{"title":"The importance of the site survey in planning and implementing an electronic security system","authors":"J. A. Brown","doi":"10.1109/CCST.1993.386825","DOIUrl":"https://doi.org/10.1109/CCST.1993.386825","url":null,"abstract":"It is noted that the conduct of a detailed site survey is critical to the successful implementation of an electronic security system. The author discusses the rationale for a site survey, the contents of the survey report, and the planning of the site survey, and the composition of the site survey team.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123562698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic video image moving target detection for wide area surveillance","authors":"C. Munno, H. Turk, J. Wayman, J. Libert, T. Tsao","doi":"10.1109/CCST.1993.386826","DOIUrl":"https://doi.org/10.1109/CCST.1993.386826","url":null,"abstract":"Two image processing techniques developed for moving target indication from video infrared imagery in natural scenes are presented. It is shown that frequency domain spatio-temporal filtering of video sequences and spatio-temporal constraint error of image frame pairs are able to detect and track moving targets (e.g., personnel) in natural scenes in spite of low image contrast, changes in the target's infrared image pattern, sensor noise, or background clutter. The effectiveness of the motion filtering algorithms when applied to sequences of data corrupted with additive noise is shown. The effectiveness of the CFAR (constant false alarm rate) adaptive threshold algorithm in controlling the false alarm rate for motion detection has been demonstrated. These steps have permitted substantial data reduction so that real-time processing is possible.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121542980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of video presentations on knowledge and public attitudes toward radioactive waste storage","authors":"E. Zannes, C. Kelsey, B. Goss","doi":"10.1109/CCST.1993.386814","DOIUrl":"https://doi.org/10.1109/CCST.1993.386814","url":null,"abstract":"A study was conducted to determine whether short video presentations of facts about radiation and WIPP (Waste Isolation Pilot Plant) and WIPP transportation would increase knowledge and change attitudes regarding the storage of radioactive waste; and (2) to determine the effect of various audio and visual techniques employed in the video presentations on knowledge acquisition and opinion. Changes in knowledge and attitudes toward radioactive waste and the WIPP produced by viewing three video presentations have been measured by showing the tapes to selected viewing groups. The first video presents facts about natural radioactivity; the second presents facts about WIPP; and the third presents facts about the transporting of waste to WIPP. Each video is approximately four minutes long. These initial studies have demonstrated that four-minutes-long videos can change public knowledge and opinion, and that these changes can be measured and quantified.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114550261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of a remotely operated intrusion detection system for security applications","authors":"B. Jones","doi":"10.1109/CCST.1993.386809","DOIUrl":"https://doi.org/10.1109/CCST.1993.386809","url":null,"abstract":"The author discussed a group of recent system level advancements in electronic security systems technology in the areas of sensor signal processing, remote site command, control and communications, and long-life battery operation. The technology for the advancements presented here have been designed, constructed, tested, and incorporated into operational security systems. Actual system architectures and practical embodiments of the designs are presented. The primary applications for these systems are the protection of high value facilities in remote locations and for law enforcement and military operations.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131366334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CCTV operator performance and system design","authors":"P. Walters","doi":"10.1109/CCST.1993.386830","DOIUrl":"https://doi.org/10.1109/CCST.1993.386830","url":null,"abstract":"The introduction of the Rotakin test is shown to be an important step toward improving the performance of closed-circuit television (CCTV) systems. Analysis of the alarm event process calls attention to the areas of sensitivity whereby the system can fail. Reference to knowledge in the human visual performance field makes it possible to improve the images presented to the operator, thereby permitting him to do his job more easily. The addition of systems performance testing to systems specifications provides a non-altruistic motive for the pursuit of the relevant engineering knowledge.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115878728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal allocation of security sensors/guards-graph theoretic approach","authors":"K. Inoue, T. Kohda, M. Shirahama","doi":"10.1109/CCST.1993.386812","DOIUrl":"https://doi.org/10.1109/CCST.1993.386812","url":null,"abstract":"The problem of optimal allocation of security sensors and/or guards is formulated as a graph/network problem, where the importance of the concept of degree of security or multiple minimal cut set is stressed. An algorithm for solving the formulated graph/network problem is developed and it is shown that the algorithm is very effective from the viewpoint of computational complexity. Examples are given to illustrate the concept of degree of security, optimal allocation of security sensors/guards, multiple minimal cut set, and computational efficiency. A typical example among them is: assume a terrorist or a thief is going to attack a target in a town. The problem is to find the minimum number of sensors/guards and where and how to allocate them in the town, detecting him at least twice (or more generally k times) on his way to the target, even if he may take any route among numerous possible routes.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133492932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrity and security in AM/FM-GIS","authors":"E. Orlandi","doi":"10.1109/CCST.1993.386801","DOIUrl":"https://doi.org/10.1109/CCST.1993.386801","url":null,"abstract":"The authors present the integrity and security requirements of AM/FM-GIS (geographic information system) systems, involving the security of the operating system, the DBMS (database management systems), and graphic information. Well-established security services and mechanisms developed for EDP on-line systems can be applied to AM/FM-GIS. In AM/FM-GIS, the security issue can be approached with formal methods in the pre-evaluation and evaluation phases. The security requirements should produce a well-defined input to the system design and could influence the selection of the data base with regard to the implementation technique. In AM/FM-GIS systems, different access modes should be possible on several data structures: layers, element groups, objects, and drawings.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122005453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}