18 research outputs found
Progress or Devastation? The Effects of Ethanol Plant Location on Local Land Use
Land Economics/Use,
Recommended from our members
Expected losses, insurability, and benefits from reducing vulnerability to attacks.
A model of malicious attacks against an infrastructure system is developed that uses a network representation of the system structure together with a Hidden Markov Model of an attack at a node of that system and a Markov Decision Process model of attacker strategy across the system as a whole. We use information systems as an illustration, but the analytic structure developed can also apply to attacks against physical facilities or other systems that provide services to customers. This structure provides an explicit mechanism to evaluate expected losses from malicious attacks, and to evaluate changes in those losses that would result from system hardening. Thus, we provide a basis for evaluating the benefits of system hardening. The model also allows investigation of the potential for the purchase of an insurance contract to cover the potential losses when safeguards are breached and the system fails
Farmacologia no século XX: a ciência dos medicamentos a partir da análise do livro de Goodman e Gilman
Mark Alan Turnquist and John F. Abel discuss the history of CEE
The University Faculty Memorial Statement for E Mark A. Turnquist is available at https://blogs.cornell.edu/deanoffaculty/files/2016/01/Mark-Turnquist-2fsugt7.pdf1_zbkzsi4
Recommended from our members
Design for resilience in infrastructure distribution networks.
Recommended from our members
The Pantex Process model: Formulations of the evaluation planning module
This paper describes formulations of the Evaluation Planning Module that have been developed since its inception. This module is one of the core algorithms in the Pantex Process Model, a computerized model to support production planning in a complex manufacturing system at the Pantex Plant, a US Department of Energy facility. Pantex is responsible for three major DOE programs -- nuclear weapons disposal, stockpile evaluation, and stockpile maintenance -- using shared facilities, technicians, and equipment. The model reflects the interactions of scheduling constraints, material flow constraints, and the availability of required technicians and facilities
Recommended from our members
Physical security and vulnerability modeling for infrasturcture facilities.
A model of malicious intrusions in infrastructure facilities is developed, using a network representation of the system structure together with Markov models of intruder progress and strategy. This structure provides an explicit mechanism to estimate the probability of successful breaches of physical security, and to evaluate potential improvements. Simulation is used to analyze varying levels of imperfect information on the part of the intruders in planning their attacks. An example of an intruder attempting to place an explosive device on an airplane at an airport gate illustrates the structure and potential application of the model
Full Scale Testing of an Aspirating Face Seal With Angular Misalignment
The objective of this presentation is to develop an Aspirating Face Seal design for use in the GE90 aft outer LPT seal location, and other new and existing engines. Therefore reducing the secondary flow leakages
Recommended from our members
Optimal recovery sequencing for critical infrastructure resilience assessment.
Critical infrastructure resilience has become a national priority for the U. S. Department of Homeland Security. System resilience has been studied for several decades in many different disciplines, but no standards or unifying methods exist for critical infrastructure resilience analysis. This report documents the results of a late-start Laboratory Directed Research and Development (LDRD) project that investigated the identification of optimal recovery strategies that maximize resilience. To this goal, we formulate a bi-level optimization problem for infrastructure network models. In the 'inner' problem, we solve for network flows, and we use the 'outer' problem to identify the optimal recovery modes and sequences. We draw from the literature of multi-mode project scheduling problems to create an effective solution strategy for the resilience optimization model. We demonstrate the application of this approach to a set of network models, including a national railroad model and a supply chain for Army munitions production