首页 > 最新文献

2010 IEEE International Conference on Technologies for Homeland Security (HST)最新文献

英文 中文
Facilitation of third-party development of advanced algorithms for explosive detection using workshops and grand challenges 利用研讨会和重大挑战促进第三方开发先进的爆炸物探测算法
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654955
C. Crawford, D. Castañón, John Beaty, H. Martz
The US Department of Homeland Security (DHS) has requirements for future explosives scanners that include dealing with a larger number of threats, higher probability of detection, lower false alarm rates and lower operating costs. One tactic that DHS is pursuing to achieve these requirements is to augment the capabilities of the established security vendors with third-party algorithm developers. The purposes of this presentation are to review DHS's objectives for involving third parties in the development of advanced algorithms and then to discuss how these objectives are achieved using workshops and grand challenges.
美国国土安全部(DHS)对未来的爆炸物扫描仪提出了要求,包括处理更多的威胁、更高的探测概率、更低的误报率和更低的运营成本。为了实现这些需求,国土安全部正在采取的一种策略是通过第三方算法开发人员增强现有安全供应商的能力。本演讲的目的是回顾国土安全部在高级算法开发中涉及第三方的目标,然后讨论如何通过研讨会和重大挑战实现这些目标。
{"title":"Facilitation of third-party development of advanced algorithms for explosive detection using workshops and grand challenges","authors":"C. Crawford, D. Castañón, John Beaty, H. Martz","doi":"10.1109/THS.2010.5654955","DOIUrl":"https://doi.org/10.1109/THS.2010.5654955","url":null,"abstract":"The US Department of Homeland Security (DHS) has requirements for future explosives scanners that include dealing with a larger number of threats, higher probability of detection, lower false alarm rates and lower operating costs. One tactic that DHS is pursuing to achieve these requirements is to augment the capabilities of the established security vendors with third-party algorithm developers. The purposes of this presentation are to review DHS's objectives for involving third parties in the development of advanced algorithms and then to discuss how these objectives are achieved using workshops and grand challenges.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124750179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A distributed multi-agent tracking, awareness, and communication system architecture for synchronized real-time situational understanding, surveillance, decision-making, and control 一种分布式多智能体跟踪、感知和通信系统架构,用于同步实时态势理解、监视、决策和控制
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654983
D. B. Megherbi, P. Levesque
In this paper we deal with the design and analysis of an intelligent multi-agent-based architecture for synchronized real-time situational understanding, awareness, decision-making, and control in a geographically networked distributed computing environment. In particular, we focus here on the design and implementation of a middleware framework for agent intra and inter-node communication as well as computing nodes synchronization. While the proposed work finds applications in many areas including networked chemical sensors, large key infrastructures and resources such as highways and transportations, here as application of the proposed method we consider the challenging scenario case of a set of distributed collaborating radars (multi-agent) system geographically distributed over a large terrain environment with several moving targets. Here, each radar agent, taken separately, does not have the capabilities and resources to span the monitoring of the totality of a given large terrain. However, when collaborating with other radars distributed in the large terrain environment, each with similar limited capabilities, we show and illustrate the proposed distributed agents (radars) capability of not only monitoring their respective regions, but also tracking, communicating with neighboring agents, and decision-making, to collaborating span the monitoring the totality of a given large terrain. We show how the neighboring agent radars do not necessarily have to be running on the same computing node. Similarly, as part of the scenario we also consider the case of existence of friendly and unknown forces/stressors targets that are capable of moving throughout the same distributed environment. We show how the proposed algorithms are scalable. They are implemented on the CMINDS High Performance Distributed Computing Engine (HDPC) test-bed taking full advantage of a distributed environment and multiple processing systems.
在本文中,我们设计和分析了一个基于智能多代理的架构,用于在地理网络分布式计算环境中同步实时态势理解、感知、决策和控制。在这里,我们特别关注代理内部和节点间通信以及计算节点同步的中间件框架的设计和实现。虽然所提出的工作在许多领域都有应用,包括网络化学传感器、大型关键基础设施和高速公路和交通等资源,但作为所提出方法的应用,我们考虑了一组分布式协作雷达(多智能体)系统的挑战性场景,该系统在地理上分布在具有多个移动目标的大型地形环境中。在这里,每个雷达代理,单独来看,没有能力和资源跨越监测一个给定的大地形的整体。然而,当与分布在大地形环境中的其他雷达协作时,每个雷达都具有相似的有限能力,我们展示并说明了所提出的分布式智能体(雷达)不仅能够监视各自的区域,而且还能够跟踪,与相邻智能体通信和决策,以协作跨越监测给定大地形的整体。我们展示了相邻的代理雷达不必在相同的计算节点上运行。同样地,作为场景的一部分,我们还考虑存在能够在相同的分布式环境中移动的友好和未知力量/压力源目标的情况。我们展示了所提出的算法是如何可扩展的。它们是在CMINDS高性能分布式计算引擎(HDPC)测试平台上实现的,充分利用了分布式环境和多个处理系统。
{"title":"A distributed multi-agent tracking, awareness, and communication system architecture for synchronized real-time situational understanding, surveillance, decision-making, and control","authors":"D. B. Megherbi, P. Levesque","doi":"10.1109/THS.2010.5654983","DOIUrl":"https://doi.org/10.1109/THS.2010.5654983","url":null,"abstract":"In this paper we deal with the design and analysis of an intelligent multi-agent-based architecture for synchronized real-time situational understanding, awareness, decision-making, and control in a geographically networked distributed computing environment. In particular, we focus here on the design and implementation of a middleware framework for agent intra and inter-node communication as well as computing nodes synchronization. While the proposed work finds applications in many areas including networked chemical sensors, large key infrastructures and resources such as highways and transportations, here as application of the proposed method we consider the challenging scenario case of a set of distributed collaborating radars (multi-agent) system geographically distributed over a large terrain environment with several moving targets. Here, each radar agent, taken separately, does not have the capabilities and resources to span the monitoring of the totality of a given large terrain. However, when collaborating with other radars distributed in the large terrain environment, each with similar limited capabilities, we show and illustrate the proposed distributed agents (radars) capability of not only monitoring their respective regions, but also tracking, communicating with neighboring agents, and decision-making, to collaborating span the monitoring the totality of a given large terrain. We show how the neighboring agent radars do not necessarily have to be running on the same computing node. Similarly, as part of the scenario we also consider the case of existence of friendly and unknown forces/stressors targets that are capable of moving throughout the same distributed environment. We show how the proposed algorithms are scalable. They are implemented on the CMINDS High Performance Distributed Computing Engine (HDPC) test-bed taking full advantage of a distributed environment and multiple processing systems.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121222337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Interactive Neuro-Educational Technologies (I-NET): Enhanced training of threat detection for airport luggage screeners 互动神经教育技术(I-NET):加强机场行李筛检员的威胁侦测训练
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654980
Giby Raphael, C. Berka, Natalie Kintz, Veasna Tan, Adrienne Behneman, Robin R. Johnson
Interactive Neuro-Educational Technologies (I-NET) are designed to increase the pace and efficiency of skill learning by adapting training environments to the skill levels and needs of the individuals. Advanced Brain Monitoring (ABM) explored the feasibility of integrating physiological measures into an interactive adaptive computer-based training system to facilitate mitigations, accelerate skill acquisition and provide quantitative evidence of successful training in tasks relating to airport luggage screening and threat detection. A small pilot study was conducted (N=23) to assess electroencephalographic measures of learning and performance during a threat identification task using X-Ray images designed to be representative of those typically viewed by baggage screeners. Linear regression analysis of trends in EEG Alpha (8–12 Hz) and Theta (3–7 Hz) from stimulus presentation to response for each image revealed effects for Threat Type, Task Order, Stimulus Difficulty and Response Type. Correlation between EEG engagement and workload levels with performance and heart rate and heart rate variability measures in relation to performance were explored. In addition, fixation locked event related potentials (FLERPS) in relation to user responses were investigated by interfacing a commercial eye tracker to the experimental setup.
交互式神经教育技术(I-NET)旨在通过调整培训环境以适应个人的技能水平和需求来提高技能学习的速度和效率。高级脑监测(ABM)探索了将生理措施整合到交互式自适应计算机培训系统中的可行性,以促进缓解,加速技能获取,并为与机场行李检查和威胁检测相关的任务的成功培训提供定量证据。进行了一项小型试点研究(N=23),以评估在威胁识别任务期间使用x射线图像的学习和表现的脑电图测量,该x射线图像设计为具有代表性的行李检查人员通常查看的图像。对刺激呈现到反应的脑电图α (8-12 Hz)和θ (3-7 Hz)趋势进行线性回归分析,揭示了威胁类型、任务顺序、刺激难度和反应类型的影响。EEG参与和工作量水平与表现、心率和与表现相关的心率变异性测量之间的相关性进行了探讨。此外,通过将商业眼动仪与实验装置连接,研究了与用户反应相关的注视锁定事件相关电位(FLERPS)。
{"title":"Interactive Neuro-Educational Technologies (I-NET): Enhanced training of threat detection for airport luggage screeners","authors":"Giby Raphael, C. Berka, Natalie Kintz, Veasna Tan, Adrienne Behneman, Robin R. Johnson","doi":"10.1109/THS.2010.5654980","DOIUrl":"https://doi.org/10.1109/THS.2010.5654980","url":null,"abstract":"Interactive Neuro-Educational Technologies (I-NET) are designed to increase the pace and efficiency of skill learning by adapting training environments to the skill levels and needs of the individuals. Advanced Brain Monitoring (ABM) explored the feasibility of integrating physiological measures into an interactive adaptive computer-based training system to facilitate mitigations, accelerate skill acquisition and provide quantitative evidence of successful training in tasks relating to airport luggage screening and threat detection. A small pilot study was conducted (N=23) to assess electroencephalographic measures of learning and performance during a threat identification task using X-Ray images designed to be representative of those typically viewed by baggage screeners. Linear regression analysis of trends in EEG Alpha (8–12 Hz) and Theta (3–7 Hz) from stimulus presentation to response for each image revealed effects for Threat Type, Task Order, Stimulus Difficulty and Response Type. Correlation between EEG engagement and workload levels with performance and heart rate and heart rate variability measures in relation to performance were explored. In addition, fixation locked event related potentials (FLERPS) in relation to user responses were investigated by interfacing a commercial eye tracker to the experimental setup.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127055321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic detection and recognition of traffic road signs for intelligent autonomous unmanned vehicles for urban surveillance and rescue 面向城市监控与救援的智能自主无人车交通道路标志自动检测与识别
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655078
I. Sebanja, D. Megherbi
In this paper, we propose a system that automatically detects and recognizes road signs found in the United States, in real time or close to real-time. The proposed system has application to intelligent autonomous unmanned vehicles for urban surveillance and rescue. It is a multi-layered hierarchical scheme composed of 3 parts: road sign color segmentation, shape recognition, and classification. The system is robust and is invariant to image translation, rotation and scaling. It can deal with situations where there is partial occlusion, blurring of the image, and low visibility due to either weather or a change in lighting conditions. The road sign shape detection and sign classification/recognition are both based on the Principle Component Analysis. We show that the proposed system has correct classification rate of 99.2%. Experimental results show that with the current system, using existing standard hardware/software, it takes on average 2.5 seconds to detect, to segment, and to classify/recognize road signs in a road image scene. This is considered relatively fast. This time can easily be decreased in the future with dedicated specialized hardware and optimized software, taking advantage of the latest embedded hardware technology. Currently, in this paper the focus is on red and yellow road signs found in the United States but the proposed techniques can be generalized to be used for any other colored road signs found both in the United States of America and other countries.
在本文中,我们提出了一个系统,可以自动检测和识别在美国发现的道路标志,实时或接近实时。该系统可应用于城市监控和救援的智能自主无人车。它是一个多层次的分层方案,由3个部分组成:道路标志颜色分割、形状识别和分类。该系统具有鲁棒性,对图像平移、旋转和缩放具有不变性。它可以处理由于天气或光照条件变化而导致的部分遮挡、图像模糊和能见度低的情况。道路标志形状检测和标志分类识别都是基于主成分分析的。结果表明,该系统的分类正确率达到99.2%。实验结果表明,在现有的标准硬件/软件下,对道路图像场景中的道路标志进行检测、分割和分类/识别平均需要2.5秒。这被认为是相对较快的。利用最新的嵌入式硬件技术,使用专用的专用硬件和优化的软件,可以很容易地减少这个时间。目前,本文的重点是在美国发现的红色和黄色道路标志,但所提出的技术可以推广到美国和其他国家发现的任何其他颜色的道路标志。
{"title":"Automatic detection and recognition of traffic road signs for intelligent autonomous unmanned vehicles for urban surveillance and rescue","authors":"I. Sebanja, D. Megherbi","doi":"10.1109/THS.2010.5655078","DOIUrl":"https://doi.org/10.1109/THS.2010.5655078","url":null,"abstract":"In this paper, we propose a system that automatically detects and recognizes road signs found in the United States, in real time or close to real-time. The proposed system has application to intelligent autonomous unmanned vehicles for urban surveillance and rescue. It is a multi-layered hierarchical scheme composed of 3 parts: road sign color segmentation, shape recognition, and classification. The system is robust and is invariant to image translation, rotation and scaling. It can deal with situations where there is partial occlusion, blurring of the image, and low visibility due to either weather or a change in lighting conditions. The road sign shape detection and sign classification/recognition are both based on the Principle Component Analysis. We show that the proposed system has correct classification rate of 99.2%. Experimental results show that with the current system, using existing standard hardware/software, it takes on average 2.5 seconds to detect, to segment, and to classify/recognize road signs in a road image scene. This is considered relatively fast. This time can easily be decreased in the future with dedicated specialized hardware and optimized software, taking advantage of the latest embedded hardware technology. Currently, in this paper the focus is on red and yellow road signs found in the United States but the proposed techniques can be generalized to be used for any other colored road signs found both in the United States of America and other countries.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127078059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Prompt neutrons from photofission and its use in homeland security applications 光裂变产生的中子及其在国土安全中的应用
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654938
A. Danagoulian, W. Bertozzi, C. L. Hicks, A. Klimenko, S. Korbly, R. Ledoux, Cody M. Wilson
Photofission is the process in which a nucleus disintegrates into two daughter products after absorbing a photon. Photofission near threshold in actinides is very similar to spontaneous fission in terms of the number of emitted decay neutrons and their energy distribution. Most of the neutrons are in the ∼2 MeV energy range, and can be efficiently detected with liquid scintillator detectors. Thus, Prompt Neutrons from Photofission (PNPF) near threshold can be used as an excellent tool for the detection of actinides. Since the photofission cross section for most fissionable materials drops to near zero for incident photon energies of less than 6 MeV, a source of photons with a higher energy is needed, for example 9 MeV. At this energy interference from (γ, n) processes is minimal. Photon sources in this energy range are well suited for other non-intrusive inspection applications as well as searching for fissionable materials. Passport Systems, Inc. is currently operating a continuous wave (CW) 9 MeV electron accelerator and an array of liquid scintillator detectors to achieve this goal. Pulse shape discrimination (PSD) techniques are used determine the particle type. The remaining neutrons are also filtered through an in-house developed pileup rejection algorithm. The resulting neutron count is compared with the known background to determine the confidence level for possible shielded Special Nuclear Material identification. Initial testing of this system has been performed and the results will be presented. The results show the utility of a CW photon source as well as the ability to fuse the PNPF data with other data to reduce the dose to cargo, or scan times.
光裂变是原子核吸收光子后分裂成两个子产物的过程。锕系元素在阈值附近的光裂变在发射衰变中子的数量和能量分布方面与自发裂变非常相似。大多数中子都在~ 2 MeV的能量范围内,可以用液体闪烁体探测器有效地检测到。因此,阈值附近的光裂变提示中子(PNPF)可以作为锕系元素检测的一个很好的工具。由于大多数可裂变材料的光裂变截面在入射光子能量低于6兆电子伏时下降到接近零,因此需要具有更高能量的光子源,例如9兆电子伏。在这种能量下,(γ, n)过程的干扰最小。该能量范围内的光子源非常适合于其他非侵入式检测应用以及寻找可裂变材料。Passport Systems公司目前正在运行一个连续波(CW) 9mev电子加速器和一系列液体闪烁体探测器来实现这一目标。脉冲形状判别(PSD)技术用于确定粒子类型。剩余的中子也通过内部开发的堆积排斥算法过滤。将所得中子数与已知背景进行比较,以确定可能被屏蔽的特殊核材料识别的置信水平。该系统的初步测试已经完成,测试结果即将公布。结果显示了连续波光子源的实用性,以及将PNPF数据与其他数据融合以减少对货物的剂量或扫描时间的能力。
{"title":"Prompt neutrons from photofission and its use in homeland security applications","authors":"A. Danagoulian, W. Bertozzi, C. L. Hicks, A. Klimenko, S. Korbly, R. Ledoux, Cody M. Wilson","doi":"10.1109/THS.2010.5654938","DOIUrl":"https://doi.org/10.1109/THS.2010.5654938","url":null,"abstract":"Photofission is the process in which a nucleus disintegrates into two daughter products after absorbing a photon. Photofission near threshold in actinides is very similar to spontaneous fission in terms of the number of emitted decay neutrons and their energy distribution. Most of the neutrons are in the ∼2 MeV energy range, and can be efficiently detected with liquid scintillator detectors. Thus, Prompt Neutrons from Photofission (PNPF) near threshold can be used as an excellent tool for the detection of actinides. Since the photofission cross section for most fissionable materials drops to near zero for incident photon energies of less than 6 MeV, a source of photons with a higher energy is needed, for example 9 MeV. At this energy interference from (γ, n) processes is minimal. Photon sources in this energy range are well suited for other non-intrusive inspection applications as well as searching for fissionable materials. Passport Systems, Inc. is currently operating a continuous wave (CW) 9 MeV electron accelerator and an array of liquid scintillator detectors to achieve this goal. Pulse shape discrimination (PSD) techniques are used determine the particle type. The remaining neutrons are also filtered through an in-house developed pileup rejection algorithm. The resulting neutron count is compared with the known background to determine the confidence level for possible shielded Special Nuclear Material identification. Initial testing of this system has been performed and the results will be presented. The results show the utility of a CW photon source as well as the ability to fuse the PNPF data with other data to reduce the dose to cargo, or scan times.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127219623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Establishing traveler identity using collective identity resolution 使用集体身份解析建立旅行者身份
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655036
Donald R. Kretz, Roderic W. Paulk
Every day, millions of people cross international borders by air or sea. A nation's ability to identify and neutralize threats posed by travelers depends heavily on an accurate and proactive methodology for establishing traveler identity. Lacking both a common reference model and a globally unique identification scheme, the “system” must confront the problem of multiple distinct or imprecise references to each single real-world entity when analyzing vast amounts of data. Additionally, the emergent patterns of relationships between entities are often complex, fuzzy, and/or novel. Methodologies that depend solely on exact or approximate name matches are subject to defeat simply by using aliases, and are typically prone to high levels of false positives. In order for identity resolution to be effective, information from multiple, diverse sources must be analyzed (e.g., biometric, biographic, social, etc.). Furthermore, identity analysis must be a continuous process that enables accurate pre-assessment when travel intentions first become known. To that end, this paper presents an identity resolution methodology called Collective Identity Resolution.
每天,数以百万计的人从空中或海上跨越国际边界。一个国家识别和消除旅行者构成的威胁的能力在很大程度上取决于确定旅行者身份的准确和主动的方法。由于缺乏通用的参考模型和全球唯一的标识方案,“系统”在分析大量数据时必须面对对每个单一现实世界实体的多个不同或不精确的引用的问题。此外,实体之间关系的紧急模式通常是复杂的、模糊的和/或新颖的。仅依赖于精确或近似名称匹配的方法容易通过使用别名而失败,并且通常容易出现高水平的误报。为了有效地解决身份问题,必须分析来自多个不同来源的信息(例如,生物特征、传记、社会等)。此外,身份分析必须是一个持续的过程,以便在首次了解旅行意图时能够进行准确的预评估。为此,本文提出了一种称为集体身份解决的身份解决方法。
{"title":"Establishing traveler identity using collective identity resolution","authors":"Donald R. Kretz, Roderic W. Paulk","doi":"10.1109/THS.2010.5655036","DOIUrl":"https://doi.org/10.1109/THS.2010.5655036","url":null,"abstract":"Every day, millions of people cross international borders by air or sea. A nation's ability to identify and neutralize threats posed by travelers depends heavily on an accurate and proactive methodology for establishing traveler identity. Lacking both a common reference model and a globally unique identification scheme, the “system” must confront the problem of multiple distinct or imprecise references to each single real-world entity when analyzing vast amounts of data. Additionally, the emergent patterns of relationships between entities are often complex, fuzzy, and/or novel. Methodologies that depend solely on exact or approximate name matches are subject to defeat simply by using aliases, and are typically prone to high levels of false positives. In order for identity resolution to be effective, information from multiple, diverse sources must be analyzed (e.g., biometric, biographic, social, etc.). Furthermore, identity analysis must be a continuous process that enables accurate pre-assessment when travel intentions first become known. To that end, this paper presents an identity resolution methodology called Collective Identity Resolution.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131393983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intelligent acoustic and vibration recognition/alert systems for security breaching detection, close proximity danger identification, and perimeter protection 智能声学和振动识别/警报系统,用于安全漏洞检测,近距离危险识别和周边保护
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654931
A. Dibazar, A. Yousefi, Hyung-Ook Park, Bing Lu, S. George, T. Berger
Because the protection of perimeters in national, agricultural, airport, prison, military sites, and residential areas against dangerous approaching human and vehicles when using humans to provide security is expensive or unsafe, acoustic/vibration signature identification of approaching human and vehicles threats has attracted increased attention. This paper addresses the development and deployment of three types of acoustic and vibration based smart sensors to identify and report sequential approaching threats prior to the intrusion. More specifically, we have developed: a) acoustic based long range sensor with which vehicles' engine sound and type can be identified, b) vibration based seismic analyzer which discriminates between human footsteps and other seismic events such as those caused by animals, and c) fence breaching vibration sensor which can detect intentional disturbances on the fence and discriminate between climb, kick, rattle, and lean. All of these sensors were designed with several issues in mind, namely, optimized low power usage, a low number of false positives, small size, secure radio communication, and milspec. The developed vibration based system was installed in an airport with unprotected shore lines in the vicinity of taxi- and run-ways. The system reported an average of less than two false positives per week and zero false negative for the duration of forty-five days. Six fence sensors were installed on the terminal area and end-of-runway chain-link fences where there was possibility of intentional fence climbing. The fence sensors reported no false positives for the duration of forty-five days which included several days of seasonal storms.
由于在国家、农业、机场、监狱、军事场所和居民区保护周边免受危险接近的人员和车辆的威胁,当使用人员提供安全时是昂贵的或不安全的,声学/振动特征识别接近的人员和车辆威胁引起了越来越多的关注。本文讨论了三种基于声学和振动的智能传感器的开发和部署,以在入侵之前识别和报告连续逼近的威胁。更具体地说,我们已经开发了:a)基于声学的远程传感器,可以识别车辆的发动机声音和类型;b)基于振动的地震分析仪,可以区分人类的脚步声和其他地震事件,如动物引起的地震事件;c)围栏破坏振动传感器,可以检测围栏上的故意干扰,区分爬升、踢腿、嘎嘎声和倾斜。所有这些传感器在设计时都考虑到了几个问题,即优化的低功耗、低误报次数、小尺寸、安全的无线电通信和安全规格。所开发的基于振动的系统安装在一个机场,在滑行跑道和跑道附近没有保护的海岸线。在45天的时间里,该系统每周报告的假阳性平均少于两次,假阴性为零。在可能有故意攀爬围栏的终点区和跑道末端的链式围栏上安装了6个围栏传感器。在45天的时间里,包括几天的季节性风暴,围栏传感器没有报告误报。
{"title":"Intelligent acoustic and vibration recognition/alert systems for security breaching detection, close proximity danger identification, and perimeter protection","authors":"A. Dibazar, A. Yousefi, Hyung-Ook Park, Bing Lu, S. George, T. Berger","doi":"10.1109/THS.2010.5654931","DOIUrl":"https://doi.org/10.1109/THS.2010.5654931","url":null,"abstract":"Because the protection of perimeters in national, agricultural, airport, prison, military sites, and residential areas against dangerous approaching human and vehicles when using humans to provide security is expensive or unsafe, acoustic/vibration signature identification of approaching human and vehicles threats has attracted increased attention. This paper addresses the development and deployment of three types of acoustic and vibration based smart sensors to identify and report sequential approaching threats prior to the intrusion. More specifically, we have developed: a) acoustic based long range sensor with which vehicles' engine sound and type can be identified, b) vibration based seismic analyzer which discriminates between human footsteps and other seismic events such as those caused by animals, and c) fence breaching vibration sensor which can detect intentional disturbances on the fence and discriminate between climb, kick, rattle, and lean. All of these sensors were designed with several issues in mind, namely, optimized low power usage, a low number of false positives, small size, secure radio communication, and milspec. The developed vibration based system was installed in an airport with unprotected shore lines in the vicinity of taxi- and run-ways. The system reported an average of less than two false positives per week and zero false negative for the duration of forty-five days. Six fence sensors were installed on the terminal area and end-of-runway chain-link fences where there was possibility of intentional fence climbing. The fence sensors reported no false positives for the duration of forty-five days which included several days of seasonal storms.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130097606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Role management diversity in emergency situations 紧急情况下角色管理的多样性
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655046
Hanna-Miina Sihvonen, Taina A. Kurki
In emergency organizations, shift planning and role management of human resources are basis for managing daily operative work. However, it is challenging due to the emergencies' situation-driven demands and varying human resource needs. Emergencies can be unexpected and dynamic, escalating and prolonging. Available human resources to function in needed roles and related tasks depend on many variables like persons' reachability, location of the incident and personnel, time of the day, type of the incident, and weather conditions. Personnel can operate in various roles as the incident may require. The roles have predefined skill requirements and access rights to information and information systems. The roles can change dynamically several times during a shift or period of the incident. The role can change within organization or across organizational boundaries. Many of the information systems used often lack adequate role-based shift planning, monitoring, and dynamic role changes. Traceability of the time used in each role by a person should be monitored in the system level. Thus, the systems should support monitoring workloads of human resources and ensure, as needed, also justified distribution of work based on different roles. The research of this paper is based on empirical data from various geographically distributed Finnish emergency organizations. The unique Finnish emergency response center (ERC) model has been also significant for the study, because it differs from most other countries in that it consists of authorities' joint emergency response centers. Further, the ERC is a central organization in information exchange and messaging in emergency situations. The joint centers take all emergency calls and alert the necessary authorities directly and simultaneously based on the risk assessment. Multiple authorities' information and information systems are accessed and used, thus relevant laws and policies affect the access rights and information exchange. Further, traceability of the accessed information and the role in which it has been accessed are important. Role management is a key element in system and operative level in emergency organizations' environment where dynamic shift and role changes occur within or between organizations and persons. Firstly, current challenges in emergency organizations' shift planning and role management are detailed and similarities analyzed. Secondly, a generic role-based model for human resource attribute description is proposed. Thirdly, a virtual role concept is outlined and the benefits it can introduce in information system level and what implications it has to system design are discussed.
在应急组织中,人力资源的班次规划和角色管理是管理日常业务工作的基础。然而,由于紧急情况的情况驱动的需求和不同的人力资源需求,这是具有挑战性的。紧急情况可能是出乎意料和动态的,不断升级和延长。在所需角色和相关任务中发挥作用的可用人力资源取决于许多变量,如人员的可达性、事件和人员的位置、一天中的时间、事件类型和天气条件。人员可以根据事件的需要扮演不同的角色。角色具有预定义的技能要求和对信息和信息系统的访问权限。在事件发生期间,角色可以动态地改变几次。角色可以在组织内部或跨组织边界更改。所使用的许多信息系统往往缺乏充分的基于角色的轮班计划、监测和动态角色变化。每个人在每个角色中使用的时间的可追溯性应该在系统级别进行监控。因此,各系统应支持监测人力资源的工作量,并在需要时确保根据不同的角色合理分配工作。本文的研究基于芬兰各个地理分布的应急组织的经验数据。芬兰独特的应急响应中心(ERC)模式对这项研究也很重要,因为它与大多数其他国家不同,它由当局的联合应急响应中心组成。此外,ERC是紧急情况下信息交换和信息传递的中心组织。联合中心接听所有紧急呼叫,并根据风险评估直接和同时向有关当局发出警报。多个部门的信息和信息系统被访问和使用,相关的法律和政策影响着访问权限和信息交换。此外,访问信息的可跟踪性以及访问信息的角色也很重要。在应急组织环境中,角色管理是系统和操作层面的关键要素,在组织和人员内部或之间发生动态的转换和角色变化。首先,详细分析了当前应急组织的班次规划和角色管理面临的挑战,并分析了共性。其次,提出了一种通用的基于角色的人力资源属性描述模型。第三,概述了虚拟角色的概念,讨论了虚拟角色在信息系统层面带来的好处以及对系统设计的启示。
{"title":"Role management diversity in emergency situations","authors":"Hanna-Miina Sihvonen, Taina A. Kurki","doi":"10.1109/THS.2010.5655046","DOIUrl":"https://doi.org/10.1109/THS.2010.5655046","url":null,"abstract":"In emergency organizations, shift planning and role management of human resources are basis for managing daily operative work. However, it is challenging due to the emergencies' situation-driven demands and varying human resource needs. Emergencies can be unexpected and dynamic, escalating and prolonging. Available human resources to function in needed roles and related tasks depend on many variables like persons' reachability, location of the incident and personnel, time of the day, type of the incident, and weather conditions. Personnel can operate in various roles as the incident may require. The roles have predefined skill requirements and access rights to information and information systems. The roles can change dynamically several times during a shift or period of the incident. The role can change within organization or across organizational boundaries. Many of the information systems used often lack adequate role-based shift planning, monitoring, and dynamic role changes. Traceability of the time used in each role by a person should be monitored in the system level. Thus, the systems should support monitoring workloads of human resources and ensure, as needed, also justified distribution of work based on different roles. The research of this paper is based on empirical data from various geographically distributed Finnish emergency organizations. The unique Finnish emergency response center (ERC) model has been also significant for the study, because it differs from most other countries in that it consists of authorities' joint emergency response centers. Further, the ERC is a central organization in information exchange and messaging in emergency situations. The joint centers take all emergency calls and alert the necessary authorities directly and simultaneously based on the risk assessment. Multiple authorities' information and information systems are accessed and used, thus relevant laws and policies affect the access rights and information exchange. Further, traceability of the accessed information and the role in which it has been accessed are important. Role management is a key element in system and operative level in emergency organizations' environment where dynamic shift and role changes occur within or between organizations and persons. Firstly, current challenges in emergency organizations' shift planning and role management are detailed and similarities analyzed. Secondly, a generic role-based model for human resource attribute description is proposed. Thirdly, a virtual role concept is outlined and the benefits it can introduce in information system level and what implications it has to system design are discussed.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"517 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133401199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modeling the Federal User Identity, Credential, and Access Management (ICAM) decision space to facilitate secure information sharing 对联邦用户身份、凭证和访问管理(ICAM)决策空间进行建模,以促进安全的信息共享
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5655096
T. C. Smith, Maria E. Vachino, Anil John, Chi Y. Wu, Christopher D. Obremski, Karyn Higa-Smith
Providing the right information to the right person at the right time is critical, especially for emergency response and law enforcement operations. Accomplishing this across sovereign organizations while keeping resources secure is a formidable task. What is needed is an access control solution that can break down information silos by securely enabling information sharing with non-provisioned users in a dynamic environment. Multiple government agencies, including the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) are currently developing Attribute-Based Access Control (ABAC) solutions to do just that. ABAC supports cross-organizational information sharing by facilitating policy-based resource access control. The critical components of an ABAC solution are the governing organizational policies, attribute syntax and semantics, and authoritative sources. The policies define the business objectives and the authoritative sources provide critical attribute attestation, but syntactic and semantic agreement between the information exchange endpoints is the linchpin of attribute sharing. The Organization for the Advancement of Structured Information Standards (OASIS) Security Assertion Markup Language (SAML) standard provides federation partners with a viable attribute sharing syntax, but establishing semantic agreement is an impediment to ABAC efforts. This critical issue can be successfully addressed with conceptual modeling. S&T is sponsoring the following research and development effort to provide a concept model of the User Identity, Credential, and Access Management decision space for secure information sharing.
在正确的时间向正确的人提供正确的信息至关重要,特别是对于应急反应和执法行动而言。在确保资源安全的同时,跨主权组织实现这一目标是一项艰巨的任务。我们需要的是一种访问控制解决方案,它可以通过在动态环境中安全地启用与未配置的用户共享信息来打破信息孤岛。包括国土安全部(DHS)科学技术局(S&T)在内的多个政府机构目前正在开发基于属性的访问控制(ABAC)解决方案来实现这一点。ABAC通过促进基于策略的资源访问控制来支持跨组织的信息共享。ABAC解决方案的关键组件是管理组织策略、属性语法和语义以及权威源。策略定义业务目标,权威源提供关键的属性认证,但信息交换端点之间的语法和语义协议是属性共享的关键。结构化信息标准促进组织(OASIS)安全断言标记语言(SAML)标准为联邦合作伙伴提供了可行的属性共享语法,但是建立语义协议是ABAC工作的一个障碍。这个关键问题可以通过概念建模成功解决。S&T正在赞助以下研究和开发工作,以提供用于安全信息共享的用户身份、凭据和访问管理决策空间的概念模型。
{"title":"Modeling the Federal User Identity, Credential, and Access Management (ICAM) decision space to facilitate secure information sharing","authors":"T. C. Smith, Maria E. Vachino, Anil John, Chi Y. Wu, Christopher D. Obremski, Karyn Higa-Smith","doi":"10.1109/THS.2010.5655096","DOIUrl":"https://doi.org/10.1109/THS.2010.5655096","url":null,"abstract":"Providing the right information to the right person at the right time is critical, especially for emergency response and law enforcement operations. Accomplishing this across sovereign organizations while keeping resources secure is a formidable task. What is needed is an access control solution that can break down information silos by securely enabling information sharing with non-provisioned users in a dynamic environment. Multiple government agencies, including the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) are currently developing Attribute-Based Access Control (ABAC) solutions to do just that. ABAC supports cross-organizational information sharing by facilitating policy-based resource access control. The critical components of an ABAC solution are the governing organizational policies, attribute syntax and semantics, and authoritative sources. The policies define the business objectives and the authoritative sources provide critical attribute attestation, but syntactic and semantic agreement between the information exchange endpoints is the linchpin of attribute sharing. The Organization for the Advancement of Structured Information Standards (OASIS) Security Assertion Markup Language (SAML) standard provides federation partners with a viable attribute sharing syntax, but establishing semantic agreement is an impediment to ABAC efforts. This critical issue can be successfully addressed with conceptual modeling. S&T is sponsoring the following research and development effort to provide a concept model of the User Identity, Credential, and Access Management decision space for secure information sharing.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130976539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulating a vigilance task: Extensible technology for baggage security assessment and training 模拟警戒任务:行李安全评估和培训的可扩展技术
Pub Date : 2010-12-03 DOI: 10.1109/THS.2010.5654982
R. Hubal, S. Mitroff, Matthew S. Cain, B. Scott, R. DeWitt
A number of homeland security occupations require vigilance to potentially subtle events in the environment, with high stakes for missing infrequent but consequential items. Sustained vigilance can be required for long periods of time or when sleep-deprived or physically inactive, compounding the difficulty of this task. Research on sustained vigilance has largely focused on tasks such as driving, air traffic control, medical screening, and military specialties, but the findings closely apply also to other homeland security-related occupations. A research area that has received relatively little attention, but is of critical importance to homeland security, involves the role of individual differences in vigilance. Prior research suggests that certain individuals are better than others at searching for rarely present targets over long time periods, yet what is driving this effect remains unclear. Further, it is not known whether or not sustained vigilance can be improved through training. This research team is studying two research questions: Are there individual differences in the inherent ability to sustain vigilance? and What are the most effective approaches for training and improving sustained vigilance for rare items or events?. The intent is to employ tasks (primarily visual identification and gross motor tests) that readily translate to the relevant homeland security occupations requiring sustained vigilance.
许多国土安全职业需要对环境中潜在的微妙事件保持警惕,丢失不常见但重要的项目的风险很高。在很长一段时间内,或者在睡眠不足或缺乏运动的情况下,都需要保持警惕,这就增加了这项任务的难度。对持续警惕性的研究主要集中在驾驶、空中交通管制、医疗检查和军事专业等任务上,但研究结果也密切适用于其他与国土安全相关的职业。有一个研究领域受到的关注相对较少,但对国土安全至关重要,它涉及个体差异在警惕性中的作用。先前的研究表明,在长时间内,某些人比其他人更善于寻找很少出现的目标,但导致这种效应的原因尚不清楚。此外,不知道是否可以通过训练来提高持续的警惕性。这个研究小组正在研究两个研究问题:保持警惕的内在能力是否存在个体差异?训练和提高对稀有物品或事件的持续警惕的最有效方法是什么?其目的是采用一些任务(主要是视觉识别和大动作测试),这些任务很容易转化为需要持续警惕的相关国土安全职业。
{"title":"Simulating a vigilance task: Extensible technology for baggage security assessment and training","authors":"R. Hubal, S. Mitroff, Matthew S. Cain, B. Scott, R. DeWitt","doi":"10.1109/THS.2010.5654982","DOIUrl":"https://doi.org/10.1109/THS.2010.5654982","url":null,"abstract":"A number of homeland security occupations require vigilance to potentially subtle events in the environment, with high stakes for missing infrequent but consequential items. Sustained vigilance can be required for long periods of time or when sleep-deprived or physically inactive, compounding the difficulty of this task. Research on sustained vigilance has largely focused on tasks such as driving, air traffic control, medical screening, and military specialties, but the findings closely apply also to other homeland security-related occupations. A research area that has received relatively little attention, but is of critical importance to homeland security, involves the role of individual differences in vigilance. Prior research suggests that certain individuals are better than others at searching for rarely present targets over long time periods, yet what is driving this effect remains unclear. Further, it is not known whether or not sustained vigilance can be improved through training. This research team is studying two research questions: Are there individual differences in the inherent ability to sustain vigilance? and What are the most effective approaches for training and improving sustained vigilance for rare items or events?. The intent is to employ tasks (primarily visual identification and gross motor tests) that readily translate to the relevant homeland security occupations requiring sustained vigilance.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134275079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2010 IEEE International Conference on Technologies for Homeland Security (HST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1