Search results for "format"

showing 10 items of 24643 documents

Visualization of Exchanged Information with Dynamic Networks: A Case Study of Fire Emergency Search and Rescue Operation

2017

To perform emergency response activities, complex networks of emergency responders from different emergency organizations work together to rescue affected people and to mitigate the property losses. However, to work efficiently, the emergency responders have to rely completely on the data which gets generated from heterogeneous data sources during search and rescue operation (SAR). From this abundant data, rescue teams share needed information which is hidden in the abundant data with one another to make decisions, obtain situational awareness and also to assign tasks. Moreover, understanding and analyzing the shared information is a complex and very challenging task. Therefore, in this pap…

021110 strategic defence & security studiesEmergency managementSituation awarenessbusiness.industryComputer scienceProperty (programming)Information sharing0211 other engineering and technologies030208 emergency & critical care medicine02 engineering and technologyComplex networkComputer securitycomputer.software_genreVisualizationTask (project management)03 medical and health sciences0302 clinical medicinebusinesscomputerSearch and rescue2017 IEEE 7th International Advance Computing Conference (IACC)
researchProduct

Making sense of crises: the implications of information asymmetries for resilience and social justice in disaster-ridden communities

2017

New information and communication technologies (ICT) have enabled communities to collect and share information and tap into a network of peers in unprecedented ways. For more than a decade, informa...

021110 strategic defence & security studiesEmergency managementbusiness.industrymedia_common.quotation_subject05 social sciencesGeography Planning and Development0211 other engineering and technologies02 engineering and technologyBuilding and ConstructionPublic relationsSocial justiceInformation asymmetryInformation and Communications TechnologySociology0509 other social sciences050904 information & library sciencesSafety Risk Reliability and QualityResilience (network)businessEmpowermentCivil and Structural Engineeringmedia_commonSustainable and Resilient Infrastructure
researchProduct

How Critical Infrastructure Orients International Relief in Cascading Disasters

2016

Critical infrastructure and facilities are central assets in modern societies, but their impact on international disaster relief remains mostly associated with logistics challenges. The emerging literature on cascading disasters suggests the need to integrate the nonlinearity of events in the analyses. This article investigates three case studies: the 2002 floods in the Czech Republic, Hurricane Katrina in 2005 and the 2011 Tohoku earthquake, tsunami and Fukushima meltdown in Japan. We explore how the failure of critical infrastructure can orient international disaster relief by shifting its priorities during the response. We argue that critical infrastructure can influence aid request and …

021110 strategic defence & security studiesEngineering010504 meteorology & atmospheric sciencesEmergency managementbusiness.industry0211 other engineering and technologies02 engineering and technologyManagement Monitoring Policy and LawComputer securitycomputer.software_genre01 natural sciencesCritical infrastructureManagement Information SystemsHurricane katrinabusinesscomputerEnvironmental planning0105 earth and related environmental sciencesJournal of Contingencies and Crisis Management
researchProduct

Serious Game Design for Flooding Triggered by Extreme Weather

2017

Managing crises with limited resources through a serious game is deemed as one of the ways of training and can be regarded as an alternative to a table-top exercise. This article presents the so-called “Operasjon Tyrsdal” serious game, inspired by a real case of extreme weather that hit the west coast of Norway. This reference case is used to add realism to the game. The game is designed for a single player, while the mechanics are framed in such a way that the player will have limited resources, and elevated event pressure over time. Beside applying an iterative Scrum method with seven Sprint cycles, we combined the development work with desk research and used the involvement of testers, i…

021110 strategic defence & security studiesExtreme weatherComputer scienceComputingMilieux_PERSONALCOMPUTING0211 other engineering and technologies0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processing02 engineering and technologySerious gameWater resource managementFlooding (computer networking)International Journal of Information Systems for Crisis Response and Management
researchProduct

A Novel Intelligent Technique for Product Acceptance Process Optimization on the Basis of Misclassification Probability in the Case of Log-Location-S…

2019

In this paper, to determine the optimal parameters of the product acceptance process under parametric uncertainty of underlying models, a new intelligent technique for optimization of product acceptance process on the basis of misclassification probability is proposed. It allows one to take into account all possible situations that may occur when it is necessary to optimize the product acceptance process. The technique is based on the pivotal quantity averaging approach (PQAA) which allows one to eliminate the unknown parameters from the problem and to use available statistical information as completely as possible. It is conceptually simple and easy to use. One of the most important featur…

021110 strategic defence & security studiesGeneralityMathematical optimizationBasis (linear algebra)Computer scienceScale (chemistry)0211 other engineering and technologiesProcess (computing)02 engineering and technologyPivotal quantityProduct (mathematics)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingProcess optimizationParametric statistics
researchProduct

Proper Incentives for Proper IT Security Management _ A System Dynamics Approach

2017

021110 strategic defence & security studiesIncentive0211 other engineering and technologies0202 electrical engineering electronic engineering information engineeringEconomics020201 artificial intelligence & image processing02 engineering and technologyIndustrial organizationSystem dynamicsProceedings of the 50th Hawaii International Conference on System Sciences (2017)
researchProduct

Terrorism in the Website

2020

Without any doubt, terrorism causes higher levels of anxiety and very well enhances our fears as never before. The post 9/11 context witnesses the multiplication of xenophobic expressions, such as Islamophobia or tourist-phobia, only to name a few. These expressions result from a culture of intolerance, which not only was enrooted in the ideological core of western capitalism but was accelerated just after 9/11. Some voices emphasize the needs of employing technology to make this world a safer place. This chapter goes in a contradictory direction. The authors focus on the ethical limitations of technologies when they are subordinated to the ideals of zero-risk society. Echoing Sunstein and …

021110 strategic defence & security studiesInformation Systems and ManagementScrutinyComputer Networks and Communications05 social sciences0211 other engineering and technologiesContext (language use)02 engineering and technologyCriminology0506 political scienceHardware and ArchitecturePolitical scienceFundamentalismTerrorism050602 political science & public administrationmedicineAnxietyMultiplicationmedicine.symptomSafety Risk Reliability and QualitySafety ResearchSoftwareInternational Journal of Cyber Warfare and Terrorism
researchProduct

Watermarking for ontologies

2011

In this paper, we study watermarking methods to prove the ownership of an ontology. Different from existing approaches, we propose to watermark not by altering existing statements, but by removing them. Thereby, our approach does not introduce false statements into the ontology. We show how ownership of ontologies can be established with provably tight probability bounds, even if only parts of the ontology are being re-used. We finally demonstrate the viability of our approach on real-world ontologies.

021110 strategic defence & security studiesInformation retrievalOpen worldComputer scienceOntology-based data integrationProcess ontologyData_MISCELLANEOUS0211 other engineering and technologiesWatermark02 engineering and technologyOntology (information science)computer.software_genre020204 information systems0202 electrical engineering electronic engineering information engineeringData miningDigital watermarkingSecurity parametercomputerISWC 2011: Proceedings of the 10th International Semantic Web Conference
researchProduct

Automated Dental Identification with Lowest Cost Path-Based Teeth and Jaw Separation

2016

Abstract Teeth are some of the most resilient tissues of the human body. Because of their placement, teeth often yield intact indicators even when other metrics, such as finger prints and DNA, are missing. Forensics on dental identification is now mostly manual work which is time and resource intensive. Systems for automated human identification from dental X-ray images have the potential to greatly reduce the necessary efforts spent on dental identification, but it requires a system with high stability and accuracy so that the results can be trusted. This paper proposes a new system for automated dental X-ray identification. The scheme extracts tooth and dental work contours from the X-ray…

021110 strategic defence & security studiesK5000-5582business.industrySeparation (aeronautics)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION0211 other engineering and technologies02 engineering and technologyAnatomyDental identificationpath-findinghuman dental identificationCriminal law and procedurestomatognathic diseasesstomatognathic systemSocial pathology. Social and public welfare. CriminologyPath (graph theory)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionArtificial intelligencebusinessHV1-9960Scandinavian Journal of Forensic Science
researchProduct

Building Resilience Through Effective Disaster Management

2017

Existing literature argues that taking a holistic approach to disaster management is important for organizations in building resilience. Theoretical underpinnings to achieve a holistic understanding, however, is lacking. This article applies the notion of an ecosystem as a holistic lens to understand complex disaster management. The paper reports two case studies from Japan and Nepal to illustrate how an ecosystem works during a disaster. The theoretical framework of information ecology is used in analyzing the cases. Based on the findings, the study shows three interconnected mechanisms that can build resilience of an ecosystem in a disaster management context, namely (1) coevolution, (2) …

021110 strategic defence & security studiesKnowledge managementEmergency managementbusiness.industry05 social sciencesPerspective (graphical)0211 other engineering and technologies02 engineering and technologyInformation ecology0502 economics and businessSociologybusinessResilience (network)Environmental planningComputingMilieux_MISCELLANEOUS050203 business & managementInternational Journal of Information Systems for Crisis Response and Management
researchProduct