WorldWideScience

Sample records for contraband detection system

  1. A new proof-of-principle contraband detection system

    International Nuclear Information System (INIS)

    Sredniawski, J.J.; Debiak, T.; Kamykowski, E.

    1995-12-01

    An accelerator-based technique is being developed to detect contraband materials in large containers. The source, which uses a low-energy proton beam to generate high-energy gamma rays, uses the gamma resonance absorption technique to detect nitrogen-14 and chlorine-35 in containers. Both these materials are commonly found in contraband drugs as well as in explosives. Through the use of segmented BGO detectors to detect the resonant gamma rays a quantity as low as ∼ 1 kg can be located with a considerable degree of confidence. Several stations at a port of entry can be operated with one accelerator, as described

  2. A new proof-of-principle contraband detection system

    Energy Technology Data Exchange (ETDEWEB)

    Sredniawski, J.J.; Debiak, T.; Kamykowski, E.; Rathke, J. [Northrop Grumman Corp., Bethpage, NY (United States). Advanced Technology and Development Center; Schmor, P.; Altman, A.; Rogers, J.; Boyd, J. [British Columbia Univ., Vancouver, BC (Canada). TRIUMF Facility; Brondo, J. [Scientific Innovations, Inc., East Hampton, NY (United States)

    1995-12-01

    A new concept for a CDS has been developed under a Phase I ARPA funded program; it uses gamma resonance absorption (GRA) to detect certain illegal drugs that may be transported in man-portable containers. A high detection probability for heroin and cocaine is possible with a device that is also searching for explosives. Elemental detection of both N and Cl is utilized, and with tomography, a 3D density image of the elements is generated. Total density image is also developed. These two together may be used with considerable confidence in determining if heroin or cocaine is present in the interrogated containers in a small quantity (1 kg). The CDS employs a high current ({ge}10 mA) DC accelerator that produces a beam of 1.75 or 1.89 MeV protons. These protons impact a target with coatings of {sup 13}C and {sup 34}S. Depending on the coating, the resultant resonant gamma rays are preferentially absorbed in either {sup 14}N or {sup 35}Cl. The resonant gammas come off the target in a conical fan at 80.7{degree} for N and 82{degree} for Cl; a common array of segmented BGO detectors is used over an arc of 53{degree} to provide input to an imaging subsystem. The tomography makes use of rotation and vertical translation of a baggage carousel holding typically 18 average sized bags for batch processing of the contents. The single proton accelerator and target can supply multiple detection stations with the appropriate gammas, a feature that may lead to very high throughput potential approaching 2000 bags/hr. Each detection station can operate somewhat independently from the others. This paper presents the overall requirements, design, operating principles, and characteristics of the CDS proof-of-principle device developed in the Phase I program.

  3. Far-infrared contraband-detection-system development for personnel-search applications

    International Nuclear Information System (INIS)

    Schellenbaum, R.L.

    1982-09-01

    Experiments have been conducted toward the development of an active near-millimeter-wave, far infrared, personnel search system for the detection of contraband. These experiments employed a microwave hybrid tee interferometer/radiometer scanning system and quasi-optical techniques at 3.3-mm wavelength to illuminate and detect the reflection from target objects against a human body background. Clothing and other common concealing materials are transport at this wavelength. Retroreflector arrays, in conjunction with a Gunn diode radiation source, were investigated to provide all-angle illumination and detection of specular reflections from unaligned and irregular-shaped objects. Results indicate that, under highly controlled search conditions, metal objects greater than or equal to 25 cm 2 can be detected in an enclosure lined with retroreflectors. Further development is required to produce a practical personnel search system. The investigation and feasibility of alternate far infrared search techniques are presented. 23 figures, 2 tables

  4. A contraband detection system proof-of-principle device using electrostatic acceleration

    International Nuclear Information System (INIS)

    Sredniawski, Joseph J.; Debiak, T.W.; Kamykowski, E.; Rathke, J.; Milton, B.; Rogers, J.; Schmor, P.; Stanford, G.; Brando, J.

    1996-01-01

    A new Contraband Detection System (CDS) Proof-of- Principle (POP) device is nearing completion at Northrop Grumman's Advanced Technology and Development Center. We employ gamma resonance absorption (GRA) to detect nitrogen or chlorine in explosives and certain forms of illegal drugs. Using tomography, 3-D images of the total density and selected element density are generated. These characteristics together may be utilized with considerable confidence in determining if contraband is present in baggage or cargo. The CDS employs a high current (10 mA) DC electrostatic accelerator that provides a beam of protons at either 1.75 or 1.89 MeV. These high energy particles impinge upon a target coated with 13 C or 34 S. The resultant resonant gamma rays are preferentially absorbed in either 14 N or 35 Cl. Because of the penetrating power of the gamma rays, this approach can be utilized for inspection of fully loaded aircraft containers such as the LD3. Our current program calls for testing of the POP CDS by late 1996. This paper presents the overall design and characteristics of the CDS POP. (author)

  5. Physics-based, Bayesian sequential detection method and system for radioactive contraband

    Science.gov (United States)

    Candy, James V; Axelrod, Michael C; Breitfeller, Eric F; Chambers, David H; Guidry, Brian L; Manatt, Douglas R; Meyer, Alan W; Sale, Kenneth E

    2014-03-18

    A distributed sequential method and system for detecting and identifying radioactive contraband from highly uncertain (noisy) low-count, radionuclide measurements, i.e. an event mode sequence (EMS), using a statistical approach based on Bayesian inference and physics-model-based signal processing based on the representation of a radionuclide as a monoenergetic decomposition of monoenergetic sources. For a given photon event of the EMS, the appropriate monoenergy processing channel is determined using a confidence interval condition-based discriminator for the energy amplitude and interarrival time and parameter estimates are used to update a measured probability density function estimate for a target radionuclide. A sequential likelihood ratio test is then used to determine one of two threshold conditions signifying that the EMS is either identified as the target radionuclide or not, and if not, then repeating the process for the next sequential photon event of the EMS until one of the two threshold conditions is satisfied.

  6. Safeguards applications of far infrared radiometric techniques for the detection of contraband

    Energy Technology Data Exchange (ETDEWEB)

    Hodges, D.T.; Reber, E.E.; Foote, F.B.; Schellenbaum, R.L.

    1980-02-01

    A new safeguards system under development employs radiometers in the 100 to 300 GHz spectral band to detect contraband, including shielding materials (used to attenuate the gamma ray emissions from nuclear materials), weapons, or explosives covertly concealed on personnel. Clothing is highly transparent at these frequencies and imaging techniques can detect contraband by its emissivity and reflectivity differences relative to human tissues. Experimental data are presented and sample images are used as a basis to discuss system advantages and limitations.

  7. Accelerator based techniques for contraband detection

    Science.gov (United States)

    Vourvopoulos, George

    1994-05-01

    It has been shown that narcotics, explosives, and other contraband materials, contain various chemical elements such as H, C, N, O, P, S, and Cl in quantities and ratios that differentiate them from each other and from other innocuous substances. Neutrons and γ-rays have the ability to penetrate through various materials at large depths. They are thus able, in a non-intrusive way, to interrogate volumes ranging from suitcases to Sea-Land containers, and have the ability to image the object with an appreciable degree of reliability. Neutron induced reactions such as (n, γ), (n, n') (n, p) or proton induced γ-resonance absorption are some of the reactions currently investigated for the identification of the chemical elements mentioned above. Various DC and pulsed techniques are discussed and their advantages, characteristics, and current progress are shown. Areas where use of these methods is currently under evaluation are detection of hidden explosives, illicit drug interdiction, chemical war agents identification, nuclear waste assay, nuclear weapons destruction and others.

  8. Design and Construction of a First Prototype Muon Tomography System with GEM Detectors for the Detection of Nuclear Contraband

    CERN Document Server

    AUTHOR|(CDS)2074269; Grasso, L; Locke, J B; Quintero, A; Mitra, D

    2009-01-01

    Current radiation portal monitors at sea ports and international borders that employ standard radiation detection techniques are not very sensitive to nuclear contraband that is well shielded to absorb emanating radiation. Muon Tomography (MT) based on the measurement of multiple scattering of atmospheric cosmic ray muons traversing cargo or vehicles that contain high-Z material is a promising passive interrogation technique for solving this problem. We report on the design and construction of compact Micro-Pattern Gas Detectors for a small prototype MT station. This station will employ 10 tracking stations based on 30cm x 30cm low-mass triple-GEM detectors with 2D readout. Due to the excellent spatial resolution of GEMs it is sufficient to use a gap of only a few cm between tracking stations. Together with the compact size of the GEM detectors this allows the GEM MT station to be an order of magnitude more compact than MT stations using traditional drift tubes. We present details of the production and assemb...

  9. Liquid-Xe detector for contraband detection

    International Nuclear Information System (INIS)

    Vartsky, D.; Israelashvili, I.; Cortesi, M.; Arazi, L.; Coimbra, A.E.; Moleri, L.; Erdal, E.; Bar, D.; Rappaport, M.; Shchemelinin, S.; Caspi, E.N.; Aviv, O.; Breskin, A.

    2016-01-01

    We describe progress made with a liquid-Xe (LXe) detector coupled to a gaseous photomultiplier (GPM), for combined imaging and spectroscopy of fast neutrons and gamma-rays in the MeV range. The purpose of this detector is to enable the detection of hidden explosives and fissile materials in cargo and containers. The expected position resolution is about 2 m and 3.5 mm for fast neutrons and gamma-rays, respectively. Experimental results obtained using an 241 Am source yielded energy and time resolutions of 11% and 1.2 ns RMS, respectively. Initial results obtained with the position-sensitive GPM are presented.

  10. Liquid-Xe detector for contraband detection

    Energy Technology Data Exchange (ETDEWEB)

    Vartsky, D., E-mail: david.vartsky@weizmann.ac.il [Weizmann Institute of Science, Rehovot 76100 (Israel); Israelashvili, I. [Weizmann Institute of Science, Rehovot 76100 (Israel); Nuclear Research Center of Negev (NRCN), Beer-Sheva 9001 (Israel); Cortesi, M. [National Superconducting Cyclotron Laboratory, East Lansing 48823, MI (United States); Arazi, L.; Coimbra, A.E.; Moleri, L.; Erdal, E.; Bar, D.; Rappaport, M.; Shchemelinin, S. [Weizmann Institute of Science, Rehovot 76100 (Israel); Caspi, E.N. [Nuclear Research Center of Negev (NRCN), Beer-Sheva 9001 (Israel); Aviv, O. [Soreq NRC, Yavne 81800 (Israel); Breskin, A. [Weizmann Institute of Science, Rehovot 76100 (Israel)

    2016-07-11

    We describe progress made with a liquid-Xe (LXe) detector coupled to a gaseous photomultiplier (GPM), for combined imaging and spectroscopy of fast neutrons and gamma-rays in the MeV range. The purpose of this detector is to enable the detection of hidden explosives and fissile materials in cargo and containers. The expected position resolution is about 2 m and 3.5 mm for fast neutrons and gamma-rays, respectively. Experimental results obtained using an {sup 241}Am source yielded energy and time resolutions of 11% and 1.2 ns RMS, respectively. Initial results obtained with the position-sensitive GPM are presented.

  11. Summary tables of six commercially available entry control and contraband detection technologies

    International Nuclear Information System (INIS)

    Hunter, John Anthony

    2005-01-01

    Existing contraband detection and entry control devices such as metal detectors, X-ray machines, and radiation monitors were investigated for their capability to operate in an automated environment. In addition, a limited number of new devices for detection of explosives, chemicals, and biological agents were investigated for their feasibility for inclusion in future physical security systems. The tables in this document resulted from this investigation, which was part of a conceptual design upgrade for the United States Mints. This summary of commercially available technologies was written to provide a reference for physical security upgrades at other sites

  12. Synergy or dichotomy: vapor and particle sampling in the detection of contraband

    Science.gov (United States)

    Davidson, William R.; Stott, William R.; Sleeman, Richard; Akery, Alan K.

    1994-03-01

    Chemical detection techniques for explosive and illicit drug identification were originally directed towards the detection of vapors, with research groups aiming toward the specific target of creating a mechanical dog. With the advent of the mass spectrometry based contraband detection systems, exemplified by the CONDORTM which relies on both the detection of vapors and particles, research groups and instrument manufacturers changed direction and began to develop techniques mainly oriented toward the detection of trace particles. The major advantage to the use of trace particulate residues in the detection of hazardous material is that the actual substance can be identified in nearly all cases. On the other hand, as is discussed in detail in later sections of this document, sampling of complex items can be difficult. Both vapor and particulate sampling can be invaluable in the detection of hazardous materials. In many instances the techniques offer complementary information, and results obtained via one route may lead to the use of the alternative method (for example, the vapor detection of taggants as a screening technique followed by particulate analysis for the actual target). The concepts discussed in the remainder of this paper focus on the use of tandem mass spectrometry as an analytical device in the detection of contraband materials.

  13. Trace Contraband Detection Field-Test by the South Texas Specialized Crimes and Narcotics Task Force

    Energy Technology Data Exchange (ETDEWEB)

    Hannum, David W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Contraband Detection Dept.; Shannon, Gary W. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States). Contraband Detection Dept.

    2006-04-01

    This report describes the collaboration between the South Texas Specialized Crimes and Narcotics Task Force (STSCNTF) and Sandia National Laboratories (SNL) in a field test that provided prototype hand-held trace detection technology for use in counter-drug operations. The National Institute of Justice (NIJ)/National Law Enforcement and Corrections Technology Center (NLECTC)/Border Research and Technology Center (BRTC) was contacted by STSCNTF for assistance in obtaining cutting-edge technology. The BRTC created a pilot project for Sandia National Laboratories (SNL) and the STSCNTF for the use of SNL’s Hound, a hand-held sample collection and preconcentration system that, when combined with a commercial chemical detector, can be used for the trace detection of illicit drugs and explosives. The STSCNTF operates in an area of high narcotics trafficking where methods of concealment make the detection of narcotics challenging. Sandia National Laboratories’ (SNL) Contraband Detection Department personnel provided the Hound system hardware and operational training. The Hound system combines the GE VaporTracer2, a hand-held commercial chemical detector, with an SNL-developed sample collection and preconcentration system. The South Texas Task force reported a variety of successes, including identification of a major shipment of methamphetamines, the discovery of hidden compartments in vehicles that contained illegal drugs and currency used in drug deals, and the identification of a suspect in a nightclub shooting. The main advantage of the hand-held trace detection unit is its ability to quickly identify the type of chemical (drugs or explosives) without a long lag time for laboratory analysis, which is the most common analysis method for current law enforcement procedures.

  14. Associated-particle sealed-tube neutron probe: Detection of explosives, contraband, and nuclear materials

    International Nuclear Information System (INIS)

    Rhodes, E.; Dickerman, C.E.

    1996-01-01

    Continued research and development of the APSTNG shows the potential for practical field use of this technology for detection of explosives, contraband, and nuclear materials. The APSTNG (associated-particle sealed-tube generator) inspects the item to be examined using penetrating 14-MeV neutrons generated by the deuterium-tritium reaction inside a compact accelerator tube. An alpha detector built into the sealed tube detects the alpha-particle associated with each neutron emitted in a cone encompassing the volume to be inspected. Penetrating high-energy gamma-rays from the resulting neutron reactions identify specific nuclides inside the volume. Flight-times determined from the detection times of gamma-rays and alpha-particles separate the prompt and delayed gamma-ray spectra and allow a coarse 3-D image to be obtained of nuclides identified in the prompt spectrum. The generator and detectors can be on the same side of the inspected object, on opposite sides, or with intermediate orientations. Thus, spaces behind walls and other confined regions can be inspected. Signals from container walls can be discriminated against using the flight-time technique. No collimators or shielding are required, the neutron generator is relatively small, and commercial-grade electronics are employed. The use of 14-MeV neutrons yields a much higher cross-section for detecting nitrogen than that for systems based on thermal-neutron reactions alone, and the broad range of elements with significant 14-MeV neutron cross-sections extends explosives detection to other elements including low-nitrogen compounds, and allows detection of many other substances. Proof-of-concept experiments have been successfully performed for conventional explosives, chemical warfare agents, cocaine, and fissionable materials

  15. Catalog of physical protection equipment. Book 2: Volume V. Contraband detection components

    International Nuclear Information System (INIS)

    Haberman, W.

    1977-06-01

    A catalog of commercially available physical protection equipment has been prepared for use by the U.S. Nuclear Regulatory Commission (NRC). Included is information on barrier structures and equipment, interior and exterior intrusion detection sensors, entry (access) control devices, surveillance and alarm assessment equipment, contraband detection sensors, automated response equipment, general purpose displays and general purpose communications, with one volume devoted to each of these eight areas. For each item of equipment the information included consists of performance, physical, cost and supply/logistics data. The entire catalog is contained in three notebooks for ease in its use by licensing and inspection staff at NRC

  16. Vapor detection of trafficking of contraband money: A discussion of technical feasibility

    Energy Technology Data Exchange (ETDEWEB)

    Dietz, R.N.

    1996-02-01

    For every two pounds of cocaine smuggled into the US, drug traffikers are being forced to clandestinely ship three pounds of money back out for subsequent laundering. Based on tracer technology developed for validation of long-range atmospheric transport models and other commercial applications, it is shown that US currency can be tagged with a minute amount (about 1 ppm by weight of a bill) of perfluorocharbon tracer (PFT) material that is sufficient to last for about 30 years and yet provide a vapor emission rate suitable for detectability of modest caches of contraband money in vehicles at border crossings, on aircraft at international terminals, and in buildings. The cost of tagging is less than $5 per million bills; the taggant quantity should have no impact on the feel of a bill. The low emission rate would not allow detectability of usual amounts of money in typical scenarios, providing an essential degree of privacy, but extraordinary amounts would be detectable using specialized instrumentation and know-how not easily attainable but commercially in production; an example of sub-part-per-quadrillion detection of a proposed PFT taggant is demonstrated using a prototype commercial unit. An outline of a research and demonstration program to achieve this capability and details of the proposed tagging and detection procedures already indicate that the concept is technically feasible.

  17. Fast neutron radiography scanner for the detection of contraband in air cargo containers

    International Nuclear Information System (INIS)

    Eberhardt, J.E.; Rainey, S.; Stevens, R.J.; Sowerby, B.D.; Tickner, J.R.

    2005-01-01

    There is a growing need to rapidly scan bulk air cargo for contraband such as illicit drugs and explosives. The Commonwealth Science and Industrial Research Organisation (CSIRO) have been working with Australian Customs Service to develop a scanner capable of directly scanning airfreight containers in 1-2 minutes without unpacking. The scanner combines fast neutron and gamma-ray radiography to provide high-resolution images that include information on material composition. A full-scale prototype scanner has been successfully tested in the laboratory and a commercial-scale scanner is due to be installed at Brisbane airport in 2005

  18. Particle Fabrication Using Inkjet Printing onto Hydrophobic Surfaces for Optimization and Calibration of Trace Contraband Detection Sensors

    Directory of Open Access Journals (Sweden)

    Greg Gillen

    2015-11-01

    Full Text Available A method has been developed to fabricate patterned arrays of micrometer-sized monodisperse solid particles of ammonium nitrate on hydrophobic silicon surfaces using inkjet printing. The method relies on dispensing one or more microdrops of a concentrated aqueous ammonium nitrate solution from a drop-on-demand (DOD inkjet printer at specific locations on a silicon substrate rendered hydrophobic by a perfluorodecytrichlorosilane monolayer coating. The deposited liquid droplets form into the shape of a spherical shaped cap; during the evaporation process, a deposited liquid droplet maintains this geometry until it forms a solid micrometer sized particle. Arrays of solid particles are obtained by sequential translation of the printer stage. The use of DOD inkjet printing for fabrication of discrete particle arrays allows for precise control of particle characteristics (mass, diameter and height, as well as the particle number and spatial distribution on the substrate. The final mass of an individual particle is precisely determined by using gravimetric measurement of the average mass of solution ejected per microdrop. The primary application of this method is fabrication of test materials for the evaluation of spatially-resolved optical and mass spectrometry based sensors used for detecting particle residues of contraband materials, such as explosives or narcotics.

  19. Tracking Contraband Files Transmitted Using Bittorrent

    Science.gov (United States)

    Schrader, Karl; Mullins, Barry; Peterson, Gilbert; Mills, Robert

    This paper describes a digital forensic tool that uses an FPGA-based embedded software application to identify and track contraband digital files shared using the BitTorrent protocol. The system inspects each packet on a network for a BitTorrent Handshake message, extracts the “info hash” of the file being shared, compares the hash against a list of known contraband files and, in the event of a match, adds the message to a log file for forensic analysis. Experiments demonstrate that the system is able to successfully capture and process BitTorrent Handshake messages with a probability of at least 99.0% under a network traffic load of 89.6 Mbps on a 100 Mbps network.

  20. Using contraband simulators for portal metal detector testing

    Energy Technology Data Exchange (ETDEWEB)

    Murray, D.W.

    1992-08-01

    Because contraband materials or items are either too dangerous or too expensive, contraband simulators have been widely used to test contraband detection equipment. Very realistic bomb simulators have been used to test x-ray scanners, and common radioactive sources have been used successfully to test the operation of special nuclear material (SNM) radiation detectors. The simulators used to test early metal detectors were also reasonably successful; however, these simulators were rapidly outdated by the introduction of modern active field metal detectors. This paper describes some of the earlier attempts to develop metal detector test simulators. A successful highly enriched uranium (HEU) simulator for metal detector testing is described that has duplicated all the characteristics modern equipment is capable of detecting. The paper also describes the development needed to produce handgun simulators that could be used effectively for metal detector performance testing.

  1. Using contraband simulators for portal metal detector testing

    Energy Technology Data Exchange (ETDEWEB)

    Murray, D.W.

    1992-01-01

    Because contraband materials or items are either too dangerous or too expensive, contraband simulators have been widely used to test contraband detection equipment. Very realistic bomb simulators have been used to test x-ray scanners, and common radioactive sources have been used successfully to test the operation of special nuclear material (SNM) radiation detectors. The simulators used to test early metal detectors were also reasonably successful; however, these simulators were rapidly outdated by the introduction of modern active field metal detectors. This paper describes some of the earlier attempts to develop metal detector test simulators. A successful highly enriched uranium (HEU) simulator for metal detector testing is described that has duplicated all the characteristics modern equipment is capable of detecting. The paper also describes the development needed to produce handgun simulators that could be used effectively for metal detector performance testing.

  2. 78 FR 76860 - Contraband Screening for Criminal Justice Applications

    Science.gov (United States)

    2013-12-19

    ... (in particular, correctional facilities) to improve the safety and security of staff, visitors, [[Page... include, at minimum, the following categories of information for each contraband screening system/device: 1. Model Number and Name of the screening system/device. 2. Technology used by the system/device for...

  3. Use of Ground Penetrating Radar for Locating Contraband Aboard Ocean Going Vessels: Feasibility Study

    National Research Council Canada - National Science Library

    Llopis, Jose

    2001-01-01

    Ground Penetrating Radar (GPR) surveys were conducted over various stockpiled materials at the Alabama state Docks located in Mobile, AL, to determine whether GPR is a viable method for rapidly detecting contraband materials...

  4. 28 CFR 553.12 - Contraband.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Contraband. 553.12 Section 553.12 Judicial Administration BUREAU OF PRISONS, DEPARTMENT OF JUSTICE INSTITUTIONAL MANAGEMENT INMATE PROPERTY... designated area; food items which are spoiled or retained beyond the point of safe consumption; government...

  5. Managed access technology to combat contraband cell phones in prison: Findings from a process evaluation.

    Science.gov (United States)

    Grommon, Eric

    2018-02-01

    Cell phones in correctional facilities have emerged as one of the most pervasive forms of modern contraband. This issue has been identified as a top priority for many correctional administrators in the United States. Managed access, a technology that utilizes cellular signals to capture transmissions from contraband phones, has received notable attention as a promising tool to combat this problem. However, this technology has received little evaluative attention. The present study offers a foundational process evaluation and draws upon output measures and stakeholder interviews to identify salient operational challenges and subsequent lessons learned about implementing and maintaining a managed access system. Findings suggest that while managed access captures large volumes of contraband cellular transmissions, the technology requires significant implementation planning, personnel support, and complex partnerships with commercial cellular carriers. Lessons learned provide guidance for practitioners to navigate these challenges and for scholars to improve future evaluations of managed access. Copyright © 2017 Elsevier Ltd. All rights reserved.

  6. Maritime security report. April 1997 [Maritime smuggling of drugs and contraband goods through Haiti adversely impacting legitimate commerce and development; Partnering : a key to growing challenges confronting maritime security

    Science.gov (United States)

    1997-04-01

    Haiti is a significant transshipment conduit for South American cocaine destined for the United States. This smuggling is facilitated by Haitis system of seaports which remain largely unmonitored. Smuggling and trafficking contraband merchandise aver...

  7. Automated entry control system for nuclear facilities

    International Nuclear Information System (INIS)

    Ream, W.K.; Espinoza, J.

    1985-01-01

    An entry control system to automatically control access to nuclear facilities is described. The design uses a centrally located console, integrated into the regular security system, to monitor the computer-controlled passage into and out of sensitive areas. Four types of entry control points are used: an unmanned enclosed portal with metal and SNM detectors for contraband detection with positive personnel identification, a bypass portal for contraband search after a contraband alarm in a regular portal also with positive personnel identification, a single door entry point with positive personnel identification, and a single door entry point with only a magnetic card-type identification. Security force action is required only as a response to an alarm. The integration of the entry control function into the security system computer is also described. The interface between the entry control system and the monitoring security personnel utilizing a color graphics display with touch screen input is emphasized. 2 refs., 7 figs

  8. An automated entry control system for nuclear facilities

    International Nuclear Information System (INIS)

    Ream, W.K.; Espinoza, J.

    1985-01-01

    An entry control system to automatically control access to nuclear facilities is described. The design uses a centrally located console, integrated into the regular security system, to monitor the computer-controlled passage into and out of sensitive areas. Four types of entry control points are used: an unmanned enclosed portal with metal and SNM detectors for contraband detection with positive personnel identification, a bypass portal for contraband search after a contraband alarm in a regular portal also with positive personnel identification, a single door entry point with positive personnel identification, and a single door entry point with only a magnetic card-type identification. Security force action is required only as a response to an alarm. The integration of the entry control function into the security system computer is also described. The interface between the entry control system and the monitoring security personnel utilizing a color graphics display with touch screen input is emphasized

  9. SQL injection detection system

    OpenAIRE

    Vargonas, Vytautas

    2017-01-01

    SQL injection detection system Programmers do not always ensure security of developed systems. That is why it is important to look for solutions outside being reliant on developers. In this work SQL injection detection system is proposed. The system analyzes HTTP request parameters and detects intrusions. It is based on unsupervised machine learning. Trained by regular request data system detects outlier user parameters. Since training is not reliant on previous knowledge of SQL injections, t...

  10. Portable modular detection system

    Energy Technology Data Exchange (ETDEWEB)

    Brennan, James S [Rodeo, CA; Singh, Anup [Danville, CA; Throckmorton, Daniel J [Tracy, CA; Stamps, James F [Livermore, CA

    2009-10-13

    Disclosed herein are portable and modular detection devices and systems for detecting electromagnetic radiation, such as fluorescence, from an analyte which comprises at least one optical element removably attached to at least one alignment rail. Also disclosed are modular detection devices and systems having an integrated lock-in amplifier and spatial filter and assay methods using the portable and modular detection devices.

  11. Intrusion detection system elements

    International Nuclear Information System (INIS)

    Eaton, M.J.; Mangan, D.L.

    1980-09-01

    This report highlights elements required for an intrusion detection system and discusses problems which can be encountered in attempting to make the elements effective. Topics discussed include: sensors, both for exterior detection and interior detection; alarm assessment systems, with the discussion focused on video assessment; and alarm reporting systems, including alarm communication systems and dislay/console considerations. Guidance on careful planning and design of a new or to-be-improved system is presented

  12. Cigarette packaging: Youth perceptions of "natural" cigarettes, filter references, and contraband tobacco.

    Science.gov (United States)

    Czoli, Christine D; Hammond, David

    2014-01-01

    The current study examined youth perceptions of appeal and harm of cigarette packaging with "natural" tobacco descriptors and references to filtration, as well as contraband tobacco in generic packaging. In a between-group experiment, 7,647 youth were randomized to view a pair of cigarette packages and rate perceptions of appeal and relative risk. The findings indicate that packages with "natural" descriptors were rated as significantly more appealing and less harmful. Packages with filter references were rated as significantly less harmful, whereas contraband cigarettes were rated as significantly less appealing than leading brands. The findings suggest that cigarette packaging can enhance the appeal of cigarettes and may promote false beliefs about the reduced harm of brands. The lower appeal of contraband cigarettes suggests that other factors, such as reduced price and ease of access, likely account for contraband use among youth. Copyright © 2014 Society for Adolescent Health and Medicine. Published by Elsevier Inc. All rights reserved.

  13. Interior intrusion detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Rodriguez, J.R.; Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States)); Dry, B. (BE, Inc., Barnwell, SC (United States))

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs.

  14. Interior intrusion detection systems

    International Nuclear Information System (INIS)

    Rodriguez, J.R.; Matter, J.C.; Dry, B.

    1991-10-01

    The purpose of this NUREG is to present technical information that should be useful to NRC licensees in designing interior intrusion detection systems. Interior intrusion sensors are discussed according to their primary application: boundary-penetration detection, volumetric detection, and point protection. Information necessary for implementation of an effective interior intrusion detection system is presented, including principles of operation, performance characteristics and guidelines for design, procurement, installation, testing, and maintenance. A glossary of sensor data terms is included. 36 figs., 6 tabs

  15. Semiconductor radiation detection systems

    CERN Document Server

    2010-01-01

    Covers research in semiconductor detector and integrated circuit design in the context of medical imaging using ionizing radiation. This book explores other applications of semiconductor radiation detection systems in security applications such as luggage scanning, dirty bomb detection and border control.

  16. Underwater laser detection system

    Science.gov (United States)

    Gomaa, Walid; El-Sherif, Ashraf F.; El-Sharkawy, Yasser H.

    2015-02-01

    The conventional method used to detect an underwater target is by sending and receiving some form of acoustic energy. But the acoustic systems have limitations in the range resolution and accuracy; while, the potential benefits of a laserbased underwater target detection include high directionality, high response, and high range accuracy. Lasers operating in the blue-green region of the light spectrum(420 : 570nm)have a several applications in the area of detection and ranging of submersible targets due to minimum attenuation through water ( less than 0.1 m-1) and maximum laser reflection from estimated target (like mines or submarines) to provide a long range of detection. In this paper laser attenuation in water was measured experimentally by new simple method by using high resolution spectrometer. The laser echoes from different targets (metal, plastic, wood, and rubber) were detected using high resolution CCD camera; the position of detection camera was optimized to provide a high reflection laser from target and low backscattering noise from the water medium, digital image processing techniques were applied to detect and discriminate the echoes from the metal target and subtract the echoes from other objects. Extraction the image of target from the scattering noise is done by background subtraction and edge detection techniques. As a conclusion, we present a high response laser imaging system to detect and discriminate small size, like-mine underwater targets.

  17. Solar system fault detection

    Science.gov (United States)

    Farrington, R.B.; Pruett, J.C. Jr.

    1984-05-14

    A fault detecting apparatus and method are provided for use with an active solar system. The apparatus provides an indication as to whether one or more predetermined faults have occurred in the solar system. The apparatus includes a plurality of sensors, each sensor being used in determining whether a predetermined condition is present. The outputs of the sensors are combined in a pre-established manner in accordance with the kind of predetermined faults to be detected. Indicators communicate with the outputs generated by combining the sensor outputs to give the user of the solar system and the apparatus an indication as to whether a predetermined fault has occurred. Upon detection and indication of any predetermined fault, the user can take appropriate corrective action so that the overall reliability and efficiency of the active solar system are increased.

  18. Pressure detection system

    International Nuclear Information System (INIS)

    Lawford, V.N.; Long, C.E.

    1975-01-01

    The pressure detection system described comprises a first bellows assembly that can be connected to a source of fluid under pressure, a pressure detection apparatus, a second bellows assembly connected to the first assembly and pipes with a coupling device connecting the second bellows assembly to the apparatus. The first and second assemblies can only be disconnected with difficulty from the source or not at all [fr

  19. Proximity detection system underground

    Energy Technology Data Exchange (ETDEWEB)

    Denis Kent [Mine Site Technologies (Australia)

    2008-04-15

    Mine Site Technologies (MST) with the support ACARP and Xstrata Coal NSW, as well as assistance from Centennial Coal, has developed a Proximity Detection System to proof of concept stage as per plan. The basic aim of the project was to develop a system to reduce the risk of the people coming into contact with vehicles in an uncontrolled manner (i.e. being 'run over'). The potential to extend the developed technology into other areas, such as controls for vehicle-vehicle collisions and restricting access of vehicle or people into certain zones (e.g. non FLP vehicles into Hazardous Zones/ERZ) was also assessed. The project leveraged off MST's existing Intellectual Property and experience gained with our ImPact TRACKER tagging technology, allowing the development to be fast tracked. The basic concept developed uses active RFID Tags worn by miners underground to be detected by vehicle mounted Readers. These Readers in turn provide outputs that can be used to alert a driver (e.g. by light and/or audible alarm) that a person (Tag) approaching within their vicinity. The prototype/test kit developed proved the concept and technology, the four main components being: Active RFID Tags to send out signals for detection by vehicle mounted receivers; Receiver electronics to detect RFID Tags approaching within the vicinity of the unit to create a long range detection system (60 m to 120 m); A transmitting/exciter device to enable inner detection zone (within 5 m to 20 m); and A software/hardware device to process & log incoming Tags reads and create certain outputs. Tests undertaken in the laboratory and at a number of mine sites, confirmed the technology path taken could form the basis of a reliable Proximity Detection/Alert System.

  20. Water system virus detection

    Science.gov (United States)

    Fraser, A. S.; Wells, A. F.; Tenoso, H. J.

    1975-01-01

    A monitoring system developed to test the capability of a water recovery system to reject the passage of viruses into the recovered water is described. A nonpathogenic marker virus, bacteriophage F2, is fed into the process stream before the recovery unit and the reclaimed water is assayed for its presence. Detection of the marker virus consists of two major components, concentration and isolation of the marker virus, and detection of the marker virus. The concentration system involves adsorption of virus to cellulose acetate filters in the presence of trivalent cations and low pH with subsequent desorption of the virus using volumes of high pH buffer. The detection of the virus is performed by a passive immune agglutination test utilizing specially prepared polystyrene particles. An engineering preliminary design was performed as a parallel effort to the laboratory development of the marker virus test system. Engineering schematics and drawings of a fully functional laboratory prototype capable of zero-G operation are presented. The instrument consists of reagent pump/metering system, reagent storage containers, a filter concentrator, an incubation/detector system, and an electronic readout and control system.

  1. Gas detection system

    International Nuclear Information System (INIS)

    Allan, C.J.; Bayly, J.G.

    1975-01-01

    The gas detection system provides for the effective detection of gas leaks over a large area. It includes a laser which has a laser line corresponding to an absorption line of the gas to be detected. A He-Xe laser scans a number of retroreflectors which are strategically located around a D 2 O plant to detect H 2 S leaks. The reflected beam is focused by a telescope, filtered, and passed into an infrared detector. The laser may be made to emit two frequencies, one of which corresponds with an H 2 S absorption line; or it may be modulated on and off the H 2 S absorption line. The relative amplitude of the absorbed light will be a measure of the H 2 S present

  2. Remote detection system

    International Nuclear Information System (INIS)

    Nixon, K.V.; France, S.W.; Garcia, C.; Hastings, R.D.

    1981-05-01

    A newly designed remote detection system has been developed at Los Alamos that allows the collection of high-resolution gamma-ray spectra and neutron data from a remote location. The system consists of the remote unit and a command unit. The remote unit collects data in a potentially hostile environment while the operator controls the unit by either radio or wire link from a safe position. Both units are battery powered and are housed in metal carrying cases

  3. Moving Sources Detection System

    International Nuclear Information System (INIS)

    Coulon, Romain; Kondrasovs, Vladimir; Boudergui, Karim; Normand, Stephane

    2013-06-01

    To monitor radioactivity passing through a pipe or in a given container such as a train or a truck, radiation detection systems are commonly employed. These detectors could be used in a network set along the source track to increase the overall detection efficiency. However detection methods are based on counting statistics analysis. The method usually implemented consists in trigging an alarm when an individual signal rises over a threshold initially estimated in regards to the natural background signal. The detection efficiency is then proportional to the number of detectors in use, due to the fact that each sensor is taken as a standalone sensor. A new approach is presented in this paper taking into account the temporal periodicity of the signals taken by all distributed sensors as a whole. This detection method is not based only on counting statistics but also on the temporal series analysis aspect. Therefore, a specific algorithm is then developed in our lab for this kind of applications and shows a significant improvement, especially in terms of detection efficiency and false alarms reduction. We also plan on extracting information from the source vector. This paper presents the theoretical approach and some preliminary results obtain in our laboratory. (authors)

  4. SIP threats detection system

    OpenAIRE

    Vozňák, Miroslav; Řezáč, Filip

    2010-01-01

    The paper deals with detection of threats in IP telephony, the authors developed a penetration testing system that is able to check up the level of protection from security threats in IP telephony. The SIP server is a key komponent of VoIP infrastructure and often becomes the aim of attacks and providers have to ensure the appropriate level of security. We have developed web-based penetration system which is able to check the SIP server if can face to the most common attacks.The d...

  5. Ultrasonic Leak Detection System

    Science.gov (United States)

    Youngquist, Robert C. (Inventor); Moerk, J. Steven (Inventor)

    1998-01-01

    A system for detecting ultrasonic vibrations. such as those generated by a small leak in a pressurized container. vessel. pipe. or the like. comprises an ultrasonic transducer assembly and a processing circuit for converting transducer signals into an audio frequency range signal. The audio frequency range signal can be used to drive a pair of headphones worn by an operator. A diode rectifier based mixing circuit provides a simple, inexpensive way to mix the transducer signal with a square wave signal generated by an oscillator, and thereby generate the audio frequency signal. The sensitivity of the system is greatly increased through proper selection and matching of the system components. and the use of noise rejection filters and elements. In addition, a parabolic collecting horn is preferably employed which is mounted on the transducer assembly housing. The collecting horn increases sensitivity of the system by amplifying the received signals. and provides directionality which facilitates easier location of an ultrasonic vibration source.

  6. Arc fault detection system

    Science.gov (United States)

    Jha, K.N.

    1999-05-18

    An arc fault detection system for use on ungrounded or high-resistance-grounded power distribution systems is provided which can be retrofitted outside electrical switchboard circuits having limited space constraints. The system includes a differential current relay that senses a current differential between current flowing from secondary windings located in a current transformer coupled to a power supply side of a switchboard, and a total current induced in secondary windings coupled to a load side of the switchboard. When such a current differential is experienced, a current travels through a operating coil of the differential current relay, which in turn opens an upstream circuit breaker located between the switchboard and a power supply to remove the supply of power to the switchboard. 1 fig.

  7. Radiation detection system

    International Nuclear Information System (INIS)

    Haeuszer, F.A.

    1976-01-01

    A circuit is disclosed that detects radiation transients and provides a clamping signal in response to each transient. The clamping signal is present from the time the transient rises above a given threshold level and for a known duration thereafter. The system includes radiation sensors, a blocking oscillator that generates a pulse in response to each sensor signal, and an output pulse duration control circuit. The oscillator pulses are fed simultaneously to the output pulse duration control circuit and to an OR gate, the output of which comprises the system output. The output pulse duration is controlled by the time required to magnetize a magnetic core to saturation in first one direction and then the other

  8. Passive intrusion detection system

    Science.gov (United States)

    Laue, E. G. (Inventor)

    1980-01-01

    An intrusion detection system is described in which crystal oscillators are used to provide a frequency which varies as a function of fluctuations of a particular environmental property of the atmosphere, e.g., humidity, in the protected volume. The system is based on the discovery that the frequency of an oscillator whose crystal is humidity sensitive, varies at a frequency or rate which is within a known frequency band, due to the entry of an intruder into the protected volume. The variable frequency is converted into a voltage which is then filtered by a filtering arrangement which permits only voltage variations at frequencies within the known frequency band to activate an alarm, while inhibiting the alarm activation when the voltage frequency is below or above the known frequency band.

  9. Ferret Workflow Anomaly Detection System

    National Research Council Canada - National Science Library

    Smith, Timothy J; Bryant, Stephany

    2005-01-01

    The Ferret workflow anomaly detection system project 2003-2004 has provided validation and anomaly detection in accredited workflows in secure knowledge management systems through the use of continuous, automated audits...

  10. Atrial fibrillation in a healthy adolescent after heavy smoking of contraband cigarettes.

    Science.gov (United States)

    Ozyilmaz, Isa; Ozyilmaz, Sinem; Tosun, Oyku; Tola, Hasan Tahsin; Saygi, Murat; Ergul, Yakup

    2015-08-01

    The use of contraband cigarettes is a serious public health problem. We present a case of atrial fibrillation in a healthy adolescent suspected to be caused by smoking contraband cigarettes. A 15-year-old man was admitted to our emergency department experiencing syncope and palpitations. He was a cigarette smoker, but he had never smoked any illicit tobacco products before. He had finished a pack of counterfeit cigarettes (20 pieces) in 1.5 h. His electrocardiogram showed atrial fibrillation with a rapid ventricular response and irregular RR intervals. The patient had no history of alcohol use, surgery, palpitations, hypertension, chronic bronchitis, or any infectious diseases. His atrial fibrillation was converted to a normal sinus rhythm after the cardioversion treatment. Our patient was discharged from the pediatric cardiology service and advised to quit smoking cigarettes, strictly warning against illicit tobacco products. In conclusion, intensive smoking of counterfeit cigarettes may lead to occurrences of atrial fibrillation.

  11. Complicity in contraband: British American Tobacco and cigarette smuggling in Asia.

    Science.gov (United States)

    Collin, J; Legresley, E; MacKenzie, R; Lawrence, S; Lee, K

    2004-12-01

    To examine the complicity of British American Tobacco (BAT) in cigarette smuggling in Asia, and to assess the centrality of illicit trade to regional corporate strategy. Analysis of previously confidential documents from BAT's Guildford depository. An iterative strategy combined searches based on geography, organisational structure, and key personnel, while corporate euphemisms for contraband were identified by triangulation. BAT documents demonstrate the strategic importance of smuggling across global, regional, national, and local levels. Particularly important in Asia, contraband enabled access to closed markets, created pressure for market opening, and was highly profitable. Documents demonstrate BAT's detailed oversight of illicit trade, seeking to reconcile the conflicting demands of control and deniability. BAT documents demonstrate that smuggling has been driven by corporate objectives, indicate national measures by which the problem can be addressed, and highlight the importance of a coordinated global response via WHO's Framework Convention on Tobacco Control.

  12. Post-mortem blood concentration of methanol in 17 cases of fatal poisoning from contraband vodka.

    Science.gov (United States)

    Hashemy Tonkabony, S E

    1975-01-01

    Recently in Tehran 57 persons were poisoned and admitted to hospitals after consumption of vodka. Seventeen of the 57 died and two others became blind. Analyses of the remaining vodka samples showed that they were contraband and were mixtures of methanol and water. Post-mortem samples of blood from 15 victims' hearts and two samples of viscera were analysed for methanol, the concentrations ranging from 23 to 268 mg per 100 ml blood and per 100 g viscera, respectively.

  13. Using natural beta emission for detecting concealed tobacco in parcels

    Energy Technology Data Exchange (ETDEWEB)

    Myers, Jeremy [Laboratory for Threat Material Detection, Department of Mechanical Engineering, University of New Brunswick, Fredericton, New Brunswick, E3B 5A3 (Canada); Hussein, Esam M.A. [Laboratory for Threat Material Detection, Department of Mechanical Engineering, University of New Brunswick, Fredericton, New Brunswick, E3B 5A3 (Canada)], E-mail: hussein@unb.ca

    2007-10-15

    It is suspected that postal systems are used for the illegal shipment of tobacco products to circumvent taxation and excise payments. This paper demonstrates that beta-particle emission from the potassium-40 contained in tobacco can be used to passively detect its presence in paperboard postal parcels. The same concept can be utilized for the detection of marijuana, whose leaves are also rich in {sup 40}K. The combination of high beta activity and a low weight is a good indicator of the presence of these two contraband materials.

  14. Using natural beta emission for detecting concealed tobacco in parcels

    International Nuclear Information System (INIS)

    Myers, Jeremy; Hussein, Esam M.A.

    2007-01-01

    It is suspected that postal systems are used for the illegal shipment of tobacco products to circumvent taxation and excise payments. This paper demonstrates that beta-particle emission from the potassium-40 contained in tobacco can be used to passively detect its presence in paperboard postal parcels. The same concept can be utilized for the detection of marijuana, whose leaves are also rich in 40 K. The combination of high beta activity and a low weight is a good indicator of the presence of these two contraband materials

  15. Intrusion detection: systems and models

    Science.gov (United States)

    Sherif, J. S.; Dearmond, T. G.

    2002-01-01

    This paper puts forward a review of state of the art and state of the applicability of intrusion detection systems, and models. The paper also presents a classfication of literature pertaining to intrusion detection.

  16. Introduction to detection systems

    DEFF Research Database (Denmark)

    Larsen, Jan

    Presentation of the information processing pipleline for detection including discussing of various issues and the use of mathematical modeling. A simple example of detection a signal in noise illustrated that simple modeling outperforms human visual and auditory perception. Particiants are going ...

  17. Detection and counting systems

    International Nuclear Information System (INIS)

    Abreu, M.A.N. de

    1976-01-01

    Detection devices based on gaseous ionization are analysed, such as: electroscopes ionization chambers, proportional counters and Geiger-Mueller counters. Scintillation methods are also commented. A revision of the basic concepts in electronics is done and the main equipment for counting is detailed. In the study of gama spectrometry, scintillation and semiconductor detectors are analysed [pt

  18. Innovative high pressure gas MEM's based neutron detector for ICF and active SNM detection.

    Energy Technology Data Exchange (ETDEWEB)

    Martin, Shawn Bryan; Derzon, Mark Steven; Renzi, Ronald F.; Chandler, Gordon Andrew

    2007-12-01

    An innovative helium3 high pressure gas detection system, made possible by utilizing Sandia's expertise in Micro-electrical Mechanical fluidic systems, is proposed which appears to have many beneficial performance characteristics with regards to making these neutron measurements in the high bremsstrahlung and electrical noise environments found in High Energy Density Physics experiments and especially on the very high noise environment generated on the fast pulsed power experiments performed here at Sandia. This same system may dramatically improve active WMD and contraband detection as well when employed with ultrafast (10-50 ns) pulsed neutron sources.

  19. Protein detection system

    Science.gov (United States)

    Fruetel, Julie A [Livermore, CA; Fiechtner, Gregory J [Bethesda, MD; Kliner, Dahv A. V. [San Ramon, CA; McIlroy, Andrew [Livermore, CA

    2009-05-05

    The present embodiment describes a miniature, microfluidic, absorption-based sensor to detect proteins at sensitivities comparable to LIF but without the need for tagging. This instrument utilizes fiber-based evanescent-field cavity-ringdown spectroscopy, in combination with faceted prism microchannels. The combination of these techniques will increase the effective absorption path length by a factor of 10.sup.3 to 10.sup.4 (to .about.1-m), thereby providing unprecedented sensitivity using direct absorption. The coupling of high-sensitivity absorption with high-performance microfluidic separation will enable real-time sensing of biological agents in aqueous samples (including aerosol collector fluids) and will provide a general method with spectral fingerprint capability for detecting specific bio-agents.

  20. Historic Evolution of Legislation Pertaining the Felony of Contraband in Colombia

    Directory of Open Access Journals (Sweden)

    Hernando A. Hernández Quintero

    2015-12-01

    Full Text Available States has traditionally sanctioned contraband, due not only to the detriment, it represents for their economies, but also as a manner on which those countries can collect resources for its operation throughout the imposition of fines and the seizing of merchandise. In the case study of the Colombian State, such behavior has been historically approached individually either as an administrative infringement, or as a criminal conduct; and even by combining the two as a punitive reaction. This paper presents a study of legislative evolution, legal approach used by the State of Colombia to face out such conduct, since the colonial times to the lately promulgated law 1765 of 2015.

  1. Intrusion Detection Systems with Live Knowledge System

    Science.gov (United States)

    2016-05-31

    AFRL-AFOSR-JP-TR-2016-0058 Intrusion Detection Systems with Live Knowledge System Byeong Ho Kang UNIVERSITY OF TASMANIA Final Report 05/31/2016...COVERED (From - To) 20 May 2015 to 19 May 2016 4. TITLE AND SUBTITLE Intrusion Detection Systems with Live Knowledge System 5a.  CONTRACT NUMBER 5b...298 10/26/2016https://livelink.ebs.afrl.af.mil/livelink/llisapi.dll Final Report for AOARD Grant FA2386-15-1-4061 “ Intrusion Detection Systems with

  2. Radiation detecting system

    International Nuclear Information System (INIS)

    1975-01-01

    In spectrophotometry systems, a usual arrangement for modulating the radiation is a rotating disc having one or more sectors removed. A beam of radiation may be blocked by the disc except when a cut-away sector is in the path of the beam. With a double-beam system, a cut-away sector of 180 0 may be used so that when the first path is blocked, the second is allowed through, and vice versa. One or both sides of the disc may be formed as mirrors to facilitate beam switching and to allow use of more than two beams for background compensation purposes or for analysis of more than one substance within a sample. (G.T.H.)

  3. Fault Detection for Nonlinear Systems

    DEFF Research Database (Denmark)

    Stoustrup, Jakob; Niemann, H.H.

    1998-01-01

    The paper describes a general method for designing fault detection and isolation (FDI) systems for nonlinear processes. For a rich class of nonlinear systems, a nonlinear FDI system can be designed using convex optimization procedures. The proposed method is a natural extension of methods based o...

  4. An environmental monitoring detection system

    International Nuclear Information System (INIS)

    Leli Yuniarsari; Istofa; Sukandar

    2015-01-01

    Is part of radiation detection of the nuclear facilities engineering activities within nuclear facilities. The system comprised of gamma-ray radiation detector and weather detection which includes anemometer to detect the wind direction and speed, as well as rain gauge to measure the rainfall in a period of time. Data acquisition of the output is processed by Arduino Uno system which transformed the data into a particular standard and then displayed online in the website. The radiation detection system uses gamma-ray detector of NaI(Tl) and GM which convert the radiation detected into electric pulse to be fed into a pre-amp and amplifier and modified into square pulse. The weather detection system on the other hand works based on switch principle. For example, the wind with a certain speed could turn on a switch in the system and produce a voltage or pulse which can be measured. This value will then be interpreted as the wind direction and speed. Likewise for the rainfall gauge, the volume of water entering the bucket will turn the switch on, at the same time producing 1 pulse. The result of the experiment shows that for radiation detection system the output is a square pulse 4 volts by using detector NaI(Tl) and 4.4 volts by using detector GM. For weather detection system, basically was able to detect the wind direction, wind speed and rainfall just to find out further research is needed accuracy and the results compared with the standard tools available in BMKG. (author)

  5. Ferromagnetic Objects Magnetovision Detection System

    Directory of Open Access Journals (Sweden)

    Michał Nowicki

    2013-12-01

    Full Text Available This paper presents the application of a weak magnetic fields magnetovision scanning system for detection of dangerous ferromagnetic objects. A measurement system was developed and built to study the magnetic field vector distributions. The measurements of the Earth’s field distortions caused by various ferromagnetic objects were carried out. The ability for passive detection of hidden or buried dangerous objects and the determination of their location was demonstrated.

  6. 28 CFR 50.21 - Procedures governing the destruction of contraband drug evidence in the custody of Federal law...

    Science.gov (United States)

    2010-07-01

    ... General under title I, section 1006(c)(3) of the Anti-Drug Abuse Act of 1986, Public Law 99-570 which is... drugs presents inordinate security and storage problems which create additional economic burdens on... contraband drug evidence in the custody of Federal law enforcement authorities. 50.21 Section 50.21 Judicial...

  7. Basis UST leak detection systems

    International Nuclear Information System (INIS)

    Silveria, V.

    1992-01-01

    This paper reports that gasoline and other petroleum products are leaking from underground storage tanks (USTs) at an alarming rate, seeping into soil and groundwater. Buried pipes are an even greater culprit, accounting for most suspected and detected leaks according to Environmental Protection Agency (EPA) estimates. In response to this problem, the EPA issued regulations setting standards for preventing, detecting, reporting, and cleaning up leaks, as well as fiscal responsibility. However, federal regulations are only a minimum; some states have cracked down even harder Plant managers and engineers have a big job ahead of them. The EPA estimates that there are more than 75,000 fuel USTs at US industrial facilities. When considering leak detection systems, the person responsible for making the decision has five primary choices: inventory reconciliation combined with regular precision tightness tests; automatic tank gauging; groundwater monitoring; interstitial monitoring of double containment systems; and vapor monitoring

  8. Optical detection in microfluidic systems

    DEFF Research Database (Denmark)

    Mogensen, Klaus Bo; Kutter, Jörg Peter

    2009-01-01

    Optical detection schemes continue to be favoured for measurements in microfluidic systems. A selection of the latest progress mainly within the last two years is critically reviewed. Emphasis is on integrated solutions, such as planar waveguides, coupling schemes to the outside world, evanescent...

  9. Semi autonomous mine detection system

    Energy Technology Data Exchange (ETDEWEB)

    Douglas Few; Roelof Versteeg; Herman Herman

    2010-04-01

    CMMAD is a risk reduction effort for the AMDS program. As part of CMMAD, multiple instances of semi autonomous robotic mine detection systems were created. Each instance consists of a robotic vehicle equipped with sensors required for navigation and marking, a countermine sensors and a number of integrated software packages which provide for real time processing of the countermine sensor data as well as integrated control of the robotic vehicle, the sensor actuator and the sensor. These systems were used to investigate critical interest functions (CIF) related to countermine robotic systems. To address the autonomy CIF, the INL developed RIK was extended to allow for interaction with a mine sensor processing code (MSPC). In limited field testing this system performed well in detecting, marking and avoiding both AT and AP mines. Based on the results of the CMMAD investigation we conclude that autonomous robotic mine detection is feasible. In addition, CMMAD contributed critical technical advances with regard to sensing, data processing and sensor manipulation, which will advance the performance of future fieldable systems. As a result, no substantial technical barriers exist which preclude – from an autonomous robotic perspective – the rapid development and deployment of fieldable systems.

  10. Tape Cassette Bacteria Detection System

    Science.gov (United States)

    1973-01-01

    The design, fabrication, and testing of an automatic bacteria detection system with a zero-g capability and based on the filter-capsule approach is described. This system is intended for monitoring the sterility of regenerated water in a spacecraft. The principle of detection is based on measuring the increase in chemiluminescence produced by the action of bacterial porphyrins (i.e., catalase, cytochromes, etc.) on a luminol-hydrogen peroxide mixture. Since viable as well as nonviable organisms initiate this luminescence, viable organisms are detected by comparing the signal of an incubated water sample with an unincubated control. Higher signals for the former indicate the presence of viable organisms. System features include disposable sealed sterile capsules, each containing a filter membrane, for processing discrete water samples and a tape transport for moving these capsules through a processing sequence which involves sample concentration, nutrient addition, incubation, a 4 Molar Urea wash and reaction with luminol-hydrogen peroxide in front of a photomultiplier tube. Liquids are introduced by means of a syringe needle which pierces a rubber septum contained in the wall of the capsule. Detection thresholds obtained with this unit towards E. coli and S. marcescens assuming a 400 ml water sample are indicated.

  11. Lightning Protection and Detection System

    Science.gov (United States)

    Dudley, Kenneth L. (Inventor); Szatkowski, George N. (Inventor); Woodard, Marie (Inventor); Nguyen, Truong X. (Inventor); Ely, Jay J. (Inventor); Wang, Chuantong (Inventor); Mielnik, John J. (Inventor); Koppen, Sandra V. (Inventor); Smith, Laura J. (Inventor)

    2017-01-01

    A lightning protection and detection system includes a non-conductive substrate material of an apparatus; a sensor formed of a conductive material and deposited on the non-conductive substrate material of the apparatus. The sensor includes a conductive trace formed in a continuous spiral winding starting at a first end at a center region of the sensor and ending at a second end at an outer corner region of the sensor, the first and second ends being open and unconnected. An electrical measurement system is in communication with the sensor and receives a resonant response from the sensor, to perform detection, in real-time, of lightning strike occurrences and damage therefrom to the sensor and the non-conductive substrate material.

  12. The Autonomous Pathogen Detection System

    Energy Technology Data Exchange (ETDEWEB)

    Dzenitis, J M; Makarewicz, A J

    2009-01-13

    We developed, tested, and now operate a civilian biological defense capability that continuously monitors the air for biological threat agents. The Autonomous Pathogen Detection System (APDS) collects, prepares, reads, analyzes, and reports results of multiplexed immunoassays and multiplexed PCR assays using Luminex{copyright} xMAP technology and flow cytometer. The mission we conduct is particularly demanding: continuous monitoring, multiple threat agents, high sensitivity, challenging environments, and ultimately extremely low false positive rates. Here, we introduce the mission requirements and metrics, show the system engineering and analysis framework, and describe the progress to date including early development and current status.

  13. Nucleic acid detection system and method for detecting influenza

    Energy Technology Data Exchange (ETDEWEB)

    Cai, Hong; Song, Jian

    2015-03-17

    The invention provides a rapid, sensitive and specific nucleic acid detection system which utilizes isothermal nucleic acid amplification in combination with a lateral flow chromatographic device, or DNA dipstick, for DNA-hybridization detection. The system of the invention requires no complex instrumentation or electronic hardware, and provides a low cost nucleic acid detection system suitable for highly sensitive pathogen detection. Hybridization to single-stranded DNA amplification products using the system of the invention provides a sensitive and specific means by which assays can be multiplexed for the detection of multiple target sequences.

  14. Ultrasonic System Approach to Obstacle Detection and Edge Detection

    Directory of Open Access Journals (Sweden)

    Yin Thu Win

    2011-04-01

    Full Text Available In this paper, ultrasonic system approach to obstacle detection and edge detection for industrial and rescue operations has been presented. The developed system consists of tough sonic sensor configure with personal computer for monitoring. First, the mathematical model has been presented for the object detection system. Then the numerical simulation has been performed using Matlab platform. The experiments have been conducted using ultrasonic frequency. The curtain, paper and bamboo sheet have been considered as a media during experiments. The presented system is highly accurate for object detection and edge detection behind the obstacle.

  15. Ionization detection system for aerosols

    International Nuclear Information System (INIS)

    Jacobs, M.E.

    1977-01-01

    This invention relates to an improved smoke-detection system of the ionization-chamber type. In the preferred embodiment, the system utilizes a conventional detector head comprising a measuring ionization chamber, a reference ionization chamber, and a normally non-conductive gas triode for discharging when a threshold concentration of airborne particulates is present in the measuring chamber. The improved system utilizes a measuring ionization chamber which is modified to minimize false alarms and reductions in sensitivity resulting from changes in ambient temperature. In the preferred form of the modification, an annular radiation shield is mounted about the usual radiation source provided to effect ionization in the measuring chamber. The shield is supported by a bimetallic strip which flexes in response to changes in ambient temperature, moving the shield relative to the source so as to vary the radiative area of the source in a manner offsetting temperature-induced variations in the sensitivity of the chamber. 8 claims, 7 figures

  16. Pulsed helium ionization detection system

    Science.gov (United States)

    Ramsey, R.S.; Todd, R.A.

    1985-04-09

    A helium ionization detection system is provided which produces stable operation of a conventional helium ionization detector while providing improved sensitivity and linearity. Stability is improved by applying pulsed dc supply voltage across the ionization detector, thereby modifying the sampling of the detectors output current. A unique pulse generator is used to supply pulsed dc to the detector which has variable width and interval adjust features that allows up to 500 V to be applied in pulse widths ranging from about 150 nsec to about dc conditions.

  17. Complicated systems for neutron detection

    International Nuclear Information System (INIS)

    Kozlov, I.M.; Nikotin, O.P.; Chekrenev, A.S.

    1982-01-01

    The design of the system for detecting delayed neutrons due to heavy nuclei photofission is described. The system comprises a large number of 3 He proportional counters of thermal neutrons. Each counter is equipped with an individual amplifier, discriminator and pUlse shaper. The tuning of a detector comprising several counters has been realized by changing the discrimination voltage in such a manner that the point of the ν radiation initial counting for all counters is under the same voltage of the high voltage source. Such method permits not only to reduce the tuning time but to obtain also an optimum value of perfect separation of signals from neutrons and ν radiation. Data processing has been performed by the commutator which permits to add signals in different versions. The choice of the version has been determined by output control potentials. The commutator functions have been recorded in the symbols of algebra logics. The described detector with the commutator has been employed in kinetic measurements of photofission delayed neutrons, for detecting fission neutrons with neutron background, from (α, n) for measuring the distribution of a number of instantaneous neutrons per fission act. The above principles of the detectors structure and data processing and recording facilities permit to unite according power supplies any number of thermal neutron counters and apply more complicated circuats of counter signal commutators

  18. FLEXible Damage Detection and Verification System

    Data.gov (United States)

    National Aeronautics and Space Administration — This project expands on the previously demonstrated Flat Surface Damage Detection System (FSDDS) capabilities.  The Flexible Damage Detection and Verification System...

  19. Thermal animal detection system (TADS)

    Energy Technology Data Exchange (ETDEWEB)

    Desholm, M.

    2003-03-01

    This report presents data from equipment tests and software development for the Thermal Animal Detection System (TADS) development project: 'Development of a method for estimating collision frequency between migrating birds and offshore wind turbines'. The technical tests were performed to investigate the performance of remote controlling, video file compression tool and physical stress of the thermal camera when operating outdoors and under the real time vibration conditions at a 2 MW turbine. Furthermore, experimental tests on birds were performed to describe the decreasing detectability with distance on free flying birds, the performance of the thermal camera during poor visibility, and finally, the performance of the thermal sensor software developed for securing high -quality data. In general, it can be concluded that the thermal camera and its related hardware and software, the TADS, are capable of recording migrating birds approaching the rotating blades of a turbine, even under conditions with poor visibility. If the TADS is used in a vertical viewing scenario it would comply with the requirements for a setup used for estimating the avian collision frequency at offshore wind turbines. (au)

  20. A Portable Infrasonic Detection System

    Science.gov (United States)

    Shams, Qamar A.; Burkett, Cecil G.; Zuckerwar, Allan J.; Lawrenson, Christopher C.; Masterman, Michael

    2008-01-01

    During last couple of years, NASA Langley has designed and developed a portable infrasonic detection system which can be used to make useful infrasound measurements at a location where it was not possible previously. The system comprises an electret condenser microphone, having a 3-inch membrane diameter, and a small, compact windscreen. Electret-based technology offers the lowest possible background noise, because Johnson noise generated in the supporting electronics (preamplifier) is minimized. The microphone features a high membrane compliance with a large backchamber volume, a prepolarized backplane and a high impedance preamplifier located inside the backchamber. The windscreen, based on the high transmission coefficient of infrasound through matter, is made of a material having a low acoustic impedance and sufficiently thick wall to insure structural stability. Close-cell polyurethane foam has been found to serve the purpose well. In the proposed test, test parameters will be sensitivity, background noise, signal fidelity (harmonic distortion), and temporal stability. The design and results of the compact system, based upon laboratory and field experiments, will be presented.

  1. Integrated Performance Testing Workshop, Modules 6 - 11

    Energy Technology Data Exchange (ETDEWEB)

    Leach, Janice; Torres, Teresa M.

    2012-10-01

    These modules cover performance testing of: Interior Detection Systems; Access Controls; Exterior Detection Systems; Video Assessment Systems; SNM / Contraband Detection Systems; Access Delay Elements

  2. NIST Special Publication on Intrusion Detection Systems

    National Research Council Canada - National Science Library

    Bace, Rebecca Gurley

    2001-01-01

    Intrusion detection systems (IDSs) are software or hardware systems that automate the process of monitoring the events occurring in a computer system or network, analyzing them for signs of security problems...

  3. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection

    Directory of Open Access Journals (Sweden)

    Jayakumar Kaliappan

    2015-01-01

    Full Text Available An intrusion detection system (IDS helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU, there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  4. Fusion of Heterogeneous Intrusion Detection Systems for Network Attack Detection.

    Science.gov (United States)

    Kaliappan, Jayakumar; Thiagarajan, Revathi; Sundararajan, Karpagam

    2015-01-01

    An intrusion detection system (IDS) helps to identify different types of attacks in general, and the detection rate will be higher for some specific category of attacks. This paper is designed on the idea that each IDS is efficient in detecting a specific type of attack. In proposed Multiple IDS Unit (MIU), there are five IDS units, and each IDS follows a unique algorithm to detect attacks. The feature selection is done with the help of genetic algorithm. The selected features of the input traffic are passed on to the MIU for processing. The decision from each IDS is termed as local decision. The fusion unit inside the MIU processes all the local decisions with the help of majority voting rule and makes the final decision. The proposed system shows a very good improvement in detection rate and reduces the false alarm rate.

  5. System for detecting nuclear explosions

    International Nuclear Information System (INIS)

    Rawls, L.E.

    1978-01-01

    Apparatus for detecting underground nuclear explosions is described that is comprised of an antenna located in the dielectric substance of a deep waveguide in the earth and adapted to detect low frequency electromagnetic waves generated by a nuclear explosion, the deep waveguide comprising the high conductivity upper sedimentary layers of the earth, the dielectric basement rock, and a high conductivity layer of basement rock due to the increased temperature thereof at great depths, and means for receiving the electromagnetic waves detected by said antenna means

  6. Homodyne detection of holographic memory systems

    Science.gov (United States)

    Urness, Adam C.; Wilson, William L.; Ayres, Mark R.

    2014-09-01

    We present a homodyne detection system implemented for a page-wise holographic memory architecture. Homodyne detection by holographic memory systems enables phase quadrature multiplexing (doubling address space), and lower exposure times (increasing read transfer rates). It also enables phase modulation, which improves signal-to-noise ratio (SNR) to further increase data capacity. We believe this is the first experimental demonstration of homodyne detection for a page-wise holographic memory system suitable for a commercial design.

  7. Discriminating ultrasonic proximity detection system

    Energy Technology Data Exchange (ETDEWEB)

    Annala, W C

    1986-12-04

    This invention uses an ultrasonic transmitter and receiver and a microprocessor to detect the presence of an object. In the reset mode the invention uses a plurality of echoes from each ultrasonic burst to create a reference table of the echo-burst-signature of the empty monitored environment. The invention then processes the reference table so that it only uses the most reliable data. In the detection mode the invention compares the echo-burst-signature of the present environment with the reference table, detecting an object if there is a consistent difference between the echo-burst-signature of the empty monitored environment recorded in the reference table and the echo-burst-signature of the present environment.

  8. Discriminating ultrasonic proximity detection system

    Energy Technology Data Exchange (ETDEWEB)

    Annala, W.C.

    1989-01-24

    This invention uses an ultrasonic transmitter and receiver and a microprocessor to detect the presence of an object. In the reset mode the invention uses a plurality of echoes from each ultrasonic burst to create a reference table of the echo-burst-signature of the empty monitored environment. The invention then processes the reference table so that it only uses the most reliable data. In the detection mode the invention compares the echo-burst-signature of the present environment with the reference table, detecting an object if there is a consistent difference between the echo-burst-signature of the empty monitored environment recorded in the reference table and the echo-burst-signature of the present environment.

  9. Discriminating ultrasonic proximity detection system

    Energy Technology Data Exchange (ETDEWEB)

    Annala, Wayne C. (Durango, CO)

    1989-01-01

    This invention uses an ultrasonic transmitter and receiver and a microprocessor to detect the presence of an object. In the reset mode the invention uses a plurality of echoes from each ultrasonic burst to create a reference table of the echo-burst-signature of the empty monitored environment. The invention then processes the reference table so that it only uses the most reliable data. In the detection mode the invention compares the echo-burst-signature of the present environment with the reference table, detecting an object if there is a consistent difference between the echo-burst-signature of the empty monitored environment recorded in the reference table and the echo-burst-signature of the present environment.

  10. Damage Detection and Deteriorating Structural Systems

    DEFF Research Database (Denmark)

    Long, Lijia; Thöns, Sebastian; Döhler, Michael

    2017-01-01

    detection information is determined utilizing Bayesian updating. The damage detection performance is described with the probability of indication for different component and system damage states taking into account type 1 and type 2 errors. The value of damage detection information is then calculated...

  11. Expandable coating cocoon leak detection system

    Science.gov (United States)

    Hauser, R. L.; Kochansky, M. C.

    1972-01-01

    Development of system and materials for detecting leaks in cocoon protective coatings are discussed. Method of applying materials for leak determination is presented. Pressurization of system following application of materials will cause formation of bubble if leak exists.

  12. Apriori-based network intrusion detection system

    International Nuclear Information System (INIS)

    Wang Wenjin; Liu Junrong; Liu Baoxu

    2012-01-01

    With the development of network communication technology, more and more social activities run by Internet. In the meantime, the network information security is getting increasingly serious. Intrusion Detection System (IDS) has greatly improved the general security level of whole network. But there are still many problem exists in current IDS, e.g. high leak rate detection/false alarm rates and feature library need frequently upgrade. This paper presents an association-rule based IDS. This system can detect unknown attack by generate rules from training data. Experiment in last chapter proved the system has great accuracy on unknown attack detection. (authors)

  13. An automatically tuning intrusion detection system.

    Science.gov (United States)

    Yu, Zhenwei; Tsai, Jeffrey J P; Weigert, Thomas

    2007-04-01

    An intrusion detection system (IDS) is a security layer used to detect ongoing intrusive activities in information systems. Traditionally, intrusion detection relies on extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been deployed for intrusion detection. An IDS is usually working in a dynamically changing environment, which forces continuous tuning of the intrusion detection model, in order to maintain sufficient performance. The manual tuning process required by current systems depends on the system operators in working out the tuning solution and in integrating it into the detection model. In this paper, an automatically tuning IDS (ATIDS) is presented. The proposed system will automatically tune the detection model on-the-fly according to the feedback provided by the system operator when false predictions are encountered. The system is evaluated using the KDDCup'99 intrusion detection dataset. Experimental results show that the system achieves up to 35% improvement in terms of misclassification cost when compared with a system lacking the tuning feature. If only 10% false predictions are used to tune the model, the system still achieves about 30% improvement. Moreover, when tuning is not delayed too long, the system can achieve about 20% improvement, with only 1.3% of the false predictions used to tune the model. The results of the experiments show that a practical system can be built based on ATIDS: system operators can focus on verification of predictions with low confidence, as only those predictions determined to be false will be used to tune the detection model.

  14. Real-time petroleum spill detection system

    International Nuclear Information System (INIS)

    Dakin, D.T.

    2001-01-01

    A real-time autonomous oil and fuel spill detection system has been developed to rapidly detect of a wide range of petroleum products floating on, or suspended in water. The system consists of an array of spill detection buoys distributed within the area to be monitored. The buoys are composed of a float and a multispectral fluorometer, which looks up through the top 5 cm of water to detect floating and suspended petroleum products. The buoys communicate to a base station computer that controls the sampling of the buoys and analyses the data from each buoy to determine if a spill has occurred. If statistically significant background petroleum levels are detected, the system raises an oil spill alarm. The system is useful because early detection of a marine oil spill allows for faster containment, thereby minimizing the contaminated area and reducing cleanup costs. This paper also provided test results for biofouling, various petroleum product detection, water turbidity and wave tolerance. The technology has been successfully demonstrated. The UV light source keeps the optic window free from biofouling, and the electronics are fully submerged so there is no risk that the unit could ignite the vapours of a potential oil spill. The system can also tolerate moderately turbid waters and can therefore be used in many rivers, harbours, water intakes and sumps. The system can detect petroleum products with an average thickness of less than 3 micrometers floating on the water surface. 3 refs., 15 figs

  15. Anomaly Detection for Complex Systems

    Data.gov (United States)

    National Aeronautics and Space Administration — In performance maintenance in large, complex systems, sensor information from sub-components tends to be readily available, and can be used to make predictions about...

  16. Damage Detection and Deteriorating Structural Systems

    DEFF Research Database (Denmark)

    Long, Lijia; Thöns, Sebastian; Döhler, Michael

    2017-01-01

    This paper addresses the quantification of the value of damage detection system and algorithm information on the basis of Value of Information (VoI) analysis to enhance the benefit of damage detection information by providing the basis for its optimization before it is performed and implemented....... The approach of the quantification the value of damage detection information builds upon the Bayesian decision theory facilitating the utilization of damage detection performance models, which describe the information and its precision on structural system level, facilitating actions to ensure the structural...... integrity and facilitating to describe the structural system performance and its functionality throughout the service life. The structural system performance is described with its functionality, its deterioration and its behavior under extreme loading. The structural system reliability given the damage...

  17. Voice activity detection for speaker verification systems

    Science.gov (United States)

    Borowski, Filip

    2008-01-01

    Complex algorithm for speech activity detection was presented in this article. It is based on speech enhancement, features extraction and final detection algorithm. The first one was published in ETSI standard as a module of "Advanced front-end feature extraction algorithm" in distributed speech recognition system. It consists of two main parts, noise estimatiom and Wiener filtering. For the final detection modified linear prediction coefficients and spectral entropy features are extracted form denoised signal.

  18. Embedded Systems - Missile Detection/Interception

    Directory of Open Access Journals (Sweden)

    Luis Cintron

    2010-01-01

    Full Text Available Missile defense systems are often related to major military resources aimed at shielding a specific region from incoming attacks. They are intended to detect, track, intercept, and destruct incoming enemy missiles. These systems vary in cost, efficiency, dependability, and technology. In present times, the possession of these types of systems is associated with large capacity military countries. Demonstrated here are the mathematical techniques behind missile systems which calculate trajectories of incoming missiles and potential intercept positions after initial missile detection. This procedure involved the use of vector-valued functions, systems of equations, and knowledge of projectile motion concepts.

  19. A failure detection and isolation system simulator

    International Nuclear Information System (INIS)

    Assumpcao Filho, E.O.; Nakata, H.

    1990-04-01

    A failure detection and isolation system (FDI) simulation program has been developed for IBM-PC microcomputers. The program, based on the sequential likelihood ratio testing method developed by A. Wald, was implemented with the Monte-Carlo technique. The calculated failure detection rate was favorably compared against the wind-tunnel experimental redundant temperature sensors. (author) [pt

  20. Statistical fault detection in photovoltaic systems

    KAUST Repository

    Garoudja, Elyes

    2017-05-08

    Faults in photovoltaic (PV) systems, which can result in energy loss, system shutdown or even serious safety breaches, are often difficult to avoid. Fault detection in such systems is imperative to improve their reliability, productivity, safety and efficiency. Here, an innovative model-based fault-detection approach for early detection of shading of PV modules and faults on the direct current (DC) side of PV systems is proposed. This approach combines the flexibility, and simplicity of a one-diode model with the extended capacity of an exponentially weighted moving average (EWMA) control chart to detect incipient changes in a PV system. The one-diode model, which is easily calibrated due to its limited calibration parameters, is used to predict the healthy PV array\\'s maximum power coordinates of current, voltage and power using measured temperatures and irradiances. Residuals, which capture the difference between the measurements and the predictions of the one-diode model, are generated and used as fault indicators. Then, the EWMA monitoring chart is applied on the uncorrelated residuals obtained from the one-diode model to detect and identify the type of fault. Actual data from the grid-connected PV system installed at the Renewable Energy Development Center, Algeria, are used to assess the performance of the proposed approach. Results show that the proposed approach successfully monitors the DC side of PV systems and detects temporary shading.

  1. IMPROVING CAUSE DETECTION SYSTEMS WITH ACTIVE LEARNING

    Data.gov (United States)

    National Aeronautics and Space Administration — IMPROVING CAUSE DETECTION SYSTEMS WITH ACTIVE LEARNING ISAAC PERSING AND VINCENT NG Abstract. Active learning has been successfully applied to many natural language...

  2. Detection and intelligent systems for homeland security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Detection and Intelligent Systems for Homeland Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering advanced technology for image and video interpretation systems used for surveillance, which help in solving such problems as identifying faces from live streaming or stored videos. Biometrics for human identification, including eye retinas and irises, and facial patterns are also presented. The book then provides information on sensors for detection of explosive and radioactive materials and methods for sensing chemical

  3. Detecting data anomalies methods in distributed systems

    Science.gov (United States)

    Mosiej, Lukasz

    2009-06-01

    Distributed systems became most popular systems in big companies. Nowadays many telecommunications companies want to hold large volumes of data about all customers. Obviously, those data cannot be stored in single database because of many technical difficulties, such as data access efficiency, security reasons, etc. On the other hand there is no need to hold all data in one place, because companies already have dedicated systems to perform specific tasks. In the distributed systems there is a redundancy of data and each system holds only interesting data in appropriate form. Data updated in one system should be also updated in the rest of systems, which hold that data. There are technical problems to update those data in all systems in transactional way. This article is about data anomalies in distributed systems. Avail data anomalies detection methods are shown. Furthermore, a new initial concept of new data anomalies detection methods is described on the last section.

  4. Multispectral imaging system for contaminant detection

    Science.gov (United States)

    Poole, Gavin H. (Inventor)

    2003-01-01

    An automated inspection system for detecting digestive contaminants on food items as they are being processed for consumption includes a conveyor for transporting the food items, a light sealed enclosure which surrounds a portion of the conveyor, with a light source and a multispectral or hyperspectral digital imaging camera disposed within the enclosure. Operation of the conveyor, light source and camera are controlled by a central computer unit. Light reflected by the food items within the enclosure is detected in predetermined wavelength bands, and detected intensity values are analyzed to detect the presence of digestive contamination.

  5. Portable reconfigurable detection and assessment system

    International Nuclear Information System (INIS)

    Blattman, D.A.

    1991-01-01

    Rapidly changing geopolitical issues throughout the world have made the ability to effectively respond to political, military, terrorist and peace-keeping requirements increasingly important. Recent Middle East events indicate a continuing escalation in these activities. These activities are defining the requirements for a rapidly deployable, portable, real-time detection and assessment operational security system that is reconfigurable to site specific threats. This paper describes such a system Mobile Operational Detection and Assessment system (MODAS); a commercially-off-the shelf (COTS) integrated and reconfigurable hardware/software system solution for the ever-changing geopolitical security issues of the Nineties

  6. Intrusion Detection amp Prevention Systems - Sourcefire Snort

    Directory of Open Access Journals (Sweden)

    Rajesh Vuppala

    2015-08-01

    Full Text Available Information security is a challenging issue for all business organizations today amidst increasing cyber threats. While there are many alternative intrusion detection amp prevention systems available to choose from selecting the best solution to implement to detect amp prevent cyber-attacks is a difficult task. The best solution is of the one that gets the best reviews and suits the organizations needs amp budget. In this review paper we summarize various classes of intrusion detection and prevention systems compare features of alternative solutions and make recommendation for implementation of one as the best solution for business organization in Fiji.

  7. Active fault detection in MIMO systems

    DEFF Research Database (Denmark)

    Niemann, Hans Henrik; Poulsen, Niels Kjølstad

    2014-01-01

    The focus in this paper is on active fault detection (AFD) for MIMO systems with parametric faults. The problem of design of auxiliary inputs with respect to detection of parametric faults is investigated. An analysis of the design of auxiliary inputs is given based on analytic transfer functions...... from auxiliary input to residual outputs. The analysis is based on a singular value decomposition of these transfer functions Based on this analysis, it is possible to design auxiliary input as well as design of the associated residual vector with respect to every single parametric fault in the system...... such that it is possible to detect these faults....

  8. Flat Surface Damage Detection System (FSDDS)

    Science.gov (United States)

    Williams, Martha; Lewis, Mark; Gibson, Tracy; Lane, John; Medelius, Pedro; Snyder, Sarah; Ciarlariello, Dan; Parks, Steve; Carrejo, Danny; Rojdev, Kristina

    2013-01-01

    The Flat Surface Damage Detection system (FSDDS} is a sensory system that is capable of detecting impact damages to surfaces utilizing a novel sensor system. This system will provide the ability to monitor the integrity of an inflatable habitat during in situ system health monitoring. The system consists of three main custom designed subsystems: the multi-layer sensing panel, the embedded monitoring system, and the graphical user interface (GUI). The GUI LABVIEW software uses a custom developed damage detection algorithm to determine the damage location based on the sequence of broken sensing lines. It estimates the damage size, the maximum depth, and plots the damage location on a graph. Successfully demonstrated as a stand alone technology during 2011 D-RATS. Software modification also allowed for communication with HDU avionics crew display which was demonstrated remotely (KSC to JSC} during 2012 integration testing. Integrated FSDDS system and stand alone multi-panel systems were demonstrated remotely and at JSC, Mission Operations Test using Space Network Research Federation (SNRF} network in 2012. FY13, FSDDS multi-panel integration with JSC and SNRF network Technology can allow for integration with other complementary damage detection systems.

  9. Automated Hydrogen Gas Leak Detection System

    Science.gov (United States)

    1995-01-01

    The Gencorp Aerojet Automated Hydrogen Gas Leak Detection System was developed through the cooperation of industry, academia, and the Government. Although the original purpose of the system was to detect leaks in the main engine of the space shuttle while on the launch pad, it also has significant commercial potential in applications for which there are no existing commercial systems. With high sensitivity, the system can detect hydrogen leaks at low concentrations in inert environments. The sensors are integrated with hardware and software to form a complete system. Several of these systems have already been purchased for use on the Ford Motor Company assembly line for natural gas vehicles. This system to detect trace hydrogen gas leaks from pressurized systems consists of a microprocessor-based control unit that operates a network of sensors. The sensors can be deployed around pipes, connectors, flanges, and tanks of pressurized systems where leaks may occur. The control unit monitors the sensors and provides the operator with a visual representation of the magnitude and locations of the leak as a function of time. The system can be customized to fit the user's needs; for example, it can monitor and display the condition of the flanges and fittings associated with the tank of a natural gas vehicle.

  10. Technologies for detection of nuclear materials

    International Nuclear Information System (INIS)

    DeVolpi, A.

    1996-01-01

    Detection of smuggled nuclear materials at transit points requires monitoring unknown samples in large closed packages. This review contends that high-confidence nuclear-material detection requires induced fission as the primary mechanism, with passive radiation screening in a complementary role. With the right equipment, even small quantities of nuclear materials are detectable with a high probability at transit points. The equipment could also be linked synergistically with detectors of other contrabond. For screening postal mail and packages, passive monitors are probably more cost-effective. When a suspicious item is detected, a single active probe could then be used. Until active systems become mass produced, this two-stage screening/interrogation role for active/passive equipment is more economic for cargo at border crossings. For widespread monitoring of nuclear smuggling, it will probably be necessary to develop a system for simultaneously detecting most categories of contraband, including explosives and illicit drugs. With control of nuclear materials at known storage sites being the first line of defense, detection capabilities at international borders could establish a viable second line of defense against smuggling

  11. Capacitive system detects and locates fluid leaks

    Science.gov (United States)

    1966-01-01

    Electronic monitoring system automatically detects and locates minute leaks in seams of large fluid storage tanks and pipelines covered with thermal insulation. The system uses a capacitive tape-sensing element that is adhesively bonded over seams where fluid leaks are likely to occur.

  12. Expert System Detects Power-Distribution Faults

    Science.gov (United States)

    Walters, Jerry L.; Quinn, Todd M.

    1994-01-01

    Autonomous Power Expert (APEX) computer program is prototype expert-system program detecting faults in electrical-power-distribution system. Assists human operators in diagnosing faults and deciding what adjustments or repairs needed for immediate recovery from faults or for maintenance to correct initially nonthreatening conditions that could develop into faults. Written in Lisp.

  13. Hydrogen detection systems leak response codes

    International Nuclear Information System (INIS)

    Desmas, T.; Kong, N.; Maupre, J.P.; Schindler, P.; Blanc, D.

    1990-01-01

    A loss in tightness of a water tube inside a Steam Generator Unit of a Fast Reactor is usually monitored by hydrogen detection systems. Such systems have demonstrated in the past their ability to detect a leak in a SGU. However, the increase in size of the SGU or the choice of ferritic material entails improvement of these systems in order to avoid secondary leak or to limit damages to the tube bundle. The R and D undertaken in France on this subject is presented. (author). 11 refs, 10 figs

  14. Improved biosensor-based detection system

    DEFF Research Database (Denmark)

    2015-01-01

    Described is a new biosensor-based detection system for effector compounds, useful for in vivo applications in e.g. screening and selecting of cells which produce a small molecule effector compound or which take up a small molecule effector compound from its environment. The detection system...... comprises a protein or RNA-based biosensor for the effector compound which indirectly regulates the expression of a reporter gene via two hybrid proteins, providing for fewer false signals or less 'noise', tuning of sensitivity or other advantages over conventional systems where the biosensor directly...

  15. A cable detection lidar system for helicopters

    Science.gov (United States)

    Grossmann, Benoist; Capbern, Alain; Defour, Martin; Fertala, Remi

    1992-01-01

    Helicopters in low-level flight are endangered by power lines or telephone wires, especially when flying at night and under poor visibility conditions. In order to prevent 'wire strike', Thomson has developed a lidar system consisting of a pulsed diode laser emitting in the near infrared region (lambda = 0.9 microns). The HOWARD (Helicopter Obstacle Warning and Detection) System utilizes a high repetition rate diode laser (PRE = 20 KHz) along with counter-rotating prisms for laser beam deflection with a total field of view of 30 degrees. This system was successfully field tested in 1991. HOWARD can detect one inch wires at ranges up to 200 meters. We are presently in the process of developing a flyable compact lidar system capable of detection ranges in the order of 400 meters.

  16. Network Intrusion Detection System using Apache Storm

    Directory of Open Access Journals (Sweden)

    Muhammad Asif Manzoor

    2017-06-01

    Full Text Available Network security implements various strategies for the identification and prevention of security breaches. Network intrusion detection is a critical component of network management for security, quality of service and other purposes. These systems allow early detection of network intrusion and malicious activities; so that the Network Security infrastructure can react to mitigate these threats. Various systems are proposed to enhance the network security. We are proposing to use anomaly based network intrusion detection system in this work. Anomaly based intrusion detection system can identify the new network threats. We also propose to use Real-time Big Data Stream Processing Framework, Apache Storm, for the implementation of network intrusion detection system. Apache Storm can help to manage the network traffic which is generated at enormous speed and size and the network traffic speed and size is constantly increasing. We have used Support Vector Machine in this work. We use Knowledge Discovery and Data Mining 1999 (KDD’99 dataset to test and evaluate our proposed solution.

  17. Fault detection and isolation for complex system

    Science.gov (United States)

    Jing, Chan Shi; Bayuaji, Luhur; Samad, R.; Mustafa, M.; Abdullah, N. R. H.; Zain, Z. M.; Pebrianti, Dwi

    2017-07-01

    Fault Detection and Isolation (FDI) is a method to monitor, identify, and pinpoint the type and location of system fault in a complex multiple input multiple output (MIMO) non-linear system. A two wheel robot is used as a complex system in this study. The aim of the research is to construct and design a Fault Detection and Isolation algorithm. The proposed method for the fault identification is using hybrid technique that combines Kalman filter and Artificial Neural Network (ANN). The Kalman filter is able to recognize the data from the sensors of the system and indicate the fault of the system in the sensor reading. Error prediction is based on the fault magnitude and the time occurrence of fault. Additionally, Artificial Neural Network (ANN) is another algorithm used to determine the type of fault and isolate the fault in the system.

  18. Multilayer optical disc system using homodyne detection

    Science.gov (United States)

    Kurokawa, Takahiro; Ide, Tatsuro; Tanaka, Yukinobu; Watanabe, Koichi

    2014-09-01

    A write/read system using high-productivity multilayer optical discs was developed. The recording medium used in the system consists of planar recording layers and a separated guide layer, and is fabricated by web coating and lamination process. The recording layers in the medium are made of one-photon-absorption material, on which data can be recorded with a normal laser diode. The developed system is capable of focusing and tracking on the medium and amplifying readout signals by using phase-diversity homodyne detection. A highly layer-selective focusing method using homodyne detection was also proposed. This method obtains stable focus-error signals with clearly separated S-shaped curves even when layer spacing is quite narrow, causing large interlayer crosstalk. Writing on the medium and reading with the signal amplification effect of homodyne detection was demonstrated. In addition, the effectiveness of the method was experimentally evaluated.

  19. Expert system structures for fault detection in spaceborne power systems

    Science.gov (United States)

    Watson, Karan; Russell, B. Don; Hackler, Irene

    1988-01-01

    This paper presents an architecture for an expert system structure suitable for use with power system fault detection algorithms. The system described is not for the purpose of reacting to faults which have occurred, but rather for the purpose of performing on-line diagnostics and parameter evaluation to determine potential or incipient fault conditions. The system is also designed to detect high impedance or arcing faults which cannot be detected by conventional protection devices. This system is part of an overall monitoring computer hierarchy which would provide a full evaluation of the status of the power system and react to both incipient and catastrophic faults. An approximate hardware structure is suggested and software requirements are discussed. Modifications to CLIPS software, to capitalize on features offered by expert systems, are presented. It is suggested that such a system would have significant advantages over existing protection philosophy.

  20. System for particle concentration and detection

    Science.gov (United States)

    Morales, Alfredo M.; Whaley, Josh A.; Zimmerman, Mark D.; Renzi, Ronald F.; Tran, Huu M.; Maurer, Scott M.; Munslow, William D.

    2013-03-19

    A new microfluidic system comprising an automated prototype insulator-based dielectrophoresis (iDEP) triggering microfluidic device for pathogen monitoring that can eventually be run outside the laboratory in a real world environment has been used to demonstrate the feasibility of automated trapping and detection of particles. The system broadly comprised an aerosol collector for collecting air-borne particles, an iDEP chip within which to temporarily trap the collected particles and a laser and fluorescence detector with which to induce a fluorescence signal and detect a change in that signal as particles are trapped within the iDEP chip.

  1. Automatic Emergence Detection in Complex Systems

    Directory of Open Access Journals (Sweden)

    Eugene Santos

    2017-01-01

    Full Text Available Complex systems consist of multiple interacting subsystems, whose nonlinear interactions can result in unanticipated (emergent system events. Extant systems analysis approaches fail to detect such emergent properties, since they analyze each subsystem separately and arrive at decisions typically through linear aggregations of individual analysis results. In this paper, we propose a quantitative definition of emergence for complex systems. We also propose a framework to detect emergent properties given observations of its subsystems. This framework, based on a probabilistic graphical model called Bayesian Knowledge Bases (BKBs, learns individual subsystem dynamics from data, probabilistically and structurally fuses said dynamics into a single complex system dynamics, and detects emergent properties. Fusion is the central element of our approach to account for situations when a common variable may have different probabilistic distributions in different subsystems. We evaluate our detection performance against a baseline approach (Bayesian Network ensemble on synthetic testbeds from UCI datasets. To do so, we also introduce a method to simulate and a metric to measure discrepancies that occur with shared/common variables. Experiments demonstrate that our framework outperforms the baseline. In addition, we demonstrate that this framework has uniform polynomial time complexity across all three learning, fusion, and reasoning procedures.

  2. Microcomputer-based video motion detection system

    International Nuclear Information System (INIS)

    Howington, L.C.

    1979-01-01

    This system was developed to enhance the volumetric intrusion detection capability of the Oak Ridge Y-12 Plant's security program. Not only does the system exhibit an extended range of detection over present infrared, microwave, and ultrasonic devices, it also provides an instantaneous assessment capability by providing the operator with a closed-circuit television (CCTV) image of the alarm scene as soon as motion is detected. The system consists of a custom-built, microcomputer-based, video processor which analyzes the signals received from a network of video cameras. The operator can view the camera images as they are displayed on a CCTV monitor while alarm scenes are displayed on a second monitor. Motion is detected by digitizing and comparing successive video frames and making an alarm decision based on the degree of mismatch. The software-based nature of the microcomputer lends a great deal of flexibility and adaptability in making the alarm decision. Alarm decision variables which are easily adjusted through software are the percent change in gray level required to label a pixel (picture element) as suspect, the number of suspect pixels required to generate an alarm, the pixel pattern to be sampled from the image, and the rate at which a new reference frame is taken. The system is currently being evaluated in a warehouse for potential application in several areas of the Plant. This paper discusses the hardware and software design of the system as well as problems encountered in its implementation and results obtained

  3. Radiation Detection and Dual-Energy X-Ray Imaging for Port Security

    Energy Technology Data Exchange (ETDEWEB)

    Pashby, J. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Glenn, S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Divin, C. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Martz, H. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-08-09

    Millions of cargo containers are transported across the United States border annually and are inspected for illicit radioactive material and contraband using a combination of passive radiation portal monitors (RPM) and high energy X-ray non-intrusive inspection (NII) systems. As detection performance is expected to vary with the material composition of cargo, characterizing the types of material present in cargo is important to national security. This work analyzes the passive radiation and dual energy radiography signatures from on RPM and two NII system, respectively. First, the cargos were analyzed to determine their ability to attenuate emissions from an embedded radioactive source. Secondly, dual-energy X-ray discrimination was used to determine the material composition and density of the cargos.

  4. Egg weight detection on machine vision system

    Science.gov (United States)

    Cen, Yike; Ying, Yibin; Rao, Xiuqin

    2006-10-01

    A machine vision system for egg weight detection was developed. Egg image was grabbed by a CCD camera and a frame grabber. An indicator composed of R, G, B intensity was used for image segmentation. A series of algorithms were developed to evaluate egg's vertical diameter, maximal horizontal diameter, upper horizontal diameter and nether horizontal diameter. Based on extracted four size features of vertical and maximal/upper/nether horizontal diameter, a regression model between egg's weight and its size was established using SAS, which was used to detect egg's weight. The experiment results indicated that, for egg weight detection on the machine vision system, the correlative coefficient of the regression model was 0.9781 and the absolute error was no more than +/-3 g, which would be lower work load on human graders and an increased flexibility in the egg quality control process in egg's industrialization.

  5. Statistics of multi-tube detecting systems

    International Nuclear Information System (INIS)

    Grau Carles, P.; Grau Malonda, A.

    1994-01-01

    In this paper three new statistical theorems are demonstrated and applied. These theorems simplify very much the obtention of the formulae to compute the counting efficiency when the detection system is formed by several photomultipliers associated in coincidence and sume. These theorems are applied to several photomultiplier arrangements in order to show their potential and the application. way

  6. An FPGA-Based People Detection System

    Directory of Open Access Journals (Sweden)

    James J. Clark

    2005-05-01

    Full Text Available This paper presents an FPGA-based system for detecting people from video. The system is designed to use JPEG-compressed frames from a network camera. Unlike previous approaches that use techniques such as background subtraction and motion detection, we use a machine-learning-based approach to train an accurate detector. We address the hardware design challenges involved in implementing such a detector, along with JPEG decompression, on an FPGA. We also present an algorithm that efficiently combines JPEG decompression with the detection process. This algorithm carries out the inverse DCT step of JPEG decompression only partially. Therefore, it is computationally more efficient and simpler to implement, and it takes up less space on the chip than the full inverse DCT algorithm. The system is demonstrated on an automated video surveillance application and the performance of both hardware and software implementations is analyzed. The results show that the system can detect people accurately at a rate of about 2.5 frames per second on a Virtex-II 2V1000 using a MicroBlaze processor running at 75 MHz, communicating with dedicated hardware over FSL links.

  7. The deep sea Acoustic Detection system AMADEUS

    International Nuclear Information System (INIS)

    Naumann, Christopher Lindsay

    2008-01-01

    As a part of the ANTARES neutrino telescope, the AMADEUS (ANTARES Modules for Acoustic Detection Under the Sea) system is an array of acoustical sensors designed to investigate the possibilities of acoustic detection of ultra-high energy neutrinos in the deep sea. The complete system will comprise a total of 36 acoustic sensors in six clusters on two of the ANTARES detector lines. With an inter-sensor spacing of about one metre inside the clusters and between 15 and 340 metres between the different clusters, it will cover a wide range of distances as will as provide a considerable lever arm for point source triangulation. Three of these clusters have already been deployed in 2007 and have been in operation since, currently yielding around 2GB of acoustic data per day. The remaining three clusters are scheduled to be deployed in May 2008 together with the final ANTARES detector line. Apart from proving the feasibility of operating an acoustic detection system in the deep sea, the main aim of this project is an in-depth survey of both the acoustic properties of the sea water and the acoustic background present at the detector site. It will also serve as a platform for the development and refinement of triggering, filtering and reconstruction algorithms for acoustic particle detection. In this presentation, a description of the acoustic sensor and read-out system is given, together with examples for the reconstruction and evaluation of the acoustic data.

  8. Detection of cardiovascular anomalies: Hybrid systems approach

    KAUST Repository

    Ledezma, Fernando

    2012-06-06

    In this paper, we propose a hybrid interpretation of the cardiovascular system. Based on a model proposed by Simaan et al. (2009), we study the problem of detecting cardiovascular anomalies that can be caused by variations in some physiological parameters, using an observerbased approach. We present the first numerical results obtained. © 2012 IFAC.

  9. Statistics of multi-tube detecting systems

    International Nuclear Information System (INIS)

    Grau Carles, P.; Grau Malonda, A.

    1994-01-01

    In this paper three new statistical theorems are demonstrated and applied. These theorems simplify very much the obtention of the formulae to compute the counting efficiency when the detection system is formed by several photomultipliers associated in coincidence and sum. These theorems are applied to several photomultiplier arrangements in order to show their potential and the application way. (Author) 6 refs

  10. Multi-sensor explosive detection system

    International Nuclear Information System (INIS)

    Gozani, T.; Shea, P.M.; Sawa, Z.P.

    1992-01-01

    This patent describes an explosive detection system. It comprises a source of neutrons; a detector array comprising a plurality of gamma ray detectors, each of the gamma ray detectors providing a detection signal in the event a gamma ray is captured by the detector, and at least one neutron detector, the neutron detector providing a neutron detection signal in the event a neutron is captured by the neutron detector; means for irradiating an object being examined with neutrons from the neutron source and for positioning the detector array relative to the object so that gamma rays emitted from the elements within the object as a result of the neutron irradiation are detected by the gamma ray detectors of the detector array; and parallel distributed processing means responsive to the detection signals of the detector array for discriminating between objects carrying explosives and objects not carrying explosives, the parallel distributed processing means including an artificial neural system (ANS), the ANS having a parallel network of processors, each processor of the parallel network of processors, each processor of the parallel network of processors including means for receiving at least one input signal, and means for generating an output signal as a function of the at least one input signal

  11. 46 CFR 108.405 - Fire detection system.

    Science.gov (United States)

    2010-10-01

    ...) Each fire detection system must be divided into zones to limit the area covered by any particular alarm... 46 Shipping 4 2010-10-01 2010-10-01 false Fire detection system. 108.405 Section 108.405 Shipping... EQUIPMENT Fire Extinguishing Systems § 108.405 Fire detection system. (a) Each fire detection system and...

  12. Chemical detection system and related methods

    Energy Technology Data Exchange (ETDEWEB)

    Caffrey, Augustine J.; Chichester, David L.; Egger, Ann E.; Krebs, Kenneth M.; Seabury, Edward H.; Van Siclen, Clinton D.; Wharton, C. Jayson; Zabriskie, John M.

    2017-06-27

    A chemical detection system includes a frame, an emitter coupled to the frame, and a detector coupled to the frame proximate the emitter. The system also includes a shielding system coupled to the frame and positioned at least partially between the emitter and the detector, wherein the frame positions a sensing surface of the detector in a direction substantially parallel to a plane extending along a front portion of the frame. A method of analyzing composition of a suspect object includes directing neutrons at the object, detecting gamma rays emitted from the object, and communicating spectrometer information regarding the gamma rays. The method also includes presenting a GUI to a user with a dynamic status of an ongoing neutron spectroscopy process. The dynamic status includes a present confidence for a plurality of compounds being present in the suspect object responsive to changes in the spectrometer information during the ongoing process.

  13. Development of a portable radon detection system

    International Nuclear Information System (INIS)

    Allen, J.W.

    1976-09-01

    The presence of radon-222 in soil gas and ground water can indicate the existence of nearby uranium deposits even when heavy overburdens completely absorb the associated gamma radiation. Techniques to detect and measure radon have evolved during the past several years to the point where radon prospecting is routinely employed in a number of countries. A program to develop and field test a prototype system for measuring radon from soil gas and water is described. A prototype system employing a flow through scintillation detector was designed and constructed, utilizing standard commercial components, to provide a fieldworthy unit for testing the system concepts. Laboratory and preliminary field tests of this unit indicate that it can detect anomalous radon levels of less than 10 picoCuries per liter (pCi/l) in soil gas and ground water

  14. Leak rate measurements and detection systems

    International Nuclear Information System (INIS)

    Kupperman, D.; Shack, W.J.; Claytor, T.

    1984-01-01

    A research program is under way at the Argonne National Laboratory under the sponsorship of the USNRC Office of Nuclear Regulatory Research to evaluate and develop improved leak detection systems. The primary focus of the work has been on acoustic emission detection of leaks. Leaks from artificial flaws, laboratory-generated IGSCCs and thermal fatigue cracks, and field-induced intergranular stress corrosion cracks (IGSCCs) from reactor piping have been examined. The effects of pressure, temperature, and leak rate and geometry on the acoustic signature are under study. The use of cross-correlation techniques for leak location and pattern recognition and autocorrelation for source discrimination is also being considered

  15. Tools for Detecting Causality in Space Systems

    Science.gov (United States)

    Johnson, J.; Wing, S.

    2017-12-01

    Complex systems such as the solar and magnetospheric envivonment often exhibit patterns of behavior that suggest underlying organizing principles. Causality is a key organizing principle that is particularly difficult to establish in strongly coupled nonlinear systems, but essential for understanding and modeling the behavior of systems. While traditional methods of time-series analysis can identify linear correlations, they do not adequately quantify the distinction between causal and coincidental dependence. We discuss tools for detecting causality including: granger causality, transfer entropy, conditional redundancy, and convergent cross maps. The tools are illustrated by applications to magnetospheric and solar physics including radiation belt, Dst (a magnetospheric state variable), substorm, and solar cycle dynamics.

  16. Fault Detection for Quantized Networked Control Systems

    Directory of Open Access Journals (Sweden)

    Wei-Wei Che

    2013-01-01

    Full Text Available The fault detection problem in the finite frequency domain for networked control systems with signal quantization is considered. With the logarithmic quantizer consideration, a quantized fault detection observer is designed by employing a performance index which is used to increase the fault sensitivity in finite frequency domain. The quantized measurement signals are dealt with by utilizing the sector bound method, in which the quantization error is treated as sector-bounded uncertainty. By using the Kalman-Yakubovich-Popov (GKYP Lemma, an iterative LMI-based optimization algorithm is developed for designing the quantized fault detection observer. And a numerical example is given to illustrate the effectiveness of the proposed method.

  17. Handheld microwave bomb-detecting imaging system

    Science.gov (United States)

    Gorwara, Ashok; Molchanov, Pavlo

    2017-05-01

    Proposed novel imaging technique will provide all weather high-resolution imaging and recognition capability for RF/Microwave signals with good penetration through highly scattered media: fog, snow, dust, smoke, even foliage, camouflage, walls and ground. Image resolution in proposed imaging system is not limited by diffraction and will be determined by processor and sampling frequency. Proposed imaging system can simultaneously cover wide field of view, detect multiple targets and can be multi-frequency, multi-function. Directional antennas in imaging system can be close positioned and installed in cell phone size handheld device, on small aircraft or distributed around protected border or object. Non-scanning monopulse system allows dramatically decrease in transmitting power and at the same time provides increased imaging range by integrating 2-3 orders more signals than regular scanning imaging systems.

  18. Intrusion detection systems: complement to firewall security system ...

    African Journals Online (AJOL)

    Intrusion detection systems: complement to firewall security system. ... Information Impact: Journal of Information and Knowledge Management. Journal Home ... If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

  19. Clone tag detection in distributed RFID systems.

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam; Abawajy, Jemal H

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy.

  20. Clone tag detection in distributed RFID systems

    Science.gov (United States)

    Kamaludin, Hazalila; Mahdin, Hairulnizam

    2018-01-01

    Although Radio Frequency Identification (RFID) is poised to displace barcodes, security vulnerabilities pose serious challenges for global adoption of the RFID technology. Specifically, RFID tags are prone to basic cloning and counterfeiting security attacks. A successful cloning of the RFID tags in many commercial applications can lead to many serious problems such as financial losses, brand damage, safety and health of the public. With many industries such as pharmaceutical and businesses deploying RFID technology with a variety of products, it is important to tackle RFID tag cloning problem and improve the resistance of the RFID systems. To this end, we propose an approach for detecting cloned RFID tags in RFID systems with high detection accuracy and minimal overhead thus overcoming practical challenges in existing approaches. The proposed approach is based on consistency of dual hash collisions and modified count-min sketch vector. We evaluated the proposed approach through extensive experiments and compared it with existing baseline approaches in terms of execution time and detection accuracy under varying RFID tag cloning ratio. The results of the experiments show that the proposed approach outperforms the baseline approaches in cloned RFID tag detection accuracy. PMID:29565982

  1. The synchronous active neutron detection assay system

    International Nuclear Information System (INIS)

    Pickrell, M.M.; Kendall, P.K.

    1994-01-01

    We have begun to develop a novel technique for active neutron assay of fissile material in spent nuclear fuel. This approach will exploit a 14-MeV neutron generator developed by Schlumberger. The technique, termed synchronous active neutron detection (SAND), follows a method used routinely in other branches of physics to detect very small signals in presence of large backgrounds. Synchronous detection instruments are widely available commercially and are termed ''lock-in'' amplifiers. We have implemented a digital lock-in amplifier in conjunction with the Schlumberger neutron generator to explore the possibility of synchronous detection with active neutrons. The Schlumberger system can operate at up to a 50% duty factor, in effect, a square wave of neutron yield. Results are preliminary but promising. The system is capable of resolving the fissile material contained in a small fraction of the fuel rods in a cold fuel assembly; it also appears resilient to background neutron interference. The interrogating neutrons appear to be non-thermal and penetrating. Work remains to fully explore relevant physics and optimize instrument design

  2. A System for Traffic Violation Detection

    Directory of Open Access Journals (Sweden)

    Nourdine Aliane

    2014-11-01

    Full Text Available This paper describes the framework and components of an experimental platform for an advanced driver assistance system (ADAS aimed at providing drivers with a feedback about traffic violations they have committed during their driving. The system is able to detect some specific traffic violations, record data associated to these faults in a local data-base, and also allow visualization of the spatial and temporal information of these traffic violations in a geographical map using the standard Google Earth tool. The test-bed is mainly composed of two parts: a computer vision subsystem for traffic sign detection and recognition which operates during both day and nighttime, and an event data recorder (EDR for recording data related to some specific traffic violations. The paper covers firstly the description of the hardware architecture and then presents the policies used for handling traffic violations.

  3. Perimeter intrusion detection and assessment system

    Energy Technology Data Exchange (ETDEWEB)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed.

  4. Multichannel Digital Emulator of Radiation Detection Systems

    International Nuclear Information System (INIS)

    Abba, A.; Caponio, F.; Geraci, A.

    2013-06-01

    A digital system for emulating in real time signals from generic setups for radiation detection is presented. The instrument is not a pulse generator of recorded shapes but a synthesizer of random pulses compliant to programmable statistics for energy and occurrence time. Completely programmable procedures for emulation of noise, disturbances and reference level variation can be implemented. The instrument has been realized and fully tested. (authors)

  5. Perimeter intrusion detection and assessment system

    International Nuclear Information System (INIS)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-11-01

    To obtain an effective perimeter intrusion detection system requires careful sensor selection, procurement, and installation. The selection process involves a thorough understanding of the unique site features and how these features affect the performance of each type of sensor. It is necessary to develop procurement specifications to establish acceptable sensor performance limits. Careful explanation and inspection of critical installation dimensions is required during on-site construction. The implementation of these activities at a particular site is discussed

  6. Detecting New Planets in Transiting Systems

    OpenAIRE

    Steffen, Jason H.

    2006-01-01

    I present an initial investigation into a new planet detection technique that uses the transit timing of a known, transiting planet. The transits of a solitary planet orbiting a star occur at equally spaced intervals in time. If a second planet is present, dynamical interactions within the system will cause the time interval between transits to vary. These transit time variations can be used to infer the orbital elements of the unseen, perturbing planet. I show analytic expressions for the am...

  7. An Automated Flying-Insect Detection System

    Science.gov (United States)

    Vann, Timi; Andrews, Jane C.; Howell, Dane; Ryan, Robert

    2007-01-01

    An automated flying-insect detection system (AFIDS) was developed as a proof-of-concept instrument for real-time detection and identification of flying insects. This type of system has use in public health and homeland-security decision support, agriculture and military pest management, and/or entomological research. Insects are first lured into the AFIDS integrated sphere by insect attractants. Once inside the sphere, the insect s wing beats cause alterations in light intensity that is detected by a photoelectric sensor. Following detection, the insects are encouraged (with the use of a small fan) to move out of the sphere and into a designated insect trap where they are held for taxonomic identification or serological testing. The acquired electronic wing-beat signatures are preprocessed (Fourier transformed) in real time to display a periodic signal. These signals are sent to the end user where they are graphically. All AFIDS data are preprocessed in the field with the use of a laptop computer equipped with LabVIEW. The AFIDS software can be programmed to run continuously or at specific time intervals when insects are prevalent. A special DC-restored transimpedance amplifier reduces the contributions of low-frequency background light signals, and affords approximately two orders of magnitude greater AC gain than conventional amplifiers. This greatly increases the signal-to-noise ratio and enables the detection of small changes in light intensity. The AFIDS light source consists of high-intensity Al-GaInP light-emitting diodes (LEDs). The AFIDS circuitry minimizes brightness fluctuations in the LEDs and when integrated with an integrating sphere, creates a diffuse uniform light field. The insect wing beats isotropically scatter the diffuse light in the sphere and create wing-beat signatures that are detected by the sensor. This configuration minimizes variations in signal associated with insect flight orientation. Preliminary data indicate that AFIDS has

  8. In-Situ Wire Damage Detection System

    Science.gov (United States)

    Williams, Martha K. (Inventor); Roberson, Luke B. (Inventor); Tate, Lanetra C. (Inventor); Smith, Trent M. (Inventor); Gibson, Tracy L. (Inventor); Jolley, Scott T. (Inventor); Medelius, Pedro J. (Inventor)

    2014-01-01

    An in-situ system for detecting damage in an electrically conductive wire. The system includes a substrate at least partially covered by a layer of electrically conductive material forming a continuous or non-continuous electrically conductive layer connected to an electrical signal generator adapted to delivering electrical signals to the electrically conductive layer. Data is received and processed to identify damage to the substrate or electrically conductive layer. The electrically conductive material may include metalized carbon fibers, a thin metal coating, a conductive polymer, carbon nanotubes, metal nanoparticles or a combination thereof.

  9. Optimum electromagnetic weapons detection system. [Airport security

    Energy Technology Data Exchange (ETDEWEB)

    Capots, L.H.; Gregory, W.D.; George, J.P.

    1973-09-01

    An optimized weapons detection system based on the ''active'' or ''a.c. susceptibility'' principle is described. For such uses as airport security the method should be capable of screening both passengers and hand baggage simultaneously. This detector uses the latest basic research results obtained on studies of a.c. susceptibility of metals, and identifies weapons characteristics using those results obtained from identifying chemical spectra with search routines, employing minicomputers. The detector is capable of characterizing both magnetic and non-magnetic weapons with a precision otherwise presently unavailable. System design and test data are presented.

  10. System and method for detecting gas

    Science.gov (United States)

    Chow, Oscar Ken; Moulthrop, Lawrence Clinton; Dreier, Ken Wayne; Miller, Jacob Andrew

    2010-03-16

    A system to detect a presence of a specific gas in a mixture of gaseous byproducts comprising moisture vapor is disclosed. The system includes an electrochemical cell, a transport to deliver the mixture of gaseous byproducts from the electrochemical cell, a gas sensor in fluid communication with the transport, the sensor responsive to a presence of the specific gas to generate a signal corresponding to a concentration of the specific gas, and a membrane to prevent transmission of liquid moisture, the membrane disposed between the transport and the gas sensor.

  11. Incipient fault detection and power system protection for spaceborne systems

    Science.gov (United States)

    Russell, B. Don; Hackler, Irene M.

    1987-01-01

    A program was initiated to study the feasibility of using advanced terrestrial power system protection techniques for spacecraft power systems. It was designed to enhance and automate spacecraft power distribution systems in the areas of safety, reliability and maintenance. The proposed power management/distribution system is described as well as security assessment and control, incipient and low current fault detection, and the proposed spaceborne protection system. It is noted that the intelligent remote power controller permits the implementation of digital relaying algorithms with both adaptive and programmable characteristics.

  12. Automating Vendor Fraud Detection in Enterprise Systems

    Directory of Open Access Journals (Sweden)

    Kishore Singh

    2013-06-01

    Full Text Available Fraud is a multi-billion dollar industry that continues to grow annually. Many organisations are poorly prepared to prevent and detect fraud. Fraud detection strategies are intended to quickly and efficiently identify fraudulent activities that circumvent preventative measures. In this paper we adopt a Design-Science methodological framework to develop a model for detection of vendor fraud based on analysis of patterns or signatures identified in enterprise system audit trails. The concept is demonstrated be developing prototype software. Verification of the prototype is achieved by performing a series of experiments. Validation is achieved by independent reviews from auditing practitioners. Key findings of this study are: i automating routine data analytics improves auditor productivity and reduces time taken to identify potential fraud, and ii visualisations assist in promptly identifying potentially fraudulent user activities. The study makes the following contributions: i a model for proactive fraud detection, ii methods for visualising user activities in transaction data, iii a stand-alone MCL-based prototype.

  13. A complete low cost radon detection system

    International Nuclear Information System (INIS)

    Bayrak, A.; Barlas, E.; Emirhan, E.; Kutlu, Ç.; Ozben, C.S.

    2013-01-01

    Monitoring the 222 Rn activity through the 1200 km long Northern Anatolian fault line, for the purpose of earthquake precursory, requires large number of cost effective radon detectors. We have designed, produced and successfully tested a low cost radon detection system (a radon monitor). In the detector circuit of this monitor, First Sensor PS100-7-CER-2 windowless PIN photodiode and a custom made transempedence/shaping amplifier were used. In order to collect the naturally ionized radon progeny to the surface of the PIN photodiode, a potential of 3500 V was applied between the conductive hemi-spherical shell and the PIN photodiode. In addition to the count rate of the radon progeny, absolute pressure, humidity and temperature were logged during the measurements. A GSM modem was integrated to the system for transferring the measurements from the remote locations to the data process center. - Author-Highlights: • Low cost radon detection. • Integrated GSM modem for early warning of radon anomalies. • Radon detection in environment

  14. Collision Detection for Underwater ROV Manipulator Systems.

    Science.gov (United States)

    Sivčev, Satja; Rossi, Matija; Coleman, Joseph; Omerdić, Edin; Dooly, Gerard; Toal, Daniel

    2018-04-06

    Work-class ROVs equipped with robotic manipulators are extensively used for subsea intervention operations. Manipulators are teleoperated by human pilots relying on visual feedback from the worksite. Operating in a remote environment, with limited pilot perception and poor visibility, manipulator collisions which may cause significant damage are likely to happen. This paper presents a real-time collision detection algorithm for marine robotic manipulation. The proposed collision detection mechanism is developed, integrated into a commercial ROV manipulator control system, and successfully evaluated in simulations and experimental setup using a real industry standard underwater manipulator. The presented collision sensing solution has a potential to be a useful pilot assisting tool that can reduce the task load, operational time, and costs of subsea inspection, repair, and maintenance operations.

  15. 46 CFR 108.413 - Fusible element fire detection system.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 4 2010-10-01 2010-10-01 false Fusible element fire detection system. 108.413 Section... UNITS DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.413 Fusible element fire detection system. (a) A fusible element fire detection system may be installed. (b) The arrangements for the system...

  16. Intelligent Flamefinder Detection and Alert System (IFDAS), Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Current hydrogen flame detection systems exhibit shortcomings ranging from limited detection range, to localization inaccuracy, limited sensitivity, false alarms,...

  17. Fault detection and diagnosis of photovoltaic systems

    Science.gov (United States)

    Wu, Xing

    The rapid growth of the solar industry over the past several years has expanded the significance of photovoltaic (PV) systems. One of the primary aims of research in building-integrated PV systems is to improve the performance of the system's efficiency, availability, and reliability. Although much work has been done on technological design to increase a photovoltaic module's efficiency, there is little research so far on fault diagnosis for PV systems. Faults in a PV system, if not detected, may not only reduce power generation, but also threaten the availability and reliability, effectively the "security" of the whole system. In this paper, first a circuit-based simulation baseline model of a PV system with maximum power point tracking (MPPT) is developed using MATLAB software. MATLAB is one of the most popular tools for integrating computation, visualization and programming in an easy-to-use modeling environment. Second, data collection of a PV system at variable surface temperatures and insolation levels under normal operation is acquired. The developed simulation model of PV system is then calibrated and improved by comparing modeled I-V and P-V characteristics with measured I--V and P--V characteristics to make sure the simulated curves are close to those measured values from the experiments. Finally, based on the circuit-based simulation model, a PV model of various types of faults will be developed by changing conditions or inputs in the MATLAB model, and the I--V and P--V characteristic curves, and the time-dependent voltage and current characteristics of the fault modalities will be characterized for each type of fault. These will be developed as benchmark I-V or P-V, or prototype transient curves. If a fault occurs in a PV system, polling and comparing actual measured I--V and P--V characteristic curves with both normal operational curves and these baseline fault curves will aid in fault diagnosis.

  18. Nuclear fission as a tool to contrast the contraband of special ...

    Indian Academy of Sciences (India)

    -detect uranium ... uranium sample placed in front of the detector unit. The box containing the EADS-. SODERN .... whereas the U samples cannot be discriminated from other heavy metals such as Pb that exhibit featureless coincident γ-ray ...

  19. Fast fault detection for power distribution systems

    OpenAIRE

    Öhrström, Magnus

    2003-01-01

    The main topic of this licentiate thesis is fast faultdetection. The thesis summaries the work performed in theproject“Fast fault detection for distributionsystems”. In the first chapters of the thesis the term“fast”is used in a general manner. The term is laterdefined based upon considerations and conclusions made in thefirst chapters and then related to a specific time. To be able to understand and appreciate why fast faultdetection is necessary, power system faults and theirconsequences ar...

  20. Acoustic leak detection in piping systems, 4

    International Nuclear Information System (INIS)

    Kitajima, Akira; Naohara, Nobuyuki; Aihara, Akihiko

    1983-01-01

    To monitor a high-pressure piping of nuclear power plants, a possibility of acoustic leak detection method has been experimentally studied in practical field tests and laboratory tests. Characteristics of background noise in field test and the results of experiment are summarized as follows: (1) The level of background noise in primary loop (PWR) was almost constant under actual plant operation. But it is possible that it rises at the condition of the pressure in primary loop. (2) Based on many experience of laboratory tests and practical field tests. The leak monitoring system for practical field was designed and developed. To improve the reliability, a judgment of leak on this system is used three factors of noise level, duration time of phenomena and frequency spectrum of noise signal emitted from the leak point. (author)

  1. Method and system for detecting explosives

    Science.gov (United States)

    Reber, Edward L [Idaho Falls, ID; Jewell, James K [Idaho Falls, ID; Rohde, Kenneth W [Idaho Falls, ID; Seabury, Edward H [Idaho Falls, ID; Blackwood, Larry G [Idaho Falls, ID; Edwards, Andrew J [Idaho Falls, ID; Derr, Kurt W [Idaho Falls, ID

    2009-03-10

    A method of detecting explosives in a vehicle includes providing a first rack on one side of the vehicle, the rack including a neutron generator and a plurality of gamma ray detectors; providing a second rack on another side of the vehicle, the second rack including a neutron generator and a plurality of gamma ray detectors; providing a control system, remote from the first and second racks, coupled to the neutron generators and gamma ray detectors; using the control system, causing the neutron generators to generate neutrons; and performing gamma ray spectroscopy on spectra read by the gamma ray detectors to look for a signature indicative of presence of an explosive. Various apparatus and other methods are also provided.

  2. The Environics Mobile CBRN Detection System

    International Nuclear Information System (INIS)

    Jaakkola, T.

    2007-01-01

    Environics Oy has developed a novel monitoring system for detection of Chemical, Biological, Radiological and Nuclear compounds. The system is portable and rapidly installed into a monitoring location. It will allow real time monitoring and alarming of: Chemical Warfare agents (Nerve, Blister, Blood), Toxic industrial chemicals (General toxic-alarm), Biological warfare agents (Bacteria, viruses, toxins), Radiological agents such as alpha and gamma radiation. Monitoring Station makes continuously measurements. Sensor data is processed and stored to local database by the Master Module (MM) that is located within the station. The MM sends the data to the Control Centers by using communication network. The Control Center receives and logs the data and shows it in real time on a map interface. The status of each sensor and detector can be seen in real time. (author)

  3. Simulation Model of Mobile Detection Systems

    International Nuclear Information System (INIS)

    Edmunds, T.; Faissol, D.; Yao, Y.

    2009-01-01

    In this paper, we consider a mobile source that we attempt to detect with man-portable, vehicle-mounted or boat-mounted radiation detectors. The source is assumed to transit an area populated with these mobile detectors, and the objective is to detect the source before it reaches a perimeter. We describe a simulation model developed to estimate the probability that one of the mobile detectors will come in to close proximity of the moving source and detect it. We illustrate with a maritime simulation example. Our simulation takes place in a 10 km by 5 km rectangular bay patrolled by boats equipped with 2-inch x 4-inch x 16-inch NaI detectors. Boats to be inspected enter the bay and randomly proceed to one of seven harbors on the shore. A source-bearing boat enters the mouth of the bay and proceeds to a pier on the opposite side. We wish to determine the probability that the source is detected and its range from target when detected. Patrol boats select the nearest in-bound boat for inspection and initiate an intercept course. Once within an operational range for the detection system, a detection algorithm is started. If the patrol boat confirms the source is not present, it selects the next nearest boat for inspection. Each run of the simulation ends either when a patrol successfully detects a source or when the source reaches its target. Several statistical detection algorithms have been implemented in the simulation model. First, a simple k-sigma algorithm, which alarms with the counts in a time window exceeds the mean background plus k times the standard deviation of background, is available to the user. The time window used is optimized with respect to the signal-to-background ratio for that range and relative speed. Second, a sequential probability ratio test [Wald 1947] is available, and configured in this simulation with a target false positive probability of 0.001 and false negative probability of 0.1. This test is utilized when the mobile detector maintains

  4. 46 CFR 108.404 - Selection of fire detection system.

    Science.gov (United States)

    2010-10-01

    ... space. (b) The fire detection system must be designed to minimize false alarms. ... 46 Shipping 4 2010-10-01 2010-10-01 false Selection of fire detection system. 108.404 Section 108... DESIGN AND EQUIPMENT Fire Extinguishing Systems § 108.404 Selection of fire detection system. (a) If a...

  5. Near-field millimeter-wave imaging for weapon detection

    Energy Technology Data Exchange (ETDEWEB)

    Sheen, D.M.; McMakin, D.L.; Collins, H.D.; Hall, T.E.

    1992-11-01

    Various millimeter-wave imaging systems capable of imaging through clothing for the detection of contraband metal, plastic, or ceramic weapons, have been developed at PNL. Two dimensional scanned holographic systems, developed at 35, 90, and 350 GHz, are used to obtain high resolution images of metal and plastic targets concealed by clothing. Coherent single-frequency amplitude and phase data, which is gathered over a two-dimensional scanned aperture, is reconstructed to the target plane using a holographic wavefront reconstruction technique. Practical weapon detection systems require high-speed scanning. To achieve this goal, a 35 GHz linear sequentially switched array has been built and integrated into a high speed linear scanner. This system poses special challenges on calibration / signal processing of the holographic system. Further, significant improvements in speed are required to achieve real time operation. Toward this goal, a wideband scanned system which allows for a two-dimensional image formation from a one-dimensional scanned (or array) system has been developed . Signal / image processing techniques developed and implemented for this technique are a variation on conventional synthetic aperture radar (SAR) techniques which eliminate far-field and narrow bandwidth requirements. Performance of this technique is demonstrated with imaging results obtained from a K{sub a}-band system.

  6. Near-field millimeter-wave imaging for weapon detection

    Energy Technology Data Exchange (ETDEWEB)

    Sheen, D.M.; McMakin, D.L.; Collins, H.D.; Hall, T.E.

    1992-11-01

    Various millimeter-wave imaging systems capable of imaging through clothing for the detection of contraband metal, plastic, or ceramic weapons, have been developed at PNL. Two dimensional scanned holographic systems, developed at 35, 90, and 350 GHz, are used to obtain high resolution images of metal and plastic targets concealed by clothing. Coherent single-frequency amplitude and phase data, which is gathered over a two-dimensional scanned aperture, is reconstructed to the target plane using a holographic wavefront reconstruction technique. Practical weapon detection systems require high-speed scanning. To achieve this goal, a 35 GHz linear sequentially switched array has been built and integrated into a high speed linear scanner. This system poses special challenges on calibration / signal processing of the holographic system. Further, significant improvements in speed are required to achieve real time operation. Toward this goal, a wideband scanned system which allows for a two-dimensional image formation from a one-dimensional scanned (or array) system has been developed . Signal / image processing techniques developed and implemented for this technique are a variation on conventional synthetic aperture radar (SAR) techniques which eliminate far-field and narrow bandwidth requirements. Performance of this technique is demonstrated with imaging results obtained from a K[sub a]-band system.

  7. Smart sensor systems for outdoor intrusion detection

    International Nuclear Information System (INIS)

    Lynn, J.K.

    1988-01-01

    A major improvement in outdoor perimeter security system probability of detection (PD) and reduction in false alarm rate (FAR) and nuisance alarm rate (NAR) may be obtained by analyzing the indications immediately preceding an event which might be interpreted as an intrusion. Existing systems go into alarm after crossing a threshold. Very slow changes, which accumulate until the threshold is reached, may be assessed falsely as an intrusion. A hierarchial program has begun at Stellar to develop a modular, expandable Smart Sensor system which may be interfaced to most types of sensor and alarm reporting systems. A major upgrade to the SSI Test Site is in progress so that intrusions may be simulated in a controlled and repeatable manner. A test platform is being constructed which will operate in conduction with a mobile instrumentation center with CCTVB, lighting control, weather and data monitoring and remote control of the test platform and intrusion simulators. Additional testing was contracted with an independent test facility to assess the effects of severe winter weather conditions

  8. The design method and research status of vehicle detection system based on geomagnetic detection principle

    Science.gov (United States)

    Lin, Y. H.; Bai, R.; Qian, Z. H.

    2018-03-01

    Vehicle detection systems are applied to obtain real-time information of vehicles, realize traffic control and reduce traffic pressure. This paper reviews geomagnetic sensors as well as the research status of the vehicle detection system. Presented in the paper are also our work on the vehicle detection system, including detection algorithms and experimental results. It is found that the GMR based vehicle detection system has a detection accuracy up to 98% with a high potential for application in the road traffic control area.

  9. Optical fiber-applied radiation detection system

    International Nuclear Information System (INIS)

    Nishiura, Ryuichi; Uranaka, Yasuo; Izumi, Nobuyuki

    2001-01-01

    A technique to measure radiation by using plastic scintillation fibers doped radiation fluorescent (scintillator) to plastic optical fiber for a radiation sensor, was developed. The technique contains some superiority such as high flexibility due to using fibers, relatively easy large area due to detecting portion of whole of fibers, and no electromagnetic noise effect due to optical radiation detection and signal transmission. Measurable to wide range of and continuous radiation distribution along optical fiber cable at a testing portion using scintillation fiber and flight time method, the optical fiber-applied radiation sensing system can effectively monitor space radiation dose or apparatus operation condition monitoring. And, a portable type scintillation optical fiber body surface pollution monitor can measure pollution concentration of radioactive materials attached onto body surface by arranging scintillation fiber processed to a plate with small size and flexibility around a man to be tested. Here were described on outline and fundamental properties of various application products using these plastic scintillation fiber. (G.K.)

  10. Automatic system for detecting pornographic images

    Science.gov (United States)

    Ho, Kevin I. C.; Chen, Tung-Shou; Ho, Jun-Der

    2002-09-01

    Due to the dramatic growth of network and multimedia technology, people can more easily get variant information by using Internet. Unfortunately, it also makes the diffusion of illegal and harmful content much easier. So, it becomes an important topic for the Internet society to protect and safeguard Internet users from these content that may be encountered while surfing on the Net, especially children. Among these content, porno graphs cause more serious harm. Therefore, in this study, we propose an automatic system to detect still colour porno graphs. Starting from this result, we plan to develop an automatic system to search porno graphs or to filter porno graphs. Almost all the porno graphs possess one common characteristic that is the ratio of the size of skin region and non-skin region is high. Based on this characteristic, our system first converts the colour space from RGB colour space to HSV colour space so as to segment all the possible skin-colour regions from scene background. We also apply the texture analysis on the selected skin-colour regions to separate the skin regions from non-skin regions. Then, we try to group the adjacent pixels located in skin regions. If the ratio is over a given threshold, we can tell if the given image is a possible porno graph. Based on our experiment, less than 10% of non-porno graphs are classified as pornography, and over 80% of the most harmful porno graphs are classified correctly.

  11. Distributed gas detection system and method

    Science.gov (United States)

    Challener, William Albert; Palit, Sabarni; Karp, Jason Harris; Kasten, Ansas Matthias; Choudhury, Niloy

    2017-11-21

    A distributed gas detection system includes one or more hollow core fibers disposed in different locations, one or more solid core fibers optically coupled with the one or more hollow core fibers and configured to receive light of one or more wavelengths from a light source, and an interrogator device configured to receive at least some of the light propagating through the one or more solid core fibers and the one or more hollow core fibers. The interrogator device is configured to identify a location of a presence of a gas-of-interest by examining absorption of at least one of the wavelengths of the light at least one of the hollow core fibers.

  12. Introduction To Intrusion Detection System Review

    Directory of Open Access Journals (Sweden)

    Rajni Tewatia

    2015-05-01

    Full Text Available Abstract Security of a network is always an important issue. With the continuously growing network the basic security such as firewall virus scanner is easily deceived by modern attackers who are experts in using software vulnerabilities to achieve their goals. For preventing such attacks we need even smarter security mechanism which act proactively and intelligently. Intrusion Detection System is the solution of such requirement. Many techniques have been used to implement IDS. These technique basically used in the detector part of IDS such as Neural Network Clustering Pattern Matching Rule Based Fuzzy Logic Genetic Algorithms and many more. To improve the performance of an IDS these approaches may be used in combination to build a hybrid IDS so that benefits of two o more approaches may be combined.

  13. Systems and methods for detecting neutrons

    Science.gov (United States)

    Bross, Alan D.; Mellott, Kerry L.; Pla-Dalmau, Anna

    2005-08-09

    Systems and methods for detecting neutrons. One or more neutron-sensitive scintillators can be configured from a plurality of nano-sized particles, dopants and an extruded plastic material, such as polystyrene. The nano-sized particles can be compounded into the extruded plastic material with at least one dopant that permits the plastic material to scintillate. One or more plastic light collectors can be associated with a neutron-sensitive scintillator, such that the plastic light collector includes a central hole thereof. A wavelength-shifting fiber can then be located within the hole. The wavelength shifting (WLS) fiber absorbs scintillation light having a wavelength thereof and re-emits the light at a longer wavelength.

  14. Decision algorithms in fire detection systems

    Directory of Open Access Journals (Sweden)

    Ristić Jovan D.

    2011-01-01

    Full Text Available Analogue (and addressable fire detection systems enables a new quality in improving sensitivity to real fires and reducing susceptibility to nuisance alarm sources. Different decision algorithms types were developed with intention to improve sensitivity and reduce false alarm occurrence. At the beginning, it was free alarm level adjustment based on preset level. Majority of multi-criteria decision work was based on multi-sensor (multi-signature decision algorithms - using different type of sensors on the same location or, rather, using different aspects (level and rise of one sensor measured value. Our idea is to improve sensitivity and reduce false alarm occurrence by forming groups of sensors that work in similar conditions (same world side in the building, same or similar technology or working time. Original multi-criteria decision algorithms based on level, rise and difference of level and rise from group average are discussed in this paper.

  15. Liquid chromatography detection unit, system, and method

    Science.gov (United States)

    Derenzo, Stephen E.; Moses, William W.

    2015-10-27

    An embodiment of a liquid chromatography detection unit includes a fluid channel and a radiation detector. The radiation detector is operable to image a distribution of a radiolabeled compound as the distribution travels along the fluid channel. An embodiment of a liquid chromatography system includes an injector, a separation column, and a radiation detector. The injector is operable to inject a sample that includes a radiolabeled compound into a solvent stream. The position sensitive radiation detector is operable to image a distribution of the radiolabeled compound as the distribution travels along a fluid channel. An embodiment of a method of liquid chromatography includes injecting a sample that comprises radiolabeled compounds into a solvent. The radiolabeled compounds are then separated. A position sensitive radiation detector is employed to image distributions of the radiolabeled compounds as the radiolabeled compounds travel along a fluid channel.

  16. Nuclear fission as a tool to contrast the contraband of special ...

    Indian Academy of Sciences (India)

    2015-08-25

    Aug 25, 2015 ... An integrated mobile system for port security is presented. The system was designed to perform passive measurements of neutrons and -rays to search and identify radioactive and special nuclear materials as well as for the active investigations by using the tagged neutron inspection technique of suspect ...

  17. 75 FR 5009 - Proximity Detection Systems for Underground Mines

    Science.gov (United States)

    2010-02-01

    ... Proximity Detection Systems for Underground Mines AGENCY: Mine Safety and Health Administration, Labor... information regarding whether the use of proximity detection systems would reduce the risk of accidents where... . Information on MSHA-approved proximity detection systems is available on the Internet at http://www.msha.gov...

  18. Information Capacity of Direct Detection Optical Transmission Systems

    Science.gov (United States)

    Mecozzi, Antonio; Shtaif, Mark

    2018-02-01

    We show that the spectral efficiency of a direct detection transmission system is at most 1 bit/s/Hz less than the spectral efficiency of a system employing coherent detection with the same modulation format. Correspondingly, the capacity per complex degree of freedom in systems using direct detection is lower by at most 1 bit.

  19. Reliability of leak detection systems in LWRs

    International Nuclear Information System (INIS)

    Kupperman, D.S.

    1986-10-01

    In this paper, NRC guidelines for leak detection will be reviewed, current practices described, potential safety-related problems discussed, and potential improvements in leak detection technology (with emphasis on acoustic methods) evaluated

  20. Distributed Impact Detection System, Phase I

    Data.gov (United States)

    National Aeronautics and Space Administration — Automated impact detection and characterization on manned spacecraft has been an elusive goal due to the transitory nature of the detectable high-frequency signals....

  1. Distributed Impact Detection System, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Automated impact detection and characterization on manned spacecraft has been an elusive goal due to the transitory nature of the detectable high-frequency signals....

  2. Hybrid Intrusion Detection System for DDoS Attacks

    Directory of Open Access Journals (Sweden)

    Özge Cepheli

    2016-01-01

    Full Text Available Distributed denial-of-service (DDoS attacks are one of the major threats and possibly the hardest security problem for today’s Internet. In this paper we propose a hybrid detection system, referred to as hybrid intrusion detection system (H-IDS, for detection of DDoS attacks. Our proposed detection system makes use of both anomaly-based and signature-based detection methods separately but in an integrated fashion and combines the outcomes of both detectors to enhance the overall detection accuracy. We apply two distinct datasets to our proposed system in order to test the detection performance of H-IDS and conclude that the proposed hybrid system gives better results than the systems based on nonhybrid detection.

  3. Safe Detection System for Hydrogen Leaks

    Energy Technology Data Exchange (ETDEWEB)

    Lieberman, Robert A. [Intelligent Optical Systems, Inc., Torrance, CA (United States); Beshay, Manal [Intelligent Optical Systems, Inc., Torrance, CA (United States)

    2012-02-29

    Hydrogen is an "environmentally friendly" fuel for future transportation and other applications, since it produces only pure ("distilled") water when it is consumed. Thus, hydrogen-powered vehicles are beginning to proliferate, with the total number of such vehicles expected to rise to nearly 100,000 within the next few years. However, hydrogen is also an odorless, colorless, highly flammable gas. Because of this, there is an important need for hydrogen safety monitors that can warn of hazardous conditions in vehicles, storage facilities, and hydrogen production plants. To address this need, IOS has developed a unique intrinsically safe optical hydrogen sensing technology, and has embodied it in detector systems specifically developed for safety applications. The challenge of using light to detect a colorless substance was met by creating chemically-sensitized optical materials whose color changes in the presence of hydrogen. This reversible reaction provides a sensitive, reliable, way of detecting hydrogen and measuring its concentration using light from low-cost LEDs. Hydrogen sensors based on this material were developed in three completely different optical formats: point sensors ("optrodes"), integrated optic sensors ("optical chips"), and optical fibers ("distributed sensors") whose entire length responds to hydrogen. After comparing performance, cost, time-to-market, and relative market need for these sensor types, the project focused on designing a compact optrode-based single-point hydrogen safety monitor. The project ended with the fabrication of fifteen prototype units, and the selection of two specific markets: fuel cell enclosure monitoring, and refueling/storage safety. Final testing and development of control software for these markets await future support.

  4. Planet Detectability in the Alpha Centauri System

    Science.gov (United States)

    Zhao, Lily; Fischer, Debra A.; Brewer, John; Giguere, Matt; Rojas-Ayala, Bárbara

    2018-01-01

    We use more than a decade of radial-velocity measurements for α {Cen} A, B, and Proxima Centauri from the High Accuracy Radial Velocity Planet Searcher, CTIO High Resolution Spectrograph, and the Ultraviolet and Visual Echelle Spectrograph to identify the M\\sin i and orbital periods of planets that could have been detected if they existed. At each point in a mass–period grid, we sample a simulated, Keplerian signal with the precision and cadence of existing data and assess the probability that the signal could have been produced by noise alone. Existing data places detection thresholds in the classically defined habitable zones at about M\\sin i of 53 {M}\\oplus for α {Cen} A, 8.4 {M}\\oplus for α {Cen} B, and 0.47 {M}\\oplus for Proxima Centauri. Additionally, we examine the impact of systematic errors, or “red noise” in the data. A comparison of white- and red-noise simulations highlights quasi-periodic variability in the radial velocities that may be caused by systematic errors, photospheric velocity signals, or planetary signals. For example, the red-noise simulations show a peak above white-noise simulations at the period of Proxima Centauri b. We also carry out a spectroscopic analysis of the chemical composition of the α {Centauri} stars. The stars have super-solar metallicity with ratios of C/O and Mg/Si that are similar to the Sun, suggesting that any small planets in the α {Cen} system may be compositionally similar to our terrestrial planets. Although the small projected separation of α {Cen} A and B currently hampers extreme-precision radial-velocity measurements, the angular separation is now increasing. By 2019, α {Cen} A and B will be ideal targets for renewed Doppler planet surveys.

  5. Detection of contamination of municipal water distribution systems

    Science.gov (United States)

    Cooper, John F [Oakland, CA

    2012-01-17

    A system for the detection of contaminates of a fluid in a conduit. The conduit is part of a fluid distribution system. A chemical or biological sensor array is connected to the conduit. The sensor array produces an acoustic signal burst in the fluid upon detection of contaminates in the fluid. A supervisory control system connected to the fluid and operatively connected to the fluid distribution system signals the fluid distribution system upon detection of contaminates in the fluid.

  6. Nuclear fission as a tool to contrast the contraband of special ...

    Indian Academy of Sciences (India)

    connected to the 'active unit' for the interrogation of voxels inside a load by means of the tagged neutron inspection system (TNIS) technique [1]. The SMANDRA .... Under this condition, the spot of the tagged neutron beam at the object position (located. 30 cm from the 'passive unit' front face) has been measured to be about ...

  7. SECURE personnel screening system: field trials and new developments

    Science.gov (United States)

    Smith, Steven W.

    1997-01-01

    Many different techniques have been investigated for detecting weapons, explosives, and contraband concealed under a person's clothing. Most of these are based on imaging the concealed object by using some sort of penetrating radiation, such as microwaves, ultrasound or electromagnetic fields.In spite of this effort by dozens of research groups, the only technique that has resulted in a commercially viable product is back-scatter x-ray imaging, as embodied in the SECURE 1000 personnel screening systems. The SECURE technology uses radiation levels that are insignificant compared to natural background values, being viewed as 'trivial' and 'completely insignificant' under established radiation safety standards. In the five years since the SECURE 1000 was developed, more than a dozen field trials and initial placements have been completed. This paper describes both the capabilities and limitations of the technology in these real-world applications.

  8. Research on IPv6 intrusion detection system Snort-based

    Science.gov (United States)

    Shen, Zihao; Wang, Hui

    2010-07-01

    This paper introduces the common intrusion detection technologies, discusses the work flow of Snort intrusion detection system, and analyzes IPv6 data packet encapsulation and protocol decoding technology. We propose the expanding Snort architecture to support IPv6 intrusion detection in accordance with CIDF standard combined with protocol analysis technology and pattern matching technology, and present its composition. The research indicates that the expanding Snort system can effectively detect various intrusion attacks; it is high in detection efficiency and detection accuracy and reduces false alarm and omission report, which effectively solves the problem of IPv6 intrusion detection.

  9. Measurements and standards for bulk-explosives detection

    International Nuclear Information System (INIS)

    Hudson, Larry; Bateman, Fred; Bergstrom, Paul; Cerra, Frank; Glover, Jack; Minniti, Ronaldo; Seltzer, Stephen; Tosh, Ronald

    2012-01-01

    Recent years have seen a dramatic expansion in the application of radiation and isotopes to security screening. This has been driven primarily by increased incidents involving improvised explosive devices as well as their ease of assembly and leveraged disruption of transportation and commerce. With global expenditures for security-screening systems in the hundreds of billions of dollars, there is a pressing need to develop, apply, and harmonize standards for x-ray and gamma-ray screening systems used to detect explosives and other contraband. The National Institute of Standards and Technology has been facilitating the development of standard measurement tools that can be used to gauge the technical performance (imaging quality) and radiation safety of systems used to screen luggage, persons, vehicles, cargo, and left-behind objects. After a review of this new suite of national standard test methods, test objects, and radiation-measurement protocols, we highlight some of the technical trends that are enhancing the revision of baseline standards. Finally we advocate a more intentional use of technical-performance standards by security stakeholders and outline the advantages this would accrue. - Highlights: ► This work responds to the need for standards for x-ray screening systems used to detect explosives. ► Described are new measurement tools to gage the performance and radiation safety of such systems. ► A more intentional use of technical-performance standards by security stakeholders is argued.

  10. Thermal History Devices, Systems For Thermal History Detection, And Methods For Thermal History Detection

    KAUST Repository

    Caraveo Frescas, Jesus Alfonso

    2015-05-28

    Embodiments of the present disclosure include nanowire field-effect transistors, systems for temperature history detection, methods for thermal history detection, a matrix of field effect transistors, and the like.

  11. Fast-neutron detecting system with n, γ discrimination

    International Nuclear Information System (INIS)

    Ouyang Xiaoping; Huang Bao; Cao Jinyun

    1997-11-01

    In the present work, a new type neutron detecting system is reported, which can absolutely measure neutron parameters in n + γ mixed fields and has a long continuance of static high vacuum of 10 -4 Pa. The detecting system, with middle neutron-detecting sensitivity, short time response and big linear current output, has applied successfully in pulsed neutron beam measurement

  12. An Immunity-Based Anomaly Detection System with Sensor Agents

    Directory of Open Access Journals (Sweden)

    Yoshiteru Ishida

    2009-11-01

    Full Text Available This paper proposes an immunity-based anomaly detection system with sensor agents based on the specificity and diversity of the immune system. Each agent is specialized to react to the behavior of a specific user. Multiple diverse agents decide whether the behavior is normal or abnormal. Conventional systems have used only a single sensor to detect anomalies, while the immunity-based system makes use of multiple sensors, which leads to improvements in detection accuracy. In addition, we propose an evaluation framework for the anomaly detection system, which is capable of evaluating the differences in detection accuracy between internal and external anomalies. This paper focuses on anomaly detection in user’s command sequences on UNIX-like systems. In experiments, the immunity-based system outperformed some of the best conventional systems.

  13. An immunity-based anomaly detection system with sensor agents.

    Science.gov (United States)

    Okamoto, Takeshi; Ishida, Yoshiteru

    2009-01-01

    This paper proposes an immunity-based anomaly detection system with sensor agents based on the specificity and diversity of the immune system. Each agent is specialized to react to the behavior of a specific user. Multiple diverse agents decide whether the behavior is normal or abnormal. Conventional systems have used only a single sensor to detect anomalies, while the immunity-based system makes use of multiple sensors, which leads to improvements in detection accuracy. In addition, we propose an evaluation framework for the anomaly detection system, which is capable of evaluating the differences in detection accuracy between internal and external anomalies. This paper focuses on anomaly detection in user's command sequences on UNIX-like systems. In experiments, the immunity-based system outperformed some of the best conventional systems.

  14. Systems and Methods for Automated Water Detection Using Visible Sensors

    Science.gov (United States)

    Rankin, Arturo L. (Inventor); Matthies, Larry H. (Inventor); Bellutta, Paolo (Inventor)

    2016-01-01

    Systems and methods are disclosed that include automated machine vision that can utilize images of scenes captured by a 3D imaging system configured to image light within the visible light spectrum to detect water. One embodiment includes autonomously detecting water bodies within a scene including capturing at least one 3D image of a scene using a sensor system configured to detect visible light and to measure distance from points within the scene to the sensor system, and detecting water within the scene using a processor configured to detect regions within each of the at least one 3D images that possess at least one characteristic indicative of the presence of water.

  15. System and method for detecting cells or components thereof

    Science.gov (United States)

    Porter, Marc D [Ames, IA; Lipert, Robert J [Ames, IA; Doyle, Robert T [Ames, IA; Grubisha, Desiree S [Corona, CA; Rahman, Salma [Ames, IA

    2009-01-06

    A system and method for detecting a detectably labeled cell or component thereof in a sample comprising one or more cells or components thereof, at least one cell or component thereof of which is detectably labeled with at least two detectable labels. In one embodiment, the method comprises: (i) introducing the sample into one or more flow cells of a flow cytometer, (ii) irradiating the sample with one or more light sources that are absorbed by the at least two detectable labels, the absorption of which is to be detected, and (iii) detecting simultaneously the absorption of light by the at least two detectable labels on the detectably labeled cell or component thereof with an array of photomultiplier tubes, which are operably linked to two or more filters that selectively transmit detectable emissions from the at least two detectable labels.

  16. Blind Leak Detection for Closed Systems

    Science.gov (United States)

    Oelgoetz, Peter; Johnson, Ricky; Todd, Douglas; Russell, Samuel; Walker, James

    2003-01-01

    The current inspection technique for locating interstitial leaking in the Space Shuttle Main Engine nozzles is the application of a liquid leak check solution in the openings where the interstitials space between the tubing and the structural jacket vent out the aft end of the nozzle, while its cooling tubes are pressurized to 25 psig with Helium. When a leak is found, it is classified, and if the leak is severe enough the suspect tube is cut open so that a boroscope can be inserted to find the leak point. Since the boroscope can only cover a finite tube length and since it is impossible to identify which tube (to the right or left of the identified interstitial) is leaking, many extra and undesired repairs have been made to fix just one leak. In certain instances when the interstitials are interlinked by poor braze bonding, many interstitials will show indications of leaking from a single source. What is desired is a technique that can identify the leak source so that a single repair can be performed. Dr, Samuel Russell and James Walker, both with NASA/MSFC have developed a thermographic inspection system that addresses a single repair approach. They have teamed with Boeing/Rocketdyne to repackage the inspection processes to be suitable to address full scale Shuttle development and flight hardware and implement the process at NASA centers. The methods and results presented address the thermographic identification of interstitial leaks in the Space Shuttle Main Engine nozzles. A highly sensitive digital infrared camera (capable of detecting a delta temperature difference of 0.025 C) is used to record the cooling effects associated with a leak source, such as a crack or pinhole, hidden within the nozzle wall by observing the inner hot wall surface as the nozzle is pressurized, These images are enhanced by digitally subtracting a thermal reference image taken before pressurization. The method provides a non-intrusive way of locating the tube that is leaking and the

  17. Intrusion Detection in Control Systems using Sequence Characteristics

    Science.gov (United States)

    Kiuchi, Mai; Onoda, Takashi

    Intrusion detection is considered effective in control systems. Sequences of the control application behavior observed in the communication, such as the order of the control device to be controlled, are important in control systems. However, most intrusion detection systems do not effectively reflect sequences in the application layer into the detection rules. In our previous work, we considered utilizing sequences for intrusion detection in control systems, and demonstrated the usefulness of sequences for intrusion detection. However, manually writing the detection rules for a large system can be difficult, so using machine learning methods becomes feasible. Also, in the case of control systems, there have been very few observed cyber attacks, so we have very little knowledge of the attack data that should be used to train the intrusion detection system. In this paper, we use an approach that combines CRF (Conditional Random Field) considering the sequence of the system, thus able to reflect the characteristics of control system sequences into the intrusion detection system, and also does not need the knowledge of attack data to construct the detection rules.

  18. Laser Obstacle Detection System Flight Testing

    National Research Council Canada - National Science Library

    Davis, Timothy

    2003-01-01

    ...). The Aviation Applied Technology Directorate (AATD) was contracted to mount the HELLAS sensor on the nose of a UH-60L Blackhawk helicopter and to conduct flight tests to evaluate the HELLAS obstacle detection sensor...

  19. Optimizing Systems of Threshold Detection Sensors

    National Research Council Canada - National Science Library

    Banschbach, David C

    2008-01-01

    .... Below the threshold all signals are ignored. We develop a mathematical model for setting individual sensor thresholds to obtain optimal probability of detecting a significant event, given a limit on the total number of false positives allowed...

  20. Development of Mine Detection Robot System

    Directory of Open Access Journals (Sweden)

    Yuichi Satsumi

    2008-11-01

    Full Text Available The Mine Detection Robot supports the mine removal work in countries where mines are buried, such as Afghanistan. The development started from September, 2003. Considering running on rough terrains, the robot has four crawlers, and hydraulic motors in front and rear were serially connected by piping so that they could rotate synchronously. Two work arms were mounted on the robot, one was a horizontal multi-joint SCARA type with motorized 2-link arm, while the other was a vertical multi-joint manipulator with 6 degrees of freedom. Also, domestic evaluation tests were carried out from February to March, 2005, followed by overseas validation tests in Croatia from February to March, 2006. These tests were conducted with a mine detecting senor mounted on the Robot, and the detection performance was evaluated by its mine detection rate.

  1. Development of Mine Detection Robot System

    Directory of Open Access Journals (Sweden)

    Hajime Aoyama

    2007-06-01

    Full Text Available The Mine Detection Robot supports the mine removal work in countries where mines are buried, such as Afghanistan. The development started from September, 2003. Considering running on rough terrains, the robot has four crawlers, and hydraulic motors in front and rear were serially connected by piping so that they could rotate synchronously. Two work arms were mounted on the robot, one was a horizontal multi-joint SCARA type with motorized 2-link arm, while the other was a vertical multi-joint manipulator with 6 degrees of freedom. Also, domestic evaluation tests were carried out from February to March, 2005, followed by overseas validation tests in Croatia from February to March, 2006. These tests were conducted with a mine detecting senor mounted on the Robot, and the detection performance was evaluated by its mine detection rate.

  2. A Magnetic Sensor System for Biological Detection

    KAUST Repository

    Li, Fuquan

    2015-05-01

    Magnetic biosensors detect biological targets through sensing the stray field of magnetic beads which label the targets. Commonly, magnetic biosensors employ the “sandwich” method to immobilize biological targets, i.e., the targets are sandwiched between a bio-functionalized sensor surface and bio-functionalized magnetic beads. This method has been used very successfully in different application, but its execution requires a rather elaborate procedure including several washing and incubation steps. This dissertation investigates a new magnetic biosensor concept, which enables a simple and effective detection of biological targets. The biosensor takes advantage of the size difference between bare magnetic beads and compounds of magnetic beads and biological targets. First, the detection of super-paramagnetic beads via magnetic tunnel junction (MTJ) sensors is implemented. Frequency modulation is used to enhance the signal-to-noise ratio, enabling the detection of a single magnetic bead. Second, the concept of the magnetic biosensor is investigated theoretically. The biosensor consists of an MTJ sensor, which detects the stray field of magnetic beads inside of a trap on top of the MTJ. A microwire between the trap and the MTJ is used to attract magnetic beads to the trapping well by applying a current to it. The MTJ sensor’s output depends on the number of beads inside the trap. If biological targets are in the sample solution, the beads will form bead compounds consisting of beads linked to the biological targets. Since bead compounds are larger than bare beads, the number of beads inside the trapping well will depend on the presence of biological targets. Hence, the output of the MTJ sensor will depend on the biological targets. The dependences of sensor signals on the sizes of the MTJ sensor, magnetic beads and biological targets are studied to find the optimum constellations for the detection of specific biological targets. The optimization is demonstrated

  3. Fault Detection for Shipboard Monitoring and Decision Support Systems

    DEFF Research Database (Denmark)

    Lajic, Zoran; Nielsen, Ulrik Dam

    2009-01-01

    In this paper a basic idea of a fault-tolerant monitoring and decision support system will be explained. Fault detection is an important part of the fault-tolerant design for in-service monitoring and decision support systems for ships. In the paper, a virtual example of fault detection...... will be presented for a containership with a real decision support system onboard. All possible faults can be simulated and detected using residuals and the generalized likelihood ratio (GLR) algorithm....

  4. Security Enrichment in Intrusion Detection System Using Classifier Ensemble

    Directory of Open Access Journals (Sweden)

    Uma R. Salunkhe

    2017-01-01

    Full Text Available In the era of Internet and with increasing number of people as its end users, a large number of attack categories are introduced daily. Hence, effective detection of various attacks with the help of Intrusion Detection Systems is an emerging trend in research these days. Existing studies show effectiveness of machine learning approaches in handling Intrusion Detection Systems. In this work, we aim to enhance detection rate of Intrusion Detection System by using machine learning technique. We propose a novel classifier ensemble based IDS that is constructed using hybrid approach which combines data level and feature level approach. Classifier ensembles combine the opinions of different experts and improve the intrusion detection rate. Experimental results show the improved detection rates of our system compared to reference technique.

  5. Early forest fire detection using radio-acoustic sounding system.

    Science.gov (United States)

    Sahin, Yasar Guneri; Ince, Turker

    2009-01-01

    Automated early fire detection systems have recently received a significant amount of attention due to their importance in protecting the global environment. Some emergent technologies such as ground-based, satellite-based remote sensing and distributed sensor networks systems have been used to detect forest fires in the early stages. In this study, a radio-acoustic sounding system with fine space and time resolution capabilities for continuous monitoring and early detection of forest fires is proposed. Simulations show that remote thermal mapping of a particular forest region by the proposed system could be a potential solution to the problem of early detection of forest fires.

  6. Model Based Aircraft Upset Detection and Recovery System Project

    Data.gov (United States)

    National Aeronautics and Space Administration — This proposal describes a system for detecting upset conditions and providing the corresponding control recovery actions to maintain flight integrity for general...

  7. Fault Detection and Isolation for Wind Turbine Electric Pitch System

    DEFF Research Database (Denmark)

    Zhu, Jiangsheng; Ma, Kuichao; Hajizadeh, Amin

    2017-01-01

    This paper presents a model-based fault detection and isolation scheme applied on electric pitch system of wind turbines. Pitch system is one of the most critical components due to its effect on the operational safety and the dynamics of wind turbines. Faults in this system should be precisely...... detected to prevent failures and decrease downtime. To detect faults of electric pitch actuators and sensors, an extended kalman filter (EKF) based multiple model adaptive estimation (MMAE) designed to estimate the states of the system. The proposed method is demonstrated in case studies. The simulation...... results show that the proposed method detects different fault scenarios of wind turbines under the stochastic external condition....

  8. Radar-Based Intruder Detection for a Robotic Security System

    National Research Council Canada - National Science Library

    Cory, Phil

    1998-01-01

    .... The system includes multiple supervised-autonomous platforms equipped with intrusion detection, barrier assessment, and inventory assessment subsystems commanded from an integrated control station...

  9. Contraband of Falcons

    Directory of Open Access Journals (Sweden)

    Elvira G. Nikolenko

    2016-02-01

    Full Text Available According to the criminal proceeding in smuggling of falcons, former employees of the Line Internal Affairs Department in MIA transport, working in Domodedovo airport, were sentenced to large fines  - A. Kurokhtin, D. Gorodenko and A. Kustov, as was reported in Rossiyskaya Gazeta on 19.06.2013. Inspectors of the State Committee for the wild life protection together with employees of the MIA of Khakassia on 15.09.2013 detained two individuals engaged in illegal catching of falcons. On 04.11.2013 in Buryatia perpetrator, which transported 16 falcons, was arrested. On the road Khabarovsk-Chita in the vicinity of the village Nikolayevka in Jewish Autonomous Region (Russia police seized 21 Gyrfalcons (Falco rusticolus, which on 26.11.2013 was reported in STRBC “Dalnevostochnaya”. In the village Lesnoi of Yelizovo district in the Kamchatka Region on 29.11.2013, police arrested two men and seized eight Gyrfalcons (Falco rusticolus. One Saker Falcon (Falco cherrug seized on 12.12.2013 in the village Staroaleyskoe of Tretyakovo district of the Altai Kray (Russia. On 24.12.2013 in Petropavlovsk-Kamchatsky (Russia the police, together with colleagues from the regional FSSD seized 13 Gyrfalcons (Falco rusticolus from two residents of the Krasnoyarsk Territory. On 15.01.2014 in Kamchatka, the 51-year-old resident of the village of Nagorny in Yelizovski District, which kept 8 Gyrfalcons (Falco rusticolus in the garage at his house land plot, was arrested. Prosecution office of Tarbagatay district of East Kazakhstan region (Kazakhstan together with the police and the authorities for the wild life protection found 7 Saker Falcons (Falco cherrug on 06.08.2014. At security control point “Ak-tilek - roadway" (Kazakhstan on 29.08.2014 border guards together with employees of the State Customs Service apprehended a citizen of Kazakhstan, who tried to take from Kyrgyzstan to Kazakhstan 3 young Saker Falcons (Falco cherrug. Supervisors of safety department in Khakassky Reserve prevented the catching of Saker Falcons on the territory of SPNR in Ust-Abakan District on 30.08.2015. In forest-line near Chernogorsk, Republic of Khakassia (Russia employees of the State Committee for wildlife and environment protection found 9 Saker Falcons caught by poachers on 09.09.2014. On 18.09.2014 as a result of operational search activities, employees of Altai Customs and Border Service of FSS of RF in Altai Kray prevented an attempt of illegal export of 18 falcons from Russia via the Republic of Kazakhstan. On 26.09.2014 at “Vnukovo” airport employees of the FCS of Russia prevented smuggling of 4 Gyrfalcons (Falco rusticolus, but also identified two customs officials who assisted smugglers and moved alive goods without customs control. On October 23, 2014 in the Sanctuary of rare birds “Altai-Falcon” (Barnaul, the Altai Kray, Russia 10 falcons were released. On 27.10.2014 employees of Domodedovo Customs terminated an attempt of illegal export of 5 falcons from Russia to Armenia. On 10.30.2014 in Kamchatka officers of the Criminal Investigation Office of Milkovsky Department seized two Gyrfalcons (Falco rusticolus from poachers. On 02.11.2014 border guards of Kamchatka detained intercoastal ship, where was found hold to transport falcons. On 07.11.2014 batch of 6 falcons was detained by STSI inspectors in Slavgorod in the Altai Kray (Russia at Kazakhstan customs and gave a carrier to border guards. On 05.12.2014 in Chelyabinsk Airport a group of people trying to smuggle 3 Saker Falcons (Falco cherrug from Russia to Armenia, was detained. On 11.12.2014 in Tashkent (Uzbekistan 28 Saker Falcons (Falco cherrug were released, they were seized from poachers. On 12.16.2014 in Petropavlovsk-Kamchatsky (Russia 47-year-old citizen was seized two Gyrfalcons (Falco rusticolus. On 12.27.2014 in Moscow suburbs (Russia, a female Gyrfalcon (Falco rusticolus was found. In January 2015 two suitcases were found in the toilet in Moscow Sheremetyevo airport, where were 8 Gyrfalcons (Falco rusticolus. On 02.04.2015 the Sanctuary of rare birds “Altai-Falcon” (Barnaul, the Altai Territory, Russia released 14 falcons (7 Saker Falcons Falco cherrug and 7 Peregrine Falcons F. peregrinus, confiscated in autumn 2014. On July 8, 2015 at the “Domodedovo” airport a Bulgarian citizen, who found 25 eggs of the Peregrine Falcon (Falco peregrinus, was detained. On 08.09.2015 on the territory of the cluster in Khakassky State Nature Reserve “Kamyzyakskaya steppe with lake Ulug Kohl” (Khakassia, two citizens of Syria and one native of Azerbaijan were take while attempting to catch falcons. On 11.09.2015 at Domodedovo airport staff of Rosselkhoznadzor suspended clearance of 8 Gyrfalcons (Falco rusticolus, which was brought to Moscow from the United Arab Emirates. On 18.09.2015 as a result of joint operational-search activities, officers of Altai Customs and Border Service of Russian FSS prevented an attempt of illegal export of 14 falcons from Russia to Kazakhstan. On 14.09.2015 24 Falcons were found during the check of flight № FDV-738 “Shymkent – Dubai” (Karavan.kz. Four members of the organized criminal group, involved in smuggling of Gyrfalcons (Falco rusticolus, were detained at a Moscow airport “Sheremetyevo” on 17.10.2015. Belgorod custom officers were not allowed to take 8 Saker Falcons (Falco cherrug out of Russia  on 20.10.2015. On 10.11.2015 Gosohotsluzhba of The Zabaikalsky Kray (Russia in cooperation with the police in Chernyshevsky District of the Zabaikalsky Kray detained a group of six foreigners (Syrians, Kurds, Azerbaijanian for illegal catching of falcons. On 20.11.2015 in Kamchatka officers of the Criminal Investigation of Kamchatka Police together with colleagues from the FSS regional department detained a resident of Apuka village of Olyutorsky district, which was seized nine Gyrfalcons (Falco rusticolus. On November, 2015 in Kamchatka two criminal cases were initiated on the illegal transport and keeping of gyrfalcons (Falco rusticolus. On November, 2015 in Kamchatka two criminal cases were initiated on the illegal transport and keeping of gyrfalcons (Falco rusticolus. On 03.12.2015 in Kamchatka transport police prevented the export of 3 Gyrfalcons (Falco rusticolus by flight to Khabarovsk. On 21.12.2015 in Kamchatka a Gyrfalcon (Falco rusticolus was withdrawn from a resident of Oktybrski village of Ust-Bolsheretsky district.

  10. Detecting impossible changes in infancy: a three-system account

    Science.gov (United States)

    Wang, Su-hua; Baillargeon, Renée

    2012-01-01

    Can infants detect that an object has magically disappeared, broken apart or changed color while briefly hidden? Recent research suggests that infants detect some but not other ‘impossible’ changes; and that various contextual manipulations can induce infants to detect changes they would not otherwise detect. We present an account that includes three systems: a physical-reasoning, an object-tracking, and an object-representation system. What impossible changes infants detect depends on what object information is included in the physical-reasoning system; this information becomes subject to a principle of persistence, which states that objects can undergo no spontaneous or uncaused change. What contextual manipulations induce infants to detect impossible changes depends on complex interplays between the physical-reasoning system and the object-tracking and object-representation systems. PMID:18078778

  11. Coaxial direct-detection lidar-system

    DEFF Research Database (Denmark)

    2014-01-01

    . Finally, the system comprises a detector system arranged to receive the return signal from the optical delivery system, the detector system comprising a narrowband optical filter and a detector, the narrowband optical filter having a filter center frequency of a pass-band, wherein the center lasing...... frequency and/or the center filter frequency may be scanned. The invention further relates to an aircraft airspeed measurement device, and a wind turbine airspeed measurement device comprising the LIDAR system....

  12. Fault detection and isolation in systems with parametric faults

    DEFF Research Database (Denmark)

    Stoustrup, Jakob; Niemann, Hans Henrik

    1999-01-01

    The problem of fault detection and isolation of parametric faults is considered in this paper. A fault detection problem based on parametric faults are associated with internal parameter variations in the dynamical system. A fault detection and isolation method for parametric faults is formulated...

  13. Report on Boeing pipeline leak detection system

    International Nuclear Information System (INIS)

    Aichele, W.T.

    1978-08-01

    Testing was performed on both simulated (test) and existing (water) pipelines to evaluate the Boeing leak detection technique. This technique uses a transformer mounted around the pipe to induce a voltage level onto the pipeline. The induced ground potential is measured from a distant ground probe, inserted into the surrounding soil, with respect to the excited pipeline. The induced voltage level will depend on the soil characteristics, the distance from the excited pipeline, and the probe types. If liquid should leak from the excited pipeline, the escaping liquid will modify the induced potential of the soil surrounding the excited pipeline. This will change the response of the quiescent soil characteristics and cause the voltage level on the detecting probes in the area of the leak to increase. This voltage increase will indicate a soil anomaly. However, the liquid does not have to reach the detection probe to reveal an anomalous soil condition. Several different detection probes were used and evaluated for sensitivity and response time. Although not evaluated during this test, results indicate that a wire laid parallel to the pipe axis may be the best probe configuration. A general sensitivity figure for any of the probes cannot be made from these tests; however, the technique used will reliably detect a pipeline leak of ten gallons. An additional test was performed using the Boeing pipeline leak detection technique to locate the position and depth of an underground pipeline. This test showed that the location and depth of an excited pipeline could be determined from above the ground where other methods for pipeline location had previously failed

  14. Tamper Detection for Active Surveillance Systems

    DEFF Research Database (Denmark)

    Theodore, Tsesmelis; Christensen, Lars; Fihl, Preben

    2013-01-01

    If surveillance data are corrupted they are of no use to neither manually post-investigation nor automatic video analysis. It is therefore critical to automatically be able to detect tampering events such as defocusing, occlusion and displacement. In this work we for the first time ad- dress...

  15. An Adaptive Database Intrusion Detection System

    Science.gov (United States)

    Barrios, Rita M.

    2011-01-01

    Intrusion detection is difficult to accomplish when attempting to employ current methodologies when considering the database and the authorized entity. It is a common understanding that current methodologies focus on the network architecture rather than the database, which is not an adequate solution when considering the insider threat. Recent…

  16. All row, planar fault detection system

    Science.gov (United States)

    Archer, Charles Jens; Pinnow, Kurt Walter; Ratterman, Joseph D; Smith, Brian Edward

    2013-07-23

    An apparatus, program product and method for detecting nodal faults may simultaneously cause designated nodes of a cell to communicate with all nodes adjacent to each of the designated nodes. Furthermore, all nodes along the axes of the designated nodes are made to communicate with their adjacent nodes, and the communications are analyzed to determine if a node or connection is faulty.

  17. Fault detection and isolation in systems with parametric faults

    DEFF Research Database (Denmark)

    Stoustrup, Jakob; Niemann, Hans Henrik

    1999-01-01

    The problem of fault detection and isolation of parametric faults is considered in this paper. A fault detection problem based on parametric faults are associated with internal parameter variations in the dynamical system. A fault detection and isolation method for parametric faults is formulated...... in a standard setup and a synthesis method for fault detectors is given. Further, fault detection problems with both parametric faults and faults described by external input signals are also shortly considered....

  18. Perimeter intrusion detection and assessment system

    Energy Technology Data Exchange (ETDEWEB)

    Eaton, M.J.; Jacobs, J.; McGovern, D.E.

    1977-01-01

    The key elements of the system considered at a materials storage site are intrusion sensors, alarm assessment, and system control and display. Three papers discussing each of these topics are compiled. They are abstracted individually. (JSR)

  19. Advanced Ground Systems Maintenance Anomaly Detection

    Data.gov (United States)

    National Aeronautics and Space Administration — The Inductive Monitoring System (IMS) software utilizes techniques from the fields of model-based reasoning, machine learning, and data mining to build system...

  20. Online Real-Time Tribology Failure Detection System, Phase II

    Data.gov (United States)

    National Aeronautics and Space Administration — Under NASA Phase I funding, we have developed a system for the ball bearing fault detection and identification. Our system can effectively identify multiple fault...

  1. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    OpenAIRE

    Krishnan Sadhasivan, Dhanalakshmi; Balasubramanian, Kannapiran

    2017-01-01

    Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS) to...

  2. Localized surface plasmon resonance mercury detection system and methods

    Science.gov (United States)

    James, Jay; Lucas, Donald; Crosby, Jeffrey Scott; Koshland, Catherine P.

    2016-03-22

    A mercury detection system that includes a flow cell having a mercury sensor, a light source and a light detector is provided. The mercury sensor includes a transparent substrate and a submonolayer of mercury absorbing nanoparticles, e.g., gold nanoparticles, on a surface of the substrate. Methods of determining whether mercury is present in a sample using the mercury sensors are also provided. The subject mercury detection systems and methods find use in a variety of different applications, including mercury detecting applications.

  3. Intrusion Detection System for Applications using Linux Containers

    OpenAIRE

    Abed, Amr S.; Clancy, Charles; Levy, David S.

    2016-01-01

    Linux containers are gaining increasing traction in both individual and industrial use, and as these containers get integrated into mission-critical systems, real-time detection of malicious cyber attacks becomes a critical operational requirement. This paper introduces a real-time host-based intrusion detection system that can be used to passively detect malfeasance against applications within Linux containers running in a standalone or in a cloud multi-tenancy environment. The demonstrated ...

  4. Automatic hearing loss detection system based on auditory brainstem response

    International Nuclear Information System (INIS)

    Aldonate, J; Mercuri, C; Reta, J; Biurrun, J; Bonell, C; Gentiletti, G; Escobar, S; Acevedo, R

    2007-01-01

    Hearing loss is one of the pathologies with the highest prevalence in newborns. If it is not detected in time, it can affect the nervous system and cause problems in speech, language and cognitive development. The recommended methods for early detection are based on otoacoustic emissions (OAE) and/or auditory brainstem response (ABR). In this work, the design and implementation of an automated system based on ABR to detect hearing loss in newborns is presented. Preliminary evaluation in adults was satisfactory

  5. Revisiting Anomaly-based Network Intrusion Detection Systems

    NARCIS (Netherlands)

    Bolzoni, D.

    2009-01-01

    Intrusion detection systems (IDSs) are well-known and widely-deployed security tools to detect cyber-attacks and malicious activities in computer systems and networks. A signature-based IDS works similar to anti-virus software. It employs a signature database of known attacks, and a successful match

  6. Specification Mining for Intrusion Detection in Networked Control Systems

    NARCIS (Netherlands)

    Caselli, M.; Zambon, Emmanuele; Amann, Johanna; Sommer, Robin; Kargl, Frank

    2016-01-01

    This paper discusses a novel approach to specification-based intrusion detection in the field of networked control systems. Our approach reduces the substantial human effort required to deploy a specification-based intrusion detection system by automating the development of its specification rules.

  7. Poseidon: A 2-tier Anomaly-based Intrusion Detection System

    NARCIS (Netherlands)

    Bolzoni, D.; Zambon, Emmanuele; Etalle, Sandro; Hartel, Pieter H.

    2005-01-01

    We present Poseidon, a new anomaly based intrusion detection system. Poseidon is payload-based, and presents a two-tier architecture: the first stage consists of a Self-Organizing Map, while the second one is a modified PAYL system. Our benchmarks on the 1999 DARPA data set show a higher detection

  8. Evaluation of the RACON 15000 microwave motion detection system

    International Nuclear Information System (INIS)

    1979-01-01

    A series of tests was performed on the RACON 15000 motion detection system. The primary objectives of these tests were to determine sensor detection patterns and to quantitate the effects of intruder velocity. System susceptibility to fluorescent lights, oscillatory motion, and environmental factors was also examined

  9. Upconverting nanoparticles for optimizing scintillator based detection systems

    Science.gov (United States)

    Kross, Brian; McKisson, John E; McKisson, John; Weisenberger, Andrew; Xi, Wenze; Zom, Carl

    2013-09-17

    An upconverting device for a scintillation detection system is provided. The detection system comprises a scintillator material, a sensor, a light transmission path between the scintillator material and the sensor, and a plurality of upconverting nanoparticles particles positioned in the light transmission path.

  10. Profilographic detection system for single-track scanning device

    International Nuclear Information System (INIS)

    Silar, J.; Kula, J.

    1988-01-01

    A profilographic detection system is claimed for diagnosing the renal function by isotope nephrography, and the bladder filling in small children and infants. The configuration described guarantees good position resolution and sensitivity of the detection system. (E.J.). 2 figs

  11. In-situ trainable intrusion detection system

    Energy Technology Data Exchange (ETDEWEB)

    Symons, Christopher T.; Beaver, Justin M.; Gillen, Rob; Potok, Thomas E.

    2016-11-15

    A computer implemented method detects intrusions using a computer by analyzing network traffic. The method includes a semi-supervised learning module connected to a network node. The learning module uses labeled and unlabeled data to train a semi-supervised machine learning sensor. The method records events that include a feature set made up of unauthorized intrusions and benign computer requests. The method identifies at least some of the benign computer requests that occur during the recording of the events while treating the remainder of the data as unlabeled. The method trains the semi-supervised learning module at the network node in-situ, such that the semi-supervised learning modules may identify malicious traffic without relying on specific rules, signatures, or anomaly detection.

  12. Magnetic biosensor system to detect biological targets

    KAUST Repository

    Li, Fuquan

    2012-09-01

    Magneto-resistive sensors in combination with magnetic beads provide sensing platforms, which are small in size and highly sensitive. These platforms can be fully integrated with microchannels and electronics to enable devices capable of performing complex tasks. Commonly, a sandwich method is used that requires a specific coating of the sensor\\'s surface to immobilize magnetic beads and biological targets on top of the sensor. This paper concerns a micro device to detect biological targets using magnetic concentration, magnetic as well as mechanical trapping and magnetic sensing. Target detection is based on the size difference between bare magnetic beads and magnetic beads with targets attached. This method remedies the need for a coating layer and reduces the number of steps required to run an experiment. © 2012 IEEE.

  13. Environmentally Adaptive UXO Detection and Classification Systems

    Science.gov (United States)

    2016-04-01

    in this experiment was designed to collect acoustical sonar data from underwater objects in a relatively controlled and clutter-free environment...public release; distribution is unlimited. N/A This Final Report addresses the problem of detecting and classifying underwater munitions using data...Applied Physics Laboratory ATR Automatic Target Recognition BOSS Buried Object Scanning Sonar CGF Cumulant Generating Function CPA Closest Point of

  14. Detection and quantification system for monitoring instruments

    Science.gov (United States)

    Dzenitis, John M [Danville, CA; Hertzog, Claudia K [Houston, TX; Makarewicz, Anthony J [Livermore, CA; Henderer, Bruce D [Livermore, CA; Riot, Vincent J [Oakland, CA

    2008-08-12

    A method of detecting real events by obtaining a set of recent signal results, calculating measures of the noise or variation based on the set of recent signal results, calculating an expected baseline value based on the set of recent signal results, determining sample deviation, calculating an allowable deviation by multiplying the sample deviation by a threshold factor, setting an alarm threshold from the baseline value plus or minus the allowable deviation, and determining whether the signal results exceed the alarm threshold.

  15. Assessment of leak detection systems for LWRs

    International Nuclear Information System (INIS)

    Kupperman, D.S.

    1987-01-01

    This topical report summarizes work performed by the Argonne National Laboratory as subcontractor on on-line leak monitoring of LWRs during the 12 months from October 1985 to September 1986. The use of at least three different methods is recommended for leakage detection in reactors. Monitoring of sump-flow and airborne particulate radioactivity are suggested. A third method could involve monitoring condensate flow rate from air coolers or monitoring of airborne gaseous radioactivity

  16. Pothole Detection System Using a Black-box Camera

    Directory of Open Access Journals (Sweden)

    Youngtae Jo

    2015-11-01

    Full Text Available Aging roads and poor road-maintenance systems result a large number of potholes, whose numbers increase over time. Potholes jeopardize road safety and transportation efficiency. Moreover, they are often a contributing factor to car accidents. To address the problems associated with potholes, the locations and size of potholes must be determined quickly. Sophisticated road-maintenance strategies can be developed using a pothole database, which requires a specific pothole-detection system that can collect pothole information at low cost and over a wide area. However, pothole repair has long relied on manual detection efforts. Recent automatic detection systems, such as those based on vibrations or laser scanning, are insufficient to detect potholes correctly and inexpensively owing to the unstable detection of vibration-based methods and high costs of laser scanning-based methods. Thus, in this paper, we introduce a new pothole-detection system using a commercial black-box camera. The proposed system detects potholes over a wide area and at low cost. We have developed a novel pothole-detection algorithm specifically designed to work with the embedded computing environments of black-box cameras. Experimental results are presented with our proposed system, showing that potholes can be detected accurately in real-time.

  17. An intelligent detecting system for permeability prediction of MBR.

    Science.gov (United States)

    Han, Honggui; Zhang, Shuo; Qiao, Junfei; Wang, Xiaoshuang

    2018-01-01

    The membrane bioreactor (MBR) has been widely used to purify wastewater in wastewater treatment plants. However, a critical difficulty of the MBR is membrane fouling. To reduce membrane fouling, in this work, an intelligent detecting system is developed to evaluate the performance of MBR by predicting the membrane permeability. This intelligent detecting system consists of two main parts. First, a soft computing method, based on the partial least squares method and the recurrent fuzzy neural network, is designed to find the nonlinear relations between the membrane permeability and the other variables. Second, a complete new platform connecting the sensors and the software is built, in order to enable the intelligent detecting system to handle complex algorithms. Finally, the simulation and experimental results demonstrate the reliability and effectiveness of the proposed intelligent detecting system, underlying the potential of this system for the online membrane permeability for detecting membrane fouling of MBR.

  18. Exterior field evaluation of new generation video motion detection systems

    International Nuclear Information System (INIS)

    Malone, T.P.

    1988-01-01

    Recent advancements in video motion detection (VMD) system design and technology have resulted in several new commercial VMD systems. Considerable interest in the new VMD systems has been generated because the systems are advertised to work effectively in exterior applications. Previous VMD systems, when used in an exterior environment, tended to have very high nuisance alarm rates due to weather conditions, wildlife activity and lighting variations. The new VMD systems advertise more advanced processing of the incoming video signal which is aimed at rejecting exterior environmental nuisance alarm sources while maintaining a high detection capability. This paper discusses the results of field testing, in an exterior environment, of two new VMD systems

  19. Fuzzy Based Advanced Hybrid Intrusion Detection System to Detect Malicious Nodes in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Rupinder Singh

    2017-01-01

    Full Text Available In this paper, an Advanced Hybrid Intrusion Detection System (AHIDS that automatically detects the WSNs attacks is proposed. AHIDS makes use of cluster-based architecture with enhanced LEACH protocol that intends to reduce the level of energy consumption by the sensor nodes. AHIDS uses anomaly detection and misuse detection based on fuzzy rule sets along with the Multilayer Perceptron Neural Network. The Feed Forward Neural Network along with the Backpropagation Neural Network are utilized to integrate the detection results and indicate the different types of attackers (i.e., Sybil attack, wormhole attack, and hello flood attack. For detection of Sybil attack, Advanced Sybil Attack Detection Algorithm is developed while the detection of wormhole attack is done by Wormhole Resistant Hybrid Technique. The detection of hello flood attack is done by using signal strength and distance. An experimental analysis is carried out in a set of nodes; 13.33% of the nodes are determined as misbehaving nodes, which classified attackers along with a detection rate of the true positive rate and false positive rate. Sybil attack is detected at a rate of 99,40%; hello flood attack has a detection rate of 98, 20%; and wormhole attack has a detection rate of 99, 20%.

  20. Identification and Damage Detection on Structural Systems

    DEFF Research Database (Denmark)

    Brincker, Rune; Kirkegaard, Poul Henning; Andersen, Palle

    1994-01-01

    A short introduction is given to system identification and damage assessment in civil engineering structures. The most commonly used FFT-based techniques for system identification are mentioned, and the Random decrement technique and parametric methods based on ARMA models are introduced. Speed...

  1. Development of humidity leak detection system for pipelines of WWER

    International Nuclear Information System (INIS)

    Gonor, V.K.; Morozov, S.A.; Polionov, V.P.; Portyanoj, A.G.; Shvetsov, D.M.; Konoplev, N.I.; Molyavkin, A.N.

    2007-01-01

    With allowance made for the basic requirements for the NPP pipeline leak detection system and for the accumulated experience one analyzed the basic engineering approaches to design a humidity leak detection system for the WWER primary pipelines. Paper presents the results of the feasibility study of the diagnostic algorithm service ability and the leak detection humidity system characteristics. Making use of the Kupol-M code and of the thermal bench simulating the Kalinin NPP 3-rd power unit dull basalt heat insulation pipeline leak the system is shown to meet the basic requirements stipulated in the present-day leak-before-break concept [ru

  2. A stereo vision-based obstacle detection system in vehicles

    Science.gov (United States)

    Huh, Kunsoo; Park, Jaehak; Hwang, Junyeon; Hong, Daegun

    2008-02-01

    Obstacle detection is a crucial issue for driver assistance systems as well as for autonomous vehicle guidance function and it has to be performed with high reliability to avoid any potential collision with the front vehicle. The vision-based obstacle detection systems are regarded promising for this purpose because they require little infrastructure on a highway. However, the feasibility of these systems in passenger car requires accurate and robust sensing performance. In this paper, an obstacle detection system using stereo vision sensors is developed. This system utilizes feature matching, epipoplar constraint and feature aggregation in order to robustly detect the initial corresponding pairs. After the initial detection, the system executes the tracking algorithm for the obstacles. The proposed system can detect a front obstacle, a leading vehicle and a vehicle cutting into the lane. Then, the position parameters of the obstacles and leading vehicles can be obtained. The proposed obstacle detection system is implemented on a passenger car and its performance is verified experimentally.

  3. How to detect trap cluster systems?

    International Nuclear Information System (INIS)

    Mandowski, Arkadiusz

    2008-01-01

    Spatially correlated traps and recombination centres (trap-recombination centre pairs and larger clusters) are responsible for many anomalous phenomena that are difficult to explain in the framework of both classical models, i.e. model of localized transitions (LT) and the simple trap model (STM), even with a number of discrete energy levels. However, these 'anomalous' effects may provide a good platform for identifying trap cluster systems. This paper considers selected cluster-type effects, mainly relating to an anomalous dependence of TL on absorbed dose in the system of isolated clusters (ICs). Some consequences for interacting cluster (IAC) systems, involving both localized and delocalized transitions occurring simultaneously, are also discussed

  4. Leak detection system for RBMK coolant circuit

    International Nuclear Information System (INIS)

    Cherkashov, Ju.M.; Strelkov, B.P.; Korolev, Yu.V.; Eperin, A.P.; Kozlov, E.P.; Belyanin, L.A.; Vanukov, V.N.

    1996-01-01

    In report the description of an object of the control is submitted, requests to control of leak-tightness and functioning of system are formulated, analysis of a current status on NPP with RBMK is submitted, review of methods of the leak-tightness monitoring, their advantage and defects with reference to conditions and features of a design RBMK is indicated, some results of tests and operation of various monitoring methods are submitted, requests on interaction of operative staff, leak-tightness monitoring system and protection system of reactor are submitted. (author). 11 figs, 1 tab

  5. A Novel Vision Sensing System for Tomato Quality Detection.

    Science.gov (United States)

    Srivastava, Satyam; Boyat, Sachin; Sadistap, Shashikant

    2014-01-01

    Producing tomato is a daunting task as the crop of tomato is exposed to attacks from various microorganisms. The symptoms of the attacks are usually changed in color, bacterial spots, special kind of specks, and sunken areas with concentric rings having different colors on the tomato outer surface. This paper addresses a vision sensing based system for tomato quality inspection. A novel approach has been developed for tomato fruit detection and disease detection. Developed system consists of USB based camera module having 12.0 megapixel interfaced with ARM-9 processor. Zigbee module has been interfaced with developed system for wireless transmission from host system to PC based server for further processing. Algorithm development consists of three major steps, preprocessing steps like noise rejection, segmentation and scaling, classification and recognition, and automatic disease detection and classification. Tomato samples have been collected from local market and data acquisition has been performed for data base preparation and various processing steps. Developed system can detect as well as classify the various diseases in tomato samples. Various pattern recognition and soft computing techniques have been implemented for data analysis as well as different parameters prediction like shelf life of the tomato, quality index based on disease detection and classification, freshness detection, maturity index detection, and different suggestions for detected diseases. Results are validated with aroma sensing technique using commercial Alpha Mos 3000 system. Accuracy has been calculated from extracted results, which is around 92%.

  6. Detection and Prognostics on Low Dimensional Systems

    Data.gov (United States)

    National Aeronautics and Space Administration — This paper describes the application of known and novel prognostic algorithms on systems that can be described by low dimensional, potentially nonlinear dynamics....

  7. Anomaly Detection in a Fleet of Systems

    Data.gov (United States)

    National Aeronautics and Space Administration — A fleet is a group of systems (e.g., cars, aircraft) that are designed and manufactured the same way and are intended to be used the same way. For example, a fleet...

  8. Sequential Detection of Fission Processes for Harbor Defense

    Energy Technology Data Exchange (ETDEWEB)

    Candy, J V; Walston, S E; Chambers, D H

    2015-02-12

    With the large increase in terrorist activities throughout the world, the timely and accurate detection of special nuclear material (SNM) has become an extremely high priority for many countries concerned with national security. The detection of radionuclide contraband based on their γ-ray emissions has been attacked vigorously with some interesting and feasible results; however, the fission process of SNM has not received as much attention due to its inherent complexity and required predictive nature. In this paper, on-line, sequential Bayesian detection and estimation (parameter) techniques to rapidly and reliably detect unknown fissioning sources with high statistical confidence are developed.

  9. A Universal High-Performance Correlation Analysis Detection Model and Algorithm for Network Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Hongliang Zhu

    2017-01-01

    Full Text Available In big data era, the single detection techniques have already not met the demand of complex network attacks and advanced persistent threats, but there is no uniform standard to make different correlation analysis detection be performed efficiently and accurately. In this paper, we put forward a universal correlation analysis detection model and algorithm by introducing state transition diagram. Based on analyzing and comparing the current correlation detection modes, we formalize the correlation patterns and propose a framework according to data packet timing and behavior qualities and then design a new universal algorithm to implement the method. Finally, experiment, which sets up a lightweight intrusion detection system using KDD1999 dataset, shows that the correlation detection model and algorithm can improve the performance and guarantee high detection rates.

  10. A New Anomaly Detection System for School Electricity Consumption Data

    Directory of Open Access Journals (Sweden)

    Wenqiang Cui

    2017-11-01

    Full Text Available Anomaly detection has been widely used in a variety of research and application domains, such as network intrusion detection, insurance/credit card fraud detection, health-care informatics, industrial damage detection, image processing and novel topic detection in text mining. In this paper, we focus on remote facilities management that identifies anomalous events in buildings by detecting anomalies in building electricity consumption data. We investigated five models within electricity consumption data from different schools to detect anomalies in the data. Furthermore, we proposed a hybrid model that combines polynomial regression and Gaussian distribution, which detects anomalies in the data with 0 false negative and an average precision higher than 91%. Based on the proposed model, we developed a data detection and visualization system for a facilities management company to detect and visualize anomalies in school electricity consumption data. The system is tested and evaluated by facilities managers. According to the evaluation, our system has improved the efficiency of facilities managers to identify anomalies in the data.

  11. Efficacy of computer-aided detection system for screening mammography

    International Nuclear Information System (INIS)

    Saito, Mioko; Ohnuki, Koji; Yamada, Takayuki; Saito, Haruo; Ishibashi, Tadashi; Ohuchi, Noriaki; Takahashi, Shoki

    2002-01-01

    A study was conducted to evaluate the efficacy of a computer-aided detection (CAD) system for screening mammography (MMG). Screening mammograms of 2,231 women aged over 50 yr were examined. Medio-lateral oblique (MLO) images were obtained, and two expert observers interpreted the mammograms by consensus. First, each mammogram was interpreted without the assistance of CAD, followed immediately by a re-evaluation of areas marked by the CAD system. Data were recorded to measure the effect of CAD on the recall rate, cancer detection rate and detection rate of masses, microcalcifications and other findings. The CAD system increased the recall rate from 2.3% to 2.6%. Six recalled cases were diagnosed as breast cancer pathologically, and CAD detected all of these lesions. Seven additional cases in which CAD detected abnormal findings had no malignancy. The detection rate of CAD for microcalcifications was high (95.0%). However, the detection rate for mass lesions and other findings was low (29.2% and 25.0% respectively). The false positivity rate was 0.13/film for microcalcifications, and 0.25/film for mass lesions. The efficacy of the CAD system for detecting microcalcifications on screening mammograms was confirmed. However, the low detection rate of mass lesions and relatively high rate of false positivity need to be further improved. (author)

  12. Development of radiation detection and measurement systems

    Energy Technology Data Exchange (ETDEWEB)

    Moon, B. S.; Ham, C. S.; Chung, C. E. and others

    2000-03-01

    This report contains descriptions on the following six items. The first item is the result of a study on CsI(TI) crystals with their light emitting characteristics and the result of a study on plastic scintillators. The second item is the result of a study on advanced radiation detectors and includes experiments for the effect of using a Compton suppressor with an HPGe detector. For the third item, we describe the results of a design work done using EGS4 for a thickness gauge, a density gauge, and a level gauge. The fourth item contains descriptions on the prototype circuit systems developed for a level gauge, a thickness gauge, and for a survey meter. The fifth part contains the computed tomography algorithm and a prototype scanning system developed for a CT system. As the sixth and the last item, we describe the prototype high precision heat source and the prototype heat-voltage converter which we have designed and fabricated.

  13. A physiology-based seizure detection system for multichannel EEG.

    Directory of Open Access Journals (Sweden)

    Chia-Ping Shen

    Full Text Available BACKGROUND: Epilepsy is a common chronic neurological disorder characterized by recurrent unprovoked seizures. Electroencephalogram (EEG signals play a critical role in the diagnosis of epilepsy. Multichannel EEGs contain more information than do single-channel EEGs. Automatic detection algorithms for spikes or seizures have traditionally been implemented on single-channel EEG, and algorithms for multichannel EEG are unavailable. METHODOLOGY: This study proposes a physiology-based detection system for epileptic seizures that uses multichannel EEG signals. The proposed technique was tested on two EEG data sets acquired from 18 patients. Both unipolar and bipolar EEG signals were analyzed. We employed sample entropy (SampEn, statistical values, and concepts used in clinical neurophysiology (e.g., phase reversals and potential fields of a bipolar EEG to extract the features. We further tested the performance of a genetic algorithm cascaded with a support vector machine and post-classification spike matching. PRINCIPAL FINDINGS: We obtained 86.69% spike detection and 99.77% seizure detection for Data Set I. The detection system was further validated using the model trained by Data Set I on Data Set II. The system again showed high performance, with 91.18% detection of spikes and 99.22% seizure detection. CONCLUSION: We report a de novo EEG classification system for seizure and spike detection on multichannel EEG that includes physiology-based knowledge to enhance the performance of this type of system.

  14. Traffic Congestion Detection System through Connected Vehicles and Big Data.

    Science.gov (United States)

    Cárdenas-Benítez, Néstor; Aquino-Santos, Raúl; Magaña-Espinoza, Pedro; Aguilar-Velazco, José; Edwards-Block, Arthur; Medina Cass, Aldo

    2016-04-28

    This article discusses the simulation and evaluation of a traffic congestion detection system which combines inter-vehicular communications, fixed roadside infrastructure and infrastructure-to-infrastructure connectivity and big data. The system discussed in this article permits drivers to identify traffic congestion and change their routes accordingly, thus reducing the total emissions of CO₂ and decreasing travel time. This system monitors, processes and stores large amounts of data, which can detect traffic congestion in a precise way by means of a series of algorithms that reduces localized vehicular emission by rerouting vehicles. To simulate and evaluate the proposed system, a big data cluster was developed based on Cassandra, which was used in tandem with the OMNeT++ discreet event network simulator, coupled with the SUMO (Simulation of Urban MObility) traffic simulator and the Veins vehicular network framework. The results validate the efficiency of the traffic detection system and its positive impact in detecting, reporting and rerouting traffic when traffic events occur.

  15. The leak detection and location system design of petroleum pipeline

    International Nuclear Information System (INIS)

    Liu Lixia

    2011-01-01

    In order to improve the sensibility and location precision of petroleum pipeline leak with traditional negative pressure wave detection, a multi-point distributed detection and location monitoring system composed of detection nodes along pipeline, monitoring sub-stations and pressure monitoring center was designed using C/S structure. The detection node gets the pressure signal in pipeline, and sends it to monitoring center through CPRS network that achieves online monitoring for the whole pipeline in real time. The received data was analyzed and processed with multi-point distributed negative pressure wave detection and correlation analysis method. The system can rapidly detect the leak point in pipeline timely and locate accurately to avoid enormous economic loss and environment pollutions accidents. (author)

  16. A magnetic biosensor system for detection of E. coli

    KAUST Repository

    Li, Fuquan

    2013-07-01

    This work describes a device for detecting E. coli bacteria by manipulating superparamagnetic beads to a sensing area and immobilizing them in a trapping well. The trapping well replaces the biochemical immobilization layer, which is commonly used in magnetic biosensor systems. A concept exploiting the volume difference between bare magnetic beads and magnetic bead-bioanalyte compounds is utilized to detect E. coli bacteria. Trapped beads are detected by the help of a tunnel magneto-resistive sensor. Frequency modulation is employed, in order to increase the signal-to-noise ratio, enabling the detection of individual superparamagnetic beads of 2.8 μm in diameter. Replacing the biochemical immobilization layer by the trapping well greatly simplifies the detection process. After applying the mixture of E. coli and magnetic beads to the biosensor system, bacteria detection is achieved in a single step, within a few minutes. © 2013 IEEE.

  17. Fiber-Optic Based Compact Gas Leak Detection System

    Science.gov (United States)

    deGroot, Wim A.

    1995-01-01

    A propellant leak detection system based on Raman scattering principles is introduced. The proposed system is flexible and versatile as the result of the use of optical fibers. It is shown that multiple species can be monitored simultaneously. In this paper oxygen, nitrogen, carbon monoxide, and hydrogen are detected and monitored. The current detection sensitivity for both hydrogen and carbon monoxide is 1% partial pressure at ambient conditions. The sensitivity for oxygen and nitrogen is 0.5% partial pressure. The response time to changes in species concentration is three minutes. This system can be used to monitor multiple species at several locations.

  18. Lung nodule detection on chest CT: evaluation of a computer-aided detection (CAD) system

    International Nuclear Information System (INIS)

    Lee, In Jae; Gamsu, Gordon; Czum, Julianna; Johnson, Rebecca; Chakrapani, Sanjay; Wu, Ning

    2005-01-01

    To evaluate the capacity of a computer-aided detection (CAD) system to detect lung nodules in clinical chest CT. A total of 210 consecutive clinical chest CT scans and their reports were reviewed by two chest radiologists and 70 were selected (33 without nodules and 37 with 1-6 nodules, 4-15.4 mm in diameter). The CAD system (ImageChecker CT LN-1000) developed by R2 Technology, Inc. (Sunnyvale, CA) was used. Its algorithm was designed to detect nodules with a diameter of 4-20 mm. The two chest radiologists working with the CAD system detected a total of 78 nodules. These 78 nodules form the database for this study. Four independent observers interpreted the studies with and without the CAD system. The detection rates of the four independent observers without CAD were 81% (63/78), 85% (66/78), 83% (65/78), and 83% (65/78), respectively. With CAD their rates were 87% (68/78), 85% (66/78), 86% (67/78), and 85% (66/78), respectively. The differences between these two sets of detection rates did not reach statistical significance. In addition, CAD detected eight nodules that were not mentioned in the original clinical radiology reports. The CAD system produced 1.56 false-positive nodules per CT study. The four test observers had 0, 0.1, 0.17, and 0.26 false-positive results per study without CAD and 0.07, 0.2, 0.23, and 0.39 with CAD, respectively. The CAD system can assist radiologists in detecting pulmonary nodules in chest CT, but with a potential increase in their false positive rates. Technological improvements to the system could increase the sensitivity and specificity for the detection of pulmonary nodules and reduce these false-positive results

  19. Biological Detection System Technologies Technology and Industrial Base Study. A Primer on Biological Detection Technologies

    National Research Council Canada - National Science Library

    2001-01-01

    .... and Canadian military personnel. In light of these concerns both defense departments have increased efforts to develop and field biological agent detection systems to help protect their military forces and fixed assets...

  20. Development of failed fuel detection system for PWR (III)

    International Nuclear Information System (INIS)

    Hwang, Churl Kew; Kang, Hee Dong; Jeong, Seung Ho; Cho, Byung Sub; Yoon, Byeong Joo; Yoon, Jae Seong

    1987-12-01

    Ultrasonic transducers satisfying the conditions for failed fuel rod detection for failed fuel rod detection have been designed and built. And performance tests for them have been carried out. Ultrasonic signal processing units, a manipulator guiding the ultrasonic probe through the fuel assembly lanes and its control units have been constructed. The performance of the system has been verified experimentally to be successful in failed fuel rod detection. (Author)

  1. A model for anomaly classification in intrusion detection systems

    Science.gov (United States)

    Ferreira, V. O.; Galhardi, V. V.; Gonçalves, L. B. L.; Silva, R. C.; Cansian, A. M.

    2015-09-01

    Intrusion Detection Systems (IDS) are traditionally divided into two types according to the detection methods they employ, namely (i) misuse detection and (ii) anomaly detection. Anomaly detection has been widely used and its main advantage is the ability to detect new attacks. However, the analysis of anomalies generated can become expensive, since they often have no clear information about the malicious events they represent. In this context, this paper presents a model for automated classification of alerts generated by an anomaly based IDS. The main goal is either the classification of the detected anomalies in well-defined taxonomies of attacks or to identify whether it is a false positive misclassified by the IDS. Some common attacks to computer networks were considered and we achieved important results that can equip security analysts with best resources for their analyses.

  2. Robust filtering and fault detection of switched delay systems

    CERN Document Server

    Wang, Dong; Wang, Wei

    2013-01-01

    Switched delay systems appear in a wide field of applications including networked control systems, power systems, memristive systems. Though the large amount of ideas with respect to such systems have generated, until now, it still lacks a framework to focus on filter design and fault detection issues which are relevant to life safety and property loss. Beginning with the comprehensive coverage of the new developments in the analysis and control synthesis for switched delay systems, the monograph not only provides a systematic approach to designing the filter and detecting the fault of switched delay systems, but it also covers the model reduction issues. Specific topics covered include: (1) Arbitrary switching signal where delay-independent and delay-dependent conditions are presented by proposing a linearization technique. (2) Average dwell time where a weighted Lyapunov function is come up with dealing with filter design and fault detection issues beside taking model reduction problems. The monograph is in...

  3. Transistor-based particle detection systems and methods

    Science.gov (United States)

    Jain, Ankit; Nair, Pradeep R.; Alam, Muhammad Ashraful

    2015-06-09

    Transistor-based particle detection systems and methods may be configured to detect charged and non-charged particles. Such systems may include a supporting structure contacting a gate of a transistor and separating the gate from a dielectric of the transistor, and the transistor may have a near pull-in bias and a sub-threshold region bias to facilitate particle detection. The transistor may be configured to change current flow through the transistor in response to a change in stiffness of the gate caused by securing of a particle to the gate, and the transistor-based particle detection system may configured to detect the non-charged particle at least from the change in current flow.

  4. Fall Down Detection Under Smart Home System.

    Science.gov (United States)

    Juang, Li-Hong; Wu, Ming-Ni

    2015-10-01

    Medical technology makes an inevitable trend for the elderly population, therefore the intelligent home care is an important direction for science and technology development, in particular, elderly in-home safety management issues become more and more important. In this research, a low of operation algorithm and using the triangular pattern rule are proposed, then can quickly detect fall-down movements of humanoid by the installation of a robot with camera vision at home that will be able to judge the fall-down movements of in-home elderly people in real time. In this paper, it will present a preliminary design and experimental results of fall-down movements from body posture that utilizes image pre-processing and three triangular-mass-central points to extract the characteristics. The result shows that the proposed method would adopt some characteristic value and the accuracy can reach up to 90 % for a single character posture. Furthermore the accuracy can be up to 100 % when a continuous-time sampling criterion and support vector machine (SVM) classifier are used.

  5. Occupancy change detection system and method

    Science.gov (United States)

    Bruemmer, David J [Idaho Falls, ID; Few, Douglas A [Idaho Falls, ID

    2009-09-01

    A robot platform includes perceptors, locomotors, and a system controller. The system controller executes instructions for producing an occupancy grid map of an environment around the robot, scanning the environment to generate a current obstacle map relative to a current robot position, and converting the current obstacle map to a current occupancy grid map. The instructions also include processing each grid cell in the occupancy grid map. Within the processing of each grid cell, the instructions include comparing each grid cell in the occupancy grid map to a corresponding grid cell in the current occupancy grid map. For grid cells with a difference, the instructions include defining a change vector for each changed grid cell, wherein the change vector includes a direction from the robot to the changed grid cell and a range from the robot to the changed grid cell.

  6. Detecting System of Nested Hardware Virtual Machine Monitor

    Directory of Open Access Journals (Sweden)

    Artem Vladimirovich Iuzbashev

    2015-03-01

    Full Text Available Method of nested hardware virtual machine monitor detection was proposed in this work. The method is based on HVM timing attack. In case of HVM presence in system, the number of different instruction sequences execution time values will increase. We used this property as indicator in our detection.

  7. Active Detection for Exposing Intelligent Attacks in Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Weerakkody, Sean [Carnegie Mellon Univ., Pittsburgh, PA (United States); Ozel, Omur [Carnegie Mellon Univ., Pittsburgh, PA (United States); Griffioen, Paul [Carnegie Mellon Univ., Pittsburgh, PA (United States); Sinopoli, Bruno [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    2017-07-01

    In this paper, we consider approaches for detecting integrity attacks carried out by intelligent and resourceful adversaries in control systems. Passive detection techniques are often incorporated to identify malicious behavior. Here, the defender utilizes finely-tuned algorithms to process information and make a binary decision, whether the system is healthy or under attack. We demonstrate that passive detection can be ineffective against adversaries with model knowledge and access to a set of input/output channels. We then propose active detection as a tool to detect attacks. In active detection, the defender leverages degrees of freedom he has in the system to detect the adversary. Specifically, the defender will introduce a physical secret kept hidden from the adversary, which can be utilized to authenticate the dynamics. In this regard, we carefully review two approaches for active detection: physical watermarking at the control input, and a moving target approach for generating system dynamics. We examine practical considerations for implementing these technologies and discuss future research directions.

  8. Probabilistic Anomaly Detection Based On System Calls Analysis

    Directory of Open Access Journals (Sweden)

    Przemysław Maciołek

    2007-01-01

    Full Text Available We present an application of probabilistic approach to the anomaly detection (PAD. Byanalyzing selected system calls (and their arguments, the chosen applications are monitoredin the Linux environment. This allows us to estimate “(abnormality” of their behavior (bycomparison to previously collected profiles. We’ve attached results of threat detection ina typical computer environment.

  9. SSHCure: A Flow-Based SSH Intrusion Detection System

    NARCIS (Netherlands)

    Hellemons, Laurens; Hendriks, Luuk; Hendriks, Luuk; Hofstede, R.J.; Sperotto, Anna; Sadre, R.; Pras, Aiko

    SSH attacks are a main area of concern for network managers, due to the danger associated with a successful compromise. Detecting these attacks, and possibly compromised victims, is therefore a crucial activity. Most existing network intrusion detection systems designed for this purpose rely on the

  10. Millimeter wave, high-resolution, holographic surveillance system

    Energy Technology Data Exchange (ETDEWEB)

    McMakin, D.L.; Sheen, D.M.; Collins, H.D.; Hall, T.E.; Smith, R.R.; Droppo, J.G. Jr.

    1993-12-01

    Millimeter wave holographic imaging systems capable of imaging through clothing to detect contraband, metal, plastic, or ceramic weapons may provided a practical solution to personnel inspection needs in mass transportation centers. Traditional inspection systems, such as metal detectors and x-ray imaging systems, have limitations for the detection of concealed weapons. metal detectors are limited because they cannot detect plastic weapons and x-ray imaging systems are limited in use due to radiological health considerations. A prototype millimeter wave holographic surveillance system has been developed and demonstrated at the Pacific Northwest Laboratory (PNL). The prototype millimeter wave holographic surveillance system developed at PNL consists of a sequentially switched 2 {times} 64 element array coupled to a 35 GHz bi-static transceiver. The sequentially switched array of antennas can be used to obtain the holographic data at high speed by electonically sequencing the antennas along one dimension and performing a mechanical scan along the other dimension. A one-dimensional mechanical scan be be performed in about one second. The prototype system scans an aperture of 0.75 by 2.05. This system has been demonstrated and images have been obtained on volunteers at Sea-Tac International airport in Seattle, Washington.

  11. Millimeter wave, high-resolution, holographic surveillance system

    Science.gov (United States)

    McMakin, D. L.; Sheen, D. M.; Collins, H. D.; Hall, T. E.; Smith, R. R.; Droppo, J. G., Jr.

    Millimeter wave holographic imaging systems capable of imaging through clothing to detect contraband, metal, plastic, or ceramic weapons may provided a practical solution to personnel inspection needs in mass transportation centers. Traditional inspection systems, such as metal detectors and x-ray imaging systems, have limitations for the detection of concealed weapons. Metal detectors are limited because they cannot detect plastic weapons and x-ray imaging systems are limited in use due to radiological health considerations. A prototype millimeter wave holographic surveillance system has been developed and demonstrated at the Pacific Northwest Laboratory (PNL). The prototype millimeter wave holographic surveillance system developed at PNL consists of a sequentially switched 2 (times) 64 element array coupled to a 35 GHz bi-static transceiver. The sequentially switched array of antennas can be used to obtain the holographic data at high speed by electronically sequencing the antennas along one dimension and performing a mechanical scan along the other dimension. A one-dimensional mechanical scan be be performed in about one second. The prototype system scans an aperture of 0.75 by 2.05. This system has been demonstrated and images have been obtained on volunteers at Sea-Tac International airport in Seattle, Washington.

  12. Fault detection for nonlinear systems - A standard problem approach

    DEFF Research Database (Denmark)

    Stoustrup, Jakob; Niemann, Hans Henrik

    1998-01-01

    The paper describes a general method for designing (nonlinear) fault detection and isolation (FDI) systems for nonlinear processes. For a rich class of nonlinear systems, a nonlinear FDI system can be designed using convex optimization procedures. The proposed method is a natural extension of met...

  13. A proposed data base system for detection, classification and ...

    African Journals Online (AJOL)

    A proposed data base system for detection, classification and location of fault on electricity company of Ghana electrical distribution system. Isaac Owusu-Nyarko, Mensah-Ananoo Eugine. Abstract. No Abstract. Keywords: database, classification of fault, power, distribution system, SCADA, ECG. Full Text: EMAIL FULL TEXT ...

  14. A TNA explosives-detection system in airline baggage

    Energy Technology Data Exchange (ETDEWEB)

    Shea, P.; Gozani, T. (Science Applications International Corp., Santa Clara, CA (USA)); Bozorgmanesh, H. (Science Applications International Corp., San Diego, CA (USA))

    1990-12-20

    Existing technologies that are applied to explosives-detection in passenger baggage are briefly discussed. A system based on thermal-neutron analysis (TNA) is described. The actual performance of the system in the field on passenger bags is given. The application of the TNA in an integrated airport security system is discussed in view of the intense public debate on this issue. (orig.).

  15. A System View on Iterative MIMO Detection: Dynamic Sphere Detection versus Fixed Effort List Detection

    Directory of Open Access Journals (Sweden)

    Christina Gimmler-Dumont

    2012-01-01

    reliability information is fed back from the channel decoder to the MIMO detector. In this paper, we derive a basic framework to compare different soft-input soft-output MIMO detectors in open- and closed-loop systems. Within this framework, we analyze a depth-first sphere detector and a breadth-first fixed effort detector for different application scenarios and their effects on area and energy efficiency on the whole system. We present all system components under open- and closed-loop system aspects and determine the overall implementation cost for changing an open-loop system in a closed-loop system.

  16. Malicious Hubs: Detecting Abnormally Malicious Autonomous Systems

    Energy Technology Data Exchange (ETDEWEB)

    Kalafut, Andrew J. [Indiana University; Shue, Craig A [ORNL; Gupta, Prof. Minaxi [Indiana University

    2010-01-01

    While many attacks are distributed across botnets, investigators and network operators have recently targeted malicious networks through high profile autonomous system (AS) de-peerings and network shut-downs. In this paper, we explore whether some ASes indeed are safe havens for malicious activity. We look for ISPs and ASes that exhibit disproportionately high malicious behavior using 12 popular blacklists. We find that some ASes have over 80% of their routable IP address space blacklisted and others account for large fractions of blacklisted IPs. Overall, we conclude that examining malicious activity at the AS granularity can unearth networks with lax security or those that harbor cybercrime.

  17. Detecting Fraud in Internet Auction Systems

    Science.gov (United States)

    Peng, Yanlin; Zhang, Linfeng; Guan, Yong

    Fraud compromises the thriving Internet auction market. Studies have shown that fraudsters often manipulate their reputations through sophisticated collusions with accomplices, enabling them to defeat the reputation-based feedback systems that are used to combat fraud. This paper presents an algorithm that can identify colluding fraudsters in real time. Experiments with eBay transaction data show that the algorithm has low false negative and false positive rates. Furthermore, the algorithm can identify fraudsters who are innocent at the time of the data collection, but engage in fraudulent transactions soon after they accumulate good feedback ratings.

  18. Matrix Characterization in Threat Material Detection Processes

    International Nuclear Information System (INIS)

    Obhodas, J.; Sudac, D.; Valkovic, V.

    2009-01-01

    Matrix characterization in the threat material detection is of utmost importance, it generates the background against which the threat material signal has to be identified. Threat materials (explosive, chemical warfare, ...) are usually contained within small volume inside large volumes of variable matrices. We have studied the influence of matrix materials on the capability of neutron systems to identify hidden threat material. Three specific scenarios are considered in some details: case 1--contraband material in the sea containers, case 2 - explosives in soil (landmines), case 3 - explosives and chemical warfare on the sea bottom. Effects of container cargo material on tagged neutron system are seen in the increase of gamma background and the decrease of neutron beam intensity. Detection of landmines is more complex because of variable soil properties. We have studied in detail space and time variations of soil elemental compositions and in particular hydrogen content (humidity). Of special interest are ammunitions and chemical warfare on the sea bottom, damping sites and leftovers from previous conflicts (WW-I, WW-II and local). In this case sea sediment is background source and its role is similar to the role of the soil in the landmine detection. In addition to geochemical cycling of chemical elements in semi-enclosed sea, like the Adriatic Sea, one has to consider also anthropogenic influence, especially when studying small scale variations in concentration levels. Some preliminary experimental results obtained with tagged neutron sensor inside an underwater vehicle are presented as well as data on sediment characterization by X-Ray Fluorescence.

  19. Ensemble of classifiers based network intrusion detection system performance bound

    CSIR Research Space (South Africa)

    Mkuzangwe, Nenekazi NP

    2017-11-01

    Full Text Available This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the performance...

  20. Implementing an Intrusion Detection System in the Mysea Architecture

    National Research Council Canada - National Science Library

    Tenhunen, Thomas

    2008-01-01

    .... The objective of this thesis is to design an intrusion detection system (IDS) architecture that permits administrators operating on MYSEA client machines to conveniently view and analyze IDS alerts from the single level networks...

  1. Tool for Insider Threat Detection in Corporative Information Systems

    Directory of Open Access Journals (Sweden)

    Victor Sergeevich Vedeneev

    2014-02-01

    Full Text Available Systems and tools for insider threat detection are described. Different meanings of the term “insider”, types of insiders, examples of motivation of insiders, typical insider actions are set.

  2. Alternative vehicle detection technologies for traffic signal systems : technical report.

    Science.gov (United States)

    2009-02-01

    Due to the well-documented problems associated with inductive loops, most jurisdictions have : replaced many intersection loops with video image vehicle detection systems (VIVDS). While VIVDS : have overcome some of the problems with loops such as tr...

  3. A Driver Face Monitoring System for Fatigue and Distraction Detection

    Directory of Open Access Journals (Sweden)

    Mohamad-Hoseyn Sigari

    2013-01-01

    Full Text Available Driver face monitoring system is a real-time system that can detect driver fatigue and distraction using machine vision approaches. In this paper, a new approach is introduced for driver hypovigilance (fatigue and distraction detection based on the symptoms related to face and eye regions. In this method, face template matching and horizontal projection of top-half segment of face image are used to extract hypovigilance symptoms from face and eye, respectively. Head rotation is a symptom to detect distraction that is extracted from face region. The extracted symptoms from eye region are (1 percentage of eye closure, (2 eyelid distance changes with respect to the normal eyelid distance, and (3 eye closure rate. The first and second symptoms related to eye region are used for fatigue detection; the last one is used for distraction detection. In the proposed system, a fuzzy expert system combines the symptoms to estimate level of driver hypo-vigilance. There are three main contributions in the introduced method: (1 simple and efficient head rotation detection based on face template matching, (2 adaptive symptom extraction from eye region without explicit eye detection, and (3 normalizing and personalizing the extracted symptoms using a short training phase. These three contributions lead to develop an adaptive driver eye/face monitoring. Experiments show that the proposed system is relatively efficient for estimating the driver fatigue and distraction.

  4. Anomaly-based intrusion detection for SCADA systems

    International Nuclear Information System (INIS)

    Yang, D.; Usynin, A.; Hines, J. W.

    2006-01-01

    Most critical infrastructure such as chemical processing plants, electrical generation and distribution networks, and gas distribution is monitored and controlled by Supervisory Control and Data Acquisition Systems (SCADA. These systems have been the focus of increased security and there are concerns that they could be the target of international terrorists. With the constantly growing number of internet related computer attacks, there is evidence that our critical infrastructure may also be vulnerable. Researchers estimate that malicious online actions may cause $75 billion at 2007. One of the interesting countermeasures for enhancing information system security is called intrusion detection. This paper will briefly discuss the history of research in intrusion detection techniques and introduce the two basic detection approaches: signature detection and anomaly detection. Finally, it presents the application of techniques developed for monitoring critical process systems, such as nuclear power plants, to anomaly intrusion detection. The method uses an auto-associative kernel regression (AAKR) model coupled with the statistical probability ratio test (SPRT) and applied to a simulated SCADA system. The results show that these methods can be generally used to detect a variety of common attacks. (authors)

  5. Developing nucleic acid-based electrical detection systems

    Directory of Open Access Journals (Sweden)

    Gabig-Ciminska Magdalena

    2006-03-01

    Full Text Available Abstract Development of nucleic acid-based detection systems is the main focus of many research groups and high technology companies. The enormous work done in this field is particularly due to the broad versatility and variety of these sensing devices. From optical to electrical systems, from label-dependent to label-free approaches, from single to multi-analyte and array formats, this wide range of possibilities makes the research field very diversified and competitive. New challenges and requirements for an ideal detector suitable for nucleic acid analysis include high sensitivity and high specificity protocol that can be completed in a relatively short time offering at the same time low detection limit. Moreover, systems that can be miniaturized and automated present a significant advantage over conventional technology, especially if detection is needed in the field. Electrical system technology for nucleic acid-based detection is an enabling mode for making miniaturized to micro- and nanometer scale bio-monitoring devices via the fusion of modern micro- and nanofabrication technology and molecular biotechnology. The electrical biosensors that rely on the conversion of the Watson-Crick base-pair recognition event into a useful electrical signal are advancing rapidly, and recently are receiving much attention as a valuable tool for microbial pathogen detection. Pathogens may pose a serious threat to humans, animal and plants, thus their detection and analysis is a significant element of public health. Although different conventional methods for detection of pathogenic microorganisms and their toxins exist and are currently being applied, improvements of molecular-based detection methodologies have changed these traditional detection techniques and introduced a new era of rapid, miniaturized and automated electrical chip detection technologies into pathogen identification sector. In this review some developments and current directions in

  6. Detection systems for radioactive ion beams; Systeme de detection en ions radioactifs

    Energy Technology Data Exchange (ETDEWEB)

    Savajols, H

    2002-07-01

    Two main methods are used to produce radioactive ion beams: -) the ISOL method (isotope separation on-line) in which the stable beam interacts with a thick target, the reaction products diffuse outside the target and are transferred to a source where they are ionized, a mass separator and a post-accelerator drive the selected radioactive ions to the right energy; -) the in-flight fragmentation method in which the stable beam interacts with a thin target, the reaction products are emitted from the target with a restricted angular distribution and a velocity close to that of the incident beam, the experimenter has to take advantage from the reaction kinetics to get the right particle beam. Characteristic time is far longer with the ISOL method but the beam intensity is much better because of the use of a post-accelerator. In both cases, the beam intensity is lower by several orders of magnitude than in the case of a stable beam. This article presents all the constraints imposed by radioactive beams to the detection systems of the reaction products and gives new technical solutions according to the type of nuclear reaction studied. (A.C.)

  7. Design and implementation of network attack analysis and detect system

    International Nuclear Information System (INIS)

    Lu Zhigang; Wu Huan; Liu Baoxu

    2007-01-01

    This paper first analyzes the present research state of IDS (intrusion detection system), classifies and compares existing methods. According to the problems existing in IDS, such as false-positives, false-negatives and low information visualization, this paper suggests a system named NAADS which supports multi data sources. Through a series of methods such as clustering analysis, association analysis and visualization, rate of detection and usability of NAADS are increased. (authors)

  8. Detecting new objects and building models with active robot system

    OpenAIRE

    Stergaršek Kuzmič, Eva

    2010-01-01

    An important element of a cognitive robotic system is the ability to detect novel objects and learn their representations, which are suitable for later recognition and manipulation. The basic assumption of our work is that the detection and segmentation of new objects can be facilitated by an active robotic system, which can not only observe the objects but can also manipulate them. Manipulation supports object segmentation and the accumulation of object features, which provides the basis for...

  9. Fault Detection and Performance Monitoring in PV Systems

    OpenAIRE

    Vasco Brogueira Andrade

    2017-01-01

    Given the exponential growth of the PV sector in recent years and the market?s overall need for new PV monitoring solutions, this dissertation aims at creating an automatic fault detection tool for PV systems, more specifically for shading and soiling situations. By detecting deviations in the measured PV systems? data patterns, this tool aims at providing essential information for the deployment of the right maintenance strategy for each situation.

  10. A System for Detecting Miscues in Dyslexic Read Speech

    DEFF Research Database (Denmark)

    Rasmussen, Morten Højfeldt; Tan, Zheng-Hua; Lindberg, Børge

    2009-01-01

    While miscue detection in general is a well explored research field little attention has so far been paid to miscue detection in dyslexic read speech. This domain differs substantially from the domains that are commonly researched, as for example dyslexic read speech includes frequent regressions...... that the system detects miscues at a false alarm rate of 5.3% and a miscue detection rate of 40.1%. These results are worse than current state of the art reading tutors perhaps indicating that dyslexic read speech is a challenge to handle....

  11. Attack Pattern Analysis Framework for a Multiagent Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Krzysztof Juszczyszyn

    2008-08-01

    Full Text Available The paper proposes the use of attack pattern ontology and formal framework for network traffic anomalies detection within a distributed multi-agent Intrusion Detection System architecture. Our framework assumes ontology-based attack definition and distributed processing scheme with exchange of communicates between agents. The role of traffic anomalies detection was presented then it has been discussed how some specific values characterizing network communication can be used to detect network anomalies caused by security incidents (worm attack, virus spreading. Finally, it has been defined how to use the proposed techniques in distributed IDS using attack pattern ontology.

  12. Deep Recurrent Neural Networks for seizure detection and early seizure detection systems

    Energy Technology Data Exchange (ETDEWEB)

    Talathi, S. S. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2017-06-05

    Epilepsy is common neurological diseases, affecting about 0.6-0.8 % of world population. Epileptic patients suffer from chronic unprovoked seizures, which can result in broad spectrum of debilitating medical and social consequences. Since seizures, in general, occur infrequently and are unpredictable, automated seizure detection systems are recommended to screen for seizures during long-term electroencephalogram (EEG) recordings. In addition, systems for early seizure detection can lead to the development of new types of intervention systems that are designed to control or shorten the duration of seizure events. In this article, we investigate the utility of recurrent neural networks (RNNs) in designing seizure detection and early seizure detection systems. We propose a deep learning framework via the use of Gated Recurrent Unit (GRU) RNNs for seizure detection. We use publicly available data in order to evaluate our method and demonstrate very promising evaluation results with overall accuracy close to 100 %. We also systematically investigate the application of our method for early seizure warning systems. Our method can detect about 98% of seizure events within the first 5 seconds of the overall epileptic seizure duration.

  13. A subtractive approach to interior intrusion detection system design

    International Nuclear Information System (INIS)

    Sons, R.J.; Graham, R.H. Jr.

    1986-01-01

    This paper discusses the subtractive approach to interior intrusion detection system design which assumes that all sensors are viable candidates until they are subjected to the constraints imposed by a particular facility. The constraints are determined by a sequence of questions concerning parameters such as threat definition, facility description and operation, environment, assets to be protected, security system capabilities, and cost. As a result of the questioning, some sensors will be eliminated from the candidate list, and the ''best'' set of sensors for the facility will remain. This form of questioning could be incorporated into an expert system aiding future intrusion detection system designs

  14. Wide area surveillance real-time motion detection systems

    CERN Document Server

    2014-01-01

    The book describes a system for visual surveillance using intelligent cameras. The camera uses robust techniques for detecting and tracking moving objects. The real time capture of the objects is then stored int he database. The tracking data stored in the database is analysed to study the camera view, detect and track objects, and study object behavior. These set of models provide a robust framework for coordinating the tracking of objects between overlapping and non-overlapping cameras, and recording the activity of objects detected by the system.

  15. A neuromorphic system for object detection and classification

    Science.gov (United States)

    Khosla, Deepak; Chen, Yang; Kim, Kyungnam; Cheng, Shinko Y.; Honda, Alexander L.; Zhang, Lei

    2013-05-01

    Unattended object detection, recognition and tracking on unmanned reconnaissance platforms in battlefields and urban spaces are topics of emerging importance. In this paper, we present an unattended object recognition system that automatically detects objects of interest in videos and classifies them into various categories (e.g., person, car, truck, etc.). Our system is inspired by recent findings in visual neuroscience on feed-forward object detection and recognition pipeline and mirrors that via two main neuromorphic modules (1) A front-end detection module that combines form and motion based visual attention to search for and detect "integrated" object percepts as is hypothesized to occur in the human visual pathways; (2) A back-end recognition module that processes only the detected object percepts through a neuromorphic object classification algorithm based on multi-scale convolutional neural networks, which can be efficiently implemented in COTS hardware. Our neuromorphic system was evaluated using a variety of urban area video data collected from both stationary and moving platforms. The data are quite challenging as it includes targets at long ranges, occurring under variable conditions of illuminations and occlusion with high clutter. The experimental results of our system showed excellent detection and classification performance. In addition, the proposed bio-inspired approach is good for hardware implementation due to its low complexity and mapping to off-the-shelf conventional hardware.

  16. Detection device for off-gas system accidents

    International Nuclear Information System (INIS)

    Kubota, Ryuji; Tsuruoka, Ryozo; Yamanari, Shozo.

    1984-01-01

    Purpose: To rapidly isolate the off-gas system by detecting the off-gas system failure accident in a short time. Constitution: Radiation monitors are disposed to ducts connecting an exhaust gas area and an air conditioning system as a portion of a turbine building. The ducts are disposed independently such that they ventilate only the atmosphere in the exhaust gas area and do not mix the atmosphere in the turbine building. Since radioactivity issued upon off-gas accidents to the exhaust gas area is sucked to the duct, it can be detected by radiation detection monitors in a short time after the accident. Further, since the operator judges it as the off-gas system accident, the off-gas system can be isolated in a short time after the accident. (Moriyama, K.)

  17. Evaluation of video detection systems, volume 3 : effects of windy conditions in the performance of video detection systems.

    Science.gov (United States)

    2008-05-01

    The performance of three Video Detection Systems (VDS), namely Autoscope, Iteris, and Peek, was evaluated : at stop bar and advance locations, at an instrumented signalized intersection located in Rantoul, Illinois, utilizing : a side-by-side install...

  18. Evaluation of video detection systems, volume 4 : effects of adverse weather conditions in the performance of video detection systems.

    Science.gov (United States)

    2009-03-01

    The performance of three video detection systems (VDS): Iteris, Autoscope, and Peek, was evaluated : using a side-by-side installation at a signalized intersection under various adverse weather conditions including : rain and snow in both day and nig...

  19. Evaluation of video detection systems, volume 1 : effects of configuration changes in the performance of video detection systems.

    Science.gov (United States)

    2009-10-01

    The effects of modifying the configuration of three video detection (VD) systems (Iteris, Autoscope, and Peek) : are evaluated in daytime and nighttime conditions. Four types of errors were used: false, missed, stuck-on, and : dropped calls. The thre...

  20. Design criteria and principles for criticality detection and alarm systems

    International Nuclear Information System (INIS)

    Delafield, H.J.; Clifton, J.J.

    1984-10-01

    The report gives design principles and criteria for criticality detection and alarm systems based on earlier work and revised in the light of more recent experience. In particular, account is taken of the developments which have taken place in the field of radiation detection and in the understanding of the different types of criticality excursion. General guidance is given on the principles to apply in deciding upon the need for a criticality system. The characteristics of a criticality incident are described in terms of the minimum incident of concern, and the radiation field. Criteria for the threshold of detection of a criticality incident are then derived and the methods of detection considered. The selection and siting of criticality detectors is discussed, and design principles are given for alarm systems. Finally, testing and post-alarm procedures are outlined, followed by a summary of the principal recommendations. The supporting Appendices include a discussion of reliability and a summary of radiation detector characteristics. (author)

  1. A UAV-BASED ROE DEER FAWN DETECTION SYSTEM

    Directory of Open Access Journals (Sweden)

    M. Israel

    2012-09-01

    Full Text Available This paper presents a UAV based remote sensing system for the detection of fawns in the meadows. There is a high demand because during pasture mowing many wild animals, especially roe deer fawns are killed by mowing machines. The system was tested in several real situations especially with differing weather and iluminating conditions. Its primary sensor is a lightweight thermal infrared camera. The images are captured onboard of the flight system and also transmitted as analog video stream to the ground station, where the user can follow the camera live stream on a monitor for manual animal detection. Beside a high detection rate a fast workflow is another very important objective for this application. Therefore a waypoint planning software was developed that accelerates the workflow. At adequate illuminating and weather conditions the presented UAV-based fawn detection via thermal imaging is a comfortable, fast and reliable method.

  2. a Uav-Based ROE Deer Fawn Detection System

    Science.gov (United States)

    Israel, M.

    2011-09-01

    This paper presents a UAV based remote sensing system for the detection of fawns in the meadows. There is a high demand because during pasture mowing many wild animals, especially roe deer fawns are killed by mowing machines. The system was tested in several real situations especially with differing weather and iluminating conditions. Its primary sensor is a lightweight thermal infrared camera. The images are captured onboard of the flight system and also transmitted as analog video stream to the ground station, where the user can follow the camera live stream on a monitor for manual animal detection. Beside a high detection rate a fast workflow is another very important objective for this application. Therefore a waypoint planning software was developed that accelerates the workflow. At adequate illuminating and weather conditions the presented UAV-based fawn detection via thermal imaging is a comfortable, fast and reliable method.

  3. Detection of forced oscillations in power systems with multichannel methods

    Energy Technology Data Exchange (ETDEWEB)

    Follum, James D. [Pacific Northwest National Laboratory (PNNL), Richland, WA (United States)

    2015-09-30

    The increasing availability of high fidelity, geographically dispersed measurements in power systems improves the ability of researchers and engineers to study dynamic behaviors in the grid. One such behavior that is garnering increased attention is the presence of forced oscillations. Power system engineers are interested in forced oscillations because they are often symptomatic of the malfunction or misoperation of equipment. Though the resulting oscillation is not always large in amplitude, the root cause may be serious. In this report, multi-channel forced oscillation detection methods are developed. These methods leverage previously developed detection approaches based on the periodogram and spectral-coherence. Making use of geographically distributed channels of data is shown to improved detection performance and shorten the delay before an oscillation can be detected in the online environment. Results from simulated and measured power system data are presented.

  4. Detection and Location of Structural Degradation in Mechanical Systems

    International Nuclear Information System (INIS)

    Blakeman, E.D.; Damiano, B.; Phillips, L.D.

    1999-01-01

    The investigation of a diagnostic method for detecting and locating the source of structural degradation in a mechanical system is described in this paper. The diagnostic method uses a mathematical model of the mechanical system to determine relationships between system parameters and measurable spectral features. These relationships are incorporated into a neural network, which associates measured spectral features with system parameters. Condition diagnosis is performed by presenting the neural network with measured spectral features and comparing the system parameters estimated by the neural network to previously estimated values. Changes in the estimated system parameters indicate the location and severity of degradation in the mechanical system

  5. Perancangan dan Implementasi Instrusion Detection System di Jaringan Universitas Diponegoro

    Directory of Open Access Journals (Sweden)

    Dyakso Anindito Nugroho

    2015-04-01

    Full Text Available The use of information technology gives the advantage of open access for its users, but a new problem arises that there is a threat from unauthorized users. Intrusion Detection System (IDS is applied to assist administrator to monitoring network security. IDS displays illegal access information in a raw form which is require more time to read the detected threats. This final project aims to design an IDS with web application which is made for pulling information on IDS sensor database, then processing and representing them in tables and graphs that are easy to understand. The web application also has IpTables firewall module to block attacker's IP address. The hardware used is Cisco IPS 4240, two computers Compaq Presario 4010F as client and gateway, and Cisco Catalyst 2960 switch. The software used is Ubuntu 12.0 LTS Precise operating system, BackTrack 5 R1 operating system, PHP 5.4 programming language, MySQL 5 database, and web-based system configuration tool Webmin. Testing is done using several BackTrack applications with the aim of Cisco IPS 4240 is capable of detecting accordance with the applicable rules. Each events of any attack attempt or threat was obtained from IDS sensor database in XML form. XML file is sent using Security Device Event Exchange (SDEE protocol. The web application is tested by looking at the output tables and graphs that displays the appropriate results of sensor detection. This study generated an intrusion detection system that is easier to monitor. Network packets copied by the Cisco 2960 switch and then forwarded to the sensor. Intruder detection is done by Cisco IPS 4240 sensor. Log detection processed by the web application into tables and graphs. Intrusion detection systems are intended to improve network security.

  6. Detection performance of laser range-gated imaging system

    Science.gov (United States)

    Xu, Jun; Li, Xiaofeng; Luo, Jijun; Zhang, Shengxiu; Xu, Yibin

    2010-10-01

    Laser radar is rapidly developing towards very capable sensors for number of applications such as military sensing and guidance, auto collision avoidance, robotic vision and atmospheric sensing. In this paper, the detection performance of non-scanned Laser Rang-gated (LRG) imaging system is studied. In order to compute the detection range of laser active imaging system, the range equation is derived by using laser illuminating model and considering factors which affect system imaging quality. According to the principle of laser radar and the characters of objects and the detectors in special applied setting, it mainly deduced the non-scanned laser radar range equation of the range-gated system, meanwhile, the SNR model of non-scanned LRG imaging system is set up. Then, relationship of the detection probability, the false alarm probability and the signal-to-noise ratio in the non-scanned LRG imaging system are analyzed, the influence factors of system's performance are pointed out, and the solution is proposed. The detection performance simulation software of non-scanned LRG imaging system is designed with MATLAB and the performance of the imaging system is simulated.

  7. A prototype detection system for atmospheric monitoring of xenon radioisotopes

    Science.gov (United States)

    Czyz, Steven A.; Farsoni, Abi T.; Ranjbar, Lily

    2018-03-01

    The design of a radioxenon detection system utilizing a CdZeTe crystal and a plastic scintillator coupled to an array of SiPMs to conduct beta-gamma coincidence detection for atmospheric radioxenon monitoring, as well as the measurement of 135Xe and 133/133mXe, have been detailed previously. This paper presents recent measurements of 133/133mXe and 131mXe and the observation of conversion electrons in their coincidence spectra, as well as a 48-hour background measurement to calculate the Minimum Detectable Concentration (MDC) of radioxenon isotopes in the system. The identification of Regions of Interest (ROIs) in the coincidence spectra yielded from the radioxenon measurements, and the subsequent calculation of the MDCs of the system for 135Xe, 133/133mXe, and 131mXe, are also discussed. Calculated MDCs show that the detection system preforms respectably when compared to other state of the art radioxenon detection systems and achieved an MDC of less than 1 mBq/m3 for 131mXe, 133Xe, and 133mXe, in accordance with limits set by the Comprehensive Nuclear-Test-Ban Treaty (CTBTO). The system also provides the advantage of room temperature operation, compactness, low noise operation and having simple readout electronics.

  8. On proximity detection systems for pico-projectors

    OpenAIRE

    Buckley, Edward

    2012-01-01

    It has been suggested that proximity detection systems could potentially be beneficial in increasing the eye-safe luminous flux of laser-based picoprojectors. In this letter it is shown that, whilst the benefit for LCOS-based systems could be significant, the impact upon scanned-beam projectors is far smaller.

  9. Configuration of electro-optic fire source detection system

    Science.gov (United States)

    Fabian, Ram Z.; Steiner, Zeev; Hofman, Nir

    2007-04-01

    The recent fighting activities in various parts of the world have highlighted the need for accurate fire source detection on one hand and fast "sensor to shooter cycle" capabilities on the other. Both needs can be met by the SPOTLITE system which dramatically enhances the capability to rapidly engage hostile fire source with a minimum of casualties to friendly force and to innocent bystanders. Modular system design enable to meet each customer specific requirements and enable excellent future growth and upgrade potential. The design and built of a fire source detection system is governed by sets of requirements issued by the operators. This can be translated into the following design criteria: I) Long range, fast and accurate fire source detection capability. II) Different threat detection and classification capability. III) Threat investigation capability. IV) Fire source data distribution capability (Location, direction, video image, voice). V) Men portability. ) In order to meet these design criteria, an optimized concept was presented and exercised for the SPOTLITE system. Three major modular components were defined: I) Electro Optical Unit -Including FLIR camera, CCD camera, Laser Range Finder and Marker II) Electronic Unit -including system computer and electronic. III) Controller Station Unit - Including the HMI of the system. This article discusses the system's components definition and optimization processes, and also show how SPOTLITE designers successfully managed to introduce excellent solutions for other system parameters.

  10. Automated system for crack detection using infrared thermograph

    International Nuclear Information System (INIS)

    Starman, Stanislav

    2009-01-01

    The objective of this study was the development of the automated system for crack detection on square steel bars used in the automotive industry for axle and shaft construction. The automated system for thermographic crack detection uses brief pulsed eddy currents to heat steel components under inspection. Cracks, if present, will disturb the current flow and so generate changes in the temperature profile in the crack area. These changes of temperature are visualized using an infrared camera. The image acquired by the infrared camera is evaluated through an image processing system. The advantages afforded by the system are its inspection time, its excellent flaw detection sensitivity and its ability to detect hidden, subsurface cracks. The automated system consists of four IR cameras (each side of steel bar is evaluated at a time), coil, high frequency generator and control place with computers. The system is a part of the inspection line where the subsurface and surface cracks are searched. If the crack is present, the cracked place is automatically marked. The components without cracks are then deposited apart from defective blocks. The system is fully automated and its ability is to evaluate four meter blocks within 20 seconds. This is the real reason for using this system in real industrial applications. (author)

  11. Sensor Failure Detection of FASSIP System using Principal Component Analysis

    Science.gov (United States)

    Sudarno; Juarsa, Mulya; Santosa, Kussigit; Deswandri; Sunaryo, Geni Rina

    2018-02-01

    In the nuclear reactor accident of Fukushima Daiichi in Japan, the damages of core and pressure vessel were caused by the failure of its active cooling system (diesel generator was inundated by tsunami). Thus researches on passive cooling system for Nuclear Power Plant are performed to improve the safety aspects of nuclear reactors. The FASSIP system (Passive System Simulation Facility) is an installation used to study the characteristics of passive cooling systems at nuclear power plants. The accuracy of sensor measurement of FASSIP system is essential, because as the basis for determining the characteristics of a passive cooling system. In this research, a sensor failure detection method for FASSIP system is developed, so the indication of sensor failures can be detected early. The method used is Principal Component Analysis (PCA) to reduce the dimension of the sensor, with the Squarred Prediction Error (SPE) and statistic Hotteling criteria for detecting sensor failure indication. The results shows that PCA method is capable to detect the occurrence of a failure at any sensor.

  12. Real-time thermal neutron radiographic detection systems

    International Nuclear Information System (INIS)

    Berger, H.; Bracher, D.A.

    1976-01-01

    Systems for real-time detection of thermal neutron images are reviewed. Characteristics of one system are presented; the data include contrast, resolution and speed of response over the thermal neutron intensity range 2.5 10 3 n/cm 2 -sec to 10 7 n/cm 2 -sec

  13. Start up of the whole body detection system

    International Nuclear Information System (INIS)

    Cortes P, A.; Angeles C, A.; Cuapio O, A.; Tejera R, A.

    1991-12-01

    The management of Radiological Safety of the Nuclear Center of Mexico has a whole body detection system Trade mark Canberra, manufactured by Bio-nuclear Measurements Inc. Ipswich Massachusetts. These systems are used to detect contamination of I-131 in thyroid and other nuclides (Cs-137, Cs-134, Co-60, etc.) in thorax. In this work the procedure that was continued for the setting in march of the thyroid detector is presented. A description of this system and an analysis of the uncertainties involved in the measures of activity of I-131 in thyroid of people occupationally exposed is made. (Author)

  14. Image Pre-processing in Vertical Traffic Signs Detection System

    Directory of Open Access Journals (Sweden)

    Dávid Solus

    2015-06-01

    Full Text Available The aim of this paper is to present the first steps of the systems design that will be able to detect vertical traffic signs and to provide descriptions of the applied data processing methods. This system includes various functional blocks that are described in this paper. The basis of Vertical Traffic Signs Detection System is a pre-processing of a captured traffic scene ahead of vehicle. Main part of this paper contains a description of user friendly software interface for an image pre-processing.

  15. Detection Algorithms of the Seismic Alert System of Mexico (SASMEX)

    Science.gov (United States)

    Cuellar Martinez, A.; Espinosa Aranda, J.; Ramos Perez, S.; Ibarrola Alvarez, G.; Zavala Guerrero, M.; Sasmex

    2013-05-01

    The importance of a rapid and reliable detection of an earthquake, allows taking advantage with more opportunity time of any possible opportunity warnings to the population. Thus detection algorithms in the sensing field station (FS) of an earthquake early earning system, must have a high rate of correct detection; this condition lets perform numerical processes to obtain appropriate parameters for the alert activation. During the evolution and continuous service of the Mexican Seismic Alert System (SASMEX) in more than 23 operation years, it has used various methodologies in the detection process to get the largest opportunity time when an earthquake occurs and it is alerted. In addition to the characteristics of the acceleration signal observed in sensing field stations, it is necessary the site conditions reducing urban noise, but sometimes it is not present through of the first operation years, however, urban growth near to FS cause urban noise, which should be tolerated while carrying out the relocation process of the station, and in the algorithm design should be contemplating the robustness to reduce possible errors and false detections. This work presents some results on detection algorithms used in Mexico for early warning systems for earthquakes considering recent events and different opportunity times obtained depending of the detections on P and S phases of the earthquake detected in the station. Some methodologies are reviewed and described in detail in this work and the main features implemented in The Seismic Alert System of Mexico City (SAS), in continuous operation since 1991, and the Seismic Alert System of Oaxaca City (SASO), today both comprise the SASMEX.

  16. Vision-Based People Detection System for Heavy Machine Applications

    Directory of Open Access Journals (Sweden)

    Vincent Fremont

    2016-01-01

    Full Text Available This paper presents a vision-based people detection system for improving safety in heavy machines. We propose a perception system composed of a monocular fisheye camera and a LiDAR. Fisheye cameras have the advantage of a wide field-of-view, but the strong distortions that they create must be handled at the detection stage. Since people detection in fisheye images has not been well studied, we focus on investigating and quantifying the impact that strong radial distortions have on the appearance of people, and we propose approaches for handling this specificity, adapted from state-of-the-art people detection approaches. These adaptive approaches nevertheless have the drawback of high computational cost and complexity. Consequently, we also present a framework for harnessing the LiDAR modality in order to enhance the detection algorithm for different camera positions. A sequential LiDAR-based fusion architecture is used, which addresses directly the problem of reducing false detections and computational cost in an exclusively vision-based system. A heavy machine dataset was built, and different experiments were carried out to evaluate the performance of the system. The results are promising, in terms of both processing speed and performance.

  17. Vision-Based People Detection System for Heavy Machine Applications.

    Science.gov (United States)

    Fremont, Vincent; Bui, Manh Tuan; Boukerroui, Djamal; Letort, Pierrick

    2016-01-20

    This paper presents a vision-based people detection system for improving safety in heavy machines. We propose a perception system composed of a monocular fisheye camera and a LiDAR. Fisheye cameras have the advantage of a wide field-of-view, but the strong distortions that they create must be handled at the detection stage. Since people detection in fisheye images has not been well studied, we focus on investigating and quantifying the impact that strong radial distortions have on the appearance of people, and we propose approaches for handling this specificity, adapted from state-of-the-art people detection approaches. These adaptive approaches nevertheless have the drawback of high computational cost and complexity. Consequently, we also present a framework for harnessing the LiDAR modality in order to enhance the detection algorithm for different camera positions. A sequential LiDAR-based fusion architecture is used, which addresses directly the problem of reducing false detections and computational cost in an exclusively vision-based system. A heavy machine dataset was built, and different experiments were carried out to evaluate the performance of the system. The results are promising, in terms of both processing speed and performance.

  18. Active IR System for Projectile Detection and Tracking

    Directory of Open Access Journals (Sweden)

    STANCIC, I.

    2017-11-01

    Full Text Available Reliable detection and tracking of high-speed projectiles is crucial in providing modern battlefield protection or to be used as a forensic tool. Subsonic projectiles fired from silenced weapons are difficult to detect, whereas reliable tracking of the projectile trajectory is hard to accomplish. Contemporary radar based counter-battery systems showed to be valuable in detection of incoming artillery fire, but are unable to provide detection at close ranges. In this paper, an active IR system is proposed that aims to detect and track incoming projectiles at close ranges. Proposed system is able to reconstruct projectile’s trajectory in space, predict impact location and estimate direction of projectile origin. Active detector system is based on a pair of high-speed cameras in stereo-configuration synced with computer and IR illuminator that emits coded IR light bursts. Innovative IR light coding enables automated detection and tracking of a nearby projectile and elimination of false positive alarms caused by distant objects.

  19. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Science.gov (United States)

    Cho, Eung Jun; Hong, Choong Seon; Lee, Sungwon; Jeon, Seokhee

    2013-01-01

    The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  20. A Partially Distributed Intrusion Detection System for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Eung Jun Cho

    2013-11-01

    Full Text Available The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional security mechanisms are not usually applicable due to the sensor nodes having limitations of computational power, memory capacity, and battery power. Therefore, specific security systems should be designed to function under constraints of energy or memory. A partially distributed intrusion detection system with low memory and power demands is proposed here. It employs a Bloom filter, which allows reduced signature code size. Multiple Bloom filters can be combined to reduce the signature code for each Bloom filter array. The mechanism could then cope with potential denial of service attacks, unlike many previous detection systems with Bloom filters. The mechanism was evaluated and validated through analysis and simulation.

  1. Damage Detection Sensor System for Aerospace and Multiple Applications

    Science.gov (United States)

    Williams, Martha; Lewis, Mark; Gibson, Tracy L.; Lane, John; Medelius, Pedro

    2017-01-01

    NASA has identified structural health monitoring and damage detection and verification as critical needs in multiple technology roadmaps. The sensor systems can be customized for detecting location, damage size, and depth, with velocity options and can be designed for particular environments for monitoring of impact or physical damage to a structure. The damage detection system has been successfully demonstrated in a harsh environment and remote integration tested over 1000 miles apart. Multiple applications includes: Spacecraft and Aircraft; Inflatable, Deployable and Expandable Structures; Space Debris Monitoring; Space Habitats; Military Shelters; Solar Arrays, Smart Garments and Wearables, Extravehicular activity (EVA) suits; Critical Hardware Enclosures; Embedded Composite Structures; and Flexible Hybrid Printed Electronics and Systems. For better implementation and infusion into more flexible architectures, important and improved designs in advancing embedded software and GUI interface, and increasing flexibility, modularity, and configurable capabilities of the system are currently being carried out.

  2. Efficient Mining and Detection of Sequential Intrusion Patterns for Network Intrusion Detection Systems

    Science.gov (United States)

    Shyu, Mei-Ling; Huang, Zifang; Luo, Hongli

    In recent years, pervasive computing infrastructures have greatly improved the interaction between human and system. As we put more reliance on these computing infrastructures, we also face threats of network intrusion and/or any new forms of undesirable IT-based activities. Hence, network security has become an extremely important issue, which is closely connected with homeland security, business transactions, and people's daily life. Accurate and efficient intrusion detection technologies are required to safeguard the network systems and the critical information transmitted in the network systems. In this chapter, a novel network intrusion detection framework for mining and detecting sequential intrusion patterns is proposed. The proposed framework consists of a Collateral Representative Subspace Projection Modeling (C-RSPM) component for supervised classification, and an inter-transactional association rule mining method based on Layer Divided Modeling (LDM) for temporal pattern analysis. Experiments on the KDD99 data set and the traffic data set generated by a private LAN testbed show promising results with high detection rates, low processing time, and low false alarm rates in mining and detecting sequential intrusion detections.

  3. Data analysis of inertial sensor for train positioning detection system

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Seong Jin; Park, Sung Soo; Lee, Jae Ho; Kang, Dong Hoon [Korea Railroad Research Institute, Uiwang (Korea, Republic of)

    2015-02-15

    Train positioning detection information is fundamental for high-speed railroad inspection, making it possible to simultaneously determine the status and evaluate the integrity of railroad equipment. This paper presents the results of measurements and an analysis of an inertial measurement unit (IMU) used as a positioning detection sensors. Acceleration and angular rate measurements from the IMU were analyzed in the amplitude and frequency domains, with a discussion on vibration and train motions. Using these results and GPS information, the positioning detection of a Korean tilting train express was performed from Naju station to Illo station on the Honam-line. The results of a synchronized analysis of sensor measurements and train motion can help in the design of a train location detection system and improve the positioning detection performance.

  4. Enhancing Tumor Detection in IR-UWB Breast Cancer System.

    Science.gov (United States)

    Fouad, Sara; Ghoname, Reda; Elmahdy, Abd Elmonem; Zekry, Abd Elhalim

    2017-01-01

    An ultra-wideband (UWB) microwave system for breast cancer detection is presented. The proposed system includes monocycle pulse generator, antipodal Vivaldi antenna, breast model, and calibration algorithm for tumor detection. Firstly, our pulse generator employs transmission gate in glitch generator to achieve several advantages such as low power consumption and low ringing level. Secondly, the antipodal Vivaldi antenna is designed assuming FR4 dielectric substrate material, and developed antenna element (80 × 80 mm 2 ) features a -10 dB return loss and bandwidth ranges from 2.3 GHz to more than 11 GHz. Thirdly, the phantom breast can be modeled as a layer of skin, fat, and then tumor is inserted in this layer. Finally, subtract and add algorithm (SAD) is used as a calibration algorithm in tumor detection system. The proposed system suggested that horizontal antenna position with 90° between transmitting and receiving antennas is localized as a suitable antenna position with different rotating location and a 0.5 cm near to phantom. The mean advantages of this localization and tracking position around breast is a high received power signal approximately around mv as a higher recognized signal in tumor detection. Using our proposed system we can detect tumor in 5 mm diameter.

  5. Potential detection systems for monitoring UF6 releases

    International Nuclear Information System (INIS)

    Beck, D.E.; Bostick, W.D.; Armstrong, D.P.; McNeely, J.R.; Stockdale, J.A.D.

    1994-09-01

    In the near future, the Nuclear Regulatory Commission (NRC) will begin to regulate the gaseous diffusion plants. Them is a concern that the smoke detectors currently used for uranium hexafluoride (UF 6 ) release detection will not meet NRC safety system requirements such as high reliability and rapid response. The NRC's position is that licensees should utilize state-of-the-art equipment such as hydrogen fluoride (HF) detectors that would provide more dependable detection of a UF 6 release. A survey of the literature and current vendor information was undertaken to define the state-of-the-art and commercial availability of HF (or other appropriate) detection systems. For the purpose of this report, classification of the available HF detection systems is made on the basis of detection principle (e.g., calorimetric, electrochemical, separational, or optical). Emphasis is also placed on whether the device is primarily sensitive to response from a point source (e.g., outleakage in the immediate vicinity of a specific set of components), or whether the device is potentially applicable to remote sensing over a larger area. Traditional HF point source monitoring typically uses gas sampling tubes or coated paper tapes with color developing indicator, portable and small area HF monitors are often based upon electrochemical or extractive/separational systems; and remote sensing by optical systems holds promise for indoor and outdoor large area monitoring (including plant boundary/ambient air monitoring)

  6. Embedded Sensor System for Early Pathology Detection in Building Construction

    OpenAIRE

    Torres, Santiago J. Barro; Cascon, Carlos J. Escudero

    2009-01-01

    Structure pathology detection is an important security task in building construction, which is performed by an operator by looking manually for damages on the materials. This activity could be dangerous if the structure is hidden or difficult to reach. On the other hand, embedded devices and wireless sensor networks (WSN) are becoming popular and cheap, enabling the design of an alternative pathology detection system to monitor structures based on these technologies. This article introduces a...

  7. Telescope sipping the optimum fuel leak detection system

    International Nuclear Information System (INIS)

    Deleryd, R.

    1998-01-01

    The TELESCOPE Sipping technology is an evolutionary development from previous ABB fuel leak systems used in LWR reactors. The system utilizes the existing dynamics that cause numerous fission products to leak from a failed fuel rod when the fuel assembly is raised from a reactor core during core fuel alterations. The system can also be used by repair work in pool side inspection in order to detect leaking rods or to verify reconstituted assemblies as non leakers. (author)

  8. Traffic Congestion Detection System through Connected Vehicles and Big Data

    OpenAIRE

    C?rdenas-Ben?tez, N?stor; Aquino-Santos, Ra?l; Maga?a-Espinoza, Pedro; Aguilar-Velazco, Jos?; Edwards-Block, Arthur; Medina Cass, Aldo

    2016-01-01

    This article discusses the simulation and evaluation of a traffic congestion detection system which combines inter-vehicular communications, fixed roadside infrastructure and infrastructure-to-infrastructure connectivity and big data. The system discussed in this article permits drivers to identify traffic congestion and change their routes accordingly, thus reducing the total emissions of CO2 and decreasing travel time. This system monitors, processes and stores large amounts of data, which ...

  9. Detecting, Representing and Querying Collusion in Online Rating Systems

    OpenAIRE

    Allahbakhsh, Mohammad; Ignjatovic, Aleksandar; Benatallah, Boualem; Beheshti, Seyed-Mehdi-Reza; Foo, Norman; Bertino, Elisa

    2012-01-01

    Online rating systems are subject to malicious behaviors mainly by posting unfair rating scores. Users may try to individually or collaboratively promote or demote a product. Collaborating unfair rating 'collusion' is more damaging than individual unfair rating. Although collusion detection in general has been widely studied, identifying collusion groups in online rating systems is less studied and needs more investigation. In this paper, we study impact of collusion in online rating systems ...

  10. A Fusion of Multiagent Functionalities for Effective Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Dhanalakshmi Krishnan Sadhasivan

    2017-01-01

    Full Text Available Provision of high security is one of the active research areas in the network applications. The failure in the centralized system based on the attacks provides less protection. Besides, the lack of update of new attacks arrival leads to the minimum accuracy of detection. The major focus of this paper is to improve the detection performance through the adaptive update of attacking information to the database. We propose an Adaptive Rule-Based Multiagent Intrusion Detection System (ARMA-IDS to detect the anomalies in the real-time datasets such as KDD and SCADA. Besides, the feedback loop provides the necessary update of attacks in the database that leads to the improvement in the detection accuracy. The combination of the rules and responsibilities for multiagents effectively detects the anomaly behavior, misuse of response, or relay reports of gas/water pipeline data in KDD and SCADA, respectively. The comparative analysis of the proposed ARMA-IDS with the various existing path mining methods, namely, random forest, JRip, a combination of AdaBoost/JRip, and common path mining on the SCADA dataset conveys that the effectiveness of the proposed ARMA-IDS in the real-time fault monitoring. Moreover, the proposed ARMA-IDS offers the higher detection rate in the SCADA and KDD cup 1999 datasets.

  11. On the lower of limit detection of radiometric systems

    International Nuclear Information System (INIS)

    Kamburov, H.; Boneva, S.

    1983-01-01

    The existing definitions of the quantity Asub(min), the lower detection limit, introduced as a characteristic of the sensitivity of radiometric systems are reviewed. A convenient way is found for comparing the different definitions by showing that each definition is connected with a specific value of the probability a of Type I error. The detection limits are calculated for a normal and Poisson distributions of the measured quantities. A criterion is proposed for the applicability of the normal distiribution to the problem of determining the lower detection limit

  12. Statistical Outlier Detection for Jury Based Grading Systems

    DEFF Research Database (Denmark)

    Thompson, Mary Kathryn; Clemmensen, Line Katrine Harder; Rosas, Harvey

    2013-01-01

    This paper presents an algorithm that was developed to identify statistical outliers from the scores of grading jury members in a large project-based first year design course. The background and requirements for the outlier detection system are presented. The outlier detection algorithm...... and the follow-up procedures for score validation and appeals are described in detail. Finally, the impact of various elements of the outlier detection algorithm, their interactions, and the sensitivity of their numerical values are investigated. It is shown that the difference in the mean score produced...

  13. Evaluation of advanced and current leak detection systems

    International Nuclear Information System (INIS)

    Kupperman, D.S.

    1988-01-01

    U.S. Nuclear Regulatory Commission Guide 1.45 recommends the use of at least three different detection methods in reactors to detect leakage. Monitoring of both sump-flow and airborne particulate radioactivity is mandatory. A third method can involve either monitoring of condensate flow rate from air coolers or monitoring of airborne gaseous radioactivity. Although the methods currently used for leak detection reflect the state of the art, other techniques may be developed and used. Since the recommendations of Regulatory Guide 1.45 are not mandatory, Licensee Event Report Compilations have been reviewed to help establish actual capabilities for leak detection. The review of event reports, which had previously covered the period of June 1985 to August 1986 has been extended, and now covers events to June 1987. The total number of significant events is now 83. These reports have provided documented, sometimes detailed, summaries of reactor leaks. They have helped establish the capabilities of existing systems to detect and locate leaks. Differences between PWRs and BWRs with regard to leak detection have now been analyzed. With regard to detection methods, the greatest differences between reactor types are as follows: (a) The sump pump is reported as the detection method more frequently in BWRs than in PWRs (64% vs. 35%). (b) The radiation monitor is reported as the detection method (excluding false alarms) more frequently in PWRs. Current efforts at Argonne National Laboratory (ANL) to evaluate advanced acoustic leak detection methods are directed toward the generation and analysis of acoustic data from large (0.5 to 10 gal/min) leaks and modification of the software of the GARD/ANL advanced acoustic leak detection system. In order to reach the goal of 10 gal/min leaks, the Steam Generator Test Facility at ANL has been modified to carry out the leak testing. Tests were carried out with water at 525 deg. F and 1100 psi leaking through a fatigue crack in a 4-in

  14. Continuous Fraud Detection in Enterprise Systems through Audit Trail Analysis

    Directory of Open Access Journals (Sweden)

    Peter J. Best

    2009-03-01

    Full Text Available Enterprise systems, real time recording and real time reporting pose new and significant challenges to the accounting and auditing professions. This includes developing methods and tools for continuous assurance and fraud detection. In this paper we propose a methodology for continuous fraud detection that exploits security audit logs, changes in master records and accounting audit trails in enterprise systems. The steps in this process are: (1 threat monitoring-surveillance of security audit logs for ‘red flags’, (2 automated extraction and analysis of data from audit trails, and (3 using forensic investigation techniques to determine whether a fraud has actually occurred. We demonstrate how mySAP, an enterprise system, can be used for audit trail analysis in detecting financial frauds; afterwards we use a case study of a suspected fraud to illustrate how to implement the methodology.

  15. An Android malware detection system based on machine learning

    Science.gov (United States)

    Wen, Long; Yu, Haiyang

    2017-08-01

    The Android smartphone, with its open source character and excellent performance, has attracted many users. However, the convenience of the Android platform also has motivated the development of malware. The traditional method which detects the malware based on the signature is unable to detect unknown applications. The article proposes a machine learning-based lightweight system that is capable of identifying malware on Android devices. In this system we extract features based on the static analysis and the dynamitic analysis, then a new feature selection approach based on principle component analysis (PCA) and relief are presented in the article to decrease the dimensions of the features. After that, a model will be constructed with support vector machine (SVM) for classification. Experimental results show that our system provides an effective method in Android malware detection.

  16. Design of Gear Defect Detection System Based on Machine Vision

    Science.gov (United States)

    Wang, Yu; Wu, Zhiheng; Duan, Xianyun; Tong, Jigang; Li, Ping; Chen, min; Lin, Qinglin

    2018-01-01

    In order to solve such problems as low efficiency, low quality and instability of gear surface defect detection, we designed a detection system based on machine vision, sensor coupling. By multisensory coupling, and then CCD camera image collection of gear products, using VS2010 to cooperate with Halcon library for a series of analysis and processing of images. At last, the results are fed back to the control end, and the rejected device is removed to the collecting box. The system has successfully identified defective gear. The test results show that this system can identify and eliminate the defects gear quickly and efficiently. It has reached the requirement of gear product defect detection line automation and has a certain application value.

  17. Stability of detecting system using NaI(Tl)

    International Nuclear Information System (INIS)

    Zhuo Yunshang; Lei Zhangyun; Zen Yu; Gong Hua

    1996-01-01

    A detecting system using NaI(Tl) is widely used in research and industry of nuclear science and other fields. For providing the high accuracy and working well under inclement environment, the stability of detecting system using NaI(Tl) is very important. The variation of environment temperature, the change of counting rate and long time continuous working of detector will cause un-negligible effect on the measurement. Three approaches were used. They are: 1) temperature control (It makes the effect of the variation of environment temperature on the measurement negligible.); 2) spectrum stabilizing (It adjust the peak position of the spectrum when the counting rate changes.); and 3) auto-checking and adjusting (It adjusts the drift of the NaI(Tl) detecting system when it works continuously)

  18. Energy detection UWB system based on pulse width modulation

    Directory of Open Access Journals (Sweden)

    Song Cui

    2014-05-01

    Full Text Available A new energy detection ultra-wideband system based on pulse width modulation is proposed. The bit error rate (BER performance of this new system is slightly worst than that of a pulse position modulation (PPM system in additive white Gaussian noise channels. In multipath channels, this system does not suffer from cross-modulation interference as PPM, so it can achieve better BER performance than PPM when cross-modulation interference occurs. In addition, when synchronisation errors occur, this system is more robust than PPM.

  19. The waveform correlation event detection system global prototype software design

    Energy Technology Data Exchange (ETDEWEB)

    Beiriger, J.I.; Moore, S.G.; Trujillo, J.R.; Young, C.J.

    1997-12-01

    The WCEDS prototype software system was developed to investigate the usefulness of waveform correlation methods for CTBT monitoring. The WCEDS prototype performs global seismic event detection and has been used in numerous experiments. This report documents the software system design, presenting an overview of the system operation, describing the system functions, tracing the information flow through the system, discussing the software structures, and describing the subsystem services and interactions. The effectiveness of the software design in meeting project objectives is considered, as well as opportunities for code refuse and lessons learned from the development process. The report concludes with recommendations for modifications and additions envisioned for regional waveform-correlation-based detector.

  20. ANOLE Portable Radiation Detection System Field Test and Evaluation Campaign

    International Nuclear Information System (INIS)

    Hodge, Chris A.

    2007-01-01

    Handheld, backpack, and mobile sensors are elements of the Global Nuclear Detection System for the interdiction and control of illicit radiological and nuclear materials. They are used by the U.S. Department of Homeland Security (DHS) and other government agencies and organizations in various roles for border protection, law enforcement, and nonproliferation monitoring. In order to systematically document the operational performance of the common commercial off-the-shelf portable radiation detection systems, the DHS Domestic Nuclear Detection Office conducted a test and evaluation campaign conducted at the Nevada Test Site from January 18 to February 27, 2006. Named 'Anole', it was the first test of its kind in terms of technical design and test complexities. The Anole test results offer users information for selecting appropriate mission-specific portable radiation detection systems. The campaign also offered manufacturers the opportunity to submit their equipment for independent operationally relevant testing to subsequently improve their detector performance. This paper will present the design, execution, and methodologies of the DHS Anole portable radiation detection system test campaign

  1. A Multimodal Emotion Detection System during Human-Robot Interaction

    Science.gov (United States)

    Alonso-Martín, Fernando; Malfaz, María; Sequeira, João; Gorostiza, Javier F.; Salichs, Miguel A.

    2013-01-01

    In this paper, a multimodal user-emotion detection system for social robots is presented. This system is intended to be used during human–robot interaction, and it is integrated as part of the overall interaction system of the robot: the Robotics Dialog System (RDS). Two modes are used to detect emotions: the voice and face expression analysis. In order to analyze the voice of the user, a new component has been developed: Gender and Emotion Voice Analysis (GEVA), which is written using the Chuck language. For emotion detection in facial expressions, the system, Gender and Emotion Facial Analysis (GEFA), has been also developed. This last system integrates two third-party solutions: Sophisticated High-speed Object Recognition Engine (SHORE) and Computer Expression Recognition Toolbox (CERT). Once these new components (GEVA and GEFA) give their results, a decision rule is applied in order to combine the information given by both of them. The result of this rule, the detected emotion, is integrated into the dialog system through communicative acts. Hence, each communicative act gives, among other things, the detected emotion of the user to the RDS so it can adapt its strategy in order to get a greater satisfaction degree during the human–robot dialog. Each of the new components, GEVA and GEFA, can also be used individually. Moreover, they are integrated with the robotic control platform ROS (Robot Operating System). Several experiments with real users were performed to determine the accuracy of each component and to set the final decision rule. The results obtained from applying this decision rule in these experiments show a high success rate in automatic user emotion recognition, improving the results given by the two information channels (audio and visual) separately. PMID:24240598

  2. A Multimodal Emotion Detection System during Human–Robot Interaction

    Directory of Open Access Journals (Sweden)

    Miguel A. Salichs

    2013-11-01

    Full Text Available In this paper, a multimodal user-emotion detection system for social robots is presented. This system is intended to be used during human–robot interaction, and it is integrated as part of the overall interaction system of the robot: the Robotics Dialog System (RDS. Two modes are used to detect emotions: the voice and face expression analysis. In order to analyze the voice of the user, a new component has been developed: Gender and Emotion Voice Analysis (GEVA, which is written using the Chuck language. For emotion detection in facial expressions, the system, Gender and Emotion Facial Analysis (GEFA, has been also developed. This last system integrates two third-party solutions: Sophisticated High-speed Object Recognition Engine (SHORE and Computer Expression Recognition Toolbox (CERT. Once these new components (GEVA and GEFA give their results, a decision rule is applied in order to combine the information given by both of them. The result of this rule, the detected emotion, is integrated into the dialog system through communicative acts. Hence, each communicative act gives, among other things, the detected emotion of the user to the RDS so it can adapt its strategy in order to get a greater satisfaction degree during the human–robot dialog. Each of the new components, GEVA and GEFA, can also be used individually. Moreover, they are integrated with the robotic control platform ROS (Robot Operating System. Several experiments with real users were performed to determine the accuracy of each component and to set the final decision rule. The results obtained from applying this decision rule in these experiments show a high success rate in automatic user emotion recognition, improving the results given by the two information channels (audio and visual separately.

  3. A multimodal emotion detection system during human-robot interaction.

    Science.gov (United States)

    Alonso-Martín, Fernando; Malfaz, María; Sequeira, João; Gorostiza, Javier F; Salichs, Miguel A

    2013-11-14

    In this paper, a multimodal user-emotion detection system for social robots is presented. This system is intended to be used during human-robot interaction, and it is integrated as part of the overall interaction system of the robot: the Robotics Dialog System (RDS). Two modes are used to detect emotions: the voice and face expression analysis. In order to analyze the voice of the user, a new component has been developed: Gender and Emotion Voice Analysis (GEVA), which is written using the Chuck language. For emotion detection in facial expressions, the system, Gender and Emotion Facial Analysis (GEFA), has been also developed. This last system integrates two third-party solutions: Sophisticated High-speed Object Recognition Engine (SHORE) and Computer Expression Recognition Toolbox (CERT). Once these new components (GEVA and GEFA) give their results, a decision rule is applied in order to combine the information given by both of them. The result of this rule, the detected emotion, is integrated into the dialog system through communicative acts. Hence, each communicative act gives, among other things, the detected emotion of the user to the RDS so it can adapt its strategy in order to get a greater satisfaction degree during the human-robot dialog. Each of the new components, GEVA and GEFA, can also be used individually. Moreover, they are integrated with the robotic control platform ROS (Robot Operating System). Several experiments with real users were performed to determine the accuracy of each component and to set the final decision rule. The results obtained from applying this decision rule in these experiments show a high success rate in automatic user emotion recognition, improving the results given by the two information channels (audio and visual) separately.

  4. Flow system for optical activity detection of vegetable extracts employing molecular exclusion continuous chromatographic detection

    Science.gov (United States)

    Fajer, V.; Rodríguez, C.; Naranjo, S.; Mesa, G.; Mora, W.; Arista, E.; Cepero, T.; Fernández, H.

    2006-02-01

    The combination of molecular exclusion chromatography and laser polarimetric detection has turned into a carbohydrate separation and quantification system for plant fluids of industrial value, making it possible the evaluation of the quality of sugarcane juices, agave juices and many other plant extracts. Some previous papers described a system where liquid chromatography separation and polarimetric detection using a LASERPOL 101M polarimeter with He-Ne light source allowed the collection and quantification of discrete samples for analytical purposes. In this paper, the authors are introducing a new improved system which accomplishes polarimetric measurements in a continuous flux. Chromatograms of several carbohydrates standard solutions were obtained as useful references to study juice quality of several sugarcane varieties under different physiological conditions. Results by either discrete or continuous flux systems were compared in order to test the validation of the new system. An application of the system to the diagnostics of scalded foliar is described. A computer program allowing the output of the chromatograms to a display on line and the possibility of digital storing, maxima detections, zone integration, and some other possibilities make this system very competitive and self-convincing.

  5. An artificial bioindicator system for network intrusion detection.

    Science.gov (United States)

    Blum, Christian; Lozano, José A; Davidson, Pedro Pinacho

    2015-01-01

    An artificial bioindicator system is developed in order to solve a network intrusion detection problem. The system, inspired by an ecological approach to biological immune systems, evolves a population of agents that learn to survive in their environment. An adaptation process allows the transformation of the agent population into a bioindicator that is capable of reacting to system anomalies. Two characteristics stand out in our proposal. On the one hand, it is able to discover new, previously unseen attacks, and on the other hand, contrary to most of the existing systems for network intrusion detection, it does not need any previous training. We experimentally compare our proposal with three state-of-the-art algorithms and show that it outperforms the competing approaches on widely used benchmark data.

  6. Mental Fatigue Monitoring Using a Wearable Transparent Eye Detection System

    Directory of Open Access Journals (Sweden)

    Kota Sampei

    2016-01-01

    Full Text Available We propose mental fatigue measurement using a wearable eye detection system. The system is capable of acquiring movement of the pupil and blinking from the light reflected from the eye. The reflection is detected by dye-sensitized photovoltaic cells. Since these cells are patterned onto the eyeglass and do not require external input power, the system is notable for its lightweight and low power consumption and can be combined with other wearable devices, such as a head mounted display. We performed experiments to correlate information obtained by the eye detection system with the mental fatigue of the user. Since it is quite difficult to evaluate mental fatigue objectively and quantitatively, we assumed that the National Aeronautics and Space Administration Task Load Index (NASA-TLX had a strong correlation with te mental fatigue. While a subject was requested to conduct calculation tasks, the eye detection system collected his/her information that included position, velocity and total movement of the eye, and amount and frequency of blinking. Multiple regression analyses revealed the correlation between NASA-TLX and the information obtained for 3 out of 5 subjects.

  7. Traffic Congestion Detection System through Connected Vehicles and Big Data

    Directory of Open Access Journals (Sweden)

    Néstor Cárdenas-Benítez

    2016-04-01

    Full Text Available This article discusses the simulation and evaluation of a traffic congestion detection system which combines inter-vehicular communications, fixed roadside infrastructure and infrastructure-to-infrastructure connectivity and big data. The system discussed in this article permits drivers to identify traffic congestion and change their routes accordingly, thus reducing the total emissions of CO2 and decreasing travel time. This system monitors, processes and stores large amounts of data, which can detect traffic congestion in a precise way by means of a series of algorithms that reduces localized vehicular emission by rerouting vehicles. To simulate and evaluate the proposed system, a big data cluster was developed based on Cassandra, which was used in tandem with the OMNeT++ discreet event network simulator, coupled with the SUMO (Simulation of Urban MObility traffic simulator and the Veins vehicular network framework. The results validate the efficiency of the traffic detection system and its positive impact in detecting, reporting and rerouting traffic when traffic events occur.

  8. The synchronous active neutron detection system for spent fuel assay

    International Nuclear Information System (INIS)

    Pickrell, M.M.; Kendall, P.K.

    1994-01-01

    The authors have begun to develop a novel technique for active neutron assay of fissile material in spent nuclear fuel. This approach will exploit the unique operating features of a 14-MeV neutron generator developed by Schlumberger. This generator and a novel detection system will be applied to the direct measurement of the fissile material content in spent fuel in place of the indirect measures used at present. The technique they are investigating is termed synchronous active neutron detection (SAND). It closely follows a method that has been used routinely in other branches of physics to detect very small signals in the presence of large backgrounds. Synchronous detection instruments are widely available commercially and are termed open-quotes lock-inclose quotes amplifiers. The authors have implemented a digital lock-in amplifier in conjunction with the Schlumberger neutron generator to explore the possibility of synchronous detection with active neutrons. This approach is possible because the Schlumberger system can operate at up to a 50% duty factor, in effect, a square wave of neutron yield. The results to date are preliminary but quite promising. The system is capable of resolving the fissile material contained in a small fraction of the fuel rods in a cold fuel assembly. It also appears to be quite resilient to background neutron interference. The interrogating neutrons appear to be nonthermal and penetrating. Although a significant amount of work remains to fully explore the relevant physics and optimize the instrument design, the underlying concept appears sound

  9. An object detection and tracking system for unmanned surface vehicles

    Science.gov (United States)

    Yang, Jian; Xiao, Yang; Fang, Zhiwen; Zhang, Naiwen; Wang, Li; Li, Tao

    2017-10-01

    Object detection and tracking are critical parts of unmanned surface vehicles(USV) to achieve automatic obstacle avoidance. Off-the-shelf object detection methods have achieved impressive accuracy in public datasets, though they still meet bottlenecks in practice, such as high time consumption and low detection quality. In this paper, we propose a novel system for USV, which is able to locate the object more accurately while being fast and stable simultaneously. Firstly, we employ Faster R-CNN to acquire several initial raw bounding boxes. Secondly, the image is segmented to a few superpixels. For each initial box, the superpixels inside will be grouped into a whole according to a combination strategy, and a new box is thereafter generated as the circumscribed bounding box of the final superpixel. Thirdly, we utilize KCF to track these objects after several frames, Faster-RCNN is again used to re-detect objects inside tracked boxes to prevent tracking failure as well as remove empty boxes. Finally, we utilize Faster R-CNN to detect objects in the next image, and refine object boxes by repeating the second module of our system. The experimental results demonstrate that our system is fast, robust and accurate, which can be applied to USV in practice.

  10. Determining the lower limit of detection for personnel dosimetry systems.

    Science.gov (United States)

    Roberson, P L; Carlson, R D

    1992-01-01

    A simple method for determining the lower limit of detection (LLD) for personnel dosimetry systems is described. The method relies on the definition of a critical level and a detection level. The critical level is the signal level above which a result has a small probability of being due to a fluctuation of the background. All results below the critical level should not be reported as an indication of a positive result. The detection level is the net signal level (i.e., dose received) above which there is a high confidence that a true reading will be detected and reported as a qualitatively positive result. The detection level may be identified as the LLD. A simple formula is derived to allow the calculation of the LLD under various conditions. This type of formula is being used by the Department of Energy Laboratory Accreditation Program (DOELAP) for personnel dosimetry. Participants in either the National Voluntary Laboratory Accreditation Program (NVLAP) for personnel dosimetry or DOELAP can use performance test results along with a measurement of background levels to estimate the LLDs for their dosimetry system. As long as they maintain their dosimetry system such that the LLDs are less than half the lower limit of the NVLAP or DOELAP test exposure ranges, dosimetry laboratories can avoid testing failures due to poor performance at very low exposures.

  11. Anomaly-Based Intrusion Detection Systems Utilizing System Call Data

    Science.gov (United States)

    2012-03-01

    2.1.1 Viruses The first use of the term “computer virus ” is attributed to Fred Cohen in 1983. Fred Cohen originally defined a computer virus as a...agents. Once compromised, these systems become part of what is known as a “zombie” network. 2.1.3 Trojans A Trojan horse is malware pretending to...be benign or useful software. When activated, Trojans perform unauthorized actions such as collecting, modifying, and forging data. Unlike viruses

  12. Object detection system based on multimodel saliency maps

    Science.gov (United States)

    Guo, Ya'nan; Luo, Chongfan; Ma, Yide

    2017-03-01

    Detection of visually salient image regions is extensively applied in computer vision and computer graphics, such as object detection, adaptive compression, and object recognition, but any single model always has its limitations to various images, so in our work, we establish a method based on multimodel saliency maps to detect the object, which intelligently absorbs the merits of various individual saliency detection models to achieve promising results. The method can be roughly divided into three steps: in the first step, we propose a decision-making system to evaluate saliency maps obtained by seven competitive methods and merely select the three most valuable saliency maps; in the second step, we introduce heterogeneous PCNN algorithm to obtain three prime foregrounds; and then a self-designed nonlinear fusion method is proposed to merge these saliency maps; at last, the adaptive improved and simplified PCNN model is used to detect the object. Our proposed method can constitute an object detection system for different occasions, which requires no training, is simple, and highly efficient. The proposed saliency fusion technique shows better performance over a broad range of images and enriches the applicability range by fusing different individual saliency models, this proposed system is worthy enough to be called a strong model. Moreover, the proposed adaptive improved SPCNN model is stemmed from the Eckhorn's neuron model, which is skilled in image segmentation because of its biological background, and in which all the parameters are adaptive to image information. We extensively appraise our algorithm on classical salient object detection database, and the experimental results demonstrate that the aggregation of saliency maps outperforms the best saliency model in all cases, yielding highest precision of 89.90%, better recall rates of 98.20%, greatest F-measure of 91.20%, and lowest mean absolute error value of 0.057, the value of proposed saliency evaluation

  13. Sensor failure detection in dynamical systems by Kalman filtering methodology

    International Nuclear Information System (INIS)

    Ciftcioglu, O.

    1991-03-01

    Design of a sensor failure detection system by Kalman filtering methodology is described. The method models the process systems in state-space form, the information on each state being provided by relevant sensors present in the process system. Since the measured states are usually subject to noise, the estimation of the states optimally is an essential requirement. To this end the detection system comprises Kalman estimation filters, the number of which is equal to the number of states concerned. The estimated state of a particular signal in each filter is compared with the corresponding measured signal and difference beyond a predetermined bound is identified as failure, the sensor being identified/isolated as faulty. (author). 19 refs.; 8 figs.; 1 tab

  14. Planetary Systems Detection, Formation and Habitability of Extrasolar Planets

    CERN Document Server

    Ollivier, Marc; Casoli, Fabienne; Encrenaz, Thérèse; Selsis, Franck

    2009-01-01

    Over the past ten years, the discovery of extrasolar planets has opened a new field of astronomy, and this area of research is rapidly growing, from both the observational and theoretical point of view. The presence of many giant exoplanets in the close vicinity of their star shows that these newly discovered planetary systems are very different from the solar system. New theoretical models are being developed in order to understand their formation scenarios, and new observational methods are being implemented to increase the sensitivity of exoplanet detections. In the present book, the authors address the question of planetary systems from all aspects. Starting from the facts (the detection of more than 300 extraterrestrial planets), they first describe the various methods used for these discoveries and propose a synthetic analysis of their global properties. They then consider the observations of young stars and circumstellar disks and address the case of the solar system as a specific example, different fr...

  15. Securing Cloud Computing from Different Attacks Using Intrusion Detection Systems

    Directory of Open Access Journals (Sweden)

    Omar Achbarou

    2017-03-01

    Full Text Available Cloud computing is a new way of integrating a set of old technologies to implement a new paradigm that creates an avenue for users to have access to shared and configurable resources through internet on-demand. This system has many common characteristics with distributed systems, hence, the cloud computing also uses the features of networking. Thus the security is the biggest issue of this system, because the services of cloud computing is based on the sharing. Thus, a cloud computing environment requires some intrusion detection systems (IDSs for protecting each machine against attacks. The aim of this work is to present a classification of attacks threatening the availability, confidentiality and integrity of cloud resources and services. Furthermore, we provide literature review of attacks related to the identified categories. Additionally, this paper also introduces related intrusion detection models to identify and prevent these types of attacks.

  16. Towards Improved Airborne Fire Detection Systems Using Beetle Inspired Infrared Detection and Fire Searching Strategies

    Directory of Open Access Journals (Sweden)

    Herbert Bousack

    2015-06-01

    Full Text Available Every year forest fires cause severe financial losses in many countries of the world. Additionally, lives of humans as well as of countless animals are often lost. Due to global warming, the problem of wildfires is getting out of control; hence, the burning of thousands of hectares is obviously increasing. Most important, therefore, is the early detection of an emerging fire before its intensity becomes too high. More than ever, a need for early warning systems capable of detecting small fires from distances as large as possible exists. A look to nature shows that pyrophilous “fire beetles” of the genus Melanophila can be regarded as natural airborne fire detection systems because their larvae can only develop in the wood of fire-killed trees. There is evidence that Melanophila beetles can detect large fires from distances of more than 100 km by visual and infrared cues. In a biomimetic approach, a concept has been developed to use the surveying strategy of the “fire beetles” for the reliable detection of a smoke plume of a fire from large distances by means of a basal infrared emission zone. Future infrared sensors necessary for this ability are also inspired by the natural infrared receptors of Melanophila beetles.

  17. Statistical detection model for eddy-current systems

    International Nuclear Information System (INIS)

    Martinez, J.R.; Bahr, A.J.

    1984-01-01

    This chapter presents a detailed analysis of some measured noise data and the results of using those data with a probe-flaw interaction model to compute the surface-crack detection characteristics of two different air-core coil probes. The objective is to develop a statistical model for determining the probability of detecting a given flaw using an eddy-current system. The basis for developing a statistical detection model is a measurement model that relates the output voltage of the system to its various signal and noise components. Topics considered include statistics of the measured background voltage, calibration of the probe-flaw interaction model and signal-to-noise ratio (SNR) definition, the operating characteristic, and a comparison of air-core probes

  18. Assessment of Radiation Background Variation for Moving Detection Systems

    Energy Technology Data Exchange (ETDEWEB)

    Miller, James Christopher [Los Alamos National Laboratory; Rennie, John Alan [Los Alamos National Laboratory; Toevs, James Waldo [Los Alamos National Laboratory; Wallace, Darrin J. [Los Alamos National Laboratory; Abhold, Mark Edward [Los Alamos National Laboratory

    2015-07-13

    The introduction points out that radiation backgrounds fluctuate across very short distances: factors include geology, soil composition, altitude, building structures, topography, and other manmade structures; and asphalt and concrete can vary significantly over short distances. Brief descriptions are given of the detection system, experimental setup, and background variation measurements. It is concluded that positive and negative gradients can greatly reduce the detection sensitivity of an MDS: negative gradients create opportunities for false negatives (nondetection), and positive gradients create a potentially unacceptable FAR (above 1%); the location of use for mobile detection is important to understand; spectroscopic systems provide more information for screening out false alarms and may be preferred for mobile use; and mobile monitor testing at LANL accounts for expected variations in the background.

  19. An Overview of Islanding Detection Methods in Photovoltaic Systems

    OpenAIRE

    Wei Yee Teoh; Chee Wei Tan

    2011-01-01

    The issue of unintentional islanding in PV grid interconnection still remains as a challenge in grid-connected photovoltaic (PV) systems. This paper discusses the overview of popularly used anti-islanding detection methods, practically applied in PV grid-connected systems. Anti-islanding methods generally can be classified into four major groups, which include passive methods, active methods, hybrid methods and communication base methods. Active methods have been the pref...

  20. Microculture system for detection of Newcastle disease virus antibodies.

    Science.gov (United States)

    Wooley, R E; Brown, J; Gratzek, J B; Kleven, S H; Scott, T A

    1974-05-01

    A microculture system utilizing cytopathic effect (CPE) and hemadsorption (HAd) end points was effective in determining the level of Newcastle disease virus (NDV) antibodies. The microculture system was of comparable sensitivity to the plaque reduction test for the detection of NDV antibodies. The standards by which the CPE and HAd microculture tests would be considered reproducible were defined. The results indicate that the CPE and HAd microculture tests are reproducible within one twofold dilution.

  1. Extracted-beam-detection system around synchrotron saturne

    International Nuclear Information System (INIS)

    Anne, Remy; Milleret, Gerard; Giuliani, Arlette; Lefol, Andre; Perret, Robert; Poupard, Joseph; Trogno, Andre; Van den Bossche, Maurice; N'Guyen Sieu Viet.

    1977-07-01

    The extracted-beam-detection system working around the synchrotron Saturne is presented. The whole system is composed of about forty multiwire chambers used for beam tuning and providing beams profiles. Optic beam parameters such as position, divergence, dimension, emittance can be easily measured, or calculated with a program running on a computer. They are working in large range intensity beams (10 2 to 5.10 11 p/cm 2 /s of protons, alpha particles, deutons, pions, tritons and electrons [fr

  2. Effects of extraneous odors on canine detection

    Science.gov (United States)

    Waggoner, L. Paul; Jones, Meredith H.; Williams, Marc; Johnston, J. M.; Edge, Cindy C.; Petrousky, James A.

    1998-12-01

    Dogs are often required to detect target substances under challenging conditions. One of these challenges is to detect contraband in the presence of extraneous odors, whether they are part of the ambient environment or placed there for the purpose of evading detection. This paper presents the results of two studies evaluating the ability of dogs to detect target substances in the presence of varying concentrations of extraneous odors. The studies were conducted under behavioral laboratory conditions, providing good control over vapor sources and a clear basis for evaluation of detection responses. Dogs were trained to sample an air stream consisting of the extraneous odor only or the extraneous odor plus the target odor and then press the appropriate lever to earn food. The results are described in terns of the ability of dogs to detect target odors in the presence of a wide range of concentrations of the extraneous odors.

  3. Automatic Road Gap Detection Using Fuzzy Inference System

    Science.gov (United States)

    Hashemi, S.; Valadan Zoej, M. J.; Mokhtarzadeh, M.

    2011-09-01

    Automatic feature extraction from aerial and satellite images is a high-level data processing which is still one of the most important research topics of the field. In this area, most of the researches are focused on the early step of road detection, where road tracking methods, morphological analysis, dynamic programming and snakes, multi-scale and multi-resolution methods, stereoscopic and multi-temporal analysis, hyper spectral experiments, are some of the mature methods in this field. Although most researches are focused on detection algorithms, none of them can extract road network perfectly. On the other hand, post processing algorithms accentuated on the refining of road detection results, are not developed as well. In this article, the main is to design an intelligent method to detect and compensate road gaps remained on the early result of road detection algorithms. The proposed algorithm consists of five main steps as follow: 1) Short gap coverage: In this step, a multi-scale morphological is designed that covers short gaps in a hierarchical scheme. 2) Long gap detection: In this step, the long gaps, could not be covered in the previous stage, are detected using a fuzzy inference system. for this reason, a knowledge base consisting of some expert rules are designed which are fired on some gap candidates of the road detection results. 3) Long gap coverage: In this stage, detected long gaps are compensated by two strategies of linear and polynomials for this reason, shorter gaps are filled by line fitting while longer ones are compensated by polynomials.4) Accuracy assessment: In order to evaluate the obtained results, some accuracy assessment criteria are proposed. These criteria are obtained by comparing the obtained results with truly compensated ones produced by a human expert. The complete evaluation of the obtained results whit their technical discussions are the materials of the full paper.

  4. Lysozyme-responsive polymer systems for detection of infection

    NARCIS (Netherlands)

    Schiffer, Doris; Verient, Vanessa; Luschnig, Daniel; Blokhuis-Arkes, Miriam H.E.; van der Palen, Job J.A.M.; Gamerith, Clemens; Burnet, Michael; Sigl, Eva; Heinzle, Andrea; Guebitz, Georg M.

    2015-01-01

    There is a strong need for new point-of-care systems for the detection of wound infection. Overseen infections in chronic wounds induce severe complications, such as delayed healing and high risks for the patients, while time-consuming common gold and silver standard methods for infection assessment

  5. An intrusion detection system based on fiber hydrophone

    Science.gov (United States)

    Liu, Junrong; Qiu, Xiufen; Shen, Heping

    2017-10-01

    This paper provides a new intrusion detection system based on fiber hydrophone, focusing beam forming figure positioning according to the near field and high precision sound source location algorithm which can accurately position the intrusion; obtaining its behavior path , obtaining the intrusion events related information such as speed form tracking intrusion trace; And analyze identification the detected intrusion behavior. If the monitor area is larger, the algorithm will take too much time once, and influence the system response time, for reduce the calculating time. This paper provides way that coarse location first, and then scanned for accuracy, so as to realize the intrusion events (such as car, etc.) the remote monitoring of positioning. The system makes up the blank in process capture of the fiber optic intrusion detection technology, and improves the understanding of the invasion. Through the capture of the process of intrusion behavior, and the fusion detection of intrusion behavior itself, thus analysis, judgment, identification of the intrusion information can greatly reduce the rate of false positives, greatly improved the reliability and practicability of the perimeter security system.

  6. Reliability evaluation of the Savannah River reactor leak detection system

    International Nuclear Information System (INIS)

    Daugherty, W.L.; Sindelar, R.L.; Wallace, I.T.

    1991-01-01

    The Savannah River Reactors have been in operation since the mid-1950's. The primary degradation mode for the primary coolant loop piping is intergranular stress corrosion cracking. The leak-before-break (LBB) capability of the primary system piping has been demonstrated as part of an overall structural integrity evaluation. One element of the LBB analyses is a reliability evaluation of the leak detection system. The most sensitive element of the leak detection system is the airborne tritium monitors. The presence of small amounts of tritium in the heavy water coolant provide the basis for a very sensitive system of leak detection. The reliability of the tritium monitors to properly identify a crack leaking at a rate of either 50 or 300 lb/day (0.004 or 0.023 gpm, respectively) has been characterized. These leak rates correspond to action points for which specific operator actions are required. High reliability has been demonstrated using standard fault tree techniques. The probability of not detecting a leak within an assumed mission time of 24 hours is estimated to be approximately 5 x 10 -5 per demand. This result is obtained for both leak rates considered. The methodology and assumptions used to obtain this result are described in this paper. 3 refs., 1 fig., 1 tab

  7. An Astigmatic Detection System for Polymeric Cantilever-based Sensors

    DEFF Research Database (Denmark)

    Hwu, En-Te; Liao, Hsien-Shun; Bosco, Filippo

    2012-01-01

    We demonstrate the use of an astigmatic detection system (ADS) for resonance frequency identification of polymer microcantilever sensors. The ADS technology is based on a DVD optical head combined with an optical microscope (OM). The optical head has a signal bandwidth of 80 MHz, allowing thermal...

  8. 46 CFR 76.05-1 - Fire detecting systems.

    Science.gov (United States)

    2010-10-01

    ... having sleeping accommodations for passengers. Table 76.05-1(a) Space Detecting systems Fixed... elevator enclosures do 1 Do.1 Communication corridors do 1 Do.1 Lifeboat embarkation and lowering stations do Do. Radio room do 1 Do.1 Accommodations Staterooms, toilet spaces, isolated pantries, etc do 1 Do...

  9. A vision based row detection system for sugar beet

    NARCIS (Netherlands)

    Bakker, T.; Wouters, H.; Asselt, van C.J.; Bontsema, J.; Tang, L.; Müller, J.; Straten, van G.

    2008-01-01

    One way of guiding autonomous vehicles through the field is using a vision based row detection system. A new approach for row recognition is presented which is based on grey-scale Hough transform on intelligently merged images resulting in a considerable improvement of the speed of image processing.

  10. Design and implementation of an intelligent system for detecting ...

    African Journals Online (AJOL)

    This paper presents a drowsy driver detection system, designed using an AT89C52 microcontroller in combination with smart sensors. Drowsy driving has been discovered to be a major cause of road traffic collisions. The problem lies in the fact that a driver is usually unaware of the on-set of drowsiness. It therefore ...

  11. System for detecting and processing abnormality in electromagnetic shielding

    International Nuclear Information System (INIS)

    Takahashi, T.; Nakamura, M.; Yabana, Y.; Ishikawa, T.; Nagata, K.

    1991-01-01

    The present invention relates to a system for detecting and processing an abnormality in electromagnetic shielding of an intelligent building which is constructed using an electromagnetic shielding material for the skeleton and openings such as windows and doorways so that the whole of the building is formed into an electromagnetic shielding structure. (author). 4 figs

  12. Leak detection system for a high temperature fluid pipe

    International Nuclear Information System (INIS)

    Puyal, C.; Meuwisse, C.

    1989-01-01

    The leak detection system is made by a cable with at least two isolated electrical conductors, close to the wall of the pipe. The material of the cable is chosen so as to change its electrical characteristics if a leak causes heating of the cable. A detector at one end of the cable can measure the modifications of the electrical characteristics [fr

  13. All-to-all sequenced fault detection system

    Science.gov (United States)

    Archer, Charles Jens; Pinnow, Kurt Walter; Ratterman, Joseph D.; Smith, Brian Edward

    2010-11-02

    An apparatus, program product and method enable nodal fault detection by sequencing communications between all system nodes. A master node may coordinate communications between two slave nodes before sequencing to and initiating communications between a new pair of slave nodes. The communications may be analyzed to determine the nodal fault.

  14. A Multiple-Channel Sub-Band Transient Detection System

    Energy Technology Data Exchange (ETDEWEB)

    David A. Smith

    1998-11-01

    We have developed a unique multiple-channel sub-band transient detection system to record transient electromagnetic signals in carrier-dominated radio environments; the system has been used to make unique observations of weak, transient HF signals. The detection system has made these observations possible through improved sensitivity compared to conventional broadband transient detection systems; the sensitivity improvement is estimated to be at least 20 dB. The increase in sensitivity has been achieved through subdivision of the band of interest (an 18 MHz tunable bandwidth) into eight sub-band independent detection channels, each with a 400 kHz bandwidth and its own criteria. The system generates a system trigger signal when a predetermined number of channels (typically five) trigger within a predetermined window of time (typically 100 ~s). Events are recorded with a broadband data acquisition system sampling at 50 or 100 Msample/s, so despite the fact that the detection system operates on portions of the signal confined to narrow bands, data acquisition is broadband. Between May and September of 1994, the system was used to detect and record over six thousand transient events in the frequency band from 3 to 30 MHz. Approximately 500 of the events have been characterized as paired bursts of radio noise with individual durations of 2 to 10 ps and separations between the bursts of 5 to 160 ps. The paired transients are typically 5 to 40 dB brighter than the background electromagnetic spectrum between carrier signals. We have termed these events SubIonospheric Pulse Pairs (SIPPS) and presently have no explanation as to their source. Our observations of SIPPS resemble observations of TransIonospheric Pulse Pairs (TIPPs) recorded by the Blackboard instrument on the ALEXIS satellite; the source of TIPP events is also unknown. Most of the recorded SIPP events do not exhibit frequency dispersion, implying propagation along a line-of-sight (groundwave) path; but seven of

  15. A Comparative Study of Data Mining Algorithms for High Detection Rate in Intrusion Detection System

    Directory of Open Access Journals (Sweden)

    Nabeela Ashraf

    2018-01-01

    Full Text Available Due to the fast growth and tradition of the internet over the last decades, the network security problems are increasing vigorously. Humans can not handle the speed of processes and the huge amount of data required to handle network anomalies. Therefore, it needs substantial automation in both speed and accuracy. Intrusion Detection System is one of the approaches to recognize illegal access and rare attacks to secure networks. In this proposed paper, Naive Bayes, J48 and Random Forest classifiers are compared to compute the detection rate and accuracy of IDS. For experiments, the KDD_NSL dataset is used.

  16. Ionizing radiation detection meter systems usability evaluation. Technical memorandum

    International Nuclear Information System (INIS)

    Severs, Y.; Hughes, R.; Tack, D.; Bossi, L.L.M.

    2002-12-01

    In support of the Canadian Forces Nuclear Detection, Identification and Dosimetry project a usability trial of three Ionizing Radiation Detection Meter Systems (IRDMS) was conducted 18-22 June 2001 at Connaught Ranges. The systems evaluated: System 1: ANPDR 77 Operational System with PDR 77 Alpha/Beta probes and GPS (Global Positioning System) Training System; System 2: ADM 300C Operational System with ABP 100 Alpha/Beta probes and GPS Training System, and System 3: RAM R200 Operational System with PA 100M and RG12 Alpha/Beta probes and GPS Training System. Twelve military personnel (Private to Captain) determined compliance with the bid evaluation criteria. The counter-balanced study, based on a Latin square design, was divided into two assessment phases, an operational phase and a training system phase, which rotated three groups (of four participants each) concurrently through each IRDMS. Groups were trained in set-up, maintenance and operation of each bid IRDMS prior to evaluation. The operational evaluation consisted of a test/maintenance stand, an indoor/outdoor operational stand, and an indoor,/outdoor training system stand. Participants rated the utility and usability of each system, by measuring case of use/maintenance under a range of relevant operational and clothing conditions, compatibility with soldier tasks, compatibility with clothing, compatibility with equipment and operational environments, and case of learning (including an assessment of initial and refresher training implications). A 7-point Likert-like acceptability rating scale, which covered a range from completely unacceptable (1) to completely acceptable (7), was used to evaluate the measures. The combined weighted mean scores were 584.3 for System 1 (70 o /b), 682.0 for System 2 (81 %) and 756.9 for System 3 (90%) out of a total possible score of 840. Participants reported mean scores for System 1 between barely unacceptable and borderline for both indoor and outdoor operations. System 2

  17. New Monitoring System to Detect a Radioactive Material in Motion

    International Nuclear Information System (INIS)

    Boudergui, Karim; Kondrasovs, Vladimir; Coulon, Romain; Corre, Gwenole; Normand, Stephane

    2013-06-01

    Illegal radioactive material transportation detection, by terrorist for example, is problematic in urban public transportation. Academics and industrials systems include Radiation Portal Monitor (RPM) to detect radioactive matters transported in vehicles or carried by pedestrians. However, today's RPMs are not able to efficiently detect a radioactive material in movement. Due to count statistic and gamma background, false alarms may be triggered or at the contrary a radioactive material not detected. The statistical false alarm rate has to be as low as possible in order to limit useless intervention especially in urban mass transportation. The real-time approach depicted in this paper consists in using a time correlated detection technique in association with a sensor network. It is based on several low-cost and large area plastic scintillators and a digital signal processing designed for signal reconstruction from the sensor network. The number of sensors used in the network can be adapted to fit with applications requirements or cost. The reconstructed signal is improved by comparing other approaches. This allows us to increase the device speed that has to be scanned while decreasing the risk of false alarm. In the framework of a project called SECUR-ED Secured Urban Transportation - European Demonstration, this prototype system will be used during an experiment in the Milan urban mass transportation. (authors)

  18. Robotic Mounted Detection System: robotics for route clearance

    Science.gov (United States)

    Hutchison, John; Klager, Gene; McCoy, Edward; Fite, David; Frederick, Brian

    2010-04-01

    Robotic Mounted Detection System (RMDS) is a government program to enable robotic control of a Husky route clearance vehicle with a mine detection sensor payload. The goal is for the operator to control the Husky and mine detection sensor from another vehicle. This program will provide the user with standard tele-operation control of the vehicle as well as semi-autonomous modes including cruise control, precision waypoint navigation with operator error correction and a visual mode allowing the operator to enter waypoints in the current video feed. The use of autonomy will be tailored to give the operator maximum control of the robotic vehicle's path while minimizing the effort required to maintain the desired route. Autonomous alterations of the path would conflict with the goal of route clearance, so waypoint navigation will allow the operator to supply offsets to counteract location errors. While following a waypoint path, the Husky will be capable of controlling its speed to maintain an operator specified distance from the control vehicle. Obstacle avoidance will be limited to protecting the mine detection sensor, leaving any decision to leave the path up to the operator. Video will be the primary navigational sensor feed to the operator, who will use an augmented steering wheel controller and computer display to control the Husky. A LADAR system will be used to detect obstacles that could damage the mine sensor and to maintain the optimal sensor orientation while the vehicle is moving. Practical issues and lessons learned during integration will be presented.

  19. Sensor integration study for a shallow tunnel detection system.

    Energy Technology Data Exchange (ETDEWEB)

    Yee, Mark L.; Abbott, Robert E.; Bonal, Nedra; Elbring, Gregory Jay; Senglaub, Michael E.

    2010-02-01

    During the past several years, there has been a growing recognition of the threats posed by the use of shallow tunnels against both international border security and the integrity of critical facilities. This has led to the development and testing of a variety of geophysical and surveillance techniques for the detection of these clandestine tunnels. The challenges of detection of these tunnels arising from the complexity of the near surface environment, the subtlety of the tunnel signatures themselves, and the frequent siting of these tunnels in urban environments with a high level of cultural noise, have time and again shown that any single technique is not robust enough to solve the tunnel detection problem in all cases. The question then arises as to how to best combine the multiple techniques currently available to create an integrated system that results in the best chance of detecting these tunnels in a variety of clutter environments and geologies. This study utilizes Taguchi analysis with simulated sensor detection performance to address this question. The analysis results show that ambient noise has the most effect on detection performance over the effects of tunnel characteristics and geological factors.

  20. Development of fast wireless detection system for fixed offshore platform

    Science.gov (United States)

    Li, Zhigang; Yu, Yan; Jiao, Dong; Wang, Jie; Li, Zhirui; Ou, Jinping

    2011-04-01

    Offshore platforms' security is concerned since in 1950s and 1960s, and in the early 1980s some important specifications and standards are built, and all these provide technical basis of fixed platform design, construction, installation and evaluation. With the condition that more and more platforms are in serving over age, the research about the evaluation and detection technology of offshore platform has been a hotspot, especially underwater detection, and assessment method based on the finite element calculation. For fixed platform structure detection, conventional NDT methods, such as eddy current, magnetic powder, permeate, X-ray and ultrasonic, etc, are generally used. These techniques are more mature, intuitive, but underwater detection needs underwater robot, the necessary supporting tools of auxiliary equipment, and trained professional team, thus resources and cost used are considerable, installation time of test equipment is long. This project presents a new kind of fast wireless detection and damage diagnosis system for fixed offshore platform using wireless sensor networks, that is, wireless sensor nodes can be put quickly on the offshore platform, detect offshore platform structure global status by wireless communication, and then make diagnosis. This system is operated simply, suitable for offshore platform integrity states rapid assessment. The designed system consists in intelligence acquisition equipment and 8 wireless collection nodes, the whole system has 64 collection channels, namely every wireless collection node has eight 16-bit accuracy of A/D channels. Wireless collection node, integrated with vibration sensing unit, embedded low-power micro-processing unit, wireless transceiver unit, large-capacity power unit, and GPS time synchronization unit, can finish the functions such as vibration data collection, initial analysis, data storage, data wireless transmission. Intelligence acquisition equipment, integrated with high

  1. System for automatic detection of lung nodules exhibiting growth

    Science.gov (United States)

    Novak, Carol L.; Shen, Hong; Odry, Benjamin L.; Ko, Jane P.; Naidich, David P.

    2004-05-01

    Lung nodules that exhibit growth over time are considered highly suspicious for malignancy. We present a completely automated system for detection of growing lung nodules, using initial and follow-up multi-slice CT studies. The system begins with automatic detection of lung nodules in the later CT study, generating a preliminary list of candidate nodules. Next an automatic system for registering locations in two studies matches each candidate in the later study to its corresponding position in the earlier study. Then a method for automatic segmentation of lung nodules is applied to each candidate and its matching location, and the computed volumes are compared. The output of the system is a list of nodule candidates that are new or have exhibited volumetric growth since the previous scan. In a preliminary test of 10 patients examined by two radiologists, the automatic system identified 18 candidates as growing nodules. 7 (39%) of these corresponded to validated nodules or other focal abnormalities that exhibited growth. 4 of the 7 true detections had not been identified by either of the radiologists during their initial examinations of the studies. This technique represents a powerful method of surveillance that may reduce the probability of missing subtle or early malignant disease.

  2. Design of Weft Detection System in The Stenter Machine

    Science.gov (United States)

    Gu, Minming; Xu, Xianju; Dai, Wenzhan

    2017-12-01

    In order to build an effective automatic weft-straightening system, it is important for the sensing device to detect most the possible fabric styles, designs, colours and structures, an optical sensing system that detects the angular orientation of weft threads in a moving web of a textile has been built. It contains an adjustable light source, two lens systems and photodiode sensor array. The sensor array includes 13 radial pattern of photosensitive areas that each generate an electrical signal proportional to the total intensity of the light incident on the area. The moving shadow of a weft thread passing over the area will modulate the output signal. A signal processed circuit was built to do the I/V conversion, amplifying, hardware filtering. An embed micro control system then deals with the information of these signals, calculates the angle of the weft drew. Finally, the experiments were done, the results showed that the weft detection system can deal with the fabric weft skew up to 30° and has achieved good results in the application.

  3. Detecting and mitigating aging in component cooling water systems

    International Nuclear Information System (INIS)

    Lofaro, R.J.

    1991-01-01

    The time-dependent effects of aging on component cooling water (CCW) systems in nuclear power plants has been studied and documented as part of a research program sponsored by the US Nuclear Regulatory Commission. It was found that age related degradation leads to failures in the CCW system which can result in an increase in system unavailability, if not properly detected and mitigated. To identify effective methods of managing this degradation, information on inspection, monitoring, and maintenance practices currently available was obtained from various operating plants and reviewed. The findings were correlated with the most common aging mechanisms and failure modes and a compilation of aging detection and mitigation practices was formulated. This paper discusses the results of this work

  4. Detecting and mitigating aging in component cooling water systems

    International Nuclear Information System (INIS)

    Lofaro, R.J.; Aggarwal, S.

    1992-01-01

    The time-dependent effects of aging on component cooling water (CCW) systems in nuclear power plants has been studied and documented as part of a research program sponsored by the US Nuclear Regulatory Commission. It was found that age related degradation leads to failures in the CCW system which can result in an increase in system unavailability, if not properly detected and mitigated. To identify effective methods of managing this degradation, information on inspection, monitoring, and maintenance practices currently available was obtained from various operating plants and reviewed. The findings were correlated with the most common aging mechanisms and failure modes, and a compilation of aging detection and mitigation practices was formulated. This paper discusses the results of this work

  5. Probabilistic shaping for ROF system with heterodyne coherent detection

    Directory of Open Access Journals (Sweden)

    Bo Liu

    2017-05-01

    Full Text Available We investigate and compare the performance of normal and probabilistic shaping (PS 16-ary quadrature amplitude modulation (16QAM in a photonic vector millimeter-wave (mm-wave signal generation system adopting heterodyne coherent detection. And we obtain a better bit-error ratio (BER performance in the PS 16QAM scheme compared to the normal 16QAM scheme in the simulation. We also for the first time experimentally demonstrate the feasibility of PS-polarization-division-multiplexing 16QAM in a photonic vector mm-wave signal generation system employing heterodyne coherent detection. We obtain the same BER in PS and normal schemes with the PS scheme providing a higher bit rate. Then we experimentally carry out the performance investigation of PS in a 16QAM-modulated radio over fiber system with 40 m wireless transmission.

  6. DAIDALUS: Detect and Avoid Alerting Logic for Unmanned Systems

    Science.gov (United States)

    Munoz, Cesar; Narkawicz, Anthony; Hagen, George; Upchurch, Jason; Dutle, Aaron; Consiglio, Maria; Chamberlain, James

    2015-01-01

    This paper presents DAIDALUS (Detect and Avoid Alerting Logic for Unmanned Systems), a reference implementation of a detect and avoid concept intended to support the integration of Unmanned Aircraft Systems into civil airspace. DAIDALUS consists of self-separation and alerting algorithms that provide situational awareness to UAS remote pilots. These algorithms have been formally specified in a mathematical notation and verified for correctness in an interactive theorem prover. The software implementation has been verified against the formal models and validated against multiple stressing cases jointly developed by the US Air Force Research Laboratory, MIT Lincoln Laboratory, and NASA. The DAIDALUS reference implementation is currently under consideration for inclusion in the appendices to the Minimum Operational Performance Standards for Unmanned Aircraft Systems presently being developed by RTCA Special Committee 228.

  7. Moving Object Detection in Heterogeneous Conditions in Embedded Systems.

    Science.gov (United States)

    Garbo, Alessandro; Quer, Stefano

    2017-07-01

    This paper presents a system for moving object exposure, focusing on pedestrian detection, in external, unfriendly, and heterogeneous environments. The system manipulates and accurately merges information coming from subsequent video frames, making small computational efforts in each single frame. Its main characterizing feature is to combine several well-known movement detection and tracking techniques, and to orchestrate them in a smart way to obtain good results in diversified scenarios. It uses dynamically adjusted thresholds to characterize different regions of interest, and it also adopts techniques to efficiently track movements, and detect and correct false positives. Accuracy and reliability mainly depend on the overall receipt, i.e., on how the software system is designed and implemented, on how the different algorithmic phases communicate information and collaborate with each other, and on how concurrency is organized. The application is specifically designed to work with inexpensive hardware devices, such as off-the-shelf video cameras and small embedded computational units, eventually forming an intelligent urban grid. As a matter of fact, the major contribution of the paper is the presentation of a tool for real-time applications in embedded devices with finite computational (time and memory) resources. We run experimental results on several video sequences (both home-made and publicly available), showing the robustness and accuracy of the overall detection strategy. Comparisons with state-of-the-art strategies show that our application has similar tracking accuracy but much higher frame-per-second rates.

  8. Study on high power ultraviolet laser oil detection system

    Science.gov (United States)

    Jin, Qi; Cui, Zihao; Bi, Zongjie; Zhang, Yanchao; Tian, Zhaoshuo; Fu, Shiyou

    2018-03-01

    Laser Induce Fluorescence (LIF) is a widely used new telemetry technology. It obtains information about oil spill and oil film thickness by analyzing the characteristics of stimulated fluorescence and has an important application in the field of rapid analysis of water composition. A set of LIF detection system for marine oil pollution is designed in this paper, which uses 355nm high-energy pulsed laser as the excitation light source. A high-sensitivity image intensifier is used in the detector. The upper machine sends a digital signal through a serial port to achieve nanoseconds range-gated width control for image intensifier. The target fluorescence spectrum image is displayed on the image intensifier by adjusting the delay time and the width of the pulse signal. The spectral image is coupled to CCD by lens imaging to achieve spectral display and data analysis function by computer. The system is used to detect the surface of the floating oil film in the distance of 25m to obtain the fluorescence spectra of different oil products respectively. The fluorescence spectra of oil products are obvious. The experimental results show that the system can realize high-precision long-range fluorescence detection and reflect the fluorescence characteristics of the target accurately, with broad application prospects in marine oil pollution identification and oil film thickness detection.

  9. Automated dicentric chromosome detection system for radiation dosimetry

    International Nuclear Information System (INIS)

    Xiao Jiang; Luo Yisheng; Cheng Xin; Jiang Li; He Xiaohai

    2000-01-01

    Scoring of dicentric chromosome in human lymphocyte metaphase is the routine method for evaluation of individual dose after radiation accident. Manual microscope scoring methods is tedious and time consuming. The purpose of this subject is to describe a digital image process software of an automated dicentric chromosome detection system the authors developed. Metaphase images are obtained by conventional light microscope equipped with a video camera and converted to digital images. The automatic analysis procedure which developed by C++ computer language including pretreatment of the image, individual chromosome separation and dicentrics scoring. The program was tested using the sample of human blood irradiated with 3.5 Gy γ-rays in vitro. 197 metaphases were analyzed, each of them carries dicentric, about 83% of all dicentrics can be detected correctly, while the value is about 97% for well spread metaphases. An automated dicentric chromosome detection system can give a reliable dose estimation if 80% of all dicentrics are detected correctly. The results show that authors' system can reach this level. As many factors influence the accuracy, such as the quality of cell slide, image capture and pretreatment, much work has to be done before it can be put into practice

  10. Nondestructive detection system of faults in fuses using radioisotope

    International Nuclear Information System (INIS)

    Goncalves, D.

    1973-01-01

    A system is developed to show the viability of non-destructive detection of the faults of explosive safety fuses which are manufactured by Fabrica da Estrela do Ministerio do Exercito. The faults are detected by an ion-chamber based on the variation of the intensity of the beta particles that penetrate the fuse which passes through a collimator. The beta particles are emitted by Strontium-90 + Yttrium-90 encapsulated in either stainless steel or aluminum. The concept of 'bucking Voltage' is applied to differentiate electronically the signal generated by the ion-chamber. (author)

  11. Automated System for Early Breast Cancer Detection in Mammograms

    Science.gov (United States)

    Bankman, Isaac N.; Kim, Dong W.; Christens-Barry, William A.; Weinberg, Irving N.; Gatewood, Olga B.; Brody, William R.

    1993-01-01

    The increasing demand on mammographic screening for early breast cancer detection, and the subtlety of early breast cancer signs on mammograms, suggest an automated image processing system that can serve as a diagnostic aid in radiology clinics. We present a fully automated algorithm for detecting clusters of microcalcifications that are the most common signs of early, potentially curable breast cancer. By using the contour map of the mammogram, the algorithm circumvents some of the difficulties encountered with standard image processing methods. The clinical implementation of an automated instrument based on this algorithm is also discussed.

  12. Pumping and leak detection system of the HL-2A

    International Nuclear Information System (INIS)

    Cao Zeng; Xu Yunxian; Fu Weidong

    2001-01-01

    The pumping system is a combination of 8 turbomolecular pumps with three stages pumping for HL-2A vacuum vessel, a total effective pumping speed at the vessel of 12 m 3 ·s -1 for nitrogen. The leak detection of element and vessel is performed with inspiration, case of leak detection and two mass spectrometry. The total leak rate of vessel is bellow 1 x 10 -5 Pa ·m 3 ·s -1 . The base pressure is 1 x 10 -5 Pa

  13. Towards a global flood detection system using social media

    Science.gov (United States)

    de Bruijn, Jens; de Moel, Hans; Jongman, Brenden; Aerts, Jeroen

    2017-04-01

    It is widely recognized that an early warning is critical in improving international disaster response. Analysis of social media in real-time can provide valuable information about an event or help to detect unexpected events. For successful and reliable detection systems that work globally, it is important that sufficient data is available and that the algorithm works both in data-rich and data-poor environments. In this study, both a new geotagging system and multi-level event detection system for flood hazards was developed using Twitter data. Geotagging algorithms that regard one tweet as a single document are well-studied. However, no algorithms exist that combine several sequential tweets mentioning keywords regarding a specific event type. Within the time frame of an event, multiple users use event related keywords that refer to the same place name. This notion allows us to treat several sequential tweets posted in the last 24 hours as one document. For all these tweets, we collect a series of spatial indicators given in the tweet metadata and extract additional topological indicators from the text. Using these indicators, we can reduce ambiguity and thus better estimate what locations are tweeted about. Using these localized tweets, Bayesian change-point analysis is used to find significant increases of tweets mentioning countries, provinces or towns. In data-poor environments detection of events on a country level is possible, while in other, data-rich, environments detection on a city level is achieved. Additionally, on a city-level we analyse the spatial dependence of mentioned places. If multiple places within a limited spatial extent are mentioned, detection confidence increases. We run the algorithm using 2 years of Twitter data with flood related keywords in 13 major languages and validate against a flood event database. We find that the geotagging algorithm yields significantly more data than previously developed algorithms and successfully deals

  14. Radioimmunoassay test system for detection of anti-insulin antibodies

    International Nuclear Information System (INIS)

    Dudko, N.V.; Piven', N.V.; Ibragimova, G.V.; Kasatkin, Yu.N.

    1995-01-01

    A radiodiagnostic test system has been developed and commercial kit for radioimmunoassay of anti-insulin antibodies in human blood serum created. Clinical trials of the kit in patients (150 diabetics with types 1 and 2 condition) and normal subjects (n=100) demonstrated the possibility of using this kit for the detection of preclinical forms of diabetes and for distinguishing groups at risk of diabetes among children and adults, for the detection of insulin resistance, for the differential diagnosis of diabetes, and for monitoring the efficacy of insulin therapy. 9 refs.; 1 tab

  15. Phenomena and Detection of Gas Accumulation in Piping Systems

    International Nuclear Information System (INIS)

    Lee, D. Y.; Jeon, S. S.; Hong, S. J.; Song, Y. J.

    2011-01-01

    U.S. Nuclear Regulatory Commission (NRC) issued Generic Letter (GL) 2008-01 which provides recommendation and guidance to nuclear power plants for managing gas intrusion and accumulation in safety systems such as Emergency Core Cooling (ECC), Decay Heat Removal (DHR) and Containment Spray (CS) systems. Following the GL2008-01, Nuclear Energy Institute (NEI) reported NEI 09-10 that gives industry guidance for effective prevention and management of system gas accumulation. All of U.S. utilities responded to the GL2008-01 with evaluation results for gas accumulation in safety systems mentioned above. This paper summarizes key phenomena to be evaluated against gas accumulation in safety systems and detection methods for gas accumulation in subjected systems

  16. System for tissue characterization using synchronous detection of diffuse reflectance

    International Nuclear Information System (INIS)

    Morales Lopez, Orestes M.; Stolik Isakina, Suren; La Rosa Vazquez, Jose Manuel de; Valor Reed, Alma

    2016-01-01

    The development of a system for the characterization of tissues optical properties in-vivo by synchronous detection of diffuse reflectance is presented. The system comprises an exploring probe with a linear spatial arrangement of optical fibers coupled to six lasers of 650 nm wavelength and a photodiode. The system also includes a preamplifier circuit for the photodiode, a driver for the amplitude modulation of the light signal of the lasers with optical power monitoring, a digital phase splitter for reference signal generation, an amplifying circuit with digitally switch able gain, a double phase demodulation circuit, an Arduino, and a control interface developed in LabVIEW. (Author)

  17. Noninvasive biological sensor system for detection of drunk driving.

    Science.gov (United States)

    Murata, Kohji; Fujita, Etsunori; Kojima, Shigeyuki; Maeda, Shinitirou; Ogura, Yumi; Kamei, Tsutomu; Tsuji, Toshio; Kaneko, Shigehiko; Yoshizumi, Masao; Suzuki, Nobutaka

    2011-01-01

    Systems capable of monitoring the biological condition of a driver and issuing warnings during instances of drowsiness have recently been studied. Moreover, many researchers have reported that biological signals, such as brain waves, pulsation waves, and heart rate, are different between people who have and have not consumed alcohol. Currently, we are developing a noninvasive system to detect individuals driving under the influence of alcohol by measuring biological signals. We used the frequency time series analysis to attempt to distinguish between normal and intoxicated states of a person as the basis of the sensing system.

  18. E-commerce Review System to Detect False Reviews.

    Science.gov (United States)

    Kolhar, Manjur

    2017-08-15

    E-commerce sites have been doing profitable business since their induction in high-speed and secured networks. Moreover, they continue to influence consumers through various methods. One of the most effective methods is the e-commerce review rating system, in which consumers provide review ratings for the products used. However, almost all e-commerce review rating systems are unable to provide cumulative review ratings. Furthermore, review ratings are influenced by positive and negative malicious feedback ratings, collectively called false reviews. In this paper, we proposed an e-commerce review system framework developed using the cumulative sum method to detect and remove malicious review ratings.

  19. Soft-Fault Detection Technologies Developed for Electrical Power Systems

    Science.gov (United States)

    Button, Robert M.

    2004-01-01

    The NASA Glenn Research Center, partner universities, and defense contractors are working to develop intelligent power management and distribution (PMAD) technologies for future spacecraft and launch vehicles. The goals are to provide higher performance (efficiency, transient response, and stability), higher fault tolerance, and higher reliability through the application of digital control and communication technologies. It is also expected that these technologies will eventually reduce the design, development, manufacturing, and integration costs for large, electrical power systems for space vehicles. The main focus of this research has been to incorporate digital control, communications, and intelligent algorithms into power electronic devices such as direct-current to direct-current (dc-dc) converters and protective switchgear. These technologies, in turn, will enable revolutionary changes in the way electrical power systems are designed, developed, configured, and integrated in aerospace vehicles and satellites. Initial successes in integrating modern, digital controllers have proven that transient response performance can be improved using advanced nonlinear control algorithms. One technology being developed includes the detection of "soft faults," those not typically covered by current systems in use today. Soft faults include arcing faults, corona discharge faults, and undetected leakage currents. Using digital control and advanced signal analysis algorithms, we have shown that it is possible to reliably detect arcing faults in high-voltage dc power distribution systems (see the preceding photograph). Another research effort has shown that low-level leakage faults and cable degradation can be detected by analyzing power system parameters over time. This additional fault detection capability will result in higher reliability for long-lived power systems such as reusable launch vehicles and space exploration missions.

  20. Detection and classification results for an impulse radar mine detection system

    Science.gov (United States)

    Ericsson, Anders; Gustafsson, Anders

    1997-07-01

    At Sweden's Defence Research Establishment, FOA, a hand-held mine detection device is under development. The system is based on impulse radar technique, which due to its large band width, has shown to be an effective means to find objects buried shallow in the ground. Working with radar technique gives an obvious advantage compared to e.g., metal detectors when searching for plastic mines, or when the search is performed in an area highly contaminated with metal fragments or when the soil itself is rich of ferrite. The paper concentrates on detection and classification of minelike objects from measurements in an indoor testing environment. The focus is on evaluating how methods, partly already successfully proven, work in a 'difficult' environment, namely extremely dry sand. The result shows that metal objects and a stone that was used as object, are fairly easy to detect and to classify correct. The fact that the stone is classifiable, means that the false alarm rate can be reduced. It is also possible to detect a nylon cylinder, but here is the result quite sensitive to parameters of the detection algorithm. This is due to that the permittivity of the sand in the experiment is extremely low and close to the one for nylon. For the same reason, a non-metallic AP mine is not detectable or classifiable in the dry sand. The results indicate that even thought he methods work in more normal environments, other detection and classification algorithms than the presented ones have to be used in extreme cases like this one, in order ensure the function of the device.

  1. A Distributed Signature Detection Method for Detecting Intrusions in Sensor Systems

    Directory of Open Access Journals (Sweden)

    Won Woo Ro

    2013-03-01

    Full Text Available Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on theWu–Manber algorithm. In the proposed system, the algorithm is divided into two steps; the first step is dedicated to a sensor node, and the second step is assigned to a base station. In addition, the first step is modified to achieve efficient performance under limited computation resources. We conduct evaluations with random string sets and actual intrusion signatures to show the performance improvement of the proposed method. The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method. The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors.

  2. A distributed signature detection method for detecting intrusions in sensor systems.

    Science.gov (United States)

    Kim, Ilkyu; Oh, Doohwan; Yoon, Myung Kuk; Yi, Kyueun; Ro, Won Woo

    2013-03-25

    Sensor nodes in wireless sensor networks are easily exposed to open and unprotected regions. A security solution is strongly recommended to prevent networks against malicious attacks. Although many intrusion detection systems have been developed, most systems are difficult to implement for the sensor nodes owing to limited computation resources. To address this problem, we develop a novel distributed network intrusion detection system based on the Wu-Manber algorithm. In the proposed system, the algorithm is divided into two steps; the first step is dedicated to a sensor node, and the second step is assigned to a base station. In addition, the first step is modified to achieve efficient performance under limited computation resources. We conduct evaluations with random string sets and actual intrusion signatures to show the performance improvement of the proposed method. The proposed method achieves a speedup factor of 25.96 and reduces 43.94% of packet transmissions to the base station compared with the previously proposed method. The system achieves efficient utilization of the sensor nodes and provides a structural basis of cooperative systems among the sensors.

  3. Power system distributed oscilation detection based on Synchrophasor data

    Science.gov (United States)

    Ning, Jiawei

    Along with increasing demand for electricity, integration of renewable energy and deregulation of power market, power industry is facing unprecedented challenges nowadays. Within the last couple of decades, several serious blackouts have been taking place in United States. As an effective approach to prevent that, power system small signal stability monitoring has been drawing more interests and attentions from researchers. With wide-spread implementation of Synchrophasors around the world in the last decade, power systems real-time online monitoring becomes much more feasible. Comparing with planning study analysis, real-time online monitoring would benefit control room operators immediately and directly. Among all online monitoring methods, Oscillation Modal Analysis (OMA), a modal identification method based on routine measurement data where the input is unmeasured ambient excitation, is a great tool to evaluate and monitor power system small signal stability. Indeed, high sampling Synchrophasor data around power system is fitted perfectly as inputs to OMA. Existing methods in OMA for power systems are all based on centralized algorithms applying at control centers only; however, with rapid growing number of online Synchrophasors the computation burden at control centers is and will be continually exponentially expanded. The increasing computation time at control center compromises the real-time feature of online monitoring. The communication efforts between substation and control center will also be out of reach. Meanwhile, it is difficult or even impossible for centralized algorithms to detect some poorly damped local modes. In order to avert previous shortcomings of centralized OMA methods and embrace the new changes in the power systems, two new distributed oscillation detection methods with two new decentralized structures are presented in this dissertation. Since the new schemes brought substations into the big oscillation detection picture, the proposed

  4. Lateral position detection and control for friction stir systems

    Science.gov (United States)

    Fleming, Paul; Lammlein, David; Cook, George E.; Wilkes, Don Mitchell; Strauss, Alvin M.; Delapp, David; Hartman, Daniel A.

    2010-12-14

    A friction stir system for processing at least a first workpiece includes a spindle actuator coupled to a rotary tool comprising a rotating member for contacting and processing the first workpiece. A detection system is provided for obtaining information related to a lateral alignment of the rotating member. The detection system comprises at least one sensor for measuring a force experienced by the rotary tool or a parameter related to the force experienced by the rotary tool during processing, wherein the sensor provides sensor signals. A signal processing system is coupled to receive and analyze the sensor signals and determine a lateral alignment of the rotating member relative to a selected lateral position, a selected path, or a direction to decrease a lateral distance relative to the selected lateral position or selected path. In one embodiment, the friction stir system can be embodied as a closed loop tracking system, such as a robot-based tracked friction stir welding (FSW) or friction stir processing (FSP) system.

  5. A novel mobile system for radiation detection and monitoring

    Science.gov (United States)

    Biafore, Mauro

    2014-05-01

    A novel mobile system for real time, wide area radiation surveillance has been developed within the REWARD project, financed within the FP7 programme, theme SEC-2011.1.5-1 (Development of detection capabilities of difficult to detect radioactive sources and nuclear materials - Capability Project). The REWARD sensing units are small, mobile portable units with low energy consumption, which consist of new miniaturized solid-state radiation sensors: a CdZnTe detector for gamma radiation and a high efficiency neutron detector based on novel silicon technologies. The sensing unit is integrated by a wireless communication interface to send the data remotely to a monitoring base station as well as a GPS system to calculate the position of the tag. The system also incorporates middleware and high-level software to provide web-service interfaces for the exchange of information. A central monitoring and decision support system has been designed to process the data from the sensing units and to compare them with historical record in order to generate an alarm when an abnormal situation is detected. A security framework ensures protection against unauthorized access to the network and data, ensuring the privacy of the communications and contributing to the overall robustness and reliability of the REWARD system. The REWARD system has been designed for many different scenarios such as nuclear terrorism threats, lost radioactive sources, radioactive contamination or nuclear accidents. It can be deployed in emergency units and in general in any type of mobile or static equipment, but also inside public/private buildings or infrastructures. The complete system is scalable in terms of complexity and cost and offers very high precision on both the measurement and the location of the radiation. The modularity and flexibility of the system allows for a realistic introduction to the market. Authorities may start with a basic, low cost system and increase the complexity based on their

  6. Design and Implementation of Domain Hijacking Detection System

    Directory of Open Access Journals (Sweden)

    Xue Jupo

    2015-01-01

    Full Text Available As the basement of Internet application, DNS plays a very critical role in the network running. On Jan. 21st, 2014, the occurrence of a serious DNS hijacking in Internet has aroused the attentions to the DNS security incident again. This paper comes up with a new method to detect DSN hijacking through the construction of a high-speed cache in terms of the corresponding relation between domain name and server IP. With this method, we build a cache with the domain name and the IP. With this cache, domain name can be detected if DSN hijacking happens in DNS cache server and this system can detect domain name hijacking efficiently after it happens.

  7. Development of a Computer-Aided Diagnosis System for Early Detection of Masses Using Retrospectively Detected Cancers on Prior Mammograms

    National Research Council Canada - National Science Library

    Wei, Jun

    2006-01-01

    The goal of this project is to develop a computer-aided diagnosis (CAD) system for mass detection using advanced computer vision techniques that will be trained with retrospectively detected cancers on prior mammograms...

  8. Development of a Computer-Aided Diagnosis System for Early Detection of Masses Using Retrospectively Detected Cancers on Prior Mammograms

    National Research Council Canada - National Science Library

    Wei, Jun

    2007-01-01

    The goal of this project is to develop a computer-aided diagnosis (CAD) system for mass detection using advanced computer vision techniques that will be trained with retrospectively detected cancers on prior mammograms...

  9. Development of bremsstrahlung detection type tritium gas monitoring system, (1)

    International Nuclear Information System (INIS)

    Bingo, Kazuyoshi; Yoshida, Makoto; Chida, Tohru; Kawasaki, Katsuya

    1982-11-01

    A tritium monitoring system by means of bremsstrahlung detecting was developed. A prototype system consisted of a sampling cylinder, a gas circulating apparatus, an NaI(T1) detector, an amplifier and a multichannel analyzer. The sizes of sampling cylinders used 208 mm phi x 290; 170; 70 mmH, 133 mm phi x 292; 172; 72 mmH and 55 mm phi x 294; 174; 74 mmH, respectively. The sensitivity of prototype system was from 12 to 57 cps/μCi.cm - 3 , depending on the size of sampling cylinder and an efficiency of NaI(T1) detector. When pulses due to breamsstrahlungs with energy from 4 to 17 keV were counted, the minimum detectable concentration of the prototype tritium monitoring system was obtained to be 5.2 x 10 - 3 μCi/cm 3 . It was evaluated that the detectable range of concentration was from 1 x 10 - 2 to 1 x 10 3 μCi/cm 3 . (author)

  10. Tomato seeds maturity detection system based on chlorophyll fluorescence

    Science.gov (United States)

    Li, Cuiling; Wang, Xiu; Meng, Zhijun

    2016-10-01

    Chlorophyll fluorescence intensity can be used as seed maturity and quality evaluation indicator. Chlorophyll fluorescence intensity of seed coats is tested to judge the level of chlorophyll content in seeds, and further to judge the maturity and quality of seeds. This research developed a detection system of tomato seeds maturity based on chlorophyll fluorescence spectrum technology, the system included an excitation light source unit, a fluorescent signal acquisition unit and a data processing unit. The excitation light source unit consisted of two high power LEDs, two radiators and two constant current power supplies, and it was designed to excite chlorophyll fluorescence of tomato seeds. The fluorescent signal acquisition unit was made up of a fluorescence spectrometer, an optical fiber, an optical fiber scaffolds and a narrowband filter. The data processing unit mainly included a computer. Tomato fruits of green ripe stage, discoloration stage, firm ripe stage and full ripe stage were harvested, and their seeds were collected directly. In this research, the developed tomato seeds maturity testing system was used to collect fluorescence spectrums of tomato seeds of different maturities. Principal component analysis (PCA) method was utilized to reduce the dimension of spectral data and extract principal components, and PCA was combined with linear discriminant analysis (LDA) to establish discriminant model of tomato seeds maturity, the discriminant accuracy was greater than 90%. Research results show that using chlorophyll fluorescence spectrum technology is feasible for seeds maturity detection, and the developed tomato seeds maturity testing system has high detection accuracy.

  11. Impact detection using ultrasonic waves based on artificial immune system

    Science.gov (United States)

    Okamoto, Keisuke; Mita, Akira

    2009-03-01

    This paper presents a structural health monitoring system for judging structural condition of metallic plates by analyzing ultrasonic waves. Many critical accidents of structures like buildings and aircrafts are caused by small structural errors; cracks and loosened bolts etc. This is a reason why we need to detect little errors at an early stage. Moreover, to improve precision and to reduce cost for damage detection, it is necessary to build and update the database corresponding to environmental change. This study focuses our attention on the automatable structures, specifically, applying artificial immune system (AIS) algorithm to determine the structure safe or not. The AIS is a novelty computational detection algorithm inspired from biological defense system, which discriminates between self and non-self to reject nonself cells. Here, self is defined to be normal data patterns and non-self is abnormal data patterns. Furthermore, it is not only pattern recognition but also it has a storage function. In this study, a number of impact resistance experiments of duralumin plates, with normal structural condition and abnormal structural condition, are examined and ultrasonic waves are acquired by AE sensors on the surface of the aluminum plates. By accumulating several feature vectors of ultrasonic waves, a judging method, which can determine an abnormal wave as nonself, inspired from immune system is created. The results of the experiments show good performance of this method.

  12. An integrated leak detection system for the ALMR steam generator

    International Nuclear Information System (INIS)

    Dayal, Y.; Gaubatz, D.C.; Wong, K.K.; Greene, D.A.

    1995-01-01

    The steam generator (SG) of the Advanced Liquid Metal Reactor (ALMR) system serves as a heat exchanger between the shell side secondary loop hot liquid sodium and the tube side water/steam mixture. A leak in the tube will result in the injection of the higher pressure water/steam into the sodium and cause an exothermic sodium-water reaction. An initial small leak (less than 1 gm/sec) can escalate into an intermediate size leak in a relatively short time by self enlargement of the original flaw and by initiating leaks in neighboring tubes. If not stopped, complete rupture of one or more tubes can cause injection rates of thousands of gm/sec and result in the over pressurization of the secondary loop rupture disk and dumping of the sodium to relieve pressure. The down time associated with severe sodium-water reaction damage has great adverse economic consequence. An integrated leak detection system (ILDS) has been developed which utilizes both chemical and acoustic sensors for improved leak detection. The system provides SG leak status to the reactor operator and is reliable enough to trigger automatic control action to protect the SG. The ILDS chemical subsystem uses conventional in-sodium and cover gas hydrogen detectors and incorporates knowledge based effects due to process parameters for improved reliability. The ILDS acoustic subsystem uses an array of acoustic sensors and incorporates acoustic beamforming technology for highly reliable and accurate leak identification and location. The new ILDS combines the small leak detection capability of the chemical system with the reliability and rapid detection/location capability of the acoustic system to provide a significantly improved level of protection for the SG over a wide range of operation conditions. (author)

  13. Adaptive road crack detection system by pavement classification.

    Science.gov (United States)

    Gavilán, Miguel; Balcones, David; Marcos, Oscar; Llorca, David F; Sotelo, Miguel A; Parra, Ignacio; Ocaña, Manuel; Aliseda, Pedro; Yarza, Pedro; Amírola, Alejandro

    2011-01-01

    This paper presents a road distress detection system involving the phases needed to properly deal with fully automatic road distress assessment. A vehicle equipped with line scan cameras, laser illumination and acquisition HW-SW is used to storage the digital images that will be further processed to identify road cracks. Pre-processing is firstly carried out to both smooth the texture and enhance the linear features. Non-crack features detection is then applied to mask areas of the images with joints, sealed cracks and white painting, that usually generate false positive cracking. A seed-based approach is proposed to deal with road crack detection, combining Multiple Directional Non-Minimum Suppression (MDNMS) with a symmetry check. Seeds are linked by computing the paths with the lowest cost that meet the symmetry restrictions. The whole detection process involves the use of several parameters. A correct setting becomes essential to get optimal results without manual intervention. A fully automatic approach by means of a linear SVM-based classifier ensemble able to distinguish between up to 10 different types of pavement that appear in the Spanish roads is proposed. The optimal feature vector includes different texture-based features. The parameters are then tuned depending on the output provided by the classifier. Regarding non-crack features detection, results show that the introduction of such module reduces the impact of false positives due to non-crack features up to a factor of 2. In addition, the observed performance of the crack detection system is significantly boosted by adapting the parameters to the type of pavement.

  14. Adaptive Road Crack Detection System by Pavement Classification

    Directory of Open Access Journals (Sweden)

    Alejandro Amírola

    2011-10-01

    Full Text Available This paper presents a road distress detection system involving the phases needed to properly deal with fully automatic road distress assessment. A vehicle equipped with line scan cameras, laser illumination and acquisition HW-SW is used to storage the digital images that will be further processed to identify road cracks. Pre-processing is firstly carried out to both smooth the texture and enhance the linear features. Non-crack features detection is then applied to mask areas of the images with joints, sealed cracks and white painting, that usually generate false positive cracking. A seed-based approach is proposed to deal with road crack detection, combining Multiple Directional Non-Minimum Suppression (MDNMS with a symmetry check. Seeds are linked by computing the paths with the lowest cost that meet the symmetry restrictions. The whole detection process involves the use of several parameters. A correct setting becomes essential to get optimal results without manual intervention. A fully automatic approach by means of a linear SVM-based classifier ensemble able to distinguish between up to 10 different types of pavement that appear in the Spanish roads is proposed. The optimal feature vector includes different texture-based features. The parameters are then tuned depending on the output provided by the classifier. Regarding non-crack features detection, results show that the introduction of such module reduces the impact of false positives due to non-crack features up to a factor of 2. In addition, the observed performance of the crack detection system is significantly boosted by adapting the parameters to the type of pavement.

  15. Error detection and prevention in Embedded Systems Software

    DEFF Research Database (Denmark)

    Kamel, Hani Fouad

    1996-01-01

    Despite many efforts to structure the development and design processes of embedded systems, errors are discovered at the final stages of production and sometimes after the delivery of the products. The cost of such errors can be prohibitive.Different design techniques to detect such errors...... systems, a formal model for such systems is introduced. The main characteristics of embedded systems design and the interaction of these properties are described. A taxonomy for the structure of the software developed for such systems based on the amount of processes and processors involved is presented...... will be presented. Moreover, we will try to describe the causes of these errors and the countermeasures that can be taken to avoid them. The main theme is that prevention is better than cure.The presentation is structured in three parts. The first part deals with an introduction to the subject area of embedded...

  16. Dynamic analysis methods for detecting anomalies in asynchronously interacting systems

    Energy Technology Data Exchange (ETDEWEB)

    Kumar, Akshat; Solis, John Hector; Matschke, Benjamin

    2014-01-01

    Detecting modifications to digital system designs, whether malicious or benign, is problematic due to the complexity of the systems being analyzed. Moreover, static analysis techniques and tools can only be used during the initial design and implementation phases to verify safety and liveness properties. It is computationally intractable to guarantee that any previously verified properties still hold after a system, or even a single component, has been produced by a third-party manufacturer. In this paper we explore new approaches for creating a robust system design by investigating highly-structured computational models that simplify verification and analysis. Our approach avoids the need to fully reconstruct the implemented system by incorporating a small verification component that dynamically detects for deviations from the design specification at run-time. The first approach encodes information extracted from the original system design algebraically into a verification component. During run-time this component randomly queries the implementation for trace information and verifies that no design-level properties have been violated. If any deviation is detected then a pre-specified fail-safe or notification behavior is triggered. Our second approach utilizes a partitioning methodology to view liveness and safety properties as a distributed decision task and the implementation as a proposed protocol that solves this task. Thus the problem of verifying safety and liveness properties is translated to that of verifying that the implementation solves the associated decision task. We develop upon results from distributed systems and algebraic topology to construct a learning mechanism for verifying safety and liveness properties from samples of run-time executions.

  17. Computer aided detection system for micro calcifications in digital mammograms.

    Science.gov (United States)

    Mohamed, Hayat; Mabrouk, Mai S; Sharawy, Amr

    2014-10-01

    Breast cancer continues to be a significant public health problem in the world. Early detection is the key for improving breast cancer prognosis. Mammogram breast X-ray is considered the most reliable method in early detection of breast cancer. However, it is difficult for radiologists to provide both accurate and uniform evaluation for the enormous mammograms generated in widespread screening. Micro calcification clusters (MCCs) and masses are the two most important signs for the breast cancer, and their automated detection is very valuable for early breast cancer diagnosis. The main objective is to discuss the computer-aided detection system that has been proposed to assist the radiologists in detecting the specific abnormalities and improving the diagnostic accuracy in making the diagnostic decisions by applying techniques splits into three-steps procedure beginning with enhancement by using Histogram equalization (HE) and Morphological Enhancement, followed by segmentation based on Otsu's threshold the region of interest for the identification of micro calcifications and mass lesions, and at last classification stage, which classify between normal and micro calcifications 'patterns and then classify between benign and malignant micro calcifications. In classification stage; three methods were used, the voting K-Nearest Neighbor classifier (K-NN) with prediction accuracy of 73%, Support Vector Machine classifier (SVM) with prediction accuracy of 83%, and Artificial Neural Network classifier (ANN) with prediction accuracy of 77%. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  18. DATA MINING APPLICATION IN CREDIT CARD FRAUD DETECTION SYSTEM

    Directory of Open Access Journals (Sweden)

    FRANCISCA NONYELUM OGWUELEKA

    2011-06-01

    Full Text Available Data mining is popularly used to combat frauds because of its effectiveness. It is a well-defined procedure that takes data as input and produces models or patterns as output. Neural network, a data mining technique was used in this study. The design of the neural network (NN architecture for the credit card detection system was based on unsupervised method, which was applied to the transactions data to generate four clusters of low, high, risky and high-risk clusters. The self-organizing map neural network (SOMNN technique was used for solving the problem of carrying out optimal classification of each transaction into its associated group, since a prior output is unknown. The receiver-operating curve (ROC for credit card fraud (CCF detection watch detected over 95% of fraud cases without causing false alarms unlike other statistical models and the two-stage clusters. This shows that the performance of CCF detection watch is in agreement with other detection software, but performs better.

  19. Evaluation of methods for leak detection in reactor primary systems

    International Nuclear Information System (INIS)

    Kupperman, D.S.; Claytor, T.N.

    1985-01-01

    No currently available, single leak-detection method combines optimal leakage detection sensitivity, leak-locating ability, and leakage measurement accuracy. Technology is available to improve leak detection capability at specific sites by use of acoustic monitoring. However, current acoustic monitoring techniques provide no source discrimination (e.g., to distinguish between leaks from pipe cracks and valves) and no leak-rate information (a small leak may saturate the system). Seven cracks, including three field-induced IGSCC specimens and two thermal-fatigue cracks, have been installed in a laboratory acoustic leak detection facility. The IGSCC specimens produce stronger acoustic signals than the thermal-fatigue cracks at equivalent leak rates. Despite significant differences in crack geometry, the acoustic signals from the three IGSCC specimens, tested at the same leak rate, are virtually identical in the frequency range from 300 to 400 kHz. Thus, the quantitative correlations between the acoustic signals and leak rate in the 300-400 kHz band are very similar for the IGSCC specimens. Also, acoustic background data have been acquired during a hot functional test at the Watts Bar PWR. With these data, it is now possible to estimate the sensitivity of acoustic leak detection techniques. (orig.)

  20. Sunglass detection method for automation of video surveillance system

    Science.gov (United States)

    Sikandar, Tasriva; Samsudin, Wan Nur Azhani W.; Hawari Ghazali, Kamarul; Mohd, Izzeldin I.; Fazle Rabbi, Mohammad

    2018-04-01

    Wearing sunglass to hide face from surveillance camera is a common activity in criminal incidences. Therefore, sunglass detection from surveillance video has become a demanding issue in automation of security systems. In this paper we propose an image processing method to detect sunglass from surveillance images. Specifically, a unique feature using facial height and width has been employed to identify the covered region of the face. The presence of covered area by sunglass is evaluated using facial height-width ratio. Threshold value of covered area percentage is used to classify the glass wearing face. Two different types of glasses have been considered i.e. eye glass and sunglass. The results of this study demonstrate that the proposed method is able to detect sunglasses in two different illumination conditions such as, room illumination as well as in the presence of sunlight. In addition, due to the multi-level checking in facial region, this method has 100% accuracy of detecting sunglass. However, in an exceptional case where fabric surrounding the face has similar color as skin, the correct detection rate was found 93.33% for eye glass.

  1. Advanced power system protection and incipient fault detection and protection of spaceborne power systems

    Science.gov (United States)

    Russell, B. Don

    1989-01-01

    This research concentrated on the application of advanced signal processing, expert system, and digital technologies for the detection and control of low grade, incipient faults on spaceborne power systems. The researchers have considerable experience in the application of advanced digital technologies and the protection of terrestrial power systems. This experience was used in the current contracts to develop new approaches for protecting the electrical distribution system in spaceborne applications. The project was divided into three distinct areas: (1) investigate the applicability of fault detection algorithms developed for terrestrial power systems to the detection of faults in spaceborne systems; (2) investigate the digital hardware and architectures required to monitor and control spaceborne power systems with full capability to implement new detection and diagnostic algorithms; and (3) develop a real-time expert operating system for implementing diagnostic and protection algorithms. Significant progress has been made in each of the above areas. Several terrestrial fault detection algorithms were modified to better adapt to spaceborne power system environments. Several digital architectures were developed and evaluated in light of the fault detection algorithms.

  2. Advanced Restricted Area Entry Control System (Araecs)

    Science.gov (United States)

    2014-06-01

    the plane ticket , which is scanned into the system. This scan enters the travelers name into the computer to check against a no-fly list that is...contraband than ensuring only authorized personnel can pass through the checkpoint—since anyone who purchases an airline ticket is authorized. There has...biometrics security that are most commonly used. These special biometric devices can often be seen in movies and TV shows, but these types of

  3. Triplexer Monitor Design for Failure Detection in FTTH System

    Science.gov (United States)

    Fu, Minglei; Le, Zichun; Hu, Jinhua; Fei, Xia

    2012-09-01

    Triplexer was one of the key components in FTTH systems, which employed an analog overlay channel for video broadcasting in addition to bidirectional digital transmission. To enhance the survivability of triplexer as well as the robustness of FTTH system, a multi-ports device named triplexer monitor was designed and realized, by which failures at triplexer ports can be detected and localized. Triplexer monitor was composed of integrated circuits and its four input ports were connected with the beam splitter whose power division ratio was 95∶5. By means of detecting the sampled optical signal from the beam splitters, triplexer monitor tracked the status of the four ports in triplexer (e.g. 1310 nm, 1490 nm, 1550 nm and com ports). In this paper, the operation scenario of the triplexer monitor with external optical devices was addressed. And the integrated circuit structure of the triplexer monitor was also given. Furthermore, a failure localization algorithm was proposed, which based on the state transition diagram. In order to measure the failure detection and localization time under the circumstance of different failed ports, an experimental test-bed was built. Experiment results showed that the detection time for the failure at 1310 nm port by the triplexer monitor was less than 8.20 ms. For the failure at 1490 nm or 1550 nm port it was less than 8.20 ms and for the failure at com port it was less than 7.20 ms.

  4. Hybrid feature selection for supporting lightweight intrusion detection systems

    Science.gov (United States)

    Song, Jianglong; Zhao, Wentao; Liu, Qiang; Wang, Xin

    2017-08-01

    Redundant and irrelevant features not only cause high resource consumption but also degrade the performance of Intrusion Detection Systems (IDS), especially when coping with big data. These features slow down the process of training and testing in network traffic classification. Therefore, a hybrid feature selection approach in combination with wrapper and filter selection is designed in this paper to build a lightweight intrusion detection system. Two main phases are involved in this method. The first phase conducts a preliminary search for an optimal subset of features, in which the chi-square feature selection is utilized. The selected set of features from the previous phase is further refined in the second phase in a wrapper manner, in which the Random Forest(RF) is used to guide the selection process and retain an optimized set of features. After that, we build an RF-based detection model and make a fair comparison with other approaches. The experimental results on NSL-KDD datasets show that our approach results are in higher detection accuracy as well as faster training and testing processes.

  5. Multisensor system for toxic gases detection generated on indoor environments

    Science.gov (United States)

    Durán, C. M.; Monsalve, P. A. G.; Mosquera, C. J.

    2016-11-01

    This work describes a wireless multisensory system for different toxic gases detection generated on indoor environments (i.e., Underground coal mines, etc.). The artificial multisensory system proposed in this study was developed through a set of six chemical gas sensors (MQ) of low cost with overlapping sensitivities to detect hazardous gases in the air. A statistical parameter was implemented to the data set and two pattern recognition methods such as Principal Component Analysis (PCA) and Discriminant Function Analysis (DFA) were used for feature selection. The toxic gases categories were classified with a Probabilistic Neural Network (PNN) in order to validate the results previously obtained. The tests were carried out to verify feasibility of the application through a wireless communication model which allowed to monitor and store the information of the sensor signals for the appropriate analysis. The success rate in the measures discrimination was 100%, using an artificial neural network where leave-one-out was used as cross validation method.

  6. A Siren Detection System based on Mechanical Resonant Filters

    Directory of Open Access Journals (Sweden)

    John N. Avaritsiotis

    2001-09-01

    Full Text Available A system based on mechanical resonant filters is proposed that can be used for the detection of acoustical signals the frequency components of which vary according to specific periodic patterns. Usually, signals of this category produced by the siren of an emergency vehicle. The device essentially implements a mechanical narrow filter bank that covers the frequency range of a typical siren sound. Signal detection is obtained by measuring the time delay between successive activation of the filters of the bank. The whole analysis reveals how a set of simple, low-cost mechanical resonant filters can replace an electronic analog or digital system for the implementation of a filter bank. Moreover, a scaling down procedure is proposed so that a microsystem may be developed.

  7. A novel wearable smart button system for fall detection

    Science.gov (United States)

    Zhuang, Wei; Sun, Xiang; Zhi, Yueyan; Han, Yue; Mao, Hande

    2017-05-01

    Fall has been the second most cause of accidental injury to death in the world. It has been a serious threat to the physical and mental health of the elders. Therefore, developing wearable node system with fall detecting ability has become increasingly pressing at present. A novel smart button for long-term fall detection is proposed in this paper, which is able to accurately monitor the falling behavior, and sending warning message online as well. The smart button is based on the tri-axis acceleration sensor which is used to collect the body motion signals. By using the statistical metrics of acceleration characteristics, a new SVM classification algorithm with high positive accuracy and stability is proposed so as to classify the falls and activities of daily living, and the results can be real-time displayed on Android based mobile phone. The experiments show that our wearable node system can continuously monitor the falling behavior with positive rate 94.8%.

  8. Development of failure detection system for gas-cooled reactor

    International Nuclear Information System (INIS)

    Feirreira, M.P.

    1990-01-01

    This work presents several kinds of Failure Detection Systems for Fuel Elements, stressing their functional principles and major applications. A comparative study indicates that the method of electrostatic precipitation of the fission gases Kr and Xe is the most efficient for fuel failure detection in gas-cooled reactors. A detailed study of the physical phenomena involved in electrostatic precipitation led to the derivation of an equation for the measured counting rate. The emission of fission products from the fuel and the ion recombination inside the chamber are evaluated. A computer program, developed to simulate the complete operation of the system, relates the counting rate to the concentration of Kr and Xe isotopes. The project of a mock-up is then presented. Finally, the program calculations are compared to experimental data, available from the literature, yielding a close agreement. (author)

  9. Complexity of deciding detectability in discrete event systems

    Czech Academy of Sciences Publication Activity Database

    Masopust, Tomáš

    2018-01-01

    Roč. 93, July (2018), s. 257-261 ISSN 0005-1098 Institutional support: RVO:67985840 Keywords : discrete event systems * finite automata * detectability Subject RIV: BA - General Mathematics OBOR OECD: Computer sciences, information science, bioinformathics (hardware development to be 2.2, social aspect to be 5.8) Impact factor: 5.451, year: 2016 https://www.sciencedirect.com/science/article/pii/S0005109818301730

  10. Detecting Data Concealment Programs Using Passive File System Analysis

    Science.gov (United States)

    Davis, Mark; Kennedy, Richard; Pyles, Kristina; Strickler, Amanda; Shenoi, Sujeet

    Individuals who wish to avoid leaving evidence on computers and networks often use programs that conceal data from conventional digital forensic tools. This paper discusses the application of passive file system analysis techniques to detect trace evidence left by data concealment programs. In addition, it describes the design and operation of Seraph, a tool that determines whether certain encryption, steganography and erasing programs were used to hide or destroy data.

  11. Advancing research and applications with lightning detection and mapping systems

    Science.gov (United States)

    MacGorman, Donald R.; Goodman, Steven J.

    2011-11-01

    Southern Thunder 2011 Workshop; Norman, Oklahoma, 11-14 July 2011 The Southern Thunder 2011 (ST11) Workshop was the fourth in a series intended to accelerate research and operational applications made possible by the expanding availability of ground-based and satellite systems that detect and map all types of lightning (in-cloud and cloud-to-ground). This community workshop, first held in 2004, brings together lightning data providers, algorithm developers, and operational users in government, academia, and industry.

  12. Complexity of deciding detectability in discrete event systems

    Czech Academy of Sciences Publication Activity Database

    Masopust, Tomáš

    2018-01-01

    Roč. 93, July (2018), s. 257-261 ISSN 0005-1098 Institutional support: RVO:67985840 Keywords : discrete event systems * finite automata * detectability Subject RIV: BA - General Mathematics OBOR OECD: Computer science s, information science , bioinformathics (hardware development to be 2.2, social aspect to be 5.8) Impact factor: 5.451, year: 2016 https://www. science direct.com/ science /article/pii/S0005109818301730

  13. Hatrick: A System for Real-time Threat Detection in Cyber Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Wickramaarachchi, Charith [Univ. of Southern California, Los Angeles, CA (United States); Kumbhare, Alok [Univ. of Southern California, Los Angeles, CA (United States); Chelmis, Charalampos [Univ. of Southern California, Los Angeles, CA (United States); Frincu, Marc [Univ. of Southern California, Los Angeles, CA (United States); Prasanna, Viktor [Univ. of Southern California, Los Angeles, CA (United States)

    2011-12-07

    Complexity of cyber attacks has grown rapidly over the last few decades. Novel advance techniques are needed in order to counter these attacks. Detecting some of these complex cyber attacks can be reduced to detecting patterns and dynamics in computer network traffic. These patterns can be molded as directed graphs based on their propagation through the cyber physical systems. This work in progress report presents an implemented system, Hatrick, which enable scalable, low latency dynamic graph analytics on clouds and commodity clusters. Hatrick will enable continuous monitoring of cyber physical systems to detect attack patterns in real-time.

  14. Detection Systems and Algorithms for Multiplexed Quantum Dots

    Science.gov (United States)

    Goss, Kelly Christine

    Quantum Dots (QDs) are semiconductor nanocrystals that absorb light and re-emit at a wavelength dependent on its size and shape. A group of quantum dots can be designed to have a unique spectral emission by varying the size of the quantum dots (wavelength) and number of quantum dots (optical power) [1]. This technology is refered to as Multiplexed Quantum Dots (MxQD) and when it was first proposed, MxQD tags were created with 6 optical power levels and one QD colour or 3 QD colours and 2 optical power levels. It was hypothesized that a realistic limit to the number of tags would be a system of 6 optical power levels and 6 QD colours resulting in 46655 unique tags. In recent work, the fabrication and detection of 9 unique tags [2] was demonstrated which is still far from the predicted capability of the technology. The limitations affecting the large number of unique tags are both the fabrication methods and the data detection algorithms used to read the spectral emissions. This thesis makes contributions toward improving the data detection algorithms for MxQD tags. To accomplish this, a communications system model is developed that includes the inteference between QD colours, Inter-Symbol Interference (ISI), and additive noise. The model is developed for the two optical detectors, namely a Charge-Coupled Device (CCD) spectrometer and photodiode detectors. The model also includes an analytical expression for the Signal-to-Noise Ratio (SNR) of the detectors. For the CCD spectrometer, this model is verified with an experimental prototype. With the models in place, communications systems tools are applied that overcome both ISI and noise. This is an improvement over previous work in the field that only considered algorithms to overcome the ISI or noise separately. Specifically, this thesis outlines the proposal of a matched filter to improve SNR, a Minimum Mean Square Error (MMSE) equalizer that mitigates ISI in the presence of noise and a Maximum Likelihood Sequence

  15. An improved system of detecting single event effect in SRAM

    International Nuclear Information System (INIS)

    Tong Teng; Wang Xiaohui; Zhang Zhangang; Liu Tianqi; Gu Song; Yang Zhenlei; Su Hong; Liu Jie

    2014-01-01

    The material research center in Institute of Modern Physics, Chinese Academy of Sciences (IMP, CAS) have made a fruitful achievements in the research of single event effects (SEEs) occurring in static random access memory (SRAM). However, there are some drawbacks exist in the two systems of detecting SEE owning by the material research center. Therefore, an improved method of detecting SEE is proposed, and the method functionality is implemented in a circuit. Further, a sequence of experiments are carried out in the beam radiation terminal of the Heavy Ion Facility in Lanzhou (HIRFL), and a bunch of experimental data are collected. The irradiation tests were carried out using 129 Xe for the SEE research of 65 nm SRAMs; Using 12 C for the SEE research of the 65, 130 and 150 nm SRAMs with ECC module; Using 129 Xe for the SEL research of the common commercial SRAMs and so on. These experiments provide a statistical evidence of the effectiveness and robustness of the improved system. It is believed that the proposed system will be beneficial for detecting SEE in diverse settings, and it could be taken advantage of as a platform for future research on SEE tests in more intricate devices. (authors)

  16. Anomaly detection in an automated safeguards system using neural networks

    International Nuclear Information System (INIS)

    Whiteson, R.; Howell, J.A.

    1992-01-01

    An automated safeguards system must be able to detect an anomalous event, identify the nature of the event, and recommend a corrective action. Neural networks represent a new way of thinking about basic computational mechanisms for intelligent information processing. In this paper, we discuss the issues involved in applying a neural network model to the first step of this process: anomaly detection in materials accounting systems. We extend our previous model to a 3-tank problem and compare different neural network architectures and algorithms. We evaluate the computational difficulties in training neural networks and explore how certain design principles affect the problems. The issues involved in building a neural network architecture include how the information flows, how the network is trained, how the neurons in a network are connected, how the neurons process information, and how the connections between neurons are modified. Our approach is based on the demonstrated ability of neural networks to model complex, nonlinear, real-time processes. By modeling the normal behavior of the processes, we can predict how a system should be behaving and, therefore, detect when an abnormality occurs

  17. An angle-sensitive detection system for scattered heavy ions

    CERN Document Server

    Ganz, R E; Bär, R; Bethge, Klaus; Bokemeyer, H; Folger, H; Samek, M; Salabura, P; Schwalm, D; Stiebing, K E

    1999-01-01

    A compact detection system for heavy ions scattered in collisions at the Coulomb barrier is presented. This system, consisting of four identical, low-pressure Parallel Plate Avalanche Counter (PPAC) modules with two sensitive layers each, was built to operate in an ultra-high-vacuum environment inside the EPoS II solenoid spectrometer at GSI Darmstadt. The detector covers polar angles between 20 deg. and 70 deg. with respect to the beam axis, and about 80% of 2 pi in azimuthal angle. Segmented cathodes and a delay-line read-out allow for a determination of both angles with a precision of delta THETA approx 0.7 deg. in polar and delta PHI approx 1.5 deg. in azimuthal angle, respectively. The system has been proven to be capable of handling instantaneous rates of up to 5x10 sup 5 detected ions per second per module. It neither exhibits the degradation of detection efficiency nor loss in resolution over a 500 h period of a 6 MeV/u sup 2 sup 3 sup 8 U+ sup 1 sup 8 sup 1 Ta measurement at average luminosities of 8...

  18. New radionuclide specific laboratory detection system for metallurgical industry

    International Nuclear Information System (INIS)

    Burianova, L.; Solc, J.; Dryak, P.; Moser, H.; Branger, T.; Garcia-Torano, E.; Peyres, V.; Capogni, M.; Luca, A.; Vodenik, B.; Oliveira, C.; Portugal, L.; Tzika, F.; Lutter, G.; Szucs, L.; Dziel, T.; Burda, O.; Dirk, A.; Martinkovic, J.; Sliskonen, T.; Mattila, A.

    2014-01-01

    One of the main outputs of the European Metrology Research Programme (EMRP) project 'Ionising radiation metrology for the metallurgical industry' (MetroMetal) was the recommendation on a novel spectrometric detection system optimized for the measurement of radioactivity in metallurgical samples. The recommended system, prototypes of which were constructed at two project partner's laboratories, was characterized by using Monte Carlo (MC) simulations. Six different MC codes were used to model the system and a range of cylindrical samples of cast steel, slag and fume dust. The samples' shape, density, and elemental composition were the same as the ones of the calibration standards developed within the project to provide traceability to end-users. The MC models were used to calculate full-energy peak and total detection efficiencies as well as true coincidence summing correction (TCSC) factors for selected radionuclides of interest in the metallurgical industry: 60 Co, 137 Cs, 192 Ir, 214 Bi, 214 Pb, and 208 Tl. The MC codes were compared to each other on the basis of the calculated detection efficiencies and TCSC factors. In addition, a 'Procedural guide for calculation of TCSC factors for samples in metallurgical industry' was developed for end-users. The TCSC factors reached in certain cases up to 32% showing that the summing effects are of high importance in the close measurement geometries met in routine analysis of metallurgical samples. (authors)

  19. Power System Transient Diagnostics Based on Novel Traveling Wave Detection

    Science.gov (United States)

    Hamidi, Reza Jalilzadeh

    Modern electrical power systems demand novel diagnostic approaches to enhancing the system resiliency by improving the state-of-the-art algorithms. The proliferation of high-voltage optical transducers and high time-resolution measurements provide opportunities to develop novel diagnostic methods of very fast transients in power systems. At the same time, emerging complex configuration, such as multi-terminal hybrid transmission systems, limits the applications of the traditional diagnostic methods, especially in fault location and health monitoring. The impedance-based fault-location methods are inefficient for cross-bounded cables, which are widely used for connection of offshore wind farms to the main grid. Thus, this dissertation first presents a novel traveling wave-based fault-location method for hybrid multi-terminal transmission systems. The proposed method utilizes time-synchronized high-sampling voltage measurements. The traveling wave arrival times (ATs) are detected by observation of the squares of wavelet transformation coefficients. Using the ATs, an over-determined set of linear equations are developed for noise reduction, and consequently, the faulty segment is determined based on the characteristics of the provided equation set. Then, the fault location is estimated. The accuracy and capabilities of the proposed fault location method are evaluated and also compared to the existing traveling-wave-based method for a wide range of fault parameters. In order to improve power systems stability, auto-reclosing (AR), single-phase auto-reclosing (SPAR), and adaptive single-phase auto-reclosing (ASPAR) methods have been developed with the final objectives of distinguishing between the transient and permanent faults to clear the transient faults without de-energization of the solid phases. However, the features of the electrical arcs (transient faults) are severely influenced by a number of random parameters, including the convection of the air and plasma

  20. Face detection for interactive tabletop viewscreen system using olfactory display

    Science.gov (United States)

    Sakamoto, Kunio; Kanazawa, Fumihiro

    2009-10-01

    An olfactory display is a device that delivers smells to the nose. It provides us with special effects, for example to emit smell as if you were there or to give a trigger for reminding us of memories. The authors have developed a tabletop display system connected with the olfactory display. For delivering a flavor to user's nose, the system needs to recognition and measure positions of user's face and nose. In this paper, the authors describe an olfactory display which enables to detect the nose position for an effective delivery.

  1. Burst slug detection system in french power reactors (1961)

    International Nuclear Information System (INIS)

    Megy, J.; Roguin, A.

    1961-01-01

    Gas samples are taken from the channels of the reactor and the short lived fission products are electrostatically collected to be analysed by a phosphor and photomultiplier system. The electrostatic collection and rotating electrode detector is described and its main uses exposed. Experience has shown the interest of measuring the evolution of fission products activities and not their absolute value only. In this way, data processing equipment have been designed and adapted to the detection apparatus. The system developed and realized for the G-l - G-2 - G-3 - EDF-1 - EDF-2 reactors are compared. (authors) [fr

  2. Computational vision systems for the detection of malignant melanoma.

    Science.gov (United States)

    Maglogiannis, Ilias; Kosmopoulos, Dimitrios I

    2006-01-01

    In recent years, computational vision-based diagnostic systems for dermatology have demonstrated significant progress. We review these systems by first presenting the installation, visual features utilized for skin lesion classification and the methods for defining them. We also describe how to extract these features through digital image processing methods, i.e. segmentation, registration, border detection, color and texture processing, and present how to use the extracted features for skin lesion classification by employing artificial intelligence methods, i.e. discriminant analysis, neural networks, and support vector machines. Finally, we compare these techniques in discriminating malignant melanoma tumors versus dysplastic naevi lesions.

  3. Detection of the secondary star in three AM Her systems

    International Nuclear Information System (INIS)

    Mukai, K.; Charles, P.A.

    1986-01-01

    This paper reports low-resolution spectrophotometry in the region 6000-9500 A, of three AM Her-type systems, with the Isaac Newton Telescope, and UKIRT photometry of two of them. PG1550+191 (MR Ser) was found to be in a low state; the others, CW1103+254 (ST LMi) and E2003+225(QQ Vul), were not. In all three cases spectral features characteristic of late-M stars were detected. We also report on the infrared photometry of two of the systems, enabling us to refine the distance estimates. (author)

  4. Flexible Receiver Radiation Detection System (FRRDS) Users Manual

    International Nuclear Information System (INIS)

    Troyer, G.L.

    1996-01-01

    The Flexible Receiver Radiation Detection System (FRRDS) comprises a control computer, a remote data acquisition subsystem, and three hyperpure germanium gamma radiation detectors. The scope of this document is the description of various steps for the orderly start-up, use, and shutdown of the FRRDS. Only those items necessary for these oprations are included. This document is a companion to WHC-SD-W151-UM-002, 'Operating Instructions for the 42 Inch Flexible Receiver,' WHC-SD-W151-UM-003, 'Operating Instructions for the 4-6 Inch Flexible Receiver,' and the vendor supplied system users guide (Ref. 6)

  5. On developing automated control systems for radiometric flaw detection

    International Nuclear Information System (INIS)

    Goncharov, V.I.; Gorbunov, V.I.; Epifantsev, B.N.

    1976-01-01

    The block diagram of the automated control system (ACS) in the radiation defectoscopy has been substantiated. Particular data for designing such systems are presented. The algorithms of operation of the systems are proposed to base on the known theory of statistical solutions with the input signals normalized to eliminate the transient mode of description of the information fields. The structure of the computing block of the radiation defectoscopy ACS should be chosen to be two-staged and comprising the detection and recognition units connected in series. The nearest practical results (2-3 years) should be expected from the semiautomatic subsystems of the radiation defectoscopy ACS. Such subsystems are meant to be the ''man-information processing unit'' system. Development of automatic subsystems of the radiation defectoscopy ACS is predicted for the next five years. In case of the moderate required contrast sensitivity (approximately 4%) and dimensions of the detected defects (0.2 x 0.2 mm), such systems may be developed within two years

  6. Visual Detection and Tracking System for a Spherical Amphibious Robot.

    Science.gov (United States)

    Guo, Shuxiang; Pan, Shaowu; Shi, Liwei; Guo, Ping; He, Yanlin; Tang, Kun

    2017-04-15

    With the goal of supporting close-range observation tasks of a spherical amphibious robot, such as ecological observations and intelligent surveillance, a moving target detection and tracking system was designed and implemented in this study. Given the restrictions presented by the amphibious environment and the small-sized spherical amphibious robot, an industrial camera and vision algorithms using adaptive appearance models were adopted to construct the proposed system. To handle the problem of light scattering and absorption in the underwater environment, the multi-scale retinex with color restoration algorithm was used for image enhancement. Given the environmental disturbances in practical amphibious scenarios, the Gaussian mixture model was used to detect moving targets entering the field of view of the robot. A fast compressive tracker with a Kalman prediction mechanism was used to track the specified target. Considering the limited load space and the unique mechanical structure of the robot, the proposed vision system was fabricated with a low power system-on-chip using an asymmetric and heterogeneous computing architecture. Experimental results confirmed the validity and high efficiency of the proposed system. The design presented in this paper is able to meet future demands of spherical amphibious robots in biological monitoring and multi-robot cooperation.

  7. Plantar Pressure Detection with Fiber Bragg Gratings Sensing System

    Directory of Open Access Journals (Sweden)

    Tsair-Chun Liang

    2016-10-01

    Full Text Available In this paper, a novel fiber-optic sensing system based on fiber Bragg gratings (FBGs to measure foot plantar pressure is proposed. This study first explores the Pedar-X insole foot pressure types of the adult-size chart and then defines six measurement areas to effectively identify four foot types: neutral foot, cavus foot, supinated foot and flat foot. The plantar pressure signals are detected by only six FBGs, which are embedded in silicone rubber. The performance of the fiber optic sensing is examined and compared with a digital pressure plate of i-Step P1000 with 1024 barometric sensors. In the experiment, there are 11 participants with different foot types to participate in the test. The Pearson correlation coefficient, which is determined from the measured results of the homemade fiber-optic plantar pressure system and i-Step P1000 plantar pressure plate, reaches up to 0.671 (p < 0.01. According to the measured results from the plantar pressure data, the proposed fiber optic sensing system can successfully identify the four different foot types. Measurements of this study have demonstrated the feasibility of the proposed system so that it can be an alternative for plantar pressure detection systems.

  8. Multisensor network system for wildfire detection using infrared image processing.

    Science.gov (United States)

    Bosch, I; Serrano, A; Vergara, L

    2013-01-01

    This paper presents the next step in the evolution of multi-sensor wireless network systems in the early automatic detection of forest fires. This network allows remote monitoring of each of the locations as well as communication between each of the sensors and with the control stations. The result is an increased coverage area, with quicker and safer responses. To determine the presence of a forest wildfire, the system employs decision fusion in thermal imaging, which can exploit various expected characteristics of a real fire, including short-term persistence and long-term increases over time. Results from testing in the laboratory and in a real environment are presented to authenticate and verify the accuracy of the operation of the proposed system. The system performance is gauged by the number of alarms and the time to the first alarm (corresponding to a real fire), for different probability of false alarm (PFA). The necessity of including decision fusion is thereby demonstrated.

  9. Can a safeguards accountancy system really detect an unauthorized removal

    International Nuclear Information System (INIS)

    Ehinger, M.H.; Ellis, J.H.

    1981-11-01

    Theoretical investigations and system studies indicate safeguards material balance data from reprocessing plants can be used to detect unauthorized removals. Plant systems have been modeled and simulated data used to demonstrate the techniques. But how sensitive are the techniques when used with actual plant data. What is the effect of safeguards applications on plant operability. Can safeguards be acceptable to plant operators, and are there any benefits to be derived. The Barnwell Nuclear Fuel Plant (BNFP) has been devoted to answering these and other questions over the past several years. A computerized system of near-real-time accounting and in-process inventory has been implemented and demonstrated during actual plant test runs. Measured inventories and hourly material balance closures have been made to assess safeguards in an operating plant application. The tests have culminated in actual removals of material from the operating plant to investigate the response and measure the sensitivity of the safeguards and data evaluation system

  10. Cholangiocarcinoma--an automated preliminary detection system using MLP.

    Science.gov (United States)

    Logeswaran, Rajasvaran

    2009-12-01

    Cholangiocarcinoma, cancer of the bile ducts, is often diagnosed via magnetic resonance cholangiopancreatography (MRCP). Due to low resolution, noise and difficulty is actually seeing the tumor in the images, especially by examining only a single image, there has been very little development of automated systems for cholangiocarcinoma diagnosis. This paper presents a computer-aided diagnosis (CAD) system for the automated preliminary detection of the tumor using a single MRCP image. The multi-stage system employs algorithms and techniques that correspond to the radiological diagnosis characteristics employed by doctors. A popular artificial neural network, the multi-layer perceptron (MLP), is used for decision making to differentiate images with cholangiocarcinoma from those without. The test results achieved was 94% when differentiating only healthy and tumor images, and 88% in a robust multi-disease test where the system had to identify the tumor images from a large set of images containing common biliary diseases.

  11. Realistic modeling of radiation transmission inspection systems

    International Nuclear Information System (INIS)

    Sale, K.E.

    1993-01-01

    We have applied Monte Carlo particle transport methods to assess a proposed neutron transmission inspection system for checked luggage. The geometry of the system and the time, energy and angle dependence of the source have been modeled in detail. A pulsed deuteron beam incident on a thick Be target generates a neutron pulse with a very broad energy spectrum which is detected after passage through the luggage item by a plastic scintillator detector operating in current mode (as opposed to pulse counting mode). The neutron transmission as a function of time information is used to infer the densities of hydrogen, carbon, oxygen and nitrogen in the volume sampled. The measured elemental densities can be compared to signatures for explosives or other contraband. By using such computational modeling it is possible to optimize many aspects of the design of an inspection system without costly and time consuming prototyping experiments or to determine that a proposed scheme will not work. The methods applied here can be used to evaluate neutron or photon schemes based on transmission, scattering or reaction techniques

  12. Developing Fluorescence Sensor Systems for Early Detection of Nitrification Events in Chloraminated Drinking Water Distribution Systems

    Science.gov (United States)

    Detection of nitrification events in chloraminated drinking water distribution systems remains an ongoing challenge for many drinking water utilities, including Dallas Water Utilities (DWU) and the City of Houston (CoH). Each year, these utilities experience nitrification events ...

  13. A Metrics-Based Approach to Intrusion Detection System Evaluation for Distributed Real-Time Systems

    National Research Council Canada - National Science Library

    Fink, G

    2002-01-01

    ...) computer facilities to select the best intrusion detection system for their facilities. The metrics herein are the subset of our general metric set that particularly impact real-time and distributed processing issues...

  14. System for rapid detection of antibiotic resistance of airborne pathogens

    Science.gov (United States)

    Fortin, M.; Noiseux, I.; Mouslinkina, L.; Vernon, M. L.; Laflamme, C.; Filion, G.; Duchaine, C.; Ho, J.

    2009-05-01

    This project uses function-based detection via a fundamental understanding of the genetic markers of AR to distinguish harmful organisms from innocuous ones. This approach circumvents complex analyses to unravel the taxonomic details of 1399 pathogen species, enormously simplifying detection requirements. Laval Hospital's fast permeabilization strategy enables AR revelation in <1hr. Packaging the AR protocols in liquid-processing cartridges and coupling these to our in-house miniature fiber optic flow cell (FOFC) provides first responders with timely information on-site. INO's FOFC platform consists of a specialty optical fiber through which a hole is transversally bored by laser micromachining. The analyte solution is injected into the hole of the fiber and the particles are detected and counted. The advantage with respect to classic free space FC is that alignment occurs in the fabrication process only and complex excitation and collection optics are replaced by optical fibers. Moreover, we use a sheathless configuration which has the advantage of increase the portability of the system, to reduce excess biohazard material and the need for weekly maintenance. In this paper we present the principle of our FOFC along with a, demonstration of the basic capability of the platform for detection of bacillus cereus spores using permeabilized staining.

  15. Survey of pedestrian detection for advanced driver assistance systems.

    Science.gov (United States)

    Gerónimo, David; López, Antonio M; Sappa, Angel D; Graf, Thorsten

    2010-07-01

    Advanced driver assistance systems (ADASs), and particularly pedestrian protection systems (PPSs), have become an active research area aimed at improving traffic safety. The major challenge of PPSs is the development of reliable on-board pedestrian detection systems. Due to the varying appearance of pedestrians (e.g., different clothes, changing size, aspect ratio, and dynamic shape) and the unstructured environment, it is very difficult to cope with the demanded robustness of this kind of system. Two problems arising in this research area are the lack of public benchmarks and the difficulty in reproducing many of the proposed methods, which makes it difficult to compare the approaches. As a result, surveying the literature by enumerating the proposals one--after-another is not the most useful way to provide a comparative point of view. Accordingly, we present a more convenient strategy to survey the different approaches. We divide the problem of detecting pedestrians from images into different processing steps, each with attached responsibilities. Then, the different proposed methods are analyzed and classified with respect to each processing stage, favoring a comparative viewpoint. Finally, discussion of the important topics is presented, putting special emphasis on the future needs and challenges.

  16. Development of acoustic leak detection system in PNC

    International Nuclear Information System (INIS)

    Tanabe, H.; Kuroha, M.

    1990-01-01

    The development of an acoustic leak detector is under way at PNC as a detection system that has potential of quick response and high reliability for larger steam generators of future LMFBR plants. The studies have two aspects, i.e., an acoustic wave analysis in various sodium-water reactions and a background noise (BGN) analysis in a sodium-heated 50MWt steam generator (50MWGS). In the former analysis, wave profiles of the sodium-water reaction sound were analyzed and compared with those of inert gas injection sound. The comparison revealed that there were no wave profiles specific to a sodium-water reaction sound. The latter clarified that major acoustic sources in the steam generator were sodium flow and steam generation/flow and that the water leak rate at which a noise level was comparable with that of the background noise was about 0.5 g/sec. in the evaporator of 50MWSG. The estimation of acceleration levels of BGN and leak sounds in other plants reveals that an intermediate leak is detectable in the Monju evaporator with a present acoustic detection system. (author). 2 refs, 9 figs

  17. Improvements in detection system for pulse radiolysis facility

    CERN Document Server

    Rao, V N; Manimaran, P; Mishra, R K; Mohan, H; Mukherjee, T; Nadkarni, S A; Sapre, A V; Shinde, S J; Toley, M

    2002-01-01

    This report describes the improvements made in the detection system of the pulse radiolysis facility based on a 7 MeV Linear Electron Accelerator (LINAC) located in the Radiation Chemistry and Chemical Dynamics Division of Bhabha Atomic Research Centre. The facility was created in 1986 for kinetic studies of transient species whose absorption lies between 200 and 700 nm. The newly developed detection circuits consist of a silicon (Si) photodiode (PD) detector for the wavelength range 450-1100 nm and a germanium (Ge) photodiode detector for the wavelength range 900-1600 nm. With these photodiode-based detection set-up, kinetic experiments are now routinely carried out in the wavelength range 450-1600 nm. The performance of these circuits has been tested using standard chemical systems. The rise time has been found to be 150 ns. The photo-multiplier tube (PMT) bleeder circuit has been modified. A new DC back-off circuit has been built and installed in order to avoid droop at longer time scales. A steady baselin...

  18. Acoustic system for pipe rupture monitoring and leak detection

    International Nuclear Information System (INIS)

    Herzog, W.; Jonas, H.

    1982-06-01

    As a safety aspect pipe rupture and leakage effects are of particular interest in nuclear power plants where severe consequences for the reactor may result. Counter measures against postulated pipe breaks and leakages in nuclear power plants are necessary whenever the main safety goals: safe shut-down, safe afterheat removal and retention of radioactivity, are endangered. The requirements to be met by a leak detection system depend on the time available for counter actions. If this time is short so that automatic actions are necessary the German safety criteria for nuclear power plants (Criterion 6.1) require two physically diverse signals to be monitored. One fairly obvious possibility of leak detection is to monitor process parameters (pressure, flow). As a diverse signal physical parameters outside the process may be employed: pressure transients temperature, humidity are principally suitable. In practical application, however, it is difficult to predict these parameters by way of calculation in order to establish the required set-point of the monitoring system. Experimental determination is possible only in special cases. A study of several ways of diverse leak detection methods leads to the very promising acoustic method. We investigated experimentally the feasibility of monitoring the sound created by a leakage. Air borne sound as well as body borne sound was analyzed

  19. Practical comparison of aberration detection algorithms for biosurveillance systems.

    Science.gov (United States)

    Zhou, Hong; Burkom, Howard; Winston, Carla A; Dey, Achintya; Ajani, Umed

    2015-10-01

    National syndromic surveillance systems require optimal anomaly detection methods. For method performance comparison, we injected multi-day signals stochastically drawn from lognormal distributions into time series of aggregated daily visit counts from the U.S. Centers for Disease Control and Prevention's BioSense syndromic surveillance system. The time series corresponded to three different syndrome groups: rash, upper respiratory infection, and gastrointestinal illness. We included a sample of facilities with data reported every day and with median daily syndromic counts ⩾1 over the entire study period. We compared anomaly detection methods of five control chart adaptations, a linear regression model and a Poisson regression model. We assessed sensitivity and timeliness of these methods for detection of multi-day signals. At a daily background alert rate of 1% and 2%, the sensitivities and timeliness ranged from 24 to 77% and 3.3 to 6.1days, respectively. The overall sensitivity and timeliness increased substantially after stratification by weekday versus weekend and holiday. Adjusting the baseline syndromic count by the total number of facility visits gave consistently improved sensitivity and timeliness without stratification, but it provided better performance when combined with stratification. The daily syndrome/total-visit proportion method did not improve the performance. In general, alerting based on linear regression outperformed control chart based methods. A Poisson regression model obtained the best sensitivity in the series with high-count data. Published by Elsevier Inc.

  20. Windshear certification data base for forward-look detection systems

    Science.gov (United States)

    Switzer, George F.; Hinton, David A.; Proctor, Fred H.

    1994-01-01

    Described is an introduction to a comprehensive database that is to be used for certification testing of airborne forward-look windshear detection systems. The database was developed by NASA Langley Research Center, at the request of the Federal Aviation Administration (FAA), to support the industry initiative to certify and produce forward-looking windshear detection equipment. The database contains high-resolution three-dimensional fields for meteorological variables that may be sensed by forward-looking systems. The database is made up of seven case studies that are generated by the Terminal Area Simulation System, a state-of-the-art numerical system for the realistic modeling of windshear phenomena. The selected cases contained in the certification documentation represent a wide spectrum of windshear events. The database will be used with vendor-developed sensor simulation software and vendor-collected ground-clutter data to demonstrate detection performance in a variety of meteorological conditions using NASA/FAA pre-defined path scenarios for each of the certification cases. A brief outline of the contents and sample plots from the database documentation are included. These plots show fields of hazard factor, or F-factor (Bowles 1990), radar reflectivity, and velocity vectors on a horizontal plane overlayed with the applicable certification paths. For the plot of the F-factor field the region of 0.105 and above signify an area of hazardous, performance decreasing windshear, while negative values indicate regions of performance increasing windshear. The values of F-factor are based on 1-Km averaged segments along horizontal flight paths, assuming an air speed of 150 knots (approx. 75 m/s). The database has been released to vendors participating in the certification process. The database and associated document have been transferred to the FAA for archival storage and distribution.

  1. Detecting, anticipating, and predicting critical transitions in spatially extended systems.

    Science.gov (United States)

    Kwasniok, Frank

    2018-03-01

    A data-driven linear framework for detecting, anticipating, and predicting incipient bifurcations in spatially extended systems based on principal oscillation pattern (POP) analysis is discussed. The dynamics are assumed to be governed by a system of linear stochastic differential equations which is estimated from the data. The principal modes of the system together with corresponding decay or growth rates and oscillation frequencies are extracted as the eigenvectors and eigenvalues of the system matrix. The method can be applied to stationary datasets to identify the least stable modes and assess the proximity to instability; it can also be applied to nonstationary datasets using a sliding window approach to track the changing eigenvalues and eigenvectors of the system. As a further step, a genuinely nonstationary POP analysis is introduced. Here, the system matrix of the linear stochastic model is time-dependent, allowing for extrapolation and prediction of instabilities beyond the learning data window. The methods are demonstrated and explored using the one-dimensional Swift-Hohenberg equation as an example, focusing on the dynamics of stochastic fluctuations around the homogeneous stable state prior to the first bifurcation. The POP-based techniques are able to extract and track the least stable eigenvalues and eigenvectors of the system; the nonstationary POP analysis successfully predicts the timing of the first instability and the unstable mode well beyond the learning data window.

  2. Magnetic resonance imaging of living systems by remote detection

    Science.gov (United States)

    Wemmer, David; Pines, Alexander; Bouchard, Louis; Xu, Shoujun; Harel, Elad; Budker, Dmitry; Lowery, Thomas; Ledbetter, Micah

    2013-10-29

    A novel approach to magnetic resonance imaging is disclosed. Blood flowing through a living system is prepolarized, and then encoded. The polarization can be achieved using permanent or superconducting magnets. The polarization may be carried out upstream of the region to be encoded or at the place of encoding. In the case of an MRI of a brain, polarization of flowing blood can be effected by placing a magnet over a section of the body such as the heart upstream of the head. Alternatively, polarization and encoding can be effected at the same location. Detection occurs at a remote location, using a separate detection device such as an optical atomic magnetometer, or an inductive Faraday coil. The detector may be placed on the surface of the skin next to a blood vessel such as a jugular vein carrying blood away from the encoded region.

  3. Iterative Reconfigurable Tree Search Detection of MIMO Systems

    Directory of Open Access Journals (Sweden)

    Hanwen Luo

    2007-01-01

    Full Text Available This paper is concerned with reduced-complexity detection, referred to as iterative reconfigurable tree search (IRTS detection, with application in iterative receivers for multiple-input multiple-output (MIMO systems. Instead of the optimum maximum a posteriori probability detector, which performs brute force search over all possible transmitted symbol vectors, the new scheme evaluates only the symbol vectors that contribute significantly to the soft output of the detector. The IRTS algorithm is facilitated by carrying out the search on a reconfigurable tree, constructed by computing the reliabilities of symbols based on minimum mean-square error (MMSE criterion and reordering the symbols according to their reliabilities. Results from computer simulations are presented, which proves the good performance of IRTS algorithm over a quasistatic Rayleigh channel even for relatively small list sizes.

  4. Tetraphenylporphyrin as a protein label for triple detection analytical systems

    Directory of Open Access Journals (Sweden)

    Kamila Konopińska

    2015-12-01

    Full Text Available Porphyrins and metalloporphyrins are promising new protein labels that can be detected using multiple techniques; improving the reliability of the analysis and broadening the range of the linear response. Here, we investigate the potential of 5,10,15,20-tetraphenyl-21H,23H-porphyrin (Tpp as a hybrid protein label. The electrochemical and optical properties of porphyrin conjugated with bovine serum albumin (BSA, chicken egg albumin (CEA and immunoglobulin G (IgG were determined and optimal conditions for Tpp-protein conjugation established. Model conjugates of carboxylated Tpp with BSA and short peptides were characterized using differential pulse voltammetry, UV–Vis spectrophotometry and spectrofluorimetry. These results reveal that Tpp is a promising molecule to be used in a triple detection protein labelling system.

  5. Phosphatase activity tunes two-component system sensor detection threshold.

    Science.gov (United States)

    Landry, Brian P; Palanki, Rohan; Dyulgyarov, Nikola; Hartsough, Lucas A; Tabor, Jeffrey J

    2018-04-12

    Two-component systems (TCSs) are the largest family of multi-step signal transduction pathways in biology, and a major source of sensors for biotechnology. However, the input concentrations to which biosensors respond are often mismatched with application requirements. Here, we utilize a mathematical model to show that TCS detection thresholds increase with the phosphatase activity of the sensor histidine kinase. We experimentally validate this result in engineered Bacillus subtilis nitrate and E. coli aspartate TCS sensors by tuning their detection threshold up to two orders of magnitude. We go on to apply our TCS tuning method to recently described tetrathionate and thiosulfate sensors by mutating a widely conserved residue previously shown to impact phosphatase activity. Finally, we apply TCS tuning to engineer B. subtilis to sense and report a wide range of fertilizer concentrations in soil. This work will enable the engineering of tailor-made biosensors for diverse synthetic biology applications.

  6. Optical filtering in directly modulated/detected OOFDM systems.

    Science.gov (United States)

    Sánchez, C; Ortega, B; Wei, J L; Capmany, J

    2013-12-16

    This work presents a theoretical investigation on the performance of directly modulated/detected (DM/DD) optical orthogonal frequency division multiplexed (OOFDM) systems subject to optical filtering. The impact of both linear and nonlinear distortion effects are taken into account to calculate the effective signal-to-noise ratio of each subcarrier. These results are then employed to optimize the design parameters of two simple optical filtering structures: a Mach Zehnder interferometer and a uniform fiber Bragg grating, leading to a significant optical power budget improvement given by 3.3 and 3dB, respectively. These can be further increased to 5.5 and 4.2dB respectively when balanced detection configurations are employed. We find as well that this improvement is highly dependent on the clipping ratio.

  7. Minimum Detectable Activity for Tomographic Gamma Scanning System

    Energy Technology Data Exchange (ETDEWEB)

    Venkataraman, Ram [Canberra Industries (AREVA BDNM), Meriden, CT (United States); Smith, Susan [Canberra Industries (AREVA BDNM), Meriden, CT (United States); Kirkpatrick, J. M. [Canberra Industries (AREVA BDNM), Meriden, CT (United States); Croft, Stephen [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2015-01-01

    For any radiation measurement system, it is useful to explore and establish the detection limits and a minimum detectable activity (MDA) for the radionuclides of interest, even if the system is to be used at far higher values. The MDA serves as an important figure of merit, and often a system is optimized and configured so that it can meet the MDA requirements of a measurement campaign. The non-destructive assay (NDA) systems based on gamma ray analysis are no exception and well established conventions, such the Currie method, exist for estimating the detection limits and the MDA. However, the Tomographic Gamma Scanning (TGS) technique poses some challenges for the estimation of detection limits and MDAs. The TGS combines high resolution gamma ray spectrometry (HRGS) with low spatial resolution image reconstruction techniques. In non-imaging gamma ray based NDA techniques measured counts in a full energy peak can be used to estimate the activity of a radionuclide, independently of other counting trials. However, in the case of the TGS each “view” is a full spectral grab (each a counting trial), and each scan consists of 150 spectral grabs in the transmission and emission scans per vertical layer of the item. The set of views in a complete scan are then used to solve for the radionuclide activities on a voxel by voxel basis, over 16 layers of a 10x10 voxel grid. Thus, the raw count data are not independent trials any more, but rather constitute input to a matrix solution for the emission image values at the various locations inside the item volume used in the reconstruction. So, the validity of the methods used to estimate MDA for an imaging technique such as TGS warrant a close scrutiny, because the pair-counting concept of Currie is not directly applicable. One can also raise questions as to whether the TGS, along with other image reconstruction techniques which heavily intertwine data, is a suitable method if one expects to measure samples whose activities

  8. Network Intrusion Detection System – A Novel Approach

    Directory of Open Access Journals (Sweden)

    Krish Pillai

    2013-08-01

    Full Text Available Network intrusion starts off with a series of unsuccessful breakin attempts and results eventually with the permanent or transient failure of an authentication or authorization system. Due to the current complexity of authentication systems, clandestine attempts at intrusion generally take considerable time before the system gets compromised or damaging change is affected to the system giving administrators a window of opportunity to proactively detect and prevent intrusion. Therefore maintaining a high level of sensitivity to abnormal access patterns is a very effective way of preventing possible break-ins. Under normal circumstances, gross errors on the part of the user can cause authentication and authorization failures on all systems. A normal distribution of failed attempts should be tolerated while abnormal attempts should be recognized as such and flagged. But one cannot manage what one cannot measure. This paper proposes a method that can efficiently quantify the behaviour of users on a network so that transient changes in usage can be detected, categorized based on severity, and closely investigated for possible intrusion. The author proposes the identification of patterns in protocol usage within a network to categorize it for surveillance. Statistical anomaly detection, under which category this approach falls, generally uses simple statistical tests such as mean and standard deviation to detect behavioural changes. The author proposes a novel approach using spectral density as opposed to using time domain data, allowing a clear separation or access patterns based on periodicity. Once a spectral profile has been identified for network, deviations from this profile can be used as an indication of a destabilized or compromised network. Spectral analysis of access patterns is done using the Fast Fourier Transform (FFT, which can be computed in Θ(N log N operations. The paper justifies the use of this approach and presents preliminary

  9. Opium: The Evolution of Policies, the Tolerance of the Vice, and the Proliferation of Contraband Trade in the Philippines, 1843-1908

    Directory of Open Access Journals (Sweden)

    Alma N. Bamero

    2006-12-01

    Full Text Available This research entitled “Opium: The Evolution of Policies, the Tolerance of the Vice, and the Proliferation of Contraband Trade in the Philippines, 1843-1908” presents a discussion of the opium trade in Asia, the commercial networks it created, the political ties it strengthened, and the social relations itfostered. It also aims to reconstruct an aspect of Philippine social history in the nineteenth century through the use of archival materials that bear witness to the distribution and exploitation of a substance which some people stillclassify as taboo. The poppy was not endemic to the Philippines but opium, its derivative substance, was known to numb pain and could induce a “natural high” that left one with feelings of ease and contentment. A more complete introduction to the drug necessitates a discussion of the way it was extractedand processed. It is a cash crop that does not require complex devices and is, therefore, within the reach of farmers and common folk. From the eighteenth to the nineteenth centuries opium became very popular among the Chinese who discovered that their markets were being flooded with it by the British sothat the latter could pay for the tea that they craved.The Spanish Bourbons, in an effort to boost Philippine economy, allowed the trading of this substance. Initially this was supervised by the officials of the Alcaiceria de San Fernando but in 1843 the meticulous examination of the country’s finances merited the creation of an opium revenuefarm through municipal franchising. Opium could only be used by the Chinese who were migrating in big groups. This paper presents the details of the monopoly contract, identifies some of the wealthier contratistas of the period, and discusses the consequences of such a commercial venture. Smuggling orcontraband trade proliferated and by way of illustration the events namely, the Scandal of 1843 and the Gunga Incident, have been narrated. The creation of an over

  10. Immunoliposome-PCR: a generic ultrasensitive quantitative antigen detection system

    Directory of Open Access Journals (Sweden)

    He Junkun

    2012-06-01

    encapsulate multiple reporters per liposome also helps overcome the effect of polymerase inhibitors present in biological specimens. Finally, the biotin-labeled liposome detection reagent can be coupled through a NeutrAvidin bridge to a multitude of biotin-labeled probes, making ILPCR a highly generic assay system.

  11. Computer Aided Diagnosis System for Early Lung Cancer Detection

    Directory of Open Access Journals (Sweden)

    Fatma Taher

    2015-11-01

    Full Text Available Lung cancer continues to rank as the leading cause of cancer deaths worldwide. One of the most promising techniques for early detection of cancerous cells relies on sputum cell analysis. This was the motivation behind the design and the development of a new computer aided diagnosis (CAD system for early detection of lung cancer based on the analysis of sputum color images. The proposed CAD system encompasses four main processing steps. First is the preprocessing step which utilizes a Bayesian classification method using histogram analysis. Then, in the second step, mean shift segmentation is applied to segment the nuclei from the cytoplasm. The third step is the feature analysis. In this step, geometric and chromatic features are extracted from the nucleus region. These features are used in the diagnostic process of the sputum images. Finally, the diagnosis is completed using an artificial neural network and support vector machine (SVM for classifying the cells into benign or malignant. The performance of the system was analyzed based on different criteria such as sensitivity, specificity and accuracy. The evaluation was carried out using Receiver Operating Characteristic (ROC curve. The experimental results demonstrate the efficiency of the SVM classifier over other classifiers, with 97% sensitivity and accuracy as well as a significant reduction in the number of false positive and false negative rates.

  12. The Italian Lightning Detection System of CESI and its applications

    International Nuclear Information System (INIS)

    Iorio, R.

    1998-01-01

    Aim of the paper is to give a description of the CESI lightning detection system SIRF. The system allows the real time localization (latitude, longitude) of the striking point of a cloud-to-ground lightning flash. Electrical parameters of the impulsive currents related to the flash strokes are calculated as well. Based on sensors covering the whole Italian territory, SIRF configuration and of the basic calculation criteria for passing from the sensor raw data to the final flash data is given together with the evaluation of the system expected performance parameters (accuracy, detection efficiently, signal/noise ratio). Main uses of lightning data in several fields are then reported, with special reference to electrical applications. Mention is done about the different modalities adopted for data distribution, according to that either real time or passed time applications have to be carried out. In this latter case (e.g. statistics), a huge amount of data archived within the Lightning Data Base of SIRF is available [it

  13. Detecting and Refactoring Operational Smells within the Domain Name System

    Directory of Open Access Journals (Sweden)

    Marwan Radwan

    2015-04-01

    Full Text Available The Domain Name System (DNS is one of the most important components of the Internet infrastructure. DNS relies on a delegation-based architecture, where resolution of names to their IP addresses requires resolving the names of the servers responsible for those names. The recursive structures of the inter dependencies that exist between name servers associated with each zone are called dependency graphs. System administrators' operational decisions have far reaching effects on the DNSs qualities. They need to be soundly made to create a balance between the availability, security and resilience of the system. We utilize dependency graphs to identify, detect and catalogue operational bad smells. Our method deals with smells on a high-level of abstraction using a consistent taxonomy and reusable vocabulary, defined by a DNS Operational Model. The method will be used to build a diagnostic advisory tool that will detect configuration changes that might decrease the robustness or security posture of domain names before they become into production.

  14. Detecting Adulteration in Lotus Honey Using a Machine Olfactory System

    Directory of Open Access Journals (Sweden)

    M Hajinezhad

    2017-10-01

    Full Text Available Introduction Honey is a supersaturated sugar and viscose solution taken from the nectar of flowers, collected and modified by honeybees. Many producers of honey add some variety of sugars in honey that make difficulties with detection of adulterated and pure honey. Flavor is one of the most important parameters in the classification of honey samples and the smell emitted by the honey depending on the different flowers and constituents that could be different. This causes using an electronic nose system to detect honey adulteration. Materials and Methods Honey samples used in this study were lotus honey that was supplied from a market in Karaj city, Alborz province, Iran. Adulterated honey, along with percentages of fraud (by weight of zero, 20, 35 and 50 percent, was prepared by mixing sugar syrup. Each group of samples, nine times were tested by the electronic nose system. The proposed system, consists of six metal oxide semiconductor sensors, sensor chamber, sample chamber, data acquisition systems, power supply, electric valves, and pumps. Electronic nose is planned for three-phase system baseline correction, the smell of sample injection and cleaning of the sensor and sample chambers with clean air (Oxygen. Responses of the sensors were collected and stored in 420 seconds by a data acquisition system and LabView ver 2012 software. We used fractional method in this study, in order to improve the quality of the information available and to optimize the array output before passing it on to the pattern recognition system. Linear Discriminant Analysis (LDA, Principal Component Analysis (PCA and Artificial neural network (ANN were the methods used for analyzing and recognizing pattern of electronic nose signals. Data processing was carried out using Microsoft Excel, neuralsolution 5 and Unscrambler X 10.3 (CAMO AS, Norway. Results and Discussion PCA Results PCA reduces the complexity of the data-set and is performed with no information on the

  15. Systems and methods for detecting x-rays

    Science.gov (United States)

    Bross, Alan D.; Mellott, Kerry L.; Pla-Dalmau, Anna

    2006-05-02

    Systems and methods for detecting x-rays are disclosed herein. One or more x-ray-sensitive scintillators can be configured from a plurality of heavy element nano-sized particles and a plastic material, such as polystyrene. As will be explained in greater detail herein, the heavy element nano-sized particles (e.g., PbWO4) can be compounded into the plastic material with at least one dopant that permits the plastic material to scintillate. X-rays interact with the heavy element nano-sized particles to produce electrons that can deposit energy in the x-ray sensitive scintillator, which in turn can produce light.

  16. Image change detection systems, methods, and articles of manufacture

    Science.gov (United States)

    Jones, James L.; Lassahn, Gordon D.; Lancaster, Gregory D.

    2010-01-05

    Aspects of the invention relate to image change detection systems, methods, and articles of manufacture. According to one aspect, a method of identifying differences between a plurality of images is described. The method includes loading a source image and a target image into memory of a computer, constructing source and target edge images from the source and target images to enable processing of multiband images, displaying the source and target images on a display device of the computer, aligning the source and target edge images, switching displaying of the source image and the target image on the display device, to enable identification of differences between the source image and the target image.

  17. Integrated polymer waveguides for absorbance detection in chemical analysis systems

    DEFF Research Database (Denmark)

    Mogensen, Klaus Bo; El-Ali, Jamil; Wolff, Anders

    2003-01-01

    A chemical analysis system for absorbance detection with integrated polymer waveguides is reported for the first time. The fabrication procedure relies on structuring of a single layer of the photoresist SU-8, so both the microfluidic channel network and the optical components, which include planar...... waveguides and fiber-to-waveguide coupler structures, are defined in the same processing step. This results in self-alignment of all components and enables a fabrication and packaging time of only one day. The fabrication scheme has recently been presented elsewhere for fluorescence excitation of beads...

  18. Proximal caries lesion detection using the Canary Caries Detection System: an in vitro study.

    Science.gov (United States)

    Jan, Janja; Wan Bakar, Wan Zaripah; Mathews, Sapna M; Okoye, Linda O; Ehler, Benjamin R; Louden, Christopher; Amaechi, Bennett T

    2016-11-01

    This study investigated the accuracy of the Canary System (CS) to detect proximal caries lesions in vitro, and compared it with conventional methods: International Caries Detection and Assessment System (ICDAS) II and bitewing radiography (BW). Visible proximal surfaces of extracted human teeth were assessed by ICDAS-II before setting them in five manikin mouth models. Then contacting proximal surfaces in mouth models were assessed by BW and CS. Histological validation with polarized-light microscopy served as a gold standard. Pairwise comparisons were performed on area under the curve (AUC), sensitivity, and specificity of the three methods, and corrected using Bonferroni's method. Sensitivities and specificities were compared using a test of proportions and AUC values were compared using DeLong's method. The CS presented significantly higher sensitivity (0.933) than ICDAS-II (0.733, P = 0.01) and BW (0.267, P proximal lesions than ICDAS-II and BW, although without significantly higher specificity. © 2015 Wiley Publishing Asia Pty Ltd.

  19. Experimental investigation of leak detection using mobile distributed monitoring system

    Science.gov (United States)

    Chen, Jiang; Zheng, Junli; Xiong, Feng; Ge, Qi; Yan, Qixiang; Cheng, Fei

    2018-01-01

    The leak detection of rockfill dams is currently hindered by spatial and temporal randomness and wide monitoring range. The spatial resolution of fiber Bragg grating (FBG) temperature sensing technology is related to the distance between measuring points. As a result, the number of measuring points should be increased to ensure that the precise location of the leak is detected. However, this leads to a higher monitoring cost. Consequently, it is difficult to promote and apply this technology to effectively monitor rockfill dam leakage. In this paper, a practical mobile distributed monitoring system with dual-tubes is used by combining the FBG sensing system and hydrothermal cycling system. This dual-tube structure is composed of an outer polyethylene of raised temperature resistance heating pipe, an inner polytetrafluoroethylene tube, and a FBG sensor string, among which, the FBG sensor string can be dragged freely in the internal tube to change the position of the measuring points and improve the spatial resolution. In order to test the effectiveness of the system, the large-scale model test of concentrated leakage in 13 working conditions is carried out by identifying the location, quantity, and leakage rate of leakage passage. Based on Newton’s law of cooling, the leakage state is identified using the seepage identification index ζ v that was confirmed according to the cooling curve. Results suggested that the monitoring system shows high sensitivity and can improve the spatial resolution with limited measuring points, and thus better locate the leakage area. In addition, the seepage identification index ζ v correlated well with the leakage rate qualitatively.

  20. System to Detect Racial-based Bullying through Gamification

    Directory of Open Access Journals (Sweden)

    José Antonio Álvarez-Bermejo

    2016-11-01

    Full Text Available Prevention and detection of bullying due to racial stigma was studied in school contexts using a system designed following gamification principles and integrating less usual elements, such as social interaction, augmented reality and cell phones in educational scenarios. Grounded Theory and User Centered Design were employed to explore coexistence inside and outside the classroom in terms of preferences and distrust in several areas of action and social frameworks of activity, and to direct the development of a cell phone app for early detection of school bullying scenarios. One hundred and fifty-one interviews were given at five schools selected for their high multiracial percentage and conflict. The most outstanding results were structural, that is the distribution of the classroom group by type of activity and subject being dealt with. Furthermore, in groups over 12 years of age, the relational structures in the classroom in the digital settings in which they participated with their cell phones did not reoccur, because face-to-face and virtual interaction between students with the supervision and involvement of the teacher combined to detect bullying caused by racial discrimination.

  1. System to Detect Racial-Based Bullying through Gamification.

    Science.gov (United States)

    Álvarez-Bermejo, José A; Belmonte-Ureña, Luis J; Martos-Martínez, Africa; Barragán-Martín, Ana B; Del Mar Simón-Marquez, María

    2016-01-01

    Prevention and detection of bullying due to racial stigma was studied in school contexts using a system designed following "gamification" principles and integrating less usual elements, such as social interaction, augmented reality and cell phones in educational scenarios. "Grounded Theory" and "User Centered Design" were employed to explore coexistence inside and outside the classroom in terms of preferences and distrust in several areas of action and social frameworks of activity, and to direct the development of a cell phone app for early detection of school bullying scenarios. One hundred and fifty-one interviews were given at five schools selected for their high multiracial percentage and conflict. The most outstanding results were structural, that is the distribution of the classroom group by type of activity and subject being dealt with. Furthermore, in groups over 12 years of age, the relational structures in the classroom in the digital settings in which they participated with their cell phones did not reoccur, because face-to-face and virtual interaction between students with the supervision and involvement of the teacher combined to detect bullying caused by racial discrimination.

  2. New Advances and Challenges of Fall Detection Systems: A Survey

    Directory of Open Access Journals (Sweden)

    Tao Xu

    2018-03-01

    Full Text Available Falling, as one of the main harm threats to the elderly, has drawn researchers’ attentions and has always been one of the most valuable research topics in the daily health-care for the elderly in last two decades. Before 2014, several researchers reviewed the development of fall detection, presented issues and challenges, and navigated the direction for the study in the future. With smart sensors and Internet of Things (IoT developing rapidly, this field has made great progress. However, there is a lack of a review and discussion on novel sensors, technologies and algorithms introduced and employed from 2014, as well as the emerging challenges and new issues. To bridge this gap, we present an overview of fall detection research and discuss the core research questions on this topic. A total of 6830 related documents were collected and analyzed based on the key words. Among these documents, the twenty most influential and highly cited articles are selected and discussed profoundly from three perspectives: sensors, algorithms and performance. The findings would assist researchers in understanding current developments and barriers in the systems of fall detection. Although researchers achieve fruitful work and progress, this research domain still confronts challenges on theories and practice. In the near future, the new solutions based on advanced IoT will sustainably urge the development to prevent falling injuries.

  3. System to Detect Racial-Based Bullying through Gamification

    Science.gov (United States)

    Álvarez-Bermejo, José A.; Belmonte-Ureña, Luis J.; Martos-Martínez, Africa; Barragán-Martín, Ana B.; del Mar Simón-Marquez, María

    2016-01-01

    Prevention and detection of bullying due to racial stigma was studied in school contexts using a system designed following “gamification” principles and integrating less usual elements, such as social interaction, augmented reality and cell phones in educational scenarios. “Grounded Theory” and “User Centered Design” were employed to explore coexistence inside and outside the classroom in terms of preferences and distrust in several areas of action and social frameworks of activity, and to direct the development of a cell phone app for early detection of school bullying scenarios. One hundred and fifty-one interviews were given at five schools selected for their high multiracial percentage and conflict. The most outstanding results were structural, that is the distribution of the classroom group by type of activity and subject being dealt with. Furthermore, in groups over 12 years of age, the relational structures in the classroom in the digital settings in which they participated with their cell phones did not reoccur, because face-to-face and virtual interaction between students with the supervision and involvement of the teacher combined to detect bullying caused by racial discrimination. PMID:27933006

  4. Coded aperture material motion detection system for the ACPR

    International Nuclear Information System (INIS)

    McArthur, D.A.; Kelly, J.G.

    1975-01-01

    Single LMFBR fuel pins are being irradiated in Sandia's Annular Core Pulsed Reactor (ACPR). In these experiments single fuel pins have been driven well into the melt and vaporization regions in transients with pulse widths of about 5 ms. The ACPR is being upgraded so that it can be used to irradiate bundles of seven LMFBR fuel pins. The coded aperture material motion detection system described is being developed for this upgraded ACPR, and has for its design goals 1 mm transverse resolution (i.e., in the axial and radial directions), depth resolution of a few cm, and time resolution of 0.1 ms. The target date for development of this system is fall 1977. The paper briefly reviews the properties of coded aperture imaging, describes one possible system for the ACPR upgrade, discusses experiments which have been performed to investigate the feasibility of such a system, and describes briefly the further work required to develop such a system. The type of coded aperture to be used has not yet been fixed, but a one-dimensional section of a Fresnel zone plate appears at this time to have significant advantages

  5. Detection optimization using linear systems analysis of a coded aperture laser sensor system

    Energy Technology Data Exchange (ETDEWEB)

    Gentry, S.M. [Sandia National Labs., Albuquerque, NM (United States). Optoelectronic Design Dept.

    1994-09-01

    Minimum detectable irradiance levels for a diffraction grating based laser sensor were calculated to be governed by clutter noise resulting from reflected earth albedo. Features on the earth surface caused pseudo-imaging effects on the sensor`s detector arras that resulted in the limiting noise in the detection domain. It was theorized that a custom aperture transmission function existed that would optimize the detection of laser sources against this clutter background. Amplitude and phase aperture functions were investigated. Compared to the diffraction grating technique, a classical Young`s double-slit aperture technique was investigated as a possible optimized solution but was not shown to produce a system that had better clutter-noise limited minimum detectable irradiance. Even though the double-slit concept was not found to have a detection advantage over the slit-grating concept, one interesting concept grew out of the double-slit design that deserved mention in this report, namely the Barker-coded double-slit. This diffractive aperture design possessed properties that significantly improved the wavelength accuracy of the double-slit design. While a concept was not found to beat the slit-grating concept, the methodology used for the analysis and optimization is an example of the application of optoelectronic system-level linear analysis. The techniques outlined here can be used as a template for analysis of a wide range of optoelectronic systems where the entire system, both optical and electronic, contribute to the detection of complex spatial and temporal signals.

  6. High Altitude Aerial Natural Gas Leak Detection System

    Energy Technology Data Exchange (ETDEWEB)

    Richard T. Wainner; Mickey B. Frish; B. David Green; Matthew C. Laderer; Mark G. Allen; Joseph R. Morency

    2006-12-31

    The objective of this program was to develop and demonstrate a cost-effective and power-efficient advanced standoff sensing technology able to detect and quantify, from a high-altitude (> 10,000 ft) aircraft, natural gas leaking from a high-pressure pipeline. The advanced technology is based on an enhanced version of the Remote Methane Leak Detector (RMLD) platform developed previously by Physical Sciences Inc. (PSI). The RMLD combines a telecommunications-style diode laser, fiber-optic components, and low-cost DSP electronics with the well-understood principles of Wavelength Modulation Spectroscopy (WMS), to indicate the presence of natural gas located between the operator and a topographic target. The transceiver transmits a laser beam onto a topographic target and receives some of the laser light reflected by the target. The controller processes the received light signal to deduce the amount of methane in the laser's path. For use in the airborne platform, we modified three aspects of the RMLD, by: (1) inserting an Erbium-doped optical fiber laser amplifier to increase the transmitted laser power from 10 mW to 5W; (2) increasing the optical receiver diameter from 10 cm to 25 cm; and (3) altering the laser wavelength from 1653 nm to 1618 nm. The modified RMLD system provides a path-integrated methane concentration sensitivity {approx}5000 ppm-m, sufficient to detect the presence of a leak from a high capacity transmission line while discriminating against attenuation by ambient methane. In ground-based simulations of the aerial leak detection scenario, we demonstrated the ability to measure methane leaks within the laser beam path when it illuminates a topographic target 2000 m away. We also demonstrated simulated leak detection from ranges of 200 m using the 25 cm optical receiver without the fiber amplifier.

  7. Analysis of Public Datasets for Wearable Fall Detection Systems.

    Science.gov (United States)

    Casilari, Eduardo; Santoyo-Ramón, José-Antonio; Cano-García, José-Manuel

    2017-06-27

    Due to the boom of wireless handheld devices such as smartwatches and smartphones, wearable Fall Detection Systems (FDSs) have become a major focus of attention among the research community during the last years. The effectiveness of a wearable FDS must be contrasted against a wide variety of measurements obtained from inertial sensors during the occurrence of falls and Activities of Daily Living (ADLs). In this regard, the access to public databases constitutes the basis for an open and systematic assessment of fall detection techniques. This paper reviews and appraises twelve existing available data repositories containing measurements of ADLs and emulated falls envisaged for the evaluation of fall detection algorithms in wearable FDSs. The analysis of the found datasets is performed in a comprehensive way, taking into account the multiple factors involved in the definition of the testbeds deployed for the generation of the mobility samples. The study of the traces brings to light the lack of a common experimental benchmarking procedure and, consequently, the large heterogeneity of the datasets from a number of perspectives (length and number of samples, typology of the emulated falls and ADLs, characteristics of the test subjects, features and positions of the sensors, etc.). Concerning this, the statistical analysis of the samples reveals the impact of the sensor range on the reliability of the traces. In addition, the study evidences the importance of the selection of the ADLs and the need of categorizing the ADLs depending on the intensity of the movements in order to evaluate the capability of a certain detection algorithm to discriminate falls from ADLs.

  8. Analysis of Public Datasets for Wearable Fall Detection Systems

    Directory of Open Access Journals (Sweden)

    Eduardo Casilari

    2017-06-01

    Full Text Available Due to the boom of wireless handheld devices such as smartwatches and smartphones, wearable Fall Detection Systems (FDSs have become a major focus of attention among the research community during the last years. The effectiveness of a wearable FDS must be contrasted against a wide variety of measurements obtained from inertial sensors during the occurrence of falls and Activities of Daily Living (ADLs. In this regard, the access to public databases constitutes the basis for an open and systematic assessment of fall detection techniques. This paper reviews and appraises twelve existing available data repositories containing measurements of ADLs and emulated falls envisaged for the evaluation of fall detection algorithms in wearable FDSs. The analysis of the found datasets is performed in a comprehensive way, taking into account the multiple factors involved in the definition of the testbeds deployed for the generation of the mobility samples. The study of the traces brings to light the lack of a common experimental benchmarking procedure and, consequently, the large heterogeneity of the datasets from a number of perspectives (length and number of samples, typology of the emulated falls and ADLs, characteristics of the test subjects, features and positions of the sensors, etc.. Concerning this, the statistical analysis of the samples reveals the impact of the sensor range on the reliability of the traces. In addition, the study evidences the importance of the selection of the ADLs and the need of categorizing the ADLs depending on the intensity of the movements in order to evaluate the capability of a certain detection algorithm to discriminate falls from ADLs.

  9. System and method of detecting cavitation in pumps

    Science.gov (United States)

    Lu, Bin; Sharma, Santosh Kumar; Yan, Ting; Dimino, Steven A.

    2017-10-03

    A system and method for detecting cavitation in pumps for fixed and variable supply frequency applications is disclosed. The system includes a controller having a processor programmed to repeatedly receive real-time operating current data from a motor driving a pump, generate a current frequency spectrum from the current data, and analyze current data within a pair of signature frequency bands of the current frequency spectrum. The processor is further programmed to repeatedly determine fault signatures as a function of the current data within the pair of signature frequency bands, repeatedly determine fault indices based on the fault signatures and a dynamic reference signature, compare the fault indices to a reference index, and identify a cavitation condition in a pump based on a comparison between the reference index and a current fault index.

  10. A Survey of Artificial Immune System Based Intrusion Detection

    Directory of Open Access Journals (Sweden)

    Hua Yang

    2014-01-01

    Full Text Available In the area of computer security, Intrusion Detection (ID is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS. The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs. This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted.

  11. A survey of artificial immune system based intrusion detection.

    Science.gov (United States)

    Yang, Hua; Li, Tao; Hu, Xinlei; Wang, Feng; Zou, Yang

    2014-01-01

    In the area of computer security, Intrusion Detection (ID) is a mechanism that attempts to discover abnormal access to computers by analyzing various interactions. There is a lot of literature about ID, but this study only surveys the approaches based on Artificial Immune System (AIS). The use of AIS in ID is an appealing concept in current techniques. This paper summarizes AIS based ID methods from a new view point; moreover, a framework is proposed for the design of AIS based ID Systems (IDSs). This framework is analyzed and discussed based on three core aspects: antibody/antigen encoding, generation algorithm, and evolution mode. Then we collate the commonly used algorithms, their implementation characteristics, and the development of IDSs into this framework. Finally, some of the future challenges in this area are also highlighted.

  12. Engineering of an Extreme Rainfall Detection System using Grid Computing

    Directory of Open Access Journals (Sweden)

    Olivier Terzo

    2012-10-01

    Full Text Available This paper describes a new approach for intensive rainfall data analysis. ITHACA's Extreme Rainfall Detection System (ERDS is conceived to provide near real-time alerts related to potential exceptional rainfalls worldwide, which can be used by WFP or other humanitarian assistance organizations to evaluate the event and understand the potentially floodable areas where their assistance is needed. This system is based on precipitation analysis and it uses rainfall data from satellite at worldwide extent. This project uses the Tropical Rainfall Measuring Mission Multisatellite Precipitation Analysis dataset, a NASA-delivered near real-time product for current rainfall condition monitoring over the world. Considering the great deal of data to process, this paper presents an architectural solution based on Grid Computing techniques. Our focus is on the advantages of using a distributed architecture in terms of performances for this specific purpose.

  13. Detection system for optical coherence tomography: Czerny-Turner spectrometer

    Science.gov (United States)

    Kamińska, Aleksandra

    2017-08-01

    Research methods based on spectral analysis have powerful impact on development in many field of science. Signal spectrum can be a source of useful and important data. It enables to obtain information about physical and chemical properties of tested materials. This paper has been devoted to describe optical design for high resolution spectrometer, which is significant element of optical coherence tomography (OCT) systems. Designed spectrometer is working in visible range (450-830 nm). Czerny-Turner configuration enables to correcting astigmatism and coma aberration over full bandwidth. Moreover, spectrometer has uncomplicated construction. Merely, two mirrors and diffraction gratings allows to design low - cost spectrometer with satisfying optical properties. Spectrum detection has been realized using CMOS line scan sensors with 6144 pixels. It provides high speed and resolution of the system.

  14. Multidisciplinary Research in Mine Detection and Neutralization Systems: Missouri-Led Muri

    National Research Council Canada - National Science Library

    Mitchell, Robert

    2003-01-01

    ...), multi-algorithm and multi-sensor fusion, image processing and detection algorithms for lightweight airborne mine detection, concepts for designing and fielding new OPR based mine detection systems...

  15. A radioactive particle detection system for the Maralinga rehabilitation project

    International Nuclear Information System (INIS)

    Martin, L.J.; Baylis, S.H.

    1998-01-01

    Following the cessation of British nuclear testing at Maralinga, several sites were left contaminated with plutonium in various forms over areas of many square kilometres. The contamination included 239 Pu and 241 Am together with other isotopes of plutonium, and was in the form of fine dust, discrete particles and contaminated fragments of metals, plastics and ceramics. Following a government decision to rehabilitate the area to a standard suitable for re-occupation by the traditional owners, the Maralinga Tjarutja, an expert committee, MARTAC, was convened to advise the Department of Primary Industries and Energy about suitable methods and standards for the cleanup. Criteria set by MARTAC required the removal of all discrete particles of contamination exceeding 100 kBq of 241 Am and imposed limits on the numbers of particles exceeding 20 kBq. A detection system was required which could detect any radioactive particles exceeding criteria and, following rehabilitation, verify that none remained. The most useful indicator of contamination was the 60 keV gamma-ray from 241 Am. The system was fitted to a four wheel drive utility vehicle, and was based on four thin-crystal, sodium iodide detectors of 12.5 cm diameter held 30 cm above ground level. Electronic components from off-the-shelf hand-held ratemeters were used to provide the high voltage supply, amplifier and single channel analyser in a ruggedised form of proven reliability. The combined use of thin crystal detectors and single channel analyser allowed a significant reduction in background count rates while maintaining the efficiency for detection of the 60 keV gamma-ray. To allow efficient and reliable coverage, the vehicle was fitted with a high-resolution speedometer to allow the proper speed to be maintained, and a mapping display, based on the GPS system, which showed the previous path of the vehicle and boundary of the area to be scanned. Whenever a radioactive particle was detected, its coordinates were

  16. Detection of speaking with a new respiratory inductive plethysmography system.

    Science.gov (United States)

    Wilhelm, Frank H; Handke, Eva M; Roth, Walton T

    2003-01-01

    The LifeShirt system, a garment with integrated sensors connected to a handheld computer, allows recording of a wide variety of clinically important cardiorespiratory data continuously for extended periods outside the laboratory or clinic. The device includes sensors for assessment of physical activity and posture since both can affect physiological activation and need to be controlled. Speaking is another potential confounding factor in the interpretation of physiological data. Auditory speech recording is problematic because it can pick up sources other than the person's voice (external microphone) or is obtrusive (throat microphone). The abdominal and thoracic calibrated respiratory inductive plethysmography (RIP) sensors integrated in the LifeShirt system might be an adequate alternative for detecting speech. In a laboratory experiment we determined respiratory parameters indicative of speech. Eighteen subjects were instructed to sit quietly, write, and speak continuously, for 4 min each. Nine parameters were derived from the RIP signals and averaged over each minute. In addition, nine variability parameters were computed as their coefficients of breath-by-breath variation. Inspiratory/expiratory time (IE-ratio) best distinguished speaking from writing with 98% correct classification at a cutoff criterion of 0.52. This criterion was equally successful in distinguishing speaking from sitting quietly. Discriminant analyses indicated that linear combinations of IE-ratio and a variety of other parameters did not reliably improve classification accuracy across tasks and replications. These results demonstrate the high efficacy of RIP-derived IE-ratio for speech detection and suggest that auditory recording is not necessary for detection of speech in ambulatory assessment.

  17. Magneto-mechanical trapping systems for biological target detection

    KAUST Repository

    Li, Fuquan

    2014-03-29

    We demonstrate a magnetic microsystem capable of detecting nucleic acids via the size difference between bare magnetic beads and bead compounds. The bead compounds are formed through linking nonmagnetic beads and magnetic beads by the target nucleic acids. The system comprises a tunnel magneto-resistive (TMR) sensor, a trapping well, and a bead-concentrator. The TMR sensor detects the stray field of magnetic beads inside the trapping well, while the sensor output depends on the number of beads. The size of the bead compounds is larger than that of bare magnetic beads, and fewer magnetic beads are required to fill the trapping well. The bead-concentrator, in turn, is capable of filling the trap in a controlled fashion and so to shorten the assay time. The bead-concentrator includes conducting loops surrounding the trapping well and a conducting line underneath. The central conducting line serves to attract magnetic beads in the trapping well and provides a magnetic field to magnetize them so to make them detectable by the TMR sensor. This system excels by its simplicity in that the DNA is incubated with magnetic and nonmagnetic beads, and the solution is then applied to the chip and analyzed in a single step. In current experiments, a signal-to-noise ratio of 40.3 dB was obtained for a solution containing 20.8 nM of DNA. The sensitivity and applicability of this method can be controlled by the size or concentration of the nonmagnetic bead, or by the dimension of the trapping well.

  18. Penstock failure detection system at the 'Valsan' hydro power plant

    International Nuclear Information System (INIS)

    Georgescu, A M; Coşoiu, C I; Alboiu, N; Hlevca, D; Tataroiu, R; Popescu, O

    2012-01-01

    'Valsan' is a small Hydro Power Plant, 5 MW, situated at about 160 km north of Bucharest, Romania, on the small 'Valsan' river in a remote mountainous area. It is equipped with a single Francis turbine. The penstock is located in the access shaft of the HPP. 'Hidroelectrica', the Romanian company that operates the HPP, was trying to implement a remote penstock failure detection system. Starting from a classic hydraulic problem, the authors of the paper derived a method for failure detection and localization on the pipe. The method assumes the existence of 2 flow meters and 2 pressure transducers at the inlet and outlet of the pressurized pipe. Calculations have to be based on experimental values measured in a permanent regime for different values of the flow rate. The method was at first tested on a pipe, in the Hydraulic Laboratory of the Technical University of Civil Engineering Bucharest. Pipe failure was modelled by opening of a valve on a tee branch of the analyzed pipe. Experimental results were found to be in good agreement with theoretical ones. The penstock of the 'Valsan' HPP, was modelled in EPANET, in order to: i) test the method at a larger scale; ii) get the right flow and pressure transducers that are needed to implement it. At the request of 'Hidroelectrica' a routine that computes the efficiency of the turbine was added to the monitoring software. After the system was implemented, another series of measurements were performed at the site in order to validate it. Failure was modelled by opening an existing valve on a branch of the penstock. Detection of the failure was correct and almost instantaneous, while failure location was accurate within 5% of the total penstock length.

  19. Penstock failure detection system at the "Valsan" hydro power plant

    Science.gov (United States)

    Georgescu, A. M.; Coşoiu, C. I.; Alboiu, N.; Hlevca, D.; Tataroiu, R.; Popescu, O.

    2012-11-01

    "Valsan" is a small Hydro Power Plant, 5 MW, situated at about 160 km north of Bucharest, Romania, on the small "Valsan" river in a remote mountainous area. It is equipped with a single Francis turbine. The penstock is located in the access shaft of the HPP. "Hidroelectrica", the Romanian company that operates the HPP, was trying to implement a remote penstock failure detection system. Starting from a classic hydraulic problem, the authors of the paper derived a method for failure detection and localization on the pipe. The method assumes the existence of 2 flow meters and 2 pressure transducers at the inlet and outlet of the pressurized pipe. Calculations have to be based on experimental values measured in a permanent regime for different values of the flow rate. The method was at first tested on a pipe, in the Hydraulic Laboratory of the Technical University of Civil Engineering Bucharest. Pipe failure was modelled by opening of a valve on a tee branch of the analyzed pipe. Experimental results were found to be in good agreement with theoretical ones. The penstock of the "Valsan" HPP, was modelled in EPANET, in order to: i) test the method at a larger scale; ii) get the right flow and pressure transducers that are needed to implement it. At the request of "Hidroelectrica" a routine that computes the efficiency of the turbine was added to the monitoring software. After the system was implemented, another series of measurements were performed at the site in order to validate it. Failure was modelled by opening an existing valve on a branch of the penstock. Detection of the failure was correct and almost instantaneous, while failure location was accurate within 5% of the total penstock length.

  20. Real-Time EEG-Based Happiness Detection System

    Directory of Open Access Journals (Sweden)

    Noppadon Jatupaiboon

    2013-01-01

    Full Text Available We propose to use real-time EEG signal to classify happy and unhappy emotions elicited by pictures and classical music. We use PSD as a feature and SVM as a classifier. The average accuracies of subject-dependent model and subject-independent model are approximately 75.62% and 65.12%, respectively. Considering each pair of channels, temporal pair of channels (T7 and T8 gives a better result than the other area. Considering different frequency bands, high-frequency bands (Beta and Gamma give a better result than low-frequency bands. Considering different time durations for emotion elicitation, that result from 30 seconds does not have significant difference compared with the result from 60 seconds. From all of these results, we implement real-time EEG-based happiness detection system using only one pair of channels. Furthermore, we develop games based on the happiness detection system to help user recognize and control the happiness.