Design of an Emergency Prediction and Prevention Platform for Societal Security Decision Support Using Neural Networks

  • Zeng-Guang Hou
  • Min Tan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3917)


Disasters, either naturally-occurring or man-made, frequently occur. For example, the recent chemical plant explosion on Nov. 13, 2005 at the Jilin Petrochemical Company caused a major environmental catastrophe in the water system of Songhua River. The explosion produced about 100 tonne of toxic chemicals, including benzene, spilled into the Songhua River and created an 80 km slick. The river contamination forced the shutdown of water supply in Harbin, a city located downstream with 3.8 million residents. The water pollution also brought problems to cities in China and Russia further downstream. Shortly afterwards, on Dec. 17, 2005, the City Central Hospital in Liaoyuan, Jilin Province, caught fire and left 39 people dead. In 2005, several serious coal mine disasters happened in China, which caused great losses in both life and economic assets. The lack of work safety and poor management has led to the high frequency of such coal mine accidents in recent years in China. In addition to the above disasters, there are other emergencies such as the Severe Acute Respiratory Syndrome (SARS), mad-cow disease and bird flu that caused world-wide attention and resulted in huge economic losses. Societal security has been a very important topic for civilians, governments, officials, and researchers as well.


Severe Acute Respiratory Syndrome Homeland Security Severe Acute Respiratory Syndrome Neural Network Method Huge Economic Loss 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Konar, A.: Computational Intelligence: Principles, Techniques and Applications. Springer, Berlin Heidelberg (2005)CrossRefMATHGoogle Scholar
  2. 2.
    Kantor, P.B., et al.: Intelligence and Security Informatics. LNCS. Springer, New York (2005)CrossRefGoogle Scholar
  3. 3.
    Chen, H., Wang, F.Y.: Artificial Intelligence for Homeland Security. IEEE Intelligent Systems, 12–16 (2005)Google Scholar
  4. 4.
    Yao, Y.Y., Wang, F.Y., Wang, J., Zeng, D.: Rule + Exception Strategies for Security Information Analysis. IEEE Intelligent Systems, 52–57 (2005)Google Scholar
  5. 5.
    Chen, H., Wang, F.Y., Zeng, D.: Intelligence and Security informatics for Homeland Security: Information, Communication and Transportation. IEEE Trans. Intelligent Transportation Systems, 329–341 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Zeng-Guang Hou
    • 1
  • Min Tan
    • 1
  1. 1.The Chinese Academy of SciencesKey Laboratory of Complex Systems and Intelligence ScienceBeijingP.R. China

Personalised recommendations