FREE ELECTRONIC LIBRARY - Theses, dissertations, documentation

Pages:     | 1 | 2 || 4 | 5 |   ...   | 9 |

«COOPERATION THEME 10 SECURITY (European Commission C(2007)2460 of 11 June 2007) FP 7 Cooperation Work Programme: Security Changes to the Cooperation ...»

-- [ Page 3 ] --

Technical content / scope: The task is to develop stand off large throughput scanning capabilities required to pick out from a stream suspect items, such as drugs, viri, CBRNE (chemical, biological, radiological and nuclear substances as well as explosives), hidden objects or persons, including both fast narrow scanning in specific streams, and wide area scanning with sufficient granularity to enable law enforcement to intervene. The steps to take will be (a) very fast alerting with low false alarm rates on a broad class of objects and substances, (b) after the alarm and within reasonable time identification of a type of substance and (c) very thorough analysis and profiling on the biological or chemical components of specific substances.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

Topic SEC-2007-1.3-02 Improved control of explosives throughout their “lifecycle”

Technical content / scope: In order to prevent the use as terrorist weapons of commercial explosives and detonators as well as of improvised substances made from widely available precursor chemicals, the task is to tag explosive characteristics of precursor compounds to be able to tag, trace and detect more readily components and detonators and to develop smart secure detonators; to investigate into secure stockpiling, use and transport of explosives.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

–  –  –

Function: Positioning & localisation Topic SEC-2007-1.3-03 Localisation and tracking of components of substance production Technical content / scope: With a view to either preventing production or detecting production and use, the task is to develop novel technologies and innovative approaches for the monitoring of the production, trade, availability and use of chemical components required for the production of certain types of drugs, explosives and agents.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

Topic SEC-2007-1.3-04 Observation through water, metal, ground etc

Technical content / scope: The task is to develop novel technologies and innovative approaches enabling the observation of people, platforms and carriers in complex environments in order to increase surveillance and intervention capabilities. Increasing the surveillance area and performance of future sensor systems should address the lowering of successive obstacles (people, buildings, metal, water, vegetation) that currently inhibit the observation.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

Function: Situation awareness & assessment (surveillance) Topic SEC-2007-1.3-05 Water distribution surveillance Technical content / scope: The task is to further improve the surveillance of water distribution networks for security purposes with respect to the following issues: Design of methodologies to identify new relevant contaminants; modelling of the impact of contamination (preventive and real-time); adaptation and integration of various sensors in a surveillance system; development of tools for the optimal configuration of sensors in a distribution network; tools for the neutralisation of contaminants including the development of methods to decontaminate polluted lines and installations; development of systems for data handling from various sources like sensors, customer information, health complaints, process control, intelligence services and decision support tools. Ongoing actions in particular on the European level need to be taken into account.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

Topic SEC-2007-1.3-06 Secure strategic information management systems

Technical content / scope: The task is to create secure situation awareness systems contributing to combating the activities of organised crime, such as drug and weapons smuggling, complicated money laundering and child pornography trafficking schemes, individual and private sector fraud etc., by automatically combining data from disparate high

Page 13 of 53 FP 7 Cooperation Work Programme: Security

volumes data repositories (e.g. financial, demographic, mobility, law enforcement data sources etc.) and analysing the data to allow complex conclusions to be generated in order to facilitate appropriate, fast and responsible decision making to prevent or respond to security incidents. Legal restrictions must of course be respected. This will include automated analysis of complex and different cultural/domain data with multiple reference models; the ability to handle and combine real-time data feeds and historical databases; the policing of existing information systems. The security of the infrastructure to perform this task is also a key objective.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

Page 14 of 53 FP 7 Cooperation Work Programme: Security

Activity 2: Increasing the Security of infrastructures and utilities The challenge of this activity is to protect critical infrastructures and utilities (both physical and logical systems from e.g. sensitive and administrative buildings (often also of symbolic value), train and subway stations, sensitive manufacturing plants, energy production sites, storage and distribution, to information and communication networks or public events etc.) against being damaged, destroyed or disrupted by deliberate acts of terrorism, natural disasters, negligence, accidents or computer hacking, criminal activity and malicious behaviour. Their direct, often trans-national dependencies and the cascading failures generated in case of failure in one of them (special emphasis is given to the robustness of the power transmission and distribution system due to its underlying operational importance to most others) will be taken into account, as well as the consequential dependencies to the commercial environment. Cost effectiveness will be addressed as one of the driving design parameters. Efficient technological solutions need to be developed. Where no solution exists, the research effort should emphasise low cost solutions; where efficient but costly technologies exist, research efforts should focus on ways to reduce dramatically the cost for similar performances.

Area 2.1: Demonstration projects Topic SEC-2007-2.

1-01. Security of critical infrastructures related to mass transportation (phase 1) The Security Research Call 1 calls for the first phase of this demonstration programme, which will define its strategic roadmap and ensure EU wide awareness.

The scope and technical content of the full demonstration project (phase 2, which will build upon phase 1) will be the demonstration of a consistent and integrated set of mass transportation security systems to secure transport networks, nodes and platforms, taking into account the specific requirements for each sector/mode and the particular cross-border dimension of mass transport. This covers

- Surveillance systems designed to meet specific requirements for mass transportation networks, transfer nodes and platform interiors;

- Interoperability of different surveillance systems managed by different operators and/or between different EU countries;

- Comprehensive threat detection systems fusing data across diverse and distributed networks and analysing threats via spatial/pattern recognition techniques. Detecting, tracking and tracing individuals, crowds and objects within, and across, transport systems, while respecting the personal integrity of individuals;

- Post-event situation analysis systems capable of rapidly accessing and piecing together different multi-media and digital data to re-enact a sequence of event;

–  –  –

- Common operational picture integrating and displaying data from a diverse set of sources on optimised man machine interfaces utilising intelligence based alarm management;

- Neutralisation and containment systems for attack avoidance, suppression or nullification.

The interoperability requirements will drive standardisation in this area.

Scope of Phase 1 (open): The action will define the strategic roadmap required for the demonstration project which should take into account relevant completed, ongoing and planned work and lay out, in a coherent and clear manner, the further research work required.

It will assess the relevant factual and political situation and trends as well as potential classification requirements and issues related to IPR, also with a view to procurement. It will ensure EU wide dissemination of the preparation of the demonstration project proposal to the relevant stakeholders from both the supply and user side. It will also indicate where the cooperation of third country participants is required or recommended.

Call: Security Research Call 1 Funding schemes: Coordination and support action (aiming at supporting research activities).

Expected impact: Through comprehensive preparation (not proposal preparation) of the demonstration project, the action will provide a solid basis for the description of its phase 2 in the Work Programme of Security Research Call 3 in 2009 as well as for sequencing and describing research tasks to be called for in future security Work Programmes. It will achieve qualified EU wide awareness of relevant industries (including SMEs), universities and research establishments of the upcoming demonstration project identifying key players and performance profiles of other required contributors, allowing for their effective and balanced access to the action. It will also achieve qualified EU wide awareness of relevant end users, governments and other bodies, facilitating and providing guidance concerning the real-life implementation of the system of systems to be demonstrated.

Area 2.2: Integration projects

Expected impact: While taking into account the mutual dependency of technology, organisational dynamics and human factors as well as related legal issues, actions in this area will achieve a substantial improvement with respect to performance, reliability, speed and cost. They will also identify standardisation requirements and provide information concerning further research needs with a view to future security Work Programmes.

Through the performance of the integrated technology system, actions will allow product and service developers to verify and optimise their technologies at all development stages. This will reinforce their potential to create important market opportunities for European industry and establish leadership.

Actions will demonstrate the technology based potential for enhancing the effectiveness of European authorities in implementing their security policies and the capabilities of security forces. In addition, the actions will provide guidance for their implementation, including privacy relevant aspects.

The Security Research Call 1 calls for the following actions:

–  –  –

Topic SEC-2007-2.2-01 Integrated protection of rail transportation Technical content / scope: The task is to develop an integrated system to improve the security of rail transportation through better protection of railways and trains, and to reduce disparity in security between European railway systems. This will include the immunity of signal and power distribution systems against electromagnetic terrorism, the detection of abnormal objects on or under ballast; clearance of trains before daily use; control of access to driver’s cabin, detection of unauthorised driver; new methods/tools to isolate and secure luggage; as well as a study and tools to reduce disparity of European railway systems’ security. The action will demonstrate the potential of the European rail transportation systems for improved protection and homogeneity.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

Area 2.3: Capability projects

Expected impact: Actions in this area will provide the (adapted) technology basis and relevant knowledge for security capabilities needed in this (and also other) mission(s), as required by integrating industry and/or (private and/or public) end users, while achieving a significant improvement with respect to performance, reliability, speed and cost. At the same time, actions will reflect the mutual dependency of technology, organisational dynamics, human factors, societal issues as well as related legal aspects. This will reinforce European industry’s potential to create important market opportunities and establish leadership, and it will ensure sufficient awareness and understanding of all relevant issues for the take-up of their outcome (e.g. regarding harmonisation and standardisation, potential classification requirements, international co-operation needs, communication strategies etc.) as well as for further research needs with a view to future security Work Programmes.

The Security Research Call 1 calls for the following actions:

Function: Detection, identification & authentication Topic SEC-2007-2.3-01 Detection of unattended goods and of owner Technical content / scope: In the framework of a public area under video surveillance, the task is to develop novel tools and innovative approaches to (a) the automated real-time detection of the fact that goods (typically luggage) have been abandoned, (b) the fast identification of the individual who left the goods, and (c) the fast determination of the current location of that individual or his/her followed path.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

–  –  –

Pages:     | 1 | 2 || 4 | 5 |   ...   | 9 |

Similar works:

«LONG ISLAND HOUSING SERVICES, INC. La Agencia de Vivienda Justa de los Condados de Nassau y Suffolk Celebrando 46 Años Defendiendo y Aplicando la Ley de Vivienda FAMILIARÍCESE.GUÍA DE LOS DERECHOS DE VIVIENDA JUSTA EN LONG ISLAND © FotografÍa por Bernard J. Kleina Nuestra misión es la eliminación de la discriminación ilegal de vivienda y promoción de vivienda decente y económica por medio del apoyo y la educación. Long Island Housing Services, Inc. Suffolk: 631-567-5111 / Nassau:...»


«Comprendiendo los iniCios de la Complejidad soCial en la Costa del paCífiCo y el altiplano de Guatemala Bárbara Arroyo Departamento de Monumentos Prehispánicos y Coloniales, Dirección General del Patrimonio Cultural y Natural, Guatemala Introducción La evidencia más antigua de ocupación sedentaria en Guatemala se encuentra en la Costa del Pacífico de Guatemala. Esta se fecha para alrededor del año 1700 a.C. La información viene de una serie de investigaciones que se han realizado a lo...»

«Alaska Workers’ Compensation Appeals Commission Assets, Inc., Commerce & Industry Final Decision Insurance Co., Chartis, and Northern Adjusters, Inc., Decision No. 195 April 22, 2014 Appellants/Cross-Appellees, vs. Derrick F. Taylor, AWCAC Appeal No. 13-017 Appellee/Cross-Appellant. AWCB Decision No. 13-0081 AWCB Case Nos. 200512941M and Final decision on appeal from Alaska Workers’ Compensation Board Final Decision and Order No. 13-0081, issued at Anchorage, Alaska, on July 17, 2013, by...»

«.. 'ref, _. '• • E'. 8iidtlOlf Jcd) (3) J ~d6 \ RULE. · 0. Pf1'8J.iI)..,.,···'(:Jl!l~!:k:2 · if July 6,2000 Our Ref. No. 98-733-CC Select Sector SPDR Fund RESPONSE OF THE OFFICE OF CHIEF COUNSEL and Diamonds Trust DIVISION OF INVESTMENT MANAGEMENT File Nos. 811-8837; 811 -9170 Your letter of June 23, 2000 requests our assurance that we would not recommend enforcement action to the Securities and Exchange Commission under Section 12(d)(3) of the Investment Company Act of 1940...»

«IAEA Safety Standards for protecting people and the environment Operational Limits and Conditions and Operating Procedures for Research Reactors Safety Guide No. NS-G-4.4 OPERATIONAL LIMITS AND CONDITIONS AND OPERATING PROCEDURES FOR RESEARCH REACTORS Safety standards survey The IAEA welcomes your response. Please see: http://www-ns.iaea.org/standards/feedback.htm The following States are Members of the International Atomic Energy Agency: AFGHANISTAN GREECE NORWAY ALBANIA GUATEMALA PAKISTAN...»

«  Compulsory Efficient Use of Land (CEUL) for Land Zoning can contrive the rapid change of land use pattern: A Case Study of Charchartala Union, Ashuganj, Brahmanbaria A Dissertation by Mohammad Moniruzzaman Bakaul MAGD Batch V ID No-13372015 Submitted to Institute of Governance Studies BRAC University Dhaka In Partial Fulfillment of the Requirement for the Degree of Master of Arts in Governance and Development (MAGD) 2013‐14 BRAC Institute of Governance and Development BRAC University Dhaka...»

«Publish detail Revolution In Time Clocks And Making Of Modern World books document, also Download PDF Revolution In Time Clocks And Making Of Modern World digital file REVOLUTION IN TIME CLOCKS AND MAKING OF MODERN WORLD PDF Complete data published is really a hard copy manual thats printed REVOLUTION IN TIME CLOCKS AND MAKING OF MODERN WORLD Document nicely bound, and functional. It operates as a reference manual skim the TOC or index, get the page, and stick to the directions detail by...»

«Social Capital and Cyberpower in the African American Community: A Case Study of a Community Technology Center in the Dual City Abdul Alkalimat and Kate Williams (abdul.alkalimat@utoledo.edu and katewill@umich.edu) This book chapter is posted at the University of Michigan by the Alliance for Community Technology. It will also appear in Community Informatics: Community Development Through the Use of Information and Communications Technologies, edited by Leigh Keeble and Brian Loader, London:...»

«Public Disclosure Authorized Public Disclosure Authorized Public Disclosure Authorized Public Disclosure Authorized Colección Banco Mundial De los Derechos a la Realidad Helena Ribe David A. Robalino Ian Walker De los Derechos a la Realidad Incentivos, mercados de trabajo, y el desafío de la protección social universal en América Latina y el Caribe © 2012 Banco Internacional de Reconstrucción y Fomento/Asociación Internacional De Fomento o Banco Mundial 1818 H Street NW Washington DC...»

«The Conceptualisation of Urban Media: FACT’s ‘Disco Window’ An essay by Mike Stubbs, Varvara Guljajeva & Mar Canet Sola When defining public space today, it is important to point out that that largescale privatisation is taking place. For example, large shopping malls aim to create environments for seducing people to spend their spare time in. There are a number of attractions starting from playgrounds and open-air terraces to underground aquariums and in-door skating facilities....»

«NATIONAL HEADQUARTERS BULLETIN VETERANS OF FOREIGNE T I N U.S. B U L L WARS OF THE BULLETIN KANSAS CITY, MISSOURI VOLUME 38, NO. 10 MAY 2014 SERVING THE DESERVING AMERICA’S VETERANS VFW NATIONAL CONVENTION HOUSING: CONVENTION HOUSING: 115th National Convention housing opened February 17, 2014. Housing reservation information is located on the convention website accessed through the main VFW website at www.vfw.org. You may also call the VFW Housing Bureau directly (#888-850-7720 M-F, 7a-6p...»

<<  HOME   |    CONTACTS
2016 www.theses.xlibx.info - Theses, dissertations, documentation

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.