29 resultados para Police forces

em CentAUR: Central Archive University of Reading - UK


Relevância:

60.00% 60.00%

Publicador:

Resumo:

The problem of technology obsolescence in information intensive businesses (software and hardware no longer being supported and replaced by improved and different solutions) and a cost constrained market can severely increase costs and operational, and ultimately reputation risk. Although many businesses recognise technological obsolescence, the pervasive nature of technology often means they have little information to identify the risk and location of pending obsolescence and little money to apply to the solution. This paper presents a low cost structured method to identify obsolete software and the risk of their obsolescence where the structure of a business and its supporting IT resources can be captured, modelled, analysed and the risk to the business of technology obsolescence identified to enable remedial action using qualified obsolescence information. The technique is based on a structured modelling approach using enterprise architecture models and a heatmap algorithm to highlight high risk obsolescent elements. The method has been tested and applied in practice in three consulting studies carried out by Capgemini involving four UK police forces. However the generic technique could be applied to any industry based on plans to improve it using ontology framework methods. This paper contains details of enterprise architecture meta-models and related modelling.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The problem of technology obsolescence in information intensive businesses (software and hardware no longer being supported and replaced by improved and different solutions) and a cost constrained market can severely increase costs and operational, and ultimately reputation risk. Although many businesses recognise technological obsolescence, the pervasive nature of technology often means they have little information to identify the risk and location of pending obsolescence and little money to apply to the solution. This paper presents a low cost structured method to identify obsolete software and the risk of their obsolescence where the structure of a business and its supporting IT resources can be captured, modelled, analysed and the risk to the business of technology obsolescence identified to enable remedial action using qualified obsolescence information. The technique is based on a structured modelling approach using enterprise architecture models and a heatmap algorithm to highlight high risk obsolescent elements. The method has been tested and applied in practice in two consulting studies carried out by Capgemini involving three UK police forces. However the generic technique could be applied to any industry based on plans to improve it using ontology framework methods. This paper contains details of enterprise architecture meta-models and related modelling.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new algorithm is described for refining the pose of a model of a rigid object, to conform more accurately to the image structure. Elemental 3D forces are considered to act on the model. These are derived from directional derivatives of the image local to the projected model features. The convergence properties of the algorithm is investigated and compared to a previous technique. Its use in a video sequence of a cluttered outdoor traffic scene is also illustrated and assessed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article analyses the counter-terrorist operations carried out by Captain (later Major General) Orde Wingate in Palestine in 1938, and considers whether these might inform current operations. Wingate's Special Night Squads were formed from British soldiers and Jewish police specifically to counter terrorist and sabotage attacks. Their approach escalated from interdicting terrorist gangs to pre-emptive attacks on suspected terrorist sanctuaries to reprisal attacks after terrorist atrocities. They continued the British practice of using irregular units in counter-insurgency, which was sustained into the postwar era and contributed to the evolution of British Special Forces. Wingate's methods proved effective in pacifying terrorist-infested areas and could be applied again, but only in the face of 'friction' arising from changes in cultural attitudes since the 1930s, and from the political-strategic context of post-2001 counter-insurgent and counter-terrorist operations. In some cases, however, public opinion might not preclude the use of some of Wingate's techniques.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The paper looks at the setting up of media services for British Army forces engaged in Operation Granby, the British participation in Operation Desert Storm, the liberation of Kuwait from Iraqi occupation in 1991. In particular, the piece focuses on the creation of a force newspaper and radio station.There is far more involved in the organisation of modern war than simply battles themselves One aspect is the importance of creating and maintaining morale, which can be achieved in a number of ways, especially by keeping troops informed of their progress, purpose and mission as operations unfold. This was specifically recognised by commanders in the Gulf War, who ensured the smooth transmission of information by the provision of media services for forces personnel throughout the War. Here S J Anglim concentrates on the difficulties inherent in setting up and running the Gulf Forces newspaper, The Sandy Times, a Radio service and producing video reviews, all of which played their part in ensunng high morale. He concludes that there are lessons to be learnt and implemented for the success of any future conflicts.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The identification of criminal networks is not a routine exploratory process within the current practice of the law enforcement authorities; rather it is triggered by specific evidence of criminal activity being investigated. A network is identified when a criminal comes to notice and any associates who could also be potentially implicated would need to be identified if only to be eliminated from the enquiries as suspects or witnesses as well as to prevent and/or detect crime. However, an identified network may not be the one causing most harm in a given area.. This paper identifies a methodology to identify all of the criminal networks that are present within a Law Enforcement Area, and, prioritises those that are causing most harm to the community. Each crime is allocated a score based on its crime type and how recently the crime was committed; the network score, which can be used as decision support to help prioritise it for law enforcement purposes, is the sum of the individual crime scores.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In over forty years of research robots have made very little progress still largely confined to industrial manufacture and cute toys, yet in the same period computing has followed Moores Law where the capacity double roughly every two years. So why is there no Moores Law for robots? Two areas stand out as worthy of research to speedup progress. The first is to get a greater understanding of how human and animal brains control movement, the second to build a new generation of robots that have greater haptic sense, that is a better ability to adapt to the environment as it is encountered. A remarkable property of the cognitive-motor system in humans and animals is that it is slow. Recognising an object may take 250 mS, a reaction time of 150 mS is considered fast. Yet despite this slow system we are well designed to allow contact with the world in a variety of ways. We can anticipate an encounter, use the change of force as a means of communication and ignore sensory cues when they are not relevant. A better understanding of these process has allowed us to build haptic interfaces to mimic the interaction. Emerging from this understanding are new ways to control the contact between robots, the user and the environment. Rehabilitation robotics has all the elements in the subject to not only enable and change the lives of people with disabilities, but also to facilitate revolution change in classic robotics.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The chapter examines the evidence for budget concerns or external (WTO) pressures being the drivers for the 'Health Check' reform of the European Union's common agricultural policy.