1,488 research outputs found

    ECHO Information sharing models

    Get PDF
    As part of the ECHO project, the Early Warning System (EWS) is one of four technologies under development. The E-EWS will provide the capability to share information to provide up to date information to all constituents involved in the E-EWS. The development of the E-EWS will be rooted in a comprehensive review of information sharing and trust models from within the cyber domain as well as models from other domains

    The Definition of Specific-Purpose English Language Competences Needed in Border Control and their Development Potentials II. : English for Border and Coast Guards: Specific-Purpose English Language Skills and the FRONTEX Tools Designed for their Development – Level A2/B1

    Get PDF
    The aim of this series of papers is to present modern methods of linguistics and language pedagogy concerning specific-purpose language competences and, applying them to English for Border Guards (EBG), to describe the English competences to be developed at language courses for border guards in EU member states and to explore the prospects for their improvement. Having discussed the dilemmas and methodology related to the definition of specific-purpose language competences and to needs analyses, indispensable for language course design in the first part of the series, the further parts wish to prove that the ongoing FRONTEX project entitled English Communication for Border and Coast Guards very well illustrates how the new approach to needs analysis methods is used to define the English language skills needed for border control in the EU. The author also presents that, based on the authentic material provided by border guards, the ESP competences needed for their work can be defined according to the categories used in applied linguistics and the Common European Framework of Reference for Languages. Due to the length limits of this paper, this part will only discuss elementary and intermediate (A2/B1) EBG competences

    The applications of satellites to communications, navigation and surveillance for aircraft operating over the contiguous United States. Volume 1 - Technical report

    Get PDF
    Satellite applications to aircraft communications, navigation, and surveillance over US including synthesized satellite network and aircraft equipment for air traffic contro

    Air Traffic Management Abbreviation Compendium

    Get PDF
    As in all fields of work, an unmanageable number of abbreviations are used today in aviation for terms, definitions, commands, standards and technical descriptions. This applies in general to the areas of aeronautical communication, navigation and surveillance, cockpit and air traffic control working positions, passenger and cargo transport, and all other areas of flight planning, organization and guidance. In addition, many abbreviations are used more than once or have different meanings in different languages. In order to obtain an overview of the most common abbreviations used in air traffic management, organizations like EUROCONTROL, FAA, DWD and DLR have published lists of abbreviations in the past, which have also been enclosed in this document. In addition, abbreviations from some larger international projects related to aviation have been included to provide users with a directory as complete as possible. This means that the second edition of the Air Traffic Management Abbreviation Compendium includes now around 16,500 abbreviations and acronyms from the field of aviation

    A surveillance sector review applied to infectious diseases at a country level

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The new International Health Regulations (IHR) require World Health Organization (WHO) member states to assess their core capacity for surveillance. Such reviews also have the potential to identify important surveillance gaps, improve the organisation of disparate surveillance systems and to focus attention on <it>upstream </it>hazards, determinants and interventions.</p> <p>Methods</p> <p>We developed a <it>surveillance sector review </it>method for evaluating all of the surveillance systems and related activities across a sector, in this case those concerned with infectious diseases in New Zealand. The first stage was a systematic description of these surveillance systems using a newly developed framework and classification system. Key informant interviews were conducted to validate the available information on the systems identified.</p> <p>Results</p> <p>We identified 91 surveillance systems and related activities in the 12 coherent categories of infectious diseases examined. The majority (n = 40 or 44%) of these were disease surveillance systems. They covered all categories, particularly for more severe outcomes including those resulting in death or hospitalisations. Except for some notifiable diseases and influenza, surveillance of less severe, but important infectious diseases occurring in the community was largely absent. There were 31 systems (34%) for surveillance of <it>upstream </it>infectious disease hazards, including risk and protective factors. This area tended to have many potential gaps and lack integration, partly because such systems were operated by a range of different agencies, often outside the health sector. There were fewer surveillance systems for determinants, including population size and characteristics (n = 9), and interventions (n = 11).</p> <p>Conclusions</p> <p>It was possible to create and populate a workable framework for describing all the infectious diseases surveillance systems and related activities in a single developed country and to identify potential surveillance sector gaps. This is the first stage in a review process that will lead to identification of priorities for surveillance sector development.</p

    Cyber-Physical Threat Intelligence for Critical Infrastructures Security

    Get PDF
    Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies

    Department of Defense Dictionary of Military and Associated Terms

    Get PDF
    The Joint Publication 1-02, Department of Defense Dictionary of Military and Associated Terms sets forth standard US military and associated terminology to encompass the joint activity of the Armed Forces of the United States. These military and associated terms, together with their definitions, constitute approved Department of Defense (DOD) terminology for general use by all DOD components

    Real-Time Monitoring and Prediction of Airspace Safety

    Get PDF
    The U.S. National Airspace System (NAS) has reached an extremely high level of safety in recent years. However, it will only become more difficult to maintain the current level of safety with the forecasted increase in operations, and so the FAA has been making revolutionary changes to the NAS to both expand capacity and ensure safety. Our work complements these efforts by developing a novel model-based framework for real-time monitoring and prediction of the safety of the NAS. Our framework is divided into two parts: (offline) safety analysis and modeling part, and a real-time (online) monitoring and prediction of safety. The goal of the safety analysis task is to identify hazards to flight (distilled from several national databases) and to codify these hazards within our framework such that we can monitor and predict them. From these we define safety metrics that can be monitored and predicted using dynamic models of airspace operations, aircraft, and weather, along with a rigorous, mathematical treatment of uncertainty. We demonstrate our overall approach and highlight the advantages of this approach over the current state-of-the-art through simulated scenarios

    Fit to fight or unfit for the purpose? : a review of the effectiveness of the Intelligence Cycle in UK counter-terrorism, 2003-2013

    Get PDF
    The Intelligence process has increasingly found itself in the public eye in modern times. The Al Qa’eda attacks against the USA in September 2001 led to a rapid spread of other international terrorist attacks. The invasion of Afghanistan occurred soon afterwards, followed by the invasion of Iraq in 2003. All of this resulted in the Intelligence community and their processes being pushed into the spotlight of the global media. Central to all Intelligence work is the Intelligence cycle, in whatever form it might take. This thesis investigates the effectiveness of the UK’s 6-stage Intelligence cycle in counter-terrorism work. Definitions of two key terms, Intelligence and terrorism are dissected at length, and the merits and shortcomings are outlined. Accusations of Intelligence failure have been levelled at both the UK government and at the country’s law enforcement, Intelligence and security agencies. Intelligence gaps and Intelligence failures will be described, and the differences between these key terms highlighted. All counter-terrorism work in the UK takes place within the environment of the government’s counter-terror strategy called CONTEST. The six pillars of the strategy are explained, and examples are used to show where Intelligence fits into it. Two UK-based case studies (Operation CREVICE and Operation RHYME) are used to highlight how Intelligence is used to protect the public from terrorist attacks. A thorough examination of the Intelligence cycle is conducted and some of the common difficulties and challenges encountered in the cycle are presented. It shows what can, and sometimes does, go wrong in the Intelligence cycle, and why this happens. Various models of the Intelligence cycle are compared and their intrinsic components discussed. The thesis benefits from a unique collection of personal insights from a number of serving and retired Intelligence specialist, all with personal experience of working in counter-terrorism. This adds valuable material to the considerations of the strengths and weaknesses of the model. The conclusion provides some recommendations for the enhancement and strengthening of the Intelligence cycle, resulting in a more robust and applicable model for the UK’s counter-terrorism work
    • …
    corecore