The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a novel method to improve the engagement and performance of security guards in tasks involving the monitoring of multiple video feeds. The method is based on multiplexing to the monitoring task symbiotic activities that are entertaining in nature and supportive to (not detracting from) this task. A longitudinal crossover experiment that lasted 10 days on n=15 security guards confirmed the...
There is a current interest towards outfitting police officers with body cameras while on patrol. While these systems can provide useful video recordings to serve as evidence, there are concerns that widespread deployment of these cameras will erode our individual privacy. This paper looks at the different guidelines for body cameras to identify the main privacy protection mechanisms, as well as suggest...
We present a model of fire spread in Mediterranean and Middle-Eastern (MME) cities. The model accounts for the characteristic properties of MME cities: inflammable constructions and vegetation between constructions that becomes highly flammable during long and dry summers. We develop the model following the general rules proposed by Lee and Davidson in their empirically driven model of urban fire...
The Universal Serial Bus (USB) is one of the most commonly used standards for peripherals communications in the computer industry. Its features, such as cross-platform and hot-swapping, make USB the dominant choice of connections in computer systems including keyboards, printers, external storages, digital cameras, scanners, and smartphones. In addition to communication, USB is used to charge devices...
In this paper we introduce the first augmented reality based training system for Mass Casualty Incidents (MCI). Our system enables the trainees to train in the physical environment while the disaster related objects and events such as victims, fire, tornadoes are digitally overlaid in the Smartphone camera view using Augmented Reality (AR). Using this system the trainees can experience the real physical...
Analyzing and visualizing spatiotemporal events at a disaster site is a challenging task due to the vast number of events captured during the rescue process. At the same time, the availability of spatial temporal information during a disaster event is invaluable to understand the rescue process and enhance the MCI training accordingly. For this purpose, we have developed a spatiotemporal toolkit that...
For safety and security, surveillance cameras are widely deployed. A high percentage of the visual data, however, is never watched by humans nor analyzed by computer programs. Moreover, it is common practice to erase the data after a short duration (say, two weeks) and reuse the storage space. As a result, the data are non-persistent. Non-persistent data presents serious security risks: the unwatched...
We introduce an active RFID-based algorithm for real-time tracking of victims during a Mass Casually Incident (MCI). By using responders locations obtained from GPS on their Smartphones as mobile anchors and active RFID readings from the victims, the proposed localization algorithm obtains average localization accuracy commensurate with GPS [1] (under 20 ft.). The proposed algorithm is a mobile, scalable,...
This paper attempts to provide a systematic overview of the principles and practice of biodosimetry. Biodosimetry is the use of radiation induced changes in the tissues to provide an estimate of the dose the person may have received in a radiation event. Biodosimetry provides an estimate of the individual's risk of developing the life threatening consequences of acute radiation syndrome, which is...
We describe the recent developments of an open-source project called RATCHET that can be used by groups of users to collectively construct attack trees. We present the RATCHET framework as well as a model for testing and evaluation of the produced attack trees. RATCHET has been tested in classroom settings with positive results and this paper presents the plans for expanding its outreach to the community...
Medical emergencies are part of the common daily lives of people anywhere in the world. Frequently, some of these medical emergencies end up tragically for many people due to many reasons, one of which depends on the delivery of the medical treatment especially when the patient is uncommunicative or unresponsive. The ability of the attending medical personnel to access a patient's medical history...
After 9/11, the US government encouraged civilian and military planners to think “out of the box” to prevent future large scale terror attacks. Now, civilian and military planners must continue to think “out of the box” to prevent smaller terror attacks like the recent ones in Paris and San Bernardino. These smaller terror attacks are of great concern to everyone in the US and around the world because...
A test bed was developed for Plum Island, NY experimental multi-sensor security surveillance. The system includes broadband radars, cameras, an Automatic Identification System receiver, geophones and underwater passive acoustic sensors. The sensors were grouped into nodes connected to a Command and Control Center via a Wi-Fi network. Some sensors are COTS, some were developed and built by Stevens...
The biometric authentication technology is booming in a variety of applications such as security of computers, cell phones, credit cards etc. The most widely used method of biometric identification is dactylography, as the large database already available and law enforcement agencies have long-term experience with this technology. Widely used methods of prerecording the fingerprint could be as simple...
Human trafficking is a form of modern slavery that involves force, fraud, and coercion against individuals either into forced labor or to perform sexual acts, with sex slavery receiving significant attention over the past number of years. Human trafficking has been categorized as the third most profitable crime behind the drug and arms trades [1]. Our small research team of mostly undergraduate students...
The government information sharing community faces many challenges facilitating compliant information sharing and usage across domains, including complex legislation that is difficult for non-specialists to interpret and verify by hand. We have demonstrated the utility of AIR (Accountability in RDF), an automated policy reasoning system, in the past to encode such rules in computer-readable format...
The Unmanned Aerial Vehicle (UAV) technology has gained immense popularity in recent times. The technology has witnessed enhanced capabilities in terms of payload, greater distance operability and stability in hovering. The growing sophistication in the UAV platform can be compared to the stability and efficiency delivered by manned aircraft. The UAV platform complimented by its size, absence of thermal...
In this work we propose a novel formulation that models the attack and compromise on a cyber network as a combination of two parts — direct compromise of a host and the compromise occurring through the spread of the attack on the network from a compromised host. The model parameters for the nodes are a concise representation of the host profiles that can include the risky behaviors of the associated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.