Abstract
Automated identification of persons staying and working within closed and restricted areas is required for many guarded centers and restricted areas including airports, power plants, railway and sea container terminals, military training grounds, etc. This process is essential to ensure security and support identification of threats over the area to prevent terrorism acts and ensure adequate protection level. In case of large areas and many employers involved, it is necessary to introduce automated identification methods to support or even replace traditional security forces that are usually human guards using optical and infrared vision, also enabling operation in the darkness and heavy weather conditions. This paper represents general assumption for the integrated solution using Global Positioning System (GPS) devices, range radars, communication and software, also contains in-depth description of the database-related part of the system, including dataflow model and underlying Database Management System (DBMS) design as a part of the integrated “Friend” or ”Foe” (IFF) identification solution.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Agrawal, S., Narasayya, V., Yang, B.: Integrating vertical and horizontal partitioning into automated physical database design. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data (SIGMOD 2004), pp. 359–370. ACM (2004)
Baier, D.: Developing More-Secure ASP.NET 2.0 Applications (Pro Developer). Microsoft Press (2006)
Delaney, K.: Inside Microsoft SQLServer 2005: query tuning and optimization. Microsoft Press (2007)
Department of Defense: Joint Gatekeeper System (DRAFT). Supporting communications between Commercial-off-the-Shelf Access Control Systems and ENABLER for identity management data from Department of Defense Authoritative Databases. Interface Control Document. SEIWG, https://www.siaonline.org/content.aspx?id=5938
Eisenberg, A., Kulkarni, K., Melton, J., Michels, J.E., Zemke, F.: SQL:2003 Has Been Published. SIGMOD Record 33(1) (2004)
FLIR Systems Inc.: Mid-Range Perimeter Surveillance Radars, http://gs.flir.com/uploads/file/products/brochures/midrangeradars.pdf
Gane, C., Sarson, T.: Structured systems analysis: tools and techniques.Prentice-Hall (1979)
Guo-Shing, H.: Application of the Vehicle Navigation via GPS Carrier Phase. In: Proc. of the 6th WSEAS Int. Conf. on Robotics, Control and Manufacturing Technology, Hangzhou, China, pp. 218–223 (2006)
Guo-Shing, H.: Control the Vehicle Flow via GPS Monitor Center. In: Proc. of the 6th WSEAS Int. Conf. on Signal Processing, Computational Geometry & Artificial Vision, Elounda, Greece, pp. 174–181 (2006)
GlobalTop Technology Inc.: FGPMMOPA6C GPS Standalone Module Data SheetRevision: V0A, http://download.maritex.com.pl/pdfs/wi/FGPMMOPA6C.pdf
Herb, L., Paduch, J., Tokarz, K.: Influence of Receiver Parameters on GPS Navigation Accuracy. In: Czachórski, T., Kozielski, S., Stańczyk, U. (eds.) Man-Machine Interactions 2. AISC, vol. 103, pp. 85–93. Springer, Heidelberg (2011)
Navtech Radar Ltd, AdvanceGuard W500 and W500-X Features, http://www.navtechradar.com/Documents/SecuritySystems/W500Datasheet.pdf
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Czekalski, P., Tokarz, K. (2013). SMAC - Dataflow and Storage Modeling for Remote Personnel Identification in Restricted Areas. In: Selamat, A., Nguyen, N.T., Haron, H. (eds) Intelligent Information and Database Systems. ACIIDS 2013. Lecture Notes in Computer Science(), vol 7803. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36543-0_53
Download citation
DOI: https://doi.org/10.1007/978-3-642-36543-0_53
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36542-3
Online ISBN: 978-3-642-36543-0
eBook Packages: Computer ScienceComputer Science (R0)