Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures最新文献

筛选
英文 中文
The Livermore secure-voice radio system 利弗莫尔安全语音无线电系统
C. E. Davis
{"title":"The Livermore secure-voice radio system","authors":"C. E. Davis","doi":"10.1109/CCST.1988.76003","DOIUrl":"https://doi.org/10.1109/CCST.1988.76003","url":null,"abstract":"Lawrence Livermore National Laboratory has designed and installed a security radio system that protects sensitive radio traffic against interception and deception while providing full radio coverage of the desired service area. The interception often includes penetration into buildings and heavily-shielded basement areas. The system is protected from possible assault or natural disasters. Expansion, flexibility, and integration of the control system with the security command console have been provided for. The system uses digital voice encryption throughout a system of receiver voting, VHF repeaters, and slotted transmission line for building penetration. It achieves redundancy and system protection by the use of backup antenna sites, secondary radio channels, a standby control system, and special electronics to monitor and control operation of the field units.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126750507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mobile intrusion monitoring system 移动入侵监控系统
M. Jonckheere
{"title":"Mobile intrusion monitoring system","authors":"M. Jonckheere","doi":"10.1109/CCST.1988.75993","DOIUrl":"https://doi.org/10.1109/CCST.1988.75993","url":null,"abstract":"A description is given of a mobile intrusion-monitoring system (MIMS), which was designed to be used as an electronics-based perimeter intrusion-monitoring procedure for Canada's lower security penal institutions. MIMS consists of a single sensor with a mobile interactive control and monitoring capability. The control and monitoring capability is vehicle-based but has a fixed data logging capability. Closed-circuit television system assessment is not included in the design owing to the mobile nature of the annunciation post.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114509366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure interactive Livermore alarm system 安全的交互式利弗莫尔报警系统
G. E. Davis
{"title":"Secure interactive Livermore alarm system","authors":"G. E. Davis","doi":"10.1109/CCST.1988.76002","DOIUrl":"https://doi.org/10.1109/CCST.1988.76002","url":null,"abstract":"The Safeguards and Security Department at Lawrence Livermore National Laboratory (LLNL) is currently implementing a high-security alarm system that contains a number of automation concepts that are new at Livermore. A dichotomy arises from the apparent conflict between the need to protect the materials and documents associated with nuclear weapons design and testing and the need to maintain a campus-like environment. The system implemented to meet both of these needs uses a user-friendly high-security interface that allows users to access an alarmed area, and authorized users to have field control of the access lists to that alarmed area. The system provides specialized interfaces for users, console operators, the security staff, system maintenance personnel, designers, and security administrators.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129333562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A VHF intrusion detection radar for ground-level and airborne threats 用于地面和空中威胁的甚高频入侵探测雷达
W. R. Seed
{"title":"A VHF intrusion detection radar for ground-level and airborne threats","authors":"W. R. Seed","doi":"10.1109/CCST.1988.75986","DOIUrl":"https://doi.org/10.1109/CCST.1988.75986","url":null,"abstract":"The system considerations and attributes of a short-range surveillance radar are discussed. This security sensor provides a range-gated volumetric intrusion-detection capability. It is designed for fixed installations and mobile resources, both tactical and strategic. The radar operates in the low VHF band, which offers many performance and operational benefits because of whole-body resonance phenomena, nuisance target rejection, and superior propagation characteristics.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127971782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A new air-mounted perimeter security technology 一种新的空中周边安全技术
M. Maki, W. Feller
{"title":"A new air-mounted perimeter security technology","authors":"M. Maki, W. Feller","doi":"10.1109/CCST.1988.75985","DOIUrl":"https://doi.org/10.1109/CCST.1988.75985","url":null,"abstract":"A sensing technology applicable to perimeter security applications is described. It provides the well-known terrain-following features of conventional buried-line-guided radar sensors and adds a larger above ground detection zone. The principles and features of this coupled-wave sensing technology are discussed as well as specific sensor implementation. The sensors under development include a rapid deployment line sensor for mobile resources or for temporary replacement of other failed line sensors and a permanent perimeter block sensor to provide a covert detection zone several meters high and wide.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133584454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Applying speech enhancement to audio surveillance 语音增强在音频监控中的应用
D. O'Shaughnessy, P. Kabal, D. Bernardi, L. Barbeau, C. Chu, J. Moncet
{"title":"Applying speech enhancement to audio surveillance","authors":"D. O'Shaughnessy, P. Kabal, D. Bernardi, L. Barbeau, C. Chu, J. Moncet","doi":"10.1109/CCST.1988.75991","DOIUrl":"https://doi.org/10.1109/CCST.1988.75991","url":null,"abstract":"The authors describe ways to cancel interference where an available reference signal is not synchronized with the surveillance recording, i.e., the reference is obtained later from a phonograph record on air check recording from a broadcast source. As a specific example, they discuss their experiences processing a wiretap recording used in an actual court case. They transformed the reference signal to reflect room and transmission effects and then subtracted the resulting secondary signal from the primary intercept signal, thus enhancing speech from the desired talkers by removing interfering sounds. The intercept signal was subject to time-scale modifications due to variable phonograph and tape recorder speeds, which adversely affected the ability to cancel interference automatically. The two methods that were most successful for enhancement were least-mean-squares adaptive cancellation and spectral subtraction.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"793 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133301947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Perimeter detection systems: correlation of false alarm cause with environmental factors 周界探测系统:虚报原因与环境因素的相关性
N. Custance
{"title":"Perimeter detection systems: correlation of false alarm cause with environmental factors","authors":"N. Custance","doi":"10.1109/CCST.1988.75995","DOIUrl":"https://doi.org/10.1109/CCST.1988.75995","url":null,"abstract":"The tradeoff in the overall performance of a perimeter detection system between its detection probability and its false-alarm rate is discussed. The false-alarm rate is influenced greatly by the environment in which the sensor is operating. Understanding the correlation between false-alarm rate and the environment offers the opportunity for sensors to be improved. Furthermore, the likely performance of a sensor in a given environment can be predicted. Some techniques used to explore the effects of the environment on a sensor's false-alarm rate are reviewed.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123222816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Hacking the airwaves 侵入电波
C.W. Madsen
{"title":"Hacking the airwaves","authors":"C.W. Madsen","doi":"10.1109/CCST.1988.75990","DOIUrl":"https://doi.org/10.1109/CCST.1988.75990","url":null,"abstract":"Techniques for eavesdropping on radio transmission are discussed, and the types of information transmitted in the various frequency ranges are examined. Three classes of targets are considered: diplomatic, private-corporation, and military. It is concluded that users of the RF spectrum must encrypt their data transmissions to prevent sensitive information from becoming a virtual 'open book' to potential eavesdroppers.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123657361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A remote multi-camera visual surveillance system using frame-switching technology 一种采用帧交换技术的远程多摄像机视觉监控系统
Pong-Fui Chang, Shiaw-Shiang Jiang, Long-Yih Chu
{"title":"A remote multi-camera visual surveillance system using frame-switching technology","authors":"Pong-Fui Chang, Shiaw-Shiang Jiang, Long-Yih Chu","doi":"10.1109/CCST.1988.75997","DOIUrl":"https://doi.org/10.1109/CCST.1988.75997","url":null,"abstract":"The REMVISE (remote multicamera visual surveillance) system, contains several TV cameras with well-planned scene division of the surveillance area so as to increase both the resolution and the field of view. The video signals of the cameras are combined frame by frame so that only a single TV channel or cable is needed for transmission of multiple video signals. A frame distributor containing frame grabbers is used to reconstruct the multiple-camera scenes on a bank of monitors. The system can be used for remote, real-time large-area surveillance and target identification.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115420839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
C/sup 3/A design for a waterside security system 水边安全系统的C/sup 3/A设计
J. Lougheed, R. Clifton
{"title":"C/sup 3/A design for a waterside security system","authors":"J. Lougheed, R. Clifton","doi":"10.1109/CCST.1988.75987","DOIUrl":"https://doi.org/10.1109/CCST.1988.75987","url":null,"abstract":"A concept for effective waterside security has been developed and demonstrated. It is based on the integration of command, control, and communications with assessment (C/sup 3/A). Multiple detection and assessment devices are linked by computer, and the C/sup 3/A operator is provided with an up-to-date situation map and relevant assessment imagery. Standard security doctrine is incorporated into system software to aid in rapid threat classification and to provide an appropriate response. The concept is sufficiently flexible to adapt to the wide range of sensor technologies and site variations needed for waterside security. The C/sup 3/A concept has been validated in a US-Navy-designated configuration at an operational base. The design criteria and the specific configuration used for evaluation are described.<<ETX>>","PeriodicalId":129971,"journal":{"name":"Proceedings. Institute of Electrical and Electronics Engineers 1988 International Carnahan Conference on Security Technology, Crime Countermeasures","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131235220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信