Download presentation
Presentation is loading. Please wait.
Published byDrusilla Foster Modified over 8 years ago
1
Surveillance System With SIS Controller For Incident Handling Using A Situation-based Recommendations Handbook Presenter : Chi Zhang Authors : Erland Jungert and S.-K. Chang
2
Overview Surveillance for critical infrastructure is needed Seemingly normal but actually harmful entities must also be detected. Support of the operators need to be available Goal : A Surveillance System with SIS controller using recommendation Handbook Architecture SIS controller Recommendation Handbook Information Structure A scenario will be described
3
System Architecture Sensor System A large system of sensors. Necessary capacity for collection, analysis, storage. SIS controller To identify entities engaged in hostile activities Visual operation control Operation picture Command and control unit Recommended actions viewer
4
System States Event states: Normal All appearing entities are normal Deviation Needs to be verified Incident Alarm states: Inactive Unverified (false/true) Verified (determine whether Normal/Incident)
5
SIS controller An information hub of Surveillance System Detect all entities directly/indirectly related to intruder entity Slow Intelligence process: 1). Determine all antagonist candidates 2)Eliminate unlikely entities.
6
Computational Cycles Cycle0: [guard 0,2] P0 +adapt= P1 =prop+ P2 ( Normal; Receive and propagate sensor info ) Cycle1: [guard1,0] P 3 +adapt= P 4 ( Deviation; Request to verify alarm ) Cycle2: [guard 2,2] P 1 -enum elim- P 6 (Incident; Identify all incident-related entities ) Cycle3: P 7 =prop+ P 8 (Request all sensors to track those entities) Cycle4: P 9 +adapt= P 10 =prop+ P 11 (Propagate from sensors to VOC) Cycle5: [guard5,9] P 12 +adapt= P 13 (Request all sensor info; No new identities, go cycle 9)
7
Computational Cycles Cycle6: [guard 6,9] P 14 -enum elim- P 16 (Enumerate over new entities; No new incident entities, go to cycle 9) Cycle7: P 17 =prop+ P 18 (Propagate to VOC) Cycle8: P 19 =prop+ P 20 (Propagate to sensors to track new incident entities) Cycle9: P 21 +adapt= P 22 (SISC adapt from sensors) Cycle10: [guard10,5] P 22 >elim- P 23 (Resolve incident entities; If incident entity set not reduced to zero, go to cycle 5) Cycle11: [guard11, 0] P 18 =prop+ P 19 (Incident terminated; go back to cycle 0; Normal)
8
Recommendations Handbook Activities to respond request from SISC Entity; Deviation; Unverified Entity; Incident; Verified Entities; Incident; Verified Output Recommended Actions Search result from handbook Special care also needed for operators (Complicated situations)
9
A scenario
10
Event Examples in this scenario Status information: Context information: Hand book search criteria: Person, Deviation, approaching fence Recommendations: send out guard to verify alarm; instruct guard to inform on what is going on; operator should follow track of person approaching fence in operational picture.
11
Event from SIS view
12
Event Examples in this scenario Status information: Context information: Hand book search criteria: Person, Incident, at prohibited area Recommendations: instruct guards to arrest person at prohibited area. Report from guard: person at prohibited area is arrested.
13
Event from SIS view
14
Information Structure Event related information To find relevant entries in handbook To keep the operational picture updated Acquired and complementary information Data captured that relates to detected entities Needed context information
15
Information Structure Event situation Relations between Event and Alarm status Entity relations Entity relations with environment Relations with other entities
16
Conclusion A surveillance for the protection of critical infrastructure is proposed Based on an approach to Slow Intelligence A SIS controller using various searching criteria to Recommendations Handbook Maintenance of an operational picture system Contributes to Slow intelligence research as it describes realistic computation cycles
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.