首页 > 最新文献

Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology最新文献

英文 中文
Post Parcel and Letter Bombs (PPLBs) 邮包炸弹及信件炸弹
O. Mueller
The explosive devices, charges sent by post or by messenger services are a special group of the IEDs (Improvised Explosive Devices). The lecture will show a short impression of the history of the PPLBs. The PPLBs (Post Parcel and Letter Bombs) are mainly EBTs (Explosive Booby Traps). The addressee's dynamic activity will cause the detonation of the hidden explosive mechanism. Sometimes the PPLBs are "general directed infernal machines", the detonation occurs at the target institution, for example at a post office, a city-hall, at a railway station. The paper classifies several types of PPLBs. The defence possibilities are well known in the international antiterrorist practice, but sometimes "security-holes", leakages cause dramatic situations. The author shows some examples of the occurred attempts by PPLBs.
通过邮政或信使服务发送的爆炸装置,是简易爆炸装置(ied)的一个特殊类别。讲座将简要介绍pplb的历史。邮包炸弹和信件炸弹主要是爆炸性饵雷。收件人的动态活动将引起隐爆机制的引爆。有时,pplb是“一般定向的地狱机器”,爆炸发生在目标机构,例如邮局,市政厅,火车站。本文对几种类型的pplb进行了分类。在国际反恐实践中,防御的可能性是众所周知的,但有时“安全漏洞”、泄漏会造成戏剧性的局面。作者列举了一些已经发生的pplb尝试的例子。
{"title":"Post Parcel and Letter Bombs (PPLBs)","authors":"O. Mueller","doi":"10.1109/CCST.1995.524918","DOIUrl":"https://doi.org/10.1109/CCST.1995.524918","url":null,"abstract":"The explosive devices, charges sent by post or by messenger services are a special group of the IEDs (Improvised Explosive Devices). The lecture will show a short impression of the history of the PPLBs. The PPLBs (Post Parcel and Letter Bombs) are mainly EBTs (Explosive Booby Traps). The addressee's dynamic activity will cause the detonation of the hidden explosive mechanism. Sometimes the PPLBs are \"general directed infernal machines\", the detonation occurs at the target institution, for example at a post office, a city-hall, at a railway station. The paper classifies several types of PPLBs. The defence possibilities are well known in the international antiterrorist practice, but sometimes \"security-holes\", leakages cause dramatic situations. The author shows some examples of the occurred attempts by PPLBs.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126007507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced digital communications system design considerations for law enforcement and internal security purposes 用于执法和内部安全目的的先进数字通信系统设计考虑因素
G. M. Stone, K. Bluitt
In the United States and worldwide, enciphered digital wireless systems are on the verge of proliferation as the Associated Public Safety Communications Officials (APCO) Project 25 advanced narrowband digital communications (ANDC) standards for law enforcement are finalized. Likewise, in Europe, the TETRA digital standards will likely accelerate deployment of digital wireless systems throughout the Continent. Both APCO Project 25 FDMA and TETRA TDMA system architectures are intended to support infrastructure dependent public safety and internal security "dispatch" operations whilst APCO Project 25 is more amenable to non-infrastructure based communications. We address the system features now available in first generation ANDC systems. In addition, we make recommendations appertaining to the design, modeling and simulation parameters applicable to both enciphered and unprotected digital tactical wireless communications architectures suitable for law enforcement and internal security purposes. As we move into the digital world, is should be noted that the performance of enciphered digital wireless systems are severely impacted not only by the magnitude of the recovered radio frequency signal but more so by the phase perturbations typically encountered in tactical wireless environments. Thus, enciphered digital wireless system design, modeling and simulation must be multi-dimensional, recognizing and overcoming those environmental aspects which most significantly affect its viability.
在美国和世界范围内,加密数字无线系统正处于扩散的边缘,因为联合公共安全通信官员(APCO)项目25用于执法的先进窄带数字通信(ANDC)标准最终确定。同样,在欧洲,TETRA数字标准可能会加速整个欧洲大陆数字无线系统的部署。APCO Project 25 FDMA和TETRA TDMA系统架构旨在支持依赖于基础设施的公共安全和内部安全“调度”操作,而APCO Project 25更适合非基础设施通信。我们解决了第一代ANDC系统中现有的系统功能。此外,我们还就适用于执法和内部安全目的的加密和不受保护的数字战术无线通信架构的设计、建模和仿真参数提出建议。随着我们进入数字世界,应该注意的是,加密数字无线系统的性能不仅受到恢复射频信号的大小的严重影响,而且受到战术无线环境中通常遇到的相位扰动的严重影响。因此,加密数字无线系统的设计、建模和仿真必须是多维的,识别和克服那些最显著影响其可行性的环境因素。
{"title":"Advanced digital communications system design considerations for law enforcement and internal security purposes","authors":"G. M. Stone, K. Bluitt","doi":"10.1109/CCST.1995.524943","DOIUrl":"https://doi.org/10.1109/CCST.1995.524943","url":null,"abstract":"In the United States and worldwide, enciphered digital wireless systems are on the verge of proliferation as the Associated Public Safety Communications Officials (APCO) Project 25 advanced narrowband digital communications (ANDC) standards for law enforcement are finalized. Likewise, in Europe, the TETRA digital standards will likely accelerate deployment of digital wireless systems throughout the Continent. Both APCO Project 25 FDMA and TETRA TDMA system architectures are intended to support infrastructure dependent public safety and internal security \"dispatch\" operations whilst APCO Project 25 is more amenable to non-infrastructure based communications. We address the system features now available in first generation ANDC systems. In addition, we make recommendations appertaining to the design, modeling and simulation parameters applicable to both enciphered and unprotected digital tactical wireless communications architectures suitable for law enforcement and internal security purposes. As we move into the digital world, is should be noted that the performance of enciphered digital wireless systems are severely impacted not only by the magnitude of the recovered radio frequency signal but more so by the phase perturbations typically encountered in tactical wireless environments. Thus, enciphered digital wireless system design, modeling and simulation must be multi-dimensional, recognizing and overcoming those environmental aspects which most significantly affect its viability.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126092280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A robust fire detection algorithm for temperature and optical smoke density using fuzzy logic 基于模糊逻辑的温度和光烟雾密度火灾检测算法
H.C. Muller, A. Fischer
Multi sensor based fire detection (MSbFD) systems are one of the important current developments in automatic fire detection technology. The two main objectives of this progress are the still unacceptable false alarm behaviour and improvements in the fire detection capabilities (i.e. shorter detection times) of fire detection systems. The use of more than one sensor in a fire detector gives an improved image of the environment monitored and hence allows a safer alarm decision. Multi sensor technology allows but does imply the enhancement of fire detection systems in the desired directions. The crucial point is the evaluation and interpretation of the signals produced by the monitored phenomena. This signal processing (detection algorithm) mostly determines the detectors capabilities. Due to the availability of microcontrollers applicable to fire detector technology with its severe technical constraints (i.e. power consumption) modern signal processing techniques (neural networks, fuzzy logic) can be used. The paper presents a MSbFD algorithm using two fire parameters (temperature and optical smoke density). These two sensors were chosen since ionization systems may become increasingly difficult to apply because of the environmental regulations being imposed on them. The evaluation and processing of the sensor signals is carried out by the use of fuzzy logic. The concept of the algorithm is outlined and its performance and robustness in the fire and the non-fire case is shown by simulation results.
基于多传感器的火灾探测系统是当前火灾自动探测技术的重要发展方向之一。这一进展的两个主要目标是仍然不可接受的误报行为和改进火灾探测系统的火灾探测能力(即缩短探测时间)。在火灾探测器中使用多个传感器可以改善被监测环境的图像,从而允许更安全的报警决策。多传感器技术允许但确实意味着在期望的方向上增强火灾探测系统。关键是对被监测现象所产生的信号进行评价和解释。这种信号处理(检测算法)在很大程度上决定了探测器的性能。由于适用于具有严重技术限制(即功耗)的火灾探测器技术的微控制器的可用性,可以使用现代信号处理技术(神经网络,模糊逻辑)。本文提出了一种基于两个火灾参数(温度和光烟密度)的MSbFD算法。选择这两个传感器是因为电离系统可能会变得越来越难以应用,因为环境法规强加于他们。利用模糊逻辑对传感器信号进行评估和处理。概述了该算法的基本概念,并通过仿真结果验证了该算法在火灾和非火灾情况下的性能和鲁棒性。
{"title":"A robust fire detection algorithm for temperature and optical smoke density using fuzzy logic","authors":"H.C. Muller, A. Fischer","doi":"10.1109/CCST.1995.524912","DOIUrl":"https://doi.org/10.1109/CCST.1995.524912","url":null,"abstract":"Multi sensor based fire detection (MSbFD) systems are one of the important current developments in automatic fire detection technology. The two main objectives of this progress are the still unacceptable false alarm behaviour and improvements in the fire detection capabilities (i.e. shorter detection times) of fire detection systems. The use of more than one sensor in a fire detector gives an improved image of the environment monitored and hence allows a safer alarm decision. Multi sensor technology allows but does imply the enhancement of fire detection systems in the desired directions. The crucial point is the evaluation and interpretation of the signals produced by the monitored phenomena. This signal processing (detection algorithm) mostly determines the detectors capabilities. Due to the availability of microcontrollers applicable to fire detector technology with its severe technical constraints (i.e. power consumption) modern signal processing techniques (neural networks, fuzzy logic) can be used. The paper presents a MSbFD algorithm using two fire parameters (temperature and optical smoke density). These two sensors were chosen since ionization systems may become increasingly difficult to apply because of the environmental regulations being imposed on them. The evaluation and processing of the sensor signals is carried out by the use of fuzzy logic. The concept of the algorithm is outlined and its performance and robustness in the fire and the non-fire case is shown by simulation results.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115013814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Digital video storage for security applications 用于安全应用的数字视频存储
A. Mcleod
A summary of the drawbacks of video recorders in CCTV applications is presented. The paper continues with arguments for the use of digital video recording techniques. It describes the features of a digital system developed for car park entrance control which can be applied to all types of access control, incident capture and perimeter protection. Finally, the wider implications of the use of such technology is considered.
总结了录像机在CCTV应用中的不足之处。文章继续讨论了使用数字视频记录技术的理由。它描述了为停车场入口控制开发的数字系统的特点,该系统可应用于所有类型的访问控制,事件捕获和周边保护。最后,讨论了使用这种技术的更广泛的影响。
{"title":"Digital video storage for security applications","authors":"A. Mcleod","doi":"10.1109/CCST.1995.524939","DOIUrl":"https://doi.org/10.1109/CCST.1995.524939","url":null,"abstract":"A summary of the drawbacks of video recorders in CCTV applications is presented. The paper continues with arguments for the use of digital video recording techniques. It describes the features of a digital system developed for car park entrance control which can be applied to all types of access control, incident capture and perimeter protection. Finally, the wider implications of the use of such technology is considered.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115620854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
New developments in night-vision equipment and techniques 夜视设备和技术的新发展
R. Thompson
The continued loss of lucrative military contracts has caused western manufacturers of night-vision components and systems to review their marketing strategy. But the product range remains essentially unaltered and, as the equipment was originally designed for a military role, it can be unsuited to police use. The paper outlines the present state of low-light surveillance imaging and notes that although development work on image-intensifiers still continues, this work is likely to contract with the reduction in military sponsorship. It reports the use of Russian night-vision equipment by the criminal, the effect of this on police operations, and proposes a way forward for future research and development.
利润丰厚的军事合同的持续流失,已促使西方夜视组件和系统制造商重新审视自己的营销策略。但产品范围基本保持不变,由于该设备最初是为军事用途设计的,因此可能不适合警察使用。该文件概述了微光监视成像的现状,并指出尽管图像增强器的开发工作仍在继续,但这项工作可能会随着军事赞助的减少而减少。它报告了犯罪分子使用俄罗斯夜视设备的情况,以及这对警察行动的影响,并提出了未来研究和发展的方向。
{"title":"New developments in night-vision equipment and techniques","authors":"R. Thompson","doi":"10.1109/CCST.1995.524747","DOIUrl":"https://doi.org/10.1109/CCST.1995.524747","url":null,"abstract":"The continued loss of lucrative military contracts has caused western manufacturers of night-vision components and systems to review their marketing strategy. But the product range remains essentially unaltered and, as the equipment was originally designed for a military role, it can be unsuited to police use. The paper outlines the present state of low-light surveillance imaging and notes that although development work on image-intensifiers still continues, this work is likely to contract with the reduction in military sponsorship. It reports the use of Russian night-vision equipment by the criminal, the effect of this on police operations, and proposes a way forward for future research and development.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121201691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Searching for buried objects with surface penetrating radar 用地面穿透雷达搜索被埋物体
D. Daniels
This paper reviews the principles of surface penetrating radar, discusses the technical requirements for the individual sub-systems comprising a surface penetrating radar and provides examples of typical applications for the method. Continued technical improvements in system performance enable clearer radar images of the internal structure of materials to be obtained, thus advancing the application of the technique.
本文综述了表面穿透雷达的原理,讨论了组成表面穿透雷达的各个子系统的技术要求,并提供了该方法的典型应用实例。系统性能的持续技术改进使得能够获得更清晰的材料内部结构雷达图像,从而推进了该技术的应用。
{"title":"Searching for buried objects with surface penetrating radar","authors":"D. Daniels","doi":"10.1109/CCST.1995.524746","DOIUrl":"https://doi.org/10.1109/CCST.1995.524746","url":null,"abstract":"This paper reviews the principles of surface penetrating radar, discusses the technical requirements for the individual sub-systems comprising a surface penetrating radar and provides examples of typical applications for the method. Continued technical improvements in system performance enable clearer radar images of the internal structure of materials to be obtained, thus advancing the application of the technique.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116357390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using CLASP to assess perimeter security 使用CLASP评估外围安全性
C. Tarr, S. Peaty
The overall aim of any decisions concerning perimeter security is to strike a balance between security and cost. This necessitates making difficult choices between barriers, alarm systems and staff for patrol or response duties. A computer software package known as CLASP (Comparative Layout Analysis for Secure Perimeters) was developed to support this decision making process. It is based on a mathematical model that evaluates sets of performance measures, such as the chance of an escape, and the cost of construction, for a number of alternative perimeter arrangements.
任何有关外围安全性的决策的总体目标都是在安全性和成本之间取得平衡。这就需要在屏障、警报系统和巡逻或响应职责的人员之间做出艰难的选择。为支持这一决策过程,开发了一种称为CLASP(安全边界比较布局分析)的计算机软件包。它基于一个数学模型,该模型评估了一系列性能指标,例如逃生的机会和施工成本,以及许多替代的外围安排。
{"title":"Using CLASP to assess perimeter security","authors":"C. Tarr, S. Peaty","doi":"10.1109/CCST.1995.524929","DOIUrl":"https://doi.org/10.1109/CCST.1995.524929","url":null,"abstract":"The overall aim of any decisions concerning perimeter security is to strike a balance between security and cost. This necessitates making difficult choices between barriers, alarm systems and staff for patrol or response duties. A computer software package known as CLASP (Comparative Layout Analysis for Secure Perimeters) was developed to support this decision making process. It is based on a mathematical model that evaluates sets of performance measures, such as the chance of an escape, and the cost of construction, for a number of alternative perimeter arrangements.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122986535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Are infra red illuminators eye safe? 红外线照明器对眼睛安全吗?
H. Devereux, M. Smalley
Infra red lighting has become common place in providing illumination for surveillance systems. Manufacturers have developed better illuminators to provide greater range and have produced efficient optics for reducing visible illumination and enhancing the IR output. However little investigation into the harmful effects of infra red light has been carried out with reference to these illuminators, and hence no guidelines exist. The concern is focused on the fact that infra red light is not visible to the eye and hence the eye's normal protection system is incapable of reacting to the energy. Damage effects are well understood with regard to infra red radiation in the context of hot object viewing, as in the steel and forging application. With this in mind the Security Equipment Assessment Laboratory has considered IR illuminators and their harmful effects. The paper presents an overview of the current knowledge base and draws conclusions and recommendations on safe working and design practices.
红外照明在为监控系统提供照明方面已经成为常见的地方。制造商已经开发出更好的照明器,以提供更大的范围,并生产出有效的光学器件,以减少可见照明和提高红外输出。然而,对红外光的有害影响进行的调查很少涉及这些照明器,因此没有指导方针存在。人们关注的焦点是眼睛无法看到红外线,因此眼睛的正常保护系统无法对这种能量做出反应。在热物体观察的背景下,损伤效应很好地理解了红外辐射,如在钢铁和锻造应用中。考虑到这一点,安全设备评估实验室已经考虑了红外照明灯及其有害影响。本文概述了目前的知识库,并就安全工作和设计实践提出了结论和建议。
{"title":"Are infra red illuminators eye safe?","authors":"H. Devereux, M. Smalley","doi":"10.1109/CCST.1995.524954","DOIUrl":"https://doi.org/10.1109/CCST.1995.524954","url":null,"abstract":"Infra red lighting has become common place in providing illumination for surveillance systems. Manufacturers have developed better illuminators to provide greater range and have produced efficient optics for reducing visible illumination and enhancing the IR output. However little investigation into the harmful effects of infra red light has been carried out with reference to these illuminators, and hence no guidelines exist. The concern is focused on the fact that infra red light is not visible to the eye and hence the eye's normal protection system is incapable of reacting to the energy. Damage effects are well understood with regard to infra red radiation in the context of hot object viewing, as in the steel and forging application. With this in mind the Security Equipment Assessment Laboratory has considered IR illuminators and their harmful effects. The paper presents an overview of the current knowledge base and draws conclusions and recommendations on safe working and design practices.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126737733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Evidence quality imaging for bank security 银行安全证据质量成像
P. Gallagher, S. Doyle
A long standing problem within the banking security and law enforcement communities has been the inability to use the images recorded with conventional security cameras as definitive evidence in a court of law. The issue with affordable solid state or tube security cameras is the spatial resolution and gray scale resolution. Neither is sufficient. Alternatives using film cameras have proved too expensive and embarrassingly unreliable. The advancement of high resolution solid state cameras promises to overcome today's technological and economic barriers. A series of static tests of the EG&G Reticon model MD4013 camera in a major financial institution in Chicago, Illinois showed such good results that a full scale installation trial was initiated. This trial took place during the late winter through the summer of 1995. The paper first describes the million pixel CCD camera used in the customer's trial, then describes the image capture, storage and communications system used, and finally reports the results of the trial.
银行安全和执法部门长期存在的一个问题是,无法将传统安全摄像头拍摄的图像作为法庭上的确凿证据。价格实惠的固态或电子管安全摄像机的问题是空间分辨率和灰度分辨率。两者都不够。事实证明,使用胶片相机的替代品过于昂贵,而且令人尴尬地不可靠。高分辨率固态相机的进步有望克服当今的技术和经济障碍。EG&G Reticon型号MD4013摄像机在伊利诺伊州芝加哥市的一家大型金融机构进行了一系列静态测试,结果显示效果非常好,因此开始了全尺寸安装试验。审判在1995年冬末至夏季期间进行。本文首先介绍了客户试用中使用的百万像素CCD摄像机,然后介绍了所使用的图像采集、存储和通信系统,最后报告了试用结果。
{"title":"Evidence quality imaging for bank security","authors":"P. Gallagher, S. Doyle","doi":"10.1109/CCST.1995.524948","DOIUrl":"https://doi.org/10.1109/CCST.1995.524948","url":null,"abstract":"A long standing problem within the banking security and law enforcement communities has been the inability to use the images recorded with conventional security cameras as definitive evidence in a court of law. The issue with affordable solid state or tube security cameras is the spatial resolution and gray scale resolution. Neither is sufficient. Alternatives using film cameras have proved too expensive and embarrassingly unreliable. The advancement of high resolution solid state cameras promises to overcome today's technological and economic barriers. A series of static tests of the EG&G Reticon model MD4013 camera in a major financial institution in Chicago, Illinois showed such good results that a full scale installation trial was initiated. This trial took place during the late winter through the summer of 1995. The paper first describes the million pixel CCD camera used in the customer's trial, then describes the image capture, storage and communications system used, and finally reports the results of the trial.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126213540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of a neural network based transient classifier at monitoring an acoustic perimeter intruder detection system 基于神经网络的暂态分类器在声周界入侵者检测系统监测中的性能
N.H. Parsons
An investigation was carried out to evaluate the performance of a Multi-Layer Perceptron based neural network transient classifier for detecting attacks, using bolt cutters, on security fences. A tape containing acoustic recordings from fence mounted microphonic cable security systems was used in the investigation. The data was digitised and Fourier Transformed and the resulting spectrograms were subject to detailed examination, in conjunction with aural analysis, in order to deduce appropriate time/frequency resolution for distinguishing genuine attacks from background signals. This facilitated the selection of suitable candidate sets of processing parameters for the system. The data was then partitioned into training and test data. Normalised spectrograms were extracted from the training data and labelled appropriately as "Fencecut" or "Backgrnd" for use as training templates for the neural networks. A back-propagation algorithm was used for training the neural networks.
研究了一种基于多层感知器的神经网络暂态分类器的性能,用于检测使用断线钳对安全围栏的攻击。调查中使用了一盘载有围栏上安装的麦克风电缆保安系统的录音磁带。数据经过数字化和傅里叶变换,得到的频谱图经过详细的检查,结合听觉分析,以推断出适当的时间/频率分辨率,以区分真正的攻击和背景信号。这有助于为系统选择合适的候选处理参数集。然后将数据划分为训练数据和测试数据。从训练数据中提取归一化谱图,并适当地标记为“篱笆”或“背景”,以用作神经网络的训练模板。采用反向传播算法对神经网络进行训练。
{"title":"Performance of a neural network based transient classifier at monitoring an acoustic perimeter intruder detection system","authors":"N.H. Parsons","doi":"10.1109/CCST.1995.524726","DOIUrl":"https://doi.org/10.1109/CCST.1995.524726","url":null,"abstract":"An investigation was carried out to evaluate the performance of a Multi-Layer Perceptron based neural network transient classifier for detecting attacks, using bolt cutters, on security fences. A tape containing acoustic recordings from fence mounted microphonic cable security systems was used in the investigation. The data was digitised and Fourier Transformed and the resulting spectrograms were subject to detailed examination, in conjunction with aural analysis, in order to deduce appropriate time/frequency resolution for distinguishing genuine attacks from background signals. This facilitated the selection of suitable candidate sets of processing parameters for the system. The data was then partitioned into training and test data. Normalised spectrograms were extracted from the training data and labelled appropriately as \"Fencecut\" or \"Backgrnd\" for use as training templates for the neural networks. A back-propagation algorithm was used for training the neural networks.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126093283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1