2007 IEEE Conference on Technologies for Homeland Security最新文献

筛选
英文 中文
A Free Space Optics Based Identification and Interrogation System 基于自由空间光学的识别与讯问系统
2007 IEEE Conference on Technologies for Homeland Security Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370014
A. Ghosh, P. Verma, S. Cheng, A. Venugopalan
{"title":"A Free Space Optics Based Identification and Interrogation System","authors":"A. Ghosh, P. Verma, S. Cheng, A. Venugopalan","doi":"10.1109/THS.2007.370014","DOIUrl":"https://doi.org/10.1109/THS.2007.370014","url":null,"abstract":"In this paper we discuss the design of a free-space optics based system that can be used for identification or identification/interrogation over varying distances. The system consists of photonic transducers and sources that can be easily incorporated in optical tags and base-stations. When an optical reader sends an interrogation beam of light to an optical tag, the tag sends its response. A major advantage of our system is that various electronic or photonic sensors or transducers can be easily incorporated in the design of optical tags so that the output of the sensors can be read remotely. The proposed system does not cause RF interference to nearby objects and is secure owing to the highly directional nature of optical communication. The system can use encryption technology to provide an additional layer of security. Unlike RF-IDs our system also provides flexibility on the distance between tags and base-stations or readers. Further, optical communication is unlicensed unlike the use of RF bands. Optical identification/interrogation systems proposed in the literature either uses specially designed MEMS devices or holograms. Compared to these our system is built with low-cost optoelectronic components and can be packaged in low-cost and rugged units.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126436686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Toward Developing Genetic Algorithms to Aid in Critical Infrastructure Modeling 开发遗传算法以帮助关键基础设施建模
2007 IEEE Conference on Technologies for Homeland Security Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370044
M. R. Permann
{"title":"Toward Developing Genetic Algorithms to Aid in Critical Infrastructure Modeling","authors":"M. R. Permann","doi":"10.1109/THS.2007.370044","DOIUrl":"https://doi.org/10.1109/THS.2007.370044","url":null,"abstract":"Today's society relies upon an array of complex national and international infrastructure networks such as transportation, telecommunication, financial and energy. Understanding these interdependencies is necessary in order to protect our critical infrastructure. The Critical Infrastructure Modeling System, CIMScopy, examines the interrelationships between infrastructure networks. CIMScopy development is sponsored by the National Security Division at the Idaho National Laboratory (INL) in its ongoing mission for providing critical infrastructure protection and preparedness. A genetic algorithm (GA) is an optimization technique based on Darwin's theory of evolution. A GA can be coupled with CIMScopy to search for optimum ways to protect infrastructure assets. This includes identifying optimum assets to enforce or protect, testing the addition of or change to infrastructure before implementation, or finding the optimum response to an emergency for response planning. This paper describes the addition of a GA to infrastructure modeling for infrastructure planning. It first introduces the CIMScopy infrastructure modeling software used as the modeling engine to support the GA. Next, the GA techniques and parameters are defined. Then a test scenario illustrates the integration with CIMScopy and the preliminary results.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123353470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Coordinated Activation and Reporting for Energy-Efficient Target Intrusion Detection, Tracking, and Reporting in Wireless Sensor Networks 无线传感器网络中节能目标入侵检测、跟踪与报告的协同激活与报告
2007 IEEE Conference on Technologies for Homeland Security Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370045
D. Jain, V. Vokkarane
{"title":"Coordinated Activation and Reporting for Energy-Efficient Target Intrusion Detection, Tracking, and Reporting in Wireless Sensor Networks","authors":"D. Jain, V. Vokkarane","doi":"10.1109/THS.2007.370045","DOIUrl":"https://doi.org/10.1109/THS.2007.370045","url":null,"abstract":"Wireless sensor network (WSN) is a network consisting of several nodes equipped with sensors that cooperatively monitor physical conditions. WSNs are being used in many monitoring applications. In this paper, we present a new approach to perform coordinated activation and reporting (CAR) for energy-efficient target monitoring (detection, tracking, and reporting) in WSNs. Our approach aims to minimize the response-time by activating sensors (from sleep-mode) that are along the target's path, and then forwarding the information to be reported to the base-station from these sensors along the same coordinated path. If we are unable to meet the response-time deadline using a coordinated path, we split the tracking path and the reporting path in to independent paths, so that the base-station is reported within the response-time deadline. We perform extensive simulations on different sample target-paths, and compute average response-time and network lifetime for each scenario. We also investigate the problem of optimal base-station placement, so as to improve the average response-time in the network.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115635660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Web 2.0 Framework for Real-time Location Intelligence 实时位置智能的Web 2.0框架
2007 IEEE Conference on Technologies for Homeland Security Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370036
K. Rivard
{"title":"A Web 2.0 Framework for Real-time Location Intelligence","authors":"K. Rivard","doi":"10.1109/THS.2007.370036","DOIUrl":"https://doi.org/10.1109/THS.2007.370036","url":null,"abstract":"With increasing deployments of global positioning system (GPS) devices, radio frequency identification (RFID) tags, and other location-aware devices, it is now possible to capture time-varying object information. In addition, existing systems such as enterprise resource planning (ERP) systems emit ancillary object metadata (e.g., inventory levels in a warehouse). The challenge is how to leverage these information assets for demanding field operations scenarios such as crisis management, given the size and real-time nature of the data. To address the challenge, we have built a Web 2.0 framework for real-time spatial intelligence and collaboration. Our framework includes an extensible architecture for ingesting and combining spatial data across multiple formats; a fusion server for merging spatial and bespoke business data; support for spatial transformations tied to configurable business rules; and a publishing engine that pushes the combined information out for consumption in a visual, collaborative presentation layer running in standard Web browsers and on mobile devices. The result is an easily deployable system with broad reach to the field through a visual, interactive interface presenting timely, meaningful information.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130163096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TPLS: A Time and Power Based Localization Scheme for Indoor WLAN Using Sensor Networks TPLS:一种基于时间和功率的室内无线局域网传感器网络定位方案
2007 IEEE Conference on Technologies for Homeland Security Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370031
Abdallah El Moutia, K. Makki, N. Pissinou
{"title":"TPLS: A Time and Power Based Localization Scheme for Indoor WLAN Using Sensor Networks","authors":"Abdallah El Moutia, K. Makki, N. Pissinou","doi":"10.1109/THS.2007.370031","DOIUrl":"https://doi.org/10.1109/THS.2007.370031","url":null,"abstract":"Rapid growth in the number of wireless enabled devices has led to an increased interest in location-aware services. The core support for such services is provided by a location system. In this paper, we present a time and power based localization scheme (TPLS) for indoor wireless local area network (WLAN) using an overlay sensor network. TPLS is based on time difference of arrival (TDoA) and received signal strength (RSS) using radio frequency and ultrasonic signals to measure and detect the range differences from the wireless mobile terminal to three sensor nodes. Mobile terminals can use TPLS to effectively estimate their locations based on the range differences. These range differences are averaged over multiple beacon intervals to counter interference and fading before they are combined to estimate the location of a mobile terminal through trilateration. TPLS requires low computation overhead and no time synchronization, as the location estimation algorithm involves only a simple algebraic operation.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125546194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
FNET: A Quickly Deployable and Economic System to Monitor the Electric Grid FNET:一个快速部署和经济的电网监控系统
2007 IEEE Conference on Technologies for Homeland Security Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370047
R. Gardner, Yilu Liu
{"title":"FNET: A Quickly Deployable and Economic System to Monitor the Electric Grid","authors":"R. Gardner, Yilu Liu","doi":"10.1109/THS.2007.370047","DOIUrl":"https://doi.org/10.1109/THS.2007.370047","url":null,"abstract":"In a time where the electric grid has become a potential target for malicious attacks against homeland security, this paper presents a system that can detect and locate disturbances that have an impact the electric grid. The system presented is referred to as FNET which is short for \"Internet-based Frequency Monitoring Network. \" FNET uses frequency measurements taken from across the electric interconnection to detect and locate disturbances such as generator trips and load shedding. These events occur routinely (almost daily) under normal system conditions. In these circumstances, the electric grid and its components usually respond in a manner so as to preserve the grid's integrity. However, in a time where threats to homeland security can involve threats to the electric grid, such disturbances caused by malicious (and perhaps multiple) attacks can cascade leading to the collapse of the entire electric grid. The goal of this work is to show that FNET can be an invaluable tool for enhancing situational awareness of the country's electric infrastructure especially in situations where the preservation of homeland security is critical.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125556357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Data Interoperability Strategies for Conceptually-Similar Disparate Systems 概念相似的异构系统的数据互操作性策略
2007 IEEE Conference on Technologies for Homeland Security Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370026
G. Harman
{"title":"Data Interoperability Strategies for Conceptually-Similar Disparate Systems","authors":"G. Harman","doi":"10.1109/THS.2007.370026","DOIUrl":"https://doi.org/10.1109/THS.2007.370026","url":null,"abstract":"The public safety software industry is extremely fragmented; there are several hundred different dispatch systems alone in use in the United States today. All of these systems perform nearly identical functions from a user's perspective, but they all implement these functions and store the resulting data in their own fashion. This paper will examine a technique for sharing data between such systems for coordinated response to an emergency scenario or everyday events.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121044148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human-Centered Fusion Framework 以人为本的融合框架
2007 IEEE Conference on Technologies for Homeland Security Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370030
C. Posse, A. White, N. Beagley
{"title":"Human-Centered Fusion Framework","authors":"C. Posse, A. White, N. Beagley","doi":"10.1109/THS.2007.370030","DOIUrl":"https://doi.org/10.1109/THS.2007.370030","url":null,"abstract":"In recent years the benefits of fusing signatures extracted from large amounts of distributed and/or heterogeneous data sources have been largely documented in various problems ranging from biological protein function prediction to cyberspace monitoring. In spite of significant progress in information fusion research, there is still no formal theoretical framework for defining various types of information fusion systems, defining and analyzing relations among such types, and designing information fusion systems using a formal method approach. Consequently, fusion systems are often poorly understood, are less than optimal, and/or do not suit user needs. To start addressing these issues, we outline a formal human-centered fusion framework for reasoning about fusion strategies. Our approach relies on a new taxonomy for fusion strategies, an alternative definition of information fusion in terms of parameterized paths in signature related spaces, an algorithmic formalization of fusion strategies and a library of numeric and dynamic visual tools measuring the impact as well as the impact behavior of fusion strategies. Using a real case of intelligence analysis we demonstrate that the proposed framework enables end users to rapidly 1) develop and implement alternative fusion strategies, 2) understand the impact of each strategy, 3) compare the various strategies, and 4) perform the above steps without having to know the mathematical foundations of the framework. We also demonstrate that the human impact on a fusion system is critical in the sense that small changes in strategies do not necessarily correspond to small changes in results.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126791152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic Visual Analysis for Transportation Security 运输安全的自动可视化分析
2007 IEEE Conference on Technologies for Homeland Security Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370012
N. Haering, K. Shafique
{"title":"Automatic Visual Analysis for Transportation Security","authors":"N. Haering, K. Shafique","doi":"10.1109/THS.2007.370012","DOIUrl":"https://doi.org/10.1109/THS.2007.370012","url":null,"abstract":"The safety and security of transportation infrastructure has become the focus of increased attention in the post-9/11 era. Concerns in this area include the possibility of terrorist activity directed at travelers and/or property. As the leader in intelligent video, ObjectVideo is developing intelligent capabilities specifically tailored to meet the needs of the transportation industry that work effectively in diverse environments, for example, tunnels of a subway, highway rail grade crossings, and air and seaports. ObjectVideo's intelligent system employs a network of visual sensors to monitor sensitive areas. The technology accurately detects, identifies, classifies, and tracks objects and people; automatically detects activities that violate user specified security rules and notifies security personnel in real-time about rule violations and suspicious activities. The system automatically monitors user specified areas for unauthorized people and vehicles loitering on a platform, for suspicious objects (e.g., backpacks or bags) left on or near sensitive locations, or for objects that are large enough to cause serious accidents. Because the system is capable of distinguishing non-threatening objects and controlling false alerts, the software maximizes the effectiveness of security personnel, allowing them to focus their efforts on potential threats, enhancing protection for all passengers, freight and facilities.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114235533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Results From Application of Time Series Concepts to Vehicle Gamma Count Profiles 时间序列概念应用于车辆伽马计数曲线的结果
2007 IEEE Conference on Technologies for Homeland Security Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370034
C. Lo Presti, B. Milbrath, M. Tardiff, S. Hartley-McBride
{"title":"Results From Application of Time Series Concepts to Vehicle Gamma Count Profiles","authors":"C. Lo Presti, B. Milbrath, M. Tardiff, S. Hartley-McBride","doi":"10.1109/THS.2007.370034","DOIUrl":"https://doi.org/10.1109/THS.2007.370034","url":null,"abstract":"Algorithms based on time-series analysis techniques were explored for maximizing the effectiveness of pass-through radiation portal monitors for detection of special nuclear material (SNM). Time-series properties of vehicle count profiles such as stationarity and autocorrelation within energy windows were characterized. Vehicle count profiles were nonstationary but were found to be made stationary by first-differencing. Autocorrelation functions showed consistent differences between NORM alarm and non-alarm vehicles. Injection studies were performed to assess the performance of time-domain detection algorithms based on stationarity tests and on the CUSUM change-point detection test. Results indicated possible roles for detection algorithms based on statistical process control and on time series concepts.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133577175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信