Proceedings. International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
Protection of enclosures with harmonic pressure variation 谐波压力变化的外壳保护
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751968
F. Ryser, S. Strassler
{"title":"Protection of enclosures with harmonic pressure variation","authors":"F. Ryser, S. Strassler","doi":"10.1109/CCST.1989.751968","DOIUrl":"https://doi.org/10.1109/CCST.1989.751968","url":null,"abstract":"It is shown theoretically how pressure variations can be utilized to measure the leakage rate of enclosures and to protect enclosures against intrusion.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115454782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overview of security technology efforts at bell communications research 概述安全技术努力在贝尔通信研究
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751957
B.K. Schwartz
{"title":"Overview of security technology efforts at bell communications research","authors":"B.K. Schwartz","doi":"10.1109/CCST.1989.751957","DOIUrl":"https://doi.org/10.1109/CCST.1989.751957","url":null,"abstract":"","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121086660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fundamental considerations on the standardization of security devices with a view to the realization of the European interior market 1992 1992年关于安全装置标准化的基本思考,以期实现欧洲内饰市场
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751949
A. Scheidweiler
{"title":"Fundamental considerations on the standardization of security devices with a view to the realization of the European interior market 1992","authors":"A. Scheidweiler","doi":"10.1109/CCST.1989.751949","DOIUrl":"https://doi.org/10.1109/CCST.1989.751949","url":null,"abstract":"The paper deals with the situation of standardization, testing and certification in Europe in the field of security systems. Starting from the objectives of the EC to realize an interior European market until 1992 the problems of trade barriers are discussed. It is shown which importantrole European standards will play in the future.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127636192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data media / communication- security and recovery 数据媒体/通信-安全和恢复
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751965
A.R. Dowdeswell
{"title":"Data media / communication- security and recovery","authors":"A.R. Dowdeswell","doi":"10.1109/CCST.1989.751965","DOIUrl":"https://doi.org/10.1109/CCST.1989.751965","url":null,"abstract":"","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130966173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On-line signature verification: how manv countries are in the race? 在线签名验证:有多少国家在竞争?
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751977
R. Plamondon, G. Lorette
{"title":"On-line signature verification: how manv countries are in the race?","authors":"R. Plamondon, G. Lorette","doi":"10.1109/CCST.1989.751977","DOIUrl":"https://doi.org/10.1109/CCST.1989.751977","url":null,"abstract":"This paper presents a survey of the major achievements in automatic signature verification based on dynamic or on-line techniques. After a review of preprocessing techniques a special attention is given to feature extraction methods and comparison processes with respect to the two basic representa tions of a signature: functions and parameters. Comparative results of performance are then presented and discussed.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132793774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Perimeter security research in Britain past, present and future 英国周边安全研究的过去、现在和未来
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751944
A.N. Kapsey
{"title":"Perimeter security research in Britain past, present and future","authors":"A.N. Kapsey","doi":"10.1109/CCST.1989.751944","DOIUrl":"https://doi.org/10.1109/CCST.1989.751944","url":null,"abstract":"My talk will largely be about the work done on government supported research and development work on security systems for prisons and other large installations of national importance.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131829615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A knowledge-based approach to automatic alarm interpretation using computer vision, on image sequences 基于知识的自动报警解释方法,利用计算机视觉,对图像序列
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751982
T. Ellis, Paul L. Rosin, P. Moukas, P. Golton
{"title":"A knowledge-based approach to automatic alarm interpretation using computer vision, on image sequences","authors":"T. Ellis, Paul L. Rosin, P. Moukas, P. Golton","doi":"10.1109/CCST.1989.751982","DOIUrl":"https://doi.org/10.1109/CCST.1989.751982","url":null,"abstract":"This paper describes the development of a knowledge based system which will be used to automate the interpretation of an alarm event resulting from a perimeter intrusion detection system. The knowledge-based system analyses a sequence of digital images captured before, during and after the alarm is generated. Additional data, pertaining to the alarm sensor, prevailing weather conditions and time-of-day are also available to assist the interpretation. In order to cope with the diverse nature of the different data sources, a knowledge-based approach is used to perform the interpretation. Models are maintained for a variety of possible alarm causes (human, animal, environmental, false etc.) and each model characterises a number of properties associated with that particular alarm source. The event data is interrogated by the KBS following the selection of a particular model.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127123687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
David: advanced developments for the next generation of video intrusion detection 大卫:下一代视频入侵检测的先进发展
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751970
E. J. Kozlow
{"title":"David: advanced developments for the next generation of video intrusion detection","authors":"E. J. Kozlow","doi":"10.1109/CCST.1989.751970","DOIUrl":"https://doi.org/10.1109/CCST.1989.751970","url":null,"abstract":"The Digital Automatic Video Intrusion Detection (DAVID) sensor was introduced at the International Carnahan Con ference on Security Technology in 1983. Since then, hundreds of DAVID video intrusion detection sensors have been suc cessfully deploied at nuclear facilities, correctional institutions, military bases and industrial complexes. This broad base of DAVID customers has provided Computing Devices Company with input regarding potential product improvements and new areas of application. During the past two years, Computing Devices company has embarked upon a vigorous research and development effort aimed at advancing DAVID's state-of-the-art performance in video intrusion detection. This paper describes a set of innovative enhancements of the DAVID sensor which serve to broaden its scope Of application, improve its performance and enhance its usability. Specifically, new DAVID algorithms have been designed to detect, classify and track intruders based on both horizontal and vertical components of intruder movement in the video image, to increase the probability of detection under all weather conditions and to reduce the nuisance alarm rate due to outdoor environmental disturbances.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122479398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Now to secure a mixed mode terminal teletex X.25 network 现在要保证一个混合模式的终端电传X.25网络
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.752001
M. Houthooft, H. Cnudde
{"title":"Now to secure a mixed mode terminal teletex X.25 network","authors":"M. Houthooft, H. Cnudde","doi":"10.1109/CCST.1989.752001","DOIUrl":"https://doi.org/10.1109/CCST.1989.752001","url":null,"abstract":"This paper gives a conceptual analysis of the protection of a network of PC workstations. It analyses the pro blematic of protection and suggests a rudimentary solution. The network described is an existing network in Belgium, however, because of security reasons it is not possible to give more information on the nature of this network. Nevertheless, this will not prevent us of describing an adequate security solution for this kind of network. The network itself is consisted of a number of PC work stations, connected through the packet-switched data network (X.25/TELETEX).","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130801651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remote identification and movement control techniques 远程识别和运动控制技术
Proceedings. International Carnahan Conference on Security Technology Pub Date : 1989-10-03 DOI: 10.1109/CCST.1989.751993
M. Jonckheere, M. Eng, P. Eng.
{"title":"Remote identification and movement control techniques","authors":"M. Jonckheere, M. Eng, P. Eng.","doi":"10.1109/CCST.1989.751993","DOIUrl":"https://doi.org/10.1109/CCST.1989.751993","url":null,"abstract":"A long standing requirement for the penitentiary services is the need to know the location of staff during an incident or when a personal duress alarm has been triggered. A second basic requirement is the ability to manage the movement of inmates inside the institutions. These requirements have generally been met through the use of post standards for the staff related functions, and control posts for the inmate movement control requirements. Alternate methods have been tried to automate this location identification process. Although the technology and concepts to track individuals or things have been refined recently, it has been shown that these techniques are not very effective in the indoor environment for applicationa which require a high degree of reliability and which cannot tolerate any time delays for information processing. The Correctional Service of Canada is embarking on a program to re-address these problems, and to develop new concepts and technologies in an effort to introduce remote identification and tracking techniques in an indoor environment. The purpose of the program is the development of a system which will be capable of identifying the location of every individual in a penal institution, to effect inmate counts, and to introduce a capability to manage the movements of the inmates which will be less intrusive than the existing methods, and which will allow the security staff to have more time to be reassigned to corrective and rehabilitative functions.","PeriodicalId":288105,"journal":{"name":"Proceedings. International Carnahan Conference on Security Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1989-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126810731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信