104,522 research outputs found

    Vulnerability reduction of infrastructure reconstruction projects

    Get PDF
    Various infrastructure segments of numerous countries have been repeatedly subjected to natural and man-made disasters. The potential reason of damaging infrastructure facilities and their services is resultant disaster risks due to natural or man-made hazards connect with vulnerable infrastructure facilities and vulnerable communities. The simplest way to prevent or mitigate disaster losses is addressing vulnerabilities. The main study based on which this paper was compiled aimed at exploring and investigating the vulnerabilities of infrastructures and communities benefited from infrastructures and possible solutions to overcome them. This paper presents the literature review conducted on vulnerabilities of infrastructures and empirical evidence collated on best possible DRR strategies to overcome such vulnerabilities of infrastructures. The main study was conducted using case study strategy and the expert interviews. This paper is entirely based on the data collated from the expert interviews conducted in Sri Lanka and United Kingdom. The expert interviews discovered various DRR strategies to overcome the vulnerabilities of the infrastructure project

    The Yarmouk tributary to the Jordan river II: Infrastructure impeding the transformation of equitable transboundary water arrangements

    Get PDF
    This article explores the ways in which key components of infrastructure built on the Yarmouk tributary to the Jordan River induce or impede the transformation of existing transboundary water arrangements. Focussing on the Jordanian-Israeli Adassiyeh Weir and on the Jordanian-Syrian Wehdeh Dam, the article interprets archival documents, official river-gauging data, and interviews through a frame that highlights depoliticisation by hydrocracies within the politics of international infrastructure. The weir is found to be operated in a manner that prioritises Jordan's commitment to Israel when flows are low, and to be designed to bound the volume that Jordan can make use of during low or very high flows. The dam appears oversized but regulates the flow to the downstream weir when its reservoir does not lie empty. The design and operation of the infrastructure is found to partially and selectively depoliticise contentious transboundary water issues in a manner that privileges the more powerful actors. Transformation of the arrangements is impeded as the distribution and use of the flows is not questioned by the water authorities or the international diplomatic community, and alternative arrangements are not considered

    Modelling interdependencies between the electricity and information infrastructures

    Full text link
    The aim of this paper is to provide qualitative models characterizing interdependencies related failures of two critical infrastructures: the electricity infrastructure and the associated information infrastructure. The interdependencies of these two infrastructures are increasing due to a growing connection of the power grid networks to the global information infrastructure, as a consequence of market deregulation and opening. These interdependencies increase the risk of failures. We focus on cascading, escalating and common-cause failures, which correspond to the main causes of failures due to interdependencies. We address failures in the electricity infrastructure, in combination with accidental failures in the information infrastructure, then we show briefly how malicious attacks in the information infrastructure can be addressed

    Rethinking mobility at the urban-transportation-geography nexus

    Get PDF
    Building on the main sections of the book, this concluding chapter identifies four thematic areas for future research into the urban-transportation-geography nexus as follows: (1) the everyday experience of transport and mobility in the “ordinary city”; (2) the environment and the urban politics of mobility; (3) connected cities and competitive states; and (4) transportation mobility and new imaginaries of city-regional development

    A Survey on IT-Techniques for a Dynamic Emergency Management in Large Infrastructures

    Get PDF
    This deliverable is a survey on the IT techniques that are relevant to the three use cases of the project EMILI. It describes the state-of-the-art in four complementary IT areas: Data cleansing, supervisory control and data acquisition, wireless sensor networks and complex event processing. Even though the deliverable’s authors have tried to avoid a too technical language and have tried to explain every concept referred to, the deliverable might seem rather technical to readers so far little familiar with the techniques it describes

    Improving SIEM for critical SCADA water infrastructures using machine learning

    Get PDF
    Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems. Supervisory control and data acquisition (SCADA) systems are used in industrial, infrastructure and facility processes (e.g. manufacturing, fabrication, oil and water pipelines, building ventilation, etc.) Like other Internet of Things (IoT) implementations, SCADA systems are vulnerable to cyber-attacks, therefore, a robust anomaly detection is a major requirement. However, having an accurate anomaly detection system is not an easy task, due to the difficulty to differentiate between cyber-attacks and system internal failures (e.g. hardware failures). In this paper, we present a model that detects anomaly events in a water system controlled by SCADA. Six Machine Learning techniques have been used in building and evaluating the model. The model classifies different anomaly events including hardware failures (e.g. sensor failures), sabotage and cyber-attacks (e.g. DoS and Spoofing). Unlike other detection systems, our proposed work helps in accelerating the mitigation process by notifying the operator with additional information when an anomaly occurs. This additional information includes the probability and confidence level of event(s) occurring. The model is trained and tested using a real-world dataset
    corecore