{"title":"New solutions to perimeter protection and point access control","authors":"L. Bennett","doi":"10.1109/CCST.1992.253753","DOIUrl":null,"url":null,"abstract":"The author discusses new technologies available to detect approaches to a protected perimeter, intelligent systems for combining information from different detection systems to reduce false alarms by coincidence monitoring, and the use of biometrics and database systems to improve the speed and quality of access point systems. Experimental and trial data are presented to assess the cost benefits of new approaches. These data are related to the opportunities for improved total system performance and integrity.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1992.253753","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The author discusses new technologies available to detect approaches to a protected perimeter, intelligent systems for combining information from different detection systems to reduce false alarms by coincidence monitoring, and the use of biometrics and database systems to improve the speed and quality of access point systems. Experimental and trial data are presented to assess the cost benefits of new approaches. These data are related to the opportunities for improved total system performance and integrity.<>