2008 IEEE Conference on Technologies for Homeland Security最新文献

筛选
英文 中文
Developing Critical/Dynamical Area Security with Dual-Surveillance/Radial-Ring Configured Networks 利用双监视/径向环配置网络开发关键/动态区域安全
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534457
L. Hsu
{"title":"Developing Critical/Dynamical Area Security with Dual-Surveillance/Radial-Ring Configured Networks","authors":"L. Hsu","doi":"10.1109/THS.2008.4534457","DOIUrl":"https://doi.org/10.1109/THS.2008.4534457","url":null,"abstract":"We prototype optimal-degree, bipartite SCADA networks, namely generalized honeycomb torus networks and spider-web networks, to provide real-time sightline-availability in critical infrastructure paths, where large passing cars can block the view of targeted objects. These network prototypes, i.e., generalized honeycomb torus (GHT) networks, spider-web (SW) networks, can offer both nodes' and edges' fault-tolerance and a processing order to help the network management. The SW network can also be used as a main skeleton to combine paths' SCADA networks into an area SCADA network, which can have greater response capability. Cellular wireless telecommunications can be networked as the spider-web network to promote communication quality. SW(6,n) can optimally offer dual-pair mutually independent hamiltonian paths (MIHP) for any pair of bipartite nodes, so that information transmitted in a specific route can be assigned special meanings like the hint motion between the pitcher and the catcher in the baseball game, cooperatively with the mechanism of dynamic authentication/authorization. Furthermore, because routes of signal transmission can be specifically arranged, the impact of environmental factors related to multipath effects can be calculated to promote transmission quality. The proof of such MIHP properties is introduced by combinatorial graph patterns, logical rules, and mathematical rules in this article.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131110060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
New Concepts in Intrusion Detection 入侵检测中的新概念
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534424
N. J. Meyerhoff
{"title":"New Concepts in Intrusion Detection","authors":"N. J. Meyerhoff","doi":"10.1109/THS.2008.4534424","DOIUrl":"https://doi.org/10.1109/THS.2008.4534424","url":null,"abstract":"This is a continuation of work presented in [1]. It appears possible to measure the Doppler frequency shift caused by radar impinging on blood pumped by the heart to infer the presence of a human in situations where other sensors cannot. This work is applicable to perimeter defense. The relation between the Doppler frequency shift and the pumping action of the heart was modeled mathematically. There is increasing interest in sending electromagnetic signals into the human body, not only for physical security but also for medical reasons [2] To estimate the detection range, propagation of a radar signal through the body is modeled. Input signal is dissipated primarily by scattering at organ interfaces, and attenuation in each organ. Scattering is caused by differences in the index of refraction at each interface. Scattering starts at the air-skin interface. In principal, the approach is valid for many radar frequencies, but high frequencies (GHz) are preferred. However, at these frequencies, significant signal attenuation is expected. Compromise frequencies are therefore being examined. Several hundred MHz might be a good alternative. In addition to examining different frequencies, different signal paths are being examined. Since the radar scans, its signal will enter at different parts of the body and therefore follow different paths, each of which will have a different attenuation. Body parts with expected low and high attenuations have been identified.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133740278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Based Information Sharing Between Emergency Operations Center 基于网络的应急行动中心信息共享
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534441
R. Chipman, R. Wuerfel
{"title":"Network Based Information Sharing Between Emergency Operations Center","authors":"R. Chipman, R. Wuerfel","doi":"10.1109/THS.2008.4534441","DOIUrl":"https://doi.org/10.1109/THS.2008.4534441","url":null,"abstract":"To respond effectively to major incidents, such as terrorist acts and natural disasters, emergency operation centers (EOC) must rely on collaboration and information sharing between multiple agencies and jurisdictions. However, local jurisdictions and states throughout the Nation find it difficult to share data and implement processes that span the different systems and organizations responsible for unified incident response. For example, adjacent counties often lack the means of sharing a common situational view of an evolving incident and their responses. Emerging internet technologies are key enablers for improving the timeliness and effectiveness of this unified response. This paper describes an ongoing initiative sponsored by the DHS, Science & Technology Directorate as part of the Regional Technology Initiative (RTT) that is employing EDXL, XMPP, Web Services and other advanced information technologies to interconnect cooperating EOCs in real time to improve their situational awareness and assist in coordinating their unified incident response. The paper discusses the architecture and technology incorporated in the framework, shows details of a demonstration of the system in the Seattle region, and discusses the significant advantages identified by the participating jurisdictions to date.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134253305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Facilitating Communication for First Responders Using Dynamic Distributed Constraint Optimization 使用动态分布式约束优化促进第一响应者的通信
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534470
R. N. Lass, W. Regli, A. Kaplan, M. Mitkus, J. Sim
{"title":"Facilitating Communication for First Responders Using Dynamic Distributed Constraint Optimization","authors":"R. N. Lass, W. Regli, A. Kaplan, M. Mitkus, J. Sim","doi":"10.1109/THS.2008.4534470","DOIUrl":"https://doi.org/10.1109/THS.2008.4534470","url":null,"abstract":"The establishment of a common operating picture through shared situation awareness is critical for the management of first responder operations. Situation awareness is the knowledge of the state and physical location of people, objects and terrain within an area of interest. First responder operations can be quite complex, involving the coordination of and collaboration among teams distributed over large areas. Adding to this complexity is the use of heterogeneous networks with diverse radios, traffic flows and applications. This paper describes some initial results using distributed constraint optimization (DCOP) techniques to facilitate situation awareness for first responders. A brief background on DCOP is presented, along with how DCOP can be applied to enable situation awareness. An example demonstrating the application of DCOP algorithms to a particular situation awareness problem is presented. Finally, some critical issues that arise when utilizing DCOP are described, along with some approaches to addressing these issues. By integrating these DCOP techniques with situation awareness tools, we believe that many of the information distribution, interoperability, and networking difficulties faced in the first responder environment can be overcome.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"34 Suppl 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123466266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Partial Multimedia Encryption with Different Security Levels 不同安全级别的部分多媒体加密
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534506
Yicong Zhou, K. Panetta, S. Aagaian
{"title":"Partial Multimedia Encryption with Different Security Levels","authors":"Yicong Zhou, K. Panetta, S. Aagaian","doi":"10.1109/THS.2008.4534506","DOIUrl":"https://doi.org/10.1109/THS.2008.4534506","url":null,"abstract":"This paper presents three multimedia encryption algorithms base on a new generalized P-gray code (GPGC) to protect the surveillance data in homeland security applications. The GPGC is a k-digital parametric sequence suitable for any base, n. It is also called the (n, k, p)-gray code where p is a parameter that allows the users to change the distance to yield different gray code sequences. The base n and parameter p as security keys have many options to make the encrypted multimedia difficult to decode. This allows the encrypted objects to be protected with high levels of security. The experimental results verify that the presented algorithms are lossless approaches and good at partial multimedia encryption. A method of measuring the percentage of image encryption is introduced and the measure results are also provided to quantify the encryption performance. Experiments demonstrate that the algorithms show good performance for the common attacks. Due to the low complexity of the algorithms, they are also suitable for real-time applications. The principles behind the presented solutions may be applied to various image, audio, and video systems.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129473427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Fast Modeling of Urban Plume Transport for Emergency Response and Preparedness 面向应急响应和准备的城市羽流快速建模
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534513
H.N. Lee
{"title":"Fast Modeling of Urban Plume Transport for Emergency Response and Preparedness","authors":"H.N. Lee","doi":"10.1109/THS.2008.4534513","DOIUrl":"https://doi.org/10.1109/THS.2008.4534513","url":null,"abstract":"We have developed a new approach for fast (i.e., low computational time) modeling the urban transport of atmospheric plume. New model concept by implementing an advanced Gaussian technique is described. For the test of model, comparisons of the model solutions with the EPA wind tunnel experimental measurements over a tall high-rise building are presented. It shows a good agreement between model calculations and experimental measurements. The new approach shows a promising and sets a framework for developing a fast Gaussian urban plume transport model that can be quickly used in emergency by the first responders worked in the cities. For the radiological event, we demonstrate the ease of analyses of radioactivity levels from the present model.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128286012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MANTIS Multi-Attribute Networked Terrorism Identification System; A Neural Paradigm for Fighting the Jihad MANTIS多属性网络恐怖主义识别系统对抗圣战的神经范式
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534418
S. Coerr
{"title":"MANTIS Multi-Attribute Networked Terrorism Identification System; A Neural Paradigm for Fighting the Jihad","authors":"S. Coerr","doi":"10.1109/THS.2008.4534418","DOIUrl":"https://doi.org/10.1109/THS.2008.4534418","url":null,"abstract":"The objective of this proposal is to demonstrate the feasibility and importance of creating an innovative class of multi-attribute behavior signatures. These behavior signatures will provide an invaluable tool to the warfighter for predicting, identifying, detecting, following, and anticipating the activities of members of transnational terrorist groups, whether state- sponsored or independent actors. The primary means of accomplishing this objective is through the identification of particular domestic and international behavior, followed by a correlation of this conduct to worldwide terrorist activities. The newly identified behavior signatures may then be applied to a searchable, multi-attribute, networked terrorism identification system (hereafter \"MANTIS\"). An application of this kind will be searchable, fungible, scalable and responsive, thereby leveraging disparate data streams and bases of knowledge and allowing the anticipation of enemy activities.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116524659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inter-LAN Socket Connection Manager (ILSCM) 局域网内插座连接管理器(ILSCM)
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534453
J. Valdivia, J. Gray
{"title":"Inter-LAN Socket Connection Manager (ILSCM)","authors":"J. Valdivia, J. Gray","doi":"10.1109/THS.2008.4534453","DOIUrl":"https://doi.org/10.1109/THS.2008.4534453","url":null,"abstract":"The Inter-LAN socket connection manager (ILSCM) is a Government Off-The-Shelf (GOTS) XML software utility thatInter-LAN socket connection manager performs bi-directional message validation and medium assurance guard functions. ILSCM is not tailored to any particular program needs. It is completely versatile and fully scaleable to support the needs of any XML-based system seeking an affordable message validation and access control guarding solution.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125328661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Perimeter Security on Detecting Acoustic Signature of Approaching Vehicle Using Nonlinear Neural Computation 基于非线性神经计算的临近车辆声特征检测周界安全
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534422
Bing Lu, A. Dibazar, T. Berger
{"title":"Perimeter Security on Detecting Acoustic Signature of Approaching Vehicle Using Nonlinear Neural Computation","authors":"Bing Lu, A. Dibazar, T. Berger","doi":"10.1109/THS.2008.4534422","DOIUrl":"https://doi.org/10.1109/THS.2008.4534422","url":null,"abstract":"We propose using a neurobiology-motivated prototype to detect approaching vehicles and to identify the type of vehicles for perimeter security. Acoustic sound of running vehicles is analyzed. Motivated by mammalian auditory cortex studies, the proposed detector processes both spectral and temporal components of input data. With the exact acoustic signature being unknown, a nonlinear Hebbian learning (NHL), one basic and appealing neural learning function found in human brain, is employed for unsupervised learning. This learning rule extracts representative independent features from the spectro-temporal ones and to reduce the dimensionality of the feature space. During learning, synaptic weights between input and output neurons are adaptively learned. Simulation results show that the proposed system can accurately extract critical features from original input data, and can achieve better performance under noisy environments than its counterparts. Additive white Gaussian noise and colored human vowel noise are mixed with vehicle sounds. For any vehicle recognition, the proposed system decreases the error rate to 3% with improvement 21 ~ 34% at signal-to-noise ratio (SNR)= 0 dB, and functions efficiently with error rate 7 ~ 8% at low SNR=-6 dB when its counterparts cannot work properly at this situation. Next for identifying four types of vehicles, the proposed method has workable performance 60 ~ 85% at low SNR= 0 dB and robust performance 80 ~ 100% at SNR= 5,10 dB.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126402594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Using Two-Way Datacasting to Deliver Real-Time Public Safety Information 利用双向数据广播传递实时公共安全信息
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534434
S. Valcourt, P. Datla, K. Chamberlin, B. McMahon
{"title":"Using Two-Way Datacasting to Deliver Real-Time Public Safety Information","authors":"S. Valcourt, P. Datla, K. Chamberlin, B. McMahon","doi":"10.1109/THS.2008.4534434","DOIUrl":"https://doi.org/10.1109/THS.2008.4534434","url":null,"abstract":"Datacasting involves the use of the excess bandwidth in a digital terrestrial television station's stream to deliver broadcasted data to a variety of receivers. Initially developed as a stationary fixed technology, this project involves receiving this broadcast in a mobile environment. This one-way transmission allows the datacast receiver to decouple data packets at a rate of up to 2.5 Mbps. Utilizing these data rates, various real-time applications can play a major role in placing information in the field where the existing low-speed data transmission methods in use today cannot. Researchers at the University of New Hampshire have already reported in various papers the successes achieved in datacasting in the mobile environment, an implementation that the original developers of datacasting had not intended. The introduction of two-way communication using multiple channels coordinated with datacasting has allowed the datacasting system to achieve real-time, asymmetric broadband communication in the mobile environment that is both cost-effective and viable for delivering critical data to the field in a timely and reliable fashion. This paper explains the technical concepts jointly engineered to deliver the two-way datacasting model, as well as highlights the results of prototype applications and devices installed in a mobile environment. Further, future challenges and enhancements of the technology are highlighted.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128793429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信