SlideShare a Scribd company logo
1 of 102
Download to read offline
MechatronicsMechatronics
for
Homeland Security 2012
Sanjay Sahay, IPS
IGP, Eastern Range, Davangere.
Structure of the PresentationStructure of the Presentation
Introduction
Technologically Yours- A will to learn
Software at the core of it all- a learning to a life time
Mechatronics- what is it all about? Objectives, Applications, Evolution and
Challenges
9/11 Changed the World
Department of Homeland Security
Its technological components
Challenges thrown to Mechatronics
Conclusion
Knowledge
BASIS FOR HUMAN EXISTENCE
OUGHT TO BE SHARED
SHOULD PASS ON FROM GENERATION TO THE OTHER
SUPER SPECILISATION AND INTERDEPENDENCE CO-EXIST
THE WHOLE WORLD HAD ONE KNOWLEDGE BASE- ARTIFICIAL BARRIERS
LEARNING A LIFE LONG PROCESS
SCALABILITY OF SKILLS IS THE KEY TO LEARNING
UN 2000-01
Cyber Crime Police Station
Mechatronics for Homeland Security
My journey to technology
UN Sudan 2005-06
Police Computerisation
Police Telecommunications
Other Technologies
The making of a Manager
THE NEED- Can the Police manage
Mechatronics for Homeland Security
My journey to technology
THE NEED- Can the Police manage
without technology?
The World Changeth:
Mechatronics for Homeland Security
My journey to technology
The World Changeth:
Multi Disciplinary
Cross Disciplinary
Inter Disciplinary
THE FINAL MODEL OF TODAY’S WORLD
IS A OVERLAY OF SOFTWARE AND
MANAGEMENT OF EVERY SINGLE
Mechatronics for Homeland Security
2012 - the face of the world
MANAGEMENT OF EVERY SINGLE
TECHNOLOGICAL AND ECONOMIC
ACTIVITY, TASK, PROCESS OR
OPERATION
MECHATRONICS BASE DIAGRAM
Term coined in around 1980
It combines in a synergetic way the classical
engineering disciplines, mechanical and electrical
Mechatronics for Homeland Security
What is Mechatronics
engineering disciplines, mechanical and electrical
engineering and computer science, leading to new
types of products
Some implications on relevant research
directions are design/production techniques,
control, artificial intelligence and man/machine
interfaces
For solving synthesis task (like anti-blocking
system, ABS) engineering mechanics are , of course,
needed
Mechatronics for Homeland Security
What is Mechatronics
needed
In addition knowledge of systems theory and
control techniques are required
Solution needs to be realised knowledge and
methods from electrical engineering, electronics and
computer science would also have to be used
Growth in interdisciplinary field
Possible as a result of the availability of cheap
Mechatronics for Homeland Security
What is Mechatronics
Possible as a result of the availability of cheap
computational power
Further supported by the rise of versatile power
electronics
Influence of information on design
MECHATRONICS BASE DIAGRAM
A DESIGN PHILOSOPHYA DESIGN PHILOSOPHY
CONCURRENT
APPROACH
Mechatronics for Homeland Security
Simply Mechatronics
Any time you use electronics to control anyAny time you use electronics to control any
device to improve, automate, or increase
productivity you are using mechatronics.
Mechatronics for Homeland Security
Schematic Representation of Advanced Mechatronic System
The tendency is obviously to include much more
Mechatronics for Homeland Security
What is Mechatronics- information is the game changer
The tendency is obviously to include much more
information processing into the product to make
better use of resources and to make it more versatile
to the user
It is the extension and the completion of
mechanical systems with sensors and
microcompters that is the most important aspect
Mechatronics for Homeland Security
Sensors and Microcomputers complete the system
Such systems pick up changes in its enviornment
by sensors and reacts to their signals using the
appropriate information processing makes it
different from conventional machines
Software has become an integral part of the
product itself , necessary for its function and
operation
Mechatronics for Homeland Security
Software at the center of all technologies
It is fully justifiable to say that software has
become an actual ‘ Machine element’
Integration is the Mantra
Mechatronics for Homeland Security
Innovation at the core of Mechatronic Systems
Incident Flow
ALERT
Mechatronics and Homeland Security
Command and Control Center-
a
PCR
Ambulance
Fire
Video DataMap Data Incident Data
Response
Procedure
Activated
Task Completed
&
Incident Closed
Reports
C4i Operator
Evolving Field
Mechatronics and Homeland Security
Evolutionary Discipline
Evolving Field
Evolving Applications
Automated Guided Vehicles
UAV- Unmanned Aerial Vehicle, commonly known as
Drone
Framework for Safe & Secure City
Suggestive Applications in Homeland Security
Robots – for ex. Bomb disposal
Robots for anti-hostage operations
TETRA Radio Network
Video Surveillance System
Vehicle design suitable for law and order
Weaponry
Field of service robots
Mechatronics and Homeland Security
New Applications
Still very limited , due to the still underdeveloped
intelligence of these machines
Numerous research works of mobile robots
Mechatronics is leading the way in micromachining and
nanotechniques
Mechatronics and Homeland Security
New Applications
nanotechniques
These new fields will intensively use methods from
mechatronics to make motions within very small
dimensions visible and controllable
Supplying and defining demanding applications and
integrating the control tasks into a technical system
Co-existence of technical systems with the biological
Mechatronics and Homeland Security
Objectives
Co-existence of technical systems with the biological
ones
Co-existence will develop cooperation
In this cooperation between biological or otherwise
unstructured systems and technical ones , Mechatronics
will play a very essential role
In such a co-operation it will be necessary to use
Mechatronics and Homeland Security
Objectives
In such a co-operation it will be necessary to use
machines that can be called intelligent and cooperative , in
contrast to current industry where such an interaction is
not yet usually needed
For any such less structured enviornments, in the future
machines with some kind of intelligence would be needed
Mechatronics and Homeland Security
Objectives
However, it will always be the case that this ‘ Machine
Intelligence’ is not sufficient
Human being
Such man/machine interactions require an appropriate
approach
9/11
9/11 9/11
9/11
9/11 has been a watershed in modern human
history
The world changed forever
This has been one of the negative used of
9/11 – Watershed in Modern History
The world changed for ever!
This has been one of the negative used of
technology in the history of mankind
Asymmetric Warfare
One world brought the world to near disaster
Privacy was given a go by
Technology took the world centerstage
The images of 9/11 has a lasting imprint of
human mind and would stay with us forever
Creation of this dept in US Administration in Oct
2002
Merger of 23 departments with interfaces
9/11 – Watershed in Modern History
Department of Homeland Security- A positive response
Merger of 23 departments with interfaces
worldwide
Technology as at main platform was accepted
the standard mode of handling internal security
Technology would be given as much importance
as the other critical internal security components
If 9/11 has been the most negative use of modern technology
9/11 – Watershed in Modern History
9/11 to Abottabad
If 9/11 has been the most negative use of modern technology
then Abottabad would go down as one of the most positive
use of modern technology
Command and Control Center
Interception Systems
Framework for Safe & Secure City
Suggestive Components
Interception Systems
TETRA Radio Network
Video Surveillance System
AVLS
Geo-Spatial Technology
Single Portal Access to C4i
Framework for Safe & Secure City
Command and Control Center
Single Portal Access to C4i
A web-based Solution that integrates surveillance
CCTV feeds, Emergency Response, AVTS, ITS,
Coastal Security, TETRA & GPS Location data on GIS
Map
Integrated Command Control Coordination And Communication System
Multi Vendor Video
Management
Integrated Situation
Management
Framework for Safe & Secure City
Command and Control Center
Incident Flow
ALERT
Framework for Safe & Secure City
Command and Control Center-
a
PCR
Ambulance
Fire
Video DataMap Data Incident Data
Response
Procedure
Activated
Task Completed
&
Incident Closed
Reports
C4i Operator
Framework for Safe & Secure City
Framework for Safe & Secure City
C4i Functionalities
• Incident Management
• Video Management
• Training and Simulation
• Recording, Debriefing and
Analysis
Framework for Safe & Secure City
Command and Control Center
• Integrated 2D GIS
• Sensor Management
• Situation at a Glance
• Sounds and Announcements
• Threat level Management
• Mobility
• VOIP Integration
Analysis
• Reports
• Administration and Authorization
• Video Wall Management
• Skill Set Management
• Work flow/Business Process
Where Are We Looking?
Framework for Safe & Secure City
Interception Systems
What Do We Intercept?
Voice Fax
Framework for Safe & Secure City
Interception Systems
Voice Fax
SMS Data
Framework for Safe & Secure City
Command and Control Center
Mass Interception Architecture
Networks
Mobile ILD Fixed Sat IP
Framework for Safe & Secure City
Interception Systems
Mediation
Storage & Archival
Processing – Demod & Speech
VerbaPSV
WS 6WS 1 WS 2 WS 3 WS 4 WS 5 WS 7 WS 8
Management
Advantages Of Mass Interception Systems
• Completely passive
• Undetectable by GSM/CDMA/PSTN Subscriber
• Undetectable by Network Operator
• Same system can be configured to work with
Framework for Safe & Secure City
Interception Systems
• Same system can be configured to work with
GSM
CDMA
Fixed Line
• Accurate acquisition of network data
• Can be used with Speaker ID systems
• No interaction with network equipment
• Small size, complete system can be mounted in a small truck/van
Framework for Safe & Secure City
Interception Systems
What Can The Verbacentre Do?
• Connects to multiple service providers
• Intercepts Voice, Fax and SMS
• Records all CRI/IRI
• Processes and correlates Call Content and CRI data
Framework for Safe & Secure City
Interception Systems
• Processes and correlates Call Content and CRI data
• Demodulates Fax
• Decodes SMS
• Reconstructs GPRS/EDGE and 1xRTT Sessions
• Provides Location Cell ID
• Provides IMSI, IMEI etc..
User Interface
Framework for Safe & Secure City
Interception Systems
GSM Identity Interrogator And Geo-locator
Framework for Safe & Secure City
Interception Systems
Interception Systems
Harrier- Applications
Key Applications
• Identification of Targets’ unknown mobile
• Detecting Targets’ Presence
Framework for Safe & Secure City
Interception Systems
• Detecting Targets’ Presence
• Direction Finding to locate Target
Other Applications
• Detection GSM Activity in a secure zone
• Profiling Targets
• Denial of Service
How It Works
GSM
Network
Framework for Safe & Secure City
Interception Systems
• Mobiles monitor up to 6 BTSs
• Harrier clones neighbour BTS
• Entices mobile to register, captures mobile identity IMSI, IMEI and TMSI etc.
Network
Harrier
Geo-locating A Target
1
• Harrier team deployed to this cell
location
• Once located Target is locked to
Harrier and Silent Call initiated.
• Target’s phone begins transmitting
Framework for Safe & Secure City
Interception Systems
3
2
• Target’s phone begins transmitting
and DF teams move in to track and
locate phone
• Multiple DF can be deployed for
rapid target location. Covert
Handheld & Body-worn DF available
Exposes the invisible
ReveaLinx
Framework for Safe & Secure City
Interception Systems
Exposes the invisible
links
hidden in your data
What is ReveaLinx
• Create nodes and links from source data
– “bottom up”
Link and Network Analysis
Framework for Safe & Secure City
Interception Systems
– “bottom up”
– disparate sources
• Visualize
– for analyst to interpret and
communicate
– harness the human mind
• Unique analytical methods
– Relationships
– Patterns
– Networks
You see data today in the form of records, tables, graphs, reports
Ref# Name Address Phone ID#
XXX101 BILL JONES 999 WEST 4TH ST 999-666-8888 234-56-7890
Source Data
Framework for Safe & Secure City
Interception Systems
XXX101 BILL JONES 999 WEST 4TH ST 999-666-8888 234-56-7890
YYY202 SAM SMITH 888 OAK STREET 888-999-0000 111-11-1234
Nodes
Ref# Name Address Phone ID#
XXX101 BILL JONES 999 WEST 4TH ST 999-666-8888 234-56-7890
ReveaLinks breaks these records into the smallest
relevant elements - “Nodes”
Framework for Safe & Secure City
Interception Systems
XXX101 BILL JONES 999 WEST 4TH ST 999-666-8888 234-56-7890
YYY202 SAM SMITH 888 OAK STREET 888-999-0000 111-11-1234
BILL JONES 999 WEST 4TH ST
999-666-8888
234-56-7890
XXX101
Links
Ref# Name Address Phone ID#
Then shows how these individual elements of data are connected
to each other – “Links”
Framework for Safe & Secure City
Interception Systems
Ref# Name Address Phone ID#
XXX101 BILL JONES 999 WEST 4TH ST 999-666-8888 234-56-7890
YYY202 SAM SMITH 888 OAK STREET 888-999-0000 111-11-1234
BILL JONES 999 WEST 4TH ST
999-666-8888
234-56-7890
XXX101
Relationships
Using both nodes and links, complex indirect relationships can be
‘discovered’ in large volumes of data
Framework for Safe & Secure City
Interception Systems -
BILL JONES 999 WEST 4TH ST
999-666-8888
234-56-7890
XXX101
PHIL CLARK 848-090-9904
JOE PAGE
459-89-9986
ROB JONES
Nodes
Framework for Safe & Secure City
Interception Systems
Nodes
Framework for Safe & Secure City
Interception Systems
Nodes
Framework for Safe & Secure City
Interception Systems
Nodes
Framework for Safe & Secure City
Interception Systems
Nodes
Framework for Safe & Secure City
Interception Systems
Nodes
Framework for Safe & Secure City
Interception Systems
Attributes
Address Node Attributes
Dwelling Type: Unit
Year built: 1964
Bedrooms: 2
Title: Torrens
Total Occupants: 1
Vehicle Node Attributes
Make: Mazda
Model: Astina
Year: 1998
Engine Size: 1800
Framework for Safe & Secure City
Interception Systems -
Person / Address
Link Attributes
Years at Address: 5
Status: Owner
Joint Ownership: No
Other Occupants: No
Total Occupants: 1
ReveaLinx Architecture
DB1
Data Servers
Analyst 1
Data Modelling and Analysis Investigation Presentation
Case A
Framework for Safe & Secure City
Interception Systems
Develop Applications
DB1
DB2
Deploy
Applications
Direct connection to
systems to retrieve data
ReveaLinks
Analyst 2
Workstation
Workstation
Workstation
Analyst 3Results
Delivery
Data
Files
Presenter
Presenter
Case B
Case
Delivery
TETRA
• Radio systems are still the backbone in a modern public
safety and security network, because the field operations
Framework for Safe & Secure City
rely entirely on its functionality and reliability.
• TETRA = TErrestrial Trunked RAdio
• Mobile Telephony : GSM : : Radio Communication: TETRA
TETRA Is Purpose-built Technology For Mission Critical
Communication
Specialized group communication
• one-to-many communication
High availability
• Redundancy
Framework for Safe & Secure City
TETRA
• Push-to-talk, instant call
connection in less than 0.5 sec
• Redundancy
• Priorities
• Direct Mode Operation
• Base station fallback
Uncompromising security
• Authentication
• Air interface encryption
• End-to-end encryption
• Disabling of stolen radios
Advanced data services
• Status and text messaging
• IP packet data
• High speed data - TEDS
In The Past Agencies Used To Have Their Own Private, Isolated
Radio Communication Systems
Fire dept.Rescue
Framework for Safe & Secure City
TETRA
Fire dept.
Traffic police
Crime unit
Rescue
Public
transport
ation
Power
generation &
distribution
Ambulance
TETRA Enables Sharing Of A Common Infrastructure Between
All Mission Critical Users
Fire Dept.
Framework for Safe & Secure City
TETRA
TETRA
Fire Dept.
Traffic Police
Power Generation
& Distribution
Ambulance
Public
Transportation
Crime Unit
Rescue
TETRA enabling services
• No technical communication barriers between
organizations
• Enables efficient co-operation between authorities
Framework for Safe & Secure City
TETRA
• Enables efficient co-operation between authorities
especially in large incidents
• Seamless communication readiness everywhere, while
VPNs retain inter-agency privacy
• Connecting independent networks together
TETRA enabling services…
Enables new data-intensive applications:
high quality images
multimedia video clips
Framework for Safe & Secure City
TETRA
multimedia video clips
access to intra/internet
field command systems
Sharing a common TETRA infrastructure by all authorities
improves inter-agency cooperation in large incidents
Components
Securing AccessTransmitting
Video
Capture Video
Managing
Video
Framework for Safe & Secure City
Video Surveillance System -
Firewall
Intrusion
Detection
Wireless
Transmission
for Cameras
WAN
transmission
to NOC
Capture Video
Control
Solution
View and Store Video
Response
Video Management
Framework for Safe & Secure City
Video Surveillance System -
Response Management
Enables Communications Between Multiple Devices
VHF
RADIO
PSTN
Framework for Safe & Secure City
Video Surveillance System -
IPICS
UHF
RADIO
PTT over
Cellular
VoIP PTTCell
Mgmt.
Softwar
e
IP Phone
Secure Access
Application Security
System Management
Policy—Reputation—Identity
Protect the core
applications from
attack
Protect the video
content from
Framework for Safe & Secure City
Video Surveillance System -
Network Security
Endpoint Security
Content Security
Self-Defending Network:
Best of Breed Security in a
Systems Approach
content from
misuse and
abuse
Ensure no
attacks or
malfunction in
the network
Ensure end
users cannot
abuse the
system
Features Of Proposed Architecture
• Hierarchical Architecture Video endpoints/Police stations and
Control rooms
• Easily Scalable : Add more video Surveillance points/Police stations
and Control rooms
Framework for Safe & Secure City
Video Surveillance System
and Control rooms
• Redundancy: In an emergency, control and monitoring can be
easily transferred to any other point on the network
• Secured IP based Network enables Anywhere, Anytime, Any
Device, access
• Easy to Manage: Management/Administration and Configuration
through Web clients
• Third party Integration: Integration of 3rd party Video Analytics,
Storage .. etc
Next Steps
• Determine the Type of Camera’s required at each video
Surveillance points
• Determine the bandwidth required at each video Surveillance
Framework for Safe & Secure City
Video Surveillance System
• Determine the bandwidth required at each video Surveillance
points
• Conduct the feasibility study to determine the Type of
Connectivity media ( Ethernet/Leased line/Wireless) required
between video Surveillance points to Police stations and to
Control room and DGP office and work closely with service
providers.
• Finalize on 3rd party application Integration
• Finalize the Architecture
Technology Position In Adoption Cycle
In Vehicle Display Terminals
OCC Systems
Offline Vehicle Tracking
Fleet Management Solution
Online Vehicle Tracking
Framework for Safe & Secure City
AVLS
I Innovators
EA Early Adopters
EM Pragmatists Early Majority
LM Pragmatists Late Majority
T Traditionalists
I EA EM LM T
C
h
a
s
m
Live Video Streaming
OCC Systems
Offline Vehicle Tracking
Driver Identification System
Mobile Application
Occupancy Monitoring System
Passenger Identification Systems
Driver Assistance System
In Vehicle Computers
Estimated Time of Arrival Systems
Navigation Systems
GPS Technology
Server
Geostationary Satellite
OverLAN
ProtectedbyFirewall&IDS
Framework for Safe & Secure City
AVLS -
Mobile Service Provider
Network
Mobile Tower
GPS/GPRS Module
Reports
Security
Team
Over
Private
APN
OverLAN
ProtectedbyFirewall&IDS
Technology & Benefits
Framework for Safe & Secure City
AVLS
Key Functionalities
Locating Closest First Responder On An Incident
Report Using Fleetcheck
Once an incident information is
Framework for Safe & Secure City
AVLS -
Once an incident information is
received at the control room, then
can navigate in the map to that
report and identify the closest police
officer to that location. This can
closely integrate with Dial 100
solution aswell.
Directing The Officer To The Right Incident Spot
When a police officer has to
Key Functionalities
Framework for Safe & Secure City
AVLS
When a police officer has to
be sent to a particular
location, the control room
staff can advice on the
directions to be taken by the
vehicle using the live vehicle
movement data on the maps.
Key Functionalities
Automated Trip Sheet Generation
The man power spent on
report generation and
Framework for Safe & Secure City
AVLS
report generation and
maintenance can be reduced
with the help of automated
trip sheet generation. Data
includes vehicle on nightly
basis, with starting location
and all the other locations
covered by the vehicle.
Key Functionalities
Efficient Fuel Disbursement
Framework for Safe & Secure City
Fuel level can be monitored
live across vehicles and the
usage can be monitored and
controlled efficiently.
Key Functionalities
Feature to provide vehicle service alerts at every
programmed km interval
Framework for Safe & Secure City
AVLS
programmed km interval
The vehicle maintenance
schedules can be fed to the
system to generate alerts at
periodic intervals.
Key Functionalities
Creating Active Geofences To Track Critical Vehicle Movement
If a particular police vehicle is
Framework for Safe & Secure City
AVLS
If a particular police vehicle is
on a predetermined trip such
as moving prisoners, etc, a
virtual fence may be created
which can be used to detect
any violations to the
prescribed route.
Key Functionalities
Capability To Track All Idling Locations, Idling Durations
Framework for Safe & Secure City
AVLS
All the locations where the
vehicle was stopped including
for traffic lights will be tracked
and will be available in the
control room.
Key Functionalities
Ability To Look At The Path Traveled By The Vehicle For
Any Given Timeframe
Framework for Safe & Secure City
AVLS
Any Given Timeframe
From one location, i.e. the
control room, the tracking
members can identify the trace
of route or path taken by the
vehicle in any given timeframe.
The coverage of the patrol to
various points can be tracked
using the system.
GPS Enabled Departments
GPS Enabled Departments
Bangalore police had adopted GPS for about 750
four wheelers which is monitored from central
Framework for Safe & Secure City
AVLS
four wheelers which is monitored from central
command and control center. Now the Bangalore
police is expanding to two wheeler tracking as well.
Delhi police had adopted GPS technology for about
640 two and four wheelers, which are monitored
and operated from central command and control
center.
• Live tracking of the first responder vehicles
• State of the art control room for monitoring the operations
• Dial 100, emergency call handling system
Key Functionalities
AVLS
Framework for Safe & Secure City
• Dial 100, emergency call handling system
• Officer & Team identification and coordination
• Estimated time of arrival to the destination
• Alert and Communicate with the officers on the move
• Log of exact activity by individual officers.
• Control over unauthorized and unscheduled stoppages.
• Faster response time by better coordination with traffic
department
Live View Screenshot
Framework for Safe & Secure City
AVLS
Geo-Spatial Technology
Geo-Spatial Technology
DHS Mission Statement
According to the National Strategy for Homeland Security and
DHS’S mission statement,
homeland security covers prevention, protection, response, and
recovery.recovery.
Geospatial products and intelligence play a key role in
departments’ preparation for disasters and its response to
them and support incident management
Sun Synchronous Imaging Satellites
RRRR
EEEE
QQQQ
UUUU
IIII
RRRR
EEEE
MMMM
EEEE
Spectral Bands
EEEE
TTTT
SSSS
Swath
Ortho Pan
Geo-Spatial Technology
Geo-Spatial Technology
Geospatial Information Stages
Geo
Techno- Specialty
Core
Ideas
Techno-
logies
Data
Specialty
Fields
Geospatial Technology
Some applications in Homeland Security
Geospatial Technology provides enhanced geospatial
understanding of a facilities vulnerabilities and speed up
detection and response time in the event of a security breach
Rapid access to extensive data, displayed in a geospatial
medium helps protect critical assets and infrastructure and
ensures public safety
Geo-Spatial Technology
DHS Spatial Data Infrastructure
DHS Spatial Data Infrastructure (SDI),a subset of Enterprise
Architecture, consists of geographic system software and
hardware, geospatial applications, data, standards, policies,hardware, geospatial applications, data, standards, policies,
programs, and the human resources necessary to acquire,
process, analyze, store, maintain, distribute, and otherwise use
geospatial data as a strategic asset for the DHS and the nation
Geo-Spatial Technology
Geospatial Preparedness
The Final Destination
Means the level of overall capability and capacity necessary to
enable all levels of the Dept to use geospatial data, geographic
information systems software and hardware, and geospatial
applications to perform essential functions such as prevention,applications to perform essential functions such as prevention,
detection, planning, mitigation, response, and recovery in order
to minimize loss of life and property from weapons of mass
destruction, terrorist threats, major threats, major man made
accidents, and natural disasters
Mechatronics and Homeland Security
Conclusion
Mechatronics has the capability to design and
deliver products which can radically change our
quality of response in the war against terror. Thequality of response in the war against terror. The
missing like is the lack of interconnect between
the two at the R & D level. An integrated and all
inclusive technology strategy is the answer.
Mechatronics and Homeland Security
Conclusion
A State of Art Center for Homeland Security is the answer!
We owe it to every INDIAN
You guys have been good to me
Thank You

More Related Content

What's hot

What's hot (8)

Robot Configuration - 1
Robot Configuration - 1Robot Configuration - 1
Robot Configuration - 1
 
Aerospace Nanotechnology
Aerospace NanotechnologyAerospace Nanotechnology
Aerospace Nanotechnology
 
The design of Farm cart 0011 report 1 2020
The design of Farm cart 0011  report 1 2020The design of Farm cart 0011  report 1 2020
The design of Farm cart 0011 report 1 2020
 
Nanotechnology Application (Physics)
Nanotechnology Application (Physics)Nanotechnology Application (Physics)
Nanotechnology Application (Physics)
 
COBOTS.ppt
COBOTS.pptCOBOTS.ppt
COBOTS.ppt
 
CNC Presentation
CNC PresentationCNC Presentation
CNC Presentation
 
Nanotechnology
NanotechnologyNanotechnology
Nanotechnology
 
Micro Electrochemical Machining
Micro Electrochemical MachiningMicro Electrochemical Machining
Micro Electrochemical Machining
 

Similar to Mechatronics for Homeland Security

Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaAngeloluca Barba
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANETDr.Irshad Ahmed Sumra
 
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019Grid Dynamics
 
Lemay Scinteie it-trans-2010, Karlshruhe
Lemay Scinteie it-trans-2010, KarlshruheLemay Scinteie it-trans-2010, Karlshruhe
Lemay Scinteie it-trans-2010, KarlshruheValentin Scinteie
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorEuropean Services Institute
 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveDawn Nash Pfeiffer
 
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...Stuart Bennett
 
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)Big Data Value Association
 
Airport security 2013 slawomir szlufik
Airport security 2013   slawomir szlufikAirport security 2013   slawomir szlufik
Airport security 2013 slawomir szlufikRussell Publishing
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructureShreyas Satpute
 
Public safety in a multi media era facilitating incident management response
Public safety in a multi media era   facilitating incident management responsePublic safety in a multi media era   facilitating incident management response
Public safety in a multi media era facilitating incident management responseJack Brown
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security InfrastructureGAURAV. H .TANDON
 
Next gen emergency-aware platform
Next gen emergency-aware platformNext gen emergency-aware platform
Next gen emergency-aware platformProdapt Solutions
 

Similar to Mechatronics for Homeland Security (20)

Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
Using Computing Methods to Secure VANET
Using Computing Methods to Secure VANETUsing Computing Methods to Secure VANET
Using Computing Methods to Secure VANET
 
HLS Perspective, Safer cities for a better tomorrow
HLS Perspective, Safer cities for a better tomorrowHLS Perspective, Safer cities for a better tomorrow
HLS Perspective, Safer cities for a better tomorrow
 
HLS Perspective. Safer cities for a better tomorrow
HLS Perspective. Safer cities for a better tomorrowHLS Perspective. Safer cities for a better tomorrow
HLS Perspective. Safer cities for a better tomorrow
 
Cyber security and Homeland security
Cyber security and Homeland securityCyber security and Homeland security
Cyber security and Homeland security
 
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
The New Era of Public Safety Records Management: Dynamic talks Chicago 9/24/2019
 
Lemay Scinteie it-trans-2010, Karlshruhe
Lemay Scinteie it-trans-2010, KarlshruheLemay Scinteie it-trans-2010, Karlshruhe
Lemay Scinteie it-trans-2010, Karlshruhe
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity Critical Infrastructure and Cybersecurity
Critical Infrastructure and Cybersecurity
 
SDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator PerspectiveSDI @ISCWest 2017: A Systems Integrator Perspective
SDI @ISCWest 2017: A Systems Integrator Perspective
 
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
CSU - ITC571 Capstone Project Seminar - Security Issues and challenges with W...
 
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
 
Airport security 2013 slawomir szlufik
Airport security 2013   slawomir szlufikAirport security 2013   slawomir szlufik
Airport security 2013 slawomir szlufik
 
smart security infrastructure
smart security infrastructuresmart security infrastructure
smart security infrastructure
 
Public safety in a multi media era facilitating incident management response
Public safety in a multi media era   facilitating incident management responsePublic safety in a multi media era   facilitating incident management response
Public safety in a multi media era facilitating incident management response
 
2.1 TEMU Workshop 2016
2.1   TEMU Workshop 2016 2.1   TEMU Workshop 2016
2.1 TEMU Workshop 2016
 
Smart Security Infrastructure
Smart Security InfrastructureSmart Security Infrastructure
Smart Security Infrastructure
 
Next gen emergency-aware platform
Next gen emergency-aware platformNext gen emergency-aware platform
Next gen emergency-aware platform
 
Cii iq's national business excellence conclave 2013
Cii   iq's national business excellence conclave 2013Cii   iq's national business excellence conclave 2013
Cii iq's national business excellence conclave 2013
 

More from ADGP, Public Grivences, Bangalore

More from ADGP, Public Grivences, Bangalore (20)

Towards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for IndiaTowards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for India
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CCTNS & Homeland Security
CCTNS & Homeland SecurityCCTNS & Homeland Security
CCTNS & Homeland Security
 
Secure it0001
Secure it0001Secure it0001
Secure it0001
 
e-gov: Secure IT 2014
e-gov: Secure IT 2014e-gov: Secure IT 2014
e-gov: Secure IT 2014
 
Asymmetric warfare for geoworld
Asymmetric warfare for geoworldAsymmetric warfare for geoworld
Asymmetric warfare for geoworld
 
Secure Cities 2013
Secure Cities 2013Secure Cities 2013
Secure Cities 2013
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop
 
KSP Composite Computerization Model
KSP Composite Computerization ModelKSP Composite Computerization Model
KSP Composite Computerization Model
 
CCTNS Karnataka Overview
CCTNS Karnataka OverviewCCTNS Karnataka Overview
CCTNS Karnataka Overview
 
Xime erp creation & change management 18082013
Xime erp creation & change management 18082013Xime erp creation & change management 18082013
Xime erp creation & change management 18082013
 
Technological framework
Technological frameworkTechnological framework
Technological framework
 
E gov championship workshop bangalore 21082013
E gov championship workshop bangalore 21082013E gov championship workshop bangalore 21082013
E gov championship workshop bangalore 21082013
 
Homeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism MechanismHomeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism Mechanism
 
Leadership casestudy
Leadership casestudyLeadership casestudy
Leadership casestudy
 
Reaching out to the unreached
Reaching out to the unreachedReaching out to the unreached
Reaching out to the unreached
 
LTC Word
LTC WordLTC Word
LTC Word
 
Homeland security – A robust counter terrorism mechanism
Homeland security – A robust counter terrorism mechanismHomeland security – A robust counter terrorism mechanism
Homeland security – A robust counter terrorism mechanism
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 

Mechatronics for Homeland Security

  • 1. MechatronicsMechatronics for Homeland Security 2012 Sanjay Sahay, IPS IGP, Eastern Range, Davangere.
  • 2. Structure of the PresentationStructure of the Presentation Introduction Technologically Yours- A will to learn Software at the core of it all- a learning to a life time Mechatronics- what is it all about? Objectives, Applications, Evolution and Challenges 9/11 Changed the World Department of Homeland Security Its technological components Challenges thrown to Mechatronics Conclusion
  • 3. Knowledge BASIS FOR HUMAN EXISTENCE OUGHT TO BE SHARED SHOULD PASS ON FROM GENERATION TO THE OTHER SUPER SPECILISATION AND INTERDEPENDENCE CO-EXIST THE WHOLE WORLD HAD ONE KNOWLEDGE BASE- ARTIFICIAL BARRIERS LEARNING A LIFE LONG PROCESS SCALABILITY OF SKILLS IS THE KEY TO LEARNING
  • 4. UN 2000-01 Cyber Crime Police Station Mechatronics for Homeland Security My journey to technology UN Sudan 2005-06 Police Computerisation Police Telecommunications Other Technologies The making of a Manager
  • 5. THE NEED- Can the Police manage Mechatronics for Homeland Security My journey to technology THE NEED- Can the Police manage without technology?
  • 6. The World Changeth: Mechatronics for Homeland Security My journey to technology The World Changeth: Multi Disciplinary Cross Disciplinary Inter Disciplinary
  • 7. THE FINAL MODEL OF TODAY’S WORLD IS A OVERLAY OF SOFTWARE AND MANAGEMENT OF EVERY SINGLE Mechatronics for Homeland Security 2012 - the face of the world MANAGEMENT OF EVERY SINGLE TECHNOLOGICAL AND ECONOMIC ACTIVITY, TASK, PROCESS OR OPERATION
  • 9. Term coined in around 1980 It combines in a synergetic way the classical engineering disciplines, mechanical and electrical Mechatronics for Homeland Security What is Mechatronics engineering disciplines, mechanical and electrical engineering and computer science, leading to new types of products Some implications on relevant research directions are design/production techniques, control, artificial intelligence and man/machine interfaces
  • 10. For solving synthesis task (like anti-blocking system, ABS) engineering mechanics are , of course, needed Mechatronics for Homeland Security What is Mechatronics needed In addition knowledge of systems theory and control techniques are required Solution needs to be realised knowledge and methods from electrical engineering, electronics and computer science would also have to be used
  • 11. Growth in interdisciplinary field Possible as a result of the availability of cheap Mechatronics for Homeland Security What is Mechatronics Possible as a result of the availability of cheap computational power Further supported by the rise of versatile power electronics Influence of information on design
  • 12. MECHATRONICS BASE DIAGRAM A DESIGN PHILOSOPHYA DESIGN PHILOSOPHY CONCURRENT APPROACH
  • 13. Mechatronics for Homeland Security Simply Mechatronics Any time you use electronics to control anyAny time you use electronics to control any device to improve, automate, or increase productivity you are using mechatronics.
  • 14. Mechatronics for Homeland Security Schematic Representation of Advanced Mechatronic System
  • 15. The tendency is obviously to include much more Mechatronics for Homeland Security What is Mechatronics- information is the game changer The tendency is obviously to include much more information processing into the product to make better use of resources and to make it more versatile to the user
  • 16. It is the extension and the completion of mechanical systems with sensors and microcompters that is the most important aspect Mechatronics for Homeland Security Sensors and Microcomputers complete the system Such systems pick up changes in its enviornment by sensors and reacts to their signals using the appropriate information processing makes it different from conventional machines
  • 17. Software has become an integral part of the product itself , necessary for its function and operation Mechatronics for Homeland Security Software at the center of all technologies It is fully justifiable to say that software has become an actual ‘ Machine element’ Integration is the Mantra
  • 18. Mechatronics for Homeland Security Innovation at the core of Mechatronic Systems
  • 19. Incident Flow ALERT Mechatronics and Homeland Security Command and Control Center- a PCR Ambulance Fire Video DataMap Data Incident Data Response Procedure Activated Task Completed & Incident Closed Reports C4i Operator
  • 20. Evolving Field Mechatronics and Homeland Security Evolutionary Discipline Evolving Field Evolving Applications
  • 21. Automated Guided Vehicles UAV- Unmanned Aerial Vehicle, commonly known as Drone Framework for Safe & Secure City Suggestive Applications in Homeland Security Robots – for ex. Bomb disposal Robots for anti-hostage operations TETRA Radio Network Video Surveillance System Vehicle design suitable for law and order Weaponry
  • 22. Field of service robots Mechatronics and Homeland Security New Applications Still very limited , due to the still underdeveloped intelligence of these machines Numerous research works of mobile robots
  • 23. Mechatronics is leading the way in micromachining and nanotechniques Mechatronics and Homeland Security New Applications nanotechniques These new fields will intensively use methods from mechatronics to make motions within very small dimensions visible and controllable
  • 24. Supplying and defining demanding applications and integrating the control tasks into a technical system Co-existence of technical systems with the biological Mechatronics and Homeland Security Objectives Co-existence of technical systems with the biological ones Co-existence will develop cooperation In this cooperation between biological or otherwise unstructured systems and technical ones , Mechatronics will play a very essential role
  • 25. In such a co-operation it will be necessary to use Mechatronics and Homeland Security Objectives In such a co-operation it will be necessary to use machines that can be called intelligent and cooperative , in contrast to current industry where such an interaction is not yet usually needed
  • 26. For any such less structured enviornments, in the future machines with some kind of intelligence would be needed Mechatronics and Homeland Security Objectives However, it will always be the case that this ‘ Machine Intelligence’ is not sufficient Human being Such man/machine interactions require an appropriate approach
  • 28. 9/11
  • 29. 9/11 has been a watershed in modern human history The world changed forever This has been one of the negative used of 9/11 – Watershed in Modern History The world changed for ever! This has been one of the negative used of technology in the history of mankind Asymmetric Warfare One world brought the world to near disaster Privacy was given a go by Technology took the world centerstage The images of 9/11 has a lasting imprint of human mind and would stay with us forever
  • 30. Creation of this dept in US Administration in Oct 2002 Merger of 23 departments with interfaces 9/11 – Watershed in Modern History Department of Homeland Security- A positive response Merger of 23 departments with interfaces worldwide Technology as at main platform was accepted the standard mode of handling internal security Technology would be given as much importance as the other critical internal security components
  • 31. If 9/11 has been the most negative use of modern technology 9/11 – Watershed in Modern History 9/11 to Abottabad If 9/11 has been the most negative use of modern technology then Abottabad would go down as one of the most positive use of modern technology
  • 32. Command and Control Center Interception Systems Framework for Safe & Secure City Suggestive Components Interception Systems TETRA Radio Network Video Surveillance System AVLS Geo-Spatial Technology
  • 33. Single Portal Access to C4i Framework for Safe & Secure City Command and Control Center Single Portal Access to C4i A web-based Solution that integrates surveillance CCTV feeds, Emergency Response, AVTS, ITS, Coastal Security, TETRA & GPS Location data on GIS Map
  • 34. Integrated Command Control Coordination And Communication System Multi Vendor Video Management Integrated Situation Management Framework for Safe & Secure City Command and Control Center
  • 35. Incident Flow ALERT Framework for Safe & Secure City Command and Control Center- a PCR Ambulance Fire Video DataMap Data Incident Data Response Procedure Activated Task Completed & Incident Closed Reports C4i Operator
  • 36. Framework for Safe & Secure City
  • 37. Framework for Safe & Secure City
  • 38. C4i Functionalities • Incident Management • Video Management • Training and Simulation • Recording, Debriefing and Analysis Framework for Safe & Secure City Command and Control Center • Integrated 2D GIS • Sensor Management • Situation at a Glance • Sounds and Announcements • Threat level Management • Mobility • VOIP Integration Analysis • Reports • Administration and Authorization • Video Wall Management • Skill Set Management • Work flow/Business Process
  • 39. Where Are We Looking? Framework for Safe & Secure City Interception Systems
  • 40. What Do We Intercept? Voice Fax Framework for Safe & Secure City Interception Systems Voice Fax SMS Data
  • 41. Framework for Safe & Secure City Command and Control Center
  • 42. Mass Interception Architecture Networks Mobile ILD Fixed Sat IP Framework for Safe & Secure City Interception Systems Mediation Storage & Archival Processing – Demod & Speech VerbaPSV WS 6WS 1 WS 2 WS 3 WS 4 WS 5 WS 7 WS 8 Management
  • 43. Advantages Of Mass Interception Systems • Completely passive • Undetectable by GSM/CDMA/PSTN Subscriber • Undetectable by Network Operator • Same system can be configured to work with Framework for Safe & Secure City Interception Systems • Same system can be configured to work with GSM CDMA Fixed Line • Accurate acquisition of network data • Can be used with Speaker ID systems • No interaction with network equipment • Small size, complete system can be mounted in a small truck/van
  • 44. Framework for Safe & Secure City Interception Systems
  • 45. What Can The Verbacentre Do? • Connects to multiple service providers • Intercepts Voice, Fax and SMS • Records all CRI/IRI • Processes and correlates Call Content and CRI data Framework for Safe & Secure City Interception Systems • Processes and correlates Call Content and CRI data • Demodulates Fax • Decodes SMS • Reconstructs GPRS/EDGE and 1xRTT Sessions • Provides Location Cell ID • Provides IMSI, IMEI etc..
  • 46. User Interface Framework for Safe & Secure City Interception Systems
  • 47. GSM Identity Interrogator And Geo-locator Framework for Safe & Secure City Interception Systems Interception Systems
  • 48. Harrier- Applications Key Applications • Identification of Targets’ unknown mobile • Detecting Targets’ Presence Framework for Safe & Secure City Interception Systems • Detecting Targets’ Presence • Direction Finding to locate Target Other Applications • Detection GSM Activity in a secure zone • Profiling Targets • Denial of Service
  • 49. How It Works GSM Network Framework for Safe & Secure City Interception Systems • Mobiles monitor up to 6 BTSs • Harrier clones neighbour BTS • Entices mobile to register, captures mobile identity IMSI, IMEI and TMSI etc. Network Harrier
  • 50. Geo-locating A Target 1 • Harrier team deployed to this cell location • Once located Target is locked to Harrier and Silent Call initiated. • Target’s phone begins transmitting Framework for Safe & Secure City Interception Systems 3 2 • Target’s phone begins transmitting and DF teams move in to track and locate phone • Multiple DF can be deployed for rapid target location. Covert Handheld & Body-worn DF available
  • 51. Exposes the invisible ReveaLinx Framework for Safe & Secure City Interception Systems Exposes the invisible links hidden in your data
  • 52. What is ReveaLinx • Create nodes and links from source data – “bottom up” Link and Network Analysis Framework for Safe & Secure City Interception Systems – “bottom up” – disparate sources • Visualize – for analyst to interpret and communicate – harness the human mind • Unique analytical methods – Relationships – Patterns – Networks
  • 53. You see data today in the form of records, tables, graphs, reports Ref# Name Address Phone ID# XXX101 BILL JONES 999 WEST 4TH ST 999-666-8888 234-56-7890 Source Data Framework for Safe & Secure City Interception Systems XXX101 BILL JONES 999 WEST 4TH ST 999-666-8888 234-56-7890 YYY202 SAM SMITH 888 OAK STREET 888-999-0000 111-11-1234
  • 54. Nodes Ref# Name Address Phone ID# XXX101 BILL JONES 999 WEST 4TH ST 999-666-8888 234-56-7890 ReveaLinks breaks these records into the smallest relevant elements - “Nodes” Framework for Safe & Secure City Interception Systems XXX101 BILL JONES 999 WEST 4TH ST 999-666-8888 234-56-7890 YYY202 SAM SMITH 888 OAK STREET 888-999-0000 111-11-1234 BILL JONES 999 WEST 4TH ST 999-666-8888 234-56-7890 XXX101
  • 55. Links Ref# Name Address Phone ID# Then shows how these individual elements of data are connected to each other – “Links” Framework for Safe & Secure City Interception Systems Ref# Name Address Phone ID# XXX101 BILL JONES 999 WEST 4TH ST 999-666-8888 234-56-7890 YYY202 SAM SMITH 888 OAK STREET 888-999-0000 111-11-1234 BILL JONES 999 WEST 4TH ST 999-666-8888 234-56-7890 XXX101
  • 56. Relationships Using both nodes and links, complex indirect relationships can be ‘discovered’ in large volumes of data Framework for Safe & Secure City Interception Systems - BILL JONES 999 WEST 4TH ST 999-666-8888 234-56-7890 XXX101 PHIL CLARK 848-090-9904 JOE PAGE 459-89-9986 ROB JONES
  • 57. Nodes Framework for Safe & Secure City Interception Systems
  • 58. Nodes Framework for Safe & Secure City Interception Systems
  • 59. Nodes Framework for Safe & Secure City Interception Systems
  • 60. Nodes Framework for Safe & Secure City Interception Systems
  • 61. Nodes Framework for Safe & Secure City Interception Systems
  • 62. Nodes Framework for Safe & Secure City Interception Systems
  • 63. Attributes Address Node Attributes Dwelling Type: Unit Year built: 1964 Bedrooms: 2 Title: Torrens Total Occupants: 1 Vehicle Node Attributes Make: Mazda Model: Astina Year: 1998 Engine Size: 1800 Framework for Safe & Secure City Interception Systems - Person / Address Link Attributes Years at Address: 5 Status: Owner Joint Ownership: No Other Occupants: No Total Occupants: 1
  • 64. ReveaLinx Architecture DB1 Data Servers Analyst 1 Data Modelling and Analysis Investigation Presentation Case A Framework for Safe & Secure City Interception Systems Develop Applications DB1 DB2 Deploy Applications Direct connection to systems to retrieve data ReveaLinks Analyst 2 Workstation Workstation Workstation Analyst 3Results Delivery Data Files Presenter Presenter Case B Case Delivery
  • 65. TETRA • Radio systems are still the backbone in a modern public safety and security network, because the field operations Framework for Safe & Secure City rely entirely on its functionality and reliability. • TETRA = TErrestrial Trunked RAdio • Mobile Telephony : GSM : : Radio Communication: TETRA
  • 66. TETRA Is Purpose-built Technology For Mission Critical Communication Specialized group communication • one-to-many communication High availability • Redundancy Framework for Safe & Secure City TETRA • Push-to-talk, instant call connection in less than 0.5 sec • Redundancy • Priorities • Direct Mode Operation • Base station fallback Uncompromising security • Authentication • Air interface encryption • End-to-end encryption • Disabling of stolen radios Advanced data services • Status and text messaging • IP packet data • High speed data - TEDS
  • 67. In The Past Agencies Used To Have Their Own Private, Isolated Radio Communication Systems Fire dept.Rescue Framework for Safe & Secure City TETRA Fire dept. Traffic police Crime unit Rescue Public transport ation Power generation & distribution Ambulance
  • 68. TETRA Enables Sharing Of A Common Infrastructure Between All Mission Critical Users Fire Dept. Framework for Safe & Secure City TETRA TETRA Fire Dept. Traffic Police Power Generation & Distribution Ambulance Public Transportation Crime Unit Rescue
  • 69. TETRA enabling services • No technical communication barriers between organizations • Enables efficient co-operation between authorities Framework for Safe & Secure City TETRA • Enables efficient co-operation between authorities especially in large incidents • Seamless communication readiness everywhere, while VPNs retain inter-agency privacy • Connecting independent networks together
  • 70. TETRA enabling services… Enables new data-intensive applications: high quality images multimedia video clips Framework for Safe & Secure City TETRA multimedia video clips access to intra/internet field command systems Sharing a common TETRA infrastructure by all authorities improves inter-agency cooperation in large incidents
  • 71. Components Securing AccessTransmitting Video Capture Video Managing Video Framework for Safe & Secure City Video Surveillance System - Firewall Intrusion Detection Wireless Transmission for Cameras WAN transmission to NOC Capture Video Control Solution View and Store Video Response
  • 72. Video Management Framework for Safe & Secure City Video Surveillance System -
  • 73. Response Management Enables Communications Between Multiple Devices VHF RADIO PSTN Framework for Safe & Secure City Video Surveillance System - IPICS UHF RADIO PTT over Cellular VoIP PTTCell Mgmt. Softwar e IP Phone
  • 74. Secure Access Application Security System Management Policy—Reputation—Identity Protect the core applications from attack Protect the video content from Framework for Safe & Secure City Video Surveillance System - Network Security Endpoint Security Content Security Self-Defending Network: Best of Breed Security in a Systems Approach content from misuse and abuse Ensure no attacks or malfunction in the network Ensure end users cannot abuse the system
  • 75. Features Of Proposed Architecture • Hierarchical Architecture Video endpoints/Police stations and Control rooms • Easily Scalable : Add more video Surveillance points/Police stations and Control rooms Framework for Safe & Secure City Video Surveillance System and Control rooms • Redundancy: In an emergency, control and monitoring can be easily transferred to any other point on the network • Secured IP based Network enables Anywhere, Anytime, Any Device, access • Easy to Manage: Management/Administration and Configuration through Web clients • Third party Integration: Integration of 3rd party Video Analytics, Storage .. etc
  • 76. Next Steps • Determine the Type of Camera’s required at each video Surveillance points • Determine the bandwidth required at each video Surveillance Framework for Safe & Secure City Video Surveillance System • Determine the bandwidth required at each video Surveillance points • Conduct the feasibility study to determine the Type of Connectivity media ( Ethernet/Leased line/Wireless) required between video Surveillance points to Police stations and to Control room and DGP office and work closely with service providers. • Finalize on 3rd party application Integration • Finalize the Architecture
  • 77. Technology Position In Adoption Cycle In Vehicle Display Terminals OCC Systems Offline Vehicle Tracking Fleet Management Solution Online Vehicle Tracking Framework for Safe & Secure City AVLS I Innovators EA Early Adopters EM Pragmatists Early Majority LM Pragmatists Late Majority T Traditionalists I EA EM LM T C h a s m Live Video Streaming OCC Systems Offline Vehicle Tracking Driver Identification System Mobile Application Occupancy Monitoring System Passenger Identification Systems Driver Assistance System In Vehicle Computers Estimated Time of Arrival Systems Navigation Systems
  • 78. GPS Technology Server Geostationary Satellite OverLAN ProtectedbyFirewall&IDS Framework for Safe & Secure City AVLS - Mobile Service Provider Network Mobile Tower GPS/GPRS Module Reports Security Team Over Private APN OverLAN ProtectedbyFirewall&IDS
  • 79. Technology & Benefits Framework for Safe & Secure City AVLS
  • 80. Key Functionalities Locating Closest First Responder On An Incident Report Using Fleetcheck Once an incident information is Framework for Safe & Secure City AVLS - Once an incident information is received at the control room, then can navigate in the map to that report and identify the closest police officer to that location. This can closely integrate with Dial 100 solution aswell.
  • 81. Directing The Officer To The Right Incident Spot When a police officer has to Key Functionalities Framework for Safe & Secure City AVLS When a police officer has to be sent to a particular location, the control room staff can advice on the directions to be taken by the vehicle using the live vehicle movement data on the maps.
  • 82. Key Functionalities Automated Trip Sheet Generation The man power spent on report generation and Framework for Safe & Secure City AVLS report generation and maintenance can be reduced with the help of automated trip sheet generation. Data includes vehicle on nightly basis, with starting location and all the other locations covered by the vehicle.
  • 83. Key Functionalities Efficient Fuel Disbursement Framework for Safe & Secure City Fuel level can be monitored live across vehicles and the usage can be monitored and controlled efficiently.
  • 84. Key Functionalities Feature to provide vehicle service alerts at every programmed km interval Framework for Safe & Secure City AVLS programmed km interval The vehicle maintenance schedules can be fed to the system to generate alerts at periodic intervals.
  • 85. Key Functionalities Creating Active Geofences To Track Critical Vehicle Movement If a particular police vehicle is Framework for Safe & Secure City AVLS If a particular police vehicle is on a predetermined trip such as moving prisoners, etc, a virtual fence may be created which can be used to detect any violations to the prescribed route.
  • 86. Key Functionalities Capability To Track All Idling Locations, Idling Durations Framework for Safe & Secure City AVLS All the locations where the vehicle was stopped including for traffic lights will be tracked and will be available in the control room.
  • 87. Key Functionalities Ability To Look At The Path Traveled By The Vehicle For Any Given Timeframe Framework for Safe & Secure City AVLS Any Given Timeframe From one location, i.e. the control room, the tracking members can identify the trace of route or path taken by the vehicle in any given timeframe. The coverage of the patrol to various points can be tracked using the system.
  • 88. GPS Enabled Departments GPS Enabled Departments Bangalore police had adopted GPS for about 750 four wheelers which is monitored from central Framework for Safe & Secure City AVLS four wheelers which is monitored from central command and control center. Now the Bangalore police is expanding to two wheeler tracking as well. Delhi police had adopted GPS technology for about 640 two and four wheelers, which are monitored and operated from central command and control center.
  • 89. • Live tracking of the first responder vehicles • State of the art control room for monitoring the operations • Dial 100, emergency call handling system Key Functionalities AVLS Framework for Safe & Secure City • Dial 100, emergency call handling system • Officer & Team identification and coordination • Estimated time of arrival to the destination • Alert and Communicate with the officers on the move • Log of exact activity by individual officers. • Control over unauthorized and unscheduled stoppages. • Faster response time by better coordination with traffic department
  • 90. Live View Screenshot Framework for Safe & Secure City AVLS
  • 92. Geo-Spatial Technology DHS Mission Statement According to the National Strategy for Homeland Security and DHS’S mission statement, homeland security covers prevention, protection, response, and recovery.recovery. Geospatial products and intelligence play a key role in departments’ preparation for disasters and its response to them and support incident management
  • 93. Sun Synchronous Imaging Satellites RRRR EEEE QQQQ UUUU IIII RRRR EEEE MMMM EEEE Spectral Bands EEEE TTTT SSSS Swath Ortho Pan
  • 95. Geo-Spatial Technology Geospatial Information Stages Geo Techno- Specialty Core Ideas Techno- logies Data Specialty Fields
  • 96. Geospatial Technology Some applications in Homeland Security Geospatial Technology provides enhanced geospatial understanding of a facilities vulnerabilities and speed up detection and response time in the event of a security breach Rapid access to extensive data, displayed in a geospatial medium helps protect critical assets and infrastructure and ensures public safety
  • 97. Geo-Spatial Technology DHS Spatial Data Infrastructure DHS Spatial Data Infrastructure (SDI),a subset of Enterprise Architecture, consists of geographic system software and hardware, geospatial applications, data, standards, policies,hardware, geospatial applications, data, standards, policies, programs, and the human resources necessary to acquire, process, analyze, store, maintain, distribute, and otherwise use geospatial data as a strategic asset for the DHS and the nation
  • 98. Geo-Spatial Technology Geospatial Preparedness The Final Destination Means the level of overall capability and capacity necessary to enable all levels of the Dept to use geospatial data, geographic information systems software and hardware, and geospatial applications to perform essential functions such as prevention,applications to perform essential functions such as prevention, detection, planning, mitigation, response, and recovery in order to minimize loss of life and property from weapons of mass destruction, terrorist threats, major threats, major man made accidents, and natural disasters
  • 99. Mechatronics and Homeland Security Conclusion Mechatronics has the capability to design and deliver products which can radically change our quality of response in the war against terror. Thequality of response in the war against terror. The missing like is the lack of interconnect between the two at the R & D level. An integrated and all inclusive technology strategy is the answer.
  • 100. Mechatronics and Homeland Security Conclusion A State of Art Center for Homeland Security is the answer!
  • 101. We owe it to every INDIAN
  • 102. You guys have been good to me Thank You