There’s always a requirement for faster, more accurate, and easier to implement threat identification systems for concealed electronics, to thwart terrorism and espionage attempts. Common electronic devices are used in the design of improvised explosive devices (IEDs) that target military and civilian populations alike, while concealed recording devices illegally capture proprietary and confidential data, compromising both governmental and industrial information resources. This research proposes a unique nonintrusive, repeatable, reliable and scalable D&I system for identifying threat devices by unintended radiated emissions (URE). Only a passive URE system, as opposed to active or hybrid systems, is appropriate for bomb detection or human interrogation, since potentially hazardous energy radiations are not emitted. Additionally, the proposed system is distinctive in its simplicity, allowing rapid implementation, and easy expandability. Finally, validation testing is provided to demonstrate the system’s reliability and repeatability.
URE is the electromagnetic emissions that active electronic equipment, such as radios and cellphones radiate. URE is analogous to a human fingerprint, since on a microscopic level, each and every URE signature is unique. However same-type electronic devices put out similar radiations and electronics of the same model have almost identical radio frequency signatures. URE signatures can change with device settings, such as a channel on a radio, or Airplane versus Clock mode on a cell phone. This uniqueness of URE data per device setting enables URE to be used to determine the mode of an operational electronic device. The characteristics of URE enable it to be used for explosive ordinance detection (EOD) and applications such as quality control in manufacturing, electronics troubleshooting,device identification for inventory, and detection of prohibited hidden electronics.
The proposed D&I process also addresses big data problems involved in capturing URE data and building a database of URE characteristics for identification. Issue interpretation is utilized with the URE data to distinguish between threat and non-threat electronic devices, using multiple criteria decision analysis (MCDA) and decision-making techniques to determine type, model and mode of the hidden devices. The outlined URE data handling methods and specified decision analysis techniques for URE data processing are further unique contributions of this research.
Optimization, verified by testing, is used to improve the speed and accuracy of the identification decision algorithm. The developed system is validated with URE data from 166 devices, which are representative of IED and espionage threats, but the system is extendable to all URE D&I applications, such as Quality Assurance, Inventory, and smart applications. Due to the immaturity of the URE D&I field and lack of documentation on the topic, the properties and potential of this more effective D&I system, compared to current methods, will be of interest to explosive ordnance disposal, security service, electronic system manufacturing, automated inventory, and mobile application development communities and potentially others as well.
|Advisor:||Holzer, Thomas H., Sarkani, Shahryar|
|Commitee:||Etemadi, Amir, Murphree, E. L., Rohde, David M.|
|School:||The George Washington University|
|School Location:||United States -- District of Columbia|
|Source:||DAI-B 79/08(E), Dissertation Abstracts International|
|Subjects:||Electrical engineering, Systems science, Computer science|
|Keywords:||Decision making, Multiple criteria decision analysis, Simple additive weighting, Systems engineering, Unintended electromagnetic emissions, Unintended radiated emissions|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be