Next generation systems for critical infrastructure protection must support capabilities such as behavior analysis, situation modeling and data mining integrated within sophisticated virtual or augmented reality interfaces. This paper describes the design goals and implementation of a platform for critical infrastructure security applications. The platform is designed to support semi-automated 3D modeling of infrastructures, 3D integration of sensor networks, situation modeling and visual simulation via 3D animation, and advanced situation analysis. Such a system would enable operators to recognize preliminary indications of crisis situations and promptly activate the appropriate countermeasures. It would also assist them in optimizing normal operations and conducting simulations for emergency planning and crisis management.
Chapter PDF
Similar content being viewed by others
References
J. Armstrong, Programming Erlang: Software for a Concurrent World, Pragmatic Bookshelf, Raleigh, North Carolina, 2007.
P. Assogna, G. Bertocchi, A. Paoluzzi, G. Scorzelli and R. Zollo, From 2D plans to 3D building models for security modeling of critical infrastruc tures, to appear in International Journal of Shape Modeling, 2008.
J. Backus, Can programming be liberated from the von Neumann style? A functional style and its algebra of programs, Communications of the ACM, vol. 21(8), pp. 613–641, 1978.
J. Backus, J. Williams and E. Wimmers, An introduction to the programming language FL, in Research Topics in Functional Programming, D. Turner (Ed.), Addison-Wesley Longman, Boston, Massachusetts, pp. 219– 247, 1990.
C. Bajaj, C. Baldazzi, S. Cutchin, A. Paoluzzi, V. Pascucci and M. Vi-centino, A programming approach for complex animations (Part I:Methodology), Computer-Aided Design, vol. 31(11), pp. 695–710, 1999.
C. Bajaj, A. Paoluzzi and G. Scorzelli, Progressive conversion from B-rep to BSP for streaming geometric modeling, Computer-Aided Design and Applications, vol. 3(5), pp. 577–586, 2006.
J. Cremer, J. Kearney and Y. Papelis, HCSM: A framework for behavior and scenario control in virtual environments, ACM Transactions on Modeling and Computer Simulation, vol. 5(3), pp. 242–267, 1995.
C. Hewitt, P. Bishop, I. Greif, B. Smith, T. Matson and R. Steiger, Actor induction and meta-evaluation, Proceedings of the First Annual ACM SIGACT-SIGPLAN Symposium on Principles of Programming Languages, pp. 153–168, 1973.
R. Howarth, Spatial models for wide-area visual surveillance: Computational approaches and spatial building-blocks, Artificial Intelligence Review, vol. 23(2), pp. 97–155, 2005.
A. Koestler, The Ghost in the Machine, Arkana, London, United Kingdom, 1967.
R. Lewis and C. Sequin, Generation of 3D building models from 2D architectural plans, Computer-Aided Design, vol. 30(10), pp. 765–779, 1998.
D. Luckham and B. Frasca, Complex Event Processing in Distributed Systems, Technical Report CSL-TR-98-754, Computer Systems Laboratory, Stanford University, Palo Alto, California, 1998.
J. Miller, G. Baramidze, A. Sheth and P. Fishwick, Investigating ontologies for simulation modeling, Proceedings of the Thirty-Seventh Annual Symposium on Simulation, pp. 55–63, 2004.
R. Ott, M. Gutierrez, D. Thalmann and F. Vexo, Advanced virtual reality technologies for surveillance and security applications, Proceedings of the ACM International Conference on Virtual Reality Continuum and its Applications, pp. 163–170, 2006.
A. Paoluzzi, Geometric Programming for Computer-Aided Design, John Wiley and Sons, Chichester, United Kingdom, 2003.
A. Paoluzzi and A. D'Ambrogio, A programming approach for complex animations (Part II: Reconstruction of a real disaster), Computer-Aided Design, vol. 31(11), pp. 711–732, 1999.
A. Paoluzzi and G. Scorzelli, Pattern-driven mapping from architectural plans to solid models of buildings, presented at the Israel-Italy Bi-National Conference on Shape Modeling and Reasoning for Industrial and Biomedical Applications, 2007.
M. Park and P. Fishwick, Integrating dynamic and geometry model components through ontology-based inference, Simulation, vol. 81(12), pp. 795–813, 2005.
L. Perrochon, W. Mann, S. Kasriel and D. Luckham, Event mining with event processing networks, Proceedings of the Third Pacific-Asia Conference on Knowledge Discovery and Data Mining, pp. 474–478, 1999.
J. Peterson, Petri nets, ACM Computing Surveys, vol. 9(3), pp. 223–252, 1977.
I. Sebe, J. Hu, S. You and U. Neumann, 3D video surveillance with augmented virtual environments, Proceedings of the First ACM SIGMM International Workshop on Video Surveillance, pp. 107–112, 2003.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 IFIP International Federation for Information Processing
About this paper
Cite this paper
Assogna, P., Bertocchi, G., Paoluzzi, A., Vicentino, M., Scorzelli, G., Zollo, R. (2008). Using 3D Models And Discrete Simulations In Infrastructure Security Applications. In: Papa, M., Shenoi, S. (eds) Critical Infrastructure Protection II. ICCIP 2008. The International Federation for Information Processing, vol 290. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-88523-0_20
Download citation
DOI: https://doi.org/10.1007/978-0-387-88523-0_20
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-88522-3
Online ISBN: 978-0-387-88523-0
eBook Packages: Computer ScienceComputer Science (R0)