WWW.THESES.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Theses, dissertations, documentation
 
<< HOME
CONTACTS



Pages:     | 1 || 3 | 4 |   ...   | 9 |

«COOPERATION THEME 10 SECURITY (European Commission C(2007)5765 of 29 November 2007) FP 7 Cooperation Work Programme: Security This Work Programme ...»

-- [ Page 2 ] --

Actions within the Security theme build not only on technology gain from the capability projects, and also on research outcomes of other themes of the 7th Framework Programme or of national research programmes. Only issues of European added value are covered in the theme and it is ensured that it is complementary with all other Community actions.

Complementarity with non-EU research will be ensured via the members of the Security Programme Committee configuration.

In general, a network of National Contact Points and in particular network(s) of security research stakeholders (including both the supply and the user side) are seen as instrumental in promoting the dissemination of security research to its end users, national public authorities and citizens alike. Suitable Coordination and support actions to achieve this could also receive funding (see in particular topics in activity 7).

Due to the sensitivity of the Security theme, the Rules for participation12 foresee the possibility of restrictions to the dissemination of the outcome of the actions on a case by case basis. Special provisions will be taken in the grant agreement.

For the Security Research Call 1, proposals must not contain any classified information. This would lead to declaring them ineligible immediately. However, it is possible that the output of COM(2005)705; Article 22

–  –  –

an action needs to be classified or classified inputs are required. In this case proposers have to ensure and provide evidence of the clearance of all relevant persons and facilities. Consortia have to clarify issues such as e.g. access to classified information or export or transfer control with the national authorities of their Member States / Associated Countries prior to submitting the proposal. Proposals need to provide a security aspect letter, indicating the levels of classification required. Appropriate arrangements have to be included in the consortium agreement.

All actions of the Security theme are in principle open to international co-operation to Industrialised countries as well as to ICPC13 countries. However, according to the Specific Programme, parts of the Work Programme can be restricted to EU and associated countries.

Such restriction is not foreseen in the 2007 Work Programme. At this stage, it is also not foreseen to have any ‘specific international co-operation actions’ in the Security theme.

Positively evaluated proposals involving sensitive and classified information, those involving international co-operation as well as those collaborative projects where 75% funding for all participants is foreseen will be flagged to the members of the Security Programme Committee configuration and dealt with according to its Rules for Procedure.

Ethical principles and gender aspects must always be taken into account. The pursuit of scientific knowledge and its technical application towards society requires the talent, perspectives and insight that can only be assured by increasing diversity in the research workforce. Therefore, a balanced representation of women and men at all levels in research projects is encouraged.

Cross-thematic approaches: For all four missions, security is often linked to the interoperability of systems (e.g. for command & control, networked critical infrastructures, border management & security etc.); and often interoperability is an ICT issue. Thus, a Joint Call for Proposals with Theme 3 Information and Communication Technologies is foreseen in 2007 in order to ensure comprehensive coverage.

Security issues could also be regarded as intrinsic elements of several of the other Cooperation themes. The scope of the calls has been carefully defined throughout the themes, in order to avoid gaps or duplication (with a view to the full duration of the 7th Framework Programme, not only the Security Research Call 1). Thus in case of doubt, whether a proposal is fully in scope with the topics presented under this theme, it is recommended to consult as well the Work Programmes of the other Co-operation themes.

Risk-sharing Finance Facility

In addition to direct financial support to participants in RTD actions, the Community will improve their access to private sector finance by contributing financially to the 'Risk-Sharing Finance Facility' (RSFF) established by the European Investment Bank (EIB).

The Community contribution to RSFF will be used, by the Bank, in accordance with eligibility criteria set out in the Work Programme 'Co-operation' (horizontal issues). RSFF support is not conditional on promoters securing grants resulting from calls for proposals ICPC: International Co-operation Partner Countries, see Annex 1.

–  –  –

described herein, although the combination of grants and RSFF-supported financing from EIB is possible.

In accordance with the Specific Programme 'Co-operation', which stipulates that the Community contribution to RSFF will be funded by proportional contributions of all Themes, except Socio-economic Sciences and the Humanities, the Commitment Appropriations for this Theme to RSFF in 2007 will be EUR 4.428 million. This amount will be committed entirely in 2007.

The use of the Community Contribution from the Specific Programme 'Co-operation' will be on a 'first come, first served' basis and will not be constrained by the proportional contribution of Themes.





Further information on the RSFF is given in the Annex 4 of this work programme.

Other activities The theme will support ERA-NET activities14 that develop the cooperation and coordination of research programmes carried out at national or regional level in the Member or Associated States through the networking of research programmes, towards their mutual opening and the development and implementation of joint activities.

ERA-NET projects can network four types of activities: (1) Information exchange – (2) Definition and preparation of joint activities – (3) Implementation of joint activities – (4)

Funding of joint trans-national research actions:

• ERA-NETs launched under FP6 wishing to submit a follow-up proposal under FP7 have to propose a strong coordination action focusing directly on steps three and four, in order to achieve mutual opening and trans-national research via joint/common calls, joint/common programmes or, if appropriate, other joint trans-national actions.

• New ERA-NETs, which address new topics and without any experience from FP6, should address at least the first three steps, but are encouraged to aim at the “four step approach”, as described above.

The Security Research Call 1 offers the possibility to submit a dedicated ERA-NET proposal under Topic SEC-2007-7.0-04 Transparency and networking amongst Member States and Associated Countries.

The funding of projects and activities through the above schemes and the development of the programme will be supported by Calls for Tender for public procurement, which will be issued by the Commission, where appropriate, such as specific studies or services required to achieve the programme objectives.

The Security Research theme has the objectives to contribute both to the security of citizens and to growth, employment and competitiveness of the European security industry. In this context, it will facilitate the various actors to cooperate and coordinate in order to avoid ERA-NET activities will be subject to a joint call across the Specific programme ‘Co-operation’ - see Annex 4.

–  –  –

unnecessary duplication and explore synergies. Therefore, support to studies in the relevant areas of security research is envisaged.

The theme will also support events and conferences, in particular those organised by the

rotating presidency of the European Union, with the objectives of:

• The dissemination of information on activities of FP7 Security research,

• To bring together the main European players of research and development in the field of security.

.

Topic SEC-2007-7.0-07 Support to the European Security Research - SRC’08 The French presidency is hosting the “European Security Research Conference - SRC '08” The conference will take place in Paris on 29 and 30 September 2008 and will allow the participation of about 1000 – 1200 people.

The named beneficiary for the grant is:

Ministère de l’enseignement supérieur et de la recherche 1, rue Descartes 75231 Paris cedex 05 France The EC contribution will not represent more that 50% of the total cost of the conference and is limited to EUR 150 000.

The EC contribution will be implemented as a grant through a support action, funding scheme: Coordination and support action (supporting), to a named beneficiary. It will be evaluated in accordance with the standard FP7 evaluation criteria (including weight and thresholds) and sub-criteria, together with an eligibility, selection and award criteria for the funding scheme as set out in Annex 2 of this work programme

–  –  –

II CONTENT OF CALLS IN 2007 II.1 Security Research Call 1 (FP7-SEC-2007-1) The primary ambition of the Security theme is to provide enhanced security related technologies, systems and systems of systems and to facilitate their take-up for the implementation of security policies and programmes as soon as possible.

Thus the Security Research Call 1 launches the implementation of two demonstration programmes (phases 1) in the two security policy missions Security of infrastructures and utilities and Intelligent surveillance and border security. They will demonstrate integrated innovative systems of systems (focus on highest level building block).

In parallel, and supporting this focus from the other building block levels, novel and improved technologies will be developed, adapted and integrated into systems to be ready for the next generation of integrated security systems of systems to be demonstrated for full scale take-up in the future.

Topic descriptions are deliberately kept rather brief and general in order to allow for a variety of promising technological approaches which may address more than one specific security application. This ensures that in principle more than one proposal can be selected for each topic, thus guaranteeing competition amongst proposals. It is also possible not to select any proposals submitted to a topic at all, if the quality is not sufficient and evaluators do not recommend it.

The Security Research Call 1 is open to the submission of proposals for actions referring to the following topics.

Activity 1: Increasing the Security of citizens The challenge of this activity is to contribute to combating the activities of organised crime (such as drug and weapons smuggling, complicated money laundering and child pornography trafficking schemes, individual and private sector fraud, illegal movement of equipment, technology and knowledge etc.) and terrorism by developing secure information and financial networks, robust secure communications and virtual policing of information infrastructures, including the internet, to uncover and track terrorist activities; to enhance the intelligence and analysis capabilities (capacity and quality) across a range of sectors in concert with digital forensic technology to track, trace and apprehend terrorists; with respect to terrorist weapons to detect, track, trace, identify and neutralise CBRNE (Chemical, Biological, Radiological, Nuclear agents and Explosives) – both ‘traditional’ and ‘home grown’. Speed, robustness and affordability will be the driving design parameters for technological and system solutions.

–  –  –

Area 1.1: Demonstration projects No demonstration programmes foreseen in this activity for Security Research Call 1.

See also chapter IV Indicative priorities for future calls.

Area 1.2: Integration projects Expected impact: While taking into account the mutual dependency of technology, organisational dynamics and human factors as well as related legal issues, actions in this area will achieve a substantial improvement with respect to performance, reliability, speed and cost.

They will also identify standardisation requirements and provide information concerning further research needs with a view to future security Work Programmes.

Through the performance of the integrated technology system, actions will allow product and service developers to verify and optimise their technologies at all development stages. This will reinforce their potential to create important market opportunities for European industry and establish leadership.

Actions will demonstrate the technology based potential for enhancing the effectiveness of European authorities in implementing their security policies and the capabilities of security forces. In addition, the actions will provide guidance for their implementation, including privacy relevant aspects.

The Security Research Call 1 calls for the following actions:

Topic SEC-2007-1.2-01 Intelligent urban environment observation system Technical content / scope: The task is to develop both a fixed and a man portable, integrated, fast, wide area behavioural observation system for individuals, platforms and goods in complex (urban) environments. It should meet surveillance and security tasks including compound security, trafficking of illegal goods, safety monitoring and evacuation on a 24h / 7 days basis. This will include the integration of sensor technologies, data fusion and intelligent observation systems to enable stand-off detection and analysis through barriers, of substances and weapons, of carriers and people as well as behaviour analysis to separate potential perpetrators from crowds and neutralise the threat.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

Topic SEC-2007-1.2-02 Integrated mobile security kit



Pages:     | 1 || 3 | 4 |   ...   | 9 |


Similar works:

«THE WORLD OF ARAB AND MUSLIM CHILDREN IN CHILDREN’S BOOKS Compiled by Judith V. Lechner, Associate Professor Department of Educational Foundations, Leadership, and Technology Auburn University Relatively few books exist in English that give children a vision of the Arab world or of the Muslim religion, but there are some picture and chapter books that are told fom Arab and r Muslim perspectives or sympathetically portray these cultures and avoid stereotypes. I have included both fiction and...»

«Quebracho Vol.18(1,2):47-57 Caracterización de los anillos de crecimiento y su relación con la densidad básica de la madera en Eucalyptus camaldulensis Growth rings caracterization and basic density relationship in Eucalyptus camaldulensis wood Moglia J. G.1; A. M. Giménez2; D. González3 y R. Gerez4 RESUMEN ABSTRACT Los objetivos de este trabajo son verificar la This work aimed to verify the growth rings visualización de los límites en los anillos de boundaries visualization of forty...»

«Evidence Real and Imagined: Thinking Clearly About the “Jesus Family Tomb” Michael S. Heiser, PhD Academic Editor, Logos Bible Software On March 4, 2007, the Discovery Channel aired “The Lost Tomb of Jesus,” a riveting documentary produced by James Cameron, best known for the Oscar-winning motion picture Titanic, and directed by Simcha Jacobovici. The documentary complemented the launch of the publicity campaign for a book on the subject by Jacobovici, co-authored with Charles...»

«Ascites Balvir S Tomar Definition Ascites is of Greek derivation (askhos) which refers to a ‘bag’ or ‘sack’. The word describes pathologic fluid accumulation within the peritoneal cavity (Fig. 9.17.1). Figure 9.17.1 Child with ascites Background Inside the abdomen there is a membrane called the peritoneum which has two layers. One layer lines the abdominal wall and the other layer covers the organs inside the abdominal cavity. The peritoneum produces a fluid that acts as a lubricant and...»

«PUB-1301 Statewide – SP (Rev. 5/02) PÁGINA 1 ESTADO DE NUEVA YORK CÓMO LLENAR LA SOLICITUD PARA ASISTENCIA TEMPORAL (TA) – ASISTENCIA MÉDICA (MA) PROGRAMA DE AHORROS MEDICARE (MSP) CUPONES DE ALIMENTOS (FS) SERVICIOS (S), incluyendo el Cuidado de Crianza (FC) y ASISTENCIA PARA EL CUIDADO DE NIÑOS (CC) Cuando vea “Asistencia Temporal” o “TA” en esta solicitud, se refiere a “Asistencia para Familias” y “Asistencia Red de Seguridad”. A estos dos programas de Asistencia...»

«CRITICAL ANALYSIS OF RESEARCH ON PROJECT SUCCESS IN CONSTRUCTION MANAGEMENT JOURNALS Sarath Gunathilaka, Martin Morgan Tuuli and Andrew R J Dainty Department of Civil & Building Engineering, Loughborough University, Loughborough, Leicestershire, LE11 3TU, UK How to deliver project success has become a prominent discourse in both academic and practitioner debates on project management. However, despite years of research, how to improve the likelihood of successfully delivering a project and the...»

«3 Vielen Dank...... dass Sie sich für einen unserer AV-Receiver entschieden haben. Zu Ihrer eigenen Sicherheit, und um Ihnen den gesamten Funktionsumfang nahe zu bringen, lesen Sie bitte diese Anleitung sorgfältig durch und bewahren Sie sie für späteres Nachschlagen auf. Sollten Sie das Gerät einmal verkaufen, so geben Sie bitte dem Käufer auch diese Anleitung mit. www.dk-digital.com © 2006 Copyright, Hersteller: DK digital GmbH, Germany Wichtige Hinweise, bitte beachten! •...»

«Best Practice Catalog Main Power Transformer Revision 2.0, 8/06/2012 HAP – Best Practice Catalog – Main Power Transformer Prepared by MESA ASSOCIATES, INC. Chattanooga, TN 37402 and OAK RIDGE NATIONAL LABORATORY Oak Ridge, Tennessee 37831-6283 managed by UT-BATTELLE, LLC for the U.S. DEPARTMENT OF ENERGY under contract DE-AC05-00OR22725 Rev. 2.0, 8/06/2012 2 HAP – Best Practice Catalog – Main Power Transformer Contents 1.0 Scope and Purpose 1.1 Hydropower Taxonomy Position 1.1.1 Main...»

«August 2007 Rambling for Rhododendrons: Sikkim 29th April – 16th May 2007 By Christopher Miller Rambling for Rhododendrons: Sikkim 29th April – 16th May 2007 The Greentours / Alpine Garden Society tour of the Sikkim Himalaya provided an ideal opportunity to develop my knowledge of the flora of the region. Through immediate experience of natural habitat I was able to increase my understanding of the cultural requirements of this flora. Moreover the tour provided invaluable botanical...»

«TRANSCRIPT METHAMPHETAMINE: FACT VS. FICTION AND LESSONS FROM THE CRACK HYSTERIA A Conversation With Carl Hart, Bill Piper, Holly Catania and Howard Josepher Moderator: Marykate O’Neil Inroduction: Kasia Malinowska-Sempruch ANNOUNCER: You are listening to a recording of the open society foundations, working to build vibrant and tolerant democracies worldwide. Visit us at OpenSocietyFoundations.org. KASIA MALINOWSKA-SEMPRUCH: When Carl and I had a conversation about (UNINTEL PHRASE) for this...»

«64 ‘The US does ‘We have received inquiries from the European Union, the Council of Europe, and from several not condone...’ individual countries about media reports concerning US conduct in the war on terror. I am going to respond now to those inquiries, as I depart today for Europe. And this will also essentially form the text of the letter that I will send to Secretary Straw, who wrote on behalf of the European Union as the European Union Condoleezza Rice President. Andrew Tyrie MP...»

«UNIVERSIDAD SAN FRANCISCO DE QUITO AESTOP ©Derechos de Autor Leonor Ximena Alvarado Carrasco CONCEPTO DEL PROYECTO En búsqueda de una alternativa rápida y confortable para llegar fácilmente al nuevo aeropuerto de Quito, ubicado a una hora y veinte minutos desde el norte de la capital, nace AEROSTOP. Un hotel de aeropuerto, denominado así por su cercanía al mismo, cuyo objetivo principal es brindar alojamiento a viajeros, tanto de placer como negocios, cuyos domicilios son distantes al...»





 
<<  HOME   |    CONTACTS
2016 www.theses.xlibx.info - Theses, dissertations, documentation

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.