Abstract: For any country in the world, it has become a priority to protect the critical infrastructure from looming risks of terrorism. In any infrastructure system, the structural elements like lower floors, exterior columns, walls etc. are key elements which are the most susceptible to damage due to blast load. The present study revisits the state of art review of the design and analysis of reinforced concrete panels subjected to blast loading. Various aspects in association with blast loading on structure, i.e. estimation of blast load, experimental works carried out previously, the numerical simulation tools, various material models, etc. are considered for exploring the current practices adopted worldwide. Discussion on various parametric studies to investigate the effect of reinforcement ratios, thickness of slab, different charge weight and standoff distance is also made. It was observed that for the simulation of blast load, CONWEP blast function or equivalent numerical equations were successfully employed by many researchers. The study of literature indicates that the researches were carried out using experimental works and numerical simulation using well known generalized finite element methods, i.e. LS-DYNA, ABAQUS, AUTODYN. Many researchers recommended to use concrete damage model to represent concrete and plastic kinematic material model to represent steel under action of blast loads for most of the numerical simulations. Most of the studies reveal that the increase reinforcement ratio, thickness of slab, standoff distance was resulted in better blast resistance performance of reinforced concrete panel. The study summarizes the various research results and appends the present state of knowledge for the structures exposed to blast loading.
Abstract: The development of solutions to improve the resistance of buildings to short-term dynamic loads, particularly impact load, is driven by the urgent demand worldwide on securing human life and critical infrastructures. The research training group GRK 2250/1 aims to develop mineral-bonded composites that allow the fabrication of thin-layered strengthening layers providing available concrete members with enhanced impact resistance. This paper presents the development of 3D woven wire cellular structures that can be used as innovative reinforcement for targeted composites. 3D woven wire cellular structures are truss-like architectures that can be fabricated in an automatized process with a great customization possibility. The specific architecture allows this kind of structures to have good load bearing capability and forming behavior, which is of great potential to give strength against impact loading. An appropriate combination of topology and material enables an optimal use of thin-layered reinforcement in concrete constructions.
Abstract: Crisis preparedness training is the best possible strategy for identifying weak points, understanding vulnerability, and finding possible strategies for mitigation of blackout consequences. Training represents an effective tool for developing abilities and skills to cope with crisis situations. This article builds on the results of the research carried out in the field of preparation, realization, process, and impacts of training on subjects of energy sector critical infrastructure as a part of crisis preparedness. The research has revealed that the subjects of energy sector critical infrastructure have not realized training and therefore are not prepared for the restoration of the energy supply and black start after blackout regardless of the fact that most subjects state blackout and subsequent black start as key dangers. Training, together with mutual communication and processed crisis documentation, represent a basis for successful solutions for dealing with emergency situations. This text presents the suggested model of SIMEX simulator as a tool which supports managing crisis situations, containing training environment. Training models, possibilities of constructive simulation making use of non-aggregated as well as aggregated entities and tools of communication channels of individual simulator nodes have been introduced by the article.
Abstract: The paper deals with simulation programs of spread of harmful substances. Air pollution has a direct impact on the quality of human life and environmental protection is currently a very hot topic. Therefore, the paper focuses on the simulation of release of harmful substances. The first part of article deals with perspectives and possibilities of implementation outputs of simulations programs into the system which is education and of practical training of the management staff during emergency events in the frame of critical infrastructure. The last part shows the practical testing and evaluation of simulation programs. Of the tested simulations software been selected Symos97. The tool offers advanced features for setting leakage. Gradually allows the user to model the terrain, location, and method of escape of harmful substances.
Abstract: The primary approach for estimating bridge deterioration uses Markov-chain models and regression analysis. Traditional Markov models have problems in estimating the required transition probabilities when a small sample size is used. Often, reliable bridge data have not been taken over large periods, thus large data sets may not be available. This study presents an important change to the traditional approach by using the Small Data Method to estimate transition probabilities. The results illustrate that the Small Data Method and traditional approach both provide similar estimates; however, the former method provides results that are more conservative. That is, Small Data Method provided slightly lower than expected bridge condition ratings compared with the traditional approach. Considering that bridges are critical infrastructures, the Small Data Method, which uses more information and provides more conservative estimates, may be more appropriate when the available sample size is small. In addition, regression analysis was used to calculate bridge deterioration. Condition ratings were determined for bridge groups, and the best regression model was selected for each group. The results obtained were very similar to those obtained when using Markov chains; however, it is desirable to use more data for better results.
Abstract: Industrial Control Systems (ICS) such as Supervisory Control And Data Acquisition (SCADA) can be seen in many different critical infrastructures, from nuclear management to utility, medical equipment, power, waste and engine management on ships and planes. The role SCADA plays in critical infrastructure has resulted in a call to secure them. Many lives depend on it for daily activities and the attack vectors are becoming more sophisticated. Hence, the security of ICS is vital as malfunction of it might result in huge risk. This paper describes how the application of Prey Predator (PP) approach in flocks of birds could enhance the detection of malicious activities on ICS. The PP approach explains how these animals in groups or flocks detect predators by following some simple rules. They are not necessarily very intelligent animals but their approach in solving complex issues such as detection through corporation, coordination and communication worth emulating. This paper will emulate flocking behavior seen in birds in detecting predators. The PP approach will adopt six nearest bird approach in detecting any predator. Their local and global bests are based on the individual detection as well as group detection. The PP algorithm was designed following MapReduce methodology that follows a Split Detection Convergence (SDC) approach.
Abstract: During airport planning and design stages, the major issues of capacity and safety in construction and operation of an airport need to be taken into consideration. The airside of an airport is a major and critical infrastructure that usually consists of runway(s), taxiway system, and apron(s) etc., which have to be designed according to the international standards and recommendations, and local limitations to accommodate the forecasted demands. However, in many cases, airport airsides are suffering from unexpected risks that occurred during airport operations. Therefore, safety risk assessment should be applied in the planning and design of airsides to cope with the probability of risks and their consequences, and to make decisions to reduce the risks to as low as reasonably practicable (ALARP) based on safety risk assessment. This paper presents a combination approach of Failure Modes, Effect, and Criticality Analysis (FMECA), Fuzzy Reasoning Approach (FRA), and Fuzzy Analytic Hierarchy Process (FAHP) to develop a risk analysis model for safety risk assessment. An illustrated example is used to the demonstrate risk assessment process on how the design of an airside in an airport can be analysed by using the proposed safety design risk assessment model.
Abstract: Polymeric composites are being increasingly used as
repair material for repairing critical infrastructures such as building,
bridge, pressure vessel, piping and pipeline. Technique in repairing
damaged pipes is one of the major concerns of pipeline owners.
Considerable researches have been carried out on the repair of
corroded pipes using composite materials. This article attempts a
short review of the subject matter to provide insight into various
techniques used in repairing corroded pipes, focusing on a wide range
of composite repair systems. These systems including pre-cured
layered, flexible wet lay-up, pre-impregnated, split composite sleeve
and flexible tape systems. Both advantages and limitations of these
repair systems were highlighted. Critical technical aspects have been
discussed through the current standards and practices. Research gaps
and future study scopes in achieving more effective design
philosophy are also presented.
Abstract: This paper deals with using of prevailing operation
system MS Office (SmartArt...) for mathematical models, using
DYVELOP (Dynamic Vector Logistics of Processes) method. It
serves for crisis situations investigation and modelling within the
organizations of critical infrastructure. In first part of paper, it will be
introduced entities, operators, and actors of DYVELOP method. It
uses just three operators of Boolean algebra and four types of the
entities: the Environments, the Process Systems, the Cases, and the
Controlling. The Process Systems (PrS) have five “brothers”:
Management PrS, Transformation PrS, Logistic PrS, Event PrS and
Operation PrS. The Cases have three “sisters”: Process Cell Case,
Use Case, and Activity Case. They all need for the controlling of
their functions special Ctrl actors, except ENV – it can do without
Ctrl. Model´s maps are named the Blazons and they are able
mathematically - graphically express the relationships among entities,
actors and processes. In second part of this paper, the rich blazons of
DYVELOP method will be used for the discovering and modelling of
the cycling cases and their phases. The blazons need live PowerPoint
presentation for better comprehension of this paper mission. The
crisis management of energetic crisis infrastructure organization is
obliged to use the cycles for successful coping of crisis situations.
Several times cycling of these cases is necessary condition for the
encompassment for both emergency events and the mitigation of
organization´s damages. Uninterrupted and continuous cycling
process brings for crisis management fruitfulness and it is good
indicator and controlling actor of organizational continuity and its
sustainable development advanced possibilities. The research reliable
rules are derived for the safety and reliable continuity of energetic
critical infrastructure organization in the crisis situation.
Abstract: With the increasing dependence of countries on the
critical infrastructure, it increases their vulnerability. Big threat is
primarily in the human factor (personnel of the critical infrastructure)
and in terrorist attacks. It emphasizes the development of
methodology for searching of weak points and their subsequent
elimination. This article discusses methods for the analysis of safety
in the objects of critical infrastructure. It also contains proposal for
methodology for training employees of security services in the
objects of the critical infrastructure and developing scenarios of
attacks on selected objects of the critical infrastructure.
Abstract: The paper is focused on the application of the security
audit method on the selected objects of the critical infrastructure. The
emphasis is put on security audit method to find gaps in the critical
infrastructure security. The theoretical part describes objects of the
critical infrastructure. The practical part describes using of the
security audit method. The main emphasis was put on the protection
of the critical infrastructure in the Czech Republic.
Abstract: The purpose of this paper is to contribute to the
enhancement of a hydroelectric plant protection by coordinating
protection measures / existing security and introducing new measures
under a risk management process. In addition, plan identifies key
critical elements of a hydroelectric plant, from its level vulnerabilities
and threats it is subjected to in order to achieve the necessary
protection measures to reduce the level of risk.
Abstract: At the present time, awareness, education, computer
simulation and information systems protection are very serious and
relevant topics. The article deals with perspectives and possibilities of
implementation of emergence or natural hazard threats into the
system which is developed for communication among members of
crisis management staffs. The Czech Hydro-Meteorological Institute
with its System of Integrated Warning Service resents the largest
usable base of information. National information systems are connected to foreign systems,
especially to flooding emergency systems of neighboring countries,
systems of European Union and international organizations where the
Czech Republic is a member. Use of outputs of particular information
systems and computer simulations on a single communication
interface of information system for communication among members
of crisis management staff and setting the site interoperability in the
net will lead to time savings in decision-making processes in solving
extraordinary events and crisis situations. Faster managing of an
extraordinary event or a crisis situation will bring positive effects and
minimize the impact of negative effects on the environment.
Abstract: This paper proposes the application of the Smart
Security Concept in the East Mediterranean. Smart Security aims to
secure critical infrastructure, such as hydrocarbon platforms, against
asymmetrical threats. The concept is based on Anti Asymmetrical
Area Denial (A3D) which necessitates limiting freedom of action of
maritime terrorists and piracy by founding safe and secure maritime
areas through sea lines of communication using short range
capabilities.
Abstract: Risk analysis is considered as a fundamental aspect
relevant for ensuring the level of critical infrastructure protection,
where the critical infrastructure is seen as system, asset or its part
which is important for maintaining the vital societal functions. Article
actually discusses and analyzes the potential application of selected
tools of information support for the implementation and within the
framework of risk analysis and critical infrastructure protection. Use
of the information in relation to their risk analysis can be viewed as a
form of simplifying the analytical process. It is clear that these
instruments (information support) for these purposes are countless, so
they were selected representatives who have already been applied in
the selected area of critical infrastructure, or they can be used. All
presented fact were the basis for critical infrastructure resilience
evaluation methodology development.
Abstract: The organizations of European and Czech critical
infrastructure have specific position, mission, characteristics and
behaviour in European Union and Czech state/business environments,
regarding specific requirements for regional and global security
environments. They must respect policy of national security and
global rules, requirements and standards in all their inherent and
outer processes of supply - customer chains and networks. A
controlling is generalized capability to have control over situational
policy. This paper aims and purposes are to introduce the controlling
as quite new necessary process attribute providing for critical
infrastructure is environment the capability and profit to achieve its
commitment regarding to the effectiveness of the quality
management system in meeting customer/ user requirements and also
the continual improvement of critical infrastructure organization’s
processes overall performance and efficiency, as well as its societal
security via continual planning improvement via DYVELOP
modelling.
Abstract: This paper deals with a protection of the national and
European infrastructure. It is issue nowadays. The paper deals with
the perspectives and possibilities of "smart solutions" to critical
infrastructure protection. The research project deals with computers
aided technologies are used from the perspective of new, better
protection of selected infrastructure objects. Protection is focused on
communication and information channels. These communication and
information channels are very important for the functioning of the
system of protection of critical infrastructure elements.
Abstract: The number of intrusions and attacks against critical
infrastructures and other information networks is increasing rapidly.
While there is no identified evidence that terrorist organizations are
currently planning a coordinated attack against the vulnerabilities of
computer systems and network connected to critical infrastructure,
and origins of the indiscriminate cyber attacks that infect computers
on network remain largely unknown. The growing trend toward the
use of more automated and menacing attack tools has also
overwhelmed some of the current methodologies used for tracking
cyber attacks. There is an ample possibility that this kind of cyber
attacks can be transform to cyberterrorism caused by illegal purposes.
Cyberterrorism is a matter of vital importance to national welfare.
Therefore, each countries and organizations have to take a proper
measure to meet the situation and consider effective legislation about
cyberterrorism.
Abstract: In this paper we propose an intelligent agent approach
to control the electric power grid at a smaller granularity in order to
give it self-healing capabilities. We develop a method using the
influence model to transform transmission substations into
information processing, analyzing and decision making (intelligent
behavior) units. We also develop a wireless communication method
to deliver real-time uncorrupted information to an intelligent
controller in a power system environment. A combined networking
and information theoretic approach is adopted in meeting both the
delay and error probability requirements. We use a mobile agent
approach in optimizing the achievable information rate vector and in
the distribution of rates to users (sensors). We developed the concept
and the quantitative tools require in the creation of cooperating semiautonomous
subsystems which puts the electric grid on the path
towards intelligent and self-healing system.
Abstract: The paper deals with the perspectives and possibilities
of "smart solutions" to critical infrastructure protection. It means that
common computer aided technologies are used from the perspective
of new, better protection of selected infrastructure objects. The paper
is focused on the co-product of the Czech Defence Research Project -
ADAPTIV. This project is carrying out by the University of Defence,
Faculty of Economics and Management at the Department of Civil
Protection. The project creates system and technology for adaptive
cybernetic camouflage of armed forces objects, armaments, vehicles
and troops and of mobilization infrastructure. These adaptive
camouflage system and technology will be useful for army tactic
activities protection and for decoys generation also. The fourth
chapter of the paper concerns the possibilities of using the introduced
technology to the protection of selected civil (economically
important), critical infrastructure objects. The aim of this section
is to introduce the scientific capabilities and potential of the
University of Defence research results and solutions for the practice.