296 resources related to Border Control
- Topics related to Border Control
- IEEE Organizations related to Border Control
- Conferences related to Border Control
- Periodicals related to Border Control
- Most published Xplore authors for Border Control
Energy conversion and conditioning technologies, power electronics, adjustable speed drives and their applications, power electronics for smarter grid, energy efficiency,technologies for sustainable energy systems, converters and power supplies
The ACC is the annual conference of the American Automatic Control Council (AACC, the U.S. national member organization of the International Federation for Automatic Control (IFAC)). The ACC is internationally recognized as a premier scientific and engineering conference dedicated to the advancement of control theory and practice. The ACC brings together an international community of researchers and practitioners to discuss the latest findings in automatic control. The 2020 ACC technical program will
The International Conference on Information Fusion is the premier forum for interchange of the latest research in data and information fusion, and its impacts on our society. The conference brings together researchers and practitioners from academia and industry to report on the latest scientific and technical advances.
The Frontiers in Education (FIE) Conference is a major international conference focusing on educational innovations and research in engineering and computing education. FIE 2019 continues a long tradition of disseminating results in engineering and computing education. It is an ideal forum for sharing ideas, learning about developments and interacting with colleagues inthese fields.
2020 IEEE Radar Conference (RadarConf20)
Annual IEEE Radar Conference
The IEEE Aerospace and Electronic Systems Magazine publishes articles concerned with the various aspects of systems for space, air, ocean, or ground environments.
Experimental and theoretical advances in antennas including design and development, and in the propagation of electromagnetic waves including scattering, diffraction and interaction with continuous media; and applications pertinent to antennas and propagation, such as remote sensing, applied optics, and millimeter and submillimeter wave techniques.
The theory, design and application of Control Systems. It shall encompass components, and the integration of these components, as are necessary for the construction of such systems. The word `systems' as used herein shall be interpreted to include physical, biological, organizational and other entities and combinations thereof, which can be represented through a mathematical symbolism. The Field of Interest: shall ...
IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...
The design and manufacture of consumer electronics products, components, and related activities, particularly those used for entertainment, leisure, and educational purposes
2014 IEEE Joint Intelligence and Security Informatics Conference, 2014
Each year the number of passengers travelling around the world is steadily increasing. Hence, the efficient handling of border crossings while maintaining a high security is a demanding challenge for the future. In this work we present the key security components for a novel proposed one-stop-shop (OSS) border control system, which tries to achieve greatest throughput of travelers while applying ...
2017 IEEE International Conference on RFID Technology & Application (RFID-TA), 2017
The paper presents the application of the RFID technology in the international system of the European Union (EU) border control. The proposed architecture consists of computerized portable units (equipped with specialized devices for data acquisition) carried by border officers and the server cloud infrastructure. Among other details of the proposed system (such as QR codes or images of people trying ...
2013 European Intelligence and Security Informatics Conference, 2013
The Border Control community uses a number of skills, techniques and technologies to achieve its objectives: everything from the skilled eye, ear and feel of the border officer to sophisticated data, image and biometric analytics. These are often used singly or in small combinations or at different stages. What might a border control system look like which used a larger ...
2006 CIE International Conference on Radar, 2006
This paper describes part of the activities required to model and assess the performance of a national integrated system (NIS) in the context of homeland security and in particular on border control issues. The border control requires an accurate surveillance of the terrestrial, maritime and overland boundaries, thus involving a wide number of heterogeneous sensors, command and control centres, platforms ...
2018 International Joint Conference on Neural Networks (IJCNN), 2018
This paper provides an overview of border control processes and how the inclusion of different biometric technologies contributes to its improvement. In particular, facial recognition is one of the latest biometric technology to have been added to this list of technologies. The Face Matching Tool (FMT), a system defined to assist border guards in the process of validating the identity ...
Renewable Power for Refugee Camps
IROS 2014 Plenary: Todd Kuiken
Additive-generative Industrial Design for Robotic Automation
Optimization for Robust Motion Planning and Control
Inspiring Brilliance: The impact of control theory and cybernetics of Maxwell's paper: On governors
Build Your Career: IEEE Metro Area Workshops
Navigation and Control of Unmanned Vehicles: A Fuzzy Logic Perspective
Surgical Robotics: Analysis and Control Architecture for Semiautonomous Robotic Surgery
Learning Control and Knowledge Transfer Between Aerial Robots for Improved Accuracy in Trajectory Tracking
EMBC 2011-Workshop-Motor Control Principles in Neurorobotics and Prosthetics-PT IV
APEC 2012 - Dr. Fred Lee Plenary
Maker Faire 2008: Smart LEDs
EMBC 2011-Workshop- Motor Control Principles in Neurorobotics and Prosthetics-PT II
IMS 2012 Special Sessions: The Evolution of Some Key Active and Passive Microwave Components - L.R. Whicker
Maker Faire 2008: Pong and Asteroids Watch
Control of a Fully-Actuated Airship for Satellite Emulation
EMBC 2011-Workshop-Motor Control Principles in Neurorobotics and Prosthetics-PT I
Qing-Chang Zhong, Distinguished Lecturer - PELS
A 6GS/s 9.5 Bit Pipelined Folding-Interpolating ADC with 7.3 ENOB and 52.7dBc SFDR in the 2nd Nyquist Band in 0.25μm SiGe-BiCMOS: RFIC Interactive Forum
Each year the number of passengers travelling around the world is steadily increasing. Hence, the efficient handling of border crossings while maintaining a high security is a demanding challenge for the future. In this work we present the key security components for a novel proposed one-stop-shop (OSS) border control system, which tries to achieve greatest throughput of travelers while applying highest security measurements. We collect the main stakeholder's requirements for an OSS system and assembly the necessary technological solutions so that the proposed OSS system can be operated at all kinds of borders. Thereby, the selected technologies are evaluated and current limitations and constraints described.
The paper presents the application of the RFID technology in the international system of the European Union (EU) border control. The proposed architecture consists of computerized portable units (equipped with specialized devices for data acquisition) carried by border officers and the server cloud infrastructure. Among other details of the proposed system (such as QR codes or images of people trying to enter EU), RFID information is critical for the border control procedure. It must be read from passports and confronted against local and remote data, stored in the central database The paper presents the general architecture of the proposed border control system. The structure of the application, responsible for connecting the RFID reader with the portable computer and communicating with the Internet database via the Web Services technology is presented. Introduced use cases show functionality of the system, focusing on the acquisition and analysis of the RFID information.
The Border Control community uses a number of skills, techniques and technologies to achieve its objectives: everything from the skilled eye, ear and feel of the border officer to sophisticated data, image and biometric analytics. These are often used singly or in small combinations or at different stages. What might a border control system look like which used a larger number of near-simultaneous scans, checks and queries on each passenger? And how might it be evaluated? This paper examines what a 'Swiss Army Knife', multi-tool approach to border, visas and internal migration control might involve and how this multi-tool approach might solve a number of common problems. It briefly touches on the erasing of boundaries between traditional 'immigration' information systems and those of port security, carrier reservations, economic and demographic statistics, police and counter- terrorism agencies.
This paper describes part of the activities required to model and assess the performance of a national integrated system (NIS) in the context of homeland security and in particular on border control issues. The border control requires an accurate surveillance of the terrestrial, maritime and overland boundaries, thus involving a wide number of heterogeneous sensors, command and control centres, platforms and communication networks. One of the layers of the integrated system is composed by radar sensors; these sensors can be ground or ship based, 1D or 3D. The paper deals with the problem of correlation and fusion of track data pertaining to ground and ship based, 2D and 3D radar sensors directly in the radar sites. Then, the improved (i.e. more accurate) information can be soon made available for a number of radar functions, such as: (i) re-pointing of the beam along the threat direction of arrival, (ii) energy and time management, (iii) cue of other sensors (i.e. infrared) or proper reaction means (patrol boat), (iv) preliminary classification of potential hostile targets. The updating and testing of the data extractor (DE) of a notional surveillance radar system is presented; the modified hardware and software is capable of acquiring, managing and fusing tracks pertaining to the radar system housing the DE and to other systems connected to the DE itself
This paper provides an overview of border control processes and how the inclusion of different biometric technologies contributes to its improvement. In particular, facial recognition is one of the latest biometric technology to have been added to this list of technologies. The Face Matching Tool (FMT), a system defined to assist border guards in the process of validating the identity of a travel document holder during the crossing border process, is presented in this paper. The system is built using advanced and high- performance deep learning models. Existing solutions for border control, such as the Automated Border Check gates (ABC gates), are possible thanks to the use of facial recognition as the main option for identity validation. These solutions imply a decrease in the queue time that a traveler expends crossing the border at airports around the globe. The FMT module, together with the rest of the iBorderCtrl system, reduces this waiting time while providing unconstrained and high facial recognition performances at the land borders.
This paper describes ten lessons that programs should consider when introducing innovations to automatically identify and verify the eligibilities of travelers as part of border control and customs processes. These lessons are drawn from focus group discussions comprising former members of IRIS program. We argue that these and similar lessons should be incorporated into a systematic methodology to stimulate collaboration between designers and stakeholders in order to improve complex decision-making regarding the value of introducing innovations for controlling borders.
Automated Border Control (ABC) in airports and land crossings utilize automated technology to verify passenger identity claims. Accuracy, interaction stability, user error, and the need for a harmonized approach to implementation are required. Two models proposed in this paper establish a global path through ABC processes. The first, the generic model, maps separately the enrolment and verification phases of an ABC scenario. This allows a standardization of the process and an exploration of variances and similarities between configurations across implementations. The second, the identity claim process, decomposes the verification phase of the generic model to an enhanced resolution of ABC implementations. Harnessing a human-biometric sensor interaction framework allows the identification and quantification of errors within the system's use, attributing these errors to either system performance or human interaction. Data from a live operational scenario are used to analyze behaviors, which aid in establishing what effect these have on system performance. Utilizing the proposed method will aid already established methods in improving the performance assessment of a system. Through analyzing interactions and possible behavioral scenarios from the live trial, it was observed that 30.96% of interactions included some major user error. Future development using our proposed framework will see technological advances for biometric systems that are able to categorize interaction errors and feedback appropriately.
In a world where terrorism is threatening as well civilian people as the forces involved in peacekeeping and peace enforcing missions, the protection of borderlines of regions of interest as well as military camps is a necessary demand. To maintain day- and night performance under adverse weather conditions especially with the ability to cope with dust, fog and haze or snow, radar sensors are under development. Especially the millimetre wave region offers the additional advantage of small, light weight miniature sensors with the capability to accommodate a high signal bandwidth and thus high range resolution. To demonstrate these capabilities for both millimetre wave regions, Ka- and W-band, experiments were conducted jointly by EADS, Ulm, and FGAN-FHR, Wachtberg. A low cost and easily portable 35-GHz radar, originally designed for SAR applications in small UAVs, is used for automatic detection and recognition of moving hostile objects like persons and vehicles at distances of several kilometres in a strong ground clutter environment. A similar FM-CW radar operating at 94 GHz has been used under comparable environmental conditions to gather data at this radar band. It could be shown that possible foes will be recognized and exactly localized in range, azimuth and velocity. Possible applications of such sensors embedded in protection system concepts are presented as well as signature examples, algorithm approaches and results from outdoor experiments.
Traditionally, automated access and border control biometric systems are thought of and designed as verification 1-to-1 systems, where a single comparison between a probe and the claimed identity is examined to allow or disallow the entry to a person; and as such they have been evaluated to date - by using the error tradeoff statistics, which counts how many times a person was falsely accepted or rejected. Such a design however may soon become obsolete due to the recent shift towards applying biometrics to free-flow surveillance-like environments and also in the light of recent findings showing that performance of many verification systems can be improved through the use of several 1-to-N scores, instead of relying on a single 1-to-1 score only. As the framework for designing biometric-enabled access and border control systems changes, so has to change the methodology for the evaluation of such systems. This paper addresses this problem by establishing the multi- order biometric score analysis framework. The framework incorporates latest innovations and recommendations related to the comprehensive evaluation of biometric systems, including subject-based analysis, calibrated score analysis, and two new performance metrics: threshold-validated recognition ranking and non-confident decisions due to multiple threshold-validated scores. The framework is implemented in the Comprehensive Biometrics Evaluation Toolkit (C-BET) and has been applied for the evaluation of several biometric modalities, in particular, those that are frequently contemplated for the use in unconstrained access-border control applications, such as face, voice and iris. The results of the iris modality evaluation are presented in this paper.
As hardware accelerators proliferate, there is a desire to logically integrate them more tightly with CPUs through interfaces such as shared virtual memory. Although this integration has programmability and performance benefits, it may also have serious security and fault isolation implications, especially when accelerators are designed by third parties. Unchecked, accelerators could make incorrect memory accesses, causing information leaks, data corruption, or crashes not only for processes running on the accelerator, but for the rest of the system as well. Unfortunately, current security solutions are insufficient for providing memory protection from tightly integrated untrusted accelerators. We propose Border Control, a sandboxing mechanism which guarantees that the memory access permissions in the page table are respected by accelerators, regardless of design errors or malicious intent. Our hardware implementation of Border Control provides safety against improper memory accesses with a space overhead of only 0.006% of system physical memory per accelerator. We show that when used with a current highly demanding accelerator, this initial Border Control implementation has on average a 0.15% runtime overhead relative to the unsafe baseline.
No standards are currently tagged "Border Control"