首页 > 最新文献

Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology最新文献

英文 中文
The use of an expert system to expand a multi sensor fire detector to a robust fire detector 利用专家系统将多传感器火灾探测器扩展为鲁棒型火灾探测器
T. Jandeweith
A new fire detector is presented which produces a lower rate of false alarms then a customary one, in rooms that are hard to supervise. The detector is based on the assumption that rooms have a specific use, so that often similar reasons lead to false alarms. Therefore, a customary detector is improved so that it is capable of saving the physical characteristics of non-fire events. When a critical situation arises in the supervised room, it is compared to past non-fire events. When a cause is recognized as a repetitive non-fire cause, the decision is taken in favour of the non-fire hypothesis, otherwise, in favour of the hypothesis.
提出了一种新型火灾探测器,在难以监督的房间中,比传统的火灾探测器产生更低的误报率。探测器是基于房间有特定用途的假设,所以经常会有类似的原因导致误报。因此,对常规探测器进行改进,使其能够保存非火灾事件的物理特性。当监控室出现紧急情况时,将其与过去的非火灾事件进行比较。当一个原因被认为是一个重复的非火的原因时,这个决定就有利于非火的假设,否则,就有利于假设。
{"title":"The use of an expert system to expand a multi sensor fire detector to a robust fire detector","authors":"T. Jandeweith","doi":"10.1109/CCST.1995.524915","DOIUrl":"https://doi.org/10.1109/CCST.1995.524915","url":null,"abstract":"A new fire detector is presented which produces a lower rate of false alarms then a customary one, in rooms that are hard to supervise. The detector is based on the assumption that rooms have a specific use, so that often similar reasons lead to false alarms. Therefore, a customary detector is improved so that it is capable of saving the physical characteristics of non-fire events. When a critical situation arises in the supervised room, it is compared to past non-fire events. When a cause is recognized as a repetitive non-fire cause, the decision is taken in favour of the non-fire hypothesis, otherwise, in favour of the hypothesis.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132181984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The 3DIS System 3DIS系统
S. Veitch, J. Dexter, G. Ross, J. Driscoll, M. Watts
The 3DIS Security System uses the overlapping fields of view of multiple video cameras to create discrete 3D volumes of space that are sensitive to movement. The system may be used in both indoor and outdoor installations to implement automated video surveillance. 3DIS Version 1.xx has validated the use of "3D detection zones" within the security industry. 3DIS Version 2.xx is nearing the end of the first stage of its development.
3DIS安全系统利用多个摄像机的重叠视场来创建对移动敏感的离散3D空间体。该系统可用于室内和室外装置,以实现自动视频监控。3DIS版本1。xx已在安防行业内验证了“3D检测区”的使用。3DIS版本2。Xx已接近第一阶段开发的尾声。
{"title":"The 3DIS System","authors":"S. Veitch, J. Dexter, G. Ross, J. Driscoll, M. Watts","doi":"10.1109/CCST.1995.524733","DOIUrl":"https://doi.org/10.1109/CCST.1995.524733","url":null,"abstract":"The 3DIS Security System uses the overlapping fields of view of multiple video cameras to create discrete 3D volumes of space that are sensitive to movement. The system may be used in both indoor and outdoor installations to implement automated video surveillance. 3DIS Version 1.xx has validated the use of \"3D detection zones\" within the security industry. 3DIS Version 2.xx is nearing the end of the first stage of its development.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"84 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114339185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A strategy for security of buildings 建筑物的安全策略
J. Harrington-Lynn, T. Pascoe
The security of buildings can be influenced by aspects of building design and urban planning. The paper reports on progress of research at the Building Research Establishment, to assess the effectiveness of these measures and to develop a strategy based on risk assessment. Such a strategy will allow designers, the police and others to assess the most effective combination of design and other measures to counter domestic burglary and other crimes.
建筑的安全性会受到建筑设计和城市规划方面的影响。本文报告了建筑研究机构的研究进展,以评估这些措施的有效性,并制定基于风险评估的策略。这种策略将使设计师、警察和其他人能够评估设计和其他措施的最有效组合,以打击国内入室盗窃和其他犯罪。
{"title":"A strategy for security of buildings","authors":"J. Harrington-Lynn, T. Pascoe","doi":"10.1109/CCST.1995.524911","DOIUrl":"https://doi.org/10.1109/CCST.1995.524911","url":null,"abstract":"The security of buildings can be influenced by aspects of building design and urban planning. The paper reports on progress of research at the Building Research Establishment, to assess the effectiveness of these measures and to develop a strategy based on risk assessment. Such a strategy will allow designers, the police and others to assess the most effective combination of design and other measures to counter domestic burglary and other crimes.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121981699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Pre-processing of fingerprint images 指纹图像预处理
N. D. Tucker
The pre-processing of fingerprint images covers a wide variety of image processing and requirements. This paper addresses the problem of the extraction of relevant macroscopic properties of the image, in particular the location of key features. This ongoing research explores the transformation of the image into a reconstructed skeletal form, followed by the conversion of the image into a series of tracks. These latter permit the straightforward extraction of essential pattern characteristics.
指纹图像的预处理涉及到各种各样的图像处理和要求。本文解决了图像相关宏观属性的提取问题,特别是关键特征的定位问题。这项正在进行的研究探索了将图像转换为重建的骨骼形式,然后将图像转换为一系列轨道。后者允许直接提取基本模式特征。
{"title":"Pre-processing of fingerprint images","authors":"N. D. Tucker","doi":"10.1109/CCST.1995.524739","DOIUrl":"https://doi.org/10.1109/CCST.1995.524739","url":null,"abstract":"The pre-processing of fingerprint images covers a wide variety of image processing and requirements. This paper addresses the problem of the extraction of relevant macroscopic properties of the image, in particular the location of key features. This ongoing research explores the transformation of the image into a reconstructed skeletal form, followed by the conversion of the image into a series of tracks. These latter permit the straightforward extraction of essential pattern characteristics.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123963700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Testing of detection systems 检测系统测试
G. Leach
The phrase "probability of detection" (P/sub d/) is often misused in the context of exterior electronic perimeter intrusion detection systems (PIDS). For example, a system which correctly detects when tested three times has detected at a rate of 100%, but might not have a "probability of detection" of 100%. "P/sub d/" is often misused to describe this experimental result as a 100% probability of detection. "Confidence limits" for P/sub d/ can be estimated and minimum extents for testing can then be demanded. These confidence limits are sometimes calculated using the normal, or the chi-squared, statistical distributions. Using these distributions for PIDS testing is questionable because they are often used outside their region of validity. There are fundamental constraints which obstruct conventional statistical confidence limits for P/sub d/ from being found. P/sub d/ statistics are discussed and an exact way to express detection uncertainty using the binomial distribution is described. Ways to reduce testing, yet maintain confidence, are discussed. Experts are concerned that extensive, but unrepresentative, testing gives an unwarranted impression of reliability. This paper emphasises the importance of representative testing and the clear presentation of results.
在外部电子边界入侵检测系统(PIDS)中,“检测概率”(P/sub / d/)一词经常被误用。例如,一个系统在测试三次后正确检测,其检测率为100%,但可能没有100%的“检测概率”。“P/sub / d/”经常被误用来描述这个实验结果为100%的检测概率。可以估计P/sub / d的“置信限”,然后可以要求测试的最小范围。这些置信限有时使用正态分布或卡方统计分布来计算。使用这些分布进行pid测试是有问题的,因为它们经常在其有效区域之外使用。有一些基本的制约因素阻碍了发现P/sub / d/的常规统计置信限。讨论了P/sub / d统计量,并描述了用二项分布表示检测不确定度的精确方法。讨论了减少测试,同时保持信心的方法。专家们担心,广泛但不具代表性的测试会给人一种毫无根据的可靠性印象。本文强调代表性测试和结果清晰呈现的重要性。
{"title":"Testing of detection systems","authors":"G. Leach","doi":"10.1109/CCST.1995.524741","DOIUrl":"https://doi.org/10.1109/CCST.1995.524741","url":null,"abstract":"The phrase \"probability of detection\" (P/sub d/) is often misused in the context of exterior electronic perimeter intrusion detection systems (PIDS). For example, a system which correctly detects when tested three times has detected at a rate of 100%, but might not have a \"probability of detection\" of 100%. \"P/sub d/\" is often misused to describe this experimental result as a 100% probability of detection. \"Confidence limits\" for P/sub d/ can be estimated and minimum extents for testing can then be demanded. These confidence limits are sometimes calculated using the normal, or the chi-squared, statistical distributions. Using these distributions for PIDS testing is questionable because they are often used outside their region of validity. There are fundamental constraints which obstruct conventional statistical confidence limits for P/sub d/ from being found. P/sub d/ statistics are discussed and an exact way to express detection uncertainty using the binomial distribution is described. Ways to reduce testing, yet maintain confidence, are discussed. Experts are concerned that extensive, but unrepresentative, testing gives an unwarranted impression of reliability. This paper emphasises the importance of representative testing and the clear presentation of results.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132392650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Modern signal processing for temperature fluctuation based fire detectors 基于温度波动火灾探测器的现代信号处理
T. Kaiser, B. Piller, P. Ryser
We suggest use of the high frequency part of the temperature signal or the temperature fluctuations in addition to or as a replacement for the common fire detector which is based only on a lowpass filtered (smoothed) temperature signal. Furthermore, a signal processing method distinguishing fire from non-fire situations using fire detectors that measure temperature fluctuations is presented. This method is partly based on the interpretation of the sensor output signals as a linear filtered stochastic process which enabled the reconstruction of the input signals from known output signals. We show the advantage of this method through application to many fire and non-fire situations.
我们建议使用温度信号的高频部分或温度波动,作为仅基于低通滤波(平滑)温度信号的普通火灾探测器的补充或替代。此外,提出了一种利用测量温度波动的火灾探测器区分火灾和非火灾情况的信号处理方法。该方法部分基于将传感器输出信号解释为线性滤波随机过程,从而能够从已知输出信号重建输入信号。通过对多种火灾和非火灾情况的应用,证明了该方法的优越性。
{"title":"Modern signal processing for temperature fluctuation based fire detectors","authors":"T. Kaiser, B. Piller, P. Ryser","doi":"10.1109/CCST.1995.524913","DOIUrl":"https://doi.org/10.1109/CCST.1995.524913","url":null,"abstract":"We suggest use of the high frequency part of the temperature signal or the temperature fluctuations in addition to or as a replacement for the common fire detector which is based only on a lowpass filtered (smoothed) temperature signal. Furthermore, a signal processing method distinguishing fire from non-fire situations using fire detectors that measure temperature fluctuations is presented. This method is partly based on the interpretation of the sensor output signals as a linear filtered stochastic process which enabled the reconstruction of the input signals from known output signals. We show the advantage of this method through application to many fire and non-fire situations.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126553601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A risk assessment methodology for security advisors 安全顾问的风险评估方法
J. Strutt, J. Patrick, N. Custance
This paper describes the trends within the United Kingdom which have led to an increased emphasis on risk management. The paper then presents the methodology which was developed in conjunction with Cranfield University to meet the needs of the 15 members of an advisory branch. The branch is a centrally funded resource which provide recommendations for protective security upgrades to a wide range of Government clients. Risk assessment is seen as the most effective method for providing such advice now that clients are no longer bound by prescriptive solutions.
本文描述了英国内部的趋势,这导致了对风险管理的日益重视。然后,该文件介绍了与克兰菲尔德大学共同制定的方法,以满足咨询部门15名成员的需要。该科是由中央政府资助的资源部门,为政府的广大客户提供有关提升防护保安的建议。由于客户不再受规定性解决方案的约束,风险评估被视为提供此类建议的最有效方法。
{"title":"A risk assessment methodology for security advisors","authors":"J. Strutt, J. Patrick, N. Custance","doi":"10.1109/CCST.1995.524917","DOIUrl":"https://doi.org/10.1109/CCST.1995.524917","url":null,"abstract":"This paper describes the trends within the United Kingdom which have led to an increased emphasis on risk management. The paper then presents the methodology which was developed in conjunction with Cranfield University to meet the needs of the 15 members of an advisory branch. The branch is a centrally funded resource which provide recommendations for protective security upgrades to a wide range of Government clients. Risk assessment is seen as the most effective method for providing such advice now that clients are no longer bound by prescriptive solutions.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126073785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Novel approach to secure broadcast in distributed systems 分布式系统中安全广播的新方法
R.H. Deng, T. Tjhung
We present a scheme for secure broadcasting confidential data messages in distributed system or networking environments. The scheme is based on the theory of linear block codes and does not make use of any encryption algorithms. In addition, we show how to achieve reliable message transmission in the presence of channel errors by sending an error correcting parity message in the secure broadcast scheme.
提出了一种在分布式系统或网络环境下安全广播机密数据消息的方案。该方案基于线性分组码理论,不使用任何加密算法。此外,我们还展示了如何在存在信道错误的情况下通过在安全广播方案中发送纠错奇偶消息来实现可靠的消息传输。
{"title":"Novel approach to secure broadcast in distributed systems","authors":"R.H. Deng, T. Tjhung","doi":"10.1109/CCST.1995.524941","DOIUrl":"https://doi.org/10.1109/CCST.1995.524941","url":null,"abstract":"We present a scheme for secure broadcasting confidential data messages in distributed system or networking environments. The scheme is based on the theory of linear block codes and does not make use of any encryption algorithms. In addition, we show how to achieve reliable message transmission in the presence of channel errors by sending an error correcting parity message in the secure broadcast scheme.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123844009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reducing manpower intensive tasks through automation of security technologies 通过自动化安全技术减少人力密集型任务
R. Carback
Security in today's government and commercial environments is changing. The willingness to provide manpower against security threats is diminishing. Risk management is preferred to risk avoidance. In order for management to ensure that the appropriate security is provided while downsizing or right sizing protective services and other security personnel, automation of security technologies is a necessity. Several manpower intensive tasks and processes are: facilities access control, issuance of staff and visitor badges, provision of information for visitors, access control to interior facilities, and the issuance of office keys. Reduction of the required manning for these processes is enabled though the automation and integration of various security technologies including biometric identification systems. This paper provides a background on manpower intensive tasks and processes, security technologies that may be employed within them, resource reduction capabilities, and a customer's experience with the use of the technologies within a large Government environment.
当今政府和商业环境中的安全正在发生变化。提供人力对抗安全威胁的意愿正在减弱。风险管理优先于风险规避。为了确保管理层在缩减或适当调整保护服务和其他安全人员时提供适当的安全,安全技术的自动化是必要的。人力密集的工作和程序包括:设施出入管制、签发员工及访客证、为访客提供资料、进入内部设施的管制,以及签发办公室钥匙。通过自动化和包括生物识别系统在内的各种安全技术的集成,减少了这些过程所需的人员配备。本文件提供有关人力密集的工作和程序的背景资料、在这些工作和程序中可能采用的保安技术、减少资源的能力,以及客户在大型政府环境中使用这些技术的经验。
{"title":"Reducing manpower intensive tasks through automation of security technologies","authors":"R. Carback","doi":"10.1109/CCST.1995.524932","DOIUrl":"https://doi.org/10.1109/CCST.1995.524932","url":null,"abstract":"Security in today's government and commercial environments is changing. The willingness to provide manpower against security threats is diminishing. Risk management is preferred to risk avoidance. In order for management to ensure that the appropriate security is provided while downsizing or right sizing protective services and other security personnel, automation of security technologies is a necessity. Several manpower intensive tasks and processes are: facilities access control, issuance of staff and visitor badges, provision of information for visitors, access control to interior facilities, and the issuance of office keys. Reduction of the required manning for these processes is enabled though the automation and integration of various security technologies including biometric identification systems. This paper provides a background on manpower intensive tasks and processes, security technologies that may be employed within them, resource reduction capabilities, and a customer's experience with the use of the technologies within a large Government environment.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131996758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Low-cost outdoor video motion and non-motion detection 低成本户外视频运动和非运动检测
B. Jones
The video monitoring of outdoor sites is a demanding task that is commonly tackled by having security guards look at arrays of CCTV monitors. Experience shows that this is largely ineffective, both as a detector and a deterrent. However, modern digital imaging systems can solve both these problems by maintaining constant vigilance 24 hours a day. These systems can be versatile and can operate in several different modes, video motion detection, video nonmotion detection and incident capture, thus providing a flexibility of application environment. By basing these systems on powerful PC technology the end user benefits from a large range of facilities at relatively low cost. In particular, it is possible to have low cost frame storage and high performance communications over telephones, ISDN or Ethernet. Image sequences both prior to and after an event can be stored and transmitted. Archiving and retrieval of events can be done efficiently through standard databases. However, in order that such systems be operationally viable it is essential that the detection algorithms be smart enough to reduce the number of false alarms to virtually zero. Most of the discussion concerns technology that is currently available and in everyday use: the author uses the ASTRAGUARD product as a specific example of such a system.
户外场所的视频监控是一项要求很高的任务,通常通过保安人员查看闭路电视监视器阵列来解决。经验表明,这在很大程度上是无效的,无论是作为侦查还是威慑。然而,现代数字成像系统可以通过保持24小时不间断的警戒来解决这两个问题。这些系统具有通用性,可以在多种不同的模式下工作,视频运动检测、视频非运动检测和事件捕获,从而提供了灵活的应用环境。通过将这些系统建立在强大的PC技术上,最终用户可以以相对较低的成本从大量的设施中受益。特别是,通过电话、ISDN或以太网实现低成本帧存储和高性能通信是可能的。可以存储和传输事件之前和事件之后的图像序列。事件的归档和检索可以通过标准数据库高效地完成。然而,为了使这种系统在操作上可行,检测算法必须足够智能,以将假警报的数量减少到几乎为零。大多数讨论都涉及当前可用的和日常使用的技术:作者使用ASTRAGUARD产品作为此类系统的具体示例。
{"title":"Low-cost outdoor video motion and non-motion detection","authors":"B. Jones","doi":"10.1109/CCST.1995.524938","DOIUrl":"https://doi.org/10.1109/CCST.1995.524938","url":null,"abstract":"The video monitoring of outdoor sites is a demanding task that is commonly tackled by having security guards look at arrays of CCTV monitors. Experience shows that this is largely ineffective, both as a detector and a deterrent. However, modern digital imaging systems can solve both these problems by maintaining constant vigilance 24 hours a day. These systems can be versatile and can operate in several different modes, video motion detection, video nonmotion detection and incident capture, thus providing a flexibility of application environment. By basing these systems on powerful PC technology the end user benefits from a large range of facilities at relatively low cost. In particular, it is possible to have low cost frame storage and high performance communications over telephones, ISDN or Ethernet. Image sequences both prior to and after an event can be stored and transmitted. Archiving and retrieval of events can be done efficiently through standard databases. However, in order that such systems be operationally viable it is essential that the detection algorithms be smart enough to reduce the number of false alarms to virtually zero. Most of the discussion concerns technology that is currently available and in everyday use: the author uses the ASTRAGUARD product as a specific example of such a system.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134446440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1