Using 3D Models And Discrete Simulations In Infrastructure Security Applications

  • Pierluigi Assogna
  • Glauco Bertocchi
  • Alberto Paoluzzi
  • Michele Vicentino
  • Giorgio Scorzelli
  • Roberto Zollo
Conference paper
Part of the The International Federation for Information Processing book series (IFIPAICT, volume 290)

Next generation systems for critical infrastructure protection must support capabilities such as behavior analysis, situation modeling and data mining integrated within sophisticated virtual or augmented reality interfaces. This paper describes the design goals and implementation of a platform for critical infrastructure security applications. The platform is designed to support semi-automated 3D modeling of infrastructures, 3D integration of sensor networks, situation modeling and visual simulation via 3D animation, and advanced situation analysis. Such a system would enable operators to recognize preliminary indications of crisis situations and promptly activate the appropriate countermeasures. It would also assist them in optimizing normal operations and conducting simulations for emergency planning and crisis management.


Geometric modeling simulation infrastructure security 


  1. 1.
    J. Armstrong, Programming Erlang: Software for a Concurrent World, Pragmatic Bookshelf, Raleigh, North Carolina, 2007.Google Scholar
  2. 2.
    P. Assogna, G. Bertocchi, A. Paoluzzi, G. Scorzelli and R. Zollo, From 2D plans to 3D building models for security modeling of critical infrastruc tures, to appear in International Journal of Shape Modeling, 2008.Google Scholar
  3. 3.
    J. Backus, Can programming be liberated from the von Neumann style? A functional style and its algebra of programs, Communications of the ACM, vol. 21(8), pp. 613–641, 1978.MathSciNetCrossRefzbMATHGoogle Scholar
  4. 4.
    J. Backus, J. Williams and E. Wimmers, An introduction to the programming language FL, in Research Topics in Functional Programming, D. Turner (Ed.), Addison-Wesley Longman, Boston, Massachusetts, pp. 219– 247, 1990.Google Scholar
  5. 5.
    C. Bajaj, C. Baldazzi, S. Cutchin, A. Paoluzzi, V. Pascucci and M. Vi-centino, A programming approach for complex animations (Part I:Methodology), Computer-Aided Design, vol. 31(11), pp. 695–710, 1999.CrossRefzbMATHGoogle Scholar
  6. 6.
    C. Bajaj, A. Paoluzzi and G. Scorzelli, Progressive conversion from B-rep to BSP for streaming geometric modeling, Computer-Aided Design and Applications, vol. 3(5), pp. 577–586, 2006.CrossRefGoogle Scholar
  7. 7.
    J. Cremer, J. Kearney and Y. Papelis, HCSM: A framework for behavior and scenario control in virtual environments, ACM Transactions on Modeling and Computer Simulation, vol. 5(3), pp. 242–267, 1995.CrossRefGoogle Scholar
  8. 8.
    C. Hewitt, P. Bishop, I. Greif, B. Smith, T. Matson and R. Steiger, Actor induction and meta-evaluation, Proceedings of the First Annual ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages, pp. 153–168, 1973.Google Scholar
  9. 9.
    R. Howarth, Spatial models for wide-area visual surveillance: Computational approaches and spatial building-blocks, Artificial Intelligence Review, vol. 23(2), pp. 97–155, 2005.MathSciNetCrossRefGoogle Scholar
  10. 10.
    A. Koestler, The Ghost in the Machine, Arkana, London, United Kingdom, 1967.Google Scholar
  11. 11.
    R. Lewis and C. Sequin, Generation of 3D building models from 2D architectural plans, Computer-Aided Design, vol. 30(10), pp. 765–779, 1998.CrossRefzbMATHGoogle Scholar
  12. 12.
    D. Luckham and B. Frasca, Complex Event Processing in Distributed Systems, Technical Report CSL-TR-98-754, Computer Systems Laboratory, Stanford University, Palo Alto, California, 1998.Google Scholar
  13. 13.
    J. Miller, G. Baramidze, A. Sheth and P. Fishwick, Investigating ontologies for simulation modeling, Proceedings of the Thirty-Seventh Annual Symposium on Simulation, pp. 55–63, 2004.Google Scholar
  14. 14.
    R. Ott, M. Gutierrez, D. Thalmann and F. Vexo, Advanced virtual reality technologies for surveillance and security applications, Proceedings of the ACM International Conference on Virtual Reality Continuum and its Applications, pp. 163–170, 2006.Google Scholar
  15. 15.
    A. Paoluzzi, Geometric Programming for Computer-Aided Design, John Wiley and Sons, Chichester, United Kingdom, 2003.CrossRefGoogle Scholar
  16. 16.
    A. Paoluzzi and A. D'Ambrogio, A programming approach for complex animations (Part II: Reconstruction of a real disaster), Computer-Aided Design, vol. 31(11), pp. 711–732, 1999.CrossRefzbMATHGoogle Scholar
  17. 17.
    A. Paoluzzi and G. Scorzelli, Pattern-driven mapping from architectural plans to solid models of buildings, presented at the Israel-Italy Bi-National Conference on Shape Modeling and Reasoning for Industrial and Biomedical Applications, 2007.Google Scholar
  18. 18.
    M. Park and P. Fishwick, Integrating dynamic and geometry model components through ontology-based inference, Simulation, vol. 81(12), pp. 795–813, 2005.CrossRefGoogle Scholar
  19. 19.
    L. Perrochon, W. Mann, S. Kasriel and D. Luckham, Event mining with event processing networks, Proceedings of the Third Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp. 474–478, 1999.Google Scholar
  20. 20.
    J. Peterson, Petri nets, ACM Computing Surveys, vol. 9(3), pp. 223–252, 1977.CrossRefzbMATHGoogle Scholar
  21. 21.
    I. Sebe, J. Hu, S. You and U. Neumann, 3D video surveillance with augmented virtual environments, Proceedings of the First ACM SIGMM International Workshop on Video Surveillance, pp. 107–112, 2003.Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • Pierluigi Assogna
    • 1
  • Glauco Bertocchi
    • 1
  • Alberto Paoluzzi
    • 1
  • Michele Vicentino
    • 1
  • Giorgio Scorzelli
    • 1
  • Roberto Zollo
    • 1
  1. 1.Third University of RomeRomeItaly

Personalised recommendations