首页 > 最新文献

Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology最新文献

英文 中文
Effectiveness of orthogonal instantaneous and transitional feature parameters for speaker verification 正交瞬时和过渡特征参数在说话人验证中的有效性
A. Ariyaeeinia, P. Sivakumaran
The effectiveness, for text-dependent speaker verification, of orthogonal instantaneous and transitional feature parameters of speech is investigated. Instantaneous spectral features are represented by cepstral coefficients obtained through a linear prediction analysis of speech. Transitional spectral information is characterised using differential cepstral coefficients. Sets of orthogonal parameters are obtained by applying an eigenvector analysis to instantaneous and transitional feature coefficients. The experimental work is based on the use of a subset of the BT Millar speech database, consisting of repetitions of isolated digit utterances 1 to 9 and zero spoken by twenty male speakers. The investigation includes an examination of the relative speaker discrimination abilities of the above two types of orthogonal feature parameters. It is shown experimentally that the equal error rate in verification can be reduced significantly by forming a spectral distance based on a combination of orthogonal instantaneous and transitional feature parameters. It is further demonstrated that, when the input utterance consists of a sequence of five digits, an equal error rate of less than 0.5% can be achieved.
研究了语音瞬时特征参数和过渡特征参数正交方法在文本依赖说话人验证中的有效性。瞬时频谱特征由语音线性预测分析得到的倒谱系数表示。过渡光谱信息是用微分倒谱系数表征的。通过对瞬时和过渡特征系数进行特征向量分析,得到正交参数集。这项实验工作是基于使用英国电信米勒语音数据库的一个子集,由20名男性说话者重复的孤立的数字话语1到9和0组成。研究包括对上述两类正交特征参数的相对说话人识别能力的检验。实验表明,基于正交瞬时特征参数和过渡特征参数组合形成光谱距离,可以显著降低验证中的等错误率。进一步证明,当输入话语由五位数序列组成时,可以实现小于0.5%的相等错误率。
{"title":"Effectiveness of orthogonal instantaneous and transitional feature parameters for speaker verification","authors":"A. Ariyaeeinia, P. Sivakumaran","doi":"10.1109/CCST.1995.524737","DOIUrl":"https://doi.org/10.1109/CCST.1995.524737","url":null,"abstract":"The effectiveness, for text-dependent speaker verification, of orthogonal instantaneous and transitional feature parameters of speech is investigated. Instantaneous spectral features are represented by cepstral coefficients obtained through a linear prediction analysis of speech. Transitional spectral information is characterised using differential cepstral coefficients. Sets of orthogonal parameters are obtained by applying an eigenvector analysis to instantaneous and transitional feature coefficients. The experimental work is based on the use of a subset of the BT Millar speech database, consisting of repetitions of isolated digit utterances 1 to 9 and zero spoken by twenty male speakers. The investigation includes an examination of the relative speaker discrimination abilities of the above two types of orthogonal feature parameters. It is shown experimentally that the equal error rate in verification can be reduced significantly by forming a spectral distance based on a combination of orthogonal instantaneous and transitional feature parameters. It is further demonstrated that, when the input utterance consists of a sequence of five digits, an equal error rate of less than 0.5% can be achieved.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122708029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
INTREPID fence disturbance sensor performance testing INTREPID栅栏干扰传感器性能测试
K. Harman
Discusses INTREPID Reflex Cable (RC) acoustic cable intrusion sensor technology. Prototype units have been tested on chain link fences at a number of sites under various environmental conditions. This paper presents results of this testing. There have been a number of papers that describe the problems associated with acoustic cable sensors on fences. A key problem has been excessive false alarms due to wind, rain and other environmental conditions. Variation in sensitivity due to the fence condition is a major problem. The ability of INTREPID MicroPoint Coax Cable sensor to locate the disturbance along the length of the sensor provides a means of effectively solving these problems.
讨论了INTREPID反射电缆(RC)声电缆入侵传感器技术。原型装置已经在各种环境条件下的许多地点的链环围栏上进行了测试。本文给出了该测试的结果。已经有许多论文描述了与围栏上的声学电缆传感器相关的问题。一个关键问题是由于风、雨和其他环境条件造成的过多误报。由于围栏条件引起的灵敏度变化是一个主要问题。INTREPID微点同轴电缆传感器沿传感器长度定位干扰的能力为有效解决这些问题提供了一种手段。
{"title":"INTREPID fence disturbance sensor performance testing","authors":"K. Harman","doi":"10.1109/CCST.1995.524927","DOIUrl":"https://doi.org/10.1109/CCST.1995.524927","url":null,"abstract":"Discusses INTREPID Reflex Cable (RC) acoustic cable intrusion sensor technology. Prototype units have been tested on chain link fences at a number of sites under various environmental conditions. This paper presents results of this testing. There have been a number of papers that describe the problems associated with acoustic cable sensors on fences. A key problem has been excessive false alarms due to wind, rain and other environmental conditions. Variation in sensitivity due to the fence condition is a major problem. The ability of INTREPID MicroPoint Coax Cable sensor to locate the disturbance along the length of the sensor provides a means of effectively solving these problems.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117155288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Computerised signature verification 电脑化签名验证
A. Lewcock
AEA Technology has developed a dynamic signature verification software called "Countermatch", for PCs. Use of an elastic pattern matching code allows a person's signature, captured electronically, to be compared against a reference "template", with a real or forged diagnosis being made in a little over one second. For three months, from September to November 1994, the software was tested by the Employment Service at two of their offices in the North of England. (The Employment Service is the UK Government Agency responsible for distributing unemployment benefit). During this time thousands of members of the public used it, as they signed when claiming unemployment benefit. The Employment Service now uses the software everyday at the offices. This paper reports on the experiences gained through such a large trial.
AEA科技公司为个人电脑开发了一款名为“Countermatch”的动态签名验证软件。使用弹性模式匹配代码,可以通过电子方式捕获一个人的签名,与参考“模板”进行比较,在一秒钟多一点的时间内做出真实或伪造的诊断。从1994年9月到11月的三个月里,就业服务处在其位于英格兰北部的两个办事处对该软件进行了测试。(就业服务局是负责发放失业救济金的英国政府机构)。在此期间,成千上万的公众成员在申请失业救济金时使用了它。就业服务中心现在每天都在办公室使用这个软件。本文报告了通过如此大规模的试验所获得的经验。
{"title":"Computerised signature verification","authors":"A. Lewcock","doi":"10.1109/CCST.1995.524736","DOIUrl":"https://doi.org/10.1109/CCST.1995.524736","url":null,"abstract":"AEA Technology has developed a dynamic signature verification software called \"Countermatch\", for PCs. Use of an elastic pattern matching code allows a person's signature, captured electronically, to be compared against a reference \"template\", with a real or forged diagnosis being made in a little over one second. For three months, from September to November 1994, the software was tested by the Employment Service at two of their offices in the North of England. (The Employment Service is the UK Government Agency responsible for distributing unemployment benefit). During this time thousands of members of the public used it, as they signed when claiming unemployment benefit. The Employment Service now uses the software everyday at the offices. This paper reports on the experiences gained through such a large trial.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123569282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Tactical automated security system (TASS): operational concept field evaluation results 战术自动化安全系统(TASS):作战概念现场评估结果
D. Lowe
The worldwide quick reaction deployment concept for the tactical automated security system (TASS) was demonstrated to have great value in a base defense operational exercise. TASS equipment was deployed and used as part of the Foal Eagle 94 exercise at Kunsan AB, Korea. The TASS functions of detection, data communication, annunciation, assessment and portable power were evaluated using prototype equipment. The results of the TASS operation during the exercise was very impressive. The friendly forces quickly incorporated the TASS equipment into their defensive operations and were able to intercept and neutralize approximately 80% of the aggressor force penetration attempts at the defensive perimeter.
战术自动化安全系统(TASS)的全球快速反应部署概念在基地防御作战演习中被证明具有巨大价值。TASS装备是在韩国群山基地的鹞鹰94演习中部署和使用的。利用样机对TASS的检测、数据通信、报信、评估和移动电源功能进行了评估。演习中,塔斯系统的操作效果令人印象深刻。友军迅速将TASS装备纳入其防御行动,并能够拦截和中和大约80%的侵略者在防御周界的渗透企图。
{"title":"Tactical automated security system (TASS): operational concept field evaluation results","authors":"D. Lowe","doi":"10.1109/CCST.1995.524743","DOIUrl":"https://doi.org/10.1109/CCST.1995.524743","url":null,"abstract":"The worldwide quick reaction deployment concept for the tactical automated security system (TASS) was demonstrated to have great value in a base defense operational exercise. TASS equipment was deployed and used as part of the Foal Eagle 94 exercise at Kunsan AB, Korea. The TASS functions of detection, data communication, annunciation, assessment and portable power were evaluated using prototype equipment. The results of the TASS operation during the exercise was very impressive. The friendly forces quickly incorporated the TASS equipment into their defensive operations and were able to intercept and neutralize approximately 80% of the aggressor force penetration attempts at the defensive perimeter.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133061768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wall tops: operational considerations for barriers and detectors 墙顶:屏障和探测器的操作考虑
I. Wassell, R. M. Rodger
The last line of defence in preventing an escape from a high security prison is often a wall. Walls can prevent escape, by providing both delay and deterrence. However, without any reliable form of associated detection system then interception can only be fortuitous. A paper study of the types of walls used by European Prison Services was undertaken for the Prison Service in August 1993. Simultaneously, work was being pursued on the redesign of walls and wall top devices for the highest category prisons in England. Both threads of work amalgamated in an evaluation programme that included Government scientists, engineers, Prison Officials and UK industry. Several samples of wall top devices and height adjustments were evaluated to learn the cost effectiveness of delay. Meanwhile, work was progressing on the development and evaluation of detection systems for mounting on wall tops. An earlier development between Government and industry had produced a system that had good detection performance, a low false alarm rate but was not used operationally due to cost considerations. This paper will review the work to date concentrating on the evaluation of both the wall top devices and the detection system. It will address some strengths and weaknesses and will also look at some operational considerations.
防止犯人从戒备森严的监狱逃跑的最后一道防线通常是一堵墙。墙壁可以通过提供延迟和威慑来阻止逃跑。然而,如果没有任何可靠的相关检测系统,那么拦截只能是偶然的。1993年8月为欧洲监狱服务处进行了一项关于欧洲监狱服务处使用的墙壁类型的书面研究。同时,正在进行重新设计英格兰最高级别监狱的墙壁和墙顶装置的工作。这两方面的工作合并在一个评估方案中,其中包括政府科学家、工程师、监狱官员和英国工业界。评估了几个墙顶装置和高度调整的样本,以了解延迟的成本效益。同时,开发和评价安装在墙顶的探测系统的工作正在取得进展。政府和工业界之间的早期发展产生了一种系统,该系统具有良好的探测性能,误报率低,但由于成本考虑而没有在操作中使用。本文将回顾迄今为止的工作,重点是对墙顶装置和检测系统的评估。它将讨论一些优势和劣势,还将考虑一些操作方面的考虑。
{"title":"Wall tops: operational considerations for barriers and detectors","authors":"I. Wassell, R. M. Rodger","doi":"10.1109/CCST.1995.524728","DOIUrl":"https://doi.org/10.1109/CCST.1995.524728","url":null,"abstract":"The last line of defence in preventing an escape from a high security prison is often a wall. Walls can prevent escape, by providing both delay and deterrence. However, without any reliable form of associated detection system then interception can only be fortuitous. A paper study of the types of walls used by European Prison Services was undertaken for the Prison Service in August 1993. Simultaneously, work was being pursued on the redesign of walls and wall top devices for the highest category prisons in England. Both threads of work amalgamated in an evaluation programme that included Government scientists, engineers, Prison Officials and UK industry. Several samples of wall top devices and height adjustments were evaluated to learn the cost effectiveness of delay. Meanwhile, work was progressing on the development and evaluation of detection systems for mounting on wall tops. An earlier development between Government and industry had produced a system that had good detection performance, a low false alarm rate but was not used operationally due to cost considerations. This paper will review the work to date concentrating on the evaluation of both the wall top devices and the detection system. It will address some strengths and weaknesses and will also look at some operational considerations.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129211259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technology for the detection of airborne intruders approaching the high-security, high-value asset 探测接近高安全、高价值资产的空中入侵者的技术
E. Greneker
There is growing interest in the United States in the protection of high value assets from aircraft intrusion. Aircraft technology has improved Helicopters can serve as an intruder transport, a highly mobile weapon platform, and an escape vehicle after an intrusion has been committed. The helicopter can also serve as a transport for a high value material asset that may be stolen. Fixed wing aircraft are also a threat. The suicide mission to destroy an asset or generate adverse publicity is credible. If there is sufficient runway, the fixed wing aircraft can serve as a transport of intruders into a protected site, an intruder escape vehicle, or a transport for a stolen high value asset. The runway for a short take off and landing (STOL) aircraft used as intrusion vehicle can be any cleared area, including roadways only 100 meters in length with obstructions 20 meters high at the end. There may be existing, in place aircraft detection sensors near most sites that can be used to detect an aircraft's presence and provide early warning. If not, there is another family of sensors that can detect, track, and classify detected aircraft as fixed wing or helicopter. This second class of sensor can be installed if high resolution tracking of a target is required. The paper discusses the principles of aircraft detection, reviews some of the technology presently on the market for aircraft detection, and presents test data to show the ranges at which aircraft can be detected by these types of sensors.
在美国,保护高价值资产免受飞机入侵的兴趣越来越大。飞机技术已经得到改进,直升机可以作为入侵者运输工具、高度机动的武器平台和入侵发生后的逃逸车辆。直升机也可以作为可能被盗的高价值物质资产的运输工具。固定翼飞机也是一个威胁。摧毁资产或制造负面宣传的自杀式任务是可信的。如果有足够的跑道,固定翼飞机可以作为入侵者进入受保护地点的运输工具,入侵者逃离车辆,或运输被盗的高价值资产。短距起降飞机(短距起降飞机)的跑道可以是任何被清除的区域,包括长度只有100米的道路,尽头有20米高的障碍物。在大多数地点附近可能有现有的飞机探测传感器,可用于探测飞机的存在并提供早期预警。如果没有,还有另一类传感器可以探测、跟踪和分类被探测到的飞机,如固定翼飞机或直升机。如果需要对目标进行高分辨率跟踪,则可以安装第二类传感器。本文讨论了飞机探测的原理,回顾了目前市场上用于飞机探测的一些技术,并提供了测试数据,以显示这些类型的传感器可以探测到飞机的范围。
{"title":"Technology for the detection of airborne intruders approaching the high-security, high-value asset","authors":"E. Greneker","doi":"10.1109/CCST.1995.524905","DOIUrl":"https://doi.org/10.1109/CCST.1995.524905","url":null,"abstract":"There is growing interest in the United States in the protection of high value assets from aircraft intrusion. Aircraft technology has improved Helicopters can serve as an intruder transport, a highly mobile weapon platform, and an escape vehicle after an intrusion has been committed. The helicopter can also serve as a transport for a high value material asset that may be stolen. Fixed wing aircraft are also a threat. The suicide mission to destroy an asset or generate adverse publicity is credible. If there is sufficient runway, the fixed wing aircraft can serve as a transport of intruders into a protected site, an intruder escape vehicle, or a transport for a stolen high value asset. The runway for a short take off and landing (STOL) aircraft used as intrusion vehicle can be any cleared area, including roadways only 100 meters in length with obstructions 20 meters high at the end. There may be existing, in place aircraft detection sensors near most sites that can be used to detect an aircraft's presence and provide early warning. If not, there is another family of sensors that can detect, track, and classify detected aircraft as fixed wing or helicopter. This second class of sensor can be installed if high resolution tracking of a target is required. The paper discusses the principles of aircraft detection, reviews some of the technology presently on the market for aircraft detection, and presents test data to show the ranges at which aircraft can be detected by these types of sensors.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128375136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WatchIt. A fully supervised identification, location and tracking system WatchIt。一个完全监督的识别、定位和跟踪系统
B. W. Martin
Radio frequency (RF) based systems have been successfully deployed in personnel identification and access control applications where the tag read ranges are usually less than one meter. Such technology has also been used in the identification of assets such as raw and finished goods inventory. These assets are well controlled so that one meter or less read ranges are adequate. Attempts to apply RF technology to the problems of location, identification and control of assets and/or people within a facility have exposed the limitations of RF over longer read ranges. The tag to reader path is no longer homogeneous because walls, furnishings, and equipment introduce impairments to the simple direct propagation of RF energy, so that the presence of an RF signal at a receiver cannot be used as a reliable indication of location. This paper describes the WatchIt system which combines the transmission power of radio frequency with the containment control of infrared to accurately locate and track assets and personnel within facilities.
基于射频(RF)的系统已经成功地部署在人员识别和访问控制应用中,其中标签读取范围通常小于一米。这种技术也被用于识别资产,如原材料和成品库存。这些资产控制良好,因此1米或更小的读取范围就足够了。试图将射频技术应用于设施内资产和/或人员的定位、识别和控制问题,暴露了射频在较长读取范围内的局限性。标签到阅读器的路径不再是均匀的,因为墙壁、家具和设备会对射频能量的简单直接传播造成损害,因此接收器上射频信号的存在不能作为位置的可靠指示。本文介绍了WatchIt系统,该系统将射频的发射功率与红外的遏制控制相结合,可以准确地定位和跟踪设施内的资产和人员。
{"title":"WatchIt. A fully supervised identification, location and tracking system","authors":"B. W. Martin","doi":"10.1109/CCST.1995.524928","DOIUrl":"https://doi.org/10.1109/CCST.1995.524928","url":null,"abstract":"Radio frequency (RF) based systems have been successfully deployed in personnel identification and access control applications where the tag read ranges are usually less than one meter. Such technology has also been used in the identification of assets such as raw and finished goods inventory. These assets are well controlled so that one meter or less read ranges are adequate. Attempts to apply RF technology to the problems of location, identification and control of assets and/or people within a facility have exposed the limitations of RF over longer read ranges. The tag to reader path is no longer homogeneous because walls, furnishings, and equipment introduce impairments to the simple direct propagation of RF energy, so that the presence of an RF signal at a receiver cannot be used as a reliable indication of location. This paper describes the WatchIt system which combines the transmission power of radio frequency with the containment control of infrared to accurately locate and track assets and personnel within facilities.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131327920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Operational requirement analysis-a new approach to effective security 操作需求分析——有效安全的新途径
J. Aldridge
A Home Office Research and Development Project aimed at improving the operational effectiveness of closed circuit television (CCTV) safety and security systems was begun in April 1992. The main objectives were to: establish performance guidelines based on the picture quality and content needs of investigators and observers; develop methods of testing the performance of systems; and develop a method of analysing and documenting the needs of customers. This paper is primarily concerned with the last of these objectives which has led to the development of a structured analysis methodology for security problems. It outlines how such an operational requirement (OR) is produced. It illustrates its value at various stages of system acquisition and use: as a feasibility study tool, in the production of budgetary estimates, in pre-tender qualification, in system specification, for comparison of tenders, and in testing and commissioning. The paper indicates how the work is linked into the development of European standards and illustrates its wider application.
1992年4月开始了一个内政部研究和发展项目,目的是提高闭路电视安全和保安系统的业务效率。主要目标是:根据调查人员和观察员的图像质量和内容需要制定工作准则;开发测试系统性能的方法;开发一种分析和记录客户需求的方法。本文主要关注这些目标中的最后一个,它导致了安全问题结构化分析方法的发展。它概述了如何产生这样的操作需求(OR)。它说明了它在系统获取和使用的各个阶段的价值:作为可行性研究工具,在预算概算的制作中,在投标前的资格鉴定中,在系统规格中,在投标的比较中,以及在测试和调试中。本文指出了这项工作是如何与欧洲标准的发展相联系的,并说明了其更广泛的应用。
{"title":"Operational requirement analysis-a new approach to effective security","authors":"J. Aldridge","doi":"10.1109/CCST.1995.524947","DOIUrl":"https://doi.org/10.1109/CCST.1995.524947","url":null,"abstract":"A Home Office Research and Development Project aimed at improving the operational effectiveness of closed circuit television (CCTV) safety and security systems was begun in April 1992. The main objectives were to: establish performance guidelines based on the picture quality and content needs of investigators and observers; develop methods of testing the performance of systems; and develop a method of analysing and documenting the needs of customers. This paper is primarily concerned with the last of these objectives which has led to the development of a structured analysis methodology for security problems. It outlines how such an operational requirement (OR) is produced. It illustrates its value at various stages of system acquisition and use: as a feasibility study tool, in the production of budgetary estimates, in pre-tender qualification, in system specification, for comparison of tenders, and in testing and commissioning. The paper indicates how the work is linked into the development of European standards and illustrates its wider application.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123816351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Advances in ported coaxial cable technology 端口同轴电缆技术的进展
R. Clifton, B. G. Rich
Ported coaxial cable technology was first developed in the mid-1970's in response to a growing need for high performance covert sensors for perimeter intrusion detection. Technology development over the years has lead to a number of different sensor products that have seen wide-spread application. The original ported coaxial cable sensors went through several generations of improvements-primarily in response to experience gained from thousands of installations worldwide. These early generations were essentially refinements to the original products, intended to incrementally improve detection and invalid alarm performance and also to increase reliability. For perspective, this paper provides a very brief historical review of the ported coaxial cable sensors that have been commercialized to date and introduces two new and innovative sensor configurations that have recently emerged from research and development programs at Senstar Corporation. The first is a new "single-cable" networked sensor introduced to the market as S/spl infin/Trax which significantly reduces installation costs and complexity by eliminating the need for a second buried cable-while retaining the detection zone characteristics and performance established by the original sensors. The second is a "totally covert" configuration that takes advantage of recent advances in semiconductor technology to further simplify installation and also offers a growth path for joint domain and multiple sensor integration.
端口同轴电缆技术最初是在20世纪70年代中期开发的,以响应对用于周边入侵检测的高性能隐蔽传感器日益增长的需求。多年来的技术发展已经导致了许多不同的传感器产品已经看到了广泛的应用。最初的端口同轴电缆传感器经历了几代的改进,主要是根据全球数千个安装的经验。这些早期产品基本上是对原始产品的改进,旨在逐步改进检测和无效报警性能,并提高可靠性。从角度来看,本文提供了迄今为止已经商业化的端口同轴电缆传感器的非常简短的历史回顾,并介绍了最近从Senstar公司的研究和开发计划中出现的两种新的创新传感器配置。第一种是市场上推出的新型“单电缆”网络传感器,名为S/spl infin/Trax,通过消除对第二根埋地电缆的需求,显著降低了安装成本和复杂性,同时保留了原始传感器所建立的检测区域特性和性能。第二种是“完全隐蔽”的配置,它利用了半导体技术的最新进展,进一步简化了安装,并为联合域和多个传感器集成提供了增长路径。
{"title":"Advances in ported coaxial cable technology","authors":"R. Clifton, B. G. Rich","doi":"10.1109/CCST.1995.524725","DOIUrl":"https://doi.org/10.1109/CCST.1995.524725","url":null,"abstract":"Ported coaxial cable technology was first developed in the mid-1970's in response to a growing need for high performance covert sensors for perimeter intrusion detection. Technology development over the years has lead to a number of different sensor products that have seen wide-spread application. The original ported coaxial cable sensors went through several generations of improvements-primarily in response to experience gained from thousands of installations worldwide. These early generations were essentially refinements to the original products, intended to incrementally improve detection and invalid alarm performance and also to increase reliability. For perspective, this paper provides a very brief historical review of the ported coaxial cable sensors that have been commercialized to date and introduces two new and innovative sensor configurations that have recently emerged from research and development programs at Senstar Corporation. The first is a new \"single-cable\" networked sensor introduced to the market as S/spl infin/Trax which significantly reduces installation costs and complexity by eliminating the need for a second buried cable-while retaining the detection zone characteristics and performance established by the original sensors. The second is a \"totally covert\" configuration that takes advantage of recent advances in semiconductor technology to further simplify installation and also offers a growth path for joint domain and multiple sensor integration.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"298 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134342714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The place of expert evidence in French criminal courts 专家证据在法国刑事法庭上的地位
J.P. Dolt
Expert evidence is produced by having recourse to the forensic sciences. It helps to decide of the innocence or guilt of the judged by jurors of the French courts. It is necessary to study if those accused do have at their disposal enough guarantees when forensic sciences are used in criminal trials. Accused should at least benefit by two guarantees when expert evidence is used in front of French criminal courts: first the expertises are executed by specialists and so should be reliable: then, expertises should be normally controlled by the occasional magistrates (i.e. jurors). The reliability of expertises depends on the personal qualities of the expert (intelligence, professional conscientiousness, ability) and the method used for the valuation. Concerning jurors control on expertises, the study tries to show that jurors are not able to appraise expert evidence, because of their ignorance relating to forensic sciences. In fact, their conviction is determined by the pressure exerted on them by public opinion and by the impressions created in court by experts. All these remarks lead to conclude that it is necessary to suppress the jury institution in French criminal courts and to replace it by professional magistrates specialized in criminal law and forensic sciences.
专家证据是通过诉诸法医科学而产生的。它有助于法国法院的陪审员判断被告是否有罪。有必要研究在刑事审判中使用法医科学时,被告是否有足够的保障。当专家证据在法国刑事法庭上使用时,被告至少应该从两个保证中受益:首先,专家是由专家执行的,因此应该是可靠的;其次,专家通常应该由偶尔的地方法官(即陪审员)控制。专家的可靠性取决于专家的个人素质(智力、专业责任心、能力)和评估所用的方法。关于陪审员对专家的控制,该研究试图表明陪审员无法评估专家证据,因为他们对法医学一无所知。事实上,他们的定罪是由公众舆论施加给他们的压力和专家在法庭上造成的印象决定的。所有这些言论都使我们得出结论,认为有必要取消法国刑事法院的陪审制度,并以专门从事刑法和法医科学的专业治安法官取而代之。
{"title":"The place of expert evidence in French criminal courts","authors":"J.P. Dolt","doi":"10.1109/CCST.1995.524952","DOIUrl":"https://doi.org/10.1109/CCST.1995.524952","url":null,"abstract":"Expert evidence is produced by having recourse to the forensic sciences. It helps to decide of the innocence or guilt of the judged by jurors of the French courts. It is necessary to study if those accused do have at their disposal enough guarantees when forensic sciences are used in criminal trials. Accused should at least benefit by two guarantees when expert evidence is used in front of French criminal courts: first the expertises are executed by specialists and so should be reliable: then, expertises should be normally controlled by the occasional magistrates (i.e. jurors). The reliability of expertises depends on the personal qualities of the expert (intelligence, professional conscientiousness, ability) and the method used for the valuation. Concerning jurors control on expertises, the study tries to show that jurors are not able to appraise expert evidence, because of their ignorance relating to forensic sciences. In fact, their conviction is determined by the pressure exerted on them by public opinion and by the impressions created in court by experts. All these remarks lead to conclude that it is necessary to suppress the jury institution in French criminal courts and to replace it by professional magistrates specialized in criminal law and forensic sciences.","PeriodicalId":376576,"journal":{"name":"Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1995-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134316144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings The Institute of Electrical and Electronics Engineers. 29th Annual 1995 International Carnahan Conference on Security Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1