security checkpoints
Recently Published Documents


TOTAL DOCUMENTS

43
(FIVE YEARS 14)

H-INDEX

5
(FIVE YEARS 1)

2022 ◽  
Vol 8 ◽  
pp. e841
Author(s):  
Aymen Akremi

Digital vision technologies emerged exponentially in all living areas to watch, play, control, or track events. Security checkpoints have benefited also from those technologies by integrating dedicated cameras in studied locations. The aim is to manage the vehicles accessing the inspection security point and fetching for any suspected ones. However, the gathered data volume continuously increases each day, making their analysis very hard and time-consuming. This paper uses semantic-based techniques to model the data flow between the cameras, checkpoints, and administrators. It uses ontologies to deal with the increased data size and its automatic analysis. It considers forensics requirements throughout the creation of the ontology modules to ensure the records’ admissibility for any possible investigation purposes. Ontology-based data modeling will help in the automatic events search and correlation to track suspicious vehicles efficiently.


2021 ◽  
Vol 25 (Special) ◽  
pp. 3-174-3-185
Author(s):  
Sumayah T. Ayob ◽  
◽  
Zainab A. Alkaissi ◽  

The travel speeds selected and trusted by the driver vary according to his behavior and the surrounding environment. Accordingly, this paper studies the change of the free-flow speed, influences on it, of the route linking Al-Bayaa and Bab Almudam sectors. A GPS device was used to collect data during 60 rounds for three periods (morning, day, and night), 50 of them during the off-peak time and 10 during peak time with drivers of both genders and different ages. The results showed a variation of the FFS values at off-evening peak time, also noting the posted speed limits corresponding to the statistically calculated 85, which was 69km\hr. along the route. The emergence of a significant impact of the security checkpoints in link 3, causing a general defect in the traffic accounts. Also, there was an increase in the speed with an increase in lane width by 13% and a decrease in the speed with an increase in the number of lanes by 45.18% and 18.6% between 2 and 4 lanes and 2 and 3 lanes respectively. It should be noted that male is bolder and more reckless in choosing speeds by 26.32% than female and that groups of 50 and below years old choose less speed by 13.52% of ages 35 and below years old who are more confident and familiar in dealing with roads and choosing the appropriate speed.


2021 ◽  
Vol 11 (2) ◽  
pp. 1-25
Author(s):  
Zhiding Hu ◽  
Victor Konrad

English Abstract: Formerly localized, restricted border interaction between China and Southeast Asia has shifted to extensive cross-border engagement along regulated borders with a hierarchy of crossings and expansive borderlands. This expanded security system reveals rescaled and repositioned border security infrastructure and practice into a point and corridor system with vanguard crossings at Hekou, Mohan and Ruili. Fundamental shifts are concurrent focus on primary crossings and spatially extensive borderlands that encompass diminished attention to lesser crossings, beyond the border implementation of security checkpoints, mobile security, and compromise, to enable effective management of expansive borderlands. These borderlands mediate space and enable spatial reapportionment of security to accommodate greatly enhanced cross-border flows of people, goods, and information, thus shaping extensive spaces of exclusion and integration and focused places of exception.Spanish Abstract: La anteriormente restringida interacción fronteriza China–Sudeste Asiático, cambió a un extenso compromiso de fronteras reguladas con una jerarquía de cruces y zonas transfronterizas expansivas. Este sistema ampliado de seguridad, revela la infraestructura y prácticas transfronterizas reescaladas y reubicadas como puntos y sistemas de corredores con cruces de vanguardia en Hekou, Mohan y Ruili. Los cambios se enfocan en los cruces primarios y extensión de fronteras, disminuyendo la atención a los cruces menores —después de la implementación de puntos de control de seguridad—, la seguridad móvil y el compromiso a una gestión fronteriza eficaz. Estas zonas permiten la redistribución espacial de la seguridad acomodando los intensificados flujos transfronterizos de personas, bienes e información, conformando espacios de exclusión e integración, así como lugares de excepción focalizados. French Abstract: L’interaction frontalière entre la Chine et l’Asie du Sud-Est, autrefois localisée et limitée, s’est transformée en un engagement transfrontalier réglementé avec une hiérarchie de passages et des zones frontalières étendues. Ce système de sécurité élargi révèle une infrastructure et une pratique de sécurité frontalière redimensionnées et repositionnées dans un système de points et de corridors avec des passages d’avant-garde à Hekou, Mohan et Ruili. Les changements fondamentaux se concentrent sur les principaux points de passage, les zones frontalières étendues, la mise en œuvre de points de contrôle de sécurité, la sécurité mobile et le compromis, pour permettre une gestion effi cace des zones frontalières étendues. Ces dernières permettre ent la médiation de l’espace et la réaffectation spatiale de la sécurité afin d’accueillir des fl ux transfrontaliers de personnes, de biens et d’informations considérablement accrus, façonnant ainsi de vastes espaces d’exclusion et d’intégration et des lieux d’exception ciblés.


Author(s):  
Ming Wan ◽  
Zhifang Chen ◽  
Junhua Guo

Rational and orderly passenger organization in subway station can improve travel efficiency and safety. How to improve the efficiency of security check, which has a significant impact on the passenger organization, to reduce passengers staying time in the terminal level has the potential to improve service satisfaction. The Weidong Station of Line 1 of Nanchang Metro was selected as the research object. Anylogic software was used to simulate the process of arrival, ticket purchase, security check, gate-crossing machine etc. The results indicate that the dynamic adjustment of security checkpoints and fast passage for passengers without luggage can improve the security efficiency and relieve the congestion in the station hall.


2021 ◽  
Vol 59 ◽  
pp. 234-243
Author(s):  
Miguel Mujica Mota ◽  
Paolo Scala ◽  
Alejandro Di Bernardi ◽  
Angel Orozco

Aerospace ◽  
2020 ◽  
Vol 7 (6) ◽  
pp. 69
Author(s):  
Stef Janssen ◽  
Régis van der Sommen ◽  
Alexander Dilweg ◽  
Alexei Sharpanskykh

Airport security checkpoints are the most important bottleneck in airport operations, but few studies aim to empirically understand them better. In this work we address this lack of data-driven quantitative analysis and insights about the security checkpoint process. To this end, we followed a total of 2277 passengers through the security checkpoint process at Rotterdam The Hague Airport (RTM), and published detailed timing data about their journey through the process. This dataset is unique in scientific literature, and can aid future researchers in the modelling and analysis of the security checkpoint. Our analysis showed important differences between six identified passenger types. Business passengers were found to be the fastest group, while passengers with reduced mobility (PRM) and families were the slowest two groups. We also identified events that hindered the performance of the security checkpoint, in which groups of passengers had to wait long for security employees or other passengers. A total of 335 such events occurred, with an average of 2.3 passengers affected per event. It was found that a passenger that had a high luggage drop time was followed by an event in 27% of the cases, which was the most frequent cause. To mitigate this waiting time of subsequent passengers in the security checkpoint process, we performed an experiment with a so-called service lane. This lane was used to process passengers that are expected to be slow, while the remaining lanes processed the other passengers. It was found that the mean throughput of the service lane setups was higher than the average throughput of the standard lanes, making it a promising setup to investigate further.


Sensors ◽  
2020 ◽  
Vol 20 (11) ◽  
pp. 3015 ◽  
Author(s):  
Sourav Panda ◽  
Yuanzhen Liu ◽  
Gerhard Petrus Hancke ◽  
Umair Mujtaba Qureshi

This paper explores the security vulnerability of Personal Identification Number (PIN) or numeric passwords. Entry Device (PEDs) that use small strings of data (PINs, keys or passwords) as means of verifying the legitimacy of a user. Today, PEDs are commonly used by personnel in different industrial and consumer electronic applications, such as entry at security checkpoints, ATMs and customer kiosks, etc. In this paper, we propose a side-channel attack on a 4–6 digit random PIN key, and a PIN key user verification method. The intervals between two keystrokes are extracted from the acoustic emanation and used as features to train machine-learning models. The attack model has a 60% chance to recover the PIN key. The verification model has an 88% accuracy on identifying the user. Our attack methods can perform key recovery by using the acoustic side-channel at low cost. As a countermeasure, our verification method can improve the security of PIN entry devices.


2020 ◽  
Vol 50 (3) ◽  
pp. 190-196
Author(s):  
Sheldon H. Jacobson

The Transportation Security Administration (TSA) is responsible for protecting the nation's air transportation system. Risk-based security is a paradigm for aligning security resources (i.e., personnel, technology, and time) with security risks. PreCheck is one approach that the TSA uses to implement this strategy. Given that passengers enrolled in PreCheck undergo background checks and fingerprinting, they experience expedited screening at airport security checkpoints, with standard screening lanes dedicated to passengers not enrolled in PreCheck. This difference can favorably impact the TSA’s ability to detect threat items like firearms. This paper uses publicly available data on firearm detection, number of passengers screened, and the fraction of passenger screenings in PreCheck lanes to estimate the number of firearms missed at airport security checkpoints in the United States. To achieve this, it defines risky firearms as firearms carried by passengers not enrolled in PreCheck and assumes that only standard screening lanes are where such firearms are brought to checkpoints. Under this assumption, the number of risky firearms missed in the recent past is estimated, given more current risky firearm detection rates. This analysis suggests that increasing the number of PreCheck passenger screenings may reduce the number of undetected risky firearms passing through security checkpoints.


2020 ◽  
Vol 25 (2) ◽  
pp. 255-260 ◽  
Author(s):  
Akimasa Kimura ◽  
Tetsuya Jinno ◽  
Sachiyuki Tsukada ◽  
Masaaki Matsubara ◽  
Hideyuki Koga

Sign in / Sign up

Export Citation Format

Share Document