Improving real-time security screening

被引:0
|
作者
Hand, Benjamin M. [1 ]
Bailey, Colleen P. [1 ]
机构
[1] Univ North Texas, Dept Elect Engn, Denton, TX 76207 USA
关键词
security screening; x-ray; classification; object detection;
D O I
10.1117/12.3014170
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Transportation Security Administration (TSA) is responsible for air travel safety within the United States but faces a significant challenge. Recent studies show an alarming 80% failure rate in threat detection at most screening locations, primarily due to heavy reliance on human judgment. With more than 50,000 TSA officers screening over 2 million passengers daily, it is essential to address this issue promptly, as evidenced by a 42% increase in complaints related to TSA screening over the past year, according to the US Department of Transportation's monthly air travel consumer report. These complaints underscore the pressing need for improved threat detection procedures in airport security. In response to these critical concerns, we present a novel and efficient neural network classification algorithm as a potential solution, specifically designed to mitigate the identified shortcomings in the TSA's threat detection capabilities. By reducing the overall complexity of larger models, through the application of advanced layers and an artfully configured structure, we achieve a solution that maximizes efficiency without compromising accuracy. This research bridges the gap between the demands of contemporary threat detection and the practical limitations of airport security procedures. By introducing a tailored solution, we aim to significantly enhance the efficacy of threat detection, thereby contributing to the overall safety and security of air travel. This work represents a pivotal step in addressing the critical issues associated with the TSA's current screening methods and underscores the potential of advanced technology to bolster the reliability of threat detection systems.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] REALITY CHECK: IMPROVING REAL-TIME PIPELINE MONITORING USING NEAR REAL-TIME FLUID DATA
    Jutras, Joseph
    Barlow, Rick
    IPC2008: PROCEEDINGS OF THE ASME INTERNATIONAL PIPELINE CONFERENCE - 2008, VOL 1, 2009, : 641 - 649
  • [42] Real-Time Systems Security Through Scheduler Constraints
    Mohan, Sibin
    Yoon, Man-Ki
    Pellizzoni, Rodolfo
    Bobba, Rakesh
    2014 26TH EUROMICRO CONFERENCE ON REAL-TIME SYSTEMS (ECRTS 2014), 2014, : 129 - +
  • [43] Supporting timeliness and security in real-time database systems
    Son, SH
    NINTH EUROMICRO WORKSHOP ON REAL TIME SYSTEMS, PROCEEDINGS, 1997, : 266 - 273
  • [44] Seamless Handover and Security Solution for Real-Time Services
    Diab, Wafaa Bou
    Tohme, Samir
    2009 11TH IEEE INTERNATIONAL SYMPOSIUM ON MULTIMEDIA (ISM 2009), 2009, : 363 - 368
  • [45] Schedulability driven security optimization in real-time systems
    Lin, Man
    Yang, Laurence T.
    FIRST INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2006, : 314 - +
  • [46] REAL-TIME EXTERNAL EQUIVALENTS FOR STATIC SECURITY ANALYSIS
    MONTICELLI, A
    DECKMANN, S
    GARCIA, A
    STOTT, B
    IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1979, 98 (02): : 498 - 508
  • [47] Guiding the selection of security patterns for real-time systems
    Motii, Anas
    Hamid, Brahim
    Lanusse, Agnes
    Bruel, Jean-Michel
    2016 21ST INTERNATIONAL CONFERENCE ON ENGINEERING OF COMPLEX COMPUTER SYSTEMS (ICECCS 2016), 2016, : 155 - 164
  • [48] Modelling security risks in real-time operating systems
    Kiszka, Jan
    Wagner, Bernardo
    2007 5TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2007, : 125 - 130
  • [49] Transient security assessment in real-time at southern company
    Viikinsalo, James
    Martin, Alan
    Morison, Kip
    Wang, Lei
    Howell, Frederic
    2006 IEEE/PES POWER SYSTEMS CONFERENCE AND EXPOSITION. VOLS 1-5, 2006, : 13 - +
  • [50] Real-time Security & Dependability monitoring: make it a bundle
    Coppolino, Luigi
    D'Antonio, Salvatore
    Formicola, Valerio
    Romano, Luigi
    2014 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2014,