Using 3D Models And Discrete Simulations In Infrastructure Security Applications
نویسندگان
چکیده
Next generation systems for critical infrastructure protection must support capabilities such as behavior analysis, situation modeling and data mining integrated within sophisticated virtual or augmented reality interfaces. This paper describes the design goals and implementation of a platform for critical infrastructure security applications. The platform is designed to support semi-automated 3D modeling of infrastructures, 3D integration of sensor networks, situation modeling and visual simulation via 3D animation, and advanced situation analysis. Such a system would enable operators to recognize preliminary indications of crisis situations and promptly activate the appropriate countermeasures. It would also assist them in optimizing normal operations and conducting simulations for emergency planning and crisis management.
منابع مشابه
Accuracy of Discrete Element Method Simulations: Rolling and Sliding Frictions Effects-Case study: Iron Ore Pellets
The discrete element method (DEM) has been used as a popular simulation method in order to verify the designs by visualizing how materials flow through complex equipment geometries. Although DEM simulation is a powerful design tool, finding a DEM model that includes all real material properties is not computationally feasible. In order to obtain more realistic results, particle energy loss du...
متن کامل4D geomechanical simulations for field development planning
3D and 4D geomechanical can be time-consuming to build and calibrate. However, once such a model is built, it is relative straightforward to use this model for various field development and management applications. In so doing, the return on the initial investment of time and effort in the creation of a 4D geomechanical model can be substantial. I present a case study where a 4D geomechanical m...
متن کاملOptimum decoder for multiplicative spread spectrum image watermarking with Laplacian modeling
This paper investigates the multiplicative spread spectrum watermarking method for the image. The information bit is spreaded into middle-frequency Discrete Cosine Transform (DCT) coefficients of each block of an image using a generated pseudo-random sequence. Unlike the conventional signal modeling, we suppose that both signal and noise are distributed with Laplacian distribution, because the ...
متن کامل3D Path Planning Algorithm for Mobile Anchor-Assisted Positioning in Wireless Sensor Networks
Positioning service is one of Wireless Sensor Networks’ (WSNs) fundamental services. The accurate position of the sensor nodes plays a vital role in many applications of WSNs. In this paper, a 3D positioning algorithm is being proposed, using mobile anchor node to assist sensor nodes in order to estimate their positions in a 3D geospatial environment. However, mobile anchor node’s 3D path optim...
متن کاملModeling Host OSI Layers Cyber-Attacks Using System Dynamics
Cyber security modeling is the process of creating a normalized view of the cyber security situation. A typical cyber security model has information about the network infrastructure, security settings, and a list of possible vulnerabilities and threats. By using known vulnerabilities, and information about the infrastructure and security controls in place, the cyber security simulation allows a...
متن کامل