2008 IEEE Conference on Technologies for Homeland Security最新文献

筛选
英文 中文
Border Crossing Detection and Tracking through Localized Image Processing 基于局部图像处理的边界检测与跟踪
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534473
A. Greenblatt, K. Panetta, S. Agaian
{"title":"Border Crossing Detection and Tracking through Localized Image Processing","authors":"A. Greenblatt, K. Panetta, S. Agaian","doi":"10.1109/THS.2008.4534473","DOIUrl":"https://doi.org/10.1109/THS.2008.4534473","url":null,"abstract":"The United States' borders are at risk and, due to their vast size, cannot possibly be monitored in their entirety by people at all hours of the day. Automated detection systems for border intrusion exist, but many of them require expensive electronics and lengthy installation procedures. This paper introduces a novel image processing algorithm that detects and tracks moving targets and, when coupled with infrared sensors, can detect temperature changes in the earth that may indicate paths being constructed for border-crossing under the surface. Intensive computer simulations show that the algorithm can also be adapted to automated vehicle control. The proposed algorithm can be implemented with commercial, off-the-shelf desktop computers and cameras, allowing for rapid deployment at low cost. Finally, use of Internet-enabled computers would allow a central command post to monitor the borders at all times and the algorithm could be combined with a simple system that automatically notifies command when a breach of the border occurs.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125711630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
DS CDMA Radio Transmissions Detection DS CDMA无线电传输检测
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534419
R. Katulski, J. Stefanski, R. Studanski, R. Was
{"title":"DS CDMA Radio Transmissions Detection","authors":"R. Katulski, J. Stefanski, R. Studanski, R. Was","doi":"10.1109/THS.2008.4534419","DOIUrl":"https://doi.org/10.1109/THS.2008.4534419","url":null,"abstract":"This paper presents two methods for detection DS CDMA signals hidden in the noise are described. The proposed methods are based on analysis of an averaged spectrum of the signal and an averaged spectrum of signal raised to the power 2n. These methods are difficult to use when narrowband signals are presented in an analysing frequency band. Influence of narrowband signals for the DS CDMA signals detection is shown. Simulation experimental results are provided to illustrate the approach. Experimental results with filtering interferences in the time domain and the in frequency domain are presented.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132541774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Intelligent Searching using Sentence Context 基于句子上下文的智能搜索
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534428
A. Chickinsky
{"title":"Intelligent Searching using Sentence Context","authors":"A. Chickinsky","doi":"10.1109/THS.2008.4534428","DOIUrl":"https://doi.org/10.1109/THS.2008.4534428","url":null,"abstract":"Fusion centers have access to terra bytes of information from both businesses and federal, state and local governments. The information ranges from computer generated databases to collections of notes with transcript of interviews performed by law enforcement personnel. Searching notes and transcripts is difficult and time consuming because humans do not use a comment set of phrases. Phrases vary due to past experiences, origin of birth and generational differences. Search engines try to compensate for these differences by performing context searches. Context searches replace specific words in the search request with other predetermined words. One can reduce false positives with an intelligent search based on grammar and English sentence structure. Intelligent sentence searching converts the each document into a set of simple sentences using only words in the predefined dictionary. These simple sentences capture the essence of the document. The conversion methodology uses synonyms, idiomatic expressions, grammar, patterns of speech and word location to create a searchable index. Because of the limited dictionary and elimination of most ambiguities, searches can be free of false positives. This paper describes the sentence context methodology, examples, and test results for a representative law enforcement report.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"47-48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134082567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Protecting Military Perimeters from Approaching Human and Vehicle Using Biologically Realistic Dynamic Synapse Neural Network 利用生物逼真的动态突触神经网络保护军事边界免受人类和车辆接近
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534426
Hyung-Ook Park, A. Dibazar, T. Berger
{"title":"Protecting Military Perimeters from Approaching Human and Vehicle Using Biologically Realistic Dynamic Synapse Neural Network","authors":"Hyung-Ook Park, A. Dibazar, T. Berger","doi":"10.1109/THS.2008.4534426","DOIUrl":"https://doi.org/10.1109/THS.2008.4534426","url":null,"abstract":"The goal of this study is to detect and classify approaching human threats or vehicles, e.g. suicide bombers nearing a secured zone such as military bases. More specifically, this research is focused on (i) developing a vibration recognition system that can detect systematic vibration events; the entity might be a medium, human, animal, or a passenger vehicle, and (ii) discriminating between such a series of events vs. background and a single vibration event, e.g., falling of a tree limb. We have employed a seismic sensor to detect vibrations generated by footsteps and vehicles. A geophone is an inexpensive sensor which provides easy and instant deployment as well as long range detection capability. We have also designed a low power, low noise, and low cost hardware solution to process seismic waves locally where the sensor is located and wireless capability of the system makes it to communicate with a remote command center. Temporal features of the vibration signals were modeled by the dynamic synapse neural network (DSNN) using data recorded in the deserts of Joshua Tree, CA. The system showed 1.7% false recognition rate for the recognition of human footsteps, 6.7% for vehicle, and 0.0% for background. The models were able to reject quadrupedal animal's footsteps (in this study a trained dog). The system rejected dog's footsteps with 0.02% false recognition rate.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115198637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Performance Analysis of Dual-Homed Fault-Tolerant Routing in Wireless Sensor Networks 无线传感器网络中双主容错路由性能分析
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534499
N. Jain, V. Vokkarane, Jianping Wang
{"title":"Performance Analysis of Dual-Homed Fault-Tolerant Routing in Wireless Sensor Networks","authors":"N. Jain, V. Vokkarane, Jianping Wang","doi":"10.1109/THS.2008.4534499","DOIUrl":"https://doi.org/10.1109/THS.2008.4534499","url":null,"abstract":"One of the fundamental purpose of sensing information is to immediately respond to any anomalies. In order to make an accurate and cognizant decision, there is a great need for a fault-tolerant wireless sensor network. In this paper, we evaluate two categories of dual-homed routing for providing fault-tolerance in wireless sensor networks, namely dedicated dual-homed routing and shared dual-homed routing. We investigate two dedicated dual-homed routing techniques, namely 1+1 dual-homed routing and 1:1 dual-homed routing. We also develop shared dual-homed routing techniques, namely 1:2 dual-homed routing and 1:4 dual-homed routing. This paper investigates each technique's capability for providing fault-tolerance and its performance in terms of network lifetime, packet loss probability, end-to-end packet delay, and average throughput. Such an investigation will provide a comprehensive understanding about each proposed fault-tolerant technique. This will provide valuable insight for providing grade-of-protection in multi-layer wireless sensor networks by applying different techniques at different layers.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"2002 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116891617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Enhancing Cargo Container Security during Transportation: A Mesh Networking Based Approach 提高集装箱运输过程中的安全性:一种基于网状网络的方法
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534429
Su Jin Kim, G. Deng, S.K.S. Gupta, M. Murphy-Hoye
{"title":"Enhancing Cargo Container Security during Transportation: A Mesh Networking Based Approach","authors":"Su Jin Kim, G. Deng, S.K.S. Gupta, M. Murphy-Hoye","doi":"10.1109/THS.2008.4534429","DOIUrl":"https://doi.org/10.1109/THS.2008.4534429","url":null,"abstract":"Cargo containers which transport 90 percent of the world's trade transit the countries of the world daily. Despite the vulnerability of cargo containers, only about 5 percent of the over 10 million cargo containers entering the U.S. each year can be inspected now. Our primary goal is to develop the smart container security system using RFID and Wireless Sensor Networks in order to enhance the cargo container security. In addition, the end-to-end visibility via this networked tracking and sensing capability can bring additional commercial benefits to supply chain and chain of custody. In this paper, we first propose a dynamic mesh container network among neighboring containers. Since a group of containers moves together, we can take advantages of interaction between them via this mesh container network instead of focusing an individual container. Second, we introduce the concept of Mobile Edge Computing Devices (MECD) which is the interface between distributed sensors and the end server in order to reduce processing and bandwidth requirements to the end servers. MECDs can give scalability, flexibility, reliability, and cost-efficiency to our cargo container security system.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121988800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Fingerprint Recognition Algorithms for Partial and Full Fingerprints 部分指纹和全指纹的指纹识别算法
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534494
S. Mil'shtein, A. Pillai, A. Shendye, C. Liessner, M. Baier
{"title":"Fingerprint Recognition Algorithms for Partial and Full Fingerprints","authors":"S. Mil'shtein, A. Pillai, A. Shendye, C. Liessner, M. Baier","doi":"10.1109/THS.2008.4534494","DOIUrl":"https://doi.org/10.1109/THS.2008.4534494","url":null,"abstract":"An urgent need to develop accurate biometric recognition system is expressed by governmental agencies at the local, state, and federal levels, as well as by private commercial companies. Fingerprinting is the most practical and widely used biometric technique. The pattern of ridges and valleys of each fingerprint is unique. The minutiae based algorithm is widely used for fingerprint authentication. One of the significant parts of this algorithm is the classification of fingerprints which allows minimizing significantly the number of fingerprints referenced for each identification procedure. However, the minutiae algorithm has some serious drawbacks. If the core of a fingerprint is not visible, then identification cannot proceed. Yet in some cases, partial fingerprints need to be identified. We recently developed a novel contactless line scanner for recognition of fingerprint pattern that converts a three dimensional object like a finger into a two dimensional image with minimal distortion. This novel imaging technique based on a line by line scanned image required the development of a new recognition algorithm. In this study, we propose two new algorithms. The first algorithm, called the spaced frequency transformation algorithm (SFTA), is based on taking the fast Fourier transform of the images. The second algorithm, called the line scan algorithm (LSA), was developed to compare partial fingerprints and reduce the time taken to compare full fingerprints. A combination of SFTA and LSA provides a very efficient recognition technique.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128404816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Performance Analysis of Highly Available Ad Hoc Surveillance Networks Based on Dropped Units 基于丢弃单元的高可用Ad Hoc监控网络性能分析
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534435
A. Wolff, S. Subik, C. Wietfeld
{"title":"Performance Analysis of Highly Available Ad Hoc Surveillance Networks Based on Dropped Units","authors":"A. Wolff, S. Subik, C. Wietfeld","doi":"10.1109/THS.2008.4534435","DOIUrl":"https://doi.org/10.1109/THS.2008.4534435","url":null,"abstract":"In emergency situations like an attack on a building, public networks are not sufficiently reliable. Hence field forces, who want to share multimedia mission information, have to build up their own multi-hop wireless network. To build up these ad hoc networks, battery driven wireless nodes with meshing capability, called dropped units, present a new technology option for homeland security applications. To ensure sufficient coverage, an excessive usage of dropped units seems to be an obvious solution, but leads to undesired effects, such as interference. To solve this dilemma, rules to find an optimal number of dropped units are presented in this paper. To derive guidelines for this, realistic homeland security scenarios were analyzed. A dedicated simulation environment provided a reliable prediction of the required number of dropped units. We analyzed the communication link of moving or movable wireless clients like surveillance and first responder's devices. The simulation results lead to the conclusion that with a limited number of dropped units a practically 100% network availability can be achieved.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130484620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Next Generation Data Fusion Open Source Intelligence (OSINT) System Based on MPEG7 基于MPEG7的下一代数据融合开源智能(OSINT)系统
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534420
M. Pfeiffer, M. Ávila, G. Backfried, N. Pfannerer, J. Riedler
{"title":"Next Generation Data Fusion Open Source Intelligence (OSINT) System Based on MPEG7","authors":"M. Pfeiffer, M. Ávila, G. Backfried, N. Pfannerer, J. Riedler","doi":"10.1109/THS.2008.4534420","DOIUrl":"https://doi.org/10.1109/THS.2008.4534420","url":null,"abstract":"We describe the Sail Labs Media Mining System which is capable of processing vast amounts of data typically gathered from open sources in unstructured form. The data are processed by a set of components and the output is produced in MPEG7 format. The origin and kind of input may be as diverse as a set of satellite receivers monitoring TV stations or textual input from web-pages or RSS-feeds. A sequence of processing steps analyzing the audio, video and textual content of the input is carried out. The resulting output is made available for search and retrieval, analysis and visualization on a next generation Media Mining Server. Access to the system is web-based; the system can serve as a search platform across open, closed or secured networks. Data may also be extracted and exported and thus be made available in airgap networks. The Media Mining System can be used as a tool for situational awareness, information sharing and risk assessment.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125491111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Associating Moving Objects Across Non-overlapping Cameras: A Query-by-Example Approach 跨非重叠摄像机关联移动对象:按例查询方法
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534515
I. Cohen, Yunqian Ma, B. Miller
{"title":"Associating Moving Objects Across Non-overlapping Cameras: A Query-by-Example Approach","authors":"I. Cohen, Yunqian Ma, B. Miller","doi":"10.1109/THS.2008.4534515","DOIUrl":"https://doi.org/10.1109/THS.2008.4534515","url":null,"abstract":"In this paper we present a query by example approach for tracking people across non overlapping cameras. The method proposed is based on the use of a multi-dimensional feature vector and its covariance, defining an appearance model of every detected moving region in the network of cameras. The model uses relative pixel position, color and gradients descriptors of each detected object. Association of objects across non-overlapping cameras is performed by matching appearance of selected object with past observations. Availability of tracking within every camera can further improve the accuracy of such association by matching several targets appearance models with detected regions. For this purpose we present an automatic clustering technique allowing to build a multi-valued appearance model from a collection of covariance matrices. The proposed approach does not require geometric or colorimetric calibration of the cameras. We will illustrate the method for tracking people and objects in relatively crowded indoor scenes.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121433033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信