1993 Proceedings of IEEE International Carnahan Conference on Security Technology最新文献

筛选
英文 中文
The importance of the site survey in planning and implementing an electronic security system 地盘勘测在策划及实施电子保安系统中的重要性
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386825
J. A. Brown
{"title":"The importance of the site survey in planning and implementing an electronic security system","authors":"J. A. Brown","doi":"10.1109/CCST.1993.386825","DOIUrl":"https://doi.org/10.1109/CCST.1993.386825","url":null,"abstract":"It is noted that the conduct of a detailed site survey is critical to the successful implementation of an electronic security system. The author discusses the rationale for a site survey, the contents of the survey report, and the planning of the site survey, and the composition of the site survey team.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123562698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic video image moving target detection for wide area surveillance 面向广域监控的视频图像运动目标自动检测
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386826
C. Munno, H. Turk, J. Wayman, J. Libert, T. Tsao
{"title":"Automatic video image moving target detection for wide area surveillance","authors":"C. Munno, H. Turk, J. Wayman, J. Libert, T. Tsao","doi":"10.1109/CCST.1993.386826","DOIUrl":"https://doi.org/10.1109/CCST.1993.386826","url":null,"abstract":"Two image processing techniques developed for moving target indication from video infrared imagery in natural scenes are presented. It is shown that frequency domain spatio-temporal filtering of video sequences and spatio-temporal constraint error of image frame pairs are able to detect and track moving targets (e.g., personnel) in natural scenes in spite of low image contrast, changes in the target's infrared image pattern, sensor noise, or background clutter. The effectiveness of the motion filtering algorithms when applied to sequences of data corrupted with additive noise is shown. The effectiveness of the CFAR (constant false alarm rate) adaptive threshold algorithm in controlling the false alarm rate for motion detection has been demonstrated. These steps have permitted substantial data reduction so that real-time processing is possible.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121542980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Effect of video presentations on knowledge and public attitudes toward radioactive waste storage 视频演示对放射性废物储存知识和公众态度的影响
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386814
E. Zannes, C. Kelsey, B. Goss
{"title":"Effect of video presentations on knowledge and public attitudes toward radioactive waste storage","authors":"E. Zannes, C. Kelsey, B. Goss","doi":"10.1109/CCST.1993.386814","DOIUrl":"https://doi.org/10.1109/CCST.1993.386814","url":null,"abstract":"A study was conducted to determine whether short video presentations of facts about radiation and WIPP (Waste Isolation Pilot Plant) and WIPP transportation would increase knowledge and change attitudes regarding the storage of radioactive waste; and (2) to determine the effect of various audio and visual techniques employed in the video presentations on knowledge acquisition and opinion. Changes in knowledge and attitudes toward radioactive waste and the WIPP produced by viewing three video presentations have been measured by showing the tapes to selected viewing groups. The first video presents facts about natural radioactivity; the second presents facts about WIPP; and the third presents facts about the transporting of waste to WIPP. Each video is approximately four minutes long. These initial studies have demonstrated that four-minutes-long videos can change public knowledge and opinion, and that these changes can be measured and quantified.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114550261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of a remotely operated intrusion detection system for security applications 设计了一个用于安全应用的远程操作入侵检测系统
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386809
B. Jones
{"title":"Design of a remotely operated intrusion detection system for security applications","authors":"B. Jones","doi":"10.1109/CCST.1993.386809","DOIUrl":"https://doi.org/10.1109/CCST.1993.386809","url":null,"abstract":"The author discussed a group of recent system level advancements in electronic security systems technology in the areas of sensor signal processing, remote site command, control and communications, and long-life battery operation. The technology for the advancements presented here have been designed, constructed, tested, and incorporated into operational security systems. Actual system architectures and practical embodiments of the designs are presented. The primary applications for these systems are the protection of high value facilities in remote locations and for law enforcement and military operations.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131366334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CCTV operator performance and system design CCTV操作员性能及系统设计
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386830
P. Walters
{"title":"CCTV operator performance and system design","authors":"P. Walters","doi":"10.1109/CCST.1993.386830","DOIUrl":"https://doi.org/10.1109/CCST.1993.386830","url":null,"abstract":"The introduction of the Rotakin test is shown to be an important step toward improving the performance of closed-circuit television (CCTV) systems. Analysis of the alarm event process calls attention to the areas of sensitivity whereby the system can fail. Reference to knowledge in the human visual performance field makes it possible to improve the images presented to the operator, thereby permitting him to do his job more easily. The addition of systems performance testing to systems specifications provides a non-altruistic motive for the pursuit of the relevant engineering knowledge.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115878728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimal allocation of security sensors/guards-graph theoretic approach 安全传感器/警卫的优化配置——图论方法
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386812
K. Inoue, T. Kohda, M. Shirahama
{"title":"Optimal allocation of security sensors/guards-graph theoretic approach","authors":"K. Inoue, T. Kohda, M. Shirahama","doi":"10.1109/CCST.1993.386812","DOIUrl":"https://doi.org/10.1109/CCST.1993.386812","url":null,"abstract":"The problem of optimal allocation of security sensors and/or guards is formulated as a graph/network problem, where the importance of the concept of degree of security or multiple minimal cut set is stressed. An algorithm for solving the formulated graph/network problem is developed and it is shown that the algorithm is very effective from the viewpoint of computational complexity. Examples are given to illustrate the concept of degree of security, optimal allocation of security sensors/guards, multiple minimal cut set, and computational efficiency. A typical example among them is: assume a terrorist or a thief is going to attack a target in a town. The problem is to find the minimum number of sensors/guards and where and how to allocate them in the town, detecting him at least twice (or more generally k times) on his way to the target, even if he may take any route among numerous possible routes.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133492932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrity and security in AM/FM-GIS AM/FM-GIS中的完整性和安全性
1993 Proceedings of IEEE International Carnahan Conference on Security Technology Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386801
E. Orlandi
{"title":"Integrity and security in AM/FM-GIS","authors":"E. Orlandi","doi":"10.1109/CCST.1993.386801","DOIUrl":"https://doi.org/10.1109/CCST.1993.386801","url":null,"abstract":"The authors present the integrity and security requirements of AM/FM-GIS (geographic information system) systems, involving the security of the operating system, the DBMS (database management systems), and graphic information. Well-established security services and mechanisms developed for EDP on-line systems can be applied to AM/FM-GIS. In AM/FM-GIS, the security issue can be approached with formal methods in the pre-evaluation and evaluation phases. The security requirements should produce a well-defined input to the system design and could influence the selection of the data base with regard to the implementation technique. In AM/FM-GIS systems, different access modes should be possible on several data structures: layers, element groups, objects, and drawings.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122005453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信