. Reliability of the vacuum contactors with aM protection fuses is analyzed. 8 references.

  19. Optimization of active distribution networks: Design and analysis of significative case studies for enabling control actions of real infrastructure

    Science.gov (United States)

    Moneta, Diana; Mora, Paolo; Viganò, Giacomo; Alimonti, Gianluca

    2014-12-01

    The diffusion of Distributed Generation (DG) based on Renewable Energy Sources (RES) requires new strategies to ensure reliable and economic operation of the distribution networks and to support the diffusion of DG itself. An advanced algorithm (DISCoVER - DIStribution Company VoltagE Regulator) is being developed to optimize the operation of active network by means of an advanced voltage control based on several regulations. Starting from forecasted load and generation, real on-field measurements, technical constraints and costs for each resource, the algorithm generates for each time period a set of commands for controllable resources that guarantees achievement of technical goals minimizing the overall cost. Before integrating the controller into the telecontrol system of the real networks, and in order to validate the proper behaviour of the algorithm and to identify possible critical conditions, a complete simulation phase has started. The first step is concerning the definition of a wide range of "case studies", that are the combination of network topology, technical constraints and targets, load and generation profiles and "costs" of resources that define a valid context to test the algorithm, with particular focus on battery and RES management. First results achieved from simulation activity on test networks (based on real MV grids) and actual battery characteristics are given, together with prospective performance on real case applications.

  20. Optimization of active distribution networks: Design and analysis of significative case studies for enabling control actions of real infrastructure

    Directory of Open Access Journals (Sweden)

    Moneta Diana

    2014-01-01

    Full Text Available The diffusion of Distributed Generation (DG based on Renewable Energy Sources (RES requires new strategies to ensure reliable and economic operation of the distribution networks and to support the diffusion of DG itself. An advanced algorithm (DISCoVER – DIStribution Company VoltagE Regulator is being developed to optimize the operation of active network by means of an advanced voltage control based on several regulations. Starting from forecasted load and generation, real on-field measurements, technical constraints and costs for each resource, the algorithm generates for each time period a set of commands for controllable resources that guarantees achievement of technical goals minimizing the overall cost. Before integrating the controller into the telecontrol system of the real networks, and in order to validate the proper behaviour of the algorithm and to identify possible critical conditions, a complete simulation phase has started. The first step is concerning the definition of a wide range of “case studies”, that are the combination of network topology, technical constraints and targets, load and generation profiles and “costs” of resources that define a valid context to test the algorithm, with particular focus on battery and RES management. First results achieved from simulation activity on test networks (based on real MV grids and actual battery characteristics are given, together with prospective performance on real case applications.

  1. The BIRN Project: Distributed Information Infrastructure and Multi-scale Imaging of the Nervous System (BIRN = Biomedical Informatics Research Network)

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The grand goal in neuroscience research is to understand how the interplay of structural, chemical and electrical signals in nervous tissue gives rise to behavior. Experimental advances of the past decades have given the individual neuroscientist an increasingly powerful arsenal for obtaining data, from the level of molecules to nervous systems. Scientists have begun the arduous and challenging process of adapting and assembling neuroscience data at all scales of resolution and across disciplines into computerized databases and other easily accessed sources. These databases will complement the vast structural and sequence databases created to catalogue, organize and analyze gene sequences and protein products. The general premise of the neuroscience goal is simple; namely that with "complete" knowledge of the genome and protein structures accruing rapidly we next need to assemble an infrastructure that will facilitate acquisition of an understanding for how functional complexes operate in their ...

  2. Method of optimum channel switching in equipment of infocommunication network in conditions of cyber attacks to their telecommunication infrastructure.

    Science.gov (United States)

    Kochedykov, S. S.; Noev, A. N.; Dushkin, A. V.; Gubin, I. A.

    2018-05-01

    On the basis of the mathematical graph theory, the method of optimum switching of infocommunication networks in the conditions of cyber attacks is developed. The idea of representation of a set of possible ways on the graph in the form of the multilevel tree ordered by rules of algebra of a logic theory is the cornerstone of a method. As a criterion of optimization, the maximum of network transmission capacity to which assessment Ford- Falkerson's theorem is applied is used. The method is realized in the form of a numerical algorithm, which can be used not only for design, but also for operational management of infocommunication networks in conditions of violation of the functioning of their switching centers.

  3. Government Services Information Infrastructure Management

    Energy Technology Data Exchange (ETDEWEB)

    Cavallini, J.S.; Aiken, R.J.

    1995-04-01

    The Government Services Information Infrastructure (GSII) is that portion of the NII used to link Government and its services, enables virtual agency concepts, protects privacy, and supports emergency preparedness needs. The GSII is comprised of the supporting telecommunications technologies, network and information services infrastructure and the applications that use these. The GSII is an enlightened attempt by the Clinton/Gore Administration to form a virtual government crossing agency boundaries to interoperate more closely with industry and with the public to greatly improve the delivery of government services. The GSII and other private sector efforts, will have a significant impact on the design, development, and deployment of the NII, even if only through the procurement of such services. The Federal Government must adopt new mechanisms and new paradigms for the management of the GSII, including improved acquisition and operation of GSII components in order to maximize benefits. Government requirements and applications will continue to evolv. The requirements from government services and users of form affinity groups that more accurately and effectively define these common requirements, that drive the adoption and use of industry standards, and that provide a significant technology marketplace.

  4. Benefit of adaptive FEC in shared backup path protected elastic optical network.

    Science.gov (United States)

    Guo, Hong; Dai, Hua; Wang, Chao; Li, Yongcheng; Bose, Sanjay K; Shen, Gangxiang

    2015-07-27

    We apply an adaptive forward error correction (FEC) allocation strategy to an Elastic Optical Network (EON) operated with shared backup path protection (SBPP). To maximize the protected network capacity that can be carried, an Integer Linear Programing (ILP) model and a spectrum window plane (SWP)-based heuristic algorithm are developed. Simulation results show that the FEC coding overhead required by the adaptive FEC scheme is significantly lower than that needed by a fixed FEC allocation strategy resulting in higher network capacity for the adaptive strategy. The adaptive FEC allocation strategy can also significantly outperform the fixed FEC allocation strategy both in terms of the spare capacity redundancy and the average FEC coding overhead needed per optical channel. The proposed heuristic algorithm is efficient and not only performs closer to the ILP model but also does much better than the shortest-path algorithm.

  5. A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks

    Science.gov (United States)

    Jing, Xu; Hu, Hanwen; Yang, Huijun; Au, Man Ho; Li, Shuqin; Xiong, Naixue; Imran, Muhammad; Vasilakos, Athanasios V.

    2017-01-01

    The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider’s server contains a lot of valuable resources. LoBSs’ users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs’ risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs’ risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing. PMID:28335569

  6. A Quantitative Risk Assessment Model Involving Frequency and Threat Degree under Line-of-Business Services for Infrastructure of Emerging Sensor Networks.

    Science.gov (United States)

    Jing, Xu; Hu, Hanwen; Yang, Huijun; Au, Man Ho; Li, Shuqin; Xiong, Naixue; Imran, Muhammad; Vasilakos, Athanasios V

    2017-03-21

    The prospect of Line-of-Business Services (LoBSs) for infrastructure of Emerging Sensor Networks (ESNs) is exciting. Access control remains a top challenge in this scenario as the service provider's server contains a lot of valuable resources. LoBSs' users are very diverse as they may come from a wide range of locations with vastly different characteristics. Cost of joining could be low and in many cases, intruders are eligible users conducting malicious actions. As a result, user access should be adjusted dynamically. Assessing LoBSs' risk dynamically based on both frequency and threat degree of malicious operations is therefore necessary. In this paper, we proposed a Quantitative Risk Assessment Model (QRAM) involving frequency and threat degree based on value at risk. To quantify the threat degree as an elementary intrusion effort, we amend the influence coefficient of risk indexes in the network security situation assessment model. To quantify threat frequency as intrusion trace effort, we make use of multiple behavior information fusion. Under the influence of intrusion trace, we adapt the historical simulation method of value at risk to dynamically access LoBSs' risk. Simulation based on existing data is used to select appropriate parameters for QRAM. Our simulation results show that the duration influence on elementary intrusion effort is reasonable when the normalized parameter is 1000. Likewise, the time window of intrusion trace and the weight between objective risk and subjective risk can be set to 10 s and 0.5, respectively. While our focus is to develop QRAM for assessing the risk of LoBSs for infrastructure of ESNs dynamically involving frequency and threat degree, we believe it is also appropriate for other scenarios in cloud computing.

  7. Critical infrastructure system security and resiliency

    CERN Document Server

    Biringer, Betty; Warren, Drake

    2013-01-01

    Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard. With an emphasis on protecting an infrastructure's ability to perform its mission or function, Critical Infrastructure System Security and Resiliency presents a practical methodology for developing an effective protection system that can either prevent undesired events or mitigate the consequences of such events.Developed at Sandia National Labs, the authors' analytical approach and

  8. Zaštita računarskih mreža / Protection of computer networks

    Directory of Open Access Journals (Sweden)

    Milojko Jevtović

    2005-09-01

    Full Text Available U radu su obrađene metode napada, oblici ugrožavanja i vrste pretnji kojima su izložene računarske mreže, kao i moguće metode i tehnička rešenja za zaštitu mreža. Analizirani su efekti pretnji kojima mogu biti izložene računarske mreže i informacije koje se preko njih prenose. Opisana su određena tehnička rešenja koja obezbeđuju potreban nivo zaštite računarskih mreža, kao i mere za zaštitu informacija koje se preko njih prenose. Navedeni su standardi koji se odnose na metode i procedure kriptozaštite informacija u računarskim mrežama. U radu je naveden primer zaštite jedne lokalne računarske mreže. / In this paper different methods of attacks, threats and different forms of dangers to the computer networks are described. The possible models and technical solutions for networks protection are also given. The effects of threats directed to the computer networks and their information are analyzed certain technical solutions that provide necessary protection level of the computer networks as well as measures for information protection are also described. The standards for methods and security procedure for the information in computer networks are enlisted. There is also an example of protecting one local data network (in this paper.

  9. Protection of Passive Optical Networks by Using Ring Topology and Tunable Splitters

    Directory of Open Access Journals (Sweden)

    Pavel Lafata

    2013-01-01

    Full Text Available This article proposes an innovative method for protecting of passive optical networks (PONs, especially the central optical unit – optical line termination (OLT. PON networks are typically used in modern high-speed access networks, but there are also several specific applications, such as in business, army or science sector, which require a complex protection and backup system against failures and malfunctions. A standard tree or star topologies, which are usually used for PON networks, are significantly vulnerable mainly against the malfunctions and failures of OLT unit or feeder optical cable. The method proposed in this paper is focused on forming PON network with ring topology using passive optical splitters. The main idea is based on the possibility of placing both OLT units (primary and secondary on the opposite sides of the ring, which can potentially increase the resistance of network. This method is described in the article and scenarios and calculations using symmetric or tunable asymmetric passive optical splitters are included as well.

  10. Railway infrastructure security

    CERN Document Server

    Sforza, Antonio; Vittorini, Valeria; Pragliola, Concetta

    2015-01-01

    This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railway infrastructure security. Based on analyses by academics, technology providers, and railway operators, it explains how to assess terrorist and criminal threats, design countermeasures, and implement effective security strategies. In so doing, it draws upon a range of experiences from different countries in Europe and beyond. The book is the first to be devoted entirely to this subject. It will serve as a timely reminder of the attractiveness of the railway infrastructure system as a target for criminals and terrorists and, more importantly, as a valuable resource for stakeholders and professionals in the railway security field aiming to develop effective security based on a mix of methodological, technological, and organizational tools. Besides researchers and decision makers in the field, the book will appeal to students interested in critical infrastructur...

  11. DASISH Reference Model for SSH Data Infrastructures

    NARCIS (Netherlands)

    Fihn, Johan; Gnadt, Timo; Hoogerwerf, M.L.; Jerlehag, Birger; Lenkiewicz, Przemek; Priddy, M.; Shepherdson, John

    2016-01-01

    The current ”rising tide of scientific data” accelerates the need for e-infrastructures to support the lifecycle of data in research, from creation to reuse [RTW]. Different types of e-infrastructures address this need. Consortia like GÉANT and EGI build technical infrastructures for networking and

  12. Momentum in Transformation of Technical Infrastructure

    DEFF Research Database (Denmark)

    Nielsen, Susanne Balslev; Elle, Morten

    1999-01-01

    Current infrastructure holds a considerable momentum and this momentum is a barrier of transformation towards more sustainable technologies and more sustainable styles of network management. Using the sewage sector in Denmark as an example of a technical infrastructure system this paper argues...... that there are technical, economical and social aspects of the current infrastructures momentum....

  13. A virtual infrastructure based on honeycomb tessellation for data dissemination in multi-sink mobile wireless sensor networks

    NARCIS (Netherlands)

    Erman-Tüysüz, A.; Dilo, Arta; Havinga, Paul J.M.

    2012-01-01

    A new category of intelligent sensor network applications emerges where motion is a fundamental characteristic of the system under consideration. In such applications, sensors are attached to vehicles, or people that move around large geographic areas. For instance, in mission critical applications

  14. Cyber Infrastructure Protection. Volume 2

    Science.gov (United States)

    2013-05-01

    danger of contamination across these systems has grown. Second, cyber attacks have become less eco- nomically or politically neutral than in previous... food for thought on how this norm has shaped our ongoing collective treatment of it going forward. Through the enactment of FOIA in 1966, the push to... Malaysia and other parts of Southeast Asia, where there are fewer legal risks for the buyers, sellers, and operators.35 THEORIZING THE STRUCTURAL

  15. CERN printing infrastructure

    International Nuclear Information System (INIS)

    Otto, R; Sucik, J

    2008-01-01

    For many years CERN had a very sophisticated print server infrastructure [13] which supported several different protocols (AppleTalk, IPX and TCP/IP) and many different printing standards. Today's situation differs a lot: we have a much more homogenous network infrastructure, where TCP/IP is used everywhere and we have less printer models, which almost all work using current standards (i.e. they all provide PostScript drivers). This change gave us the possibility to review the printing architecture aiming at simplifying the infrastructure in order to achieve full automation of the service. The new infrastructure offers both: LPD service exposing print queues to Linux and Mac OS X computers and native printing for Windows based clients. The printer driver distribution is automatic and native on Windows and automated by custom mechanisms on Linux, where the appropriate Foomatic drivers are configured. Also the process of printer registration and queue creation is completely automated following the printer registration in the network database. At the end of 2006 we have moved all (∼1200) CERN printers and all users' connections at CERN to the new service. This paper will describe the new architecture and summarize the process of migration

  16. CERN printing infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Otto, R; Sucik, J [CERN, Geneva (Switzerland)], E-mail: Rafal.Otto@cern.ch, E-mail: Juraj.Sucik@cern.ch

    2008-07-15

    For many years CERN had a very sophisticated print server infrastructure [13] which supported several different protocols (AppleTalk, IPX and TCP/IP) and many different printing standards. Today's situation differs a lot: we have a much more homogenous network infrastructure, where TCP/IP is used everywhere and we have less printer models, which almost all work using current standards (i.e. they all provide PostScript drivers). This change gave us the possibility to review the printing architecture aiming at simplifying the infrastructure in order to achieve full automation of the service. The new infrastructure offers both: LPD service exposing print queues to Linux and Mac OS X computers and native printing for Windows based clients. The printer driver distribution is automatic and native on Windows and automated by custom mechanisms on Linux, where the appropriate Foomatic drivers are configured. Also the process of printer registration and queue creation is completely automated following the printer registration in the network database. At the end of 2006 we have moved all ({approx}1200) CERN printers and all users' connections at CERN to the new service. This paper will describe the new architecture and summarize the process of migration.

  17. An efficient hybrid protection scheme with shared/dedicated backup paths on elastic optical networks

    Directory of Open Access Journals (Sweden)

    Nogbou G. Anoh

    2017-02-01

    Full Text Available Fast recovery and minimum utilization of resources are the two main criteria for determining the protection scheme quality. We address the problem of providing a hybrid protection approach on elastic optical networks under contiguity and continuity of available spectrum constraints. Two main hypotheses are used in this paper for backup paths computation. In the first case, it is assumed that backup paths resources are dedicated. In the second case, the assumption is that backup paths resources are available shared resources. The objective of the study is to minimize spectrum utilization to reduce blocking probability on a network. For this purpose, an efficient survivable Hybrid Protection Lightpath (HybPL algorithm is proposed for providing shared or dedicated backup path protection based on the efficient energy calculation and resource availability. Traditional First-Fit and Best-Fit schemes are employed to search and assign the available spectrum resources. The simulation results show that HybPL presents better performance in terms of blocking probability, compared with the Minimum Resources Utilization Dedicated Protection (MRU-DP algorithm which offers better performance than the Dedicated Protection (DP algorithm.

  18. Leveraging modern climatology to increase adaptive capacity across protected area networks

    Science.gov (United States)

    Davison, J.E.; Graumlich, L.J.; Rowland, E.L.; Pederson, G.T.; Breshears, D.D.

    2012-01-01

    Human-driven changes in the global environment pose an increasingly urgent challenge for the management of ecosystems that is made all the more difficult by the uncertain future of both environmental conditions and ecological responses. Land managers need strategies to increase regional adaptive capacity, but relevant and rapid assessment approaches are lacking. To address this need, we developed a method to assess regional protected area networks across biophysically important climatic gradients often linked to biodiversity and ecosystem function. We plot the land of the southwestern United States across axes of historical climate space, and identify landscapes that may serve as strategic additions to current protected area portfolios. Considering climate space is straightforward, and it can be applied using a variety of relevant climate parameters across differing levels of land protection status. The resulting maps identify lands that are climatically distinct from existing protected areas, and may be utilized in combination with other ecological and socio-economic information essential to collaborative landscape-scale decision-making. Alongside other strategies intended to protect species of special concern, natural resources, and other ecosystem services, the methods presented herein provide another important hedging strategy intended to increase the adaptive capacity of protected area networks. ?? 2011 Elsevier Ltd.

  19. Cyber Attacks and Energy Infrastructures: Anticipating Risks

    International Nuclear Information System (INIS)

    Desarnaud, Gabrielle

    2017-01-01

    This study analyses the likelihood of cyber-attacks against European energy infrastructures and their potential consequences, particularly on the electricity grid. It also delivers a comparative analysis of measures taken by different European countries to protect their industries and collaborate within the European Union. The energy sector experiences an unprecedented digital transformation upsetting its activities and business models. Our energy infrastructures, sometimes more than a decade old and designed to remain functional for many years to come, now constantly interact with light digital components. The convergence of the global industrial system with the power of advanced computing and analytics reveals untapped opportunities at every step of the energy value chain. However, the introduction of digital elements in old and unprotected industrial equipment also exposes the energy industry to the cyber risk. One of the most compelling example of the type of threat the industry is facing, is the 2015 cyber-attack on the Ukraine power grid, which deprived about 200 000 people of electricity in the middle of the winter. The number and the level of technical expertise of cyber-attacks rose significantly after the discovery of the Stuxnet worm in the network of Natanz uranium enrichment site in 2010. Energy transition policies and the growing integration of renewable sources of energy will intensify this tendency, if cyber security measures are not part of the design of our future energy infrastructures. Regulators try to catch up and adapt, like in France where the authorities collaborate closely with the energy industry to set up a strict and efficient regulatory framework, and protect critical operators. This approach is adopted elsewhere in Europe, but common measures applicable to the whole European Union are essential to protect strongly interconnected energy infrastructures against a multiform threat that defies frontiers

  20. Cost- and reliability-oriented aggregation point association in long-term evolution and passive optical network hybrid access infrastructure for smart grid neighborhood area network

    Science.gov (United States)

    Cheng, Xiao; Feng, Lei; Zhou, Fanqin; Wei, Lei; Yu, Peng; Li, Wenjing

    2018-02-01

    With the rapid development of the smart grid, the data aggregation point (AP) in the neighborhood area network (NAN) is becoming increasingly important for forwarding the information between the home area network and wide area network. Due to limited budget, it is unable to use one-single access technology to meet the ongoing requirements on AP coverage. This paper first introduces the wired and wireless hybrid access network with the integration of long-term evolution (LTE) and passive optical network (PON) system for NAN, which allows a good trade-off among cost, flexibility, and reliability. Then, based on the already existing wireless LTE network, an AP association optimization model is proposed to make the PON serve as many APs as possible, considering both the economic efficiency and network reliability. Moreover, since the features of the constraints and variables of this NP-hard problem, a hybrid intelligent optimization algorithm is proposed, which is achieved by the mixture of the genetic, ant colony and dynamic greedy algorithm. By comparing with other published methods, simulation results verify the performance of the proposed method in improving the AP coverage and the performance of the proposed algorithm in terms of convergence.

  1. Persistence of self-recruitment and patterns of larval connectivity in a marine protected area network

    KAUST Repository

    Berumen, Michael L.

    2012-02-01

    The use of marine protected area (MPA) networks to sustain fisheries and conserve biodiversity is predicated on two critical yet rarely tested assumptions. Individual MPAs must produce sufficient larvae that settle within that reserve\\'s boundaries to maintain local populations while simultaneously supplying larvae to other MPA nodes in the network that might otherwise suffer local extinction. Here, we use genetic parentage analysis to demonstrate that patterns of self-recruitment of two reef fishes (Amphiprion percula and Chaetodon vagabundus) in an MPA in Kimbe Bay, Papua New Guinea, were remarkably consistent over several years. However, dispersal from this reserve to two other nodes in an MPA network varied between species and through time. The stability of our estimates of self-recruitment suggests that even small MPAs may be self-sustaining. However, our results caution against applying optimization strategies to MPA network design without accounting for variable connectivity among species and over time. 2012 The Authors.

  2. Online Social Networking, Sexual Risk and Protective Behaviors: Considerations for Clinicians and Researchers.

    Science.gov (United States)

    Holloway, Ian W; Dunlap, Shannon; Del Pino, Homero E; Hermanstyne, Keith; Pulsipher, Craig; Landovitz, Raphael J

    2014-09-01

    Online social networking refers to the use of internet-based technologies that facilitate connection and communication between users. These platforms may be accessed via computer or mobile device (e.g., tablet, smartphone); communication between users may include linking of profiles, posting of text, photo and video content, instant messaging and email. This review provides an overview of recent research on the relationship between online social networking and sexual risk and protective behaviors with a focus on use of social networking sites (SNS) among young people and populations at high risk for sexually transmitted infections (STIs). While findings are mixed, the widespread use of SNS for sexual communication and partner seeking presents opportunities for the delivery and evaluation of public health interventions. Results of SNS-based interventions to reduce sexual risk are synthesized in order to offer hands-on advice for clinicians and researchers interested in engaging patients and study participants via online social networking.

  3. TD-LTE Wireless Private Network QoS Transmission Protection

    Science.gov (United States)

    Zhang, Jianming; Cheng, Chao; Wu, Zanhong

    With the commencement of construction of the smart grid, the demand power business for reliability and security continues to improve, the reliability transmission of power TD-LTE Wireless Private Network are more and more attention. For TD-LTE power private network, it can provide different QoS services according to the user's business type, to protect the reliable transmission of business. This article describes in detail the AF module of PCC in the EPC network, specifically introduces set up AF module station and QoS mechanisms in the EPS load, fully considers the business characteristics of the special power network, establishing a suitable architecture for mapping QoS parameters, ensuring the implementation of each QoS business. Through using radio bearer management, we can achieve the reliable transmission of each business on physical channel.

  4. Infrastructural Fractals

    DEFF Research Database (Denmark)

    Bruun Jensen, Casper

    2007-01-01

    . Instead, I outline a fractal approach to the study of space, society, and infrastructure. A fractal orientation requires a number of related conceptual reorientations. It has implications for thinking about scale and perspective, and (sociotechnical) relations, and for considering the role of the social...... and a fractal social theory....

  5. Networking as an efficient, modern way of favouring stakeholders' involvement in implementing good radiological protection

    International Nuclear Information System (INIS)

    Lefaure, Ch.; Janssens, A.; Mrabit, K.; Ahier, B.

    2006-01-01

    Since the publication of ICRP 22 and ICRP 26 in 1973 and 1977 respectively, the understanding and practical implementation of the concept of Optimisation of Radiation Protection known as ALARA ('as low as reasonably achievable') has developed considerably globally and particularly in Europe. In the 1990 ICRP 60 publication, ALARA was re-emphasised as the cornerstone of the radiological protection system. This is also an explicit requirement of the International Basic Safety Standards for Protection against Ionizing Radiation and for the Safety of Radiation Sources (International BSS) and EC Directive laying down the Basic Safety Standards for radiological protection (EURATOM Directive 96/29), as well as of most of the national regulations. Throughout the 1980's and early 1990's ALARA was integrated into many organisations' radiation protection programmes, particularly in the nuclear industry and mainly for managing occupational exposure. One of the main lessons identified from that period was that it was not possible to implement good radiological protection by relying only on technical rules and procedures summarised in the three words: 'Time-Distance-Shielding'. A fourth word, 'Commitment', was to be added as no radiological protection programme would be successful without the commitment of all concerned stakeholders: regulatory bodies, managers, workers, etc. The scope of this presentation is, through different international feedback experiences, to demonstrate how networking is an efficient, modern way of fostering stakeholders involvement in implementing good radiological protection. (authors)

  6. Emerging marine protected area networks in the coral triangle: Lessons and way forward

    Directory of Open Access Journals (Sweden)

    Stuart J Green

    2011-01-01

    Full Text Available Marine protected areas (MPAs and MPA networks are valuable tools for protecting coral reef habitats and managing near-shore fisheries, while playing an essential role in the overall conservation of marine biodiversity. In addition, MPAs and their networks are often the core strategy for larger scale and more integrated forms of marine resource management that can lead to ecosystem-based management regimes for seascapes and eco-regions. This study conducted in 2008 documents the status of selected MPAs and MPA networks in Indonesia, Philippines and Papua New Guinea, to better understand development and their level of success in the Coral Triangle. Findings reveal that substantial gaps exist between the theory and practice of creating functional MPA networks. Across these sites, biophysical and social science knowledge, required to build functional and effective MPAs or MPA networks, lagged behind substantially. Aspects that appeared to require the most attention to improve MPA network effectiveness included essential management systems, institutional arrangements, governance and sustainable financing. Common indicators of success such as increased fish catch and habitat quality parameters were consistently associated with several independent variables: sustainable financing for management, clarity of MPA network rules, enforcement by community level enforcers, local skills development, and involvement in management by local elected politicians, a functional management board, multi-stakeholder planning mechanisms and participatory biophysical assessments. Conclusions are that although considerable investments have been made in MPAs and potential MPA networks in the Coral Triangle, management effectiveness is generally poor throughout the region and that not many large, formally declared MPAs are well managed.

  7. Complementarity and Area-Efficiency in the Prioritization of the Global Protected Area Network.

    Directory of Open Access Journals (Sweden)

    Peter Kullberg

    Full Text Available Complementarity and cost-efficiency are widely used principles for protected area network design. Despite the wide use and robust theoretical underpinnings, their effects on the performance and patterns of priority areas are rarely studied in detail. Here we compare two approaches for identifying the management priority areas inside the global protected area network: 1 a scoring-based approach, used in recently published analysis and 2 a spatial prioritization method, which accounts for complementarity and area-efficiency. Using the same IUCN species distribution data the complementarity method found an equal-area set of priority areas with double the mean species ranges covered compared to the scoring-based approach. The complementarity set also had 72% more species with full ranges covered, and lacked any coverage only for half of the species compared to the scoring approach. Protected areas in our complementarity-based solution were on average smaller and geographically more scattered. The large difference between the two solutions highlights the need for critical thinking about the selected prioritization method. According to our analysis, accounting for complementarity and area-efficiency can lead to considerable improvements when setting management priorities for the global protected area network.

  8. Complementarity and Area-Efficiency in the Prioritization of the Global Protected Area Network.

    Science.gov (United States)

    Kullberg, Peter; Toivonen, Tuuli; Montesino Pouzols, Federico; Lehtomäki, Joona; Di Minin, Enrico; Moilanen, Atte

    2015-01-01

    Complementarity and cost-efficiency are widely used principles for protected area network design. Despite the wide use and robust theoretical underpinnings, their effects on the performance and patterns of priority areas are rarely studied in detail. Here we compare two approaches for identifying the management priority areas inside the global protected area network: 1) a scoring-based approach, used in recently published analysis and 2) a spatial prioritization method, which accounts for complementarity and area-efficiency. Using the same IUCN species distribution data the complementarity method found an equal-area set of priority areas with double the mean species ranges covered compared to the scoring-based approach. The complementarity set also had 72% more species with full ranges covered, and lacked any coverage only for half of the species compared to the scoring approach. Protected areas in our complementarity-based solution were on average smaller and geographically more scattered. The large difference between the two solutions highlights the need for critical thinking about the selected prioritization method. According to our analysis, accounting for complementarity and area-efficiency can lead to considerable improvements when setting management priorities for the global protected area network.

  9. Computer network data communication controller for the Plutonium Protection System (PPS)

    International Nuclear Information System (INIS)

    Rogers, M.S.

    1978-10-01

    Systems which employ several computers for distributed processing must provide communication links between the computers to effectively utilize their capacity. The technique of using a central network controller to supervise and route messages on a multicomputer digital communications net has certain economic and performance advantages over alternative implementations. Conceptually, the number of stations (computers) which can be accommodated by such a controller is unlimited, but practical considerations dictate a maximum of about 12 to 15. A Data Network Controller (DNC) has been designed around a M6800 microprocessor for use in the Plutonium Protection System (PPS) demonstration facilities

  10. Durability of critical infrastructures

    OpenAIRE

    Raluca Pascu; Ramiro Sofronie

    2011-01-01

    The paper deals with those infrastructures by which world society, under the pressure ofdemographic explosion, self-survives. The main threatening comes not from terrorist attacks, but fromthe great natural catastrophes and global climate change. It’s not for the first time in history when suchmeasures of self-protection are built up. First objective of this paper is to present the background fordurability analysis. Then, with the aid of these mathematical tools the absolute durability of thr...

  11. Ambiguity in Social Network Data for Presence, Sensitive-Attribute, Degree and Relationship Privacy Protection.

    Science.gov (United States)

    Rajaei, Mehri; Haghjoo, Mostafa S; Miyaneh, Eynollah Khanjari

    2015-01-01

    Maintaining privacy in network data publishing is a major challenge. This is because known characteristics of individuals can be used to extract new information about them. Recently, researchers have developed privacy methods based on k-anonymity and l-diversity to prevent re-identification or sensitive label disclosure through certain structural information. However, most of these studies have considered only structural information and have been developed for undirected networks. Furthermore, most existing approaches rely on generalization and node clustering so may entail significant information loss as all properties of all members of each group are generalized to the same value. In this paper, we introduce a framework for protecting sensitive attribute, degree (the number of connected entities), and relationships, as well as the presence of individuals in directed social network data whose nodes contain attributes. First, we define a privacy model that specifies privacy requirements for the above private information. Then, we introduce the technique of Ambiguity in Social Network data (ASN) based on anatomy, which specifies how to publish social network data. To employ ASN, individuals are partitioned into groups. Then, ASN publishes exact values of properties of individuals of each group with common group ID in several tables. The lossy join of those tables based on group ID injects uncertainty to reconstruct the original network. We also show how to measure different privacy requirements in ASN. Simulation results on real and synthetic datasets demonstrate that our framework, which protects from four types of private information disclosure, preserves data utility in tabular, topological and spectrum aspects of networks at a satisfactory level.

  12. TCIA Secure Cyber Critical Infrastructure Modernization.

    Energy Technology Data Exchange (ETDEWEB)

    Keliiaa, Curtis M. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2017-02-01

    The Sandia National Laboratories (Sandia Labs) tribal cyber infrastructure assurance initiative was developed in response to growing national cybersecurity concerns in the the sixteen Department of Homeland Security (DHS) defined critical infrastructure sectors1. Technical assistance is provided for the secure modernization of critical infrastructure and key resources from a cyber-ecosystem perspective with an emphasis on enhanced security, resilience, and protection. Our purpose is to address national critical infrastructure challenges as a shared responsibility.

  13. Adaptive protection coordination scheme for distribution network with distributed generation using ABC

    Directory of Open Access Journals (Sweden)

    A.M. Ibrahim

    2016-09-01

    Full Text Available This paper presents an adaptive protection coordination scheme for optimal coordination of DOCRs in interconnected power networks with the impact of DG, the used coordination technique is the Artificial Bee Colony (ABC. The scheme adapts to system changes; new relays settings are obtained as generation-level or system-topology changes. The developed adaptive scheme is applied on the IEEE 30-bus test system for both single- and multi-DG existence where results are shown and discussed.

  14. Protection system for 11kV network using arc noise

    International Nuclear Information System (INIS)

    Burdi, M.K.; Memon, A.S.; Shaikh, S.A.

    2000-01-01

    Extensive research work is being done on protecting devices for 11KV network using arc noise and fault noise frequencies in relay to operate a circuit breaker; The relay works on the principle of detecting fault and extracting voltage signal output from the noise frequencies across filter. The voltage development without amplification, is enough to operate the circuit breaker. Sensitivity of the circuit breaker. In this paper design, operation and application of the relay are described. (author)

  15. Investigation and modeling on protective textiles using artificial neural networks for defense applications

    International Nuclear Information System (INIS)

    Ramaiah, Gurumurthy B.; Chennaiah, Radhalakshmi Y.; Satyanarayanarao, Gurumurthy K.

    2010-01-01

    Kevlar 29 is a class of Kevlar fiber used for protective applications primarily by the military and law enforcement agencies for bullet resistant vests, hence for these reasons military has found that armors reinforced with Kevlar 29 multilayer fabrics which offer 25-40% better fragmentation resistance and provide better fit with greater comfort. The objective of this study is to investigate and develop an artificial neural network model for analyzing the performance of ballistic fabrics made from Kevlar 29 single layer fabrics using their material properties as inputs. Data from fragment simulation projectile (FSP) ballistic penetration measurements at 244 m/s has been used to demonstrate the modeling aspects of artificial neural networks. The neural network models demonstrated in this paper is based on back propagation (BP) algorithm which is inbuilt in MATLAB 7.1 software and is used for studies in science, technology and engineering. In the present research, comparisons are also made between the measured values of samples selected for building the neural network model and network predicted results. The analysis of the results for network predicted and experimental samples used in this study showed similarity.

  16. Network of Research Infrastructures for European Seismology (NERIES)-Web Portal Developments for Interactive Access to Earthquake Data on a European Scale

    Science.gov (United States)

    Spinuso, A.; Trani, L.; Rives, S.; Thomy, P.; Euchner, F.; Schorlemmer, D.; Saul, J.; Heinloo, A.; Bossu, R.; van Eck, T.

    2009-04-01

    The Network of Research Infrastructures for European Seismology (NERIES) is European Commission (EC) project whose focus is networking together seismological observatories and research institutes into one integrated European infrastructure that provides access to data and data products for research. Seismological institutes and organizations in European and Mediterranean countries maintain large, geographically distributed data archives, therefore this scenario suggested a design approach based on the concept of an internet service oriented architecture (SOA) to establish a cyberinfrastructure for distributed and heterogeneous data streams and services. Moreover, one of the goals of NERIES is to design and develop a Web portal that acts as the uppermost layer of the infrastructure and provides rendering capabilities for the underlying sets of data The Web services that are currently being designed and implemented will deliver data that has been adopted to appropriate formats. The parametric information about a seismic event is delivered using a seismology-specific Extensible mark-up Language(XML) format called QuakeML (https://quake.ethz.ch/quakeml), which has been formalized and implemented in coordination with global earthquake-information agencies. Uniform Resource Identifiers (URIs) are used to assign identifiers to (1) seismic-event parameters described by QuakeML, and (2) generic resources, for example, authorities, locations providers, location methods, software adopted, and so on, described by use of a data model constructed with the resource description framework (RDF) and accessible as a service. The European-Mediterranean Seismological Center (EMSC) has implemented a unique event identifier (UNID) that will create the seismic event URI used by the QuakeML data model. Access to data such as broadband waveform, accelerometric data and stations inventories will be also provided through a set of Web services that will wrap the middleware used by the

  17. Robustness of a Neural Network Model for Power Peak Factor Estimation in Protection Systems

    International Nuclear Information System (INIS)

    Souza, Rose Mary G.P.; Moreira, Joao M.L.

    2006-01-01

    This work presents results of robustness verification of artificial neural network correlations that improve the real time prediction of the power peak factor for reactor protection systems. The input variables considered in the correlation are those available in the reactor protection systems, namely, the axial power differences obtained from measured ex-core detectors, and the position of control rods. The correlations, based on radial basis function (RBF) and multilayer perceptron (MLP) neural networks, estimate the power peak factor, without faulty signals, with average errors between 0.13%, 0.19% and 0.15%, and maximum relative error of 2.35%. The robustness verification was performed for three different neural network correlations. The results show that they are robust against signal degradation, producing results with faulty signals with a maximum error of 6.90%. The average error associated to faulty signals for the MLP network is about half of that of the RBF network, and the maximum error is about 1% smaller. These results demonstrate that MLP neural network correlation is more robust than the RBF neural network correlation. The results also show that the input variables present redundant information. The axial power difference signals compensate the faulty signal for the position of a given control rod, and improves the results by about 10%. The results show that the errors in the power peak factor estimation by these neural network correlations, even in faulty conditions, are smaller than the current PWR schemes which may have uncertainties as high as 8%. Considering the maximum relative error of 2.35%, these neural network correlations would allow decreasing the power peak factor safety margin by about 5%. Such a reduction could be used for operating the reactor with a higher power level or with more flexibility. The neural network correlation has to meet requirements of high integrity software that performs safety grade actions. It is shown that the

  18. Green Infrastructure, Groundwater and the Sustainable City

    Science.gov (United States)

    Band, L. E.

    2014-12-01

    The management of water is among the most important attributes of urbanization. Provision of sufficient quantities and quality of freshwater, treatment and disposal of wastewater and flood protection are critical for urban sustainability. Over the last century, two major shifts in water management paradigms have occurred, the first to improve public health with the provision of infrastructure for centralized sanitary effluent collection and treatment, and the rapid drainage and routing of stormwater. A current shift in paradigm is now occurring in response to the unintended consequences of sanitary and stormwater management, which have degraded downstream water bodies and shifted flood hazard downstream. Current infrastructure is being designed and implemented to retain, rather than rapidly drain, stormwater, with a focus on infiltration based methods. In urban areas, this amounts to a shift in hydrologic behavior to depression focused recharge. While stormwater is defined as surface flow resulting from developed areas, an integrated hydrologic systems approach to urban water management requires treatment of the full critical zone. In urban areas this extends from the top of the vegetation and building canopy, to a subsurface depth including natural soils, fill, saprolite and bedrock. In addition to matric and network flow in fracture systems, an urban "karst" includes multiple generations of current and past infrastructure, which has developed extensive subsurface pipe networks for supply and drainage, enhancing surface/groundwater flows and exchange. In this presentation, Band will discuss the need to focus on the urban critical zone, and the development and adaptation of new modeling and analytical approaches to understand and plan green infrastructure based on surface/groundwater/ecosystem interactions, and implications for the restoration and new design of cities.

  19. Effective methods of protection of the intellectual activity results in infosphere of global telematics networks

    Directory of Open Access Journals (Sweden)

    D. A. Lovtsov

    2016-01-01

    Full Text Available The purpose of this article is perfection of using metodology of technological and organization and legal protect of intellectual activity results and related intellectual rights in information sphere of Global Telematics Networks (such as of «Internet», «Relkom», «Sitek», «Sedab», «Remart», and others. On the conduct analysis base of the peculiarities and possibilities of using of different technological, organization and legal methods and ways protection of information objects the offers of perfection of corresponding organization and legal safeguarding are formulated. The effectiveness of the protection is provided on the basis of rational aggregation technological, organization and legal methods and ways possible in a particular situation.

  20. Understanding the context of network traffic alerts

    NARCIS (Netherlands)

    Cappers, B.C.M.; van Wijk, J.J.; Best, D.M.; Staheli, D.; Prigent, N.; Engle, S.; Harrison, L.

    2016-01-01

    For the protection of critical infrastructures against complex virus attacks, automated network traffic analysis and deep packet inspection are unavoidable. However, even with the use of network intrusion detection systems, the number of alerts is still too large to analyze manually. In addition,