首页 > 最新文献

2007 IEEE Conference on Technologies for Homeland Security最新文献

英文 中文
A Free Space Optics Based Identification and Interrogation System 基于自由空间光学的识别与讯问系统
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370014
A. Ghosh, P. Verma, S. Cheng, A. Venugopalan
In this paper we discuss the design of a free-space optics based system that can be used for identification or identification/interrogation over varying distances. The system consists of photonic transducers and sources that can be easily incorporated in optical tags and base-stations. When an optical reader sends an interrogation beam of light to an optical tag, the tag sends its response. A major advantage of our system is that various electronic or photonic sensors or transducers can be easily incorporated in the design of optical tags so that the output of the sensors can be read remotely. The proposed system does not cause RF interference to nearby objects and is secure owing to the highly directional nature of optical communication. The system can use encryption technology to provide an additional layer of security. Unlike RF-IDs our system also provides flexibility on the distance between tags and base-stations or readers. Further, optical communication is unlicensed unlike the use of RF bands. Optical identification/interrogation systems proposed in the literature either uses specially designed MEMS devices or holograms. Compared to these our system is built with low-cost optoelectronic components and can be packaged in low-cost and rugged units.
在本文中,我们讨论了一个基于自由空间光学系统的设计,该系统可用于不同距离的识别或识别/询问。该系统由光子换能器和光源组成,可以很容易地集成到光学标签和基站中。当光学读取器向光学标签发送一束询问光时,标签就发送它的响应。我们的系统的一个主要优点是,各种电子或光子传感器或换能器可以很容易地集成在光学标签的设计中,以便传感器的输出可以远程读取。该系统不会对附近的物体造成射频干扰,并且由于光通信的高度方向性而具有安全性。该系统可以使用加密技术提供额外的安全层。与rf - id不同,我们的系统在标签与基站或读取器之间的距离上也提供了灵活性。此外,光通信与射频频段的使用不同,是无需许可的。文献中提出的光学识别/询问系统要么使用专门设计的MEMS器件,要么使用全息图。与这些相比,我们的系统是用低成本的光电元件构建的,可以封装在低成本和坚固的单元中。
{"title":"A Free Space Optics Based Identification and Interrogation System","authors":"A. Ghosh, P. Verma, S. Cheng, A. Venugopalan","doi":"10.1109/THS.2007.370014","DOIUrl":"https://doi.org/10.1109/THS.2007.370014","url":null,"abstract":"In this paper we discuss the design of a free-space optics based system that can be used for identification or identification/interrogation over varying distances. The system consists of photonic transducers and sources that can be easily incorporated in optical tags and base-stations. When an optical reader sends an interrogation beam of light to an optical tag, the tag sends its response. A major advantage of our system is that various electronic or photonic sensors or transducers can be easily incorporated in the design of optical tags so that the output of the sensors can be read remotely. The proposed system does not cause RF interference to nearby objects and is secure owing to the highly directional nature of optical communication. The system can use encryption technology to provide an additional layer of security. Unlike RF-IDs our system also provides flexibility on the distance between tags and base-stations or readers. Further, optical communication is unlicensed unlike the use of RF bands. Optical identification/interrogation systems proposed in the literature either uses specially designed MEMS devices or holograms. Compared to these our system is built with low-cost optoelectronic components and can be packaged in low-cost and rugged units.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126436686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Toward Developing Genetic Algorithms to Aid in Critical Infrastructure Modeling 开发遗传算法以帮助关键基础设施建模
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370044
M. R. Permann
Today's society relies upon an array of complex national and international infrastructure networks such as transportation, telecommunication, financial and energy. Understanding these interdependencies is necessary in order to protect our critical infrastructure. The Critical Infrastructure Modeling System, CIMScopy, examines the interrelationships between infrastructure networks. CIMScopy development is sponsored by the National Security Division at the Idaho National Laboratory (INL) in its ongoing mission for providing critical infrastructure protection and preparedness. A genetic algorithm (GA) is an optimization technique based on Darwin's theory of evolution. A GA can be coupled with CIMScopy to search for optimum ways to protect infrastructure assets. This includes identifying optimum assets to enforce or protect, testing the addition of or change to infrastructure before implementation, or finding the optimum response to an emergency for response planning. This paper describes the addition of a GA to infrastructure modeling for infrastructure planning. It first introduces the CIMScopy infrastructure modeling software used as the modeling engine to support the GA. Next, the GA techniques and parameters are defined. Then a test scenario illustrates the integration with CIMScopy and the preliminary results.
当今社会依赖于一系列复杂的国家和国际基础设施网络,如交通、电信、金融和能源。为了保护我们的关键基础设施,了解这些相互依赖关系是必要的。关键基础设施建模系统,CIMScopy,检查基础设施网络之间的相互关系。CIMScopy的开发是由爱达荷国家实验室(INL)的国家安全部门赞助的,该部门正在执行提供关键基础设施保护和准备的任务。遗传算法是一种基于达尔文进化论的优化技术。遗传算法可以与CIMScopy相结合,以寻找保护基础设施资产的最佳方法。这包括确定要强制执行或保护的最佳资产,在实施之前测试基础设施的添加或更改,或者为响应计划找到对紧急情况的最佳响应。本文描述了将遗传算法添加到基础设施建模中以进行基础设施规划。首先介绍了作为支持GA的建模引擎的cimscope基础架构建模软件。其次,定义了遗传算法的技术和参数。然后,一个测试场景说明了与CIMScopy的集成和初步结果。
{"title":"Toward Developing Genetic Algorithms to Aid in Critical Infrastructure Modeling","authors":"M. R. Permann","doi":"10.1109/THS.2007.370044","DOIUrl":"https://doi.org/10.1109/THS.2007.370044","url":null,"abstract":"Today's society relies upon an array of complex national and international infrastructure networks such as transportation, telecommunication, financial and energy. Understanding these interdependencies is necessary in order to protect our critical infrastructure. The Critical Infrastructure Modeling System, CIMScopy, examines the interrelationships between infrastructure networks. CIMScopy development is sponsored by the National Security Division at the Idaho National Laboratory (INL) in its ongoing mission for providing critical infrastructure protection and preparedness. A genetic algorithm (GA) is an optimization technique based on Darwin's theory of evolution. A GA can be coupled with CIMScopy to search for optimum ways to protect infrastructure assets. This includes identifying optimum assets to enforce or protect, testing the addition of or change to infrastructure before implementation, or finding the optimum response to an emergency for response planning. This paper describes the addition of a GA to infrastructure modeling for infrastructure planning. It first introduces the CIMScopy infrastructure modeling software used as the modeling engine to support the GA. Next, the GA techniques and parameters are defined. Then a test scenario illustrates the integration with CIMScopy and the preliminary results.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123353470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Coordinated Activation and Reporting for Energy-Efficient Target Intrusion Detection, Tracking, and Reporting in Wireless Sensor Networks 无线传感器网络中节能目标入侵检测、跟踪与报告的协同激活与报告
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370045
D. Jain, V. Vokkarane
Wireless sensor network (WSN) is a network consisting of several nodes equipped with sensors that cooperatively monitor physical conditions. WSNs are being used in many monitoring applications. In this paper, we present a new approach to perform coordinated activation and reporting (CAR) for energy-efficient target monitoring (detection, tracking, and reporting) in WSNs. Our approach aims to minimize the response-time by activating sensors (from sleep-mode) that are along the target's path, and then forwarding the information to be reported to the base-station from these sensors along the same coordinated path. If we are unable to meet the response-time deadline using a coordinated path, we split the tracking path and the reporting path in to independent paths, so that the base-station is reported within the response-time deadline. We perform extensive simulations on different sample target-paths, and compute average response-time and network lifetime for each scenario. We also investigate the problem of optimal base-station placement, so as to improve the average response-time in the network.
无线传感器网络(WSN)是由多个节点组成的网络,这些节点配备有传感器,可以协同监测物理状况。无线传感器网络被用于许多监控应用中。在本文中,我们提出了一种新的方法来执行协调激活和报告(CAR)的节能目标监测(检测,跟踪和报告)在无线传感器网络。我们的方法旨在通过激活沿着目标路径的传感器(从睡眠模式),然后沿着相同的协调路径将这些传感器要报告的信息转发给基站,从而最大限度地减少响应时间。如果使用协调路径无法满足响应时间截止日期,我们将跟踪路径和报告路径拆分为独立路径,以便在响应时间截止日期内报告基站。我们对不同的样本目标路径进行了广泛的模拟,并计算了每种场景的平均响应时间和网络生命周期。我们还研究了基站的最优布局问题,以提高网络的平均响应时间。
{"title":"Coordinated Activation and Reporting for Energy-Efficient Target Intrusion Detection, Tracking, and Reporting in Wireless Sensor Networks","authors":"D. Jain, V. Vokkarane","doi":"10.1109/THS.2007.370045","DOIUrl":"https://doi.org/10.1109/THS.2007.370045","url":null,"abstract":"Wireless sensor network (WSN) is a network consisting of several nodes equipped with sensors that cooperatively monitor physical conditions. WSNs are being used in many monitoring applications. In this paper, we present a new approach to perform coordinated activation and reporting (CAR) for energy-efficient target monitoring (detection, tracking, and reporting) in WSNs. Our approach aims to minimize the response-time by activating sensors (from sleep-mode) that are along the target's path, and then forwarding the information to be reported to the base-station from these sensors along the same coordinated path. If we are unable to meet the response-time deadline using a coordinated path, we split the tracking path and the reporting path in to independent paths, so that the base-station is reported within the response-time deadline. We perform extensive simulations on different sample target-paths, and compute average response-time and network lifetime for each scenario. We also investigate the problem of optimal base-station placement, so as to improve the average response-time in the network.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115635660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Web 2.0 Framework for Real-time Location Intelligence 实时位置智能的Web 2.0框架
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370036
K. Rivard
With increasing deployments of global positioning system (GPS) devices, radio frequency identification (RFID) tags, and other location-aware devices, it is now possible to capture time-varying object information. In addition, existing systems such as enterprise resource planning (ERP) systems emit ancillary object metadata (e.g., inventory levels in a warehouse). The challenge is how to leverage these information assets for demanding field operations scenarios such as crisis management, given the size and real-time nature of the data. To address the challenge, we have built a Web 2.0 framework for real-time spatial intelligence and collaboration. Our framework includes an extensible architecture for ingesting and combining spatial data across multiple formats; a fusion server for merging spatial and bespoke business data; support for spatial transformations tied to configurable business rules; and a publishing engine that pushes the combined information out for consumption in a visual, collaborative presentation layer running in standard Web browsers and on mobile devices. The result is an easily deployable system with broad reach to the field through a visual, interactive interface presenting timely, meaningful information.
随着全球定位系统(GPS)设备、射频识别(RFID)标签和其他位置感知设备的部署不断增加,现在可以捕获时变的对象信息。此外,诸如企业资源规划(ERP)系统之类的现有系统会发出辅助对象元数据(例如,仓库中的库存水平)。面临的挑战是,考虑到数据的规模和实时性,如何利用这些信息资产来满足危机管理等苛刻的现场操作场景。为了应对这一挑战,我们建立了一个用于实时空间情报和协作的Web 2.0框架。我们的框架包括一个可扩展的架构,用于摄取和组合跨多种格式的空间数据;用于合并空间和定制业务数据的融合服务器;支持与可配置业务规则相关的空间转换;以及一个发布引擎,该引擎将合并后的信息推送出去,供在标准Web浏览器和移动设备上运行的可视化协作表示层中使用。其结果是一个易于部署的系统,通过可视化、交互式界面提供及时、有意义的信息,可以广泛地到达现场。
{"title":"A Web 2.0 Framework for Real-time Location Intelligence","authors":"K. Rivard","doi":"10.1109/THS.2007.370036","DOIUrl":"https://doi.org/10.1109/THS.2007.370036","url":null,"abstract":"With increasing deployments of global positioning system (GPS) devices, radio frequency identification (RFID) tags, and other location-aware devices, it is now possible to capture time-varying object information. In addition, existing systems such as enterprise resource planning (ERP) systems emit ancillary object metadata (e.g., inventory levels in a warehouse). The challenge is how to leverage these information assets for demanding field operations scenarios such as crisis management, given the size and real-time nature of the data. To address the challenge, we have built a Web 2.0 framework for real-time spatial intelligence and collaboration. Our framework includes an extensible architecture for ingesting and combining spatial data across multiple formats; a fusion server for merging spatial and bespoke business data; support for spatial transformations tied to configurable business rules; and a publishing engine that pushes the combined information out for consumption in a visual, collaborative presentation layer running in standard Web browsers and on mobile devices. The result is an easily deployable system with broad reach to the field through a visual, interactive interface presenting timely, meaningful information.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130163096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
TPLS: A Time and Power Based Localization Scheme for Indoor WLAN Using Sensor Networks TPLS:一种基于时间和功率的室内无线局域网传感器网络定位方案
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370031
Abdallah El Moutia, K. Makki, N. Pissinou
Rapid growth in the number of wireless enabled devices has led to an increased interest in location-aware services. The core support for such services is provided by a location system. In this paper, we present a time and power based localization scheme (TPLS) for indoor wireless local area network (WLAN) using an overlay sensor network. TPLS is based on time difference of arrival (TDoA) and received signal strength (RSS) using radio frequency and ultrasonic signals to measure and detect the range differences from the wireless mobile terminal to three sensor nodes. Mobile terminals can use TPLS to effectively estimate their locations based on the range differences. These range differences are averaged over multiple beacon intervals to counter interference and fading before they are combined to estimate the location of a mobile terminal through trilateration. TPLS requires low computation overhead and no time synchronization, as the location estimation algorithm involves only a simple algebraic operation.
无线设备数量的快速增长导致人们对位置感知服务的兴趣增加。这些服务的核心支持是由定位系统提供的。在本文中,我们提出了一种基于时间和功率的室内无线局域网(WLAN)定位方案(TPLS)。TPLS是基于到达时间差(TDoA)和接收信号强度(RSS),利用射频和超声波信号测量和检测从无线移动终端到三个传感器节点的距离差。移动终端可以使用TPLS基于距离差有效地估计其位置。这些距离差在多个信标间隔上平均,以对抗干扰和衰落,然后通过三边测量将它们组合起来估计移动终端的位置。TPLS的位置估计算法只涉及简单的代数运算,计算量小,不需要时间同步。
{"title":"TPLS: A Time and Power Based Localization Scheme for Indoor WLAN Using Sensor Networks","authors":"Abdallah El Moutia, K. Makki, N. Pissinou","doi":"10.1109/THS.2007.370031","DOIUrl":"https://doi.org/10.1109/THS.2007.370031","url":null,"abstract":"Rapid growth in the number of wireless enabled devices has led to an increased interest in location-aware services. The core support for such services is provided by a location system. In this paper, we present a time and power based localization scheme (TPLS) for indoor wireless local area network (WLAN) using an overlay sensor network. TPLS is based on time difference of arrival (TDoA) and received signal strength (RSS) using radio frequency and ultrasonic signals to measure and detect the range differences from the wireless mobile terminal to three sensor nodes. Mobile terminals can use TPLS to effectively estimate their locations based on the range differences. These range differences are averaged over multiple beacon intervals to counter interference and fading before they are combined to estimate the location of a mobile terminal through trilateration. TPLS requires low computation overhead and no time synchronization, as the location estimation algorithm involves only a simple algebraic operation.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125546194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
FNET: A Quickly Deployable and Economic System to Monitor the Electric Grid FNET:一个快速部署和经济的电网监控系统
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370047
R. Gardner, Yilu Liu
In a time where the electric grid has become a potential target for malicious attacks against homeland security, this paper presents a system that can detect and locate disturbances that have an impact the electric grid. The system presented is referred to as FNET which is short for "Internet-based Frequency Monitoring Network. " FNET uses frequency measurements taken from across the electric interconnection to detect and locate disturbances such as generator trips and load shedding. These events occur routinely (almost daily) under normal system conditions. In these circumstances, the electric grid and its components usually respond in a manner so as to preserve the grid's integrity. However, in a time where threats to homeland security can involve threats to the electric grid, such disturbances caused by malicious (and perhaps multiple) attacks can cascade leading to the collapse of the entire electric grid. The goal of this work is to show that FNET can be an invaluable tool for enhancing situational awareness of the country's electric infrastructure especially in situations where the preservation of homeland security is critical.
在电网已成为针对国土安全的恶意攻击的潜在目标的情况下,本文提出了一种能够检测和定位影响电网的干扰的系统。本文提出的系统被称为FNET,即“基于internet的频率监测网络”。FNET使用从整个电力互连中获取的频率测量来检测和定位干扰,例如发电机跳闸和负载脱落。在正常的系统条件下,这些事件经常(几乎每天)发生。在这种情况下,电网及其组成部分通常以某种方式作出反应,以保持电网的完整性。然而,在对国土安全的威胁可能涉及对电网的威胁的情况下,这种由恶意(可能是多次)攻击引起的干扰可能导致整个电网的崩溃。这项工作的目标是表明,FNET可以成为增强国家电力基础设施态势感知的宝贵工具,特别是在维护国土安全至关重要的情况下。
{"title":"FNET: A Quickly Deployable and Economic System to Monitor the Electric Grid","authors":"R. Gardner, Yilu Liu","doi":"10.1109/THS.2007.370047","DOIUrl":"https://doi.org/10.1109/THS.2007.370047","url":null,"abstract":"In a time where the electric grid has become a potential target for malicious attacks against homeland security, this paper presents a system that can detect and locate disturbances that have an impact the electric grid. The system presented is referred to as FNET which is short for \"Internet-based Frequency Monitoring Network. \" FNET uses frequency measurements taken from across the electric interconnection to detect and locate disturbances such as generator trips and load shedding. These events occur routinely (almost daily) under normal system conditions. In these circumstances, the electric grid and its components usually respond in a manner so as to preserve the grid's integrity. However, in a time where threats to homeland security can involve threats to the electric grid, such disturbances caused by malicious (and perhaps multiple) attacks can cascade leading to the collapse of the entire electric grid. The goal of this work is to show that FNET can be an invaluable tool for enhancing situational awareness of the country's electric infrastructure especially in situations where the preservation of homeland security is critical.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125556357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Data Interoperability Strategies for Conceptually-Similar Disparate Systems 概念相似的异构系统的数据互操作性策略
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370026
G. Harman
The public safety software industry is extremely fragmented; there are several hundred different dispatch systems alone in use in the United States today. All of these systems perform nearly identical functions from a user's perspective, but they all implement these functions and store the resulting data in their own fashion. This paper will examine a technique for sharing data between such systems for coordinated response to an emergency scenario or everyday events.
公共安全软件行业极度分散;今天,仅在美国就有几百种不同的调度系统在使用。从用户的角度来看,所有这些系统都执行几乎相同的功能,但是它们都以自己的方式实现这些功能并存储结果数据。本文将研究在这些系统之间共享数据的技术,以协调响应紧急情况或日常事件。
{"title":"Data Interoperability Strategies for Conceptually-Similar Disparate Systems","authors":"G. Harman","doi":"10.1109/THS.2007.370026","DOIUrl":"https://doi.org/10.1109/THS.2007.370026","url":null,"abstract":"The public safety software industry is extremely fragmented; there are several hundred different dispatch systems alone in use in the United States today. All of these systems perform nearly identical functions from a user's perspective, but they all implement these functions and store the resulting data in their own fashion. This paper will examine a technique for sharing data between such systems for coordinated response to an emergency scenario or everyday events.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121044148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human-Centered Fusion Framework 以人为本的融合框架
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370030
C. Posse, A. White, N. Beagley
In recent years the benefits of fusing signatures extracted from large amounts of distributed and/or heterogeneous data sources have been largely documented in various problems ranging from biological protein function prediction to cyberspace monitoring. In spite of significant progress in information fusion research, there is still no formal theoretical framework for defining various types of information fusion systems, defining and analyzing relations among such types, and designing information fusion systems using a formal method approach. Consequently, fusion systems are often poorly understood, are less than optimal, and/or do not suit user needs. To start addressing these issues, we outline a formal human-centered fusion framework for reasoning about fusion strategies. Our approach relies on a new taxonomy for fusion strategies, an alternative definition of information fusion in terms of parameterized paths in signature related spaces, an algorithmic formalization of fusion strategies and a library of numeric and dynamic visual tools measuring the impact as well as the impact behavior of fusion strategies. Using a real case of intelligence analysis we demonstrate that the proposed framework enables end users to rapidly 1) develop and implement alternative fusion strategies, 2) understand the impact of each strategy, 3) compare the various strategies, and 4) perform the above steps without having to know the mathematical foundations of the framework. We also demonstrate that the human impact on a fusion system is critical in the sense that small changes in strategies do not necessarily correspond to small changes in results.
近年来,从大量分布式和/或异构数据源中提取的融合特征的好处已经在从生物蛋白质功能预测到网络空间监测的各种问题中得到了大量的记录。尽管信息融合研究取得了重大进展,但目前还没有一个正式的理论框架来定义各种类型的信息融合系统,定义和分析这些类型之间的关系,以及使用形式化方法来设计信息融合系统。因此,融合系统通常不太了解,不是最佳的,和/或不适合用户需求。为了开始解决这些问题,我们概述了一个正式的以人为中心的融合框架,用于推理融合策略。我们的方法依赖于融合策略的新分类法,基于签名相关空间参数化路径的信息融合的替代定义,融合策略的算法形式化以及测量融合策略影响和影响行为的数字和动态可视化工具库。通过使用智能分析的真实案例,我们证明了所提出的框架使最终用户能够快速地1)开发和实施替代融合策略,2)了解每种策略的影响,3)比较各种策略,以及4)执行上述步骤,而无需了解框架的数学基础。我们还证明了人类对融合系统的影响是至关重要的,因为策略的微小变化并不一定对应于结果的微小变化。
{"title":"Human-Centered Fusion Framework","authors":"C. Posse, A. White, N. Beagley","doi":"10.1109/THS.2007.370030","DOIUrl":"https://doi.org/10.1109/THS.2007.370030","url":null,"abstract":"In recent years the benefits of fusing signatures extracted from large amounts of distributed and/or heterogeneous data sources have been largely documented in various problems ranging from biological protein function prediction to cyberspace monitoring. In spite of significant progress in information fusion research, there is still no formal theoretical framework for defining various types of information fusion systems, defining and analyzing relations among such types, and designing information fusion systems using a formal method approach. Consequently, fusion systems are often poorly understood, are less than optimal, and/or do not suit user needs. To start addressing these issues, we outline a formal human-centered fusion framework for reasoning about fusion strategies. Our approach relies on a new taxonomy for fusion strategies, an alternative definition of information fusion in terms of parameterized paths in signature related spaces, an algorithmic formalization of fusion strategies and a library of numeric and dynamic visual tools measuring the impact as well as the impact behavior of fusion strategies. Using a real case of intelligence analysis we demonstrate that the proposed framework enables end users to rapidly 1) develop and implement alternative fusion strategies, 2) understand the impact of each strategy, 3) compare the various strategies, and 4) perform the above steps without having to know the mathematical foundations of the framework. We also demonstrate that the human impact on a fusion system is critical in the sense that small changes in strategies do not necessarily correspond to small changes in results.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126791152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Automatic Visual Analysis for Transportation Security 运输安全的自动可视化分析
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370012
N. Haering, K. Shafique
The safety and security of transportation infrastructure has become the focus of increased attention in the post-9/11 era. Concerns in this area include the possibility of terrorist activity directed at travelers and/or property. As the leader in intelligent video, ObjectVideo is developing intelligent capabilities specifically tailored to meet the needs of the transportation industry that work effectively in diverse environments, for example, tunnels of a subway, highway rail grade crossings, and air and seaports. ObjectVideo's intelligent system employs a network of visual sensors to monitor sensitive areas. The technology accurately detects, identifies, classifies, and tracks objects and people; automatically detects activities that violate user specified security rules and notifies security personnel in real-time about rule violations and suspicious activities. The system automatically monitors user specified areas for unauthorized people and vehicles loitering on a platform, for suspicious objects (e.g., backpacks or bags) left on or near sensitive locations, or for objects that are large enough to cause serious accidents. Because the system is capable of distinguishing non-threatening objects and controlling false alerts, the software maximizes the effectiveness of security personnel, allowing them to focus their efforts on potential threats, enhancing protection for all passengers, freight and facilities.
交通基础设施的安全和保障已成为后9/11时代人们日益关注的焦点。这方面的关切包括针对旅行者和/或财产的恐怖主义活动的可能性。作为智能视频领域的领导者,ObjectVideo正在开发专门为满足运输行业在不同环境下有效工作的需求而量身定制的智能功能,例如地铁隧道、高速公路铁路平交道口、航空和海港。ObjectVideo的智能系统采用视觉传感器网络来监控敏感区域。该技术可以准确地检测、识别、分类和跟踪物体和人;自动检测违反用户安全规则的活动,并实时通知安全人员违反规则和可疑活动。该系统会自动监控用户指定的区域是否有未经授权的人员和车辆在平台上游荡,是否有可疑物品(如背包或包)留在敏感位置或附近,或者是否有足够大的物体导致严重事故。由于该系统能够区分非威胁性物体并控制虚假警报,因此该软件最大限度地提高了安全人员的效率,使他们能够将精力集中在潜在威胁上,加强对所有乘客、货物和设施的保护。
{"title":"Automatic Visual Analysis for Transportation Security","authors":"N. Haering, K. Shafique","doi":"10.1109/THS.2007.370012","DOIUrl":"https://doi.org/10.1109/THS.2007.370012","url":null,"abstract":"The safety and security of transportation infrastructure has become the focus of increased attention in the post-9/11 era. Concerns in this area include the possibility of terrorist activity directed at travelers and/or property. As the leader in intelligent video, ObjectVideo is developing intelligent capabilities specifically tailored to meet the needs of the transportation industry that work effectively in diverse environments, for example, tunnels of a subway, highway rail grade crossings, and air and seaports. ObjectVideo's intelligent system employs a network of visual sensors to monitor sensitive areas. The technology accurately detects, identifies, classifies, and tracks objects and people; automatically detects activities that violate user specified security rules and notifies security personnel in real-time about rule violations and suspicious activities. The system automatically monitors user specified areas for unauthorized people and vehicles loitering on a platform, for suspicious objects (e.g., backpacks or bags) left on or near sensitive locations, or for objects that are large enough to cause serious accidents. Because the system is capable of distinguishing non-threatening objects and controlling false alerts, the software maximizes the effectiveness of security personnel, allowing them to focus their efforts on potential threats, enhancing protection for all passengers, freight and facilities.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114235533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Results From Application of Time Series Concepts to Vehicle Gamma Count Profiles 时间序列概念应用于车辆伽马计数曲线的结果
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370034
C. Lo Presti, B. Milbrath, M. Tardiff, S. Hartley-McBride
Algorithms based on time-series analysis techniques were explored for maximizing the effectiveness of pass-through radiation portal monitors for detection of special nuclear material (SNM). Time-series properties of vehicle count profiles such as stationarity and autocorrelation within energy windows were characterized. Vehicle count profiles were nonstationary but were found to be made stationary by first-differencing. Autocorrelation functions showed consistent differences between NORM alarm and non-alarm vehicles. Injection studies were performed to assess the performance of time-domain detection algorithms based on stationarity tests and on the CUSUM change-point detection test. Results indicated possible roles for detection algorithms based on statistical process control and on time series concepts.
研究了基于时间序列分析技术的算法,以最大限度地提高特殊核材料(SNM)检测的穿透辐射门户监测仪的有效性。分析了车辆数量曲线在能量窗内的平稳性和自相关性等时间序列特性。车辆数量曲线是非平稳的,但发现通过一阶差分使其平稳。自相关函数在NORM报警车辆和非报警车辆之间表现出一致的差异。进行注射研究,以评估基于平稳性测试和CUSUM变化点检测测试的时域检测算法的性能。结果表明,基于统计过程控制和时间序列概念的检测算法可能发挥作用。
{"title":"Results From Application of Time Series Concepts to Vehicle Gamma Count Profiles","authors":"C. Lo Presti, B. Milbrath, M. Tardiff, S. Hartley-McBride","doi":"10.1109/THS.2007.370034","DOIUrl":"https://doi.org/10.1109/THS.2007.370034","url":null,"abstract":"Algorithms based on time-series analysis techniques were explored for maximizing the effectiveness of pass-through radiation portal monitors for detection of special nuclear material (SNM). Time-series properties of vehicle count profiles such as stationarity and autocorrelation within energy windows were characterized. Vehicle count profiles were nonstationary but were found to be made stationary by first-differencing. Autocorrelation functions showed consistent differences between NORM alarm and non-alarm vehicles. Injection studies were performed to assess the performance of time-domain detection algorithms based on stationarity tests and on the CUSUM change-point detection test. Results indicated possible roles for detection algorithms based on statistical process control and on time series concepts.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133577175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2007 IEEE Conference on Technologies for Homeland Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1