Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures最新文献

筛选
英文 中文
Radar as part of a netted surveillance system-a problem revisited 雷达作为网络监视系统的一部分——这个问题被重新审视
F. R. Williamson, R. Brooks, E. Greneker, N. Currie, J. Williamson, M. McGee
{"title":"Radar as part of a netted surveillance system-a problem revisited","authors":"F. R. Williamson, R. Brooks, E. Greneker, N. Currie, J. Williamson, M. McGee","doi":"10.1109/CCST.1992.253748","DOIUrl":"https://doi.org/10.1109/CCST.1992.253748","url":null,"abstract":"The authors discuss the use of radar as a security surveillance sensor and present methods for integrating this sensor technology into netted sensor systems. The capabilities and limitations of radar sensors are discussed, and several surveillance scenarios are presented. A general architecture for netting multiple radar sensors together and for netting radar sensors with more conventional surveillance units is discussed. These netting concepts are useful for large or small systems in both military and industrial applications. Radar system configurations for fixed base security applications are described. Signal processing algorithms that appear practical with the increased performance of today's computer technology are presented.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123968729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An object-oriented security model for office environments 面向对象的办公环境安全模型
S. Castano, P. Samarati
{"title":"An object-oriented security model for office environments","authors":"S. Castano, P. Samarati","doi":"10.1109/CCST.1992.253744","DOIUrl":"https://doi.org/10.1109/CCST.1992.253744","url":null,"abstract":"The authors present a security system for the protection of documents in an office information system. The system takes into consideration aspects of both dynamic changing of user activities and document sharing. The model the system is built on is based on the definition of role as a set of actions and responsibilities associated with a particular working activity. Access authorizations are specified according to roles. The role played by a user at a specific time identifies the working environment of the user and hence the operations that he/she can execute on documents. In modeling roles and documents the graph formalism and the inheritance mechanism are used. The use of an object-oriented programming language in the system realization allows an easy representation of the characteristics of the model.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"491 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115883711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Sensitivity enhancement in interferometric fiber sensors by using the optical Kerr effect 利用光学克尔效应增强干涉型光纤传感器的灵敏度
C. Hsia
{"title":"Sensitivity enhancement in interferometric fiber sensors by using the optical Kerr effect","authors":"C. Hsia","doi":"10.1109/CCST.1992.253750","DOIUrl":"https://doi.org/10.1109/CCST.1992.253750","url":null,"abstract":"Sensitivity enhancement in fiber interferometric sensors was achieved by connecting a balanced nonlinear Mach-Zehnder fiber interferometer to the sensing interferometer. Taking advantage of the phase-sensitive nature of this nonlinear interferometer, the improvement of the sensitivity for each output of the interferometer was found to be proportional to the nonlinear phase shift due to the optical Kerr effect, induced by the total power in the fiber. Since high power is needed to induce a large nonlinear phase shift, it is assumed that a high peak-power pulse train is used, with a pulse repetition rate greater than the minimum sampling frequency. This is required by the Nyquist criterion for the reconstruction of the sensed signal. The theory is also extended to remote fiber sensing systems.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129129974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CLASP: a computerised aid to cost effective perimeter security CLASP:一种具有成本效益的外围安全计算机辅助工具
C. Tarr
{"title":"CLASP: a computerised aid to cost effective perimeter security","authors":"C. Tarr","doi":"10.1109/CCST.1992.253741","DOIUrl":"https://doi.org/10.1109/CCST.1992.253741","url":null,"abstract":"The problem of providing cost-effective perimeter security for prisons was addressed by the development of a mathematical model to evaluate a set of performance measures. This model was designed to evaluate perimeter security, starting from the assumption that an escaped person has reached the perimeter, and calculating the chances of preventing a subsequent escape. The author describes the evolution from the initial formulation of a model, to an operational computer software package the current version of which is known as CLASP (computerized layout analysis for secure perimeters). Conclusions about the future prospects of using a computer package for perimeter security decision making are drawn from this experience.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127434445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信