Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654955
C. Crawford, D. Castañón, John Beaty, H. Martz
The US Department of Homeland Security (DHS) has requirements for future explosives scanners that include dealing with a larger number of threats, higher probability of detection, lower false alarm rates and lower operating costs. One tactic that DHS is pursuing to achieve these requirements is to augment the capabilities of the established security vendors with third-party algorithm developers. The purposes of this presentation are to review DHS's objectives for involving third parties in the development of advanced algorithms and then to discuss how these objectives are achieved using workshops and grand challenges.
{"title":"Facilitation of third-party development of advanced algorithms for explosive detection using workshops and grand challenges","authors":"C. Crawford, D. Castañón, John Beaty, H. Martz","doi":"10.1109/THS.2010.5654955","DOIUrl":"https://doi.org/10.1109/THS.2010.5654955","url":null,"abstract":"The US Department of Homeland Security (DHS) has requirements for future explosives scanners that include dealing with a larger number of threats, higher probability of detection, lower false alarm rates and lower operating costs. One tactic that DHS is pursuing to achieve these requirements is to augment the capabilities of the established security vendors with third-party algorithm developers. The purposes of this presentation are to review DHS's objectives for involving third parties in the development of advanced algorithms and then to discuss how these objectives are achieved using workshops and grand challenges.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124750179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654983
D. B. Megherbi, P. Levesque
In this paper we deal with the design and analysis of an intelligent multi-agent-based architecture for synchronized real-time situational understanding, awareness, decision-making, and control in a geographically networked distributed computing environment. In particular, we focus here on the design and implementation of a middleware framework for agent intra and inter-node communication as well as computing nodes synchronization. While the proposed work finds applications in many areas including networked chemical sensors, large key infrastructures and resources such as highways and transportations, here as application of the proposed method we consider the challenging scenario case of a set of distributed collaborating radars (multi-agent) system geographically distributed over a large terrain environment with several moving targets. Here, each radar agent, taken separately, does not have the capabilities and resources to span the monitoring of the totality of a given large terrain. However, when collaborating with other radars distributed in the large terrain environment, each with similar limited capabilities, we show and illustrate the proposed distributed agents (radars) capability of not only monitoring their respective regions, but also tracking, communicating with neighboring agents, and decision-making, to collaborating span the monitoring the totality of a given large terrain. We show how the neighboring agent radars do not necessarily have to be running on the same computing node. Similarly, as part of the scenario we also consider the case of existence of friendly and unknown forces/stressors targets that are capable of moving throughout the same distributed environment. We show how the proposed algorithms are scalable. They are implemented on the CMINDS High Performance Distributed Computing Engine (HDPC) test-bed taking full advantage of a distributed environment and multiple processing systems.
{"title":"A distributed multi-agent tracking, awareness, and communication system architecture for synchronized real-time situational understanding, surveillance, decision-making, and control","authors":"D. B. Megherbi, P. Levesque","doi":"10.1109/THS.2010.5654983","DOIUrl":"https://doi.org/10.1109/THS.2010.5654983","url":null,"abstract":"In this paper we deal with the design and analysis of an intelligent multi-agent-based architecture for synchronized real-time situational understanding, awareness, decision-making, and control in a geographically networked distributed computing environment. In particular, we focus here on the design and implementation of a middleware framework for agent intra and inter-node communication as well as computing nodes synchronization. While the proposed work finds applications in many areas including networked chemical sensors, large key infrastructures and resources such as highways and transportations, here as application of the proposed method we consider the challenging scenario case of a set of distributed collaborating radars (multi-agent) system geographically distributed over a large terrain environment with several moving targets. Here, each radar agent, taken separately, does not have the capabilities and resources to span the monitoring of the totality of a given large terrain. However, when collaborating with other radars distributed in the large terrain environment, each with similar limited capabilities, we show and illustrate the proposed distributed agents (radars) capability of not only monitoring their respective regions, but also tracking, communicating with neighboring agents, and decision-making, to collaborating span the monitoring the totality of a given large terrain. We show how the neighboring agent radars do not necessarily have to be running on the same computing node. Similarly, as part of the scenario we also consider the case of existence of friendly and unknown forces/stressors targets that are capable of moving throughout the same distributed environment. We show how the proposed algorithms are scalable. They are implemented on the CMINDS High Performance Distributed Computing Engine (HDPC) test-bed taking full advantage of a distributed environment and multiple processing systems.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121222337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654980
Giby Raphael, C. Berka, Natalie Kintz, Veasna Tan, Adrienne Behneman, Robin R. Johnson
Interactive Neuro-Educational Technologies (I-NET) are designed to increase the pace and efficiency of skill learning by adapting training environments to the skill levels and needs of the individuals. Advanced Brain Monitoring (ABM) explored the feasibility of integrating physiological measures into an interactive adaptive computer-based training system to facilitate mitigations, accelerate skill acquisition and provide quantitative evidence of successful training in tasks relating to airport luggage screening and threat detection. A small pilot study was conducted (N=23) to assess electroencephalographic measures of learning and performance during a threat identification task using X-Ray images designed to be representative of those typically viewed by baggage screeners. Linear regression analysis of trends in EEG Alpha (8–12 Hz) and Theta (3–7 Hz) from stimulus presentation to response for each image revealed effects for Threat Type, Task Order, Stimulus Difficulty and Response Type. Correlation between EEG engagement and workload levels with performance and heart rate and heart rate variability measures in relation to performance were explored. In addition, fixation locked event related potentials (FLERPS) in relation to user responses were investigated by interfacing a commercial eye tracker to the experimental setup.
{"title":"Interactive Neuro-Educational Technologies (I-NET): Enhanced training of threat detection for airport luggage screeners","authors":"Giby Raphael, C. Berka, Natalie Kintz, Veasna Tan, Adrienne Behneman, Robin R. Johnson","doi":"10.1109/THS.2010.5654980","DOIUrl":"https://doi.org/10.1109/THS.2010.5654980","url":null,"abstract":"Interactive Neuro-Educational Technologies (I-NET) are designed to increase the pace and efficiency of skill learning by adapting training environments to the skill levels and needs of the individuals. Advanced Brain Monitoring (ABM) explored the feasibility of integrating physiological measures into an interactive adaptive computer-based training system to facilitate mitigations, accelerate skill acquisition and provide quantitative evidence of successful training in tasks relating to airport luggage screening and threat detection. A small pilot study was conducted (N=23) to assess electroencephalographic measures of learning and performance during a threat identification task using X-Ray images designed to be representative of those typically viewed by baggage screeners. Linear regression analysis of trends in EEG Alpha (8–12 Hz) and Theta (3–7 Hz) from stimulus presentation to response for each image revealed effects for Threat Type, Task Order, Stimulus Difficulty and Response Type. Correlation between EEG engagement and workload levels with performance and heart rate and heart rate variability measures in relation to performance were explored. In addition, fixation locked event related potentials (FLERPS) in relation to user responses were investigated by interfacing a commercial eye tracker to the experimental setup.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127055321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655078
I. Sebanja, D. Megherbi
In this paper, we propose a system that automatically detects and recognizes road signs found in the United States, in real time or close to real-time. The proposed system has application to intelligent autonomous unmanned vehicles for urban surveillance and rescue. It is a multi-layered hierarchical scheme composed of 3 parts: road sign color segmentation, shape recognition, and classification. The system is robust and is invariant to image translation, rotation and scaling. It can deal with situations where there is partial occlusion, blurring of the image, and low visibility due to either weather or a change in lighting conditions. The road sign shape detection and sign classification/recognition are both based on the Principle Component Analysis. We show that the proposed system has correct classification rate of 99.2%. Experimental results show that with the current system, using existing standard hardware/software, it takes on average 2.5 seconds to detect, to segment, and to classify/recognize road signs in a road image scene. This is considered relatively fast. This time can easily be decreased in the future with dedicated specialized hardware and optimized software, taking advantage of the latest embedded hardware technology. Currently, in this paper the focus is on red and yellow road signs found in the United States but the proposed techniques can be generalized to be used for any other colored road signs found both in the United States of America and other countries.
{"title":"Automatic detection and recognition of traffic road signs for intelligent autonomous unmanned vehicles for urban surveillance and rescue","authors":"I. Sebanja, D. Megherbi","doi":"10.1109/THS.2010.5655078","DOIUrl":"https://doi.org/10.1109/THS.2010.5655078","url":null,"abstract":"In this paper, we propose a system that automatically detects and recognizes road signs found in the United States, in real time or close to real-time. The proposed system has application to intelligent autonomous unmanned vehicles for urban surveillance and rescue. It is a multi-layered hierarchical scheme composed of 3 parts: road sign color segmentation, shape recognition, and classification. The system is robust and is invariant to image translation, rotation and scaling. It can deal with situations where there is partial occlusion, blurring of the image, and low visibility due to either weather or a change in lighting conditions. The road sign shape detection and sign classification/recognition are both based on the Principle Component Analysis. We show that the proposed system has correct classification rate of 99.2%. Experimental results show that with the current system, using existing standard hardware/software, it takes on average 2.5 seconds to detect, to segment, and to classify/recognize road signs in a road image scene. This is considered relatively fast. This time can easily be decreased in the future with dedicated specialized hardware and optimized software, taking advantage of the latest embedded hardware technology. Currently, in this paper the focus is on red and yellow road signs found in the United States but the proposed techniques can be generalized to be used for any other colored road signs found both in the United States of America and other countries.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127078059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654938
A. Danagoulian, W. Bertozzi, C. L. Hicks, A. Klimenko, S. Korbly, R. Ledoux, Cody M. Wilson
Photofission is the process in which a nucleus disintegrates into two daughter products after absorbing a photon. Photofission near threshold in actinides is very similar to spontaneous fission in terms of the number of emitted decay neutrons and their energy distribution. Most of the neutrons are in the ∼2 MeV energy range, and can be efficiently detected with liquid scintillator detectors. Thus, Prompt Neutrons from Photofission (PNPF) near threshold can be used as an excellent tool for the detection of actinides. Since the photofission cross section for most fissionable materials drops to near zero for incident photon energies of less than 6 MeV, a source of photons with a higher energy is needed, for example 9 MeV. At this energy interference from (γ, n) processes is minimal. Photon sources in this energy range are well suited for other non-intrusive inspection applications as well as searching for fissionable materials. Passport Systems, Inc. is currently operating a continuous wave (CW) 9 MeV electron accelerator and an array of liquid scintillator detectors to achieve this goal. Pulse shape discrimination (PSD) techniques are used determine the particle type. The remaining neutrons are also filtered through an in-house developed pileup rejection algorithm. The resulting neutron count is compared with the known background to determine the confidence level for possible shielded Special Nuclear Material identification. Initial testing of this system has been performed and the results will be presented. The results show the utility of a CW photon source as well as the ability to fuse the PNPF data with other data to reduce the dose to cargo, or scan times.
{"title":"Prompt neutrons from photofission and its use in homeland security applications","authors":"A. Danagoulian, W. Bertozzi, C. L. Hicks, A. Klimenko, S. Korbly, R. Ledoux, Cody M. Wilson","doi":"10.1109/THS.2010.5654938","DOIUrl":"https://doi.org/10.1109/THS.2010.5654938","url":null,"abstract":"Photofission is the process in which a nucleus disintegrates into two daughter products after absorbing a photon. Photofission near threshold in actinides is very similar to spontaneous fission in terms of the number of emitted decay neutrons and their energy distribution. Most of the neutrons are in the ∼2 MeV energy range, and can be efficiently detected with liquid scintillator detectors. Thus, Prompt Neutrons from Photofission (PNPF) near threshold can be used as an excellent tool for the detection of actinides. Since the photofission cross section for most fissionable materials drops to near zero for incident photon energies of less than 6 MeV, a source of photons with a higher energy is needed, for example 9 MeV. At this energy interference from (γ, n) processes is minimal. Photon sources in this energy range are well suited for other non-intrusive inspection applications as well as searching for fissionable materials. Passport Systems, Inc. is currently operating a continuous wave (CW) 9 MeV electron accelerator and an array of liquid scintillator detectors to achieve this goal. Pulse shape discrimination (PSD) techniques are used determine the particle type. The remaining neutrons are also filtered through an in-house developed pileup rejection algorithm. The resulting neutron count is compared with the known background to determine the confidence level for possible shielded Special Nuclear Material identification. Initial testing of this system has been performed and the results will be presented. The results show the utility of a CW photon source as well as the ability to fuse the PNPF data with other data to reduce the dose to cargo, or scan times.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127219623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655036
Donald R. Kretz, Roderic W. Paulk
Every day, millions of people cross international borders by air or sea. A nation's ability to identify and neutralize threats posed by travelers depends heavily on an accurate and proactive methodology for establishing traveler identity. Lacking both a common reference model and a globally unique identification scheme, the “system” must confront the problem of multiple distinct or imprecise references to each single real-world entity when analyzing vast amounts of data. Additionally, the emergent patterns of relationships between entities are often complex, fuzzy, and/or novel. Methodologies that depend solely on exact or approximate name matches are subject to defeat simply by using aliases, and are typically prone to high levels of false positives. In order for identity resolution to be effective, information from multiple, diverse sources must be analyzed (e.g., biometric, biographic, social, etc.). Furthermore, identity analysis must be a continuous process that enables accurate pre-assessment when travel intentions first become known. To that end, this paper presents an identity resolution methodology called Collective Identity Resolution.
{"title":"Establishing traveler identity using collective identity resolution","authors":"Donald R. Kretz, Roderic W. Paulk","doi":"10.1109/THS.2010.5655036","DOIUrl":"https://doi.org/10.1109/THS.2010.5655036","url":null,"abstract":"Every day, millions of people cross international borders by air or sea. A nation's ability to identify and neutralize threats posed by travelers depends heavily on an accurate and proactive methodology for establishing traveler identity. Lacking both a common reference model and a globally unique identification scheme, the “system” must confront the problem of multiple distinct or imprecise references to each single real-world entity when analyzing vast amounts of data. Additionally, the emergent patterns of relationships between entities are often complex, fuzzy, and/or novel. Methodologies that depend solely on exact or approximate name matches are subject to defeat simply by using aliases, and are typically prone to high levels of false positives. In order for identity resolution to be effective, information from multiple, diverse sources must be analyzed (e.g., biometric, biographic, social, etc.). Furthermore, identity analysis must be a continuous process that enables accurate pre-assessment when travel intentions first become known. To that end, this paper presents an identity resolution methodology called Collective Identity Resolution.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131393983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654931
A. Dibazar, A. Yousefi, Hyung-Ook Park, Bing Lu, S. George, T. Berger
Because the protection of perimeters in national, agricultural, airport, prison, military sites, and residential areas against dangerous approaching human and vehicles when using humans to provide security is expensive or unsafe, acoustic/vibration signature identification of approaching human and vehicles threats has attracted increased attention. This paper addresses the development and deployment of three types of acoustic and vibration based smart sensors to identify and report sequential approaching threats prior to the intrusion. More specifically, we have developed: a) acoustic based long range sensor with which vehicles' engine sound and type can be identified, b) vibration based seismic analyzer which discriminates between human footsteps and other seismic events such as those caused by animals, and c) fence breaching vibration sensor which can detect intentional disturbances on the fence and discriminate between climb, kick, rattle, and lean. All of these sensors were designed with several issues in mind, namely, optimized low power usage, a low number of false positives, small size, secure radio communication, and milspec. The developed vibration based system was installed in an airport with unprotected shore lines in the vicinity of taxi- and run-ways. The system reported an average of less than two false positives per week and zero false negative for the duration of forty-five days. Six fence sensors were installed on the terminal area and end-of-runway chain-link fences where there was possibility of intentional fence climbing. The fence sensors reported no false positives for the duration of forty-five days which included several days of seasonal storms.
{"title":"Intelligent acoustic and vibration recognition/alert systems for security breaching detection, close proximity danger identification, and perimeter protection","authors":"A. Dibazar, A. Yousefi, Hyung-Ook Park, Bing Lu, S. George, T. Berger","doi":"10.1109/THS.2010.5654931","DOIUrl":"https://doi.org/10.1109/THS.2010.5654931","url":null,"abstract":"Because the protection of perimeters in national, agricultural, airport, prison, military sites, and residential areas against dangerous approaching human and vehicles when using humans to provide security is expensive or unsafe, acoustic/vibration signature identification of approaching human and vehicles threats has attracted increased attention. This paper addresses the development and deployment of three types of acoustic and vibration based smart sensors to identify and report sequential approaching threats prior to the intrusion. More specifically, we have developed: a) acoustic based long range sensor with which vehicles' engine sound and type can be identified, b) vibration based seismic analyzer which discriminates between human footsteps and other seismic events such as those caused by animals, and c) fence breaching vibration sensor which can detect intentional disturbances on the fence and discriminate between climb, kick, rattle, and lean. All of these sensors were designed with several issues in mind, namely, optimized low power usage, a low number of false positives, small size, secure radio communication, and milspec. The developed vibration based system was installed in an airport with unprotected shore lines in the vicinity of taxi- and run-ways. The system reported an average of less than two false positives per week and zero false negative for the duration of forty-five days. Six fence sensors were installed on the terminal area and end-of-runway chain-link fences where there was possibility of intentional fence climbing. The fence sensors reported no false positives for the duration of forty-five days which included several days of seasonal storms.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130097606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655046
Hanna-Miina Sihvonen, Taina A. Kurki
In emergency organizations, shift planning and role management of human resources are basis for managing daily operative work. However, it is challenging due to the emergencies' situation-driven demands and varying human resource needs. Emergencies can be unexpected and dynamic, escalating and prolonging. Available human resources to function in needed roles and related tasks depend on many variables like persons' reachability, location of the incident and personnel, time of the day, type of the incident, and weather conditions. Personnel can operate in various roles as the incident may require. The roles have predefined skill requirements and access rights to information and information systems. The roles can change dynamically several times during a shift or period of the incident. The role can change within organization or across organizational boundaries. Many of the information systems used often lack adequate role-based shift planning, monitoring, and dynamic role changes. Traceability of the time used in each role by a person should be monitored in the system level. Thus, the systems should support monitoring workloads of human resources and ensure, as needed, also justified distribution of work based on different roles. The research of this paper is based on empirical data from various geographically distributed Finnish emergency organizations. The unique Finnish emergency response center (ERC) model has been also significant for the study, because it differs from most other countries in that it consists of authorities' joint emergency response centers. Further, the ERC is a central organization in information exchange and messaging in emergency situations. The joint centers take all emergency calls and alert the necessary authorities directly and simultaneously based on the risk assessment. Multiple authorities' information and information systems are accessed and used, thus relevant laws and policies affect the access rights and information exchange. Further, traceability of the accessed information and the role in which it has been accessed are important. Role management is a key element in system and operative level in emergency organizations' environment where dynamic shift and role changes occur within or between organizations and persons. Firstly, current challenges in emergency organizations' shift planning and role management are detailed and similarities analyzed. Secondly, a generic role-based model for human resource attribute description is proposed. Thirdly, a virtual role concept is outlined and the benefits it can introduce in information system level and what implications it has to system design are discussed.
{"title":"Role management diversity in emergency situations","authors":"Hanna-Miina Sihvonen, Taina A. Kurki","doi":"10.1109/THS.2010.5655046","DOIUrl":"https://doi.org/10.1109/THS.2010.5655046","url":null,"abstract":"In emergency organizations, shift planning and role management of human resources are basis for managing daily operative work. However, it is challenging due to the emergencies' situation-driven demands and varying human resource needs. Emergencies can be unexpected and dynamic, escalating and prolonging. Available human resources to function in needed roles and related tasks depend on many variables like persons' reachability, location of the incident and personnel, time of the day, type of the incident, and weather conditions. Personnel can operate in various roles as the incident may require. The roles have predefined skill requirements and access rights to information and information systems. The roles can change dynamically several times during a shift or period of the incident. The role can change within organization or across organizational boundaries. Many of the information systems used often lack adequate role-based shift planning, monitoring, and dynamic role changes. Traceability of the time used in each role by a person should be monitored in the system level. Thus, the systems should support monitoring workloads of human resources and ensure, as needed, also justified distribution of work based on different roles. The research of this paper is based on empirical data from various geographically distributed Finnish emergency organizations. The unique Finnish emergency response center (ERC) model has been also significant for the study, because it differs from most other countries in that it consists of authorities' joint emergency response centers. Further, the ERC is a central organization in information exchange and messaging in emergency situations. The joint centers take all emergency calls and alert the necessary authorities directly and simultaneously based on the risk assessment. Multiple authorities' information and information systems are accessed and used, thus relevant laws and policies affect the access rights and information exchange. Further, traceability of the accessed information and the role in which it has been accessed are important. Role management is a key element in system and operative level in emergency organizations' environment where dynamic shift and role changes occur within or between organizations and persons. Firstly, current challenges in emergency organizations' shift planning and role management are detailed and similarities analyzed. Secondly, a generic role-based model for human resource attribute description is proposed. Thirdly, a virtual role concept is outlined and the benefits it can introduce in information system level and what implications it has to system design are discussed.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"517 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133401199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655096
T. C. Smith, Maria E. Vachino, Anil John, Chi Y. Wu, Christopher D. Obremski, Karyn Higa-Smith
Providing the right information to the right person at the right time is critical, especially for emergency response and law enforcement operations. Accomplishing this across sovereign organizations while keeping resources secure is a formidable task. What is needed is an access control solution that can break down information silos by securely enabling information sharing with non-provisioned users in a dynamic environment. Multiple government agencies, including the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) are currently developing Attribute-Based Access Control (ABAC) solutions to do just that. ABAC supports cross-organizational information sharing by facilitating policy-based resource access control. The critical components of an ABAC solution are the governing organizational policies, attribute syntax and semantics, and authoritative sources. The policies define the business objectives and the authoritative sources provide critical attribute attestation, but syntactic and semantic agreement between the information exchange endpoints is the linchpin of attribute sharing. The Organization for the Advancement of Structured Information Standards (OASIS) Security Assertion Markup Language (SAML) standard provides federation partners with a viable attribute sharing syntax, but establishing semantic agreement is an impediment to ABAC efforts. This critical issue can be successfully addressed with conceptual modeling. S&T is sponsoring the following research and development effort to provide a concept model of the User Identity, Credential, and Access Management decision space for secure information sharing.
{"title":"Modeling the Federal User Identity, Credential, and Access Management (ICAM) decision space to facilitate secure information sharing","authors":"T. C. Smith, Maria E. Vachino, Anil John, Chi Y. Wu, Christopher D. Obremski, Karyn Higa-Smith","doi":"10.1109/THS.2010.5655096","DOIUrl":"https://doi.org/10.1109/THS.2010.5655096","url":null,"abstract":"Providing the right information to the right person at the right time is critical, especially for emergency response and law enforcement operations. Accomplishing this across sovereign organizations while keeping resources secure is a formidable task. What is needed is an access control solution that can break down information silos by securely enabling information sharing with non-provisioned users in a dynamic environment. Multiple government agencies, including the Department of Homeland Security (DHS) Science and Technology Directorate (S&T) are currently developing Attribute-Based Access Control (ABAC) solutions to do just that. ABAC supports cross-organizational information sharing by facilitating policy-based resource access control. The critical components of an ABAC solution are the governing organizational policies, attribute syntax and semantics, and authoritative sources. The policies define the business objectives and the authoritative sources provide critical attribute attestation, but syntactic and semantic agreement between the information exchange endpoints is the linchpin of attribute sharing. The Organization for the Advancement of Structured Information Standards (OASIS) Security Assertion Markup Language (SAML) standard provides federation partners with a viable attribute sharing syntax, but establishing semantic agreement is an impediment to ABAC efforts. This critical issue can be successfully addressed with conceptual modeling. S&T is sponsoring the following research and development effort to provide a concept model of the User Identity, Credential, and Access Management decision space for secure information sharing.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130976539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654982
R. Hubal, S. Mitroff, Matthew S. Cain, B. Scott, R. DeWitt
A number of homeland security occupations require vigilance to potentially subtle events in the environment, with high stakes for missing infrequent but consequential items. Sustained vigilance can be required for long periods of time or when sleep-deprived or physically inactive, compounding the difficulty of this task. Research on sustained vigilance has largely focused on tasks such as driving, air traffic control, medical screening, and military specialties, but the findings closely apply also to other homeland security-related occupations. A research area that has received relatively little attention, but is of critical importance to homeland security, involves the role of individual differences in vigilance. Prior research suggests that certain individuals are better than others at searching for rarely present targets over long time periods, yet what is driving this effect remains unclear. Further, it is not known whether or not sustained vigilance can be improved through training. This research team is studying two research questions: Are there individual differences in the inherent ability to sustain vigilance? and What are the most effective approaches for training and improving sustained vigilance for rare items or events?. The intent is to employ tasks (primarily visual identification and gross motor tests) that readily translate to the relevant homeland security occupations requiring sustained vigilance.
{"title":"Simulating a vigilance task: Extensible technology for baggage security assessment and training","authors":"R. Hubal, S. Mitroff, Matthew S. Cain, B. Scott, R. DeWitt","doi":"10.1109/THS.2010.5654982","DOIUrl":"https://doi.org/10.1109/THS.2010.5654982","url":null,"abstract":"A number of homeland security occupations require vigilance to potentially subtle events in the environment, with high stakes for missing infrequent but consequential items. Sustained vigilance can be required for long periods of time or when sleep-deprived or physically inactive, compounding the difficulty of this task. Research on sustained vigilance has largely focused on tasks such as driving, air traffic control, medical screening, and military specialties, but the findings closely apply also to other homeland security-related occupations. A research area that has received relatively little attention, but is of critical importance to homeland security, involves the role of individual differences in vigilance. Prior research suggests that certain individuals are better than others at searching for rarely present targets over long time periods, yet what is driving this effect remains unclear. Further, it is not known whether or not sustained vigilance can be improved through training. This research team is studying two research questions: Are there individual differences in the inherent ability to sustain vigilance? and What are the most effective approaches for training and improving sustained vigilance for rare items or events?. The intent is to employ tasks (primarily visual identification and gross motor tests) that readily translate to the relevant homeland security occupations requiring sustained vigilance.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134275079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}