http://wazka.wat.edu.pl
A Computer System for CBRN Contamination
Threats Analysis Support, Prediction Their
Effects and Alarming the Population:
Polish Case Study
CS
CC
’201
7, C
rete
, 14-
17.0
7.20
17
Zbigniew TARAPATA, Ryszard ANTKIEWICZ,
Mariusz CHMIELEWSKI, Michał DYK, Rafał KASPRZYK,
Wojciech KULAS, Andrzej NAJGEBAUER,
Dariusz PIERZCHAŁA, Jarosław RULKA
Institute of Computer and Information Systems
Faculty of Cybernetics
Military University of Technology, Warsaw, Poland
AGENDA
✓ Project Genesis:
✓ Description of The National System for Detection of Contamination and
Alarming in Poland;
✓ Main goals of the project;
✓ A concept of WAZkA system:
✓ In English: System for CBRN (Chemical, Biological, Radiological, Nuclear)
Contamination Threats Analysis Support and Alarming;
✓ In Polish: system Wsparcia Analiz Zagrożeń Skażeniami i Alarmowania;
✓ Selected IT tools in WAZkA system:
✓ Event Tree Analyser (ETA);
✓ Emulators of Threat Monitoring Systems;
✓ Integration with existing threat simulators (SI Promien, Aloha);
✓ Common Operational Picture (COP);
✓ Conclusion.
The National System for Detection of Contamination and Alarming in Poland
✓ The functional systems, which constitute the KSWSiA/NSDCA
system core, are the following:
✓ The System of Contamination Detection of the Armed Forces of the
Republic of Poland - supervised by the Minister of National Defense,
✓ networks and systems for the epidemiological surveillance and
control of communicable diseases in the country as well as national
contact points for the international surveillance system to identify
threats to human health and life of large populations - supervised by the
Minister of Health,
✓ systems of early detection of radioactive contamination and
radioactive contamination centers, whose activities are coordinated by
the President of the National Atomic Energy Agency,
✓ voivodeship early detection systems supervised by Voivodes,
✓ systems for epizootic and phytosanitary surveillance, supervision
of safety of animal products and animal feeding stuffs, supervision
of safety of agro-food products controlled by the competent Ministers of
Agriculture and Agricultural Markets.
The main objective of the project
✓ The main objective of WAZkA project:
✓ to develop and construct a highly developed ICT tool,
needed by the entities of the National System for
Detection of Contamination and Alarming (NSDCA) in
Poland (Krajowy System Wykrywania Skażeń i
Alarmowania, KSWSiA), which shall support the following
processes:
✓information exchange between the system elements,
✓coordination of the system operations,
✓assessment and expert analyses, needed by the
decision-making bodies, with respect to risk emergency
situations during natural disasters, technical failures or
other events resulting in biological, chemical or
radioactive contamination (CBRN).
A concept of WAZkA system
WAZkA = system Wsparcia Analiz Zagrożeń Skażeniami i Alarmowania
(System for CBRN Contamination Threats Analysis Support and Alarming)
- IMGW stations
- PMS stations
- ASS-500 stations
- WSSE
- SAPOS
- others
- RSO
- Alarming sirens
- TV, radio, Internet
- others
- COP (Common
Operational Picture)
- Board = internet
portal with access to
current threats info
- CARE
- SI Promień
- ALOHA
- Electronical forms to
data acquisition
- TMS emulators
Selected IT tools in WAZkA systemto suport information management and
decision making in KSWSiA/NSDCA
http://wazka.wat.edu.pl
1.1 Event Tree Analyser✓ Event Tree Analyser (ETA) - description:
✓ Event Tree Analyser is the application built in the client-server
architecture, which does not need any additional software
to be installed by the user outside a web browser;
✓ It is the element of Data Acquistion & Analysis Module of WAZkA ;
✓ The Event Tree is a graphical representation of a chronological sequence of
events, significant from the point of view of the functioning of the object;
1.2 Event Tree Analyser, cont.✓ Event Tree Analyser - funcionality:
✓ Determination of probability of the occurrence of a given scenario of events;
✓ Assessment of the final event consequences;
✓ Calculation of frequency of the occurrence of particular event scenarios;
✓ Modification of the Event Tree characteristics in case of the occurrence of specific events;
Initial element (threat
cause or initial event)
Event with name
Final element,
i.e. effects
Dependency between
sequence of events occurence
with probability
1.3 Event Tree Analyser vs LOGAN✓ Event Tree Analyser
(ETA) is integrated with
WAZkA;
✓ ETA application does
not require the
necessity to build
complementary event
in every case, even
though it provides for
such a possibility;
✓ Apart from determining
the probability of
occurrence of the effects,
the probability of
occurrence of each of
the indirect events is
also measured
provided that
predecessor of such
events occurred;
ETA
LOGAN
2.1 Integration with Existing Simulators of Threats Causes & Effects
SI Promień ALOHA
ADatP-3
NBC
KML
PAS
SI Promień ALOHA
ADatP-3
NBC
KML
PAS
Parser ADatP-3 Parser KML
ALFA/BEL/001/001/C//
DELTA/030726ZAPR2010//
FOXTROT/MGRS:31UDS875500/-//
CBRNTYPE/CHEM//
PAPAA/2KM/3-10DAY/10KM/2-6DAY//
PAPAX/030700ZAPR2010/MGRS:31UDS865483/
MGRS:31UDS855500/MGRS:31UDS865517/
MGRS:31UDS976579/MGRS:31UDS974418//
2.2 Integration with Existing Simulators of Threats Causes & Effects, cont.
✓General concept of the emulators' location in the
system WAZkA:
Training
Real operating
3.1 Emulators of Threat Monitoring Systems
Rece
ivin
gdata
ch
annels
WAZkAsystem
Threat Monitoring Systems (automatic and „manual”)
Emulators of Threat Monitoring Systems
✓ The main goals of emulators of
Threat Monitoring Systems:
✓Emulators of the Threats Monitoring Systems (ETMS) allow to
generate, in an artificial and user-controlled manner, data
on risks, which "pretend" to be real data obtained from the
monitoring systems;
✓ Imitate of real threat monitoring systems in the same way as
real environments do;
✓Use it for the purpose of training;
✓ Functional areas of emulators:
✓Authorization;
✓Emulation startup;
✓Read of emulation parameters;
✓Change of emulation parameters;
✓Stopping emulation;
✓Building scenario.
3.2 Emulators of Threat Monitoring Systems, cont.
✓ The main goals of emulators of
Threat Monitoring Systems:
✓ Imitate of real threat monitoring systems in the same way as
real environments do;
✓ use it for the purpose of training;
✓Emulatory działają zgodnie z zadanym scenariuszem;
✓Udostępnione jest narzędzie do budowania scenariuszy;
✓System WAZkA nie powinien odczuwać różnicy w działaniu
z systemem rzeczywistym i emulowanym;
✓ Z emulatorów bezpośrednio będą korzystać analitycy budujący
scenariusze i administratorzy nadzorujący proces szkolenia;
✓Pośrednio z emulatorów korzystać będą szkoleni.
3.3 Emulators of Threat Monitoring Systems, cont.
4. Common Operational Picture (COP)✓ GIS tool, which allows to present an operating situation on the basis of background maps;
✓ Web application based on SOA architecture – provides services in the form of RESTful
API and handles data serialization, in both XML and JSON formats;
✓ The application offers a possibility of enriching the presented operating situation with the
risk data provided in the form of NATO ADat-P3 (CBRN) reports or Keyhole Markup
Language (KML - Aloha and others);
✓ Map module allows:
✓ map calculation functions: determination of the lengths of the user-defined routes, fields of
marked areas;
✓ decision making functions: determination of terrain elevation profiles and flood zones;
✓ using symbols of NATO APP-6A and Ministry of the Interior and Administration for
presentation graphical objects;
✓ possibility of visualizing any WMS (Web Map Service).
Terrain elevation profileflood zones Risk data visualization
Project web page: http://wazka.wat.edu.pl
Conclusions✓ Essential factors of project realization success:
✓ identification of the processes implemented under the National System
for Detection of Contamination and Alarming, which require support by the IT
services (program applications);
✓ numerous consultations are underway with the KSWSiA entities, in
particular with the Central Contamination Analysis Center, which is at the
same time the Administrative Center of KSWSiA, and State Fire Service
Headquarters - the project owner;
✓ obtaining access to the sources of data from the existing risk
monitoring systems, managed by various institutions (IMGW, GIS, GIOŚ,
RCB, PAA, etc);
✓ the quality of the collected data shall determine the usability of the IT
system and adequacy of the developed analyses and decisions;
✓ New legislative and organizational solutions shall be
indicated, which allow to reduce the time - from the moment of
obtaining the information on an event to the time of undertaking
appropriate actions by the KSWSiA entities.
http://wazka.wat.edu.pl
A Computer System for CBRN Contamination
Threats Analysis Support, Prediction Their
Effects and Alarming the Population:
Polish Case Study
CS
CC
’201
7, C
rete
, 14-
17.0
7.20
17
Zbigniew TARAPATA, Ryszard ANTKIEWICZ,
Mariusz CHMIELEWSKI, Michał DYK, Rafał KASPRZYK,
Wojciech KULAS, Andrzej NAJGEBAUER,
Dariusz PIERZCHAŁA, Jarosław RULKA
Corresponding author: [email protected]
Institute of Computer and Information Systems
Faculty of Cybernetics
Military University of Technology, Warsaw, Poland
THANK YOU VERY MUCH