Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "critical Infrastructure" wg kryterium: Temat


Tytuł:
Technologies for monitoring the technical condition of transport infrastructure objects based on the coefficient of correlation between critical values of noise and useful signals
Autorzy:
Aliev, Telman
Musaeva, Naila
Powiązania:
https://bibliotekanauki.pl/articles/2203895.pdf
Data publikacji:
2022
Wydawca:
Politechnika Śląska. Wydawnictwo Politechniki Śląskiej
Tematy:
noise
useful signal
noisy signal
transport infrastructure object
monitoring
defect
dynamics of malfunction development
critical value of noise
correlation coefficient
szum
użyteczny sygnał
głośny sygnał
obiekt infrastruktury transportowej
monitorowanie
defekt
dynamika rozwoju usterki
wartość krytyczna hałasu
współczynnik korelacji
Opis:
Transport infrastructure objects are exposed to a large number of loads, which cause the formation of displacements, bends, wear, cracks, breakdowns, corrosion, and other defects. It is shown that at the moment of initiation of malfunctions in objects, the noise of the noisy signals coming from the corresponding sensor takes critical values that correlate with useful signals. Therefore, algorithms are developed for calculating the probability of random noise accepting critical values, a coefficient of correlation between the critical values of the noise and the useful component, and a relay cross-correlation function. Technologies for monitoring the technical condition of transport infrastructure objects are proposed based on the estimates of the developed noise characteristics. Computational experiments are conducted, and the reliability of the developed algorithms and technologies is confirmed.
Źródło:
Transport Problems; 2022, 17, 2; 213--224
1896-0596
2300-861X
Pojawia się w:
Transport Problems
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
A biochemical multi-species quality model of a drinking water distribution system for simulation and design
Autorzy:
Arminski, K.
Zubowicz, T.
Brdys, M. A.
Powiązania:
https://bibliotekanauki.pl/articles/907619.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Zielonogórski. Oficyna Wydawnicza
Tematy:
multi species
chloramine
quality
drinking water
distribution system
critical infrastructure system
chloramina
jakość
woda pitna
system dystrybucji
infrastruktura krytyczna
Opis:
Drinking Water Distribution Systems (DWDSs) play a key role in sustainable development of modern society. They are classified as critical infrastructure systems. This imposes a large set of highly demanding requirements on the DWDS operation and requires dedicated algorithms for on-line monitoring and control to tackle related problems. Requirements on DWDS availability restrict the usability of the real plant in the design phase. Thus, a proper model is crucial. Within this paper a DWDS multi-species quality model for simulation and design is derived. The model is composed of multiple highly inter-connected modules which are introduced to represent chemical and biological species and (above all) their interactions. The chemical part includes the processes of chloramine decay with additional bromine catalysis and reaction with nitrogen compounds. The biological part consists of both heterotrophic and chemo-autotrophic bacteria species. The heterotrophic bacteria are assumed to consume assimilable organic carbon. Autotrophs are ammonia oxidizing bacteria and nitrite oxidizing bacteria species which are responsible for nitrification processes. Moreover, Disinfection By-Products (DBPs) are also considered. Two numerical examples illustrate the derived model’s behaviour in normal and disturbance operational states.
Źródło:
International Journal of Applied Mathematics and Computer Science; 2013, 23, 3; 571-585
1641-876X
2083-8492
Pojawia się w:
International Journal of Applied Mathematics and Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Opening of offshore oil business in Mexico and associated framework to cope with potential maritime security threats
Autorzy:
Ávila-Zúñiga-Nordfjeld, A.
Dalaklis, D.
Powiązania:
https://bibliotekanauki.pl/articles/117224.pdf
Data publikacji:
2018
Wydawca:
Uniwersytet Morski w Gdyni. Wydział Nawigacyjny
Tematy:
offshore oil business
ISPS Code
critical offshore infrastructure
offshore technology
Port Facility Security Plan (PFSP)
port’s security program
Mexican ports
maritime security
Opis:
After 75 years of State oil monopoly, Mexico performed the first business oil round in 2015 involving the private sector. This auction-round offered 14 oil exploration fields located on the continental shelf to private companies. The development and exploitation of these hydrocarbon fields faces significant challenges regarding security. The economic loss for theft of hydrocarbons through illegal connections to pipelines is estimated to 973 million, 125 thousand U.S. dollar, only for the year of 2014. While productive research has been made, it has mainly focused on transportation systems and basically, pipelines. The development and establishment of policies prioritizing maritime security and protection of critical offshore infrastructure against theft of hydrocarbons, drugs organizations and terror attacks needs to be included in the national agenda to improve maritime security and mitigate potential security threats at sea, including damage to the marine environment. This could increase the trust of investors and stakeholders and would contribute to the faster development of new exploration and production fields. While the International Ship and Port Facility Security Code (ISPS Code) is the cornerstone for the construction of the port's security program and establishes the requirements of the Port Facility Security Plan (PFSP), including oil port facilities, it has not been fully implemented in several important Mexican ports. It is concluded that some important ports lack many of the core security processes, procedures and controls that should be included in any PFSP. This article briefly reviews the situation of the oil industry from a security perspective and discusses key elements of maritime security; addressing the necessity of the inclusion of maritime security and protection of critical oil infrastructure offshore in the national agenda that would provide for future research directions in the maritime security domain and contribute to the establishment of a national maritime security policy.
Źródło:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation; 2018, 12, 1; 173-179
2083-6473
2083-6481
Pojawia się w:
TransNav : International Journal on Marine Navigation and Safety of Sea Transportation
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Zarządzanie kryzysowe na przykładzie sektora węglowego w Polsce
Crisis management on the example of the coal sector in Poland
Autorzy:
Bałamut, Anna
Powiązania:
https://bibliotekanauki.pl/articles/31342211.pdf
Data publikacji:
2024
Wydawca:
Krakowska Akademia im. Andrzeja Frycza Modrzewskiego
Tematy:
kryzys
zarządzanie
węgiel
bezpieczeństwo
Polska
strategia
infrastruktura krytyczna
crisis
management
coal
security
Polska
strategy
critical infrastructure
Opis:
Ostatnich kilka lat przyniosło wiele zmian w kształcie sektora energetycznego w Polsce. Dywersyfikacja kierunków i źródeł energii jest od dawna elementem polityki bezpieczeństwa energetyczno-ekologicznego nie tyko Polski, ale i całej Unii Europejskiej. Pozostaje pytanie, jak Polska radzi sobie z dostosowaniem rynku energii do polityki nisko- lub zeroemisyjności UE, z ograniczeniem dostaw surowców z Rosji i z rosnącymi cenami surowców. Sytuacja kryzysowa może przerodzić się w sukces przedsiębiorstwa (w tym przypadku – państwa), jeżeli działania zostaną podjęte w sposób szybki, efektywny i uwzględniający perspektywę czasową, zarówno krótko- jak i długoterminową. Drugi element to zasobność państwa w zaplecze surowcowe, podmiotowe (relacje na poziomie lokalnym, regionalnym, krajowym i międzynarodowym) oraz sprawnie funkcjonujący mechanizm i struktura, która umiejętnie rozdziela zadania. Skonkretyzowanie zadań i rozdzielenie odpowiedzialności pozwalają na weryfikację działań i ich skrupulatną ocenę. Nie można pomijać też tzw. czynników okolicznościowych, które stanowią elementy składowe zaistniałej sytuacji i dają jej pełny obraz (kryzys z dominacją czynników wewnętrznych lub zewnętrznych).
The last few years have brought many changes to the shape of the energy sector in Poland. Diversification of directions and sources of energy has long had its place in the policy of energy and ecological security not only in Poland, but also in the European Union. The question is how Poland coped with adapting the energy market to the EU’s low- or zero-emission policy, how it coped with the reduction of supplies of raw materials from Russia, how it coped with the rising prices of raw materials. A crisis situation can turn into a success for an enterprise (in this case, the state) if actions are taken in a quick, effective and time-sensitive manner, both in the short and long term. The second element is the state’s wealth in raw materials, subjective resources (relations at the local, regional, national and international level) as well as an efficiently functioning mechanism and structure that skillfully distributes tasks. Specifying tasks and separating responsibilities allows for verification of activities and meticulous evaluation of them. Also the so-called circumstantial factors cannot be omitted, that constitute the components of the existing situation and give a full picture of it (crisis dominated by internal or external factors).
Źródło:
Bezpieczeństwo. Teoria i Praktyka; 2024, LIV, 1; 61-76
1899-6264
2451-0718
Pojawia się w:
Bezpieczeństwo. Teoria i Praktyka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Krytyczne uwagi dotyczące bezpieczeństwa infrastruktury krytycznej
Critical Remarks Concerning the Security of Critical Infrastructure
Autorzy:
Banasik, Mirosław
Bagińska, Julia
Powiązania:
https://bibliotekanauki.pl/articles/2139722.pdf
Data publikacji:
2019-12-31
Wydawca:
Wydawnictwo Naukowe Dolnośląskiej Szkoły Wyższej
Tematy:
bezpieczeństwo
infrastruktura krytyczna
ochrona
zagrożenia
uwarunkowania bezpieczeństwa
security
critical infrastructure
protection
threat
security determinants
Opis:
Pojęcia infrastruktury i infrastruktury krytycznej są różnie interpretowane i w większości przypadków nie uwzględniają konsekwencji zagrożeń. Celem artykułu było przedstawienie wyników badań nad oceną teorii bezpieczeństwa infrastruktury krytycznej. W artykule przedstawiono interpretacje pojęcia infrastruktura krytyczna i jej autorską definicję. Wyjaśniono uwarunkowania bezpieczeństwa infrastruktury krytycznej i wskazano na kluczowe elementy decydujące o jej bezpieczeństwie.
The notions of infrastructure and critical infrastructure in particular are ambiguous and in most cases do not take into account the consequences of threats. The aim of the article was to present the results of research on evaluation of critical infrastructure security theory. The article presents interpretations of the notion critical infrastructure and its author's definition. It clarifies the security determinants of critical infrastructure and points to the key elements determining its security.
Źródło:
Rocznik Bezpieczeństwa Międzynarodowego; 2019, 13, 2; 69-88
1896-8848
2450-3436
Pojawia się w:
Rocznik Bezpieczeństwa Międzynarodowego
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
PREDICT project: PREparing for the Domino effect In Crisis siTuations
Autorzy:
Barbarin, B.
Dominique, S.
Powiązania:
https://bibliotekanauki.pl/articles/2069296.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
predictive tool
decision support system
critical infrastructure
modelling
Opis:
The PREDICT project aims at delivering a comprehensive solution (PREDICT Suite) for dealing with cascading effects in multi-sectorial crisis situations covering aspects of critical infrastructures. The PREDICT solution based on the three following pillars: methodologies, models and software tools, will increase the awareness and understanding of cascading effects in crisis situations. Two types of tools that will be coupled together are being developed: a decision support system and a foresight and prediction tool. Three test cases are being elaborated in three different location across Europe to validate the PREDICT suite. The decision makers will benefit from the PREDICT Suite which will improve their capability to respond and enhancing their preparedness on domino effects.
Źródło:
Journal of Polish Safety and Reliability Association; 2015, 6, 3; 9--14
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Planning and Organising Protection of Critical Infrastructure
Planowanie i organizowanie ochrony infrastruktury
Autorzy:
Barć, Marek
Powiązania:
https://bibliotekanauki.pl/articles/22444307.pdf
Data publikacji:
2022
Wydawca:
Uniwersytet Rzeszowski. Wydawnictwo Uniwersytetu Rzeszowskiego
Tematy:
infrastruktura krytyczna
ochrona
system ochrony
plan ochrony
critical infrastructure
protection
security system
protection plan
Opis:
Artykuł poświęcony jest planowaniu i organizacji ochrony infrastruktury krytycznej. Wskazano w nim sposób planowania oraz przedstawiono układ planu ochrony infrastruktury krytycznej. Najważniejszą rzeczą jest ochrona krytycznych elementów infrastruktury, z których obywatele korzystają na co dzień. Mowa więc w artykule o systemach zaopatrzenia w energię, zasobach energetycznych i paliwach, systemie zaopatrzenia w żywność i wodę. A przede wszystkim o systemach finansowych, opiece zdrowotnej i ICT.
The article is devoted to planning and organizing critical infrastructure protection. The planning method was indicated there, and the layout of the critical infrastructure protection plan was presented. The most important thing is to protect critical infrastructure components that citizens use on a daily basis. So I am talking in the article about energy supply systems, energy resources and fuels, food and water supply system. And above all about financial systems, healthcare and ICT.
Źródło:
Polityka i Społeczeństwo; 2022, 20, 2; 5-21
1732-9639
Pojawia się w:
Polityka i Społeczeństwo
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Rodzaje ochrony infrastruktury krytycznej
Types of critical infrastructure protection
Autorzy:
Barć, Marek
Powiązania:
https://bibliotekanauki.pl/articles/2053184.pdf
Data publikacji:
2021
Wydawca:
Akademia Marynarki Wojennej. Wydział Dowodzenia i Operacji Morskich
Tematy:
infrastruktura krytyczna
ochrona
system ochrony
plan ochrony
critical infrastructure
security
security system
security plan
Opis:
Ochrona infrastruktury krytycznej to proces, który obejmuje dużą liczbę obszarów zadaniowych i kompetencji oraz angażujący wiele zainteresowanych stron. Proces ten obejmuje wszelkie działania zmierzające do zapewnienia funkcjonalności, ciągłości działań i integralności infrastruktury krytycznej, zakłada również stopniowe dochodzenie do oczekiwanego rezultatu oraz nieustanne doskonalenie.
One of the main tasks of internal security is to guarantee the functionality of the critical infrastructure systems. The protection of critical infrastructure, so important for the security of the state and its citizens, is also the most important task for the heads of government and local government administration. Access to this type of services becomes a key issue from the point of view of the efficient functioning and development of a modern state, society and economy. These services and the infrastructure that provides them have been referred to as critical infrastructure. As a result of events caused by natural or human activities, critical infrastructure may be destroyed or damaged. The consequence may be a threat to the continuity of key services, and thus the property, health or even life of citizens. Taking into account also the fact that such incidents negatively affect the economic development of the state, it should be stated that the critical infrastructure plays a key role in the functioning of the state and the life of its citizens, and its protection is one of the priorities for the Polish state. Critical infrastructure protection is a process that covers a large number of task areas and competences, and involves many stakeholders. This process includes all activities aimed at ensuring functionality and continuity of activities an integrity of the critical infrastructure, it also assumes a gradual achievement of the expected result and continuous improvement.
Źródło:
Rocznik Bezpieczeństwa Morskiego; 2021, XV; 1-15
1898-3189
Pojawia się w:
Rocznik Bezpieczeństwa Morskiego
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Nieużytkowane studia - recyrkulacja zagrożeń
Unexploited (artesian) wells-recycling of hazards
Autorzy:
Baumgart, E.
Flizikowski, J.
Powiązania:
https://bibliotekanauki.pl/articles/2071345.pdf
Data publikacji:
2010
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
infrastruktura krytyczna
zaopatrzenie w wodę
critical infrastructure
water supply
Opis:
Wody podziemne stanowią bardzo cenne źródło życia dla wszystkich organizmów. Istnieje wiele zagrożeń warstwy wodonośnej. Jednym z nich są nieużytkowane ujęcia wód podziemnych. Scharakteryzowano punktowe zagrożenia w zakresie: zrzutów ścieków, produktów korozji, rozkładu tworzyw, urządzeń i instalacji zalegających w warstwie wodonośnej, wskazano możliwości poprawy jakości wód podziemnych przez ograniczania zagrożeń krytycznej infrastruktury.
An attempt of analysis of chemical pore-forming residue in fragmented samples of porous polypropylene is presented in the paper. A standard method for the determination of density of porous polymer materials was used in tests. The creep speed indicator, MFR, was also measured and its values were treated as an approximate benchmark of waste porophor content in polymer. Variable technological parameters of injection process including two temperature profiles of clamping system and variable mould temperature, and also two values of clamp pressure were applied. Key words: porous polymer, plastic processing, plastic density
Źródło:
Inżynieria i Aparatura Chemiczna; 2010, 5; 18-19
0368-0827
Pojawia się w:
Inżynieria i Aparatura Chemiczna
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Reliability and vulnerability of transformers for electricity transmission and distribution
Autorzy:
Berg, H.
Fritze, N.
Powiązania:
https://bibliotekanauki.pl/articles/2069269.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
critical infrastructure
transformer
reliability
ageing
blackouts
Opis:
In the last years the failure frequency of transformers increased, e.g. due to ageing or external hazards. In particular fires and explosions of main oil-filled transformers are considered as critical. Therefore, international experiences of transformer failures at nuclear and non-nuclear power plants and at substations have been investigated in more detail. Consequences of transformer failures with respect to a reliable electricity transmission and distribution as well as measures to enhance the reliability of critical infrastructure and to avoid blackouts are addressed.
Źródło:
Journal of Polish Safety and Reliability Association; 2015, 6, 3; 15--24
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Critical infrastructure and resilience goals
Autorzy:
Berg, H. P.
Powiązania:
https://bibliotekanauki.pl/articles/2069198.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
critical infrastructure
reliability
resilience
robustness
Opis:
Critical infrastructure risks pose a special problem for all countries. The companies that own these infrastructures operate in competitive and regulated environments. However, it is neither practical nor possible to protect critical infrastructures from all hazards. For the government, the continuity of these infrastructures is critical to many of its fundamental missions: economic stability and growth, national security, public safety, and quality of life. In that context resilience has become an important factor to fulfil the task of the critical infrastructure protection. Thus, the development of a framework to establish resilience goals could be helpful.
Źródło:
Journal of Polish Safety and Reliability Association; 2013, 4, 2; 147--154
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Reliability and vulnerability of critical infrastructure : electricity distribution
Autorzy:
Berg, H, P.
Fritze, N.
Powiązania:
https://bibliotekanauki.pl/articles/2069366.pdf
Data publikacji:
2013
Wydawca:
Uniwersytet Morski w Gdyni. Polskie Towarzystwo Bezpieczeństwa i Niezawodności
Tematy:
critical infrastructure
reliability
transformer
ageing
failure statistics
blackouts
Opis:
In recent years the failure frequency of transformers increased. In particular fires and explosions of main oilfilled transformers are considered as critical. Therefore, international experiences of transformer failures at nuclear and non-nuclear power plants and at substations have been investigated in more detail. Consequences of transformer failures with respect to a reliable electric power supply and distribution are addressed and proactive measures to enhance the reliability of critical infrastructure and to avoid blackouts are described.
Źródło:
Journal of Polish Safety and Reliability Association; 2013, 4, 1; 9--20
2084-5316
Pojawia się w:
Journal of Polish Safety and Reliability Association
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Critical infrastructures risk management : case study
Autorzy:
Białas, A.
Powiązania:
https://bibliotekanauki.pl/articles/375621.pdf
Data publikacji:
2016
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
critical infrastructure
risk assessment
risk management
interdependencies
tools for risk management
Opis:
The paper concerns a risk assessment and management methodology in critical infrastructures. The aim of the paper is to present researches on risk management within the experimentation tool based on the OSCAD software. The researches are focused on interdependent infrastructures where the specific phenomena, like escalating and cascading effects, may occur. The objective of the researches is to acquire knowledge about risk issues within interdependent infrastructures, to assess the usefulness of the OSCAD-based risk manager in this application domain, and to identify directions for further R&D works. The paper contains a short introduction to risk management in critical infrastructures, presents the state of the art, and the context, plan and scenarios of the performed validation experiments. Next, step by step, the validation is performed. It encompasses two collaborating infrastructures (railway, energy). It is shown how a hazardous event impacts the given infrastructure (primary and secondary eects) and the neighbouring infrastructure. In the conclusions the experiments are summarized, the OSCAD software assessed and directions of the future works identified.
Źródło:
Theoretical and Applied Informatics; 2016, 28, 1-2; 13-36
1896-5334
Pojawia się w:
Theoretical and Applied Informatics
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Selected models of information warfare in cyberspace
Autorzy:
Bielawski, Radosław
Radomska, Aleksandra
Powiązania:
https://bibliotekanauki.pl/articles/576343.pdf
Data publikacji:
2017-03-21
Wydawca:
Akademia Sztuki Wojennej
Tematy:
cyberspace
information models
national security
military system
critical
infrastructure
Opis:
One form of activity in cyberspace is the information battle. One of the proposed definitions will define it as a negative co–operation in the sphere of information acquisition, information distortion and information defense, where each side of the action is subordinated to the antagonistic side of the other. It leads to the achievement of political objectives and is aimed at overthrowing the systems of the state responsible for the state of its security. It is important that this condition is at a high, or at least acceptable, level. To ensure this level, it is important to define cybersecurity fighting models that are adequate for the threats and to determine their impact on the level of national security risk in cyberspace. Literature on the subject contains many models of cyberwarfare information that have been shaped in recent years. However, there is no assessment of the adequacy of these models for the risks and risks associated with national security threats. It should be noted that information security itself, as part of national security, is variable. New threats are emerging and, at a very high rate and with high activity in cyberspace, they are capable of destabilising the security of key state administration bodies, military facilities and other important state– run infrastructures. It should be emphasised that existing cyberspace fighting information models are not universal and cannot be used for any type of threat to national security. They need to find, organise and evaluate those that would be the most appropriate not only for national security threats but also for geopolitical determinants. Assumptions for the research and its results are a noticeable increase in the number of cyberattacks, some of which are important from the point of view of national security – the military system and critical infrastructure elements of the state. The following subject of the research was adopted in the article – models of information fight, related to threats to national security coming from / to cyberspace. The purpose of scientific research is to define models of information combat and to determine the suitability and evaluation of these models for the purpose of evaluating the risks of national security threats. Identifying the subject and objectives of the research led to a general research question: What appropriate models of information fight in cyberspace can be defined and used for the risks of national security threats? The research method applied theoretical methods (analysis, synthesis, generalisation, abstraction, inference, analogy and comparison) as well as the empirical method of dialogue and the method of participant observation.
Źródło:
Security and Defence Quarterly; 2017, 14, 1; 35-50
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Unmanned aerial vehicles in the protection of the elements of a country’s critical infrastructure – selected directions of development
Autorzy:
Bielawski, Radosław
Rządkowski, Witold
Perz, Rafał
Powiązania:
https://bibliotekanauki.pl/articles/576505.pdf
Data publikacji:
2018-12-20
Wydawca:
Akademia Sztuki Wojennej
Tematy:
security
critical infrastructure
unmanned aerial system/vehicle (UAS/UAV)
programme “Świerszcz” [English: “Cricket”]
Opis:
This paper explores the directions for the application of unmanned aerial vehicles in the provision of security to vital elements of a country’s critical infrastructure. The analysis focuses on two paths of development: the first one refers to the transportation system, the latter is related to the gas supply network – the basic components of a country’s critical infrastructure. The first section of this paper will examine the current state of knowledge in the field, and is designed as a reference of terminology pertaining to unmanned aerial vehicles (definitions and classification). The section shall furthermore provide a basis for and a contribution to the developed conceptual-semantic framework for UAV research. The first direction of development is described in terms of the characteristics and assumptions of the system; this includes an overview of the specific requirements of the unmanned platform itself, as well as the elements of the system, such as a local monitoring centre and other components. Furthermore, this section provides the overview of the designated mobile application, whose development is expected to improve the efficiency of system operation, which is a conceptual novelty considering similar developments. The second direction concerns the development of an unmanned system of production, storage, and use of chemical and radioactive substances, including pipelines for hazardous substances. The programme that fits perfectly in the framework of the second considered branch of development is “Cricket” [Polish: “Świerszcz”] – a programme implemented in the periodic inspection of gas supply infrastructure. The description of the programme in question included specifying the technical and operational requirements for the fight devices as well as for the equipment.
Źródło:
Security and Defence Quarterly; 2018, 22, 5; 3-19
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies