205 research outputs found

    Assessment of crisis readiness to move a patient from the airport with suspected Ebola

    Get PDF
    The aim of this article is to verify the readiness of patient transport from the airport with symptoms for Ebola disease by the rescue services of the Integrated Rescue System of the Czech Republic. Detection of possible risks and causes of risks during patient transport. In one part of the article, the part is devoted to the current legislation regulating the cooperation of IRS, economic measures for crisis situations, functions of state material reserves management, material security of selected IRS components and the work of BIOHAZARD TEAM. The main part of the article describes the course of the extraordinary event. There is a chapter devoted to the analysis and evaluation of risks during transport. It also deals with the issues of transport, risks and problems that may be encountered by the intervening members of the IRS units. In conclusion, the proposed measures to help minimize risks in the transport of infected patient

    Females prefer extra-pair males that are older and better hunters

    Get PDF
    Age of male is an important cue in mate selection, including extra-pair copulations; different phenotypic and behavioural traits are known to be age related. Paternity studies show that older males predominate as fathers of extra-pair young. It remains unclear if females actively choose older males because they possess high quality traits or because older males are more successful in coercing fertile females. We experimentally provided mounted males of different age (yearling vs. adult) of great grey shrike Lanius excubitor with nuptial gifts of different quality (vole vs. cricket) and observed reactions of females and their social partners. Females strongly preferred older males with energy-rich nuptial gifts. The reactions of females’ social partner to the extra-pair male did not differ significantly amongst experimental groups. However, males responded to the reaction of their mates and male aggressive behaviour increased when their mate showed an interest in an intruder

    Comparison of the intrusion detection system rules in relation with the SCADA systems

    Get PDF
    Increased interconnectivity, interoperability and complexity of communication in Supervisory Control and Data Acquisition (further only SCADA) systems, resulted in increasing efficiency of industrial processes. However, the recently isolated SCADA systems are considered as the targets of considerable number of cyber-attacks. Because of this, the SCADA cyber-security is under constant pressure. In this article we examine suitability of current state signature based Intrusion Detection System (further only IDS) in SCADA systems. Therefore, we deeply evaluate the Snort and the Quickdraw rules based on signatures in order to specify their relations to SCADA cyber security. We report the results of the study comprising more than two hundred rules. © Springer International Publishing Switzerland 2016

    Comparative Analysis of Fatal Work Injuries and Fatal Traffic Accidents in the Czech Republic and Slovakia in 2017 and its Use in Risk Prevention

    Get PDF
    Zajištění bezpečnosti a ochrany zdraví při práci (BOZP) je upraveno řadou právních předpisů, které se poměrně často aktualizují, a je nezbytné sledovat jejich vývoj. Základním kamenem pro správné a funkční zajištění BOZP je analýza rizik na konkrétním pracovišti (činnosti). Cílem tohoto článku je komparační analýza nejaktuálnějších smrtelných pracovních úrazů a smrtelných dopravních nehod, které se staly na území ČR a SR v roce 2017. Tato analýza může pomoci zaměstnavateli případně odborně způsobilé osobě v prevenci rizik (OZO) správně odhadnou riziko řízení motorového vozidla. Analýza rizik byla vyhotovena pomocí FMEA analýzy.Health and safety at work (OSH) is governed by a number of laws that are relatively frequently updated and it is necessary to monitor their progression. A cornerstone for right and functional occupational health and safety is risk analysis at a particular workplace (activity). The aim of this article is a comparative analysis of the most recent fatal injuries and fatal traffi c accidents that occurred in the Czech Republic and Slovakia in 2017. This analysis can help an employer or a competent person in risk prevention (OZO) to correctly assess the risk of driving. Risk analysis was conducted using FMEA analysis

    Fuzzy logic as support for security and safety solution in soft targets

    Get PDF
    Security and safety situations in objects, which are categorized as soft targets, is difficult. The current solving is based on several different type of solving. Soft targets are specific objects, and it requires special software solution. The proposal is based on fuzzy logic. Fuzzy logic could apply more expert's knowledges and it could help owners and managers with adequate responses in critical situation, and also definition of adequate preventive actions. System solving could help effectivity of proposed measures. The decision making is based on this fuzzy logic support and aim is explained in paper.European Regional Development Fund under the project CEBIA-Tech Instrumentation [CZ.1.05/2.1.00/19.0376]; Internal Grant Agency of Tomas Bata University [IGA/FAI (CEBIA)/2016/12]; Ministry of the Interior of the Czech Republic [VI20152019049

    Failures in a Critical Infrastructure System

    Get PDF
    The purpose of this chapter is to provide a comprehensive overview of a critical infrastructure system, of failures and impacts that occur within it and of the resilience, which effectively reduces the risk of these impacts spreading on to dependent subsystems. The chapter presents a basic description of a critical infrastructure system and of the hierarchic arrangement of its subsystems and linkages between them. Critical infrastructure system failures, including their causes and impacts on dependent subsystems and on society as a whole, are presented in the following section. Particular focus is given to the propagation of impacts in a critical infrastructure system and the current approaches to their modeling. The chapter concludes by expounding on the resilience of critical infrastructure subsystems and its impact on the minimization of failures in critical infrastructure subsystems in circumstances involving emergencies

    Information Support of Crisis Management

    Get PDF
    The increasing importance of information has begun the process of interrelated changes of the whole society in today’s world. The rapid development of information and communication technologies occurs also in the problematic of crisis management. Since we live in a dynamic world, it is important to be ready to the changes that life brings, responding and adopting new technologies. One of them is crisis management information system. Information system is a tool for information support. Information systems in general are very important and indispensable part of planning, organizing, managing and controlling. This definitely applies to crisis management information system. They are therefore used in the planning of emergency measures as well as in crisis situations. Crisis management is an activity, which can help us to save life, health and property in the whole world

    Hospital Energy Resilience

    Get PDF
    Many emergencies and crises threaten the whole world. These affect not only the lives, health, and property of citizens but also the subjects and elements of the critical infrastructure itself. Breaking the critical infrastructure system would have a severe impact on the state’s security, securing the basic living needs of the population, the health of the people, or the economy of the country. One of the significant sectors of the critical infrastructure is undoubtedly healthcare. It is vital for the health service to be able to perform its function, even in times of crisis. The crisis of naturogenic character ordinarily has the so-called cascade effect, which causes other extraordinary events and crises. An example of this may be windstorm, resulting in a power outage. A significant impact of the power supply outage in healthcare is observed in hospitals. There is currently no assessment tool to set the hospital’s readiness for a power outage. The aim of the chapter is to analyze the current state of the crisis preparedness of the hospital

    A new Approach to Identification of Critical Elements in Railway Infrastructure

    Get PDF
    The paper contains a presentation of new approaches to solving the problem of identifying critical infrastructure elements in the railway sub-sector. The research objective was to analyse the procedures which are used to identify the potential elements of critical infrastructure in the transportation sector. Specific attention is paid to criteria of methods developed in Germany, the Czech Republic and Slovakia. The objective of the work is based on the analysis of the current state of art. The research also attempted to design an effective methodology which allows assessing the significance of rail infrastructure elements. The developed methodology should help to set a group of potential elements of critical infrastructure in the railway sub-sector. © 2017 The Authors.Grant Agency of Slovak Republic [1/0240/15]; Ministry of the Interior of the Czech Republic, project "RESILIENCE - Dynamic Resilience Evaluation of Interrelated Critical Infrastructure Subsystems

    The proposal of security and safety management system with fuzzy logic support

    Get PDF
    This paper presents the implementation of the fuzzy logic into the security and safety solution in the soft targets. The primary structure of safety and security tool is described in the first part. This tool has been implemented into specific object; for example, for object without security and safety solution (soft targets). In the next part, the primary rules for the use of fuzzy logic are defined. The aim of this paper is to define the primary layout for software which could help operators with decision-making process. The article also proposes and describes the solution for system application of security requirements by understanding the soft targets threats. The system solution is different for each organization and object; however, the main structure is the same
    corecore