1 / 12

Bridge Infrastructure Management (BIM): Safety and Security

CANARIE's Network-Enabled Platforms Workshop: "Convergence of Cyber-Infrastructure and the Next-Generation Internet“ June 26-27, 2007 - Ottawa, Ontario. Bridge Infrastructure Management (BIM): Safety and Security. David T. Lau, Carleton University Shikharesh Majumdar, Carleton University

naeva
Télécharger la présentation

Bridge Infrastructure Management (BIM): Safety and Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CANARIE's Network-Enabled Platforms Workshop:"Convergence of Cyber-Infrastructure and the Next-Generation Internet“ June 26-27, 2007 - Ottawa, Ontario Bridge Infrastructure Management (BIM): Safety and Security David T. Lau, Carleton University Shikharesh Majumdar, Carleton University Biswajit Nandy, Solana Networks

  2. Introduction • Safety and Security • Bridge collapse causes catastrophic loss • Montreal Bridge collapse is one of many examples • Renewal of aging bridge and other public infrastructures -- $100B in Canada alone • Management of Bridge Infrastructure can save life and reduce maintenance cost • Remote monitoring and management of bridges can be facilitated by the power of Cyber- infrastructure Montreal Bridge Collapse, October 2006 Source: CBC • Monitored data can be of various types: sensor data, video data, acoustic, visual inspection etc. • Monitoring of large number of bridges, manage and making information available at finger tips, automated health & condition assessments and management, maintenance and emergency response are various facets of this problem. Confidential Information

  3. Structural Health Monitoring of Plaza Bridge David T. Lau Dept of Civil and Environmental EngCarleton University Confidential Information

  4. Confidential Information

  5. Intelligent Infrastructure 1. Data Acquisition 6. 1. 2. Data Processing 3. Data Mining,GIS 5. 4. Knowledge Base 2. 5. Decision Support 3. 6. Alert System 4. Confidential Information

  6. Vision • Safety and Security • Critical Infrastructure and Asset management • Emergency preparedness and response • Information, Integration, Internet, Innovation • Foundation of Virtual Organization of BIM • BIM utilizes Cyber-infrastructure (Advanced networks and web technology) for: • Collection of information • Amalgamation and assimilation of information • Processing and interpretation of Information • Dissemination of information • Providing decision support on management and emergency response • Real-time • Geographically distributed information and resources Confidential Information

  7. BIM VO Partners • Stakeholder • PWGSC • S. Foo • Infrastructure owner and end-user of information, Stakeholder of safety and security, Custodian of public asset • Knowledge Providers: • Carleton, Civil Engineering • D. Lau • Engineering information extraction – vibration, corrosion, Data visualization, Data management, Instrumentation and sensor array • Calgary, Civil Engineering • T. Brown • Engineering information extraction – ice load, Data base development • Taiwan • K. C. Chang • Data mining and simulation tools • Europe: • H. Wenzel • Decision support and management tools • Middleware Developers • Solana Networks • B. Nandy • Web services based platform development and integration with network (e.g., UCLP), deployment • Carleton, Systems & Computer Engineering • S. Majumdar • On demand resource allocation and management • VO Manager Confidential Information

  8. Policy • VO Management policy • Resource Commitments from VO partners: Processing, Storage, Communication, Expertise • Risk mitigation plan • Security policy • Information sharing • Execution Plan • Functional requirements • Specification of application and middleware • High-level design • Development • Integration • Deployment • Maintenance Confidential Information

  9. Resources • Various types of resources: sensor, computing, storage, communication and human • Sensors (data source) • Monitoring bridge characteristics • Computing • Data compression before transmission • Analyzing data for engineering inspection or processing data for real time visualization • Storage • Storing data for analyzing long term trends • Classification and management of data for effective data discovery and retrieval • Caching for improved performance • Replication of data for load balancing and increased reliability • Communication • Components: e.g. lightpath, Routed paths or VLAN • Human • Personnel with expertise in various domains Confidential Information

  10. Resource Management Middleware • Resources: • Dedicated • Allocated on demand • Need resource management middleware to coordinate, direct and allocate resources for effective operation and problem solving. • Will allow seamless communication among resources • Matchmaking: which resources to use for satisfying a request • Scheduling: online sequencing of requests for same resource Resource Management Middleware Processors Secondary Repositories Primary Storage Ottawa Taiwan Europe Human Calgary Communication Infrastructure Confidential Information

  11. CANARIE Funding • Development of platform middleware and integration with network • Development of distributed resource allocation and management middleware • Development of application middleware • Data visualization of distributed data sources • Data visualization of distributed hybrid data • Integration of application services • Tele-operation of sensors • Equipment for Cyber-infrastructure • Development of VO management tools • Operation and maintenance of VO Confidential Information

  12. Conclusions • Development of Bridge Infrastructure Management will facilitate • Safety and security • Emergency preparedness and response • Preventive maintenance and cost savings • Leadership in innovative use of advanced networks in infrastructure management applications • Assembled a strong Team • A team of experts with domain knowledge and track record of Bridge monitoring research and practices • Experts on resource allocation and management • A company with extensive development expertise in Web Technology and Networking. Confidential Information

More Related