首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
The Police Scientific Branch (PSDB) is part of the Crime Reduction and Community Safety Group (CRCSG) of the Home Office. Part of PSDB's work includes evaluating and assessing new technologies for perimeter intrusion detection. Laser scanning technology has been used for some time in a range of industrial and commercial applications. These span from detecting hands when they are close to dangerous machinery to preventing collisions at container ports and monitoring manufacturing processes. Laser scanners are non-contact measurement systems and scan their surroundings two-dimensionally. This describes the application of laser scanning to physical security, including modifications to such systems for their use as perimeter intrusion detection systems (PIDS). In these systems, motion detection is provided by a pulsed laser beam by measuring the propagation time for the reflected beam to return to its source. Using this information, a contour plot of the surrounding area is built up. Once this contour information has been obtained, the detector can recognise the addition of an object to its field of view through a change in the programmed surroundings. Consequently, the size, shape, and direction of targets moving in the frame can be assessed and an alarm output given, if required. This explains the main operating principles of the systems, including mechanisms for the detection of a potential intruder and the handling of false alarms. Detection capabilities and the potential for low false alarm rates will be described, along with configurations for operational deployment.  相似文献   

2.
Many Perimeter Intrusion Detection Systems (PIDS) use microphonic sensors mounted on fences to detect intruder attacks. Vibrations in the fence are detected and analysed to determine whether they represent an intrusion attempt. The signals from the fence are processed to filter out as many false alarms as possible. It is important that the output from the sensors is linear along the fence, to ensure that there is no point on the perimeter less sensitive to intruder attack. The investigation reported in this paper aims to discover whether the performance of acoustic detection systems could be improved through research into fence acoustics. Using models of fence vibrations, sensors could be positioned to obtain a more linear response. In addition, through knowledge of the fence vibrations produced by both real attacks and the typical causes of false alarms, a system could be designed which could better distinguish between them, giving a lower false alarm rate and increased detection performance. Characteristic profiles were found for the different forms of attack to the fence. Although the investigation is still in its early stages, these attack profiles suggest that a new type of detection system could be designed based on profile recognition  相似文献   

3.
The further development of a previously reported knowledge-based vision recognition system for automating the interpretation of alarm events resulting from a perimeter intrusion detection system (PIDS) is reported. Measurements extracted over a sequence of digitized images are analyzed to identify the cause of the alarm. Models are maintained for alarm causes, and the scene and the measurements are matched with the models to derive an appropriate classification of the event. An overview of the initial classification system is provided, and modifications to the system are described. The results of applying the system to a range of real alarm events are presented, and further improvements are discussed  相似文献   

4.
Security applications of computer vision   总被引:1,自引:0,他引:1  
In an age which bears witness to a proliferation of Closed Circuit Television (CCTV) cameras for security and surveillance monitoring, the use of image processing and computer vision techniques which were provided as top end bespoke solutions can now be realised using desktop PC processing. Commercial Video Motion Detection (VMD) and Intelligent Scene Monitoring (ISM) systems are becoming increasingly sophisticated, aided, in no small way, by a technology transfer from previously exclusively military research sectors. Image processing is traditionally concerned with pre-processing operations such as Fourier filtering, edge detection and morphological operations. Computer vision extends the image processing paradigm to include understanding of scene content, tracking and object classification. Examples of computer vision applications include Automatic Number Plate Recognition (ANPR), people and vehicle tracking, crowd analysis and model based vision. Often image processing and computer vision techniques are developed with highly specific applications in mind and the goal of a more global understanding computer vision system remains, at least for now, outside the bounds of present technology. This paper will review some of the most recent developments in computer vision and image processing for challenging outdoor perimeter security applications. It also describes the efforts of development teams to integrate some of these advanced ideas into coherent prototype development systems  相似文献   

5.
CFAR data fusion center with inhomogeneous receivers   总被引:1,自引:0,他引:1  
Detection systems with distributed sensors and data fusion are increasingly used by surveillance systems. A system formed by N inhomogeneous constant false alarm rate (CFAR) detectors (cell-averaging (CA) and ordered statistic (OS) CFAR detectors) is studied. A recursive formulation of an algorithm that permits a fixed level of false alarms in the data fusion center is presented, to set the optimum individual threshold levels in the CFAR receivers and the optimum `K out of N' decision rule in order to maximize the total probability of detection. The algorithm also considers receivers of different quality or with different communication channel qualities connecting them with the fusion center. This procedure has been applied to several hypothetical networks with distributed CA-CFAR and OS-CFAR receivers and for Rayleigh targets and interference, and it was seen that in general the fusion decision OR rule is not always the best  相似文献   

6.
This paper describes one solution to the problem of providing Perimeter Intruder Detection, (PIDS), for sites whose boundary includes direct access from uncontrolled water. Two surveillance heads were proposed, each consisting of a TI camera and a Colour CCTV camera mounted on a pan and tilt unit  相似文献   

7.
分析了现代电子系统机内测试 (BIT)技术存在的虚警问题 ,提出运用神经网络虚警过滤器(NNFAF)技术来降低虚警、改进BIT能力 ;并介绍了NNFAF的原理和网络开发方法 ;最后分析了NN FAF技术的特点、应用及发展方向。  相似文献   

8.
A model is presented for estimating the intercept probabilities of radiowave-acquisition receiving systems. The specific architecture of each of the receiving systems is not important, but there must be two or more of them and they must operate in such a manner that for each trial (event) they alarm independently from a statistical point of view. The data giving the number of alarms for each receiver and the number of receivers alarming for each trial is all that is required. These data are used to form estimates of the conditional probabilities of intercept and simultaneous alarm. A least mean square estimator is then used to find the unconditional intercept probabilities.  相似文献   

9.
A technique for suppressing second-time-around radar returns using pulse-repetition interval (PRI) modulation is presented and analyzed. It is shown that a staggered PRI radar system can offer considerable improvement over a nonstaggered radar system in rejecting second-time-around returns which cause false alarms. This improvement is a function of detector implementation (noncoherent integrator or binary integrator), the number of staggered PRIs, the quiescent false alarm number, the Swerling number of the false return, the transmitted signal power, the second-time-around noise power, and the quiescent noise power of the radar. Small changes in transmitted signal power can be traded off with the quiescent false alarm number to suppress the bogus return significantly. In addition, for a noncoherent integrator, all other parameters being equal, if the second-time-around return is a Swerling case II or IV target, then there is an optimum number of staggered PRIs that can be chosen to minimize the likelihood of its detection. It is also shown that the binary integrator significantly reduces the number of second-time-around return detections when compared with the noncoherent integrator. However, there is an accompanying loss of detection  相似文献   

10.
Detection system with distributed sensors and data fusion. are increasingly being used by surveillance systems. There has been a great deal of theoretical study on decentralized detection networks composed of identical or non-identical sensors. To solve the resulting nonlinear system, exhaustive search and some crude approximations are adopted. However, those methods often cause either the system to be insensitive to some parameters or the suboptimal results. In this paper, a novel flexible genetic algorithm is investigated to obtain the optimal results on constant false alarm rate data fusion. Using this approach, all system parameters are directly coded in decimal chromosomes and they can be optimized simultaneously. The simulation results show that adopting the proposed approach, one can achieve better performances than the reported methods and results  相似文献   

11.
本地业务网络在实际工作中采用主备网双平面方式运行,各平面核心层交换机重要单板采用主备配置,一般情况下单板或设备出现异常,系统可以实现无缝割接,业务不受影响;但是,在实际维护过程中,由于配置了不同的检测机制,核心层交换机主控板倒换过程中,业务可能会出现异常。针对实际维护过程中发现的主控板倒换系统上报异常告警问题,通过跟踪异常情况下业务的错误转发路径分析主控板倒换对组网业务的影响,对异常告警产生的机理进行分析,提出通过重新激活BFD(Bidirectional Forwarding Detection,双向转发检测)会话的方式以保证业务正常转发路径的处理方法,以及对主控板版本进行升级的解决建议,可以有效保证业务网络的可靠运行。  相似文献   

12.
Determination of Failure Thresholds in Hybrid Navigation   总被引:1,自引:0,他引:1  
A systematic approach for the determination of failure thresholds for hybrid navigation systems is described. Cost functions which reflect the importance assigned to the consequences of false and missed alarms are minimized. The false alarm probability is obtained as a function of the threshold magnitude by observing the statistical behavior of the instrument outputs in the normal operating mode. The missed alarm probability is obtained by determining the sensitivity of navigation error performance to instrument error sources. Two cost functions are considered. To illustrate this method, failure detection and identification (FDI) thresholds are determined for the Space Shuttle Approach and Landing Test flight.  相似文献   

13.
The purpose of an intelligent alarm analysis system is to provide complete and manageable information to a central alarm station operator by applying alarm processing and fusion techniques to sensor information. This paper discusses the sensor fusion approach taken to perform intelligent alarm analysis for the Advanced Exterior Sensor (AES). The AES is an intrusion detection and assessment system designed for wide-area coverage, quick deployment, low false/nuisance alarm operation, and immediate visual assessment. It combines three sensor technologies (visible, infrared, and millimeter wave radar) collocated on a compact and portable remote sensor module. The remote sensor module rotates at a rate of 1 revolution per second to detect and track motion and provide assessment in a continuous 360° field-of-regard. Sensor fusion techniques are used to correlate and integrate the track data from these three sensors into a single track for operator observation. Additional inputs to the fusion process include environmental data, knowledge of sensor performance under certain weather conditions, sensor priority, and recent operator feedback. A confidence value is assigned to the track as a result of the fusion process. This helps to reduce nuisance alarms and to increase operator confidence in the system while reducing the workload of the operator  相似文献   

14.
The scientific mission DAVID (Data and Video Interactive Distribution) of the Italian Space Agency (ASI) will pioneer the use of the W-band for a challenging telecommunications experiment. The unavailability of channel measurements and the technological limitations in that frequency range imply a system assessment based on channel extrapolation and a wise error control strategy. In that frame, a system approach is proposed that will allow the exploitation of the W-band for high capacity satellite communications. The results obtained through that approach in the assessment of the DAVID W-band experiment are provided and their perspectives identified and discussed.  相似文献   

15.
Knowledge-based system for multi-target tracking in a littoral environment   总被引:1,自引:0,他引:1  
The paper addresses how to efficiently exploit the knowledge-base (KB), e.g. environmental maps and characteristics of the targets, in order to gain improved performance in the tracking of multiple targets via measurements provided by a ship-borne radar operating in a littoral environment. In this scenario, the nonhomogeneity of the surveillance region makes the conventional tracking systems (not using the KB) very sensitive to false alarms and/or missed detections. It is demonstrated that an effective use of the KB can be exploited at various levels of the tracking algorithms so as to significantly reduce the number of false alarms, missed detections, and false tracks and improve true target track life. The KB is exploited at two different levels. First, some key parameters of the tracking system are made dependent upon the track location, e.g., sea, land, coast, meteo zones (i.e., zones affected by meteorological phenomena) etc. Second, modifications are introduced to cope with a priori identified regions nit hi high clutter density (e.g. littoral areas, roads, meteo zones etc.). To evaluate the behavior of the proposed knowledge-based tracking systems, extensive results are presented using both simulated and real radar data  相似文献   

16.
The DAta and Video Interactive Distribution (DAVID) mission belongs to the Small Missions for Science and Technology Programme of the Italian Space Agency (ASI) and is aimed at pioneering the use of the W-band channel for telecommunications experiments. Furthermore, it envisages the test of a novel technique, for an optimal sharing of the satellite resources, among a grid of Earth terminals, that could be usefully exploited in future W-band operational systems.  相似文献   

17.
Safety and security are the most discussed topics in the aviation field. The latest security initiatives in the field of aviation propose [1I] the aircraft carriers to implement video surveillance within the aircraft at strategic locations. The current proposals allow the video surveillance data to be stored within the aircraft and monitored by one of the flight crew. The monitoring crew will be responsible for identifying the anomaly within the aircraft and take necessary preventive actions. With the introduction of additional technology within the aircraft, mere human perception may not be sufficient to make a decision. In this research work, the authors explore the possibility of implementing a smart video surveillance system (SVSS) within the aircraft that is tuned toward detecting the behavioral anomaly within the aircraft. The SVSS will generate security triggers when it detects an anomaly within the aircraft. These triggers could be combined with other triggers generated by different aircraft components (possible alarms from the flight crew, data traffic anomaly, or alarm generated by one of the avionics components) to provide a better understanding of the situation to the monitoring crew.  相似文献   

18.
现代飞行器广泛采用机内测试(Built-intest,BIT)技术,以便对其内部故障进行自动检测、诊断和隔离,但是常规BIT面临诊断能力不足和诊断模糊性等问题,导致BIT虚警率高,难以有效发挥其应有的作用.本文论述了BIT虚警的基本理论、虚警的危害及现状,并从BIT虚警产生的原因分析入手,提出了解决虚警问题的一些方法和措施.  相似文献   

19.
航空移动通信系统(空空信道)中,大的多径时延和多普勒频移会造成非常严重的符号间干扰,高速宽带下尤为突出,使得传统的频域信道估计算法不得不通过提高运算长度和复杂度来实现性能,而航空通信对实时性的要求使其难以工程实现。本文针对空空信道时延长而衰落小的条件,提出一种基于PN码的时域信道估计算法,连续发送N段m序列作为训练序列...  相似文献   

20.
在轨卫星异常报警和故障诊断方法研究   总被引:1,自引:0,他引:1  
及时发现卫星出现的异常是卫星在轨管理的一项重要工作,它关系到卫星在轨使用寿命。能够及时发现并判断卫星异常的方法有很多,本文对这些方法进行了研究,并将其归纳为2类,一类是基于遥测参数超限报警方法,另一类是故障诊断方法。分别对这2类方法从功能、效果、软件实现的难度进行比较,结果表明,在不同的管理和实现难度要求下,这些方法完成卫星管理的效果不同。另外,本文还提出了一种遥测参数相对判断算法,简化了报警门限设置,能够及时发现卫星任何参数突跳,是一种有效的卫星异常报警方法。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号