2006 IEEE International Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety最新文献

筛选
英文 中文
Aircraft Classification Using a Microwave Barrier 利用微波屏障对飞机进行分类
L. Cristaldi, G. D'Antona, M. Faifer, A. Ferrero, R. Ottoboni
{"title":"Aircraft Classification Using a Microwave Barrier","authors":"L. Cristaldi, G. D'Antona, M. Faifer, A. Ferrero, R. Ottoboni","doi":"10.1109/MSHS.2006.314349","DOIUrl":"https://doi.org/10.1109/MSHS.2006.314349","url":null,"abstract":"In the airport area, a runway incursion is represented by any situation in which a moving object (aircraft, car, person, animal, etc.) on the ground should produce a risk of collision. Due to its potentially catastrophic effects, the prevention and detection of runway incursion is a very important aim for any airport. This aim represents a multi-dimensional issue that can be faced only with a multi-dimensional and multi-task approach. From a measurement point of view, a fundamental role in this context is played by the sensors network employed in the airport area. Developing a cooperative sensor network able to carry out a real time, accurate and reliable information about the airport ground status is mandatory. This work presents the activity developed by the authors focused on the improvement of the measurement characteristic of a sensor system employed in an Italian airport for the surveillance of stop bars areas. A method, based on a classifier, which permits to extract new and high-level information from the sensor signals, is proposed. This method allows to classify the type of transiting object, discriminating therefore the intrusions from the authorized passages. In this way, by a simple retro fitting to existing system, a significant improvement of the safety of the traffic control process has been achieved","PeriodicalId":188809,"journal":{"name":"2006 IEEE International Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124893807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Novel Optical Techniques for Efficient Stand off Detection of Backscattered Polarimetric Signatures from Cluttered Targets 杂波目标后向散射偏振特征有效分离检测的新光学技术
G. Giakos, S. Sukumar, P. Bathini, S. Paturi, S. Sumrain, K. Ambadipudi, K. Valluru
{"title":"Novel Optical Techniques for Efficient Stand off Detection of Backscattered Polarimetric Signatures from Cluttered Targets","authors":"G. Giakos, S. Sukumar, P. Bathini, S. Paturi, S. Sumrain, K. Ambadipudi, K. Valluru","doi":"10.1109/MSHS.2006.314350","DOIUrl":"https://doi.org/10.1109/MSHS.2006.314350","url":null,"abstract":"Novel detection concepts aimed to enhance the detection/discrimination capabilities of targets surrounded by scattering/cluttered backgrounds have been presented. The experimental results of this study, acquired using laser beams to illuminate scenes at specific wavelengths and interrogate their respective reflectance spectral features, indicate that spectral degree of linear polarization (DOLP) image difference techniques, as well as near-pixel multispectral detection techniques provide enhanced detection with high discrimination capabilities","PeriodicalId":188809,"journal":{"name":"2006 IEEE International Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122691526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optical Beamforming of Multiple Independent-Simultaneous RF Beams for Secure Communications 用于安全通信的多个独立同时射频波束的光束形成
A. Siahmakoun
{"title":"Optical Beamforming of Multiple Independent-Simultaneous RF Beams for Secure Communications","authors":"A. Siahmakoun","doi":"10.1109/MSHS.2006.314332","DOIUrl":"https://doi.org/10.1109/MSHS.2006.314332","url":null,"abstract":"We propose and demonstrate a novel architecture for processing simultaneous independent RF beams. The proposed optical processor technology employs wavelength division multiplexing (WDM) encoding and technologies that enhances secure communications for a wide bandwidth of operation. In our example of two-channel approach, four adjacent ITU optical WDM channels are used as optical carriers. Each pair of optical carriers directs RF information of one receive/transmit beam. The optical channels feed a 3-bit programmable dispersion matrix (PDM), which performs true-time delay processing. The PDM is based on three optical delay lines, arranged in a binary or ternary configuration. Each delay line consists of four fiber-Bragg gratings (FBG). The separation between FBG increases by multiples of two for each delay line. Beampatterns are characterized in receive and transmit modes for RF signals in 0.5-1.5 GHz range and are obtained for target angles of plusmn70deg. The measurement results demonstrate the simultaneous processing of two RF-beams and the squint free nature of the beamformer. The scaled up version of beamformer to large array size and its simultaneous multiple-beam processing will be presented. We would also describe a potential architecture of an all-optical delta-sigma modulator that can be implemented in a digital transmit/receive beamformer","PeriodicalId":188809,"journal":{"name":"2006 IEEE International Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122068605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Jumping Crowd on Stadium Stands Through Image Processing to Security Purposes 从图像处理的角度分析体育馆看台上人群的跳跃行为
A. Cigada, E. Zappa
{"title":"Analysis of Jumping Crowd on Stadium Stands Through Image Processing to Security Purposes","authors":"A. Cigada, E. Zappa","doi":"10.1109/MSHS.2006.314352","DOIUrl":"https://doi.org/10.1109/MSHS.2006.314352","url":null,"abstract":"The goal of this paper is to introduce an innovative and quantitative measurement technique, useful for the estimation of the people motion on stadia stands, at least under a statistical point of view. The authors propose and qualify here image based people motion estimation: the idea is to measure the \"motion level\" of the people through the analysis of images grabbed with common video cameras or with an infrared thermal imager. Cameras working in the visible wavelength range usually have a higher resolution than thermal cameras and are much cheaper, due to this reasons they are often preferred for the estimation of people motion in case of events held during the day (i.e. with stable lighting conditions); nevertheless thermal cameras have various important advantages in some applications, as during concerts; in these cases, in fact, lighting is mainly projected on artists, leaving the audience in an almost completely dark atmosphere. In this scenario the use of a common camera often leads to poor quality images; for this reason in this research a thermal camera has also been used, in order to acquire sequences of infrared images of the jumping crowd. In this way more reliable results can be obtained even in case of very low lighting","PeriodicalId":188809,"journal":{"name":"2006 IEEE International Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125750712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Autom atic Profiling and Behavior Prediction of Computer System Users 计算机系统用户的自动分析与行为预测
J. Monroy, J. Becerra, F. Bellas, R. Duro, F. López-Peña
{"title":"Autom atic Profiling and Behavior Prediction of Computer System Users","authors":"J. Monroy, J. Becerra, F. Bellas, R. Duro, F. López-Peña","doi":"10.1109/MSHS.2006.314353","DOIUrl":"https://doi.org/10.1109/MSHS.2006.314353","url":null,"abstract":"Detecting changes in the behavior of users can serve as an indicator of malicious or damaging misuse in many services; including the possible usurpation of a regular user identity by an intruder. For these purposes, approaches based on the profiling of users are not as common as those based on the analysis of the system behavior. This paper presents a method for automatically profiling and subsequently predicting the behavior of computer system users. The method is based on evolutionary profiling agents evolving in real time in order to dynamically provide a profile for each subject under analysis. The paper presents some experimental results from real data providing scheduled time and the real effective use of resources made by users of a high performance computing (HPC) center. The resulting profiling turns out to be very good for most users and the consequential relative error between prediction and effective activities appears as an effective parameter in detecting both changes in user behavior and user identity usurpation","PeriodicalId":188809,"journal":{"name":"2006 IEEE International Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121146518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Palm Print Recognition: A New Algorithm For Corner Detection Using Palm Anatomy Features 掌纹识别:一种基于掌纹解剖特征的角点检测新算法
N. Srinivasan, E. Micheli-Tzanakou
{"title":"Palm Print Recognition: A New Algorithm For Corner Detection Using Palm Anatomy Features","authors":"N. Srinivasan, E. Micheli-Tzanakou","doi":"10.1109/MSHS.2006.314340","DOIUrl":"https://doi.org/10.1109/MSHS.2006.314340","url":null,"abstract":"This paper describes an automated approach to palm print recognition. Particular emphasis has been given to the alignment method, for which a new corner finding algorithm has been developed. The corner finding algorithm proposed in this paper is a simple and fast way to process corners and has been particularly developed to detect the fingertip and trough corners of a palm. Based on three key corners, a consistent region of interest (ROI) is extracted for each palm. A feature vector is computed for each ROI and a similarity measure is computed from for similar and dissimilar palms. It is seen that that the similarity measure is markedly variable for similar and dissimilar palms","PeriodicalId":188809,"journal":{"name":"2006 IEEE International Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129654417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Computational Fluid Dynamics Approach for Optimization of a Sensor Network 传感器网络优化的计算流体动力学方法
D. Hamel, M. Chwastek, B. Farouk, K. Dandekar, M. Kam
{"title":"A Computational Fluid Dynamics Approach for Optimization of a Sensor Network","authors":"D. Hamel, M. Chwastek, B. Farouk, K. Dandekar, M. Kam","doi":"10.1109/MSHS.2006.314347","DOIUrl":"https://doi.org/10.1109/MSHS.2006.314347","url":null,"abstract":"We optimize the placement of sensors for detecting a nuclear, biological, or chemical (NBC) attack in a dense urban environment. This approach draws from two main areas: (1) computational fluid dynamic (CFD) simulations and (2) sensor placement algorithms. The main objective was to minimize detection time of a NBC sensor network for attacks on a generic urban environment. To this end we conducted simulations in such environments using thirty-three (33) unique attack locations, thirty-three (33) candidate sensor locations, prevailing wind conditions, and the properties of the chemical agent, chlorine gas. A total of ninety-nine (99) simulated attack scenarios were created (three sets of thirty-three unique attack simulations) and used for optimization. Simulated chemical agent concentration data were collected at each candidate sensor location as a function of time. The integration of this concentration data with respect to time was used to calculate the contaminant \"consumption\" of the network and the sensor placement algorithm, along with contaminant-level detection, minimized consumption to the network while also minimizing the number of sensors placed. Our results show how a small number of properly placed sensors (eight (8), in our case) provides the best achievable coverage (additional sensors do not help)","PeriodicalId":188809,"journal":{"name":"2006 IEEE International Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114462277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Introducing Agility in Hybrid Communication Systems and Sensors 在混合通信系统和传感器中引入敏捷性
C. Christodoulou, C. Abdallah, J. Khoury, P. Yu, M. Franceschetti
{"title":"Introducing Agility in Hybrid Communication Systems and Sensors","authors":"C. Christodoulou, C. Abdallah, J. Khoury, P. Yu, M. Franceschetti","doi":"10.1109/MSHS.2006.314343","DOIUrl":"https://doi.org/10.1109/MSHS.2006.314343","url":null,"abstract":"This paper presents a new approach in dealing with hybridization issues in communication systems or sensors. The thrust is to separate the logical network (sensor) infrastructure from the physical one. Here we show how we can exploit concepts such as persistent identification which we believe is crucial to be able to connect a variety of heterogeneous devices in a network that grows, and that is robust to failures. A vital characteristic of our architecture is the ability to accommodate a variety of heterogeneous devices and subsystems. Several examples of hybridization of sensors at the physical, logical, and network levels are presented and discussed","PeriodicalId":188809,"journal":{"name":"2006 IEEE International Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131544871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Embedded System for Delimiting Hzardous Areas 一种用于划定危险区域的嵌入式系统
C. Alippi, Crisian Galperti
{"title":"An Embedded System for Delimiting Hzardous Areas","authors":"C. Alippi, Crisian Galperti","doi":"10.1109/MSHS.2006.314346","DOIUrl":"https://doi.org/10.1109/MSHS.2006.314346","url":null,"abstract":"In this paper we suggest a wireless embedded system for estimating the closeness and the interaction time between mobile and fixed units for personal safety applications. In particular, the system provides a technological support during emergency or critical situations - where personnel has to safety move in a critical dynamic scenario - by automatically delimiting a dangerous area previously characterised by a third party. The suggested approach significantly extends existing solutions not requiring any absolute position information or a fixed infrastructure. Moreover, being deeply embedded, it can be quickly deployed in a new environment","PeriodicalId":188809,"journal":{"name":"2006 IEEE International Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122598350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信