3,026 research outputs found

    TRAVISIONS 2022

    Get PDF

    ECHO Information sharing models

    Get PDF
    As part of the ECHO project, the Early Warning System (EWS) is one of four technologies under development. The E-EWS will provide the capability to share information to provide up to date information to all constituents involved in the E-EWS. The development of the E-EWS will be rooted in a comprehensive review of information sharing and trust models from within the cyber domain as well as models from other domains

    Estimating the efficacy of mass rescue operations in ocean areas with vehicle routing models and heuristics

    Get PDF
    Tese de doutoramento, Estatística e Investigação Operacional (Optimização), Universidade de Lisboa, Faculdade de Ciências, 2018Mass rescue operations (MRO) in maritime areas, particularly in ocean areas, are a major concern for the authorities responsible for conducting search and rescue (SAR) activities. A mass rescue operation can be defined as a search and rescue activity characterized by the need for immediate assistance to a large number of persons in distress, such that the capabilities normally available to search and rescue are inadequate. In this dissertation we deal with a mass rescue operation within ocean areas and we consider the problem of rescuing a set of survivors following a maritime incident (cruise ship, oil platform, ditched airplane) that are drifting in time. The recovery of survivors is performed by nearby ships and helicopters. We also consider the possibility of ships capable of refuelling helicopters while hovering which can extend the range to which survivors can be rescued. A linear binary integer formulation is presented along with an application that allows users to build instances of the problem. The formulation considers a discretization of time within a certain time step in order to assess the possibility of travelling along different locations. The problem considered in this work can be perceived as an extension of the generalized vehicle routing problem (GVRP) with a profit stance since we may not be able to recover all of the survivors. We also present a look ahead approach, based on the pilot method, to the problem along with some optimal results using state of the art Mixed-integer linear programming solvers. Finally, the efficacy of the solution from the GVRP is estimated for a set of scenarios that combine incident severity, location, traffic density for nearby ships and SAR assets availability and location. Using traffic density maps and the estimated MRO efficacy, one can produce a combined vulnerability map to ascertain the quality of response to each scenario.Marinha Portuguesa, Plano de Atividades de Formação Nacional (PAFN

    Development of Bridge Information Model (BrIM) for digital twinning and management using TLS technology

    Get PDF
    In the current modern era of information and technology, the concept of Building Information Model (BIM), has made revolutionary changes in different aspects of engineering design, construction, and management of infrastructure assets, especially bridges. In the field of bridge engineering, Bridge Information Model (BrIM), as a specific form of BIM, includes digital twining of the physical asset associated with geometrical inspections and non-geometrical data, which has eliminated the use of traditional paper-based documentation and hand-written reports, enabling professionals and managers to operate more efficiently and effectively. However, concerns remain about the quality of the acquired inspection data and utilizing BrIM information for remedial decisions in a reliable Bridge Management System (BMS) which are still reliant on the knowledge and experience of the involved inspectors, or asset manager, and are susceptible to a certain degree of subjectivity. Therefore, this research study aims not only to introduce the valuable benefits of Terrestrial Laser Scanning (TLS) as a precise, rapid, and qualitative inspection method, but also to serve a novel sliced-based approach for bridge geometric Computer-Aided Design (CAD) model extraction using TLS-based point cloud, and to contribute to BrIM development. Moreover, this study presents a comprehensive methodology for incorporating generated BrIM in a redeveloped element-based condition assessment model while integrating a Decision Support System (DSS) to propose an innovative BMS. This methodology was further implemented in a designed software plugin and validated by a real case study on the Werrington Bridge, a cable-stayed bridge in New South Wales, Australia. The finding of this research confirms the reliability of the TLS-derived 3D model in terms of quality of acquired data and accuracy of the proposed novel slice-based method, as well as BrIM implementation, and integration of the proposed BMS into the developed BrIM. Furthermore, the results of this study showed that the proposed integrated model addresses the subjective nature of decision-making by conducting a risk assessment and utilising structured decision-making tools for priority ranking of remedial actions. The findings demonstrated acceptable agreement in utilizing the proposed BMS for priority ranking of structural elements that require more attention, as well as efficient optimisation of remedial actions to preserve bridge health and safety

    Future Transportation

    Get PDF
    Greenhouse gas (GHG) emissions associated with transportation activities account for approximately 20 percent of all carbon dioxide (co2) emissions globally, making the transportation sector a major contributor to the current global warming. This book focuses on the latest advances in technologies aiming at the sustainable future transportation of people and goods. A reduction in burning fossil fuel and technological transitions are the main approaches toward sustainable future transportation. Particular attention is given to automobile technological transitions, bike sharing systems, supply chain digitalization, and transport performance monitoring and optimization, among others

    Spring 2015 Full Issue

    Get PDF

    The use of Eye Tracking Technology in Maritime High-Speed Craft Navigation

    Get PDF
    publishedVersio

    Cyberterrorism in the Context of Contemporary International Law

    Get PDF
    The present Article addressed the legal issues surrounding cyberterrorism. In the first chapter, the author explains why cyberterrorism should be described as “the use of electronic networks taking the form of a cyber-attack to commit a) a substantive act criminalized by the existing legal instruments prohibiting terrorism, or b) an act of terrorism under international customary law.” Further, with a special emphasis on existing anti-terrorism conventions and customary international law, it was demonstrated which actors are likely to engage in acts of cyberterrorism (non-state actors, corporations and individuals), as well as which targets are protected by law and which aims are to be pursued by terrorists. The last two chapters concentrated on permissibility of individual response to cyberterrorism and applicability of this concept to jus in bello. The author noted that although generally self-defense in jus ad bellum is permitted, the controversial legal theories will have trouble adapting to the realities of cyberterrorism without international support. The author also highlights the paradoxical situation of two regimes on terrorism (archaic and conventional) coexisting during armed conflicts and its impact on cyberterrorism. Future convergence of these regimes on political level will require legal coordination of international organizations. This Article demonstrates why conventional terrorism by states should be ruled out as a viable concept in international law. at the same time the author argues in favor of the organization of the islamic conference suggestion to exclude freedom-fighters from the applicability of anti-terrorism conventions. major legal gaps identified in this article include preservation of prisoner of war privileges by conventional terrorists during wars, as well as legal discrepancy created by the conventions regime on terrorism which ensures freedom-fighters and cyber-guerillas receive less legal protection than military forces of a state despite their equal status under the additional protocol I

    Data analytics 2016: proceedings of the fifth international conference on data analytics

    Get PDF
    corecore