Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
The use of an expert system to expand a multi sensor fire detector to a robust fire detector 利用专家系统将多传感器火灾探测器扩展为鲁棒型火灾探测器
T. Jandeweith
{"title":"The use of an expert system to expand a multi sensor fire detector to a robust fire detector","authors":"T. Jandeweith","doi":"10.1109/CCST.1995.524915","DOIUrl":"https://doi.org/10.1109/CCST.1995.524915","url":null,"abstract":"A new fire detector is presented which produces a lower rate of false alarms then a customary one, in rooms that are hard to supervise. The detector is based on the assumption that rooms have a specific use, so that often similar reasons lead to false alarms. Therefore, a customary detector is improved so that it is capable of saving the physical characteristics of non-fire events. When a critical situation arises in the supervised room, it is compared to past non-fire events. When a cause is recognized as a repetitive non-fire cause, the decision is taken in favour of the non-fire hypothesis, otherwise, in favour of the hypothesis.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132181984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The 3DIS System 3DIS系统
S. Veitch, J. Dexter, G. Ross, J. Driscoll, M. Watts
{"title":"The 3DIS System","authors":"S. Veitch, J. Dexter, G. Ross, J. Driscoll, M. Watts","doi":"10.1109/CCST.1995.524733","DOIUrl":"https://doi.org/10.1109/CCST.1995.524733","url":null,"abstract":"The 3DIS Security System uses the overlapping fields of view of multiple video cameras to create discrete 3D volumes of space that are sensitive to movement. The system may be used in both indoor and outdoor installations to implement automated video surveillance. 3DIS Version 1.xx has validated the use of \"3D detection zones\" within the security industry. 3DIS Version 2.xx is nearing the end of the first stage of its development.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"84 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114339185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A strategy for security of buildings 建筑物的安全策略
J. Harrington-Lynn, T. Pascoe
{"title":"A strategy for security of buildings","authors":"J. Harrington-Lynn, T. Pascoe","doi":"10.1109/CCST.1995.524911","DOIUrl":"https://doi.org/10.1109/CCST.1995.524911","url":null,"abstract":"The security of buildings can be influenced by aspects of building design and urban planning. The paper reports on progress of research at the Building Research Establishment, to assess the effectiveness of these measures and to develop a strategy based on risk assessment. Such a strategy will allow designers, the police and others to assess the most effective combination of design and other measures to counter domestic burglary and other crimes.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121981699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Pre-processing of fingerprint images 指纹图像预处理
N. D. Tucker
{"title":"Pre-processing of fingerprint images","authors":"N. D. Tucker","doi":"10.1109/CCST.1995.524739","DOIUrl":"https://doi.org/10.1109/CCST.1995.524739","url":null,"abstract":"The pre-processing of fingerprint images covers a wide variety of image processing and requirements. This paper addresses the problem of the extraction of relevant macroscopic properties of the image, in particular the location of key features. This ongoing research explores the transformation of the image into a reconstructed skeletal form, followed by the conversion of the image into a series of tracks. These latter permit the straightforward extraction of essential pattern characteristics.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123963700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Testing of detection systems 检测系统测试
G. Leach
{"title":"Testing of detection systems","authors":"G. Leach","doi":"10.1109/CCST.1995.524741","DOIUrl":"https://doi.org/10.1109/CCST.1995.524741","url":null,"abstract":"The phrase \"probability of detection\" (P/sub d/) is often misused in the context of exterior electronic perimeter intrusion detection systems (PIDS). For example, a system which correctly detects when tested three times has detected at a rate of 100%, but might not have a \"probability of detection\" of 100%. \"P/sub d/\" is often misused to describe this experimental result as a 100% probability of detection. \"Confidence limits\" for P/sub d/ can be estimated and minimum extents for testing can then be demanded. These confidence limits are sometimes calculated using the normal, or the chi-squared, statistical distributions. Using these distributions for PIDS testing is questionable because they are often used outside their region of validity. There are fundamental constraints which obstruct conventional statistical confidence limits for P/sub d/ from being found. P/sub d/ statistics are discussed and an exact way to express detection uncertainty using the binomial distribution is described. Ways to reduce testing, yet maintain confidence, are discussed. Experts are concerned that extensive, but unrepresentative, testing gives an unwarranted impression of reliability. This paper emphasises the importance of representative testing and the clear presentation of results.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132392650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modern signal processing for temperature fluctuation based fire detectors 基于温度波动火灾探测器的现代信号处理
T. Kaiser, B. Piller, P. Ryser
{"title":"Modern signal processing for temperature fluctuation based fire detectors","authors":"T. Kaiser, B. Piller, P. Ryser","doi":"10.1109/CCST.1995.524913","DOIUrl":"https://doi.org/10.1109/CCST.1995.524913","url":null,"abstract":"We suggest use of the high frequency part of the temperature signal or the temperature fluctuations in addition to or as a replacement for the common fire detector which is based only on a lowpass filtered (smoothed) temperature signal. Furthermore, a signal processing method distinguishing fire from non-fire situations using fire detectors that measure temperature fluctuations is presented. This method is partly based on the interpretation of the sensor output signals as a linear filtered stochastic process which enabled the reconstruction of the input signals from known output signals. We show the advantage of this method through application to many fire and non-fire situations.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126553601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A risk assessment methodology for security advisors 安全顾问的风险评估方法
J. Strutt, J. Patrick, N. Custance
{"title":"A risk assessment methodology for security advisors","authors":"J. Strutt, J. Patrick, N. Custance","doi":"10.1109/CCST.1995.524917","DOIUrl":"https://doi.org/10.1109/CCST.1995.524917","url":null,"abstract":"This paper describes the trends within the United Kingdom which have led to an increased emphasis on risk management. The paper then presents the methodology which was developed in conjunction with Cranfield University to meet the needs of the 15 members of an advisory branch. The branch is a centrally funded resource which provide recommendations for protective security upgrades to a wide range of Government clients. Risk assessment is seen as the most effective method for providing such advice now that clients are no longer bound by prescriptive solutions.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126073785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Novel approach to secure broadcast in distributed systems 分布式系统中安全广播的新方法
R.H. Deng, T. Tjhung
{"title":"Novel approach to secure broadcast in distributed systems","authors":"R.H. Deng, T. Tjhung","doi":"10.1109/CCST.1995.524941","DOIUrl":"https://doi.org/10.1109/CCST.1995.524941","url":null,"abstract":"We present a scheme for secure broadcasting confidential data messages in distributed system or networking environments. The scheme is based on the theory of linear block codes and does not make use of any encryption algorithms. In addition, we show how to achieve reliable message transmission in the presence of channel errors by sending an error correcting parity message in the secure broadcast scheme.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123844009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reducing manpower intensive tasks through automation of security technologies 通过自动化安全技术减少人力密集型任务
R. Carback
{"title":"Reducing manpower intensive tasks through automation of security technologies","authors":"R. Carback","doi":"10.1109/CCST.1995.524932","DOIUrl":"https://doi.org/10.1109/CCST.1995.524932","url":null,"abstract":"Security in today's government and commercial environments is changing. The willingness to provide manpower against security threats is diminishing. Risk management is preferred to risk avoidance. In order for management to ensure that the appropriate security is provided while downsizing or right sizing protective services and other security personnel, automation of security technologies is a necessity. Several manpower intensive tasks and processes are: facilities access control, issuance of staff and visitor badges, provision of information for visitors, access control to interior facilities, and the issuance of office keys. Reduction of the required manning for these processes is enabled though the automation and integration of various security technologies including biometric identification systems. This paper provides a background on manpower intensive tasks and processes, security technologies that may be employed within them, resource reduction capabilities, and a customer's experience with the use of the technologies within a large Government environment.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131996758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Low-cost outdoor video motion and non-motion detection 低成本户外视频运动和非运动检测
B. Jones
{"title":"Low-cost outdoor video motion and non-motion detection","authors":"B. Jones","doi":"10.1109/CCST.1995.524938","DOIUrl":"https://doi.org/10.1109/CCST.1995.524938","url":null,"abstract":"The video monitoring of outdoor sites is a demanding task that is commonly tackled by having security guards look at arrays of CCTV monitors. Experience shows that this is largely ineffective, both as a detector and a deterrent. However, modern digital imaging systems can solve both these problems by maintaining constant vigilance 24 hours a day. These systems can be versatile and can operate in several different modes, video motion detection, video nonmotion detection and incident capture, thus providing a flexibility of application environment. By basing these systems on powerful PC technology the end user benefits from a large range of facilities at relatively low cost. In particular, it is possible to have low cost frame storage and high performance communications over telephones, ISDN or Ethernet. Image sequences both prior to and after an event can be stored and transmitted. Archiving and retrieval of events can be done efficiently through standard databases. However, in order that such systems be operationally viable it is essential that the detection algorithms be smart enough to reduce the number of false alarms to virtually zero. Most of the discussion concerns technology that is currently available and in everyday use: the author uses the ASTRAGUARD product as a specific example of such a system.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134446440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信