L. Cristaldi, G. D'Antona, M. Faifer, A. Ferrero, R. Ottoboni
{"title":"Aircraft Classification Using a Microwave Barrier","authors":"L. Cristaldi, G. D'Antona, M. Faifer, A. Ferrero, R. Ottoboni","doi":"10.1109/MSHS.2006.314349","DOIUrl":"https://doi.org/10.1109/MSHS.2006.314349","url":null,"abstract":"In the airport area, a runway incursion is represented by any situation in which a moving object (aircraft, car, person, animal, etc.) on the ground should produce a risk of collision. Due to its potentially catastrophic effects, the prevention and detection of runway incursion is a very important aim for any airport. This aim represents a multi-dimensional issue that can be faced only with a multi-dimensional and multi-task approach. From a measurement point of view, a fundamental role in this context is played by the sensors network employed in the airport area. Developing a cooperative sensor network able to carry out a real time, accurate and reliable information about the airport ground status is mandatory. This work presents the activity developed by the authors focused on the improvement of the measurement characteristic of a sensor system employed in an Italian airport for the surveillance of stop bars areas. A method, based on a classifier, which permits to extract new and high-level information from the sensor signals, is proposed. This method allows to classify the type of transiting object, discriminating therefore the intrusions from the authorized passages. In this way, by a simple retro fitting to existing system, a significant improvement of the safety of the traffic control process has been achieved","PeriodicalId":188809,"journal":{"name":"2006 IEEE International Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124893807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Giakos, S. Sukumar, P. Bathini, S. Paturi, S. Sumrain, K. Ambadipudi, K. Valluru
{"title":"Novel Optical Techniques for Efficient Stand off Detection of Backscattered Polarimetric Signatures from Cluttered Targets","authors":"G. Giakos, S. Sukumar, P. Bathini, S. Paturi, S. Sumrain, K. Ambadipudi, K. Valluru","doi":"10.1109/MSHS.2006.314350","DOIUrl":"https://doi.org/10.1109/MSHS.2006.314350","url":null,"abstract":"Novel detection concepts aimed to enhance the detection/discrimination capabilities of targets surrounded by scattering/cluttered backgrounds have been presented. The experimental results of this study, acquired using laser beams to illuminate scenes at specific wavelengths and interrogate their respective reflectance spectral features, indicate that spectral degree of linear polarization (DOLP) image difference techniques, as well as near-pixel multispectral detection techniques provide enhanced detection with high discrimination capabilities","PeriodicalId":188809,"journal":{"name":"2006 IEEE International Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122691526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optical Beamforming of Multiple Independent-Simultaneous RF Beams for Secure Communications","authors":"A. Siahmakoun","doi":"10.1109/MSHS.2006.314332","DOIUrl":"https://doi.org/10.1109/MSHS.2006.314332","url":null,"abstract":"We propose and demonstrate a novel architecture for processing simultaneous independent RF beams. The proposed optical processor technology employs wavelength division multiplexing (WDM) encoding and technologies that enhances secure communications for a wide bandwidth of operation. In our example of two-channel approach, four adjacent ITU optical WDM channels are used as optical carriers. Each pair of optical carriers directs RF information of one receive/transmit beam. The optical channels feed a 3-bit programmable dispersion matrix (PDM), which performs true-time delay processing. The PDM is based on three optical delay lines, arranged in a binary or ternary configuration. Each delay line consists of four fiber-Bragg gratings (FBG). The separation between FBG increases by multiples of two for each delay line. Beampatterns are characterized in receive and transmit modes for RF signals in 0.5-1.5 GHz range and are obtained for target angles of plusmn70deg. The measurement results demonstrate the simultaneous processing of two RF-beams and the squint free nature of the beamformer. The scaled up version of beamformer to large array size and its simultaneous multiple-beam processing will be presented. We would also describe a potential architecture of an all-optical delta-sigma modulator that can be implemented in a digital transmit/receive beamformer","PeriodicalId":188809,"journal":{"name":"2006 IEEE International Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety","volume":"149 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122068605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of Jumping Crowd on Stadium Stands Through Image Processing to Security Purposes","authors":"A. Cigada, E. Zappa","doi":"10.1109/MSHS.2006.314352","DOIUrl":"https://doi.org/10.1109/MSHS.2006.314352","url":null,"abstract":"The goal of this paper is to introduce an innovative and quantitative measurement technique, useful for the estimation of the people motion on stadia stands, at least under a statistical point of view. The authors propose and qualify here image based people motion estimation: the idea is to measure the \"motion level\" of the people through the analysis of images grabbed with common video cameras or with an infrared thermal imager. Cameras working in the visible wavelength range usually have a higher resolution than thermal cameras and are much cheaper, due to this reasons they are often preferred for the estimation of people motion in case of events held during the day (i.e. with stable lighting conditions); nevertheless thermal cameras have various important advantages in some applications, as during concerts; in these cases, in fact, lighting is mainly projected on artists, leaving the audience in an almost completely dark atmosphere. In this scenario the use of a common camera often leads to poor quality images; for this reason in this research a thermal camera has also been used, in order to acquire sequences of infrared images of the jumping crowd. In this way more reliable results can be obtained even in case of very low lighting","PeriodicalId":188809,"journal":{"name":"2006 IEEE International Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125750712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Monroy, J. Becerra, F. Bellas, R. Duro, F. López-Peña
{"title":"Autom atic Profiling and Behavior Prediction of Computer System Users","authors":"J. Monroy, J. Becerra, F. Bellas, R. Duro, F. López-Peña","doi":"10.1109/MSHS.2006.314353","DOIUrl":"https://doi.org/10.1109/MSHS.2006.314353","url":null,"abstract":"Detecting changes in the behavior of users can serve as an indicator of malicious or damaging misuse in many services; including the possible usurpation of a regular user identity by an intruder. For these purposes, approaches based on the profiling of users are not as common as those based on the analysis of the system behavior. This paper presents a method for automatically profiling and subsequently predicting the behavior of computer system users. The method is based on evolutionary profiling agents evolving in real time in order to dynamically provide a profile for each subject under analysis. The paper presents some experimental results from real data providing scheduled time and the real effective use of resources made by users of a high performance computing (HPC) center. The resulting profiling turns out to be very good for most users and the consequential relative error between prediction and effective activities appears as an effective parameter in detecting both changes in user behavior and user identity usurpation","PeriodicalId":188809,"journal":{"name":"2006 IEEE International Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121146518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Palm Print Recognition: A New Algorithm For Corner Detection Using Palm Anatomy Features","authors":"N. Srinivasan, E. Micheli-Tzanakou","doi":"10.1109/MSHS.2006.314340","DOIUrl":"https://doi.org/10.1109/MSHS.2006.314340","url":null,"abstract":"This paper describes an automated approach to palm print recognition. Particular emphasis has been given to the alignment method, for which a new corner finding algorithm has been developed. The corner finding algorithm proposed in this paper is a simple and fast way to process corners and has been particularly developed to detect the fingertip and trough corners of a palm. Based on three key corners, a consistent region of interest (ROI) is extracted for each palm. A feature vector is computed for each ROI and a similarity measure is computed from for similar and dissimilar palms. It is seen that that the similarity measure is markedly variable for similar and dissimilar palms","PeriodicalId":188809,"journal":{"name":"2006 IEEE International Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129654417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Hamel, M. Chwastek, B. Farouk, K. Dandekar, M. Kam
{"title":"A Computational Fluid Dynamics Approach for Optimization of a Sensor Network","authors":"D. Hamel, M. Chwastek, B. Farouk, K. Dandekar, M. Kam","doi":"10.1109/MSHS.2006.314347","DOIUrl":"https://doi.org/10.1109/MSHS.2006.314347","url":null,"abstract":"We optimize the placement of sensors for detecting a nuclear, biological, or chemical (NBC) attack in a dense urban environment. This approach draws from two main areas: (1) computational fluid dynamic (CFD) simulations and (2) sensor placement algorithms. The main objective was to minimize detection time of a NBC sensor network for attacks on a generic urban environment. To this end we conducted simulations in such environments using thirty-three (33) unique attack locations, thirty-three (33) candidate sensor locations, prevailing wind conditions, and the properties of the chemical agent, chlorine gas. A total of ninety-nine (99) simulated attack scenarios were created (three sets of thirty-three unique attack simulations) and used for optimization. Simulated chemical agent concentration data were collected at each candidate sensor location as a function of time. The integration of this concentration data with respect to time was used to calculate the contaminant \"consumption\" of the network and the sensor placement algorithm, along with contaminant-level detection, minimized consumption to the network while also minimizing the number of sensors placed. Our results show how a small number of properly placed sensors (eight (8), in our case) provides the best achievable coverage (additional sensors do not help)","PeriodicalId":188809,"journal":{"name":"2006 IEEE International Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114462277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Christodoulou, C. Abdallah, J. Khoury, P. Yu, M. Franceschetti
{"title":"Introducing Agility in Hybrid Communication Systems and Sensors","authors":"C. Christodoulou, C. Abdallah, J. Khoury, P. Yu, M. Franceschetti","doi":"10.1109/MSHS.2006.314343","DOIUrl":"https://doi.org/10.1109/MSHS.2006.314343","url":null,"abstract":"This paper presents a new approach in dealing with hybridization issues in communication systems or sensors. The thrust is to separate the logical network (sensor) infrastructure from the physical one. Here we show how we can exploit concepts such as persistent identification which we believe is crucial to be able to connect a variety of heterogeneous devices in a network that grows, and that is robust to failures. A vital characteristic of our architecture is the ability to accommodate a variety of heterogeneous devices and subsystems. Several examples of hybridization of sensors at the physical, logical, and network levels are presented and discussed","PeriodicalId":188809,"journal":{"name":"2006 IEEE International Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131544871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Embedded System for Delimiting Hzardous Areas","authors":"C. Alippi, Crisian Galperti","doi":"10.1109/MSHS.2006.314346","DOIUrl":"https://doi.org/10.1109/MSHS.2006.314346","url":null,"abstract":"In this paper we suggest a wireless embedded system for estimating the closeness and the interaction time between mobile and fixed units for personal safety applications. In particular, the system provides a technological support during emergency or critical situations - where personnel has to safety move in a critical dynamic scenario - by automatically delimiting a dangerous area previously characterised by a third party. The suggested approach significantly extends existing solutions not requiring any absolute position information or a fixed infrastructure. Moreover, being deeply embedded, it can be quickly deployed in a new environment","PeriodicalId":188809,"journal":{"name":"2006 IEEE International Workshop on Measurement Systems for Homeland Security, Contraband Detection and Personal Safety","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122598350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}