MODELING SENSORS AND THREATS IN A THREE-DIMENSIONAL REAL-TIME SIMULATION OF A SEAPORT ENVIRONMENT By ALLEN CHRISTIANSEN

نویسندگان

  • Lawrence Holder
  • Robert Lewis
چکیده

The members of the Committee appointed to examine the thesis of ALLEN CHRISTIANSEN find it satisfactory and recommend that it be accepted. iii ACKNOWLEDGMENT I would like to acknowledge the help and guidance that my graduate advisor Professor Lawrence Holder gave me throughout the entirety of the project. He helped me to look at problems I was encountering from a different angle, and encouraged me to explore new ideas I had on how to improve the project, regardless of how strange they sounded. I would also like to thank him for having patience with me when I procrastinated making the progress I should have been. I would also like to acknowledge the help of Dr. Cook, and Dr. Lewis in providing me with areas of research I overlooked in order to make the project more complete. Chair: Larry Holder Performing on-site testing for security configurations for a seaport can be quite costly both from a financial, and security perspective due to the effects that testing an ineffective configuration could have on both the efficiency and safety of the seaport in question. In order to alleviate these costs a simulation can be used to analyze new security configurations without disrupting normal operations. We postulate that such a simulation can provide enough fidelity that, even with performance limitations, an accurate evaluation of sensor configurations can be provided. We present the development of the particle emitter and sensor system which is used in PortSimulator, a three-dimensional simulation environment which can help security professionals perform cost effective analysis on configurations of passive sensors in a seaport environment. The main focus for our work was to try to develop a system which could provide the most accurate information while dealing with system performance constraints. Our tests for the different systems focus primarily on the aspect of performance. We address how the accuracy of our two primary propagation systems degrades when the number of particles fired at it increases. We also address ratios of sensors and emitters in regards to at what point does the number of sensors or emitters cause the system to perform so poorly that it is no longer usable.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Game-Based Simulation for the Evaluation of Threat Detection in a Seaport Environment

The ability to simulate a seaport environment, including illicit cargo and the sensors designed to detect such cargo, allows the evaluation of alternative detection methods in order to improve security at our nation’s seaports. We describe our progress towards this goal. Specifically, we describe our modeling of threats at a particle emission level, modeling of sensors as particle detectors, mo...

متن کامل

Design and Analysis of Cost-Efficient Sensor Deployment for Tracking Small UAS with Agent-Based Modeling

Recently, commercial unmanned aerial systems (UAS) have gained popularity. However, these UAS are potential threats to people in terms of safety in public places, such as public parks or stadiums. To reduce such threats, we consider a design, modeling, and evaluation of a cost-efficient sensor system that detects and tracks small UAS. In this research, we focus on discovering the best sensor de...

متن کامل

Simulation of Passive and Multistatic Active Sonar Contacts

Fields of distributed passive and multistatic active sonar sensors provide a surveillance capability against quiet submarine threats in ASW scenarios. A significant challenge of heterogeneous, multi-sensor systems is the successful fusion of information from the various sensors to enable robust target detection, classification, localization, and tracking. Sensor fusion and tracking algorithms m...

متن کامل

Reverse Modeling and Autonomous Extrapolation of RF Threats

This paper addresses the investigation of the basic components of reverse modeling and autonomous extrapolation of radio frequency (RF) threats in electronic warfare settings. To design and test our system, we first model RF threats using the radioactive parameters received. The enemy radar simulated with a transponder or emitter transmits electronic signals; next, the sensors of the system int...

متن کامل

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009