6,925 research outputs found

    Human Trafficking and Terrorism: Utilizing National Security Resources to Prevent Human Trafficking in the Islamic State

    Get PDF
    This is a report of a Master’s thesis done in behalf of the local network in Stockholm, under Fortum Distribution AB. The thesis was to conduct a review of a distribution station named Fs MyrĂ€ngen located in TĂ€by. A model was created for the 11 kV network linked to the secondary side of Fs MyrĂ€ngen. Based on this model and using symmetrical components, theoretical fault currents (short circuit and ground fault) could be calculated. The results of these fault currents are used to investigate and develop new settings for relay protection and ground equipment in the station. The results of the calculated fault currents were also used to investigate unwanted voltages that occurs for grounded parts due to earth faults. The value of these unwanted voltages was then compared to heavy current regulations developed by the Electrical Safety Authority in Sweden. Another element of the work was to create a rehabilitation plan for the structure on the 11 kV side of Fs MyrĂ€ngen, the main goal regarding the rehabilitation plan was to investigate the advantages and disadvantages that exist at a possible transition to numerical protection relays. This was done by making a market overview of the different types of numerical protection relays and compare these with the existing analog protective device in Fs MyrĂ€ngen. The study showed that protective relay settings should be revised according to the recommendations in the report, ground equipment should be replaced with a self-regulating type, transformers should be replaced due to age and capacity limitations. Regarding a switch to numerical protection relays the type REF615 from ABB was recommended, in that case the control board in the station should be replaced to a station computer. Furthermore should current transformers be replaced to recive a desired sensitivity regarding detection of ground faults. The report also showed that Fs MyrĂ€ngen meets the regulations of unwanted voltages over grounded parts in distribution stations due to earth faults.Detta Ă€r en rapport av ett examensarbete utfört i uppdrag av lokalnĂ€t Stockholm under Fortum Distribution AB. Examensarbetet gick ut pĂ„ att göra en översyn av en fördelningsstation vid namn Fs MyrĂ€ngen som Ă€r belĂ€gen i TĂ€by. En modell skapades av 11 kV nĂ€tet kopplat till Fs MyrĂ€ngen, utifrĂ„n denna modell samt med hjĂ€lp av symmetriska komponenter berĂ€knades teoretiska felströmmar bĂ„de för kortslutning och jordslutning. Resultaten av dessa felströmmar anvĂ€ndes för att utreda och ta fram instĂ€llningar pĂ„ relĂ€skydd och nollpunktsutrustning i stationen. Resultaten pĂ„ framrĂ€knade jordfelsströmmar anvĂ€ndes Ă€ven för att utreda vilken spĂ€nningssĂ€ttning som uppstĂ„r vid jordfel, i de nĂ€tstationer som matas av Fs MyrĂ€ngen. SpĂ€nningssĂ€ttningen pĂ„ nĂ€tstationerna jĂ€mfördes sedan med de starkströmsföreskrifter som Ă€r framtagna av elsĂ€kerhetsverket. Ett annat moment i arbetet var att skapa en upprustningsplan för skyddsanordningen pĂ„ 11 kV sidan i Fs MyrĂ€ngen, huvudmĂ„let för den biten var att utreda vilka fördelar och nackdelar som finns vid en eventuell övergĂ„ng till numeriska skydd. Detta gjordes genom att göra en marknadsöversikt över olika typer av numeriska relĂ€skydd, samt jĂ€mföra dessa med den befintliga skyddsanordningen i MyrĂ€ngen som Ă€r av analog typ. Studien visade att relĂ€skyddsinstĂ€llningar bör ses över enligt rekommendationer i rapporten, nollpunktsutrustningen bör bytas ut till sjĂ€lvreglerande typ, transformatorerna bör bytas ut p.g.a. Ă„lder och kapacitetsbegrĂ€nsning. GĂ€llande skyddsanordningen rekommenderas en övergĂ„ng till numeriska skydd av typen REF615, och i samband med detta byta ut den befintliga kontrolltavlan i stationen till en stationsdator. Vidare bör Ă€ven strömtransformatorer för jordfelsskydden bytas ut för att uppnĂ„ önskad kĂ€nslighet gĂ€llande detektering av jordfel. För spĂ€nningssĂ€ttning av nĂ€tstationer vid jordfel, visar resultaten att stationen uppfyller kraven enligt starkströmsföreskrifterna frĂ„n elsĂ€kerhetsverket

    Invisible Force: Information Warfare and the Future of Conflict

    Get PDF
    The year is 2030. Large swaths of the world are destabilized. Famine is rampant due to the aftermath of the long legacy of failed globalization. Citizens from poorer countries are migrating to escape famine, war, climate change, and lack of opportunity created by failed states. Wealthier countries, worried about resource scarcity, close themselves off to the refugees. Amid all of this, quantum computing has been achieved, resulting in infinitely faster processing of more information than ever before. Quantum technology and a fracturing of the global alliances enable global elite to exercise control over information - resulting in a segmented Internet. Nations are now ruled by technocratic elites, some who remain committed to individual liberty and privacy, and others who extract data as a raw material from the lives of individuals, with no restrictions on its use other than profit. By 2030, the nature of information war has changed. Combined with new, ubiquitous technology and levels of individual customization from data extraction, people don’t even realize they’re being manipulated.https://digitalcommons.usmalibrary.org/aci_books/1023/thumbnail.jp

    Global Risks 2015, 10th Edition.

    Get PDF
    The 2015 edition of the Global Risks report completes a decade of highlighting the most significant long-term risks worldwide, drawing on the perspectives of experts and global decision-makers. Over that time, analysis has moved from risk identification to thinking through risk interconnections and the potentially cascading effects that result. Taking this effort one step further, this year's report underscores potential causes as well as solutions to global risks. Not only do we set out a view on 28 global risks in the report's traditional categories (economic, environmental, societal, geopolitical and technological) but also we consider the drivers of those risks in the form of 13 trends. In addition, we have selected initiatives for addressing significant challenges, which we hope will inspire collaboration among business, government and civil society communitie

    The Millennium Development Goals And Reproductive Health: Moving Beyond the UN

    Get PDF
    One of a series of reports for the foundation on women's rights and poverty reductio

    COMPREHENSIVE DEFENSE: PSYCHOLOGICAL RESILIENCE IN MONGOLIA

    Get PDF
    Mongolia is bordered by two powerful nations that are vying for greater influence on the global stage. As a relatively smaller, democratic nation vulnerable to influence from these prominent neighbors, Mongolia faces increasing challenges in governance. One of the primary challenges is maintaining Mongolian independence, which requires national resilience and resistance in the face of external influence. Specifically, it requires psychological resilience in all sectors and all layers of society as a critical component for comprehensive defense. Mongolian national defense policies have relied on conventional military forces for decades, but those policies do not include the psychological preparation and involvement of the Mongolian population. This thesis looks to Nordic countries and Taiwan for insight. Norway, Finland, and Sweden maintain a comprehensive defense, or “total defense,” approach that systematically invests in social and psychological resilience. This thesis asks, How can Mongolia achieve similar levels of national resilience? To address this question, this research uses NATO’s comprehensive defense model as a framework to explore lines of effort Mongolia can invest in to enhance social and psychological resilience across all areas of society through education, information, and inclusion. Furthermore, the study makes recommendations on how to begin implementing programs to develop Mongolia’s psychological resilience using existing resources.Ded Huranda, Mongolian Armed ForcesApproved for public release. Distribution is unlimited

    Cyber-Grooming Young Women for Terrorist Activity: Dominant and Subjugated Explanatory Narratives

    Get PDF
    status: publishe

    Spinning our Wheels: Improving our Ability to Respond to Bullying and Cyberbullying

    Get PDF
    Bullying is physical and or psychological abuse perpetuated by one powerful child upon another, with the intention to harm or dominate. Bullying and aggression in schools has reached epidemic proportions. Abusive bullying behaviors begin in elementary school, peak during middle school, and begin to subside in high school. Bullying behaviors are associated with catastrophic violence. Cyberbullying has emerged as one result of the increasingly online social life in which modern teens and children engage. Mediation may be inappropriate. The only safety mechanism that children will ultimately retain is the one between their ears

    A Survey of the Practices and Perceptions of Students in One Catholic High School on the Use of the Internet in Relation to Safety, Cyberbullying, and Sexting

    Get PDF
    Digital technology holds a powerful and ubiquitous place in society. The Internet provides today\u27s students with unprecedented access to information. Its use in education has transformed educational paradigms, yet it also provides new challenges. While students do use the technology for schoolwork, they also use it in inappropriate ways. The Internet has provided a powerful and invasive weapon for cyberbullies and predators to prey on the vulnerable and the unsuspecting. The Pontifical Council for Social Communications (2002) affirmed that [Y]oung people need to learn how to function well in the world of cyberspace, make discerning judgments according to sound moral criteria (#7). Furthermore, John Paul II (1990a) espoused the importance of the power and potential of technology, especially for youth, and warned that technology be embraced only if the moral component drives its use. A quantitative study was performed using the Student Internet Use Survey that was developed to investigate the practices and perceptions of students in a Catholic high school on the use of the Internet. Specifically, this study examined students\u27 practices and perceptions related to general Internet usage, safety, cyberbullying, and sexting. An online survey was used to collect data from 483 students who were enrolled in a Catholic high school that employs 1-to-1technology. Survey data revealed that teens used the Internet everyday and 96% used social media. Eighty percent used privacy settings to protect their information, and nearly 8 of 10 were concerned that information posted online could negatively affect their future. The threat of cyberbullying is a realistic danger, and over three-quarters of teens reported that adults should be involved when addressing the concerns of cyberbullying. Additionally, 30% of teens engaged in sexting activities, informing the educational community that educators need to educate students about the dangers and long-term effects of sexting practices. This study provides valuable information about students in Catholic high schools regarding their perceptions and practices on the use of the Internet. By gaining knowledge and understanding of students\u27 practices and perceptions, administrators and educators will be able to create policies and design curriculum to address student and community needs
    • 

    corecore