141 research outputs found

    Derivation of a methodology to compare C,B and R detection capability in urban events

    Get PDF
    Many comparisons have been made between Chemical detectors (C), between Biological (B) detectors, and between Radiological detectors (R), providing insights to the best C, B and R equipment for a given purpose. However, no comparison has been made between C, B and R systems to appraise how C, B and R detectors perform against each other and where capability gaps lie. The dissertation generates a method to achieve an inter-comparison between C, B and R detection capabilities and identifies where to invest resources to achieve a more effective overall CBR detection architecture. The inter-comparison methodology is based on an operational analysis tool (SMARTS). The overall CBR detection architecture is illustrated through detect to warn and detect to treat mechanisms across the timeline of a realistic scenario. The scenario has been created to be non-prejudicial to C, B or R incidents, deconstructed into four frames to accommodate SMARTS. The most suitable deconstruction is into early warning, personnel security screening, initial response and definitive identification frames. The most suitable detector Key Performance Characteristics (KPCs) are identified for each frame. SMARTS is performed by analysing the current performance of the C, B and R detection systems drawn from the literature and the target requirements determined by defensible logic. The desire to improve each capability from its current state to target requirement is subjectively determined by the author. A sensitivity analysis is applied to mitigate the effect of a limited pool of opinion. Applying the methodology to published CBR detection capability data and the author’s appraisal of the target requirement reveals that B detection requires the greatest development and R the least, and that detection in the security screening and initial response frames falls short of capability compared to early warning and definitive identification frames. Selectivity is a challenge across a broad range of frames and agents. This work provides a methodology that is modular and transparent so that it can be repopulated should new data or alternative perception arises

    A conceptual information sharing framework to improve supply chain security collaboration

    Get PDF
    Modern Supply Chains are critical in terms of efficiency, economic activities and commercial impact, particularly in case of security incidents. Inland terminals, commercial ports and dry ports constitute key gateways for the transportation flows in these modern supply chains and are require enhanced security procedures. This paper develops a framework that facilitates the sharing of information among various supply chain stakeholders, which is expected to improve the security level from a value chain perspective. In this context, we propose the upgrade of the current security strategies utilizing existing processes, equipment in order to minimise time and cost currently needed but more importantly improving the level of security in the supply chain. A conceptual rule and role-based data fusion framework is developed enabling the seamless and timely exchange of messages. The proposed Data Fusion Framework has a simple architecture that supports quick integration to either network-based, distributed systems or conventional stand-alone systems and adheres to common data fusion principles. The proposed framework considers different components (e.g. sensors, algorithms and fusing procedures) in an equipment agnostic approach so as to enable easy access and easy usage of security information.N/

    Events Recognition System for Water Treatment Works

    Get PDF
    The supply of drinking water in sufficient quantity and required quality is a challenging task for water companies. Tackling this task successfully depends largely on ensuring a continuous high quality level of water treatment at Water Treatment Works (WTW). Therefore, processes at WTWs are highly automated and controlled. A reliable and rapid detection of faulty sensor data and failure events at WTWs processes is of prime importance for its efficient and effective operation. Therefore, the vast majority of WTWs operated in the UK make use of event detection systems that automatically generate alarms after the detection of abnormal behaviour on observed signals to ensure an early detection of WTW’s process failures. Event detection systems usually deployed at WTWs apply thresholds to the monitored signals for the recognition of WTW’s faulty processes. The research work described in this thesis investigates new methods for near real-time event detection at WTWs by the implementation of statistical process control and machine learning techniques applied for an automated near real-time recognition of failure events at WTWs processes. The resulting novel Hybrid CUSUM Event Recognition System (HC-ERS) makes use of new online sensor data validation and pre-processing techniques and utilises two distinct detection methodologies: first for fault detection on individual signals and second for the recognition of faulty processes and events at WTWs. The fault detection methodology automatically detects abnormal behaviour of observed water quality parameters in near real-time using the data of the corresponding sensors that is online validated and pre-processed. The methodology utilises CUSUM control charts to predict the presence of faults by tracking the variation of each signal individually to identify abnormal shifts in its mean. The basic CUSUM methodology was refined by investigating optimised interdependent parameters for each signal individually. The combined predictions of CUSUM fault detection on individual signals serves the basis for application of the second event detection methodology. The second event detection methodology automatically identifies faults at WTW’s processes respectively failure events at WTWs in near real-time, utilising the faults detected by CUSUM fault detection on individual signals beforehand. The method applies Random Forest classifiers to predict the presence of an event at WTW’s processes. All methods have been developed to be generic and generalising well across different drinking water treatment processes at WTWs. HC-ERS has proved to be effective in the detection of failure events at WTWs demonstrated by the application on real data of water quality signals with historical events from a UK’s WTWs. The methodology achieved a peak F1 value of 0.84 and generates 0.3 false alarms per week. These results demonstrate the ability of method to automatically and reliably detect failure events at WTW’s processes in near real-time and also show promise for practical application of the HC-ERS in industry. The combination of both methodologies presents a unique contribution to the field of near real-time event detection at WTW

    Application of artificial intelligence techniques for automated detection of myocardial infarction: A review

    Full text link
    Myocardial infarction (MI) results in heart muscle injury due to receiving insufficient blood flow. MI is the most common cause of mortality in middle-aged and elderly individuals around the world. To diagnose MI, clinicians need to interpret electrocardiography (ECG) signals, which requires expertise and is subject to observer bias. Artificial intelligence-based methods can be utilized to screen for or diagnose MI automatically using ECG signals. In this work, we conducted a comprehensive assessment of artificial intelligence-based approaches for MI detection based on ECG as well as other biophysical signals, including machine learning (ML) and deep learning (DL) models. The performance of traditional ML methods relies on handcrafted features and manual selection of ECG signals, whereas DL models can automate these tasks. The review observed that deep convolutional neural networks (DCNNs) yielded excellent classification performance for MI diagnosis, which explains why they have become prevalent in recent years. To our knowledge, this is the first comprehensive survey of artificial intelligence techniques employed for MI diagnosis using ECG and other biophysical signals.Comment: 16 pages, 8 figure

    Earthmoving construction automation with military applications: Past, present and future

    Full text link
    © ISARC 2018 - 35th International Symposium on Automation and Robotics in Construction and International AEC/FM Hackathon: The Future of Building Things. All rights reserved. Amongst increasing innovations in frontier engineering sciences, the advancements in Robotic and Autonomous Systems (RAS) has brought about a new horizon in construction applications. There is evidence of the increasing interest in RAS technologies in the civil construction sector being reflected in construction efforts of many military forces. In particular, Army or ground-based forces are frequently called upon to conduct construction tasks as part of military operations, tasks which could be partially or fully aided by the employment of RAS technologies. Along with recent advances in the Internet of Things (IoT) and cyber-physical system infrastructure, it is essential to examine the current maturity, technical feasibility, and affordability, as well as the challenges and future directions of the adoption and application of RAS to military construction. This paper presents a comprehensive survey and provides a contemporary and industry-independent overview on the state-of-the-art of earthmoving construction automation used in defence, spanning current world’s best practice through to that which is predicted over the coming years

    The European Union's fight against terrorism : a critical discourse analysis

    Get PDF
    Since the events of September 11, 2001, the threat of terrorism has gained ever more political salience, occupying a place at the top of the EU political agenda. In response to the perceived threat, the EU has developed a distinct approach to counter-terrorism, themed around what is called the "fight against terrorism‟. This approach is more than just a set of institutional or public policy responses designed to negate the threat of terrorism; it is also an influential political discourse which plays an important role in the construction of counter-terrorism policy and the legitimisation of counter-terrorism policy responses. This thesis uses critical discourse analysis to study the discursive construction of EU counter-terrorism policy. It uses representative extracts from twenty counter-terrorism documents prepared by/or for the EU institution the European Council, across a ten-year period from November 1999 to December 2009. The analysis identifies several strands of the "fight against terrorism‟ discourse, which it is argued are central to its constitution and that remain consistent across the period analysed. In the post-September 11 period, these strands of the counter-terrorism discourse play an important role in constructing an ubiquitous internal/external "terrorist‟ threat. These include: terrorism as a "criminal act‟; terrorism as an act perpetrated primarily by "non-state actors‟; terrorism as "new‟ and seeking to gain access to and/or use weapons of mass destruction; the threat of terrorism linked to an "open‟ or "globalised‟ geo-strategic environment, thus requiring measures of "control‟ at the EU border; and the threat of terrorism linked to "violent radicalisation‟ or "Islamist terrorism‟, emanating both internally ("home-grown terrorism‟) and externally to the EU. When these different strands are taken together they constitute the "fight against terrorism‟ discourse. It is argued that this discourse helps to construct the identity of the EU, whilst simultaneously the identity of the EU is central to the formulation of counter-terrorism policies. As such, the representations contained within the counter-terrorism discourse and counter-terrorism policy are considered to be mutually or co-constitutive. The main contention of the thesis therefore is that EU identity is constituted through the "fight against terrorism‟ discourse. Critical discourse analysis was chosen as a method through which to investigate EU counter-terrorism policy because it allows us to: map how the "fight against terrorism‟ discourse is constructed; to demonstrate how it provides a language for talking about terrorism; to understand how the discourse defines what is accepted knowledge about (who or what is) terrorism; and to reveal how that knowledge structures the counter-terrorism policy response as a "natural‟ or "common-sense‟ approach to the challenge of terrorism. This approach is novel in the sense that it is attentive to often neglected issues such as identity. In particular, it explores how the "fight against terrorism‟ discourse construct a "European‟ sense of Self in opposition to a "terrorist‟ Other. It investigates the extent to which the "fight against terrorism‟ discourse plays a role in the legitimisation of new security practices; as well as reflecting on the extent to which these practices are contributing to the blurring of the distinction between internal and external security policy. It also considers whether the discourse is reflective of a process of "securitisation‟ of social and political life within Europe

    INTEROPERABILITY FOR MODELING AND SIMULATION IN MARITIME EXTENDED FRAMEWORK

    Get PDF
    This thesis reports on the most relevant researches performed during the years of the Ph.D. at the Genova University and within the Simulation Team. The researches have been performed according to M&S well known recognized standards. The studies performed on interoperable simulation cover all the environments of the Extended Maritime Framework, namely Sea Surface, Underwater, Air, Coast & Land, Space and Cyber Space. The applications cover both the civil and defence domain. The aim is to demonstrate the potential of M&S applications for the Extended Maritime Framework, applied to innovative unmanned vehicles as well as to traditional assets, human personnel included. A variety of techniques and methodology have been fruitfully applied in the researches, ranging from interoperable simulation, discrete event simulation, stochastic simulation, artificial intelligence, decision support system and even human behaviour modelling

    MODELLING VIRTUAL ENVIRONMENT FOR ADVANCED NAVAL SIMULATION

    Get PDF
    This thesis proposes a new virtual simulation environment designed as element of an interoperable federation of simulator to support the investigation of complex scenarios over the Extended Maritime Framework (EMF). Extended Maritime Framework is six spaces environment (Underwater, Water surface, Ground, Air, Space, and Cyberspace) where parties involved in Joint Naval Operations act. The amount of unmanned vehicles involved in the simulation arise the importance of the Communication modelling, thus the relevance of Cyberspace. The research is applied to complex cases (one applied to deep waters and one to coast and littoral protection) as examples to validate this approach; these cases involve different kind of traditional assets (e.g. satellites, helicopters, ships, submarines, underwater sensor infrastructure, etc.) interact dynamically and collaborate with new autonomous systems (i.e. AUV, Gliders, USV and UAV). The use of virtual simulation is devoted to support validation of new concepts and investigation of collaborative engineering solutions by providing a virtual representation of the current situation; this approach support the creation of dynamic interoperable immersive framework that could support training for Man in the Loop, education and tactical decision introducing the Man on the Loop concepts. The research and development of the Autonomous Underwater Vehicles requires continuous testing so a time effective approach can result a very useful tool. In this context the simulation can be useful to better understand the behaviour of Unmanned Vehicles and to avoid useless experimentations and their costs finding problems before doing them. This research project proposes the creation of a virtual environment with the aim to see and understand a Joint Naval Scenario. The study will be focusing especially on the integration of Autonomous Systems with traditional assets; the proposed simulation deals especially with collaborative operation involving different types of Autonomous Underwater Vehicles (AUV), Unmanned Surface Vehicles (USV) and UAV (Unmanned Aerial Vehicle). The author develops an interoperable virtual simulation devoted to present the overall situation for supervision considering also the sensor capabilities, communications and mission effectiveness that results dependent of the different asset interaction over a complex heterogeneous network. The aim of this research is to develop a flexible virtual simulation solution as crucial element of an HLA federation able to address the complexity of Extended Maritime Framework (EMF). Indeed this new generation of marine interoperable simulation is a strategic advantage for investigating the problems related to the operational use of autonomous systems and to finding new ways to use them respect to different scenarios. The research deal with the creation of two scenarios, one related to military operations and another one on coastal and littoral protection where the virtual simulation propose the overall situation and allows to navigate into the virtual world considering the complex physics affecting movement, perception, interaction and communication. By this approach, it becomes evident the capability to identify, by experimental analysis within the virtual world, the new solutions in terms of engineering and technological configuration of the different systems and vehicles as well as new operational models and tactics to address the specific mission environment. The case of study is a maritime scenario with a representation of heterogeneous network frameworks that involves multiple vehicles both naval and aerial including AUVs, USVs, gliders, helicopter, ships, submarines, satellite, buoys and sensors. For the sake of clarity aerial communications will be represented divided from underwater ones. A connection point for the latter will be set on the keel line of surface vessels representing communication happening via acoustic modem. To represent limits in underwater communications, underwater signals have been considerably slowed down in order to have a more realistic comparison with aerial ones. A maximum communication distance is set, beyond which no communication can take place. To ensure interoperability the HLA Standard (IEEE 1516 evolved) is adopted to federate other simulators so to allow its extensibility for other case studies. Two different scenarios are modelled in 3D visualization: Open Water and Port Protection. The first one aims to simulate interactions between traditional assets in Extended Maritime Framework (EMF) such as satellite, navy ships, submarines, NATO Research Vessels (NRVs), helicopters, with new generation unmanned assets as AUV, Gliders, UAV, USV and the mutual advantage the subjects involved in the scenario can have; in other word, the increase in persistence, interoperability and efficacy. The second scenario models the behaviour of unmanned assets, an AUV and an USV, patrolling a harbour to find possible threats. This aims to develop an algorithm to lead patrolling path toward an optimum, guaranteeing a high probability of success in the safest way reducing human involvement in the scenario. End users of the simulation face a graphical 3D representation of the scenario where assets would be represented. He can moves in the scenario through a Free Camera in Graphic User Interface (GUI) configured to entitle users to move around the scene and observe the 3D sea scenario. In this way, players are able to move freely in the synthetic environment in order to choose the best perspective of the scene. The work is intended to provide a valid tool to evaluate the defencelessness of on-shore and offshore critical infrastructures that could includes the use of new technologies to take care of security best and preserve themselves against disasters both on economical and environmental ones
    • …
    corecore