828 resultados para homeland security
Resumo:
On December 21, 2015, Governor Branstad issued Executive Order 87 (EO87); a cybersecurity initiative for the State of Iowa. The executive order establishes a multi-agency partnership, the EO87 Leadership Team, with the Office of the Chief Information Officer, Iowa National Guard, Department of Public Safety, Iowa Communications Network, and the Iowa Homeland Security and Emergency Management Department. The order directs these agencies to develop a comprehensive cybersecurity strategy which addresses lifeline critical infrastructure, risk assessments, best practices, awareness training, public education and communication, collaboration, K-12 and higher education, data breach notifications, and incident response planning to protect the citizens of Iowa and Iowa businesses. The EO87 Leadership Team, along with several key partners, worked diligently over the last six months to prepare recommendations that will have a direct and sustainable impact on protecting lifeline critical infra-structure, reducing risk to government operations, and creating sustainable partnerships in cybersecurity.
Resumo:
A snapshot of water resource trends prepared by the Iowa DNR in collaboration with the Iowa Department of Agriculture and Land Stewardship, the U.S. Geological Survey, and The Iowa Homeland Security and Emergency Management Department.
Resumo:
Thesis (Ph.D.)--University of Washington, 2016-08
Resumo:
A snapshot of water resource trends prepared by the Iowa DNR in collaboration with the Iowa Department of Agriculture and Land Stewardship, the U.S. Geological Survey, and The Iowa Homeland Security and Emergency Management Department.
Resumo:
A decision-maker, when faced with a limited and fixed budget to collect data in support of a multiple attribute selection decision, must decide how many samples to observe from each alternative and attribute. This allocation decision is of particular importance when the information gained leads to uncertain estimates of the attribute values as with sample data collected from observations such as measurements, experimental evaluations, or simulation runs. For example, when the U.S. Department of Homeland Security must decide upon a radiation detection system to acquire, a number of performance attributes are of interest and must be measured in order to characterize each of the considered systems. We identified and evaluated several approaches to incorporate the uncertainty in the attribute value estimates into a normative model for a multiple attribute selection decision. Assuming an additive multiple attribute value model, we demonstrated the idea of propagating the attribute value uncertainty and describing the decision values for each alternative as probability distributions. These distributions were used to select an alternative. With the goal of maximizing the probability of correct selection we developed and evaluated, under several different sets of assumptions, procedures to allocate the fixed experimental budget across the multiple attributes and alternatives. Through a series of simulation studies, we compared the performance of these allocation procedures to the simple, but common, allocation procedure that distributed the sample budget equally across the alternatives and attributes. We found the allocation procedures that were developed based on the inclusion of decision-maker knowledge, such as knowledge of the decision model, outperformed those that neglected such information. Beginning with general knowledge of the attribute values provided by Bayesian prior distributions, and updating this knowledge with each observed sample, the sequential allocation procedure performed particularly well. These observations demonstrate that managing projects focused on a selection decision so that the decision modeling and the experimental planning are done jointly, rather than in isolation, can improve the overall selection results.
Resumo:
Rapid, sensitive and selective detection of chemical hazards and biological pathogens has shown growing importance in the fields of homeland security, public safety and personal health. In the past two decades, efforts have been focusing on performing point-of-care chemical and biological detections using miniaturized biosensors. These sensors convert target molecule binding events into measurable electrical signals for quantifying target molecule concentration. However, the low receptor density and the use of complex surface chemistry in receptors immobilization on transducers are common bottlenecks in the current biosensor development, adding to the cost, complexity and time. This dissertation presents the development of selective macromolecular Tobacco mosaic virus-like particle (TMV VLP) biosensing receptor, and the microsystem integration of VLPs in microfabricated electrochemical biosensors for rapid and performance-enhanced chemical and biological sensing. Two constructs of VLPs carrying different receptor peptides targeting at 2,4,6-trinitrotoluene (TNT) explosive or anti-FLAG antibody are successfully bioengineered. The VLP-based TNT electrochemical sensor utilizes unique diffusion modulation method enabled by biological binding between target TNT and receptor VLP. The method avoids the influence from any interfering species and environmental background signals, making it extremely suitable for directly quantifying the TNT level in a sample. It is also a rapid method that does not need any sensor surface functionalization process. For antibody sensing, the VLPs carrying both antibody binding peptides and cysteine residues are assembled onto the gold electrodes of an impedance microsensor. With two-phase immunoassays, the VLP-based impedance sensor is able to quantify antibody concentrations down to 9.1 ng/mL. A capillary microfluidics and impedance sensor integrated microsystem is developed to further accelerate the process of VLP assembly on sensors and improve the sensitivity. Open channel capillary micropumps and stop-valves facilitate localized and evaporation-assisted VLP assembly on sensor electrodes within 6 minutes. The VLP-functionalized impedance sensor is capable of label-free sensing of antibodies with the detection limit of 8.8 ng/mL within 5 minutes after sensor functionalization, demonstrating great potential of VLP-based sensors for rapid and on-demand chemical and biological sensing.
Resumo:
A Constituição da República Portuguesa desde 1982, e após sete revisões constitucionais, faz a distinção vincada entre o que é Segurança Interna e Defesa Nacional. Assim, reserva para a primeira a intervenção das Forças da Segurança e para a segunda a as Forças Armadas, permitindo apenas a intervenção destas na Segurança Interna em estados de excepção, como o estado de emergência e o estado de sítio. Dada a delicadeza do tema optou-se pela construção de um questionário, para que as pessoas possam pronunciar-se de forma isenta sobre o tema, sem constrangimentos institucionais. Optou-se por uma abordagem qualitativa. Com base num guião, entrevistaram-se quatro peritos no assunto de forma a obter respostas sobre a viabilidade da intervenção das Forças Armadas na Segurança Interna, num estado de normalidade democrática. As respostas depois de transcritas constituíram o corpus que foi submetido a análise de conteúdo. Com base nesta análise de conteúdo, a partir dos excertos de discursos codificados nas categorias e subcategorias, procedeu-se à construção dos itens que figurarão numa primeira versão do questionário. A primeira versão do questionário apresenta-se em torno de quatro eixos (categorias), que se dividem em subcategorias: intervenção das Forças Armadas na Segurança Interna; legislação; mudança do paradigma de segurança; e, definição conceptual.
Resumo:
To analyze the characteristics and predict the dynamic behaviors of complex systems over time, comprehensive research to enable the development of systems that can intelligently adapt to the evolving conditions and infer new knowledge with algorithms that are not predesigned is crucially needed. This dissertation research studies the integration of the techniques and methodologies resulted from the fields of pattern recognition, intelligent agents, artificial immune systems, and distributed computing platforms, to create technologies that can more accurately describe and control the dynamics of real-world complex systems. The need for such technologies is emerging in manufacturing, transportation, hazard mitigation, weather and climate prediction, homeland security, and emergency response. Motivated by the ability of mobile agents to dynamically incorporate additional computational and control algorithms into executing applications, mobile agent technology is employed in this research for the adaptive sensing and monitoring in a wireless sensor network. Mobile agents are software components that can travel from one computing platform to another in a network and carry programs and data states that are needed for performing the assigned tasks. To support the generation, migration, communication, and management of mobile monitoring agents, an embeddable mobile agent system (Mobile-C) is integrated with sensor nodes. Mobile monitoring agents visit distributed sensor nodes, read real-time sensor data, and perform anomaly detection using the equipped pattern recognition algorithms. The optimal control of agents is achieved by mimicking the adaptive immune response and the application of multi-objective optimization algorithms. The mobile agent approach provides potential to reduce the communication load and energy consumption in monitoring networks. The major research work of this dissertation project includes: (1) studying effective feature extraction methods for time series measurement data; (2) investigating the impact of the feature extraction methods and dissimilarity measures on the performance of pattern recognition; (3) researching the effects of environmental factors on the performance of pattern recognition; (4) integrating an embeddable mobile agent system with wireless sensor nodes; (5) optimizing agent generation and distribution using artificial immune system concept and multi-objective algorithms; (6) applying mobile agent technology and pattern recognition algorithms for adaptive structural health monitoring and driving cycle pattern recognition; (7) developing a web-based monitoring network to enable the visualization and analysis of real-time sensor data remotely. Techniques and algorithms developed in this dissertation project will contribute to research advances in networked distributed systems operating under changing environments.
Resumo:
A snapshot of water resource trends prepared by the Iowa DNR in collaboration with the Iowa Department of Agriculture and Land Stewardship, the U.S. Geological Survey, and The Iowa Homeland Security and Emergency Management Department.
Resumo:
A review of water resource trends prepared by the Iowa DNR in collaboration with the Iowa Department of Agriculture and Land Stewardship, the U.S. Geological Survey, and The Iowa Homeland Security and Emergency Management Department.
Resumo:
El siguiente estudio de caso analiza la influencia de la llegada de la migración infantil indocumentada centroamericana en la reformulación de la política migratoria de Estados Unidos en el período 2010-2014. Enfocándose en el caso de Honduras para dar a conocer y analizar las causas que crean las dinámicas migratorias por parte de los menores, este trabajo analiza como la llegada de estas poblaciones genera ciertos efectos en el proceso de toma de decisión de las políticas internas de los Estados Unidos. Por un lado, para resaltar las características del fenómeno migratorio, se utilizan las teorías de redes sociales y la teoría push and pull. Por otro, mediante los conceptos de Sensibilidad y Vulnerabilidad expuestos en la teoría de la Interdependencia Compleja de las Relaciones Internacionales, como también el concepto de Seguridad Societal propuesto por Barry Buzan se estudia el nivel de influencia del fenómeno infantil en el gobierno norteamericano.
Resumo:
El objetivo de esta monografía es analizar el proceso de descentralización de Al Qaeda a causa del debilitamiento de su centro en Afganistán por la intervención militar de la coalición occidental. Se estudia como Al Qaeda deja de ser una organización jerárquica, comenzando a organizarse en red. Estas trasformaciones se pueden explicar a la luz de los principales postulados de la teoría de Guerra en Red, que incluyen la falta de un liderazgo central, y la distribución en enjambre para atacar. Siguiendo la línea argumentativa, finalmente se demuestra que mediante la expansión de la red, Al Qaeda aún bajo su situación de debilidad ha mantenido vigente la yihad trasnacional a través de las organizaciones filiales en África.
Resumo:
La presente investigación tiene como finalidad analizar las implicaciones humanitarias de la participación de las Compañías Militares Privadas (PMC) contratadas por los Estados en escenarios de conflicto, a partir del caso de Blackwater y Estados Unidos en Irak (2003-2007), con el fin de mostrar a través de algunos hechos específicos como el acaecido en la plaza Al Nisour los vacíos existentes en la regulación de sus actividades. Frente a estos hechos se muestra como la Comunidad Internacional ha tratado de avanzar en la creación de un régimen internacional que las controle, sin embargo, como se evidencia a lo largo de este escrito la falta de compromiso por parte de los Estados ha hecho que esta tarea se vea obstaculizada y por lo tanto la actuación de estas compañías se encuentra aún en una zona jurídica gris.
Resumo:
Tradicionalmente, la consolidación de la seguridad energética en Estados Unidos se ha mostrado como un asunto de seguridad nacional. En especial, la escasez de recursos energéticos ha sido vista como un problema existencial que requiere de medidas de emergencia en el marco de un proceso de securitización. Sin embargo, esta investigación surgiere que el tema ha sido mayoritariamente politizado a inicios del siglo XXI. Quizá este proceso de securitización tan solo fue implícitamente planteado con ocasión de la invasión a Irak en 2003, en la medida en que dicha intervención pudo haberse inspirado por la necesidad de derrocar a un régimen que había impedido el acceso estadounidense a recursos petroleros iraquíes. En este orden de ideas, la investigación analiza las políticas de seguridad energética de los gobiernos de George W. Bush y Barack H. Obama con el propósito de entender el grado en el que estas estuvieron vinculadas a sus respectivas agendas de seguridad nacional.