Application of Semantic Knowledge Management System in Selected Areas of Polish Public Administration
Summary: This paper describes an application of semantic technologies and knowledge management systems in chosen areas of Polish public administration. Short analyses of crisis management and EU policy coordination processes are presented. An architecture of a knowledge management system with interfaces using controlled natural language is proposed. A lot of examples are shown that prove a usefulness of semantic knowledge management and automated reasoning in these fields.
Keywords: crisis management, EU policy coordination, knowledge management system, semantic
The risk profile of the Gauteng City Region (GCR) necessitates the implementation of a single, province-wide incident management system that is capable of ensuring the effective, coordinated response to large-scale and complex incidents by the GCR’s various response organizations.
Presentation by Nicolas Mueller at 5th Workshop on Strategic Crisis Managemen...OECD Governance
Presentation by Nicolas Mueller,Swiss Federal Chancellery, at 5th Workshop on Strategic Crisis Management - OECD. For more information see www.oecd.org/gov/risk/5th-workshop-strategic-crisis-management.htm
Cognitum is a Polish company that develops knowledge management systems and tools for heterogeneous data acquisition and cloud testing. It partners with universities and government agencies and customers include the Polish Agency for Enterprise Development. Cognitum's main products are FluentEditor for OWL, an ontology editor using controlled natural language, and Ontorion Knowledge Server. It also does media monitoring, internet and text analysis, and cloud computing applications including web application testing. Cognitum researches knowledge management systems in fields like mediation and healthcare decision support.
Cognitum Ontorion: Knowledge Representation and Reasoning SystemCognitum
Presentation from FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS which was held in Lodz, between 13 - 16 of September, 2015.
Pawel Kaplanski - CTO of Cognitum, presented an approach to hybrid agent architecture, which is implemented on top of a scalable Knowledge Representation & Reasoning (KRR) system.
To learn more, visit our website: http://www.cognitum.eu/
This case study examines David Neeleman, the founder and CEO of JetBlue Airlines. Some key points:
1) Neeleman appeals to travelers by offering amenities like satellite TV and electronic ticketing on newer planes.
2) JetBlue has achieved high customer satisfaction through its focus on service and technology.
3) Though still growing, JetBlue has been profitable through its low operating costs and efficient employees.
Dr Alessandro Seganti from Cognitum presented basics of Semantic Technologies, OntorionCNL, Ontorion Semantic Framework and Fluent Editor during International Conference on Computer Science -- Research and Applications IBIZA 2014, UMCS Lublin.
To learn more visit: http://www.cognitum.eu/semantics/
Semantic Rules Representation in Controlled Natural Language in FluentEditorCognitum
Abstract. The purpose of this paper is to present a way of representation of semantic rules (SWRL) in controlled natural language (English) in order to facilitate understanding the rules by humans interacting with a machine. The rule representation is implemented in FluentEditor – ontology editor with controlled natural language (CNL). The representation can be used in a lot of domains where people interact with machines and use specialized interfaces to define knowledge in a system (semantic knowledge base), e.g. representing medical knowledge and guidelines, procedures in crisis management or in management of any coordination processes. Such knowledge bases are able to support decision making in any discipline provided there is a knowledge stored in a proper semantic way.
The risk profile of the Gauteng City Region (GCR) necessitates the implementation of a single, province-wide incident management system that is capable of ensuring the effective, coordinated response to large-scale and complex incidents by the GCR’s various response organizations.
Presentation by Nicolas Mueller at 5th Workshop on Strategic Crisis Managemen...OECD Governance
Presentation by Nicolas Mueller,Swiss Federal Chancellery, at 5th Workshop on Strategic Crisis Management - OECD. For more information see www.oecd.org/gov/risk/5th-workshop-strategic-crisis-management.htm
Cognitum is a Polish company that develops knowledge management systems and tools for heterogeneous data acquisition and cloud testing. It partners with universities and government agencies and customers include the Polish Agency for Enterprise Development. Cognitum's main products are FluentEditor for OWL, an ontology editor using controlled natural language, and Ontorion Knowledge Server. It also does media monitoring, internet and text analysis, and cloud computing applications including web application testing. Cognitum researches knowledge management systems in fields like mediation and healthcare decision support.
Cognitum Ontorion: Knowledge Representation and Reasoning SystemCognitum
Presentation from FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS which was held in Lodz, between 13 - 16 of September, 2015.
Pawel Kaplanski - CTO of Cognitum, presented an approach to hybrid agent architecture, which is implemented on top of a scalable Knowledge Representation & Reasoning (KRR) system.
To learn more, visit our website: http://www.cognitum.eu/
This case study examines David Neeleman, the founder and CEO of JetBlue Airlines. Some key points:
1) Neeleman appeals to travelers by offering amenities like satellite TV and electronic ticketing on newer planes.
2) JetBlue has achieved high customer satisfaction through its focus on service and technology.
3) Though still growing, JetBlue has been profitable through its low operating costs and efficient employees.
Dr Alessandro Seganti from Cognitum presented basics of Semantic Technologies, OntorionCNL, Ontorion Semantic Framework and Fluent Editor during International Conference on Computer Science -- Research and Applications IBIZA 2014, UMCS Lublin.
To learn more visit: http://www.cognitum.eu/semantics/
Semantic Rules Representation in Controlled Natural Language in FluentEditorCognitum
Abstract. The purpose of this paper is to present a way of representation of semantic rules (SWRL) in controlled natural language (English) in order to facilitate understanding the rules by humans interacting with a machine. The rule representation is implemented in FluentEditor – ontology editor with controlled natural language (CNL). The representation can be used in a lot of domains where people interact with machines and use specialized interfaces to define knowledge in a system (semantic knowledge base), e.g. representing medical knowledge and guidelines, procedures in crisis management or in management of any coordination processes. Such knowledge bases are able to support decision making in any discipline provided there is a knowledge stored in a proper semantic way.
Sterowniki .NET i C++ dla Apache CassandraCognitum
The document discusses Cassandra drivers for .NET and C++. It describes how older Thrift-based drivers worked, the advantages of Cassandra's new asynchronous binary protocol, and examples of using the .NET driver. It also outlines plans for future driver development, including a new C++ driver built on Boost.Asio.
Introduction to Ontology Engineering with Fluent Editor 2014Cognitum
An introductory course for Ontology Engineering using Controlled Natural Language. Fluent Editor (FE) is an ontology editor that is a tool for editing and manipulating ontologies. The main feature of Fluent Editor is that it uses controlled natural language (CNL) to communicate with a user. Communication with CNL is a more suitable for human users alternative to XML-based OWL editors.
Application of Semantic Knowledge Management System in Selected Areas of Pol...Cognitum
Application of Semantic Knowledge Management System in Selected Areas of Polish Public Administration
---
Zastosowanie semantycznego systemu zarządzania wiedzą w wybranych obszarach polskiej administracji publicznej
---
http://www.cognitum.eu/semantics/
This document provides instructions for adding, subtracting, multiplying, and dividing fractions. It explains that to add or subtract fractions, the denominators must be the same. It shows examples of calculating fractions step-by-step. It also discusses how to find common denominators, such as by multiplying the denominators and adjusting the numerators proportionally. The goal is to demonstrate different fraction operations through examples and ensure the reader understands how to work with fractions.
Practical applications of controlled natural language with description logics...Cognitum
Practical applications of controlled natural language with description logics and OWL. FluentEditor and OASE.
Presented at CNL2012, Zurich.
- Crisis (Emergency) Management – Controlled Natural Language Component
- Ontorion – Semantic Knowledge Management Framework
- OASE - semiotic framework for software development
Nowoczesne technologie w naukach społecznychCognitum
Nowoczesne technologie w naukach społecznych.
- Potencjalne obszary zastosowań w naukach społecznych
- Możliwości technologiczne
- Formalna reprezentacja wiedzy
- Bariera dostępności
- System zarządzania wiedzą
- Cognitum Ontorion
- Wspieranie zarządzania procesem
- Modelowanie zjawisk emergentnych
- Zaproszenie do współpracy
Zarzadzanie wiedza dla zarządzania kryzysowegoCognitum
Prezentacja przygotowana przez dr Aleksandrę Zięba oraz dr Pawła Kapłańskiego na IV Ogólnopolski Kongres Analityków Informacji, który odbył się w Warszwie w dniu 26 lutego 2014 r.
European scientific and security research project, led by e-Geos (Italy) on crisis management and on the development of a secure common information space.
U.S. Federal Department Of Homeland SecurityMegan Espinoza
The document discusses the development of the U.S. Department of Homeland Security in response to terrorist attacks in the 1990s and early 2000s. It outlines the agencies that were incorporated into DHS and their key responsibilities related to border security, emergency preparedness and response, technology, and infrastructure protection. The creation of DHS represented the largest reorganization of the federal government since the National Security Act of 1947.
The application of the ‘New Sciences’ to Risk and Project ManagementDr David Hancock
This document provides an overview of an article from the May 2010 issue of PM World Today titled "The application of the ‘New Sciences’ to Risk and Project Management" by Dr. David Hancock. The article discusses how project risk management has traditionally relied on numerical and statistical approaches but could benefit from incorporating insights from chaos theory and considering projects as complex systems. It argues that most projects should be viewed as "deterministic chaotic systems" rather than predictable problems. The article also examines different types of problems like "tame," "messes," and "wicked" problems and how their complexities impact risk management. It concludes that risk professionals need new approaches like "risk leadership" to address uncertainties and complexities rather than relying solely on quantitative
Agenda for the 6th Strategic Crisis Management Workshop on 12-13 June 2017 in Geneva, Switzerland on Managing Critical Infrastructure Crises - Partnerships between governments and infrastructure operators.
The document discusses crisis management in response to a collapse at a copper mine. It outlines 10 fundamental steps to consider in crisis management involving potential life-threatening conditions. These include having a comprehensive crisis plan, quickly identifying the crisis, and telling all relevant information to those affected fast and honestly. It also discusses the importance of crisis identification and moving fast to find corrective measures. The summary focuses on the key aspects of crisis management discussed in the document - having a plan, identifying the crisis, and communicating transparently and quickly.
The Total Flood Warning System: a review of the conceptNeil Dufty
The Total Flood Warning System concept is promoted by the Australian Government and is widely used in the design of Australia’s early flood warning systems. The Total Flood Warning System concept is technically robust in comparison with international flood warning system frameworks. However, it is not as ‘total’ as it might be. This paper looks at six other components identified that make the system holistic and more effective.
Smart Cities- A systems perspective on security risk identification: Methodo...Smart Cities Project
This document provides a framework for identifying security risks from a systems perspective. It constructs a four quadrant model to analyze risks from both an objective and perceived perspective, as well as a technical and organizational view. Research applying this framework in 50 Flemish city councils found it useful for identifying a broader range of risks. The methodology combines systems thinking with constructivist triangulation to gain a holistic understanding of risks in their organizational context.
This document discusses disaster risk governance and policy from a university course on disaster risk management and sustainable development. It covers key concepts of governance, including the three components of economic, political and administrative governance. Good governance principles that are important for effective disaster risk management are also outlined, including participation, rule of law, transparency and accountability. The document emphasizes that mainstreaming disaster risk reduction into governance systems is important to help integrate risk reduction into all relevant development sectors.
National Response Framework And National Incident...Deb Birch
The National Incident Management System (NIMS) and National Response Framework (NRF) were created to standardize incident response across agencies and jurisdictions. NIMS established a standardized incident command system (ICS) to coordinate response. The September 11th attacks revealed issues with interoperable communications between first responders. This lack of coordination highlighted the need for NIMS/NRF to facilitate multi-agency response and management of large-scale incidents.
At present, the frequent occurrence of emergencies has threatened the safety of peoples lives and property. The complexity and dynamics of emergencies determine the difficulty for the government as a single entity to deal with in emergency management. The active participation of non governmental organizations, including social organizations, and the realization of the coordination and coupling with government departments are conducive to the improvement of emergency management capability in all aspects and the whole process. Wang Meiying | Yue Danni | Fu Nannan "Research on Emergency Capability Assessment" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30533.pdf Paper Url :https://www.ijtsrd.com/management/risk-management/30533/research-on-emergency-capability-assessment/wang-meiying
Response and recovery are the final two phases of disaster ma.docxwilfredoa1
Response and recovery are the final two phases of disaster management. As an agency, I would tell the chief that these phases are just as important as mitigation and preparedness and have subcomponents that need to be addressed. Romans 8:28 states, “And we know that for those who love God all things work together for good, for those who are called according to his purpose.” I would advise the chief that in response and recovery the purpose is to save lives, which requires working together for the good of the people. Working together means with other agencies to include federal, state and local, as well as working with the stakeholders of the community. Coming together in these phases is our purpose to save lives.
As a department, I would instruct the chief that we need to be informed and follow the procedures of the national response framework (NRF), the national incident management systems (NIMS), and the incident command system (ICS). Training needs to be held to understand how NIMS and ICS work and are implemented in response to a disaster. All members of the police department and especially supervisors need to train and be able to follow ICS. This will prepare the department for responding. The chief should encourage redundancy in response and recovery. According to Nemeth (2016), redundancy means that the department will have multiple systems, subsystems, assets, or processes in case one fails, or one is lost (p. 548). It is important to have redundancy because Murphy’s law plays into effect in the most serious of times, and having a backup system can help reduce saving lives.
In recovery, resiliency is also very important. According to FEMA’s document on the national disaster recovery framework, “Resilience is the ability to prepare for and adapt to changing conditions and withstand and recover rapidly from disruptions. Resilience includes the ability to withstand and recover from deliberate attacks, accidents, or naturally occurring threats or incidents” (p. 8). The department should research and find resources that are available in our area to help in recovery. Leaning on the stakeholders in the community to help with recovery is a necessary component, as taking on this task alone will be difficult. The recovery phase includes “the reconstitution of government operations and services, housing and services for displaced families and individuals; and replenishment of stockpiles” (Lindsay, 2012, p. 3). The community the department serves must work together with the agency to be successful in this phase. I would instruct the chief the importance of community relations to help with recovery as they will be able to provide resources and possibly help cut down on the budget required to provide services.
Continuity of operations planning is another component that requires training and budgeting to accomplish, but is a fairly simple concept. The phases within the continuity of operations is readiness and .
The document outlines Ontario's strategy to establish a provincial trauma system through Regional Trauma Networks (RTNs). It discusses establishing two pilot RTNs, evaluating their experiences, and developing tools to support expanding the RTN model province-wide. Performance measures will track effectiveness over the next 2-4 years. By providing leadership, education, and knowledge sharing, RTNs are expected to become self-sustaining and advance Ontario's inclusive trauma system.
Mass Atrocities and Armed Conflict: Links, Distinctions and Implications for ...frameworkteam
Presentation from a brown bag lunch discussion organized by the UN Interagency Framework Team for Preventive Action on "Mass Atrocities and Armed Conflict: Links, Distinctions and Implications for Prevention", held on 23 March 2011.
Please note that the designations employed and the presentation of material in this information product do not imply the expression of any opinion whatsoever on the part of the United Nations concerning the legal or development status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. The mention of specific companies or products of manufacturers, whether or not these have been patented, does not imply that these have been endorsed or recommended by the United Nations in preference to others of a similar nature that are not mentioned.
LIVING WITH THE EARTHObjectives for this.docxcroysierkathey
LIVING WITH THE EARTH
Objectives for this Chapter
A student reading this chapter will be able to:
Discuss the history and origins of Incident Command System (ICS), the National Incident Management System (NIMS), and The National Response Plan (NRP.
List and describe the major components of ICS, NIMS, and NRP
Objectives for this Chapter
A student reading this chapter will be able to:
Describe and discuss the role of Environmental Health professionals in emergency/disaster response.
IntroductionIt is not terrorist bombs or the release of anthrax spores that spawned the birth of modern day emergency preparedness.
USS Cole
IntroductionIt began with a wildfire in Southern California in 1970 that swept through several counties during a 13 day period burning more than half a million acres, destroying over 700 structures, and costing 16 lives.
FIRESCOPEthe 92nd Congress approved funding for the U.S. Forest Service Research group to design a system or process to significantly improve the capacity of the agencies in Southern California to provide protection against wildfires.
This became known as FIRESCOPE (Firefighting Resources of California Organized for Potential Emergencies).
FIRESCOPE
There were five major program components that required planning and attention.
The coordination of the resources among many agencies during a large incident,
Creating a standard and easily understood terminology by all participants to avoid the use of professional jargon that would differ among police, fire, and emergency medical responders,
Code Four-----I'm okay or Are you okay? Police
Fire departments almost never use this term.
FIRESCOPE
Develop systems and technical capacity that would permit communication among many participating agencies,
Provide training to all members of the participating agencies in communication, terminology, and command structure, and
Develop better methods for predicting the behavior of fires.
Incident CommandThese objectives were ultimately condensed into two components of the FIRESOPE system designated as:Incident Command System (ICS) that provided a specific command structure and coordinated incident management tool.Multi-Agency Coordination System (MACS) that improved coordination among multiple agencies for large incidents that demanded massive resources.
ICSICS structure and successfully employed ICS on a number of wildland and urban fires in 1978. The use of ICS expanded to non-fire incidents. The management of these incidents was “all-hazard” as they employed the well documented and proven command structure of ICS to a wide variety of incidents.
NIIMSInitial steps to extend this ICS management structure began in 1983 with the creation of the National Inter-Agency Incident Management System (NIIMS).
Post 9/11In swift reaction to 9/11, the Homeland Security Act of 2002 (H.R. 5005-8) was approved with the purpose of establishing a Department of Homeland Secur ...
NRFThe National Response Framework (NRF) is a guide to how.docxgibbonshay
The National Response Framework (NRF) establishes the fundamental mission for emergency response in the United States, including engaging partnerships, tiered responses, and unified efforts. The National Incident Management System (NIMS) guides government and private sector organizations on allocating resources and coordinating response efforts for any type of national emergency. The Incident Command System (ICS) provides an organizational structure and tools to help all response agencies work together efficiently and precisely during emergencies. Effective communication and coordination between responding entities is also important for clear understanding of roles and responsibilities.
Sterowniki .NET i C++ dla Apache CassandraCognitum
The document discusses Cassandra drivers for .NET and C++. It describes how older Thrift-based drivers worked, the advantages of Cassandra's new asynchronous binary protocol, and examples of using the .NET driver. It also outlines plans for future driver development, including a new C++ driver built on Boost.Asio.
Introduction to Ontology Engineering with Fluent Editor 2014Cognitum
An introductory course for Ontology Engineering using Controlled Natural Language. Fluent Editor (FE) is an ontology editor that is a tool for editing and manipulating ontologies. The main feature of Fluent Editor is that it uses controlled natural language (CNL) to communicate with a user. Communication with CNL is a more suitable for human users alternative to XML-based OWL editors.
Application of Semantic Knowledge Management System in Selected Areas of Pol...Cognitum
Application of Semantic Knowledge Management System in Selected Areas of Polish Public Administration
---
Zastosowanie semantycznego systemu zarządzania wiedzą w wybranych obszarach polskiej administracji publicznej
---
http://www.cognitum.eu/semantics/
This document provides instructions for adding, subtracting, multiplying, and dividing fractions. It explains that to add or subtract fractions, the denominators must be the same. It shows examples of calculating fractions step-by-step. It also discusses how to find common denominators, such as by multiplying the denominators and adjusting the numerators proportionally. The goal is to demonstrate different fraction operations through examples and ensure the reader understands how to work with fractions.
Practical applications of controlled natural language with description logics...Cognitum
Practical applications of controlled natural language with description logics and OWL. FluentEditor and OASE.
Presented at CNL2012, Zurich.
- Crisis (Emergency) Management – Controlled Natural Language Component
- Ontorion – Semantic Knowledge Management Framework
- OASE - semiotic framework for software development
Nowoczesne technologie w naukach społecznychCognitum
Nowoczesne technologie w naukach społecznych.
- Potencjalne obszary zastosowań w naukach społecznych
- Możliwości technologiczne
- Formalna reprezentacja wiedzy
- Bariera dostępności
- System zarządzania wiedzą
- Cognitum Ontorion
- Wspieranie zarządzania procesem
- Modelowanie zjawisk emergentnych
- Zaproszenie do współpracy
Zarzadzanie wiedza dla zarządzania kryzysowegoCognitum
Prezentacja przygotowana przez dr Aleksandrę Zięba oraz dr Pawła Kapłańskiego na IV Ogólnopolski Kongres Analityków Informacji, który odbył się w Warszwie w dniu 26 lutego 2014 r.
European scientific and security research project, led by e-Geos (Italy) on crisis management and on the development of a secure common information space.
U.S. Federal Department Of Homeland SecurityMegan Espinoza
The document discusses the development of the U.S. Department of Homeland Security in response to terrorist attacks in the 1990s and early 2000s. It outlines the agencies that were incorporated into DHS and their key responsibilities related to border security, emergency preparedness and response, technology, and infrastructure protection. The creation of DHS represented the largest reorganization of the federal government since the National Security Act of 1947.
The application of the ‘New Sciences’ to Risk and Project ManagementDr David Hancock
This document provides an overview of an article from the May 2010 issue of PM World Today titled "The application of the ‘New Sciences’ to Risk and Project Management" by Dr. David Hancock. The article discusses how project risk management has traditionally relied on numerical and statistical approaches but could benefit from incorporating insights from chaos theory and considering projects as complex systems. It argues that most projects should be viewed as "deterministic chaotic systems" rather than predictable problems. The article also examines different types of problems like "tame," "messes," and "wicked" problems and how their complexities impact risk management. It concludes that risk professionals need new approaches like "risk leadership" to address uncertainties and complexities rather than relying solely on quantitative
Agenda for the 6th Strategic Crisis Management Workshop on 12-13 June 2017 in Geneva, Switzerland on Managing Critical Infrastructure Crises - Partnerships between governments and infrastructure operators.
The document discusses crisis management in response to a collapse at a copper mine. It outlines 10 fundamental steps to consider in crisis management involving potential life-threatening conditions. These include having a comprehensive crisis plan, quickly identifying the crisis, and telling all relevant information to those affected fast and honestly. It also discusses the importance of crisis identification and moving fast to find corrective measures. The summary focuses on the key aspects of crisis management discussed in the document - having a plan, identifying the crisis, and communicating transparently and quickly.
The Total Flood Warning System: a review of the conceptNeil Dufty
The Total Flood Warning System concept is promoted by the Australian Government and is widely used in the design of Australia’s early flood warning systems. The Total Flood Warning System concept is technically robust in comparison with international flood warning system frameworks. However, it is not as ‘total’ as it might be. This paper looks at six other components identified that make the system holistic and more effective.
Smart Cities- A systems perspective on security risk identification: Methodo...Smart Cities Project
This document provides a framework for identifying security risks from a systems perspective. It constructs a four quadrant model to analyze risks from both an objective and perceived perspective, as well as a technical and organizational view. Research applying this framework in 50 Flemish city councils found it useful for identifying a broader range of risks. The methodology combines systems thinking with constructivist triangulation to gain a holistic understanding of risks in their organizational context.
This document discusses disaster risk governance and policy from a university course on disaster risk management and sustainable development. It covers key concepts of governance, including the three components of economic, political and administrative governance. Good governance principles that are important for effective disaster risk management are also outlined, including participation, rule of law, transparency and accountability. The document emphasizes that mainstreaming disaster risk reduction into governance systems is important to help integrate risk reduction into all relevant development sectors.
National Response Framework And National Incident...Deb Birch
The National Incident Management System (NIMS) and National Response Framework (NRF) were created to standardize incident response across agencies and jurisdictions. NIMS established a standardized incident command system (ICS) to coordinate response. The September 11th attacks revealed issues with interoperable communications between first responders. This lack of coordination highlighted the need for NIMS/NRF to facilitate multi-agency response and management of large-scale incidents.
At present, the frequent occurrence of emergencies has threatened the safety of peoples lives and property. The complexity and dynamics of emergencies determine the difficulty for the government as a single entity to deal with in emergency management. The active participation of non governmental organizations, including social organizations, and the realization of the coordination and coupling with government departments are conducive to the improvement of emergency management capability in all aspects and the whole process. Wang Meiying | Yue Danni | Fu Nannan "Research on Emergency Capability Assessment" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30533.pdf Paper Url :https://www.ijtsrd.com/management/risk-management/30533/research-on-emergency-capability-assessment/wang-meiying
Response and recovery are the final two phases of disaster ma.docxwilfredoa1
Response and recovery are the final two phases of disaster management. As an agency, I would tell the chief that these phases are just as important as mitigation and preparedness and have subcomponents that need to be addressed. Romans 8:28 states, “And we know that for those who love God all things work together for good, for those who are called according to his purpose.” I would advise the chief that in response and recovery the purpose is to save lives, which requires working together for the good of the people. Working together means with other agencies to include federal, state and local, as well as working with the stakeholders of the community. Coming together in these phases is our purpose to save lives.
As a department, I would instruct the chief that we need to be informed and follow the procedures of the national response framework (NRF), the national incident management systems (NIMS), and the incident command system (ICS). Training needs to be held to understand how NIMS and ICS work and are implemented in response to a disaster. All members of the police department and especially supervisors need to train and be able to follow ICS. This will prepare the department for responding. The chief should encourage redundancy in response and recovery. According to Nemeth (2016), redundancy means that the department will have multiple systems, subsystems, assets, or processes in case one fails, or one is lost (p. 548). It is important to have redundancy because Murphy’s law plays into effect in the most serious of times, and having a backup system can help reduce saving lives.
In recovery, resiliency is also very important. According to FEMA’s document on the national disaster recovery framework, “Resilience is the ability to prepare for and adapt to changing conditions and withstand and recover rapidly from disruptions. Resilience includes the ability to withstand and recover from deliberate attacks, accidents, or naturally occurring threats or incidents” (p. 8). The department should research and find resources that are available in our area to help in recovery. Leaning on the stakeholders in the community to help with recovery is a necessary component, as taking on this task alone will be difficult. The recovery phase includes “the reconstitution of government operations and services, housing and services for displaced families and individuals; and replenishment of stockpiles” (Lindsay, 2012, p. 3). The community the department serves must work together with the agency to be successful in this phase. I would instruct the chief the importance of community relations to help with recovery as they will be able to provide resources and possibly help cut down on the budget required to provide services.
Continuity of operations planning is another component that requires training and budgeting to accomplish, but is a fairly simple concept. The phases within the continuity of operations is readiness and .
The document outlines Ontario's strategy to establish a provincial trauma system through Regional Trauma Networks (RTNs). It discusses establishing two pilot RTNs, evaluating their experiences, and developing tools to support expanding the RTN model province-wide. Performance measures will track effectiveness over the next 2-4 years. By providing leadership, education, and knowledge sharing, RTNs are expected to become self-sustaining and advance Ontario's inclusive trauma system.
Mass Atrocities and Armed Conflict: Links, Distinctions and Implications for ...frameworkteam
Presentation from a brown bag lunch discussion organized by the UN Interagency Framework Team for Preventive Action on "Mass Atrocities and Armed Conflict: Links, Distinctions and Implications for Prevention", held on 23 March 2011.
Please note that the designations employed and the presentation of material in this information product do not imply the expression of any opinion whatsoever on the part of the United Nations concerning the legal or development status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. The mention of specific companies or products of manufacturers, whether or not these have been patented, does not imply that these have been endorsed or recommended by the United Nations in preference to others of a similar nature that are not mentioned.
LIVING WITH THE EARTHObjectives for this.docxcroysierkathey
LIVING WITH THE EARTH
Objectives for this Chapter
A student reading this chapter will be able to:
Discuss the history and origins of Incident Command System (ICS), the National Incident Management System (NIMS), and The National Response Plan (NRP.
List and describe the major components of ICS, NIMS, and NRP
Objectives for this Chapter
A student reading this chapter will be able to:
Describe and discuss the role of Environmental Health professionals in emergency/disaster response.
IntroductionIt is not terrorist bombs or the release of anthrax spores that spawned the birth of modern day emergency preparedness.
USS Cole
IntroductionIt began with a wildfire in Southern California in 1970 that swept through several counties during a 13 day period burning more than half a million acres, destroying over 700 structures, and costing 16 lives.
FIRESCOPEthe 92nd Congress approved funding for the U.S. Forest Service Research group to design a system or process to significantly improve the capacity of the agencies in Southern California to provide protection against wildfires.
This became known as FIRESCOPE (Firefighting Resources of California Organized for Potential Emergencies).
FIRESCOPE
There were five major program components that required planning and attention.
The coordination of the resources among many agencies during a large incident,
Creating a standard and easily understood terminology by all participants to avoid the use of professional jargon that would differ among police, fire, and emergency medical responders,
Code Four-----I'm okay or Are you okay? Police
Fire departments almost never use this term.
FIRESCOPE
Develop systems and technical capacity that would permit communication among many participating agencies,
Provide training to all members of the participating agencies in communication, terminology, and command structure, and
Develop better methods for predicting the behavior of fires.
Incident CommandThese objectives were ultimately condensed into two components of the FIRESOPE system designated as:Incident Command System (ICS) that provided a specific command structure and coordinated incident management tool.Multi-Agency Coordination System (MACS) that improved coordination among multiple agencies for large incidents that demanded massive resources.
ICSICS structure and successfully employed ICS on a number of wildland and urban fires in 1978. The use of ICS expanded to non-fire incidents. The management of these incidents was “all-hazard” as they employed the well documented and proven command structure of ICS to a wide variety of incidents.
NIIMSInitial steps to extend this ICS management structure began in 1983 with the creation of the National Inter-Agency Incident Management System (NIIMS).
Post 9/11In swift reaction to 9/11, the Homeland Security Act of 2002 (H.R. 5005-8) was approved with the purpose of establishing a Department of Homeland Secur ...
NRFThe National Response Framework (NRF) is a guide to how.docxgibbonshay
The National Response Framework (NRF) establishes the fundamental mission for emergency response in the United States, including engaging partnerships, tiered responses, and unified efforts. The National Incident Management System (NIMS) guides government and private sector organizations on allocating resources and coordinating response efforts for any type of national emergency. The Incident Command System (ICS) provides an organizational structure and tools to help all response agencies work together efficiently and precisely during emergencies. Effective communication and coordination between responding entities is also important for clear understanding of roles and responsibilities.
NRFThe National Response Framework (NRF) is a guide to how.docxmccormicknadine86
NRF
The National Response Framework (NRF) is a guide to how the nation responds to all types of disasters and emergencies.
The NRF is used to prevent, prepare for, respond to, and recover from terrorist attacks, major disasters, and other emergencies.
The NRF also established a fundamental mission to (1) engage partnerships; (2) tiered response; (3) flexible and adaptable operational capability; (4) unity of effort through unified command; and (5) readiness to act.
The governor coordinates state resources and provides the guidance for all types of incidents.
NIMS
The National Incident Management System (NIMS) focus is to better improve the nation's response to emergencies. Its goal is a better system that can more efficiently allocate resources in the event of a disaster and facilitate cooperation among diverse entities and agencies.
NIMS guides all levels of government, non-governmental organizations (NGO), and the private sector to work together to prevent, protect against, mitigate, respond to, and recover from incidents.
A comprehensive, nationwide, systematic approach to incident management, including the command and coordination of incidents, resource management, and information management
A set of concepts and principles for all threats, hazards, and events across all mission areas (Prevention, Protection, Mitigation, Response, Recovery)
Scalable, flexible, and adaptable; used for all incidents, from day-to-day to large-scale
Standard resource management procedures that enable coordination among different jurisdictions or organizations
ICS
Management system designed to enable effective and efficient domestic incident management by integrating a combination of facilities, equipment, personnel, procedures, and communications operating within a common organizational structure.
Structured to facilitate activities in five major functional areas: command, operations, planning, logistics, Intelligence & Investigations, finance and administration.
Purpose of enabling incident managers to identify the key concerns associated with the incident often under urgent conditions without sacrificing attention to any component of the command system.
The National Response Framework (NRF) is the guide that established the fundamental mission to engage partnerships, tiered responses, and unit efforts. In short, the NRF is responsible for all the planning and preparedness that goes into the support of the communities.
The National Incident Management System (NIMS) guides the government officials and organizations in the private sector regarding the necessary recourses for the emergencies they are faced with daily. The system is set-up to be resourceful towards any kind of national emergency event, whether it’s to mitigate, prevent, protect against, respond to, and recover from.
The Incident Command System (ICS) assist in bring the necessary tools and plans of action to the major areas in an emergen.
Explain how the concept of whole community is used at the local le.docxSANSKAR20
Explain how the concept of whole community is used at the local level of government to mitigate against risk.
Instructions: Fully utilize the materials that have been provided to you in order to support your response. Your initial post should be at least 350 words. APA format, use ctations.
Lesson
Week Two – The National Preparedness System
In March of 2011, the executive branch of the federal government issued Presidential Policy Directive (PPD) 8. This directive described how the nation will prepare for those threats and hazards that constitute the greatest risk to national security. PPD 8 was followed in the fall of that same year with the publication of the National Preparedness Goal (which was updated in 2015), and then a month later with the National Preparedness System (NPS). Similar to the term “risk” that was focused upon in our first lesson, “prepare” or “preparedness” are key terms as well as it relates to the underlying principles of this entire course. In order to properly examine the National Preparedness System, these terms as used within the context of the NPS must be understood.
As previously noted, we directed attention upon the notion of risk last week. We should remain cognizant that risk refers to the overall consequences represented by various types of threats and hazards. The analysis of risk rests within an all-hazards system and approach, wherein all dangers to a community are examined. In addition, these dangers are prioritized, not on preconceived notions of importance, but upon the actual, detrimental impact they have on a community. Acts of terrorism and of other man-made incidents of violence must be considered alongside natural and technological hazards as well; prioritized in a manner where preparedness and mitigation efforts can be appropriately discussed, formulated, and implemented. In essence, through its various components, the National Preparedness System offers a very consistent and dependable methodology that can be applied to a host of activities; those that range from aiding the decision making process to identifying and allocating resources (DHS, 2011).
So just as the NPS requires us to take a broad view of those elements that determine risk, it similarly requires us to take a wide-ranging view of preparedness as well. In essence, preparedness refers to a community’s ability to respond immediately to a disastrous event (remember, disaster events range from acts of terrorism to industrial accidents to natural disasters). Preparedness also refers to the community’s ability to recover from the event; and preparedness refers to all of those actions taken by the community to either prevent the event, or to mitigate the consequences of that event.
Within the National Preparedness System, the National Preparedness Goal (2015) defines the system’s measure of success as “A secure and resilient nation with capabilities required across the whole community to prevent, protect against, mitigate, respon ...
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
Dandelion Hashtable: beyond billion requests per second on a commodity serverAntonios Katsarakis
This slide deck presents DLHT, a concurrent in-memory hashtable. Despite efforts to optimize hashtables, that go as far as sacrificing core functionality, state-of-the-art designs still incur multiple memory accesses per request and block request processing in three cases. First, most hashtables block while waiting for data to be retrieved from memory. Second, open-addressing designs, which represent the current state-of-the-art, either cannot free index slots on deletes or must block all requests to do so. Third, index resizes block every request until all objects are copied to the new index. Defying folklore wisdom, DLHT forgoes open-addressing and adopts a fully-featured and memory-aware closed-addressing design based on bounded cache-line-chaining. This design offers lock-free index operations and deletes that free slots instantly, (2) completes most requests with a single memory access, (3) utilizes software prefetching to hide memory latencies, and (4) employs a novel non-blocking and parallel resizing. In a commodity server and a memory-resident workload, DLHT surpasses 1.6B requests per second and provides 3.5x (12x) the throughput of the state-of-the-art closed-addressing (open-addressing) resizable hashtable on Gets (Deletes).
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor IvaniukFwdays
At this talk we will discuss DDoS protection tools and best practices, discuss network architectures and what AWS has to offer. Also, we will look into one of the largest DDoS attacks on Ukrainian infrastructure that happened in February 2022. We'll see, what techniques helped to keep the web resources available for Ukrainians and how AWS improved DDoS protection for all customers based on Ukraine experience
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Application of Semantic Knowledge Management System in Selected Areas of Polish Public Administration
1. Anna Wróblewska1,2, Aleksandra Zięba1,3, Renata Mieńkowska-Norkiene1,3,
Paweł Kapłański1, Paweł Zarzycki1
Application of Semantic Knowledge Management System
in Selected Areas of Polish Public Administration
1. Introduction
Knowledge management systems (KMS) play an important role with respect
to the advancement of information management, collaboration and information
sharing4. Ontologies and also all the aspects of semantic technologies (e.g. SWRL
rules, reasoners), which are applied in KMS, allow to represent static knowledge
about given part of the world. Ontologies are used for sharing knowledge and
common understanding of a particular domain of interest, which makes
communication between various beings possible and unambiguous. The various
actors may be human users with different levels of expertise or computer
programs (agents).
Ontology refers to a description of a given part of the world using a specific
vocabulary and a set of explicit assumptions concerning intended meaning of
words from the vocabulary. It incorporates common vision about knowledge that
is (to be) represented5. Generally, the semantic technologies allow for easy
adaptation to changes in legislation and procedures without the need for
intervention in the system architecture and its internal structure. In this case, we
need to exchange only the knowledge of the system described using ontologies
and defined rules. Additionally to whole spectrum of semantic technologies,
interfaces using controlled natural language (CNL) can improve human-computer
interaction easiness and efficiency.
In this paper we present an architecture and some ideas associated with
KMS, e.g. application of ontologies and interfaces using CNL. We show that the
tools have a potential to improve effectiveness and efficiency of work
coordination in specific fields of Polish public administration. The areas of
administration are crisis management and EU policy coordination processes. At
first (in section 2 and 3) we introduce the domains and we analyse their actors,
current problems, processes, existing solutions etc. In the following sections the
principal contributions of this document are: a general view of an architecture of
KMS applied to coordination processes in the chosen areas (section 4), a simple
use case dedicated to crises management showing the usefulness of ontologies,
1
Cognitum Sp. z o.o., email: office@cognitum.eu
2
Institute of Computer Science, Warsaw University of Technology, email: awroblew@ii.pw.edu.pl
3
Institute of Political Science, University of Warsaw
4
S. Staab, R. Studer, Handbook on Ontologies, 2nd ed., Springer 2009
5
A. Sheth, C. Ramakrishnan, Semantic (Web) Technology In Action: Ontology Driven Information
Systems for Search, “Integration and Analysis, Bulletin of the Technical Committee on Data
Engineering”, 26 (4) 2003, pp. 40-48
2. automated reasoning and CNL interfaces in this field (section 5). In the last
section we conclude our work and give an overview of future works.
2. Crisis Management Processes
Crisis management (CM) is an activity of public administration which is a
part of national security management. Crisis management is focused on four
distinct but intertwining phases: mitigation, preparation, response and recovery. It
is an interdisciplinary field dealing with the strategic organizational management
processes (an integrated rescue and emergency system) used to prevent critical
situations (hazard analysis, risk assessment), prepare to assume control of crises
by way of planned activities, to respond in case of emergencies, removing their
effects and restoring the resources and critical infrastructure.6 In Poland, the crisis
management corresponds more to the definition of crisis management activity
rather than only crisis management. It is not restricted only to respond to the
identified risks, but it is a holistic process that deals with the prevention of crises,
preparing to take control of them as a result of planned actions, responses, and
then the reconstruction of the destroyed infrastructure. The reconstruction also
includes prevention, because it forces that making infrastructure decisions and
drawing conclusions about the improvement of the situation so as to minimize the
effects of subsequent events.7
The crisis management system (CMS) formed bodies that are interrelated. In
Poland, the CMS comprises: disaster management authorities, advisory-consulting
bodies (crisis management teams) and crisis management centers. At all
administrative levels are created appropriate organizational units. The legal basis
for the functioning of the Polish crisis management system is the Act on Crisis
Management 26, April 2007, defining composition rules functioning and powers
of the institutions at every level of administrative division.8 CMS in Poland can be
divided into 4 levels: national, voivodeship (provinces), powiats (counties) and
gminas (communes or municipalities). However, the possible influence of the
gminas level is limited by the lack of compatibility and lack of standardization.
The position of central coordination (voivodeship) is mainly functional, while at
the level of gminas, powiats and regional real actions are taken.9 Crisis
6
Ustawa z dnia 26 kwietnia 2007 r. o zarządzaniu kryzysowym, Dz.U. 2007 nr 89 poz. 590.
7
W. Skomra, Zarządzanie kryzysowe – praktyczny przewodnik po nowelizacji ustawy, Presscom
Sp. z o.o., Wrocław 2010.
8
Other legal acts: Zarządzenie Nr 86 Prezesa Rady Ministrów z dnia 14 sierpnia 2008 r. w sprawie
organizacji i trybu pracy Rządowego Zespołu Zarządzania Kryzysowego (M.P. z 2008 r. Nr 61,
poz. 538); Rozporządzenie Prezesa Rady Ministrów z dnia 10 lipca 2008 r. w sprawie organizacji i
trybu działania Rządowego Centrum Bezpieczeństwa (Dz. U. z 2008 r. Nr 128, poz. 821);
Rozporządzenie Rady Ministrów z dnia 15 grudnia 2009 r. w sprawie określenia organów
administracji rządowej, które utworzą centra zarządzania kryzysowego, oraz sposobu ich
funkcjonowania ( Dz.U. z 2009 nr 226 poz. 1810)
9
If a threat covers one gmina (municipality/commune), to fully function properly managing the
prefect (wójt), the mayor, president of the city, sometimes with help/advisory of starost (powiat
level). When a threat is present in more than one municipality, a starost takes over the
management. Similarly, the situation is an emergency in several counties – a governor (voivode)
takes over the management.
3. management is focused primarily on acquiring, processing and distribution of
information. The information is the basis for further action, issue decisions, and it
enables communication between services/ actors of the system. Rapid circulation
of information is very important in this process, and therefore are created twenty-
four hour crisis management centers. They provide the service of the tasks on
national level. On the highest central level is formed Governmental Crisis
Management Team, chaired by the Prime Minister. The tasks of the team are
advisory and opinion-making activities, its value increases in time of crisis. The
super ministerial structure responsible inter alia for civil emergency planning,
ongoing monitoring of risks, and to ensure a continuous flow of information
across the country is the Government Centre for Security (RCB).10 Nevertheless,
it is not known who is the supervisor over the voivodeship, because RCB is
subjected to Prime Minister and there exists Department of Rescue Services and
Citizen Protection in Ministry of the Interior. On provinces level are appointed
Voivodeship Crisis Management Centres and on district level Powiat Crisis
Management Centres.11 At the gminas level, such a center could be set up.
However, in most cases, risk monitoring is carried out by people working in
independent positions on crisis management in collaboration with prefect. The
key element of emergency preparedness here is municipal emergency program
planning, which includes identifying and asserting the risks the community faces.
Crisis management plans are also formed at the powiat, voivodeship and national
level, and usually there are copied by the lowest levels. The goal of making plan
on different levels is to develop systematic procedures that provide an effective
response to a probable emergency.
Crisis always results in disruption of the existing order. It is usually
unpredictable and entails qualitative changes in the functioning system,
organization, or country. It includes often a catastrophic phenomenon, due to
natural causes or uncontrolled humans activities, causing a threat to themselves
and the environment in which they live. The factors that make up a crisis are: time
pressure, state of emergency, and a surprise. An important factor is characterized
by crisis management operation under pressure, especially at the stage of
response. In general, you can divide crises because of the environment from
which they come to: natural disasters, technical specifications, acts of terrorism
and other threats.12 That the situation could be considered a crisis there must
occur: the circumstances of a given situation conditioning the negative impact on
the level of security of citizens and at the same time the inadequacy of the forces
and resources available and applicable to the event by public authorities. The
crisis we face when security is breached. It begins the process variable, which
10
Government Centre for Security (Rządowe Centrum Bezpieczeństwa), homepage:
http://www.rcb.gov.pl
11
A. Najgebauer, Modele zagrożeń aglomeracji miejskiej wraz z systemem zarządzania
kryzysowego na przykładzie miasta stołecznego Warszawy, Wojskowa Akademia Techniczna,
Warszawa 2009, p. 25
12
Crisis Management Center (Centrum Zarządzania Kryzysowego) http:/czk.pl; A. Kurkiewicz,
Zarządzanie sytuacjami kryzysowymi w polskim systemie prawnym, in: M. Jabłonowski, L.
Smolak eds., Zarządzanie kryzysowe w Polsce, Akademia Humanistyczna imienia Aleksandra
Gieysztora, Pułtusk 2007, pp. 151-152.
4. affects external and internal factors. It is also a state of instability, violation of
social ties, characterized by the possibility of losing control of the situation.13
The universal principles of crisis management can be reduced to five rules:
• The dominance of the territorial structure over departmental,
• Single command (leadership and responsibility),
• Responding on the lowest level of administration,
• The principle of subsidiarity,
• Combination of forces and means at every possible level of government.
The main challenges that are associated with these rules should therefore be:
monitoring and current assessment of the situation; ensuring exchange of
information with the relevant authorities (including the emergency services,
security and social benefit institutions); warning and alerting the personnel of
military units; preparation the necessary forces and resources to use (equipment
suppliers) to join the anti-crisis in conjunction with other forces (such as co-
district municipality); the coordination of the various emergency services; if
necessary armed force branches in emergency operations; response to build up an
emergency and direct the action and inform the public; preserve the continuity of
opinion, that there are adequate levels of readiness for military units.
The complexity of the tasks and duties are determined with three criteria:
time, space and aggregation (information presentation). The information used in
crisis management refers to these dimensions at each stage (e.g. the spread of the
epidemic in the region, the threat of flooding). In a crisis situation, the information
may generally vary with time. The ability to calculate the time for the
implementation of a specific task and the reality of the project in relation to time,
we have the disposal affects the effectiveness and feasibility of response plans.
The criterion of time in emergency response planning is a prerequisite for
effective action. The data must be delivered to the intervention units aggregated
and properly presented, such as a specific map or map layer (it includes working
with geo-information). Analysis of the information is to take the form of decision
analysis. The decision here is choosing the objectives, methods and tools of
action. Information and decision-making process, occurring in emergency
management, is a systematic processing of information in the operating
instructions.14
The creation of a knowledge management system based on human-computer
interaction in natural language would be a real support for the actors and
performers of CMS. Process would improve the flow of information and shorten
the time of decision. The latest scientific projects in Europe that are applied to the
area of crisis management and which partially inspired our approach are:
ORCHESTRA15, OASIS16, Dynamic Geovisualization in Crisis Management17,
ISyCri18.
13
W. Kitler, Istota zarządzania kryzyoswego, in: J. Gryz, W. Kitler eds., System reagowania
kryzysowego, Wydawnictwo Adam Marszałek, Toruń 2007, pp. 20-23
14
R. Grocki, Kryterium czasu w planach reagowania kryzysowego, in M. Jablonski, L. Smolak
eds., op. cit, pp. 219-227
15
Open Architecture and Spatial Data Infrastructure for Risk Management, an European project,
2005-2008, www.eu-orchestra.org
5. 3. EU Policy Coordination Processes
EU policy coordination (EUPC) processes on national level are processes of
elaboration of instructions for representatives of national public administrations
on how to vote (and what position to represent) in the Council. The subject of
coordination is a proposal of a legal act of the EU (usually a directive).
Governments which are well coordinated, are considered to be more efficient,
experience fewer conflicts as well as use less and more rationally public resources
in pursuit for achievement of their political goals.19
Coordination of European policies is an extremely important issue for
Polish public administration, since its purpose is efficient realization of national
interests on European level and proper implementation of European policies into
national policies.20 In order to achieve the above mentioned purposes, it is
necessary to properly use administrative resources (e.g. human, financial),
administrative capacities (e.g. know-how, best practices), and efficient systems
supporting the coordination process (document exchange, communication,
division of responsibilities). European integration process, since it bases to a
certain extent on path-dependence model, requires efforts to maintain acceptable
level of participation in decision and policy-making processes on the level of
European institutions. Therefore it is essential to build efficient system of
coordination of European matters in order not to be a European laggard. As for
now Poland is one of these Member States which least efficiently coordinate
European policies (regarding mainly implementation of the EU law) 21. This fact
underlines the need (actually indispensability) for improvement of the EU policies
coordination system.
In Poland, the system of coordination of EU policies is led by the Polish
Prime Minister and Minister of Foreign Affairs (MFA). In the MFA there is a
special Committee for European Affairs, which is responsible for overall
coordination of the EU issues in Poland.22 All the coordination actors have a
dedicated hierarchical structure and they include mainly ministries, parliament,
Permanent Representation of Poland in the EU, central agencies and social
partners. They are involved in the process of gathering information necessary for
16
Open Advanced System for Improved Crisis Management, an European project, 2004-2008,
www.oasis-fp6.org
17
Project in Czech Republic, 2005-2011, http://www.muni.cz/research/projects/2134
18
Information Systems Interoperability in Crisis Situations, project in France, 2007-2010,
http://www.irit.fr/isycri/eng
19
H. Kassim, B. G. Peters, V. Wright, The National Co-ordination of EU Policy Volume 2 The
Domestic Level, Oxford 2001, pp.1-21
20
Ibidempp.2-12
21
R. Zubek, K. Staronova, Ministerial Transposition of EU Directives: Can Oversight Improve
Performance?, Institute fo European Integration Research, Working Paper No. 09/2010, December
2010, available at: http://www.eif.oeaw.ac.at/downloads/workingpapers/wp2010-09.pdf, accessed
04.09.2012
22
Ustawa z dnia 27 sierpnia 2009 r. o Komitecie do Spraw Europejskich ((Dz.U. z 2009 r. Nr 161,
poz. 1277), Ustawa z dnia 8 sierpnia 1996 r. o Radzie Ministrów (Dz.U. z 2003 r. Nr 24, poz. 199
ze zm.)
6. elaboration of Polish position in European institutions, processing documents
related to the position, managing communication with other institutions involved,
sticking to strict time frame etc.23
Summing up, important aspects in EU policies coordination are
communication channels and tools (for communication) among the actors and
subjects of coordination (documents, usually proposals of the EU legal acts). All
the taken actions and decisions are based on and derived from legal acts
(underlying a system of relations as well as division of competences and
responsibilities in coordination). At the end of one coordination process there are
outcomes of coordination: usually instructions and positions.
The knowledge which needs to be managed in the coordination system
regards: (i) legal bases which needs to be applied (procedures) – mainly laws,
regulations of ministers and others; (ii) actions undertaken within the process
(preparation of instructions, detailed analysis of the documents’ merit,
consultations with social partners etc.); (iii) actors involved in certain actions
(actors’ hierarchy, division of responsibilities); (iv) documents to be dealt with at
certain stages of the process (instructions, positions, adopted legal acts to be
implemented).
There are a few systems supporting document flow (e.g. EWD-P of Rodan
Systems SA24) and communication in Polish public administration (intranet;
skuteczni.gov.pl). They are, nevertheless, usually hardly efficient, applying them
requires a lot of effort on the side of officials. They require constant monitoring of
changes and updating. They have been implemented only in some institutions of
the whole system. There have been diagnosed numerous problems pointing out
not only a necessity but also indispensability of building a complex and “tailor-
made” system supporting coordination of European policies on national level in
Poland.
Some of the most important problems arising from EUPC processes and
currently implemented systems: (i) a number of contradictions, discrepancies,
various procedures among different divisions involved in a coordination process,
not unified categories of legal acts and regulations; (ii) lack of tools supporting
prioritization of goals and objectives of coordination on the basis on legal acts,
(iii) poor distribution of tasks and not effective communication among competent
authorities and / or officials; (iv) only transposition of directives or only document
flow without any focus on the merit. All these issues lead to inability to properly
diagnose problems in coordination process (without a uniform system they are
hard to be detected), and find ways to solve them.
There is a need of substantive knowledge base, streamlining preparation of
instructions and Polish positions in European institutions. The knowledge
management system (KMS) may not only fill in the gap in technological support
for coordination institutions but also solve numerous problems arising from
dysfunctions of the already existing systems (e.g. poor user experience, lack of
23
R. Mieńkowska-Norkiene, Koordynacja polityk unijnych w Polsce, Warszawa 2009, pp.6-11
Also: N. K. Tabaszewski, Struktury koordynacji polityki europejskiej w Polsce, Annales
Universitatis Mariae Curie-Skłodowska Lublin – Polonia, Vol. XVIII, 1 2011, pp.51-66
24
http://www.rodan.pl/web/guest/przykladowe/wdrozenia/ewdp
7. appropriate training for end users, incoherent information infrastructure). The
system can lead to efficient use of tools and instruments enabling high
coordination performance. Such knowledge management system can: (i) gather
and systematize info about sources of expertise and experts themselves, (ii) merge
various procedures, (iii) unify categories of legal acts and regulations. We assume
that the system contains a full set of procedures in certain area and thus it enables
avoidance of contradictory procedures, it can finds duplications. This results in
putting in proper order legal acts and procedures (according to rules of “lex
posterior derogat legi priori” and “lex specialis derogat legi generali”).
Furthermore, the system may provide the end users access to as large as
necessary knowledge base which may be used by them without specific
knowledge of description logic. A big advantage of the KMS based on use of
controlled natural language interface is that it can be effectively used even by
users without domain knowledge. In the Polish coordination system it is important
since it involves both actors involved in proceeding information without analyzing
it (e. g. European departments in ministries) as well as actors dealing with domain
knowledge (departments in ministries responsible for the merit of Polish positions
in the EU institutions in specific fields).
4. Knowledge Management Systems in Public Administration
In response to the above mentioned problems in the selected areas of Polish
public administration, we propose a specially designed semantic knowledge
management system Ontorion Knowledge Server25. The system collects
knowledge and information from different sources (e.g. web services, institution
databases, other information entered by dedicated users with the specialized
interfaces). The knowledge in the system is designed as ontologies and SWRL
rules to define the common understanding of the domain. The advantage of this
design is that the knowledge can be easily changed while all the actual knowledge
is instantly available to all system actors and the system automatically adjusts its
behavior to this knowledge (through the rules/executors). Secondly end-users will
require less effort to learn how to interact with the system, since its User
Interfaces are built upon well-known schema (i.e. natural language). Last but not
least maintenance costs of this system are highly reduced, since this approach
leads to eliminate or reduces several phases of maintenance of the classical IT
system (e.g. system analysis, detailed design, implementation of data-base and
system codes, validation in test-environment and final acceptance tests).
Knowledge in coordination of the analyzed public administration fields can
be divided into at least 2 layers: general knowledge describing the common
understanding (e.g. crisis types and characteristics, types of rescue actors and their
resources, coordination actors, types of EU documents, types of legal acts),
specific concrete instances and their parameters (e.g. particular crisis event that
occurs at given date and time, one EUPC process). The first layer in ontology
terminology is called Terminology Box. They are concepts, relations and axioms.
25
http://www.cognitum.eu/semantics/Ontorion/
8. The second layer is called Assertion Box and it contains instances. In this article
we use term “meta-ontology” for the general knowledge with additional rules (e.g.
SWRL rules). The meta-ontology can gather the 2 layers, e.g. general actors
named as police, fire brigade (not particular teams and divisions).
In CM there are also additional facts associated with geo-information which
can be considered as another layer of knowledge. The concrete actors such as
individual fire brigade departments and their locations and particular resources
can be considered as belonging to the grained ontologies (not the general meta-
ontology). In EUPC the grained ontologies can gather information about
particular departments and persons involved in coordination institutions.
Our proposed system has dedicated interfaces that can be used by experts in
a specific domain, coordination users and other public (e.g. rescue teams in CM,
all the citizens). We assume that experts define the general knowledge in the
system (the interface is shown in Figure 1 at the right bottom corner).
Coordination users can specify instances (e.g. describe concrete documents and
processes in EUPC). An example of coordination user interface is shown in
Figure 1 on the right side. Other public can read selected information (e.g. to be
informed about a progress of a crisis and procedures to execute in that case).
Figure 1. The system interface dedicated for an expert to define domain
knowledge in CNL
Source: own development
The user interfaces utilize components allowing defining the knowledge in
controlled natural language (CNL)26, that is a subset of natural language with
restricted grammar and vocabulary in order to reduce its ambiguity and
complexity. In the last years, CNL has established itself in various application
26
P. Kapłański, Controlled English interface for knowledge bases, “Studia Informatica” 2011, vol.
32, no. 2A (96), pp. 486-494
9. fields as powerful knowledge representation language that is readable by humans
and processable by computers. We use CNL with formal semantic (e.g.
description logic, OWL standards, SWRL rules) that will allow us to provide a
domain ontology with rules. Then we apply automatic reasoning services and we
generate explanations (written in CNL) of the automatically provided
implications.
Summing up, new instances can be entered into a core storage (shown in the
central circle in Figure 1) in two ways: the new instances are grabbed
automatically from different sources (e.g. from structured data written in
databases, from private or public clouds, from GIS web services), the new
instances can be entered into the system by coordination user as it was said
before. The core storage can be distributed or central, implemented in NoSQL
technology (e.g. Cassandra27, Azure Tables28) or other RDF data store (e.g.
AllegroGraph29, Virtuoso30).
When a new instance is entered into the core storage, a specially designed
algorithm Modularizer is launched. The Modularizer31 extracts the whole
knowledge associated with the newly arrived instance (all the concepts, relations
in the ontology, associated SWRL rules etc.) and then it copies the ontology
module. The module is exported to one reasoning service (on the left side of
Figure 1). When the service reasons any new knowledge associated with the new
appearing instance, then an alert is produced. The alert is sent to the external
services dedicated to operate on the chosen special types of alerts. For example:
when we derive the new knowledge that police is needed at the site of particular
event, the dedicated service can call the proper emergency teams.
5. Use Case Dedicated to Crisis Management
In this use case we consider and construct only the meta-ontology of crisis
management. The ontology can characterize crises (crisis events, effects, risks and
dangers), the studied world (crisis environment: people, natural sites, goods) and
treatment system (communication and coordination actors, procedures and tasks
and the treatment infrastructure, e.g. resources). The ontology and some dedicated
SWRL rules are shown in Figure 2.
Our use case concerns a tanker accident and its effects. A tanker truck
(containing unknown toxic substance) had an accident. Several children of the
near kindergarten (outside when the accident happened) feel sick. We use the
ontology and reasoning engine to find answers to questions: what the dangers can
occur and what emergency services are needed. A fragment of the ontology and
SWRL rules and instances modelling the use case and written in CNL is shown in
27
http://cassandra.apache.org/
28
http://www.windowsazure.com/en-us/develop/net/how-to-guides/table-services/
29
http://www.franz.com/agraph/allegrograph/
30
http://virtuoso.openlinksw.com/rdf-quad-store/
31
P. Kaplanski, Syntactic Modular Decomposition of Large Ontologies with Relational Database,
in: N. Nguyen, R. Katarzyniak, A. Janiak,eds. New Challenges in Computational Collective
Intelligence, vol. 244 2009, Springer Berlin / Heidelberg, pp. 65-72
10. Figure 3. The developed system infrastructure can deduce that in our use case we
need such rescue teams as police, fire brigade and emergency medical services.
SWRL rules
Actor(?xa) Crisis(?xc) Danger(?xr) Effect(?xe) Procedure(?xp) assumes(?xa, ?xp)
causes(?xe, ?xr) induces(?xc, ?xe) reduces(?xp, ?xr) -> needs(?xc, ?xa)
Actor(?xa) Crisis(?xc) Crisis_Type(?xct) has-type(?xc, ?xct) reacts-to-type(?xa,
?xct) -> needs(?xc, ?xa)
Figure 2. A fragment of the developed ontology and SWRL rules modeling meta-
knowledge of crisis management (screenshot from Protégé ontology editor).
Source: own development
FRAGMENT OF GENERAL KNOWLEDGE
Communication-Disaster is a technical-disaster.
Toxic-Accident is a technical-disaster.
Fire is a technical-disaster.
Fire-Brigade is an actor.
Police is an actor.
Emergency-Medical-Service is an actor.
Fire-Brigade reacts-to-type Toxic-Accident.
Fire-Brigade reacts-to-type Fire.
Police reacts-to-type Communication-Disaster.
Securing-Suspicious-Substances reduces Contamination.
Fire-Brigade assumes Securing-Suspicious-Substances.
Leakage-Of-Toxins is an effect.
Leakage-Of-Toxins causes Contamination.
Contamination is a risk.
Sick-Children-Result is an effect.
Sick-Children-Result concerns Sick-Children.
Sick-Children are a people-group.
SWRL RULES
If Z is an actor and if a crisis has-type a crisis-type and if Z reacts-to-type the crisis-
type then the crisis needs-actor Z.
If Z is an actor and if an effect causes a danger and if a crisis induces the effect and if
Z assumes a procedure and if the procedure reduces the danger then the crisis needs-actor Z.
If Z is an actor and if an effect concerns a people-group and if a crisis induces the effect
and if it is true that the people-group has-victims and if Z is Emergency-Medical-Service
then the crisis needs-actor Z.
ACCIDENT DESCRIPTION
11. Tanker-Accident-X has-type Toxic-Accident.
Tanker-Accident-X has-type Communication-Disaster.
Tanker-Accident-X induces Sick-Children-Result.
Tanker-Accident-X induces Leakage-Of-Toxins.
REASONED RESULTS
Tanker-Accident-X must need Police.
Tanker-Accident-X must need Fire-Brigade.
Tanker-Accident-X must need Emergency-Medical-Service.
Figure 3. A fragment of the developed ontology and SWRL rules and instances
dedicated to taker accident use case. The knowledge is written in developed CNL
interface.
Source: own development
6. Conclusions and perspectives
In this paper we have investigated a problem of application of semantic
technologies and a distributed system architecture in selected areas of Polish
public administration. The chosen areas are crisis management and EU policy
coordination processes. We have sketched an architecture of semantic knowledge
management system Ontorion. We have described user interfaces and mechanisms
of dedicated controlled natural language. We have given a lot of examples
showing how to model domains of crisis management and EU policy
coordination. In the future we plan to elaborate CNL mechanisms for Polish
language, integrate geo-information and the presented meta-knowledge, collect
crisis management and UE policy coordination procedures to be coded in CNL
and extend the system to other disciplines, e.g. oncology medical guidelines.
Bibliography
Gryz J., Kitler W. (eds.), System reagowania kryzysowego, Wydawnictwo Adam
MarszałekToruń 2007,
Jabłonowski M., Smolak L. (eds.), Zarządzanie kryzysowe w Polsce, Akademia
Humanistyczna imienia Aleksandra Gieysztora, Pułtustk 2007;
Kapłański P., Syntactic Modular Decomposition of Large Ontologies with
Relational Database, in: “New Challenges in Computational Collective
Intelligence”, 2009, vol. 244, pp. 65-72, Springer Berlin/Heidelberg.
Kapłański P., Controlled English interface for knowledge bases, In: “Studia
Informatica”, 2011, vol. 32, no. 2A (96), pp. 486-494.
Kassim P., Peters B. G., Wright V., The National Co-ordination of EU Policy
Volume 2 The Domestic Level, Oxford 2001, pp.1-21.
Kassim H., Peters B. G., Wright V., The National Co-ordination of EU Policy
Volume I The European Level, Oxford 2001, Mieńkowska-Norkiene R.,
Koordynacja polityk unijnych w Polsce, Warszawa 2009, pp.6-11.
Najgebauer A., Modele zagrożeń aglomeracji miejskiej wraz z systemem
zarządzania kryzysowego na przykładzie miasta stołecznego Warszawy,
Wojskowa Akademia Techniczna, Warszawa 2009, Nowak-Far A., System
koordynacji polityki europejskiej w Polsce – administracja centralna, in:
Usprawnienie kształtowania się polskiego stanowiska w UE - skuteczniejsza
polityka europejska, Raport Instytutu Kościuszki, październik 2007 r., pp.21-
12. 22.
Sheth A., Ramakrishnan C.: Semantic (Web) Technology In Action: Ontology
Driven Information Systems for Search, Integration and Analysis, Bulletin of
the Technical Committee on Data Engineering, vol. 26 no. 4, pp. 40-48, 2003.
Skomra W., Zarządzanie kryzysowe – praktyczny przewodnik po nowelizacji
ustawy, Presscom Sp. z o.o., Wrocław, 2010.
Staab S.; Studer R., Handbook on Ontologies, 2nd ed., Springer, 2009.
Tabaszewski N. K., Struktury koordynacji polityki europejskiej w Polsce, Annales
Universitatis Mariae Curie-Skłodowska Lublin – Polonia, Vol. XVIII, 2011,
pp.51-66.
Ustawa z dnia 26 kwietnia 2007 r. o zarządzaniu kryzysowym, Dz.U. 2007 nr 89
poz. 590.
Ustawa z dnia 27 sierpnia 2009 r. o Komitecie do Spraw Europejskich, Dz.U. z
2009 r. Nr 161, poz. 1277.
Ustawa z dnia 8 sierpnia 1996 r. o Radzie Ministrów, Dz.U. z 2003 r. Nr 24, poz.
199 ze zm.
Zubek R., Staronova K., Ministerial Transposition of EU Directives: Can
Oversight Improve Performance?, Institute fo European Integration Research,
Working Paper No. 09/2010, December 2010.
Network sources
cassandra.apache.org/, accessed 12.09.2012
skuteczni.gov.pl/, accessed 12.09.2012
virtuoso.openlinksw.com/rdf-quad-store/, accessed 12.09.2012
www.cognitum.eu/semantics/Ontorion/, Semantic Knowledge Management
Framework, accessed 12.09.2012
www.czk.pl, Crisis Management Center (Centrum Zarządzania Kryzysowego),
accessed 12.09.2012
www.eif.oeaw.ac.at/downloads/workingpapers/wp2010-09.pdf, accessed
04.09.2012
www.eu-orchestra.org, Open Architecture and Spatial Data Infrastructure for Risk
Management, accessed 12.09.2012
www.franz.com/agraph/allegrograph/, accessed 12.09.2012
www.irit.fr/isycri/eng, Information Systems Interoperability in Crisis Situations,
accessed 12.09.2012
www.muni.cz/research/projects/2134, accessed 12.09.2012
www.oasis-fp6.org, Open Advanced System for Improved Crisis Management,
accessed 12.09.2012
www.rcb.gov.pl, Government Centre for Security (Rządowe Centrum
Bezpieczeństwa), accessed 12.09.2012
www.rodan.pl/web/guest/przykladowe/wdrozenia/ewdp, accessed 13.09.2012
13. www.windowsazure.com/en-us/develop/net/how-to-guides/table-services,
accessed 12.09.2012
Application of Semantic Knowledge Management System
in Selected Areas of Polish Public Administration
Summary: This paper describes an application of semantic technologies and
knowledge management systems in chosen areas of Polish public administration.
Short analyses of crisis management and EU policy coordination processes are
presented. An architecture of a knowledge management system with interfaces
using controlled natural language is proposed. A lot of examples are shown that
prove a usefulness of semantic knowledge management and automated reasoning
in these fields.
Keywords: crisis management, EU policy coordination, knowledge management
system, semantic technologies, ontologies, controlled, natural language, system
analysis.
Zastosowanie semantycznego systemu zarządzania wiedzą
w wybranych obszarach polskiej administracji publicznej
Streszczenie: Artykuł opisuje zastosowanie technologii semantycznych
i systemów zarządzania wiedzą w wybranych obszarach polskiej administracji
publicznej. Została przedstawiona krótka analiza dziedzin: zarządzania
kryzysowego i koordynacji polityki UE. Zaproponowano architekturę systemu
zarządzania wiedzą z interfejsami stosującymi komunikację za pomocą
kontrolowanego języka naturalnego. Podano przykłady pokazujące przydatność
semantycznego zarządzania wiedzą i automatycznego wnioskowania
w analizowanych dziedzinach administracji.
Słowa kluczowe: zarządzanie kryzysowe, koordynacja polityki UE, systemy
zarządzania wiedzą, technologie semantyczne, ontologie, kotrolowany język
naturalny, analiza systemowa