首页 > 最新文献

2007 IEEE Conference on Technologies for Homeland Security最新文献

英文 中文
Bioluminescent Sensors for Onsite Non-specific Screening of Toxic Agents in Food and Water 用于现场非特异性筛选食物和水中有毒物质的生物发光传感器
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370046
E. Alocilja, T. McLean
This paper presents a non-specific detection system for quickly screening toxic and harmful contaminants in food products by utilizing the properties of naturally occurring bioluminescence in selected living bacteria. The goal of the project was to evaluate the effectiveness of using luminescent bacteria as "canaries" for rapid non-specific detection of toxic contaminants for homeland food protection and defense. Vibro fischeri was used as the specific biological sensor in this study. The bacteria was grown in marine broth and maintained between 22 and 25degC for optimal growth. Cultures were used to determine the presence of a surrogate toxicant, in this case, sodium hypochlorite (bleach) in various concentrations. Initial results show that 10% bleach quenches light emission immediately upon contact with the bacteria contained in 3 food matrices, namely: skim milk, 2% milk, and drinking water. This naturally occurring biological sensor would be useful in providing an inexpensive, highly renewable early warning system of a potentially catastrophic event. A successful system would enhance early surveillance against any intentional attack on the US food supply, including drinking water. Even in the absence of a bioterrorism event, the biological sensor would still be useful in control measures against naturally occurring or sanitation-constrained toxic substances.
本文介绍了一种非特异性检测系统,该系统利用选定的活细菌的天然生物发光特性,快速筛选食品中有毒和有害污染物。该项目的目的是评估利用发光细菌作为“金丝雀”快速非特异性检测有毒污染物的有效性,为国土食品保护和防御提供依据。本研究以fischeri Vibro为特异性生物传感器。细菌在海洋肉汤中生长,并保持在22至25摄氏度之间以达到最佳生长。培养用于确定替代毒物的存在,在这种情况下,次氯酸钠(漂白剂)在不同浓度。初步结果显示,10%的漂白剂在接触三种食物基质(即脱脂牛奶、2%牛奶和饮用水)中所含的细菌时,会立即熄灭发光。这种自然产生的生物传感器将有助于提供一种廉价的、高度可再生的潜在灾难性事件早期预警系统。一个成功的系统将加强对美国食品供应(包括饮用水)蓄意攻击的早期监控。即使在没有发生生物恐怖主义事件的情况下,生物传感器仍可用于对自然发生或限制卫生条件的有毒物质采取控制措施。
{"title":"Bioluminescent Sensors for Onsite Non-specific Screening of Toxic Agents in Food and Water","authors":"E. Alocilja, T. McLean","doi":"10.1109/THS.2007.370046","DOIUrl":"https://doi.org/10.1109/THS.2007.370046","url":null,"abstract":"This paper presents a non-specific detection system for quickly screening toxic and harmful contaminants in food products by utilizing the properties of naturally occurring bioluminescence in selected living bacteria. The goal of the project was to evaluate the effectiveness of using luminescent bacteria as \"canaries\" for rapid non-specific detection of toxic contaminants for homeland food protection and defense. Vibro fischeri was used as the specific biological sensor in this study. The bacteria was grown in marine broth and maintained between 22 and 25degC for optimal growth. Cultures were used to determine the presence of a surrogate toxicant, in this case, sodium hypochlorite (bleach) in various concentrations. Initial results show that 10% bleach quenches light emission immediately upon contact with the bacteria contained in 3 food matrices, namely: skim milk, 2% milk, and drinking water. This naturally occurring biological sensor would be useful in providing an inexpensive, highly renewable early warning system of a potentially catastrophic event. A successful system would enhance early surveillance against any intentional attack on the US food supply, including drinking water. Even in the absence of a bioterrorism event, the biological sensor would still be useful in control measures against naturally occurring or sanitation-constrained toxic substances.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122371586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PSnet: A Collaborative, Bottom-up Approach To Building a Regional Public Safety Network PSnet:建立区域公共安全网络的协作、自下而上的方法
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370010
G. Fosque
Effective coordination of public safety functions requires high-quality regional data networking that connects many municipal, state, federal and other agencies. One approach would be to build a massive new network and invite (or force) everyone onto it. This paper describes an alternative approach: an ongoing project in the Boston area create a regional network by leveraging existing networking assets and other public safety investments. A pilot project is complete, and growth of the network is underway. The model on which PSnet is based - private and public entities at local, state, and federal levels collaborating to create and operate network infrastructure - has been proven successful from a technical, operational, and business point of view in other domains among other communities such as research and higher education. Creating PSnet is as much about creating the necessary governance and other human and organizational infrastructure as it is about the network itself.
公共安全职能的有效协调需要连接许多市、州、联邦和其他机构的高质量区域数据网络。一种方法是建立一个庞大的新网络,并邀请(或强迫)所有人加入其中。本文描述了一种替代方法:波士顿地区正在进行的一个项目通过利用现有的网络资产和其他公共安全投资来创建一个区域网络。试点项目已经完成,网络正在发展中。PSnet所基于的模型——地方、州和联邦层面的私有和公共实体合作创建和运营网络基础设施——已经在其他领域(如研究和高等教育)从技术、操作和业务角度证明是成功的。创建PSnet与创建必要的治理以及其他人力和组织基础设施一样多,因为它与网络本身有关。
{"title":"PSnet: A Collaborative, Bottom-up Approach To Building a Regional Public Safety Network","authors":"G. Fosque","doi":"10.1109/THS.2007.370010","DOIUrl":"https://doi.org/10.1109/THS.2007.370010","url":null,"abstract":"Effective coordination of public safety functions requires high-quality regional data networking that connects many municipal, state, federal and other agencies. One approach would be to build a massive new network and invite (or force) everyone onto it. This paper describes an alternative approach: an ongoing project in the Boston area create a regional network by leveraging existing networking assets and other public safety investments. A pilot project is complete, and growth of the network is underway. The model on which PSnet is based - private and public entities at local, state, and federal levels collaborating to create and operate network infrastructure - has been proven successful from a technical, operational, and business point of view in other domains among other communities such as research and higher education. Creating PSnet is as much about creating the necessary governance and other human and organizational infrastructure as it is about the network itself.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"26-27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116775218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Results of Location Service Measurements for CCDS Applications CCDS应用的位置服务测量结果
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370056
R. Katulski, J. Stefanski, R. Niski, J. Zurek
In this paper the unique coastal cellular distress system (CCDS), based on a cellular phone network was proposed. The concept, functional properties and services of this system were described. The problem of the location service (LCS) at sea was presented. The geographical location accuracy of a mobile phone in a coastal sea area is analysed. Special measurement system and software application, designed for the field trial is also presented. The measurement results of LCS quality at sea are presented. Finally, the integration of cellular network based system and Search And Rescue service (SAR) was discussed.
提出了一种基于蜂窝电话网络的独特海岸蜂窝遇险系统(CCDS)。介绍了该系统的概念、功能特性和服务。提出了海上定位服务(LCS)问题。对手机在沿海海域的地理定位精度进行了分析。介绍了为现场试验设计的专用测量系统和软件应用。介绍了海上LCS质量的测量结果。最后,讨论了基于蜂窝网络的系统与搜救服务(SAR)的集成。
{"title":"Results of Location Service Measurements for CCDS Applications","authors":"R. Katulski, J. Stefanski, R. Niski, J. Zurek","doi":"10.1109/THS.2007.370056","DOIUrl":"https://doi.org/10.1109/THS.2007.370056","url":null,"abstract":"In this paper the unique coastal cellular distress system (CCDS), based on a cellular phone network was proposed. The concept, functional properties and services of this system were described. The problem of the location service (LCS) at sea was presented. The geographical location accuracy of a mobile phone in a coastal sea area is analysed. Special measurement system and software application, designed for the field trial is also presented. The measurement results of LCS quality at sea are presented. Finally, the integration of cellular network based system and Search And Rescue service (SAR) was discussed.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114649723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MobileEmerGIS: a Wireless-enabled Technology Platform To Support Emergency Response Management mobileemergenis:支持应急响应管理的无线技术平台
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370019
C. Wietfeld, A. Wolff, U. Bieker
In this paper, the architecture and middleware services of the wireless-enabled emergency response management system MobileEmerGIS are introduced. MobileEmerGIS allows to gather and to distribute multimedia information to and from mobile nodes (either human users or sensors/actors). Thereby, field forces and eye witnesses can transfer data collected in the field, such as pictures from emergency sites, immediately to centrally located decision makers as well as other field forces (using PDA platforms and even their own private mobile phones). While the data collected by the system provides many opportunities for optimizing the coordination of the rescue activities, at the same there is a risk that on-site rescue forces are paralyzed by being overwhelmed with the exponentially growing amount of information. Therefore one of the key capabilities of MobileEmerGIS is that centrally stored data is made available to mobile rescue forces in a highly focused way, for example by applying geopositioning and role-dependent filters. By referencing real-life scenarios (such as a large-scale fire emergency), concrete application services enabled by MobileEmerGIS are presented.
介绍了无线应急响应管理系统mobileemergenis的体系结构和中间件服务。MobileEmerGIS允许在移动节点(人类用户或传感器/演员)之间收集和分发多媒体信息。因此,野战部队和目击者可以将在现场收集到的数据,例如从应急地点获取的图片,立即传送给位于中央的决策者以及其他野战部队(使用PDA平台,甚至他们自己的私人移动电话)。虽然该系统收集的数据为优化救援活动的协调提供了许多机会,但同时也存在现场救援力量被指数级增长的信息量所淹没而瘫痪的风险。因此,mobileemergenis的关键功能之一是,通过应用地理定位和角色相关过滤器,以高度集中的方式将集中存储的数据提供给移动救援部队。通过引用实际场景(如大规模火灾紧急情况),介绍mobileemergenis支持的具体应用服务。
{"title":"MobileEmerGIS: a Wireless-enabled Technology Platform To Support Emergency Response Management","authors":"C. Wietfeld, A. Wolff, U. Bieker","doi":"10.1109/THS.2007.370019","DOIUrl":"https://doi.org/10.1109/THS.2007.370019","url":null,"abstract":"In this paper, the architecture and middleware services of the wireless-enabled emergency response management system MobileEmerGIS are introduced. MobileEmerGIS allows to gather and to distribute multimedia information to and from mobile nodes (either human users or sensors/actors). Thereby, field forces and eye witnesses can transfer data collected in the field, such as pictures from emergency sites, immediately to centrally located decision makers as well as other field forces (using PDA platforms and even their own private mobile phones). While the data collected by the system provides many opportunities for optimizing the coordination of the rescue activities, at the same there is a risk that on-site rescue forces are paralyzed by being overwhelmed with the exponentially growing amount of information. Therefore one of the key capabilities of MobileEmerGIS is that centrally stored data is made available to mobile rescue forces in a highly focused way, for example by applying geopositioning and role-dependent filters. By referencing real-life scenarios (such as a large-scale fire emergency), concrete application services enabled by MobileEmerGIS are presented.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124796955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Managing Implementation Risks through Time-Behavior Analysis 通过时间-行为分析管理实施风险
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370053
N. H. Wasserman
The protection of critical infrastructure systems from outside threat depends upon an understanding of the human behaviors that act as threats and the human behaviors that build defenses against those threats. The paper presents a model and architectural approach for categorizing those behaviors, which takes into account the effects of incremental growth and propagation of behaviors across networks. The time-behavior model is applied to considerations of business architecture and implementation risks for security and other technologies.
关键基础设施系统免受外部威胁的保护取决于对作为威胁的人类行为和针对这些威胁建立防御的人类行为的理解。本文提出了一种对这些行为进行分类的模型和体系结构方法,该方法考虑了行为在网络中的增量增长和传播的影响。时间行为模型用于考虑业务体系结构和安全性及其他技术的实现风险。
{"title":"Managing Implementation Risks through Time-Behavior Analysis","authors":"N. H. Wasserman","doi":"10.1109/THS.2007.370053","DOIUrl":"https://doi.org/10.1109/THS.2007.370053","url":null,"abstract":"The protection of critical infrastructure systems from outside threat depends upon an understanding of the human behaviors that act as threats and the human behaviors that build defenses against those threats. The paper presents a model and architectural approach for categorizing those behaviors, which takes into account the effects of incremental growth and propagation of behaviors across networks. The time-behavior model is applied to considerations of business architecture and implementation risks for security and other technologies.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"111 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124115638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Video for Homeland Security Applications 国土安全应用智能视频
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370035
A. Nusimow
This paper considers the problem of protecting critical infrastructure and other homeland security initiatives with the application of an intelligent video (IV) system. A systems engineering approach is followed to decompose top level requirements into system functions based on the Department of Homeland Security (DHS) Strategic Plan, The National Strategy for Homeland Security, and the National Infrastructure Protection Plan (NIPP). In parallel, the attributes of an intelligent video system are introduced, and then correlated with the system functions. Specific top level intelligent video system attributes and applications include virtual perimeter breach detection, object detection, removed or left object detection, object counting, object classification, object tracking, wrong way detection, facial recognition, forensic video, and behavior alerts. In this way, the overarching application of intelligent video technology to specific homeland security challenges are shown. The paper highlights the capabilities and benefits of an intelligent video system to autonomously perform real time monitoring activities and alert notifications based on user defined rules. Some of the challenges to intelligent video systems such as dynamic environments, false alarms, and privacy implications are addressed.
本文考虑了应用智能视频(IV)系统保护关键基础设施和其他国土安全举措的问题。遵循系统工程方法将顶级需求分解为基于国土安全部(DHS)战略计划、国土安全国家战略和国家基础设施保护计划(NIPP)的系统功能。同时,介绍了智能视频系统的属性,并与系统功能进行了关联。具体的顶级智能视频系统属性和应用包括虚拟边界破坏检测、对象检测、移除或留下的对象检测、对象计数、对象分类、对象跟踪、错误路径检测、面部识别、取证视频和行为警报。通过这种方式,展示了智能视频技术在特定国土安全挑战中的总体应用。本文重点介绍了智能视频系统基于用户定义规则自主执行实时监控活动和警报通知的能力和优势。解决了智能视频系统面临的一些挑战,如动态环境、假警报和隐私影响。
{"title":"Intelligent Video for Homeland Security Applications","authors":"A. Nusimow","doi":"10.1109/THS.2007.370035","DOIUrl":"https://doi.org/10.1109/THS.2007.370035","url":null,"abstract":"This paper considers the problem of protecting critical infrastructure and other homeland security initiatives with the application of an intelligent video (IV) system. A systems engineering approach is followed to decompose top level requirements into system functions based on the Department of Homeland Security (DHS) Strategic Plan, The National Strategy for Homeland Security, and the National Infrastructure Protection Plan (NIPP). In parallel, the attributes of an intelligent video system are introduced, and then correlated with the system functions. Specific top level intelligent video system attributes and applications include virtual perimeter breach detection, object detection, removed or left object detection, object counting, object classification, object tracking, wrong way detection, facial recognition, forensic video, and behavior alerts. In this way, the overarching application of intelligent video technology to specific homeland security challenges are shown. The paper highlights the capabilities and benefits of an intelligent video system to autonomously perform real time monitoring activities and alert notifications based on user defined rules. Some of the challenges to intelligent video systems such as dynamic environments, false alarms, and privacy implications are addressed.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114308042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Video Performance Requirements for Tactical Video Applications 战术视频应用的视频性能要求
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370025
M. Pinson, S. Wolf, R. Stafford
The Public Safety Statement of Requirements (PS-SoR) for Communications & Interoperability focuses on the needs of first responders to communicate and share information as authorized, when it is needed, where it is needed, and in a mode or form that allows the practitioners to effectively use it. PS-SoR Volume I defined functional communication and interoperability requirements. Published in September, 2006, PS-SoR Volume II identifies quantitative performance metrics, including minimum video performance requirements for public safety's tactical video applications. The goal was not to identify what is achievable with current technology but rather, looking towards the future, to investigate the minimum level of performance that first responders need in order to effectively use their video equipment. On behalf of the SAFECOM Program and the Office of Law Enforcement Standards, the Institute for Telecommunication Sciences (ITS) conducted subjective video quality testing to estimate the level of video quality that first responders find acceptable for tactical video applications. This subjective testing utilized source video content that is typical of public safety operations in structured subjective viewing experiments with 35 first responders. The evaluations from these first responders, in viewing high quality video (original video) and purposefully degraded video (using video compression and transmission equipment), allowed determination of basic quality thresholds for public safety tactical video applications. These perceptual quality thresholds have been translated into technical parameters for use by video equipment designers, manufacturers, and customers. This paper summarizes those findings. Other testing to evaluate requirements for other public safety applications is underway.
通信和互操作性的公共安全需求声明(PS-SoR)侧重于第一响应者在授权的情况下,在需要的时候,在需要的地方,以允许从业者有效使用的模式或形式进行通信和共享信息。PS-SoR第1卷定义了功能通信和互操作性需求。PS-SoR第二卷于2006年9月发布,确定了定量性能指标,包括公共安全战术视频应用的最低视频性能要求。目的不是确定当前技术可以实现的目标,而是展望未来,调查急救人员有效使用视频设备所需的最低性能水平。代表SAFECOM项目和执法标准办公室,电信科学研究所(ITS)进行了主观视频质量测试,以估计第一响应者认为可接受的战术视频应用的视频质量水平。该主观测试利用了35名第一响应者在结构化主观观看实验中典型的公共安全操作源视频内容。在观看高质量视频(原始视频)和有目的地降级视频(使用视频压缩和传输设备)时,这些第一响应者的评估允许确定公共安全战术视频应用的基本质量阈值。这些感知质量阈值已转化为视频设备设计师、制造商和客户使用的技术参数。本文对这些发现进行了总结。其他评估其他公共安全应用需求的测试正在进行中。
{"title":"Video Performance Requirements for Tactical Video Applications","authors":"M. Pinson, S. Wolf, R. Stafford","doi":"10.1109/THS.2007.370025","DOIUrl":"https://doi.org/10.1109/THS.2007.370025","url":null,"abstract":"The Public Safety Statement of Requirements (PS-SoR) for Communications & Interoperability focuses on the needs of first responders to communicate and share information as authorized, when it is needed, where it is needed, and in a mode or form that allows the practitioners to effectively use it. PS-SoR Volume I defined functional communication and interoperability requirements. Published in September, 2006, PS-SoR Volume II identifies quantitative performance metrics, including minimum video performance requirements for public safety's tactical video applications. The goal was not to identify what is achievable with current technology but rather, looking towards the future, to investigate the minimum level of performance that first responders need in order to effectively use their video equipment. On behalf of the SAFECOM Program and the Office of Law Enforcement Standards, the Institute for Telecommunication Sciences (ITS) conducted subjective video quality testing to estimate the level of video quality that first responders find acceptable for tactical video applications. This subjective testing utilized source video content that is typical of public safety operations in structured subjective viewing experiments with 35 first responders. The evaluations from these first responders, in viewing high quality video (original video) and purposefully degraded video (using video compression and transmission equipment), allowed determination of basic quality thresholds for public safety tactical video applications. These perceptual quality thresholds have been translated into technical parameters for use by video equipment designers, manufacturers, and customers. This paper summarizes those findings. Other testing to evaluate requirements for other public safety applications is underway.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121732867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A Pressurized Tank Car Inspection System for Railroad Transportation Security 用于铁路运输安全的增压罐车检测系统
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370013
P. Womble, J. Spadaro, M. Harrison, A. Barzilov, D. Harper, B. Lemoff, R. Martin, I. Novikov, J. Paschal, L. Hopper, C. Davenport, J. Lodmell
Pressurized rail tank cars transport large volumes of volatile liquids and gases throughout the country, much of which is hazardous and/or flammable. Our group is developing a trackside inspection system for these tank cars. It consists of five narrow frequency band pressure sensors with center frequencies of 40 and 75 kHz, a broad band microphone for sound normalization and three video cameras. In addition, a 5 cm times 5 cm NaI(Tl) radiation detector provides radiological data on the passing trains every 60 seconds. During operation, an audio frequency spectrum is associated with each frame of the video camera as the train passes by the system at normal speeds, and the spectra are inspected for high frequency sounds associated with leaks. A 10 m tall tower houses the system positioned approximately 10 m from the center of a rail line and siding located in Bowling Green, KY (USA). The system is controlled by a website and server located at the tower and the Internet connection utilizes WiFi (802.11 g) radios.
加压铁路罐车在全国各地运输大量挥发性液体和气体,其中大部分是危险和/或易燃的。我们小组正在为这些油罐车开发一种轨旁检查系统。它由5个中心频率为40和75千赫的窄频带压力传感器、一个用于声音标准化的宽带麦克风和3个摄像机组成。此外,一个5厘米乘以5厘米的NaI(Tl)辐射探测器每60秒提供一次经过列车的辐射数据。在运行过程中,当列车以正常速度通过系统时,音频频谱与摄像机的每一帧相关联,并检查与泄漏相关的高频声音。位于美国肯塔基州鲍灵格林的一个10米高的塔楼容纳了该系统,该系统位于距离铁路线和侧线中心约10米的地方。该系统由位于发射塔的网站和服务器控制,互联网连接使用WiFi (802.11 g)无线电。
{"title":"A Pressurized Tank Car Inspection System for Railroad Transportation Security","authors":"P. Womble, J. Spadaro, M. Harrison, A. Barzilov, D. Harper, B. Lemoff, R. Martin, I. Novikov, J. Paschal, L. Hopper, C. Davenport, J. Lodmell","doi":"10.1109/THS.2007.370013","DOIUrl":"https://doi.org/10.1109/THS.2007.370013","url":null,"abstract":"Pressurized rail tank cars transport large volumes of volatile liquids and gases throughout the country, much of which is hazardous and/or flammable. Our group is developing a trackside inspection system for these tank cars. It consists of five narrow frequency band pressure sensors with center frequencies of 40 and 75 kHz, a broad band microphone for sound normalization and three video cameras. In addition, a 5 cm times 5 cm NaI(Tl) radiation detector provides radiological data on the passing trains every 60 seconds. During operation, an audio frequency spectrum is associated with each frame of the video camera as the train passes by the system at normal speeds, and the spectra are inspected for high frequency sounds associated with leaks. A 10 m tall tower houses the system positioned approximately 10 m from the center of a rail line and siding located in Bowling Green, KY (USA). The system is controlled by a website and server located at the tower and the Internet connection utilizes WiFi (802.11 g) radios.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121912574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Isotopic Identification for NaI Spectroscopic Portal Monitors Using the Material Basis Set (MBS) Method 基于物质基集(MBS)方法的NaI光谱门脉监测仪同位素鉴定改进
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370040
R. Estep, B. Sapp, W. Russ
This report describes our application of the multiple isotope material basis set (MIMBS) method for isotope identification to the analysis of simulated spectra of Nal logs used in spectral portal monitors. The MIMBS method couples attenuation corrections for shielding materials with an ordinary isotopic response function fit. Spectrum simulations of twenty-four isotopes were generated using the Speculator software (with MCNP for attenuation calculations) for a 3 x 5 x 16-inch Nal log detector, through a series of attenuating absorbers representing a Z range from Al through Pb. Two-isotope combinations of these were analyzed using the MIMBS algorithm, with and without added 4 K background and Poisson noise. We found the MIMBS method to be highly accurate in identifying both the component isotopes and their relative amounts, even at high noise and background levels.
本文介绍了我们将多同位素物质基集(MIMBS)方法用于同位素鉴定的Nal测井模拟光谱分析。MIMBS方法将屏蔽材料的衰减校正与普通同位素响应函数拟合耦合在一起。利用Speculator软件(使用MCNP进行衰减计算)对3 x 5 x 16英寸的Nal测井探测器进行了24种同位素的光谱模拟,通过一系列衰减吸收器代表从Al到Pb的Z范围。使用MIMBS算法对这些双同位素组合进行分析,并在添加和不添加4 K背景和泊松噪声的情况下进行分析。我们发现,即使在高噪声和背景水平下,MIMBS方法在识别成分同位素及其相对数量方面也非常准确。
{"title":"Improved Isotopic Identification for NaI Spectroscopic Portal Monitors Using the Material Basis Set (MBS) Method","authors":"R. Estep, B. Sapp, W. Russ","doi":"10.1109/THS.2007.370040","DOIUrl":"https://doi.org/10.1109/THS.2007.370040","url":null,"abstract":"This report describes our application of the multiple isotope material basis set (MIMBS) method for isotope identification to the analysis of simulated spectra of Nal logs used in spectral portal monitors. The MIMBS method couples attenuation corrections for shielding materials with an ordinary isotopic response function fit. Spectrum simulations of twenty-four isotopes were generated using the Speculator software (with MCNP for attenuation calculations) for a 3 x 5 x 16-inch Nal log detector, through a series of attenuating absorbers representing a Z range from Al through Pb. Two-isotope combinations of these were analyzed using the MIMBS algorithm, with and without added 4 K background and Poisson noise. We found the MIMBS method to be highly accurate in identifying both the component isotopes and their relative amounts, even at high noise and background levels.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124950149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Wide Area Intruder Detection System with a Pair of Transceiver Cables 带有一对收发器电缆的广域入侵者检测系统
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370023
T. Hirai, K. Inomata, N. Miyake, K. Sumi, K. Tanaka
We have developed a wide area intruder detection surveillance system which was delivered to the Japanese market last summer. This technology is known as MELWATCH which stands for MELco WATCH(to keep lookout). It has been installed at several sites in Japan. MELWATCH is composed of a pair of sensor cables, a sensor unit and an intrusion detection terminal. The sensor cables are composed of a transmission and a receiving cable (transceiver cables), both of which are off-the-shelf leaky coaxial cables. The sensor cables are deployed in parallel along the boundary to be monitored. Upon activation, the sensor unit sends an electric wave into the transmission cable which results in the electric wave leaks from the cable. The receiving cable receives the leaked electric wave and an electric field is formed between the cables. When an intruder enters the electric field, the sensor unit detects this activity and the precise location of the intrusion. Moreover, this sensor is less affected by the environmental noise, such as trees or small animals, nor weather conditions. In addition, the ability to specify the intrusion point makes it possible to configure the more sophisticated system with pan-tilt-zoom cameras. In this paper, we show the effectiveness of MELWATCH through the field data of the several installed sites.
我们已经开发了一种广域入侵检测监视系统,并于去年夏天交付给日本市场。这项技术被称为MELWATCH,代表MELco WATCH(保持警惕)。它已经安装在日本的几个地点。MELWATCH由一对传感器电缆、一个传感器单元和一个入侵检测终端组成。传感器电缆由传输电缆和接收电缆(收发电缆)组成,均为现货泄漏同轴电缆。传感器电缆沿待监测边界平行布放。激活后,传感器单元向传输电缆发送电波,导致电波从电缆泄漏。接收电缆接收泄漏的电波,电缆之间形成电场。当入侵者进入电场时,传感器单元检测到这种活动和入侵的精确位置。此外,这种传感器受环境噪声的影响较小,例如树木或小动物,也不受天气条件的影响。此外,指定入侵点的能力使得配置更复杂的系统与泛倾斜变焦相机成为可能。在本文中,我们通过几个安装站点的现场数据来证明MELWATCH的有效性。
{"title":"Wide Area Intruder Detection System with a Pair of Transceiver Cables","authors":"T. Hirai, K. Inomata, N. Miyake, K. Sumi, K. Tanaka","doi":"10.1109/THS.2007.370023","DOIUrl":"https://doi.org/10.1109/THS.2007.370023","url":null,"abstract":"We have developed a wide area intruder detection surveillance system which was delivered to the Japanese market last summer. This technology is known as MELWATCH which stands for MELco WATCH(to keep lookout). It has been installed at several sites in Japan. MELWATCH is composed of a pair of sensor cables, a sensor unit and an intrusion detection terminal. The sensor cables are composed of a transmission and a receiving cable (transceiver cables), both of which are off-the-shelf leaky coaxial cables. The sensor cables are deployed in parallel along the boundary to be monitored. Upon activation, the sensor unit sends an electric wave into the transmission cable which results in the electric wave leaks from the cable. The receiving cable receives the leaked electric wave and an electric field is formed between the cables. When an intruder enters the electric field, the sensor unit detects this activity and the precise location of the intrusion. Moreover, this sensor is less affected by the environmental noise, such as trees or small animals, nor weather conditions. In addition, the ability to specify the intrusion point makes it possible to configure the more sophisticated system with pan-tilt-zoom cameras. In this paper, we show the effectiveness of MELWATCH through the field data of the several installed sites.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129593231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2007 IEEE Conference on Technologies for Homeland Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1