PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.
This PDF file contains the front matter associated with SPIE Proceedings Volume 9074, including the Title Page, Copyright information, Table of Contents, and Conference Committee listing.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Infrastructure Protection and Counter Terrorism Systems and Technologies I
This paper describes the architecture of a microwave radar system intended for imaging concealed objects under clothing as a subject walks through the inspection area. The system uses the principle of inverse aperture which is achieved by a person’s movement past a stationary microwave sensor array. In the system, the vertical resolution is achieved by arranging microwave sensors vertically while the horizontal resolution is due to the subject’s horizontal motion. The positioning of the objects is achieved by employing a synchronous video sensor that allows coherent radar signal processing. A possible radar signal processing technique based on signal accumulation is described. Numerical experiments are conducted with the described object trajectory model. The influence of positioning errors attributed to the video positioning system is also modeled numerically. An experimental setup is designed and proposed to evaluate the suggested signal processing techniques on real data with an electro-mechanical scanner and single transceiver. It is suggested that the signal acquisition with the system can be accomplished using the stop motion technique, in which a series of changing stationary scenes is sampled and processed. Experimental radar images are demonstrated for stationary objects with concealed items and considered as reference images. Further development of the system is suggested.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
By adopting The NATO Strategic Concept Document in 2010, some important changes in the perception of threat and management of crisis were introduced. This new concept, named ''Comprehensive Approach'', includes the precautions of pre-crisis management, applications of crisis-duration management and reconstruction phase of post-intervention management. NATO will be interested in not only the political and military options , but also social, economical and informational aspects of crisis. NATO will take place in all phases of conflict. The conflicts which occur outside the borders of NATO's nations and terrorism are perceived as threat sources for peace and stability. In addition to conventional threats, cyber attacks which threaten network-supported communication systems, preventing applications from accessing to space that will be used in different fields of life. On the other hand, electronic warfare capabilities which can effect us negatively are added to threat list as new threats. In the process in which military is thought as option, a harder planning phase is waiting for NATO's decision makers who struggle for keeping peace and security. Operation planning process which depends on comprehensive approach, contains these steps: Situational awareness of battlefield, evaluation of the military intervention options, orientation, developing an operation plan, reviewing the plan and transition phases.1 To be successful in theater which is always changing with the technological advances, there has to be an accurate and timely planning on the table. So, spending time for planning can be shown as one of the biggest problem. In addition, sustaining situational awareness which is important for the whole operation planning process, technical command and control hitches, human factor, inability to determine the center of gravity of opponent in asymmetrical threat situations can be described as some of the difficulties in operation planning. In this study, a possible air operation planning process is analyzed according to a comprehensive approach. The difficulties of planning are identified. Consequently, for optimizing a decisionmaking process of an air operation, a planning process is identified in a virtual command and control structure.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
To compensate for its eye’s inability to point its eye at a target, the fly’s eye consists of multiple angularly spaced sensors giving the fly the wide-area visual coverage it needs to detect and avoid the threats around him. Based on a similar concept a revolutionary new micro-radar sensor technology is proposed for detecting and tracking ground and/or airborne low profile low altitude targets in harsh urban environments. Distributed along a border or around a protected object (military facility and buildings, camp, stadium) small size, low power unattended radar sensors can be used for target detection and tracking, threat warning, pre-shot sniper protection and provides effective support for homeland security. In addition it can provide 3D recognition and targets classification due to its use of five orders more pulses than any scanning radar to each space point, by using few points of view, diversity signals and intelligent processing. The application of an array of directional antennas eliminates the need for a mechanical scanning antenna or phase processor. It radically decreases radar size and increases bearing accuracy several folds. The proposed micro-radar sensors can be easy connected to one or several operators by point-to-point invisible protected communication. The directional antennas have higher gain, can be multi-frequency and connected to a multi-functional network. Fly eye micro-radars are inexpensive, can be expendable and will reduce cost of defense.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
We describe a portable unattended persistent surveillance system that corrects for harsh illumination conditions, where bright sun light creates mixed contrast effects, i.e., heavy shadows and washouts. These effects result in high dynamic range scenes, where illuminance can vary from few luxes to a 6 figure value. When using regular monitors and cameras, such wide span of illuminations can only be visualized if the actual range of values is compressed, leading to the creation of saturated and/or dark noisy areas and a loss of information in these areas. Images containing extreme mixed contrast cannot be fully enhanced from a single exposure, simply because all information is not present in the original data. The active intervention in the acquisition process is required. A software package, capable of integrating multiple types of COTS and custom cameras, ranging from Unmanned Aerial Systems (UAS) data links to digital single-lens reflex cameras (DSLR), is described. Hardware and software are integrated via a novel smart data acquisition algorithm, which communicates to the camera the parameters that would maximize information content in the final processed scene. A fusion mechanism is then applied to the smartly acquired data, resulting in an enhanced scene where information in both dark and bright areas is revealed. Multi-threading and parallel processing are exploited to produce automatic real time full motion corrected video. A novel enhancement algorithm was also devised to process data from legacy and non-controllable cameras. The software accepts and processes pre-recorded sequences and stills, enhances visible, night vision, and Infrared data, and successfully applies to night time and dark scenes. Various user options are available, integrating custom functionalities of the application into intuitive and easy to use graphical interfaces. The ensuing increase in visibility in surveillance video and intelligence imagery will expand the performance and timely decision making of the human analyst, as well as that of unmanned systems performing automatic data exploitation, such as target detection and identification.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
People do not want to see and hear a war. In today’s world, if war is inevitable, the use of air power is seen as the preferable means of conducting operations instead of financially burdensome land battles which are more likely to cause heavy loss of life. The use of Air Power has gained importance in NATO operations in the Post-Cold War era. For example, air power has undertaken a decisive role from the beginning to the end of the operation in Libya. From this point of view, the most important issue to consider is how to direct air power more effectively at operational level. NATO's Core JFAC (Joint Force Air Command) was established in 2012 to control joint air power at operational level from a single center. US had experienced JFAC aproach in the Operation Desert Storm in 1991. UK, France, Germany, Italy and Spain are also directing their air power from their JFAC structures. Joint air power can be directed from a single center at operational level by means of JFAC. JFAC aproach provides complex planning progress of Air Power to be controled faster in a single center. An Air Power with a large number of aircrafts, long range missiles of cutting-edge technology may have difficulties in achieving results unless directed effectively. In this article, directing air power more effectively at operational level has been studied in the framework of directing air power from a single center carried out by SWOT analysis technique. “Directing Air Power at operational level from a single center similar to JFAC-like structure” is compared with “Directing Air Power at operational level from two centers similar to AC (Air Command) + CAOC (Combined Air Operations Center) structure” As a result of this study, it is assessed that directing air power at operational level from a single center would bring effectiveness to the air campaign. The study examines directing air power at operational level. Developments at political, strategic and tactical levels have been ignored.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A characterization study is made from a trilateration system for impulsive sounds, in which theoretical analysis and experimental results are presented. This system uses an analog trilateration method, avoiding to implement high frequency ADC conversion elements. It also presents the optimization of the chosen array of microphones, thus allowing for a better trilateration algorithm behavior.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Counter Sniper, Small Projectiles, and Gunfire Localization Systems and Technologies
The paper presents some aspects of muzzle flash detection using low resolution polycrystalline PbSe 32×32 and 80×80 detectors FPA operating at room temperature (uncooled performance). These sensors, which detect in MWIR (3 - 5 microns region) and are manufactured using proprietary technology from New Infrared Technologies (VPD PbSe – Vapor Phase Deposition of polycrystalline PbSe), can be applied to muzzle flash detection. The system based in the uncooled 80×80 FPA monolithically integrated with the CMOS readout circuitry has allowed image recording with frame rates over 2000 Hz (true snapshot acquisition), whereas the lower density, uncooled 32×32 FPA is suitable for being used in low cost infrared imagers sensitive in the MWIR band with frame rates above 1000 Hz. The FPA detector, read-out electronics and processing electronics (allows the implementation of some algorithms for muzzle flash detection) of both systems are presented. The systems have been tested at field test ground. Results of detection range measurement with two types of optical systems (wide and narrow field of view) have been shown. The theoretical analysis of possibility detection of muzzle flash and initial results of testing of some algorithms for muzzle flash detection have been presented too.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This work presents a prototype of low-cost gunshots identification system that uses consumer electronics in order to ensure the existence of gunshots and then classify it according to a previously established database. The implementation of this tool in the urban areas is to set records that support the forensics, hence improving law enforcement also on developing countries. An analysis of its effectiveness is presented in comparison with theoretical results obtained with numerical simulations.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A superhydrophobic (SH) surface has many characteristics, one of which is its self-cleaning, anti-soiling functionality, that are desirable across various industries. A transparent, self-cleaning surface utilizes the right combination of surface chemistry and roughness that force water droplets to form high water contact angles (CA). This in turn allows droplets to easily roll off and pick up dirt and debris across the surface. In theory this is simple but in practice this can be very difficult as superhydrophobicity and optical transparency are competitive. We have developed a simple, spray-on coating based on functionalized SiO2 nanoparticles that can easily be applied to surfaces whose application requires high transparency including, but not limited to, optical sensors, photovoltaics, sights, and lenses. In addition, these coatings exhibit practical mechanical and environmental durability that allow prolonged use of the coatings in harsh environments.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A low-cost acoustic localization system is presented, in which a video camera is directed towards the source of impulsive sounds such as gunshots. An analog filter is implemented at the first stage, in order to reduce the range of frequencies to analyze, hence narrowing and improving the localization of gunshots. The system is design for the integration of open source consumer electronics and processing devices, which makes large-scale deployment possible even in developing countries. Furthermore, results are also obtained with a prototype that shows a high percentage of successes.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Cyber Crimes and Cyberterrorism Systems and Technologies
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Information and Communication Systems and Technologies
Recent years have been characterized by an increase in the air traffic. More attention over micro-economic and macroeconomic indexes would be strategic to gather and enhance the safety of a flight and customer needing, for communicating by wireless handhelds on-board aircrafts. Thus, European Telecommunications Standards Institute (ETSI) proposed a GSM On Board (GSMOBA) system as a possible solution, allowing mobile terminals to communicate through GSM system on aircraft, avoiding electromagnetic interferences with radio components aboard. The main issues are directly related with interferences that could spring-out when mobile terminals attempt to connect to ground BTS, from the airplane. This kind of system is able to resolve the problem in terms of conformance of Effective Isotropic Radiated Power (EIRP) limits, defined outside the aircraft, by using an On board BTS (OBTS) and modeling the relevant key RF parameters on the air. The main purpose of this work is to illustrate the state-of-the-art of literature and previous studies about the problem, giving also a good detail of technical and normative references.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In this paper, a commonly used third-order model of an induction motor with eight parameters is analyzed in order to classify the model parameters based on their degree of significance in the model behavior. Using the results of this classification, only the significant parameters of an induction motor need to be estimated from the measurements. The remainder of the parameters can be replaced by their typical values, which results in an optimization problem with a reduced dimension. The reduced parameter model needs less computation time and thus is better suited for real-time applications. The significance of this approach is greater when many induction motors or dynamic inductive loads in the system need to be identified. A nonlinear Least absolute shrinkage and selection operator (Lasso) term selection method is employed for this study. The Lasso method minimizes the sum of squared errors, with a constraint on the L1 norm of the parameter vector, which is used to push some parameters to zero. The main idea, when using this method for nonlinear models, involves incorporating the Lasso constraint in an iterative solution approach such as Gauss-Newton algorithm. This method reduces the variance of the parameter estimates, and simplifies the interpretation of the model. To evaluate the performance of the proposed algorithm, the parameters of an induction motor are estimated. Estimation is performed both for simulated and experimental data. The results of the proposed approach are compared to those of a method based on sensitivity analysis.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Sensor technologies such as infrared sensors and hyperspectral imaging, video camera surveillance are proven to be viable in port security. Drawing from sources such as infrared sensor data, digital camera images and processed hyperspectral images, this article explores the implementation of a real-time data delivery system. In an effort to improve the manner in which anomaly detection data is delivered to interested parties in port security, this system explores how a client-server architecture can provide protected access to data, reports, and device status. Sensor data and hyperspectral image data will be kept in a monitored directory, where the system will link it to existing users in the database. Since this system will render processed hyperspectral images that are dynamically added to the server - which often occupy a large amount of space - the resolution of these images is trimmed down to around 1024×768 pixels. Changes that occur in any image or data modification that originates from any sensor will trigger a message to all users that have a relation with the aforementioned. These messages will be sent to the corresponding users through automatic email generation and through a push notification using Google Cloud Messaging for Android. Moreover, this paper presents the complete architecture for data reception from the sensors, processing, storage and discusses how users of this system such as port security personnel can use benefit from the use of this service to receive secure real-time notifications if their designated sensors have detected anomalies and/or have remote access to results from processed hyperspectral imagery relevant to their assigned posts.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Nowadays, technologies like improved reality systems, sensing systems and communication systems, are moving forward with a high rate. This situation is very convenient for military groups that are trying to access modern technologies. According to that, it is very feasible to propose the development of electronic devices that increase the possibilities for soldiers to be alive during an armed conflict, providing them with information that can bring strategic benefits on the combat field, which is the main goal of this research. Therefore, it is proposed in this paper the early design stages of a smart army helmet, focusing in their low cost production; however, all the electronics stages specified here are proposed as prototypes.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
An orbital service model allows data to be collected, stored and used on different nodes comprising an ad-hoc system where provider craft supply services to consumer craft. Ad-hoc networks and provider-consumer relationships are commonly used in various applications on Earth. The deterministic movement of spacecraft, however, allows the ad-hoc network and service providing model to operate in a different way than would be typical in most terrestrial ad-hoc networks. While long periods of no direct node-to-node connectivity may exist, the periods of connectivity are pre-known based on orbital parameters. Additionally, paths for indirect connectivity can be identified and evaluated for cost effectiveness. This paper presents a data management approach for an orbital computing ad-hoc system. Algorithms for determining where data should be stored (identification of most useful point of storage, whether multiple copies are justified) and how movement should be affected (transfer scheduling, replication, etc.) are presented and evaluated.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In this paper we discuss relations between Bayesian Truthing (experimental validation), Bayesian statistics, and Binary Sensing in the context of selected Homeland Security and Intelligence, Surveillance, Reconnaissance (ISR) optical and nonoptical application scenarios. The basic Figure of Merit (FoM) is Positive Predictive Value (PPV), as well as false positives and false negatives. By using these simple binary statistics, we can analyze, classify, and evaluate a broad variety of events including: ISR; natural disasters; QC; and terrorism-related, GIS-related, law enforcement-related, and other C3I events.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
We present a novel system for enhancing the efficiency and accuracy of checked baggage screening process at airports. The system requirements address the identification and retrieval of objects of interest that are prohibited in a checked luggage. The automated testbed is comprised of a Baxter research robot designed by Rethink Robotics for luggage and object manipulation, and a down-looking overhead RGB-D sensor for inspection and detection. We discuss an overview of current system implementations, areas of opportunity for improvements, robot system integration challenges, details of the proposed software architecture and experimental results from a case study for identifying various kinds of lighters in checked bags.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Digital Decision Generation (DDG) tools are important software sub-systems of Command and Control (C2) systems and technologies. In this paper, we present a special type of DDGs based on Bayesian Inference, related to adverse (hostile) networks, including such important applications as terrorism-related networks and organized crime ones.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Modern AirandSpace Power is increasingly becoming a political tool. In this article, AirandSpacePower as a political tool will be discussed. The primary purpose of this article is to search how AirandSpacePower can provide contributions to security and also determine if it may reach the political goals on its own at war by SWOT Analysis Method and analysing the role of AirandSpace Power in Operation Unified Protector (Libya) as a case study. In conclusion, AirandSpacePower may not be sufficient to win the political goals on its own. However it may reach the political aims partially against the adversary on its own depending upon the situations. Moreover it can alone persuade the adversary to alter its behavior(s) in war.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.