2021
DOI: 10.46300/9102.2021.15.28
|View full text |Cite
|
Sign up to set email alerts
|

An Innovative Security Screening Architecture for Detecting Illicit Goods and Threats

Abstract: Every year, millions of letters/parcels containing illicit goods are detected by customs authorities, which use traditional security screening equipment. However this equipment cannot detect all kinds of illicit goods and the detection procedure heavily depends on the attention of the customs officer. In order to achieve sufficiently fast intelligent screening of the large volumes of letters/parcels and detect all common kinds of threats, this paper proposes a highly innovative architecture well-beyond the sta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 22 publications
0
1
0
Order By: Relevance
“…Even though very interesting, most aforementioned works are not tested on real world settings and do not provide specific levels of threat. This paper builds on previous extensive experience on surveillance, authentication, illicit goods detection and location-based action analysis [48] - [53], to perform threat assessment of neighboring CIs. Three scenarios are analyzed, multiple explosions are considered, a CI-based fusion algorithm is proposed for non-overlapping segments of the Voronoi tessellation and a real time innovative algorithm to assess the specific threat of each CI is presented.…”
Section: Related Workmentioning
confidence: 99%
“…Even though very interesting, most aforementioned works are not tested on real world settings and do not provide specific levels of threat. This paper builds on previous extensive experience on surveillance, authentication, illicit goods detection and location-based action analysis [48] - [53], to perform threat assessment of neighboring CIs. Three scenarios are analyzed, multiple explosions are considered, a CI-based fusion algorithm is proposed for non-overlapping segments of the Voronoi tessellation and a real time innovative algorithm to assess the specific threat of each CI is presented.…”
Section: Related Workmentioning
confidence: 99%