FREE ELECTRONIC LIBRARY - Theses, dissertations, documentation

Pages:     | 1 | 2 || 4 | 5 |   ...   | 9 |

«COOPERATION THEME 10 SECURITY (European Commission C(2007)5765 of 29 November 2007) FP 7 Cooperation Work Programme: Security This Work Programme ...»

-- [ Page 3 ] --

Technical content / scope: The task is to develop an innovative and integrated, mobile security kit for rapid deployment, which can be applied to various situations such as large scale events (e.g. sport or show events) and to early warning / crisis response. The aim is to support and enhance the flexibility and adaptation capabilities of European security forces for preventing or responding to security incidents. This will involve sets of mobile security modules; tools for the protection of special persons; general security of events; interfacing with local security forces; multiple sensors etc.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

–  –  –

Area 1.3: Capability projects Expected impact: Actions in this area will provide the (adapted) technology basis and relevant knowledge for security capabilities needed in this (and also other) mission(s), as required by integrating industry and/or (private and/or public) end users, while achieving a significant improvement with respect to performance, reliability, speed and cost.

At the same time, actions will reflect the mutual dependency of technology, organisational dynamics, human factors, societal issues as well as related legal aspects. This will reinforce European industry’s potential to create important market opportunities and establish leadership, and it will ensure sufficient awareness and understanding of all relevant issues for the take-up of their outcome (e.g. regarding harmonisation and standardisation, potential classification requirements, international co-operation needs, communication strategies etc.) as well as for further research needs with a view to future security Work Programmes.

The Security Research Call 1 calls for the following actions:

Function: Detection, identification & authentication Topic SEC-2007-1.3-01 Stand off scanning and detection of hidden dangerous materials, objects or stowaways, fast and reliable alerting and specification.

Technical content / scope: The task is to develop stand off large throughput scanning capabilities required to pick out from a stream suspect items, such as drugs, viri, CBRNE (chemical, biological, radiological and nuclear substances as well as explosives), hidden objects or persons, including both fast narrow scanning in specific streams, and wide area scanning with sufficient granularity to enable law enforcement to intervene. The steps to take will be (a) very fast alerting with low false alarm rates on a broad class of objects and substances, (b) after the alarm and within reasonable time identification of a type of substance and (c) very thorough analysis and profiling on the biological or chemical components of specific substances.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

Topic SEC-2007-1.3-02 Improved control of explosives throughout their “lifecycle”

Technical content / scope: In order to prevent the use as terrorist weapons of commercial explosives and detonators as well as of improvised substances made from widely available precursor chemicals, the task is to tag explosive characteristics of precursor compounds to be able to tag, trace and detect more readily components and detonators and to develop smart secure detonators; to investigate into secure stockpiling, use and transport of explosives.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

–  –  –

Function: Positioning & localisation Topic SEC-2007-1.3-03 Localisation and tracking of components of substance production Technical content / scope: With a view to either preventing production or detecting production and use, the task is to develop novel technologies and innovative approaches for the monitoring of the production, trade, availability and use of chemical components required for the production of certain types of drugs, explosives and agents.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

Topic SEC-2007-1.3-04 Observation through water, metal, ground etc

Technical content / scope: The task is to develop novel technologies and innovative approaches enabling the observation of people, platforms and carriers in complex environments in order to increase surveillance and intervention capabilities. Increasing the surveillance area and performance of future sensor systems should address the lowering of successive obstacles (people, buildings, metal, water, vegetation) that currently inhibit the observation.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

Function: Situation awareness & assessment (surveillance) Topic SEC-2007-1.3-05 Water distribution surveillance Technical content / scope: The task is to further improve the surveillance of water distribution networks for security purposes with respect to the following issues: Design of methodologies to identify new relevant contaminants; modelling of the impact of contamination (preventive and real-time); adaptation and integration of various sensors in a surveillance system; development of tools for the optimal configuration of sensors in a distribution network; tools for the neutralisation of contaminants including the development of methods to decontaminate polluted lines and installations; development of systems for data handling from various sources like sensors, customer information, health complaints, process control, intelligence services and decision support tools. Ongoing actions in particular on the European level need to be taken into account.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

Topic SEC-2007-1.3-06 Secure strategic information management systems

Technical content / scope: The task is to create secure situation awareness systems contributing to combating the activities of organised crime, such as drug and weapons smuggling, complicated money laundering and child pornography trafficking schemes, individual and private sector fraud etc., by automatically combining data from disparate high

Page 15 of 57 FP 7 Cooperation Work Programme: Security

volumes data repositories (e.g. financial, demographic, mobility, law enforcement data sources etc.) and analysing the data to allow complex conclusions to be generated in order to facilitate appropriate, fast and responsible decision making to prevent or respond to security incidents. Legal restrictions must of course be respected. This will include automated analysis of complex and different cultural/domain data with multiple reference models; the ability to handle and combine real-time data feeds and historical databases; the policing of existing information systems. The security of the infrastructure to perform this task is also a key objective.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

Page 16 of 57 FP 7 Cooperation Work Programme: Security

Activity 2: Increasing the Security of infrastructures and utilities The challenge of this activity is to protect critical infrastructures and utilities (both physical and logical systems from e.g. sensitive and administrative buildings (often also of symbolic value), train and subway stations, sensitive manufacturing plants, energy production sites, storage and distribution, to information and communication networks or public events etc.) against being damaged, destroyed or disrupted by deliberate acts of terrorism, natural disasters, negligence, accidents or computer hacking, criminal activity and malicious behaviour. Their direct, often trans-national dependencies and the cascading failures generated in case of failure in one of them (special emphasis is given to the robustness of the power transmission and distribution system due to its underlying operational importance to most others) will be taken into account, as well as the consequential dependencies to the commercial environment. Cost effectiveness will be addressed as one of the driving design parameters. Efficient technological solutions need to be developed. Where no solution exists, the research effort should emphasise low cost solutions; where efficient but costly technologies exist, research efforts should focus on ways to reduce dramatically the cost for similar performances.

Area 2.1: Demonstration projects Topic SEC-2007-2.

1-01. Security of critical infrastructures related to mass transportation (phase 1) The Security Research Call 1 calls for the first phase of this demonstration programme, which will define its strategic roadmap and ensure EU wide awareness.

The scope and technical content of the full demonstration project (phase 2, which will build upon phase 1) will be the demonstration of a consistent and integrated set of mass transportation security systems to secure transport networks, nodes and platforms, taking into account the specific requirements for each sector/mode and the particular cross-border dimension of mass transport. This covers

- Surveillance systems designed to meet specific requirements for mass transportation networks, transfer nodes and platform interiors;

- Interoperability of different surveillance systems managed by different operators and/or between different EU countries;

- Comprehensive threat detection systems fusing data across diverse and distributed networks and analysing threats via spatial/pattern recognition techniques. Detecting, tracking and tracing individuals, crowds and objects within, and across, transport systems, while respecting the personal integrity of individuals;

- Post-event situation analysis systems capable of rapidly accessing and piecing together different multi-media and digital data to re-enact a sequence of event;

–  –  –

- Common operational picture integrating and displaying data from a diverse set of sources on optimised man machine interfaces utilising intelligence based alarm management;

- Neutralisation and containment systems for attack avoidance, suppression or nullification.

The interoperability requirements will drive standardisation in this area.

Scope of Phase 1 (open): The action will define the strategic roadmap required for the demonstration project which should take into account relevant completed, ongoing and planned work and lay out, in a coherent and clear manner, the further research work required.

It will assess the relevant factual and political situation and trends as well as potential classification requirements and issues related to IPR, also with a view to procurement. It will ensure EU wide dissemination of the preparation of the demonstration project proposal to the relevant stakeholders from both the supply and user side. It will also indicate where the cooperation of third country participants is required or recommended.

Call: Security Research Call 1 Funding schemes: Coordination and support action (aiming at supporting research activities).

Expected impact: Through comprehensive preparation (not proposal preparation) of the demonstration project, the action will provide a solid basis for the description of its phase 2 in the Work Programme of Security Research Call 3 in 2009 as well as for sequencing and describing research tasks to be called for in future security Work Programmes. It will achieve qualified EU wide awareness of relevant industries (including SMEs), universities and research establishments of the upcoming demonstration project identifying key players and performance profiles of other required contributors, allowing for their effective and balanced access to the action. It will also achieve qualified EU wide awareness of relevant end users, governments and other bodies, facilitating and providing guidance concerning the real-life implementation of the system of systems to be demonstrated.

Area 2.2: Integration projects

Expected impact: While taking into account the mutual dependency of technology, organisational dynamics and human factors as well as related legal issues, actions in this area will achieve a substantial improvement with respect to performance, reliability, speed and cost. They will also identify standardisation requirements and provide information concerning further research needs with a view to future security Work Programmes.

Through the performance of the integrated technology system, actions will allow product and service developers to verify and optimise their technologies at all development stages. This will reinforce their potential to create important market opportunities for European industry and establish leadership.

Actions will demonstrate the technology based potential for enhancing the effectiveness of European authorities in implementing their security policies and the capabilities of security forces. In addition, the actions will provide guidance for their implementation, including privacy relevant aspects.

The Security Research Call 1 calls for the following actions:

–  –  –

Topic SEC-2007-2.2-01 Integrated protection of rail transportation Technical content / scope: The task is to develop an integrated system to improve the security of rail transportation through better protection of railways and trains, and to reduce disparity in security between European railway systems. This will include the immunity of signal and power distribution systems against electromagnetic terrorism, the detection of abnormal objects on or under ballast; clearance of trains before daily use; control of access to driver’s cabin, detection of unauthorised driver; new methods/tools to isolate and secure luggage; as well as a study and tools to reduce disparity of European railway systems’ security. The action will demonstrate the potential of the European rail transportation systems for improved protection and homogeneity.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

Area 2.3: Capability projects

Pages:     | 1 | 2 || 4 | 5 |   ...   | 9 |

Similar works:

«HANDBOOK FOR CANDIDATES (At Elections where Electronic Voting Machines are used) Nirvachan Sadan, Ashoka Road New Delhi-110 001 CONTENTS Chapter Particulars Page No. I Preliminary 1-6 -Delimitation and Extent of Constituencies -Photo Electoral Rolls and Electors Photo Identity Cards -Candidate must be an elector II Qualifications & disqualifications 7-20 III Nominations & Allotment of Symbols 21-36 -Form of Nomination Paper -Security deposits -Election Symbols IV Scrutiny of Nominations 37-41 V...»

«DISCUSSION PAPER SERIES IZA DP No. 1372 Does Outsourcing Increase Profitability? Holger Görg Aoife Hanley October 2004 Forschungsinstitut zur Zukunft der Arbeit Institute for the Study of Labor Does Outsourcing Increase Profitability? Holger Görg University of Nottingham and IZA Bonn Aoife Hanley University of Nottingham Discussion Paper No. 1372 October 2004 IZA P.O. Box 7240 53072 Bonn Germany Phone: +49-228-3894-0 Fax: +49-228-3894-180 Email: iza@iza.org Any opinions expressed here are...»

«Simulador de gestión de un empresa productora de bebidas no alcohólicas.-Manual del participanteparticipanteVersión 2014 Simulador de gestión de una empresa productora de bebidas no alcohólicas.INDICE 1. Presentación 2. Descripción básica del entorno de simulación 3. Áreas de decisión. 4. Factores de competitividad y objetivos 5. Evaluación de los resultados. Simulador de gestión de una empresa productora de bebidas no alcohólicas. 1. Presentación Entorno de simulación...»

«SERIES IZA DP No. 8764 PAPER Voluntary Activities and Daily Happiness in the US J. Ignacio Gimenez-Nadal DISCUSSION Jose Alberto Molina January 2015 Forschungsinstitut zur Zukunft der Arbeit Institute for the Study of Labor Voluntary Activities and Daily Happiness in the US J. Ignacio Gimenez-Nadal University of Zaragoza and CTUR Jose Alberto Molina University of Zaragoza and IZA Discussion Paper No. 8764 January 2015 IZA P.O. Box 7240 53072 Bonn Germany Phone: +49-228-3894-0 Fax:...»

«“Displacing and Disciplining Roma Waste Pickers in Belgrade. Who can become a rightful subject of the 'clean' and 'sustainable' city to come?” Eva Schwab* © by Eva Schwab (*) eva_schwab@ymail.com Paper presented at the RC21 International Conference on “The Ideal City: between myth and reality. Representations, policies, contradictions and challenges for tomorrow's urban life” Urbino (Italy) 29 August 2015. http://www.rc21.org/en/conferences/urbino2015/ INTRODUCTION “Environmental...»

«ATLAST Contributors All of the ATLAST workshop participants have been contributors in some way. The early workshops (1992–94) focused on developing computer exercises and projects. A large percent of those workshop participants developed and submitted computer exercises for inclusion in the ATLAST collection. It’s not possible to assign credit to every exercise or project individually, because many of these submissions were actually the result of collaborative efforts during workshops and...»

«Pragmatics 19:1.17-38 (2009) International Pragmatics Association SPEAKING LIKE ASIAN IMMIGRANTS: INTERSECTIONS OF ACCOMMODATION AND MOCKING AT A U.S. HIGH SCHOOL1 Elaine Chun Abstract This article explores the relationship between immigrant and non-immigrant Asian American youth identities and the use of language to manage this relationship. Focusing on everyday interactions at a high school in Texas, the analysis examines how fluent English-speaking Korean and Filipino American students draw...»

«THE BOOK OF ABSTRACTS Table of Contents: Scientific Committee............................................. 5 Policymaking and “Informal Rights”: Evidence from Central and Eastern Europe........................ 7 Political Capitalism as a Broad Social Context of Informality in Serbia................................... 8 How NGOs Influence Government Social Inclusion and Poverty Reduction...»

«Journal of Universal Computer Science, vol. 8, no. 8 (2002), 809-833 submitted: 11/2/02, accepted: 29/4/02, appeared: 28/8/02  J.UCS Scheduling Tasks to a Team of Autonomous Mobile Service Robots in Indoor Enviroments Hartmut Surmann (Fraunhofer Institute for Autonomous Intelligent Systems (AIS) Schloss Birlinghoven, D-53754 Sankt Augustin, Germany, surmann@ais.fhg.de) Antonio Morales (Jaume-I University, Robotic Intelligence Laboratory Campus Riu Sec, Edificio TI, E-12071 Castellon, Spain,...»

«Citation: Hibberd, Penelope (2011) What is the Meaning of Family-Centred Admiral Nursing for Carers? Doctoral thesis, Northumbria University.This version was downloaded from Northumbria Research Link: http://nrl.northumbria.ac.uk/870/ Northumbria University has developed Northumbria Research Link (NRL) to enable users to access the University’s research output. Copyright © and moral rights for items on NRL are retained by the individual author(s) and/or other copyright owners. Single copies...»

«Evaluation of Car Rental Reservation/Management System with Tracking Capability Performance A thesis submitted to Graduate Department of Computer Science, college of Art and Science, in partial fulfillment of the requirements for the degree of Master of Science (Information Technology) University Utara Malaysia Fathi Ali El_Shahawi All rights received 2009 PERMISSION TO USE   In presenting this thesis in partial fulfillment of the requirement for a postgraduate degree from University Utara...»

«REMITTITUR SUGGESTED, MODIFY and AFFIRM; Opinion Filed December 16, 2015. S In The Court of Appeals Fifth District of Texas at Dallas No. 05-14-01137-CV BISHOP ABBEY HOMES, LTD. AND NATHAN HALSEY, Appellants V. BRYON AND PAIGE HALE, Appellees On Appeal from the 439th Judicial District Court Rockwall County, Texas Trial Court Cause No. 1-11-1207 MEMORANDUM OPINION Before Justices Lang-Miers, Brown, and Schenck Opinion by Justice Lang-Miers Appellees Bryon and Paige Hale sued appellants Bishop...»

<<  HOME   |    CONTACTS
2016 www.theses.xlibx.info - Theses, dissertations, documentation

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.