An IT Tool to Support Anti-crisis Training in WAZkA System: A Case Study

  • Wojciech Kulas
  • Zbigniew TarapataEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 935)


In the paper, the authors presented the concept and elements of implementation of the subsystem to support the training process of operators of the anti-crisis system. It was made in the form of emulators of hazard monitoring systems for the needs of an IT system supporting the analysis of threats in the form of CBRN (Chemical, Biological, Radiation, Nuclear) contamination, forecasting their effects and alerting the population (WAZkA).

The genesis of building the emulator subsystem is the need to provide a tool to support the training process of people involved in the activities of the National System of Detection of Contamination and Alarming (KSWSiA) in Poland. However, the emulators designed in this way can also be used as a tool to support the development of emergency procedures.

Emulators were proposed as IT tools. A constructive simulation was chosen as the emulation method, but reduced to a simple, determined data delivery in accordance with the previously prepared scenario.


Emulators Support of anti-crisis training Software development WAZkA system 



This work was partially supported by grant Noo DOB-BIO7/12/01/2015 of Polish National Center for Research and Development (NCBiR) titled “Integration and support of information management processes and decision optimization in warning and alarm system” [13] and Statutory Research Work of Institute of Computer and Information Systems, Cybernetics Faculty, Military University of Technology in Warsaw, Poland.


  1. 1.
    Binek, T., Czepiel, J.: The national system of contamination detection and alarm. Curr. Oper. Pol. BiTP 36(4), 15–24 (2014)Google Scholar
  2. 2.
    Bowman, W., Woods, D.: Emulation of multivariate simulators using thin-plate splines with application to atmospheric dispersion. SIAM/ASA J. Uncertain. Quantif. 4, 1323–1344 (2016)MathSciNetCrossRefGoogle Scholar
  3. 3.
    Gelenbe, E., Wu, F.-J.: Large scale simulation for human evacuation and rescue. Comput. Math. Appl. 64(12), 3869–3880 (2012)CrossRefGoogle Scholar
  4. 4.
    Grabowski, D., Kurowski, W., Muszynski, W., Rubel, B., Smagala, G., Swietochowska, J.: Radiation monitoring network in Poland. Nukleonika 46(4), 147–149 (2001)Google Scholar
  5. 5.
    Greenberg, A., Small, R., Zenyuh, J., Skidmore, M.: Monitoring for hazard in flight management systems. Eur. J. Oper. Res. 84(1), 5–24 (1995)CrossRefGoogle Scholar
  6. 6.
    Li, X.L., et al.: Framework for emergency decision exercise system of urban crisis based on Wargaming. Appl. Mech. Mater. 373–375, 1139–1143 (2013)CrossRefGoogle Scholar
  7. 7.
    Lipiński, P., Isajenko, K., Biernacka, M., Żak, A.: Integration of polish monitoring networks (ASS-500 and PMS systems). Nukleonika 46(4), 143–146 (2001)Google Scholar
  8. 8.
    Manatakis, D., Nennes, M., Bakas, I., Manolakos, E.: Simulation-driven emulation of collaborative algorithms to assess their requirements for a large-scale WSN implementation. In: Proceedings of the 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE Explore (2014)Google Scholar
  9. 9.
    Tarapata, Z.: Models and algorithms for knowledge-based decision support and simulation in defense and transport applications. Military University of Technology, Warsaw (2011)Google Scholar
  10. 10.
    Tarapata, Z., Antkiewicz, R., Chmielewski, M., Dyk, M., Kasprzyk, R., Kulas, W., Najgebauer, A., Pierzchała, D., Rulka, J.: A computer system for CBRN contamination threats analysis support, prediction their effects and alarming the population: polish case study. MATEC Web Conf. 125, 02012 (2017). Scholar
  11. 11.
    Waszkowski, R., Nowicki, T., Saniuk, A.: Human-computer interaction in sanitary inspection simulation exercises. In: Soares, M., Falcão, C., Ahram, T. (eds.) Advances in Ergonomics Modeling, Usability & Special Populations. Advances in Intelligent Systems and Computing, vol. 486. Springer, Cham (2017)Google Scholar
  12. 12.
    Yin, H., Song, D.: Automatic Malware Analysis. An Emulator Based Approach. Springer, New York (2013)CrossRefGoogle Scholar
  13. 13.
    WAZkA Project Homepage, Accessed 5 June 2018

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  1. 1.Faculty of CyberneticsMilitary University of TechnologyWarsawPoland

Personalised recommendations