Tia Gao, C. Pesto, L. Selavo, Yin Chen, JeongGil Ko, Jong Hyun Lim, A. Terzis, A. Watt, J. Jeng, Bor-rong Chen, K. Lorincz, M. Welsh
{"title":"Wireless Medical Sensor Networks in Emergency Response: Implementation and Pilot Results","authors":"Tia Gao, C. Pesto, L. Selavo, Yin Chen, JeongGil Ko, Jong Hyun Lim, A. Terzis, A. Watt, J. Jeng, Bor-rong Chen, K. Lorincz, M. Welsh","doi":"10.1109/THS.2008.4534447","DOIUrl":"https://doi.org/10.1109/THS.2008.4534447","url":null,"abstract":"This project demonstrates the feasibility of using cost- effective, flexible, and scalable sensor networks to address critical bottlenecks of the emergency response process. For years, emergency medical service providers conducted patient care by manually measuring vital signs, documenting assessments on paper, and communicating over handheld radios. When disasters occurred, the large numbers of casualties quickly and easily overwhelmed the responders. Collaboration with EMS and hospitals in the Baltimore Washington Metropolitan region prompted us to develop miTag (medical information tag), a cost- effective wireless sensor platform that automatically track patients throughout each step of the disaster response process, from disaster scenes, to ambulances, to hospitals. The miTag is a highly extensible platform that supports a variety of sensor add-ons - GPS, pulse oximetry, blood pressure, temperature, ECG - and relays data over a self-organizing wireless mesh network Scalability is the distinguishing characteristic of miTag: its wireless network scales across a wide range of network densities, from sparse hospital network deployments to very densely populated mass casualty sites. The miTag system is out-of-the-box operational and includes the following key technologies: 1) cost-effective sensor hardware, 2) self-organizing wireless network and 3) scalable server software that analyzes sensor data and delivers real-time updates to handheld devices and web portals. The system has evolved through multiple iterations of development and pilot deployments to become an effective patient monitoring solution. A pilot conducted with the Department of Homeland Security indicates miTags can increase the patient care capacity of responders in the field A pilot at Washington Hospital showed miTags are capable of reliably transmitting data inside radio-interference-rich critical care settings.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127105292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel Trace Chemical Detection Technologies for Homeland Security","authors":"A. Staubs, M. S. Matyjaszczyk","doi":"10.1109/THS.2008.4534449","DOIUrl":"https://doi.org/10.1109/THS.2008.4534449","url":null,"abstract":"Trace chemical detection issues relevant to Homeland Security (HS), specifically to the detection of chemical warfare agents (CWAs), biological species, and high explosives are discussed. A special attention is paid to the ion mobility spectrometry, its improved version, field compensated ion mobility spectrometry (known also as FIS, FAIMS, microDMxtrade, and DMS), and mass spectrometry. Sampling and analysis scenarios are discussed with special emphasis on the ways to prevent positive and negative false alarms, like through 'doping', for example. Possible explanations of false negatives and ways of their prevention as well as the detection of well hidden explosives are discussed. Reasons for the X-ray screening being the primary and the trace chemical detection-the secondary screening methodology at airports are explained. Sampling; pyrolysis/ volatilization of sample; transfer of volatilized sample, and its ionization; transfer of ions, their separation, and detection are discussed, and the ways of improvement proposed. Advantages and disadvantages of multipeak detection are presented. A comeback of mass spectrometry is observed with instruments being miniaturized and equipped with innovative ionization sources which should make sampling easier and detection more specific. Importance of the miniaturization of the transportation security instrumentation is stressed. A confirmational analysis is suggested as another important tool in the prevention of false negatives and positives, especially when the multipeak detection is not possible. A new detection system, consisting of the miniaturized FAIMS and mass spectrometer is proposed as the sensitive, specific, portable and rapid response trace chemical detection system for Homeland Security applications.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123778370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Watchlist Screening By Combining Evidence From Multiple Search Algorithms","authors":"Keith J. Miller","doi":"10.1109/THS.2008.4534432","DOIUrl":"https://doi.org/10.1109/THS.2008.4534432","url":null,"abstract":"In this paper, we describe a metasearch tool resulting from experiments in aggregating the results of different name matching algorithms on a knowledge- intensive multicultural name matching task. Three retrieval engines that match Romanized names were tested on a noisy and predominantly Arabic dataset. One is based on a generic string matching algorithm; another is designed specifically for Arabic names; and the third makes use of culturally-specific matching strategies for multiple cultures. We show that even a relatively naive method for aggregating results significantly increased effectiveness over each of the individual algorithms, resulting in nearly tripling the F-score of the worst-performing algorithm included in the aggregate, and in a 6 point improvement in F-score over the single best-performing algorithm included.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131306338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Perry Pederson, David Lee, Guoqiang Shu, Dongluo Chen, Zhijun Liu, Na Li, Lifeng Sang
{"title":"Virtual Cyber-Security Testing Capability for Large Scale Distributed Information Infrastructure Protection","authors":"Perry Pederson, David Lee, Guoqiang Shu, Dongluo Chen, Zhijun Liu, Na Li, Lifeng Sang","doi":"10.1109/THS.2008.4534480","DOIUrl":"https://doi.org/10.1109/THS.2008.4534480","url":null,"abstract":"Security, reliability and interoperability are indispensable in today's distributed heterogeneous information infrastructure. For government and military applications, it is crucial to conduct effective and efficient testing of security properties for newly developed systems, which are to be integrated into existing information system. Yet little progress has been made in the technology advancement of rigorous and automated security testing. In this contribution we present virtual cyber security testing capability (VCSTC) - a DoD funded project-for developing an automated testing capability that can assess the operational functions and security impact of a target system without physically integrating it into an intended network infrastructure. VCSTC first synthesizes a model to emulate the real network infrastructure; then it automatically generates and executes test cases with guaranteed coverage of the features and security properties under test. This report presents the architecture of VCSTC, its key techniques and experimental results on real systems.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126394406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy Calibration Algorithms for the Multiple Isotope Material Basis Set (MIMBS) Isotope Identification Method","authors":"R. Estep, B. Sapp","doi":"10.1109/THS.2008.4534415","DOIUrl":"https://doi.org/10.1109/THS.2008.4534415","url":null,"abstract":"As we show in this report, the multiple isotope material basis set (MIMBS) method for isotope identification with medium- and low-resolution gamma-ray detectors requires an accurate energy calibration to be optimally effective. Determination of the detector's energy calibration using one or more known radioisotopes is generally required for all applications. We are developing an algorithm that automatically finds the best energy calibration using one or more identified (standard) gamma spectra as input, with no effort on the part of the user other than qualitatively identifying the isotopes present in the spectrum. Instruments that suffer significant energy calibration drift, such as Nal handheld identifiers, also require some type of real time gain stabilization to keep their calibration steady. We have developed two approaches for stabilizing the energy calibration for MIMBS analyses, (1) a standard peak-based gain stabilization algorithm for use when seeded or background gamma peaks are known to be present and (2) a peak-free stabilization algorithm based on a non-linear gain optimization. In this report, we describe the calibration algorithms and evaluate their effectiveness on real and simulated gamma-ray spectra under varying measurement conditions.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133992048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Detection of Potential Threat Objects in X-ray Luggage Scan Images","authors":"S. Nercessian, K. Panetta, S. Agaian","doi":"10.1109/THS.2008.4534504","DOIUrl":"https://doi.org/10.1109/THS.2008.4534504","url":null,"abstract":"The detection of threat objects using X-ray luggage scan images has become an important means of aviation security. Most airport screening is still based on the manual detection of potential threat objects by human experts. This paper presents a system for the automatic detection of potential threat objects in X-ray luggage scan images. Segmentation and edge-based feature vectors form the basis of the automatic detection system. The system is illustrated using handguns as the threat objects in question. The experimental results show that the system can effectively detect the handguns in X-ray luggage scan images with minimal amounts of false positives. Also, apart from the initial setup of the classification database, the algorithm is suitable for real-time applications.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132841635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Investigation into the Efficacy of Keystroke Analysis for Perimeter Defense and Facility Access","authors":"Christopher S. Leberknight, G. Widmeyer, M. Recce","doi":"10.1109/THS.2008.4534475","DOIUrl":"https://doi.org/10.1109/THS.2008.4534475","url":null,"abstract":"The purpose of this study is to evaluate the performance of static keystroke analysis as a complimentary and transparent security solution in the context of perimeter defense and facility access. A biometric keypad prototype was developed to evaluate the classification accuracy using temporal keystroke characteristics and feature points extracted from pressure sensors embedded within the keypad. A novel method is proposed to improve keystroke classification accuracy by analyzing 3 pressure related characteristics: amplitude or peak, peak area, and peak sharpness.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"56 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132899781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Direction Sensitive Neutron Detector","authors":"S. Ahlen","doi":"10.1109/THS.2008.4534436","DOIUrl":"https://doi.org/10.1109/THS.2008.4534436","url":null,"abstract":"The threat of nuclear terrorism presents an increasingly urgent and difficult challenge to the United States in the 21st Century. New technologies with improved sensitivity will be needed to identify hidden nuclear weapons in order to protect the United States from this threat. This paper describes a detector under development that will measure the direction and energy of recoiling nuclei produced in collisions with neutrons emitted by spontaneous fission from plutonium warheads. Such a detector will have improved sensitivity compared to other neutron detectors due to its ability to determine the direction of approach of the neutrons, thereby reducing significantly the backgrounds due to cosmic ray neutrons.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132562774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coordinating the Global Information Grid Initiative with the NG9-1-1 Initiative","authors":"M. Schmitt","doi":"10.1109/THS.2008.4534488","DOIUrl":"https://doi.org/10.1109/THS.2008.4534488","url":null,"abstract":"As the Department of Defense develops the Global Information Grid, the Department of Transportation develops the Next Generation 9-1-1 system. Close examinations of these initiatives show that the two are similar in architectures, applications, and communications interoperability. These similarities are extracted from the lowest user level to the highest commander rank that will be involved in each network. Once the similarities are brought into perspective, efforts should be made to collaborate between the two departments.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133106504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Airport Perimeter Security: Where we've been, Where we are, and Where we're going","authors":"A. Barry, D. S. Mazel","doi":"10.1109/THS.2008.4534423","DOIUrl":"https://doi.org/10.1109/THS.2008.4534423","url":null,"abstract":"Perimeter security at an airport requires disparate sensors to operate in concert to detect intruders; track them; assess threats; coordinate responses; (for example, human responders for investigation, or door and gate closings); gather evidence for law enforcement prosecution; and coordinate responses between law enforcement agencies. At present, no one system accomplishes all these tasks. Our work and development has evolved a system that meets these needs. In this paper we describe that evolution and show where we've been in system development, how that past has shaped our present deployment of systems and how our current work will lead to a complete solution.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133610850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}