Search results
1 – 10 of 420Caroline Bayart, Patrick Bonnel and Catherine Morency
Data fusion and the combination of multiple data sources have been part of travel survey processes for some time. In the current context, where technologies and information…
Abstract
Data fusion and the combination of multiple data sources have been part of travel survey processes for some time. In the current context, where technologies and information systems spread and become more and more diverse, the transportation community is getting more and more interested in the potential of data fusion processes to help gather more complete datasets and help give additional utility to available data sources. Research is looking for ways to enhance the available information by using both various data collection methods and data from various sources, surveys or observation systems. Survey response rates are decreasing over the world, and combining survey modes appears to be an interesting way to address this problem. Letting interviewees choose their survey mode allows increasing response rates, but survey mode could impact the data collected. This paper first discusses issues rising when combining survey modes within the same survey and presents a method to merge the data coming from different survey modes, in order to consolidate the database. Then, it defines and describes the data fusion process and discusses how it can be relevant for transportation analysis and modelling purposes. Benefiting from the availability of various datasets from the Greater Montréal Area and the Greater Lyon Area, some applications of data fusion are constructed and/or reproduced to illustrate and test some of the methods described in the literature.
We investigate the effects of technological capabilities on firms’ survival chances during market-fusing technological change. Our context is the matured U.S. machine tool…
Abstract
We investigate the effects of technological capabilities on firms’ survival chances during market-fusing technological change. Our context is the matured U.S. machine tool industry. During the period of our study, 1975 through 1995, a drastic shift in demand conditions prompted the buyers of machine tools to demand more versatile products to improve their productivity. The advent of microprocessors enabled manufacturers to meet these demands by combining the functions of previously distinctive products. As a result, market segments fused and machine tool manufacturers in once disparate product categories came into direct competition with one another. We propose that incumbents with broader component and architectural capabilities will be better able to adapt to and hence survive market-fusing technological change. Our results, based on a panel data set of U.S. machine tool incumbents, support the value of broad component capabilities but reveal no adaptive advantage of architectural capabilities.
This chapter examines the principles behind law enforcement intelligence and identifies best practices established by other local and state law enforcement organizations. Then, it…
Abstract
This chapter examines the principles behind law enforcement intelligence and identifies best practices established by other local and state law enforcement organizations. Then, it conducts a close analysis of the law enforcement intelligence process to determine, in light of best practices, how policies and procedures might be changed to better address law enforcement operations. A redefined intelligence process, as described in this chapter, will provide all participating agencies with a universal definition of law enforcement intelligence, will maintain and enhance community-policing efforts, and will establish a platform for contribution to the domestic intelligence cycle – which is essential for leveraging resources to detect and disrupt organized criminal organizations and terrorism.
Details
Keywords
Eileen M. Decker, Matthew Morin and Eric M. Rosner
Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a…
Abstract
Cyber threats present constantly evolving and unique challenges to national security professionals at all levels of government. Public and private sector entities also face a constant stream of cyberattacks through varied methods by actors with myriad motivations. These threats are not expected to diminish in the near future. As a result, homeland security and national security professionals at all levels of government must understand the unique motivations and capabilities of malicious cyber actors in order to better protect against and respond to cyberattacks. This chapter outlines the most common cyberattacks; explains the motivations behind these attacks; and describes the federal, state, and local efforts to address these threats.
Details
Keywords
Irina Farquhar and Alan Sorkin
This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative…
Abstract
This study proposes targeted modernization of the Department of Defense (DoD's) Joint Forces Ammunition Logistics information system by implementing the optimized innovative information technology open architecture design and integrating Radio Frequency Identification Device data technologies and real-time optimization and control mechanisms as the critical technology components of the solution. The innovative information technology, which pursues the focused logistics, will be deployed in 36 months at the estimated cost of $568 million in constant dollars. We estimate that the Systems, Applications, Products (SAP)-based enterprise integration solution that the Army currently pursues will cost another $1.5 billion through the year 2014; however, it is unlikely to deliver the intended technical capabilities.