=Paper= {{Paper |id=Vol-3035/paper19 |storemode=property |title=Site Security System with 3D Imaging |pdfUrl=https://ceur-ws.org/Vol-3035/paper19.pdf |volume=Vol-3035 |authors=Sergey V. Shaytura,Alina M. Minitaeva,Larisa V. Sumzina,Alexander V. Maksimov }} ==Site Security System with 3D Imaging== https://ceur-ws.org/Vol-3035/paper19.pdf
Site Security System with 3D Imaging
Sergey V. Shaytura1,3, Alina M. Minitaeva2,3, Larisa V. Sumzina3 and Alexander V. Maksimov3
1
  Russian University of Transport (MIIT), Minayevskiy Pereulok, 2, Moscow, 127055
2
  Bauman Moscow State Technical University, 5/1 2nd Baymanskay ul., Moscow, 105005, Russia
3
  Russian State University of Tourism and Service, Ulitsa Glavnaya, 99, Cherkizovo, Moscow Oblast, 141221

                 Abstract
                 This article presents research on site security systems with 3D imaging tools and
                 geoinformation systems. This technology is built upon the integration of video surveillance
                 systems, pattern recognition and cartographic platform to precisely locate events on a map or
                 a plan. Such systems are used to quickly detect emergencies and make emergency actions.
                 The technology is proposed for securing city-owned premises such as hospitals, schools,
                 kindergartens, educational institutions, etc.Adoption of the technology will substantially
                 secure these sites from intrusion and terrorist attacks. This article analyzes shareware
                 programs for building a security system with 3D modeling. Based on the software chosen, we
                 gained a high-quality imaging of the security system using the medical unit No. 154 in
                 Krasnoarmeysk as an example. The key benefit of a security system with 3D imaging is that
                 it allows for an active part in viewing, which is much more interesting than passive
                 surveillance. It provides a vivid experience and a much clearer idea of what you are dealing
                 with.

                 Keywords 1
                 3D modeling, security system, geoinformation technologies, geoinformation systems,
                 video surveillance system, technical means, checkpoints

1. Introduction
    As society evolves, city-owned premises face new security challenges. Potential intruders become
more technical, illegal acts are being refined [1, 2, 3, 4]. City-owned premises such as hospitals,
clinics, educational institutions, kindergartens, etc. are the most vulnerable.
    In conventional access control systems, dispatcher at the checkpoint sees information from
cameras and analyzes the current situation, so there is no processing or highlighting sites at risk [5, 6,
7, 8, 9]. An intelligent access control system established based on 3D geographic information system
allows to approach site security at a different quality level. Such systems will not only monitor the
current situation, but also predict possible deviations from the standard situation, assess the degree of
emergency and offer the best solution to prevent a dangerous situation. Intelligent access control
systems will make it possible to move the point of decision-making on access to a remote site, thus
securing private security officers [10, 11, 12, 13, 14].

2. Materials and Methods
    The article explores the application of spatial geoinformation analysis [15, 16, 17, 18, 19] to
creation of a site security system [20, 21, 22, 23]. Geoinformation data analysis is based on
mathematical and statistical methods, artificial intelligence methods (pattern recognition, neural
network methods) [24, 25, 26, 27], cartographic and spatial analysis [28, 29, 30, 31, 32].
    To ensure that security program is effective, it is necessary to identify and assess vulnerabilities to
all types of hazards and threats. This involves developing capacity to prevent, protect, respond and

BIT-2021: XI International Scientific and Technical Conference on Secure Information Technologies, April 6-7, 2021, Moscow, Russia
EMAIL: swshaytura@gmail.com (A. 1); aminitaeva@mail.ru (A. 2); byttech1@yandex.ru (A. 3) maksimovav52@yandex.ru (A.4)
ORCID: 0000-0002-5621-5460 (A. 1); 0000-0002-9197-4219 (A. 2); 0000-0002-1138-464X (A. 3) 0000-0002-9191-6852 (A. 4)
            © 2021 Copyright for this paper by its authors.
            Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).
            CEUR Workshop Proceedings (CEUR-WS.org)


                                                                                   176
recover from catastrophic incidents. Nowadays, maintaining continuous situation awareness is
generally accepted as the basis for a successful outcome while ensuring national security. It is quite
difficult to gain the ability to collaborate with different stakeholders; assess vulnerabilities; and
prioritize resource allocation.
    The Geographic Information System (GIS) platform allows government agencies to [33, 34, 35,
36, 37]:
    ● Assess threats and vulnerabilities to critical infrastructure and the public.
    ● Develop mitigation and protection options to protect critical infrastructure.
    ● Maintain general situation awareness across multiple teams for daily operations.
    ● Maintain response and incident management processes.
    ● Support damage assessment using all types of mobile devices.
    GIS technology has long been used by government agencies, including those supporting national
security missions. Traditionally, GIS has been used by a small group of highly skilled analysts and
GIS specialists to identify threats, plan resource deployment, and map potential actions and develop
contingency plans.
     Desktop applications were created for creating information products and printing paper maps.
Today’s GIS platforms enable staff to access easy-to-use maps and applications supporting the
mission on any device anywhere anytime, on any network.
    GIS technology is much more prevalent and available online, in the cloud, and serves as a
complete geospatial software platform for geographic understanding, user process support,
collaboration, dynamic situation awareness and monitoring, and measurement. Technology provides
access to information for planning, response, concern, mitigation and recovery. Applications are
highly customizable and can provide quick access, understanding, and distribution to support
coordinated action.
    GIS platforms also integrate geographic information with business intelligence systems. Tabular
data comes to life on a dynamic map, so the information is easy to understand, resulting in faster and
better national security solutions. Enterprise business intelligence agency can now be geographically
enriched with geospatial data and maps.
    The GIS platform is designed to deliver relevant content via simple applications and web maps
that fit everybody’s needs in the organization.
    The platform allows users to create, manage and access data from other systems both within
organization and externally. The platform supports desktop, browser and mobile environments. It
works in any environment, from the office to the field. Mobile applications can immediately sync
with office systems and continue operation when disconnected from the network.
    The GIS platform can be easily configured to securely exchange data with specific users or
communities.
    Inter-agency collaboration and intelligence sharing are critical to national security. For example,
planning security for a special event, such as a major sporting event, or for an important tourist
attraction involves collaboration. Special events attract many people including tourists, officials and
celebrities.
    Many agencies and stakeholders use their own systems to plan and operate a special event. These
systems are often disabled, which makes them more reliable. Information exchange is near-
impossible. GIS platforms are designed to access data from existing systems and integrate them into a
common geographic system, a web map. This platform provides data interaction, better performance
and understanding by adding location.
    The GIS platform can be configured with applications, viewers, and group permissions that are
consistent with the organization’s workflows.

3. Results

  3.1. 3D Spatial Data Modeling and Visualization System
    The 3D spatial data modeling and visualization system is designed to visualize territories and sites
in space, carry out a comprehensive analysis of the territory and display geoinformation resources [38,
39, 40]. The program enables users to freely move in 3D space, provides a 3D visual representation of

                                                   177
cities, settlements, terrain, critical sites, and simulation of possible natural and man-made situations.
The program allows you to load vector layers and space images, Earth remote sensing data, 3D
models with an option to edit model location.


  3.2.Building a Security System
   The site should have a checkpoint for access control (Fig. 1).




   Figure 1. Checkpoint

    Checkpoint equipment should provide the necessary throughput and a possibility to thoroughly
check passes and documents, inspect all types of transport, transported goods and meet the following
requirements. The checkpoint must be equipped with the necessary communication and alarm systems
to call the guard reserve. Various turnstiles can be used as access control. There will be video cameras
installed on site (Fig. 2).




   Figure 2. Perimeter camera display

   A 3D site model will be created based on 3D modeling programs (Fig. 3).




                                                    178
   Figure 3. 3D Site Model

   The current situation will be determined by comparing the data received from the video camera
with the site model.

4. Discussion of Results
    Geographic information system in the modern sense is a technology for collecting, organizing,
exchanging and analyzing information. It allows to see what is happening and where, how different
events are interrelated and affected by location, what geographic, social and economic factors
determine the organization’s operation, and how to best use local features and spatial patterns. By
combining spatial and business information, GIS allows to simulate the real world and gives an idea
of the spatial patterns, dependencies, processes and situations that occur therein.
    GIS has become a conventional technology for solving a great number of tasks, particularly in
monitoring, security and emergency management systems [41, 42]. GIS is a necessary component in
building situation and analytical centers. In these cases, GIS is used both for addressing strategic
planning, forecasting and modelling tasks and for day-to-day monitoring and operational
management. With situation and analytical centers (SAC) built upon GIS, you can see process
dynamics with precise spatial and temporal localization of each event.

5. Conclusion
    All-source data integration and broad options for a comprehensive analysis (including real-time),
visualization and publication of information allow decision-makers to act within the cartographic
system model. Moreover, pattern recognition systems can be used for a fast response in emergency
situations.
    Cartographic video monitoring is built upon the integration of video surveillance systems, pattern
recognition and cartographic platform to precisely locate events on a map or a plan. Such systems are
used to quickly detect emergencies and make emergency actions.
    The system combines data streams from various sources (including video), they can be accessed
via various services on the cartographic portal and mobile devices.




                                                  179
6. References
       [1] Telny A.V., Chernikov R.S. “Algorithm for processing alarm notifications of object security
alarms to reduce the level of false alarms”. Control systems, communications and security, 2019. No
4. С. 140-162. DOI: 10.24411/2410-9916-2019-10405.
       [2] Probabilistic Modeling in System Engineering / By ed. A. Kostogryzov – London:
IntechOpen, 2018. 278 p. DOI: 10.5772/intechopen.71396.
       [3] Dorofeev A.V., Markov A.S., Tsirlov V.L. Social Media in Identifying Threats to Ensure
Safe Life in a Modern City. Communications in Computer and Information Science, 2016, vol. 674,
pp. 441-449. DOI: 10.1007/978-3-319-49700-6_44.
       [4] Jayasinghe, D., Cobourne, S., Markantonakis, K., Akram, R.N., Mayes, K. “Philanthropy on
the blockchain” (2018) Lecture Notes in Computer Science (including subseries Lecture Notes in
Artificial Intelligence and Lecture Notes inBioinformatics), 10741 LNCS, pp. 25-38.
       [5] F. Mouton, L. Leenen, and H.S. Venter, “Social engineering attack examples, templates and
scenarios” , Computers & Security, ] vol. 59, pp. 186–209, 2016.
       [6] V. Yemelyanov, N. Yemelyanova and A. Nedelkin, “Neural network for decision support to
determine the operating mode of lined equipment”, Paper presented at the MATEC Web of
Conferences, p.224, 2018. doi:10.1051/matecconf/201822404005
       [7] D. Maevsky, V. Kharchenko, M. Kolisnyk, and E. Maevskaya, “Software reliability models
and assessment techniques review: Classification issues”, 2017 9th IEEE International Conference on
Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications
(IDAACS), IEEE, pp. 894–899, 2017. DOI: 10.1109/IDAACS.2017.8095216
       [8] R. M. J. Rathnayaka, KTMU Hemapala, “Developing of scalable SCADA in view of
acquiring multi-protocol smart grid devices”, 2016 2nd International Conference on Advances in
Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 182 – 187,
2016. DOI: 10.1109/AEEICB.2016.7538269
       [9] Thuraisingham, B. “Blockchain Technologies and Their Applications in Data Science and
Cyber Security”(2020) Proceedings - 2020 3rd International Conference on Smart BlockChain,
SmartBlock 2020, статья № 9415693, pp. 1-4.
       [10] Nayak, A., Dutta, K. “Blockchain: The perfect data protection tool” (2018) Proceedings of
2017 International Conference on Intelligent Computing and Control, I2C2 2017, 2018-January, pp.
1-3.
       [11] Shaytura S.V., Minitaeva A.M., Feoktistova V.M., Ordov K.V. “Blockchains in spatial
data security” - In: CEUR Workshop Proceedings. Selected Papers of the X Anniversary International
Scientific and Technical Conference on Secure Information Technologies (BIT 2019). - 2019. - С. 70-
74.
       [12] Boiko, V. Shendryk, and O. Boiko, “Information systems for supply chain management:
uncertainties, risks and cyber security”, Procedia Computer Science, vol. 149, pp. 65 – 70, 2019. DOI:
10.1016/j.procs.2019.01.108.
       [13] Veretennikov, N.P., Mikulenok, A.S., Bogachev, V.F.”Management of the System for
Russian Arctic Region Logistics and Information Support” (2018) Proceedings of the 2018
International Conference ''Quality Management, Transport and Information Security,Information
Technologies'', IT and QM and IS 2018, статья № 8524986, pp. 271-273.
       [14] Stereva, K. “Terrestrial laser scanning – a still neglected reality in the process of creating
and maintenance of cadastral maps”, 20th International Scientific Multidisciplinary Conference on
Earth and Planetary Sciences SGEM2020, Albena, Bulgaria
       [15] S.V. Shaitura, Yu.P. Kozhaev, K.V. Ordov, T.A. Vintova, A.M. Minitaeva, and V.M.
Feoktistova, “Geoinformation services in a spatial economy”, International Journal of Civil
Engineering and Technology, vol. 9, no. 22, pp. 829-841, 2018.
       [16] Shaitura S.V., Ordov K.V., Lesnichaya I.G., Romanova Yu. D., Khachaturova S.S.
“Services and mechanisms of competitive intelligence on the internet”. Espacios.- 2018.- Т. 39.-
№ 45.- С. 24.




                                                    180
       [17] Shaitura S.V., Feoktistova F.M., Minitaeva A.M., Olenev L.A., Chulkov V.O., Kozhaev
Y.P. “Spatial geomarketing powered by big data”. Revista Turismo Estudos & Práticas. 2020. № S5.
С. 13.
       [18] Shaytura S.V., Ordov K.V., Minitaeva A.M. (2019). “Digital learning methods for the
digital economy”. Proceedings of the International Scientific and Practical Conference on Digital
Economy (ISCDE 2019), Yekaterinburg, Russia, pp. 606-611 https://doi.org/10.2991/iscde-
19.2019.117
       [19] Stereva, K., Postolovski, A., Gospodinov, S. “Control, in the process of the building
construction, by means of stationary terrestrial laser scanning, 6th World Multidisciplinary Earth
Sciences Symposium - WMESS 2020, Prague, Czech Republic
       [20] R. M. J. Rathnayaka, KTMU Hemapala, “Developing of scalable SCADA in view of
acquiring multi-protocol smart grid devices”, 2016 2nd International Conference on Advances in
Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 182 – 187,
2016. DOI: 10.1109/AEEICB.2016.7538269
       [21] Gan, J., Tsoukalas, G., Netessine, S. Initial coin offerings, speculation, and asset
tokenization(2021) Management Science, 67 (2), pp. 914-931.
       [22] Hasan, H.R., Salah, K., Jayaraman, R., Yaqoob, I., Omar, M.Blockchain Architectures for
Physical Internet: A Vision, Features, Requirements, and Applications(2021) IEEE Network, 35 (2),
статья № 9246622, pp. 174-181.
       [23] S. Loginova, Methods subsidiarity management, Perspectives of Science & Education,
3(2015)165-169 Advances in Economics, Business and Management Research, volume 138, 365
       [24] Brousseau E., Pénard T. The economics of digital business models: A framework for
analyzing the economics of platforms //Review of network Economics. – 2007. – V. 6. – №. 2. – p.81-
114.
       [25] Maslova Maria Al., Lagutkina Tatiana Vl. Analysis and identification of positive and
negative aspects of distance learning implementation // Research result. Information technologies -
2020 vol 5 № 2. C. 54-60.
       [26] Krasikov V.A. Analytic complexity of hypergeometric functions satisfying systems with
holonomic rank two // Lecture Notes in Computer Science. 2019. V. 11661 LNCS. С. 330-342.
       [27] Zharov, V.G.Efficiency of metal plaque lubricants in bearing supports of machinery for
public utilities and services(2020) International Journal of Emerging Trends in Engineering
Research, 8 (4), № 47, pp. 1232-1241.
       [28] Tatarinov, V., Kirsanov, A. Information support for safety insurance of road transport of
dangerous goods (2019) IOP Conference Series: Materials Science and Engineering, 492 (1), №
012006, .
       [29] Tatarinov, V., Kirsanov, A.Enhancement of monitoring systems for the transport of
dangerous goods by road (2019) IOP Conference Series: Materials Science and Engineering, 492 (1),
№ 012017, .
       [30] Ivanov, V.A. Repair of slide guides of metal cutting machines using composite
materials(2020) International Journal of Emerging Trends in Engineering Research, 8 (8), статья №
79, pp. 4533-4536.
       [31] Maksimov, A.V., Sumzina, L.V. The influence of refrigerants on energy indicators of
hermetic compressors (2020) International Journal of Emerging Trends in Engineering Research, 8
(7), pp. 3305-3309.
       [32] Ivanov, V.A. Reconditioning of worn process equipment using composite materials(2020)
International Journal of Emerging Trends in Engineering Research, 8 (6), № 68, pp. 2635-2642.
       [33] Shaitura S.V., Stepanova M.G., Shaitura A.S., Ordov K.V., Galkin N.A. Application of
information-analytical systems in management // Journal of Theoretical and Applied Information
Technology.- 2016.- V. 90.- № 2.- С. 10-22.
       [34] V.Ya. Tsvetkov, S.V. Shaitura, A.M. Minitaeva, V.M. Feoktistova, Yu.P. Kozhaev, L.P.
Belyu, “Metamodelling in the information field” . Amazonia Investiga. 9(25) (2020) 395-402
       [35] Shaitura S.V., Kozhaev Yu.P., Ordov K.V., Antonenkova A.V., Zhenova N.A.
“Performance evaluation of the electronic commerce systems” Espacios.- 2017.- Т. 38.- № 62.- С. 11.



                                                  181
        [36] Shaitura S.V., Minitaeva A.M, Ordov K.V., Shaparenko V.V. “Virtual enterprises in a
spatial economy”. International Journal of Recent Technology and Engineering (IJRTE) -2019. Т. 7.
№ 6. С. 719 - 724.
        [37] Shaitura S.V., Ordov K.V., Lesnichaya I.G., Romanova Yu. D., Khachaturova S.S.
“Services and mechanisms of competitive intelligence on the internet”. Espacios.- 2018.- Т. 39.- №
45.- С. 24.
        [38] Gospodinov, S., Stereva, K. “Determining of areas on the territory of R Bulgaria with a
low intensity of the recent vertical movements of the Earth`s crust”, 20th International Scientific
Multidisciplinary Conference on Earth and Planetary Sciences SGEM2020, Albena, Bulgaria
        [39] Stereva, K. ”Influence of the temperature extension of the staffs on the results of precise
levelling measurements”, 20th International Scientific Multidisciplinary Conference on Earth and
Planetary Sciences SGEM2020, Albena, Bulgaria
        [40] Stereva, K. “Detection and measurement of cracks in rock massifs by means of ground
laser scanning” , 6th World Multidisciplinary Earth Sciences Symposium - WMESS 2020, Prague,
Czech Republic
        [41] Oveshnikova L., Lebedinskaya O., Timofeev A., Mikheykina L., Sibirskaya E., Lula P.
“Studying the sector of the russian high-tech innovations on the basis of the global innovation index
insead”. Advances in Intelligent Systems and Computing . 2019. V. 726. С. 87-96.
        [42] Lebedinskaya O.G., Timofeev A.G., Yarnykh E.A., Eldyaeva N.A., Golodov S.V.
“Features of the population’s savings transformation into investments at the present stage”. Advances
in Intelligent Systems and Computing. 2018. V. 622. С. 510-518.
        [43] Subramanian, H. “Security tokens: architecture, smart contract applications and
illustrations using SAFE” (2020) Managerial Finance, 46 (6), pp. 735-748.




                                                   182