2008 IEEE Conference on Technologies for Homeland Security最新文献

筛选
英文 中文
Wireless Medical Sensor Networks in Emergency Response: Implementation and Pilot Results 应急响应中的无线医疗传感器网络:实施和试验结果
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534447
Tia Gao, C. Pesto, L. Selavo, Yin Chen, JeongGil Ko, Jong Hyun Lim, A. Terzis, A. Watt, J. Jeng, Bor-rong Chen, K. Lorincz, M. Welsh
{"title":"Wireless Medical Sensor Networks in Emergency Response: Implementation and Pilot Results","authors":"Tia Gao, C. Pesto, L. Selavo, Yin Chen, JeongGil Ko, Jong Hyun Lim, A. Terzis, A. Watt, J. Jeng, Bor-rong Chen, K. Lorincz, M. Welsh","doi":"10.1109/THS.2008.4534447","DOIUrl":"https://doi.org/10.1109/THS.2008.4534447","url":null,"abstract":"This project demonstrates the feasibility of using cost- effective, flexible, and scalable sensor networks to address critical bottlenecks of the emergency response process. For years, emergency medical service providers conducted patient care by manually measuring vital signs, documenting assessments on paper, and communicating over handheld radios. When disasters occurred, the large numbers of casualties quickly and easily overwhelmed the responders. Collaboration with EMS and hospitals in the Baltimore Washington Metropolitan region prompted us to develop miTag (medical information tag), a cost- effective wireless sensor platform that automatically track patients throughout each step of the disaster response process, from disaster scenes, to ambulances, to hospitals. The miTag is a highly extensible platform that supports a variety of sensor add-ons - GPS, pulse oximetry, blood pressure, temperature, ECG - and relays data over a self-organizing wireless mesh network Scalability is the distinguishing characteristic of miTag: its wireless network scales across a wide range of network densities, from sparse hospital network deployments to very densely populated mass casualty sites. The miTag system is out-of-the-box operational and includes the following key technologies: 1) cost-effective sensor hardware, 2) self-organizing wireless network and 3) scalable server software that analyzes sensor data and delivers real-time updates to handheld devices and web portals. The system has evolved through multiple iterations of development and pilot deployments to become an effective patient monitoring solution. A pilot conducted with the Department of Homeland Security indicates miTags can increase the patient care capacity of responders in the field A pilot at Washington Hospital showed miTags are capable of reliably transmitting data inside radio-interference-rich critical care settings.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127105292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 244
Novel Trace Chemical Detection Technologies for Homeland Security 用于国土安全的新型微量化学检测技术
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534449
A. Staubs, M. S. Matyjaszczyk
{"title":"Novel Trace Chemical Detection Technologies for Homeland Security","authors":"A. Staubs, M. S. Matyjaszczyk","doi":"10.1109/THS.2008.4534449","DOIUrl":"https://doi.org/10.1109/THS.2008.4534449","url":null,"abstract":"Trace chemical detection issues relevant to Homeland Security (HS), specifically to the detection of chemical warfare agents (CWAs), biological species, and high explosives are discussed. A special attention is paid to the ion mobility spectrometry, its improved version, field compensated ion mobility spectrometry (known also as FIS, FAIMS, microDMxtrade, and DMS), and mass spectrometry. Sampling and analysis scenarios are discussed with special emphasis on the ways to prevent positive and negative false alarms, like through 'doping', for example. Possible explanations of false negatives and ways of their prevention as well as the detection of well hidden explosives are discussed. Reasons for the X-ray screening being the primary and the trace chemical detection-the secondary screening methodology at airports are explained. Sampling; pyrolysis/ volatilization of sample; transfer of volatilized sample, and its ionization; transfer of ions, their separation, and detection are discussed, and the ways of improvement proposed. Advantages and disadvantages of multipeak detection are presented. A comeback of mass spectrometry is observed with instruments being miniaturized and equipped with innovative ionization sources which should make sampling easier and detection more specific. Importance of the miniaturization of the transportation security instrumentation is stressed. A confirmational analysis is suggested as another important tool in the prevention of false negatives and positives, especially when the multipeak detection is not possible. A new detection system, consisting of the miniaturized FAIMS and mass spectrometer is proposed as the sensitive, specific, portable and rapid response trace chemical detection system for Homeland Security applications.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123778370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improving Watchlist Screening By Combining Evidence From Multiple Search Algorithms 结合多种搜索算法的证据改进监视名单筛选
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534432
Keith J. Miller
{"title":"Improving Watchlist Screening By Combining Evidence From Multiple Search Algorithms","authors":"Keith J. Miller","doi":"10.1109/THS.2008.4534432","DOIUrl":"https://doi.org/10.1109/THS.2008.4534432","url":null,"abstract":"In this paper, we describe a metasearch tool resulting from experiments in aggregating the results of different name matching algorithms on a knowledge- intensive multicultural name matching task. Three retrieval engines that match Romanized names were tested on a noisy and predominantly Arabic dataset. One is based on a generic string matching algorithm; another is designed specifically for Arabic names; and the third makes use of culturally-specific matching strategies for multiple cultures. We show that even a relatively naive method for aggregating results significantly increased effectiveness over each of the individual algorithms, resulting in nearly tripling the F-score of the worst-performing algorithm included in the aggregate, and in a 6 point improvement in F-score over the single best-performing algorithm included.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131306338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Virtual Cyber-Security Testing Capability for Large Scale Distributed Information Infrastructure Protection 面向大规模分布式信息基础设施防护的虚拟网络安全测试能力
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534480
Perry Pederson, David Lee, Guoqiang Shu, Dongluo Chen, Zhijun Liu, Na Li, Lifeng Sang
{"title":"Virtual Cyber-Security Testing Capability for Large Scale Distributed Information Infrastructure Protection","authors":"Perry Pederson, David Lee, Guoqiang Shu, Dongluo Chen, Zhijun Liu, Na Li, Lifeng Sang","doi":"10.1109/THS.2008.4534480","DOIUrl":"https://doi.org/10.1109/THS.2008.4534480","url":null,"abstract":"Security, reliability and interoperability are indispensable in today's distributed heterogeneous information infrastructure. For government and military applications, it is crucial to conduct effective and efficient testing of security properties for newly developed systems, which are to be integrated into existing information system. Yet little progress has been made in the technology advancement of rigorous and automated security testing. In this contribution we present virtual cyber security testing capability (VCSTC) - a DoD funded project-for developing an automated testing capability that can assess the operational functions and security impact of a target system without physically integrating it into an intended network infrastructure. VCSTC first synthesizes a model to emulate the real network infrastructure; then it automatically generates and executes test cases with guaranteed coverage of the features and security properties under test. This report presents the architecture of VCSTC, its key techniques and experimental results on real systems.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126394406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Energy Calibration Algorithms for the Multiple Isotope Material Basis Set (MIMBS) Isotope Identification Method 多同位素物质基集(MIMBS)同位素识别方法的能量校准算法
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534415
R. Estep, B. Sapp
{"title":"Energy Calibration Algorithms for the Multiple Isotope Material Basis Set (MIMBS) Isotope Identification Method","authors":"R. Estep, B. Sapp","doi":"10.1109/THS.2008.4534415","DOIUrl":"https://doi.org/10.1109/THS.2008.4534415","url":null,"abstract":"As we show in this report, the multiple isotope material basis set (MIMBS) method for isotope identification with medium- and low-resolution gamma-ray detectors requires an accurate energy calibration to be optimally effective. Determination of the detector's energy calibration using one or more known radioisotopes is generally required for all applications. We are developing an algorithm that automatically finds the best energy calibration using one or more identified (standard) gamma spectra as input, with no effort on the part of the user other than qualitatively identifying the isotopes present in the spectrum. Instruments that suffer significant energy calibration drift, such as Nal handheld identifiers, also require some type of real time gain stabilization to keep their calibration steady. We have developed two approaches for stabilizing the energy calibration for MIMBS analyses, (1) a standard peak-based gain stabilization algorithm for use when seeded or background gamma peaks are known to be present and (2) a peak-free stabilization algorithm based on a non-linear gain optimization. In this report, we describe the calibration algorithms and evaluate their effectiveness on real and simulated gamma-ray spectra under varying measurement conditions.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133992048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Automatic Detection of Potential Threat Objects in X-ray Luggage Scan Images x射线行李扫描图像中潜在威胁物体的自动检测
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534504
S. Nercessian, K. Panetta, S. Agaian
{"title":"Automatic Detection of Potential Threat Objects in X-ray Luggage Scan Images","authors":"S. Nercessian, K. Panetta, S. Agaian","doi":"10.1109/THS.2008.4534504","DOIUrl":"https://doi.org/10.1109/THS.2008.4534504","url":null,"abstract":"The detection of threat objects using X-ray luggage scan images has become an important means of aviation security. Most airport screening is still based on the manual detection of potential threat objects by human experts. This paper presents a system for the automatic detection of potential threat objects in X-ray luggage scan images. Segmentation and edge-based feature vectors form the basis of the automatic detection system. The system is illustrated using handguns as the threat objects in question. The experimental results show that the system can effectively detect the handguns in X-ray luggage scan images with minimal amounts of false positives. Also, apart from the initial setup of the classification database, the algorithm is suitable for real-time applications.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132841635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
An Investigation into the Efficacy of Keystroke Analysis for Perimeter Defense and Facility Access 击键分析在周界防御和设施访问中的有效性研究
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534475
Christopher S. Leberknight, G. Widmeyer, M. Recce
{"title":"An Investigation into the Efficacy of Keystroke Analysis for Perimeter Defense and Facility Access","authors":"Christopher S. Leberknight, G. Widmeyer, M. Recce","doi":"10.1109/THS.2008.4534475","DOIUrl":"https://doi.org/10.1109/THS.2008.4534475","url":null,"abstract":"The purpose of this study is to evaluate the performance of static keystroke analysis as a complimentary and transparent security solution in the context of perimeter defense and facility access. A biometric keypad prototype was developed to evaluate the classification accuracy using temporal keystroke characteristics and feature points extracted from pressure sensors embedded within the keypad. A novel method is proposed to improve keystroke classification accuracy by analyzing 3 pressure related characteristics: amplitude or peak, peak area, and peak sharpness.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"56 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132899781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Direction Sensitive Neutron Detector 方向敏感中子探测器
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534436
S. Ahlen
{"title":"A Direction Sensitive Neutron Detector","authors":"S. Ahlen","doi":"10.1109/THS.2008.4534436","DOIUrl":"https://doi.org/10.1109/THS.2008.4534436","url":null,"abstract":"The threat of nuclear terrorism presents an increasingly urgent and difficult challenge to the United States in the 21st Century. New technologies with improved sensitivity will be needed to identify hidden nuclear weapons in order to protect the United States from this threat. This paper describes a detector under development that will measure the direction and energy of recoiling nuclei produced in collisions with neutrons emitted by spontaneous fission from plutonium warheads. Such a detector will have improved sensitivity compared to other neutron detectors due to its ability to determine the direction of approach of the neutrons, thereby reducing significantly the backgrounds due to cosmic ray neutrons.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132562774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Coordinating the Global Information Grid Initiative with the NG9-1-1 Initiative 协调全球信息网格倡议与NG9-1-1倡议
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534488
M. Schmitt
{"title":"Coordinating the Global Information Grid Initiative with the NG9-1-1 Initiative","authors":"M. Schmitt","doi":"10.1109/THS.2008.4534488","DOIUrl":"https://doi.org/10.1109/THS.2008.4534488","url":null,"abstract":"As the Department of Defense develops the Global Information Grid, the Department of Transportation develops the Next Generation 9-1-1 system. Close examinations of these initiatives show that the two are similar in architectures, applications, and communications interoperability. These similarities are extracted from the lowest user level to the highest commander rank that will be involved in each network. Once the similarities are brought into perspective, efforts should be made to collaborate between the two departments.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133106504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Airport Perimeter Security: Where we've been, Where we are, and Where we're going 机场周边安全:我们去过哪里,我们在哪里,我们要去哪里
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534423
A. Barry, D. S. Mazel
{"title":"Airport Perimeter Security: Where we've been, Where we are, and Where we're going","authors":"A. Barry, D. S. Mazel","doi":"10.1109/THS.2008.4534423","DOIUrl":"https://doi.org/10.1109/THS.2008.4534423","url":null,"abstract":"Perimeter security at an airport requires disparate sensors to operate in concert to detect intruders; track them; assess threats; coordinate responses; (for example, human responders for investigation, or door and gate closings); gather evidence for law enforcement prosecution; and coordinate responses between law enforcement agencies. At present, no one system accomplishes all these tasks. Our work and development has evolved a system that meets these needs. In this paper we describe that evolution and show where we've been in system development, how that past has shaped our present deployment of systems and how our current work will lead to a complete solution.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133610850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信