1994 Proceedings of IEEE International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
Low cost image transmission system 低成本图像传输系统
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363790
D. Skogmo
{"title":"Low cost image transmission system","authors":"D. Skogmo","doi":"10.1109/CCST.1994.363790","DOIUrl":"https://doi.org/10.1109/CCST.1994.363790","url":null,"abstract":"Throughout the Department of Energy (DOE) complex, sites protect themselves with intrusion detection systems Some of these systems have sensors in remote areas. These sensors frequently alarm-not because they have detected a terrorist skulking around the area, but because they have detected a horse, or a dog, or a bush moving in the breeze. Even though the local security force is 99% sure there is no real threat, they must assess each of these nuisance or false alarms. Generally, the procedure consists of dispatching an inspector to drive to the area and make an assessment. This is expensive in terms of manpower and the assessment is not timely. Often, by the time the inspector arrives, the cause of the alarm has vanished. A television camera placed to view the area protected by the sensor could be used to help in this assessment, but this requires the installation of high-quality cable, optical fiber, or a microwave link. Further, to be of use at the present time, the site must have had the foresight to have installed these facilities in the past and have them ready for use now. What is needed is a device to place between the television camera and a modem connecting to a low-bandwidth channel such as radio or a telephone line. This paper discusses the development of such a device: an Image Transmission System, or ITS.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133885859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some advantages gained by sharing the capabilities of the security system with site operations (U) 通过与现场操作共享安全系统的功能而获得的一些优势(U)
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363795
M. Brinton
{"title":"Some advantages gained by sharing the capabilities of the security system with site operations (U)","authors":"M. Brinton","doi":"10.1109/CCST.1994.363795","DOIUrl":"https://doi.org/10.1109/CCST.1994.363795","url":null,"abstract":"Security control and communication systems have become capable, powerful, and very expensive. Oftentimes the security function has been seen by site operations as not only a bother but also a competitor for scarce funds. We recognized a non-security problem being faced by operations, namely providing a precise system of emergency accountability of evacuated personnel under tight cost and schedule constraints. Our security control system could do this as an extension of its logical presence attendance function without degrading its security posture. By a combination of willingness, resourcefulness, and energy the security community extended and modified the security control and communication system within its basic capabilities. Operations' need was met, cost and schedule constraints were observed, and the security function became a tangible resource to benefit operations. Additional ways are being investigated to provide more benefits to operations by making use of the enrolment database and access control capabilities of the security control system. Some modifications made to the security system promise to improve effectiveness of the security function as a bonus.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123547173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sticky foam technology for less-than-lethal force situations 粘性泡沫技术适用于非致命情况
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363780
T. Goolsby
{"title":"Sticky foam technology for less-than-lethal force situations","authors":"T. Goolsby","doi":"10.1109/CCST.1994.363780","DOIUrl":"https://doi.org/10.1109/CCST.1994.363780","url":null,"abstract":"Sticky foam is an extremely tacky, tenacious material used to entangle and impair an individual. It was developed at Sandia National Laboratories (SNL) in the late 1970's for usage in nuclear safeguards and security applications. In late 1992, the National Institute of Justice (NIJ), the research arm of the Department of Justice, began a project with SNL to determine the applicability of sticky foam for law enforcement usage. The objectives of the project were to develop a dispenser capable of firing sticky foam, to conduct an extensive toxicology review of sticky foam (formulation SF-283), to test the developed dispenser and sticky foam effectiveness on SNL volunteers acting out prison and law enforcement scenarios, and to have the dispenser and sticky foam further evaluated by correctional representatives. This paper discusses the results of the project.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127599859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Advantages of redeployable and relocatable security systems 可重新部署和可重新定位的安全系统的优点
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363770
A. Birch
{"title":"Advantages of redeployable and relocatable security systems","authors":"A. Birch","doi":"10.1109/CCST.1994.363770","DOIUrl":"https://doi.org/10.1109/CCST.1994.363770","url":null,"abstract":"We describe Rapid Deployment Intrusion Detection System (RDIDS), and Relocatable Intrusion Detection System (RIDS) systems which can be designed for operation in any weather conditions. They are impervious to salt air, chemical and most explosive environments, and are highly resistant to nuisance and false alarms. Therefore, RDIDS and RIDS have the flexibility needed for urban, rural and remote installations. RDIDS was developed in the 90's, with the encouragement of TRW, for the US Air Defense System in Cape Kennedy, Florida, Fort Hood, Texas and more recently for the D.O.E. Strategic petroleum Reserve sites. These systems utilize photovoltaic power as their primary source of energy with twelve-hour battery backup. Security systems can be integrated with Radio Frequency (RF) polling transceivers operating in the VHF or UHF range. Further, RDIDS can be engineered to interface with fiber optic technology, thereby ensuring quality transmission in rural environments. Fiber optic cable integration has proven its effectiveness in outdoor environments as a reliable transmission source when using CCTV cameras. The fiber optic module can be used for monitoring the tamper and alarm circuits as well as video transmission. These technologies offer additional flexibility and substantial cash savings when compared to hard-wired installations. RDIDS can be deployed for a wide variety of special applications and can be operational in a fraction of the time required for conventional systems.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122996194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Synergism in outdoor video illumination, intrusion detection and assessment 协同户外视频照明,入侵检测和评估
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363798
M. Maki
{"title":"Synergism in outdoor video illumination, intrusion detection and assessment","authors":"M. Maki","doi":"10.1109/CCST.1994.363798","DOIUrl":"https://doi.org/10.1109/CCST.1994.363798","url":null,"abstract":"This paper reviews the basic considerations in outdoor video intrusion detection and assessment systems and outlines some recent advances to enhance their performance. The background elements of system design including, for example camera siting, lighting options and specific site features of the perimeter are reviewed and related to both detection and assessment needs. The principles and features provided by electronic detection systems will also be reviewed relative to the security needs. Finally a new advancement, a synergistic combination of illumination, camera, and detection system will be described. This utilizes a 'Video Post' camera and infra-red (IR) illumination package, and the David 300 intrusion detection sensor.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133697337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
RAOPS: resource allocation optimization program for safeguards 保障资源配置优化程序
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363776
A. Zardecki, J. Markin
{"title":"RAOPS: resource allocation optimization program for safeguards","authors":"A. Zardecki, J. Markin","doi":"10.1109/CCST.1994.363776","DOIUrl":"https://doi.org/10.1109/CCST.1994.363776","url":null,"abstract":"RAOPS (Resource Allocation Optimization Program for Safeguards) is extended to a multiobjective return function having the detection probability and expected detection time as criteria. The expected detection time is included as a constraint, based on the well-known Avenhaus model of the optimum number of inventory periods. Examples of computation are provided.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122268315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intruder detection system by image processing 采用图像处理的入侵者检测系统
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363799
T. Takano, K. Ushita, N. Aoyama, S. Ikeda, I. Nishimura
{"title":"Intruder detection system by image processing","authors":"T. Takano, K. Ushita, N. Aoyama, S. Ikeda, I. Nishimura","doi":"10.1109/CCST.1994.363799","DOIUrl":"https://doi.org/10.1109/CCST.1994.363799","url":null,"abstract":"The Police Communications Research Center has developed an Intruder Detection System using an image processing technique. The system can automatically give an alarm when it detects intruders in images taken with a surveillance TV camera. It allows easy construction of surveillance support systems with high degree of reliability, and reduces burdens for surveillance.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127979844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Claude Shannon's cryptography research during World War II and the mathematical theory of communication 克劳德·香农在二战期间的密码学研究和通信的数学理论
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363804
E. Rogers
{"title":"Claude Shannon's cryptography research during World War II and the mathematical theory of communication","authors":"E. Rogers","doi":"10.1109/CCST.1994.363804","DOIUrl":"https://doi.org/10.1109/CCST.1994.363804","url":null,"abstract":"Dr. Claude E. Shannon, the eminent mathematician and electrical engineer at Bell Labs., worked on cryptographic research from 1940 to 1945. He proved mathematically that the SIGSALY coding system linking the U.S. President with Prime Minister Winston Churchill by radio-telephone could not be broken by the Germans. As part of the same activity at a theoretical level, Shannon developed the mathematical theory of communication, published in 1948, which was to become the root paradigm for the emerging field of communication study.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127607000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Automated fingerprint identification system (AFIS) benchmarking using the National Institute of Standards and Technology (NIST) Special Database 4 使用美国国家标准与技术研究院(NIST)特殊数据库进行自动指纹识别系统(AFIS)基准测试
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363768
R. Khanna, W. Shen
{"title":"Automated fingerprint identification system (AFIS) benchmarking using the National Institute of Standards and Technology (NIST) Special Database 4","authors":"R. Khanna, W. Shen","doi":"10.1109/CCST.1994.363768","DOIUrl":"https://doi.org/10.1109/CCST.1994.363768","url":null,"abstract":"The recent growth in the number of products that use fingerprint matching technology has spawned a need for appropriate evaluation methods. We propose a set of benchmarks based on NIST Special Database 4 to support the evaluation of fingerprint matching technology. The approach used to develop the benchmark parameters and performance measurement methods are discussed. Benchmark parameters were established with members of the law enforcement community. Characteristics that typically affect fingerprint matching algorithm performance are observed and measured. Variation of matcher performance due to these characteristics, and others, indicates a need for standard data (NIST Special Database 4) when comparing algorithm performance. Benchmark parameter measurements using the United Kingdom Home Office HO-39 fingerprint matching algorithm and a Sun SPARC 10 are provided. Analysis of benchmark results provides insight into matcher performance. An example demonstrates how the benchmarks may be used.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122119935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Synergistic radar: novel applications and performance 协同雷达:新的应用和性能
1994 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1994-10-12 DOI: 10.1109/CCST.1994.363800
A. Gagnon, M. Frechette
{"title":"Synergistic radar: novel applications and performance","authors":"A. Gagnon, M. Frechette","doi":"10.1109/CCST.1994.363800","DOIUrl":"https://doi.org/10.1109/CCST.1994.363800","url":null,"abstract":"Instantel has introduced the technology of synergistic radar as an outdoor perimeter security sensor. The system detects humans moving in proximity to a distributed antenna cable by monitoring disturbances to commercial FM radio signals. We present results of long-term beta testing (including environmental effects of the harsh Canadian winter) for rooftop and surface applications. Emphasis is placed on site particularities and the treatment of site impairments for rooftop applications. The synergistic radar technology also presents a wide variety of detection techniques beyond simple perimeter sensing. Test results for unique applications arising from the use of a single sensor cable are also described. Finally, the synergistic radar technology is open to a completely new application where the distributed antenna cable is replaced by a metal object such as a vehicle. The object acts as an antenna sensor to detect intrusion attempts.<<ETX>>","PeriodicalId":314758,"journal":{"name":"1994 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1994-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125234462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信