=Paper=
{{Paper
|id=Vol-3035/paper19
|storemode=property
|title=Site Security System with 3D Imaging
|pdfUrl=https://ceur-ws.org/Vol-3035/paper19.pdf
|volume=Vol-3035
|authors=Sergey V. Shaytura,Alina M. Minitaeva,Larisa V. Sumzina,Alexander V. Maksimov
}}
==Site Security System with 3D Imaging==
Site Security System with 3D Imaging Sergey V. Shaytura1,3, Alina M. Minitaeva2,3, Larisa V. Sumzina3 and Alexander V. Maksimov3 1 Russian University of Transport (MIIT), Minayevskiy Pereulok, 2, Moscow, 127055 2 Bauman Moscow State Technical University, 5/1 2nd Baymanskay ul., Moscow, 105005, Russia 3 Russian State University of Tourism and Service, Ulitsa Glavnaya, 99, Cherkizovo, Moscow Oblast, 141221 Abstract This article presents research on site security systems with 3D imaging tools and geoinformation systems. This technology is built upon the integration of video surveillance systems, pattern recognition and cartographic platform to precisely locate events on a map or a plan. Such systems are used to quickly detect emergencies and make emergency actions. The technology is proposed for securing city-owned premises such as hospitals, schools, kindergartens, educational institutions, etc.Adoption of the technology will substantially secure these sites from intrusion and terrorist attacks. This article analyzes shareware programs for building a security system with 3D modeling. Based on the software chosen, we gained a high-quality imaging of the security system using the medical unit No. 154 in Krasnoarmeysk as an example. The key benefit of a security system with 3D imaging is that it allows for an active part in viewing, which is much more interesting than passive surveillance. It provides a vivid experience and a much clearer idea of what you are dealing with. Keywords 1 3D modeling, security system, geoinformation technologies, geoinformation systems, video surveillance system, technical means, checkpoints 1. Introduction As society evolves, city-owned premises face new security challenges. Potential intruders become more technical, illegal acts are being refined [1, 2, 3, 4]. City-owned premises such as hospitals, clinics, educational institutions, kindergartens, etc. are the most vulnerable. In conventional access control systems, dispatcher at the checkpoint sees information from cameras and analyzes the current situation, so there is no processing or highlighting sites at risk [5, 6, 7, 8, 9]. An intelligent access control system established based on 3D geographic information system allows to approach site security at a different quality level. Such systems will not only monitor the current situation, but also predict possible deviations from the standard situation, assess the degree of emergency and offer the best solution to prevent a dangerous situation. Intelligent access control systems will make it possible to move the point of decision-making on access to a remote site, thus securing private security officers [10, 11, 12, 13, 14]. 2. Materials and Methods The article explores the application of spatial geoinformation analysis [15, 16, 17, 18, 19] to creation of a site security system [20, 21, 22, 23]. Geoinformation data analysis is based on mathematical and statistical methods, artificial intelligence methods (pattern recognition, neural network methods) [24, 25, 26, 27], cartographic and spatial analysis [28, 29, 30, 31, 32]. To ensure that security program is effective, it is necessary to identify and assess vulnerabilities to all types of hazards and threats. This involves developing capacity to prevent, protect, respond and BIT-2021: XI International Scientific and Technical Conference on Secure Information Technologies, April 6-7, 2021, Moscow, Russia EMAIL: swshaytura@gmail.com (A. 1); aminitaeva@mail.ru (A. 2); byttech1@yandex.ru (A. 3) maksimovav52@yandex.ru (A.4) ORCID: 0000-0002-5621-5460 (A. 1); 0000-0002-9197-4219 (A. 2); 0000-0002-1138-464X (A. 3) 0000-0002-9191-6852 (A. 4) © 2021 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings (CEUR-WS.org) 176 recover from catastrophic incidents. Nowadays, maintaining continuous situation awareness is generally accepted as the basis for a successful outcome while ensuring national security. It is quite difficult to gain the ability to collaborate with different stakeholders; assess vulnerabilities; and prioritize resource allocation. The Geographic Information System (GIS) platform allows government agencies to [33, 34, 35, 36, 37]: ● Assess threats and vulnerabilities to critical infrastructure and the public. ● Develop mitigation and protection options to protect critical infrastructure. ● Maintain general situation awareness across multiple teams for daily operations. ● Maintain response and incident management processes. ● Support damage assessment using all types of mobile devices. GIS technology has long been used by government agencies, including those supporting national security missions. Traditionally, GIS has been used by a small group of highly skilled analysts and GIS specialists to identify threats, plan resource deployment, and map potential actions and develop contingency plans. Desktop applications were created for creating information products and printing paper maps. Today’s GIS platforms enable staff to access easy-to-use maps and applications supporting the mission on any device anywhere anytime, on any network. GIS technology is much more prevalent and available online, in the cloud, and serves as a complete geospatial software platform for geographic understanding, user process support, collaboration, dynamic situation awareness and monitoring, and measurement. Technology provides access to information for planning, response, concern, mitigation and recovery. Applications are highly customizable and can provide quick access, understanding, and distribution to support coordinated action. GIS platforms also integrate geographic information with business intelligence systems. Tabular data comes to life on a dynamic map, so the information is easy to understand, resulting in faster and better national security solutions. Enterprise business intelligence agency can now be geographically enriched with geospatial data and maps. The GIS platform is designed to deliver relevant content via simple applications and web maps that fit everybody’s needs in the organization. The platform allows users to create, manage and access data from other systems both within organization and externally. The platform supports desktop, browser and mobile environments. It works in any environment, from the office to the field. Mobile applications can immediately sync with office systems and continue operation when disconnected from the network. The GIS platform can be easily configured to securely exchange data with specific users or communities. Inter-agency collaboration and intelligence sharing are critical to national security. For example, planning security for a special event, such as a major sporting event, or for an important tourist attraction involves collaboration. Special events attract many people including tourists, officials and celebrities. Many agencies and stakeholders use their own systems to plan and operate a special event. These systems are often disabled, which makes them more reliable. Information exchange is near- impossible. GIS platforms are designed to access data from existing systems and integrate them into a common geographic system, a web map. This platform provides data interaction, better performance and understanding by adding location. The GIS platform can be configured with applications, viewers, and group permissions that are consistent with the organization’s workflows. 3. Results 3.1. 3D Spatial Data Modeling and Visualization System The 3D spatial data modeling and visualization system is designed to visualize territories and sites in space, carry out a comprehensive analysis of the territory and display geoinformation resources [38, 39, 40]. The program enables users to freely move in 3D space, provides a 3D visual representation of 177 cities, settlements, terrain, critical sites, and simulation of possible natural and man-made situations. The program allows you to load vector layers and space images, Earth remote sensing data, 3D models with an option to edit model location. 3.2.Building a Security System The site should have a checkpoint for access control (Fig. 1). Figure 1. Checkpoint Checkpoint equipment should provide the necessary throughput and a possibility to thoroughly check passes and documents, inspect all types of transport, transported goods and meet the following requirements. The checkpoint must be equipped with the necessary communication and alarm systems to call the guard reserve. Various turnstiles can be used as access control. There will be video cameras installed on site (Fig. 2). Figure 2. Perimeter camera display A 3D site model will be created based on 3D modeling programs (Fig. 3). 178 Figure 3. 3D Site Model The current situation will be determined by comparing the data received from the video camera with the site model. 4. Discussion of Results Geographic information system in the modern sense is a technology for collecting, organizing, exchanging and analyzing information. It allows to see what is happening and where, how different events are interrelated and affected by location, what geographic, social and economic factors determine the organization’s operation, and how to best use local features and spatial patterns. By combining spatial and business information, GIS allows to simulate the real world and gives an idea of the spatial patterns, dependencies, processes and situations that occur therein. GIS has become a conventional technology for solving a great number of tasks, particularly in monitoring, security and emergency management systems [41, 42]. GIS is a necessary component in building situation and analytical centers. In these cases, GIS is used both for addressing strategic planning, forecasting and modelling tasks and for day-to-day monitoring and operational management. With situation and analytical centers (SAC) built upon GIS, you can see process dynamics with precise spatial and temporal localization of each event. 5. Conclusion All-source data integration and broad options for a comprehensive analysis (including real-time), visualization and publication of information allow decision-makers to act within the cartographic system model. Moreover, pattern recognition systems can be used for a fast response in emergency situations. Cartographic video monitoring is built upon the integration of video surveillance systems, pattern recognition and cartographic platform to precisely locate events on a map or a plan. Such systems are used to quickly detect emergencies and make emergency actions. The system combines data streams from various sources (including video), they can be accessed via various services on the cartographic portal and mobile devices. 179 6. References [1] Telny A.V., Chernikov R.S. “Algorithm for processing alarm notifications of object security alarms to reduce the level of false alarms”. Control systems, communications and security, 2019. No 4. С. 140-162. DOI: 10.24411/2410-9916-2019-10405. [2] Probabilistic Modeling in System Engineering / By ed. A. Kostogryzov – London: IntechOpen, 2018. 278 p. DOI: 10.5772/intechopen.71396. [3] Dorofeev A.V., Markov A.S., Tsirlov V.L. Social Media in Identifying Threats to Ensure Safe Life in a Modern City. Communications in Computer and Information Science, 2016, vol. 674, pp. 441-449. DOI: 10.1007/978-3-319-49700-6_44. [4] Jayasinghe, D., Cobourne, S., Markantonakis, K., Akram, R.N., Mayes, K. “Philanthropy on the blockchain” (2018) Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes inBioinformatics), 10741 LNCS, pp. 25-38. [5] F. Mouton, L. Leenen, and H.S. Venter, “Social engineering attack examples, templates and scenarios” , Computers & Security, ] vol. 59, pp. 186–209, 2016. [6] V. Yemelyanov, N. Yemelyanova and A. Nedelkin, “Neural network for decision support to determine the operating mode of lined equipment”, Paper presented at the MATEC Web of Conferences, p.224, 2018. doi:10.1051/matecconf/201822404005 [7] D. Maevsky, V. Kharchenko, M. Kolisnyk, and E. Maevskaya, “Software reliability models and assessment techniques review: Classification issues”, 2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS), IEEE, pp. 894–899, 2017. DOI: 10.1109/IDAACS.2017.8095216 [8] R. M. J. Rathnayaka, KTMU Hemapala, “Developing of scalable SCADA in view of acquiring multi-protocol smart grid devices”, 2016 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 182 – 187, 2016. DOI: 10.1109/AEEICB.2016.7538269 [9] Thuraisingham, B. “Blockchain Technologies and Their Applications in Data Science and Cyber Security”(2020) Proceedings - 2020 3rd International Conference on Smart BlockChain, SmartBlock 2020, статья № 9415693, pp. 1-4. [10] Nayak, A., Dutta, K. “Blockchain: The perfect data protection tool” (2018) Proceedings of 2017 International Conference on Intelligent Computing and Control, I2C2 2017, 2018-January, pp. 1-3. [11] Shaytura S.V., Minitaeva A.M., Feoktistova V.M., Ordov K.V. “Blockchains in spatial data security” - In: CEUR Workshop Proceedings. Selected Papers of the X Anniversary International Scientific and Technical Conference on Secure Information Technologies (BIT 2019). - 2019. - С. 70- 74. [12] Boiko, V. Shendryk, and O. Boiko, “Information systems for supply chain management: uncertainties, risks and cyber security”, Procedia Computer Science, vol. 149, pp. 65 – 70, 2019. DOI: 10.1016/j.procs.2019.01.108. [13] Veretennikov, N.P., Mikulenok, A.S., Bogachev, V.F.”Management of the System for Russian Arctic Region Logistics and Information Support” (2018) Proceedings of the 2018 International Conference ''Quality Management, Transport and Information Security,Information Technologies'', IT and QM and IS 2018, статья № 8524986, pp. 271-273. [14] Stereva, K. “Terrestrial laser scanning – a still neglected reality in the process of creating and maintenance of cadastral maps”, 20th International Scientific Multidisciplinary Conference on Earth and Planetary Sciences SGEM2020, Albena, Bulgaria [15] S.V. Shaitura, Yu.P. Kozhaev, K.V. Ordov, T.A. Vintova, A.M. Minitaeva, and V.M. Feoktistova, “Geoinformation services in a spatial economy”, International Journal of Civil Engineering and Technology, vol. 9, no. 22, pp. 829-841, 2018. [16] Shaitura S.V., Ordov K.V., Lesnichaya I.G., Romanova Yu. D., Khachaturova S.S. “Services and mechanisms of competitive intelligence on the internet”. Espacios.- 2018.- Т. 39.- № 45.- С. 24. 180 [17] Shaitura S.V., Feoktistova F.M., Minitaeva A.M., Olenev L.A., Chulkov V.O., Kozhaev Y.P. “Spatial geomarketing powered by big data”. Revista Turismo Estudos & Práticas. 2020. № S5. С. 13. [18] Shaytura S.V., Ordov K.V., Minitaeva A.M. (2019). “Digital learning methods for the digital economy”. Proceedings of the International Scientific and Practical Conference on Digital Economy (ISCDE 2019), Yekaterinburg, Russia, pp. 606-611 https://doi.org/10.2991/iscde- 19.2019.117 [19] Stereva, K., Postolovski, A., Gospodinov, S. “Control, in the process of the building construction, by means of stationary terrestrial laser scanning, 6th World Multidisciplinary Earth Sciences Symposium - WMESS 2020, Prague, Czech Republic [20] R. M. J. Rathnayaka, KTMU Hemapala, “Developing of scalable SCADA in view of acquiring multi-protocol smart grid devices”, 2016 2nd International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 182 – 187, 2016. DOI: 10.1109/AEEICB.2016.7538269 [21] Gan, J., Tsoukalas, G., Netessine, S. Initial coin offerings, speculation, and asset tokenization(2021) Management Science, 67 (2), pp. 914-931. [22] Hasan, H.R., Salah, K., Jayaraman, R., Yaqoob, I., Omar, M.Blockchain Architectures for Physical Internet: A Vision, Features, Requirements, and Applications(2021) IEEE Network, 35 (2), статья № 9246622, pp. 174-181. [23] S. Loginova, Methods subsidiarity management, Perspectives of Science & Education, 3(2015)165-169 Advances in Economics, Business and Management Research, volume 138, 365 [24] Brousseau E., Pénard T. The economics of digital business models: A framework for analyzing the economics of platforms //Review of network Economics. – 2007. – V. 6. – №. 2. – p.81- 114. [25] Maslova Maria Al., Lagutkina Tatiana Vl. Analysis and identification of positive and negative aspects of distance learning implementation // Research result. Information technologies - 2020 vol 5 № 2. C. 54-60. [26] Krasikov V.A. Analytic complexity of hypergeometric functions satisfying systems with holonomic rank two // Lecture Notes in Computer Science. 2019. V. 11661 LNCS. С. 330-342. [27] Zharov, V.G.Efficiency of metal plaque lubricants in bearing supports of machinery for public utilities and services(2020) International Journal of Emerging Trends in Engineering Research, 8 (4), № 47, pp. 1232-1241. [28] Tatarinov, V., Kirsanov, A. Information support for safety insurance of road transport of dangerous goods (2019) IOP Conference Series: Materials Science and Engineering, 492 (1), № 012006, . [29] Tatarinov, V., Kirsanov, A.Enhancement of monitoring systems for the transport of dangerous goods by road (2019) IOP Conference Series: Materials Science and Engineering, 492 (1), № 012017, . [30] Ivanov, V.A. Repair of slide guides of metal cutting machines using composite materials(2020) International Journal of Emerging Trends in Engineering Research, 8 (8), статья № 79, pp. 4533-4536. [31] Maksimov, A.V., Sumzina, L.V. The influence of refrigerants on energy indicators of hermetic compressors (2020) International Journal of Emerging Trends in Engineering Research, 8 (7), pp. 3305-3309. [32] Ivanov, V.A. Reconditioning of worn process equipment using composite materials(2020) International Journal of Emerging Trends in Engineering Research, 8 (6), № 68, pp. 2635-2642. [33] Shaitura S.V., Stepanova M.G., Shaitura A.S., Ordov K.V., Galkin N.A. Application of information-analytical systems in management // Journal of Theoretical and Applied Information Technology.- 2016.- V. 90.- № 2.- С. 10-22. [34] V.Ya. Tsvetkov, S.V. Shaitura, A.M. Minitaeva, V.M. Feoktistova, Yu.P. Kozhaev, L.P. Belyu, “Metamodelling in the information field” . Amazonia Investiga. 9(25) (2020) 395-402 [35] Shaitura S.V., Kozhaev Yu.P., Ordov K.V., Antonenkova A.V., Zhenova N.A. “Performance evaluation of the electronic commerce systems” Espacios.- 2017.- Т. 38.- № 62.- С. 11. 181 [36] Shaitura S.V., Minitaeva A.M, Ordov K.V., Shaparenko V.V. “Virtual enterprises in a spatial economy”. International Journal of Recent Technology and Engineering (IJRTE) -2019. Т. 7. № 6. С. 719 - 724. [37] Shaitura S.V., Ordov K.V., Lesnichaya I.G., Romanova Yu. D., Khachaturova S.S. “Services and mechanisms of competitive intelligence on the internet”. Espacios.- 2018.- Т. 39.- № 45.- С. 24. [38] Gospodinov, S., Stereva, K. “Determining of areas on the territory of R Bulgaria with a low intensity of the recent vertical movements of the Earth`s crust”, 20th International Scientific Multidisciplinary Conference on Earth and Planetary Sciences SGEM2020, Albena, Bulgaria [39] Stereva, K. ”Influence of the temperature extension of the staffs on the results of precise levelling measurements”, 20th International Scientific Multidisciplinary Conference on Earth and Planetary Sciences SGEM2020, Albena, Bulgaria [40] Stereva, K. “Detection and measurement of cracks in rock massifs by means of ground laser scanning” , 6th World Multidisciplinary Earth Sciences Symposium - WMESS 2020, Prague, Czech Republic [41] Oveshnikova L., Lebedinskaya O., Timofeev A., Mikheykina L., Sibirskaya E., Lula P. “Studying the sector of the russian high-tech innovations on the basis of the global innovation index insead”. Advances in Intelligent Systems and Computing . 2019. V. 726. С. 87-96. [42] Lebedinskaya O.G., Timofeev A.G., Yarnykh E.A., Eldyaeva N.A., Golodov S.V. “Features of the population’s savings transformation into investments at the present stage”. Advances in Intelligent Systems and Computing. 2018. V. 622. С. 510-518. [43] Subramanian, H. “Security tokens: architecture, smart contract applications and illustrations using SAFE” (2020) Managerial Finance, 46 (6), pp. 735-748. 182