104,522 research outputs found
Vulnerability reduction of infrastructure reconstruction projects
Various infrastructure segments of numerous countries have been repeatedly subjected to natural and man-made disasters. The potential reason of damaging infrastructure
facilities and their services is resultant disaster risks due to natural or man-made hazards connect with vulnerable infrastructure facilities and vulnerable communities. The
simplest way to prevent or mitigate disaster losses is addressing vulnerabilities. The main study based on which this paper was compiled aimed at exploring and
investigating the vulnerabilities of infrastructures and communities benefited from infrastructures and possible solutions to overcome them. This paper presents the
literature review conducted on vulnerabilities of infrastructures and empirical evidence collated on best possible DRR strategies to overcome such vulnerabilities of
infrastructures. The main study was conducted using case study strategy and the expert interviews. This paper is entirely based on the data collated from the expert interviews conducted in Sri Lanka and United Kingdom. The expert interviews discovered various DRR strategies to overcome the vulnerabilities of the infrastructure project
The Yarmouk tributary to the Jordan river II: Infrastructure impeding the transformation of equitable transboundary water arrangements
This article explores the ways in which key components of infrastructure built on the Yarmouk tributary to the Jordan River induce or impede the transformation of existing transboundary water arrangements. Focussing on the Jordanian-Israeli Adassiyeh Weir and on the Jordanian-Syrian Wehdeh Dam, the article interprets archival documents, official river-gauging data, and interviews through a frame that highlights depoliticisation by hydrocracies within the politics of international infrastructure. The weir is found to be operated in a manner that prioritises Jordan's commitment to Israel when flows are low, and to be designed to bound the volume that Jordan can make use of during low or very high flows. The dam appears oversized but regulates the flow to the downstream weir when its reservoir does not lie empty. The design and operation of the infrastructure is found to partially and selectively depoliticise contentious transboundary water issues in a manner that privileges the more powerful actors. Transformation of the arrangements is impeded as the distribution and use of the flows is not questioned by the water authorities or the international diplomatic community, and alternative arrangements are not considered
Modelling interdependencies between the electricity and information infrastructures
The aim of this paper is to provide qualitative models characterizing
interdependencies related failures of two critical infrastructures: the
electricity infrastructure and the associated information infrastructure. The
interdependencies of these two infrastructures are increasing due to a growing
connection of the power grid networks to the global information infrastructure,
as a consequence of market deregulation and opening. These interdependencies
increase the risk of failures. We focus on cascading, escalating and
common-cause failures, which correspond to the main causes of failures due to
interdependencies. We address failures in the electricity infrastructure, in
combination with accidental failures in the information infrastructure, then we
show briefly how malicious attacks in the information infrastructure can be
addressed
Rethinking mobility at the urban-transportation-geography nexus
Building on the main sections of the book, this concluding chapter identifies four thematic areas for future research into the urban-transportation-geography nexus as follows: (1) the everyday experience of transport and mobility in the “ordinary city”; (2) the environment and the urban politics of mobility; (3) connected cities and competitive states; and (4) transportation mobility and new imaginaries of city-regional development
A Survey on IT-Techniques for a Dynamic Emergency Management in Large Infrastructures
This deliverable is a survey on the IT techniques that are relevant to the three use cases of the project EMILI. It describes the state-of-the-art in four complementary IT areas: Data cleansing, supervisory control and data acquisition, wireless sensor networks and complex event processing. Even though the deliverable’s authors have tried to avoid a too technical language and have tried to explain every concept referred to, the deliverable might seem rather technical to readers so far little familiar with the techniques it describes
Recommended from our members
Towards a methodology for the development of integrated IT infrastructures
In this paper, the authors propose and validate
a methodology for the development of integrated
Information Technology (IT) infrastructures. The
motivation for putting forward a new methodology is
grounded on the limitations of the various software
engineering methodologies (traditional) that exist
today. Despite that the traditional methodologies result
in the development of Information Systems (IS) from
scratch, Enterprise Application Integration (EAI)
builds integrated IT infrastructures using existing
applications. This significant difference is associated
with many issues needed to be realised and addressed
like: (a) the changes that such an infrastructure brings
to organisations, (b) the resistance to change and (c)
the extension of IS lifecycle’s. The proposed
methodology consist of eight stages and aims at
supporting software engineers, organisations and
researchers to build integrated IT infrastructures. As a
result the methodology seeks to contribute to the body
of knowledge
Improving SIEM for critical SCADA water infrastructures using machine learning
Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems. Supervisory control and data acquisition (SCADA) systems are used in industrial, infrastructure and facility processes (e.g. manufacturing, fabrication, oil and water pipelines, building ventilation, etc.) Like other Internet of Things (IoT) implementations, SCADA systems are vulnerable to cyber-attacks, therefore, a robust anomaly detection is a major requirement. However, having an accurate anomaly detection system is not an easy task, due to the difficulty to differentiate between cyber-attacks and system internal failures (e.g. hardware failures). In this paper, we present a model that detects anomaly events in a water system controlled by SCADA. Six Machine Learning techniques have been used in building and evaluating the model. The model classifies different anomaly events including hardware failures (e.g. sensor failures), sabotage and cyber-attacks (e.g. DoS and Spoofing). Unlike other detection systems, our proposed work helps in accelerating the mitigation process by notifying the operator with additional information when an anomaly occurs. This additional information includes the probability and confidence level of event(s) occurring. The model is trained and tested using a real-world dataset
- …