首页> 外文会议>2010 International Waterside Security Conference >Evaluation of Waterside Security processes and systems by modelling and simulation
【24h】

Evaluation of Waterside Security processes and systems by modelling and simulation

机译:通过建模和仿真评估水边安全流程和系统

获取原文

摘要

Many who are interested in the topic of Waterside Security focus primarily on the detection of threats. This may seem like a logical focal point, but the ideal starting point should be to understand the system-of-systems with which security is to be ensured so that e.g. threat detection can be analysed within the broader context. For this purpose it is necessary to have a tool that can consider all issues relating to Waterside Security, evaluate alternatives and draw conclusions before it is attempted to specify or acquire solutions to security problems. Such a tool can be used not only to otptimise a protection system, but also to point out where system shortcomings are. From there it can become evident where new solutions are required and thus where technology and development effort should be spent. A model is presented here with which it has been attempted to capture all important elements relating to the design and implementation of solutions to Waterside Security problems. The aim of the model is to create a tool which gives understanding to the relatively new field of Waterside Security rather than acting as an operational planning tool. For that purpose, the model contains elements representing (1) the environment in which the threat and the systems operate, (2) the potential threats, (3) the protection system hardware and (4) the processes by which the systems are operated. This gives a complete picture of the influence that each part has in the performance of the total system-of-systems. Performance of sub-functions such as detection, classification, tracking, interception and neutralisation can be individually analysed and system effectiveness can be compared to desired or practical benchmarks. The model is developed in a block-based modelling environment which makes provision for continuous processes (such as movement) and discrete processes (e.g. command and control). Detail will be given on the model structure, individual model elements and the user int--erface. Also simulation results will be presented for a number of different scenarios, ranging form low-level equipment performance to the response for complex combined above and below water threats.
机译:许多对Waterside Security主题感兴趣的人主要关注威胁的检测。这似乎是一个逻辑上的焦点,但是理想的出发点应该是了解要确保安全性的系统系统,例如威胁检测可以在更广泛的范围内进行分析。为此,有必要使用一种工具来考虑与水边安全相关的所有问题,评估替代方案并得出结论,然后再尝试指定或获取安全问题的解决方案。这种工具不仅可以用来优化保护系统,还可以指出系统缺陷的出处。从那里可以明显看出,在哪里需要新的解决方案,以及在哪里应该花费技术和开发精力。这里介绍了一个模型,尝试使用该模型来捕获与水边安全问题的解决方案的设计和实施有关的所有重要元素。该模型的目的是创建一种工具,该工具可以使人们对Waterside Security的相对较新的领域有所了解,而不是充当操作计划工具。为此,模型包含表示(1)威胁和系统在其中运行的环境,(2)潜在威胁,(3)保护系统硬件和(4)操纵系统的过程的元素。这给出了每个部分对整个系统性能的影响的完整描述。可以分别分析子功能的性能,例如检测,分类,跟踪,拦截和中和,并且可以将系统有效性与所需基准或实际基准进行比较。该模型是在基于块的建模环境中开发的,该环境提供了连续过程(例如运动)和离散过程(例如命令和控制)。将详细介绍模型结构,各个模型元素以及用户的内部结构, -- erface。此外,还将针对多种不同情况提供仿真结果,从低水平的设备性能到对复杂的水上和水下威胁的响应,都将给出仿真结果。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号