Search results for "infrastructure"

showing 10 items of 326 documents

A New Coupling Solution for G3-PLC Employment in MV Smart Grids

2019

This paper proposes a new coupling solution for transmitting narrowband multicarrier power line communication (PLC) signals over medium voltage (MV) power lines. The proposed system is based on an innovative PLC coupling principle, patented by the authors, which exploits the capacitive divider embedded in voltage detecting systems (VDS) already installed inside the MV switchboard. Thus, no dedicated couplers have to be installed and no switchboard modifications or energy interruptions are needed. This allows a significant cost reduction of MV PLC implementation. A first prototype of the proposed coupling system was presented in previous papers: it had a 15 kHz bandwidth useful to couple sin…

Control and Optimizationpower system measurementComputer scienceOrthogonal frequency-division multiplexingEnergy Engineering and Power Technologylcsh:Technologypower system communicationNarrowbandsmart gridsElectrical and Electronic EngineeringCenter frequencysmart gridEngineering (miscellaneous)Renewable Energy Sustainability and the Environmentbusiness.industrylcsh:TBandwidth (signal processing)Electrical engineeringpower system measurementsnarrow band power line communicationPower-line communicationElectric power transmissionSmart gridModulationcommunication system performanceICT infrastructure for smart gridbusinessSettore ING-INF/07 - Misure Elettriche E ElettronicheEnergy (miscellaneous)VoltageEnergies
researchProduct

PLC security and critical infrastructure protection

2013

Programmable Logic Controllers (PLCs) are the most important components embedded in Industrial Control Systems (ICSs). ICSs have achieved highest standards in terms of efficiency and performance. As a result of that, higher portion of infrastructure in industries has been automated for the comfort of human beings. Therefore, protection of such systems is crucial. It is important to investigate the vulnerabilities of ICSs in order to solve the threats and attacks against critical infrastructure to protect human lives and assets. PLC is the basic building block of an ICS. If PLCs are exploited, overall system will be exposed to the threat. Many believed that PLCs are secured devices due to it…

Control system securityEngineeringbusiness.industryProgrammable logic controllerCritical infrastructure protectionIndustrial control systemComputer securitycomputer.software_genreStuxnetCritical infrastructureData Protection Act 1998Isolation (database systems)businesscomputer2013 IEEE 8th International Conference on Industrial and Information Systems
researchProduct

Aproximación a la Geografía del despilfarro en España: balance de las últimas dos décadas

2018

Este trabajo pretende ser una primera aproximación a la dimensión del despilfarro de recursos públicos en infraestructuras en España desde 1995 hasta la actualidad en los distintos niveles de gobierno. A partir de algunas precisiones sobre los conceptos de despilfarro y corrupción, se analiza, de una parte, la inversión y los sobrecostes en infraestructuras innecesarias impulsadas y ejecutadas por la Administración General del Estado en el ámbito de sus competencias, y de otra, infraestructuras, proyectos, eventos e inversiones fallidas, vacías o infrautilizadas acometidas por las Comunidades Autónomas y los gobiernos locales. Se abordan los déficit de marco institucional y de gobernanza te…

Corruptionmedia_common.quotation_subjectEspañaGeography Planning and Development0211 other engineering and technologies02 engineering and technologyEnvironmental Science (miscellaneous)Political science050602 political science & public administrationGE1-350Territorial governanceDespilfarroEarth-Surface Processesmedia_commonGeography (General)GovernmentInfraestructurasWelfare economicsCrony capitalism05 social sciencesInfrastructures021107 urban & regional planningInvestment (macroeconomics)0506 political scienceEnvironmental sciencesUrban StudiesWork (electrical)WasteSpainCentral governmentAnálisis Geográfico RegionalCapitalismo clientelarG1-922
researchProduct

Simulations of networked critical infrastructures

2018

Master's thesis Information- and communication technology IKT590 - University of Agder 2018 Critical infrastructure (CI) refers to assets that are essential for the functioning of a society and economy, such as telecommunication/ICT; energy generation, transmission and distribution; financial sector; etc. CIs are tightly coupled, creating a complex system where failures propagate from a disrupted CI to other CIs, aggravating and prolonging the societal impact through cascading effects. This thesis extends a system dynamic model by Eliza Canzani describing how a failed critical infrastructure that cannot deliver products and services impacts other critical infrastructures, and how a critical…

Critical infrastructuresIKT590interdependenciessystem dynamics modellingVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550epidemics modelling
researchProduct

Customer data collection infrastructure and Customer Experience Management:The SAQ Case Study

2017

Channel integration makes Customer Experience Management more complex and requires from retailers a regeneration of their value proposition. A longitudinal case study reveal a hierarchical sequence of operant resource triad: cultural mindsets, strategic directions for designing value propositions, and a dynamic system of capabilities for continually renewing customer experiences. The implementation of a customer data collection infrastructure, the adoption of an iterative and sequential innovation process, and the mobilization of cross-functional and multidisciplinary project teams, will help develop the firm’s dynamic system of capabilities.

Customer data collection infrastructureLongitudinal case studyHiérarchie de ressources opérantesCustomer Experience ManagementHierarchical operant resources[SHS.GESTION]Humanities and Social Sciences/Business administrationProgramme de reconnaissance clientEtude de cas longitudinaleAgile methodsGestion de l’expérience clientMéthodes agiles[SHS.GESTION] Humanities and Social Sciences/Business administration
researchProduct

Phenomena in the Cyber World

2015

This chapter describes and evaluates the cyber world, including its phenomena, from a strategic perspective. As no universally accepted definitions for the cyber world exist, associated literature and publications address it in many different ways. A five-layer model is constructed for cyber threats, which include cybervandalism, cybercrime, cyber intelligence, cyberterrorism and cyberwarfare. This chapter depicts the standards-based risk model, cyber operations and cyberweaponry, as well as the critical structures of society as the targets. Moreover, cyber security definitions are provided. Cyber world phenomena are addressed in more detail in other chapters of this book.

CybercrimeRisk modelCyberwarfareComputer scienceCyberterrorismPerspective (graphical)Network-centric warfareComputer securitycomputer.software_genrecomputerComputingMilieux_MISCELLANEOUSInformation warfareCritical infrastructure
researchProduct

Criminal networks analysis in missing data scenarios through graph distances.

2021

Data collected in criminal investigations may suffer from: (i) incompleteness, due to the covert nature of criminal organisations; (ii) incorrectness, caused by either unintentional data collection errors and intentional deception by criminals; (iii) inconsistency, when the same information is collected into law enforcement databases multiple times, or in different formats. In this paper we analyse nine real criminal networks of different nature (i.e., Mafia networks, criminal street gangs and terrorist organizations) in order to quantify the impact of incomplete data and to determine which network type is most affected by it. The networks are firstly pruned following two specific methods: …

Data AnalysisFOS: Computer and information sciencesComputer and Information SciencesScienceIntelligenceSocial SciencesTransportationCriminologyCivil EngineeringSocial NetworkingComputer Science - Computers and SocietyLaw EnforcementSociologyComputers and Society (cs.CY)PsychologyHumansComputer NetworksSocial and Information Networks (cs.SI)Algorithms; Humans; Terrorism; Criminals; Data Analysis; Social NetworkingSettore INF/01 - InformaticaQCognitive PsychologyRBiology and Life SciencesEigenvaluesComputer Science - Social and Information NetworksCriminalsTransportation InfrastructurePoliceRoadsProfessionsAlgebraLinear AlgebraPeople and PlacesPhysical SciencesEngineering and TechnologyCognitive ScienceMedicineLaw and Legal SciencesPopulation GroupingsTerrorismCrimeCriminal Justice SystemMathematicsNetwork AnalysisAlgorithmsResearch ArticleNeurosciencePLoS ONE
researchProduct

Emergent vulnerabilities in Integrated Operations: A proactive simulation study of economic risk

2009

Abstract The protection of critical infrastructure requires an understanding of the effects of change on current and future safety and operations. Vulnerabilities may emerge during the rollout of updated techniques and integration of new technology with existing work practices. Managers need to understand how their decisions, often focused on economic priorities, affect the dynamics of vulnerability over time. Such understanding is difficult to obtain, as the historical data typically used for decision support, prediction and forecasting may not be available. We report on the use of group model building and simulation to consider proactively the effects of a 10-year, multi-billion dollar mo…

Decision support systemInformation Systems and ManagementTechnological changeManagement scienceComputer scienceProcess (engineering)VulnerabilityIntegrated operationsCritical infrastructureComputer Science ApplicationsRisk analysis (engineering)Vulnerability assessmentModeling and SimulationProblem domainSafety Risk Reliability and QualityInternational Journal of Critical Infrastructure Protection
researchProduct

Forecasting the diffusion of hydrogen EV refuelling infrastructures in Italy

2019

In Italy the electric vehicle revolution is arrived but it still has difficulties to take off. At the moment hybrid technology would seem the most quoted, due especially to range anxiety. The aim of this work is to understand if the fuel cell technology can find place in Italy. The possibility to use fuel cell to storage electric energy is quite interesting: the charging times will be reduced, and heavy passenger transportation should be easily faced. Basing on the existing history and analysis of the information accessible, this paper addresses the existing e-mobility scenario in Italy and predicts the cities in which a hydrogen refuelling infrastructure should be more remunerative, in ord…

Diffusion (acoustics)InfrastructureRange anxietybusiness.product_category020209 energy02 engineering and technology010501 environmental sciencesEnvironmental economicsE-mobilityElectric vehicle01 natural sciencesCharging stationElectric energyWork (electrical)Order (exchange)Electric vehicleCharging station0202 electrical engineering electronic engineering information engineeringNiche marketbusiness0105 earth and related environmental sciences
researchProduct

Dsdivn: A Distributed Software-Defined Networking Architecture for Infrastructure-Less Vehicular Networks

2017

International audience; In the last few years, the emerging network architecture paradigm of Software-Defined Networking (SDN), has become one of the most important technology to manage large scale networks such as Vehicular Ad-hoc Networks (VANETs). Recently, several works have shown interest in the use of SDN paradigm in VANETs. SDN brings flexibility, scalability and management facility to current VANETs. However, almost all of proposed Software-Defined VANET (SDVN) architectures are infrastructure-based. This paper will focus on how to enable SDN in infrastructure-less vehicular environments. For this aim, we propose a novel distributed SDN-based architecture for uncovered infrastructur…

Distributed control[SPI]Engineering Sciences [physics]Infrastructure-less zones[SPI] Engineering Sciences [physics]ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSVehicular Ad-hoc networksMobile controllers ClusteringSoftware-Defined networking
researchProduct