PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.
This PDF file contains the front matter associated with SPIE
Proceedings Volume 6538, including the Title Page, Copyright
information, Table of Contents, and the Conference Committee listing.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In this paper the use of Internet Protocol ver.6 packets to convey hidden information is exploited. The possibility
to hide information in commonly used data transport mechanisms allows one to send extra information in a
transparent way. The hidden message does not affect the routing mechanism neither interferes with the security
mechanisms implemented on IP based networks, as firewalls, intrusion detection systems, authentication tools.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper discusses Physical Optics Corporation's (POC) wearable snap connector technology that provides for the
transfer of data and power throughout an electronic garment (e-garment). These connectors resemble a standard garment
button and can be mated blindly with only one hand. Fully compatible with military clothing, their application allows
for the networking of multiple electronic devices and an intuitive method for adding/removing existing components from
the system. The attached flexible cabling also permits the rugged snap connectors to be fed throughout the standard
webbing found in military garments permitting placement in any location within the uniform. Variations of the snap
electronics/geometry allow for integration with USB 2.0 devices, RF antennas, and are capable of transferring high
bandwidth data streams such as the 221 Mbps required for VGA video. With the trend towards providing military
officers with numerous electronic devices (i.e., heads up displays (HMD), GPS receiver, PDA, etc), POC's snap
connector technology will greatly improve cable management resulting in a less cumbersome uniform. In addition, with
electronic garments gaining widespread adoption in the commercial marketplace, POC's technology is finding
applications in such areas as sporting good manufacturers and video game technology.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Securing enterprise networks comes under two broad topics: Intrusion Detection Systems (IDS) and
Intrusion Prevention Systems (IPS). The right combination of selected algorithms/techniques under both
topics produces better security for a given network. This approach leads to using layers of physical,
administrative, electronic, and encrypted systems to protect valuable resources. So far, there is no
algorithm, which guarantees absolute protection for a given network from intruders. Intrusion Prevention
Systems like IPSec, Firewall, Sender ID, Domain Keys Identified Mail (DKIM) etc. do not guarantee
absolute security just like existing Intrusion Detection Systems. Our approach focuses on developing an
IDS, which will detect all intruders that bypass the IPS and at the same time will be used in updating the
IPS, since the IPS fail to prevent some intruders from entering a given network. The new IDS will employ
both signature-based detection and anomaly detection as its analysis strategy. It should therefore be able to
detect known and unknown intruders or attacks and further isolate those sources of attack within the
network. Both real-time and off-line IDS predictions will be applied under the analysis and response stages.
The basic IDS architecture will involve both centralized and distributed/heterogeneous architecture to
ensure effective detection. Pro-active responses and corrective responses will be employed. The new
security system, which will be made up of both IDS and IPS, should be less expensive to implement
compared to existing ones. Finally, limitations of existing security systems have to be eliminated with the
introduction of the new security system.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Given the anticipated increases in highway traffic, the scale and complexity of the traffic infrastructure will continue to
grow progressively in time and in distributed geographical areas. To assure transportation efficiency, safety, and
security in the presence of such growth, it is critical to identify an infrastructure development methodology that can
adapt to expansions while assuring reliable operation for both centralized monitoring and distributed management. In
this paper, a wireless sensor network design methodology is presented, aimed at providing effective distributed
surveillance, anomaly detection, and coordinated response. The proposed methodology integrates state-of-the-art traffic
sensors, with flexibly programmable controller devices that can integrate with the available traffic control equipments.
The system methodology provides a paradigm in which sensors and controllers can be progressively incorporated and
programmed to autonomously coordinate with peer sensors and a hierarchy of controllers to detect, notify, and react to
anomalous events. Since the system can tolerate failure of parts of the system, as the network connectivity continues to
increase, the proposed sensor network will have positive implications on evacuation plans during natural disasters or
terrorist attacks. To illustrate the design methodology and usage, a simulated system along a freeway corridor in South
Carolina was constructed in an integrated microscopic traffic and wireless sensor network simulation platform, in which
distributed incident detection and response functions were implemented. The test results, including detection and false
alarm rates and wireless communication latencies, are analyzed to identify insights of the system's operation and
potential enhancement strategies.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In this paper, we consider moving target detection and ranging for indoor sensing applications in urban environments. A
simple method is used to determine the unambiguous range of an indoor moving target using dual frequency continuous
wave (CW) radars. The dual-frequency radar employs two different carrier frequencies and simultaneously measures the
phase change with respect to time, for each of the two frequencies. It uses phase comparison of the radar returns at the
two frequencies to provide an estimate of the target range. The dual-frequency approach offers the benefit of reduced
complexity, fast computation time, real time target tracking, and localization in highly cluttered indoor scenes. We
present experimental results showing the effectiveness of the proposed method for indoor range estimation. Targets
undergoing different motions, such as constant Doppler, micro-Doppler and accelerating/decelerating translation profiles
are considered. The Doppler and the micro-Doppler signatures of the moving targets are also provided for each
experiment, which demonstrate the utility of such signatures for indoor target classification.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper discusses a new approach to X-ray non-intrusive (NDE) inspection based on hard X-ray imaging optics. A
new X-ray lens, called lobster-eye-lens (LEL) is the transmission lens, based on reflection optics, with grazing-angle
deflection of 0.2° and photon energy of 40-100 keV. The lens reflection-optics is based on large, high-quality X-ray
mirrors with r.m.s. lower than 1 nm. The through-the-wall inspection capability of such a system, based on Compton
back-scattering, can be applied for longer ranges, (up to 100 m in the air), and thick walls (over 2 cm for wood, and over
2 mm for metal). CONOPS examples are given for homeland security applications.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Described is the principal of THz sensing and its implementation based on a newly discovered
possibility in a sub visible range to penetrate through various materials and to be absorbed by them to a various
extent. The advantage of the proposed solution stems from a greater degree of mobility of the sensor and its
ability to distinguish between different materials - the feature not attainable by the X-Ray apparatus. The
identification may be also more "diplomatic" since it does not involve "seeing through". Presented is the
description of the identification devices as well as the results of the measurements of the object of interest, and
the prospects of a further development of the proposed principle/device.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Pacific Northwest National Laboratory researchers have been at the forefront of developing innovative screening
systems to enhance security and a novel imaging system to provide custom-fit clothing using holographic radar imaging
techniques. First-of-a-kind cylindrical holographic imaging systems have been developed to screen people at security
checkpoints for the detection of concealed, body worn, non-metallic threats such as plastic and liquid explosives, knifes
and contraband. Another embodiment of this technology is capable of obtaining full sized body measurements in near
real time without the person under surveillance removing their outer garments. Radar signals readily penetrate clothing
and reflect off the water in skin. This full body measurement system is commercially available for best fitting ready to
wear clothing, which was the first "biometric" application for this technology. One compelling feature of this
technology for security biometric applications is that it can see effectively through disguises, appliances and body hair.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Due to the ever increasing use of radioactive materials in day to day living from the treatment of cancer patients and
irradiation of food for preservation to industrial radiography to check for defects in the welding of pipelines and
buildings there is a growing concern over the tracking and monitoring of these sources in transit prior to use as well as
the waste produced by such use. The prevention of lost sealed sources is important in reducing the environmental and
health risk posed by direct exposure, co-mingling in the metal recycling stream, use in contaminated consumer products,
and use in terrorist activities.
Northwest Nuclear, LLC (NWN) and the Applied Physics Institute (API) at Western Kentucky University have
developed a tracking technology using active radio frequency identification (RFID) tags. This system provides location
information by measuring the time of arrival of packets from a set of RFID tags to a set of location receivers. The
system can track and graphically display the location on maps, drawings or photographs of tagged items on any 802.11-
compliant device (PDAs, laptops, computers, WiFi telephones) situated both outside and inside structures. This
location information would be vital for tracking the location of high level radiological sources while in transit. RFID
technology would reduce the number of lost sources by tracking them from origination to destination. Special tags
which indicate tampering or sudden movement have also been developed.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper describes our novel capability for analyzing voxel data such as muon images to detect potential threat objects
and then to further discriminate them by shape. This is done with Change Detection using Data Modeling. These
methods minimize long exposure requirements previously reported in the literature. This paper summarizes our
algorithm and provides example results.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Vehicle and Weapons Detection and Tracking Systems
The Army Research Laboratory (ARL) has conducted experiments using acoustic sensor arrays
suspended below tethered aerostats to detect and localize transient signals from mortars, artillery, and small
arms fire. The airborne acoustic sensor array calculates an azimuth and elevation to the originating transient,
and immediately cues a collocated imager to capture the remaining activity at the site of the acoustic
transient. This single array's vector solution defines a ground-intersect region or grid coordinate for threat
reporting. Unattended ground sensor (UGS) systems can augment aerostat arrays by providing additional
solution vectors from several ground-based acoustic arrays to perform a 3D triangulation on a source
location. The aerostat array's advantage over ground systems is that it is not as affected by diffraction and
reflection from man-made structures, trees, or terrain, and has direct line-of-sight to most events.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Airport security and efficiency are both compromised by the process of requiring passengers to remove their shoe.
A novel shoe scanner developed at the GE Security San Diego Center of Excellence uses both Quadrupole
Resonance (QR) and configuration-sensitive metal detection to identify threats hidden in shoes. The shoe
scanner was developed with an open-access chassis and scanning chamber that allows passengers to stand in the
system in a natural position during the scanning process. More traditional magnetic resonance systems are closed
or partially closed and cannot be used for screening personnel because the scanning chambers confine the object
in question. The shoe scanner's novelty lies in a particular chassis geometry that allows both QR and metal
screening. The resulting scanning system achieves the same level of performance as a more confining system.
The shoe scanner is small enough to allow integration with other sensors such as the GE Itemizer FXTM trace
detection system. In fact, the first application of the novel shoe scanner is expected to be as a component in a
multi-sensor verification and security system known as the Secure Registered Traveler (SRT) Kiosk. The SRT
kiosk is designed to be used as part of the TSA's Registered Traveler Program.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The detection, classification and tracking of chemical agents (explosives) being surreptitiously smuggled into public
areas, such as airports, for destructive purposes is difficult to solve by unobtrusive means. We propose the use of a
novel energy cell with gas/vapor sniffing capability. Variants of such devices are routinely used by police to detect
alcohol emanating from the breath of suspected impaired vehicle drivers. We have advanced this technology with the
development of a Pethanol Alkaline Energy Cell which is capable of reading gaseous emissions ultimately in the parts
per billion range. Our work is described in terms of detecting TATAP (acetone peroxide).
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper describes the development and initial validation of a bioaerosol optical sensor model. This model was used
to help determine design parameters and estimate performance of a new low-cost optical sensor for detecting
bioterrorism agents. In order to estimate sensor performance in detecting biowarfare simulants and rejecting
environmental interferents, use was made of a previously reported catalog of EEM (excitation/emission matrix)
fluorescence cross-section measurements and previously reported multiwavelength-excitation biosensor modeling work.
In the present study, the biosensor modeled employs a single high-power 365 nm UV LED source plus an IR laser diode
for particle size determination. The sensor has four output channels: IR size channel, UV elastic channel and two
fluorescence channels. The sensor simulation was used to select the fluorescence channel wavelengths of 400-450 and
450-600 nm. Using these selected fluorescence channels, the performance of the sensor in detecting simulants and
rejecting interferents was estimated. Preliminary measurements with the sensor are presented which compare favorably
with the simulation results.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper presents a new paradigm for the utilization of video surveillance cameras as optical sensors to augment and
significantly improve the reliability and responsiveness of chemical monitoring systems. Incorporated into a hierarchical
tiered sensing architecture, cameras serve as 'Tier 1' or 'trigger' sensors monitoring for visible indications after a release
of warfare or industrial toxic chemical agents. No single sensor today yet detects the full range of these agents, but the
result of exposure is harmful and yields visible 'duress' behaviors. Duress behaviors range from simple to complex
types of observable signatures. By incorporating optical sensors in a tiered sensing architecture, the resulting alarm
signals based on these behavioral signatures increases the range of detectable toxic chemical agent releases and allows
timely confirmation of an agent release. Given the rapid onset of duress type symptoms, an optical sensor can detect the
presence of a release almost immediately. This provides cues for a monitoring system to send air samples to a higher-tiered
chemical sensor, quickly launch protective mitigation steps, and notify an operator to inspect the area using the
camera's video signal well before the chemical agent can disperse widely throughout a building.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Robots have been successfully deployed within bomb squads all over the world for decades. Recent technical
improvements are increasing the prospects to achieve the same benefits also for other high risk professions. As the
number of applications increase issues of collaboration and coordination come into question. Can several groups deploy
the same type of robot? Can they deploy the same methods? Can resources be shared? What characterizes the different
applications? What are the similarities and differences between different groups?
This paper reports on a study of four areas in which robots are already, or are about to be deployed: Military Operations
in Urban Terrain (MOUT), Military and Police Explosive Ordnance Disposal (EOD), Military Chemical Biological
Radiological Nuclear contamination control (CBRN), and Fire Fighting (FF). The aim of the study has been to achieve a
general overview across the four areas to survey and compare their similarities and differences. It has also been
investigated to what extent it is possible for the them to deploy the same type of robot.
It was found that the groups share many requirements, but, that they also have a few individual hard constrains. A
comparison across the groups showed the demands of man-portability, ability to access narrow premises, and ability to
handle objects of different weight to be decisive; two or three different sizes of robots will be needed to satisfy the need
of the four areas.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper describes Defence Research & Development Canada's (DRDC) miniature Remote Neutralization Vehicle (mini-RNV) project undertaken at DRDC Suffield as a response to the current IED threat. This project demonstrates an alternative capability for rapid response EOD/IED situations in addition to other roles. The mini-RNV project follows a unified development process that will field a suite of tools for evaluation by the military and law enforcement. This paper outlines current capability, future directions, and possible applications of this system.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Through a SBIR funding from NAVAIR, we have successfully developed an innovative, miniaturized, and
lightweight PTZ UCAV imager called OmniBird for UCAV taxiing. The proposed OmniBird will be able to fit in a
small space. The designed zoom capability allows it to acquire focused images for targets ranging from 10 to 250 feet.
The innovative panning mechanism also allows the system to have a field of view of +/- 100 degrees within the provided
limited spacing (6 cubic inches). The integrated optics, camera sensor, and mechanics solution will allow the OmniBird
to stay optically aligned and shock-proof under harsh environments.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In this paper we present a new method of compressing and decompressing video streams directly on video
sensors and display panels, without the use of on-board or independent DSP processors. This eliminates
compression/decompression processing delays, minimizes power use, reduces the physical size of the
system, and significantly reduces the bandwidth required for the live transmission of images. The method
enhances the capabilities of small size surveillance systems, UAVs as well as battery powered mobile
entertainment equipment (digital cameras, iPODs, camcorders, camera cell phones...). To achieve these
goals we make structural changes to the camera and display sub-system architectures so they can directly
process the compressed streams. In particular, we geometrically distribute the light detection and
generation elements to correspond to the DCT and ICT coefficients of the JPEG/MPEG algorithm. This
eliminates many system redundancies which in turn deliver the aforementioned performance improvements.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Command, Control, Communications and Intelligence (C3I)
To quickly find relevant information from huge amounts of data is a very challenging issue for intelligence analysts.
Most employ their prior domain knowledge to improve their process of finding relevant information. In this paper, we
explore the influences of a user's prior domain knowledge on the effectiveness of an information seeking task by using
seed user models in an enhanced information retrieval system. In our approach, a user model is created to capture a
user's intent in an information seeking task. The captured user intent is then integrated with the attributes describing an
information retrieval system in a decision theoretic framework. Our test bed consists of two benchmark collections from
the information retrieval community: MEDLINE and CACM. We divide each query set from a collection into two
subsets: training set and testing set. We use three different approaches to selecting the queries for the training set: (1) the
queries generating large domain knowledge, (2) the queries relating to many other queries, and (3) a mixture of (1) and
(2). Each seed user model is created by running our enhanced information retrieval system through such a training set.
We assess the effects of having more domain knowledge, or more relevant domain knowledge, or a mixture of both on
the effectiveness of a user in an information seeking task.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper will present the use and implementation of uncertainty visualization in a disaster recovery tool called
DiRecT. DirecT is an emergency response system that couples the visualization mechanism with a distributed computing
architecture for a more reliable, failsafe infrastructure. The uncertainty visualization cues help provide the means of
determining the priority of assigning resources to the entities by taking into account various factors such as their identity,
location, and health. With DiRecT the incident commander would be able to quickly assess the current scenario and
make critical and informed decisions. An important part of DiRect is its distributed, real-time infrastructure which
supports capture, storage and delivery of data from various sources in the field. DiRect also supports personnel
communication through an instant memoing feature.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper describes our novel capability for calculating composite risk factors for airline flights. Custom asset vectors
are created pre-flight using the flight plan to determine high value assets that are within reach of the flight. Individual
asset risks in the asset vector are then combined into a composite risk factor (CRF) which is used to rank overall flight
risk and assign available Federal Air Marshals (FAMs). This paper summarizes our algorithm and provides example
results.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The range and scope of EO/IR sensor systems within security and surveillance applications is growing, and this places a
corresponding demand on the image processing functionality required to meet the end-users' needs and requirements.
Within this paper, the application of different image processing architectures and techniques is reviewed in terms of
situational awareness criteria and is illustrated through specific system applications. The concepts and benefits of multimodal
and distributed sensor systems are also considered together with the attendant data registration and fusion
techniques. Finally, the exploitation of a priori information within the integrated security and surveillance picture is
considered from both a processing technology and image display perspective.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
This paper discusses military and Homeland Security sensors, sensor systems, and sensor fusion under very general
assumptions of statistical performance. In this context, the system performance metrics parameters are analyzed in the
form of direct and inverse conditional probabilities, based on so-called signal theory, applied first for automatic target
recognition (ATR). In particular, false alarm rate, false positive, false negative rate, accuracy, and probability of
detection (or, probability of correct rejection), are discussed as conditional probabilities within classical and Bayesian
inference. Several examples from various homeland security areas are also discussed to illustrate the concept. As a
result, it is shown that vast majority of sensor systems (in a very general sense) can be discussed in terms of these
parameters.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
There are some computer vision systems that are available on a market but those are quite far from a real
usage of our daily life in a sense of security guard or in a sense of a usage of recognition of a target
object behaviour. Because those surroundings' sensing might need to recognize a detail description of an
object, like "the distance to an object" and "an object detail figure" and "its figure of edging", which are
not possible to have a clear picture of the mechanisms of them with the present recognition system. So
for doing this, here studies on mechanisms of how a pair of human eyes can recognize a distance apart,
an object edging, and an object in order to get basic essences of vision mechanisms. And those basic
mechanisms of object recognition are simplified and are extended logically for applying to a computer
vision system. Some of the results of these studies are introduced on this paper.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In a multi-layered command structure, information from unattended ground sensor systems has typically been
transferred from the observation area to the highest level of command. The information is analyzed from many such
regions and disseminated to the appropriate forward operating base as intelligence or action orders. Some missions, like
the detection and interdiction of Time Critical Targets, may be hampered by the current data dissemination timeline.
Therefore alternate, faster methods of providing actionable intelligence into theater are required for these missions.
This paper discusses alternative architectures that reduce the information dissemination time line from the sensor fields
through the command center and back down to the quick reactionary forces.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A universal solution for management of dynamic sensor networks will be presented, covering both networking and
application layers. A network of intelligent modules, overlaying the sensor network, collectively interprets mission
scenarios in a special high-level language, which can start from any nodes and cover the network at runtime. The
spreading scenarios are extremely compact, which may be useful for energy saving communications. The code will be
exhibited for distributed collection and fusion of sensor data, also for tracking mobile targets by scattered and
communicating sensors.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Detecting modern diesel-electric submarines operating on batteries in littoral waters is very difficult using traditional
sonar technology due in large part to the noisy and reverberant acoustic environment. To address this issue, SI2
Technologies Inc. (SI2) has developed a small, low cost, short range, dual mode acoustic sensor. The sensors can be
deployed in large numbers (hundreds or thousands) to provide a high density sensor field depending upon the application
of interest. SI2's low cost sensors have a short detection range and therefore are far less susceptible to multi-path
reverberations and other acoustic artifacts. Simulation results will be presented showing that high probabilities of
detection (PD) can be achieved with low false alarm rates (FAR) using a field of a few hundred of these low cost sensors.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Pressurized rail tank cars transport large volumes of volatile liquids and gases throughout the country, much of which is
hazardous and/or flammable. These gases, once released in the atmosphere, can wreak havoc with the environment and
local populations. We developed a system which can non-intrusively and non-invasively detect and locate pinhole-sized
leaks in pressurized rail tank cars using acoustic sensors. The sound waves from a leak are produced by
turbulence from the gas leaking to the atmosphere. For example, a 500 μm hole in an air tank pressurized to 689 kPa
produces a broad audio frequency spectrum with a peak near 40 kHz. This signal is detectable at 10 meters with a
sound pressure level of 25 dB. We are able to locate a leak source using triangulation techniques. The prototype of the
system consists of a network of acoustic sensors and is located approximately 10 meters from the center of the rail-line.
The prototype has two types of acoustic sensors, each with different narrow frequency response band: 40 kHz and 80
kHz. The prototype is connected to the Internet using WiFi (802.11g) transceiver and can be remotely operated from
anywhere in the world. The paper discusses the construction, operation and performance of the system.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
On the basis of the analysis of clustering algorithm that had been proposed for MANET, a novel clustering strategy was
proposed in this paper. With the trust defined by statistical hypothesis in probability theory and the cluster head selected
by node trust and node mobility, this strategy can realize the function of the malicious nodes detection which was
neglected by other clustering algorithms and overcome the deficiency of being incapable of implementing the relative
mobility metric of corresponding nodes in the MOBIC algorithm caused by the fact that the receiving power of two
consecutive HELLO packet cannot be measured. It's an effective solution to cluster MANET securely.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The phenomenon of ballistic shock wave emission by a small calibre projectile at supersonic speed is quite relevant in
automatic sniper localization applications. When available, ballistic shock wave analysis makes possible the estimation
of the main ballistic features of a gunfire event. The propagation of ballistic shock waves in air is a process which mainly
involves nonlinear distortion, or steepening, and atmospheric absorption. Current ballistic shock waves propagation
models used in automatic sniper localization systems only consider nonlinear distortion effects. This means that only the
rates of change of shock peak pressure and the N-wave duration with distance are considered in the determination of the
miss distance. In the present paper we present an improved acoustical model of small calibre ballistic shock wave
propagation in air, intended to be used in acoustics-based automatic sniper localization applications. In our approach, we
have considered nonlinear distortion, but additionally we have also introduced the effects of atmospheric sound
absorption. Atmospheric absorption is implemented in the time domain in order to get faster calculation times than those
computed in frequency domain. Furthermore, we take advantage of the fact that atmospheric absorption plays a
fundamental role in the rise times of the shocks, and introduce the rate of change of the rise time with distance as a third
parameter to be used in the determination of the miss distance. This lead us to a more accurate and robust estimation of
the miss distance, and consequently of the projectile trajectory, and the spatial coordinates of the gunshot origin.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Determining the location of an explosive event using a networked sensor system within an acceptable accuracy is a
challenging problem. McQ has developed such a system, using a mesh network of inexpensive acoustic sensors. The
system performs a three-dimensional, time-difference-of-arrival (TDOA) localization of blasts of various yields in
several different environments. Localization information of the blast is provided to the end user by exfiltration over
satellite communications. The system is able to perform accurately in the presence of various sources of error including
GPS position, propagation effects, temperature, and error in determining the time of arrival (TOA). The system design
as well as its performance are presented.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Most of modern automatic sniper localization systems are based on the utilization of the acoustical emissions produced
by the gun fire events. In order to estimate the spatial coordinates of the sniper location, these systems measures the time
delay of arrival of the acoustical shock wave fronts to a microphone array. In more advanced systems, model based
estimation of the nonlinear distortion parameters of the N-waves is used to make projectile trajectory and calibre
estimations. In this work we address the sniper localization problem using a model based search-matching approach. The
automatic sniper localization algorithm works searching for the acoustics model of ballistic shock waves which best
matches the measured data. For this purpose, we implement a previously released acoustics model of ballistic shock
waves. Further, the sniper location, the projectile trajectory and calibre, and the muzzle velocity are regarded as the
inputs variables of such a model. A search algorithm is implemented in order to found what combination of the input
variables minimize a fitness function defined as the distance between measured and simulated data. In such a way, the
sniper location, the projectile trajectory and calibre, and the muzzle velocity can be found. In order to evaluate the
performance of the algorithm, we conduct computer based experiments using simulated gunfire event data calculated at
the nodes of a virtual distributed sensor network. Preliminary simulation results are quite promising showing fast
convergence of the algorithm and good localization accuracy.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In this note we focus on convergence behavior of the Extended Kalman Filter used as a state estimator for
projectile attitude and position estimation. We provide first the complete dynamical model, into a non linear state space
form, to describe the projectile behavior. Due to strong non linearities and poor observability of the system, very few
estimation techniques could be applied, among them the celebrate EKF. The later is, however, very sensitive to bad
initializations and small perturbations. The main contribution of this work lies in the use of a modified EKF to assure a
strong tracking using magnetometer sensor only. The modified EKF follows from the connection of some instrumental
matrices, fixed by the user, and the convergence behavior. Simulation results show the good performances of the
proposed approach.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The integration of varied types of EO, IR, and Laser Illumination sensors used for perimeter security
greatly improves the data that is available to the process of classifying potential threats. A key component
of the design of layered sets of sensors is to understand the method in which detection, recognition, and
identification distances are defined by each vendor. Historically, it has been challenging to compare each
vendor's stated values as each type of sensor has unique characteristics that hinder the process of
performing a so called "apples to apples" comparison. This results in more costly field testing and
software simulations that attempt to model real world deployments. What we do know is that solutions are
desired where multiple sensors are used to provide information to the Detection, Recognition through
Identification process, as well as, associated human or software-based threat assessment and reaction
processes.
Perimeter security typically involves several layers of detection and investigation. Many entities have
invested in detection sensors only to find out that they lack integrated or queued investigative sensors that
provide a better return on investment for their systems. When you add night vision sensors to the mix, the
challenges increase. This paper will examine sensor technologies and integration/command
control/analytics technologies that are attempting to tie things together. The latest technologies including
queued sensors and advances in detection/analytics using PTZ sensors will be covered.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Recent and future explorations of Mars and lunar surfaces through rovers and landers have spawned great interest in
developing an instrument that can perform in-situ analysis of minerals on planetary surfaces. Several research groups
have anticipated that for such analysis, Raman spectroscopy is the best suited technique because it can unambiguously
provide the composition and structure of a material. A remote pulsed Raman spectroscopy system for analyzing
minerals was demonstrated at NASA Langley Research Center in collaboration with the University of Hawaii. This
system utilizes a 532 nm pulsed laser as an excitation wavelength, and a telescope with a 4-inch aperture for collecting
backscattered radiation. A spectrograph equipped with a super notch filter for attenuating Rayleigh scattering is used to
analyze the scattered signal. To form the Raman spectrum, the spectrograph utilizes a holographic transmission grating
that simultaneously disperses two spectral tracks on the detector for increased spectral range. The spectrum is recorded
on an intensified charge-coupled device (ICCD) camera system, which provides high gain to allow detection of
inherently weak Stokes lines. To evaluate the performance of the system, Raman standards such as calcite and
naphthalene are analyzed. Several sets of rock and mineral samples obtained from Ward's Natural Science are tested
using the Raman spectroscopy system. In addition, Raman spectra of combustible substances such acetone and isopropanol are also obtained.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The recent fighting activities in various parts of the world have highlighted the need for accurate fire
source detection on one hand and fast "sensor to shooter cycle" capabilities on the other. Both needs
can be met by the SPOTLITE system which dramatically enhances the capability to rapidly engage
hostile fire source with a minimum of casualties to friendly force and to innocent bystanders.
Modular system design enable to meet each customer specific requirements and enable excellent
future growth and upgrade potential.
The design and built of a fire source detection system is governed by sets of requirements issued by
the operators. This can be translated into the following design criteria:
I) Long range, fast and accurate fire source detection capability.
II) Different threat detection and classification capability.
III) Threat investigation capability.
IV) Fire source data distribution capability (Location, direction, video image, voice).
V) Men portability. )
In order to meet these design criteria, an optimized concept was presented and exercised for the
SPOTLITE system.
Three major modular components were defined:
I) Electro Optical Unit -Including FLIR camera, CCD camera, Laser Range Finder and Marker
II) Electronic Unit -including system computer and electronic.
III) Controller Station Unit - Including the HMI of the system.
This article discusses the system's components definition and optimization processes, and also show
how SPOTLITE designers successfully managed to introduce excellent solutions for other system
parameters.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Georgia Tech has initiated a research program into the detection of covert personnel. This program focuses on the
detection problem in scenarios focused on urban operations, tunnels, or convoys. These nontraditional operational
scenarios present multiple opportunities for personnel to hide as well as a variety to clutter levels. The research program
focuses on a detailed phenomenological analysis of human physiology and signatures with the subsequent identification
and characterization of potential observables - initially in the context of urban environments. For this current effort,
several electro-optical sensing modalities have been evaluated for use as a component in an unattended sensor suite
designed to detect personnel. These modalities include active sensors (e.g., vibrometry) and passive sensors (e.g., multispectral,
thermal). Particular emphasis has been given to the investigation of short wave infrared signatures and the
comparison of this band to the other electro-optical wavebands. This paper will discuss the design of a multi-spectral
signature model which forms a component of the evaluation process. Example results will be presented as well as a
discussion of the issues to be addressed as part of the electro-optical sensor evaluation.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
One of the main factors limiting high performance remote fiber sensing systems is the Rayleigh backscatter
associated with a long length of optical delivery fiber. Rayleigh backscatter introduces amplitude and phase
noise during interferometric signal extraction, resulting in degradation of system sensitivity. This noise source
increases with the length of optical fiber used in the architecture, and thus traditionally sets the lower limit on
signal strength and the total remote sensing distance. We present the latest results for a 100 km remote fiber
dynamic strain sensing system, where a radio-frequency (RF) modulated laser is used to interrogate a fiber Fabry-
Perot sensor. The signal extraction is derived interferometrically from the differential phase between the carrier
and its RF sidebands. We demonstrate unprecedented remote sensitivity performance by complete mitigation of
the debilitating effects associated with Rayleigh backscatter in the 100 km of optical delivery fiber. We show that
optimization of the laser modulation depth, as well as fiber Fabry-Perot design both facilitate a large signal-to-noise
ratio. This maximized signal-to-noise ratio enables the complete suppression of the noise associated with
Rayleigh backscatter. The result is a long-distance remote fiber sensing system that is limited only by the laser
frequency noise. This remote sensitivity is an important breakthrough for a range of applications, such as sea
floor acoustic sensing arrays, deep sea hydrophone arrays, and remote surveillance arrays.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Nowadays internet video surveillance cameras are widely use in security monitoring. The quantities of
installations of these cameras also become more and more. This paper reports that the internet video
surveillance cameras can be applied as a remote sensor for monitoring the concentrations of particulate
matter less than 10 micron (PM10), so that real time air quality can be monitored at multi location
simultaneously. An algorithm was developed based on the regression analysis of relationship between the
measured reflectance components from a surface material and the atmosphere. This algorithm converts
multispectral image pixel values acquired from these cameras into quantitative values of the
concentrations of PM10. These computed PM10 values were compared to other standard values measured
by a DustTrakTM meter. The correlation results showed that the newly develop algorithm produced a high
degree of accuracy as indicated by high correlation coefficient (R2) and low root-mean-square-error
(RMS) values. The preliminary results showed that the accuracy produced by this internet video
surveillance camera is slightly better than that from the internet protocol (IP) camera. Basically the spatial
resolution of images acquired by the IP camera was poorer compared to the internet video surveillance
camera. This is because the images acquired by IP camera had been compressed and there was no
compression for the images from the internet video surveillance camera.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
In this paper, biologically-inspired optical imaging systems, including fish eye, bug eye, lobster eye, and RGB color
vision, are discussed as new lensing systems for military and homeland security applications. This new area of interest
includes UV, VIS, IR, and X-ray part of electromagnetic spectrum. In particular, recent progress at Physical Optics
Corporation will be discussed, including such applications as hyperspectral/multi-spectral imagery, video surveillance,
and X-ray inspection.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
An advanced surveillance/security system is being developed for unattended 24/7 image acquisition and automated
detection, discrimination, and tracking of humans and vehicles. The low-light video camera incorporates an electron
multiplying CCD sensor with a programmable on-chip gain of up to 1000:1, providing effective noise levels of less than
1 electron. The EMCCD camera operates in full color mode under sunlit and moonlit conditions, and monochrome under
quarter-moonlight to overcast starlight illumination. Sixty frame per second operation and progressive scanning
minimizes motion artifacts. The acquired image sequences are processed with FPGA-compatible real-time algorithms,
to detect/localize/track targets and reject non-targets due to clutter under a broad range of illumination conditions and
viewing angles. The object detectors that are used are trained from actual image data. Detectors have been developed
and demonstrated for faces, upright humans, crawling humans, large animals, cars and trucks. Detection and tracking of
targets too small for template-based detection is achieved. For face and vehicle targets the results of the detection are
passed to secondary processing to extract recognition templates, which are then compared with a database for
identification. When combined with pan-tilt-zoom (PTZ) optics, the resulting system provides a reliable wide-area 24/7
surveillance system that avoids the high life-cycle cost of infrared cameras and image intensifiers.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A new video processing and compression approach for real-time ATR and ultra-real-time pre-ATR is presented.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
A 111-Mega pixel, 92x92 mm2, full-frame CCD imager with 9x9 um2 pixel size has been developed for use in scientific
applications. Recent interest for ultra-high resolution imagers for electronic imaging OEM customers in various
scientific markets, including biotechnology, microscopy, crystallography, astronomy, spectroscopy, and aerial
reconnaissance markets has lead to the development of the STA1600A 111-Mega pixel monochromatic charge-coupled
device. Innovative design techniques were utilized in the early development of this device, yielding low RMS noise and
high MTF for readout speeds ranging from 1 Mpixel/s to 25 Mpixel/sec. This paper will provide detailed information on
the design and performance capabilities of the STA1600A, as well as background information on the commercial uses of
this device.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The Air Force Research Laboratory's Information Directorate (AFRL/IF) has established the Concealed Weapons
Detection/Through Wall Surveillance Test & Evaluation (CWD/TWS T&E) Facility to accomplish in-depth analysis of
technologies applicable to identified Law Enforcement (LE) and Corrections operational and situational functional
requirements. This CWD/TWS T&E Facility is capable of performing T&E on all technologies that have been proposed
to accomplish these functions. The current technology focuses are: for CWD, passive and acoustic operations; for TWS,
active radio frequency (RF) and acoustic operations. However, this T&E Facility can be easily adapted for analysis of
other technology application prototypes. The technology prototypes that are in existence have been developed primarily
through direct support from the Department of Justice (DOJ), National Institute of Justice (NIJ) Office of Science &
Technology (OS&T). Additionally, Statements Of Need (SON) from US National and State LE and Corrections
agencies, along with market indicators, have driven commercial institutions to research and investigate the feasibility of
adapting their technology applications for utilization to address the CWD and/or TWS challenges. This paper will
highlight the unique capabilities of this Facility. These being: T&E of CWD/TWS devices against NIJ specified
requirements; Characterization of CWD/TWS devices performance; Characterization of the constructed walls for TWS;
and Representative test setups for CWD/TWS testing.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The goal of an imaging sensor with nearly constant response, constant image quality, with a focal plane array of pixels
whose overlap can be scaled, that can still provide a nearly hemispherical field-of-view has been demonstrated. The
topic of this paper is the optical design of just such a sensor. A flow down of these performance constraints to hardware
specifications is bounded by information theory, diffraction theory, plus practical matters that constrain the overlap of
focal plane arrays.
A set of performance goals for a sensor are the ability to observe features ≤25 μr features in size within a 45° scene
using >1 G pixels.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Historically, it is believed that fratricide accounts for up to 15% of friendly casualties during operations and a UK MoD
report identifies that almost half of all such casualties occur in situations involving ground units only. Such risks can be
mitigated, to an extent, via operational awareness and effective communications. However, recent conflicts have
involved a much more dynamic, complex and technically sophisticated battlefield than previously experienced. For
example, Operation Telic (Desert Storm) involved almost one million combatants and ten thousand armoured vehicles in
the coalition force, advancing across an extensive battlefront at high speed during daylight and at night, making effective
use of a range of electro-optic sensors. The accelerated tempo of battle means that front lines can undergo rapid,
punctuated advances that can leave individual combat units with a much degraded situational awareness, particularly of
where they are in relation to other 'friendly' combatants. Consequently, there is a need for a robust, low cost, low
weight, compact, unpowered, interoperable, Combat Identification technique for use with popular electro-optic sensors
which can be deployed, and is effective, at the individual combat unit level. In this paper we discuss ground-to-ground
combat identification materials that meet these requirements, all of which are based on the air-to-ground MirageTM
vehicle marking material. We show some preliminary ground-to-ground data collected from the new variant MirageTM
material in recent experimental trials conducted during the day, evening and at night.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The German ministry of the interior, represented by the civil defence agency BBK, established analytical task forces for
the analysis of released chemicals in the case of fires, chemical accidents, terrorist attacks, or war. One of the first
assignments of the task forces was the provision of analytical services during the football world cup 2006. One part of
the equipment of these emergency response forces is a remote sensing system that allows identification and
visualisation of hazardous clouds from long distances, the scanning infrared gas imaging system SIGIS 2. The system is
based on an interferometer with a single detector element in combination with a telescope and a synchronised scanning
mirror. The system allows 360° surveillance. The system is equipped with a video camera and the results of the analyses
of the spectra are displayed by an overlay of a false colour image on the video image. This allows a simple evaluation of
the position and the size of a cloud. The system was deployed for surveillance of stadiums and public viewing areas,
where large crowds watched the games. Although no intentional or accidental releases of hazardous gases occurred in
the stadiums and in the public viewing areas, the systems identified and located various foreign gases in the air.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Although existing night vision equipment provides a significant improvement in target detection in low light conditions,
there are several limitations that limit their effectiveness. Focus is a significant problem for night vision equipment due
to the low f-number optics required to obtain sufficient sensitivity as well as the dynamic nature of night vision
applications, which requires frequent focus adjustments. The Georgia Tech Research Institute has developed a prototype
next-generation night vision device called the Improved Night Vision Demonstrator (INVD) in order to address these
shortfalls. This paper will describe the design of the INVD system as well as an analysis of its performance.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Surface-enhanced Raman scattering (SERS) combines extremely high sensitivity, due to enhanced
Raman cross-sections comparable or even better than fluorescence, with the observation of vibrational
spectra of adsorbed species, providing one of the most incisive analytical methods for chemical and
biochemical detection and analysis. Nanoparticles are of fundamental interest since they possess unique
size-dependent properties (optical, electrical, mechanical, chemical, magnetic, etc.), which are quite
different from the bulk and the atomic state. Metal colloids have become the most commonly used
nanostructures for SERS. Silver colloids have been synthesized by chemical reduction methods, and they
have been used for detecting TNT in solution with high sensitivity and molecular specificity. The present
study focuses on metallic nanoparticles with in the 50-100 nm particle size. The nanoparticles were
characterized using techniques such as UV-VIS spectroscopy, Scanning Electron Microscope, Atomic
Force Microscopy and Raman Spectroscopy. Detection of TNT deposited on silver colloids was achieved
at a wavelength of 532 nm, with a laser operating at 10 mW power (at head). The spectra were obtained
in the 100-3500 cm-1
range by averaging 3 scans for 10 seconds of integration time. Results indicate an
increase in the intensity of the vibrational signals due to SERS in TNT which was still detectable by the
enhanced presence of the NO2 out-of-plane bending modes at 820 and 850 cm-1 and the NO2 stretching
mode at 1300-1370 cm-1.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Infrared and Raman spectra in solid state of the cyclic nitramine hexahydro-1,3,5-trinitro-s-triazine, commonly
known as RDX, and 13C, and 15N (on ring) enriched RDX analogues were recorded and their fundamental
frequencies have been assigned using isotopic frequency shifts. RDX exists in two polymorphic forms known as α
and β. RDX molecules adopts C3v symmetry in the vapor phase, in solution and in the β-solid phase, in contrast to
stable &agr;-RDX solid phase which has close to Cs symmetry. Chemical calculations applying ab initio density
functional theory (DFT) have been carried out for the three RDX isotopomers at the 6-311G++** basis set level and
the computed vibrational frequencies have been compared with the experimental values. The calculated isotopic
frequency shifts, induced by 13C and 15N labeling, are in very good accordance with measured ones. The changes in
vibrational modes associated with the isotopic substitutions are well modeled by the calculation and previous
assignments of the vibrational spectra have been revised, especially where the exact nature of the vibrational modes
had been either vague or contradictory.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Metallic silver nanoparticles coated with titanium dioxide were synthesized via a simple route. The chemical
reduction of Ag+ to Ago was followed with the controlled polymerization of TiO2 to produce very small size and
narrow distribution of nanoparticles produced the desired TiO2/Ag colloidal suspensions. The prepared nanoparticles
were characterized by UV-VIS absorption and by Energy Dispersive X-ray Spectroscopy. The spectrum of the
suspension of normal Ag nanoparticles had a surface plasmon resonance peaked at 420 nm arising from particles
characteristic of Ag colloidal dispersions. Similar surface plasmon absorptions due to Ag nanoparticles were
observed for the suspension of Titania coated Ag nanoparticles, but at longer wavelength than for the suspension of
Ag nanoparticles. This absorption shift ( +15 to +20 nm) is caused by refractive index of Titania and suggests
coverage of Ag nanoparticles with Titania. TiO2/Ag colloids were used to measure Raman spectra in capillary tubes
at different excitation sources to observe the enhancement of the Raman signatures of solution of TNT and DNT at
different pH values. At pH = 10.3 TNT showed an increase of the NO2 stretching mode at the 1365 cm-1 in
comparison with the other pHs and the solution without colloids. In addition, the band ca. 1213 cm-1 and NO2 (1370
cm-1) band were shifted from their normal positions.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
The use of liquid explosives by terrorists has raised the attention to the use of hazardous liquids as threats to people,
buildings and transportation systems. Hazardous liquids such as explosive mixtures, flammables or even chemical
warfare agents (CWA) can be concealed in common containers and pass security checks undetected. This work
presents three non invasive, non destructive detection approaches that can be used to characterize the content of
common liquid containers and detect if the liquid is the intended or a concealed hazardous liquid. Fiber optic
coupled Raman spectroscopy and Stand off Raman spectroscopy were used to inspect the content of glass and
plastic bottles and thermal conductivity was used to asses the liquid inside aluminum cans. Raman spectroscopy
experiments were performed at 532 nm, 488 nm and 785 nm excitation wavelengths. The hazardous liquids under
consideration included CWA simulant DMMP, hydrogen peroxide, acetone, cyclohexane, ethanol and nitric acid.
These techniques have potential use as a detector for hazardous liquids at a check point or to inspect suspicious
bottles from a distance.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
Characterization of hexamethelene triperoxide diamine (HMTD), tetramethylene diperoxide dicarbamide (TMDD)
and tetramethylene diperoxide acetamide (TMDA) has been carried out using Direct Analysis in Real Time/Time of
Flight Mass Spectrometry (DART-TOF/MS). The study also centered in the detection of their precursors such as
hexamine and formaldehyde. Analysis of the compounds by GC-MS was also conducted. HMTD shows a clear peak
at 209 m/z that allowed its detection in standard solutions and lab made standards. TATP samples with deuterium
enrichment are being analyzed to compare results that could differentiate from HMTD and similar substances. All
samples were characterized by Raman and FT-IR to confirm the DART results. Some of the vibrations observed
were in the ν(O-O), ν(N-C), ν(N-H), ν(C-O), δ(CH3-C) and δ(C-O). Development methodology for trace detection
was compared with GC/MS and HPLC-MS results previously presented for HMTD and TATP.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.