The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Guidelines, directives, and policy statements are usually presented in “linear” text form - word after word, page after page. However necessary, this practice impedes full understanding, obscures feedback dynamics, hides mutual dependencies and cascading effects and the like, — even when augmented with tables and diagrams. The net result is often a checklist response as an end in itself. All this...
This paper examines the vulnerabilities created by commercially available drone technology to facilities security and how a risk assessment process can be used to identify how the ability to secure a site is being transformed. This requires the transforming from 2D thinking and perimeter fencing to a 3D cage and identifying how sensors can be deployed to stem the vulnerabilities. The smuggling of...
Scene understanding is an important component of intelligence, surveillance, and reconnaissance systems as well as autonomous vehicles. Scenes are composed of objects and their surrounding environment, both of which should be useful for a vision system to recognize the type of scene. A fusion system architecture that combines features from a whole image and detected objects, analogous to simultaneous...
Several transportation network vulnerability models have been proposed. However, most only consider disruptions as a static snapshot in time and the impact on total travel time. These approaches cannot consider the time-varying nature of travel demand nor other undesirable outcomes that follow from transportation network disruptions. This paper proposes an algorithmic approach to assess the vulnerability...
Polyvinyl toluene and polystyrene are materials commonly used in plastic scintillators. In recent years, cold weather related performance degradation has been identified in plastic scintillators that are exposed to the environment. Prior exposure to water vapor at high temperatures, in particular, has been identified as a likely culprit. This work subjected a selection of commercially produced polyvinyl...
Disasters caused by terrorist attacks or by natural causes such as floodings or earthquakes pose a very challenging task for emergency responders. DIORAMA disaster situation awareness and management system enhances the situation awareness of emergency responders by localizing victims in real time. In this paper we introduce a low cost localization algorithm for DIORAMA system using Bluetooth Low Energy...
Today, cloud computing is of paramount importance and is widely used. There have been many works illustrating the potential of narrowly focused security attacks against cloud systems, as well as elaborate mitigation techniques. However, the understanding of the implications of these attacks and mitigations on practical cloud systems as a whole, remains limited. One of the reasons is the difficulty...
Over the last decade, there have been several unsuccessful attempts to commercialize indoor localization technology for emergency responders mainly due to a poor product-market fit. This paper describes in detail the findings and conclusions of NSF Innovation Corps (I-Corps) Team 735 (Customer Discovery for Field-Deployable Indoor Localization Technology), part of the Spring 2016 DC-area cohort. As...
Color transfer techniques have been widely developed to manipulate color information of image data in many applications. In this paper, color transfer research is presented for camouflage applications, along with the challenges facing many state-of-the-art color transfer methods. To address these challenges, a new fast color transfer algorithm is proposed. This new fast color transfer algorithm follows...
Maritime border protection has an important role in border security. The increasing number of refugees migrating from one country to an another in illegal ways creates a potential risk for those countries having that of traffic. According to the United Nations Refugee Agency, the majority of refugees and migrants are likely to be aboard unsafe boats that are prone to capsizing. For these types of...
The Dover inherently secure processor being developed at Draper extends a conventional CPU (we use an open-source RISC-V implementation) with a Policy EXecution coprocessor (PEX). The PEX maintains metadata at the granularity of every word accessible by the application processor (AP), including registers, and the PEX enforces software-defined policies at the granularity of each instruction executed...
SIR alone appears to explain the bulk of the correlation between Incident Responder ratings and the Risk Index model. However, it appears that the semantic quality factor, Q, was able to capture some risk information that SIR alone was not. While the random variation in Spearman's Correlation Coefficient calculated on a sample of 20 observations is significant compared to any of the absolute differences...
In this paper, we propose two schemes for prescription eyeglasses detection. The first proposed scheme is non-learning which uses Viola-Jones to detect Region of Interest (ROI) followed by glass detection yielding an overall accuracy of 99.0% for FERET and 97.9% for VISOB datasets. The second scheme is the learning-based scheme consisting of three main steps (a) ROI detection, (b) Local Binary Pattern...
This paper presents the results from a feasibility study where an artificial neural network is applied to detect person-borne improvised explosive devices (IEDs) from imagery acquired using three different sensors; a radar array, an infrared (IR) camera, and a passive millimeter-wave camera. The data set was obtained from the U.S. Department of Homeland Security (DHS) Science and Technology Directorate...
In order to reach systemic sustainability, efforts and activities will need coordination beyond a single entity and across a community. Common ground and common opportunity exists between community sustainability development and community resilience. The Rochester Sustainability Collaborative organized their collective efforts and applied a qualitative and quantitative indicator framework to assess...
One imperative mission of the Department of Homeland Security (DHS) is to prevent, combat, and mitigate extensive and sophisticated Distributed Denial of Service (DDoS) attacks in early stages. The problem with DDoS attacks is that they can cripple even the most established and largest organizations through generating a huge amount of traffic that will cause the network to crash. A Denial of Service...
A wide field-of-view and rapid response to threats are critical components of any surveillance system. Field of view is normally implemented by articulating a camera allowing it to swivel to pan and tilt, and actively zooming in on “interesting” locations. Since a single camera suffers from the “soda straw” problem, where only a small portion of the scene can be examined at any given time (leaving...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.