首页 > 最新文献

2011 IEEE International Conference on Technologies for Homeland Security (HST)最新文献

英文 中文
Information sharing for situational understanding and command coordination in emergency management and disaster response 在紧急情况管理和灾害应对中,为了解情况和指挥协调而共享信息
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107843
R. Desourdis, J. Contestabile
This paper explores why information sharing is important to successfully dealing with large-scale events and how a lack of public safety communications systems interoperability is a major impediment. It describes how “holistic interoperability,” which addresses matters of trust and understanding that lead to predictable collaboration, is needed and how the lessons from the lack of information sharing during Pearl Harbor remains instructive today. It goes on to describe how a conceptual technical framework of information layers (i.e., the data, integration and presentation layers) is useful to developing solutions to this lack of interoperability. It also postulates how emerging technologies will move us from today's flawed “publish-and-subscribe” environment, which suffers from many of the “Pearl Harbor failures,” to an automated preplanned “sense-and — respond” model. Work reported herein was derived from an Urban Area Security Grant as part of interoperable communications programs for the National Capital Region (NCR).
本文探讨了为什么信息共享对于成功处理大型事件很重要,以及缺乏公共安全通信系统互操作性是一个主要障碍。它描述了如何需要“整体互操作性”,即解决导致可预测协作的信任和理解问题,以及珍珠港事件中缺乏信息共享的教训如何在今天仍然具有指导意义。接着描述了信息层(即数据层、集成层和表示层)的概念性技术框架对于开发解决这种缺乏互操作性的方案是如何有用的。它还假设了新兴技术将如何将我们从今天有缺陷的“发布-订阅”环境(这种环境遭受了许多“珍珠港失败”)转移到一个自动化的预先计划的“感知-响应”模式。本文报告的工作来源于城市地区安全拨款,作为国家首都地区(NCR)可互操作通信计划的一部分。
{"title":"Information sharing for situational understanding and command coordination in emergency management and disaster response","authors":"R. Desourdis, J. Contestabile","doi":"10.1109/THS.2011.6107843","DOIUrl":"https://doi.org/10.1109/THS.2011.6107843","url":null,"abstract":"This paper explores why information sharing is important to successfully dealing with large-scale events and how a lack of public safety communications systems interoperability is a major impediment. It describes how “holistic interoperability,” which addresses matters of trust and understanding that lead to predictable collaboration, is needed and how the lessons from the lack of information sharing during Pearl Harbor remains instructive today. It goes on to describe how a conceptual technical framework of information layers (i.e., the data, integration and presentation layers) is useful to developing solutions to this lack of interoperability. It also postulates how emerging technologies will move us from today's flawed “publish-and-subscribe” environment, which suffers from many of the “Pearl Harbor failures,” to an automated preplanned “sense-and — respond” model. Work reported herein was derived from an Urban Area Security Grant as part of interoperable communications programs for the National Capital Region (NCR).","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121472139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Improvised nuclear device case study: An analytic framework for disaster management 简易核装置案例研究:灾害管理的分析框架
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107869
B. Buddemeier, N. Suski
Reducing the casualties of catastrophic terrorist attacks requires an understanding of weapons of mass destruction effects, infrastructure damage, atmospheric dispersion, and health effects. The Federal Planning Guidance for Response to a Nuclear Detonation provides the strategy for response to an improvised nuclear device detonation. The supporting science developed by national laboratories and other technical organizations for this document significantly improves our understanding of the hazards posed by such an event. Detailed fallout predictions from the advanced suite of three-dimensional meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory, including extensive global geographical and realtime meteorological databases to support model calculations, are a key part of response planning. This presentation describes the methodology and results to date, including visualization aids developed for response organizations. These products have greatly enhanced the community planning process through first-person points of view and description of the dynamic nature of the event.
减少灾难性恐怖袭击的伤亡需要了解大规模毁灭性武器的影响、基础设施的破坏、大气扩散和健康影响。《应对核爆炸联邦规划指南》提供了应对简易核装置爆炸的战略。国家实验室和其他技术组织为本文件开发的支持科学大大提高了我们对此类事件所造成危害的理解。劳伦斯利弗莫尔国家实验室开发的先进三维气象学和羽流/沉降模型的详细沉降预测,包括广泛的全球地理和实时气象数据库,以支持模型计算,是响应计划的关键部分。本报告描述了迄今为止的方法和结果,包括为响应组织开发的可视化辅助工具。这些产品通过第一人称视角和对事件动态性质的描述,极大地增强了社区规划过程。
{"title":"Improvised nuclear device case study: An analytic framework for disaster management","authors":"B. Buddemeier, N. Suski","doi":"10.1109/THS.2011.6107869","DOIUrl":"https://doi.org/10.1109/THS.2011.6107869","url":null,"abstract":"Reducing the casualties of catastrophic terrorist attacks requires an understanding of weapons of mass destruction effects, infrastructure damage, atmospheric dispersion, and health effects. The Federal Planning Guidance for Response to a Nuclear Detonation provides the strategy for response to an improvised nuclear device detonation. The supporting science developed by national laboratories and other technical organizations for this document significantly improves our understanding of the hazards posed by such an event. Detailed fallout predictions from the advanced suite of three-dimensional meteorology and plume/fallout models developed at Lawrence Livermore National Laboratory, including extensive global geographical and realtime meteorological databases to support model calculations, are a key part of response planning. This presentation describes the methodology and results to date, including visualization aids developed for response organizations. These products have greatly enhanced the community planning process through first-person points of view and description of the dynamic nature of the event.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127972831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A framework for real-time monitoring of acoustic events using a wireless sensor network 一种利用无线传感器网络实时监测声学事件的框架
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107880
Akankshu Dhawan, R. Balasubramanian, V. Vokkarane
Wireless Sensors have been used for environmental monitoring and battlefield surveillance for many years now. Wireless, low-cost, and low-energy sensors are distributed geographically to monitor and report specific effects such as temperature, light, motion and sound. The hardware, network protocols and information retrieval techniques for wireless sensor networks are areas of active research. While outdoor monitoring has been done using wireless sensor networks for some time now, little work has been done in indoor environments. This paper presents a novel approach towards a real time system for indoor surveillance of campus-like environments for loud acoustic events such as gunshots. The work proposes the use of low-cost MICAz motes and a scalable networking approach that ensures low-energy consumption, reliable communication and high data rate. The system uses a hierarchical decision making model to categorize loud acoustic signals, localize the event and trigger an alert system in case of critical events like a gunshot. Several experiments were conducted with real gunshots and other acoustic sources to validate the detection and localization approach.
无线传感器用于环境监测和战场监视已有多年历史。无线、低成本和低能耗传感器分布在地理位置,以监测和报告特定的影响,如温度、光、运动和声音。无线传感器网络的硬件、网络协议和信息检索技术是目前研究的热点。虽然使用无线传感器网络进行室外监测已经有一段时间了,但在室内环境中进行的工作却很少。本文提出了一种新的方法,用于校园类环境的室内实时监控系统,用于嘈杂的声音事件,如枪声。该工作提出使用低成本的MICAz motes和可扩展的网络方法,以确保低能耗、可靠的通信和高数据速率。该系统使用分层决策模型对响亮的声音信号进行分类,定位事件,并在发生枪击等关键事件时触发警报系统。用真实枪声和其他声源进行了多次实验,验证了检测和定位方法。
{"title":"A framework for real-time monitoring of acoustic events using a wireless sensor network","authors":"Akankshu Dhawan, R. Balasubramanian, V. Vokkarane","doi":"10.1109/THS.2011.6107880","DOIUrl":"https://doi.org/10.1109/THS.2011.6107880","url":null,"abstract":"Wireless Sensors have been used for environmental monitoring and battlefield surveillance for many years now. Wireless, low-cost, and low-energy sensors are distributed geographically to monitor and report specific effects such as temperature, light, motion and sound. The hardware, network protocols and information retrieval techniques for wireless sensor networks are areas of active research. While outdoor monitoring has been done using wireless sensor networks for some time now, little work has been done in indoor environments. This paper presents a novel approach towards a real time system for indoor surveillance of campus-like environments for loud acoustic events such as gunshots. The work proposes the use of low-cost MICAz motes and a scalable networking approach that ensures low-energy consumption, reliable communication and high data rate. The system uses a hierarchical decision making model to categorize loud acoustic signals, localize the event and trigger an alert system in case of critical events like a gunshot. Several experiments were conducted with real gunshots and other acoustic sources to validate the detection and localization approach.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"XCV 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131386991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Quantum cryptography: An emerging technology in network security 量子密码学:网络安全中的一项新兴技术
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107841
M. Sharbaf
The uses of computer communications networks technologies have increased the incidents of computer abuse. Because of these incidents, most organizations facing pressure to protect their assets. Most digital networks generally rely on modern cryptosystems to secure the confidentiality and integrity of traffic carried across the network. The current modern cryptosystems based on mathematical model introduce potential security holes related to technological progress of computing power, the key refresh rate and key expansion ratio, the most crucial parameters in the security of any cryptographic techniques. For that reason efforts have been made to establish new foundation for cryptography science in the computer communications networks. One of these efforts has led to the development of quantum cryptography technology, whose security relies on the laws of quantum mechanics [1,2,3,20, 24]. This research paper concentrates on quantum cryptography, and how this technology contributes to the network security. The scope of this research paper is to cover the weaknesses, and the security pitfalls in modern cryptography, fundamental concepts of quantum cryptography, the real — world application implementation of this technology, finally the future direction in which the quantum cryptography is headed forwards.
计算机通信网络技术的使用增加了滥用计算机的事件。由于这些事件,大多数组织面临着保护其资产的压力。大多数数字网络通常依靠现代密码系统来确保网络中传输的流量的机密性和完整性。目前基于数学模型的现代密码系统引入了与计算能力、密钥刷新率和密钥扩展率等技术进步有关的潜在安全漏洞,这是任何密码技术安全性中最关键的参数。因此,人们一直在努力为计算机通信网络中的密码学科学建立新的基础。其中一项努力导致了量子密码技术的发展,其安全性依赖于量子力学定律[1,2,3,20,24]。本文主要研究量子密码学,以及该技术对网络安全的贡献。本文的研究范围是涵盖现代密码学的弱点和安全隐患,量子密码学的基本概念,该技术在现实世界中的应用实现,最后量子密码学的未来发展方向。
{"title":"Quantum cryptography: An emerging technology in network security","authors":"M. Sharbaf","doi":"10.1109/THS.2011.6107841","DOIUrl":"https://doi.org/10.1109/THS.2011.6107841","url":null,"abstract":"The uses of computer communications networks technologies have increased the incidents of computer abuse. Because of these incidents, most organizations facing pressure to protect their assets. Most digital networks generally rely on modern cryptosystems to secure the confidentiality and integrity of traffic carried across the network. The current modern cryptosystems based on mathematical model introduce potential security holes related to technological progress of computing power, the key refresh rate and key expansion ratio, the most crucial parameters in the security of any cryptographic techniques. For that reason efforts have been made to establish new foundation for cryptography science in the computer communications networks. One of these efforts has led to the development of quantum cryptography technology, whose security relies on the laws of quantum mechanics [1,2,3,20, 24]. This research paper concentrates on quantum cryptography, and how this technology contributes to the network security. The scope of this research paper is to cover the weaknesses, and the security pitfalls in modern cryptography, fundamental concepts of quantum cryptography, the real — world application implementation of this technology, finally the future direction in which the quantum cryptography is headed forwards.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130196718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Assuring software and hardware security and integrity throughout the supply chain 确保整个供应链的软硬件安全和完整性
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107848
C. Axelrod
There is much talk in government and private sector circles about setting up additional test laboratories for certifying commonly-used software and hardware products. It has also been suggested that quality control and oversight be included at each step of the supply-chain. However, reviews are typically done after-the-fact, and have much less value for controlling processes. Often only when malware or rogue components are discovered in final products are more thorough audits initiated. By then it is often too late to retrieve items already in production. Much damage could have already occurred by the time a recall takes effect. The author has long supported supply-chain customers and entities installing sensors to monitor processes and products throughout the supply-chain life cycle. At various stages, products and services should be sent to laboratories for testing or be subjected to internal tests to verify that they comply with design specifications and external requirements.
在政府和私营部门圈子里,有很多关于建立额外的测试实验室来认证常用的软件和硬件产品的讨论。也有人建议,质量控制和监督包括在供应链的每一步。然而,审查通常是事后完成的,对于控制过程的价值要小得多。通常只有在最终产品中发现恶意软件或流氓组件时,才会启动更彻底的审计。到那时,检索已经在生产中的项目往往为时已晚。到召回生效时,可能已经造成了很大的损害。作者长期以来一直支持供应链客户和实体安装传感器来监控整个供应链生命周期中的过程和产品。在不同阶段,应将产品和服务送到实验室进行测试或进行内部测试,以验证它们是否符合设计规范和外部要求。
{"title":"Assuring software and hardware security and integrity throughout the supply chain","authors":"C. Axelrod","doi":"10.1109/THS.2011.6107848","DOIUrl":"https://doi.org/10.1109/THS.2011.6107848","url":null,"abstract":"There is much talk in government and private sector circles about setting up additional test laboratories for certifying commonly-used software and hardware products. It has also been suggested that quality control and oversight be included at each step of the supply-chain. However, reviews are typically done after-the-fact, and have much less value for controlling processes. Often only when malware or rogue components are discovered in final products are more thorough audits initiated. By then it is often too late to retrieve items already in production. Much damage could have already occurred by the time a recall takes effect. The author has long supported supply-chain customers and entities installing sensors to monitor processes and products throughout the supply-chain life cycle. At various stages, products and services should be sent to laboratories for testing or be subjected to internal tests to verify that they comply with design specifications and external requirements.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122087307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Aggregating seismic, acoustic and vibration sensor outputs for enhancing threat detection performance and estimating threat-level 聚合地震、声学和振动传感器输出以增强威胁检测性能和估计威胁级别
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107871
A. Yousefi, A. Dibazar, T. Berger
In this paper, a sensor fusion technique with enhanced performance in assets' protection is introduced. The presented fusion technique models activity dynamics in the protected area by combining acoustic, seismic and vibration sensors outputs. The proposed algorithm learns underlying normal activities in the protected area; and detects abnormal activities — possible threat using sensor outputs. The activity learning in the smart fence evolves through time, and it is independent of prior assumption of threat models. The simulation result developed for cargo train protection shows more than 98% performance in possible threat detection, which performs at least 3% better than naive detection technique. Activity dynamics in large scale areas — airports and military basis — can be modeled using the proposed fusion technique, in which the computational complexity for threat detection is not significant. The capability of the methodology to adjust its free parameters through time makes the threat detection process robust to existing environmental and activity dynamics changes.
本文介绍了一种提高资产保护性能的传感器融合技术。该融合技术将声波、地震和振动传感器的输出结合起来,对保护区的活动动态进行建模。该算法学习保护区内潜在的正常活动;并检测异常活动-使用传感器输出可能的威胁。智能围栏中的活动学习是随着时间的推移而进化的,它不依赖于对威胁模型的先验假设。针对货运列车防护的仿真结果表明,可能威胁检测的准确率超过98%,比单纯检测技术提高至少3%。在机场和军事基地等大范围区域的活动动态可以使用所提出的融合技术进行建模,其中威胁检测的计算复杂度不显著。该方法随时间调整其自由参数的能力使威胁检测过程对现有环境和活动动态变化具有鲁棒性。
{"title":"Aggregating seismic, acoustic and vibration sensor outputs for enhancing threat detection performance and estimating threat-level","authors":"A. Yousefi, A. Dibazar, T. Berger","doi":"10.1109/THS.2011.6107871","DOIUrl":"https://doi.org/10.1109/THS.2011.6107871","url":null,"abstract":"In this paper, a sensor fusion technique with enhanced performance in assets' protection is introduced. The presented fusion technique models activity dynamics in the protected area by combining acoustic, seismic and vibration sensors outputs. The proposed algorithm learns underlying normal activities in the protected area; and detects abnormal activities — possible threat using sensor outputs. The activity learning in the smart fence evolves through time, and it is independent of prior assumption of threat models. The simulation result developed for cargo train protection shows more than 98% performance in possible threat detection, which performs at least 3% better than naive detection technique. Activity dynamics in large scale areas — airports and military basis — can be modeled using the proposed fusion technique, in which the computational complexity for threat detection is not significant. The capability of the methodology to adjust its free parameters through time makes the threat detection process robust to existing environmental and activity dynamics changes.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124857269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart Container Management: Creating value from real-time container security device data 智能容器管理:从实时容器安全设备数据中创造价值
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107912
Julia Carn
Raytheon and GlobalTrak participated in the European Union's Framework Program 7 (FP7) Smart Container Management (Smart-CM) Project, which strove to demonstrate state-of-the-art tracking and condition monitoring technologies, to explore their integration into value-added services for business and government agencies, and to participate in the development of best practices and standards. Raytheon and GlobalTrak provided 24 GlobalTrak Wedge devices to the three logistics services providers involved in the project: COSCO, DHL, and Kuehne + Nagel. These devices were deployed between October 2010 and July 2011 in a total of 42 trips on seven secure trade lanes between Europe, the Middle East, and Asia. Tri-modal (road, rail, and sea) tracking and condition monitoring was successfully demonstrated. The Smart-CM trials successfully provided container security data (geo-tracking and door status), which is of essential interest to Customs authorities. The value-added service sought by both regulatory agencies and commercial operators include security status, estimated time of arrival (ETA), dwell time, breach notification, exception handling, and container location and scheduling. In order to develop a viable, long-term business case for the value-added services required by business and government stakeholders, it will be necessary to integrate Container Security Device (CSD) data with data provided by other players in the supply chain, such as cargo owners, shipping lines, and ports. This challenge could be addressed in a future cooperative EU/US endeavor.
雷神公司和GlobalTrak公司参与了欧盟框架计划7 (FP7)智能集装箱管理(Smart- cm)项目,该项目致力于展示最先进的跟踪和状态监测技术,探索将其集成到商业和政府机构的增值服务中,并参与最佳实践和标准的开发。雷神公司和GlobalTrak公司向参与该项目的三家物流服务供应商:中远集团、DHL和Kuehne + Nagel公司提供了24台GlobalTrak Wedge设备。这些设备于2010年10月至2011年7月在欧洲、中东和亚洲之间的七条安全贸易航线上共进行了42次部署。成功演示了三模式(公路、铁路和海上)跟踪和状态监测。Smart-CM试验成功地提供了集装箱安全数据(地理跟踪和门状态),这对海关当局至关重要。监管机构和商业运营商寻求的增值服务包括安全状态、预计到达时间(ETA)、停留时间、违规通知、异常处理以及集装箱位置和调度。为了为企业和政府利益相关者所需的增值服务开发一个可行的、长期的商业案例,有必要将集装箱安全设备(CSD)数据与供应链中其他参与者(如货主、航运公司和港口)提供的数据集成起来。这一挑战可以在未来的欧盟/美国合作努力中得到解决。
{"title":"Smart Container Management: Creating value from real-time container security device data","authors":"Julia Carn","doi":"10.1109/THS.2011.6107912","DOIUrl":"https://doi.org/10.1109/THS.2011.6107912","url":null,"abstract":"Raytheon and GlobalTrak participated in the European Union's Framework Program 7 (FP7) Smart Container Management (Smart-CM) Project, which strove to demonstrate state-of-the-art tracking and condition monitoring technologies, to explore their integration into value-added services for business and government agencies, and to participate in the development of best practices and standards. Raytheon and GlobalTrak provided 24 GlobalTrak Wedge devices to the three logistics services providers involved in the project: COSCO, DHL, and Kuehne + Nagel. These devices were deployed between October 2010 and July 2011 in a total of 42 trips on seven secure trade lanes between Europe, the Middle East, and Asia. Tri-modal (road, rail, and sea) tracking and condition monitoring was successfully demonstrated. The Smart-CM trials successfully provided container security data (geo-tracking and door status), which is of essential interest to Customs authorities. The value-added service sought by both regulatory agencies and commercial operators include security status, estimated time of arrival (ETA), dwell time, breach notification, exception handling, and container location and scheduling. In order to develop a viable, long-term business case for the value-added services required by business and government stakeholders, it will be necessary to integrate Container Security Device (CSD) data with data provided by other players in the supply chain, such as cargo owners, shipping lines, and ports. This challenge could be addressed in a future cooperative EU/US endeavor.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129748718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Real-time Online Game-based Use-case Engine for Validation of Interagency Doctrine in Emergency Operations: Research exploring the use of synthetic environments to augment disaster planning, preparation, response, and recovery 基于实时在线游戏的用例引擎,用于验证紧急行动中的机构间原则:研究探索使用合成环境来增强灾难规划、准备、响应和恢复
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107896
W. Walsh, C. Blais, Lyla A Englehorn, Perry McDowell
Emergency response operational systems often do not work as expected by users. Subject matter expertise is not always considered for system design when developing the system requirements, and interagency coordination is often absent. With the Real-time Online Game-based Use-case Engine for Validation of Interagency Doctrine in Emergency Operations (ROGUEVIDEO) project we are attempting to build a bridge between operational environments and synthetic environments. The ROGUEVIDEO approach is to capture subject matter expert (SME)-validated doctrine, plans, procedures, equipment, decision making and systems in an architectural framework, then build a transfer mechanism from the architectural framework to an open source synthetic environment. The integrity of the SME input will result in more relevant and accurate simulations to better prepare global emergency responders. Interagency and international planning and response to natural and man-made disasters require new capabilities for planners and responders. Emergency response practitioners require the ability to test, exercise and challenge existing doctrines, plans and equipment for a variety of emergency scenarios. Further, they need a system that will capture response best practices and subject matter expertise. Currently, we have found stakeholders do have limited tools to look at their own doctrines in isolation, but what is lacking is an interagency validation framework for working on the increasing complexity of multi-agency emergency response activities, as well as a sufficient training environment. One of the main tenets of the ROGUEVIDEO project is to leverage and build on existing efforts. To realize this, we have researched domestic efforts for modeling and simulation, training and exercises, and emergency planning and response frameworks. Our findings surfaced various national doctrine such as the National Response Framework (NRF) and the National Incident Management System (NIMS) as well as the Homeland Security Exercise Evaluation Program (HSEEP) which provides a principal foundation for us to elicit data inputs from operators. To test this approach, we held an HSEEP Data Collection Workshop at the MOVES Institute on 24 February 2011. This served as our first step toward collecting SME input to inform development of the synthetic environment. By the HSEEP definition, this initial workshop was truly a hybrid of a traditional seminar and workshop, designed to acquaint participants with the ROGUEVIDEO project and approach before we move to the next step of discussing the plan or way ahead for using a table top exercise (TTX) to elicit SME data inputs. The subsequent TTX conducted in August 2011 in Long Beach, California, helped validate and highlight successes of symbiotic doctrine; tactics, techniques and procedures (TTPs); standard operating procedures (SOPs); and equipment use, as well as surface interagency gaps related to National Planning Scenario 11, a radiological dispersal even
应急响应操作系统往往不能按用户的预期工作。在开发系统需求时,系统设计并不总是考虑到主题专业知识,并且经常缺乏机构间的协调。通过基于实时在线游戏的紧急行动跨部门原则验证用例引擎(ROGUEVIDEO)项目,我们正试图在作战环境和综合环境之间建立一座桥梁。ROGUEVIDEO方法是在架构框架中捕获主题专家(SME)验证的理论、计划、程序、设备、决策制定和系统,然后构建从架构框架到开源合成环境的转移机制。中小企业投入的完整性将导致更相关和准确的模拟,以更好地为全球应急人员做好准备。机构间和国际规划以及对自然灾害和人为灾害的反应要求规划人员和反应人员具备新的能力。应急反应从业人员需要有能力测试、演练和挑战现有的理论、计划和设备,以应对各种紧急情况。此外,他们还需要一个能够获取最佳响应实践和专业知识的系统。目前,我们发现利益攸关方能够孤立地审视自己的理论的工具确实有限,但缺乏的是一个机构间验证框架,用于处理日益复杂的多机构应急活动,以及一个足够的培训环境。ROGUEVIDEO项目的主要原则之一是利用和建立现有的成果。为了实现这一目标,我们研究了国内在建模和仿真、训练和演习以及应急计划和响应框架方面的努力。我们的发现揭示了各种国家原则,如国家响应框架(NRF)和国家事件管理系统(NIMS)以及国土安全演习评估计划(HSEEP),这为我们从运营商那里获取数据输入提供了主要基础。为了测试这种方法,我们于2011年2月24日在MOVES研究所举办了HSEEP数据收集研讨会。这是我们收集SME输入以通知合成环境开发的第一步。根据HSEEP的定义,这个最初的研讨会实际上是传统研讨会和研讨会的混合体,旨在让参与者熟悉ROGUEVIDEO项目和方法,然后再讨论使用桌面练习(TTX)来获取SME数据输入的计划或方法。随后于2011年8月在加州长滩进行的TTX有助于验证和突出共生理论的成功;战术、技术和程序(TTPs);标准操作程序;设备使用,以及与国家规划情景11(放射性扩散事件)有关的表面机构间差距。来自该TTX的信息被用于通知软件开发工作,以提供可视化和交互式的跨部门理论验证经验,潜在地适用于所有15个美国国土安全部国家规划方案。
{"title":"Real-time Online Game-based Use-case Engine for Validation of Interagency Doctrine in Emergency Operations: Research exploring the use of synthetic environments to augment disaster planning, preparation, response, and recovery","authors":"W. Walsh, C. Blais, Lyla A Englehorn, Perry McDowell","doi":"10.1109/THS.2011.6107896","DOIUrl":"https://doi.org/10.1109/THS.2011.6107896","url":null,"abstract":"Emergency response operational systems often do not work as expected by users. Subject matter expertise is not always considered for system design when developing the system requirements, and interagency coordination is often absent. With the Real-time Online Game-based Use-case Engine for Validation of Interagency Doctrine in Emergency Operations (ROGUEVIDEO) project we are attempting to build a bridge between operational environments and synthetic environments. The ROGUEVIDEO approach is to capture subject matter expert (SME)-validated doctrine, plans, procedures, equipment, decision making and systems in an architectural framework, then build a transfer mechanism from the architectural framework to an open source synthetic environment. The integrity of the SME input will result in more relevant and accurate simulations to better prepare global emergency responders. Interagency and international planning and response to natural and man-made disasters require new capabilities for planners and responders. Emergency response practitioners require the ability to test, exercise and challenge existing doctrines, plans and equipment for a variety of emergency scenarios. Further, they need a system that will capture response best practices and subject matter expertise. Currently, we have found stakeholders do have limited tools to look at their own doctrines in isolation, but what is lacking is an interagency validation framework for working on the increasing complexity of multi-agency emergency response activities, as well as a sufficient training environment. One of the main tenets of the ROGUEVIDEO project is to leverage and build on existing efforts. To realize this, we have researched domestic efforts for modeling and simulation, training and exercises, and emergency planning and response frameworks. Our findings surfaced various national doctrine such as the National Response Framework (NRF) and the National Incident Management System (NIMS) as well as the Homeland Security Exercise Evaluation Program (HSEEP) which provides a principal foundation for us to elicit data inputs from operators. To test this approach, we held an HSEEP Data Collection Workshop at the MOVES Institute on 24 February 2011. This served as our first step toward collecting SME input to inform development of the synthetic environment. By the HSEEP definition, this initial workshop was truly a hybrid of a traditional seminar and workshop, designed to acquaint participants with the ROGUEVIDEO project and approach before we move to the next step of discussing the plan or way ahead for using a table top exercise (TTX) to elicit SME data inputs. The subsequent TTX conducted in August 2011 in Long Beach, California, helped validate and highlight successes of symbiotic doctrine; tactics, techniques and procedures (TTPs); standard operating procedures (SOPs); and equipment use, as well as surface interagency gaps related to National Planning Scenario 11, a radiological dispersal even","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126779385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A stochastic game model on container security 容器安全性的随机博弈模型
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107856
N. Onur Bakir, E. Kardes
We present a stochastic game model that compares alternatives for better container security. The players are an attacker who plans a nuclear attack, and a defender who considers two interdiction alternatives. The attacker can choose the container path, the attack method and the target, whereas the defender might improve transportation security and inspections at domestic seaports. In the baseline case, the attacker ships a nuclear weapon under the disguise of a front company and through a foreign seaport that does not participate in the Container Security Initiative. The target is a domestic seaport despite the higher economic toll of an urban attack. The defender should improve transportation security, but improvement decisions on domestic seaport inspections should be scrutinized carefully.
我们提出了一个随机博弈模型,比较了更好的容器安全性的替代方案。玩家是一个计划核攻击的攻击者和一个考虑两种拦截选择的防守者。攻击者可以选择集装箱路径、攻击方式和攻击目标,防御者可以提高国内港口的运输安全和检查。在基线情况下,攻击者在幌子公司的伪装下,通过一个不参与集装箱安全倡议的外国海港运送核武器。袭击目标是一个国内海港,尽管城市袭击造成的经济损失更高。防卫方应改善运输安全,但应仔细审查国内港口检查的改进决定。
{"title":"A stochastic game model on container security","authors":"N. Onur Bakir, E. Kardes","doi":"10.1109/THS.2011.6107856","DOIUrl":"https://doi.org/10.1109/THS.2011.6107856","url":null,"abstract":"We present a stochastic game model that compares alternatives for better container security. The players are an attacker who plans a nuclear attack, and a defender who considers two interdiction alternatives. The attacker can choose the container path, the attack method and the target, whereas the defender might improve transportation security and inspections at domestic seaports. In the baseline case, the attacker ships a nuclear weapon under the disguise of a front company and through a foreign seaport that does not participate in the Container Security Initiative. The target is a domestic seaport despite the higher economic toll of an urban attack. The defender should improve transportation security, but improvement decisions on domestic seaport inspections should be scrutinized carefully.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121547987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Avoiding the closure of ports during a national emergency 避免在国家紧急情况下关闭港口
Pub Date : 2011-12-19 DOI: 10.1109/THS.2011.6107914
G. Bottan
The likelihood of a terrorist organization obtaining and transporting a nuclear weapon to the U.S. is considered by many to be low, but the threat is real and the consequences are potentially catastrophic. If such a situation were to occur, what would the response of the United States be? This paper emphasizes that closing all ports of entry would cost billions of dollars and that to mitigate such costs the U.S. should have in place mechanisms and equipment capable of clearing containers from nuclear weapons, so ports of entry can continue to operate, even if at reduced volumes. Allowing goods into our country would keep factories running, emergency facilities operational, and medical supplies and other humanitarian help flowing, making our nation more capable of responding to such a crisis. The paper explains one approach for keeping our ports open. It describes the use of a technology called Effective Z in 3D (EZ-3D™) whereby a sea cargo container would be automatically inspected to locate high Z anomalies (characteristic of nuclear materials and/or shielding) within a minute. Simultaneously, a second technology called “Prompt Neutrons from Photo fission” (PNPF) would automatically clear the container from having fissionable material. The container could be allowed into the country if no fissionable anomalies are detected. If a container is found to have anomalies or an alert related to fissionable material is produced, a third technology called Nuclear Resonance Fluorescence (NRF) would be used. NRF can examine the anomaly by measuring the isotopic content of the materials in the regions of interest and resolve any alert or ambiguity via material identification.
许多人认为,恐怖组织获得核武器并将其运送到美国的可能性很低,但这种威胁是真实的,其后果可能是灾难性的。如果发生这种情况,美国将作何反应?本文强调,关闭所有入境口岸将花费数十亿美元,为了减少这些成本,美国应该建立能够清除核武器集装箱的机制和设备,这样入境口岸就可以继续运作,即使数量减少。允许货物进入我国将使工厂继续运转,应急设施继续运转,医疗用品和其他人道主义援助源源不断,使我国更有能力应对这样的危机。这篇论文解释了保持我们的港口开放的一种方法。它描述了一种名为Effective Z in 3D (EZ-3D™)的技术的使用,通过该技术,海运货物集装箱将在一分钟内自动检查以定位高Z异常(核材料和/或屏蔽的特征)。与此同时,另一种被称为“光裂变产生的瞬发中子”(PNPF)的技术将自动清除容器中的可裂变物质。如果没有检测到裂变异常,该容器可以被允许进入该国。如果发现容器有异常或产生与裂变物质有关的警报,则会使用第三种技术,称为核共振荧光(NRF)。NRF可以通过测量感兴趣区域中物质的同位素含量来检查异常,并通过物质识别来解决任何警告或模糊。
{"title":"Avoiding the closure of ports during a national emergency","authors":"G. Bottan","doi":"10.1109/THS.2011.6107914","DOIUrl":"https://doi.org/10.1109/THS.2011.6107914","url":null,"abstract":"The likelihood of a terrorist organization obtaining and transporting a nuclear weapon to the U.S. is considered by many to be low, but the threat is real and the consequences are potentially catastrophic. If such a situation were to occur, what would the response of the United States be? This paper emphasizes that closing all ports of entry would cost billions of dollars and that to mitigate such costs the U.S. should have in place mechanisms and equipment capable of clearing containers from nuclear weapons, so ports of entry can continue to operate, even if at reduced volumes. Allowing goods into our country would keep factories running, emergency facilities operational, and medical supplies and other humanitarian help flowing, making our nation more capable of responding to such a crisis. The paper explains one approach for keeping our ports open. It describes the use of a technology called Effective Z in 3D (EZ-3D™) whereby a sea cargo container would be automatically inspected to locate high Z anomalies (characteristic of nuclear materials and/or shielding) within a minute. Simultaneously, a second technology called “Prompt Neutrons from Photo fission” (PNPF) would automatically clear the container from having fissionable material. The container could be allowed into the country if no fissionable anomalies are detected. If a container is found to have anomalies or an alert related to fissionable material is produced, a third technology called Nuclear Resonance Fluorescence (NRF) would be used. NRF can examine the anomaly by measuring the isotopic content of the materials in the regions of interest and resolve any alert or ambiguity via material identification.","PeriodicalId":228322,"journal":{"name":"2011 IEEE International Conference on Technologies for Homeland Security (HST)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115288472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2011 IEEE International Conference on Technologies for Homeland Security (HST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1