《1980 CARNAHAN CONFERENCE ON CRIME COUNTERMEASURES MAY 14-16 1980》求取 ⇩

Session 1: Opening SessionSession Chairman: Sanford A. Multings Constabulery Office, Telecommunications Division,Kingston,Jamaica,Weet Indies1

Comparing Police Communications of Five Forces in AsiaEstelle Zannes, University of New Mexico, Albuquerque, New Mexico1

System Engineering Laid BareLouis L. Taylor, Bernard Johnson Inc.Houston, Texas7

800 MHz Trunked Radio Systems for Public Safety: Present Limitations and the Prospecta of Their MinimizationJames F. DiMauro, Booze, Allen & Hamilton,Inc Tinton Falls,New Jersey13

Session 2: Communication and ControlSession Chairman: Kenneth D. Hopper, Bell Telephone Laboratories, Holmdel, New Jersey17

A Low-Cost Surveillance, Command, Control and Communications System for the Interception of Drug-Smuggling AircraftFrank Box and D. James Chadwick, Hydrotronics, Inc.McLean, Virginia17

Vehicle Direction Sensing RadarFabian C. Monds, J. A. C. Stewart, R. A. Brown, J. Mallon and D. McGlade, The Queen's University of Belfast, Ireland23

Analog Voice Privacy with a MicroprocessorSergei Udalov, Axiomatix, Los Angeles, California27

Computer-Aided New Dispatch System for the Tokyo Metropolitan Police DepartmentHiroshi Ohno, Makoto Funahashi and Shiro Ohki, Communications Bureau, National Police Agency, Tokyo, Japan39

Session 3: Recognition and VerificationSession Chairman: Carmen J.Tona, International Telephone and Telegraph, Dayton, Ohio47

Computer Interfacing of the Rockwell International ADAP for Flexible Digital Audio ProcessingAnthony M. Collins, Australian National University, Canberra, Australia47

A Real Time Auto matic Speaker Recognition System on Mini-ComputerCherif El Chafei, Thomson C.S.F. Coop, Paris, France53

A Low Cost Speaker Verification DeviceM. H.Kuhn and R. Geppert, Pbilips GmbHForscbungslaboratorium, Hambung, Germany57

External Intrusion Sensors-A Study of Performance and CompatibilityN. I. Buckley, Sborrock Security Systems Ltd. Blackburn, Lancs., England63

Session 4: Alarm SystemsSession Chairman: Gerald Levett, Canadian Corrections Service, Ottawa, Ontario, Canada67

Computerized Site Security Monitor and Response SystemRaymond T. Moore, Institute for Computer Sciences and Tecbnology, National Bureau of Standards, Washington, D.C.67

Evaluation of the GUIDAR Intrusion Detection System for the Correctional Service of Canada (CSC)Roy D. Ball, Roy Ball Associates, Ltd., and Gerald Levett, The Correctional Service of Canada, Ottawa, Ontario, Canada73

A Centralized Alarm System for Urban and Long Distance Areas ApplicationAdalberto Biasiotti, Italtel, Societa Italiana Telecomunicazioni, Milan, Italy83

The Los Alamos Scientific Laboratory Long Range Alarm SystemRobert DesJardin, Los Alamos Scientific Laboratory, Los Alamos, New Mexico89

Evening SessionSession Chairman: Lawrence D. Sanson, General Telephone Company of Kentucky Lexington, Kentucky97

White Collar Crime-Computer Abuse A Challenge to Law EnforcementRichard J. Gallagher, Consultant, Bethesda, Maryland97

Session ti: Detection and IdentificationSession Chairman:Louis L.Taylor, Bernard Johnson,Inc.,Houston,Texas103

Applications of Digital Image Restoration to Photographie EvidenceH. J. Trussell and T. M. Cannon, Los Alamos Scientific Laboratory, University of California, Los Alamos, New Mexico103

Prospects for Computer Vision in Security SystemsBruce L. Bullock, Hugbes Research Laboratories, Malibu, California109

New Types of Leaky Transmission Lines for Detection and Classification of Moving ObjectsM. Hamid, Naval Postgraduate School, Montercy, California117

An Automatic Personal Verification System Based on Signature Writing HabitsWilliam J. Hale and Bruno C. Paganini, NCR Corporation, Dayton, Ohio121

Additional Papers Published127

A Technological Approach to Arson PreventionJeffery L. Gwynne, Honeywell, Inc., Arlington Heights, Illinois127

Spatial Filter Available for Defocus Sensing and its ApplicationsSuteo Tsutsumi Kohji Takemura, and Yasumasa Itakura, Kyoto Institute of Technology, Matsugasaki, Sakyo-ku, Kyoto, Japan133

Use of LORAN-C in AVM and C2 SystemsWilliam F. O'Halloran, Jr. and Bahar J. Uttam, JACOR, Woburn, Massachusetts143

Adam Smith's, Countermeasure Against CrimeJohn S. Jackson, University of Kentucky, Lexington, Kentucky147

Facility Intrusion Detection SystemBen Barker, U. S. Army MERADCOM, and R. A. Miller, GTE Sylvania, Mountain View. California153

1980《1980 CARNAHAN CONFERENCE ON CRIME COUNTERMEASURES MAY 14-16 1980》由于是年代较久的资料都绝版了,几乎不可能购买到实物。如果大家为了学习确实需要,可向博主求助其电子版PDF文件(由JOHN S.JACKSON 1980 ENGINEERING 出版的版本) 。对合法合规的求助,我会当即受理并将下载地址发送给你。