Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655100
K. Lakkaraju, Ann E. Speed
Modeling and simulation can be an important tool in helping develop techniques to better communicate safety-critical information for disaster preparation and recovery. However, these tools are only moderately useful if they do not capture both the social component (how information diffuses in a population through communication between individuals) and the cognitive component (how individuals integrate information and change behavior). The objective of this paper is to lay the groundwork for more complex simulations by providing a summarization of some of the important phenomenon identified in the attitude change literature. We describe four processes that are important to capture: (1) the drive for consistency; (2) information distortion; (3) persuasion route; and (4) implicit/explicit attitudes. We describe the experiments that illustrated these phenomenon and the factors that influence them (cognitive load, attitude relationships, and the social network). Finally, we describe a conceptual model that captures some of these processes and can be used as a starting point.
{"title":"Key parameters for modeling information diffusion in populations","authors":"K. Lakkaraju, Ann E. Speed","doi":"10.1109/THS.2010.5655100","DOIUrl":"https://doi.org/10.1109/THS.2010.5655100","url":null,"abstract":"Modeling and simulation can be an important tool in helping develop techniques to better communicate safety-critical information for disaster preparation and recovery. However, these tools are only moderately useful if they do not capture both the social component (how information diffuses in a population through communication between individuals) and the cognitive component (how individuals integrate information and change behavior). The objective of this paper is to lay the groundwork for more complex simulations by providing a summarization of some of the important phenomenon identified in the attitude change literature. We describe four processes that are important to capture: (1) the drive for consistency; (2) information distortion; (3) persuasion route; and (4) implicit/explicit attitudes. We describe the experiments that illustrated these phenomenon and the factors that influence them (cognitive load, attitude relationships, and the social network). Finally, we describe a conceptual model that captures some of these processes and can be used as a starting point.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124888120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654973
Peter B. Gutgarts, A. Temin
Significant knowledge exists in the field of safety-critical software design and implementation. Formal design methods and high quality compilers allow production of software products with desired behavioral parameters. Generally, if we know what behavior parameters are needed then we can achieve them in the software code. But do we know what behavioral parameters are needed for security-critical software? Can application security be specified in a way suitable for the machine code so that we can achieve software that is as secure as it is safe?
{"title":"Security-critical versus safety-critical software","authors":"Peter B. Gutgarts, A. Temin","doi":"10.1109/THS.2010.5654973","DOIUrl":"https://doi.org/10.1109/THS.2010.5654973","url":null,"abstract":"Significant knowledge exists in the field of safety-critical software design and implementation. Formal design methods and high quality compilers allow production of software products with desired behavioral parameters. Generally, if we know what behavior parameters are needed then we can achieve them in the software code. But do we know what behavioral parameters are needed for security-critical software? Can application security be specified in a way suitable for the machine code so that we can achieve software that is as secure as it is safe?","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121065568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655075
Guy L. Varland
At the direction of the Deputy Secretary of Defense (DepSecDef), we conducted a Capabilities Based Assessment (CBA) on Homeland Defense and Civil Support for the Commander, North American Aerospace Defense Command (NORAD). United States Northern Command (USNORTHCOM) agreed to lead the CBA to help develop a clear understanding of DoD and interagency roles, responsibilities, and capabilities to enhance unified action and mitigate potential uncertainty. In addition, the DepSecDef designated the HD/CS CBA as one of DoD's Top 25 Transformational Priorities to advance to a major milestone by December 2008. USNORTHCOM conducted the assessment between 1 September 2007 and 15 October 2008 in accordance with the Joint Capabilities Integration and Development System (JCIDS) process (USNORTHCOM HD/CS JCD, page 1).
{"title":"A systems engineering approach to disaster response scenario modeling","authors":"Guy L. Varland","doi":"10.1109/THS.2010.5655075","DOIUrl":"https://doi.org/10.1109/THS.2010.5655075","url":null,"abstract":"At the direction of the Deputy Secretary of Defense (DepSecDef), we conducted a Capabilities Based Assessment (CBA) on Homeland Defense and Civil Support for the Commander, North American Aerospace Defense Command (NORAD). United States Northern Command (USNORTHCOM) agreed to lead the CBA to help develop a clear understanding of DoD and interagency roles, responsibilities, and capabilities to enhance unified action and mitigate potential uncertainty. In addition, the DepSecDef designated the HD/CS CBA as one of DoD's Top 25 Transformational Priorities to advance to a major milestone by December 2008. USNORTHCOM conducted the assessment between 1 September 2007 and 15 October 2008 in accordance with the Joint Capabilities Integration and Development System (JCIDS) process (USNORTHCOM HD/CS JCD, page 1).","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125247279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654946
S. Mukhopadhyay, J. Glodo, R. Hawrami, U. Shirwadkar, E. van Loef, W. Higgins, A. Churilov, K. Shah
Gamma-ray signatures are generally used for detecting nuclear materials. It is difficult to distinguish gammas from backgrounds and innocent radiological materials, which can result in high false alarm rate. Dual neutron-gamma detectors for detecting illegally trafficked nuclear materials have a potential to reduce the false alarm rate. Elpasolite scintillator Cs2LiYCl6 (CLYC) doped with Ce3+ presented in this work can detect both neutrons and gammas efficiently. In this work we will discuss results to show the ability of CLYC to detect thermal neutrons efficiently with very high gamma discrimination rate. Excellent energy resolution that can be obtained with CLYC is as good as 3.9 % for 662 keV (FWHM). On the other hand, the presence of 6Li which has an acceptable cross-section for thermal neutron capture, allows this material to detect thermal neutrons as well. In the energy spectrum, the full energy thermal neutron peak typically appears above 3 MeV gamma-equivalent energy (GEE). Thus very effective pulse height discrimination (PHD) can be implemented with these materials by rejecting gamma-ray events below 3 MeV. Apart from PHD, using pulse-shape discrimination (PSD) it is also possible to separate neutron and gamma events. Preliminary measurements using NIM modules were performed, the method frequently used for organic scintillators to estimate the gamma rejection ratio (GRR). Moreover, we have also tested this scintillator with Si-based optical sensors, such as avalanche photo diodes (APD), and solid state photo multipliers (SSPM). The results clearly show that CLYC can be used for thermal neutron detection with these devices. This gives the opportunity for developing efficient, compact, and low-cost radiation detectors that can be deployed in large numbers.
{"title":"Detection of nuclear material with dual neutron — Gamma detector","authors":"S. Mukhopadhyay, J. Glodo, R. Hawrami, U. Shirwadkar, E. van Loef, W. Higgins, A. Churilov, K. Shah","doi":"10.1109/THS.2010.5654946","DOIUrl":"https://doi.org/10.1109/THS.2010.5654946","url":null,"abstract":"Gamma-ray signatures are generally used for detecting nuclear materials. It is difficult to distinguish gammas from backgrounds and innocent radiological materials, which can result in high false alarm rate. Dual neutron-gamma detectors for detecting illegally trafficked nuclear materials have a potential to reduce the false alarm rate. Elpasolite scintillator Cs2LiYCl6 (CLYC) doped with Ce3+ presented in this work can detect both neutrons and gammas efficiently. In this work we will discuss results to show the ability of CLYC to detect thermal neutrons efficiently with very high gamma discrimination rate. Excellent energy resolution that can be obtained with CLYC is as good as 3.9 % for 662 keV (FWHM). On the other hand, the presence of 6Li which has an acceptable cross-section for thermal neutron capture, allows this material to detect thermal neutrons as well. In the energy spectrum, the full energy thermal neutron peak typically appears above 3 MeV gamma-equivalent energy (GEE). Thus very effective pulse height discrimination (PHD) can be implemented with these materials by rejecting gamma-ray events below 3 MeV. Apart from PHD, using pulse-shape discrimination (PSD) it is also possible to separate neutron and gamma events. Preliminary measurements using NIM modules were performed, the method frequently used for organic scintillators to estimate the gamma rejection ratio (GRR). Moreover, we have also tested this scintillator with Si-based optical sensors, such as avalanche photo diodes (APD), and solid state photo multipliers (SSPM). The results clearly show that CLYC can be used for thermal neutron detection with these devices. This gives the opportunity for developing efficient, compact, and low-cost radiation detectors that can be deployed in large numbers.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131883926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654928
Paul L. Evans, K. Rogers
We present a 3D imaging technique, which combines the novel acquisition of diffracted X-ray signals and X-ray absorption data. The relatively high intensity of the diffraction signals afforded by our new approach has important implications for high specificity and high sensitivity security scanning applications. Our technique utilises a configuration of a tubular X-ray beam incident upon a ring absorption sensor and a diffraction sensor. The relative translation of the object under inspection enables the 3D scanning of extended objects. The sensing arrangement focuses on planes normal to the symmetry axis of the interrogating X-ray beam. Orders of magnitude increase in the intensity of the diffraction signal is possible in comparison with conventional angular dispersive methods. Our transmission mode approach effects a convergent and therefore inherently compact, diffracted ray geometry. We have undertaken initial testing and evaluation of this concept with various arrangements of objects fabricated from a range of different materials. The synthesis of the absorption and diffraction data is the basis for a new 3D imaging modality.
{"title":"3D X-ray diffraction imaging for materials ID","authors":"Paul L. Evans, K. Rogers","doi":"10.1109/THS.2010.5654928","DOIUrl":"https://doi.org/10.1109/THS.2010.5654928","url":null,"abstract":"We present a 3D imaging technique, which combines the novel acquisition of diffracted X-ray signals and X-ray absorption data. The relatively high intensity of the diffraction signals afforded by our new approach has important implications for high specificity and high sensitivity security scanning applications. Our technique utilises a configuration of a tubular X-ray beam incident upon a ring absorption sensor and a diffraction sensor. The relative translation of the object under inspection enables the 3D scanning of extended objects. The sensing arrangement focuses on planes normal to the symmetry axis of the interrogating X-ray beam. Orders of magnitude increase in the intensity of the diffraction signal is possible in comparison with conventional angular dispersive methods. Our transmission mode approach effects a convergent and therefore inherently compact, diffracted ray geometry. We have undertaken initial testing and evaluation of this concept with various arrangements of objects fabricated from a range of different materials. The synthesis of the absorption and diffraction data is the basis for a new 3D imaging modality.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122894609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654932
F. Quivira, Kristen Fassbender, J. Martinez-Lorenzo, C. Rappaport
Detecting and imaging the presence of illicit tunnels in any given volume of soil is occasionaly possible because the air that fills them is materially quite different from anything else underground. The Underground Focusing Spotlight Synthetic Aperture Radar (UF-SL-SAR) concept has been suggested for sub-surface tunnel detection due to its ability to scan large areas of terrain in a short amount of time. This paper explores the feasibility of tunnel detection under rough ground surfaces using an algorithmic implementation of the UF-SL-SAR concept. In particular, detectability is investigated as a function of tunnel depth, ground surface roughness and soil type.
{"title":"Feasibility of tunnel detection under rough ground surfaces using Underground Focusing Spotlight Synthetic Aperture Radar","authors":"F. Quivira, Kristen Fassbender, J. Martinez-Lorenzo, C. Rappaport","doi":"10.1109/THS.2010.5654932","DOIUrl":"https://doi.org/10.1109/THS.2010.5654932","url":null,"abstract":"Detecting and imaging the presence of illicit tunnels in any given volume of soil is occasionaly possible because the air that fills them is materially quite different from anything else underground. The Underground Focusing Spotlight Synthetic Aperture Radar (UF-SL-SAR) concept has been suggested for sub-surface tunnel detection due to its ability to scan large areas of terrain in a short amount of time. This paper explores the feasibility of tunnel detection under rough ground surfaces using an algorithmic implementation of the UF-SL-SAR concept. In particular, detectability is investigated as a function of tunnel depth, ground surface roughness and soil type.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122911723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655030
N. Cutmore, Yi Liu, J. Tickner
There is a pressing world-wide need for a technology that can rapidly scan air freight containers for a range of threats, including explosives, narcotics, CBRN materials and other contraband. Starting in 2002, CSIRO developed a cargo scanning concept that combines fast neutron and high-energy gamma-ray or x-ray radiography. The scans can be processed to produce high-resolution radiographic images that show both areal density and composition. In 2008, CSIRO and Nuctech Company Limited launched a joint venture for the commercialization and global deployment of the technology. In early 2009 a commercial prototype unit was demonstrated that combined neutron and dual-energy, binocular-vision x-ray technologies from the two partners to achieve significantly higher image quality and cargo throughputs. This paper reviews the scientific, technological and commercial developments that have been critical to the development of the Cargo Scanner.
{"title":"Development and commercialization of a fast-neutron/x-ray Cargo Scanner","authors":"N. Cutmore, Yi Liu, J. Tickner","doi":"10.1109/THS.2010.5655030","DOIUrl":"https://doi.org/10.1109/THS.2010.5655030","url":null,"abstract":"There is a pressing world-wide need for a technology that can rapidly scan air freight containers for a range of threats, including explosives, narcotics, CBRN materials and other contraband. Starting in 2002, CSIRO developed a cargo scanning concept that combines fast neutron and high-energy gamma-ray or x-ray radiography. The scans can be processed to produce high-resolution radiographic images that show both areal density and composition. In 2008, CSIRO and Nuctech Company Limited launched a joint venture for the commercialization and global deployment of the technology. In early 2009 a commercial prototype unit was demonstrated that combined neutron and dual-energy, binocular-vision x-ray technologies from the two partners to achieve significantly higher image quality and cargo throughputs. This paper reviews the scientific, technological and commercial developments that have been critical to the development of the Cargo Scanner.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127174907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655076
Joshua J. Hajicek, Noah J. Myrent, Qi Li, Daniel J. Barker, K. Coyne
Objective test methods were developed to quantify and assess the effects of personal protection equipment on auditory situational awareness. The tests utilize a custom head and torso simulator that is able to don personal protective equipment and employs acoustics, signal processing, and measurement techniques. The tests measure localization and speech intelligibility effects of personal protective equipment such as air purifying respirators, helmets, chemical protective jackets, and powered air purifying respirators. These methods also quantify the effects of noise generated by personal protective equipment electro/mechanical noise. Localization effects are evaluated in terms of the head-related transfer function. Speech intelligibility is evaluated using the speech transmission index. Results indicate that some types of head-borne personal protective equipment lead to significant distortions to the head-related transfer function and decreased speech transmission index scores, consequently altering auditory situational awareness.
{"title":"Protocols for improved understanding of situational awareness effects of head-borne PPE","authors":"Joshua J. Hajicek, Noah J. Myrent, Qi Li, Daniel J. Barker, K. Coyne","doi":"10.1109/THS.2010.5655076","DOIUrl":"https://doi.org/10.1109/THS.2010.5655076","url":null,"abstract":"Objective test methods were developed to quantify and assess the effects of personal protection equipment on auditory situational awareness. The tests utilize a custom head and torso simulator that is able to don personal protective equipment and employs acoustics, signal processing, and measurement techniques. The tests measure localization and speech intelligibility effects of personal protective equipment such as air purifying respirators, helmets, chemical protective jackets, and powered air purifying respirators. These methods also quantify the effects of noise generated by personal protective equipment electro/mechanical noise. Localization effects are evaluated in terms of the head-related transfer function. Speech intelligibility is evaluated using the speech transmission index. Results indicate that some types of head-borne personal protective equipment lead to significant distortions to the head-related transfer function and decreased speech transmission index scores, consequently altering auditory situational awareness.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130883945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654956
Bryan T. Bonvallet, Joshua Barron
The research, design, and testing of chemical and biological (CB) detection systems can involve any number of different specialties. Whether fusing sensor data, statistically modeling physical processes, developing simulation software, or evaluating sensor technologies, researchers are aided by large repositories of data to accomplish and validate their work. In these cases, a sensor testbed can be deployed for long-term data collection to fill that need. Such data collection requires software that can run reliably for long periods of time, process and collect data coming from sensors (both CB and non-CB sensors in some testbeds), and monitor the status of the testbed components and infrastructure. If software doesn't already exist to collect and aggregate sensor data, the time and money spent on development and testing of this software detracts from actual data collection. To address the issue of rapidly developing software for long-term, data collection testbeds, the All-Purpose Interface for Testbed Environments (APITE) software architecture is introduced. The APITE architecture is a Python-based set of software tools designed to simplify and expedite the task of writing software for testbeds of sensors. The APITE architecture facilitates monitoring and maintenance alerts to maximize uptime, tiered or flat sensor collection, and triggered responses. These are all facilitated by the same underlying software mechanism. The underlying software mechanism, based on Finite State Automata, is intended to be largely transparent to the software developer. This paper will describe how the APITE architecture works, demonstrate its ease-of-use for researchers, and describe its potential use for critical infrastructure protection through tiered sensor collection and automated system responses.
{"title":"A software architecture for rapid development and deployment of sensor testbeds","authors":"Bryan T. Bonvallet, Joshua Barron","doi":"10.1109/THS.2010.5654956","DOIUrl":"https://doi.org/10.1109/THS.2010.5654956","url":null,"abstract":"The research, design, and testing of chemical and biological (CB) detection systems can involve any number of different specialties. Whether fusing sensor data, statistically modeling physical processes, developing simulation software, or evaluating sensor technologies, researchers are aided by large repositories of data to accomplish and validate their work. In these cases, a sensor testbed can be deployed for long-term data collection to fill that need. Such data collection requires software that can run reliably for long periods of time, process and collect data coming from sensors (both CB and non-CB sensors in some testbeds), and monitor the status of the testbed components and infrastructure. If software doesn't already exist to collect and aggregate sensor data, the time and money spent on development and testing of this software detracts from actual data collection. To address the issue of rapidly developing software for long-term, data collection testbeds, the All-Purpose Interface for Testbed Environments (APITE) software architecture is introduced. The APITE architecture is a Python-based set of software tools designed to simplify and expedite the task of writing software for testbeds of sensors. The APITE architecture facilitates monitoring and maintenance alerts to maximize uptime, tiered or flat sensor collection, and triggered responses. These are all facilitated by the same underlying software mechanism. The underlying software mechanism, based on Finite State Automata, is intended to be largely transparent to the software developer. This paper will describe how the APITE architecture works, demonstrate its ease-of-use for researchers, and describe its potential use for critical infrastructure protection through tiered sensor collection and automated system responses.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125715415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655051
M. Pfaff, J. Drury, G. Klein, L. More, Sung Pil Moon, Yikun Liu
Emergency response is an especially challenging domain for decision support, as often high-impact decisions must be made quickly, usually under high levels of uncertainty about the situation. The level of uncertainty and the time pressure require a new approach to using modelbased decision support tools during ongoing emergency events. This paper discusses the latest in a series of experiments examining the use of a decision-space visualization helping users identify the most robust options in response to complex emergency scenarios. The results provide additional insight into the value of decision-space information and option awareness for users working in complex, emerging, and uncertain task environments.
{"title":"Weighing decisions: Aiding emergency response decision making via option awareness","authors":"M. Pfaff, J. Drury, G. Klein, L. More, Sung Pil Moon, Yikun Liu","doi":"10.1109/THS.2010.5655051","DOIUrl":"https://doi.org/10.1109/THS.2010.5655051","url":null,"abstract":"Emergency response is an especially challenging domain for decision support, as often high-impact decisions must be made quickly, usually under high levels of uncertainty about the situation. The level of uncertainty and the time pressure require a new approach to using modelbased decision support tools during ongoing emergency events. This paper discusses the latest in a series of experiments examining the use of a decision-space visualization helping users identify the most robust options in response to complex emergency scenarios. The results provide additional insight into the value of decision-space information and option awareness for users working in complex, emerging, and uncertain task environments.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"230 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124542144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}