Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655072
Joseph L. Smith, N. A. Renfroe, L.E. Long, Kenneth W. Herrle, Mary M. Scheidt
Recent terrorist attacks in Mumbai and tragedies such as the Virginia Tech massacre underscore the need to understand and train for active shooter and force-on-force engagements with adversary forces. Terrorist organizations are known to possess the intent and capability to attack highly secure critical facilities such as nuclear storage and power facilities as well as schools, stadiums, and other public gathering places. Advanced agent-based modeling and simulation have evolved to enable virtual investigation of such scenarios. This paper offers insight into the benefits and use of advanced science-based tools to investigate these scenarios in-depth. Virtual simulations provide cost-effective, valuable insight into scenarios that cannot be realistically played out in real-world exercises. Included are discussions on people movement, evacuations, gaming scenarios, and other applications using this advanced technology.
{"title":"Advancements in simulations for active shooter & force-on-force engagements","authors":"Joseph L. Smith, N. A. Renfroe, L.E. Long, Kenneth W. Herrle, Mary M. Scheidt","doi":"10.1109/THS.2010.5655072","DOIUrl":"https://doi.org/10.1109/THS.2010.5655072","url":null,"abstract":"Recent terrorist attacks in Mumbai and tragedies such as the Virginia Tech massacre underscore the need to understand and train for active shooter and force-on-force engagements with adversary forces. Terrorist organizations are known to possess the intent and capability to attack highly secure critical facilities such as nuclear storage and power facilities as well as schools, stadiums, and other public gathering places. Advanced agent-based modeling and simulation have evolved to enable virtual investigation of such scenarios. This paper offers insight into the benefits and use of advanced science-based tools to investigate these scenarios in-depth. Virtual simulations provide cost-effective, valuable insight into scenarios that cannot be realistically played out in real-world exercises. Included are discussions on people movement, evacuations, gaming scenarios, and other applications using this advanced technology.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134304429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654940
P. Ugorowski, A. Ariesanti, D. Mcgregor, A. Kargar
Many homeland security applications involving gamma-ray detectors require energy resolution of better than 1%–2% for isotope identification. Existing High-Purity germanium (HPGe) detectors have the needed energy resolution but suffer from large size and the need for liquid-nitrogen or electromechanical cooling. Compact, inexpensive, room-temperature-operated devices are needed for handheld monitors, portal monitors, and monitors for nuclear materials in storage or transit. At Kansas State University, CdZnTe (CZT) gamma-ray detectors with better than 1% energy resolution have been developed. Mercuric Iodide detectors with better than 2% energy resolution have also been developed. Both devices make use of the Frisch-collar technology developed at KSU, and the quoted results were achieved without electronic corrections. The goal of the research at KSU is to maximize the energy resolution of the signals coming from the detectors, before any electronic corrections are made. The characteristics of these small, inexpensive devices will be discussed.
{"title":"Compact, inexpensive, high-energy-resolution, room-temperature-operated, semiconductor gamma-ray detectors for isotope identification","authors":"P. Ugorowski, A. Ariesanti, D. Mcgregor, A. Kargar","doi":"10.1109/THS.2010.5654940","DOIUrl":"https://doi.org/10.1109/THS.2010.5654940","url":null,"abstract":"Many homeland security applications involving gamma-ray detectors require energy resolution of better than 1%–2% for isotope identification. Existing High-Purity germanium (HPGe) detectors have the needed energy resolution but suffer from large size and the need for liquid-nitrogen or electromechanical cooling. Compact, inexpensive, room-temperature-operated devices are needed for handheld monitors, portal monitors, and monitors for nuclear materials in storage or transit. At Kansas State University, CdZnTe (CZT) gamma-ray detectors with better than 1% energy resolution have been developed. Mercuric Iodide detectors with better than 2% energy resolution have also been developed. Both devices make use of the Frisch-collar technology developed at KSU, and the quoted results were achieved without electronic corrections. The goal of the research at KSU is to maximize the energy resolution of the signals coming from the detectors, before any electronic corrections are made. The characteristics of these small, inexpensive devices will be discussed.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115606482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655084
Björn Stelte, Robert Koch, M. Ullmann
Today, the security of virtualization is based on the isolation properties provided by the hypervisor. This security-by-isolation concept depends on the high integrity of each virtual system as well as a trustworthy host system. Erroneous implementation or conceptional failure limits this isolation mechanism. Today the strength of the isolation can only be guaranteed after a boot operation. Missing is a permanent surveillance of the separation mechanisms during the system operation. That is the main subject of our proposal. We suggest the integration of a sensory integrity measurement architecture (SIMA) for this purpose. SIMA consists of trusted virtual sensors and an analyzing sink to monitor the integrity of the system permanently during operation.
{"title":"Towards integrity measurement in virtualized environments — A hypervisor based sensory integrity measurement architecture (SIMA)","authors":"Björn Stelte, Robert Koch, M. Ullmann","doi":"10.1109/THS.2010.5655084","DOIUrl":"https://doi.org/10.1109/THS.2010.5655084","url":null,"abstract":"Today, the security of virtualization is based on the isolation properties provided by the hypervisor. This security-by-isolation concept depends on the high integrity of each virtual system as well as a trustworthy host system. Erroneous implementation or conceptional failure limits this isolation mechanism. Today the strength of the isolation can only be guaranteed after a boot operation. Missing is a permanent surveillance of the separation mechanisms during the system operation. That is the main subject of our proposal. We suggest the integration of a sensory integrity measurement architecture (SIMA) for this purpose. SIMA consists of trusted virtual sensors and an analyzing sink to monitor the integrity of the system permanently during operation.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122072087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655069
R. Hartnett, P. Swaszek, K. Gross
Differential GPS, or DGPS, is a medium frequency (MF) radio system that is used worldwide for the broadcast of differential corrections to users to improve the accuracy and integrity of the GPS. This communications system works by digitally modulating radio signals broadcast from a network of marine radio beacons operating in the medium frequency 283.5–325 kHz radio band. The modulation scheme called Minimum Shift Keying (MSK) is used to transmit the correction data at typical data rates of between 50 and 200 bits per second (bps). The U.S. Coast Guard has pioneered the use of MSK for transmission of differential GPS corrections, and has provided over ten years of worthy service with the system. The U.S. DGPS installation is nation-wide, with over 85 transmitters providing double coverage to most of the CONUS. Today, the Coast Guard is re-examining the role of DGPS/radio beacons with the goal of optimizing service for the next ten years. Here we suggest that the DGPS system has significant capability for use beyond that of its current mandate; specifically, there exists the potential for concurrently transmitting a second information-bearing signal on the beacon signal. We believe that this simultaneous transmission of the current navigation correction information (the primary channel) and additional messaging (perhaps DHS emergency messaging or other relevant information) could be accomplished at very minimal cost, and with minimal impact on current users, using a technique we have called phase trellis overlay. This idea has been proposed in earlier work by these authors; several variations of the approach have been designed, analyzed, and tested with results presented at Institute of Navigation conferences. These previous presentations have focused on the technical details of the method; for example, design of the new communications signals, bandwidth of the resulting signal relative to the DGPS system requirements, implementation concerns at the transmitter, and its impact on legacy user performance were analyzed. Here we summarize these earlier results within the context of a potential DHS emergency messaging system. We re-examine the technical details of this approach as a simply parameterized FM (frequency modulation) overlay which yields mathematically tractable performance results. Sample results of this analysis highlight the tradeoffs between coverage expected for legacy users and coverage expected for the new DHS messaging system.
{"title":"Augmenting the DGPS broadcast with emergency information — Potential coverage and data rate","authors":"R. Hartnett, P. Swaszek, K. Gross","doi":"10.1109/THS.2010.5655069","DOIUrl":"https://doi.org/10.1109/THS.2010.5655069","url":null,"abstract":"Differential GPS, or DGPS, is a medium frequency (MF) radio system that is used worldwide for the broadcast of differential corrections to users to improve the accuracy and integrity of the GPS. This communications system works by digitally modulating radio signals broadcast from a network of marine radio beacons operating in the medium frequency 283.5–325 kHz radio band. The modulation scheme called Minimum Shift Keying (MSK) is used to transmit the correction data at typical data rates of between 50 and 200 bits per second (bps). The U.S. Coast Guard has pioneered the use of MSK for transmission of differential GPS corrections, and has provided over ten years of worthy service with the system. The U.S. DGPS installation is nation-wide, with over 85 transmitters providing double coverage to most of the CONUS. Today, the Coast Guard is re-examining the role of DGPS/radio beacons with the goal of optimizing service for the next ten years. Here we suggest that the DGPS system has significant capability for use beyond that of its current mandate; specifically, there exists the potential for concurrently transmitting a second information-bearing signal on the beacon signal. We believe that this simultaneous transmission of the current navigation correction information (the primary channel) and additional messaging (perhaps DHS emergency messaging or other relevant information) could be accomplished at very minimal cost, and with minimal impact on current users, using a technique we have called phase trellis overlay. This idea has been proposed in earlier work by these authors; several variations of the approach have been designed, analyzed, and tested with results presented at Institute of Navigation conferences. These previous presentations have focused on the technical details of the method; for example, design of the new communications signals, bandwidth of the resulting signal relative to the DGPS system requirements, implementation concerns at the transmitter, and its impact on legacy user performance were analyzed. Here we summarize these earlier results within the context of a potential DHS emergency messaging system. We re-examine the technical details of this approach as a simply parameterized FM (frequency modulation) overlay which yields mathematically tractable performance results. Sample results of this analysis highlight the tradeoffs between coverage expected for legacy users and coverage expected for the new DHS messaging system.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"346 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123356907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655045
T. Nohara
The benefits of a commercial approach to the deployment of radar surveillance along the Great Lakes St. Lawrence Seaway System (GLSLSS) is discussed. Surveillance solutions must be multi-mission suitable, scalable, flexible, maintainable, upgradeable, interoperable, shareable, and affordable. This flexibility is fundamental to successfully leveraging tomorrow, investments made today in order to keep up with changing threats and technology. Not only can homeland security surveillance solutions benefit by leveraging commercial technologies, but non-sensitive target information, can drive significant human and commercial benefits. The paper presents a radar surveillance framework whose network architecture, COTS components, specially designed components and open interfaces are discussed. The modular nature of the framework includes software definable algorithms for acquisition of sea, air or land targets of interest, built-in integration of target information that fully scales in support of wide-area surveillance, and open interfaces in support of new, multi-mission situational awareness applications.
{"title":"A commercial approach to successful persistent radar surveillance of sea, air and land along the northern border","authors":"T. Nohara","doi":"10.1109/THS.2010.5655045","DOIUrl":"https://doi.org/10.1109/THS.2010.5655045","url":null,"abstract":"The benefits of a commercial approach to the deployment of radar surveillance along the Great Lakes St. Lawrence Seaway System (GLSLSS) is discussed. Surveillance solutions must be multi-mission suitable, scalable, flexible, maintainable, upgradeable, interoperable, shareable, and affordable. This flexibility is fundamental to successfully leveraging tomorrow, investments made today in order to keep up with changing threats and technology. Not only can homeland security surveillance solutions benefit by leveraging commercial technologies, but non-sensitive target information, can drive significant human and commercial benefits. The paper presents a radar surveillance framework whose network architecture, COTS components, specially designed components and open interfaces are discussed. The modular nature of the framework includes software definable algorithms for acquisition of sea, air or land targets of interest, built-in integration of target information that fully scales in support of wide-area surveillance, and open interfaces in support of new, multi-mission situational awareness applications.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126493174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654986
C. M. Phillips
This presentation describes the use of an FTIR (Fourier Transform Infrared)-based spectrometer designed to continuously monitor ambient air for the presence of chemical warfare agents (CWAs) and toxic industrial chemicals (TICs). The necessity of a reliable system capable of quickly and accurately detecting very low levels of CWAs and TICs while simultaneously retaining a negligible false alarm rate will be explored. Technological advancements in FTIR sensing have reduced noise while increasing selectivity and speed of detection. The hardware and algorithms described here will explain why this FTIR system is very effective for the simultaneous detection and speciation of a wide variety of toxic compounds at ppb concentrations. Analytical test data will be reviewed demonstrating the system's sensitivity to and selectivity for specific CWAs and TICs. These results include analyses of data from live agent testing for the determination of detection limits, immunity to interferences, detection times, and false alarm rates. Sensing systems such as this are critical for effective chemical hazard identification which is directly relevant to the Homeland Security community.
{"title":"FTIR-based air monitoring system with improved sensitivity and selectivity for Homeland Security applications","authors":"C. M. Phillips","doi":"10.1109/THS.2010.5654986","DOIUrl":"https://doi.org/10.1109/THS.2010.5654986","url":null,"abstract":"This presentation describes the use of an FTIR (Fourier Transform Infrared)-based spectrometer designed to continuously monitor ambient air for the presence of chemical warfare agents (CWAs) and toxic industrial chemicals (TICs). The necessity of a reliable system capable of quickly and accurately detecting very low levels of CWAs and TICs while simultaneously retaining a negligible false alarm rate will be explored. Technological advancements in FTIR sensing have reduced noise while increasing selectivity and speed of detection. The hardware and algorithms described here will explain why this FTIR system is very effective for the simultaneous detection and speciation of a wide variety of toxic compounds at ppb concentrations. Analytical test data will be reviewed demonstrating the system's sensitivity to and selectivity for specific CWAs and TICs. These results include analyses of data from live agent testing for the determination of detection limits, immunity to interferences, detection times, and false alarm rates. Sensing systems such as this are critical for effective chemical hazard identification which is directly relevant to the Homeland Security community.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128582487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655064
K. Daniel, S. Rohde, C. Wietfeld
Unmanned Aerial Vehicles (UAV) enable the in-depth reconnaissance and surveillance of major incidents. Uncontrolled emissions of liquid or gaseous contaminants in cases of volcanic eruptions, large fires, industrial incidents or terrorist attacks can be analyzed by utilizing UAVs (cf. Fig. 1). Hence, the use of cognitive Unmanned Aerial Systems (UAS) for distributing mobile sensors in incident areas is in general a significant value add for remote sensing, reconnaissance, surveillance and communication purposes [1][2]. Police departments, fire brigades and other homeland security organizations will have access to medium and small size UAVs in the near future and will integrate UAVs in their work flow. In this paper we are focusing on the civilian concepts of operations (CONOPS) for UAVs, in particular for small-scale UAVs. We present viable concepts on system level for leveraging public wireless communication networks for UAV-based sensor networks with respect to existing constraints and user requirements.
{"title":"Leveraging public wireless communication infrastructures for UAV-based sensor networks","authors":"K. Daniel, S. Rohde, C. Wietfeld","doi":"10.1109/THS.2010.5655064","DOIUrl":"https://doi.org/10.1109/THS.2010.5655064","url":null,"abstract":"Unmanned Aerial Vehicles (UAV) enable the in-depth reconnaissance and surveillance of major incidents. Uncontrolled emissions of liquid or gaseous contaminants in cases of volcanic eruptions, large fires, industrial incidents or terrorist attacks can be analyzed by utilizing UAVs (cf. Fig. 1). Hence, the use of cognitive Unmanned Aerial Systems (UAS) for distributing mobile sensors in incident areas is in general a significant value add for remote sensing, reconnaissance, surveillance and communication purposes [1][2]. Police departments, fire brigades and other homeland security organizations will have access to medium and small size UAVs in the near future and will integrate UAVs in their work flow. In this paper we are focusing on the civilian concepts of operations (CONOPS) for UAVs, in particular for small-scale UAVs. We present viable concepts on system level for leveraging public wireless communication networks for UAV-based sensor networks with respect to existing constraints and user requirements.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126183169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5655105
John DeVale, K. Tan
Research and development of new information assurance techniques and technologies is ongoing and varied. Each new proposal and technique arrives with great promise and anticipated success as research teams struggle to develop new and innovative responses to emerging threats. Unfortunately, these techniques frequently fall short of expectation when deployed due to difficulties with false alarms, trouble operating in a non-idealized or new domain, or flexibility limiting assumptions which are only valid with specific input sets. We believe these failures are due to fundamental problems with the experimental method for evaluating the effectiveness of new ideas and techniques. This work explores the effect of a poorly understood data synthesis process on the evaluation of IA devices. The point of an evaluation is to independently determine what a detector can and cannot detect, i.e. the metric of detection. This can only be done when the data contains carefully controlled ground truth. We broadly define the term “similarity class” to facilitate discussion about the different ways data (and more specifically test data) can be similar, and use these ideas to illustrate the pre-requisites for correct evaluation of anomaly detectors. We focus on how anomaly detectors function and should be evaluated in 2 specific domains with disparate system architectures and data: a sensor and data transport network for air frame tracking and display, and a deep space mission spacecraft command link. Finally, we present empirical evidence illustrating the effectiveness of our approach in these domains, and introduce the entropy of a time series sensor as a critical measure of data similarity for test data in these domains.
{"title":"Evaluating information assurance performance and the impact of data characteristics","authors":"John DeVale, K. Tan","doi":"10.1109/THS.2010.5655105","DOIUrl":"https://doi.org/10.1109/THS.2010.5655105","url":null,"abstract":"Research and development of new information assurance techniques and technologies is ongoing and varied. Each new proposal and technique arrives with great promise and anticipated success as research teams struggle to develop new and innovative responses to emerging threats. Unfortunately, these techniques frequently fall short of expectation when deployed due to difficulties with false alarms, trouble operating in a non-idealized or new domain, or flexibility limiting assumptions which are only valid with specific input sets. We believe these failures are due to fundamental problems with the experimental method for evaluating the effectiveness of new ideas and techniques. This work explores the effect of a poorly understood data synthesis process on the evaluation of IA devices. The point of an evaluation is to independently determine what a detector can and cannot detect, i.e. the metric of detection. This can only be done when the data contains carefully controlled ground truth. We broadly define the term “similarity class” to facilitate discussion about the different ways data (and more specifically test data) can be similar, and use these ideas to illustrate the pre-requisites for correct evaluation of anomaly detectors. We focus on how anomaly detectors function and should be evaluated in 2 specific domains with disparate system architectures and data: a sensor and data transport network for air frame tracking and display, and a deep space mission spacecraft command link. Finally, we present empirical evidence illustrating the effectiveness of our approach in these domains, and introduce the entropy of a time series sensor as a critical measure of data similarity for test data in these domains.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121721547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-12-03DOI: 10.1109/THS.2010.5654976
J. Morentz
The Unified Incident Command and Decision Support (UICDS) middleware has moved through its architecture design phase, the development of a reference implementation, and now is engaged in a major pilot under the sponsorship of the Department of Homeland Security, Directorate of Science and Technology, Infrastructure and Geophysical Division. The current project will deploy pilots of the middleware in more than 20 states and approximately 100 pilot locations in order to assess the utility of the design for federal, state, and local agency use. UICDS enables ubiquitous information exchange among existing government and commercial incident management technologies for the purpose of creating one-to-many, incident-specific, agreement-based information sharing among a wide range of technologies used in incident management. This paper describes the current state of the architecture and reference implementation and offers an invitation to organization in both the government and private sectors to participate in pilots.
{"title":"Unified Incident Command and Decision Support (UICDS) pilots take information sharing to the real world of incident management: A department of homeland security initiative for information sharing among commercial, government, academic, and volunteer technology providers to support the national inci","authors":"J. Morentz","doi":"10.1109/THS.2010.5654976","DOIUrl":"https://doi.org/10.1109/THS.2010.5654976","url":null,"abstract":"The Unified Incident Command and Decision Support (UICDS) middleware has moved through its architecture design phase, the development of a reference implementation, and now is engaged in a major pilot under the sponsorship of the Department of Homeland Security, Directorate of Science and Technology, Infrastructure and Geophysical Division. The current project will deploy pilots of the middleware in more than 20 states and approximately 100 pilot locations in order to assess the utility of the design for federal, state, and local agency use. UICDS enables ubiquitous information exchange among existing government and commercial incident management technologies for the purpose of creating one-to-many, incident-specific, agreement-based information sharing among a wide range of technologies used in incident management. This paper describes the current state of the architecture and reference implementation and offers an invitation to organization in both the government and private sectors to participate in pilots.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129927158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-01DOI: 10.1109/THS.2010.5655042
Yicong Zhou, K. Panetta, S. Agaian
Baggage scanning systems are widely used at security checkpoint in airports for homeland security applications. However, the CT baggage images suffer from background noise and the presence of low contrast. To address this problem, this paper introduces a new 3D CT baggage image enhancement algorithm using order statistic decomposition. Computer simulation and comparisons are given to demonstrate the excellent enhancement performance of the presented new algorithm and its capability of significantly improving visual quality of CT images while removing the background noise.
{"title":"3D CT baggage image enhancement based on order statistic decomposition","authors":"Yicong Zhou, K. Panetta, S. Agaian","doi":"10.1109/THS.2010.5655042","DOIUrl":"https://doi.org/10.1109/THS.2010.5655042","url":null,"abstract":"Baggage scanning systems are widely used at security checkpoint in airports for homeland security applications. However, the CT baggage images suffer from background noise and the presence of low contrast. To address this problem, this paper introduces a new 3D CT baggage image enhancement algorithm using order statistic decomposition. Computer simulation and comparisons are given to demonstrate the excellent enhancement performance of the presented new algorithm and its capability of significantly improving visual quality of CT images while removing the background noise.","PeriodicalId":106557,"journal":{"name":"2010 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"280 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132036825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}