首页 > 最新文献

2010 IEEE International Conference on Technologies for Homeland Security (HST)最新文献

英文 中文
Disruption management optimization for defense industrial base systems 国防工业基础系统中断管理优化
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655052
Saheed Hamid, T. Mazucchi, S. Sarkani
Military supplies have unique functions that are not widely used elsewhere, so there are likely limited producers of these items. In times of war, the usage rate for military materiel increases dramatically and demand follows a non-linear pattern. Whether the items are bullets or tanks, if their production facilities are destroyed or severely damaged by acts of terrorism, natural, or man-made disasters, what recourse would the military have in order to acquire these unique supplies? To mitigate this risk, is it worth the expense and effort to duplicate the capability or it is more advantageous to stockpile unique commodities in case of such disasters? Is it advisable to acquire a temporary or emergency capability, until an indigenous capability can be reconstituted? This paper seeks to develop an optimizing process to answer these logistics and policy questions, using a process similar to the Military Decision Making Process (MDMP).
军用物资具有其他地方没有广泛使用的独特功能,因此这些物品的生产商可能有限。在战争时期,军用物资的使用率急剧增加,需求遵循非线性模式。无论这些物品是子弹还是坦克,如果它们的生产设施被恐怖主义行为、自然灾害或人为灾害摧毁或严重损坏,军方将有什么办法来获得这些独特的供应?为了减轻这种风险,是否值得花费精力复制这种能力,或者在发生此类灾难时储存独特的商品更为有利?在能够重建本国能力之前,是否应该获得临时或应急能力?本文试图开发一个优化过程来回答这些后勤和政策问题,使用类似于军事决策过程(MDMP)的过程。
{"title":"Disruption management optimization for defense industrial base systems","authors":"Saheed Hamid, T. Mazucchi, S. Sarkani","doi":"10.1109/THS.2010.5655052","DOIUrl":"https://doi.org/10.1109/THS.2010.5655052","url":null,"abstract":"Military supplies have unique functions that are not widely used elsewhere, so there are likely limited producers of these items. In times of war, the usage rate for military materiel increases dramatically and demand follows a non-linear pattern. Whether the items are bullets or tanks, if their production facilities are destroyed or severely damaged by acts of terrorism, natural, or man-made disasters, what recourse would the military have in order to acquire these unique supplies? To mitigate this risk, is it worth the expense and effort to duplicate the capability or it is more advantageous to stockpile unique commodities in case of such disasters? Is it advisable to acquire a temporary or emergency capability, until an indigenous capability can be reconstituted? This paper seeks to develop an optimizing process to answer these logistics and policy questions, using a process similar to the Military Decision Making Process (MDMP).","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132671160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An automatic non-native speaker recognition system 非母语人士自动识别系统
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655088
Bozhao Tan, Qi Li, Robert Foresta
Identification of non-native personnel is a critical piece of information for making crucial on-the-spot decisions for security purposes. Identification of a non-native speaker is often readily apparent in normal conversation with a native speaker through speech content and accent. Such identification which requires familiarity with language nuances may not be possible for a non-native interrogator or intelligence analyst or when conversing or listening through a machine language translator. Developing an automatic system to identify speakers as native or non-native, as well as their native language, including dialect, within input audio streams, is the major goal of this project. Such a system may be used alone or with other downstream applications such as machine language translation systems. In this paper we present four approaches to identify native and non-native speakers as a binary recognition problem. The approaches can be further categorized into phonetic-based approaches and non-phonetic-based approaches. These approaches were tested on two separate databases, including text-dependent read speech and text-independent spontaneous speech. The results show that our system is competitive in comparison with other published, state-of-the-art non-native speaker recognition systems. Key metrics for automated non-native recognition systems include: 1) positive identification rates, 2) false alarm/identification rates, and 3) length of captured speech sample required to reach a decision.
非本国人员的身份是为安全目的作出关键的现场决定的一项关键信息。在与母语人士的正常对话中,通过讲话内容和口音可以很容易地识别出非母语人士。这种需要熟悉语言细微差别的识别,对于非母语的审讯人员或情报分析员来说,或者通过机器语言翻译器进行交谈或聆听时,可能是不可能的。开发一个自动系统,在输入的音频流中识别说话者是母语还是非母语,以及他们的母语,包括方言,是这个项目的主要目标。这样的系统可以单独使用或与其他下游应用程序(如机器语言翻译系统)一起使用。在本文中,我们提出了四种方法来识别母语和非母语人士作为一个二值识别问题。这些方法可以进一步分为基于语音的方法和非基于语音的方法。这些方法在两个独立的数据库上进行了测试,包括文本依赖的阅读语音和文本独立的自发语音。结果表明,与其他已发表的、最先进的非母语识别系统相比,我们的系统具有竞争力。自动非原生识别系统的关键指标包括:1)正识别率,2)假警报/识别率,以及3)达到决策所需的捕获语音样本长度。
{"title":"An automatic non-native speaker recognition system","authors":"Bozhao Tan, Qi Li, Robert Foresta","doi":"10.1109/THS.2010.5655088","DOIUrl":"https://doi.org/10.1109/THS.2010.5655088","url":null,"abstract":"Identification of non-native personnel is a critical piece of information for making crucial on-the-spot decisions for security purposes. Identification of a non-native speaker is often readily apparent in normal conversation with a native speaker through speech content and accent. Such identification which requires familiarity with language nuances may not be possible for a non-native interrogator or intelligence analyst or when conversing or listening through a machine language translator. Developing an automatic system to identify speakers as native or non-native, as well as their native language, including dialect, within input audio streams, is the major goal of this project. Such a system may be used alone or with other downstream applications such as machine language translation systems. In this paper we present four approaches to identify native and non-native speakers as a binary recognition problem. The approaches can be further categorized into phonetic-based approaches and non-phonetic-based approaches. These approaches were tested on two separate databases, including text-dependent read speech and text-independent spontaneous speech. The results show that our system is competitive in comparison with other published, state-of-the-art non-native speaker recognition systems. Key metrics for automated non-native recognition systems include: 1) positive identification rates, 2) false alarm/identification rates, and 3) length of captured speech sample required to reach a decision.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132942299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Gamma-insensitive fast neutron detector with spectral source identification potential 具有光谱源识别潜力的伽马不敏感快中子探测器
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654947
R. Chandra, G. Davatz, A. Howard
A neutron scintillation detector based on high-pressure 4He has been developed and tested. The detector responds to elastic scattering of unmoderated fast neutrons, preserving neutron energy, position, and timing information. Neutrons from three different sources, AmBe, 252Cf, and from the ambient background, have been measured with clearly distinct energy spectra. Exposing the detector to different levels of gamma radiation up to 1 mSv/h from a 60Co source has demonstrated that gamma exposure does not affect neutron detection performance within measurement statistics. Applications in the field of radiation portal monitoring are discussed.
研制并测试了一种基于高压4He的中子闪烁探测器。探测器响应非慢化快中子的弹性散射,保留中子能量、位置和时间信息。来自三种不同来源的中子,AmBe, 252Cf,以及来自环境背景,已经用明显不同的能谱进行了测量。将探测器暴露于60Co源的高达1 mSv/h的不同水平的伽马辐射中,表明伽马暴露在测量统计范围内不会影响中子探测性能。讨论了在辐射门户监测领域的应用。
{"title":"Gamma-insensitive fast neutron detector with spectral source identification potential","authors":"R. Chandra, G. Davatz, A. Howard","doi":"10.1109/THS.2010.5654947","DOIUrl":"https://doi.org/10.1109/THS.2010.5654947","url":null,"abstract":"A neutron scintillation detector based on high-pressure 4He has been developed and tested. The detector responds to elastic scattering of unmoderated fast neutrons, preserving neutron energy, position, and timing information. Neutrons from three different sources, AmBe, 252Cf, and from the ambient background, have been measured with clearly distinct energy spectra. Exposing the detector to different levels of gamma radiation up to 1 mSv/h from a 60Co source has demonstrated that gamma exposure does not affect neutron detection performance within measurement statistics. Applications in the field of radiation portal monitoring are discussed.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134320060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Automated computation of malware behavior 自动计算恶意软件行为
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655085
R. Linger, M. Pleszkoch, Kirk Sayre, Timothy Daly
Automated software behavior computation is an emerging technology under development at the Software Engineering Institute that can be applied to analysis of malicious code. Behavior computation is based on the semantics of programming language instructions and the opportunity to compose them to determine net effects of programs. An initial implementation is targeted to malicious code expressed in Intel assembly language.
自动化软件行为计算是软件工程研究所正在开发的一项新兴技术,可以应用于恶意代码的分析。行为计算是基于编程语言指令的语义和组合它们以确定程序的净效果的机会。最初的实现是针对用英特尔汇编语言表达的恶意代码。
{"title":"Automated computation of malware behavior","authors":"R. Linger, M. Pleszkoch, Kirk Sayre, Timothy Daly","doi":"10.1109/THS.2010.5655085","DOIUrl":"https://doi.org/10.1109/THS.2010.5655085","url":null,"abstract":"Automated software behavior computation is an emerging technology under development at the Software Engineering Institute that can be applied to analysis of malicious code. Behavior computation is based on the semantics of programming language instructions and the opportunity to compose them to determine net effects of programs. An initial implementation is targeted to malicious code expressed in Intel assembly language.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133143122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparison of experimental and modeled results of an active millimeter wave inverse synthetic aperture radar system used to perform standoff detection of person-borne improvised explosive devices 有源毫米波逆合成孔径雷达系统对人载简易爆炸装置进行对峙探测的实验与仿真结果比较
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654952
J. Fernandes, R. Obermeier, M. Hagelen, J. Martinez-Lorenzo, C. Rappaport
With the recent rise in casualties resulting from person-borne improvised explosive devices (PBIEDs) or ”suicide bombers,” there is an urgent need for standoff detection of such threats. An optimum system that fulfills the requirements of standoff detection must be portable, low cost, and have a high probability of detection with low probability of false alarm at a distance of at least 20 meters. Currently there are a variety of modalities being researched to perform standoff detection of PBIED's including: backscatter X-ray imaging, infrared imaging, optical detection, terahertz imaging, video analytics, and millimeter-wave (MMW) imaging. MMW imaging at 94 GHz is a very good modality for performing standoff detection of PBIEDs. MMWs can propagate through the atmosphere and clothing with very little attenuation, while at the same time do not cause damage to human skin tissue. A mono-static linear frequency modulated continuous wave (LFMCW) circular inverse synthetic aperture radar (ISAR) system has been developed and tested. A model of such a system using a two dimensional full wave analysis based on the finite difference method in the frequency domain has been developed and compared with results of the experimental system. Using a two dimensional matched filtering technique in the frequency domain, simulated images have been used as a means of performing target detection and classification. The imaging results of both simulated and experimentally obtained data is presented in this paper. Initial results using the 2D matched filtering target classification technique will also be presented.
随着最近由个人携带的简易爆炸装置(PBIEDs)或“自杀式炸弹”造成的伤亡人数上升,迫切需要对这类威胁进行对峙检测。满足防区检测要求的最佳系统必须具有便携性、低成本以及在至少20米距离内具有高检测概率和低虚警概率。目前,有各种各样的模式正在研究用于执行PBIED的对峙检测,包括:后向散射x射线成像、红外成像、光学检测、太赫兹成像、视频分析和毫米波(MMW)成像。94ghz的毫米波成像是一种非常好的pbied对峙检测方式。毫米波可以通过大气和衣服传播,衰减很小,同时不会对人体皮肤组织造成损害。研制并测试了单静态线性调频连续波(LFMCW)圆逆合成孔径雷达(ISAR)系统。利用基于频域有限差分法的二维全波分析方法建立了该系统的模型,并与实验系统的结果进行了比较。利用频域二维匹配滤波技术,仿真图像被用作目标检测和分类的手段。本文给出了模拟数据和实验数据的成像结果。本文还将介绍使用二维匹配滤波目标分类技术的初步结果。
{"title":"A comparison of experimental and modeled results of an active millimeter wave inverse synthetic aperture radar system used to perform standoff detection of person-borne improvised explosive devices","authors":"J. Fernandes, R. Obermeier, M. Hagelen, J. Martinez-Lorenzo, C. Rappaport","doi":"10.1109/THS.2010.5654952","DOIUrl":"https://doi.org/10.1109/THS.2010.5654952","url":null,"abstract":"With the recent rise in casualties resulting from person-borne improvised explosive devices (PBIEDs) or ”suicide bombers,” there is an urgent need for standoff detection of such threats. An optimum system that fulfills the requirements of standoff detection must be portable, low cost, and have a high probability of detection with low probability of false alarm at a distance of at least 20 meters. Currently there are a variety of modalities being researched to perform standoff detection of PBIED's including: backscatter X-ray imaging, infrared imaging, optical detection, terahertz imaging, video analytics, and millimeter-wave (MMW) imaging. MMW imaging at 94 GHz is a very good modality for performing standoff detection of PBIEDs. MMWs can propagate through the atmosphere and clothing with very little attenuation, while at the same time do not cause damage to human skin tissue. A mono-static linear frequency modulated continuous wave (LFMCW) circular inverse synthetic aperture radar (ISAR) system has been developed and tested. A model of such a system using a two dimensional full wave analysis based on the finite difference method in the frequency domain has been developed and compared with results of the experimental system. Using a two dimensional matched filtering technique in the frequency domain, simulated images have been used as a means of performing target detection and classification. The imaging results of both simulated and experimentally obtained data is presented in this paper. Initial results using the 2D matched filtering target classification technique will also be presented.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130037954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cryptkeeper: Improving security with encrypted RAM Cryptkeeper:通过加密RAM提高安全性
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655081
P. Peterson
Random Access Memory (RAM) was recently shown to be vulnerable to physical attacks exposing the totality of memory, including user data and encryption keys. We present Cryptkeeper, a novel software-encrypted virtual memory manager that mitigates data exposure when used with a secure key-hiding mechanism. Cryptkeeper significantly reduces the amount of cleartext data in memory by dividing RAM into a smaller, cleartext working set and a larger, encrypted area. This extends the standard memory model and provides encrypted swap as a side effect. Despite a 9x slowdown in pathological cases, target applications such as Firefox are only 9% slower with our Linux-based prototype. We also identify several optimizations which can significantly improve performance. Cryptkeeper enables the expression of new security policies for memory, and demonstrates that modern personal computers can perform heavy-duty work on behalf of operating systems with surprisingly low overhead.
随机存取存储器(RAM)最近被证明容易受到物理攻击,暴露了整个内存,包括用户数据和加密密钥。我们提出了Cryptkeeper,一种新颖的软件加密虚拟内存管理器,当与安全密钥隐藏机制一起使用时,可以减轻数据暴露。Cryptkeeper通过将RAM划分为较小的明文工作集和较大的加密区域,显着减少了内存中的明文数据量。这扩展了标准内存模型,并提供加密交换作为副作用。尽管在病理情况下速度会慢9倍,但在基于linux的原型中,Firefox等目标应用程序的速度只慢9%。我们还确定了几个可以显著提高性能的优化。Cryptkeeper支持对内存的新安全策略的表达,并证明了现代个人计算机可以以令人惊讶的低开销代表操作系统执行繁重的工作。
{"title":"Cryptkeeper: Improving security with encrypted RAM","authors":"P. Peterson","doi":"10.1109/THS.2010.5655081","DOIUrl":"https://doi.org/10.1109/THS.2010.5655081","url":null,"abstract":"Random Access Memory (RAM) was recently shown to be vulnerable to physical attacks exposing the totality of memory, including user data and encryption keys. We present Cryptkeeper, a novel software-encrypted virtual memory manager that mitigates data exposure when used with a secure key-hiding mechanism. Cryptkeeper significantly reduces the amount of cleartext data in memory by dividing RAM into a smaller, cleartext working set and a larger, encrypted area. This extends the standard memory model and provides encrypted swap as a side effect. Despite a 9x slowdown in pathological cases, target applications such as Firefox are only 9% slower with our Linux-based prototype. We also identify several optimizations which can significantly improve performance. Cryptkeeper enables the expression of new security policies for memory, and demonstrates that modern personal computers can perform heavy-duty work on behalf of operating systems with surprisingly low overhead.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"598 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115106196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 57
Location and identification of radioactive material with the GRETA (Gamma-Ray Experimental Telescope Assembly) 伽玛射线实验望远镜组件对放射性物质的定位和识别
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654944
Joshua R. Wood, J. Legere, M. McConnell, J. Ryan
We previously reported Compton imaging measurements of 137Cs and 60Co laboratory sources using the full 15-channel readout of the Gamma-Ray Experimental Telescope Assembly (GRETA). We have since modified the detector geometry to accommodate a wider range of Compton scattering angles and implemented a neural networking method for the location of interaction positions with a 3-cm resolution inside the detector volumes. This paper describes the implementation of the neural networking method and culminates in the imaging of 137Cs, 60Co, and 252Cf sources using this technique.
我们之前报道了使用伽马射线实验望远镜组件(GRETA)的完整15通道读数对137Cs和60Co实验室源的康普顿成像测量。此后,我们修改了探测器的几何形状,以适应更大范围的康普顿散射角,并实现了一种神经网络方法,用于定位探测器体积内分辨率为3厘米的相互作用位置。本文描述了神经网络方法的实现,并最终使用该技术对137Cs, 60Co和252Cf源进行成像。
{"title":"Location and identification of radioactive material with the GRETA (Gamma-Ray Experimental Telescope Assembly)","authors":"Joshua R. Wood, J. Legere, M. McConnell, J. Ryan","doi":"10.1109/THS.2010.5654944","DOIUrl":"https://doi.org/10.1109/THS.2010.5654944","url":null,"abstract":"We previously reported Compton imaging measurements of 137Cs and 60Co laboratory sources using the full 15-channel readout of the Gamma-Ray Experimental Telescope Assembly (GRETA). We have since modified the detector geometry to accommodate a wider range of Compton scattering angles and implemented a neural networking method for the location of interaction positions with a 3-cm resolution inside the detector volumes. This paper describes the implementation of the neural networking method and culminates in the imaging of 137Cs, 60Co, and 252Cf sources using this technique.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128502393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An imaging neutron spectrometer 成像中子谱仪
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654943
J. Ryan, C. Bancroft, P. Bloser, U. Bravar, C. Frost, M. McConnell, J. Legere, Joshua R. Wood, R. Woolf, D. Fourguette, L. Larocque, Jane C. Pavlich, G. Ritter, Gregory J. Wassick
We have developed, fabricated and tested a prototype imaging neutron spectrometer designed for real-time neutron source location and identification. Real-time detection and identification is important for locating materials. These materials, specifically uranium and transuranics, emit neutrons via spontaneous or induced fission. Unlike other forms of radiation (e.g. gamma rays), penetrating neutron emission is very uncommon. The instrument detects these neutrons, constructs images of the emission pattern, and reports the neutron spectrum. The device will be useful for security and proliferation deterrence, as well as for nuclear waste characterization and monitoring. The instrument is optimized for imaging and spectroscopy in the 1–20 MeV range. The detection principle is based upon multiple elastic neutron-proton scatters in organic scintillator. Two detector panel layers are utilized. By measuring the recoil proton and scattered neutron locations and energies, the direction and energy spectrum of the incident neutrons can be determined and discrete and extended sources identified. Event reconstruction yields an image of the source and its location. The hardware is low power, low mass, and rugged. Its modular design allows the user to combine multiple units for increased sensitivity. We will report the results of laboratory testing of the instrument, including exposure to a calibrated Cf-252 source. Instrument parameters include energy and angular resolution, gamma rejection, minimum source identification distances and times, and projected effective area for a fully populated instrument.
我们开发、制造并测试了一台用于实时中子源定位和识别的成像中介仪样机。实时检测和识别对于物料定位非常重要。这些物质,特别是铀和超铀物质,通过自发或诱导裂变释放中子。与其他形式的辐射(例如伽马射线)不同,穿透中子发射是非常罕见的。仪器检测这些中子,构建发射模式的图像,并报告中子谱。该装置将用于安全和扩散威慑,以及核废料的表征和监测。该仪器在1-20 MeV范围内进行了成像和光谱优化。探测原理是基于有机闪烁体中的多个弹性中子-质子散射。采用了两层探测器面板。通过测量反冲质子和散射中子的位置和能量,可以确定入射中子的方向和能谱,并确定离散源和扩展源。事件重建产生源及其位置的图像。硬件低功耗,低质量,坚固耐用。其模块化设计允许用户组合多个单元以提高灵敏度。我们将报告仪器的实验室测试结果,包括暴露于校准的Cf-252源。仪器参数包括能量和角分辨率,伽马抑制,最小源识别距离和时间,以及全填充仪器的投影有效面积。
{"title":"An imaging neutron spectrometer","authors":"J. Ryan, C. Bancroft, P. Bloser, U. Bravar, C. Frost, M. McConnell, J. Legere, Joshua R. Wood, R. Woolf, D. Fourguette, L. Larocque, Jane C. Pavlich, G. Ritter, Gregory J. Wassick","doi":"10.1109/THS.2010.5654943","DOIUrl":"https://doi.org/10.1109/THS.2010.5654943","url":null,"abstract":"We have developed, fabricated and tested a prototype imaging neutron spectrometer designed for real-time neutron source location and identification. Real-time detection and identification is important for locating materials. These materials, specifically uranium and transuranics, emit neutrons via spontaneous or induced fission. Unlike other forms of radiation (e.g. gamma rays), penetrating neutron emission is very uncommon. The instrument detects these neutrons, constructs images of the emission pattern, and reports the neutron spectrum. The device will be useful for security and proliferation deterrence, as well as for nuclear waste characterization and monitoring. The instrument is optimized for imaging and spectroscopy in the 1–20 MeV range. The detection principle is based upon multiple elastic neutron-proton scatters in organic scintillator. Two detector panel layers are utilized. By measuring the recoil proton and scattered neutron locations and energies, the direction and energy spectrum of the incident neutrons can be determined and discrete and extended sources identified. Event reconstruction yields an image of the source and its location. The hardware is low power, low mass, and rugged. Its modular design allows the user to combine multiple units for increased sensitivity. We will report the results of laboratory testing of the instrument, including exposure to a calibrated Cf-252 source. Instrument parameters include energy and angular resolution, gamma rejection, minimum source identification distances and times, and projected effective area for a fully populated instrument.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134157143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving supply chain robustness and preventing counterfeiting through authenticated product labels 通过认证的产品标签提高供应链的稳健性和防止假冒
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655097
Vivek Pathak
Counterfeiting is a serious problem impacting customers and producers in the global economy. We design authenticated product labels (APL), a cryptography based practical counterfeit detection method. Our solution can be used by customers, distributors, and law enforcement alike. APLs not only detects counterfeit goods, but also deters counterfeiting by provably pinpointing its source in the supply chain. Counterfeiting is a serious problem impacting customers and producers in the global economy. We design authenticated product labels (APL), a cryptography based practical counterfeit detection method. Our solution can be used by customers, distributors, and law enforcement alike. APLs not only detects counterfeit goods, but also deters counterfeiting by provably pinpointing its source in the supply chain.
假冒是影响全球经济中消费者和生产者的一个严重问题。我们设计了一种基于密码学的实用防伪方法——认证产品标签(APL)。客户、分销商和执法部门都可以使用我们的解决方案。api不仅可以检测假冒商品,还可以通过在供应链中确定其来源来阻止假冒。假冒是影响全球经济中消费者和生产者的一个严重问题。我们设计了一种基于密码学的实用防伪方法——认证产品标签(APL)。客户、分销商和执法部门都可以使用我们的解决方案。api不仅可以检测假冒商品,还可以通过在供应链中确定其来源来阻止假冒。
{"title":"Improving supply chain robustness and preventing counterfeiting through authenticated product labels","authors":"Vivek Pathak","doi":"10.1109/THS.2010.5655097","DOIUrl":"https://doi.org/10.1109/THS.2010.5655097","url":null,"abstract":"Counterfeiting is a serious problem impacting customers and producers in the global economy. We design authenticated product labels (APL), a cryptography based practical counterfeit detection method. Our solution can be used by customers, distributors, and law enforcement alike. APLs not only detects counterfeit goods, but also deters counterfeiting by provably pinpointing its source in the supply chain. Counterfeiting is a serious problem impacting customers and producers in the global economy. We design authenticated product labels (APL), a cryptography based practical counterfeit detection method. Our solution can be used by customers, distributors, and law enforcement alike. APLs not only detects counterfeit goods, but also deters counterfeiting by provably pinpointing its source in the supply chain.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133168693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
System of systems analysis of catastrophic events: A preliminary investigation of unprecedented scenarios 灾难性事件的系统分析系统:对前所未有的情景的初步调查
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654962
L. Levine, Carol Woody
When catastrophes occur, what key dynamics take place? How do these dynamics affect our technical infrastructure, and how can we understand these patterns of failure in order to better build and operate future technologies and systems of systems? What happens when catastrophes are unprecedented and the known range of emergency response activities is ineffective? This research analyzes multiple catastrophes, viewed through designated lenses, with consideration of how systems of systems fail, as well as the implications for future systems of systems. In this phase we studied two cases, Hurricane Katrina and 9/11, representing threats from natural forces and terrorism. The lens used is the Generic Error Modeling System (GEMS). The GEMS framework helps us to understand types of errors that occur in operational situations and distinguishes among skill-, rule-, and knowledge-based modes. We report on key findings in three areas: (1) the problematic role that technology plays given its fragility and dominance, (2) a coordination and centralization effect, and (3) the failure to consider failure.
当灾难发生时,发生了什么关键的动态?这些动态如何影响我们的技术基础设施,我们如何理解这些故障模式,以便更好地构建和操作未来的技术和系统的系统?当灾难是前所未有的,而已知的应急活动范围是无效的,会发生什么?本研究通过指定的镜头分析了多重灾难,考虑了系统的系统是如何失败的,以及对未来系统的系统的影响。在这个阶段,我们研究了两个案例,卡特里娜飓风和9/11,代表了自然力量和恐怖主义的威胁。使用的镜头是通用误差建模系统(GEMS)。GEMS框架帮助我们理解在操作情况下发生的错误类型,并区分基于技能、规则和基于知识的模式。我们报告了三个方面的主要发现:(1)技术在脆弱性和主导地位下所扮演的有问题的角色,(2)协调和集中效应,以及(3)未能考虑失败。
{"title":"System of systems analysis of catastrophic events: A preliminary investigation of unprecedented scenarios","authors":"L. Levine, Carol Woody","doi":"10.1109/THS.2010.5654962","DOIUrl":"https://doi.org/10.1109/THS.2010.5654962","url":null,"abstract":"When catastrophes occur, what key dynamics take place? How do these dynamics affect our technical infrastructure, and how can we understand these patterns of failure in order to better build and operate future technologies and systems of systems? What happens when catastrophes are unprecedented and the known range of emergency response activities is ineffective? This research analyzes multiple catastrophes, viewed through designated lenses, with consideration of how systems of systems fail, as well as the implications for future systems of systems. In this phase we studied two cases, Hurricane Katrina and 9/11, representing threats from natural forces and terrorism. The lens used is the Generic Error Modeling System (GEMS). The GEMS framework helps us to understand types of errors that occur in operational situations and distinguishes among skill-, rule-, and knowledge-based modes. We report on key findings in three areas: (1) the problematic role that technology plays given its fragility and dominance, (2) a coordination and centralization effect, and (3) the failure to consider failure.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125975251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2010 IEEE International Conference on Technologies for Homeland Security (HST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1