{"title":"周界保护和点访问控制的新解决方案","authors":"L. Bennett","doi":"10.1109/CCST.1992.253753","DOIUrl":null,"url":null,"abstract":"The author discusses new technologies available to detect approaches to a protected perimeter, intelligent systems for combining information from different detection systems to reduce false alarms by coincidence monitoring, and the use of biometrics and database systems to improve the speed and quality of access point systems. Experimental and trial data are presented to assess the cost benefits of new approaches. These data are related to the opportunities for improved total system performance and integrity.<<ETX>>","PeriodicalId":105477,"journal":{"name":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1992-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"New solutions to perimeter protection and point access control\",\"authors\":\"L. Bennett\",\"doi\":\"10.1109/CCST.1992.253753\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The author discusses new technologies available to detect approaches to a protected perimeter, intelligent systems for combining information from different detection systems to reduce false alarms by coincidence monitoring, and the use of biometrics and database systems to improve the speed and quality of access point systems. Experimental and trial data are presented to assess the cost benefits of new approaches. These data are related to the opportunities for improved total system performance and integrity.<<ETX>>\",\"PeriodicalId\":105477,\"journal\":{\"name\":\"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures\",\"volume\":\"59 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1992-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCST.1992.253753\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 1992 International Carnahan Conference on Security Technology: Crime Countermeasures","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.1992.253753","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
New solutions to perimeter protection and point access control
The author discusses new technologies available to detect approaches to a protected perimeter, intelligent systems for combining information from different detection systems to reduce false alarms by coincidence monitoring, and the use of biometrics and database systems to improve the speed and quality of access point systems. Experimental and trial data are presented to assess the cost benefits of new approaches. These data are related to the opportunities for improved total system performance and integrity.<>