7,143 research outputs found

    Agent-based techniques for National Infrastructure Simulation

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Civil and Environmental Engineering, 2002.Includes bibliographical references (leaves 35-37).Modern society is dependent upon its networks of infrastructure. These networks have grown in size and complexity to become interdependent, creating within them hidden vulnerabilities. The critical nature of these infrastructures has led to the establishment of the National Infrastructure Simulation and Analysis Center (NISAC) by the United States Government. The goal of NISAC is to provide the simulation capability to understand infrastructure interdependencies, detect vulnerabilities, and provide infrastructure planning and crises response assistance. This thesis examines recent techniques for simulation and analyzes their suitability for the national infrastructure simulation problem. Variable and agent-based simulation models are described and compared. The bottom-up approach of the agent-based model is found to be more suitable than the top-down approach of the variable-based model. Supercomputer and distributed, or grid computing solutions are explored. Both are found to be valid solutions and have complimentary strengths. Software architectures for implementation such as the traditional object-oriented approach and the web service model are examined. Solutions to meet NISAC objectives using the agent-based simulation model implemented with web services and a combination of hardware configurations are proposed.by Kenny Lin.S.M

    Unmanned systems interoperability standards

    Get PDF
    Over the past several years, there has been rapid growth in the development and employment of unmanned systems in military and civilian endeavors. Some military organizations have expressed concern that these systems are being fielded without sufficient capabilities to interoperate with existing systems. Despite recognition of this requirement, interoperability efforts remain diverse and disjointed across the United States and internationally. The Naval Postgraduate School (NPS), Monterey, California, was sponsored by the U.S. Office of the Secretary of Defense (OSD) Joint Ground Robotics Enterprise (JGRE) in Fiscal Year 2016 (FY16) to explore (1) enhancement of robotics education; (2) improved representation of robotic systems in combat simulations; and (3) interoperability standards for military robotics systems. This report discusses work performed in FY16 to identify current and emerging interoperability standards for unmanned systems, including interactions of robotic systems with command and control (C2) and simulation systems. The investigation included assessment of the applicability of standardization activities in the Simulation Interoperability Standards Organization (SISO) in its development of the Phase 1 Coalition Battle Management Language (C-BML) and currently in-progress Command and Control Systems - Simulation Systems Interoperation (C2SIM) standardization efforts. The report provides a recommended approach, standards, activities, and timetable for a cross-system communications roadmap.Secretary of Defense Joint Ground Robotics Enterprise, 3090 Defense Pentagon, Room 5C756, Washington, DC 20301Office of the Secretary of Defense Joint Ground Robotics Enterprise.Approved for public release; distribution is unlimited

    Modeling forward base camps as complex adaptive sociotechnical systems

    Get PDF
    Work for this thesis focuses on managing complexity within complex adaptive sociotechnical systems by using model based systems engineering and virtual engineering tools. The hypothesis of the work is that integrated virtual models can be used to increase the understanding of these complex adaptive sociotechnical systems, resulting in a reduction in the perceived complexity. This was tested by the use of a two factor survey given to experts of a system (the customer and members of the model design team) and to a target user-group. This group received a demonstration and had hands on experience with a preliminary model of the same system. Results of the survey show that new system designers using an integrated virtual modeling tool view the system as less complex than experts involved with designing the same system without using a tool. Further data is required to support this conclusion, and a plan for gathering more data is described. The application of this method to an emergency response system is then discussed to show how it can be applied to other complex sociotechnical systems and guidelines for applying this methodology are proposed

    Importance and significance of information sharing in terrorism field

    Get PDF
    Years after the 11th Sept 2001 have led in researchers to re-structure intelligence and counter terrorism in technology information to overcome problems and issues related to terrorism. This work provides an updated research of Information and Communication technology (ICT) related to re-structuring of intelligence and counter-terrorism. For this purpose, the objectives of this work is to conduct a survey on the conceptual view of the researchers who developed tools for electronic information sharing employed in intelligence and counterterrorism and summary of their works in this emerging field. The work discusses the different visions and views of information sharing, critical infrastructure, tools and key resources discussed by the researchers. It also shows some of the experiences in countries considered as international reference on the subject, including some information-sharing issues. In addition, the work carries out a review of current tools, software applications and modelling techniques around anti-terrorism in accordance with their functionality in information sharing tools. The work emphasises on identifying the various counter terrorism related works that have direct relevance to information transportation researches and advocating security informatics studies that are closely integrated with transportation research and information technologies related to the recommendations of the 9/11 commission report in 2004. The importance of this study is that it gives a unified view of the existing approaches of electronic information sharing in order to help developing tools used in intelligence and counter terrorism for future coordination and collaboration in national security applications

    Evolving technologies for disaster management in U.S. Cities

    Get PDF
    Thesis (M.C.P.)--Massachusetts Institute of Technology, Dept. of Urban Studies and Planning, 2011.Cataloged from PDF version of thesis.Includes bibliographical references (p. 63-65).The rapid development of modem technology has increased access to and reliance on sophisticated communication and real time technology. These technologies, which have become embedded within everyday life, have significant implications for government agencies - particularly within the field of disaster management. This paper draws on the evolution of disaster research, the history of disaster management in the US, literature on emerging uses of social media technology, and interviews from 24 emergency management offices in the US to examine three questions: 1) What types of technology are cities currently using in disaster management, 2) Which factors are most influential in determining how cities select emergency management technology, and 3) How can future technology development better address the needs of emergency managers? Several conclusions and observations emerged from analysis of the current literature and interview data. First, technology is primarily used by city disaster management agencies in the preparedness and response phrases of the disaster cycle. These technologies can be grouped into communications, data management, and simulation technologies. Cities are already operating on web-based platforms and are, in many cases, tentatively experimenting with the use of social media as a one-way broadcasting system rather than a bi-directional platform to gather information from the general public. Second, while various factors impact technology adoption, funding, the support of a political champion, and legal concerns stand out in particular. In addition to these adoption factors, cities are also currently facing a number of challenges including general interoperability, changing government-public relations, and increasingly mobile populations. Future technology needs must work to address these issues through the development and adoption of open standards, strengthening data integration capacities. Cities much also better leverage both existing and new forms of communication to build the level of trust needed to both reduce vulnerability and increase resilience.by Vanessa Mei-Yee Ng.M.C.P

    Globalization and Maritime Security Conference Report

    Get PDF
    Portions of this work performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under Contract DE-AC52-07NA27344, LLNL-AR-409177.LLNL-AR-409177DE-AC52-07NA2734

    Risk assessment methodologies for Critical Infrastructure Protection. Part I: A state of the art

    Get PDF
    Effective risk assessment methodologies are the cornerstone of a successful Critical Infrastructure Protection program. The extensive number of risk assessment methodologies for critical infrastructures clearly supports this argument. Risk assessment is indispensable in order to identify threats, assess vulnerabilities and evaluate the impact on assets, infrastructures or systems taking into account the probability of the occurrence of these threats. This is a critical element that differentiates a risk assessment from a typical impact assessment methodologyJRC.G.6-Security technology assessmen

    Infastructure Interdependencies Modeling and Analysis - A Review and Synthesis

    Get PDF
    The events of 9/11 and the occurrence of major natural disasters in recent years has resulted in increased awareness and renewed desire to protect critical infrastructure that are the pillars to maintaining what has become normal life in our economy. The problem has been compounded because the increased connectedness between the various sectors of the economy has resulted in interdependencies that allow for problems and issues with one infrastructure to affect other infrastructures. This area is now being investigated extensively after the Department of Homeland Security (DHS) prioritized this issue. There is now a vast extant of literature in the area of infrastructure interdependencies and the modeling of it. This paper presents a synthesis and survey of the literature in the area of infrastructure interdependency modeling methods and proposes a framework for classification of these studies. The framework classifies infrastructure interdependency modeling and analysis methods into four quadrants in terms of system complexities and risks. The directions of future research are also discussed in this paper
    • …
    corecore