By Topic

Security Technology, 2000. Proceedings. IEEE 34th Annual 2000 International Carnahan Conference on

Date 23-25 Oct. 2000

Filter Results

Displaying Results 1 - 25 of 43
  • Proceedings IEEE 34th Annual 2000 International Carnahan Conference on Security Technology (Cat. No.00CH37083)

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (183 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s): 15
    Request permission for commercial reuse | PDF file iconPDF (53 KB)
    Freely Available from IEEE
  • Intrepid digital microwave: a new approach to bistatic radar

    Publication Year: 2000, Page(s):17 - 21
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    Southwest Microwave Inc. (SMI) introduced the world's first commercially viable bistatic microwave intrusion detection sensor in 1971. Bistatic microwave has become the paradigm for high security perimeters, and SMI products have become industry standards. With the introduction of intrepid digital microwave, SMI brings the latest in digital signal processing (DSP) and power and data networking to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AMETHYST: automatic alarm assessment: operational experience

    Publication Year: 2000, Page(s):107 - 112
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB)

    The aim of the AMETHYST (Automatic Event Authentication Systems) project is to encourage the development of a high-performance perimeter detection system by using video assessment to enhance the Perimeter Intrusion Detection System (PIDS). AMETHYST will automatically assess the cause of all PIDS alarms and pass to an operator only those alarms that are likely to be caused by an intruder. It will t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • False alarm estimation in an automated fingerprint identification system (AFIS)

    Publication Year: 2000, Page(s):260 - 261
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (124 KB)

    Law enforcement uses automated fingerprint identification systems (AFIS) to identify people who are reported missing, wanted, or who require background investigation. AFIS employ automated searches of fingerprint features in feature databases. The feature records have relational links to other descriptive information. Quantitative AFIS evaluation includes measurement of missed detection (Type I) a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Trunking versus conventional radio systems

    Publication Year: 2000, Page(s):137 - 140
    Cited by:  Papers (1)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    Correctional Service Canada (CSC) has recently replaced the ageing, out-of-date radio communications systems in all major CSC facilities with new conventional digital radio systems. Based on very specific and restrictive operational requirements coupled with developments in digital radio technology and the Associated Public Communications Officers (APCO) Project 25 digital radio standards, it was ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A 6805-based security system for broadcasting stock information

    Publication Year: 2000, Page(s):238 - 241
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (264 KB)

    This research describes the design and implementation of secure stock information broadcasting systems using Motorola's 68HC05B6 single-chip microcontroller as the embedded security devices. In-band technology is used to transparently insert encrypted stock information into TV channel(s) and send to households. The implemented conditional-access system uses the Data Encryption Standard (DES) and t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Introduction of site access management systems across the defence estate

    Publication Year: 2000, Page(s):71 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (536 KB)

    The paper examines the introduction by the UK's Ministry of Defence (MOD) of Site Access Management Systems (SAMS, formerly known as Technical Access Control Systems (TACS)) into the Defence Estate. The MOD's association with SAMS came about as a result of a number of events that focused the attention of the MOD on the need to explore all options to better the security of access, particularly in r... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Operational requirements for security measures

    Publication Year: 2000, Page(s):64 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    Many physical and procedural security measures have not met users' needs because the implications of what is required have not been fully thought through. An operational requirement is a statement of needs based upon a thorough and systematic assessment of the problems to be solved and the hoped for outcomes. It should provide the link between a high level need and the system procurement process. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technical considerations in site access management systems

    Publication Year: 2000, Page(s):77 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB)

    Site Access Management Systems (SAM) within the UK have evolved throughout the 90's, utilising increasingly more powerful and sophisticated hardware, more advanced communications services, and more effective software, thus providing improved user interfaces and better data/image handling characteristics. The requirement for SAMS in secure establishments came about from a desire to increase the act... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assisting the UK government's CCTV initiative

    Publication Year: 2000, Page(s):113 - 118
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB)

    The paper discusses the technology being used in a UK Government initiative under which £153m is being made available to “crime reduction partnerships” in England and Wales to install CCTV in public areas. The aim is to reduce crime and the fear of crime. So far, the Government has awarded a total of £33m to more than 180 schemes. The perception in Government circles is tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fire detection with temperature sensor arrays

    Publication Year: 2000, Page(s):262 - 268
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    We show how to locate a fire in a closed room by an array of sophisticated temperature sensors. Solving this problem enables not only the automatic fire extinguishing in buildings such as museums, warehouses, shopping malls, computer rooms, etc., but also a better understanding of the causes of fire. Consequently, this approach might be also very useful for fire prevention and fire detection View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intelli-FIELDTM the next generation, electrostatic field disturbance sensor

    Publication Year: 2000, Page(s):22 - 28
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (640 KB)

    Outdoor perimeter volumetric field disturbance sensors must reliably detect perturbations to the field caused by an intruder, while rejecting noise and environmental changes that may be orders of magnitude greater than the target response. Currently, E-Field(R) systems are widely deployed in nuclear, correctional and industrial sites to provide perimeter security. These systems are eff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Remote detection of deception using radar vital signs monitor technology

    Publication Year: 2000, Page(s):170 - 173
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    Traditional lie detector testing requires the subject to be physically attached to a variety of sensors. This is impractical for scenarios such as checkpoints where a large number of individuals are entering at a high rate, forcing other methods to be employed. Currently, checkpoint officers must make a quick decision to determine if an individual is being deceptive, and if in turn they should be ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The RADAR Flashlight three years later: an update on developmental progress

    Publication Year: 2000, Page(s):257 - 259
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    The RADAR Flashlight was developed to be a law enforcement tool. It can detect the respiration signature of a motionless individual standing up to 5 meters behind a 20 centimeter hollow core concrete block wall. Wooden doors typical of those found on most homes are almost transparent to the system. Dry plywood, particle board and wall board do not attenuate the signal significantly. Most system ap... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dramatic resolution enhancement of gamma-ray spectra acquired with cadmium-zinc-telluride detectors via a patented pulse-shape-analysis methodology

    Publication Year: 2000, Page(s):276 - 280
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    We are developing a technique to correct for the resolution-degrading ballistic deficit in cadmium-zinc-telluride (CZT) gamma-ray detectors using our patent-pending pulse-shape analysis methodology. The pulse-shape-analysis methodology has already been demonstrated by LLNL for application in Compton rejection (technology being licensed) and possible application to gamma-ray imaging with Ge-based s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Line-scan imaging for the positive identification of ballistics specimens

    Publication Year: 2000, Page(s):269 - 275
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    The identification of firearms from forensic ballistics specimens is an exacting and intensive activity performed by specialists with extensive experience. The introduction of imaging technology to assist the identification process of firearms has enhanced the ability of forensic ballisticians to analyse the specimens. This paper describes a development in the application of imaging technology for... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Novelty in synergistic radar technology, by adding intrusion location capability

    Publication Year: 2000, Page(s):29 - 34
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    There is a new trend in the outdoor security market that demands more precision in identifying the crossing area of an intruder. Often called “intrusion location capability”, this capability also presents inherent features such as; more accuracy in camera pre-set positioning, temporary disabling of sub-zone and individual sensitivity level per sub-zone. However, even though the market ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applications of Blast/FX, an explosive effects analysis software tool

    Publication Year: 2000, Page(s):218 - 221
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    Recent events have highlighted the threat posed by terrorist bombings. To address these evolving security concerns, the FAA identified the need to have an improved capability to assess the effects of explosions against civil aviation facilities and their occupants. For many engineers and security specialists, the need to assess the risks to buildings from explosions represents a new and often impo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Usability assessment of a bottle content tester for use in airports by screeners

    Publication Year: 2000, Page(s):174 - 177
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    Explosives may be concealed as a liquid or slurry in bottles in carry-on or checked baggage. To alleviate the uncertainty associated with screening liquid containers, devices are currently in development to screen bottles. These bottle-screening devices will provide a mechanism for airport security personnel to quickly and precisely examine liquids in bottles. Currently, airport security personnel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of feature extraction techniques in automatic face recognition systems for security applications

    Publication Year: 2000, Page(s):40 - 46
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    The paper is aimed at analyzing the performance of two different state-of-the-art automatic face recognition systems. One of the key issues regarding face recognition is the election of convenient features for representing identity in facial images. Multivariate analysis and Gabor analysis are alternative methods for accomplishing this feature extraction stage. Consequently, two different approach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Barriers [security]

    Publication Year: 2000, Page(s):100 - 106
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (588 KB)

    It is widely accepted that a single barrier or a series of barriers can protect a secure site from attack. Although the presence of a barrier may deter an attack, in many cases its most important function is to delay an attack. A barrier is considered effective if it can delay an attacker for a period longer than it takes a response force to respond to the attack. At present, there are varying vie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining high security barriers and electronic detection to create active barrier structures

    Publication Year: 2000, Page(s):94 - 99
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    Typical perimeter security systems may be identified as some sort of barrier structure combined with an electronic detection system applied in proximity to it. The paper describes the combination of a simple high security fence base structure with modified topping devices and electronic detection systems such as taut wire and microphonic detectors. The combined structure is designed as a single ac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CATV - interactive security and communication system

    Publication Year: 2000, Page(s):124 - 136
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    The areas of television, telecommunication, and information technology are converging, new application areas are arising and new services are being established. Aside from the traditional delivery channels, computer networks play an increasing role in providing the new services. An important part of these services is based on video. However, in order to develop and establish such services, the dif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Radio frequency-based personnel location systems

    Publication Year: 2000, Page(s):141 - 150
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (944 KB)

    This paper presents the technologies available to locate the origin of radio frequency transmissions for Personnel Location Systems. The development and application of these systems will be discussed. A new class of signal strength location systems will be introduced that sets the standard for locating accuracy in indoor and campus environments. Many technologies have been applied to locating radi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.