WWW.THESES.XLIBX.INFO
FREE ELECTRONIC LIBRARY - Theses, dissertations, documentation
 
<< HOME
CONTACTS



Pages:     | 1 |   ...   | 2 | 3 || 5 | 6 |   ...   | 9 |

«COOPERATION THEME 10 SECURITY (European Commission C(2007)5765 of 29 November 2007) FP 7 Cooperation Work Programme: Security This Work Programme ...»

-- [ Page 4 ] --

Expected impact: Actions in this area will provide the (adapted) technology basis and relevant knowledge for security capabilities needed in this (and also other) mission(s), as required by integrating industry and/or (private and/or public) end users, while achieving a significant improvement with respect to performance, reliability, speed and cost. At the same time, actions will reflect the mutual dependency of technology, organisational dynamics, human factors, societal issues as well as related legal aspects. This will reinforce European industry’s potential to create important market opportunities and establish leadership, and it will ensure sufficient awareness and understanding of all relevant issues for the take-up of their outcome (e.g. regarding harmonisation and standardisation, potential classification requirements, international co-operation needs, communication strategies etc.) as well as for further research needs with a view to future security Work Programmes.

The Security Research Call 1 calls for the following actions:

Function: Detection, identification & authentication Topic SEC-2007-2.3-01 Detection of unattended goods and of owner Technical content / scope: In the framework of a public area under video surveillance, the task is to develop novel tools and innovative approaches to (a) the automated real-time detection of the fact that goods (typically luggage) have been abandoned, (b) the fast identification of the individual who left the goods, and (c) the fast determination of the current location of that individual or his/her followed path.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

–  –  –

Topic SEC-2007-2.3-02 Detection of abnormal behaviour of vehicles both in wide and small land areas Technical content / scope: (a) Within small, well controlled land areas such as in the proximity of a critical infrastructure under video surveillance or (b) in open land areas which may be relatively cluttered but well controlled with radar sensors, image and pattern processing technology and human behaviour analysis and modelling, the task is to develop novel tools and innovative approaches to automated real-time detection of abnormal behaviour of vehicles (such as suspect trajectory, unusual speed, unexpected manoeuvring etc.). Platforms should supplement existing surveillance systems and be capable of detecting, recognising and classifying movements within areas and also be capable of interfacing to e.g.

acoustic, seismic, passive infra red and chemical / biological sensors and video.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

Topic SEC-2007-2.3-03 Detection of abnormal behaviour

Technical content / scope: The task is to create novel tools and innovative approaches for the reliable and effective automatic and real-time detection of potentially threatening abnormal behaviour of individuals in a crowd or of a group of individuals in a crowd in an open space, e.g. those in relation to large scale events. This will include the definition of the ’abnormal behaviour‘ to be detected; deployment of various sensors types; development of solutions applicable for short and mid-range distance. Privacy and civil liberties of individuals must be respected.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

Function: Situation awareness & assessment (surveillance) Topic SEC-2007-2.3-04 Small area 24 hours surveillance Technical content / scope: The task is to develop novel technologies and innovative approaches enabling for permanent monitoring and surveillance (human beings, vehicles, goods) of the inside and of the surrounding areas of critical infrastructures as well as for permanent information acquisition and information treatment for detection of alert situations.

Solutions must be operational on a 24h basis, under all weather conditions.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

Page 20 of 57 FP 7 Cooperation Work Programme: Security

Activity 3: Intelligent surveillance and enhancing border security The challenge of this activity is to address border security in the context of integrated border management ensuring legitimate trade and flow of people, thus supporting the Schengen cooperation, the efforts of national authorities and those of the European Union’s external borders agency FRONTEX with respect to the convergence of information management systems, interoperability, training and cascading best practice. Actions will refer to issues relevant for all the consecutive tiers of the European border security strategy15. The link to standardisation, regulation and legislation as well as to related testing, evaluation and certification will be crucial. The focus of this Work Programme is on illegal immigration as well as on trafficking of drugs, weapons and illicit substances. With respect to illegal immigration the objective is to develop novel, reliable and scaleable solutions to efficiently identify illegal movements, whilst not unduly impeding the flow of the vast majority of legitimate travellers and vehicles. Naturally, privacy and human rights will need to be taken into account. With respect to the trafficking of drugs, weapons and illicit substances such as CBRNE (Chemical, Biological, Radiological, Nuclear and Explosives) agents, the objective is to create a coordinated and integrated security system to ensure the security of goods supply chains and logistics networks, while addressing traceability, standardisation and more affordable robust solutions as well as reduction of unit cost and screening times.16 Area 3.1: Demonstration projects Topic SEC-2007-3.1-01 Integrated border management system (phase 1) The Security Research Call 1 calls for the first phase of this demonstration programme, which will define its strategic roadmap and ensure EU wide awareness.





The scope and technical content of the full demonstration project (phase 2, which will build upon phase 1) will be the demonstration of a comprehensive and integrated border management system relating to the Schengen co-operation and the European Union’s external borders capable of providing concentric layers of protection from pre-entry control measures through to co-operation inside and between Member States and Associated Countries. This

comprises:

- Surveillance systems to improve situational awareness and detect anomalous behaviour of people and platforms (vehicles, boats, aircraft);

- Identity management systems including documentation, equipment and supporting databases to accurately identify and authenticate individuals, goods and platforms;

- Information management systems to fuse data from disparate systems (identity management, intelligence etc.) in order to improve decision making;

As part of the definition of the EU Border Management Strategy, see Council Conclusions of Justice Home Affairs Council of 20-22 September 2006.

Actions under this activity can take up solutions provided e.g. by GMES (see theme 9 Space) or Galileo (see theme 7 Transport (including Aeronautics)).

–  –  –

- Secure communication systems for improved co-operation between national and international border control authorities;

- Positioning and localisation systems to track and trace individuals, goods and platforms;

- Advanced training methods, tools and systems based on true representation simulation systems;

- Improved architectures, processes and systems for border security including extending the legal borders to departure points outside of the EU perimeter.

For the demonstration project to be effective, widespread deployment is required, for which innovative business models will be needed.

Scope of Phase 1 (open): The action will define the strategic roadmap required for the demonstration project which should take into account relevant completed, ongoing and planned work and lay out, in a coherent and clear manner, the further research work required.

It will assess the relevant factual and political situation and trends as well as potential classification requirements and issues related to IPR, also with a view to procurement. It will ensure EU wide dissemination of the preparation of the demonstration project proposal to the relevant stakeholders from both the supply and user side. It will also indicate where the cooperation of third country participants is required or recommended.

Call: Security Research Call 1 Funding schemes: Coordination and support action (aiming at supporting research activities).

Expected impact: Through comprehensive preparation (not proposal preparation) of the demonstration project, the action will provide a solid basis for the description of its phase 2 in the Work Programme of Security Research Call 3 in 2009 as well as for sequencing and describing research tasks to be called for in future security Work Programmes. It will achieve qualified EU wide awareness of relevant industries (including SMEs), universities and research establishments of the upcoming demonstration project, identifying key players and performance profiles of other required contributors, allowing for their effective and balanced access to the action. It will also achieve qualified EU wide awareness of relevant end users, governments and other bodies, facilitating and providing guidance concerning the real-life implementation of the system of systems to be demonstrated.

Area 3.2: Integration projects

Expected impact: While taking into account the mutual dependency of technology, organisational dynamics and human factors as well as related legal issues, actions in this area will achieve a substantial improvement with respect to performance, reliability, speed and cost. They will also identify standardisation requirements and provide information concerning further research needs with a view to future security Work Programmes.

Through the performance of the integrated technology system, actions will allow product and service developers to verify and optimise their technologies at all development stages. This

Page 22 of 57 FP 7 Cooperation Work Programme: Security

will reinforce their potential to create important market opportunities for European industry and establish leadership.

Actions will demonstrate the technology based potential for enhancing the effectiveness of European authorities in implementing their security policies and the capabilities of security forces In addition, the actions will provide guidance for their implementation, including privacy relevant aspects.

The Security Research Call 1 calls for the following actions:

Topic SEC-2007-3.2-01 Main port area security system (including containers) Technical content / scope: The task is to create an integrated port area (land, sub-surface, water) security system capable of providing accurate situational awareness, based on various sources and integrating all result streams, and alerting security operators to required interventions, while doing uninterrupted logistics business. The system will improve situation awareness at main ports through the monitoring and tracking of complex port environments as a consequence of the continuous arrival and departure of cargo (containers), ships, vehicles, staff and passengers, and also the potential threats by boats and swimmers etc. This will include mobile and fixed detection and recognition systems in order to provide intelligent event detection, supporting the decision control; investigation into cargos scanner outputs fused with shipping manifest information, external risk assessment and a-priori threat knowledge which allows for automatic anomaly detection.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

Topic SEC-2007-3.2-02 Unregulated land borders and wide land surveillance system

Technical content / scope: The task is to develop an integrated, adaptable land border and large area (including rough or devastated environments) surveillance system. It will be able to detect and locate (the movements of) individuals, vehicles, and hazardous substances (e.g.

CBRNE) crossing unregulated land borders and, when required, track and trace their movements thereafter. It will combine novel dedicated remote or autonomous platforms equipped with multi-sensor data acquisition systems (of different types such as chemical and biological) with active imaging (such as radar, infrared, visible). These data will be further processed and integrated, e.g. including their fusion with navigation information and terrain databases. A central display system will present the large amounts of information in an easily managed format that facilitates the priorisation of alarm events, tracks responses, records events for future analysis and supports the human interface with Security personnel.

The capacities offered by the GMES17 services developed by the Space theme will be fully exploited.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

Global Monitoring of Environment and Security

–  –  –

Topic SEC-2007-3.2-03 Integrated check points security Technical content / scope: The task is to create an advanced integrated check point system to enhance the performance of the existing screening portals at regulated border crossing or other comparable checkpoints for individuals, vehicles and platforms. This will include advanced detection technologies for threats (e.g. weapons, CBRNE). Detection will be integrated with automatic video analysis systems, multi-biometrics and mobile OCR technologies. Eventually a shared database of information / intelligence between the European border security operators will improve situation awareness. The system shall respect the privacy and civil liberties of individuals.

Call: Security Research Call 1 Funding scheme(s): Collaborative project.

Area 3.3: Capability projects



Pages:     | 1 |   ...   | 2 | 3 || 5 | 6 |   ...   | 9 |


Similar works:

«Public Disclosure Authorized NUEVOS MODELOS PARA EL ACCESO UNIVERSAL DE LOS SERVICIOS DE TELECOMUNICACIONES EN AMÉRICA LATINA Public Disclosure Authorized INFORME COMPLETO Public Disclosure Authorized Public Disclosure Authorized Mayo 2007 THE WORLD BANK NUEVOS MODELOS PARA EL ACCESO UNIVERSAL DE LOS SERVICIOS DE TELECOMUNICACIONES EN AMÉRICA LATINA LECCIONES DEL PASADO Y RECOMENDACIONES PARA UNA NUEVA GENERACIÓN DE PROGRAMAS DE ACCESO UNIVERSAL PARA EL SIGLO XXI INFORME COMPLETO FORO...»

«Ágora VI Los informes sobre el capital humano ¿Es posible informar sobre el capital humano, y en caso afirmativo, por qué motivo y de qué manera? Salónica, 24 y 25 de junio de 1999 ES Ágora VI Los informes sobre el capital humano: ¿Es posible informar sobre el capital humano, y en caso afirmativo, por qué motivo y de qué manera? Salónica, 24 y 25 de junio de 1999 Cedefop Panorama series; 20 Luxemburgo: Oficina de Publicaciones Oficiales de las Comunidades Europeas, 2002 Puede...»

«Guía del Comercio Electrónico Cómo empezar Índice 1. Comercio Electrónico: oportunidades y beneficios 2. El éxito online es cuantificable: indicadores de éxito 3. Las expectativas de tus clientes 3.1 ¿Qué productos son adecuados para el comercio online?4. El factor clave del éxito: la diferencia es lo que cuenta 4.1 Usabilidad: pónselo fácil a tus clientes 4.2 Confianza y seguridad: el fundamento de todo negocio 4.3 Marketing y ventas 4.4 Servicio al cliente: la posventa equivale a...»

«Digital Imaging Basics by Melanie Cofield Information Technology Lab School of Information The University of Texas at Austin Summer 2005 Introduction Digital imaging has become more than just a popular pastime in contemporary culture. Personal computers, in addition to a plethora of hand-held electronic devices, have become the preferred mode of communication for increasingly large portions of the population. Digital cameras and camera phones have made taking, processing, and sharing photos...»

«Alabama Nursing Home Association MEMORANDUM Date: February 26, 2014 To: Administrators and Activity & Social Service Personnel From: John Matson, Director of Communications RE: Ms. Alabama Nursing Home Pageant 2014 Thank you for your interest in the 2014 Ms. Alabama Nursing Home Pageant. This packet includes guidelines for conducting your own facility pageant and instructions for entering your contestant in the Ms. Alabama Nursing Home Pageant. Please read this information thoroughly and...»

«SUSTENTO AL ENFOQUE MULTIDIMENSIONAL DE LA CREACIÓN DE VALOR Farré, Daniel* * Facultad Cs. Económicas. Universidad de Buenos Aires Argentina E-mail: DFarre@pdigma.com.ar Resumo Si estamos de acuerdo con la tendencia de los agentes económicos a manejarse con una filosofía de valor, y entendiendo que esta es necesariamente subjetiva e individual, la utilización de modelos de decisión considerando sólo los objetivos económicos del propietario limita al decisor a información “autista”...»

«Three Oswego County Brothers in the Civil War and After: A Review of the Scriber Family and the 24th, 110th, and 184th NYSV Infantries By Kent Scriber Ithaca, New York Three Oswego County Brothers in the Civil War and After: A Review of the Scriber Family and the 24th, 110th, and 184th NYSV Infantries by Kent Scriber Ithaca, New York January 3, 2014 Danby Press Ithaca, New York Contents Chapter 1 Introduction..7 Chapter 2 Early Background.. 13 Chapter 3 Oswego County Answering the Call..19...»

«55 ion and Ot x bila leaga Zi ria O rra labar Ge O r o Zig 55 ion and Ot x a ibil Oleaga z ra barria er la G O r igo Z ia rr aba Ol r igo Z Azaleko argazkia: Milizianoak guardian. Otxandioko kanpandorrean. Olabarria Oleaga, Zigor Gerra Zibila Otxandion / Zigor Olabarria Oleaga. – Donostia : Eusko Ikaskuntza, 2011. 238 or. : ir. ; 24 cm. – (Lankidetzan ; 55) ISBN: 978-84-8419-217-6 I. Olabarria Oleaga, Zigor II. Bilduma III. Tit. Eusko Ikaskuntzak eta Otxandioko Udalak eskertzen diote...»

«TINY ELF CAKE TUTORIAL Learn how to make this cute Tiny Elf Cake!Included in this downloadable tutorial: Cake & Icing Recipes Templates for the elf hat Instructions how to stack 32 pages of step by step picture instructions Instructions how to make perfect stripes Skill Level: Beginner/Intermediate Ginger Soave, Cake Artist As seen on TLC’s Next Great Baker, Season 4 The Icing on the Cake SUPPLIES: Cake & Icing recipes included Templates: Vanilla Pound Cake Elf Hat Template provided...»

«Ryerson University Digital Commons @ Ryerson Theses and dissertations 1-1-2012 Thermal Degradation Of High Molecular Weight Polyethylene To Obtain Low Molecular Weight Polyethylene Wax Michael J. D'Amato Ryerson University Follow this and additional works at: http://digitalcommons.ryerson.ca/dissertations Part of the Chemical Engineering Commons Recommended Citation D'Amato, Michael J., Thermal Degradation Of High Molecular Weight Polyethylene To Obtain Low Molecular Weight Polyethylene Wax...»

«hotel atlántico madrid hotel atlántico madrid Hotel Atlántico**** in Madrid Spanien 9.1 Bewertungen | Zoover 5 Hotelbewertungen für Hotel Atlántico**** (Madrid Madrid Spanien). Durchschnittsnote: 9.1 von 10. "Ein bombastisches Hotel", Hotel Atlantico in Madrid Hotelgäste über Hotel Atlantico in Madrid : "Ein bombastisches Hotel". Hotelbewertungen beim Testsieger HolidayCheck vergleichen und günstig Urlaub buchen Hotel Atlantico (Madrid, Espagne) : voir 2 Réserver...»

«GRUMA, S.A.B. DE C.V. Calzada del Valle 407 Ote. Colonia del Valle San Pedro Garza García, Nuevo León 66220, México www.gruma.com ANNUAL REPORT FILED IN ACCORDANCE WITH THE GENERAL PROVISIONS APPLICABLE TO SECURITIES’ ISSUERS AND OTHER SECURITIES MARKET’S PARTICIPANTS FOR THE YEAR ENDED DECEMBER 31, 2015. As of December 31, 2015, our capital stock is represented by 432,749,079 ordinary, registered, Series “B”, Class I no par value shares. Such securities are registered in the...»





 
<<  HOME   |    CONTACTS
2016 www.theses.xlibx.info - Theses, dissertations, documentation

Materials of this site are available for review, all rights belong to their respective owners.
If you do not agree with the fact that your material is placed on this site, please, email us, we will within 1-2 business days delete him.