20,544 research outputs found

    Building Information Modeling as Tool for Enhancing Disaster Resilience of the Construction Industry

    Get PDF
    As frequencies of the disasters are increasing, new technologies can be used to enhance disaster resilience performance of the construction industry. This paper investigates the usage of BIM (Building Information Modeling) in enhancing disaster resilience of the construction industry and in the establishment of the resilient built environment. In-depth literature review findings reveal BIM’s contribution to the disaster resilience in the pre-disaster and post-disaster phases especially through influencing the performance of the supply chain, construction process, and rescue operations. This paper emphasises the need for BIM’s integration to the education and training curriculums of the built environment professionals. Policy makers, construction professionals, professional bodies, academics can benefit from this research

    Training of Crisis Mappers and Map Production from Multi-sensor Data: Vernazza Case Study (Cinque Terre National Park, Italy)

    Get PDF
    This aim of paper is to presents the development of a multidisciplinary project carried out by the cooperation between Politecnico di Torino and ITHACA (Information Technology for Humanitarian Assistance, Cooperation and Action). The goal of the project was the training in geospatial data acquiring and processing for students attending Architecture and Engineering Courses, in order to start up a team of "volunteer mappers". Indeed, the project is aimed to document the environmental and built heritage subject to disaster; the purpose is to improve the capabilities of the actors involved in the activities connected in geospatial data collection, integration and sharing. The proposed area for testing the training activities is the Cinque Terre National Park, registered in the World Heritage List since 1997. The area was affected by flood on the 25th of October 2011. According to other international experiences, the group is expected to be active after emergencies in order to upgrade maps, using data acquired by typical geomatic methods and techniques such as terrestrial and aerial Lidar, close-range and aerial photogrammetry, topographic and GNSS instruments etc.; or by non conventional systems and instruments such us UAV, mobile mapping etc. The ultimate goal is to implement a WebGIS platform to share all the data collected with local authorities and the Civil Protectio

    INTEROPERABILITY FOR MODELING AND SIMULATION IN MARITIME EXTENDED FRAMEWORK

    Get PDF
    This thesis reports on the most relevant researches performed during the years of the Ph.D. at the Genova University and within the Simulation Team. The researches have been performed according to M&S well known recognized standards. The studies performed on interoperable simulation cover all the environments of the Extended Maritime Framework, namely Sea Surface, Underwater, Air, Coast & Land, Space and Cyber Space. The applications cover both the civil and defence domain. The aim is to demonstrate the potential of M&S applications for the Extended Maritime Framework, applied to innovative unmanned vehicles as well as to traditional assets, human personnel included. A variety of techniques and methodology have been fruitfully applied in the researches, ranging from interoperable simulation, discrete event simulation, stochastic simulation, artificial intelligence, decision support system and even human behaviour modelling

    Conceptualising and prototyping a decision support system for safer urban unmanned aerial vehicle operations

    Get PDF
    Currently, there is limited discourse surrounding the safe operational planning of UAVs within complex multi-stakeholder urban environments. This paper conceptualises a methodology for prototyping a decision support system for urban UAV flight operations planning. The proposition is based on integrating urban 3-dimensional data with the physical factors of UAV flight operations. A simulated, holistic understanding of UAV usage in urban space emerges, enabling better informed decisions by planners around safe flight operations. The feasibility, applicability and benefits of the decision support system and associated policy implications for urban planners and UAV users are discussed scoping further development of this approach

    Improving the resilience of post-disaster water distribution systems using a dynamic optimization framework

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Improving the resilience of water distribution systems (WDSs) to handle natural disasters (e.g., earthquakes) is a critical step towards sustainable urban water management. This requires the water utility to be able to respond quickly to such disaster events and in an organized manner, to prioritize the use of available resources to restore service rapidly whilst minimizing the negative impacts. Many methods have been developed to evaluate the WDS resilience, but few efforts are made so far to improve resilience of a post-disaster WDS through identifying optimal sequencing of recovery actions. To address this gap, a new dynamic optimization framework is proposed here where the resilience of a post-disaster WDS is evaluated using six different metrics. A tailored Genetic Algorithm is developed to solve the complex optimization problem driven by these metrics. The proposed framework is demonstrated using a real-world WDS with 6,064 pipes. Results obtained show that the proposed framework successfully identifies near-optimal sequencing of recovery actions for this complex WDS. The gained insights, conditional on the specific attributes of the case study, include: (i) the near-optimal sequencing of recovery strategy heavily depends on the damage properties of the WDS, (ii) replacements of damaged elements tend to be scheduled at the intermediate-late stages of the recovery process due to their long operation time, and (iii) interventions to damaged pipe elements near critical facilities (e.g., hospitals) should not be necessarily the first priority to recover due to complex hydraulic interactions within the WDS

    Guide to Australia’s national security capability

    Get PDF
    This paper provides a single consolidated picture of the capabilities that enable Australia to achieve national security outcomes in a range of environments, including domestically, at the border, offshore and in cyberspace. Introduction The period since 2001 has been transformative for Australia’s national security and our national security challenges continue to evolve. To meet these challenges, we need new ways to coordinate and develop our capability and to shape the national security environment. Significant advances have been made in recent years to build greater collaboration and interoperability across the national security community. However, the increasing complexity of national security threats requires an even more consistent and connected approach to capability planning that complements existing individual agency arrangements. To that end, the Government has developed a security classified National Security Capability Plan to provide a single consolidated picture of the capabilities that enable Australia to achieve national security outcomes. This Guide offers an overview of Australia’s national security capability planning. It identifies the functions performed by the national security community and how these achieve the objectives outlined in the National Security Strategy (2013). Capability planning is one of the tools that support Government to better consider how capabilities can be directed to meet national security objectives. This ensures that capability investment is focussed and that Government can give appropriate consideration to redirecting existing capabilities to meet new or emerging risks and opportunities. It also highlights areas where agencies’ capabilities are interdependent, identifying focus areas for collaboration and interoperability. Having a better understanding of our capabilities will help us to make more informed decisions about what we need. Australia’s national security arrangements are underpinned by a number of agencies working across areas such as diplomacy, defence, development, border protection, law enforcement and intelligence. Australia’s national security agencies include: Attorney-General’s Department (AGD) Australian Agency for International Development (AusAID) Australian Crime Commission (ACC) Australian Customs and Border Protection Service (ACBPS) Australian Federal Police (AFP) Australian Security Intelligence Organisation (ASIO) Australian Secret Intelligence Service (ASIS) Australian Geospatial-Intelligence Organisation (AGO) Australian Signals Directorate (ASD) Department of Agriculture, Fisheries and Forestry (DAFF) Department of Defence (Defence) Department of Foreign Affairs and Trade (DFAT) Department of Health and Ageing (DoHA) Department of Immigration and Citizenship (DIAC) Department of Infrastructure and Transport (DIT) Department of the Prime Minister and Cabinet (PM&C) Office of National Assessments (ONA). The Capability Plan brings together, for the first time, a single view of the capabilities maintained by these agencies with the exception of Defence capabilities. Defence has a separate established capability planning process that includes the Defence White Paper (2013) and Defence Capability Plan (2012). Defence is a key contributor to Australia’s national security arrangements including leading the coordination and delivery of national security science and technology and works in close cooperation with other national security agencies. Defence capabilities will continue to be managed through existing mechanisms, principally the Defence Capability Plan. For the first time, the Capability Plan, and the accompanying Guide to Australia’s National Security Capability, presents a unified picture of the capabilities that exist across non-Defence national security agencies. Together with other strategic planning tools, this work informs the broader national security planning cycle and supports the objectives and implementation of overarching policy documents such as the National Security Strategy and the Australia in the Asian Century White Paper. The Capability Plan complements the Defence Capability Plan and does not seek to duplicate it. It should also be noted that the Guide has not been designed to signal specific initiatives or tender opportunities. Such processes will continue to be managed by individual agencies

    Critical Infrastructure Protection Approaches: Analytical Outlook on Capacity Responsiveness to Dynamic Trends

    Get PDF
    Overview: Critical infrastructures (CIs) – any asset with a functionality that is critical to normal societal functions, safety, security, economic or social wellbeing of people, and disruption or destruction of which would have a very significant negative societal impact. CIs are clearly central to the normal functioning of a nation’s economy and require to be protected from both intentional and unintentional sabotages. It is important to correctly discern and aptly manage security risks within CI domains. The protection (security) of CIs and their networks can provide clear benefits to owner organizations and nations including: enabling the attainment of a properly functioning social environment and economic market, improving service security, enabling integration to external markets, and enabling service recipients (consumers, clients, and users) to benefit from new and emerging technological developments. To effectively secure CI system, firstly, it is crucial to understand three things - what can happen, how likely it is to happen, and the consequences of such happenings. One way to achieve this is through modelling and simulations of CI attributes, functionalities, operations, and behaviours to support security analysis perspectives, and especially considering the dynamics in trends and technological adoptions. Despite the availability of several security-related CI modelling approaches (tools and techniques), trends such as inter-networking, internet and IoT integrations raise new issues. Part of the issues relate to how to effectively (more precisely and realistically) model the complex behavior of interconnected CIs and their protection as system of systems (SoS). This report attempts to address the broad goal around this issue by reviewing a sample of critical infrastructure protection approaches; comprising tools, techniques, and frameworks (methodologies). The analysis covers contexts relating to the types of critical infrastructures, applicable modelling techniques, risk management scope covered, considerations for resilience, interdependency, and policy and regulations factors. Key Findings: This research presents the following key findings: 1. There is not a single specific Critical Infrastructure Protection (CIP) approach – tool, technique, methodology or framework – that exists or emerges as a ‘fit-for-all’; to allow the modelling and simulation of cyber security risks, resilience, dependency, and impact attributes in all critical infrastructure set-ups. 2. Typically, two or more modelling techniques can be (need to be) merged to cover a broader scope and context of modelling and simulation applications (areas) to achieve desirable highlevel protection and security for critical infrastructures. 3. Empirical-based, network-based, agent-based, and system dynamics-based modelling techniques are more widely used, and all offer gains for their use. 4. The deciding factors for choosing modelling techniques often rest on; complexity of use, popularity of approach, types and objectives of user Organisation and sector. 5. The scope of modelling functions and operations also help to strike the balance between ‘specificity’ and ‘generality’ of modelling technique and approach for the gains of in-depth analysis and wider coverage respectively. 6. Interdependency and resilience modelling and simulations in critical infrastructure operations, as well as associated security and safety risks; are crucial characteristics that need to be considered and explored in revising existing or developing new CIP modelling approaches. Recommendations: Key recommendations from this research include: 1. Other critical infrastructure sectors such as emergency services, food & agriculture, and dams; need to draw lessons from the energy and transportation sectors for the successive benefits of: i. Amplifying the drive and efforts towards evaluating and understanding security risks to their infrastructure and operations. ii. Support better understanding of any associated dependencies and cascading impacts. iii. Learning how to establish effective security and resilience. iv. Support the decision-making process linked with measuring the effectiveness of preparedness activities and investments. v. Improve the behavioural security-related responses of CI to disturbances or disruptions. 2. Security-related critical infrastructure modelling approaches should be developed or revised to include wider scopes of security risk management – from identification to effectiveness evaluations, to support: i. Appropriate alignment and responsiveness to the dynamic trends introduced by new technologies such as IoT and IIoT. ii. Dynamic security risk management – especially the assessment section needs to be more dynamic than static, to address the recurrent and impactful risks that emerge in critical infrastructures

    Part 1: Executive summary

    Get PDF
    A workshop was convened by the FAA and NASA for the purpose of providing a forum at which leading designers, manufacturers, and users of helicopter simulators could initiate and participate in a development process that would facilitate the formulation of qualification standards by the regulatory agency. Formal papers were presented, special topics were discussed in breakout sessions, and a draft FAA advisory circular defining specifications for helicopter simulators was presented and discussed. A working group of volunteers was formed to work with the National Simulator Program Office to develop a final version of the circular. The workshop attracted 90 individuals from a constituency of simulator manufacturers, training organizations, the military, civil regulators, research scientists, and five foreign countries. A great amount of information was generated and recorded verbatim. This information is presented herein within the limits of accuracy inherent in recording, transcribing, and editing spoken technical material
    corecore