Spelling suggestions: "subject:"hostile environments"" "subject:"ostile environments""
1 |
Managing hostile environments : journalists and media workers : learning to survive the world's difficult, remote and hostile environmentsFiler, Shaun Matthew January 2009 (has links)
The aim of this research is to examine the changing nature of risks that face journalists and media workers in the world's difficult, remote and hostile environments, and consider the 'adequacy' of managing hostile environment safety courses that some media organizations require prior to foreign assignments. The study utilizes several creative works and contributions to this area of analysis, which includes a documentary film production, course contributions, an emergency reference handbook, security and incident management reviews and a template for evacuation and contingency planning.
The research acknowledges that employers have a 'duty of care' to personnel working in these environments, identifies the necessity for pre-deployment training and support, and provides a solution for organizations that wish to initiate a comprehensive framework to advise, monitor, protect and respond to incidents. Finally, it explores the possible development of a unique and holistic service to facilitate proactive and responsive support, in the form of a new profession of 'Editorial Logistics Officer' or 'Editorial Safety Officer' within media organizations.
This area of research is vitally important to the profession, and the intended contribution is to introduce a simple and cost-efficient framework for media organizations that desire to implement pre-deployment training and field-support – as these programs save lives. The complete proactive and responsive services may be several years from implementation. However, this study demonstrates that the facilitation of Managing Hostile Environment (MHE) courses should be the minimum professional standard. These courses have saved lives in the past and they provide journalists with the tools to "cover the story, and not become the story."
|
2 |
The provision of health care in remote hostile environmentsBrebner, John Alexander January 1990 (has links)
The health care of those who work in remote places associated with hostile environments is reviewed, concentrating on the offshore oil industry and Antarctic populations. An understanding of associated environmental hazards is essential for adequate health care and particular attention is paid to the hyperbaric environment and to environmental heat and cold. The basic medical problems in remote health care are evaluated in three related studies. The first examines 2,162 personnel who required medical evacuations from the offshore structures of four North Sea operating companies, the second with 5,894 presentations from offshore at the A&E department of Aberdeen Royal Infirmary, while the third examines 100 annual medical reports from British Antarctic Survey stations.
|
3 |
Key Management for Wireless Sensor Networks in Hostile EnvironmentsChorzempa, Michael William 09 June 2006 (has links)
Large-scale wireless sensor networks (WSNs) are highly vulnerable to attacks because they consist of numerous resource-constrained devices and communicate via wireless links. These vulnerabilities are exacerbated when WSNs have to operate unattended in a hostile environment, such as battlefields. In such an environment, an adversary poses a physical threat to all the sensor nodes. An adversary may capture any node, compromising critical security data including keys used for encryption and authentication. Consequently, it is necessary to provide security services to these networks to ensure their survival. We propose a novel, self-organizing key management scheme for large-scale and long-lived WSNs, called Survivable and Efficient Clustered Keying (SECK). SECK provides administrative services that ensures the survivability of the network. SECK is suitable for managing keys in a hierarchical WSN consisting of low-end sensor nodes clustered around more capable gateway nodes. Using cluster-based administrative keys, SECK provides five efficient security administration mechanisms: 1) clustering and key setup, 2) node addition, 3) key renewal, 4) recovery from multiple node captures, and 5) re-clustering. All of these mechanisms have been shown to localize the impact of attacks and considerably improve the efficiency of maintaining fresh session keys. Using simulation and analysis, we show that SECK is highly robust against node capture and key compromise while incurring low communication and storage overhead. / Master of Science
|
4 |
Reconfigurable wireless sensor platform for training and research in networked embedded systemsGonzalez, Oscar V 01 June 2005 (has links)
Ever since the University of California, Berkeley released the first commercial Wireless Sensor Network, (WSN), "mote", applications that employ the WSN technology have increased many fold. There are many kinds of prototypes and architectures for WSNs that are being developed by major communication companies. Due to the lack of a common standard for different physical and MAC layer protocols, interoperability among the wireless systems is constrained. Additionally, remote sensing capability, reconfigurability and interoperability have not yet been designed. In the current platforms hardware upgrading has to be performed on-site by replacing the old sensors with new ones. This procedure increases considerably the costs of deployment and maintenance. On-site upgrading also imposes serious constraints on applications that operate in very limited access environments.
|
Page generated in 0.0697 seconds