Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524737
A. Ariyaeeinia, P. Sivakumaran
The effectiveness, for text-dependent speaker verification, of orthogonal instantaneous and transitional feature parameters of speech is investigated. Instantaneous spectral features are represented by cepstral coefficients obtained through a linear prediction analysis of speech. Transitional spectral information is characterised using differential cepstral coefficients. Sets of orthogonal parameters are obtained by applying an eigenvector analysis to instantaneous and transitional feature coefficients. The experimental work is based on the use of a subset of the BT Millar speech database, consisting of repetitions of isolated digit utterances 1 to 9 and zero spoken by twenty male speakers. The investigation includes an examination of the relative speaker discrimination abilities of the above two types of orthogonal feature parameters. It is shown experimentally that the equal error rate in verification can be reduced significantly by forming a spectral distance based on a combination of orthogonal instantaneous and transitional feature parameters. It is further demonstrated that, when the input utterance consists of a sequence of five digits, an equal error rate of less than 0.5% can be achieved.
{"title":"Effectiveness of orthogonal instantaneous and transitional feature parameters for speaker verification","authors":"A. Ariyaeeinia, P. Sivakumaran","doi":"10.1109/CCST.1995.524737","DOIUrl":"https://doi.org/10.1109/CCST.1995.524737","url":null,"abstract":"The effectiveness, for text-dependent speaker verification, of orthogonal instantaneous and transitional feature parameters of speech is investigated. Instantaneous spectral features are represented by cepstral coefficients obtained through a linear prediction analysis of speech. Transitional spectral information is characterised using differential cepstral coefficients. Sets of orthogonal parameters are obtained by applying an eigenvector analysis to instantaneous and transitional feature coefficients. The experimental work is based on the use of a subset of the BT Millar speech database, consisting of repetitions of isolated digit utterances 1 to 9 and zero spoken by twenty male speakers. The investigation includes an examination of the relative speaker discrimination abilities of the above two types of orthogonal feature parameters. It is shown experimentally that the equal error rate in verification can be reduced significantly by forming a spectral distance based on a combination of orthogonal instantaneous and transitional feature parameters. It is further demonstrated that, when the input utterance consists of a sequence of five digits, an equal error rate of less than 0.5% can be achieved.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122708029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524927
K. Harman
Discusses INTREPID Reflex Cable (RC) acoustic cable intrusion sensor technology. Prototype units have been tested on chain link fences at a number of sites under various environmental conditions. This paper presents results of this testing. There have been a number of papers that describe the problems associated with acoustic cable sensors on fences. A key problem has been excessive false alarms due to wind, rain and other environmental conditions. Variation in sensitivity due to the fence condition is a major problem. The ability of INTREPID MicroPoint Coax Cable sensor to locate the disturbance along the length of the sensor provides a means of effectively solving these problems.
{"title":"INTREPID fence disturbance sensor performance testing","authors":"K. Harman","doi":"10.1109/CCST.1995.524927","DOIUrl":"https://doi.org/10.1109/CCST.1995.524927","url":null,"abstract":"Discusses INTREPID Reflex Cable (RC) acoustic cable intrusion sensor technology. Prototype units have been tested on chain link fences at a number of sites under various environmental conditions. This paper presents results of this testing. There have been a number of papers that describe the problems associated with acoustic cable sensors on fences. A key problem has been excessive false alarms due to wind, rain and other environmental conditions. Variation in sensitivity due to the fence condition is a major problem. The ability of INTREPID MicroPoint Coax Cable sensor to locate the disturbance along the length of the sensor provides a means of effectively solving these problems.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117155288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524736
A. Lewcock
AEA Technology has developed a dynamic signature verification software called "Countermatch", for PCs. Use of an elastic pattern matching code allows a person's signature, captured electronically, to be compared against a reference "template", with a real or forged diagnosis being made in a little over one second. For three months, from September to November 1994, the software was tested by the Employment Service at two of their offices in the North of England. (The Employment Service is the UK Government Agency responsible for distributing unemployment benefit). During this time thousands of members of the public used it, as they signed when claiming unemployment benefit. The Employment Service now uses the software everyday at the offices. This paper reports on the experiences gained through such a large trial.
{"title":"Computerised signature verification","authors":"A. Lewcock","doi":"10.1109/CCST.1995.524736","DOIUrl":"https://doi.org/10.1109/CCST.1995.524736","url":null,"abstract":"AEA Technology has developed a dynamic signature verification software called \"Countermatch\", for PCs. Use of an elastic pattern matching code allows a person's signature, captured electronically, to be compared against a reference \"template\", with a real or forged diagnosis being made in a little over one second. For three months, from September to November 1994, the software was tested by the Employment Service at two of their offices in the North of England. (The Employment Service is the UK Government Agency responsible for distributing unemployment benefit). During this time thousands of members of the public used it, as they signed when claiming unemployment benefit. The Employment Service now uses the software everyday at the offices. This paper reports on the experiences gained through such a large trial.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123569282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524743
D. Lowe
The worldwide quick reaction deployment concept for the tactical automated security system (TASS) was demonstrated to have great value in a base defense operational exercise. TASS equipment was deployed and used as part of the Foal Eagle 94 exercise at Kunsan AB, Korea. The TASS functions of detection, data communication, annunciation, assessment and portable power were evaluated using prototype equipment. The results of the TASS operation during the exercise was very impressive. The friendly forces quickly incorporated the TASS equipment into their defensive operations and were able to intercept and neutralize approximately 80% of the aggressor force penetration attempts at the defensive perimeter.
{"title":"Tactical automated security system (TASS): operational concept field evaluation results","authors":"D. Lowe","doi":"10.1109/CCST.1995.524743","DOIUrl":"https://doi.org/10.1109/CCST.1995.524743","url":null,"abstract":"The worldwide quick reaction deployment concept for the tactical automated security system (TASS) was demonstrated to have great value in a base defense operational exercise. TASS equipment was deployed and used as part of the Foal Eagle 94 exercise at Kunsan AB, Korea. The TASS functions of detection, data communication, annunciation, assessment and portable power were evaluated using prototype equipment. The results of the TASS operation during the exercise was very impressive. The friendly forces quickly incorporated the TASS equipment into their defensive operations and were able to intercept and neutralize approximately 80% of the aggressor force penetration attempts at the defensive perimeter.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133061768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524728
I. Wassell, R. M. Rodger
The last line of defence in preventing an escape from a high security prison is often a wall. Walls can prevent escape, by providing both delay and deterrence. However, without any reliable form of associated detection system then interception can only be fortuitous. A paper study of the types of walls used by European Prison Services was undertaken for the Prison Service in August 1993. Simultaneously, work was being pursued on the redesign of walls and wall top devices for the highest category prisons in England. Both threads of work amalgamated in an evaluation programme that included Government scientists, engineers, Prison Officials and UK industry. Several samples of wall top devices and height adjustments were evaluated to learn the cost effectiveness of delay. Meanwhile, work was progressing on the development and evaluation of detection systems for mounting on wall tops. An earlier development between Government and industry had produced a system that had good detection performance, a low false alarm rate but was not used operationally due to cost considerations. This paper will review the work to date concentrating on the evaluation of both the wall top devices and the detection system. It will address some strengths and weaknesses and will also look at some operational considerations.
{"title":"Wall tops: operational considerations for barriers and detectors","authors":"I. Wassell, R. M. Rodger","doi":"10.1109/CCST.1995.524728","DOIUrl":"https://doi.org/10.1109/CCST.1995.524728","url":null,"abstract":"The last line of defence in preventing an escape from a high security prison is often a wall. Walls can prevent escape, by providing both delay and deterrence. However, without any reliable form of associated detection system then interception can only be fortuitous. A paper study of the types of walls used by European Prison Services was undertaken for the Prison Service in August 1993. Simultaneously, work was being pursued on the redesign of walls and wall top devices for the highest category prisons in England. Both threads of work amalgamated in an evaluation programme that included Government scientists, engineers, Prison Officials and UK industry. Several samples of wall top devices and height adjustments were evaluated to learn the cost effectiveness of delay. Meanwhile, work was progressing on the development and evaluation of detection systems for mounting on wall tops. An earlier development between Government and industry had produced a system that had good detection performance, a low false alarm rate but was not used operationally due to cost considerations. This paper will review the work to date concentrating on the evaluation of both the wall top devices and the detection system. It will address some strengths and weaknesses and will also look at some operational considerations.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129211259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524905
E. Greneker
There is growing interest in the United States in the protection of high value assets from aircraft intrusion. Aircraft technology has improved Helicopters can serve as an intruder transport, a highly mobile weapon platform, and an escape vehicle after an intrusion has been committed. The helicopter can also serve as a transport for a high value material asset that may be stolen. Fixed wing aircraft are also a threat. The suicide mission to destroy an asset or generate adverse publicity is credible. If there is sufficient runway, the fixed wing aircraft can serve as a transport of intruders into a protected site, an intruder escape vehicle, or a transport for a stolen high value asset. The runway for a short take off and landing (STOL) aircraft used as intrusion vehicle can be any cleared area, including roadways only 100 meters in length with obstructions 20 meters high at the end. There may be existing, in place aircraft detection sensors near most sites that can be used to detect an aircraft's presence and provide early warning. If not, there is another family of sensors that can detect, track, and classify detected aircraft as fixed wing or helicopter. This second class of sensor can be installed if high resolution tracking of a target is required. The paper discusses the principles of aircraft detection, reviews some of the technology presently on the market for aircraft detection, and presents test data to show the ranges at which aircraft can be detected by these types of sensors.
{"title":"Technology for the detection of airborne intruders approaching the high-security, high-value asset","authors":"E. Greneker","doi":"10.1109/CCST.1995.524905","DOIUrl":"https://doi.org/10.1109/CCST.1995.524905","url":null,"abstract":"There is growing interest in the United States in the protection of high value assets from aircraft intrusion. Aircraft technology has improved Helicopters can serve as an intruder transport, a highly mobile weapon platform, and an escape vehicle after an intrusion has been committed. The helicopter can also serve as a transport for a high value material asset that may be stolen. Fixed wing aircraft are also a threat. The suicide mission to destroy an asset or generate adverse publicity is credible. If there is sufficient runway, the fixed wing aircraft can serve as a transport of intruders into a protected site, an intruder escape vehicle, or a transport for a stolen high value asset. The runway for a short take off and landing (STOL) aircraft used as intrusion vehicle can be any cleared area, including roadways only 100 meters in length with obstructions 20 meters high at the end. There may be existing, in place aircraft detection sensors near most sites that can be used to detect an aircraft's presence and provide early warning. If not, there is another family of sensors that can detect, track, and classify detected aircraft as fixed wing or helicopter. This second class of sensor can be installed if high resolution tracking of a target is required. The paper discusses the principles of aircraft detection, reviews some of the technology presently on the market for aircraft detection, and presents test data to show the ranges at which aircraft can be detected by these types of sensors.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128375136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524928
B. W. Martin
Radio frequency (RF) based systems have been successfully deployed in personnel identification and access control applications where the tag read ranges are usually less than one meter. Such technology has also been used in the identification of assets such as raw and finished goods inventory. These assets are well controlled so that one meter or less read ranges are adequate. Attempts to apply RF technology to the problems of location, identification and control of assets and/or people within a facility have exposed the limitations of RF over longer read ranges. The tag to reader path is no longer homogeneous because walls, furnishings, and equipment introduce impairments to the simple direct propagation of RF energy, so that the presence of an RF signal at a receiver cannot be used as a reliable indication of location. This paper describes the WatchIt system which combines the transmission power of radio frequency with the containment control of infrared to accurately locate and track assets and personnel within facilities.
{"title":"WatchIt. A fully supervised identification, location and tracking system","authors":"B. W. Martin","doi":"10.1109/CCST.1995.524928","DOIUrl":"https://doi.org/10.1109/CCST.1995.524928","url":null,"abstract":"Radio frequency (RF) based systems have been successfully deployed in personnel identification and access control applications where the tag read ranges are usually less than one meter. Such technology has also been used in the identification of assets such as raw and finished goods inventory. These assets are well controlled so that one meter or less read ranges are adequate. Attempts to apply RF technology to the problems of location, identification and control of assets and/or people within a facility have exposed the limitations of RF over longer read ranges. The tag to reader path is no longer homogeneous because walls, furnishings, and equipment introduce impairments to the simple direct propagation of RF energy, so that the presence of an RF signal at a receiver cannot be used as a reliable indication of location. This paper describes the WatchIt system which combines the transmission power of radio frequency with the containment control of infrared to accurately locate and track assets and personnel within facilities.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131327920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524947
J. Aldridge
A Home Office Research and Development Project aimed at improving the operational effectiveness of closed circuit television (CCTV) safety and security systems was begun in April 1992. The main objectives were to: establish performance guidelines based on the picture quality and content needs of investigators and observers; develop methods of testing the performance of systems; and develop a method of analysing and documenting the needs of customers. This paper is primarily concerned with the last of these objectives which has led to the development of a structured analysis methodology for security problems. It outlines how such an operational requirement (OR) is produced. It illustrates its value at various stages of system acquisition and use: as a feasibility study tool, in the production of budgetary estimates, in pre-tender qualification, in system specification, for comparison of tenders, and in testing and commissioning. The paper indicates how the work is linked into the development of European standards and illustrates its wider application.
{"title":"Operational requirement analysis-a new approach to effective security","authors":"J. Aldridge","doi":"10.1109/CCST.1995.524947","DOIUrl":"https://doi.org/10.1109/CCST.1995.524947","url":null,"abstract":"A Home Office Research and Development Project aimed at improving the operational effectiveness of closed circuit television (CCTV) safety and security systems was begun in April 1992. The main objectives were to: establish performance guidelines based on the picture quality and content needs of investigators and observers; develop methods of testing the performance of systems; and develop a method of analysing and documenting the needs of customers. This paper is primarily concerned with the last of these objectives which has led to the development of a structured analysis methodology for security problems. It outlines how such an operational requirement (OR) is produced. It illustrates its value at various stages of system acquisition and use: as a feasibility study tool, in the production of budgetary estimates, in pre-tender qualification, in system specification, for comparison of tenders, and in testing and commissioning. The paper indicates how the work is linked into the development of European standards and illustrates its wider application.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123816351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524725
R. Clifton, B. G. Rich
Ported coaxial cable technology was first developed in the mid-1970's in response to a growing need for high performance covert sensors for perimeter intrusion detection. Technology development over the years has lead to a number of different sensor products that have seen wide-spread application. The original ported coaxial cable sensors went through several generations of improvements-primarily in response to experience gained from thousands of installations worldwide. These early generations were essentially refinements to the original products, intended to incrementally improve detection and invalid alarm performance and also to increase reliability. For perspective, this paper provides a very brief historical review of the ported coaxial cable sensors that have been commercialized to date and introduces two new and innovative sensor configurations that have recently emerged from research and development programs at Senstar Corporation. The first is a new "single-cable" networked sensor introduced to the market as S/spl infin/Trax which significantly reduces installation costs and complexity by eliminating the need for a second buried cable-while retaining the detection zone characteristics and performance established by the original sensors. The second is a "totally covert" configuration that takes advantage of recent advances in semiconductor technology to further simplify installation and also offers a growth path for joint domain and multiple sensor integration.
{"title":"Advances in ported coaxial cable technology","authors":"R. Clifton, B. G. Rich","doi":"10.1109/CCST.1995.524725","DOIUrl":"https://doi.org/10.1109/CCST.1995.524725","url":null,"abstract":"Ported coaxial cable technology was first developed in the mid-1970's in response to a growing need for high performance covert sensors for perimeter intrusion detection. Technology development over the years has lead to a number of different sensor products that have seen wide-spread application. The original ported coaxial cable sensors went through several generations of improvements-primarily in response to experience gained from thousands of installations worldwide. These early generations were essentially refinements to the original products, intended to incrementally improve detection and invalid alarm performance and also to increase reliability. For perspective, this paper provides a very brief historical review of the ported coaxial cable sensors that have been commercialized to date and introduces two new and innovative sensor configurations that have recently emerged from research and development programs at Senstar Corporation. The first is a new \"single-cable\" networked sensor introduced to the market as S/spl infin/Trax which significantly reduces installation costs and complexity by eliminating the need for a second buried cable-while retaining the detection zone characteristics and performance established by the original sensors. The second is a \"totally covert\" configuration that takes advantage of recent advances in semiconductor technology to further simplify installation and also offers a growth path for joint domain and multiple sensor integration.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"298 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134342714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1995-10-18DOI: 10.1109/CCST.1995.524952
J.P. Dolt
Expert evidence is produced by having recourse to the forensic sciences. It helps to decide of the innocence or guilt of the judged by jurors of the French courts. It is necessary to study if those accused do have at their disposal enough guarantees when forensic sciences are used in criminal trials. Accused should at least benefit by two guarantees when expert evidence is used in front of French criminal courts: first the expertises are executed by specialists and so should be reliable: then, expertises should be normally controlled by the occasional magistrates (i.e. jurors). The reliability of expertises depends on the personal qualities of the expert (intelligence, professional conscientiousness, ability) and the method used for the valuation. Concerning jurors control on expertises, the study tries to show that jurors are not able to appraise expert evidence, because of their ignorance relating to forensic sciences. In fact, their conviction is determined by the pressure exerted on them by public opinion and by the impressions created in court by experts. All these remarks lead to conclude that it is necessary to suppress the jury institution in French criminal courts and to replace it by professional magistrates specialized in criminal law and forensic sciences.
{"title":"The place of expert evidence in French criminal courts","authors":"J.P. Dolt","doi":"10.1109/CCST.1995.524952","DOIUrl":"https://doi.org/10.1109/CCST.1995.524952","url":null,"abstract":"Expert evidence is produced by having recourse to the forensic sciences. It helps to decide of the innocence or guilt of the judged by jurors of the French courts. It is necessary to study if those accused do have at their disposal enough guarantees when forensic sciences are used in criminal trials. Accused should at least benefit by two guarantees when expert evidence is used in front of French criminal courts: first the expertises are executed by specialists and so should be reliable: then, expertises should be normally controlled by the occasional magistrates (i.e. jurors). The reliability of expertises depends on the personal qualities of the expert (intelligence, professional conscientiousness, ability) and the method used for the valuation. Concerning jurors control on expertises, the study tries to show that jurors are not able to appraise expert evidence, because of their ignorance relating to forensic sciences. In fact, their conviction is determined by the pressure exerted on them by public opinion and by the impressions created in court by experts. All these remarks lead to conclude that it is necessary to suppress the jury institution in French criminal courts and to replace it by professional magistrates specialized in criminal law and forensic sciences.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134316144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}