Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 2 of 2
Full-Text Articles in Engineering
Synthesis Of Best Practices In Transportation Security, Volume Ii: Emergency Response, Rodrigo Vargas, Jon D. Fricker
Synthesis Of Best Practices In Transportation Security, Volume Ii: Emergency Response, Rodrigo Vargas, Jon D. Fricker
JTRP Technical Reports
Part I of the research focused on developing a methodology to identify and evaluate the most critical and vulnerable INDOT assets. This method aims at obtaining an index that reflects the vulnerability and criticality of an asset on the basis of multiple performance criteria. This methodology was tested on the seven INDOT districts. Because not all the factors that influence the vulnerability do have same weight, the analytical hierarchical process is used to obtain the weights for the criteria. Countermeasures are suggested as a part of the research to reduce the vulnerability of a given asset based on its relevant …
Synthesis Of Best Practices In Transportation Security, Volume I: Vulnerability Assessment, Haritha Reddy Venna, Jon D. Fricker
Synthesis Of Best Practices In Transportation Security, Volume I: Vulnerability Assessment, Haritha Reddy Venna, Jon D. Fricker
JTRP Technical Reports
Part I of the research focused on developing a methodology to identify and evaluate the most critical and vulnerable INDOT assets. This method aims at obtaining an index that reflects the vulnerability and criticality of an asset on the basis of multiple performance criteria. This methodology was tested on the seven INDOT districts. Because not all the factors that influence the vulnerability do have same weight, the analytical hierarchical process is used to obtain the weights for the criteria. Countermeasures are suggested as a part of the research to reduce the vulnerability of a given asset based on its relevant …