Improving real-time security screening

被引:0
|
作者
Hand, Benjamin M. [1 ]
Bailey, Colleen P. [1 ]
机构
[1] Univ North Texas, Dept Elect Engn, Denton, TX 76207 USA
关键词
security screening; x-ray; classification; object detection;
D O I
10.1117/12.3014170
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The Transportation Security Administration (TSA) is responsible for air travel safety within the United States but faces a significant challenge. Recent studies show an alarming 80% failure rate in threat detection at most screening locations, primarily due to heavy reliance on human judgment. With more than 50,000 TSA officers screening over 2 million passengers daily, it is essential to address this issue promptly, as evidenced by a 42% increase in complaints related to TSA screening over the past year, according to the US Department of Transportation's monthly air travel consumer report. These complaints underscore the pressing need for improved threat detection procedures in airport security. In response to these critical concerns, we present a novel and efficient neural network classification algorithm as a potential solution, specifically designed to mitigate the identified shortcomings in the TSA's threat detection capabilities. By reducing the overall complexity of larger models, through the application of advanced layers and an artfully configured structure, we achieve a solution that maximizes efficiency without compromising accuracy. This research bridges the gap between the demands of contemporary threat detection and the practical limitations of airport security procedures. By introducing a tailored solution, we aim to significantly enhance the efficacy of threat detection, thereby contributing to the overall safety and security of air travel. This work represents a pivotal step in addressing the critical issues associated with the TSA's current screening methods and underscores the potential of advanced technology to bolster the reliability of threat detection systems.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] Security Issues in Industrial Real-Time Systems
    Al-Jarad, Talhah
    Al Madani, Basem
    2010 THE 3RD INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND INDUSTRIAL APPLICATION (PACIIA2010), VOL V, 2010, : 357 - 361
  • [22] Security-Cognizant Real-Time Scheduling
    Baruah, Sanjoy
    2022 IEEE 25TH INTERNATIONAL SYMPOSIUM ON REAL-TIME DISTRIBUTED COMPUTING (ISORC 2022), 2022, : 77 - 85
  • [23] Analysis of Embedded Real-Time System Security
    Ma Jingjing
    ADVANCES IN COMPUTER SCIENCE, ENVIRONMENT, ECOINFORMATICS, AND EDUCATION, PT II, 2011, 215 : 429 - 433
  • [24] AN INTEGRATED PACKAGE FOR REAL-TIME SECURITY ENHANCEMENT
    BERTRAM, TJ
    DEMAREE, KD
    DANGELMAIER, LC
    IEEE TRANSACTIONS ON POWER SYSTEMS, 1990, 5 (02) : 592 - 600
  • [25] Real-time data-security chip
    不详
    COMPUTER DESIGN, 1997, 36 (02): : 101 - 101
  • [26] Static Security Optimization for Real-Time Systems
    Lin, Man
    Xu, Li
    Yang, Laurence T.
    Qin, Xiao
    Zheng, Nenggan
    Wu, Zhaohui
    Qiu, Meikang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2009, 5 (01) : 22 - 37
  • [27] Real-time correlation of network security alerts
    Li, Zhitang
    Zhang, Aifang
    Lei, Jie
    Wang, Li
    ICEBE 2007: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2007, : 73 - +
  • [28] Survey of real-time multimedia security mechanisms
    Moravcik, Marek
    Segec, Pavel
    Hrabovsky, Jakub
    Papan, Jozef
    Uramova, Jana
    2016 INTERNATIONAL CONFERENCE ON EMERGING ELEARNING TECHNOLOGIES AND APPLICATIONS (ICETA), 2016,
  • [29] FreeTEE: when real-time and security meet
    Pinto, S.
    Oliveira, D.
    Pereira, J.
    Cabral, J.
    Tavares, A.
    PROCEEDINGS OF 2015 IEEE 20TH CONFERENCE ON EMERGING TECHNOLOGIES & FACTORY AUTOMATION (ETFA), 2015,
  • [30] PasDroid: Real-time Security Enhancement for Android
    Hsiao, Shuen-Wen
    Hung, Shih-Hao
    Chien, Roger
    Yeh, Chih-Wei
    2014 EIGHTH INTERNATIONAL CONFERENCE ON INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING (IMIS), 2014, : 229 - 235