18
http:// w a z k a.wat.edu.pl A Computer System for CBRN Contamination Threats Analysis Support, Prediction Their Effects and Alarming the Population: Polish Case Study CSCC’2017, Crete , 14 - 17.07.2017 Zbigniew TARAPATA, Ryszard ANTKIEWICZ, Mariusz CHMIELEWSKI, Michał DYK, Rafał KASPRZYK, Wojciech KULAS, Andrzej NAJGEBAUER, Dariusz PIERZCHAŁA, Jarosław RULKA Institute of Computer and Information Systems Faculty of Cybernetics Military University of Technology, Warsaw , Poland

A Computer System for CBRN Contamination Threats Analysis

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: A Computer System for CBRN Contamination Threats Analysis

http://wazka.wat.edu.pl

A Computer System for CBRN Contamination

Threats Analysis Support, Prediction Their

Effects and Alarming the Population:

Polish Case Study

CS

CC

’201

7, C

rete

, 14-

17.0

7.20

17

Zbigniew TARAPATA, Ryszard ANTKIEWICZ,

Mariusz CHMIELEWSKI, Michał DYK, Rafał KASPRZYK,

Wojciech KULAS, Andrzej NAJGEBAUER,

Dariusz PIERZCHAŁA, Jarosław RULKA

Institute of Computer and Information Systems

Faculty of Cybernetics

Military University of Technology, Warsaw, Poland

Page 2: A Computer System for CBRN Contamination Threats Analysis

AGENDA

✓ Project Genesis:

✓ Description of The National System for Detection of Contamination and

Alarming in Poland;

✓ Main goals of the project;

✓ A concept of WAZkA system:

✓ In English: System for CBRN (Chemical, Biological, Radiological, Nuclear)

Contamination Threats Analysis Support and Alarming;

✓ In Polish: system Wsparcia Analiz Zagrożeń Skażeniami i Alarmowania;

✓ Selected IT tools in WAZkA system:

✓ Event Tree Analyser (ETA);

✓ Emulators of Threat Monitoring Systems;

✓ Integration with existing threat simulators (SI Promien, Aloha);

✓ Common Operational Picture (COP);

✓ Conclusion.

Page 3: A Computer System for CBRN Contamination Threats Analysis

The National System for Detection of Contamination and Alarming in Poland

✓ The functional systems, which constitute the KSWSiA/NSDCA

system core, are the following:

✓ The System of Contamination Detection of the Armed Forces of the

Republic of Poland - supervised by the Minister of National Defense,

✓ networks and systems for the epidemiological surveillance and

control of communicable diseases in the country as well as national

contact points for the international surveillance system to identify

threats to human health and life of large populations - supervised by the

Minister of Health,

✓ systems of early detection of radioactive contamination and

radioactive contamination centers, whose activities are coordinated by

the President of the National Atomic Energy Agency,

✓ voivodeship early detection systems supervised by Voivodes,

✓ systems for epizootic and phytosanitary surveillance, supervision

of safety of animal products and animal feeding stuffs, supervision

of safety of agro-food products controlled by the competent Ministers of

Agriculture and Agricultural Markets.

Page 4: A Computer System for CBRN Contamination Threats Analysis

The main objective of the project

✓ The main objective of WAZkA project:

✓ to develop and construct a highly developed ICT tool,

needed by the entities of the National System for

Detection of Contamination and Alarming (NSDCA) in

Poland (Krajowy System Wykrywania Skażeń i

Alarmowania, KSWSiA), which shall support the following

processes:

✓information exchange between the system elements,

✓coordination of the system operations,

✓assessment and expert analyses, needed by the

decision-making bodies, with respect to risk emergency

situations during natural disasters, technical failures or

other events resulting in biological, chemical or

radioactive contamination (CBRN).

Page 5: A Computer System for CBRN Contamination Threats Analysis

A concept of WAZkA system

WAZkA = system Wsparcia Analiz Zagrożeń Skażeniami i Alarmowania

(System for CBRN Contamination Threats Analysis Support and Alarming)

- IMGW stations

- PMS stations

- ASS-500 stations

- WSSE

- SAPOS

- others

- RSO

- Alarming sirens

- TV, radio, Internet

- others

- COP (Common

Operational Picture)

- Board = internet

portal with access to

current threats info

- CARE

- SI Promień

- ALOHA

- Electronical forms to

data acquisition

- TMS emulators

Page 6: A Computer System for CBRN Contamination Threats Analysis

Selected IT tools in WAZkA systemto suport information management and

decision making in KSWSiA/NSDCA

http://wazka.wat.edu.pl

Page 7: A Computer System for CBRN Contamination Threats Analysis

1.1 Event Tree Analyser✓ Event Tree Analyser (ETA) - description:

✓ Event Tree Analyser is the application built in the client-server

architecture, which does not need any additional software

to be installed by the user outside a web browser;

✓ It is the element of Data Acquistion & Analysis Module of WAZkA ;

✓ The Event Tree is a graphical representation of a chronological sequence of

events, significant from the point of view of the functioning of the object;

Page 8: A Computer System for CBRN Contamination Threats Analysis

1.2 Event Tree Analyser, cont.✓ Event Tree Analyser - funcionality:

✓ Determination of probability of the occurrence of a given scenario of events;

✓ Assessment of the final event consequences;

✓ Calculation of frequency of the occurrence of particular event scenarios;

✓ Modification of the Event Tree characteristics in case of the occurrence of specific events;

Initial element (threat

cause or initial event)

Event with name

Final element,

i.e. effects

Dependency between

sequence of events occurence

with probability

Page 9: A Computer System for CBRN Contamination Threats Analysis

1.3 Event Tree Analyser vs LOGAN✓ Event Tree Analyser

(ETA) is integrated with

WAZkA;

✓ ETA application does

not require the

necessity to build

complementary event

in every case, even

though it provides for

such a possibility;

✓ Apart from determining

the probability of

occurrence of the effects,

the probability of

occurrence of each of

the indirect events is

also measured

provided that

predecessor of such

events occurred;

ETA

LOGAN

Page 10: A Computer System for CBRN Contamination Threats Analysis

2.1 Integration with Existing Simulators of Threats Causes & Effects

SI Promień ALOHA

ADatP-3

NBC

KML

PAS

Page 11: A Computer System for CBRN Contamination Threats Analysis

SI Promień ALOHA

ADatP-3

NBC

KML

PAS

Parser ADatP-3 Parser KML

ALFA/BEL/001/001/C//

DELTA/030726ZAPR2010//

FOXTROT/MGRS:31UDS875500/-//

CBRNTYPE/CHEM//

PAPAA/2KM/3-10DAY/10KM/2-6DAY//

PAPAX/030700ZAPR2010/MGRS:31UDS865483/

MGRS:31UDS855500/MGRS:31UDS865517/

MGRS:31UDS976579/MGRS:31UDS974418//

2.2 Integration with Existing Simulators of Threats Causes & Effects, cont.

Page 12: A Computer System for CBRN Contamination Threats Analysis

✓General concept of the emulators' location in the

system WAZkA:

Training

Real operating

3.1 Emulators of Threat Monitoring Systems

Rece

ivin

gdata

ch

annels

WAZkAsystem

Threat Monitoring Systems (automatic and „manual”)

Emulators of Threat Monitoring Systems

Page 13: A Computer System for CBRN Contamination Threats Analysis

✓ The main goals of emulators of

Threat Monitoring Systems:

✓Emulators of the Threats Monitoring Systems (ETMS) allow to

generate, in an artificial and user-controlled manner, data

on risks, which "pretend" to be real data obtained from the

monitoring systems;

✓ Imitate of real threat monitoring systems in the same way as

real environments do;

✓Use it for the purpose of training;

✓ Functional areas of emulators:

✓Authorization;

✓Emulation startup;

✓Read of emulation parameters;

✓Change of emulation parameters;

✓Stopping emulation;

✓Building scenario.

3.2 Emulators of Threat Monitoring Systems, cont.

Page 14: A Computer System for CBRN Contamination Threats Analysis

✓ The main goals of emulators of

Threat Monitoring Systems:

✓ Imitate of real threat monitoring systems in the same way as

real environments do;

✓ use it for the purpose of training;

✓Emulatory działają zgodnie z zadanym scenariuszem;

✓Udostępnione jest narzędzie do budowania scenariuszy;

✓System WAZkA nie powinien odczuwać różnicy w działaniu

z systemem rzeczywistym i emulowanym;

✓ Z emulatorów bezpośrednio będą korzystać analitycy budujący

scenariusze i administratorzy nadzorujący proces szkolenia;

✓Pośrednio z emulatorów korzystać będą szkoleni.

3.3 Emulators of Threat Monitoring Systems, cont.

Page 15: A Computer System for CBRN Contamination Threats Analysis

4. Common Operational Picture (COP)✓ GIS tool, which allows to present an operating situation on the basis of background maps;

✓ Web application based on SOA architecture – provides services in the form of RESTful

API and handles data serialization, in both XML and JSON formats;

✓ The application offers a possibility of enriching the presented operating situation with the

risk data provided in the form of NATO ADat-P3 (CBRN) reports or Keyhole Markup

Language (KML - Aloha and others);

✓ Map module allows:

✓ map calculation functions: determination of the lengths of the user-defined routes, fields of

marked areas;

✓ decision making functions: determination of terrain elevation profiles and flood zones;

✓ using symbols of NATO APP-6A and Ministry of the Interior and Administration for

presentation graphical objects;

✓ possibility of visualizing any WMS (Web Map Service).

Terrain elevation profileflood zones Risk data visualization

Page 16: A Computer System for CBRN Contamination Threats Analysis

Project web page: http://wazka.wat.edu.pl

Page 17: A Computer System for CBRN Contamination Threats Analysis

Conclusions✓ Essential factors of project realization success:

✓ identification of the processes implemented under the National System

for Detection of Contamination and Alarming, which require support by the IT

services (program applications);

✓ numerous consultations are underway with the KSWSiA entities, in

particular with the Central Contamination Analysis Center, which is at the

same time the Administrative Center of KSWSiA, and State Fire Service

Headquarters - the project owner;

✓ obtaining access to the sources of data from the existing risk

monitoring systems, managed by various institutions (IMGW, GIS, GIOŚ,

RCB, PAA, etc);

✓ the quality of the collected data shall determine the usability of the IT

system and adequacy of the developed analyses and decisions;

✓ New legislative and organizational solutions shall be

indicated, which allow to reduce the time - from the moment of

obtaining the information on an event to the time of undertaking

appropriate actions by the KSWSiA entities.

Page 18: A Computer System for CBRN Contamination Threats Analysis

http://wazka.wat.edu.pl

A Computer System for CBRN Contamination

Threats Analysis Support, Prediction Their

Effects and Alarming the Population:

Polish Case Study

CS

CC

’201

7, C

rete

, 14-

17.0

7.20

17

Zbigniew TARAPATA, Ryszard ANTKIEWICZ,

Mariusz CHMIELEWSKI, Michał DYK, Rafał KASPRZYK,

Wojciech KULAS, Andrzej NAJGEBAUER,

Dariusz PIERZCHAŁA, Jarosław RULKA

Corresponding author: [email protected]

Institute of Computer and Information Systems

Faculty of Cybernetics

Military University of Technology, Warsaw, Poland

THANK YOU VERY MUCH