Ultra-wide bandwidth (UWB) radar can probably detect an intruder by virtue of his/her heartbeat. Ordinarily used for detection of buried objects, UWB radar can measure the Doppler frequency shift caused by the radar impinging on blood pumped in the heart to infer the presence of a human in situations where other sensors cannot, or to supplement other sensors. The heart is divided into four chambers. Two are called ventricles. They contract thereby ejecting blood at high speed. Detection improves as the intruder becomes increasingly agitated or runs. Pumping action of the heart is modeled mathematically.
{"title":"Intrusion Detection by Ultra-Wide Bandwidth Radar","authors":"N. J. Meyerhoff","doi":"10.1109/THS.2007.370024","DOIUrl":"https://doi.org/10.1109/THS.2007.370024","url":null,"abstract":"Ultra-wide bandwidth (UWB) radar can probably detect an intruder by virtue of his/her heartbeat. Ordinarily used for detection of buried objects, UWB radar can measure the Doppler frequency shift caused by the radar impinging on blood pumped in the heart to infer the presence of a human in situations where other sensors cannot, or to supplement other sensors. The heart is divided into four chambers. Two are called ventricles. They contract thereby ejecting blood at high speed. Detection improves as the intruder becomes increasingly agitated or runs. Pumping action of the heart is modeled mathematically.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115036139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The RadTrac real-time detection and tracking software runs on a laptop computer networked to gamma-radiation detectors. A probabilistic estimate for source position is generated by combining measured count rate data with a first-principles stochastic model for the space and time dependence of count rates and knowledge of detector intrinsic efficiency. Recent development work has focused on improving RadTrac sensitivity in low-count rate situations. A method has been developed for processing count rates by energy according to that part of the energy spectrum with the greatest signal-to-noise ratio. In addition a method has been developed that places constraints on the solution that are physically appropriate when count rates approach background. In both instances experiments with a weak source confirmed the uncertainty in estimated position is reduced.
{"title":"Sensitivity Improvement In Low-Profile Distributed Detector Systems For Tracking Sources In Transit","authors":"R. Vilim, R. Klann, C. Fink, C. Campos, T. Medley","doi":"10.1109/THS.2007.370041","DOIUrl":"https://doi.org/10.1109/THS.2007.370041","url":null,"abstract":"The RadTrac real-time detection and tracking software runs on a laptop computer networked to gamma-radiation detectors. A probabilistic estimate for source position is generated by combining measured count rate data with a first-principles stochastic model for the space and time dependence of count rates and knowledge of detector intrinsic efficiency. Recent development work has focused on improving RadTrac sensitivity in low-count rate situations. A method has been developed for processing count rates by energy according to that part of the energy spectrum with the greatest signal-to-noise ratio. In addition a method has been developed that places constraints on the solution that are physically appropriate when count rates approach background. In both instances experiments with a weak source confirmed the uncertainty in estimated position is reduced.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132017449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Johnson, P. Swaszek, R. Hartnett, R. Shalaev, M. Wiggins
In 2001, the Volpe National Transportation Systems Center completed an evaluation of the Global Positioning System (GPS) vulnerabilities and the potential impacts to transportation systems in the United States. One of the recommendations of this study was for the operation of backup system(s) to GPS; Loran C, which has been operated by the U.S. Coast Guard for the past 40 years, was identified as one possible backup system. The Federal Aviation Administration (FAA) has been leading a team consisting of members from industry, government, and academia to evaluate the future of Loran-C in the United States. In a recently completed Navigation Transition Study, the FAA concluded that Loran-C, as an independent radionavigation system, is theoretically the best backup for the GPS; however, in order for Loran-C to be considered a viable back-up system to GPS, it must be able to meet the requirements of non-precision approach (NPA) for the aviation community and the harbor entrance and approach (HEA) requirements for the maritime community. The accuracy requirements for Loran to be used as a backup system are 307 m for NPA and 20 m for HEA. In addition, there are integrity, availability, and continuity requirements. The current Loran system of 24 stations provides a stated absolute accuracy in navigation position of only 0.25 NM; however, enhanced Loran or eLoran has the capability of meeting the stringent requirements for NPA and HEA. In order to meet the accuracy requirements user receivers must use additional secondary factors (ASFs) in calculating the user position. ASFs are propagation time adjustments that are subtracted from the receiver's times of arrival (TOAs) to account for propagation over non-seawater paths. These ASFs vary both spatially and temporally and both types of variations need to be accounted for to meet the accuracy targets. The current approaches to meeting the needs of the aviation and maritime communities are slightly different. For maritime navigation, the spatial variations will be accounted for through the use of a grid of ASF values that is known by the receiver a priori. As one component of the eLoran system, a reference station located nearby the harbor will be used to estimate the temporal changes in the ASFs relative to the published spatial grid; these differences will be broadcast using the Loran data channel (9th pulse) to the user receiver. This general method to HEA navigation was discussed by the authors in 2003 (ION AM 2003). More recently (ION GNSS 2006) we developed a technique to process survey data into a harbor grid. For the aviation community the approach is to measure and publish a set of ASF values for each airport. These airport ASFs will be adjusted to be in the middle of the seasonal variation in order to minimize the maximum error. This approach has been discussed by the authors most recently in papers presented in 2005 (ILA 34) and 2006 (ION NTM 2006). In this paper we show results from both flight te
2001年,Volpe国家交通系统中心完成了对全球定位系统(GPS)脆弱性及其对美国交通系统潜在影响的评估。本研究的建议之一是对GPS的备份系统进行操作;在过去的40年里,美国海岸警卫队一直在使用Loran C,它被认为是一个可能的备用系统。美国联邦航空管理局(FAA)一直在领导一个由工业界、政府和学术界成员组成的团队,评估Loran-C在美国的未来。在最近完成的导航过渡研究中,联邦航空局得出结论,Loran-C作为一个独立的无线电导航系统,理论上是GPS的最佳备份;然而,为了使Loran-C被认为是GPS的可行备用系统,它必须能够满足航空界的非精确进近(NPA)要求和海事界的港口入口和进近(HEA)要求。Loran作为备用系统的精度要求为NPA为307米,HEA为20米。此外,还有完整性、可用性和连续性需求。目前由24个站点组成的Loran系统在导航位置上的绝对精度仅为0.25海里;然而,增强型Loran或eLoran具有满足NPA和HEA严格要求的能力。为了满足精度要求,用户接收机在计算用户位置时必须使用附加的辅助因子(asf)。asf是从接收机到达时间(TOAs)中减去的传播时间调整值,以考虑在非海水路径上的传播。这些asf在空间和时间上都有变化,需要考虑这两种类型的变化,以满足精度目标。目前满足航空界和海运界需求的方法略有不同。对于海上导航,将通过使用接收器先验地知道的ASF值网格来解释空间变化。作为eLoran系统的一个组成部分,位于港口附近的参考站将用于估计相对于公布的空间网格的asf的时间变化;这些差异将使用Loran数据通道(第9脉冲)广播到用户接收器。作者在2003年(ION AM 2003)对HEA导航的一般方法进行了讨论。最近(ION GNSS 2006),我们开发了一种将调查数据处理成港口网格的技术。对于航空界来说,方法是测量并发布每个机场的一组ASF值。这些机场asf将被调整到季节变化的中间位置,以尽量减少最大误差。作者最近在2005年(ILA 34)和2006年(ION NTM 2006)发表的论文中讨论了这种方法。在本文中,我们展示了在美国各地机场进行的飞行测试和在康涅狄格州泰晤士河进行的海上测试的结果。这些结果表明,eLoran能够使用我们提出的ASF方法满足NPA和HEA的精度要求。
{"title":"An Evaluation of eLoran as a Backup to GPS","authors":"G. Johnson, P. Swaszek, R. Hartnett, R. Shalaev, M. Wiggins","doi":"10.1109/THS.2007.370027","DOIUrl":"https://doi.org/10.1109/THS.2007.370027","url":null,"abstract":"In 2001, the Volpe National Transportation Systems Center completed an evaluation of the Global Positioning System (GPS) vulnerabilities and the potential impacts to transportation systems in the United States. One of the recommendations of this study was for the operation of backup system(s) to GPS; Loran C, which has been operated by the U.S. Coast Guard for the past 40 years, was identified as one possible backup system. The Federal Aviation Administration (FAA) has been leading a team consisting of members from industry, government, and academia to evaluate the future of Loran-C in the United States. In a recently completed Navigation Transition Study, the FAA concluded that Loran-C, as an independent radionavigation system, is theoretically the best backup for the GPS; however, in order for Loran-C to be considered a viable back-up system to GPS, it must be able to meet the requirements of non-precision approach (NPA) for the aviation community and the harbor entrance and approach (HEA) requirements for the maritime community. The accuracy requirements for Loran to be used as a backup system are 307 m for NPA and 20 m for HEA. In addition, there are integrity, availability, and continuity requirements. The current Loran system of 24 stations provides a stated absolute accuracy in navigation position of only 0.25 NM; however, enhanced Loran or eLoran has the capability of meeting the stringent requirements for NPA and HEA. In order to meet the accuracy requirements user receivers must use additional secondary factors (ASFs) in calculating the user position. ASFs are propagation time adjustments that are subtracted from the receiver's times of arrival (TOAs) to account for propagation over non-seawater paths. These ASFs vary both spatially and temporally and both types of variations need to be accounted for to meet the accuracy targets. The current approaches to meeting the needs of the aviation and maritime communities are slightly different. For maritime navigation, the spatial variations will be accounted for through the use of a grid of ASF values that is known by the receiver a priori. As one component of the eLoran system, a reference station located nearby the harbor will be used to estimate the temporal changes in the ASFs relative to the published spatial grid; these differences will be broadcast using the Loran data channel (9th pulse) to the user receiver. This general method to HEA navigation was discussed by the authors in 2003 (ION AM 2003). More recently (ION GNSS 2006) we developed a technique to process survey data into a harbor grid. For the aviation community the approach is to measure and publish a set of ASF values for each airport. These airport ASFs will be adjusted to be in the middle of the seasonal variation in order to minimize the maximum error. This approach has been discussed by the authors most recently in papers presented in 2005 (ILA 34) and 2006 (ION NTM 2006). In this paper we show results from both flight te","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114620723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Presently, star, mesh, tree, and clustered hierarchical architecture have emerged as the choice topologies for wireless sensor networks (WSN). Each topology has its own pros and cons under the specific working environment constraints. Consequently, current research depicts customized domain-specific ad hoc network topologies for efficient utilization of the constrained sensor resources. In this paper, we compare the various WSN topologies using performance criteria such as reliability, energy-efficiency, network life, scalability, self-organizing capability, data latency, etc. We focus on the reliability comparison of different topologies through a quantitative study. And we present a qualitative discussion on other performance criteria. Our study will provide useful insights for the WSN designers in choosing the appropriate topology and associated design parameters. We illustrate our observations via case studies.
{"title":"A Performance Comparison of Different Topologies for Wireless Sensor Networks","authors":"A. Shrestha, L. Xing","doi":"10.1109/THS.2007.370059","DOIUrl":"https://doi.org/10.1109/THS.2007.370059","url":null,"abstract":"Presently, star, mesh, tree, and clustered hierarchical architecture have emerged as the choice topologies for wireless sensor networks (WSN). Each topology has its own pros and cons under the specific working environment constraints. Consequently, current research depicts customized domain-specific ad hoc network topologies for efficient utilization of the constrained sensor resources. In this paper, we compare the various WSN topologies using performance criteria such as reliability, energy-efficiency, network life, scalability, self-organizing capability, data latency, etc. We focus on the reliability comparison of different topologies through a quantitative study. And we present a qualitative discussion on other performance criteria. Our study will provide useful insights for the WSN designers in choosing the appropriate topology and associated design parameters. We illustrate our observations via case studies.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114712898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recent large scale disasters have awakened governments domestically and overseas to their needs for preparedness to support homeland security and public safety. First responders of various agencies (e.g., fire department, police, EMS) are often on the front line to assist in managing these events to protect lives and property. The effectiveness of their mission is highly dependent on capability of communication systems available at incident scenes. The US Department of Homeland Security has among its top priorities the need for stronger information sharing and infrastructure protection, as well as interoperable communications and equipments. In this paper, we determine key requirements for first responder systems by examining various vulnerabilities and threats in such systems. We investigate implications of interoperable heterogeneous networking, horizontal/vertical communications and various applications on system architecture design. We also identify technical challenges in designing first responder systems with high quality of service and quality of protection, which are critical for supporting diverse multimedia first responder applications over reliable and trusted heterogeneous networks.
{"title":"Requirements and System Architecture Design Consideration for First Responder Systems","authors":"Ying Huang, Wenbo He, K. Nahrstedt, W.C. Lee","doi":"10.1109/THS.2007.370017","DOIUrl":"https://doi.org/10.1109/THS.2007.370017","url":null,"abstract":"Recent large scale disasters have awakened governments domestically and overseas to their needs for preparedness to support homeland security and public safety. First responders of various agencies (e.g., fire department, police, EMS) are often on the front line to assist in managing these events to protect lives and property. The effectiveness of their mission is highly dependent on capability of communication systems available at incident scenes. The US Department of Homeland Security has among its top priorities the need for stronger information sharing and infrastructure protection, as well as interoperable communications and equipments. In this paper, we determine key requirements for first responder systems by examining various vulnerabilities and threats in such systems. We investigate implications of interoperable heterogeneous networking, horizontal/vertical communications and various applications on system architecture design. We also identify technical challenges in designing first responder systems with high quality of service and quality of protection, which are critical for supporting diverse multimedia first responder applications over reliable and trusted heterogeneous networks.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115526357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper presents a novel agent-based framework as a decision aid tool for intelligence analysis. This technology extends net-centric information processing and abstraction as well as fusion and multi-source integration strategies. Our information agents traverse and mediate disparate ontologies in different formats providing a foundation for semantic interoperability. The presented system provides knowledge discovery by accessing a large number of information sources in a particular domain and organizing them into a network of information agents. Each agent provides expertise on a specific topic by drawing on relevant information from other information agents in related knowledge domains. Unique advantages include net-centric scalability, principled information assurance, as well as ground breaking knowledge discovery in service of intelligence analysis.
{"title":"Radical Agent-Based Approach for Intelligence Analysis","authors":"S. Rahimi, H. Hexmoor, B. Gupta","doi":"10.1109/THS.2007.370043","DOIUrl":"https://doi.org/10.1109/THS.2007.370043","url":null,"abstract":"This paper presents a novel agent-based framework as a decision aid tool for intelligence analysis. This technology extends net-centric information processing and abstraction as well as fusion and multi-source integration strategies. Our information agents traverse and mediate disparate ontologies in different formats providing a foundation for semantic interoperability. The presented system provides knowledge discovery by accessing a large number of information sources in a particular domain and organizing them into a network of information agents. Each agent provides expertise on a specific topic by drawing on relevant information from other information agents in related knowledge domains. Unique advantages include net-centric scalability, principled information assurance, as well as ground breaking knowledge discovery in service of intelligence analysis.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114774242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Fair, R. LeClaire, M. Wilson, A. L. Turk, S. DeLand, D. Powell, P.C. Klare, M. Ewers, L. Dauelsberg, D. Izraelevitz
Decision makers, faced with highly complex alternatives for protecting our nation's critical infrastructures must understand the consequences of policy options before they enact solutions to prevent and mitigate disasters. An effective way to examine these tradeoffs is to use a computer simulation that integrates high level representations of each infrastructure, their interdependencies and reactions to a variety of potential disruptions. To address this need, the Critical Infrastructure Protection Decision Support System (CIPDSS) project, funded by the Department of Homeland Security Science and Technology Directorate (DHS S&T), has developed a decision support tool that provides insights to help decision makers make risk-informed decisions. With the addition of a disease progression simulation, the CIPDSS tool has a unique ability to provide a high-level, integrated analysis of a pandemic influenza outbreak while representing the impact on critical infrastructures. This simulation models the time-dependent evolution of the disease and can be calibrated to prior data or to other higher fidelity models as appropriate. Mitigation options such as the use of antivirals and vaccines as prophylaxis, treatment or some combination as well as quarantine options can be assessed. Special attention is given to impacts to the population through sickness, targeted quarantine, or fear-based self-isolation and the resulting impacts on critical infrastructure operations.
{"title":"An Integrated Simulation of Pandemic Influenza Evolution, Mitigation and Infrastructure Response","authors":"J. Fair, R. LeClaire, M. Wilson, A. L. Turk, S. DeLand, D. Powell, P.C. Klare, M. Ewers, L. Dauelsberg, D. Izraelevitz","doi":"10.1109/THS.2007.370052","DOIUrl":"https://doi.org/10.1109/THS.2007.370052","url":null,"abstract":"Decision makers, faced with highly complex alternatives for protecting our nation's critical infrastructures must understand the consequences of policy options before they enact solutions to prevent and mitigate disasters. An effective way to examine these tradeoffs is to use a computer simulation that integrates high level representations of each infrastructure, their interdependencies and reactions to a variety of potential disruptions. To address this need, the Critical Infrastructure Protection Decision Support System (CIPDSS) project, funded by the Department of Homeland Security Science and Technology Directorate (DHS S&T), has developed a decision support tool that provides insights to help decision makers make risk-informed decisions. With the addition of a disease progression simulation, the CIPDSS tool has a unique ability to provide a high-level, integrated analysis of a pandemic influenza outbreak while representing the impact on critical infrastructures. This simulation models the time-dependent evolution of the disease and can be calibrated to prior data or to other higher fidelity models as appropriate. Mitigation options such as the use of antivirals and vaccines as prophylaxis, treatment or some combination as well as quarantine options can be assessed. Special attention is given to impacts to the population through sickness, targeted quarantine, or fear-based self-isolation and the resulting impacts on critical infrastructure operations.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"75 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120925142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Weiqun Shi, G. Arabadjis, B. Bishop, P. Hill, R. Plasse
Potential terrorists/adversaries can exploit a wide range of airborne threats against civilian and military targets. There is no effective, low-cost solution to robustly and reliably detect and identify small, low-flying airborne vehicles such as fixed-wing aircraft or unmanned aerial vehicles (UAVs) that might be carrying out chemical, biological or nuclear attacks, or smuggling drugs or illegal immigrants across the border. This paper presents a low-cost and low-power methodology for performing key 24/7 sentry functions that can be used for the protection and the surveillance of critical infrastructure from airborne threats. The methodology is based on joint multi-sensor fusion technology. It consists of a forward-based fence comprised of a mixture of selected low cost, low power, netted sensors including a simple radar, acoustic microphone array and optical (infrared and visible) cameras to detect, track and discriminate potential airborne targets. An experimental prototype end-to-end proof of concept system with deploy able software, hardware and connectivity is built using COTS component. Multi-modal senor fusion algorithms employing Kalman filter for target tracking and acoustic and image recognition algorithm for target classification are implemented. Results from field tests reveal reasonable detection and discrimination among candidate aircraft.
{"title":"Development of an Experimental Prototype Multi-Modal Netted Sensor Fence for Homeland Defense and Border Integrity","authors":"Weiqun Shi, G. Arabadjis, B. Bishop, P. Hill, R. Plasse","doi":"10.1109/THS.2007.370049","DOIUrl":"https://doi.org/10.1109/THS.2007.370049","url":null,"abstract":"Potential terrorists/adversaries can exploit a wide range of airborne threats against civilian and military targets. There is no effective, low-cost solution to robustly and reliably detect and identify small, low-flying airborne vehicles such as fixed-wing aircraft or unmanned aerial vehicles (UAVs) that might be carrying out chemical, biological or nuclear attacks, or smuggling drugs or illegal immigrants across the border. This paper presents a low-cost and low-power methodology for performing key 24/7 sentry functions that can be used for the protection and the surveillance of critical infrastructure from airborne threats. The methodology is based on joint multi-sensor fusion technology. It consists of a forward-based fence comprised of a mixture of selected low cost, low power, netted sensors including a simple radar, acoustic microphone array and optical (infrared and visible) cameras to detect, track and discriminate potential airborne targets. An experimental prototype end-to-end proof of concept system with deploy able software, hardware and connectivity is built using COTS component. Multi-modal senor fusion algorithms employing Kalman filter for target tracking and acoustic and image recognition algorithm for target classification are implemented. Results from field tests reveal reasonable detection and discrimination among candidate aircraft.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"864 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120978730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Moving objects often contain the most important information in surveillance videos. The detection and segmentation of moving objects are the basis for object recognition and intrusion analysis. Gaussian mixture model (GMM) is an effective way to extract moving objects from a video background. However, the conventional mixture Gaussian method suffers from false motion detection in complex backgrounds and slow convergence. A novel approach, which integrates an adaptive Gaussian mixture model with a support vector machine (SVM) classifier, is proposed to detect and segment moving objects in dynamic backgrounds for video surveillance. Each pixel in an image sequence is sorted as a background pixel or a foreground pixel by applying mixture Gaussian method. A block-based SVM classifier is further employed to check each foreground pixel, and it classifies the foreground pixel as a motion pixel or a non-motion pixel. All motion pixels are grouped into moving objects. By utilizing both spatial and temporal information, this integrated method is robust to complex environments. Experimental results show this approach significantly decreases the false motion detection and improves segmentation quality of moving objects.
{"title":"Moving Objects Detection and Segmentation In Dynamic Video Backgrounds","authors":"Jiaming Zhang, Chi Hau Chen","doi":"10.1109/THS.2007.370021","DOIUrl":"https://doi.org/10.1109/THS.2007.370021","url":null,"abstract":"Moving objects often contain the most important information in surveillance videos. The detection and segmentation of moving objects are the basis for object recognition and intrusion analysis. Gaussian mixture model (GMM) is an effective way to extract moving objects from a video background. However, the conventional mixture Gaussian method suffers from false motion detection in complex backgrounds and slow convergence. A novel approach, which integrates an adaptive Gaussian mixture model with a support vector machine (SVM) classifier, is proposed to detect and segment moving objects in dynamic backgrounds for video surveillance. Each pixel in an image sequence is sorted as a background pixel or a foreground pixel by applying mixture Gaussian method. A block-based SVM classifier is further employed to check each foreground pixel, and it classifies the foreground pixel as a motion pixel or a non-motion pixel. All motion pixels are grouped into moving objects. By utilizing both spatial and temporal information, this integrated method is robust to complex environments. Experimental results show this approach significantly decreases the false motion detection and improves segmentation quality of moving objects.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124501652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A prototype system for the detection, assessment and mitigation of airborne chemical, biological, radiological and explosive releases in the Port of Boston and other US seaports.
一个用于检测、评估和缓解波士顿港和其他美国海港空气中化学、生物、放射性和爆炸性释放的原型系统。
{"title":"Protecting Boston's Environment (PROBE)","authors":"R. F. Weiss","doi":"10.1109/THS.2007.370038","DOIUrl":"https://doi.org/10.1109/THS.2007.370038","url":null,"abstract":"A prototype system for the detection, assessment and mitigation of airborne chemical, biological, radiological and explosive releases in the Port of Boston and other US seaports.","PeriodicalId":428684,"journal":{"name":"2007 IEEE Conference on Technologies for Homeland Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129118372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}