Search results for " Infrastructure"

showing 10 items of 269 documents

Savienojamības Problēmas Baltijas Jūras Reģionā. Fehmarn Belt Fixed Link Project un Øresund Bridge Gadījums

2021

Darbā tiek pētītas savienojamības problēmas Baltijas jūras reģionā, analizējot Fehmarn Belt Fixed Link un Øresund Bridge gadījumus. Savienojamības attīstība ir atkarīga no transporta koridoru harmonizācijas, modernizācijas un perspektīvas. Pētījums mērķis ir vērsts uz Fehmarn Belt Fixed Link ietekmes noteikšanu savienojuma elementiem. Izmantojot salīdzinošo metodi, tiek analizēti Øresund Bridge projekts un gaidāmā projekta kvalitatīvā SWOT analīze. Tiek pētīti Eiropas Savienības instrumenti, piemēram, Trans European Transport Network un Interreg, tādu reģionu savienojamībai kā Øresund, Skåne, Schleswig-Holstein un Zealand, transporta projektu rezultāti, termiņi un prognozes. Pētījums norāda…

ConnectivityBaltijas jūras reģiona studijasInfrastructure ProjectTransport InfrastructureRegional DevelopmentCross-Border Integration
researchProduct

Assessing the Environmental Performances of Urban Roundabouts Using the VSP Methodology and AIMSUN

2022

In line with globally shared environmental sustainability goals, the shift towards citizen-friendly mobility is changing the way people move through cities and road user behaviour. Building a sustainable road transport requires design knowledge to develop increasingly green road infrastructures and monitoring the environmental impacts from mobile crowdsourced data. In this view, the paper presents an empirically based methodology that integrates the vehicle-specific power (VSP) model and microscopic traffic simulation (AIMSUN) to estimate second-by-second vehicle emissions at urban roundabouts. The distributions of time spent in each VSP mode from instantaneous vehicle trajectory data gathe…

Control and OptimizationRenewable Energy Sustainability and the EnvironmentRoundaboutEnergy Engineering and Power Technologyroundabout; vehicle-specific power; pollutant emission; microsimulation; road infrastructurePollutant emissionVehicle-specific powerroundabout vehicle-specific power pollutant emission microsimulation road infrastructureRoad infrastructureSettore ICAR/04 - Strade Ferrovie Ed AeroportiMicrosimulationElectrical and Electronic EngineeringEngineering (miscellaneous)Energy (miscellaneous)
researchProduct

A New Coupling Solution for G3-PLC Employment in MV Smart Grids

2019

This paper proposes a new coupling solution for transmitting narrowband multicarrier power line communication (PLC) signals over medium voltage (MV) power lines. The proposed system is based on an innovative PLC coupling principle, patented by the authors, which exploits the capacitive divider embedded in voltage detecting systems (VDS) already installed inside the MV switchboard. Thus, no dedicated couplers have to be installed and no switchboard modifications or energy interruptions are needed. This allows a significant cost reduction of MV PLC implementation. A first prototype of the proposed coupling system was presented in previous papers: it had a 15 kHz bandwidth useful to couple sin…

Control and Optimizationpower system measurementComputer scienceOrthogonal frequency-division multiplexingEnergy Engineering and Power Technologylcsh:Technologypower system communicationNarrowbandsmart gridsElectrical and Electronic EngineeringCenter frequencysmart gridEngineering (miscellaneous)Renewable Energy Sustainability and the Environmentbusiness.industrylcsh:TBandwidth (signal processing)Electrical engineeringpower system measurementsnarrow band power line communicationPower-line communicationElectric power transmissionSmart gridModulationcommunication system performanceICT infrastructure for smart gridbusinessSettore ING-INF/07 - Misure Elettriche E ElettronicheEnergy (miscellaneous)VoltageEnergies
researchProduct

PLC security and critical infrastructure protection

2013

Programmable Logic Controllers (PLCs) are the most important components embedded in Industrial Control Systems (ICSs). ICSs have achieved highest standards in terms of efficiency and performance. As a result of that, higher portion of infrastructure in industries has been automated for the comfort of human beings. Therefore, protection of such systems is crucial. It is important to investigate the vulnerabilities of ICSs in order to solve the threats and attacks against critical infrastructure to protect human lives and assets. PLC is the basic building block of an ICS. If PLCs are exploited, overall system will be exposed to the threat. Many believed that PLCs are secured devices due to it…

Control system securityEngineeringbusiness.industryProgrammable logic controllerCritical infrastructure protectionIndustrial control systemComputer securitycomputer.software_genreStuxnetCritical infrastructureData Protection Act 1998Isolation (database systems)businesscomputer2013 IEEE 8th International Conference on Industrial and Information Systems
researchProduct

Simulations of networked critical infrastructures

2018

Master's thesis Information- and communication technology IKT590 - University of Agder 2018 Critical infrastructure (CI) refers to assets that are essential for the functioning of a society and economy, such as telecommunication/ICT; energy generation, transmission and distribution; financial sector; etc. CIs are tightly coupled, creating a complex system where failures propagate from a disrupted CI to other CIs, aggravating and prolonging the societal impact through cascading effects. This thesis extends a system dynamic model by Eliza Canzani describing how a failed critical infrastructure that cannot deliver products and services impacts other critical infrastructures, and how a critical…

Critical infrastructuresIKT590interdependenciessystem dynamics modellingVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550epidemics modelling
researchProduct

Customer data collection infrastructure and Customer Experience Management:The SAQ Case Study

2017

Channel integration makes Customer Experience Management more complex and requires from retailers a regeneration of their value proposition. A longitudinal case study reveal a hierarchical sequence of operant resource triad: cultural mindsets, strategic directions for designing value propositions, and a dynamic system of capabilities for continually renewing customer experiences. The implementation of a customer data collection infrastructure, the adoption of an iterative and sequential innovation process, and the mobilization of cross-functional and multidisciplinary project teams, will help develop the firm’s dynamic system of capabilities.

Customer data collection infrastructureLongitudinal case studyHiérarchie de ressources opérantesCustomer Experience ManagementHierarchical operant resources[SHS.GESTION]Humanities and Social Sciences/Business administrationProgramme de reconnaissance clientEtude de cas longitudinaleAgile methodsGestion de l’expérience clientMéthodes agiles[SHS.GESTION] Humanities and Social Sciences/Business administration
researchProduct

Phenomena in the Cyber World

2015

This chapter describes and evaluates the cyber world, including its phenomena, from a strategic perspective. As no universally accepted definitions for the cyber world exist, associated literature and publications address it in many different ways. A five-layer model is constructed for cyber threats, which include cybervandalism, cybercrime, cyber intelligence, cyberterrorism and cyberwarfare. This chapter depicts the standards-based risk model, cyber operations and cyberweaponry, as well as the critical structures of society as the targets. Moreover, cyber security definitions are provided. Cyber world phenomena are addressed in more detail in other chapters of this book.

CybercrimeRisk modelCyberwarfareComputer scienceCyberterrorismPerspective (graphical)Network-centric warfareComputer securitycomputer.software_genrecomputerComputingMilieux_MISCELLANEOUSInformation warfareCritical infrastructure
researchProduct

Criminal networks analysis in missing data scenarios through graph distances.

2021

Data collected in criminal investigations may suffer from: (i) incompleteness, due to the covert nature of criminal organisations; (ii) incorrectness, caused by either unintentional data collection errors and intentional deception by criminals; (iii) inconsistency, when the same information is collected into law enforcement databases multiple times, or in different formats. In this paper we analyse nine real criminal networks of different nature (i.e., Mafia networks, criminal street gangs and terrorist organizations) in order to quantify the impact of incomplete data and to determine which network type is most affected by it. The networks are firstly pruned following two specific methods: …

Data AnalysisFOS: Computer and information sciencesComputer and Information SciencesScienceIntelligenceSocial SciencesTransportationCriminologyCivil EngineeringSocial NetworkingComputer Science - Computers and SocietyLaw EnforcementSociologyComputers and Society (cs.CY)PsychologyHumansComputer NetworksSocial and Information Networks (cs.SI)Algorithms; Humans; Terrorism; Criminals; Data Analysis; Social NetworkingSettore INF/01 - InformaticaQCognitive PsychologyRBiology and Life SciencesEigenvaluesComputer Science - Social and Information NetworksCriminalsTransportation InfrastructurePoliceRoadsProfessionsAlgebraLinear AlgebraPeople and PlacesPhysical SciencesEngineering and TechnologyCognitive ScienceMedicineLaw and Legal SciencesPopulation GroupingsTerrorismCrimeCriminal Justice SystemMathematicsNetwork AnalysisAlgorithmsResearch ArticleNeurosciencePLoS ONE
researchProduct

Emergent vulnerabilities in Integrated Operations: A proactive simulation study of economic risk

2009

Abstract The protection of critical infrastructure requires an understanding of the effects of change on current and future safety and operations. Vulnerabilities may emerge during the rollout of updated techniques and integration of new technology with existing work practices. Managers need to understand how their decisions, often focused on economic priorities, affect the dynamics of vulnerability over time. Such understanding is difficult to obtain, as the historical data typically used for decision support, prediction and forecasting may not be available. We report on the use of group model building and simulation to consider proactively the effects of a 10-year, multi-billion dollar mo…

Decision support systemInformation Systems and ManagementTechnological changeManagement scienceComputer scienceProcess (engineering)VulnerabilityIntegrated operationsCritical infrastructureComputer Science ApplicationsRisk analysis (engineering)Vulnerability assessmentModeling and SimulationProblem domainSafety Risk Reliability and QualityInternational Journal of Critical Infrastructure Protection
researchProduct

Urban Infrastructure and Euergetism Outside the City of Rome

2015

This chapter explores the connection between the monumentalization of cities, the use of local resources, and the involvement of benefactors in civic building operations. At its peak the Roman Empire comprised a mosaic of some two thousand flourishing cities. For the establishment and maintenance of their infrastructure, they benefited in large part from the contributions of wealthy citizens and, in some situations, of outside sponsors. This chapter uses epigraphic evidence to explain what financial resources cities had at their disposal and who was responsible for benefactions that benefited the communities and their inhabitants. It also discusses the nature of the benefactions and what su…

Economic growthEconomyEuergetismUrbanizationPolitical scienceUrban infrastructure
researchProduct