{"title":"Bioluminescent Sensors for Onsite Non-specific Screening of Toxic Agents in Food and Water","authors":"E. Alocilja, T. McLean","doi":"10.1109/THS.2007.370046","DOIUrl":"https://doi.org/10.1109/THS.2007.370046","url":null,"abstract":"This paper presents a non-specific detection system for quickly screening toxic and harmful contaminants in food products by utilizing the properties of naturally occurring bioluminescence in selected living bacteria. The goal of the project was to evaluate the effectiveness of using luminescent bacteria as \"canaries\" for rapid non-specific detection of toxic contaminants for homeland food protection and defense. Vibro fischeri was used as the specific biological sensor in this study. The bacteria was grown in marine broth and maintained between 22 and 25degC for optimal growth. Cultures were used to determine the presence of a surrogate toxicant, in this case, sodium hypochlorite (bleach) in various concentrations. Initial results show that 10% bleach quenches light emission immediately upon contact with the bacteria contained in 3 food matrices, namely: skim milk, 2% milk, and drinking water. This naturally occurring biological sensor would be useful in providing an inexpensive, highly renewable early warning system of a potentially catastrophic event. A successful system would enhance early surveillance against any intentional attack on the US food supply, including drinking water. Even in the absence of a bioterrorism event, the biological sensor would still be useful in control measures against naturally occurring or sanitation-constrained toxic substances.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122371586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PSnet: A Collaborative, Bottom-up Approach To Building a Regional Public Safety Network","authors":"G. Fosque","doi":"10.1109/THS.2007.370010","DOIUrl":"https://doi.org/10.1109/THS.2007.370010","url":null,"abstract":"Effective coordination of public safety functions requires high-quality regional data networking that connects many municipal, state, federal and other agencies. One approach would be to build a massive new network and invite (or force) everyone onto it. This paper describes an alternative approach: an ongoing project in the Boston area create a regional network by leveraging existing networking assets and other public safety investments. A pilot project is complete, and growth of the network is underway. The model on which PSnet is based - private and public entities at local, state, and federal levels collaborating to create and operate network infrastructure - has been proven successful from a technical, operational, and business point of view in other domains among other communities such as research and higher education. Creating PSnet is as much about creating the necessary governance and other human and organizational infrastructure as it is about the network itself.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"26-27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116775218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Results of Location Service Measurements for CCDS Applications","authors":"R. Katulski, J. Stefanski, R. Niski, J. Zurek","doi":"10.1109/THS.2007.370056","DOIUrl":"https://doi.org/10.1109/THS.2007.370056","url":null,"abstract":"In this paper the unique coastal cellular distress system (CCDS), based on a cellular phone network was proposed. The concept, functional properties and services of this system were described. The problem of the location service (LCS) at sea was presented. The geographical location accuracy of a mobile phone in a coastal sea area is analysed. Special measurement system and software application, designed for the field trial is also presented. The measurement results of LCS quality at sea are presented. Finally, the integration of cellular network based system and Search And Rescue service (SAR) was discussed.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114649723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MobileEmerGIS: a Wireless-enabled Technology Platform To Support Emergency Response Management","authors":"C. Wietfeld, A. Wolff, U. Bieker","doi":"10.1109/THS.2007.370019","DOIUrl":"https://doi.org/10.1109/THS.2007.370019","url":null,"abstract":"In this paper, the architecture and middleware services of the wireless-enabled emergency response management system MobileEmerGIS are introduced. MobileEmerGIS allows to gather and to distribute multimedia information to and from mobile nodes (either human users or sensors/actors). Thereby, field forces and eye witnesses can transfer data collected in the field, such as pictures from emergency sites, immediately to centrally located decision makers as well as other field forces (using PDA platforms and even their own private mobile phones). While the data collected by the system provides many opportunities for optimizing the coordination of the rescue activities, at the same there is a risk that on-site rescue forces are paralyzed by being overwhelmed with the exponentially growing amount of information. Therefore one of the key capabilities of MobileEmerGIS is that centrally stored data is made available to mobile rescue forces in a highly focused way, for example by applying geopositioning and role-dependent filters. By referencing real-life scenarios (such as a large-scale fire emergency), concrete application services enabled by MobileEmerGIS are presented.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124796955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Managing Implementation Risks through Time-Behavior Analysis","authors":"N. H. Wasserman","doi":"10.1109/THS.2007.370053","DOIUrl":"https://doi.org/10.1109/THS.2007.370053","url":null,"abstract":"The protection of critical infrastructure systems from outside threat depends upon an understanding of the human behaviors that act as threats and the human behaviors that build defenses against those threats. The paper presents a model and architectural approach for categorizing those behaviors, which takes into account the effects of incremental growth and propagation of behaviors across networks. The time-behavior model is applied to considerations of business architecture and implementation risks for security and other technologies.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"111 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124115638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Video for Homeland Security Applications","authors":"A. Nusimow","doi":"10.1109/THS.2007.370035","DOIUrl":"https://doi.org/10.1109/THS.2007.370035","url":null,"abstract":"This paper considers the problem of protecting critical infrastructure and other homeland security initiatives with the application of an intelligent video (IV) system. A systems engineering approach is followed to decompose top level requirements into system functions based on the Department of Homeland Security (DHS) Strategic Plan, The National Strategy for Homeland Security, and the National Infrastructure Protection Plan (NIPP). In parallel, the attributes of an intelligent video system are introduced, and then correlated with the system functions. Specific top level intelligent video system attributes and applications include virtual perimeter breach detection, object detection, removed or left object detection, object counting, object classification, object tracking, wrong way detection, facial recognition, forensic video, and behavior alerts. In this way, the overarching application of intelligent video technology to specific homeland security challenges are shown. The paper highlights the capabilities and benefits of an intelligent video system to autonomously perform real time monitoring activities and alert notifications based on user defined rules. Some of the challenges to intelligent video systems such as dynamic environments, false alarms, and privacy implications are addressed.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114308042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video Performance Requirements for Tactical Video Applications","authors":"M. Pinson, S. Wolf, R. Stafford","doi":"10.1109/THS.2007.370025","DOIUrl":"https://doi.org/10.1109/THS.2007.370025","url":null,"abstract":"The Public Safety Statement of Requirements (PS-SoR) for Communications & Interoperability focuses on the needs of first responders to communicate and share information as authorized, when it is needed, where it is needed, and in a mode or form that allows the practitioners to effectively use it. PS-SoR Volume I defined functional communication and interoperability requirements. Published in September, 2006, PS-SoR Volume II identifies quantitative performance metrics, including minimum video performance requirements for public safety's tactical video applications. The goal was not to identify what is achievable with current technology but rather, looking towards the future, to investigate the minimum level of performance that first responders need in order to effectively use their video equipment. On behalf of the SAFECOM Program and the Office of Law Enforcement Standards, the Institute for Telecommunication Sciences (ITS) conducted subjective video quality testing to estimate the level of video quality that first responders find acceptable for tactical video applications. This subjective testing utilized source video content that is typical of public safety operations in structured subjective viewing experiments with 35 first responders. The evaluations from these first responders, in viewing high quality video (original video) and purposefully degraded video (using video compression and transmission equipment), allowed determination of basic quality thresholds for public safety tactical video applications. These perceptual quality thresholds have been translated into technical parameters for use by video equipment designers, manufacturers, and customers. This paper summarizes those findings. Other testing to evaluate requirements for other public safety applications is underway.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121732867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Womble, J. Spadaro, M. Harrison, A. Barzilov, D. Harper, B. Lemoff, R. Martin, I. Novikov, J. Paschal, L. Hopper, C. Davenport, J. Lodmell
{"title":"A Pressurized Tank Car Inspection System for Railroad Transportation Security","authors":"P. Womble, J. Spadaro, M. Harrison, A. Barzilov, D. Harper, B. Lemoff, R. Martin, I. Novikov, J. Paschal, L. Hopper, C. Davenport, J. Lodmell","doi":"10.1109/THS.2007.370013","DOIUrl":"https://doi.org/10.1109/THS.2007.370013","url":null,"abstract":"Pressurized rail tank cars transport large volumes of volatile liquids and gases throughout the country, much of which is hazardous and/or flammable. Our group is developing a trackside inspection system for these tank cars. It consists of five narrow frequency band pressure sensors with center frequencies of 40 and 75 kHz, a broad band microphone for sound normalization and three video cameras. In addition, a 5 cm times 5 cm NaI(Tl) radiation detector provides radiological data on the passing trains every 60 seconds. During operation, an audio frequency spectrum is associated with each frame of the video camera as the train passes by the system at normal speeds, and the spectra are inspected for high frequency sounds associated with leaks. A 10 m tall tower houses the system positioned approximately 10 m from the center of a rail line and siding located in Bowling Green, KY (USA). The system is controlled by a website and server located at the tower and the Internet connection utilizes WiFi (802.11 g) radios.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121912574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved Isotopic Identification for NaI Spectroscopic Portal Monitors Using the Material Basis Set (MBS) Method","authors":"R. Estep, B. Sapp, W. Russ","doi":"10.1109/THS.2007.370040","DOIUrl":"https://doi.org/10.1109/THS.2007.370040","url":null,"abstract":"This report describes our application of the multiple isotope material basis set (MIMBS) method for isotope identification to the analysis of simulated spectra of Nal logs used in spectral portal monitors. The MIMBS method couples attenuation corrections for shielding materials with an ordinary isotopic response function fit. Spectrum simulations of twenty-four isotopes were generated using the Speculator software (with MCNP for attenuation calculations) for a 3 x 5 x 16-inch Nal log detector, through a series of attenuating absorbers representing a Z range from Al through Pb. Two-isotope combinations of these were analyzed using the MIMBS algorithm, with and without added 4 K background and Poisson noise. We found the MIMBS method to be highly accurate in identifying both the component isotopes and their relative amounts, even at high noise and background levels.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124950149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Hirai, K. Inomata, N. Miyake, K. Sumi, K. Tanaka
{"title":"Wide Area Intruder Detection System with a Pair of Transceiver Cables","authors":"T. Hirai, K. Inomata, N. Miyake, K. Sumi, K. Tanaka","doi":"10.1109/THS.2007.370023","DOIUrl":"https://doi.org/10.1109/THS.2007.370023","url":null,"abstract":"We have developed a wide area intruder detection surveillance system which was delivered to the Japanese market last summer. This technology is known as MELWATCH which stands for MELco WATCH(to keep lookout). It has been installed at several sites in Japan. MELWATCH is composed of a pair of sensor cables, a sensor unit and an intrusion detection terminal. The sensor cables are composed of a transmission and a receiving cable (transceiver cables), both of which are off-the-shelf leaky coaxial cables. The sensor cables are deployed in parallel along the boundary to be monitored. Upon activation, the sensor unit sends an electric wave into the transmission cable which results in the electric wave leaks from the cable. The receiving cable receives the leaked electric wave and an electric field is formed between the cables. When an intruder enters the electric field, the sensor unit detects this activity and the precise location of the intrusion. Moreover, this sensor is less affected by the environmental noise, such as trees or small animals, nor weather conditions. In addition, the ability to specify the intrusion point makes it possible to configure the more sophisticated system with pan-tilt-zoom cameras. In this paper, we show the effectiveness of MELWATCH through the field data of the several installed sites.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129593231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}