Search results for " Infrastructure"
showing 10 items of 269 documents
Savienojamības Problēmas Baltijas Jūras Reģionā. Fehmarn Belt Fixed Link Project un Øresund Bridge Gadījums
2021
Darbā tiek pētītas savienojamības problēmas Baltijas jūras reģionā, analizējot Fehmarn Belt Fixed Link un Øresund Bridge gadījumus. Savienojamības attīstība ir atkarīga no transporta koridoru harmonizācijas, modernizācijas un perspektīvas. Pētījums mērķis ir vērsts uz Fehmarn Belt Fixed Link ietekmes noteikšanu savienojuma elementiem. Izmantojot salīdzinošo metodi, tiek analizēti Øresund Bridge projekts un gaidāmā projekta kvalitatīvā SWOT analīze. Tiek pētīti Eiropas Savienības instrumenti, piemēram, Trans European Transport Network un Interreg, tādu reģionu savienojamībai kā Øresund, Skåne, Schleswig-Holstein un Zealand, transporta projektu rezultāti, termiņi un prognozes. Pētījums norāda…
Assessing the Environmental Performances of Urban Roundabouts Using the VSP Methodology and AIMSUN
2022
In line with globally shared environmental sustainability goals, the shift towards citizen-friendly mobility is changing the way people move through cities and road user behaviour. Building a sustainable road transport requires design knowledge to develop increasingly green road infrastructures and monitoring the environmental impacts from mobile crowdsourced data. In this view, the paper presents an empirically based methodology that integrates the vehicle-specific power (VSP) model and microscopic traffic simulation (AIMSUN) to estimate second-by-second vehicle emissions at urban roundabouts. The distributions of time spent in each VSP mode from instantaneous vehicle trajectory data gathe…
A New Coupling Solution for G3-PLC Employment in MV Smart Grids
2019
This paper proposes a new coupling solution for transmitting narrowband multicarrier power line communication (PLC) signals over medium voltage (MV) power lines. The proposed system is based on an innovative PLC coupling principle, patented by the authors, which exploits the capacitive divider embedded in voltage detecting systems (VDS) already installed inside the MV switchboard. Thus, no dedicated couplers have to be installed and no switchboard modifications or energy interruptions are needed. This allows a significant cost reduction of MV PLC implementation. A first prototype of the proposed coupling system was presented in previous papers: it had a 15 kHz bandwidth useful to couple sin…
PLC security and critical infrastructure protection
2013
Programmable Logic Controllers (PLCs) are the most important components embedded in Industrial Control Systems (ICSs). ICSs have achieved highest standards in terms of efficiency and performance. As a result of that, higher portion of infrastructure in industries has been automated for the comfort of human beings. Therefore, protection of such systems is crucial. It is important to investigate the vulnerabilities of ICSs in order to solve the threats and attacks against critical infrastructure to protect human lives and assets. PLC is the basic building block of an ICS. If PLCs are exploited, overall system will be exposed to the threat. Many believed that PLCs are secured devices due to it…
Simulations of networked critical infrastructures
2018
Master's thesis Information- and communication technology IKT590 - University of Agder 2018 Critical infrastructure (CI) refers to assets that are essential for the functioning of a society and economy, such as telecommunication/ICT; energy generation, transmission and distribution; financial sector; etc. CIs are tightly coupled, creating a complex system where failures propagate from a disrupted CI to other CIs, aggravating and prolonging the societal impact through cascading effects. This thesis extends a system dynamic model by Eliza Canzani describing how a failed critical infrastructure that cannot deliver products and services impacts other critical infrastructures, and how a critical…
Customer data collection infrastructure and Customer Experience Management:The SAQ Case Study
2017
Channel integration makes Customer Experience Management more complex and requires from retailers a regeneration of their value proposition. A longitudinal case study reveal a hierarchical sequence of operant resource triad: cultural mindsets, strategic directions for designing value propositions, and a dynamic system of capabilities for continually renewing customer experiences. The implementation of a customer data collection infrastructure, the adoption of an iterative and sequential innovation process, and the mobilization of cross-functional and multidisciplinary project teams, will help develop the firm’s dynamic system of capabilities.
Phenomena in the Cyber World
2015
This chapter describes and evaluates the cyber world, including its phenomena, from a strategic perspective. As no universally accepted definitions for the cyber world exist, associated literature and publications address it in many different ways. A five-layer model is constructed for cyber threats, which include cybervandalism, cybercrime, cyber intelligence, cyberterrorism and cyberwarfare. This chapter depicts the standards-based risk model, cyber operations and cyberweaponry, as well as the critical structures of society as the targets. Moreover, cyber security definitions are provided. Cyber world phenomena are addressed in more detail in other chapters of this book.
Criminal networks analysis in missing data scenarios through graph distances.
2021
Data collected in criminal investigations may suffer from: (i) incompleteness, due to the covert nature of criminal organisations; (ii) incorrectness, caused by either unintentional data collection errors and intentional deception by criminals; (iii) inconsistency, when the same information is collected into law enforcement databases multiple times, or in different formats. In this paper we analyse nine real criminal networks of different nature (i.e., Mafia networks, criminal street gangs and terrorist organizations) in order to quantify the impact of incomplete data and to determine which network type is most affected by it. The networks are firstly pruned following two specific methods: …
Emergent vulnerabilities in Integrated Operations: A proactive simulation study of economic risk
2009
Abstract The protection of critical infrastructure requires an understanding of the effects of change on current and future safety and operations. Vulnerabilities may emerge during the rollout of updated techniques and integration of new technology with existing work practices. Managers need to understand how their decisions, often focused on economic priorities, affect the dynamics of vulnerability over time. Such understanding is difficult to obtain, as the historical data typically used for decision support, prediction and forecasting may not be available. We report on the use of group model building and simulation to consider proactively the effects of a 10-year, multi-billion dollar mo…
Urban Infrastructure and Euergetism Outside the City of Rome
2015
This chapter explores the connection between the monumentalization of cities, the use of local resources, and the involvement of benefactors in civic building operations. At its peak the Roman Empire comprised a mosaic of some two thousand flourishing cities. For the establishment and maintenance of their infrastructure, they benefited in large part from the contributions of wealthy citizens and, in some situations, of outside sponsors. This chapter uses epigraphic evidence to explain what financial resources cities had at their disposal and who was responsible for benefactions that benefited the communities and their inhabitants. It also discusses the nature of the benefactions and what su…