{"title":"Border Crossing Detection and Tracking through Localized Image Processing","authors":"A. Greenblatt, K. Panetta, S. Agaian","doi":"10.1109/THS.2008.4534473","DOIUrl":"https://doi.org/10.1109/THS.2008.4534473","url":null,"abstract":"The United States' borders are at risk and, due to their vast size, cannot possibly be monitored in their entirety by people at all hours of the day. Automated detection systems for border intrusion exist, but many of them require expensive electronics and lengthy installation procedures. This paper introduces a novel image processing algorithm that detects and tracks moving targets and, when coupled with infrared sensors, can detect temperature changes in the earth that may indicate paths being constructed for border-crossing under the surface. Intensive computer simulations show that the algorithm can also be adapted to automated vehicle control. The proposed algorithm can be implemented with commercial, off-the-shelf desktop computers and cameras, allowing for rapid deployment at low cost. Finally, use of Internet-enabled computers would allow a central command post to monitor the borders at all times and the algorithm could be combined with a simple system that automatically notifies command when a breach of the border occurs.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125711630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DS CDMA Radio Transmissions Detection","authors":"R. Katulski, J. Stefanski, R. Studanski, R. Was","doi":"10.1109/THS.2008.4534419","DOIUrl":"https://doi.org/10.1109/THS.2008.4534419","url":null,"abstract":"This paper presents two methods for detection DS CDMA signals hidden in the noise are described. The proposed methods are based on analysis of an averaged spectrum of the signal and an averaged spectrum of signal raised to the power 2n. These methods are difficult to use when narrowband signals are presented in an analysing frequency band. Influence of narrowband signals for the DS CDMA signals detection is shown. Simulation experimental results are provided to illustrate the approach. Experimental results with filtering interferences in the time domain and the in frequency domain are presented.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132541774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Searching using Sentence Context","authors":"A. Chickinsky","doi":"10.1109/THS.2008.4534428","DOIUrl":"https://doi.org/10.1109/THS.2008.4534428","url":null,"abstract":"Fusion centers have access to terra bytes of information from both businesses and federal, state and local governments. The information ranges from computer generated databases to collections of notes with transcript of interviews performed by law enforcement personnel. Searching notes and transcripts is difficult and time consuming because humans do not use a comment set of phrases. Phrases vary due to past experiences, origin of birth and generational differences. Search engines try to compensate for these differences by performing context searches. Context searches replace specific words in the search request with other predetermined words. One can reduce false positives with an intelligent search based on grammar and English sentence structure. Intelligent sentence searching converts the each document into a set of simple sentences using only words in the predefined dictionary. These simple sentences capture the essence of the document. The conversion methodology uses synonyms, idiomatic expressions, grammar, patterns of speech and word location to create a searchable index. Because of the limited dictionary and elimination of most ambiguities, searches can be free of false positives. This paper describes the sentence context methodology, examples, and test results for a representative law enforcement report.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"47-48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134082567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protecting Military Perimeters from Approaching Human and Vehicle Using Biologically Realistic Dynamic Synapse Neural Network","authors":"Hyung-Ook Park, A. Dibazar, T. Berger","doi":"10.1109/THS.2008.4534426","DOIUrl":"https://doi.org/10.1109/THS.2008.4534426","url":null,"abstract":"The goal of this study is to detect and classify approaching human threats or vehicles, e.g. suicide bombers nearing a secured zone such as military bases. More specifically, this research is focused on (i) developing a vibration recognition system that can detect systematic vibration events; the entity might be a medium, human, animal, or a passenger vehicle, and (ii) discriminating between such a series of events vs. background and a single vibration event, e.g., falling of a tree limb. We have employed a seismic sensor to detect vibrations generated by footsteps and vehicles. A geophone is an inexpensive sensor which provides easy and instant deployment as well as long range detection capability. We have also designed a low power, low noise, and low cost hardware solution to process seismic waves locally where the sensor is located and wireless capability of the system makes it to communicate with a remote command center. Temporal features of the vibration signals were modeled by the dynamic synapse neural network (DSNN) using data recorded in the deserts of Joshua Tree, CA. The system showed 1.7% false recognition rate for the recognition of human footsteps, 6.7% for vehicle, and 0.0% for background. The models were able to reject quadrupedal animal's footsteps (in this study a trained dog). The system rejected dog's footsteps with 0.02% false recognition rate.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115198637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Dual-Homed Fault-Tolerant Routing in Wireless Sensor Networks","authors":"N. Jain, V. Vokkarane, Jianping Wang","doi":"10.1109/THS.2008.4534499","DOIUrl":"https://doi.org/10.1109/THS.2008.4534499","url":null,"abstract":"One of the fundamental purpose of sensing information is to immediately respond to any anomalies. In order to make an accurate and cognizant decision, there is a great need for a fault-tolerant wireless sensor network. In this paper, we evaluate two categories of dual-homed routing for providing fault-tolerance in wireless sensor networks, namely dedicated dual-homed routing and shared dual-homed routing. We investigate two dedicated dual-homed routing techniques, namely 1+1 dual-homed routing and 1:1 dual-homed routing. We also develop shared dual-homed routing techniques, namely 1:2 dual-homed routing and 1:4 dual-homed routing. This paper investigates each technique's capability for providing fault-tolerance and its performance in terms of network lifetime, packet loss probability, end-to-end packet delay, and average throughput. Such an investigation will provide a comprehensive understanding about each proposed fault-tolerant technique. This will provide valuable insight for providing grade-of-protection in multi-layer wireless sensor networks by applying different techniques at different layers.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"2002 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116891617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Cargo Container Security during Transportation: A Mesh Networking Based Approach","authors":"Su Jin Kim, G. Deng, S.K.S. Gupta, M. Murphy-Hoye","doi":"10.1109/THS.2008.4534429","DOIUrl":"https://doi.org/10.1109/THS.2008.4534429","url":null,"abstract":"Cargo containers which transport 90 percent of the world's trade transit the countries of the world daily. Despite the vulnerability of cargo containers, only about 5 percent of the over 10 million cargo containers entering the U.S. each year can be inspected now. Our primary goal is to develop the smart container security system using RFID and Wireless Sensor Networks in order to enhance the cargo container security. In addition, the end-to-end visibility via this networked tracking and sensing capability can bring additional commercial benefits to supply chain and chain of custody. In this paper, we first propose a dynamic mesh container network among neighboring containers. Since a group of containers moves together, we can take advantages of interaction between them via this mesh container network instead of focusing an individual container. Second, we introduce the concept of Mobile Edge Computing Devices (MECD) which is the interface between distributed sensors and the end server in order to reduce processing and bandwidth requirements to the end servers. MECDs can give scalability, flexibility, reliability, and cost-efficiency to our cargo container security system.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121988800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Mil'shtein, A. Pillai, A. Shendye, C. Liessner, M. Baier
{"title":"Fingerprint Recognition Algorithms for Partial and Full Fingerprints","authors":"S. Mil'shtein, A. Pillai, A. Shendye, C. Liessner, M. Baier","doi":"10.1109/THS.2008.4534494","DOIUrl":"https://doi.org/10.1109/THS.2008.4534494","url":null,"abstract":"An urgent need to develop accurate biometric recognition system is expressed by governmental agencies at the local, state, and federal levels, as well as by private commercial companies. Fingerprinting is the most practical and widely used biometric technique. The pattern of ridges and valleys of each fingerprint is unique. The minutiae based algorithm is widely used for fingerprint authentication. One of the significant parts of this algorithm is the classification of fingerprints which allows minimizing significantly the number of fingerprints referenced for each identification procedure. However, the minutiae algorithm has some serious drawbacks. If the core of a fingerprint is not visible, then identification cannot proceed. Yet in some cases, partial fingerprints need to be identified. We recently developed a novel contactless line scanner for recognition of fingerprint pattern that converts a three dimensional object like a finger into a two dimensional image with minimal distortion. This novel imaging technique based on a line by line scanned image required the development of a new recognition algorithm. In this study, we propose two new algorithms. The first algorithm, called the spaced frequency transformation algorithm (SFTA), is based on taking the fast Fourier transform of the images. The second algorithm, called the line scan algorithm (LSA), was developed to compare partial fingerprints and reduce the time taken to compare full fingerprints. A combination of SFTA and LSA provides a very efficient recognition technique.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128404816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Highly Available Ad Hoc Surveillance Networks Based on Dropped Units","authors":"A. Wolff, S. Subik, C. Wietfeld","doi":"10.1109/THS.2008.4534435","DOIUrl":"https://doi.org/10.1109/THS.2008.4534435","url":null,"abstract":"In emergency situations like an attack on a building, public networks are not sufficiently reliable. Hence field forces, who want to share multimedia mission information, have to build up their own multi-hop wireless network. To build up these ad hoc networks, battery driven wireless nodes with meshing capability, called dropped units, present a new technology option for homeland security applications. To ensure sufficient coverage, an excessive usage of dropped units seems to be an obvious solution, but leads to undesired effects, such as interference. To solve this dilemma, rules to find an optimal number of dropped units are presented in this paper. To derive guidelines for this, realistic homeland security scenarios were analyzed. A dedicated simulation environment provided a reliable prediction of the required number of dropped units. We analyzed the communication link of moving or movable wireless clients like surveillance and first responder's devices. The simulation results lead to the conclusion that with a limited number of dropped units a practically 100% network availability can be achieved.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"220 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130484620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Pfeiffer, M. Ávila, G. Backfried, N. Pfannerer, J. Riedler
{"title":"Next Generation Data Fusion Open Source Intelligence (OSINT) System Based on MPEG7","authors":"M. Pfeiffer, M. Ávila, G. Backfried, N. Pfannerer, J. Riedler","doi":"10.1109/THS.2008.4534420","DOIUrl":"https://doi.org/10.1109/THS.2008.4534420","url":null,"abstract":"We describe the Sail Labs Media Mining System which is capable of processing vast amounts of data typically gathered from open sources in unstructured form. The data are processed by a set of components and the output is produced in MPEG7 format. The origin and kind of input may be as diverse as a set of satellite receivers monitoring TV stations or textual input from web-pages or RSS-feeds. A sequence of processing steps analyzing the audio, video and textual content of the input is carried out. The resulting output is made available for search and retrieval, analysis and visualization on a next generation Media Mining Server. Access to the system is web-based; the system can serve as a search platform across open, closed or secured networks. Data may also be extracted and exported and thus be made available in airgap networks. The Media Mining System can be used as a tool for situational awareness, information sharing and risk assessment.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125491111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Associating Moving Objects Across Non-overlapping Cameras: A Query-by-Example Approach","authors":"I. Cohen, Yunqian Ma, B. Miller","doi":"10.1109/THS.2008.4534515","DOIUrl":"https://doi.org/10.1109/THS.2008.4534515","url":null,"abstract":"In this paper we present a query by example approach for tracking people across non overlapping cameras. The method proposed is based on the use of a multi-dimensional feature vector and its covariance, defining an appearance model of every detected moving region in the network of cameras. The model uses relative pixel position, color and gradients descriptors of each detected object. Association of objects across non-overlapping cameras is performed by matching appearance of selected object with past observations. Availability of tracking within every camera can further improve the accuracy of such association by matching several targets appearance models with detected regions. For this purpose we present an automatic clustering technique allowing to build a multi-valued appearance model from a collection of covariance matrices. The proposed approach does not require geometric or colorimetric calibration of the cameras. We will illustrate the method for tracking people and objects in relatively crowded indoor scenes.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121433033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}