Center for Computational Homeland Security

Size: px
Start display at page:

Download "Center for Computational Homeland Security"

Transcription

1 Center for Computational Homeland Security Alok Chaturvedi, Director Purdue Homeland Security Institute Krannert School of Management

2 PHSI s Evolving Structure Bindley Bioscience BDM Entrepreneurship Learning Center Birck Nanotechnology Purdue Homeland Security Institute E-Enterprise Center for Forensic Science & Technology Center for Computational Homeland Security Center for Complex System Simulation Center for Sensing Science & Technology Center for Modeling Terrorist Financing Center for Strategic Study of Causes of terrorism

3 Joint Funding National Science Foundation (Computational Experimentation) New Science New knowledge in real world context Processes, procedures, and methodologies Computational Experimentation tools and techniques Epidemiological & Intervention modeling Fail safe grid computing Department of Defense (JPEOCBD and Crane) Real World Application Early Access to new knowledge Tactics, techniques, & procedures Validation & Verification of science Reality check Concept testing Commercialization and Mass Dissemination 21 st Century Fund: Homeland Security Technology Commercialization Training real policy makers and responders Build community/dod relationship Purdue/IU/IU School of Medicine

4 Post Harvest Food Supply-Chain Security Simulation

5 The Simulation Supply Chain Security Simulation Multi-Layered Multi-Tiered Network Model Modeling Inventory Control Perishable v/s Non-Perishable Goods Propagation of Inventory Consumer and Supplier Supply and Demand

6 The Synthetic Environment National Surveillance (i.e. Food Net) Traceback and Tracking Identification Communication Network (database, wireless) Transport Transport Transport Restaurant Farm Grains Animals Plants Transport Storage Processing Distributing Center Retail Food Flow Systems Model - Computational Decision Making Consumer Economi c Impacts? Real World Public Health Impacts? Source (Pre-harvest) Transport (Post-harvest) Storage Processing Retail & Consumption : Biological Hazard : Chemical Hazard : Radiological Hazard Detection: Response: Recovery: Prevention: Detection: Response: Recovery: Prevention: Detection: Response: Recovery: Prevention: Detection: Response: Recovery: Prevention: Detection: Response: Recovery: Prevention: : Mitigation : Investigation : Corrective action : Recall : Communication : Decontamination : Education : Risk Analysis : Good Business Practices Purdue Homeland Security Institute

7 The Inputs Products Dairy, Meat, Grains, Fruits Infrastructure Bulk, Processing, Distribution, Retail, Consumers Inventory Control Protocols Shelf Life, Inventory Size, JIT Inventory Supply and Demand of Consumers Fluctuations in consumption, Influence of media Supply and Demand of Suppliers Consumer Demand, Cost of Warehousing Economic Aspects of Supply Chain Production, Transportation, Warehousing, Quality Maintenance

8 The Process SEAS Propagation Model Agent-based, scalable Model Supply-Chain Supply and Demand Product Life Track Lots and packages Inventory transfer Cost

9 The Real-Time Visualization Visualize Supply-Chain Flow paths Flow rates Cost Critical Infrastructures Control Inventory Production Emergency Responses

10 The Scenario Chemical and Biological Terrorist Attacks Terror attacks can be caused by Bombs, Sabotages, Contaminations Preventive Actions Quality control, Inventory management Response Actions Test, recall, de-contaminate, control

11 The Result We get out of the simulation Emergency Preparedness Emergency Response Analysis of options and actions Effective communication procedures Identify weak spots in the infrastructure Questions like Authority to make decisions? Responsibility to prevent, respond?

12 Thank You SEAS Lab Krannert School of Management Purdue University Alok Chaturvedi