Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures最新文献

筛选
英文 中文
A study on the category of criminal signs 犯罪标志的范畴研究
C.-h. Lin, Li-Hsing Chen, C. Kou
{"title":"A study on the category of criminal signs","authors":"C.-h. Lin, Li-Hsing Chen, C. Kou","doi":"10.1109/CCST.1992.253765","DOIUrl":"https://doi.org/10.1109/CCST.1992.253765","url":null,"abstract":"The concept of a criminal sign means a sign of suspicion with a concrete basis related to the particular individual. An attempt is made to collect possible crime signs through the police officer's perception and to categorize them. The procedures of this study include: collecting possible criminal signs through police officers' reports and the design of a questionnaire: collecting data on the perception of criminal signs; selecting the important criminal signs of which the averages are above a certain score; and grouping the important criminal signs which have been selected into several categories by factor analysis.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132688540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Thermal detection contrast of human targets 人体目标的热探测对比
H.D. Arlowe
{"title":"Thermal detection contrast of human targets","authors":"H.D. Arlowe","doi":"10.1109/CCST.1992.253751","DOIUrl":"https://doi.org/10.1109/CCST.1992.253751","url":null,"abstract":"Work on automatic detection systems based on the thermal contrast and motion of human intruders has shown that detection is sometimes difficult, depending on solar and other environmental conditions. The conditions and energy transfer mechanisms that lead to difficult thermal detection are discussed. The infrared search and track concept is described. Detection limitations due to noise and poor contrast, and detection as a function of background are discussed. The advantages of high resolution detection systems are considered. The heat flux balance equation can be used in an iterative computer program to predict the surface temperatures of both the background and the target. The main problem with this approach is that the results are only as good as the quality and the detail of the model. Since the difference between successful detection of a target and no detection is only 1 or 2 degrees C, small errors in the input information can easily result in incorrect conclusions. The big advantage is that doing heat flux balance calculations gives the researcher a good idea which terms are the most important for a given situation.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114670879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Spread spectrum digital signal synchronization using neural networks 利用神经网络实现扩频数字信号同步
P. de Bruyne, O. Kjelsen, O. Sacroug
{"title":"Spread spectrum digital signal synchronization using neural networks","authors":"P. de Bruyne, O. Kjelsen, O. Sacroug","doi":"10.1109/CCST.1992.253729","DOIUrl":"https://doi.org/10.1109/CCST.1992.253729","url":null,"abstract":"The authors investigate whether an artificial neural network (ANN) can be trained to estimate the phase of the signal carrier frequency and acquire the timing of the spreading code sequence, only from samples of the received signal. They present an overview of the current work, the results obtained, and the future developments expected in this area. Very secure digital radio communication can be obtained. The frequency diversity inherent in the large bandwidth virtually eliminates the effect of drop-out due to multipath signal cancellation. A two or three-layer perceptron artificial neural network was used for synchronizing both the phase of the carrier frequency and the spreading code sequence. The network was trained with random samples of the code where the known phase was used to correct the network parameters. It was shown that the network could be trained to recognize the phase of a test sample after training with about 10000 presentations of the code. Results are given showing the performance of the system when presented with random samples of noisy signals.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117263916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Forensic uses of infrared video 红外视频的法医用途
R. Riedel, J. Coffin, F.J. Prokoski
{"title":"Forensic uses of infrared video","authors":"R. Riedel, J. Coffin, F.J. Prokoski","doi":"10.1109/CCST.1992.253766","DOIUrl":"https://doi.org/10.1109/CCST.1992.253766","url":null,"abstract":"A comprehensive investigation of the commercial applicability of infrared technology has been conducted. While the main focus of these efforts has been evaluation of technology applicable to an infrared facial identification system, the availability of imaging and image processing equipment has made it possible to assess the use of infrared systems and analytical techniques for other applications. The investigation has included collection and analysis of indoor and outdoor infrared imagery for potential use in scene surveillance, target identification, vehicle identification and tracking, and structural inspection. In addition, studies of medical and quality control applications of infrared imagery have been conducted. As a result of these efforts several potential uses of infrared imagery in criminal investigations have been identified, including crime scene investigation, surveillance, vehicle identification, and pursuit of suspects.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124953063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Synergistic radar: a new approach to intrusion detection 协同雷达:一种新的入侵检测方法
K. Harman, A. Gagnon
{"title":"Synergistic radar: a new approach to intrusion detection","authors":"K. Harman, A. Gagnon","doi":"10.1109/CCST.1992.253747","DOIUrl":"https://doi.org/10.1109/CCST.1992.253747","url":null,"abstract":"The authors introduce a new electromagnetic sensor technology called synergistic radar as it is utilized in the RadioGuard intrusion detection product. This passive line sensor detects disturbances to commercial FM radio signals caused by an intruder moving in proximity to an open transmission line relative to the same radio signal received on a central reference antenna. The product utilizes a totally new type open transmission line and associated signal processing technique so as to determine the location of the intruder along the sensor line and to permit the use of exactly the same cable structure along the entire cable length. This new open transmission line was designed to be used buried beneath a surface, laying on a surface or suspended in air. By simultaneously processing signals from two or more FM stations the RadioGuard product provides redundancy in case of station failure as well as improved performance due to frequency diversity. The general principles of synergistic radar, the design of the open transmission line, and the specific signal processing techniques used in RadioGuard are described. The performance of this new sensor in various applications is compared to that of competing products.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129248549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Technology developments in the RF tracking and locating of personnel and objects 射频跟踪和定位人员和物体的技术发展
G. Loubert
{"title":"Technology developments in the RF tracking and locating of personnel and objects","authors":"G. Loubert","doi":"10.1109/CCST.1992.253732","DOIUrl":"https://doi.org/10.1109/CCST.1992.253732","url":null,"abstract":"There are many applications of RF tracking for security, based on the concept of detecting a unique RF transmitter by a receiver covering a given area, where each application has its own unique range of performance requirements. The goal in the WatchMate research program was to develop a base technology that can address many of these requirements while also addressing many of the technical problems associated with each application. Described is a unique microprocessor controlled miniature transmitter that produces programmable coded pulsed transmissions and utilizes antenna diversity techniques, all in a small wrist-watch-sized package that is hermetically sealed with a two year battery life. There are provisions for custom push-button response and a unique tamper-proof means of attachment. The author describes specific monitoring requirements and the associated problems and discusses both receive antenna diversity and phased approaches.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125508351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Wireless spread spectrum sensor element signaling 无线扩频传感器元件信号
H. B. Sanderford
{"title":"Wireless spread spectrum sensor element signaling","authors":"H. B. Sanderford","doi":"10.1109/CCST.1992.253745","DOIUrl":"https://doi.org/10.1109/CCST.1992.253745","url":null,"abstract":"As a result of high installation costs and the desire to optimally place sensor elements without the limitation of wire access, there is a growing need for a reliable, low-cost wireless signaling method. It is now possible to make a 1/10 W spread-spectrum, 912 MHz carrier transmitter. This discussion is limited to the FCC's Part 15 treatment of spread spectrum. Spread-spectrum reliability, jamming performance range, and FCC regulations are discussed. Also, approaches and trade-offs concerning data collisions, fading, and battery life are highlighted.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132457716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Krypton-Crypto-based access control system 氪-密码访问控制系统
A. Spesivtsev, A.J. Krutjakov, V. Seregin, V. Sidorov, V. Wegner
{"title":"Krypton-Crypto-based access control system","authors":"A. Spesivtsev, A.J. Krutjakov, V. Seregin, V. Sidorov, V. Wegner","doi":"10.1109/CCST.1992.253740","DOIUrl":"https://doi.org/10.1109/CCST.1992.253740","url":null,"abstract":"The authors describe a cryptography-based access control system for the IBM PC. The system implements the following functions: access control on PC boot time; transparent data ciphering on hard and floppy disks; access control on logical drives on hard disks (read-and-write access, read-only access, and inhibit access); and file and data block ciphering. The hardware and software are discussed. Short descriptions of the structure, the base function, and principles of implementation are given.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124073468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identification of individuals by means of facial thermography 通过面部热成像识别个体
F.J. Prokoski, R. Riedel, J. Coffin
{"title":"Identification of individuals by means of facial thermography","authors":"F.J. Prokoski, R. Riedel, J. Coffin","doi":"10.1109/CCST.1992.253768","DOIUrl":"https://doi.org/10.1109/CCST.1992.253768","url":null,"abstract":"It was demonstrated that facial thermograms are unique to the individual, and methods and systems for positive identification were developed. This capability is inherently more accurate and more robust over varying lighting and environment conditions than is the use of video images. The technology involves the use of biosensor data for uniquely and automatically identifying individuals. Due to the connectedness of the physiological systems of the human body, elemental shapes can in general be derived from any biological sensor data which can be presented as an image. The elemental shapes and their locations provide an identification capability. Biosensors which produce very detailed localised data, such as high-resolution infrared imagers, can result in unique identification of an individual from the determination of elemental shapes and their distribution. The market for such devices and services includes all facilities which seek to restrict access to physical areas, distribution systems or information files. Some of the most immediate potential applications for positive identification systems are listed.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125297765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
A novel application of pyrolysis-gas chromatography to the differentiation of photocopiers 热解-气相色谱在复印机鉴别中的新应用
W.-T. Chang, C.-W. Huang, Y. Giang
{"title":"A novel application of pyrolysis-gas chromatography to the differentiation of photocopiers","authors":"W.-T. Chang, C.-W. Huang, Y. Giang","doi":"10.1109/CCST.1992.253767","DOIUrl":"https://doi.org/10.1109/CCST.1992.253767","url":null,"abstract":"A Curie point pyrolyser, a dual wide-bore capillary column gas chromatograph equipped with dual FIDs, and a personal computer were connected online. The differentiation of photocopier toners was based both on the comparison of retention indices and on conventional pattern recognition. A data library is also being compiled with most of the standard samples available in Taiwan. The results demonstrated that the technique was useful for the differentiation of photocopying toners and that the computer-assisted library search based on the comparison of retention indices was a powerful approach to locating suspect photocopying machines.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126314770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信