By Topic

Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology

Date 16-19 Oct. 2006

Filter Results

Displaying Results 1 - 25 of 61
  • [Front cover]

    Publication Year: 2006, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (886 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2006, Page(s): nil1
    Request permission for commercial reuse | PDF file iconPDF (179 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2006, Page(s): nil2
    Request permission for commercial reuse | PDF file iconPDF (543 KB)
    Freely Available from IEEE
  • 40th Annual IEEE International Carnahan Conferences Security Technology

    Publication Year: 2006, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (790 KB)
    Freely Available from IEEE
  • Copyright page

    Publication Year: 2006, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (350 KB)
    Freely Available from IEEE
  • Executive Committee Emeritus

    Publication Year: 2006, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (566 KB)
    Freely Available from IEEE
  • Committees

    Publication Year: 2006, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (591 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2006, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (2704 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2006, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (1437 KB)
    Freely Available from IEEE
  • IEEE Conference History

    Publication Year: 2006, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (993 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2006, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (853 KB)
    Freely Available from IEEE
  • ICCST Opening Address - Lexington, Kentucky, 2006

    Publication Year: 2006, Page(s):xv - xviii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4457 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Roger Hagengruber [biography]

    Publication Year: 2006, Page(s): xix
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (823 KB)

    Summary form only given. A short biography of Roger Hagengruber is presented. He became the Chief Security Officer at Los Alamos National Laboratory in June 2006 In this position, he is responsible for developing security strategy for the lab including increased utilization of technology. Prior to this appointment, he was Director of the Institute for Public Policy and the Office for Policy, Secun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Biographical Sketch

    Publication Year: 2006, Page(s): xx
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1015 KB) | HTML iconHTML

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proximity Detection and Ranging Using a Modified Fluorescent Lamp for Security Applications

    Publication Year: 2006, Page(s):1 - 8
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6884 KB) | HTML iconHTML

    This paper describes a proximity detection system that uses a fluorescent lamp as a capacitive sensor. Because of the ubiquity of fluorescent lamps in commercial buildings, public spaces, and households, the potential applications of a capacitive sensor of this nature are numerous. These applications include people counting, real-time people tracking and detection of anomalous objects on a person ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Proposed Motionless Laser Scanning Architecture for Perimeter Security

    Publication Year: 2006, Page(s):9 - 16
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (9020 KB) | HTML iconHTML

    This paper describes a motionless laser scanning architecture consisting of few components and no moving parts. While laser scanning by beam deflection mechanisms hold many advantages over conventional bi-static IR sensors and radio and microwave frequency intruder detection, inherent flaws exist relating to the wear and tear of the deflecting mirror and its electro-mechanical driving components. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Power Options for Wireless Sensor Networks

    Publication Year: 2006, Page(s):17 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4303 KB) | HTML iconHTML

    To combat the security threats of the 21st century it has become increasingly necessary to protect ever-remote terrain with wireless sensor surveillance. These systems must be self-sustaining to ensure they are constantly operational. Sandia developed a software simulation tool to validate a variety of renewable energy sources for commercial needs. While this software is heavily used in industry i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Practical High-Frequency Sonar for Intruder Detection in Very Shallow Environments

    Publication Year: 2006, Page(s):21 - 25
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5593 KB) | HTML iconHTML

    An active high-frequency sonar system has been identified that is appropriate for detection and classification of human-sized targets in very shallow littoral environments. The system uses technology that is currently in use in fisheries acoustics. This technology has been optimized over the last few decades to provide a robust, cost-effective solution for detection of biological targets in clutte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Selected Systems for the Detection of Human Stowaways in Air Cargo Containers

    Publication Year: 2006, Page(s):26 - 29
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4256 KB) | HTML iconHTML

    In the spring of 2005, the United States Department of Homeland Security, Transportation Security Administration (TSA) commissioned a study to identify effective methods for the detection of human stowaways in air cargo containers. A market survey was initially conducted that identified existing COTS products. That survey identified four products that were deemed worthy of further test and evaluat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Ravin: Intrusion Detection and Tracking with Organic Airport Radar and Video Systems

    Publication Year: 2006, Page(s):30 - 33
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4714 KB) | HTML iconHTML

    Currently, airport perimeter intrusion detection primarily relies on visual surveillance by security personnel and is often augmented with video cameras. This approach is limited to day light hours and degrades with bad weather. We are developing a proof of concept system, mobile RAVIN, that detects intrusions as small as a human, works at all hours and all weather conditions, and provides rapid s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Force Protection Sensor Selector

    Publication Year: 2006, Page(s):34 - 45
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (12359 KB) | HTML iconHTML

    Force protection sensor selector (FPSS) is a computer application that assists security personnel in the selection of exterior intrusion detection systems best suited for maintaining force protection and physical security at a site. The FPSS software ranks intrusion detection system (IDS) suitability on the basis of known environmental impacts on sensor systems and expected operating conditions. T... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security Simulation for Vulnerability Assessment

    Publication Year: 2006, Page(s):46 - 50
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6776 KB) | HTML iconHTML

    This paper discusses simulation technologies developed to "stimulate" an operational command and control security system. The paper discusses simulation techniques used to create a virtual model of a facility in which to conduct vulnerability assessment exercises, performance benchmarking, concept of operations (CONOPS) development and operator training. The paper discusses the specific techniques... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Considerations for Implementing an IP-Based, Video Assessment and Surveillance System

    Publication Year: 2006, Page(s):51 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (8270 KB) | HTML iconHTML

    The flexibility gained in moving from an analog video system to a digital video system is immeasurable, and the onslaught of new IP-addressable cameras and recording solutions has given security system designers an endless set of options for migrating to a digital video system. Video can be brought up and viewed by any authorized user on the security network, and adding new devices is as easy as p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quality Enhancement in Security Image Information

    Publication Year: 2006, Page(s):60 - 67
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (8853 KB) | HTML iconHTML

    The image quality of image or video information is a crucial issue in security imaging systems. Our paper deals with three different points - a posteriori image improvement, objective image quality assessment and noise removal. In the first part we have tested and evaluated the impact of edge-enhancing operators. Their performance is of two contradictory effects -edge sharpening and noise level in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Illegal Entrant Detection at a Restricted Area in Open Spaces Using Color Features

    Publication Year: 2006, Page(s):68 - 74
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6782 KB) | HTML iconHTML

    Developing an automatic and intelligent system to detect, track, recognize, and analyze moving objects could save human power in monitoring centers. In this study, the color features of an employee's uniform were extracted to identify the entrance legality in a restricted area of an open space. The body of an entrant was segmented into three parts for locating the region of interest (ROI) using a ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.