23 resultados para Playgrounds, regulations, design, infrastructures, safety


Relevância:

30.00% 30.00%

Publicador:

Resumo:

The most outstanding conceptual challenge of modern crisis management is the principle of consent. It is not a problem only at the operational level - it challenges the entire decision-making structures of crisis management operations. In post-cold war times and especially in the 21st century, there has been a transition from peacekeeping with limited size and scope towards large and complex peace operations. This shift has presented peace operations with a dilemma. How to balance between maintaining consent for peace operations, whilst being able to use military force to coerce those attempting to wreck peace processes? To address such a dilemma, this research aims to promote understanding, on what can be achieved by military crisis management operations (peace support operations) in the next decade. The research concentrates on the focal research question: Should military components induce consent or rely on the compliance of conflicting parties in crisis management operations of the next decade (2020 – 2030)? The focus is on military – political strategic level considerations, and especially on the time before political decisions to commit to a crisis management operation. This study does not focus on which actor or organisation should intervene. The framework of this thesis derives from the so called ‘peacebuilding space’, the scope of peace operations and spoiler theory. Feasibility of both peace enforcement and peacekeeping in countering future risk conditions are analysed in this framework. This future-orientated qualitative research uses the Delphi-method with a panel of national and international experts. Citation analysis supports identification of relevant reference material, which consists of contemporary literature, the Delphi-questionnaires and interviews. The research process followed three main stages. In the first stage, plausible future scenarios and risk conditions were identified with the Delphi-panel. In the second stage, operating environments for peace support operations were described and consequent hypotheses formulated. In the third stage, these hypotheses were tested on the Delphi-panel. The Delphi-panel is sufficiently wide and diverse to produce plausible yet different insights. The research design utilised specifically military crisis management and peace operations theories. This produced various and relevant normative considerations. Therefore, one may argue that this research; which is based on accepted contemporary theory, hypotheses derived thereof and utilising an expert panel, contributes to the realm of peace support operations. This research finds that some degree of peace enforcement will be feasible and necessary in at least the following risk conditions: failed governance; potential spillover of ethnic, religious, ideological conflict; vulnerability of strategic chokepoints and infrastructures in ungoverned spaces; as well as in territorial and extra-territorial border disputes. In addition, some form of peace enforcement is probably necessary in risk conditions pertaining to: extremism of marginalised groups; potential disputes over previously uninhabited and resource-rich territories; and interstate rivalry. Furthermore, this research finds that peacekeeping measures will be feasible and necessary in at least risk conditions pertaining to: potential spillover of ethnic, religious, ideological conflict; uncontrolled migration; consequences from environmental catastrophes or changes; territorial and extra-territorial border disputes; and potential disputes over previously uninhabited and resource-rich territories. These findings are all subject to both generic and case specific preconditions that must exist for a peace support operation. Some deductions could be derived from the research findings. Although some risk conditions may appear illogical, understanding the underlying logic of a conflict is fundamental to understanding transition in crisis management. Practitioners of crisis management should possess cognizance of such transition. They must understand how transition should occur from threat to safety, from conflict to stability – and so forth. Understanding transition is imperative for managing the dynamic evolution of preconditions, which begins at the outset of a peace support operation. Furthermore, it is pertinent that spoilers are defined from a peace process point of view. If spoilers are defined otherwise, it changes the nature of an operation towards war, where the logic is breaking the will of an enemy - and surrender. In peace support operations, the logic is different: actions towards spoilers are intended to cause transition towards consent - not defeat. Notwithstanding future developments, history continues to provide strategic education. However, the distinction is that the risk conditions occur in novel futures. Hence, lessons learned from the past should be fitted to the case at hand. This research shows compelling evidence that swaying between intervention optimism and pessimism is not substantiated. Both peace enforcement and peacekeeping are sine qua non for successful military crisis management in the next decade.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A web service is a software system that provides a machine-processable interface to the other machines over the network using different Internet protocols. They are being increasingly used in the industry in order to automate different tasks and offer services to a wider audience. The REST architectural style aims at producing scalable and extensible web services using technologies that play well with the existing tools and infrastructure of the web. It provides a uniform set of operation that can be used to invoke a CRUD interface (create, retrieve, update and delete) of a web service. The stateless behavior of the service interface requires that every request to a resource is independent of the previous ones facilitating scalability. Automated systems, e.g., hotel reservation systems, provide advanced scenarios for stateful services that require a certain sequence of requests that must be followed in order to fulfill the service goals. Designing and developing such services for advanced scenarios with REST constraints require rigorous approaches that are capable of creating web services that can be trusted for their behavior. Systems that can be trusted for their behavior can be termed as dependable systems. This thesis presents an integrated design, analysis and validation approach that facilitates the service developer to create dependable and stateful REST web services. The main contribution of this thesis is that we provide a novel model-driven methodology to design behavioral REST web service interfaces and their compositions. The behavioral interfaces provide information on what methods can be invoked on a service and the pre- and post-conditions of these methods. The methodology uses Unified Modeling Language (UML), as the modeling language, which has a wide user base and has mature tools that are continuously evolving. We have used UML class diagram and UML state machine diagram with additional design constraints to provide resource and behavioral models, respectively, for designing REST web service interfaces. These service design models serve as a specification document and the information presented in them have manifold applications. The service design models also contain information about the time and domain requirements of the service that can help in requirement traceability which is an important part of our approach. Requirement traceability helps in capturing faults in the design models and other elements of software development environment by tracing back and forth the unfulfilled requirements of the service. The information about service actors is also included in the design models which is required for authenticating the service requests by authorized actors since not all types of users have access to all the resources. In addition, following our design approach, the service developer can ensure that the designed web service interfaces will be REST compliant. The second contribution of this thesis is consistency analysis of the behavioral REST interfaces. To overcome the inconsistency problem and design errors in our service models, we have used semantic technologies. The REST interfaces are represented in web ontology language, OWL2, that can be part of the semantic web. These interfaces are used with OWL 2 reasoners to check unsatisfiable concepts which result in implementations that fail. This work is fully automated thanks to the implemented translation tool and the existing OWL 2 reasoners. The third contribution of this thesis is the verification and validation of REST web services. We have used model checking techniques with UPPAAL model checker for this purpose. The timed automata of UML based service design models are generated with our transformation tool that are verified for their basic characteristics like deadlock freedom, liveness, reachability and safety. The implementation of a web service is tested using a black-box testing approach. Test cases are generated from the UPPAAL timed automata and using the online testing tool, UPPAAL TRON, the service implementation is validated at runtime against its specifications. Requirement traceability is also addressed in our validation approach with which we can see what service goals are met and trace back the unfulfilled service goals to detect the faults in the design models. A final contribution of the thesis is an implementation of behavioral REST interfaces and service monitors from the service design models. The partial code generation tool creates code skeletons of REST web services with method pre and post-conditions. The preconditions of methods constrain the user to invoke the stateful REST service under the right conditions and the post condition constraint the service developer to implement the right functionality. The details of the methods can be manually inserted by the developer as required. We do not target complete automation because we focus only on the interface aspects of the web service. The applicability of the approach is demonstrated with a pedagogical example of a hotel room booking service and a relatively complex worked example of holiday booking service taken from the industrial context. The former example presents a simple explanation of the approach and the later worked example shows how stateful and timed web services offering complex scenarios and involving other web services can be constructed using our approach.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

A new Dam Safety Act (494/2009) came into force on 1st October 2009 and a Government Decree on Dam Safety (319/2010) on 5th May 2010. This Dam Safety Guide replaces the Dam Safety Code of Practice (Publication of the Ministry of Agriculture and Forestry 7/1997), removed from circulation on 1st October 2009. The Dam Safety Guide is not binding on the dam owner; the purpose is to complement and elucidate the relevant law and and decree through examples and descriptions. The Guide takes up questions concerning dam design, for instance hydrological dimensioning and technical safety requirements, dam construction and use, the dam break hazard analysis and the dam owner’s emergency action plan, maintenance, use, monitoring as well as the annual and periodic inspections. Dams are classified according to the hazard they pose into class 1, 2 or 3 dams. The classification is not needed, if, according to the dam safety authority, the dam poses no danger. The owner of a classified dam must prepare a monitoring programme, to be approved by decision of the dam safety authority. To establish the hazard caused by a dam, the owner of a class 1 dam must prepare an analysis of the dam hazard to humans and property as well as to the environment. The dam safety authority may also require a dam break hazard analysis for a dam other than class 1 dam if deemed necessary for classification. The owner of a class 1 dam must prepare a plan of measures in case of emergency or operational failure. The plan shall present the dam owner’s state of preparedness to act on their own initiative in the situations described above. In each case, the rescue authorities make a separate assessment for the need to prepare a plan as set out in the Rescue Act. The dam owner must provide the information specified in the Dam Safety Decree to be entered into the dam safety information system. The dam safety authority and the owner of the dam must keep up-to-date printouts in their own dam safety files from the information system for each dam as well as other important documents connected with dam safety to ensure that these are readily available in case of disturbance.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Nowadays, computer-based systems tend to become more complex and control increasingly critical functions affecting different areas of human activities. Failures of such systems might result in loss of human lives as well as significant damage to the environment. Therefore, their safety needs to be ensured. However, the development of safety-critical systems is not a trivial exercise. Hence, to preclude design faults and guarantee the desired behaviour, different industrial standards prescribe the use of rigorous techniques for development and verification of such systems. The more critical the system is, the more rigorous approach should be undertaken. To ensure safety of a critical computer-based system, satisfaction of the safety requirements imposed on this system should be demonstrated. This task involves a number of activities. In particular, a set of the safety requirements is usually derived by conducting various safety analysis techniques. Strong assurance that the system satisfies the safety requirements can be provided by formal methods, i.e., mathematically-based techniques. At the same time, the evidence that the system under consideration meets the imposed safety requirements might be demonstrated by constructing safety cases. However, the overall safety assurance process of critical computerbased systems remains insufficiently defined due to the following reasons. Firstly, there are semantic differences between safety requirements and formal models. Informally represented safety requirements should be translated into the underlying formal language to enable further veri cation. Secondly, the development of formal models of complex systems can be labour-intensive and time consuming. Thirdly, there are only a few well-defined methods for integration of formal verification results into safety cases. This thesis proposes an integrated approach to the rigorous development and verification of safety-critical systems that (1) facilitates elicitation of safety requirements and their incorporation into formal models, (2) simplifies formal modelling and verification by proposing specification and refinement patterns, and (3) assists in the construction of safety cases from the artefacts generated by formal reasoning. Our chosen formal framework is Event-B. It allows us to tackle the complexity of safety-critical systems as well as to structure safety requirements by applying abstraction and stepwise refinement. The Rodin platform, a tool supporting Event-B, assists in automatic model transformations and proof-based verification of the desired system properties. The proposed approach has been validated by several case studies from different application domains.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The Finnish legislation requires for a safe and secure learning environment. However, the comprehensive, risk based safety and security management (SSM) and the management commitment in the implementation and development of the SSM are not mentioned in the legislation. Multiple institutions, operators and researchers have studied and developed safety and security in educational institutions over the past decade. Typically the approach has been fragmented and without bringing up the importance of the comprehensive SSM. The development needs of the safety and security operations in universities have been studied. However, in universities of applied sciences (UASs) and in elementary schools (ESs), the performance level, strengths and weaknesses of the comprehensive SSM have not been studied. The objective of this study was to develop the comprehensive, risk based SSM of educational institutions by developing the new Asteri consultative auditing process and study its effects on auditees. Furthermore, the performance level in the comprehensive SSM in UASs and ESs were studied using Asteri and the TUTOR model developed by the Keski-Uusimaa Department for Rescue Services. In addition, strengths, development needs and differences were identified. In total, 76 educational institutions were audited between the years 2011 and 2014. The study is based on logical empiricism, and an observational applied research design was used. Auditing, observation and an electronic survey were used for data collection. Statistical analysis was used to analyze the collected information. In addition, thematic analysis was used to analyze the development areas of the organizations mentioned by the respondents in the survey. As one of the main contributions, this research presents the new Asteri consultative auditing process. Organizations with low performance levels on the audited subject benefit the most from the Asteri consultative auditing process. Asteri may be usable in many different types of audits, not only in SSM audits. As a new result, this study provides new knowledge on attitudes related to auditing. According to the research findings, auditing may generate negative attitudes and the auditor should take them into account when planning and preparing for audits. Negative attitudes can be compensated by producing added value, objectivity and positivity for the audit and, thus, improve the positive effects of auditing on knowledge and skills. Moreover, as the results of this study shows, auditing safety and security issues do not increase feelings of insecurity, but rather increase feelings of safety and security when using the new Asteri consultative auditing process with the TUTOR model. The results showed that the SSM in the audited UASs was statistically significantly more advanced than that in the audited ESs. However, there is still room for improvement in the ESs and the UASs as the approach to the SSM was fragmented. It can be assumed that the majority of Finnish UASs and ESs do not likely meet the basic level of the comprehensive, risk based the SSM.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Food safety has always been a social issue that draws great public attention. With the rapid development of wireless communication technologies and intelligent devices, more and more Internet of Things (IoT) systems are applied in the food safety tracking field. However, connection between things and information system is usually established by pre-storing information of things into RFID Tag, which is inapplicable for on-field food safety detection. Therefore, considering pesticide residue is one of the severe threaten to food safety, a new portable, high-sensitivity, low-power, on-field organophosphorus (OP) compounds detection system is proposed in this thesis to realize the on-field food safety detection. The system is designed based on optical detection method by using a customized photo-detection sensor. A Micro Controller Unit (MCU) and a Bluetooth Low Energy (BLE) module are used to quantize and transmit detection result. An Android Application (APP) is also developed for the system to processing and display detection result as well as control the detection process. Besides, a quartzose sample container and black system box are also designed and made for the system demonstration. Several optimizations are made in wireless communication, circuit layout, Android APP and industrial design to realize the mobility, low power and intelligence.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The energy consumption by ICT (Information and Communication Technology) equipment is rapidly increasing which causes a significant economic and environmental problem. At present, the network infrastructure is becoming a large portion of the energy footprint in ICT. Thus the concept of energy efficient or green networking has been introduced. Now one of the main concerns of network industry is to minimize energy consumption of network infrastructure because of the potential economic benefits, ethical responsibility, and its environmental impact. In this paper, the energy management strategies to reduce the energy consumed by network switches in LAN (Local Area Network) have been developed. According to the lifecycle assessment of network switches, during usage phase, the highest amount of energy consumed. The study considers bandwidth, link load and traffic matrixes as input parameters which have the highest contribution in energy footprint of network switches during usage phase and energy consumption as output. Then with the objective of reducing energy usage of network infrastructure, the feasibility of putting Ethernet switches hibernate or sleep mode was investigated. After that, the network topology was reorganized using clustering method based on the spectral approach for putting network switches to hibernate or switched off mode considering the time and communications among them. Experimental results show the interest of this approach in terms of energy consumption