28 research outputs found

    Contextual Knowledge and Information Fusion for Maritime Piracy Surveillance

    Get PDF
    Proceedings of: NATO Advanced Study Institute (ASI) on Prediction and Recognition of Piracy Efforts Using Collaborative Human-Centric Information Systems, Salamanca, 19-30 September, 2011Though piracy accounts for only a small fraction of the general losses of the maritime industry it creates a serious threat to the maritime security because of the connections between organized piracy and wider criminal networks and corruption on land. Fighting piracy requires monitoring the waterways, harbors,and criminal networks on the land to increase the ability of the decision makers to predict piracy attracts and manage operations to prevent or contain them. Piracy surveillance involves representing and processing huge amount heterogeneous information often uncertain, unreliable, and irrelevant within a specific context to detect and recognize suspicious activities to alert decision makers on vessel behaviors of interest with minimal false alarm. The paper discusses the role of information fusion, and context representation and utilization in building an piracy surveillance picture.This paper has utilized the results of the research activity supported in part by Projects CICYT TIN2008-06742-C02-02/TSI, CICYT TEC2008-06732-C02-02/TEC and CAM CONTEXTS (S2009/TIC-1485)Publicad

    Towards Characterizing Maritime Piracy Problems and Solution Spaces: Preliminary Results from Study Group Discussions

    Get PDF
    Proceedings of: NATO Advanced Study Institute (ASI) on Prediction and Recognition of Piracy Efforts Using Collaborative Human-Centric Information Systems, Salamanca, 19-30 September, 2011The main objective of the NATO HSD.MD.ASI.984016 on Prediction and Recognition of Piracy Efforts Using Collaborative Human-Centric Information Systems is to provide discussions on prediction, recognition and deterrence of maritime piracy through the use of collaborative human-centric information support systems. A group of more than 70 specialists and students gathered in Salamanca, Spain during the period of 19-30 September 2011 to examine maritime piracy problems and possible solutions. The ASI involved both technology and domain experts who exchanged their knowledge through lectures, plenary and brainstorming breakout study sessions in smaller interdisciplinary groups. They certainly improved their mutual awareness of the requirements, issues, policy as well as technology capable of helping to predict, recognize and deter maritime piracy. This paper presents the results of the discussions of the four interdisciplinary groups formed to study the various aspects of the maritime piracy problem.Publicad

    Context-based multi-level information fusion for harbor surveillance

    Get PDF
    Harbor surveillance is a critical and challenging part of maritime security procedures. Building a surveillance picture to support decision makers in detection of potential threats requires the integration of data and information coming from heterogeneous sources. Context plays a key role in achieving this task by providing expectations, constraints and additional information for inference about the items of interest. This paper proposes a fusion system for context-based situation and threat assessment with application to harbor surveillance. The architecture of the system is organized in two levels. The lowest level uses an ontological model to formally represent input data and to classify harbor objects and basic situations by deductive reasoning according to the harbor regulations. The higher level applies Belief-based Argumentation to evaluate the threat posed by suspicious vessels. The functioning of the system is illustrated with several examples that reproduce common harbor scenarios. (C) 2014 Elsevier B.V. All rights reserved.This work was supported in part by Projects MINECO TEC2012-37832-C02-01, CICYT TEC2011-28626-C02-02, CAM CONTEXTS (S2009/TIC-1485) and Mobility Grants Program of Fundación Caja Madrid.Publicad

    Experimental Evaluation of the Protective Efficacy of Tick-Borne Encephalitis (TBE) Vaccines Based on European and Far-Eastern TBEV Strains in Mice and in Vitro

    Get PDF
    Tick-borne encephalitis (TBE), caused by the TBE virus (TBEV), is a serious public health threat in northern Eurasia. Three subtypes of TBEV are distinguished. Inactivated vaccines are available for TBE prophylaxis, and their efficacy to prevent the disease has been demonstrated by years of implication. Nevertheless, rare TBE cases among the vaccinated have been registered. The present study aimed to evaluate the protective efficacy of 4 TBEV vaccines against naturally circulating TBEV variants. For the first time, the protection was evaluated against an extended number of phylogenetically distinct TBEV strains isolated in different years in different territories. The protective effect did not strongly depend on the infectious dose of the challenge virus or the scheme of vaccination. All vaccines induced neutralizing antibodies in protective titers against the TBEV strains used, although the vaccines varied in the spectra of induced antibodies and protective efficacy. The protective efficacy of the vaccines depended on the individual properties of the vaccine strain and the challenge virus, rather than on the subtypes. The neutralization efficiency appeared to be dependent not only on the presence of antibodies to particular epitopes and the amino acid composition of the virion surface but also on the intrinsic properties of the challenge virus E protein structure

    The Effect of IPCC Reports and Regulatory Announcements on the Stock Market

    No full text
    This study explores U.S. public companies’ reactions to scientific announcements by the IPCC (Intergovernmental Panel on Climate Change) with respect to updated climate change knowledge and how it affects their stock valuations, given their carbon emission/environmental outlooks. Based on a sample of total daily returns collected for 10 industry indexes from the S&P 500 Index over the period 1990–2014, and using an event study approach, we analyze the connection between IPCC assessment report announcements and firms’ returns to evaluate panel data models. We found that various sectors, regardless of their carbon profiles, react abnormally to IPCC report announcements without remarkable long-run cumulative effects. The implications of these results are that there is no clear violation of the efficient markets hypothesis, yet short-term profits may be gained. Furthermore, the market still reacts to new scientific announcements, even though 24 years have passed since the first IPCC report. In addition, there is a negative relationship for low and medium carbon-intensive industries, especially in the short term

    Fusion methodologies in crisis management: higher level fusion and decision making

    No full text
    This book emphasizes a contemporary view on the role of higher level fusion in designing crisis management systems. It provides the formal foundations, architecture, and implementation strategies required for building dynamic current and future situational pictures. It goes on to discuss the state-of-the-art computational approaches to designing such processes and their inherent challenges. This book integrates recent advances in decision theory with those in fusion methodology to define an end-to-end framework for decision support in crisis management. The text discusses modern fusion and decision support methods for dealing with heterogeneous and often unreliable, low fidelity, contradictory, and redundant data and information, as well as rare, unknown, unconventional or even unimaginable critical situations. The book also examines the role of context in situation management, cognitive aspects of decision making and situation management, approaches to domain representation, visualization, as well as the role and exploitation of the social media. The editors include examples and case studies from the field of disaster management. · Discusses decision making in extreme and rare situations · Presents method of representing and controlling information quality · Examines context exploitation and discovery for situation management . Provides opportunities and complexities of integrating social media in crisis management

    Information quality in information fusion and decision making

    No full text
    corecore