Strict Standards: Redefining already defined constructor for class XML_Parser in /home/sites/www.americanpoems.com/web/store/aom/includes/os.php on line 1188

Strict Standards: Declaration of XML_Parser::raiseError() should be compatible with PEAR::raiseError($message = NULL, $code = NULL, $mode = NULL, $options = NULL, $userinfo = NULL, $error_class = NULL, $skipmsg = false) in /home/sites/www.americanpoems.com/web/store/aom/includes/os.php on line 1604

Strict Standards: Declaration of XML_Unserializer::startHandler() should be compatible with XML_Parser::startHandler($xp, $elem, &$attribs) in /home/sites/www.americanpoems.com/web/store/aom/includes/os.php on line 3503

Strict Standards: Declaration of Cache_Lite_File::get() should be compatible with Cache_Lite::get($id, $group = 'default', $doNotTestCacheValidity = false) in /home/sites/www.americanpoems.com/web/store/aom/includes/cache.php on line 1020
American Poems: Books: Identification of critical locations across multiple infrastructures for terrorist actions [An article from: Reliability Engineering and System Safety]
Home
Apparel
Appliances
Books
DVD
Electronics
Home & Garden
Kindle eBooks
Magazines
Music
Outdoor Living
Software
Tools & Hardware
PC & Video Games
Location:
 Home » Books » Identification of critical locations across multiple infrastructures for terrorist actions [An article from: Reliability Engineering and System Safety]

Identification of critical locations across multiple infrastructures for terrorist actions [An article from: Reliability Engineering and System Safety]

  • Buy New: $7.95
  • as of 7/23/2014 02:10 EDT details
In Stock
  • Seller:Amazon.com
  • Sales Rank:8,586,848
  • Format:HTML
  • Language:English (Published)
  • Media:Digital
  • Pages:20
  • Publication Date:August 1, 2007
  • ASIN:B000PDTV34
Availability:Available for download now

Editorial Reviews:
Synopsis
This digital document is a journal article from Reliability Engineering and System Safety, published by Elsevier in 2007. The article is delivered in HTML format and is available in your Amazon.com Media Library immediately after purchase. You can view it with any web browser.

Description:
This paper presents a possible approach to ranking geographic regions that can influence multiple infrastructures. Once ranked, decision makers can determine whether these regions are critical locations based on their susceptibility to terrorist acts. We identify these locations by calculating a value for a geographic region that represents the combined values to the decision makers of all the infrastructures crossing through that region. These values, as well as the size of the geographic region, are conditional on an assumed destructive threat of a given size. In our case study, the threat is assumed to be minor, e.g., a bomb that can affect objects within 7m of it. This approach first requires an assessment of the users of the system. During this assessment, each user is assigned a performance index (PI) based on the disutility of the loss of each infrastructure's resource via multi-attribute utility theory (MAUT). A Monte Carlo network analysis is then performed to develop importance measures (IM) for the elements of each infrastructure for their ability to service each user. We combine the IMs with the user PIs to a value that we call valued worth (VW) for each infrastructure's elements independently. Then we use spatial analysis techniques within a geographic information system (GIS) to combine the VWs of each infrastructure's elements in a geographic area, conditional on the threat, into a total value we call geographic valued worth (GVW). The GVW is displayed graphically in the GIS system in a color scheme that shows the numerical ranking of these geographic areas. The map and rankings are then submitted to the decision makers to better allocate anti-terrorism resources. A case study of this methodology is performed on the Massachusetts Institute of Technology (MIT) campus. The results of the study show how the methodology can bring attention to areas that are important when several infrastructures are considered, but may be ignored when infrastructures are analyzed individually.

CERTAIN CONTENT THAT APPEARS ON THIS SITE COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED ‘AS IS’ AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.
Brought to you by American Poems