首页 > 最新文献

Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology最新文献

英文 中文
Thermographic imaging of the subcutaneous vascular network of the back of the hand for biometric identification 手背皮下血管网的热成像技术,用于生物识别
J. Cross, C. Smith
Access control systems require positive identification of authorised persons for entry to restricted facilities. Possession of a card by an authorised person has been the traditional approach to high security access control. These cards range from simple magnetic swipe cards through to proximity smart cards for identification. More recently, serious attempts have been made to identify appropriate biometric characteristics of individuals to provide positive identification. The more popular biometric access control techniques have included facial images, hand geometry, fingerprints and retina patterns. Also, the dynamics of keyboard input, handwritten signature and voice patterns have been reasonably successful in identifying authorised persons. This paper describes research that has been undertaken by the authors to use the subcutaneous vascular network (vein pattern) of the back of the hand as a unique personal biometric for identification. An outline will be given of a prototype low cost automatic thermographic imaging system which has been developed by the authors to obtain vein patterns for positive identification. The paper includes consideration of the image acquisition, image processing and vein pattern matching strategies. A summary of experimental results concerning the acceptance and rejection rates for the system is also provided.
出入控制系统要求获得授权的人员在进入受限制的设施时必须有明确的身份证明。由授权人员持有卡片一直是实现高安全性访问控制的传统方法。这些卡片从简单的磁卡到用于识别的近距离智能卡都有。最近,人们认真尝试确定个人的适当生物特征,以提供积极的身份识别。更流行的生物识别访问控制技术包括面部图像、手部几何形状、指纹和视网膜模式。此外,键盘输入的动态、手写签名和声音模式在识别授权人士方面相当成功。本文描述了作者利用手背的皮下血管网络(静脉模式)作为识别的独特个人生物特征所进行的研究。本文将介绍一种低成本自动热成像系统的原型,该系统由作者开发,用于获取用于阳性识别的静脉图案。本文从图像采集、图像处理和静脉模式匹配策略三个方面进行了研究。最后总结了该系统的接受率和拒绝率的实验结果。
{"title":"Thermographic imaging of the subcutaneous vascular network of the back of the hand for biometric identification","authors":"J. Cross, C. Smith","doi":"10.1109/CCST.1995.524729","DOIUrl":"https://doi.org/10.1109/CCST.1995.524729","url":null,"abstract":"Access control systems require positive identification of authorised persons for entry to restricted facilities. Possession of a card by an authorised person has been the traditional approach to high security access control. These cards range from simple magnetic swipe cards through to proximity smart cards for identification. More recently, serious attempts have been made to identify appropriate biometric characteristics of individuals to provide positive identification. The more popular biometric access control techniques have included facial images, hand geometry, fingerprints and retina patterns. Also, the dynamics of keyboard input, handwritten signature and voice patterns have been reasonably successful in identifying authorised persons. This paper describes research that has been undertaken by the authors to use the subcutaneous vascular network (vein pattern) of the back of the hand as a unique personal biometric for identification. An outline will be given of a prototype low cost automatic thermographic imaging system which has been developed by the authors to obtain vein patterns for positive identification. The paper includes consideration of the image acquisition, image processing and vein pattern matching strategies. A summary of experimental results concerning the acceptance and rejection rates for the system is also provided.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128953309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 104
Video image processing for nuclear safeguards 用于核保障的视频图像处理
C. Rodriguez, J. Howell, H. Menlove, C. Brislawn, J. Bradley, P. Chare, T. Gorten
In this presentation we introduce digital video image processing and analysis systems that are being developed at Los Alamos for application to nuclear safeguards. Of specific interest are the Inventory Verification System (IVSystem), an automated materials monitoring system; the Video Time Radiation Analysis Program (VTRAP), an integrated safeguards system; VideoTech, a surveillance system designed in conjunction with EURATOM for use in international safeguards; and we introduce detector-activated predictive wavelet transform image coding used to significantly reduce the image data storage requirements for all of these unattended, remote safeguards systems.
在这次报告中,我们介绍了洛斯阿拉莫斯正在开发的用于核保障的数字视频图像处理和分析系统。特别感兴趣的是库存核查系统(IVSystem),一个自动化的材料监测系统;视频时间辐射分析程序(VTRAP),一个综合保障系统;VideoTech,与欧洲原子能共同体共同设计用于国际保障的监测系统;我们介绍了探测器激活的预测小波变换图像编码,用于显着减少所有这些无人值机的远程安全系统的图像数据存储需求。
{"title":"Video image processing for nuclear safeguards","authors":"C. Rodriguez, J. Howell, H. Menlove, C. Brislawn, J. Bradley, P. Chare, T. Gorten","doi":"10.1109/CCST.1995.524936","DOIUrl":"https://doi.org/10.1109/CCST.1995.524936","url":null,"abstract":"In this presentation we introduce digital video image processing and analysis systems that are being developed at Los Alamos for application to nuclear safeguards. Of specific interest are the Inventory Verification System (IVSystem), an automated materials monitoring system; the Video Time Radiation Analysis Program (VTRAP), an integrated safeguards system; VideoTech, a surveillance system designed in conjunction with EURATOM for use in international safeguards; and we introduce detector-activated predictive wavelet transform image coding used to significantly reduce the image data storage requirements for all of these unattended, remote safeguards systems.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116344445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intelligent scene monitoring; technical aspects and practical experience 智能场景监控;技术方面和实践经验
B. Stubbington, P. Keenan
Recent increases in the criminal and terrorist threat have frequently been countered by a proliferation of CCTV cameras. Visible cameras offer some deterrence, and CCTV can be an effective means of patrolling an establishment, perhaps to track the source of alarms from other security systems. However, it is now widely accepted that CCTV does not provide an effective alarm system-the video images need to be interpreted with intelligence if false alarms are to be kept to a minimum; humans are expensive and particularly bad at monitoring TV screens for even short periods. The paper describes practical experiences gained from one of the world's first major installations of automated, intelligent scene monitoring systems. The system is EDS' SENTINEL SMS and the installation is at the UK end of the Channel Tunnel.
最近犯罪和恐怖主义威胁的增加经常被闭路电视摄像机的扩散所抵消。可见摄像机提供了一些威慑,闭路电视可以成为巡逻机构的有效手段,也许可以追踪来自其他安全系统的警报来源。然而,现在人们普遍认为闭路电视并不能提供一个有效的报警系统——如果要把误报降到最低,就需要对视频图像进行智能解读;人的成本很高,而且尤其不擅长短时间监视电视屏幕。本文介绍了世界上第一个大型自动化智能场景监控系统安装的实践经验。该系统是EDS的SENTINEL SMS,安装在英吉利海峡隧道的英国末端。
{"title":"Intelligent scene monitoring; technical aspects and practical experience","authors":"B. Stubbington, P. Keenan","doi":"10.1109/CCST.1995.524937","DOIUrl":"https://doi.org/10.1109/CCST.1995.524937","url":null,"abstract":"Recent increases in the criminal and terrorist threat have frequently been countered by a proliferation of CCTV cameras. Visible cameras offer some deterrence, and CCTV can be an effective means of patrolling an establishment, perhaps to track the source of alarms from other security systems. However, it is now widely accepted that CCTV does not provide an effective alarm system-the video images need to be interpreted with intelligence if false alarms are to be kept to a minimum; humans are expensive and particularly bad at monitoring TV screens for even short periods. The paper describes practical experiences gained from one of the world's first major installations of automated, intelligent scene monitoring systems. The system is EDS' SENTINEL SMS and the installation is at the UK end of the Channel Tunnel.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117132851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The application of the multiprocessor to the camera-guided patrolling vehicle 多处理器在摄像机引导巡逻车中的应用
K.-S. Wu, Yean-Hsi Chang
We design and implement an 8 node multiprocessor applied to a camera guided patrolling vehicle. The vehicle uses the middle line of the road as a guiding mark. The image of the road is grabbed and passed to the shared system memory by one node of the multiprocessor. The system memory with the priority encoder and rotator can be accessed by four nodes of the multiprocessor for image processing. The pixel coordinates of the image are calibrated with the road surface under certain conditions for guidance purposes. The sixth node is responsible for RS232C radio communications with the laboratory. It can transmit the calculated image data to the lab and/or receive the commands from the lab in case of emergency. The monitored environmental image is transmitted to the laboratory by analog radio. The seventh node takes care of obstacle avoidance with ultrasound. The eighth node is responsible for motor control of the vehicle. The commands are issued from other nodes through the hand shaking communications of Intel's 8255 chip. Each node has an Intel 8259 chip for instantaneous interrupt service. The performance of both the multiprocessor and the patrolling vehicle is evaluated.
设计并实现了一种应用于摄像机引导巡逻车的8节点多处理器。车辆以道路中线作为引导标志。道路图像由多处理器的一个节点抓取并传递到共享系统内存。具有优先编码器和旋转器的系统存储器可由多处理器的四个节点访问以进行图像处理。在一定条件下,图像的像素坐标与路面进行校准,以达到引导目的。第六个节点负责与实验室进行RS232C无线电通信。它可以在紧急情况下将计算的图像数据传输到实验室和/或接收来自实验室的命令。监测到的环境图像通过模拟无线电传输到实验室。第七个节点负责用超声波避开障碍物。第八个节点负责车辆的电机控制。这些命令通过英特尔8255芯片的握手通信从其他节点发出。每个节点都有一个用于瞬时中断服务的英特尔8259芯片。对多处理机和巡逻车的性能进行了评价。
{"title":"The application of the multiprocessor to the camera-guided patrolling vehicle","authors":"K.-S. Wu, Yean-Hsi Chang","doi":"10.1109/CCST.1995.524956","DOIUrl":"https://doi.org/10.1109/CCST.1995.524956","url":null,"abstract":"We design and implement an 8 node multiprocessor applied to a camera guided patrolling vehicle. The vehicle uses the middle line of the road as a guiding mark. The image of the road is grabbed and passed to the shared system memory by one node of the multiprocessor. The system memory with the priority encoder and rotator can be accessed by four nodes of the multiprocessor for image processing. The pixel coordinates of the image are calibrated with the road surface under certain conditions for guidance purposes. The sixth node is responsible for RS232C radio communications with the laboratory. It can transmit the calculated image data to the lab and/or receive the commands from the lab in case of emergency. The monitored environmental image is transmitted to the laboratory by analog radio. The seventh node takes care of obstacle avoidance with ultrasound. The eighth node is responsible for motor control of the vehicle. The commands are issued from other nodes through the hand shaking communications of Intel's 8255 chip. Each node has an Intel 8259 chip for instantaneous interrupt service. The performance of both the multiprocessor and the patrolling vehicle is evaluated.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116145359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Capillary zone electrophoresis in the forensic analysis of explosives 毛细管区带电泳在爆炸物法医分析中的应用
H. Cullum
Investigations into the use of capillary zone electrophoresis with indirect UV detection for the analysis of small inorganic anions and cations of explosives relevance have been carried out. The intention is to develop a procedure for the detection and identification of ions such as chlorate, nitrate, sulphate, ammonium and potassium. Separate methods for the analysis of anions and cations are described along with estimates of the limits of detection for each method.
研究了用毛细管区带电泳间接紫外检测分析与炸药相关的无机小阴离子和阳离子。目的是开发一种检测和鉴定氯酸盐、硝酸盐、硫酸盐、铵和钾等离子的程序。描述了分析阴离子和阳离子的不同方法,并对每种方法的检出限进行了估计。
{"title":"Capillary zone electrophoresis in the forensic analysis of explosives","authors":"H. Cullum","doi":"10.1109/CCST.1995.524925","DOIUrl":"https://doi.org/10.1109/CCST.1995.524925","url":null,"abstract":"Investigations into the use of capillary zone electrophoresis with indirect UV detection for the analysis of small inorganic anions and cations of explosives relevance have been carried out. The intention is to develop a procedure for the detection and identification of ions such as chlorate, nitrate, sulphate, ammonium and potassium. Separate methods for the analysis of anions and cations are described along with estimates of the limits of detection for each method.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127083060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New possibilities for video applications in the security field 视频应用在安防领域的新可能性
U. Oppelt
Continuous improvements of computer technology within the last years providing more and more powerful digital computers and computer equipment at decreasing costs, have made state of the art computers appropriate for digital image processing. This tendency will continue for the next few years, opening a wide area of applications of computers and digital image processing to security systems. The paper presents some impacts of computer and video technology on future security systems and summarizes how these technologies can be used to develop a new generation of security systems and applications.
在过去的几年中,计算机技术的不断改进,提供了越来越强大的数字计算机和成本越来越低的计算机设备,使最先进的计算机适合数字图像处理。这一趋势将在未来几年持续下去,为安全系统打开计算机和数字图像处理应用的广阔领域。本文介绍了计算机和视频技术对未来安防系统的一些影响,并总结了如何利用这些技术开发新一代安防系统和应用。
{"title":"New possibilities for video applications in the security field","authors":"U. Oppelt","doi":"10.1109/CCST.1995.524946","DOIUrl":"https://doi.org/10.1109/CCST.1995.524946","url":null,"abstract":"Continuous improvements of computer technology within the last years providing more and more powerful digital computers and computer equipment at decreasing costs, have made state of the art computers appropriate for digital image processing. This tendency will continue for the next few years, opening a wide area of applications of computers and digital image processing to security systems. The paper presents some impacts of computer and video technology on future security systems and summarizes how these technologies can be used to develop a new generation of security systems and applications.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126790973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Under vehicle examination and novel applications of digital storage techniques 车辆检测与数字存储技术的新应用
C. Yeoman
In September 1991 the Home Office Police Scientific Development Branch was approached by the Directorate of Special and Central Services to undertake a study to determine if a "real-time" undercar viewing facility could be designed and developed for use at a central London location. Investigations were undertaken which resulted in PSDB being contracted to develop and prove the capabilities of such a system. Designed to a high specification the viewing facility, known as Fisheye, uses a gated CCD imager linked to an IBM PC based computer terminal. It has been designed to supplement an established manual search procedure for the inspection of the underside of passenger vehicles entering a secure area, prior to proceeding to an underground car park.
1991年9月,特别和中央服务局与内政部警察科学发展处接洽,要求进行一项研究,以确定是否可以设计和开发一种“实时”车内观察设施,供伦敦市中心使用。进行了调查,结果与PSDB签订合同,开发和证明这种系统的能力。设计成一个高规格的观看设备,被称为鱼眼,使用一个门控CCD成像仪连接到一个基于IBM个人电脑的计算机终端。它的目的是补充既定的人工搜查程序,以便在进入地下停车场之前检查进入安全区的客运车辆的底部。
{"title":"Under vehicle examination and novel applications of digital storage techniques","authors":"C. Yeoman","doi":"10.1109/CCST.1995.524744","DOIUrl":"https://doi.org/10.1109/CCST.1995.524744","url":null,"abstract":"In September 1991 the Home Office Police Scientific Development Branch was approached by the Directorate of Special and Central Services to undertake a study to determine if a \"real-time\" undercar viewing facility could be designed and developed for use at a central London location. Investigations were undertaken which resulted in PSDB being contracted to develop and prove the capabilities of such a system. Designed to a high specification the viewing facility, known as Fisheye, uses a gated CCD imager linked to an IBM PC based computer terminal. It has been designed to supplement an established manual search procedure for the inspection of the underside of passenger vehicles entering a secure area, prior to proceeding to an underground car park.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"572 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130283778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A robust speaker verification biometric 一个强大的说话人验证生物识别
M. George, R. A. King
The need for simple, ubiquitous security procedures to verify the identity of authorised system users is assuming increasing importance in the expansion and exploitation of new technology. High performance Biometric Verification methods offer important tools for this purpose, enhancing the security, reliability and integrity of transactions conducted electronically. This paper describes TESPAR/FANN, a new digital data/artificial neural network combination which is proving highly effective in the Speaker Verification arena, and in other key non-speech applications.
在扩展和利用新技术的过程中,需要简单而普遍的保安程序来核实已获授权的系统用户的身份,这一点日益重要。高性能的生物识别验证方法为这一目的提供了重要的工具,增强了电子交易的安全性、可靠性和完整性。TESPAR/FANN是一种新型的数字数据/人工神经网络组合,在说话人验证领域和其他关键的非语音应用中被证明是非常有效的。
{"title":"A robust speaker verification biometric","authors":"M. George, R. A. King","doi":"10.1109/CCST.1995.524731","DOIUrl":"https://doi.org/10.1109/CCST.1995.524731","url":null,"abstract":"The need for simple, ubiquitous security procedures to verify the identity of authorised system users is assuming increasing importance in the expansion and exploitation of new technology. High performance Biometric Verification methods offer important tools for this purpose, enhancing the security, reliability and integrity of transactions conducted electronically. This paper describes TESPAR/FANN, a new digital data/artificial neural network combination which is proving highly effective in the Speaker Verification arena, and in other key non-speech applications.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128673926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Recent developments in a fibre optic perimeter intruder detection system 光纤周边入侵者探测系统的最新进展
I. Hawkes
This paper describes recent work on a fibre optic perimeter intruder detection system (FOPIDS), which is under continuous development at GEC-Marconi. This system is based around a technique called multiplexed heterodyne interferometry, and offers a novel method of protecting medium to large perimeters with a network of fibre optic sensors.
本文介绍了GEC-Marconi正在持续开发的光纤周边入侵者检测系统(FOPIDS)的最新工作。该系统基于一种称为多路外差干涉测量的技术,并提供了一种利用光纤传感器网络保护中到大周长的新方法。
{"title":"Recent developments in a fibre optic perimeter intruder detection system","authors":"I. Hawkes","doi":"10.1109/CCST.1995.524727","DOIUrl":"https://doi.org/10.1109/CCST.1995.524727","url":null,"abstract":"This paper describes recent work on a fibre optic perimeter intruder detection system (FOPIDS), which is under continuous development at GEC-Marconi. This system is based around a technique called multiplexed heterodyne interferometry, and offers a novel method of protecting medium to large perimeters with a network of fibre optic sensors.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133536064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Use of high power microwave weapons 使用高功率微波武器
E. Van Keuren, J. Knighten
The destructive power of high power microwave (HPM) generators allow them to be used as effective weapons by both law enforcement and criminal organizations. Now, with the desperate need for cash by some developing nations, devices such as relativistic magnetrons, capable of producing multi-megawatts and for use in weapons, have been offered for sale to other nations, groups, and individuals. Hence, HPM weapon capability has now become available not only for military use by any nation wishing to invest but by terrorists and other criminal organizations. Similarly this capability is now available for law enforcement activities. For the most part, it is believed that the aforementioned high multi-megawatt powers would not be necessary for law enforcement. Powers in the tens to hundred kilowatt range should be adequate, and tailorable sources such as microwave transmitters readily available.
高功率微波发生器的破坏力使其成为执法部门和犯罪组织使用的有效武器。现在,由于一些发展中国家迫切需要现金,一些国家向其他国家、团体和个人出售了一些设备,如能够产生数兆瓦电力并可用于武器的相对论磁控管。因此,HPM武器能力现在不仅可以用于任何希望投资的国家的军事用途,而且可以用于恐怖分子和其他犯罪组织。同样,这种能力现在也可用于执法活动。在大多数情况下,人们认为上述高兆瓦功率对于执法来说是不必要的。功率在几十到几百千瓦范围内应该是足够的,并且合适的来源,如微波发射机随时可用。
{"title":"Use of high power microwave weapons","authors":"E. Van Keuren, J. Knighten","doi":"10.1109/CCST.1995.524955","DOIUrl":"https://doi.org/10.1109/CCST.1995.524955","url":null,"abstract":"The destructive power of high power microwave (HPM) generators allow them to be used as effective weapons by both law enforcement and criminal organizations. Now, with the desperate need for cash by some developing nations, devices such as relativistic magnetrons, capable of producing multi-megawatts and for use in weapons, have been offered for sale to other nations, groups, and individuals. Hence, HPM weapon capability has now become available not only for military use by any nation wishing to invest but by terrorists and other criminal organizations. Similarly this capability is now available for law enforcement activities. For the most part, it is believed that the aforementioned high multi-megawatt powers would not be necessary for law enforcement. Powers in the tens to hundred kilowatt range should be adequate, and tailorable sources such as microwave transmitters readily available.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"101 1-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133136504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1