skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: IED countermeasures :vulnerability analysis and technology research (U).

Abstract

No abstract prepared.

Authors:
Publication Date:
Research Org.:
Sandia National Laboratories
Sponsoring Org.:
USDOE
OSTI Identifier:
884730
Report Number(s):
SAND2006-3003C
TRN: US200616%%30
DOE Contract Number:
AC04-94AL85000
Resource Type:
Conference
Resource Relation:
Conference: Proposed for presentation at the Countering IEDs Europe held May 16-17, 2006 in Berlin, Germany.
Country of Publication:
United States
Language:
English
Subject:
45 MILITARY TECHNOLOGY, WEAPONRY, AND NATIONAL DEFENSE; VULNERABILITY; BOMBS; MILITARY PERSONNEL; RISK ASSESSMENT; TECHNOLOGY UTILIZATION

Citation Formats

Merkle, Peter Benedict. IED countermeasures :vulnerability analysis and technology research (U).. United States: N. p., 2006. Web.
Merkle, Peter Benedict. IED countermeasures :vulnerability analysis and technology research (U).. United States.
Merkle, Peter Benedict. Mon . "IED countermeasures :vulnerability analysis and technology research (U).". United States. doi:.
@article{osti_884730,
title = {IED countermeasures :vulnerability analysis and technology research (U).},
author = {Merkle, Peter Benedict},
abstractNote = {No abstract prepared.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {Mon May 01 00:00:00 EDT 2006},
month = {Mon May 01 00:00:00 EDT 2006}
}

Conference:
Other availability
Please see Document Availability for additional information on obtaining the full-text document. Library patrons may search WorldCat to identify libraries that hold this conference proceeding.

Save / Share:
  • No abstract prepared.
  • Abstract not provided.
  • In an effort to protect the United States from the ever increasing threat of domestic terrorism, the Department of Homeland Security, Science and Technology Directorate (DHS S&T), has significantly increased research activities to counter the terrorist use of explosives. More over, DHS S&T has established a robust Counter-Improvised Explosive Device (C-IED) Program to Deter, Predict, Detect, Defeat, and Mitigate this imminent threat to the Homeland. The DHS S&T portfolio is complicated and changing. In order to provide the ''best answer'' for the available resources, DHS S&T would like some ''risk based'' process for making funding decisions. There is a definitemore » need for a methodology to compare very different types of technologies on a common basis. A methodology was developed that allows users to evaluate a new ''quad chart'' and rank it, compared to all other quad charts across S&T divisions. It couples a logic model with an evidential reasoning model using an Excel spreadsheet containing weights of the subjective merits of different technologies. The methodology produces an Excel spreadsheet containing the aggregate rankings of the different technologies. It uses Extensible Logic Modeling (ELM) for logic models combined with LANL software called INFTree for evidential reasoning.« less
  • The determination of the water resource vulnerability is a necessary step for the prevention of accidental pollution. When rivers or aquifers are used for water supply, it is very useful to forecast pollutant flow velocity in order to determine travel time between the potential pollution points and the intake. Usually, water resource vulnerability cartography takes only distance from intakes into account. But other physical factors are involved in pollutant propagation: slope and soil texture. It is necessary to define a method for automatic cartography of vulnerability zones around the intakes. For this aim, the authors map spatial distribution of themore » travel time on the resource catchment (river, lake, or well). This typical problem of propagation requires a specific spatial analysis: start from the river or the well and extend the zone upstream according to the velocity values. It is an iterative process: for each selected cell, the neighboring cells which contribute to the inflow are first determined. Then, for these cells, the flow velocity values are used to determine a cumulate travel time to the river or to the well. Eventually, a travel time map is obtained which controls a good deal of the vulnerability. With the aim of decision support for designing protective zones around the rivers and the wells, this method is integrated in a GIS. The method is tested on two areas in the Massif Central (France).« less
  • The assessment model ''Systematic Analysis of Vulnerability to Intrusion'' (SAVI) presented in this report is a PC-based path analysis model. It can provide estimates of protection system effectiveness (or vulnerability) against a spectrum of outsider threats including collusion with an insider adversary. It calculates one measure of system effectiveness, the probability of interruption P(I), for all potential adversary paths. SAVI can perform both theft and sabotage vulnerability analyses. For theft, the analysis is based on the assumption that adversaries should be interrupted either before they can accomplish removal of the target material from its normal location of removal from themore » site boundary. For sabotage, the analysis is based on the assumption that adversaries should be interrupted before completion of their sabotage task 3. refs., 9 figs.« less