首页 > 最新文献

1993 Proceedings of IEEE International Carnahan Conference on Security Technology最新文献

英文 中文
Adsorption/desorption GC assisted with retention index comparison of peaks for the identification of accelerants in fire residues 吸附/解吸气相色谱法对火焰残留物中助燃剂的保留指数进行了峰间比较
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386818
W.-T. Chang, Y. Giang, C. Wang, C.-W. Huang
The authors present both an efficient sample preparation procedure and a highly discriminating gas chromatographic (GC) method for the identification of accelerants in fire residues. A purge-and-trap concentrator fitted with a carbotrap adsorbent tube was used to preconcentrate the accelerants from various fire residues. The resultant sample tubes were submitted to a thermal desorption unit (TDU) which was connected to a dual wide-bore capillary column GC. The identification of the accelerants was based on both a retention indices comparison and chromatogram pattern recognition. The advantages and disadvantages of this dynamic adsorption/desorption procedure were evaluated by comparison with other pretreatment procedures such as charcoal tube adsorption/CS/sub 2/ extraction and continuous steam distillation.<>
作者提出了一种高效的样品制备方法和一种高鉴别的气相色谱(GC)方法,用于鉴定火渣中的促进剂。采用一种装有碳捕集器吸附管的净化捕集器对各种火渣中的促进剂进行了预浓缩。所得的样品管被提交到热解吸装置(TDU),该装置连接到双宽孔毛细管柱GC。通过保留指数比较和色谱模式识别对助剂进行了鉴定。通过与炭管吸附/CS/sub - 2/萃取和连续蒸汽蒸馏等预处理工艺的比较,评价了该动态吸附/解吸工艺的优缺点。
{"title":"Adsorption/desorption GC assisted with retention index comparison of peaks for the identification of accelerants in fire residues","authors":"W.-T. Chang, Y. Giang, C. Wang, C.-W. Huang","doi":"10.1109/CCST.1993.386818","DOIUrl":"https://doi.org/10.1109/CCST.1993.386818","url":null,"abstract":"The authors present both an efficient sample preparation procedure and a highly discriminating gas chromatographic (GC) method for the identification of accelerants in fire residues. A purge-and-trap concentrator fitted with a carbotrap adsorbent tube was used to preconcentrate the accelerants from various fire residues. The resultant sample tubes were submitted to a thermal desorption unit (TDU) which was connected to a dual wide-bore capillary column GC. The identification of the accelerants was based on both a retention indices comparison and chromatogram pattern recognition. The advantages and disadvantages of this dynamic adsorption/desorption procedure were evaluated by comparison with other pretreatment procedures such as charcoal tube adsorption/CS/sub 2/ extraction and continuous steam distillation.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128609680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
WIDE (Wireless Integrated Digital Equipment) System 无线综合数字设备系统
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386803
M. Tange, K. Kamata, H. Ohno, T. Asakura, T. Sunada
To deal flexibly with interprefectural criminal cases, the National Police Agency (NPA) developed the mobile radio communication system, the WIDE (Wireless Integrated Digital Equipment) system. The WIDE system, which is usually used for telephone communications, provides a wholesale command function in the event of interprefectural criminal cases. Its wholesale command function makes it possible to build up an exclusive communication network transcending prefectural borders and covering all police vehicles concerned. The WIDE system is highly resistant to interception and is operated with a narrow occupied bandwidth of 8 kHz.<>
警察厅为了灵活处理解释性刑事案件,开发了移动无线电通信系统WIDE(无线综合数字设备)。WIDE系统通常用于电话通信,在发生解释性刑事案件时提供批发指挥功能。它的批发指挥功能使其能够建立一个超越州界、覆盖所有警车的专属通讯网络。WIDE系统具有很强的抗拦截能力,并以8 kHz的窄占用带宽运行。
{"title":"WIDE (Wireless Integrated Digital Equipment) System","authors":"M. Tange, K. Kamata, H. Ohno, T. Asakura, T. Sunada","doi":"10.1109/CCST.1993.386803","DOIUrl":"https://doi.org/10.1109/CCST.1993.386803","url":null,"abstract":"To deal flexibly with interprefectural criminal cases, the National Police Agency (NPA) developed the mobile radio communication system, the WIDE (Wireless Integrated Digital Equipment) system. The WIDE system, which is usually used for telephone communications, provides a wholesale command function in the event of interprefectural criminal cases. Its wholesale command function makes it possible to build up an exclusive communication network transcending prefectural borders and covering all police vehicles concerned. The WIDE system is highly resistant to interception and is operated with a narrow occupied bandwidth of 8 kHz.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116712576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication and authorization techniques in distributed systems 分布式系统中的身份验证和授权技术
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386805
C. Laferriere, R. Charland
The authors consider the following techniques for performing the authentication of user identity and the granting of proper authorization in distributed environments: user login and routing constraints at the network level; special-purpose, challenge-response systems; private key based systems such as Kerberos; and public key based systems with smart cards. They describe and discuss the strengths and weaknesses (i.e., residual vulnerabilities) of each technique and provide guidance with respect to their applicability and deployment.<>
作者考虑了在分布式环境中执行用户身份验证和授予适当授权的以下技术:网络级别的用户登录和路由约束;专用的挑战响应系统;基于私钥的系统,如Kerberos;以及基于公钥的智能卡系统。他们描述并讨论了每种技术的优点和缺点(即,剩余的弱点),并提供了关于它们的适用性和部署的指导。
{"title":"Authentication and authorization techniques in distributed systems","authors":"C. Laferriere, R. Charland","doi":"10.1109/CCST.1993.386805","DOIUrl":"https://doi.org/10.1109/CCST.1993.386805","url":null,"abstract":"The authors consider the following techniques for performing the authentication of user identity and the granting of proper authorization in distributed environments: user login and routing constraints at the network level; special-purpose, challenge-response systems; private key based systems such as Kerberos; and public key based systems with smart cards. They describe and discuss the strengths and weaknesses (i.e., residual vulnerabilities) of each technique and provide guidance with respect to their applicability and deployment.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"57 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116431642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Future law enforcement and internal security communications architectures employing advanced technologies 采用先进技术的未来执法和内部安全通信架构
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386802
G. M. Stone, K. Bluitt
The requirements for advanced multi-dimensional tactical communications architectures are discussed. In addition, attention is given to practical means of specifying and quantifying advanced digital system performance in the planning, design, and implementation of these systems, and to the intelligence process needed to back-stop these technologies. A unified virtual architecture is considered. It is concluded that to be effective in this area, our use of technology must be guided by a master stratagem. Globally, this mindset requires both a policy and concept of operations integration of CI (counterintelligence) and OPSEC (operations security) and the migration to a communications architecture that facilitates seamless information transfer in a fashion that protects sensitive LE (law enforcement) and IS (internal security) operations.<>
讨论了对先进的多维战术通信体系结构的要求。此外,还关注了在这些系统的规划、设计和实施中指定和量化先进数字系统性能的实用方法,以及支持这些技术所需的智能过程。考虑统一的虚拟体系结构。结论是,要在这一领域取得成效,我们对技术的使用必须以总体战略为指导。在全球范围内,这种思维方式需要CI(反情报)和OPSEC(操作安全)的操作集成的策略和概念,以及向通信架构的迁移,以保护敏感的LE(执法)和IS(内部安全)操作的方式促进无缝信息传输。
{"title":"Future law enforcement and internal security communications architectures employing advanced technologies","authors":"G. M. Stone, K. Bluitt","doi":"10.1109/CCST.1993.386802","DOIUrl":"https://doi.org/10.1109/CCST.1993.386802","url":null,"abstract":"The requirements for advanced multi-dimensional tactical communications architectures are discussed. In addition, attention is given to practical means of specifying and quantifying advanced digital system performance in the planning, design, and implementation of these systems, and to the intelligence process needed to back-stop these technologies. A unified virtual architecture is considered. It is concluded that to be effective in this area, our use of technology must be guided by a master stratagem. Globally, this mindset requires both a policy and concept of operations integration of CI (counterintelligence) and OPSEC (operations security) and the migration to a communications architecture that facilitates seamless information transfer in a fashion that protects sensitive LE (law enforcement) and IS (internal security) operations.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127463217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A study on employing traditional Chinese medical knowledge in polygraphy technology 中医知识在测谎技术中的应用研究
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386834
F.-G. Lee, Y.-Y. Wu, C. Chung
A study has been carried out on the use of a polygraph to analyze the psychological reaction intensity difference between the acupoints and the other parts of the human body. The results of employing traditional Chinese medical knowledge in polygraphic technology are presented. The feasibility of the application of acupuncture to lie detection is examined.<>
一项研究利用测谎仪来分析穴位和人体其他部位的心理反应强度差异。介绍了在测谎技术中应用中医知识的结果。研究了针刺在测谎中的可行性。
{"title":"A study on employing traditional Chinese medical knowledge in polygraphy technology","authors":"F.-G. Lee, Y.-Y. Wu, C. Chung","doi":"10.1109/CCST.1993.386834","DOIUrl":"https://doi.org/10.1109/CCST.1993.386834","url":null,"abstract":"A study has been carried out on the use of a polygraph to analyze the psychological reaction intensity difference between the acupoints and the other parts of the human body. The results of employing traditional Chinese medical knowledge in polygraphic technology are presented. The feasibility of the application of acupuncture to lie detection is examined.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125265584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fast response CCTV image recall and motion detection 快速响应CCTV图像召回和运动检测
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386827
T. Folinsbee, L. Pelkowitz, R. Ball, J. Blum, B. Lavigne
An Advanced Alarm Assessment System has resulted from the merging of two CCTV (closed-circuit television) related technologies: (1) a Presearch Image Capture System (PICS) which captures and displays images from before and after an intrusion alarm; and (b) an IMAGO series video sentry and target tracker which detects motion and, optionally, controls camera pan/tilt. The new technology MPICS (Motion PICS) was evaluated at a Canadian penitentiary. The system uses a transputer network with a distributed image frame store to yield fast recall from many cameras of the events leading up to, at the time of, and just after the alarm. The most likely causes of the alarm are indicated on the display to assist user decision-making. This is especially useful during periods of high alarm activity when many zones may alarm in rapid succession.<>
一种先进的报警评估系统是由两种CCTV(闭路电视)相关技术合并而成的:(1)一种预先图像捕获系统(PICS),它可以捕获和显示入侵报警前后的图像;以及(b) IMAGO系列视频哨兵和目标跟踪器,其检测运动并可选地控制摄像机平移/倾斜。新技术MPICS(运动PICS)在加拿大监狱进行了评估。该系统使用带有分布式图像帧存储的转发器网络,从许多摄像机中快速回忆起警报发生前、发生时和刚刚发生后的事件。最可能的报警原因显示在显示屏上,以协助用户决策。这在高警报活动期间特别有用,因为许多区域可能会快速连续警报。
{"title":"Fast response CCTV image recall and motion detection","authors":"T. Folinsbee, L. Pelkowitz, R. Ball, J. Blum, B. Lavigne","doi":"10.1109/CCST.1993.386827","DOIUrl":"https://doi.org/10.1109/CCST.1993.386827","url":null,"abstract":"An Advanced Alarm Assessment System has resulted from the merging of two CCTV (closed-circuit television) related technologies: (1) a Presearch Image Capture System (PICS) which captures and displays images from before and after an intrusion alarm; and (b) an IMAGO series video sentry and target tracker which detects motion and, optionally, controls camera pan/tilt. The new technology MPICS (Motion PICS) was evaluated at a Canadian penitentiary. The system uses a transputer network with a distributed image frame store to yield fast recall from many cameras of the events leading up to, at the time of, and just after the alarm. The most likely causes of the alarm are indicated on the display to assist user decision-making. This is especially useful during periods of high alarm activity when many zones may alarm in rapid succession.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"67 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128975082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A cryptographic system based upon the continued fraction 一种基于连分式的密码系统
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386798
Wei-Bin Lee, Chin-Chen Chang, J. Jan
The authors propose a cryptographic system in which the sender and the receiver hold the same secret key. The system is a one-key system while the RSA system is a public-key system in which the enciphering key and the deciphering key are not identical. The encoding function in the proposed system is based on a linear equation with two variables. The processes of encoding and decoding are simple in this system. The operations in the system include multiplication and addition only, thus making efficient ciphering possible.<>
作者提出了一种发送方和接收方持有相同密钥的加密系统。该系统是一个单密钥系统,而RSA系统是一个公钥系统,其中加密密钥和解密密钥不相同。该系统的编码函数是基于两个变量的线性方程。该系统的编解码过程简单。系统中的操作只包括乘法和加法,因此可以实现高效的加密
{"title":"A cryptographic system based upon the continued fraction","authors":"Wei-Bin Lee, Chin-Chen Chang, J. Jan","doi":"10.1109/CCST.1993.386798","DOIUrl":"https://doi.org/10.1109/CCST.1993.386798","url":null,"abstract":"The authors propose a cryptographic system in which the sender and the receiver hold the same secret key. The system is a one-key system while the RSA system is a public-key system in which the enciphering key and the deciphering key are not identical. The encoding function in the proposed system is based on a linear equation with two variables. The processes of encoding and decoding are simple in this system. The operations in the system include multiplication and addition only, thus making efficient ciphering possible.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131595672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Transmitting multiple secrets securely in broadcasting networks 在广播网络中安全地传输多个秘密
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386833
C. -. Chang, D. Buehrer
A method is presented which permits a broadcasting mechanism to securely transmit a single ciphertext with multiple messages. These messages will only be readable by those users who have the appropriate read key(s). The other messages will be undecipherable. This is a generalization of the secure broadcasting problem stated by G. H. Chiou and W. T. Chen (1989) and C. C. Chang and C. H. Lin (1988). The proposed generalized secure broadcasting cryptosystem is based on Newton's interpolating polynomials and the Chinese remainder theorem. It is observed that the key management by a Central Authority is simple. In order to broadcast distinct messages to different users, one is only required to construct a polynomial and to compute a constant. To reveal a message, the authorized receiver only has to reveal his key by taking the constant modulo his identification number, evaluate the received polynomial with the obtained key, and then decrypt the resulting ciphertext by using his secret key. The sender can randomly choose any number of users who are authorized to know distinct messages within one broadcast.<>
提出了一种允许广播机制安全地传输包含多个消息的单个密文的方法。这些消息只有具有适当读键的用户才能读。其他的信息将无法破译。这是g.h. Chiou和w.t. Chen(1989)以及c.c. Chang和c.h. Lin(1988)提出的安全广播问题的概括。提出了基于牛顿插值多项式和中国剩余定理的广义安全广播密码系统。可以看出,由中央权威机构进行的密钥管理非常简单。为了向不同的用户广播不同的消息,只需要构造一个多项式并计算一个常数。为了显示消息,授权的接收方只需要通过对其标识号取常数模来显示其密钥,用获得的密钥评估接收到的多项式,然后使用其秘密密钥解密生成的密文。发送方可以随机选择任意数量的用户,这些用户被授权在一个广播中了解不同的消息。
{"title":"Transmitting multiple secrets securely in broadcasting networks","authors":"C. -. Chang, D. Buehrer","doi":"10.1109/CCST.1993.386833","DOIUrl":"https://doi.org/10.1109/CCST.1993.386833","url":null,"abstract":"A method is presented which permits a broadcasting mechanism to securely transmit a single ciphertext with multiple messages. These messages will only be readable by those users who have the appropriate read key(s). The other messages will be undecipherable. This is a generalization of the secure broadcasting problem stated by G. H. Chiou and W. T. Chen (1989) and C. C. Chang and C. H. Lin (1988). The proposed generalized secure broadcasting cryptosystem is based on Newton's interpolating polynomials and the Chinese remainder theorem. It is observed that the key management by a Central Authority is simple. In order to broadcast distinct messages to different users, one is only required to construct a polynomial and to compute a constant. To reveal a message, the authorized receiver only has to reveal his key by taking the constant modulo his identification number, evaluate the received polynomial with the obtained key, and then decrypt the resulting ciphertext by using his secret key. The sender can randomly choose any number of users who are authorized to know distinct messages within one broadcast.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128466364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
New ways of explosive booby traps at the international terroristic actions 新的爆炸饵雷方式针对国际恐怖主义行动
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386819
O. Mueller
The author classifies the various types of traditional and recent explosive booby traps (EBTs), and gives an interview of the international situation concerning EBTs. He clarifies some possible optimal ways to minimize the deadly applications of EBTs.<>
作者对各种类型的传统和新型爆炸饵雷进行了分类,并对国际上有关爆炸饵雷的情况进行了采访。他阐明了一些可能的最佳方法,以尽量减少ebt的致命应用。
{"title":"New ways of explosive booby traps at the international terroristic actions","authors":"O. Mueller","doi":"10.1109/CCST.1993.386819","DOIUrl":"https://doi.org/10.1109/CCST.1993.386819","url":null,"abstract":"The author classifies the various types of traditional and recent explosive booby traps (EBTs), and gives an interview of the international situation concerning EBTs. He clarifies some possible optimal ways to minimize the deadly applications of EBTs.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129357671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Synergistic radar: Radioguard application and performance 协同雷达:Radioguard的应用和性能
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386811
K. Harman, G. Loubert, A. Gagnon
The authors present test results for a number of new applications of RF cable sensors including use on a perimeter fence and laying on different surfaces as a rapid deployment line sensor. This includes the use of RadioGuard on the perimeter of roof tops. An algorithm for solving RadioGuard detects humans moving in proximity to a distributed antenna cable by monitoring disturbances to commercial FM radio signals. By utilizing the transmissions from a number of FM stations and the use of commercial FM radio receiver integrated circuits, RadioGuard provides reliable performance at an affordable price. The unique sensing cable, a modified commercially available TV twin lead, is a key to making this possible. Product design parameters as they relate to both cost and performance are discussed.<>
作者介绍了射频电缆传感器的许多新应用的测试结果,包括在周边围栏上使用和作为快速部署线传感器铺设在不同表面上。这包括在屋顶周边使用RadioGuard。一种解决RadioGuard问题的算法通过监测商业调频无线电信号的干扰来检测在分布式天线电缆附近移动的人。通过利用来自多个调频电台的传输和使用商业调频无线电接收器集成电路,RadioGuard以可承受的价格提供可靠的性能。独特的感应电缆,一种改良的商用电视双引线,是实现这一目标的关键。讨论了与成本和性能相关的产品设计参数。
{"title":"Synergistic radar: Radioguard application and performance","authors":"K. Harman, G. Loubert, A. Gagnon","doi":"10.1109/CCST.1993.386811","DOIUrl":"https://doi.org/10.1109/CCST.1993.386811","url":null,"abstract":"The authors present test results for a number of new applications of RF cable sensors including use on a perimeter fence and laying on different surfaces as a rapid deployment line sensor. This includes the use of RadioGuard on the perimeter of roof tops. An algorithm for solving RadioGuard detects humans moving in proximity to a distributed antenna cable by monitoring disturbances to commercial FM radio signals. By utilizing the transmissions from a number of FM stations and the use of commercial FM radio receiver integrated circuits, RadioGuard provides reliable performance at an affordable price. The unique sensing cable, a modified commercially available TV twin lead, is a key to making this possible. Product design parameters as they relate to both cost and performance are discussed.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128867387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
1993 Proceedings of IEEE International Carnahan Conference on Security Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1