{"title":"A study on the category of criminal signs","authors":"C.-h. Lin, Li-Hsing Chen, C. Kou","doi":"10.1109/CCST.1992.253765","DOIUrl":"https://doi.org/10.1109/CCST.1992.253765","url":null,"abstract":"The concept of a criminal sign means a sign of suspicion with a concrete basis related to the particular individual. An attempt is made to collect possible crime signs through the police officer's perception and to categorize them. The procedures of this study include: collecting possible criminal signs through police officers' reports and the design of a questionnaire: collecting data on the perception of criminal signs; selecting the important criminal signs of which the averages are above a certain score; and grouping the important criminal signs which have been selected into several categories by factor analysis.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132688540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Thermal detection contrast of human targets","authors":"H.D. Arlowe","doi":"10.1109/CCST.1992.253751","DOIUrl":"https://doi.org/10.1109/CCST.1992.253751","url":null,"abstract":"Work on automatic detection systems based on the thermal contrast and motion of human intruders has shown that detection is sometimes difficult, depending on solar and other environmental conditions. The conditions and energy transfer mechanisms that lead to difficult thermal detection are discussed. The infrared search and track concept is described. Detection limitations due to noise and poor contrast, and detection as a function of background are discussed. The advantages of high resolution detection systems are considered. The heat flux balance equation can be used in an iterative computer program to predict the surface temperatures of both the background and the target. The main problem with this approach is that the results are only as good as the quality and the detail of the model. Since the difference between successful detection of a target and no detection is only 1 or 2 degrees C, small errors in the input information can easily result in incorrect conclusions. The big advantage is that doing heat flux balance calculations gives the researcher a good idea which terms are the most important for a given situation.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114670879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spread spectrum digital signal synchronization using neural networks","authors":"P. de Bruyne, O. Kjelsen, O. Sacroug","doi":"10.1109/CCST.1992.253729","DOIUrl":"https://doi.org/10.1109/CCST.1992.253729","url":null,"abstract":"The authors investigate whether an artificial neural network (ANN) can be trained to estimate the phase of the signal carrier frequency and acquire the timing of the spreading code sequence, only from samples of the received signal. They present an overview of the current work, the results obtained, and the future developments expected in this area. Very secure digital radio communication can be obtained. The frequency diversity inherent in the large bandwidth virtually eliminates the effect of drop-out due to multipath signal cancellation. A two or three-layer perceptron artificial neural network was used for synchronizing both the phase of the carrier frequency and the spreading code sequence. The network was trained with random samples of the code where the known phase was used to correct the network parameters. It was shown that the network could be trained to recognize the phase of a test sample after training with about 10000 presentations of the code. Results are given showing the performance of the system when presented with random samples of noisy signals.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117263916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forensic uses of infrared video","authors":"R. Riedel, J. Coffin, F.J. Prokoski","doi":"10.1109/CCST.1992.253766","DOIUrl":"https://doi.org/10.1109/CCST.1992.253766","url":null,"abstract":"A comprehensive investigation of the commercial applicability of infrared technology has been conducted. While the main focus of these efforts has been evaluation of technology applicable to an infrared facial identification system, the availability of imaging and image processing equipment has made it possible to assess the use of infrared systems and analytical techniques for other applications. The investigation has included collection and analysis of indoor and outdoor infrared imagery for potential use in scene surveillance, target identification, vehicle identification and tracking, and structural inspection. In addition, studies of medical and quality control applications of infrared imagery have been conducted. As a result of these efforts several potential uses of infrared imagery in criminal investigations have been identified, including crime scene investigation, surveillance, vehicle identification, and pursuit of suspects.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124953063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synergistic radar: a new approach to intrusion detection","authors":"K. Harman, A. Gagnon","doi":"10.1109/CCST.1992.253747","DOIUrl":"https://doi.org/10.1109/CCST.1992.253747","url":null,"abstract":"The authors introduce a new electromagnetic sensor technology called synergistic radar as it is utilized in the RadioGuard intrusion detection product. This passive line sensor detects disturbances to commercial FM radio signals caused by an intruder moving in proximity to an open transmission line relative to the same radio signal received on a central reference antenna. The product utilizes a totally new type open transmission line and associated signal processing technique so as to determine the location of the intruder along the sensor line and to permit the use of exactly the same cable structure along the entire cable length. This new open transmission line was designed to be used buried beneath a surface, laying on a surface or suspended in air. By simultaneously processing signals from two or more FM stations the RadioGuard product provides redundancy in case of station failure as well as improved performance due to frequency diversity. The general principles of synergistic radar, the design of the open transmission line, and the specific signal processing techniques used in RadioGuard are described. The performance of this new sensor in various applications is compared to that of competing products.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129248549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Technology developments in the RF tracking and locating of personnel and objects","authors":"G. Loubert","doi":"10.1109/CCST.1992.253732","DOIUrl":"https://doi.org/10.1109/CCST.1992.253732","url":null,"abstract":"There are many applications of RF tracking for security, based on the concept of detecting a unique RF transmitter by a receiver covering a given area, where each application has its own unique range of performance requirements. The goal in the WatchMate research program was to develop a base technology that can address many of these requirements while also addressing many of the technical problems associated with each application. Described is a unique microprocessor controlled miniature transmitter that produces programmable coded pulsed transmissions and utilizes antenna diversity techniques, all in a small wrist-watch-sized package that is hermetically sealed with a two year battery life. There are provisions for custom push-button response and a unique tamper-proof means of attachment. The author describes specific monitoring requirements and the associated problems and discusses both receive antenna diversity and phased approaches.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125508351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless spread spectrum sensor element signaling","authors":"H. B. Sanderford","doi":"10.1109/CCST.1992.253745","DOIUrl":"https://doi.org/10.1109/CCST.1992.253745","url":null,"abstract":"As a result of high installation costs and the desire to optimally place sensor elements without the limitation of wire access, there is a growing need for a reliable, low-cost wireless signaling method. It is now possible to make a 1/10 W spread-spectrum, 912 MHz carrier transmitter. This discussion is limited to the FCC's Part 15 treatment of spread spectrum. Spread-spectrum reliability, jamming performance range, and FCC regulations are discussed. Also, approaches and trade-offs concerning data collisions, fading, and battery life are highlighted.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132457716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Spesivtsev, A.J. Krutjakov, V. Seregin, V. Sidorov, V. Wegner
{"title":"Krypton-Crypto-based access control system","authors":"A. Spesivtsev, A.J. Krutjakov, V. Seregin, V. Sidorov, V. Wegner","doi":"10.1109/CCST.1992.253740","DOIUrl":"https://doi.org/10.1109/CCST.1992.253740","url":null,"abstract":"The authors describe a cryptography-based access control system for the IBM PC. The system implements the following functions: access control on PC boot time; transparent data ciphering on hard and floppy disks; access control on logical drives on hard disks (read-and-write access, read-only access, and inhibit access); and file and data block ciphering. The hardware and software are discussed. Short descriptions of the structure, the base function, and principles of implementation are given.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124073468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of individuals by means of facial thermography","authors":"F.J. Prokoski, R. Riedel, J. Coffin","doi":"10.1109/CCST.1992.253768","DOIUrl":"https://doi.org/10.1109/CCST.1992.253768","url":null,"abstract":"It was demonstrated that facial thermograms are unique to the individual, and methods and systems for positive identification were developed. This capability is inherently more accurate and more robust over varying lighting and environment conditions than is the use of video images. The technology involves the use of biosensor data for uniquely and automatically identifying individuals. Due to the connectedness of the physiological systems of the human body, elemental shapes can in general be derived from any biological sensor data which can be presented as an image. The elemental shapes and their locations provide an identification capability. Biosensors which produce very detailed localised data, such as high-resolution infrared imagers, can result in unique identification of an individual from the determination of elemental shapes and their distribution. The market for such devices and services includes all facilities which seek to restrict access to physical areas, distribution systems or information files. Some of the most immediate potential applications for positive identification systems are listed.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125297765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel application of pyrolysis-gas chromatography to the differentiation of photocopiers","authors":"W.-T. Chang, C.-W. Huang, Y. Giang","doi":"10.1109/CCST.1992.253767","DOIUrl":"https://doi.org/10.1109/CCST.1992.253767","url":null,"abstract":"A Curie point pyrolyser, a dual wide-bore capillary column gas chromatograph equipped with dual FIDs, and a personal computer were connected online. The differentiation of photocopier toners was based both on the comparison of retention indices and on conventional pattern recognition. A data library is also being compiled with most of the standard samples available in Taiwan. The results demonstrated that the technique was useful for the differentiation of photocopying toners and that the computer-assisted library search based on the comparison of retention indices was a powerful approach to locating suspect photocopying machines.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126314770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}