首页 > 最新文献

2007 IEEE Conference on Technologies for Homeland Security最新文献

英文 中文
A Distributed Event-triggered Knowledge Sharing System for Agricultural Homeland Security 面向农业国土安全的分布式事件触发知识共享系统
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370042
S. Degwekar, J. DePree, H. Beck, S. Su
Government agencies globally are facing problems like illegal immigration, terrorism, and disease diagnostics and control. Solutions to these problems rely heavily on collaborating organizations' ability to effectively and efficiently share not only data but also knowledge embedded in organizational and inter-organizational policies, regulations, data and security constraints, processes and procedures. The United States Department of Agriculture has launched a multi-year national project to build the National Plant Diagnostic Network (NPDN) for strengthening the homeland security protection of food and agriculture by connecting five regional plant diagnostic centers with a national center. Complementing this effort, our research team has been developing a web-based, distributed system for event-triggered knowledge sharing among NPDN organizations. We capture multi-faceted knowledge using three types of rules and rule structures. A user-friendly interface is provided for collaborating organizations to define events of interest as well as knowledge rules and publish them in a global registry for browsing, querying, event subscription and notification, and processing. Event data are the dots that can be connected across organizational boundaries through the interoperation of knowledge rules and rule structures.
全球的政府机构都面临着非法移民、恐怖主义、疾病诊断和控制等问题。这些问题的解决方案在很大程度上依赖于协作组织有效和高效地共享数据的能力,不仅如此,还包括组织和组织间政策、法规、数据和安全约束、流程和程序中嵌入的知识。美国农业部启动了一项为期多年的国家项目,建立国家植物诊断网络(NPDN),通过将五个地区植物诊断中心与一个国家中心连接起来,加强对粮食和农业的国土安全保护。作为补充,我们的研究团队一直在开发一个基于网络的分布式系统,用于NPDN组织之间的事件触发知识共享。我们使用三种类型的规则和规则结构来获取多方面的知识。为协作组织提供了一个用户友好的界面,用于定义感兴趣的事件和知识规则,并将它们发布到全局注册中心,以便浏览、查询、事件订阅和通知以及处理。事件数据是可以通过知识规则和规则结构的互操作跨组织边界连接起来的点。
{"title":"A Distributed Event-triggered Knowledge Sharing System for Agricultural Homeland Security","authors":"S. Degwekar, J. DePree, H. Beck, S. Su","doi":"10.1109/THS.2007.370042","DOIUrl":"https://doi.org/10.1109/THS.2007.370042","url":null,"abstract":"Government agencies globally are facing problems like illegal immigration, terrorism, and disease diagnostics and control. Solutions to these problems rely heavily on collaborating organizations' ability to effectively and efficiently share not only data but also knowledge embedded in organizational and inter-organizational policies, regulations, data and security constraints, processes and procedures. The United States Department of Agriculture has launched a multi-year national project to build the National Plant Diagnostic Network (NPDN) for strengthening the homeland security protection of food and agriculture by connecting five regional plant diagnostic centers with a national center. Complementing this effort, our research team has been developing a web-based, distributed system for event-triggered knowledge sharing among NPDN organizations. We capture multi-faceted knowledge using three types of rules and rule structures. A user-friendly interface is provided for collaborating organizations to define events of interest as well as knowledge rules and publish them in a global registry for browsing, querying, event subscription and notification, and processing. Event data are the dots that can be connected across organizational boundaries through the interoperation of knowledge rules and rule structures.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133579004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improving Collaborative Situation Awareness with Transmedial Infrastructure 通过跨医疗基础设施提高协作态势感知
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370060
V.S. Wu, F. Velander
When attacks or natural disasters occur, emergency response organizations rely on Tactical Operations Center for situation awareness. Currently, there is a lack of connectivity and real-time data management across all agencies. Without a technology to support the harvesting and dissemination of real-time data relevant to each agent's roles and responsibilities, inter-agency communication can often be difficult and chaotic. Whether at the TOC or on-site, the combined use of fixed and mobile devices to access a common relevant picture makes each agent into an active node; as more nodes are networked in, the big picture of what's happening becomes increasingly clearer. This paper discusses how transmedial technologies can transform each agent into a network of nodes for collaborative situation awareness.
当攻击或自然灾害发生时,应急响应组织依靠战术行动中心进行态势感知。目前,所有机构之间缺乏连接和实时数据管理。如果没有一种技术来支持收集和传播与每个代理的作用和责任有关的实时数据,机构间通信往往会困难和混乱。无论是在TOC还是在现场,结合使用固定和移动设备访问共同的相关图片使每个代理都成为活动节点;随着越来越多的节点联网,正在发生的事情的大图景变得越来越清晰。本文讨论了跨媒体技术如何将每个代理转化为一个节点网络,以进行协作态势感知。
{"title":"Improving Collaborative Situation Awareness with Transmedial Infrastructure","authors":"V.S. Wu, F. Velander","doi":"10.1109/THS.2007.370060","DOIUrl":"https://doi.org/10.1109/THS.2007.370060","url":null,"abstract":"When attacks or natural disasters occur, emergency response organizations rely on Tactical Operations Center for situation awareness. Currently, there is a lack of connectivity and real-time data management across all agencies. Without a technology to support the harvesting and dissemination of real-time data relevant to each agent's roles and responsibilities, inter-agency communication can often be difficult and chaotic. Whether at the TOC or on-site, the combined use of fixed and mobile devices to access a common relevant picture makes each agent into an active node; as more nodes are networked in, the big picture of what's happening becomes increasingly clearer. This paper discusses how transmedial technologies can transform each agent into a network of nodes for collaborative situation awareness.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129816768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Components of Continuous IT Availability & Disaster Tolerant Computing: 2007 IEEE Conference on Technologies for Homeland Security: Enhancing Critical Infrastructure Dependability 持续IT可用性和容灾计算组件:2007年IEEE国土安全技术会议:增强关键基础设施的可靠性
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370028
Chad M. Lawler, S. Szygenda
This paper provides a review of the components of disaster tolerant computing and communications and reviews the current state in light of recent man-made terrorist events. The technology, process and human resource challenges of traditional disaster recovery approaches to disaster preparedness are outlined. The paper examines the relationships between disaster tolerant systems, Information Technology (IT) application availability and executive level management visibility necessary for successful system operations in the event of a catastrophic disaster. The risks of IT application downtime attributable to the increasing dependence on critical information technology applications and infrastructure are explored. Opportunities to extend complex systems independence analysis to the private business sector, and disaster tolerance are explored. A general approach for disaster tolerance is reviewed which mitigates unplanned downtime through a disciplined approach of IT infrastructure design based on redundancy and distributed components, with special attention given to the ability of executive level management to comprehend the value of uptime of an application and make appropriate capital investment.
本文回顾了容灾计算和通信的组成部分,并根据最近的人为恐怖事件回顾了目前的状态。概述了传统灾难恢复方法在备灾方面的技术、流程和人力资源挑战。本文研究了在灾难性灾难发生时,成功的系统操作所必需的容灾系统、信息技术(IT)应用程序可用性和执行层管理可见性之间的关系。由于对关键信息技术应用程序和基础设施的依赖日益增加,对IT应用程序停机的风险进行了探讨。将复杂系统独立分析扩展到私营企业部门的机会,以及对灾难的容忍。本文回顾了一种通用的容灾方法,该方法通过基于冗余和分布式组件的IT基础设施设计的规范方法减少了计划外停机时间,并特别关注执行层管理理解应用程序正常运行时间价值并进行适当资本投资的能力。
{"title":"Components of Continuous IT Availability & Disaster Tolerant Computing: 2007 IEEE Conference on Technologies for Homeland Security: Enhancing Critical Infrastructure Dependability","authors":"Chad M. Lawler, S. Szygenda","doi":"10.1109/THS.2007.370028","DOIUrl":"https://doi.org/10.1109/THS.2007.370028","url":null,"abstract":"This paper provides a review of the components of disaster tolerant computing and communications and reviews the current state in light of recent man-made terrorist events. The technology, process and human resource challenges of traditional disaster recovery approaches to disaster preparedness are outlined. The paper examines the relationships between disaster tolerant systems, Information Technology (IT) application availability and executive level management visibility necessary for successful system operations in the event of a catastrophic disaster. The risks of IT application downtime attributable to the increasing dependence on critical information technology applications and infrastructure are explored. Opportunities to extend complex systems independence analysis to the private business sector, and disaster tolerance are explored. A general approach for disaster tolerance is reviewed which mitigates unplanned downtime through a disciplined approach of IT infrastructure design based on redundancy and distributed components, with special attention given to the ability of executive level management to comprehend the value of uptime of an application and make appropriate capital investment.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130040572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Modified Fluorescent Lamp for Discreet Biometric Surveillance 用于精细生物识别监测的改良荧光灯
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370050
J. Cooley, A. Avestruz, S. Leeb
A standard 48-inch two-bulb fluorescent lamp was modified to be used as a capacitive sensing system. The lamp sensor system demonstrated the ability to detect the presence and motion of human targets at ranges of up to 10 feet between the lamp and the closest edge of the target. Proof of concept was also demonstrated for metal detection by demonstrating the ability to differentiate between a human target and the same human target carrying conducting (metallic) objects. The lamp sensor shows potential for low-cost and widespread discreet security monitoring and biometric surveillance.
一个标准的48英寸双灯泡荧光灯被改装成一个电容传感系统。灯传感器系统展示了在灯和目标最近边缘之间的10英尺范围内检测人类目标的存在和运动的能力。通过展示区分人类目标和携带导电(金属)物体的同一人类目标的能力,还展示了金属探测的概念证明。灯传感器显示了低成本和广泛的谨慎安全监控和生物识别监控的潜力。
{"title":"A Modified Fluorescent Lamp for Discreet Biometric Surveillance","authors":"J. Cooley, A. Avestruz, S. Leeb","doi":"10.1109/THS.2007.370050","DOIUrl":"https://doi.org/10.1109/THS.2007.370050","url":null,"abstract":"A standard 48-inch two-bulb fluorescent lamp was modified to be used as a capacitive sensing system. The lamp sensor system demonstrated the ability to detect the presence and motion of human targets at ranges of up to 10 feet between the lamp and the closest edge of the target. Proof of concept was also demonstrated for metal detection by demonstrating the ability to differentiate between a human target and the same human target carrying conducting (metallic) objects. The lamp sensor shows potential for low-cost and widespread discreet security monitoring and biometric surveillance.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127469169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Video Content Analysis with Effective Response 视频内容分析与有效响应
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370020
D. Abrams, S. McDowall
Video content analytics effectively identifies threats in video surveillance camera feeds. These behaviors include person/vehicle entering restricted zone, counter-flow detection, loitering, object left behind, and others. In order to provide enhanced security, events need to be integrated with a command and control system capable of effectively responding to hundreds of events per day in a busy, critical infrastructure facility. We describe a novel system -NerveCenter - that links analytic events with command center data wall camera pop-ups on alarm, extended notification tools that send multi-modal alerts, acknowledgement tracking, 911 computer aided dispatch (CAD), and geo-coded mapping tools that give operators a tactical map. The usability of these tools is discussed along with how to provide situational awareness and a common operating picture to operators and first responders.
视频内容分析有效地识别视频监控摄像机馈送中的威胁。这些行为包括人/车辆进入禁区、逆流检测、徘徊、遗留物品等。为了提供增强的安全性,需要将事件与能够在繁忙的关键基础设施中每天有效响应数百个事件的指挥和控制系统集成。我们描述了一种新颖的系统——nervecenter——它将分析事件与指挥中心数据墙报警时弹出的摄像头、发送多模态警报的扩展通知工具、确认跟踪、911计算机辅助调度(CAD)以及为操作员提供战术地图的地理编码制图工具联系起来。讨论了这些工具的可用性,以及如何为操作员和第一响应者提供态势感知和通用操作图像。
{"title":"Video Content Analysis with Effective Response","authors":"D. Abrams, S. McDowall","doi":"10.1109/THS.2007.370020","DOIUrl":"https://doi.org/10.1109/THS.2007.370020","url":null,"abstract":"Video content analytics effectively identifies threats in video surveillance camera feeds. These behaviors include person/vehicle entering restricted zone, counter-flow detection, loitering, object left behind, and others. In order to provide enhanced security, events need to be integrated with a command and control system capable of effectively responding to hundreds of events per day in a busy, critical infrastructure facility. We describe a novel system -NerveCenter - that links analytic events with command center data wall camera pop-ups on alarm, extended notification tools that send multi-modal alerts, acknowledgement tracking, 911 computer aided dispatch (CAD), and geo-coded mapping tools that give operators a tactical map. The usability of these tools is discussed along with how to provide situational awareness and a common operating picture to operators and first responders.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115243088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Passenger and Baggage Security Screening Challenges in Marine Mass Transit 海上公共交通中乘客和行李安全检查的挑战
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370055
R. Hoaglund
As technologies continue to develop and test for deployment in marine mass transit applications, industry and government strive to make successful products that will provide cost effective solutions. These solutions will most probably emerge from a fusion of several technologies to create a more complete, multi-threat coverage. Many labor intensive technologies will be replaced by automated, accurate systems of the future. Until then, effective compensatory measures for technology gaps will continue to be the interim solution in deterring a significant security event in the ferry transport system.
随着技术的不断发展和测试,以部署在海上公共交通应用中,行业和政府努力制造成功的产品,提供具有成本效益的解决方案。这些解决方案很可能来自几种技术的融合,以创建更完整的多威胁覆盖范围。未来,许多劳动密集型技术将被自动化、精确的系统所取代。在此之前,针对技术差距的有效补偿措施将继续是阻止渡轮运输系统发生重大安全事件的临时解决方案。
{"title":"Passenger and Baggage Security Screening Challenges in Marine Mass Transit","authors":"R. Hoaglund","doi":"10.1109/THS.2007.370055","DOIUrl":"https://doi.org/10.1109/THS.2007.370055","url":null,"abstract":"As technologies continue to develop and test for deployment in marine mass transit applications, industry and government strive to make successful products that will provide cost effective solutions. These solutions will most probably emerge from a fusion of several technologies to create a more complete, multi-threat coverage. Many labor intensive technologies will be replaced by automated, accurate systems of the future. Until then, effective compensatory measures for technology gaps will continue to be the interim solution in deterring a significant security event in the ferry transport system.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128239064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Mechanism for Achieving Secure and Reliable Data Transmission in Wireless Sensor Networks 一种实现无线传感器网络安全可靠数据传输的新机制
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370058
Ruiping Ma, L. Xing, Howard E. Michel
Wireless sensor networks must be designed to be both secure and reliable, especially when they are used in national security and safety-critical applications. In this paper, we propose a new mechanism, called MVMP (multi-version multi-path), which integrates data segmentation, Forward Error Correction coding, multiple paths, and multiple versions of cryptographic algorithms for achieving both secure and reliable data transmission in sensor networks. The MVMP is also energy-aware in that each piece of the original data will be encrypted by a single encryption algorithm once, and it will be transmitted only once. The proposed MVMP mechanism is compared with existing mechanisms, in particular, the secret sharing mechanism using performance criteria including redundancy level, self-healing capability, and security.
无线传感器网络的设计必须既安全又可靠,特别是当它们用于国家安全和安全关键应用时。在本文中,我们提出了一种新的机制,称为MVMP(多版本多路径),它集成了数据分割、前向纠错编码、多路径和多版本的加密算法,以实现传感器网络中安全可靠的数据传输。MVMP还具有能量感知功能,因为每个原始数据片段将由单个加密算法加密一次,并且只传输一次。将所提出的MVMP机制与现有机制进行了比较,特别是与基于冗余度、自修复能力和安全性等性能标准的秘密共享机制进行了比较。
{"title":"A New Mechanism for Achieving Secure and Reliable Data Transmission in Wireless Sensor Networks","authors":"Ruiping Ma, L. Xing, Howard E. Michel","doi":"10.1109/THS.2007.370058","DOIUrl":"https://doi.org/10.1109/THS.2007.370058","url":null,"abstract":"Wireless sensor networks must be designed to be both secure and reliable, especially when they are used in national security and safety-critical applications. In this paper, we propose a new mechanism, called MVMP (multi-version multi-path), which integrates data segmentation, Forward Error Correction coding, multiple paths, and multiple versions of cryptographic algorithms for achieving both secure and reliable data transmission in sensor networks. The MVMP is also energy-aware in that each piece of the original data will be encrypted by a single encryption algorithm once, and it will be transmitted only once. The proposed MVMP mechanism is compared with existing mechanisms, in particular, the secret sharing mechanism using performance criteria including redundancy level, self-healing capability, and security.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124137515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Systems Engineering of Datacasting for Public Safety Vehicles 公共安全车辆数据广播系统工程
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370018
S. Valcourt, K. Chamberlin, B. McMahon, A. Kun
Public safety officers need current, accurate and complete information to maintain the security of their communities. Existing communications systems for public safety officers consist of analog and digital radios, supplemented with cell phone communications. Dispatchers with a need to broadcast information can only do so via voice. Small data packets can be exchanged via point-to-point methods with modern digital radios, but no data broadcast exists for public safety communications. Broadcasting images, audio and text to officers in the field will offer a better collection of information necessary to make critical, time-sensitive public safety decisions. Live updates to in-vehicle databases and computer systems will provide officers with critical, up-to-the-minute information. Working with New Hampshire Public Television and the National Institute of Justice, we are researching a system to utilize excess bandwidth available in the public television broadcast spectrum. The system is to be implemented using the onboard data and car management system known as Project54TM. The use of this excess bandwidth for the delivery of digital data in a one-way, high-speed, broadcast stream is called datacasting. While datacasting has existed since the initial draft ATSC standards defining digital television, few locations have installed full datacasting capabilities, and no other datacasting effort has implemented a mobile, two-way datacasting system. This paper will outline the design of the datacasting environment for the New Hampshire Department of Safety, the results of field tests performed by 10 State Police vehicles collecting data during routine public safety patrols, and the status of the two-way datacasting implementation.
公共安全官员需要最新、准确和完整的信息来维护社区的安全。现有的公共安全人员通信系统包括模拟和数字无线电,并辅以移动电话通信。需要广播信息的调度员只能通过语音进行。小数据包可以通过点对点的方式与现代数字无线电交换,但没有数据广播存在于公共安全通信中。向现场官员播放图像、音频和文本将更好地收集必要的信息,以便做出关键的、时效性强的公共安全决策。车载数据库和计算机系统的实时更新将为警察提供关键的最新信息。我们正在与新罕布什尔州公共电视台和国家司法研究所合作,研究一种利用公共电视广播频谱中可用的多余带宽的系统。该系统将使用称为Project54TM的车载数据和汽车管理系统来实现。利用这些多余的带宽以单向、高速的广播流传输数字数据被称为数据广播。虽然数据广播自ATSC定义数字电视的最初标准草案以来就已经存在,但很少有地方安装了完整的数据广播功能,而且没有其他数据广播工作实现了移动双向数据广播系统。本文将概述新罕布什尔州安全部门数据广播环境的设计,10辆州警车在例行公共安全巡逻期间收集数据进行的现场测试结果,以及双向数据广播实施的现状。
{"title":"Systems Engineering of Datacasting for Public Safety Vehicles","authors":"S. Valcourt, K. Chamberlin, B. McMahon, A. Kun","doi":"10.1109/THS.2007.370018","DOIUrl":"https://doi.org/10.1109/THS.2007.370018","url":null,"abstract":"Public safety officers need current, accurate and complete information to maintain the security of their communities. Existing communications systems for public safety officers consist of analog and digital radios, supplemented with cell phone communications. Dispatchers with a need to broadcast information can only do so via voice. Small data packets can be exchanged via point-to-point methods with modern digital radios, but no data broadcast exists for public safety communications. Broadcasting images, audio and text to officers in the field will offer a better collection of information necessary to make critical, time-sensitive public safety decisions. Live updates to in-vehicle databases and computer systems will provide officers with critical, up-to-the-minute information. Working with New Hampshire Public Television and the National Institute of Justice, we are researching a system to utilize excess bandwidth available in the public television broadcast spectrum. The system is to be implemented using the onboard data and car management system known as Project54TM. The use of this excess bandwidth for the delivery of digital data in a one-way, high-speed, broadcast stream is called datacasting. While datacasting has existed since the initial draft ATSC standards defining digital television, few locations have installed full datacasting capabilities, and no other datacasting effort has implemented a mobile, two-way datacasting system. This paper will outline the design of the datacasting environment for the New Hampshire Department of Safety, the results of field tests performed by 10 State Police vehicles collecting data during routine public safety patrols, and the status of the two-way datacasting implementation.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132846371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Apply STAMP to Critical Infrastructure Protection 将STAMP应用于关键基础设施保护
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370048
Joseph R. Laracy, N. Leveson
Classical risk-based or game theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable for security risks. Additionally, these models suffer from serious deficiencies when they are applied to software-intensive, complex engineering systems. Recent work in the area of system safety engineering has led to the development of a new accident model for system safety that acknowledges the dynamic complexity of accidents. System-theoretic accident models and processes (STAMP) applies principles from control theory to enforce constraints on hazards and thereby prevent accidents. Appreciating the similarities between safety and security while still acknowledging the differences, this paper introduces the use of STAMP to security problems. In particular, it is applied to identify and mitigate the threats that could emerge in critical infrastructure systems such as the air transportation network.
经典的基于风险或博弈论的安全模型依赖于可靠性理论和理性预期经济学的假设,这些假设不适用于安全风险。此外,这些模型在应用于软件密集型、复杂的工程系统时存在严重的缺陷。最近在系统安全工程领域的工作已经导致了一种新的系统安全事故模型的发展,该模型承认事故的动态复杂性。系统理论事故模型和过程(STAMP)应用控制理论的原理来加强对危险的约束,从而防止事故的发生。认识到安全与保安之间的相似之处,同时也承认它们之间的差异,本文介绍了STAMP在安全问题中的应用。特别是,它被应用于识别和减轻可能出现在关键基础设施系统(如航空运输网络)中的威胁。
{"title":"Apply STAMP to Critical Infrastructure Protection","authors":"Joseph R. Laracy, N. Leveson","doi":"10.1109/THS.2007.370048","DOIUrl":"https://doi.org/10.1109/THS.2007.370048","url":null,"abstract":"Classical risk-based or game theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable for security risks. Additionally, these models suffer from serious deficiencies when they are applied to software-intensive, complex engineering systems. Recent work in the area of system safety engineering has led to the development of a new accident model for system safety that acknowledges the dynamic complexity of accidents. System-theoretic accident models and processes (STAMP) applies principles from control theory to enforce constraints on hazards and thereby prevent accidents. Appreciating the similarities between safety and security while still acknowledging the differences, this paper introduces the use of STAMP to security problems. In particular, it is applied to identify and mitigate the threats that could emerge in critical infrastructure systems such as the air transportation network.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121681455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Perforated Semiconductor Neutron Detector Modules for Detection of Spontaneous Fission Neutrons 用于探测自发裂变中子的穿孔半导体中子探测器模块
Pub Date : 2007-05-16 DOI: 10.1109/THS.2007.370039
D. Mcgregor, S. Bellinger, D. Bruno, S. Cowley, M. Elazegui, W. McNeil, E. Patterson, T. Unruh, C. J. Solomon, J. Shultis, B. B. Rice
Compact neutron detectors are being designed and tested for use as low-power real-time personnel dosimeters and for remote neutron sensing. The neutron detectors are pin diodes that are mass produced from high-purity Si wafers. Each detector has thousands of circular perforations etched vertically into the device. The perforations are backfilled with 6LiF to make the pin diodes sensitive to thermal neutrons. The prototype devices delivered over 3.8% thermal neutron detection efficiency while operating on only 15 volts. The highest efficiency devices thus far have delivered over 12% thermal neutron detection efficiency. Devices moderated with high density polyethylene (HDPE) can be used for fast neutron detection. Compact packages with or without remote readout electronics are under construction and characterization.
正在设计和测试紧凑型中子探测器,用于低功率实时人员剂量计和远程中子传感。中子探测器是由高纯度硅晶片大量生产的引脚二极管。每个探测器都有数千个垂直蚀刻的圆形穿孔。穿孔用6liff填充,使引脚二极管对热中子敏感。该原型设备在仅15伏电压下提供了超过3.8%的热中子探测效率。到目前为止,效率最高的设备已经提供了超过12%的热中子探测效率。用高密度聚乙烯(HDPE)缓和的装置可用于快中子探测。具有或不具有远程读出电子设备的紧凑封装正在建设和表征中。
{"title":"Perforated Semiconductor Neutron Detector Modules for Detection of Spontaneous Fission Neutrons","authors":"D. Mcgregor, S. Bellinger, D. Bruno, S. Cowley, M. Elazegui, W. McNeil, E. Patterson, T. Unruh, C. J. Solomon, J. Shultis, B. B. Rice","doi":"10.1109/THS.2007.370039","DOIUrl":"https://doi.org/10.1109/THS.2007.370039","url":null,"abstract":"Compact neutron detectors are being designed and tested for use as low-power real-time personnel dosimeters and for remote neutron sensing. The neutron detectors are pin diodes that are mass produced from high-purity Si wafers. Each detector has thousands of circular perforations etched vertically into the device. The perforations are backfilled with 6LiF to make the pin diodes sensitive to thermal neutrons. The prototype devices delivered over 3.8% thermal neutron detection efficiency while operating on only 15 volts. The highest efficiency devices thus far have delivered over 12% thermal neutron detection efficiency. Devices moderated with high density polyethylene (HDPE) can be used for fast neutron detection. Compact packages with or without remote readout electronics are under construction and characterization.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127446506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2007 IEEE Conference on Technologies for Homeland Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1