首页 > 最新文献

1993 Proceedings of IEEE International Carnahan Conference on Security Technology最新文献

英文 中文
The importance of the site survey in planning and implementing an electronic security system 地盘勘测在策划及实施电子保安系统中的重要性
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386825
J. A. Brown
It is noted that the conduct of a detailed site survey is critical to the successful implementation of an electronic security system. The author discusses the rationale for a site survey, the contents of the survey report, and the planning of the site survey, and the composition of the site survey team.<>
报告指出,进行详细的现场调查是成功实施电子保安系统的关键。作者讨论了现场调查的基本原理,调查报告的内容,现场调查的规划,以及现场调查小组的组成。
{"title":"The importance of the site survey in planning and implementing an electronic security system","authors":"J. A. Brown","doi":"10.1109/CCST.1993.386825","DOIUrl":"https://doi.org/10.1109/CCST.1993.386825","url":null,"abstract":"It is noted that the conduct of a detailed site survey is critical to the successful implementation of an electronic security system. The author discusses the rationale for a site survey, the contents of the survey report, and the planning of the site survey, and the composition of the site survey team.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123562698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic video image moving target detection for wide area surveillance 面向广域监控的视频图像运动目标自动检测
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386826
C. Munno, H. Turk, J. Wayman, J. Libert, T. Tsao
Two image processing techniques developed for moving target indication from video infrared imagery in natural scenes are presented. It is shown that frequency domain spatio-temporal filtering of video sequences and spatio-temporal constraint error of image frame pairs are able to detect and track moving targets (e.g., personnel) in natural scenes in spite of low image contrast, changes in the target's infrared image pattern, sensor noise, or background clutter. The effectiveness of the motion filtering algorithms when applied to sequences of data corrupted with additive noise is shown. The effectiveness of the CFAR (constant false alarm rate) adaptive threshold algorithm in controlling the false alarm rate for motion detection has been demonstrated. These steps have permitted substantial data reduction so that real-time processing is possible.<>
介绍了两种用于自然场景下视频红外图像运动目标指示的图像处理技术。研究表明,视频序列的频域时空滤波和图像帧对的时空约束误差能够在低图像对比度、目标红外图像模式变化、传感器噪声或背景杂波的情况下检测和跟踪自然场景中的运动目标(如人员)。结果表明,运动滤波算法在处理被加性噪声破坏的数据序列时是有效的。实验证明了恒虚警率自适应阈值算法在控制运动检测虚警率方面的有效性。这些步骤使大量的数据减少,从而使实时处理成为可能。
{"title":"Automatic video image moving target detection for wide area surveillance","authors":"C. Munno, H. Turk, J. Wayman, J. Libert, T. Tsao","doi":"10.1109/CCST.1993.386826","DOIUrl":"https://doi.org/10.1109/CCST.1993.386826","url":null,"abstract":"Two image processing techniques developed for moving target indication from video infrared imagery in natural scenes are presented. It is shown that frequency domain spatio-temporal filtering of video sequences and spatio-temporal constraint error of image frame pairs are able to detect and track moving targets (e.g., personnel) in natural scenes in spite of low image contrast, changes in the target's infrared image pattern, sensor noise, or background clutter. The effectiveness of the motion filtering algorithms when applied to sequences of data corrupted with additive noise is shown. The effectiveness of the CFAR (constant false alarm rate) adaptive threshold algorithm in controlling the false alarm rate for motion detection has been demonstrated. These steps have permitted substantial data reduction so that real-time processing is possible.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121542980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Effect of video presentations on knowledge and public attitudes toward radioactive waste storage 视频演示对放射性废物储存知识和公众态度的影响
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386814
E. Zannes, C. Kelsey, B. Goss
A study was conducted to determine whether short video presentations of facts about radiation and WIPP (Waste Isolation Pilot Plant) and WIPP transportation would increase knowledge and change attitudes regarding the storage of radioactive waste; and (2) to determine the effect of various audio and visual techniques employed in the video presentations on knowledge acquisition and opinion. Changes in knowledge and attitudes toward radioactive waste and the WIPP produced by viewing three video presentations have been measured by showing the tapes to selected viewing groups. The first video presents facts about natural radioactivity; the second presents facts about WIPP; and the third presents facts about the transporting of waste to WIPP. Each video is approximately four minutes long. These initial studies have demonstrated that four-minutes-long videos can change public knowledge and opinion, and that these changes can be measured and quantified.<>
进行了一项研究,以确定有关辐射和废物隔离中试工厂以及废物隔离中试工厂运输的事实的短片介绍是否会增加对放射性废物储存的认识并改变对放射性废物储存的态度;(2)确定视频演示中使用的各种视听技术对知识获取和意见的影响。通过向选定的观看群体播放录像带,测量了人们对放射性废物和WIPP的认识和态度的变化。第一个视频介绍了有关天然放射性的事实;第二部分介绍了WIPP的事实;第三部分介绍了向WIPP输送废物的事实。每个视频大约四分钟长。这些初步研究表明,四分钟长的视频可以改变公众的知识和意见,而且这些变化是可以测量和量化的。
{"title":"Effect of video presentations on knowledge and public attitudes toward radioactive waste storage","authors":"E. Zannes, C. Kelsey, B. Goss","doi":"10.1109/CCST.1993.386814","DOIUrl":"https://doi.org/10.1109/CCST.1993.386814","url":null,"abstract":"A study was conducted to determine whether short video presentations of facts about radiation and WIPP (Waste Isolation Pilot Plant) and WIPP transportation would increase knowledge and change attitudes regarding the storage of radioactive waste; and (2) to determine the effect of various audio and visual techniques employed in the video presentations on knowledge acquisition and opinion. Changes in knowledge and attitudes toward radioactive waste and the WIPP produced by viewing three video presentations have been measured by showing the tapes to selected viewing groups. The first video presents facts about natural radioactivity; the second presents facts about WIPP; and the third presents facts about the transporting of waste to WIPP. Each video is approximately four minutes long. These initial studies have demonstrated that four-minutes-long videos can change public knowledge and opinion, and that these changes can be measured and quantified.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114550261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of a remotely operated intrusion detection system for security applications 设计了一个用于安全应用的远程操作入侵检测系统
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386809
B. Jones
The author discussed a group of recent system level advancements in electronic security systems technology in the areas of sensor signal processing, remote site command, control and communications, and long-life battery operation. The technology for the advancements presented here have been designed, constructed, tested, and incorporated into operational security systems. Actual system architectures and practical embodiments of the designs are presented. The primary applications for these systems are the protection of high value facilities in remote locations and for law enforcement and military operations.<>
作者讨论了最近在传感器信号处理、远程站点指挥、控制和通信以及长寿命电池操作领域的电子安全系统技术的一组系统级进展。本文介绍的先进技术已经被设计、构建、测试并集成到操作安全系统中。给出了实际的系统架构和设计的具体实施例。这些系统的主要应用是保护偏远地区的高价值设施,以及执法和军事行动
{"title":"Design of a remotely operated intrusion detection system for security applications","authors":"B. Jones","doi":"10.1109/CCST.1993.386809","DOIUrl":"https://doi.org/10.1109/CCST.1993.386809","url":null,"abstract":"The author discussed a group of recent system level advancements in electronic security systems technology in the areas of sensor signal processing, remote site command, control and communications, and long-life battery operation. The technology for the advancements presented here have been designed, constructed, tested, and incorporated into operational security systems. Actual system architectures and practical embodiments of the designs are presented. The primary applications for these systems are the protection of high value facilities in remote locations and for law enforcement and military operations.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131366334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CCTV operator performance and system design CCTV操作员性能及系统设计
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386830
P. Walters
The introduction of the Rotakin test is shown to be an important step toward improving the performance of closed-circuit television (CCTV) systems. Analysis of the alarm event process calls attention to the areas of sensitivity whereby the system can fail. Reference to knowledge in the human visual performance field makes it possible to improve the images presented to the operator, thereby permitting him to do his job more easily. The addition of systems performance testing to systems specifications provides a non-altruistic motive for the pursuit of the relevant engineering knowledge.<>
引入Rotakin测试被证明是朝着提高闭路电视(CCTV)系统性能迈出的重要一步。对报警事件过程的分析使人们注意到系统可能发生故障的敏感区域。参考人类视觉表现领域的知识可以改善呈现给操作员的图像,从而使他更容易地完成他的工作。将系统性能测试添加到系统规格说明中,为追求相关的工程知识提供了一种非利他的动机
{"title":"CCTV operator performance and system design","authors":"P. Walters","doi":"10.1109/CCST.1993.386830","DOIUrl":"https://doi.org/10.1109/CCST.1993.386830","url":null,"abstract":"The introduction of the Rotakin test is shown to be an important step toward improving the performance of closed-circuit television (CCTV) systems. Analysis of the alarm event process calls attention to the areas of sensitivity whereby the system can fail. Reference to knowledge in the human visual performance field makes it possible to improve the images presented to the operator, thereby permitting him to do his job more easily. The addition of systems performance testing to systems specifications provides a non-altruistic motive for the pursuit of the relevant engineering knowledge.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115878728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimal allocation of security sensors/guards-graph theoretic approach 安全传感器/警卫的优化配置——图论方法
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386812
K. Inoue, T. Kohda, M. Shirahama
The problem of optimal allocation of security sensors and/or guards is formulated as a graph/network problem, where the importance of the concept of degree of security or multiple minimal cut set is stressed. An algorithm for solving the formulated graph/network problem is developed and it is shown that the algorithm is very effective from the viewpoint of computational complexity. Examples are given to illustrate the concept of degree of security, optimal allocation of security sensors/guards, multiple minimal cut set, and computational efficiency. A typical example among them is: assume a terrorist or a thief is going to attack a target in a town. The problem is to find the minimum number of sensors/guards and where and how to allocate them in the town, detecting him at least twice (or more generally k times) on his way to the target, even if he may take any route among numerous possible routes.<>
将安全传感器和/或防护装置的最优配置问题表述为一个图/网络问题,强调了安全度或多个最小割集概念的重要性。提出了一种求解公式化图/网络问题的算法,并从计算复杂度的角度证明了该算法的有效性。举例说明了安全程度、安全传感器/防护的最优分配、多重最小割集和计算效率的概念。其中一个典型的例子是:假设一个恐怖分子或小偷要袭击一个城镇的目标。问题是找到最小数量的传感器/警卫,以及如何在城镇中分配它们,在他前往目标的途中至少探测到他两次(或更一般地说k次),即使他可能选择众多可能路线中的任何一条。
{"title":"Optimal allocation of security sensors/guards-graph theoretic approach","authors":"K. Inoue, T. Kohda, M. Shirahama","doi":"10.1109/CCST.1993.386812","DOIUrl":"https://doi.org/10.1109/CCST.1993.386812","url":null,"abstract":"The problem of optimal allocation of security sensors and/or guards is formulated as a graph/network problem, where the importance of the concept of degree of security or multiple minimal cut set is stressed. An algorithm for solving the formulated graph/network problem is developed and it is shown that the algorithm is very effective from the viewpoint of computational complexity. Examples are given to illustrate the concept of degree of security, optimal allocation of security sensors/guards, multiple minimal cut set, and computational efficiency. A typical example among them is: assume a terrorist or a thief is going to attack a target in a town. The problem is to find the minimum number of sensors/guards and where and how to allocate them in the town, detecting him at least twice (or more generally k times) on his way to the target, even if he may take any route among numerous possible routes.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133492932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrity and security in AM/FM-GIS AM/FM-GIS中的完整性和安全性
Pub Date : 1993-10-13 DOI: 10.1109/CCST.1993.386801
E. Orlandi
The authors present the integrity and security requirements of AM/FM-GIS (geographic information system) systems, involving the security of the operating system, the DBMS (database management systems), and graphic information. Well-established security services and mechanisms developed for EDP on-line systems can be applied to AM/FM-GIS. In AM/FM-GIS, the security issue can be approached with formal methods in the pre-evaluation and evaluation phases. The security requirements should produce a well-defined input to the system design and could influence the selection of the data base with regard to the implementation technique. In AM/FM-GIS systems, different access modes should be possible on several data structures: layers, element groups, objects, and drawings.<>
作者提出了AM/FM-GIS(地理信息系统)系统的完整性和安全性要求,包括操作系统、数据库管理系统和图形信息的安全性。为电子数据处理在线系统开发的完善的保安服务和机制可以应用于AM/FM-GIS。在AM/FM-GIS中,安全问题可以在预评估和评估阶段用形式化的方法来处理。安全需求应该为系统设计提供定义良好的输入,并可能影响数据库的选择和实现技术。在AM/FM-GIS系统中,不同的访问模式应该在不同的数据结构上是可能的:层、元素组、对象和图纸。
{"title":"Integrity and security in AM/FM-GIS","authors":"E. Orlandi","doi":"10.1109/CCST.1993.386801","DOIUrl":"https://doi.org/10.1109/CCST.1993.386801","url":null,"abstract":"The authors present the integrity and security requirements of AM/FM-GIS (geographic information system) systems, involving the security of the operating system, the DBMS (database management systems), and graphic information. Well-established security services and mechanisms developed for EDP on-line systems can be applied to AM/FM-GIS. In AM/FM-GIS, the security issue can be approached with formal methods in the pre-evaluation and evaluation phases. The security requirements should produce a well-defined input to the system design and could influence the selection of the data base with regard to the implementation technique. In AM/FM-GIS systems, different access modes should be possible on several data structures: layers, element groups, objects, and drawings.<<ETX>>","PeriodicalId":404786,"journal":{"name":"1993 Proceedings of IEEE International Carnahan Conference on Security Technology","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1993-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122005453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
1993 Proceedings of IEEE International Carnahan Conference on Security Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1