{"title":"The use of an expert system to expand a multi sensor fire detector to a robust fire detector","authors":"T. Jandeweith","doi":"10.1109/CCST.1995.524915","DOIUrl":"https://doi.org/10.1109/CCST.1995.524915","url":null,"abstract":"A new fire detector is presented which produces a lower rate of false alarms then a customary one, in rooms that are hard to supervise. The detector is based on the assumption that rooms have a specific use, so that often similar reasons lead to false alarms. Therefore, a customary detector is improved so that it is capable of saving the physical characteristics of non-fire events. When a critical situation arises in the supervised room, it is compared to past non-fire events. When a cause is recognized as a repetitive non-fire cause, the decision is taken in favour of the non-fire hypothesis, otherwise, in favour of the hypothesis.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132181984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Veitch, J. Dexter, G. Ross, J. Driscoll, M. Watts
{"title":"The 3DIS System","authors":"S. Veitch, J. Dexter, G. Ross, J. Driscoll, M. Watts","doi":"10.1109/CCST.1995.524733","DOIUrl":"https://doi.org/10.1109/CCST.1995.524733","url":null,"abstract":"The 3DIS Security System uses the overlapping fields of view of multiple video cameras to create discrete 3D volumes of space that are sensitive to movement. The system may be used in both indoor and outdoor installations to implement automated video surveillance. 3DIS Version 1.xx has validated the use of \"3D detection zones\" within the security industry. 3DIS Version 2.xx is nearing the end of the first stage of its development.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"84 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114339185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A strategy for security of buildings","authors":"J. Harrington-Lynn, T. Pascoe","doi":"10.1109/CCST.1995.524911","DOIUrl":"https://doi.org/10.1109/CCST.1995.524911","url":null,"abstract":"The security of buildings can be influenced by aspects of building design and urban planning. The paper reports on progress of research at the Building Research Establishment, to assess the effectiveness of these measures and to develop a strategy based on risk assessment. Such a strategy will allow designers, the police and others to assess the most effective combination of design and other measures to counter domestic burglary and other crimes.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121981699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pre-processing of fingerprint images","authors":"N. D. Tucker","doi":"10.1109/CCST.1995.524739","DOIUrl":"https://doi.org/10.1109/CCST.1995.524739","url":null,"abstract":"The pre-processing of fingerprint images covers a wide variety of image processing and requirements. This paper addresses the problem of the extraction of relevant macroscopic properties of the image, in particular the location of key features. This ongoing research explores the transformation of the image into a reconstructed skeletal form, followed by the conversion of the image into a series of tracks. These latter permit the straightforward extraction of essential pattern characteristics.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123963700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Testing of detection systems","authors":"G. Leach","doi":"10.1109/CCST.1995.524741","DOIUrl":"https://doi.org/10.1109/CCST.1995.524741","url":null,"abstract":"The phrase \"probability of detection\" (P/sub d/) is often misused in the context of exterior electronic perimeter intrusion detection systems (PIDS). For example, a system which correctly detects when tested three times has detected at a rate of 100%, but might not have a \"probability of detection\" of 100%. \"P/sub d/\" is often misused to describe this experimental result as a 100% probability of detection. \"Confidence limits\" for P/sub d/ can be estimated and minimum extents for testing can then be demanded. These confidence limits are sometimes calculated using the normal, or the chi-squared, statistical distributions. Using these distributions for PIDS testing is questionable because they are often used outside their region of validity. There are fundamental constraints which obstruct conventional statistical confidence limits for P/sub d/ from being found. P/sub d/ statistics are discussed and an exact way to express detection uncertainty using the binomial distribution is described. Ways to reduce testing, yet maintain confidence, are discussed. Experts are concerned that extensive, but unrepresentative, testing gives an unwarranted impression of reliability. This paper emphasises the importance of representative testing and the clear presentation of results.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132392650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modern signal processing for temperature fluctuation based fire detectors","authors":"T. Kaiser, B. Piller, P. Ryser","doi":"10.1109/CCST.1995.524913","DOIUrl":"https://doi.org/10.1109/CCST.1995.524913","url":null,"abstract":"We suggest use of the high frequency part of the temperature signal or the temperature fluctuations in addition to or as a replacement for the common fire detector which is based only on a lowpass filtered (smoothed) temperature signal. Furthermore, a signal processing method distinguishing fire from non-fire situations using fire detectors that measure temperature fluctuations is presented. This method is partly based on the interpretation of the sensor output signals as a linear filtered stochastic process which enabled the reconstruction of the input signals from known output signals. We show the advantage of this method through application to many fire and non-fire situations.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126553601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A risk assessment methodology for security advisors","authors":"J. Strutt, J. Patrick, N. Custance","doi":"10.1109/CCST.1995.524917","DOIUrl":"https://doi.org/10.1109/CCST.1995.524917","url":null,"abstract":"This paper describes the trends within the United Kingdom which have led to an increased emphasis on risk management. The paper then presents the methodology which was developed in conjunction with Cranfield University to meet the needs of the 15 members of an advisory branch. The branch is a centrally funded resource which provide recommendations for protective security upgrades to a wide range of Government clients. Risk assessment is seen as the most effective method for providing such advice now that clients are no longer bound by prescriptive solutions.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126073785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel approach to secure broadcast in distributed systems","authors":"R.H. Deng, T. Tjhung","doi":"10.1109/CCST.1995.524941","DOIUrl":"https://doi.org/10.1109/CCST.1995.524941","url":null,"abstract":"We present a scheme for secure broadcasting confidential data messages in distributed system or networking environments. The scheme is based on the theory of linear block codes and does not make use of any encryption algorithms. In addition, we show how to achieve reliable message transmission in the presence of channel errors by sending an error correcting parity message in the secure broadcast scheme.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123844009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reducing manpower intensive tasks through automation of security technologies","authors":"R. Carback","doi":"10.1109/CCST.1995.524932","DOIUrl":"https://doi.org/10.1109/CCST.1995.524932","url":null,"abstract":"Security in today's government and commercial environments is changing. The willingness to provide manpower against security threats is diminishing. Risk management is preferred to risk avoidance. In order for management to ensure that the appropriate security is provided while downsizing or right sizing protective services and other security personnel, automation of security technologies is a necessity. Several manpower intensive tasks and processes are: facilities access control, issuance of staff and visitor badges, provision of information for visitors, access control to interior facilities, and the issuance of office keys. Reduction of the required manning for these processes is enabled though the automation and integration of various security technologies including biometric identification systems. This paper provides a background on manpower intensive tasks and processes, security technologies that may be employed within them, resource reduction capabilities, and a customer's experience with the use of the technologies within a large Government environment.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131996758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Low-cost outdoor video motion and non-motion detection","authors":"B. Jones","doi":"10.1109/CCST.1995.524938","DOIUrl":"https://doi.org/10.1109/CCST.1995.524938","url":null,"abstract":"The video monitoring of outdoor sites is a demanding task that is commonly tackled by having security guards look at arrays of CCTV monitors. Experience shows that this is largely ineffective, both as a detector and a deterrent. However, modern digital imaging systems can solve both these problems by maintaining constant vigilance 24 hours a day. These systems can be versatile and can operate in several different modes, video motion detection, video nonmotion detection and incident capture, thus providing a flexibility of application environment. By basing these systems on powerful PC technology the end user benefits from a large range of facilities at relatively low cost. In particular, it is possible to have low cost frame storage and high performance communications over telephones, ISDN or Ethernet. Image sequences both prior to and after an event can be stored and transmitted. Archiving and retrieval of events can be done efficiently through standard databases. However, in order that such systems be operationally viable it is essential that the detection algorithms be smart enough to reduce the number of false alarms to virtually zero. Most of the discussion concerns technology that is currently available and in everyday use: the author uses the ASTRAGUARD product as a specific example of such a system.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134446440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}