2010 IEEE International Conference on Technologies for Homeland Security (HST)最新文献

筛选
英文 中文
Initial field measurements with the Multisensor Airborne Radiation Survey (MARS) high purity germanium (HPGe) detector array 使用多传感器机载辐射测量(MARS)高纯锗(HPGe)探测器阵列进行初步现场测量
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654937
J. Fast, C. Bonebrake, K. Dorow, B. D. Glasgow, J. Jensen, S. Morris, J. Orrell, W. Pitts, J. S. Rohrer, L. Todd
{"title":"Initial field measurements with the Multisensor Airborne Radiation Survey (MARS) high purity germanium (HPGe) detector array","authors":"J. Fast, C. Bonebrake, K. Dorow, B. D. Glasgow, J. Jensen, S. Morris, J. Orrell, W. Pitts, J. S. Rohrer, L. Todd","doi":"10.1109/THS.2010.5654937","DOIUrl":"https://doi.org/10.1109/THS.2010.5654937","url":null,"abstract":"The Multi-sensor Airborne Radiation Survey (MARS) project has developed a new single cryostat detector array design for high purity germanium (HPGe) gamma ray spectrometers that achieves the high detection efficiency required for stand-off detection and actionable characterization of radiological threats. This approach is necessary since a high efficiency HPGe detector can only be built as an array due to limitations in growing large germanium crystals. The system is ruggedized and shock mounted for use in a variety of field applications. This paper reports on results from initial field measurements conducted in a truck and on two different boats.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126101781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Computation of things for human protection and fulfillment 为人类保护和实现而计算的东西
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655070
Justyna Zander, P. Mosterman, J. Kinnebrew, Gautam Biswas
{"title":"Computation of things for human protection and fulfillment","authors":"Justyna Zander, P. Mosterman, J. Kinnebrew, Gautam Biswas","doi":"10.1109/THS.2010.5655070","DOIUrl":"https://doi.org/10.1109/THS.2010.5655070","url":null,"abstract":"Computer science and computational engineering have enabled great advances in modeling and simulation to analyze various scenarios. Still, facilitating and enhancing situational awareness for a single human is rarely considered. Poor decisions by an individual encountering everyday challenges or public threat situations can have dramatic effects, both for the individual and others. In the presented research, a Computation of Things (CoTh) framework is proposed to provide individual decision support during crises and prevent long-term deviations from safe and secure conditions. The target of CoTh is to enable a profound understanding of the situation from the viewpoint of individual persons in order to permanently reduce their fear, while simultaneously increasing awareness of appropriate responses. CoTh allows for a quick forecasting of action (or non-action) alternatives based on an individual human context, including geographic position (e.g., pollution level and energy usage), activity patterns (e.g., personal nutrition habits, lifestyle, traveling load, family status, circle of friends, social network, and virtual life), and state patterns (e.g., the DNA, current health conditions, and musculature of a human), depending on the considered situation. Insights into CoTh's motivation, requirements, and challenges are provided and the architecture proposal is depicted.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122356634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Automatic contact detection in side-scan sonar data 侧扫声纳数据中的自动接触检测
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655043
R. Quintal, J. Kiernan, J. Shannon, P. Dysart
{"title":"Automatic contact detection in side-scan sonar data","authors":"R. Quintal, J. Kiernan, J. Shannon, P. Dysart","doi":"10.1109/THS.2010.5655043","DOIUrl":"https://doi.org/10.1109/THS.2010.5655043","url":null,"abstract":"Side-scan sonar is a proven tool for detection of underwater objects, particularly those objects that project above the seafloor. Rapid assessment of side-scan imagery for object detection is critical for port security needs. However, current side-scan data processing techniques are largely manual, highly time-consuming, and prone to operator error. Availability of well-trained analysts is also a challenge. This article describes a research and development effort at Science Applications International Corporation to automate side-scan sonar contact detection for safety of navigation surveys. Included in the development effort are innovative image processing and machine learning techniques designed to reduce the number of false alarms. These automated techniques are directly applicable to port security operations.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129175706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Transformational nuclear sensors — Real-time monitoring of WMDs, risk assessment & response 转型核传感器-大规模杀伤性武器的实时监测,风险评估和应对
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654950
B. Archambault, J. Webster, J. Lapinskas, T. Grimes, R. Taleyarkhan, A. Eghlima
{"title":"Transformational nuclear sensors — Real-time monitoring of WMDs, risk assessment & response","authors":"B. Archambault, J. Webster, J. Lapinskas, T. Grimes, R. Taleyarkhan, A. Eghlima","doi":"10.1109/THS.2010.5654950","DOIUrl":"https://doi.org/10.1109/THS.2010.5654950","url":null,"abstract":"Transformational nuclear particle sensor systems have been developed for detecting a variety of radiation types via interactions with ordinary fluids such as water and acetone placed under metastable states of tensioned (yes, sub-zero or below-vacuum) liquid pressures at room temperature. Advancements have resulted in the development of lab-scale prototypes which provide real-time directionality information to within 10 degrees of a neutron emitting weapons of mass destruction (WMD) source, with over 90% intrinsic efficiency, with ability to decipher multiplicity and to detect WMD-shielded neutrons in the 0.01 eV range, to unshielded neutrons in the 1–10 MeV range, and with the ability to detect alpha emitting special nuclear material (SNM) signatures to within 1–5 keV in energy resolution, and detection sensitivities to ultratrace levels (i.e., to femto-grams per cc of SNMs such as Pu, and Am). The tension metastable fluid detector (TMFD) systems are robust, and are built in the laboratory with costs in the ∼$100+ range — with inherent gamma blindness capability. A multi-physics design framework (including nuclear particle transport, acoustics, structural dynamics, fluid-heat transfer, and electro-magnetics), has also been developed, and validated.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"704 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122965338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
High-performance orthogonal sensing system and data analysis algorithm for trace explosives detection 痕量爆炸物检测的高性能正交传感系统及数据分析算法
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654953
S. Guharay, Wansheng Su
{"title":"High-performance orthogonal sensing system and data analysis algorithm for trace explosives detection","authors":"S. Guharay, Wansheng Su","doi":"10.1109/THS.2010.5654953","DOIUrl":"https://doi.org/10.1109/THS.2010.5654953","url":null,"abstract":"A hybrid sensor system is developed for trace explosives detection. The system incorporates orthogonal operational principles of its subcomponents: Surface Enhanced Raman Spectroscopy (SERS) provides high sensitivity as well as high selectivity, i.e., ultra-low detection limits simultaneously with very low false alarm rates while an ionization-based method, such as Ion Mobility Spectrometry (IMS), is used as a pre-filter to SERS, for this approach. This solution offers a significantly improved detection technology when both modes are evaluated concurrently, especially making a significant enhancement of the capability of SERS for open environment applications. This concept of operation provides a clean and controlled environment, and it enhances the operational reliability of SERS which forms the critical unit for this new detection system. The combined system outperforms the individual IMS or SERS components taken individually. This hybrid, orthogonal sensing method can be applied to other types of threat detection as well, namely, chemical and biological threats.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"166 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122838353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining social media in extreme events : Lessons learned from the DARPA network challenge 在极端事件中挖掘社交媒体:从DARPA网络挑战中吸取的教训
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655067
N. Giacobe, Hyun-Woo Kim, Avner Faraz
{"title":"Mining social media in extreme events : Lessons learned from the DARPA network challenge","authors":"N. Giacobe, Hyun-Woo Kim, Avner Faraz","doi":"10.1109/THS.2010.5655067","DOIUrl":"https://doi.org/10.1109/THS.2010.5655067","url":null,"abstract":"The DARPA Network Challenge was a nationwide exercise in the use of social media in extreme events. Teams competed to locate ten red weather balloons that DARPA tethered over public locations across the continental United States for seven to ten hours on Saturday, December 5, 2009. The MIT team won the event, finding all ten locations using monetary incentive and a multi-level marketing payout scheme. This paper outlines the methods used by the 10th place iSchools Caucus team, which used a combination approach of recruiting observers and the use of Open Source Intelligence (OSINT) to find six of the ten locations. Twitter feeds and publicly available content on competing team websites were captured. Data from these mechanisms were evaluated for content validity using a combination of secondary observers, evaluation of the reputation of reported observers and confirmation of the true identities and locations of reporting individuals by mining additional data from several social networking sites. These methods may have application in law enforcement, homeland security and extreme events when there is a desire to use humans as soft sensors, but where it is impossible to directly recruit observers or motivate them with financial incentives.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125347552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cyber security for emergency management 网络安全应急管理
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654965
J. Walker, B. J. Williams, G. Skelton
{"title":"Cyber security for emergency management","authors":"J. Walker, B. J. Williams, G. Skelton","doi":"10.1109/THS.2010.5654965","DOIUrl":"https://doi.org/10.1109/THS.2010.5654965","url":null,"abstract":"Cyber security continues to be an increasingly important topic when considering Homeland Security issues. This area however is often overlooked during a disaster or emergency situation. Emergency management within the US as it currently stands lacks any real cyber situational awareness with respect to the core activities of emergency management such as mitigation, preparedness, response and recovery. As a result critical cyberinfrastructure resources that emergency management personnel rely on is left on the sideline when planning, handling, and recovering from emergencies or natural disasters. As emergency management evolves within the US to handle dynamic man-made, and natural disasters such as terrorist attacks, hurricanes, and floods, these issues must be addressed to mitigate risks. This paper takes the first step in examining the issue of cyber situational awareness within emergency management and identifies several concerns for the emergency management community.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121907404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Fab forensics: Increasing trust in IC fabrication 晶圆厂取证:增加对IC制造的信任
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655082
Gedare Bloom, B. Narahari, R. Simha
{"title":"Fab forensics: Increasing trust in IC fabrication","authors":"Gedare Bloom, B. Narahari, R. Simha","doi":"10.1109/THS.2010.5655082","DOIUrl":"https://doi.org/10.1109/THS.2010.5655082","url":null,"abstract":"Fabrication and design are now performed by different companies as semiconductor fabrication facilities (fabs or foundries) seek to reduce costs by serving multiple clients and consolidating resources. However, lack of immediate control and observation reduces the trust which IC designers have in some fabs. To help fabs increase trust in their processes, we propose an approach for logging forensic information of the fab process and printing the information on chips so that examination of the chip reveals provable deviations from the design. Fab owners can benefit by catching rogue employees and by demonstrating high security standards to their customers. Our proposed solution uses a light runtime system that interacts with a trusted platform module (TPM).","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129475047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Wide-Angle Nuclear Detection Array (WANDA) 广角核探测阵列(WANDA)
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654935
T. Doyle, R. Devito
{"title":"Wide-Angle Nuclear Detection Array (WANDA)","authors":"T. Doyle, R. Devito","doi":"10.1109/THS.2010.5654935","DOIUrl":"https://doi.org/10.1109/THS.2010.5654935","url":null,"abstract":"The Wide-Angle Nuclear Detection Array (WANDA) is a data analysis system that uses an array of detectors to act as a coincidence detection system, utilizes a database of possible radioisotopes, and searches this database using a physics-based analysis to identify the source type and location that best accounts for the measured Compton scattering data. This method has the ability to utilize partial-energy events and works with smaller and lower cost detectors that do not require full-energy absorption. WANDA maintains a full 4π field of view, and provides simultaneous recognition of the source location and identification of source material. Test scenarios exploring comparison of WANDA and conventional detection and identification technologies are presented.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129078132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Providing decision support in complex missions such as responding to a metropolitan IED attack 在复杂任务中提供决策支持,如应对大都市IED袭击
2010 IEEE International Conference on Technologies for Homeland Security (HST) Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655054
Santosh Dawesar, Daniel Jennings, Piali De, Brian C. Urch, Scott Corwin, Peter T Gaynor
{"title":"Providing decision support in complex missions such as responding to a metropolitan IED attack","authors":"Santosh Dawesar, Daniel Jennings, Piali De, Brian C. Urch, Scott Corwin, Peter T Gaynor","doi":"10.1109/THS.2010.5655054","DOIUrl":"https://doi.org/10.1109/THS.2010.5655054","url":null,"abstract":"Responding to a terrorist attack is extraordinarily complex due to the unpredictability as well as the resulting devastation, confusion, and apprehension. Further complications arise from the enormity of available data as well as the participation of multiple agencies and organizations, which often hinders the discovery and assimilation of pertinent information in a timely fashion. A solution to these problems must be scalable, maintainable, extensible, and adaptable. Increasingly, decision-makers need an integrated, intelligent system that can seamlessly acquire, fuse, reason about, distribute, and protect information to provide enhanced, individualized decision support and situational understanding as well as foster effective collaboration. To meet this need, Raytheon is developing an intelligent system called Confluence™, which consists of an ontological framework, domain independent knowledge generation, integration, and reasoning agents, a massively scalable knowledge store, as well as various visualization components. Confluence™ can be applied to any mission by creating a mission ontology that extends the common framework, and which explicitly defines a semantic model of the physical, information, cognitive, and social domains for the mission. This paper will describe and demonstrate an application of Confluence™ to the mission of recovering from an IED attack in a crowded metropolitan area, such as Providence RI.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125514245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信