Imaging Technologies in Aviation Security
Imaging technologies have been an essential part of security screening especially in aviation security. Aviation security uses different kinds of scanning systems including X-rays, millimeter waves. New development has been researched in both imaging technologies in the past years all over the world. Recently microwave imaging systems for security applications has been researched in the University of Sussex with new finding in the imaging results. This paper will discuss the integration, factors and other management issues when it comes to deploy new imaging technology to serve the environment of aviation security.
(1) “White House Commission on Aviation Safety and Security FEBRUARY 12, 1997.” [Online]. Available: http://fas.org/irp/threat/212fin~1.html. [Accessed: 01-Aug-2014].
(2) D. Petersen and P. Polski, “International Aviation Security Research and Development,” J. Test. Eval., vol. 22, no. 3, p. 267, 1994.
(3) “http://www.heathrowairport.com/static/HeathrowAboutUs/Downloads/PDF/Aviation_connectivity_and_economy.pdf. - Google Search.” [Online]. Available: https://www.google.co.uk/search?q=http://www.heathrowairport.com/static/HeathrowAboutUs/Downloads/PDF/Aviation_connectivity_and_economy.pdf.&ie=utf-8&oe=utf-8&gws_rd=cr&ei=ELXMVaXsKcnbUdL7taAB. [Accessed: 13-Aug-2015].
(4) “wcms_208108.pdf.” [Online]. Available: http://www.ilo.org/wcmsp5/groups/public/---ed_dialogue/---sector/documents/presentation/wcms_208108.pdf. [Accessed: 02-Aug-2013].
(5) K. Leone and R. Liu, “Measures of effectiveness for passenger-baggage security screening,” Transp. Res. Rec. J. Transp. Res. Board, vol. 1822, no. 1, pp. 40–48, 2003.
(6) B. . Klock, “Test and evaluation report for X-ray detection of threats using different X-ray functions,” in 39th Annual 2005 International Carnahan Conference on Security Technology, 2005. CCST ’05, 2005, pp. 182–184.
(7) S. Michel, S. M. Koller, M. Ruh, and A. Schwaninger, “Do‘ Image Enhancement’ Functions Really Enhance X-Ray Image Interpretation?,” in Proceedings of the 29th Annual Cognitive Science Society, 2007, pp. 1301–1306.
(8) J. M. Wolfe, T. S. Horowitz, M. J. Van Wert, N. M. Kenner, S. S. Place, and N. Kibbi, “Low target prevalence is a stubborn source of errors in visual search tasks,” J. Exp. Psychol. Gen., vol. 136, no. 4, pp. 623–638, 2007.
(9) M. S. Fleck and S. R. Mitroff, “Rare Targets Are Rarely Missed in Correctable Search,” Psychol. Sci., vol. 18, no. 11, pp. 943–947, Nov. 2007.
(10) K. M. Ghylin, C. G. Drury, R. Batta, and L. Lin, “Temporal Effects in a Security Inspection Task: Breakdown of Performance Components,” Proc. Hum. Factors Ergon. Soc. Annu. Meet., vol. 51, no. 2, pp. 93–97, Oct. 2007.
(11) N. H. Mackworth, “The breakdown of vigilance durning prolonged visual search,” Q. J. Exp. Psychol., vol. 1, no. 1, pp. 6–21, Apr. 1948.
(12) M. Mendes, A. Schwaninger, N. Strebel, and S. Michel, “Why laptops should be screened separately when conventional x-ray screening is used,” in 2012 IEEE International Carnahan Conference on Security Technology (ICCST), 2012, pp. 267–273.
(13) P. Mehta and R. Smith-Bindman, “Airport full-body screening: what is the risk?,” Arch. Intern. Med., vol. 171, no. 12, pp. 1112–1115, Jun. 2011.
(14) S. Almazroui, W. Wang, and G. Zhang, “Microwave imaging using sub-space based TR-MUSIC method for security applications,” 2012.
(15) “http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2008:097:0072:0084:EN:PDF.” [Online]. Available: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2008:097:0072:0084:EN:PDF. [Accessed: 03-Aug-2014].
(16) T. Orouji, S. M. H. Pooya, M. Jafarizadeh, H. R. Khosravi, and H. R. Mohammad, “Doses to the scanned individual and to the operator from an X-ray body scanner system,” Radiat. Prot. Dosimetry, vol. 147, no. 1–2, pp. 227–229, Sep. 2011.
(17) D. A. Schauer, “Does Security Screening with Backscatter X-Rays Do More Good than Harm?,” Radiology, vol. 259, no. 1, pp. 12–16, Apr. 2011.
(18) A. Frimpong, “Introduction of full body image scanners at the airports: a delicate balance of protecting privacy and ensuring national security,” J. Transp. Secur., vol. 4, no. 3, pp. 221–229, Sep. 2011.
(19) F. Hofer and O. E. Wetter, “Operational and human factors issues of new airport security technology—two case studies,” J. Transp. Secur., vol. 5, no. 4, pp. 277–291, Dec. 2012.
(20) A. Bolfing, T. Halbherr, and A. Schwaninger, “How Image Based Factors and Human Factors Contribute to Threat Detection Performance in X-Ray Aviation Security Screening,” in HCI and Usability for Education and Work, A. Holzinger, Ed. Springer Berlin Heidelberg, 2008, pp. 419–
(21) A. Schwaninger, F. Hofer, and O. E. Wetter, “Adaptive computer-based training increases on the job performance of x-ray screeners,” in Security Technology, 2007 41st Annual IEEE International Carnahan Conference on, 2007, pp. 117–124.
(22) S. Michel, S. M. Koller, J. C. de Ruiter, R. Moerland, M. Hogervorst, and A. Schwaninger, “Computer-based training increases efficiency in X-ray image interpretation by aviation security screeners,” in Security Technology, 2007 41st Annual IEEE International Carnahan Conference
on, 2007, pp. 201–206.
(23) D. Hardmeier, F. Hofer, and A. Schwaninger, “The X-ray object recognition test (X-ray ORT) - a reliable and valid instrument for measuring visual abilities needed in X-ray screening,” in 39th Annual 2005 International Carnahan Conference on Security Technology, 2005. CCST ’05, 2005, pp. 189–192.
(24) A. Schwaninger, “Training of airport security screeners,” AIRPORT, vol. 2003, no. 5, pp. 11–13, 2003.
(25) S. M. Steiner-Koller, A. Bolfing, and A. Schwaninger, “Assessment of X-ray image interpretation competency of aviation security screeners,” in Security Technology, 2009. 43rd Annual 2009 International Carnahan Conference on, 2009, pp. 20–27.
(26) A. Schwaninger, “Increasing efficiency in airport security screening,” WIT Trans. Built Environ., vol. 82, pp. 407–416, 2005.
(27) O. E. Wetter, D. Hardmeier, and F. Hofer, “Covert testing at airports: Exploring methodology and results,” in 42nd Annual IEEE International Carnahan Conference on Security Technology, 2008. ICCST 2008, 2008, pp. 357–363.
(28) S. D. Warren and L. D. Brandeis, “Right to Privacy,” Harv. Law Rev., vol. 4, p. 193, 1891 1890.
(29) O. Mironenko, “Body scanners versus privacy and data protection,” Comput. Law Secur. Rev., vol. 27, no. 3, pp. 232–244, Jun. 2011.
(30) “The Universal Declaration of Human Rights.” [Online]. Available: http://www.un.org/en/documents/udhr/index.shtml#a13. [Accessed: 20-Mar-2014].
(31) C. Eze, “Africa: Now Showing at MMIA: Nude Images of Passengers,” This Day (Lagos), 21-Sep-2010.
(32) “Full body scanners to be installed at nine more airports,” Mail
Online. [Online]. Available: http://www.dailymail.co.uk/news/article-2512053/Full-body-scanners-installed-airports--passengers-FINALLY-allowed-opt-out.html. [Accessed: 20-Mar-2014].
(33) “TSA Pre✓TM Application Program,” Transportation Security Administration. [Online]. Available: /tsa-precheck/application-program. [Accessed: 21-Mar-2014].
(34) Q. Feng, H. Sahin, and K. C. Kapur, “Designing airport checked-baggage-screening strategies considering system capability and reliability,” Reliab. Eng. Syst. Saf., vol. 94, no. 2, pp. 618–627, Feb.
(35) L. A. McLay, S. H. Jacobson, and J. E. Kobza, “Integer programming models and analysis for a multilevel passenger screening problem,” IIE Trans., vol. 39, no. 1, pp. 73–81, 2007.
(36) A. J. Lee, L. A. McLay, and S. H. Jacobson, “Designing Aviation Security Passenger Screening Systems Using Nonlinear Control,” SIAM J. Control Optim., vol. 48, no. 4, pp. 2085–2105, Jan. 2009.
(37) L. A. McLay, A. J. Lee, and S. H. Jacobson, “Risk-Based Policies for Airport Security Checkpoint Screening,” Transp. Sci., vol. 44, no. 3, pp. 333–349, Jan. 2010.
(38) V. L. Lazar Babu, R. Batta, and L. Lin, “Passenger grouping under constant threat probability in an airport security system,” Eur. J. Oper. Res., vol. 168, no. 2, pp. 633–644, Jan. 2006.
(39) X. Nie, R. Batta, C. G. Drury, and L. Lin, “Passenger grouping with risk levels in an airport security system,” Eur. J. Oper. Res., vol. 194, no. 2, pp. 574–584, Apr. 2009.
(40) A. G. Nikolaev, S. H. Jacobson, and L. A. McLay, “A Sequential Stochastic Security System Design Problem for Aviation Security,” Transp. Sci., vol. 41, no. 2, pp. 182–194, May 2007.
(41) J. Filipiak, “Dynamic Routing in a Queueing System with a Multiple Service Facility,” Oper. Res., vol. 32, no. 5, pp. 1163–1180, Oct. 1984.
(42) F. P. Kelly and C. N. Laws, “Dynamic routing in open queueing networks: Brownian models, cut constraints and resource pooling,” Queueing Syst., vol. 13, no. 1–3, pp. 47–86, Mar. 1993.
(43) M. Jain, “Finite capacity M/M/r queueing system with queue-dependent servers,” Comput. Math. Appl., vol. 50, no. 1–2, pp. 187–199, Jul. 2005.
(44) P. R. Kumar and J. Walrand, “Individually Optimal Routing in Parallel Systems,” J. Appl. Probab., vol. 22, no. 4, p. 989, Dec. 1985.
(45) W. Winston, “Optimality of the Shortest Line Discipline,” J. Appl. Probab., vol. 14, no. 1, p. 181, Mar. 1977.
(46) J. M. Harrison and L. M. Wein, “Scheduling networks of queues: Heavy traffic analysis of a simple open network,” Queueing Syst., vol. 5, no. 4, pp. 265–279, Dec. 1989.
(47) B. L. Schwartz, “Queuing Models with Lane Selection: A New Class of Problems,” Oper. Res., vol. 22, no. 2, pp. 331–339, Apr. 1974.
(48) X. Nie, G. Parab, R. Batta, and L. Lin, “Simulation-based Selectee Lane queueing design for passenger checkpoint screening,” Eur. J. Oper. Res., vol. 219, no. 1, pp. 146–155, May 2012.
(49) A. J. Lee and S. H. Jacobson, “The impact of aviation checkpoint queues on optimizing security screening effectiveness,” Reliab. Eng. Syst. Saf., vol. 96, no. 8, pp. 900–911, Aug. 2011.
(50) International Commission on Non-Ionizing Radiation Protection, “ICNIRP statement on the ‘Guidelines for limiting exposure to time-varying electric, magnetic, and electromagnetic fields (up to 300 GHz),’” Health Phys., vol. 97, no. 3, pp. 257–258, Sep. 2009.
(51) “IEEE Standard for Safety Levels With Respect to Human Exposure to Radio Frequency Electromagnetic Fields, 3 kHz to 300 GHz,” IEEE Std C951-2005 Revis. IEEE Std C951-1991, pp. 0_1–238, 2006.
(52) O. E. Wetter, J. Wegge, K. Jonas, and K.-H. Schmidt, “Dual Goals for Speed and Accuracy on the Same Performance Task,” J. Pers. Psychol., vol. 11, no. 3, pp. 118–126, Jan. 2012.
(53) O. E. Wetter, H. Fuhrmann, M. Lipphardt, and F. Hofer, “Bringing adversaries together: The importance of a common management-level approach in complex work domains,” in 2011 IEEE International Carnahan Conference on Security Technology (ICCST), 2011, pp. 1–6.
(54) “Measuring and Improving Organizational Productivity: A Practical Guide - Robert D. Pritchard - Google Books.” [Online]. Available: http://books.google.co.uk/books/about/Measuring_and_Improving_Organizational_P.html?id=abIy-ewzrvMC&redir_esc=y. [Accessed: 05-Aug-2014].
(55) O. E. Wetter and M. Fuhrer, “A holistic approach for evaluating liquid explosive detection systems,” J. Transp. Secur., vol. 6, no. 4, pp. 377–388, Dec. 2013.
(56) “Transportation Security Administration,” Transportation Security
Administration. [Online]. Available: /. [Accessed: 28-Aug-2013].
(57) “Most fake bombs missed by screeners - USATODAY.com.” [Online]. Available: http://usatoday30.usatoday.com/news/nation/2007-10-17-airport-security_N.htm. [Accessed: 28-Aug-2013].
(58) N. G. Cutmore, Y. Liu, and J. R. Tickner, “Development and
commercialization of a fast-neutron/x-ray Cargo Scanner,” in 2010 IEEE International Conference on Technologies for Homeland Security (HST), 2010, pp. 330–336.
Authors wishing to include figures, tables, or text passages that have already been published elsewhere are required to obtain permission from the copyright owner(s) for both the print and online format and to include evidence that such permission has been granted when submitting their papers. Any material received without such evidence will be assumed to originate from the authors.
All authors of manuscripts accepted for publication in the journal Transactions on Networks and Communications are required to license the Scholar Publishing to publish the manuscript. Each author should sign one of the following forms, as appropriate:
License to publish; to be used by most authors. This grants the publisher a license of copyright. Download forms (MS Word formats) - (doc)
Publication agreement — Crown copyright; to be used by authors who are public servants in a Commonwealth country, such as Canada, U.K., Australia. Download forms (Adobe or MS Word formats) - (doc)
License to publish — U.S. official; to be used by authors who are officials of the U.S. government. Download forms (Adobe or MS Word formats) – (doc)
The preferred method to submit a completed, signed copyright form is to upload it within the task assigned to you in the Manuscript submission system, after the submission of your manuscript. Alternatively, you can submit it by email email@example.com