A Modular Design Framework for the Systematic Development ...
A Systematic Approach to Develop a Computational Framework...
Transcript of A Systematic Approach to Develop a Computational Framework...
![Page 1: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/1.jpg)
1
A Systematic Approach to Develop a
Computational Framework for Counter-
terrorism and Public Safety
Herbert H. Tsang1 and Andrew J. Park2
1 Applied Research Lab, Trinity Western University, Langley, BC, Canada2 Thompson Rivers University, Kamloops, BC, Canada
The Canadian Network for Research on
Terrorism, Security and Society (TSAS)
May 29, 2014
![Page 2: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/2.jpg)
Outline
• Introduction
• Overview of the Approach
• Simulations Examples
• Future Directions
2
![Page 3: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/3.jpg)
3
Introduction
![Page 4: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/4.jpg)
Introduction
• Framework of Government of Canada to build
resilience against terrorism
– Prevent, detect, deny and respond
• Our research focuses on “respond”.
– Rapid response in an organized manner to save lives,
reduce personal injuries, and mitigate the damage
– Require careful plans and protocols with local law
enforcement and emergency management authorities
– Response to a wide variety of terrorist threats:
Chemical, Biological, Radiological, Nuclear and
Explosive (CBRNE) threats
– Incorporate currently available technologies 4
![Page 5: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/5.jpg)
5
A quick and proper
response to terrorism
is important.
![Page 6: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/6.jpg)
6
Paul M. Torrens & Aaron W. McDaniel (2013): Modeling Geographic
Behavior in Riotous Crowds, Annals of the Association of American
Geographers, 103:1, 20-46
![Page 7: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/7.jpg)
7
GENIUS: Research Goals
• GENIUS: a computational framework for
counter-terrorism
• Develop a decision support, response planning
and risk assessment framework.
• This framework allows the user to
– explore the spatial-temporal features of the
environment,
– create a flexible human movement simulation and
visualization system, and
– perform risk analysis through the studying of different
potential scenarios.
![Page 8: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/8.jpg)
System Overview
Human Movement Simulation
Engine
Other Information
GIS Information
Models of the Environment
Human Behavior
Model Existing Tools
(e.g. GoogleEarth)
Virtual Environment
8
![Page 9: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/9.jpg)
Integration of Simulation and VE
9
Human Movement Simulation
Engine
Virtual Environment
Simulation
+
Virtual Environment
![Page 10: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/10.jpg)
Human Movement Simulation Engine
• Swarm Intelligence and Agent-based Simulation
– Parametric Model
• Parameterization of variables that affect agents’ behaviours
• Easy to develop different human models
(e.g., old people, young children, angry rioters, etc.)
– Interactions among
• Agents
• Events
• Environments
Agents respond to events. (e.g., bomb explosion, toxic gas, etc.)
Agents’ behaviours are restricted by their environments.
Events can influence the environments. (e.g., damage or
pollution) 10
![Page 11: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/11.jpg)
Parametric Model
11
![Page 12: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/12.jpg)
12
Interactions
AgentsEnvironment
Events
![Page 13: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/13.jpg)
13
Human Movement Simulation Engine
AgentCivilian
Police
Protestor
EventBomb
Gas
Riot
EnvironmentBuilding
Road
Etc.
![Page 14: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/14.jpg)
Virtual Environment (VE)
• VE is a computer-generated environment
that simulates either a real physical
environment or a artificial environment.
• With the currently technologies, it is possible
to create a very realistic, immersive, and
interactive virtual environment where users
can feel presence.
14
![Page 15: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/15.jpg)
Virtual Environment (VE)
• Applications of VE
– Entertainment (e.g., video games)
– Visualization (e.g., architecture, biology,
chemistry, etc.)
– Therapy and rehabilitation (e.g., therapy for
social phobia, physiotherapy for post-stroke
rehabilitation, etc.)
– Virtual tourism
– Training (e.g., flight simulators, virtual military
training, etc.)
– Research tools15
![Page 16: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/16.jpg)
Virtual Environment (VE)
16VE is used as a research tool.
![Page 17: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/17.jpg)
Virtual Environment (VE)
17
• Benefits of Using VE
– Realistic
– Affordable
– Interactive
– No ethics issues
– Easy and quick to change
– Possible to create any scenarios
– Familiar
– Available with advanced technologies
![Page 18: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/18.jpg)
Virtual Environment (VE)
• To build a virtual environment with a
interactive control, we used commercially
available equipment:
– Kinect for Windows (real-time movement
sensing)
– UNITY 3D (game/simulation engine)
– Autodesk Maya
18
![Page 19: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/19.jpg)
Virtual Environment (VE)
19
An example of a realistic virtual environment
Youtube link: http://youtu.be/tlkMP_ESf6k
![Page 20: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/20.jpg)
20
Simulation Examples
1) Westgate Mall Shooting (September 2013)
2) Boston Marathon Bombing (April 2013)
![Page 21: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/21.jpg)
Westgate Mall Shooting: No Police
21
This video demonstrates the Westgate Shopping Mall Shooting without police officers.
Youtube link: http://youtu.be/fzOsm9h55m4
![Page 22: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/22.jpg)
Westgate Mall Shooting: With Police
22
This video demonstrates the Westgate Shopping Mall Shooting with police officers
at strategic locations.
Youtube link: http://youtu.be/TdE2Z9T-niw
![Page 23: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/23.jpg)
Boston Marathon Bombing: No Police
23
This video demonstrates the Boston Marathon Bombing without any police officers.
Youtube link: http://youtu.be/jij5gfxFOqY
![Page 24: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/24.jpg)
Boston Marathon Bombing: With Police
24
This video demonstrates the Boston Marathon Bombing with police officers
at strategic locations.
Youtube link: http://youtu.be/04DrCgl8pmw
![Page 25: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/25.jpg)
Boston Marathon Bombing: Comparison
25
0
50
100
150
200
250
300
350
400
450
500
0 5 10 15 20 25 30 35 40 45 50 55 60 65 70 75 80 85 90 95 100
Escaped
Time (Seconds)
Boston Marathon Bombing Scenario
Escaped without responders (Scenario A) Escaped with responders (Scenario B)
Comparison between two scenarios: one without emergency responders and
the other with emergency responders
![Page 26: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/26.jpg)
GENIUS: User Interaction
26
This video demonstrates a navigation in the virtual environment using a Microsoft
Kinect device. This feature of the simulation system can be used for training purposes.
Youtube link: http://youtu.be/DTNqk3LhPuI
![Page 27: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/27.jpg)
GENIUS: Simulation
27
This video demonstrates a 3D simulation that shows a bomb going off in the crowd.
Youtube link: http://youtu.be/IqkurYqvFUg
![Page 28: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/28.jpg)
Summary
• Our framework and simulation tool can be
used to study emergency preparedness
with any possible scenarios including
terrorists’ attacks.
• The use of interactive/immersive virtual
environments is affordable, (relatively)
easy, time-saving, and flexible for training
purposes as well as research experiments.
28
![Page 29: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/29.jpg)
29
Future Directions
![Page 30: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/30.jpg)
• Research partnership
– To perform a pilot study on our framework
– To test our framework with real-world problems
– To get expert review
30
![Page 31: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/31.jpg)
• Incorporating new technologies
– Oculus Rift
– 3D scanner 3D modelling
– Augmented Reality
– Natural interactions
– Mobile computing
31
![Page 32: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/32.jpg)
Acknowledgement
• Thompson Rivers University
• Trinity Western University
• Canadian Network for Research on Terrorism, Security
and Society (TSAS)
• IRMACS, MoCSSy, and ICURS @ Simon Fraser
University
• NSERC
• Andrew K. Park Jr. (Waterloo), Alex Touchet (TRU)
32
![Page 33: A Systematic Approach to Develop a Computational Framework ...tsas.sites.olt.ubc.ca/files/2014/06/TSAS_20140529_TsangAndPark.pdf · and risk assessment framework. •This framework](https://reader035.fdocuments.us/reader035/viewer/2022081614/5fc97b1920428323b40d29d6/html5/thumbnails/33.jpg)
33
Discussion / Question?
Herbert H. Tsang, PEng, PhDAssociate Professor, Computing Science and
Mathematics, Trinity Western University
http://www.HerbertTsang.orghttp://www.applied-research.org
Andrew J. Park, PhDAssistant Professor, Computing Science,
Thompson Rivers University
http://cs.tru.ca/~apark